text
stringlengths
1
3.78M
meta
dict
A sex scandal at a Virginia fire station is under investigation by the Spotsylvania County Sheriff’s Office. Two volunteer paramedics and a volunteer firefighter are accused of having sex with minors in the firehouse. “The fact that these people were members of a county-sponsored organization makes it even more critical for us to investigate this thoroughly,” Spotsylvania County Sheriff’s Capt. Jeff Pearce said. Joseph Schlatter, a 45-year-old paramedic, was involved in a sexual relationship with 19-year-old medic Elizabeth Tosick, investigators said. They allegedly had sex at the station. They allegedly asked a teenage girl to have sex with them. “It was determined that two of the volunteer rescue squad members, male and female suspects, had approached the juvenile and had asked the juvenile female to engage in sexual relations with them while they were on duty at the fire station,” Pearce said. Volunteer firefighter Albert Dunaway, 38, had sex with a different minor and asked her for pictures of herself naked, according to the sheriff’s office. Investigators found child pornography on his home and work computers. Dunaway and Schlatter face possession of child pornography charges. Dunaway is also charged with two counts of electronic solicitation and carnal knowledge, while Schlatter is facing an indecent liberties charge. Tosick is charged with contributing to the delinquency of a minor. More charges are expected. Tosick and Schlatter were arraigned Friday. Both were recognized recently for their volunteer hours.
{ "pile_set_name": "OpenWebText2" }
58th Nova Scotia general election The 58th Nova Scotia general election may refer to the 1999 Nova Scotia general election, the 57th overall general election for Nova Scotia, for the (due to a counting error in 1859) 58th General Assembly of Nova Scotia, or the 2003 Nova Scotia general election, the 58th overall general election for Nova Scotia, for the 59th General Assembly of Nova Scotia, but considered the 36th general election for the Canadian province of Nova Scotia.
{ "pile_set_name": "Wikipedia (en)" }
<#-- /** $id:null$ $author:wmzsoft@gmail.com #date:2013.08 **/ --> <!--table-toot.ftl begin--> <#if (parameters.footVisible!true)> <div style="float:left" id="${parameters.id!'test'}_info" role="status" aria-live="polite"> ${parameters.tagbundle['table-tfoot.totalpre']!}&nbsp;${parameters.count!0} &nbsp;${parameters.tagbundle['table-tfoot.totaltail']!} <input type='text' class='pageSelected' id='${parameters.id}_pagesize' name='pagesize' value='${parameters.pagesize!20}' SIZE='3' maxlength='3' onpaste="return pagePaste()" onblur="pageBlur(this,'${parameters.id}')" originValue='${parameters.pagesize!20}' onkeypress="return pageKeypress(this, event)"> &nbsp;( <#lt><span <#rt> <#if ((parameters.pagesize!'')=='20')> <#lt> class="pagesize-select" <#rt> </#if> <#lt> onclick="spanSetPageSize('${parameters.id}',20);">20</span>,<#rt> <#lt><span <#rt> <#if ((parameters.pagesize!'')=='50')> <#lt> class="pagesize-select" <#rt> </#if> <#lt> onclick="spanSetPageSize('${parameters.id}',50);">50</span>,<#rt> <#lt><span <#rt> <#if ((parameters.pagesize!'')=='80')> <#lt> class="pagesize-select" <#rt> </#if> <#lt> onclick="spanSetPageSize('${parameters.id}',80);">80</span>,<#rt> <#lt><span <#rt> <#if ((parameters.pagesize!'')=='100')> <#lt> class="pagesize-select" <#rt> </#if> <#lt> onclick="spanSetPageSize('${parameters.id}',100);">100</span><#rt> )&nbsp;${parameters.tagbundle['table-tfoot.items']!}<#t> </div> <div id="${parameters.id!'test'}_paginate" style="float:right"> ${parameters.pagenum!0}&nbsp;/&nbsp;${parameters.pagecount!0}${parameters.tagbundle['table-tfoot.cpagetail']!} <#if ((parameters.pagenum!1)>1)> <a href='javascript:pageFirst("${parameters.id}")' class="table-tfoot-page-first"></a> <a href='javascript:pagePre("${parameters.id}")' class="table-tfoot-page-pre"></a> </#if><#rt> <#if ((parameters.pagenum!1) < (parameters.pagecount!1))> <a href='javascript:pageNext("${parameters.id}")' class="table-tfoot-page-next"></a> <a href='javascript:pageLast("${parameters.id}")' class="table-tfoot-page-last"></a> </#if> ${parameters.tagbundle['table-tfoot.goto']!} <INPUT TYPE='text' id='${parameters.id}_topage' NAME='gotoPage' class="gotoPage" value='1' onpaste="return pagePaste()" onkeypress='pageGotoKeypress("${parameters.id}", event)' SIZE='3' maxlength='5'>${parameters.tagbundle['table-tfoot.cpagetail']!} <input type='button' value='GO' onclick='pageGoto("${parameters.id}")' class='btn_href_GO'> <a href="javascript:exportExcel('${parameters.id!x}');" title="导出Excel" class="expexcel"> <img border='0' src="${baseSkin}/images/excel.png"/> </a> <a href="javascript:exportWord('${parameters.id!x}');" title="导出Word" class="expword"> <img border='0' src="${baseSkin}/images/word.png"/> </a> <a href="javascript:custcolumn('${parameters.id!x}');" title="自定义列" class="custcolumn"> <img border='0' src="${baseSkin}/images/custom.jpg"/> </a> <a href="javascript:tableFullScreen('${parameters.id!x}');" title="全屏" class="detach"> <img border='0' src="${baseSkin}/images/full.png"/> </a> <input type="hidden" id="${parameters.id}_pagenum" name="pagenum" value="${parameters.pagenum!1}"> <input type="hidden" id="${parameters.id}_pagecount" name="pagecount" value="${parameters.pagecount!0}"> <input type="hidden" id="${parameters.id}_pagesort" name="orderby" value="${parameters.orderby!''}"> </div> </#if> <!--table-toot.ftl end-->
{ "pile_set_name": "Github" }
This invention relates to a diffusion bonding method to be adapted to a superalloy based on Ni, Co, Fe or Ti. Recently, gas turbine blades have been produced by joining structural members consisting of superalloys together in a predetermined configuration. In bonding the superalloys, however, they must have the same properties as those of the superalloy base metals and hence, no definite bonding method has yet been established. Fusion welding or high temperature brazing using a Ni-based brazing material has generally been employed. However, strict limitations exist in applying the fusion welding techniques to turbine structural members and a number of structural elements can not be adapted simply because of their complicated shapes. Though brazing offers a number of advantages in comparison with fusion welding, it has very limited application because the brazed joint portion has relatively low strength and its melting point is low. Diffusion bonding, which involves the movement of the atoms between the contact base metals, is known as a bonding method having high reliability. To practise this method, however, severe requirements must be satisfied. That is, the surface coarseness of the joint surfaces must be minimized, the joint surfaces must be completely cleaned and a non-joint interface must be eliminated. To satisfy the last mentioned requirement, diffusion treatment must be carried out under high pressure contact conditions for an extended period of time. To facilitate the finish of the joint surface and to improve the joint strength, there have been proposed a method which arranges a powder insert material between the base metal surfaces to be joined and carries out diffusion bonding until the insert material finishes the reaction with the base metals (U.S. Pat. No. 3,632,319) and a method which places a foil-like insert material between the base metals to be joined and carries out diffusion bonding until the insert material finishes the reaction with the base metals (U.S. Pat. No. 3,678,570). When the foil is used as the insert material in accordance with the prior art methods, two interfaces exist between the base metals and the insert material and when the powder is used as the insert material, an extremely great number of interfaces exist between them. The greater the number of the interfaces between the joint surface of the base metals and the reactive metallic insert material, the severer becomes the pre-treating condition of the base metal surface and the longer becomes the time required for diffusion treatment. Incidentally, diffusion treatment is carried out for about 24 hours in order to obtain the joint portion having substantially the same characteristics as those of the base metals.
{ "pile_set_name": "USPTO Backgrounds" }
President Donald Trump gave hope to the terminally ill and their advocates on Tuesday when he said he would change Federal Drug Administration rules to allow access to experimental drugs not yet approved by the agency. "One thing that's always disturbed me: They come up with a new drug for a patient who's terminal, and the FDA says we can't … approve the drug, because we don't want to hurt the patient. But the patient is not going to live more than four weeks, [anyway]. So, we're going to be changing a lot of the rules," Trump said. Trump's announcement was embraced by terminally ill individuals, their loved ones, and advocacy groups interviewed by the Washington Free Beacon. "Terminally ill patients are fortunate to have a compassionate champion in President Trump," said Josh Schisler, founder and president of Freedom of Treatment, in an email. "Americans fighting for their lives don't have decades to wait for the FDA to approve new treatments." Schisler's group began advocating for wider access to experimental drugs in 2013 after his girlfriend died of brain cancer. While doctors did everything possible to extend her life, she was unable to access experimental treatments in the final stages of her life, according to Schisler. "It's obvious there's something that President Trump knows and it shows he's showing compassion," said Missouri state Rep. Jim Neely (R.) in a phone interview. Neely, a physician, sponsored "Right to Try" legislation in Missouri in 2014. For Neely, Right to Try took on a personal meaning. His 40-year-old daughter, Kristina, was diagnosed with stage-four colon cancer. She died without access to experimental drugs because she didn't qualify for clinical trials. "I see phenomenal medications that are working. There was a drug for congestive heart failure five years ago," Neely said. While that drug is now available, it was not available before final FDA approval despite its amazing results. "I'm all in and I applaud President Trump for his proactive action," Neely said. For four years during the Obama administration, the national Right to Try movement has pushed for wider drug access to medications that have shown positive results in clinical trials but have not been approved by the FDA. The movement, led by the conservative Goldwater Institute, resulted in 33 states passing Right to Try laws. Seventeen other states are considering Right to Try bills. "If a drug is approved in another developed country, like the UK or Japan, it should be available to Americans. There are countless examples of drugs that are available and saving lives in Europe, but stuck in the FDA pipeline," said Starlee Coleman, vice president of communications for Goldwater Institute, via email. "There's an ALS therapy that has been in use in Japan for 10 years and is prolonging life and reducing suffering, but Americans can't get it. There are breast cancer drugs that are saving lives in England and American women can't take them," Coleman said. The drug in Japan is one that Matthew Bellina, who has ALS, also known as Lou Gehrig's disease, cannot access. Bellina applauded Trump's announcement, expressing his frustration with the FDA approval process. "President Trump's direction to streamline the FDA is a necessary and long overdue step in fixing a broken system," said Bellina in an email. "It is frustrating that Americans with ALS cannot access this drug," Bellina said. Laura McLinn, whose 7-year-old son Jordan has Duchenne Muscular Dystrophy, said Trump's announcement was the best news she has heard in years. "To hear President Trump talk about the importance of lowering drug costs and helping terminally ill patients access drugs more quickly was probably one of the best things I've heard in two years. And I believe if anyone can make that happen … he can," said McLinn in an email. "It's a good feeling when everything you've worked for for so long is recognized as being important. And for it to be recognized by the president of the United States … wow. He knows it's what the people want and he's made a commitment to see it through," said McLinn. Jordan still does not have access to the drug his family hopes will help him, but he is being screened to receive it in February for a clinical trail, according to McLinn. "While we are obviously elated, there's another part of my heart that is broken. I have so many friends who have sons who are not qualifying for the trial so even though they have had the same hope for many years, they are now finding out that it's too late," McLinn said. "Their sons have declined to the point that they won't make it into the trial. Too much wait time. So unfair and heartbreaking."
{ "pile_set_name": "OpenWebText2" }
Erythrocyte sedimentation rate and C-reactive protein levels are poorly correlated with clinical measures of disease activity in rheumatoid arthritis, systemic lupus erythematosus and osteoarthritis patients. To determine the patterns and correlation of elevated erythrocyte sedimentation rate (ESR) and C-reactive protein (CRP) levels with outcome measures in rheumatoid arthritis (RA), and compare it to systemic lupus erythematosus (SLE) and osteoarthritis (OA) patients. Brooklyn Outcomes Arthritis Registry Database (BOARD) was analyzed to determine both first visit and mean values of ESR and CRP, along with disease activity measures in each patient. Data were analyzed with descriptive statistics and correlations. Among all patients half of all (n=377) ESR results were elevated. In RA patients the proportions of having both ESR and CRP elevated, both within normal levels, and only one elevated and the other normal were similar. For all diagnosis, both ESR and CRP have weak positive correlations with disease activity measures measured at first visits. ESR and CRP have a modest positive correlation with each other across all three disease groups. In this cohort of RA, SLE and OA patients, ESR and CRP values were modestly correlated with each other and they were weakly correlated with disease activity measures. These data suggest that another look at the role of ESR and CRP as markers of inflammation in RA patients seen in routine care may be in order.
{ "pile_set_name": "PubMed Abstracts" }
Students of the early modern period and its literature will be familiar with the 'barber-surgeon', usually glossed as a medical practitioner who performed a range of services from grooming to bloodletting. Eleanor Decamp seeks to deepen our understanding of this figure, but also to place pressure on the hyphen so that we can see that barbery and surgery were discrete if related occupations. In the process of explaining what made the barber and the surgeon recognisable to their contemporaries, she teaches us how to notice these figures on the landscape of representation. The barber wore an apron -- a garment he shared with other tradesmen -- but also carried recognisable equipment, linking him to 'the visible, legible, material world of the tradesman' (p. 46). While the surgeon might be recognised by his robe and coif, he was a 'mobile, transient figure who emerges, both literally and figuratively, at moments of crisis' (p. 47). Barbers were associated with a range of readily identified equipment: razor, scissors, basin, fleam (or lance), soapballs (with attendant puns), cupping glasses, ear-picker, comb. Surgeons had tools, of course, but these were less readily inventoried because they were constantly changing and were idiosyncratic, varying from practitioner to practitioner. In short, while props made the barber, they did not make the surgeon. The barber was often depicted in his shop, announced by a basin, a pole, even strings of teeth. In contrast, surgeons went to patients, working at the site of injuries on ships and battlefields, in households and workplaces, and sometimes in hospitals or their own homes. As a consequence, on the stage, Decamp shows, the surgeon has no place and no iconic props. Because surgeons opened bodies, the stakes of their practice were higher: 'To play a surgeon is a diabolical act; to play with barbery is harmless foolery' (p. 90). Barbers were often associated with deception; barbery is a show, even a put on. In contrast, perhaps simply because playmakers knew less about surgeons than they did about barbers, surgery is a secret and occurs off-stage. If we see it, that's because it is irregular or questionable in some way. In contrast to the chatty barber, the discreet 'surgeon's lack of spoken language *is* his narrative' (p. 190). Insisting that we always contrast the barber and the surgeon in this way, Decamp models a double vision that defines each occupation in terms of the other. Rich texture and evidentiary range distinguish this book, rather than bold argument. Decamp draws on an extraordinary range of primary sources, creatively gathered and interpreted. For instance, she several times makes good use of artefacts excavated from the wreck of the *Mary Rose* (a Tudor ship). She also consults wills, inventories, language manuals and dictionaries, medical treatises and ballads. Above all, she mines a wide range of plays, as the word 'performing' in her title might signal. First and last, she considers Lyly's *Midas*. But she also discusses, among others, Jonson's *Epicoene* and *Staple of News*, Webster's *Devil's Law Case*, Marston's *Dutch Courtes*an, Beaumont's *Knight of the Burning Pestle*, Middleton's *Fair Quarrel*, Markham and Sampson's *Herod and Antipater*, Fletcher and Massinger's *Sea Voyage*, Fletcher's *Monsieur Thomas*, and Chettle's *Hoffman*. She devotes the central chapter to case studies of Shakespeare's *Titus Andronicus* and *King Lear*. The non-dramatic texts to which she devotes sustained attention are Thomas Nashe's pamphlet *Have at You Saffron Walden* and an anonymously authored attack on Nashe, *The Trimming of Thomas Nashe*. While her discussion ranges from her earliest play, Richard Edwards's *Damon and Pithias* (first performed 1564--5) to the end of Restoration, the weight of her evidence comes from the period we associate with the flourishing of the drama: the later sixteenth century to the mid-seventeenth century. Her focus is London and the writers and cultural institutions centred there. Why is drama the central body of evidence here? Decamp links her choice to 'the meaning-making of drama, which is interested in questions of legitimacy, the correspondences between constitutional and corporeal bodies, the consequences of attempting to 'reach beyond' your lot, and the hazards of being misread and falsely labelled (directly or indirectly)' (p. 4). Barbers and surgeons were 'in the business of altering, amending, reinventing, and reshaping bodies and therefore identities' (p. 18), which was also a preoccupation of the stage. She also argues that 'forms of disguise which accompany the representation of a specific character (a barber or surgeon), as opposed to a specific actor, showcase production itself, and makes those characters discernable theatrical constructs, on or off the stage' (p. 63). The moments at which Decamp discusses the close connections between her topic and her archive are among the most interesting and useful in the book. In four of her five chapters, Decamp contrasts depictions of barbers and surgeons with respect to props, disguise, sound and language. In the chapter at the centre of the book, she proceeds a bit differently, offering case studies of how the associations around 'hazardous barbery' intensify moments of high crisis in Shakespeare's *King Lear* and *Titus Andronicus*. Although Decamp here addresses the best-known of the plays she has chosen, the chapter's argument is the book's most argument-driven and provocative. Decamp focuses on the scene in *Titus* in which Lavinia assists her father in murdering her rapists, Chiron and Demetrius, and making them into a pie to feed their mother Tamora. Decamp focuses our attention on the basin in which Lavinia collects the blood, an object associated with barbers, who used it for shaving and for bloodletting. In *King Lear*, Decamp again focuses on a scene and a prop, here the blinding of Gloucester and the chair to which he is first bound. Both objects, she argues persuasively, would have evoked the medical side of barbery and customers' terror at their vulnerability to the person who collected their blood in a basin or tied them to a chair to extract teeth. Neither play or scene mentions 'barber-surgery', that hybrid space in which barbers performed services we would now consider medicine. Yet, Decamp argues, the plays depend on a 'lurking medical and civic satire' (99) of the barbarism of such commonplace practices. While other playwrights portray such practices in city comedies, Shakespeare draws on them in these two tragedies, indirectly evoking them to heighten trauma. In the course of the book, Decamp suggests that barbery was a literary resource in a way that surgery was not. The barber figure moves from medieval drama, through popular dramatic scenes culled from earlier plays for performance during the interregnum, to the Restoration. This is not true for the surgeon. 'Put crudely, barbery material was evidently popular so playmakers made ample use of it to stuff their works: filling subplots, creating interludes' (p. 177), just as barbers purportedly used the hair they cut off to stuff tennis balls. The barber is also closely associated with the playmaker and the barber's shop with the theatre. Like the playmaker, the barber 'was endowed with the ability both to expose and to conceal or reconstruct a client's social standing and/or very nature' (p. 64). Just as playgoers are still called audiences or hearers, so the barber's shop was a 'sound-market' where 'ears were treated, entertained, and abused' (p. 136) and news and gossip exchanged. Decamp's thorough and erudite book will not only train readers to notice both barbers and surgeons in early modern drama and early modern English culture more generally. It also tunes our ears, as barbers might have, to the complex, historically specific resonances of objects (such as basins), words (including 'trim' and 'barbarous'), and names including Lavinia (associated with washing) and Chiron (who shares with the chirurgeon a root in the Greek word for hand).
{ "pile_set_name": "PubMed Central" }
Electrospinning of sodium alginate-pectin ultrafine fibers. In this study, we investigated the electrospinning process of sodium alginate-pectin fibers intended to be used as a carrier for stabilizing folic acid. Fiber-forming solutions containing 0.01% (w/w) folic acid were prepared by blending low- or medium-viscosity sodium alginate with pectin in a 70 : 30 ratio to form LSAP and MSAP solutions, respectively. Similar to other polysaccharide polymers reported previously, these solutions could not be electrospun. However, the incorporation of poly(ethylene oxide) (PEO) effectively enabled the electrospinning process. Electrospun fibers of different morphologies, ranging from fiber to fiber-bead, were obtained, depending on the blend ratio, concentration, and viscosity of the polymer-PEO solution used. Fibers electrospun from 3% MSAP/PEO (80%/20% w/w) had the smallest diameter (about 40 nm), whereas fibers containing higher PEO contents were larger in diameter. Bead-free fibers were formed when 4% LSAP/PEO (50/50) and 5% LSAP/PEO (80/20 to 50/50) were electrospun. The electrical conductivity and surface tension lowering effects of PEO on the polymer solution were likely the contributing factors for the observed electrospinning behaviors. By adjusting the formulation of the polymer solution, fibers of various morphologies may be obtained to suit different end-use applications. A study is currently ongoing to investigate the effectiveness of these fibers for stabilizing folic acid.
{ "pile_set_name": "PubMed Abstracts" }
A leader of the Palestinian group Hamas has said there will not be a renewal of the Gaza ceasefire that ends on Friday unless Israel meets some of its demands. Ismael Radwan told Al Jazeera: “The truce will not be renewed; it cannot be renewed without real achievements. As we speak, no response has been received to Hamas’s demands, which means there is no breakthrough in this respect.” A 72-hour deal brokered by Egypt took effect on Tuesday, bringing relief to residents in the Gaza Strip after four weeks of fighting and heavy bombardment. Israeli media has reported that Israel was offering to extend the ceasefire for another 72 hours unconditionally. Al Jazeera's Nicole Johnston, reporting from Jerusalem, said there were also reports in Egyptian media that the truce could be extended but few details were coming out of Cairo on any progress made with the talks. "It really goes to show how difficult it is for both sides to reach an agreement," our correspondent said. While Israel is calling for demilitarisation of the Gaza Strip, Hamas wants the Israeli blockade on Gaza lifted, and the release of Palestinian prisoners. On Wednesday, Israel's Prime Minister Benjamin Netanyahu defended his country's military actions during the four-week-long assault, blaming Hamas for the fatalities in Gaza. In a news conference in West Jerusalem, Netanyahu said: "Israel deeply regrets every civilian casualties. The people of Gaza are not our enemy, our enemy is Hamas". "Every civilian casualty is a tragedy, a tragedy of Hamas's own making." Netanyahu said Israel's intense bombardment of Gaza was a necessary response to Hamas attacks. "It was justified. It was proportionate," he said. At least 1,875 Palestinians, most of them civilians, were killed in the assault, while 67 people, including 64 soldiers, died on the Israeli side Netanyahu's comments came as UN Secretary-General Ban Ki-moon said the deaths in Gaza "have shocked and shamed the world". The UN chief has also called for investigation into bombardment of UN facilities in Gaza. "Attacks against UN premises, along with other suspected breaches of international law, must be swiftly investigated," he said. 'Senseless cycle of suffering' The UN has called on all parties in the Middle East to find a lasting peaceful solution to the conflict in Gaza. In a special meeting of the UN General Assembly convened at the request of Arab countries, Ban said: "The senseless cycle of suffering in Gaza and the West Bank, as well as in Israel, must end. Ban called for an end to rocket fire from Gaza and weapons smuggling as well as lifting an Israeli-Egyptian blockade on Gaza and bringing the besieged territory back under one Palestinian government. In Gaza, where about a half-million people have been displaced by a month of bloodshed, some residents have left UN shelters during the ceasefire to trek back to neighbourhoods where whole blocks have been destroyed by Israeli shelling and the smell of decomposing bodies fills the air. Meanwhile, streets in towns in southern Israel, which had been under daily rocket fire from the Gaza Strip, have again come to life with children playing.
{ "pile_set_name": "OpenWebText2" }
Initial planning benefits complex prospective memory at a cost. The effect of initial planning on complex prospective memory was investigated using a virtual environment and a sample of healthy young adults (N = 34). Participants were assigned to either an initial planning or a control condition and were asked to complete a series of time- and event-based prospective memory tasks. The planning group completed the tasks more quickly and accurately than the control group. However, the total time spent, including both planning and task execution, was comparable for the two groups. Within the planning group, tasks that were planned were more likely to be completed than unplanned tasks, but inclusion of overly detailed information in the plans resulted in poorer performance. These results suggest that although initial planning can be beneficial to task completion, the complexity of a plan may contribute to decrements in performance.
{ "pile_set_name": "PubMed Abstracts" }
2018 NEK Ladies Open – Singles This was the first edition of the tournament. Iga Świątek won the title, defeating Katarina Zavatska in the final, 6–2, 6–2. Seeds Draw Finals Top half Bottom half References Main Draw NEK Ladies Open - Singles
{ "pile_set_name": "Wikipedia (en)" }
Q: Is there downtime involved when using Azure vertical scaling? I have a two websites on a VM with WHM/cPanel and MySql. I am looking to move this into Azure and use vertical scaling. Visits to the website are usually stable but three or four times a year there is a big increase in traffic which historically has caused big problems for the existing host. I am looking to move it into the A5-A7 range of servers for the vertical scaling. I cannot find anything anywhere about whether there is any downtime involved when Azure scales up my VM from A5 to A6 or whatever. Does anyone have any experience with this and can give me a definitive answer as to whether there is downtime when using vertical scaling, and if there is any downtime involved then the kind of downtime I would expect Thank you for your time. A: Yes, it will incur downtime. Post on it Azure will restart your VM. Quote from the page (I highlighted the important bit): When considering the ability to resize virtual machines there are three key concepts that will impact how simple it is to change the size of your VM. The region in which your VM is deployed. Different VM sizes require different physical hardware. In some instances, an Azure region may not contain the hardware required to support the desired VM size. All Azure regions support the VM sizes Standard_A0 – A7 and Basic_A0 – A4. You can then find which other VM sizes are supported in each region under the Services tab of the Azure Regions web page. The physical hardware currently hosting your VM. If the physical hardware currently running your virtual machine also supports your desired new size, then it is very easy to change the VM size through a simple size change operation which results in a VM reboot. The deployment model used for the VM. The two deployment models are Classic and Resource Manager. The Resource Manager model is the newer model, and it supports some ease of use functionality not available in the classic deployment model.
{ "pile_set_name": "StackExchange" }
Category: activism The University of British Columbia University Sexual Assault Panel‘s report, which provides recommendations for both the university’s stand-alone policy as well as their sexual assault action plan, goes to President Martha Piper today, and it will have its public release at a date soon to be determined. I have spent the past three months working weekly with a group of excellent and committed UBC faculty members on this report. We have all put in more hours than originally anticipated, and in the last few weeks in particular I have been living and breathing this report every single day. This has been difficult, and I must emphasize, completely voluntary work. It has been work that comes with more costs than it does rewards. And there have been costs for me, ones that I cannot even yet fully grasp. While it has been a choice to go public and to advocate for change around sexual assault in educational institutions, it has also changed my life irrevocably, and not always for the better. I have given up my privacy. In many cases, I have given up my dignity: the most traumatic incidents of my life have become fodder for trolls on the internet. In being such a vocal critic of universities, I have also potentially signalled my liability as an employee in academic spaces. I do not have the protection of job security or the academic freedom that comes with a tenured position. I have tried to do all of this work while also balancing my research and my teaching. It is financially precarious, emotionally and intellectually arduous, and often frighteningly lonely. In doing this work, I have also lived and re-lived some of the most humiliating and traumatizing incidents of my life. It is no coincidence that of the six incidents of sexual assault I have experienced since 2002, five of them have taken place on the campuses of educational institutions, UBC included. As is evident by so many of the stories coming out in the press, educational spaces are ones in which violence often goes un-checked, or worse, covered-up. Policies are lacking. Resources are non-existent or understaffed. Education around responding to disclosures is not always present or consistent. In the past three months, as I have had to give more thought to how UBC should be better equipped to respond to reports and disclosures of sexual assault, I have thought about my own assault that took place at UBC more than five years ago, one that I pushed as far into the recesses of my mind as possible so that I could focus on my doctoral degree. I should say that deciding not to deal with that sexual assault more or less succeeded. To the outside world, anyway. In the years after my assault in 2011, I received federal funding for my scholarly work; I became a Liu Scholar at the Liu Institute for Global Issues; I presented my work at numerous national conferences; I’ve published in top journals in my field; I’ve become a consultant on national and provincial anti-violence initiatives; I’ve sat on countless panels, given countless interviews, written countless articles. I passed my doctoral defence with only two typos as revisions. My C.V., which details the past six years of my doctoral career, reads almost flawlessly, as if nothing ever happened. But something did happen. A few weeks into the spring term of 2011, just over a year into my doctoral program, I was sexually assaulted in the graduate lounge of my department, by student who had recently graduated from the program. I will spare you the preamble and the gory details, not because I am ashamed, but because they don’t particularly matter, and I am, despite my public persona, an intensely private person. But what you need to know is that I was terrified. Having someone’s arm crushing your sternum, and very nearly your throat, will do that do you. And afterwards, I was lost. I sought help at the Sexual Assault Support Centre, which, at that time, was located at the back corner of the old Student Union Building, right on the edge of what used to be MacInnes Field. In order to get to the front door of the SASC, you had to walk through and past all of the SUB’s garbage and recycling bins. I hope I do not need to explain that the fact that accessing support services adjacent to the building’s trash disposals made me feel as though I, too, was trash. Having tried to report sexual assault during high-school (and getting nowhere) and reporting stalking in my time at SFU (and only getting a rape whistle and a pamphlet), I knew that I wasn’t about to try yet again to receive any sort of justice. So I said nothing. And I did my work. It wasn’t the first time I’d been assaulted, and as it turns out, wasn’t the last. Somehow, violence can take on a strange sense of ordinariness. It becomes a thing that just happens before you get back to work. Except when you dream about it. Except when it affects every single moment of your life. Except when you’re in crowds, or small spaces, or big crowds, except when you don’t have a seat close to the exit in the room, except when someone frightens you. Except then. If this is the way things are for me, I want things to be different for others. Truthfully, I want to live in a world where sexual violence doesn’t exist at all, but if that can’t happen, I want to live in a world where survivors of sexual assault are supported and believed, and where there are robust systems of accountability for both perpetrators and institutions. I believe that the judicial system is flawed, and that we need better options for education and rehabilitation. I know that I don’t have all the answers. But what I know is this: I want to live in a world where my fellow survivors and allies do not have to file human rights complaints (Mandi Gray – York University, Glynnis Kirchmeier – University of British Columbia) against their institutions because they are being failed; where we do not have to go to the media because the schools we attend will not listen otherwise. I want to live in a world where survivors do not feel as if they have no choice but to drop out of school, as recently happened at Simon Fraser University. I want to live in a world where survivors, like Lizzy Seeberg, do not take their lives because they are, as Rehtaeh Parsons’ father put it regarding his daughter’s suicide, “disappointed to death” by systems that re-traumatize and re-violate survivors. I know that the report will not fix everything. Nor will the policy. Nor will all the blue phones in the world. Because horrible things still happen. Nor do I think everything at UBC is broken, either. There are many good people working in a complicated and often-broken system, one that is ultimately dependent on the fact that a university is not simply a place of learning, but also a business. There are already so many front-line workers (those at the SASC in particular, under the leadership of the incredible Ashley Bentley) and staff members who provide services to sexual assault survivors at UBC every day. There are UBC faculty who have signed the petition demanding better for their students, and apologizing for not having done enough. They organized a fantastic day of discourse and dialogue around sexual assault in February of this year. I am grateful especially to other students who are doing such amazing work: the ones who worked tirelessly in the decades before I even arrived on campus, the ones who I have stood with in my own time as a student, the ones who take up the torch now. This journey has connected me to so many of you, not just at UBC, but across the country, and although we have come together under such awful circumstances, I am so glad and grateful to know you. I wish you didn’t have to go through this. I know it’s such hard work. I keep a fire for you in my heart, always. At the end of the day, I am not a faculty member, nor an administrator, nor a politician. I do not hold exceptional power within the UBC system. I am just a person who has been fortunate enough to hear stories that have been disclosed to me in whispers and private messages and phone calls. I am humbled by those stories, even as they keep me up at night, worried. I am just a person who has gone through some extremely difficult experiences, ones that I don’t care for anyone else to have to go through. That these experiences have occurred in the context of my schooling is painful; painful because school has otherwise been a place of joy for me, painful because sexual violence formed part of a curriculum I had no desire to have delivered to me. I have, as Raymond M. Douglas writes in his book On Being Raped, gained knowledge, but “not the sort that does you, or anybody else, any good. When I was raped, I learned things about myself and the world I live in that it would have been far better not to know. And for most of my adult life, the knowledge has been killing me” (4). I could have happily gone through my educational career without these particular insights. I could even have written my dissertation on representations of sexual violence without the added expertise of lived experience. Having finished my PhD, I now leave the hallowed halls of UBC behind, hoping that in some small measure, they have become a better place for survivors because I and others have spoken up, and because panels like the one I was privileged to be a part of are doing the work that they are doing. I am aware of the fact that the increased scrutiny of the university’s response to sexual assault has been a nightmare for students, faculty, staff, and administrators alike. But I don’t think that the fact that UBC is currently under pressure to respond thoughtfully is a bad thing. Following the publication of his book Missoula: Rape and the Justice System in a College Town, Jon Krakauer faced incredible amounts of backlash by the town of Missoula itself, by the University of Montana, and by the police force. As reported by Jacob Baynham on Outside Online, one woman left this comment on Krakauer’s Facebook page: “I am so disappointed in the title of your book,” said one woman on Krakauer’s Facebook page. “I hate to see a lovely town’s reputation get destroyed.” But as Krakauer points out, Missoula is just one example of the epidemic of sexual violence across America. Missoula could just as easily be Stanford, could just as easily be here in Vancouver. But the conversation sparked by such intense scrutiny has, at least as far as is being reported, created actual change. After a town hall forum in Missoula, Baynham reports that Krakauer was asked if he’d send his daughter to the University of Montana. “I would,” he said. “I think the university is safer now than most schools. Missoula is a lot better than most places. You have this big problem, but you’ve gone a long way toward fixing it.” I think that the University of British Columbia can be a Missoula: not the school to be made a painful and humiliating example of, but the school that paves the way for comprehensive change at all levels of administration and campus life, and does in a way that does not simply prioritize supporting sexual assault survivors because it will look like a better strategy for fundraising. Call me an idealist, but I think it’s possible. And there are so many people, myself included, who want to make that happen. There are countless people with whom our panel consulted of the course of our work. The university’s draft sexual assault policy has been released, and both campus and community stakeholders are invited to give feedback here. But for now, I take my leave from my alma mater, look for brave new worlds. There is so much anti-violence work out there to do, and I will continue to do it. May the development of the UBC sexual assault policy and the action plan be an honest process, tempered by humility and by courage. For all of the survivors of sexual assault who live and work at UBC: I love you, I am in awe of you, I believe you.
{ "pile_set_name": "Pile-CC" }
John - Following-up on our conversation of Friday, I have attached a copy of your proposed NDA marked to reflect Enron's comments. I have left the description of the "Project" blank for now as I am waiting confirmation from our business personnel of the exact language they would prefer to use. In the meantime, please take a look at the attached and let me know your thoughts. Thanks. Mark Senior Counsel, EWS Phone: 713-345-8897 Facsimile: 713-646-3490 E-Mail: Mark.Greenberg@enron.com
{ "pile_set_name": "Enron Emails" }
Radomerščak Radomerščak () is a settlement in the Municipality of Ljutomer in northeastern Slovenia. The area traditionally belonged to the Styria region and is now included in the Mura Statistical Region. The Slovene philologist Franz Miklosich was born in the village in 1813. His birth house is preserved as a museum. It dates to the 17th century and was expanded in 1926 when a commemorative plaque was also unveiled. It was restored in 1960 and again in 1991. The chapel-shrine in the north of the settlement was built in the late 19th century. References External links Radomerščak on Geopedia Category:Populated places in the Municipality of Ljutomer
{ "pile_set_name": "Wikipedia (en)" }
The present invention relates to labels, and more particularly, to a two-ply label for pharmaceutical products having printing on three surfaces and a resealable top panel. As regulation of the pharmaceutical industry continues to increase, more and more information is required to be prominently displayed for consumers on the pharmaceutical product packaging or containers. Many pharmaceutical products also comprise a plurality of ingredients, all of which must be indicated on the product containers. While over-the-counter products sold in boxed packaging often have ample space for all the required consumer information, pharmaceutical products requiring physician prescriptions are sold by pharmacists in pill containers to which identification labels are affixed. The significant amount of information required to be included on these pharmaceutical bottle labels poses considerable problems when traditional labels are used. Labels are either required to be very large in order to be able to contain all the required identification information, or the information is minutely printed to ensure it fits on the label. As well as the slightly increased cost of printing larger labels, the use of a larger container simply to be able to accommodate the increased label size would become necessary. As a result, labels having more than one printed surface are becoming increasingly common. This permits a significant amount of information to be accommodated on the pharmaceutical bottle label, with legible sized printing and without resulting in an extremely crowded appearance. U.S. Pat. No. 5,056,827 issued Oct. 15, 1991 to Sasso, for example, discloses a pharmaceutical label having a printed front and back side. Each end of the label is permanently adhered to the pharmaceutical bottle, and a central double-sided printed portion of the label is attached between the two glued ends. The printed underside of the label can be accessed by tearing away a perforated strip separating the central printed portion from one of the glued ends. Canadian Patent Application 2,297,193, laid open Jul. 27, 2000, similarly discloses a label for a pharmaceutical bottle having a double sided printed section which can be peeled away from the permanently adhered end sections. However, after reading the information located on the reverse side of the printed section of the label, this section can then be resealed to its original position on the bottle. Minute spots of adhesive on the rear of the printed label section permit the peeled away section to be re-fixed in place. Several problems with these labels nevertheless remain. The quantity of information now required has become too much to fit in a visibly pleasing way even on two sides of a standard sized label. Without increasing the size of the label, smaller printing is the only other solution at present. Another disadvantage of the resealable label of Canadian Patent Application 2,297,193 remains in that the small spots of adhesive quickly lose their adhesive properties once the label has been peeled back and replaced several times. It is an object of the present invention to provide an improved label for pharmaceutical bottles. It is another object of the present invention to provide a self-adhesive two-ply label. It is another object of the present invention to provide a resealable label that permits the label to be peeled back and re-adhered many times. It is a further object of the present invention to provide a two-ply label having printing on three sides of the label. Therefore, according the present invention, there is provided a two-ply label adapted to be adhered to an object, said label comprising: a top and a bottom ply; said top ply having a front and rear printable surface, and said rear printable surface having deadened permanent adhesive thereon; said bottom ply having a front printable surface and a rear surface having permanent adhesive thereon, adapted to adhere said label to an object; and said rear printable surface of said top ply being immediately superimposed on said front printable surface of said bottom ply. There is also provided a label adapted to be adhered to an object, said label comprising: a top and a bottom ply; said top ply at least partially superimposed on said bottom ply, and having a front and rear printable surface; said top ply being removably adhered to said bottom ply; and said bottom ply being adapted to be permanently adhered to an object. According to the present invention, there is additionally provided a two ply label adapted to be adhered to an object, said label comprising: a top and bottom ply, hinged together along a common edge; said top ply having a front and rear printable surface; said bottom ply having a front printable surface and a rear surface having permanent adhesive thereon, adapted to adhere said label to an object; and said rear printable surface of said top ply being immediately superimposed on said front printable surface of said bottom ply.
{ "pile_set_name": "USPTO Backgrounds" }
The Landau-Kleffner syndrome or 'acquired aphasia with convulsive disorder'. Long-term follow-up of six children and a review of the recent literature. We present six patients with acquired aphasia with convulsive disorder (Landau-Kleffner syndrome) and distill the main clinical features from a review of the recent literature. Our series showed that the clinical picture can vary at onset, as well as during the course of the illness, and that the long-term outcome of the aphasia is quite unpredictable, despite the fact that epilepsy and electroencephalographic abnormalities usually regress or disappear with the years. We also call attention to the electroencephalographic phenomenon of electrical status epilepticus during slow sleep, and we suggest that the course of the aphasia may well be linked to the appearance and disappearance of electrical status epilepticus during slow sleep. Therefore, we recommend a sleep electroencephalogram in all children with Landau-Kleffner syndrome. Finally, our findings did not demonstrate the beneficial effect of treatment with anticonvulsants on the aphasia, but recent studies have shown that treatment with corticosteroids, whether combined with anticonvulsants, is effective.
{ "pile_set_name": "PubMed Abstracts" }
Powertrax No-Slip Traction SystemInstallation … or so we thought… make that …Detroit Locker InstallationOccasionally you set out to do a project and things don’t always go as you planned. This was one of those such […]
{ "pile_set_name": "Pile-CC" }
Friday, January 20, 2017 The human rights Defender denounces the controls “facies” – The World The constitutional Council must decide, Tuesday, 24 January, on the checks of identity, a police practice that would target twenty times more young people from visible minorities. So that the constitutional Council must decide, Tuesday, 24 January, on the identity checks, the Defender of rights shall publish, on Friday, a survey that confirms that this police practice is designed especially for young men from visible minorities, sending the idea of controls ” facies “. Following the work conducted by the human rights Defender in early 2016 with a representative sample of more than 5,000 people – a first at the national level, ” 80 % of the people corresponding to the profile “young man perceived as black or arab“ say they have been checked in the past five years (compared to 16 % for the rest of the respondents) “. These profiles are therefore ” twenty times more ” of the probability of being controlled. Jacques Toubon recalls that the identity check ” not the subject of any traceability, making it impossible to determine precisely the contours, or to assess its efficiency and effectiveness “. Just does one estimate, according to parliamentary reports, that many millions of checks are carried out each year and approximately 95 % of them result in nothing. However, these controls have a real impact. If ” 82.2% of the respondents stated they were completely or rather trust the police “, this proportion falls to less than 50 % of the people controlled more than five times in the past five years. 76,6 % of them also say ” not having received any explanation, “ on the ground of the control and less than half to qualify as the polite police behavior (compared to 70.7 % of the general population controlled at least once). Breaches of ethics are rare, but ” 8.1% of the controlled persons to declare that they have been abused, and 7.1 % insulted at the last control “. The informal ” tu ” is more common, ” reported by 16.3% of respondents, “. ” Suspected foreign “ As in 2012, the Defender of rights reiterates its wish that to be kept a record of the controls. This campaign promise had been quickly abandoned by François Hollande and his interior minister of the time, Manuel Valls. While in November 2015 the Court of cassation has sentenced for the first time in the State for controls that are discriminatory, the constitutional Council prepares to decide on two priority issues of constitutionality (QPC) : the identity checks, the entry and stay of foreigners. According to the applicants, supported at the hearing on 17 January in front of the Board by a slew of associations (Gisti, trade Union of the magistrature, Syndicat des avocats de France…), the combination of these two laws (on the controls and on foreign) leads, in practice, controls on facies. Read also : Controls on facies : after the condemnation of the State, the police will have to change its practices sections of the code of criminal procedure (articles 78-2 and 78-2-2) allow prosecutors to require identity checks in areas and for a duration limited have been validated in 1993 by the constitutional Council. But in 2012, France has pulled out of the penal code, at the request of the european Court of human rights, violations of the right of residence of foreigners, which now fall under the purview of the administrative courts. Therefore, the identity checks required by a prosecutor for the purpose of preventing an offence should no longer be used to control the regularity of the stay of ” suspected aliens “,, as it is no more an offence. Gold, ” said the lawyer, Ruben Garcia, they are, at least to Paris, always decided in some neighborhoods such as Barbès and carried out by the unit specialised in illegal immigration. The passers-by who appear to be foreign controlled. The thirty control procedures on requisition reported to the Council illustrate this ” general practice “. And legal disputes are ineffective. Xavier Pottier, for the government, recalled that the legislator had wished that the identity checks are not widespread or random. The constitutional Council shall, if the infringement of the equality before the law are the result of an incorrect application of the texts or of their unconstitutionality.
{ "pile_set_name": "Pile-CC" }
Learn Practical Skills in Valuation Valuation Master Class Live is the leading valuation training workshop for aspiring students and young professionals. Prior attendees say they gained four key things: First, they learned PRACTICAL skills for equity valuation, because we focus on real valuations, not theory. Second, they gained CONFIDENCE in their valuations, because they learned the mistakes to avoid. Third, they increased their PRODUCTIVITY, by using my valuation model and applying my tips and tricks. Fourth, they learned how to become a valuation expert and make a bigger IMPACT, after learning what really matters in valuation. Let’s talk about point number one: You will learn practical skills for equity valuation. Most people read textbooks or attend university lectures to understand valuation theory, but the reality is that actual valuation work is very, very different from theory. Many people think “well I’ll just learn valuation on the job.” WRONG. The reality is that most analysts do NOT get enough of the practical experience they need to perform well. Consider my case; I only valued about 8 REAL companies in my FIRST THREE YEARS as an analyst! I only valued 8 REAL companies in my FIRST THREE YEARS as an analyst! And I had to make recommendations that affected both my company and my own career! Crazy. We overcome this problem in the Valuation Master Class by teaching PRACTICAL skills in equity valuation. I built this whole workshop around the valuation of REAL companies. You learn real-life valuation first; theory second; and that is what makes it so practical. One of my prior students, Wafi Wahab, said: “The Valuation Master Class Live helped me to overcome the huge barrier of confidently valuing any company without hesitation.”
{ "pile_set_name": "Pile-CC" }
Q: No common factors implies functional independence Let $f$ and $g$ be two polynomials in two real variables $x$ and $y$, both of which vanish at $(0,0)$. Suppose that they have no common factors. Is it true that their Jacobian $$J(f,g)=\begin{bmatrix}\partial_x f & \partial_y f\\\partial_x g & \partial_y g\end{bmatrix}$$ is invertible at $(0,0)$? Typical example would be $f(x,y)=x$ and $g(x,y)=y$. A one-dimensional analogue seems to be that if two polynomials have no common factors, they are linearly independent as functions. A: No, that's not true. You can take $f=y-x^2$ and $g=y$, then $$ J(f,g)=\left[\begin{matrix} -2x & 1 \\ 0 & 1 \end{matrix}\right] $$ which is not invertible at $(0,0)$. The reason is that the parabola cut out by $f$ and the line cut out by $g$ intersect doubly at the origin, so the resulting point is not a smooth point.
{ "pile_set_name": "StackExchange" }
Sentai Origin Many Sorcerer's hail from heroic bloodlines. Great men, who did great deeds and pass their greatness onto their children and grandchildren. A Sorcerer with a Sentai Orgin has the opportunity to become the first of a heroic lineage. Did they get blasted by radio waves, or were they given a power coin by an alien? Who knows, you decide! Bonus Proficiencies At 1st level, you gain proficiency with melee martial weapons and unarmed strikes. Go, go Battlemage At first level when you cast a spell that requires concentration, the caster gains Temporary Hit Points equal to half her Sorcerer Level (rounded down, but at least one) at the start of each of its turns. This lasts until the spell ends. Extra Attack Starting at 6th level, you can attack twice, instead of once, whenever you take the Attack action on your turn. Tough to Kill At 14th level When the sorcerer is hit with a attack, she can use her reaction to give the attacker vulnerability to all damage types. This vulnerability ends when the attacker takes damage. Once this ability is used, it can't be used until the sorcerer takes a short or long rest.
{ "pile_set_name": "OpenWebText2" }
writeArray Write a generic (possibly multi-dimenionsional) primitive or String array. An array of Objects is also allowed if all of the elements are valid arrays. This routine is not called 'write' to avoid possible compilation errors in routines which define only some of the other methods of the interface (and defer to the superclass on others). In that case there is an ambiguity as to whether to call the routine in the current class but convert to Object, or call the method from the super class with the same type argument.
{ "pile_set_name": "Pile-CC" }
España ha participado de forma activa durante el año en la modernización de los vehículos de combate pertenecientes al gobierno de Nicolás Maduro, esto a pesar del embargo de armamento venezolano decretado por la Unión Europea en noviembre de 2017. En enero de 2018, el país europeo le aprobó al gobierno venezolano la venta de repuestos para dichos mecanismos de transporte valorados en 20 millones de euros. El monto es casi 10 veces superior al de las ventas de este tipo realizadas al país durante 2017, reseñó El País de España. Según la Estadística sobre Exportaciones de Material de Defensa de la Secretaría de Estado de Comercio, España le vendió al gobierno piezas de vehículos militares por 6.216 euros durante el primer semestre del año. Fuentes consultadas por el diario español señalaron que se trata de un programa de modernización de 86 vehículos de combate de fabricación francesa que el Ejército de Venezuela realiza y cuyo costo está cifrado en unos 70 millones de euros. Lea más en El País.
{ "pile_set_name": "OpenWebText2" }
Ontogenetic variation in the chemical defenses of cane toads (Bufo marinus): toxin profiles and effects on predators. We conducted a quantitative and qualitative chemical analysis of cane toad bufadienolides--the cardioactive steroids that are believed to be the principal cane toad toxins. We found complex shifts in toxin composition through toad ontogeny: (1) eggs contain at least 28 dominant bufadienolides, 17 of which are not detected in any other ontogenetic stage; (2) tadpoles present a simpler chemical profile with two to eight dominant bufadienolides; and (3) toxin diversity decreases during tadpole life but increases again after metamorphosis (larger metamorph/juvenile toads display five major bufadienolides). Total bufadienolide concentrations are highest in eggs (2.64 +/- 0.56 micromol/mg), decreasing during tadpole life stages (0.084 +/- 0.060 micromol/mg) before rising again after metamorphosis (2.35 +/- 0.45 micromol/mg). These variations in total bufadienolide levels correlate with toxicity to Australian frog species. For example, consumption of cane toad eggs killed tadpoles of two Australian frog species (Limnodynastes convexiusculus and Litoria rothii), whereas no tadpoles died after consuming late-stage cane toad tadpoles or small metamorphs. The high toxicity of toad eggs reflects components in the egg itself, not the surrounding jelly coat. Our results suggest a dramatic ontogenetic shift in the danger that toads pose to native predators, reflecting rapid changes in the types and amounts of toxins during toad development.
{ "pile_set_name": "PubMed Abstracts" }
[Delayed primary anastomosis for esophageal atresia]. The aim of study is to review patients with esophageal atresia, treated by means of delayed primary esophageal anastomosis at Vilnius University Children's Hospital. Study was performed by retrospective analysis of medical records including period of 1992-2002, and clinical evaluation of late results. There were 97 patients with esophageal atresia, and 17 (17.5%) of them were selected for delayed primary esophageal anastomosis. This method was introduced in year 1993. Out of 17 patients selected for delayed primary esophageal anastomosis; 4 died from septic complications. Early complications included leakage of the anastomosis for six patients; four of them recovered after conservative treatment. Esophageal stricture occurred in 5 patients, and was resolved by bouggienage. The follow-up of 13 survivors at present is from 2 to 10 years. Gastroesophageal reflux was diagnosed in 4 patients, one of them was cured with Nissen fundoplication; others received medication. All at present are developing normally. None of them suffer from dysphagia. They do not need esophageal dilatation. We have found that in this group of patients elongation of esophageal segments and delayed primary esophageal anastomosis is effective and esophagus saving procedure.
{ "pile_set_name": "PubMed Abstracts" }
Biochar Bash 2013 Camping equipment, all your own food, Work clothes, Hat, Swimmers, Towels, Drinks, Cameras, Laptops and anything special you need to be comfortable. COST: Donation of $20.00 and bring a Food tree to plant on the hill of abundance. PROGRAM: Arrive Friday afternoon and We get started Saturday Morning 7am Breakfast. Several activities will be run at the same time so if you get Bored / Tired move around and try them all. We will be doing impromptu talks and Videos on all things Biochar. During the day we can swim in the large dam to cool off and for the real adventurous we have bush mechanic short introductions to many Biochar Industries daily tasks, Biochar Bash is more than just a Biochar Experience it is also an interactive giving and receiving to this wonderful community project. So we hope to finish off some projects from 2012 like. The Worlds First Hemp Earthship Drying Shed. Food Security Food tree shade house erection. Then on Sunday after preparing for the Moxham Burn. We will spend all day tending the moxham and creating over 4 cubic meters of biochar as well as doing all the other activities that form the day to day running of Biochar Industries. Right through out the weekend we will be shooting footage for Biochar the Movie. Biochar Bash RSVP: To avoid disappointment get in early as the event will be limited to 30 people. email dolph@biocharproject.org or mail biochar Industries pobox 3189 UKI NSW 2484. HOW TO GET THERE. See the main page on the biochar industries website or click here ->Biochar Bash Map If you know something about Biochar and would like to present a topic let me know now and we can add you to the program.
{ "pile_set_name": "Pile-CC" }
Dan Kennedy's blog on media and politics • published by the Boston Phoenix from 2002 to 2005 Tuesday, August 31, 2004 NOT BAD FOR A CYBORG. But the nets missed a chance to cut to Dick Cheney when Arnold Schwarzenegger said, "And when Nelson Mandela smiled in election victory after all those years in prison, America celebrated, too." Cheney, when he was a Wyoming congressman, voted against a 1986 resolution calling for Mandela to be freed from a South African prison. BUSH ON THE COUCH.Newsweek's cover piece on George W. Bush contains some mighty telling details about his relationship with his father. Let's cut right to the chase: Many of Bush's friends, as well as his critics, wonder why Bush failed to consult one particularly experienced and able expert in the field of foreign affairs: his father. "41" often calls "43," but usually to say, "I love you, son," President Bush told NEWSWEEK. "My dad understands that I am so better informed on many issues than he could possibly be that his advice is minimal." That is a pity, say some old advisers to 41, because 43 badly needed to be rescued from the clutches of the neocons, the Defense Department ideologues who, in the view of the moderate internationalists who served in 41's administration, have hijacked American foreign policy. But the fact is that President Bush did not want to be rescued. To say he has a complicated relationship with his father is an understatement. Bush clearly admires, even worships, his father, says a friend who notes that Bush wept when his father lost political races. But he doesn't want his father's help. To some degree, he is following a Bush family code. According to family lore, Bush's grandfather Prescott refused an inheritance from his father, while W's dad refused Prescott's plea to put off joining the Navy in World War II before going to college. "No, sir, I'm going in," said the 19-year-old George H.W. Bush. In the Bushes' world, real men are supposed to make it on their own, without Dad's looking over their shoulders. After the 1988 presidential campaign, W was eager to shed the nickname "Junior." But George W. hasn't just been independent, he's been defiant. The degree to which Bush defines himself in opposition to his father is striking. While 41 raised taxes, 43 cut them, twice. Forty-one is a multilateralist; 43 is a unilateralist. Forty-one "didn't finish the job" in Iraq, so 43 finished it for him. Much was made of 43's religiosity when he told Bob Woodward that "when it comes to strength," he turns not to 41, but rather to "a higher father." But what was the president saying about his own father? ... You don't have to be Freud or Sophocles to conjure up some rivalrous or rebellious feelings of the son toward the father. George W. spend much of his early years, and a good deal of his adulthood, trying and failing to catch up to his father as a student, athlete, aviator, businessman and politician. When Bush, in a drunken rage at the age of 26, challenged his father to go "mano a mano" with him, all his father could say was how "disappointed" he was. What could be more wounding? But that was many years ago. Bush without question bears scars, possibly serious ones, that affect his behavior today. But unlike so many other sons of the powerful, he pulled his life together and made some kind of peace, or at least truce, with his demons. Written by Evan Thomas, Tamara Lipper, and Rebecca Sinderbrand, the piece - "The Road to Resolve" - is striking in its willingness to plumb the president's psychology. It seems unlikely that a vanilla publication such as Newsweek would have been willing to publish something that would be so likely to piss off the notoriously touchy Bush clan a year ago, when the president was still riding high. Also, check out this Jonathan Alter column on Bush's nasty campaign style, epitomized by his reluctance to dissociate himself from the lying Swifties. Writes Alter: "So much for any sense of decency. The man who was once an inept right-wing president but a nice guy is now just an inept right-wing president." RUSH SAVES BUSH FROM TRUTH. George W. Bush told the truth on Saturday. But don't worry. He's not going to let it happen again. He made sure of that earlier this afternoon in a characteristically fawning interview conducted by Rush Limbaugh. As you may recall, the president was asked by Matt Lauer, in an interview for NBC's Today show, whether the US could win the war on terrorism. (The interview was broadcast yesterday.) Bush replied: "I don't think you can win it. But I think you can create conditions so that those who use terror as a tool are less acceptable in parts of the world - let's put it that way." It was a good, honest answer. Unfortunately, it was also at odds with the triumphalism of his past remarks. As Elisabeth Bumiller reported in today's New York Times, Bush said as recently as July 14, "I have a clear vision and a strategy to win the war on terror." Bumiller went on to write, "It was unclear if Mr. Bush had meant to make the remark to Mr. Lauer, or if he misspoke." Misspoke? Re-read what he said. Rarely has he been so honest and coherent. Of course, Bush's candor was immediately labeled a mistake. It would have been nice if John Kerry or John Edwards had jokingly welcomed Bush to the real world. But no. Edwards made a stiff statement insisting, "This is no time to declare defeat. It won't be easy and it won't be quick, but we have a comprehensive plan to make America safer." (Note that Edwards didn't say that Bush was wrong.) Even Bush's sycophants on the Fox News Channel said Bush had stepped in it, though they tried to explain it away. So today ... El Rushbo to the rescue! "Well, I appreciate you bringing that up," Bush - calling in from Des Moines, where he was campaigning - told Limbaugh, adding that he should have been "more clear." Bush explained: "What I meant was that this is not a conventional war. It is a different kind of war. We're fighting people who have got a dark ideology who use terrorists, terrorism, as a tool." And: "In a conventional war there would be a peace treaty or there would be a moment where somebody would sit on the side and say, 'We quit.' That's not the kind of war we're in, and that's what I was saying." After talking a bit about his confidence that Iraq and Afghanistan will become "free nations," Bush said, "I probably needed to be a little more articulate," then followed up with this: "I know we'll win it, but we have to be resolved and firm, and we can't doubt what we stand for." Still more: "We're making great progress. Today at the [American] Legion I said we're winning the war on terror, and we'll win the war on terror. There's no doubt in my mind." Look, optimism has its place. But terrorism is clearly a problem to be contained and controlled. To say that it will be defeated entirely is unrealistic to the point of foolishness. Just ask the Israelis and the British. Bush could have followed up his remarks to Lauer by expanding on them in order to educate the public. Instead, he went right back to pandering. No surprise there. Bush and Limbaugh went back and forth for about 20 minutes, justifying the war in Iraq, engaging in a some light Kerry-bashing, and previewing his Thursday-night convention speech, although only a bit. "I'm going to save some of it for the speech if you don't mind," Bush said. "You're a good friend, and I hate to let you down." Replied the groveling Rush: "I understand, I understand completely." As they were closing, Bush asked the longtime OxyContin abuser, "How you feeling?" Limbaugh replied, "I've never been happier," no doubt grateful every day that he never received the sort of "justice" that the Bush family is famous for dishing out to drug abusers, and that Limbaugh himself has supported in the past. Limbaugh also told Bush that people are "praying" for him. "That's the most important thing people can do, is pray. And I appreciate that," Bush said. "I can't speak for everybody," Limbaugh said in closing, "but I can speak for quite a few. They love you out there, Mr. President, and they only wish you the best." Gee, how come Matt Lauer didn't speak to Bush that way? No sooner had Bush gotten off the phone than Limbaugh got weird. "I want to make a prediction. I hope I'm wrong, but I want to make a prediction," he said, noting that he expected mainstream news organizations would cover the interview. "I wouldn't be surprised - I would not be surprised if somewhere early on in their stories ... don't be surprised if they find a way to work in the Abu Ghraib prison stuff." Huh? Well, there's no arguing with Rush. After all, as he said of the mainstream media, "I know these people like every square inch of my glorious naked body." Got that? WONDERFUL OR MARVELOUS? MSNBC.com's "Question of the Day" is up on the home page right now. Have a look. The question: "Did Rudy Giuliani's speech reassure you or move you to support the Bush-Cheney ticket?" The choices: "Reassure" and "Move you to support." Really. I chose "Reassure" so that I could see the results. It looks like I voted with the majority, 75 percent to 25 percent. Of course, we'll never know how "Turn you off" or "Drive you to support the Kerry-Edwards ticket" might have fared. (Thanks to John Doherty.) [Update: Well, that didn't take long. The question now reads "Did Rudy Giuliani's speech move you to support the Bush-Cheney ticket?" The new options are "Yes" and "No."] McCAIN THROWS BUSH A LIFE-PRESERVER. Rudy Giuliani spoke to the delegates. John McCain spoke to the country. That's why - despite the gushing you hear over Giuliani's funny, serious, nasty, and at times eloquent speech last night - McCain actually did Bush more good, and got a leg up on his New York rival in (God help us) the 2008 presidential campaign. I can't find it online this morning, but I'm pretty sure it was Fox News nitwit Morton Kondracke who called McCain's speech "self-serving" in comparison to Giuliani's. What Kondracke liked about Rudy was the way he slashed at Kerry. Later, Kondracke amended his remarks to allow that, well, McCain did offer a rationale with the war in Iraq, and that was useful to Bush. Well, duh. In fact, McCain - who'd wanted to go to war with Iraq for years - put forth a far more effective argument than George W. Bush has ever managed to muster. If Bush can figure out a way to incorporate McCain's case into his own stump speech, he'll be a lot better off. McCain was wrong, but he was wrong in a way that was so much more palatable than Bush. Here's the heart of what McCain said: The years of keeping Saddam in a box were coming to a close. The international consensus that he be kept isolated and unarmed had eroded to the point that many critics of military action had decided the time had come again to do business with Saddam, despite his near daily attacks on our pilots, and his refusal, until his last day in power, to allow the unrestricted inspection of his arsenal. Our choice wasn't between a benign status quo and the bloodshed of war. It was between war and a graver threat. Don't let anyone tell you otherwise. Not our critics abroad. Not our political opponents. He followed that immediately with his memorable attack on Michael Moore. Now, of course, there is much in McCain's assessment with which to disagree. He failed to mention that Mohamed ElBaradei, director-general of the International Atomic Energy Agency, had already concluded that Saddam Hussein did not have nukes. McCain also left out the fact that UN weapons inspectors were swarming around Iraq, and that they actually had to leave so that Bush could commence bombing. And, of course, there is the matter of Bush's giving the finger to the world rather than building a genuine international coalition - a tragic mistake given the horrors that are taking place in Iraq today. Still, McCain was right when he argued that sanctions had pretty much run their course, and that something had to be done. (After all, that's why John Kerry voted to grant war-authorization powers to Bush.) It's just that the "something" Bush chose has turned out to be a widely predicted disaster. As for McCain's failure to rip into Kerry, a failure that Kondracke found so distasteful - well, everyone who follows politics knows that McCain likes and respects Kerry on a personal level and detests Bush. (The depth of McCain's distaste for the lying Swiftie ads is revealed in this R.W. Apple piece today.) Would anyone have found it even remotely credible if McCain had suddenly gone after Kerry as a flip-flopping weasel? Rather than coming off as a Republican partisan, McCain projected an image as a truly independent politician who's chosen a man he dislikes over one he likes strictly as a matter of principle. Just as Giuliani thanked God for Bush, Bush ought to thank God for McCain. If McCain managed to help himself in the process, well, what of it? THE REST OF THE STORY. It's not online, unfortunately, but there's a hilarious omission in today's Boston Globe. The "Names" column includes a photo of Vanessa and Alexandra Kerry with this caption: POP AND POLITICS - Vanessa (left) and Alexandra Kerry ask for quiet while urging the crowd to vote this fall at the MTV Video Music Awards Sunday in Miami. The discerning will note that the reason they were asking quiet was that they were getting booed (and cheered) by the crowd. Monday, August 30, 2004 The medals and the Cambodia charges are partisan hack stuff, cynically repeated in service of the greater Republican good. What genuinely upsets conservatives - including conservative veterans - is something different. First, conservatives think it's hypocritical for Kerry, who denounced the war, to now take credit for having fought in it. As The Wall Street Journal editorialized this week, Kerry has "managed the oxymoronic feat of celebrating both his own war-fighting valor and his antiwar activities when he returned home." But what's oxymoronic about that? What Kerry "celebrates" is that he volunteered for Vietnam - and served heroically - when elites (including Bill Clinton, Dan Quayle, and George W. Bush) were finding ways not to go. That's noble, even if Kerry thinks the war itself was not. And, if Kerry is a hypocrite for having served in a war he opposed, what about Dick Cheney - who avoided serving in a war he supported? Journalists, in short, became accomplices to fraud. And they should have known better. In 2000, Bush and his right-wing allies learned that the way to win political arguments is to launch rhetorical attacks based only loosely - if at all - on the facts and then depend on reporters to spread them as credible perspectives on the truth. And, ever since, this White House has conducted its business the very same way, shamelessly peddling lies about everything from budget projections to weapons of mass destruction without the slightest fear of retribution. Never in a campaign has a more disreputable group of people, whose accusations have been repeatedly contradicted by official records and reliable eyewitness accounts, had their claims taken so seriously. Is the New Republic partisan? Well, sure. It's nominally Democratic in a centrist, hawkish kind of way. But it also supported the war in Iraq, even going so far as to endorse Joe Lieberman in the Democratic primaries. It also ran opposing views in favor of other Democrats - and couldn't find a single person willing to write on Kerry's behalf. In other words, TNR is far from being the house organ for the Kerry-Edwards campaign, and at one time it was even sympathetic to Bush. [Update: I originally referred to the "Bush-Edwards campaign." D'oh!] So its judgment on the Swifties bears paying attention to. MAYBE I SHOULDN'T HAVE STAYED HOME AFTER ALL.Editor & Publisher has some eye-opening details on the luxuries awaiting reporters assigned to the Republican National Convention. Hey - who's got time to do any real reporting when you're getting a facial and sucking down a few bottles of complimentary beer? PRAGUE SPRING? Earlier today I took part in a media conference call with some of the founding members of Mainstream 2004, a group of self-described moderate Republicans who are seething over the right-wing extremism that has come to dominate their party. The organization debuted with a splash today, taking out a full-page ad in the New York Times. "We're seeing a Republican Party that's being taken over by some pretty hardcore activists at the grassroots level who are often way out of the mainstream of the communities they are from," said former Arizona attorney general Grant Woods. He went on to call the right-wingers folks who "don't have anything better to do" than to engage in political activism, while the people who should be the heart and soul of the Republican Party are engaged in more-normal endeavors - like working. Like the others who spoke, Woods was particularly exercised over the modern Republican Party's sorry record on the environment and on outreach to African-Americans and other minority communities. The organization's agenda sounds like that espoused by most Democrats: environmental protection; fiscal responsibility; ending barriers to stem-cell research; appointing "mainstream federal judges"; enhancing domestic security at chemical and nuclear plants and in shipping; and rebuilding alliances to "restore America's standing in the world." Yet these Republicans, at least as a group, will not go so far as to renounce George W. Bush's re-election campaign. Woods allowed only that he's backing a hoped-for presidential run by his home-state senator John McCain in 2008. Former Michigan governor William Milliken declined to say who he plans to vote for, saying he has "severe misgivings" about Bush but adding, "I don't see in John Kerry at this stage the answer to all the problems that confront us inside the country and internationally." The exception was Rick Russman, a former member of the New Hampshire Senate, who said he's decided to support Kerry if only "because I think the party needs to lose a few elections" to find its bearings again. In some ways, the group - rounded out by former New Mexico governor David Cargo - sounded like New England Republicans. For some years now, the region's moderate Republican senators have been a thorn in the side of the national Republican Party, standing for an old-fashioned mix of fiscal conservatism and social liberalism. This movement is epitomized by Maine's two GOP senators, Olympia Snowe and Susan Collins, as well as by Rhode Island's Lincoln Chafee. Vermont senator Jim Jeffords even went so far to change his affiliation from Republican to independent a few years ago to protest his party's march to the right. Given that background, I asked Russman whether he thought the New England Republican Party had anything to teach the national party. "I'd like to see some of our leaders, like these senators from Maine and others, take the lead in that and try to take the party back to the mainstream," he responded. "There's got to be a critical mass that says the pendulum's gone too far. We're starting to lose a great number of people." That's probably an exaggeration. But there's no question that the hard-right extremists are out-of-touch with mainstream, independent voters, and Karl Rove knows it. That's why this week's speakers are heavy on moderates such as New York City mayor Michael Bloomberg, former mayor Rudy Giuliani, and McCain. As Woods said, if party leaders wanted to show their true face, "they should have Tom DeLay deliver the principal speech." Still, though the Mainstream 2004 folks may be in touch with the electorate-at-large, there's not much evidence that they're in touch with modern Republicanism. Everyone who spoke during the conference call today was a former officeholder. Cargo shone the best possible light on that, saying, "We can really tell it like it is." But their status only served to underscore the sense that there is no place for them in today's GOP. Milliken praised thisNew York Times op-ed piece by former US senator Ed Brooke, a Massachusetts Republican, an African-American, and a liberal. Brooke warned that the 2004 convention may be shaping up, in its "extremism," like the one that nominated Barry Goldwater 40 years ago. Yet what neither Milliken nor Brooke want to admit is that today's GOP - which is far to the right of what Goldwater could even have imagined, or wanted - is thriving and winning elections. I was unable to get an immediate reaction from the Republican National Committee; if I receive one, I'll post it. What I was hearing from the dissident moderates, though, sounded like the Republican version of 1968's Prague Spring. The difference is that the Rove gang won't have to roll in the tanks - certainly not this year, and maybe not ever. Woods himself said that the focus is on the long-term. Yet both major parties are becoming more ideological, not less. It's hard to see how Mainstream 2004 is going to change that. ROMNEY BEHAVES HIMSELF. Give Mitt Romney this much: at least you can take him out in public. Our silky-smooth governor always says exactly what he wants to say, and no more. And he would never say anything that would call into question his nice-guy reputation. Of course, there are those of us who happen to think that waging war on poor families and gay couples isn't something that a nice guy would do, but I'm talking about manners here, not substance. Anyway, I was watching this morning's Fox & Friends a little while ago - yes, I am spending a great deal of time with the Fox News Channel, for reasons that will become evident later this week - when on came Romney for some chit-chat. It wasn't long before E.D. Hill and boys were baiting Romney with their favorite subject: the phony Swifties, whose lies about John Kerry's military service are being kept alive at this point solely by right-wing talk radio, the Internet, and the Fox News Channel. (That is to say, by no one who has actually done any reporting on the matter.) Romney started off shakily, saying that the whole thing was a "mistake ... on both sides of the aisle," adding that Kerry "really brought on a lot of this on himself" by basing so much of his campaign on his record as a Vietnam War veteran. Really, Governor? Has Kerry made too much of his military service? Probably, at least so far as it has kept him from talking more specifically about what kind of a president he would be. Does that mean it's his fault that he's been subjected to weeks of lies about the medals he won and circumstances under which he won them? Er, isn't the answer to that obvious? But then Romney settled down and said: But fundamentally John Kerry served his country with honor and pride. He's heroic for having fought there. Anybody who found themselves under enemy fire, in harm's way, is someone whom I respect. And I think the people who are attacking him for his Vietnam service are making a mistake. I think it's wrong. I wish they wouldn't do so. I don't know what it's going to do politically. Not bad - similar to the position that George W. Bush has taken, only a bit more fleshed-out and coherent. Naturally, Romney also attacked Kerry for having "not followed the example of Bob Dole" in resigning from the Senate (Kerry instead appears to have followed the example of Bush, who did not resign as governor of Texas in 2000), and for wanting to "go back to the politics of weakness and uncertainty and vacillation." But obviously that's well within the bounds of proper political discourse. What's interesting about this - and my apologies for taking so long to get to the point - is how the Republicans are reaping the benefit of having it both ways with regard to the lying Swifties. Their vicious accusations - which have been almost entirely discredited - have presumably had a lot to do with Kerry's recent drop in the polls. Meanwhile, Republicans such as Bush and Romney take the high road. You could give credit to Romney for good manners. In fact, though, whether he knows it or not, he's playing a role that only helps to further the Swifties' ongoing assault on Kerry. After all, sliming is a lot less effective if it ends up hitting the intended beneficiaries in the face. By denouncing that which is helping them, Bush and Romney are playing a very old game. HASTERT SLANDERS SOROS. WILL ANYONE NOTICE? Welcome to the official kickoff of Media Log's coverage of the Republican National Convention. I'm taking a radically different approach from the way I covered the Democrats - rather than traveling to New York, I'm embedded at Media Log Central, where I have non-stop access to cable TV, radio, and the Internet. Modern political conventions are TV shows, so why not cover them that way? I posted some pre-convention items on Saturday and Sunday, so by all means scroll down and have a look. Meanwhile, I want to call your attention to House Speaker Dennis Hastert's astonishing remarks on Fox News Sunday yesterday, in which he said he doesn't know whether billionaire financier George Soros gets any of his money from the international drug cartels. Think I'm kidding? Well, the transcript is available. The occasion was a joint appearance by Hastert and Senate majority leader Bill Frist - their "first joint TV interview ever," said host Chris Wallace, who unctuously added, "So thank you for honoring us with that." Within a few minutes, Hastert was honoring Wallace and his viewers with slander against Soros so mind-boggling that Wallace appeared stricken. Let's roll the tape: WALLACE: Let me switch subjects. You both had very deep reservations about McCain-Feingold campaign-finance reform before it was passed. In fact, I think you say in your book, Mr. Speaker, that you thought it was the worst piece of legislation that had been passed by a Republican Congress since you've come to Washington. Now that everyone seems upset with these so-called independent 527 groups, whether it's MoveOn.org on the liberal side of the spectrum or Swift Boat Veterans for Truth on the conservative side, do you feel like saying, "I told you so"? HASTERT: Well, you know, that doesn't do any good. You know, but look behind us at this convention. I remember when I was a kid watching my first convention in 1992, when both the Democratic Party and the Republican Party laid out their platform, laid out their philosophy, and that's what they followed. Here in this campaign, quote, unquote, "reform," you take party power away from the party, you take the philosophical ideas away from the party, and give them to these independent groups. You know, I don't know where George Soros gets his money. I don't know where - if it comes overseas or from drug groups or where it comes from. And I ... WALLACE: Excuse me? HASTERT: Well, that's what he's been for a number years - George Soros has been for legalizing drugs in this country. So, I mean, he's got a lot of ancillary interests out there. WALLACE: You think he may be getting money from the drug cartel? HASTERT: I'm saying I don't know where groups - could be people who support this type of thing. I'm saying we don't know. The fact is we don't know where this money comes from. Of course, it's true that "we don't know" whether George Soros gets his money from international narco-terrorists. It's also true that we don't know whether Dennis Hastert supports a constitutional amendment banning same-sex marriage in order to conceal his own longtime relationship with a man back in his district. I mean, Hastert is probably straight, and his marriage probably isn't just an elaborate ruse. But hey ... we just don't know, do we? And by the way, mega-kudos to Wallace. If he hadn't pressed Hastert on whether he might be referring to "the drug cartel," Hastert could have claimed later that he meant the Drug Policy Alliance, an anti-prohibition group that Soros supports. Not that that would have made any sense - after all, Hastert was clearly talking about groups that give to Soros, not get money from him. But Wallace forced Hastert to make his ugly insinuation explicit. So are the mainstream media going to take note of Hastert's slanderous aside? Or will it be allowed simply to fade to nothingness? [Update: The New York Daily News nails Hastert here.] GUERRIERO'S MOMENT. This could be a big week for Patrick Guerriero, the former Melrose mayor who's now executive director of the Log Cabin Republicans. The Bush-Cheney campaign is trying mightily to toe the line between hard-right anti-gay politics and happy-face image-making. Guerriero is making it clear that no compromise is possible: if you embrace hate politics, you're a hater, period. The Globe's Yvonne Abraham profiles Guerriero today, and he has an op-ed piece in the paper as well. SEEING RED, SPENDING GREEN. If nothing else, the Republican convention is an opportunity for the New York Times to rake in big bucks from anti-Bush organizations. Sunday, August 29, 2004 "I'm constantly in touch with Karl, Karen, Dan Bartlett, people who are involved with the campaign," Mr. Bush said in the interview last week. "I don't limit my conversation to a particular time of the day.'' But, he added, "if the question is, 'Is it different running this time now that you're the president?' the answer is yes. I've got a job to do." In 2000, you may recall, Bush was governor of Texas. I guess that doesn't count. But of course, it's very, very bad that Kerry's missed a lot of votes. Just one more example of how your intelligence is being insulted every day. BLOGGER STRIKES BACK. For those of you who receive Media Log by e-mail, mucho apologies for the multiple copies of the David Brooks item. It was caused by a momentary problem with Blogger.com, the software that I use to publish Media Log, combined with my own lack of patience. BROOKS'S FAVORITE REPUBLICANS. They're all dead! For just one day, at least, David Brooks the newly minted, hardcore conservative pundit has gone back to being David Brooks the thoughtful, slightly right-of-center moderate. In a long piece for today's New York Times Magazine, "How to Reinvent the G.O.P.," Brooks lays out the specifics of an overarching Brooksian political philosophy. It is a fine essay, yet it is also unintentionally hilarious. Brooks harks back to 2000, when he and William Kristol made the case in the Weekly Standard for what they called "national-greatness conservatism" and hitched their wagon to the presidential campaign of John McCain. It was a courageous move, given the long odds facing McCain. The Standard, founded by Rupert Murdoch as a house organ for the newly ascendant Republican Party of the Gingrich era, found itself frozen out, at least until after the terrorist attacks of 9/11, when the GOP's interventionist McCain wing and the isolationist Bush wing came together. (There's a decent explanation of national-greatness conservatism - and of the roles played by Brooks, Kristol, and McCain - in this 2002 American Prospect article by Richard Just.) What cracks me up about Brooks's piece are two things: the only Republicans and proto-Republicans he can find to say much nice about are Alexander Hamilton, Abraham Lincoln, and Theodore Roosevelt; and the program Brooks lays out sounds a whole lot more New Democrat than Bush Republican: entitlement reform, social mobility, an end to corporate welfare, energy independence, and mandatory national service. The most important Brooksian priority - what he calls "the war on Islamic extremism" - is, of course, something that George W. Bush has attempted to transform into a trademarked slogan of the Republican Party. But I've seen no evidence that real-world Democrats (that is, John Kerry, not Howard Dean) aren't just as committed to combating Islamist terrorists as Bush is. Perhaps rather more so, since Kerry presumably wouldn't have more than 100,000 troops tied up in Iraq while Osama bin Laden and company run free on the border between Afghanistan and Pakistan. Brooks isn't calling his philosophy national-greatness conservatism anymore, and his attempts to come up with a new name are painful. He tries out "strong-government progressive conservatism," but though it does have the merit of actually describing his ideas to some extent, it doesn't exactly roll trippingly off the tongue. Brooks's politics come across as a meld of the best of Bill Clinton and John McCain - a slightly more conservative version of the New Democrat agenda, which itself was quite a bit more conservative than the Democratic Party of George McGovern and Walter Mondale. Kerry ought to take a good, hard look at some of the ideas that Brooks is proposing. Why not? It's pretty clear that Bush won't. Saturday, August 28, 2004 I assume Vonnegut is referring to claims that under the Patriot Act, John Ashcroft's goons have been terrorizing libraries and monitoring Americans' reading habits. In fact, law enforcement agencies have always had the power to request library records as part of a criminal investigation; a provision of the Patriot Act gave them the power to do so in counterterrorism investigations without notifying the suspect. (Remember, we're talking about materials related to terrorist acts and not, say, the wit and wisdom of Michael Moore.) Whether or not such powers are appropriate, in the two years after the passage of the Patriot Act this provision was used exactly ... zero times. [Young's ellipses.] No doubt Young was relying on stories like this. But here's an excerpt from the results of a study conducted by the University of Illinois at Urbana-Champaign: In the year after the World Trade Center and Pentagon attacks, Federal and local law enforcement officials visited at least 545 (10.7%) libraries to ask for these records. Of these, 178 libraries (3.5%) received visits from the FBI. The number of libraries queried fell significantly below the 703 libraries reporting such requests the year before the terrorist events. The actual number questioned in the past year may, however, be larger, because the USA Patriot Act makes it illegal for persons or institutions to disclose that a search warrant has been served. A warning about these secrecy provisions on the LRC questionnaire may have served, in some cases, as a deterrent to candid answers. Fifteen libraries acknowledged there were questions they did not answer because they were legally prohibited from doing so. In other words, the answer to the question of whether and how the Patriot Act is being used to snoop on library patrons is inherently unknowable, since the act also makes it a crime for librarians to disclose whether they've been visited or not. The very fact that the number of reported library visits by law-enforcement officials fell in the year after 9/11 is telling, wouldn't you say? PLYING THE MEDIA WITH LIES. Media Log is still technically on vacation. But I've been catching up on the news following a three-day backpacking trip last week, and I continue to be astounded at what's happening to John Kerry's presidential campaign. The media have not necessarily done a horrible job of covering the claims of Swift Boat Veterans for Truth. Indeed, if it weren't for news orgs such as the New York Times and the Washington Post, it might not be as clear as it already is that the vets' claims consist of nothing but ugly lies. Still, editors and news directors should consider that the way they practice journalism allowed the lies to circulate and propagate, putting John Kerry's presidential campaign on the defensive and costing him a few points in the polls heading into the Republican National Convention. The outrageous claims of the Swiftvets - that one of Kerry's Purple Heart wounds was self-inflicted, that he and his crew weren't really under fire when he rescued James Rassmann and won the Bronze Star, that he executed a Vietnamese kid in a loincloth in winning the Silver Star (it was actually a Viet Cong soldier with a grenade-launcher) - should have been treated as presumptively untrue from Day One. You didn't have to do any investigative reporting to know that the official military records backed up Kerry's version of events (no, military records aren't perfect, but they're not meaningless, either), and that Kerry's hometown newspaper, the Boston Globe, had investigated his military record extensively on at least two separate occasions, in 1996 and again in 2003. Right-wing conspiracy theories aside, there is zero evidence that the Globe has ever tried to cut Kerry any slack. Plus there is the fact that all but one of the men with whom Kerry actually served support Kerry's version of events. (How deep is the lying? The very fact that the Swiftvets say they "served with Kerry" is itself a lie.) The invaluable contribution that the Times and the Post made was to show that in many cases the Swiftvets had changed their stories over the years from pro-Kerry to anti-Kerry, and that some of them claimed to have witnessed events that they could not have. But the Swiftvets and their shadowy backers understood something about the media: if you make an accusation, news orgs will cover it, get a response from the person or persons being accused, and run with it. Truth isn't the issue, at least not in day-to-day campaign coverage. Getting both sides is the name of the game, even if there isn't a single reason to believe one side and every reason to believe the other. The only charge raised against Kerry that seems to be sticking at all is that he falsely claimed to have been in Cambodia on Christmas Eve 1968 - a charge that has gained resonance because Kerry once mistakenly stated that Richard Nixon was president at that time. But as the historian Douglas Brinkley has said, Kerry was involved in extremely dangerous missions in and around the Cambodian border during that time period. It is curious, to say the least, that Kerry-haters are willing to overlook blatant lies by the Swiftvets about where they were and what they saw while pillorying Kerry for misremembering the timing of events that actually occurred. Yesterday brought a brief flurry of new excitement in the form of a Robert Novak column reporting that retired rear admiral William Schachte - who's not a member of the Swiftvets group - was continuing to claim that he was present when Kerry "nicked" himself and therefore unjustly won his first Purple Heart. Yet we already have the testimony of others who were there that Schachte was not. As the Times recently reported, Patrick Runyon and Bill Zaladonis insist they were the only crew members with Kerry when the incident occurred. "Me and Bill aren't the smartest, but we can count to three," Runyon was quoted as saying. But you know the game: Novak reports, you decide, even if you don't have the background to make an informed analysis as to who's telling the truth. As always, Bob Somerby has been invaluable in dissecting the lies of the Swiftvets, and of the pathetically poor preparation that cable-news hosts have brought to the table when they have interviewed them - even those who suspect that the vets are lying, like MSNBC's Chris Matthews. (If he'd do his homework, he'd know they're lying.) Kerry, I think, is making one serious mistake. He has denounced the lies of the Swiftvets, as he should. But by going after the ties between the Swiftvets and the Bush-Cheney campaign - ties that became all too apparent with the resignation of Bush water-carrier Benjamin Ginsberg - Kerry is playing George W. Bush's game. Rather than denounce his supporters' lies, Bush has attempted to turn the entire issue into one of the 527s, the independent political organizations running negative ads on both sides. Kerry won a victory with Ginsberg's self-immolation. But if it turns out that there are similar ties between the Kerry-Edwards campaign and some of the liberal 527s (a development that would hardly be a surprise), then the media will be able to pronounce this an "everyone does it" story and transform the entire Swiftvets campaign into a matter of moral equivalence with the anti-Bush ads being run by MoveOn.org and others. It's not. What the Swiftvets are doing is as dirty and shocking and disgraceful as anything done in modern political history - far worse than the infamous Willie Horton ad that George H.W. Bush's supporters ran in going after Michael Dukakis. Kerry cannot let the lies of the Swiftvets be held up as somehow the same as entirely truthful ads questioning Bush's missing months in the Texas Air National Guard. Saturday, August 21, 2004 THE REST OF THE STORY. Media Log is on vacation, and will not officially be back until August 30 ... maybe a little earlier, depending on what I want to say about the Republican National Convention. But I can't resist asking why the Globe couldn't manage to report that state rep Paul Kujawski has been accused of staggering out of his car and taking a leak in front of state troopers after he was pulled over on the Mass Pike on suspicion of drunk driving. For crying out loud, I heard this particular detail yesterday afternoon. (And no, I didn't get it from listening to Howie Carr.) The Herald's Ann Donlan has it today, writing that Kujawski "got even deeper in trouble after urinating in front of the troopers who stopped him." But the Globe's Elise Castelli, after reporting that Kujawski had been charged with drunk driving, disorderly conduct, and "open and gross lewdness," goes on to write: "The police declined to comment on what transpired after Kujawski's car was pulled over." Far from doing Kujawski any favors, the Globe makes it sound like he exposed himself to a busload of kindergarten students or something. "I'm thrilled with this opportunity. It's going to be a lot of fun, a lot of work. We are really going to pour high octane in the engine of this department, and just tear ass after all the exciting business news in Boston," Macero told me. As for specifics, Macero was less clear, except that he obviously wants to find a way to appeal to younger readers. "It's time to move past some of the dinosaurs in this city and look at the next generation of business leaders," he said. "We want to focus on who is behind some of our most noteworthy companies as well as some of our most up-and-coming companies and the industries that make this city tick." He also talked about his desire to "have a little fun in doing it" and bring "a little more pizzazz and splash into our business coverage." Macero plans to keep writing his column as well, although he said it might appear only once or twice a week instead of the current four. Macero's rise is likely to be popular inside the newsroom. Says one staff member who asked not to be identified: "The amount of energy he brings to the room is extraordinary. I think he wants us really out there in the community a lot more than we really have been." Adds managing editor Kevin Convey (who's not related to Eric Convey): "The idea was that we felt that the section needed new leadership and that it needs to go in a different direction." He says, "I think the section needs to be made more relevant to the business of business in Boston," and that it needs "a more lively presentation than had been the practice in the past," and to "select a few major industries and own them." Both Convey and Macero said the right things about Bunker and Schubarth, with Convey saying they put out "a solid section" and Macero adding that they "set a really high standard." Sources also say that Schubarth was well-liked among the staff. But Macero is almost certain to prove more popular with the troops than Bunker, who'd been the Herald's business editor since 1997, and whose management style had long been the source of internal grumbling. Macero may also help re-spark the paper's rivalry with the dominant Boston Globe for local business news. "We have a lot of respect for Cosmo," says the Globe's deputy business editor, Bennie DiNardo. "He's a very aggressive columnist, and we look forward to competing with him every day. If he's anything as an editor like he is as a columnist, it should be fun." Though neither Macero nor Kevin Convey made the analogy, the formula that may be at work here is that of the New York Post. The Post's formula - outrageous sensationalism in its news coverage, a good sports section, and surprisingly smart business coverage - has made it a player in New York, even if it remains a chronic money-loser. In recent months, the Herald has certainly embraced the outrageous aspects of the Post. In naming Macero to the top business job, the paper may be seeking to emulate some of the Post's better qualities as well. THE END OF A SMEAR. The talk of the political world today is the New York Times' evisceration of Swift Boat Veterans for Truth. Clocking in at nearly 3500 words, the piece - by Kate Zernike and Jim Rutenberg - demonstrates definitively that these anti-John Kerry veterans are not only contradicting what they've said about Kerry in the past, but also what's in the official record. For good measure, the Times also shows how the group and its financing grew out of the Bush-family/Karl Rove political machine in Texas, some of which had previously been reported by Salon and other outlets. But that wouldn't be especially important if there were anything to the vets' claims. There isn't, nor was there ever any reason to suppose there was. These are not the men who served directly with Kerry. The only reason they were ever taken seriously by anyone is that their tale fits into right-wing attempts to smear Kerry for his role as a leading anti-war activist. It turns out that yesterday's Washington Postexposé of Larry Thurlow was just an appetizer. As "The Note" asks today, "Does the story peter out on its own over the weekend, or does the now opened-can of worms continue to bear ? well, worms?" In the Globe, Patrick Healy and Michael Kranish have an account of Kerry's decision finally to take on George W. Bush directly over the vets' sleazy ads. Media Log wonders: did Kerry speak out yesterday knowing that, the next morning, the Times would destroy what little was left of his critics' credibility? Meanwhile, Drudge - who has still not withdrawn his sliming of Kranish - is very excited about reports that the Kerry campaign has asked bookstores to consider withdrawing the vets' book, Unfit for Command. Well, what's wrong with that? As Eric Boehlert notes, it's hardly unusual for booksellers to disavow books that turn out to be a hoax. Which is precisely what this is. NARRATIVE TRIUMPH. Like you, I scanned the Globe's four-part series "Best Men" earlier this week and told myself: Sorry, I don't have the time. Unlike you, I went back and read the entire series on the Web after the last installment had been published. I'm glad I did. Written and reported by Thomas Farragher and Patricia Wen, and photographed by Michele McDonald, "Best Men" is well worth it. It tells the story of two brothers, one gay, one straight, and of their marriages - one of which, needless to say, would not have been possible until this past spring. It is a first-rate example of narrative journalism, wonderfully written and photographed. Best of all, the subjects themselves are worthy of the thousands of words that have been lavished on them - not always the case when a newspaper trains its eye on ordinary people. The Web version has more photos than were published in the print edition, as well as audio clips. Thursday, August 19, 2004 KERRY UPDATE. Two good pieces of news today for John Kerry: 1. One of his leading tormenters on the swift-boat matter turns out to have been telling a tale that's completely contradicted by his own Bronze Star citation. The Washington Post FOIA'd the military records of Larry Thurlow and discovered, lo and behold, that the documents say his and Kerry's boats really were under fire on the day that they both won Bronze Stars. Thurlow has loudly claimed that Kerry made that up. Thurlow splutters to the Post's Michael Dobbs: "It's like a Hollywood presentation here, which wasn't the case. My personal feeling was always that I got the award for coming to the rescue of the boat that was mined. This casts doubt on anybody's awards. It is sickening and disgusting." Thurlow even goes so far as to speculate that he received what he calls a "fraudulent" Bronze Star on the basis of Kerry's so-called lies. Sorry, Mr. Thurlow. I'd say that Swift Boat Veterans for Truth's 15 minutes is just about at the 14:55 mark right now. 2. The Boston Herald's "Inside Track" reveals a "steamy secret 20-month fling" that Kerry had that left his former paramour "heartbroken" - but she says she's going to vote for him, and she calls Teresa Heinz Kerry "awesome." She's even decided to hold off on publishing a roman à clef about their romance until after the election. It really doesn't get much better than that, does it? The Kerry campaign ought to send out copies of the "Track" to every undecided voter in the country. Wednesday, August 18, 2004 MORE ON THE FBI'S INTIMIDATION TACTICS. The New York Times is getting a lot of bounce for its front-page story Monday on the FBI's attempts to intimidate political activists into not traveling to New York for the Republican National Convention. According to the Times, the bureau earlier engaged in similar tactics to keep protesters away from the Democratic convention in Boston. Well, here's a story that should have gotten more attention at the time: a report by Jules Crittenden of the Boston Herald that was published on July 28. Crittenden's lead: Peace activists say the FBI has been harassing and intimidating them with visits across the country, including an incident in Boston Saturday where federal agents, police and firefighters searched a "mobile kitchen" and seized five propane tanks. DICK CHENEY, "SENSITIVE" WARRIOR. You should read Bob Somerby every day. But you absolutely must read this. Unless you don't want further evidence of what a pathetic, lying, miserable vice-president we have. And Somerby's right about another thing: why isn't this the lead political story for every news org in the country? EARLY TO VOTE. In the swing states of Iowa and Arizona, voters will be able to cast their ballots in the presidential campaign before George W. Bush and John Kerry have held their first debate. In Wisconsin, Washington, New Mexico, and West Virginia they'll be able to vote before the third and possibly decisive debate. People in five other swing states - North Carolina, Nevada, Arkansas, Colorado, and Florida - can vote as early as mid-October, with, of course, no possibility of changing their minds depending on what happens in the final two weeks of the campaign. Is this good for democracy? I don't think so. Yet it's a central reality of the 2004 campaign, as John Harwood reports (sub. req.) in today's Wall Street Journal. Harwood writes that, according to some estimates, as many as one-third of voters will cast their ballots before the November 2 election. He adds: The potential implications of such growth in early ballots are enormous, if unpredictable. In Iowa, for instance, voting kicks off a week before the first of three scheduled Bush-Kerry debates. Pre-debate voting could lift the incumbent in a contest that Democratic strategists like to compare with the 1980 contest between President Jimmy Carter and Ronald Reagan, which broke sharply toward Mr. Reagan after a debate assured wavering voters of his competence. At the same time, early votes might precede the sort of late-breaking events that many Democrats believe could help Mr. Bush - such as the capture of Osama bin Laden, or a terror strike on U.S. soil. The change has come about, according to Harwood, because it appeals to "time-pressed voters." But those same voters could be accommodated just as well through a long-overdue reform: holding elections for two or three days over a weekend. That would make voting much easier than it is now, while at the same time keeping the idea of the election as a singular event rather than something that is dragged out over several months. In a recent interview, Joe Lenski, executive vice-president of Edison Media Research, told me that as many as 20 million people - 20 percent of the total - could vote by absentee ballot this year. He cited a reason that Harwood doesn't mention: fears raised by 2000's Florida fiasco that your vote may not count. Mailing in a paper ballot is just more reassuring than touching a screen on a voting machine, Lenski explained. (Edison has done exit polling for the television networks and the Associated Press. Its market-research clients include the Phoenix Media/Communications Group.) Sadly, that's a different issue not solved by weekend voting. The breakdown of trust - documented just this week alone by New York Times columnists Paul Krugman and Bob Herbert - is real and ongoing. In that sense, the rise of the absentee ballot is not a sign of disengagement, but rather of a burning desire to stay engaged even in the face of real doubts. Tuesday, August 17, 2004 PREPAREDNESS FOR WHAT? What better time to educate the country about terrorist threats than September, right after the kids go back to school? After all, if you can get people thinking about gas masks or how fast they can drive out of the city if a dirty bomb goes off, they might have less time to contemplate other matters ... like, I don't know, the presidential election or something. So you've got to wonder - or maybe not - about the Department of Homeland Security's plans to kick off National Preparedness Month on September 9. The timing alone sets off WMD sirens: the Republican National Convention will have just concluded, and the third anniversary of the terrorist attacks will follow two days later. Not that any of this could possibly have anything to do with politics. After all, as Homeland Security secretary Tom Ridge recently explained, "We don't do politics." Never mind that his earlier terror warning, right after the Democratic National Convention, amounted to little more than a free ad for Bush-Cheney 2004, with Ridge hailing "the president's leadership in the war against terror." NPR's On the Media has a splendid segment on this fiasco, which you can listen to in RealAudio here. Brooke Gladstone interviews Bob Harris, the author of a withering post at This Modern World. I do not necessarily subscribe to the theory that Dick Cheney's got Osama bin Laden's head in a freezer somewhere, ready for George W. Bush to pull out from beneath the podium about midway through the third debate. But there's no question that these people are willing to go a long way to keep power. Look at the terrorist arrest sprung just before John Kerry's acceptance speech, a matter that the New Republic has reported on in great detail. Here's a thought for National Preparedness Month: what are your family's plans for dealing with dubious political propaganda in the weeks leading up to the presidential election? Monday, August 16, 2004 JUST BECAUSE YOU'RE PARANOID DOESN'T MEAN THEY'RE NOT OUT TO GET YOU. A truly chilling story on the front of today's New York Times. Eric Lichtblau reports that the FBI has been visiting dissidents across the country - and in some cases even issuing subpoenas - in an attempt to stop illegal activity before it starts at the Republican National Convention. And that's the best interpretation of it. The tactics really seem aimed at scaring would-be protesters into staying away from New York. In an internal complaint, an F.B.I. employee charged that the bulletins improperly blurred the line between lawfully protected speech and illegal activity. But the Justice Department's Office of Legal Counsel, in a five-page internal analysis obtained by The New York Times, disagreed. The office, which also made headlines in June in an opinion - since disavowed - that authorized the use of torture against terrorism suspects in some circumstances, said any First Amendment impact posed by the F.B.I.'s monitoring of the political protests was negligible and constitutional. By the way, here is the "Denver antiwar group" that Lichtblau refers to near the top of his article - the American Friends Service Committee. According to the Times, 21-year-old intern Sarah Bardwell was visited by six agents. John Ashcroft knows that you just can't be too careful with those Quakers. BUSH, SLIDING. Josh Marshall notes that Washington Post columnist David Broder, the ultimate establishmentarian, has embraced the slowly emerging consensus that George W. Bush is heading toward a decisive loss this November. But Yale economist Ray C. Fair - a John Kerry supporter - tells the New York Times Magazine that his econometric model shows Bush coasting with nearly 58 percent of the vote. Media Log's prediction: the event or events that will determine the outcome have yet to occur. About Media Log Archives The Boston Phoenix's Media Log was launched in 2002 by the paper's then-media columnist, Dan Kennedy, who continued it until he left the paper in 2005. The Phoenix's current media columnist, Adam Reilly, is now the author of Media Log, which has since been renamed Don't Quote Me. Kennedy, an assistant professor of journalism at Northeastern University, blogs at Media Nation.
{ "pile_set_name": "Pile-CC" }
Commemorate the greatness of the glorious Crew - one of MLS' most storied franchises! This spectacular poster features four superstars of the team, in a brilliant intergalactic team-colored design: dynamic Midfielder Eddie Gaven, California-born defender Chad Marshall, Argentinian legend Guillermo Barros Schelotto, and Team USA mainstay Frankie Hejduk. A rare item you won't find in stores, a beauty for your wall, and a valuable collector's item for years to come!
{ "pile_set_name": "Pile-CC" }
An OTPROM is used in an application-specific integrated circuit (ASIC) for the purpose of storing boot code of a system or it can be used as a look-up table. The most common OTPROM, a NAND type, is formed of an array of n-type field effect transistors (NFETs), as depicted in FIG. 1. Adverting to FIG. 1, drain terminals 101 of storage devices 103 through 133, e.g., NFETs, in the same column are connected to the same bit line of bit lines 135, 137, 139, and 141. For example, storage devices 103, 111, 119, and 127 are connected to bit line 135. Similarly, gate terminals 143 of storage devices 103 through 133 in the same row are connected to the same word line of word lines 145, 147, 149, 151. For example, storage devices 103, 105, 107, and 109 are all connected to word line 145. Also, source terminals 153 are connected to ground supply 155, 157, 159, and 161, respectively. Each drain terminal 101 is programmed and, therefore, stores either a 0 or a 1. Consequently, when a storage device 103 through 133 is uniquely selected, the selected device of devices 103 through 133 either gives current in the micro amp (μA) range or a comparatively negligible current. Also, one binary sense amp resolves one bit line, e.g., bit line 135, and stores the data read. A known approach for programming an OTPROM includes using gate oxide thickness of the core devices as a programming method, i.e., storing either a 0 or a 1 at any one device. Another known approach for programming an OTPROM is to make use of one of the reliability effects in metal-oxide-semiconductor field-effect transistor (MOSFET) devices. In particular, a time-dependent dielectric breakdown (TDDB) stress can be applied to the gate oxide layer of a storage device as a programming method. Each of the above methods results in two possible levels of bit line read current that can be read and stored by any conventional sense amplifier. However, an OTPROM array as depicted in FIG. 1 tends to consume a lot of area on a chip because of the largely repeated devices 103 through 133, with one device storing only one bit of memory. A need therefore exists for methodology enabling an increasing of the storage capacity of an OTPROM array without requiring additional area on a chip.
{ "pile_set_name": "USPTO Backgrounds" }
Brownies de Amaranto Con Chocolate Brownies de Amaranto Súpero Ligeros, hechos a base de amaranto y Quinoa… ¡Te encantarán! El día de hoy les traigo una Receta deliciosa, de un exquisito panecillo que niños y adultos aman, ¡Brownies!, así como lo oyes, pero esta vez en una versión mucho más saludable y ligera, que te permitirá llevar a cabo una dieta equilibrada, libre de todo ese contenido de azúcar y grasas saturadas, que los panecillos convencionales nos aportan. Existen una gran diferencia ente esta nueva versión y la ya existente, por ejemplo, los nuestros quedan más esponjado y húmedos, porque dentro de sus ingredientes introducimos la ¡Quinoa!, que además de ser saludable, es ideal para aquellas personas que simplemente no pueden consumir este «postrecito», porque tienen una intolerancia al gluten y te prometo ¡Son exquisitos! Pero no sólo este ingrediente forma parte del protagonismo de estos Brownies, también el ¡Amaranto!, que junto con la ¡Quinoa!, son considerados como cereales sagrados, por su alto contenido nutricional. Ambos tienen una composición mucho más equilibrada que los cereales convencionales y lo mejor, la cantidad y calidad de proteínas es mejor. En cuanto a la grasa, encontramos niveles bajos de está y cantidades considerables de hierro en ambos, el calcio, fósforo, fibra y la Vitamina E, también se hacen presentes. Son ricos en ácido fólico y demás vitaminas del grupo B. Vamos a ver el paso a paso de como preparar una Deliciosos Brownies de Amaranto con Quinoa, libre de Gluten: Ingredientes para preparar brownies de amaranto Amaranto natural. Proteína en polvo (caseinato puede ser o vegana). Stevia 100% (no olvides leer los ingredientes de tu caja para asegurarte que sea un stevia puro) Harina de coco. Leche de almendra o de coco. Quinoa natural. Crema de cacahuate con chocolate o de avellanas casera. Frutas deshidratadas si quieres decorar. Para la cobertura de chocolate: Puedes entrar a un post en donde te mostramos como hacer Nutella en casa, o bien, sustituirla por crema de maní con chocolate, en caso de no encontrar avellanas. Como preparar brownies de amaranto Mezclarás 2 tazas de leche de almendra ó de coco en 2 tazas de harina de coco. Agregarás 1 huevo. 1 cda. de linaza, 1 cda. de cacao en polvo, 3 sobres de stevia y por ultimo 1 taza de amaranto y 1 de quinoa. Debes de tener una charola lista, previamente hidratada con un poco de aceite de coco, colocarás la mezcla dentro de ella y hornearás durante 20 minutos. Sacarás los panecillos del horno, verterás un poco de leche de almendra sobre ellos, para que estén más humedecidos y sepan más deliciosos y listo, dejarás que enfríe. A mi me encanta agregar un poco de Nutella casera para darle ese sabor a chocolate, tú también lo puedes hacer, si es que te apetece. Fuentes: Pinterest.com/Directoalpaladar.com/QueenofQuinoa.com
{ "pile_set_name": "OpenWebText2" }
GYM ACCESSORIES/CLOTHING Shopping Online Whether you’re planning your next trip to the theme parks or you’ve already arrived home from your most recent visit, shop online with Shop Disney Parks—which features a specially curated list of top-selling items and pre-arrival essentials... Shopping Online Whether you’re planning your next trip to the theme parks or you’ve already arrived home from your most recent visit, shop online with Shop Disney Parks—which features a specially curated list of top-selling items and pre-arrival essentials... Write a review Shopping Online Whether you’re planning your next trip to the theme parks or you’ve already arrived home from your most recent visit, shop online with Shop Disney Parks—which features a specially curated list of top-selling items and pre-arrival essentials.
{ "pile_set_name": "Pile-CC" }
2014 Getting Back to the Basics.  Review HIPAA Privacy and Security requirements  Review American Behavioral standards and practices developed to comply. Similar presentations Presentation on theme: "2014 Getting Back to the Basics.  Review HIPAA Privacy and Security requirements  Review American Behavioral standards and practices developed to comply."— Presentation transcript: 3 HIPAA  The H ealth I nsurance P ortability and A ccountability A ct (HIPAA)  Signed into law in 1996  Adopted Privacy Rules (2003) that protect health data (referred to as PHI) and provide members with certain rights about their health  Adopted Security Rules (2005) that protect electronic health data (referred to as e-PHI)  Amended by the HITECH Act of 2009  Amended by the Omnibus Rule to enhance patient privacy protection effective 9/24/2013  New rules and guidance continue to be issued to strengthen the requirements 4 PHI P rotected H ealth I nformation is any information, including demographic information, transmitted or maintained in any medium (electronically, on paper, via spoken word) that is created or received by a health care provider, health plan or health care clearinghouse that relate to the past, present or future physical or mental health condition of an individual, or past, present or future payment for the provision of health care to the individual and can be used to identify the individual. 5 The following identifiers of an individual or of relatives, employers or household members of the individual are considered PHI: Names Postal addresses smaller than state All elements of dates (except year) such as birth date, admission/discharge date, date of death Telephone numbers Fax numbers addresses Social security numbers Medical record numbers Health plan ID numbers Account numbers Certificate/license numbers Vehicle identifiers and serial numbers including license plates Device identifiers and serial numbers Web Universal Resources Locators (URLs) Internet Protocol (IP) address numbers Biometric identifiers, including finger and voice prints Full face photographic images and any comparable images Any other unique identifying numbers, characteristics, or codes 6 PII P ersonally I dentifiable I nformation is information that can be used to distinguish or trace an individual’s identity (e.g., name, social security number, member number, etc.), alone or when combined with other personal or identifying information which is linked or linkable to a specific individual (e.g., date and place of birth, mother’s maiden name, etc.). PII may also be referred to as personally identifiable data or individually identifiable information. NOTE: Although PII alone is not health information, it must be protected the same as PHI. Whenever PHI is referenced in this presentation, the same standard applies to PII! 8 TP O  PHI is to be accessed for work-related purposes only – those that relate to T reatment, P ayment or health care O perations (TPO – defined later in this presentation)  Your access to PHI must be restricted to only the information necessary for you to perform your job o This protects you 9  When HIPAA allows a use or disclosure of PHI, you should use only the minimum PHI necessary to accomplish the purpose of the use or disclosure  Exceptions: o Treatment of the member o Purposes for which a member has signed a HIPAA authorization o Disclosures by law o When sharing information with the member or his/her legal representative 10  De-identified health data: o Excludes all 18 elements (PHI identifiers listed previously in this presentation) any o Cannot include any information that can be used alone or in combination with other information to identify the member who is the subject of the information  Whenever possible, use de-identified health information instead of PHI De-identified data is not PHI and is not protected by the Privacy Rule. * Consult the Privacy Officer to ensure data has been sufficiently de-identified when in doubt 11  Know “how” and “where” you should store PHI o Paper files should be stored in a filing cabinet or secure location when not in use (or at a minimum, turned facedown) o PHI stored in electronic databases, document logs, spreadsheet applications, etc. must be password protected and saved to a secure location, such as a department folder. 12  Store important documents in a secure location (such as your user area or in a department folder)  Lock your screen before leaving the room (never leave your computer unlocked when unattended) 13  All s must include confidentiality notice (see next slide for example)  When sending an , be very careful to choose the correct recipient’s name o Choosing the wrong name could result in a HIPAA breach! 14  Always verify fax number before dialing  Must use a approved fax sheet that includes a confidentiality notice 15 o Place all data containing confidential information in the shred bins when no longer needed o Hand shredding is not sufficient 16 Member authorization not required to disclose PHI to:  Public health and governmental agencies, law enforcement officials and other authorities as required by law (forward these requests to the Privacy Officer for processing)  Comply with legal proceedings, such as a court or administrative order or subpoena, etc. 17 Member authorization not required to disclose PHI to the:  Member (who is the subject of the PHI)  Member’s Power of Attorney (POA) or Legal Guardian (ordered by the court or protective order) o American Behavioral must have proof of the individual’s legal authority o Legal document must specifically authorize health disclosures  Parents covered on the same American Behavioral policy of a child age 13 or younger o If the child is 14 or older, the child must authorize the disclosure *** ALWAYS ask the individual for at least two forms of ID to validate their identity*** 18 Member authorization not required to disclose a member’s PHI to the member’s family or friends in emergency situations where the member becomes incapacitated or unable to agree or object  Generally, management should approve emergency disclosures, but use your best judgment – if there is not time for approval, document the situation thoroughly and notify your supervisor afterwards 19 Member authorization not required to disclose a member’s PHI to the member’s family or friends when a member becomes incapacitated long-term (or expected long-term)  Requires proof of long-term incapacity  Can disclose to the member’s spouse or parent, or to an individual over age 19 that is the member’s child/brother/sister/next of kin  Requires completion of a Personal Representative Attestation for Long-Term Incapacitated MembersPersonal Representative Attestation for Long-Term Incapacitated Members 20 Member authorization not required for disclosure of general plan information publically available on American Behavioral’s website to family members and friends involved in a member’s care, such as:  Evidence/Certificate of Coverage  Attachment A (commercial members)  Formulary  Provider/Pharmacy Directory  Other General Plan Information  *It is permissible to release information to a friend or relative if we have obtained a signed Appointment of Representative (AOR) Form 21 Member authorization not required when we:  Share other non-PHI information with family members and friends involved in the member’s care  Verify certain information for those involved in the member’s care 22 For non-emergent situations, we can disclose to the member’s family and friends if the member authorizes the disclosure:  The member can appoint someone as their personal representative. Both the member and the appointed representative must sign the form 23 For non-emergent situations, we can also disclose PHI to a member’s family or friends through a verbal authorization from the member 24  Any other disclosure not listed previously requires the member’s authorization  Examples of disclosures requiring authorization: o Requests from attorneys/law offices o Requests from medical record companies o Requests from medical suppliers/vendors wanting to market their products or services without a treatment referral from a physician o Requests from employers Plans (self-insured employer groups) may designate specific associates authorized to receive PHI Fully insured employers should never receive PHI without a member’s authorization 25 Right to confidential communications Right to access their PHI Right to request we amend our records Right to an accounting of disclosures we have made concerning their PHI Right to file a privacy complaint Right to request a restriction on how we use/share their PHI 26  A breach occurs when PHI is “acquired, accessed, used or disclosed” in an unauthorized manner that compromises the security or privacy of the information  Examples: o Accessing PHI without a work-related need to know o Sharing PHI with those who do not need to know o Sending an /fax containing PHI to the wrong recipient o Loss or theft of records containing PHI 27  Texas HIPAA Blunder affects 277k  July Texas Health Harris Methodist Fort Worth notified some 277,000 patients that their PHI was compromised after several hospital microfilms, which were supposed to be destroyed, were found in various public locations.  Lesson: Make sure all PHI is disposed of properly!  Advocate Health Slapped with Lawsuit After Massive Data Breach  August Advocate Health Care reported the second largest HIPAA breach when four unencrypted laptops were stolen from its facility, compromising over 4 million patients’ information. Advocate has now been slapped with a class action lawsuit filed by affected patients.  Lesson: Portable devices must be secured at ALL times (even when not in use) and must be encrypted! 28  Under the Breach Notification Rule (part of the Health Information Technology for Economic and Clinical Health (HITECH) Act) individuals whose PHI is compromised must be notified in writing within 60 days of discovery of a breach  All breaches must be reported to HHS  HHS posts information about breaches at: reachnotificationrule/breachtool.html reachnotificationrule/breachtool.html 30  The Department of Health and Human Services (HHS), through the Office for Civil Rights (OCR) enforces tiered civil penalties o Monetary penalties range from $100 per violation up to 1.5 million per calendar year  State attorneys general can pursue civil suits against persons violating HIPAA  U.S. Department of Justice enforces criminal penalties o Criminal penalties for “wrongful disclosure” include fines of $50,000 to $250,000 and up to 10 years in prison NOTE: Penalties and fines apply to associates – not just to covered entities! 31  Sending PHI via unencrypted  Faxing or ing PHI to the wrong recipient  Leaving PHI unattended at copiers, on printers and fax machines, in conference rooms, in public locations, etc.  Discussing PHI in common places or with others who do not need to know the information 32  Protect PHI the way you would want someone to protect your PHI  Make HIPAA Privacy and Security a priority!
{ "pile_set_name": "Pile-CC" }
Thursday, December 18, 2008 I've created this blog to keep track of my various car-scapades, inspired by my recent purchase of a 1991 Mazda Miata. As a still-owner of a vegetable oil-powered 1980 Mercedes-Benz 240D, I've run into so many bizarre problems and eccentricities with that car that I've thought many times about putting them to (digital) paper. I never quite got around to it, partly because the amount of time I dedicated to the Benz limited how much I could spend writing about it. But a recent column on the Pansy Patrol, a car enthusiast blog I read regularly, pushed me over the edge into autoblogland. See the link in the Shared Items on the right. It's where I got the name for this blog. The things Clint talks about in that column mimic the fight I've been having in my own head about selling the Mercedes. I love it, I hate it, I love it again, I hate it some more. I strive to be rational about the decisions I make involving my cars, but in the end, it's not about what makes the most sense. It's about my love for the car. I work with a guy, Jim, who buys cars for less than $1000. Jim fixes what needs attention to make them road-worthy, but that's it. Comfort, amenities, driving pleasure, status, track prowess, power, safety, style -- none of these are things he considers when buying a car. Jim is as logical as they get. He doesn't pay depreciation. He doesn't pay a premium for comfort, style, or status. He doesn't care what he drives in any way, other than it gets him where he needs to go for the least amount of money. When the car gets too costly to repair, he'll just "throw it out." He doesn't have any passion about cars at all. This blog, then, is not about a hard-core utilitarian approach to cars. Nor is it about mindless fawning over poster cars (a la Countach, Veyron) or an endless, hopeless obsession to on-the-deathbed projects. It's about having fun, getting dirty, and feeling good about a job half-assed with duct tape and JB Weld holding up longer than the original failed part. I will primarily focus on the three cars that I own or care for, sprinkled with commentary on the automotive industry and other cars that I work on. My cars are (in order of age):
{ "pile_set_name": "Pile-CC" }
/* webymsg.c * Web Messenger Yahoo! * With and without HTTP transport * * $Id: $ * * Xplico - Internet Traffic Decoder * By Gianluca Costa <g.costa@xplico.org> * Copyright 2013 Gianluca Costa. Web: www.xplico.org * * * This program is free software; you can redistribute it and/or * modify it under the terms of the GNU General Public License * as published by the Free Software Foundation; either version 2 * of the License, or (at your option) any later version. * * This program is distributed in the hope that it will be useful, * but WITHOUT ANY WARRANTY; without even the implied warranty of * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the * GNU General Public License for more details. * * You should have received a copy of the GNU General Public License * along with this program; if not, write to the Free Software * Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA. */ #include <pcap.h> #include <arpa/inet.h> #include <string.h> #include <stdio.h> #include "proto.h" #include "dmemory.h" #include "etypes.h" #include "log.h" #include "pei.h" #include "http.h" #include "webymsg.h" static int prot_id; static int pei_url_id; static int pei_client_id; static int pei_host_id; static int pei_req_header_id; static int pei_req_body_id; static int pei_res_header_id; static int pei_res_body_id; static PktDissector HttpPktDis; /* this functions create the http pei for all http packets */ static int WebMsnYahooPei(packet* pkt) { http_msg *msg; pei *ppei; pei_component *cmpn; ppei = NULL; /* display info */ msg = (http_msg *)pkt->data; /* pei */ PeiNew(&ppei, prot_id); PeiCapTime(ppei, pkt->cap_sec); PeiMarker(ppei, pkt->serial); PeiStackFlow(ppei, pkt->stk); /* url */ PeiNewComponent(&cmpn, pei_url_id); PeiCompCapTime(cmpn, msg->start_cap); PeiCompCapEndTime(cmpn, msg->end_cap); PeiCompAddStingBuff(cmpn, msg->uri); PeiAddComponent(ppei, cmpn); /* clent */ PeiNewComponent(&cmpn, pei_client_id); PeiCompCapTime(cmpn, msg->start_cap); PeiCompCapEndTime(cmpn, msg->end_cap); PeiCompAddStingBuff(cmpn, msg->client); PeiAddComponent(ppei, cmpn); /* host */ PeiNewComponent(&cmpn, pei_host_id); PeiCompCapTime(cmpn, msg->start_cap); PeiCompCapEndTime(cmpn, msg->end_cap); PeiCompAddStingBuff(cmpn, msg->host); PeiAddComponent(ppei, cmpn); /* req hdr */ if (msg->req_hdr_file) { PeiNewComponent(&cmpn, pei_req_header_id); PeiCompCapTime(cmpn, msg->start_cap); PeiCompCapEndTime(cmpn, msg->end_cap); PeiAddComponent(ppei, cmpn); PeiCompAddFile(cmpn, NULL, msg->req_hdr_file, msg->req_hdr_size); if (msg->error && msg->req_body_size == 0 && msg->res_hdr_size == 0) { PeiCompError(cmpn, ELMT_ER_PARTIAL); } } /* req body */ if (msg->req_body_size) { PeiNewComponent(&cmpn, pei_req_body_id); PeiCompCapTime(cmpn, msg->start_cap); PeiCompCapEndTime(cmpn, msg->end_cap); PeiAddComponent(ppei, cmpn); PeiCompAddFile(cmpn, NULL, msg->req_body_file, msg->req_body_size); if (msg->error && msg->res_hdr_size == 0) { PeiCompError(cmpn, ELMT_ER_PARTIAL); } } /* res hdr */ if (msg->res_hdr_size) { PeiNewComponent(&cmpn, pei_res_header_id); PeiCompCapTime(cmpn, msg->start_cap); PeiCompCapEndTime(cmpn, msg->end_cap); PeiAddComponent(ppei, cmpn); PeiCompAddFile(cmpn, NULL, msg->res_hdr_file, msg->res_hdr_size); if (msg->error && msg->res_body_size == 0) { PeiCompError(cmpn, ELMT_ER_PARTIAL); } } /* res body */ if (msg->res_body_size) { PeiNewComponent(&cmpn, pei_res_body_id); PeiCompCapTime(cmpn, msg->start_cap); PeiCompCapEndTime(cmpn, msg->end_cap); PeiAddComponent(ppei, cmpn); PeiCompAddFile(cmpn, NULL, msg->res_body_file, msg->res_body_size); if (msg->error == 2) { PeiCompError(cmpn, ELMT_ER_HOLE); } else if (msg->error != 0) { PeiCompError(cmpn, ELMT_ER_PARTIAL); } } /* insert pei */ PeiIns(ppei); return 0; } static packet* WebMsnYahooDissector(packet *pkt) { http_msg *msg; bool ins; /* display info */ msg = (http_msg *)pkt->data; ins = FALSE; #ifdef XPL_CHECK_CODE if (msg->serial == 0) { LogPrintf(LV_FATAL, "WebMsnYahoo serial error"); exit(-1); } #endif if (msg->uri != NULL) { /* yahoo! web mail */ if (strstr(msg->uri, "&sid=") != NULL) { if (strstr(msg->uri, "/pushchannel/") != NULL || strstr(msg->uri, "?action=send-message&") != NULL) { /* send to manipulator */ WebMsnYahooPei(pkt); ins = TRUE; } } } if (ins == FALSE && HttpPktDis != NULL) { /* http pei generation and insertion */ HttpPktDis(pkt); } else { /* free memory */ HttpMsgFree(msg); PktFree(pkt); } return NULL; } int DissecRegist(const char *file_cfg) { proto_dep dep; pei_cmpt peic; memset(&dep, 0, sizeof(proto_dep)); memset(&peic, 0, sizeof(pei_cmpt)); /* protocol name */ ProtName("Yahoo! Web Messenger", "webymsg"); /* http dependence */ dep.name = "http"; dep.attr = "http.host"; dep.type = FT_STRING; dep.op = FT_OP_REX; dep.val.str = DMemMalloc(strlen(WMSNHOST_NAME_YAHOO_REX_1)+1); strcpy(dep.val.str, WMSNHOST_NAME_YAHOO_REX_1); ProtDep(&dep); dep.val.str = DMemMalloc(strlen(WMSNHOST_NAME_YAHOO_REX_2)+1); strcpy(dep.val.str, WMSNHOST_NAME_YAHOO_REX_2); ProtDep(&dep); /* PEI components */ peic.abbrev = "url"; peic.desc = "Uniform Resource Locator"; ProtPeiComponent(&peic); peic.abbrev = "client"; peic.desc = "Client"; ProtPeiComponent(&peic); peic.abbrev = "host"; peic.desc = "Host"; ProtPeiComponent(&peic); peic.abbrev = "req.header"; peic.desc = "Request header"; ProtPeiComponent(&peic); peic.abbrev = "req.body"; peic.desc = "Request body"; ProtPeiComponent(&peic); peic.abbrev = "res.header"; peic.desc = "Response header"; ProtPeiComponent(&peic); peic.abbrev = "res.body"; peic.desc = "Response body"; ProtPeiComponent(&peic); /* dissectors registration */ ProtDissectors(WebMsnYahooDissector, NULL, NULL, NULL); return 0; } int DissectInit(void) { int http_id; prot_id = ProtId("webymsg"); /* Http pei generator */ HttpPktDis = NULL; http_id = ProtId("http"); if (http_id != -1) { HttpPktDis = ProtPktDefaultDis(http_id); } /* pei id */ pei_url_id = ProtPeiComptId(prot_id, "url"); pei_client_id = ProtPeiComptId(prot_id, "client"); pei_host_id = ProtPeiComptId(prot_id, "host"); pei_req_header_id = ProtPeiComptId(prot_id, "req.header"); pei_req_body_id = ProtPeiComptId(prot_id, "req.body"); pei_res_header_id = ProtPeiComptId(prot_id, "res.header"); pei_res_body_id = ProtPeiComptId(prot_id, "res.body"); return 0; }
{ "pile_set_name": "Github" }
Music streaming platforms' audience sizes compared - marcadam http://www.ventureharbour.com/which-music-discovery-platform-has-the-most-effective-marketing/ ====== quahada Among the bleeding edge tech community, Deezer and Spotify are considered the poster children. It's interesting how big Pandora's following is, and how this will change over time as awareness for the newer services builds among the general population. It will also be interesting to see a trend comparison of pure internet radio platforms, like Pandora and Songza. ~~~ marcadam Yep - the thing about these numbers are that they're obviously based on _registered_ users, not active users. For example, which Spotify may have 33 million users, only 20 million of those are active. Pandora may have an impressive 150 million registered users, but I imagine the drop off rate of active users is relatively high given the increase in popularity of other services. ~~~ quahada yeah, and with these streaming services there's also free vs paid users. And Pandora is not profitable. I believe Pandora loses money with each user- hour, which means more users == more losses.
{ "pile_set_name": "HackerNews" }
It is known that individuals with peripheral arterial disease are at increased risk for cardiovascular morbidity and mortality. In order to facilitate design of a trial to evaluate the effects of intervention on risk factors on morbidity and mortality in such patients a feasibility study (ADMIT) has been designed to evaluate the ability to recruit, treat and retain volunteers in anticipation of a large scale multi-center study focusing on risk factor reduction.
{ "pile_set_name": "NIH ExPorter" }
Before clicking on the button to watch more vr porn, you have to check out the pictures I posted for you here below! In the porn scene you see a lot of pussies, but Nicole Love has a pussy to remember.. Start playing with it 🙂 And if you played enough with it than she loves to get you right in her round ass.. 🤤 When you think you’ve seen it all.. Nicole has been hiding something up in her butt.. Find out yourself by putting on you VR headset! WATCH NOW Pictures, pictures & Pictures! WATCH NOW
{ "pile_set_name": "OpenWebText2" }
“This forum brings together CEOs and business leaders who know what it takes to create jobs and drive economic growth,” Trump said in a statement. “My administration is committed to drawing on private sector expertise and cutting the government red tape that is holding back our businesses.” AD AD Trump’s announcement of his Strategic and Policy Forum comes as he assembles what is already the wealthiest administration in modern American history, raising questions about his team’s ability to identify with the concerns of his voters around the country. Most of the members of the advisory panel are worth tens or hundreds of millions — if not billions — of dollars. Those who will advise Trump are Schwarzman; Patomak Global Partners CEO Paul Atkins, a former commissioner of the Securities and Exchange Commission; GM Chairman and CEO Mary Barra; Cleveland Clinic CEO Toby Cosgrove; JPMorgan Chase Chairman and CEO Jamie Dimon; BlackRock Chairman and CEO Larry Fink; Disney Chairman and CEO Bob Iger; Boston Consulting Group President and CEO Rich Lesser; Walmart President and CEO Doug McMillon; former Boeing chairman and CEO Jim McNerney; Global Infrastructure Partners Chairman Adebayo Ogunlesi; IBM President and CEO Ginni Rometty; former Federal Reserve Board of Governors member Kevin Warsh; EY Global Chairman and CEO Mark Weinberger; former General Electric chairman and CEO Jack Welch; and IHS Markit Vice Chairman Daniel Yergin. As our colleagues Jim Tankersley and Ana Swanson have noted of Trump’s cabinet and advisers: AD AD Their collective wealth in many ways defies Trump’s populist campaign promises. Their business ties, particularly to Wall Street, have drawn rebukes from Democrats. But the group also amplifies Trump’s own campaign pitch: that Washington outsiders who know how to navigate and exploit a “rigged” system are best able to fix that system for the working class. “It fits into Trump’s message that he’s trying to do business in an unusual way, by bringing in these outsiders,” said Nicole Hemmer, an assistant professor in presidential studies at the University of Virginia’s Miller Center. But Trump and his team, she added, won’t be able to draw on the same sort of life struggles that President Obama did, in crafting policy to lift poor and middle-class Americans. “They’re just not going to have any access to that” life experience, she said. “I guess it will be a test — does empathy actually matter? If you’re able to echo back what people are telling you, is that enough?” AD AD A Trump adviser said Friday that discounting the administration based on its collective wealth is “categorically unfair.”
{ "pile_set_name": "OpenWebText2" }
Tag: events Firebird Events is one of the leading conference production companies in the UK. Offering exceptional value conference packages or stunning bespoke set design and AV we can cater for every possible requirement. Welcome to the UK Themed Events home page as you all know theming adds a fantastic sparkle and glitz and glamour to all private parties and corporate events. Remember if you are having a themed party if no one else can help you contact the Theme Team. At Portland Catering Company, we offer thoughtful menus filled with dishes that are always fresh and our gracious and attentive staff will take care of even the tiniest details. Portland Catering Company will make your event a truly special occasion. At Firebird Events Ltd., we excel in designing fun, effective team building sessions that utilise key skills necessary to succeed in the workplace, clear communication, collaboration, trust, leadership, encouragement and support. At Firebird our team building department offers over 80 comprehensive team building activities suitable for any sized group. We provide a range of developmental, training, motivational and physical team building options across the UK. Hire a colour changing round cocktail bar for your next event. Add a splash of colour to your function space or marquee to really lift the look of the room. The bar can be set to one colour or can be set to colour change. At Corporate Events (UK) Ltd. we have simplified organizing conferences which is why we are proud to introduce a wide range of Conference Hire Packages for you to choose from. Each conference hire package includes engineers, delivery and construction. UK Events is proud to supply LED lighting, a large range of dance floors, starcloth backdrops, Uplighters, mood lighting, LED furniture, staging and catwalks. We are a large company servicing the entire country. We stock most of our products. Managing over 1000 corporate events, private parties, weddings, conferences and awards dinners every year. Combining one of the UK's leading production companies, a comprehensive team building division and party planning department.
{ "pile_set_name": "Pile-CC" }
Athleisure Wear For Fall Athleisure wear is a style of clothing worn as athletic apparel but also suitable for casual, everyday wear. It brings the best of both worlds, comfort and versatility. Today I’m sharing athleisure wear for fall. So how can you incorporate athleisure into your daily style? Find workout pieces that look good and can be worn around town while shopping and running errands. Comments Hi Cyndi, I love this outfit! The inseam for the pants is 27 inches, and i am 5’8″. Before I order them, I am wondering how tall you are because they look perfect on you. I love that you share bible verses, thank you so much for that. God bless!! I love this outfit! I work from home as a babysitter, so this is the perfect combo of comfortable and presentable. I appreciate the variety of looks you showcase on your blog. There’s an outfit for every need in my life. Cute outfit but at age 56, I think I’d feel self conscious in camo. I find this especially when hanging out with my grown adult girls. 🙂 Just me probably. Fun about your puppy to come. You are brave. I’m done with pets. I’m enjoying the freedom of just getting to go and not have to worry about animals. Looking forward to pictures of your new puppy. Could you also update us on Wayne and his job hunting etc. etc. Oh super cute!!! It looks so comfy and yet still put together. Love all the combo’s you’ve used from head to toe:) I may have to check out these leggings( or even find a casual cargo pant in that print). Such a nice change from just plain old black. This would be great as I work from home but good enough to run out on errands without having to change. CONGRATS ON YOUR NEW PUPPY can’t wait to see some pics… We lost our sheltie 4 years ago this coming thanksgiving. (October) and what a void they leave. Have a wonderful Day Karen
{ "pile_set_name": "Pile-CC" }
Assessment of competency in clinical measurement: comparison of two forms of sequential test and sensitivity of test error rates to parameter choice. To assess clinical measurement competency by two sequential test formulations [resetting sequential probability ratio test (R-SPRT) and learning curve cumulative summation (LC-CUSUM)]. Numerical simulation and retrospective observational study. Obstetric ultrasound department. Cohorts of 10,000 simulated trainees and 62 obstetric sonographers training in nuchal translucency (NT) measurement at the 11-14-week pregnancy scan with limited case availability. Application of LC-CUSUM and R-SPRT to clinical measurement training. Proportions of real trainees achieving competency by LC-CUSUM and R-SPRT, proportions of simulated competent trainees not achieving competency (Type I error), proportions of simulated incompetent trainees achieving competency (Type II error), distribution of case number required to achieve competency (run length) and frequency of resets. For simulated cohorts, significant differences in run-length distribution and true test error rates were found between the R-SPRT and LC-CUSUM tests with equivalent parameters. Increasing the cases available to each trainee reduced the Type I error rate but increased the Type II error rate for both sequential tests for all choices of unacceptable failure rate. Discontinuities in the proportion of trainees expected to be test competent were found at critical values of unacceptable failure rate. With equivalent parameters, the R-SPRT and LC-CUSUM formulations of sequential tests produced different outcomes, demonstrating that the choice of test method, as well as the choice of parameters, is important in designing a training scheme. The R-SPRT detects incompetence as well as competence and may indicate need for further training. Simulations are valuable in estimating the proportions of trainees expected to be assessed as competent.
{ "pile_set_name": "PubMed Abstracts" }
[Optimizing palliative therapy in pancreatic carcinoma]. Only an interdisciplinary approach between surgeon, medical oncologist and radiologist may allow the optimisation of palliative treatment for pancreatic carcinoma. If imaging diagnostics do not allow to decide about the resectability of a tumour, an explorative laparotomy should be performed, unless this is precluded by comorbidity. Due to similar morbidity and mortality, but better long-term results, a choloedocho-jejunostomy should be performed for intra-operatively unresectable tumors in favour of a cholecysto-jejunostomy. In selected patients a gastro-enterostomy may be indicated. However, this is not justified prophylactically. If imaging diagnostics show definite signs of unresectability in the absence of a gastric outlet obstruction, the treatment depends on the general condition of the patient: Insertion of a pigtail-catheter is sufficient for patients in poor general condition and a short life expectancy; metal wallstents should be preferred for patients in good general condition and a life expectancy in excess of six months, due to better results regarding quality of life. Chemoablation of the celiac plexus is an useful method to control the sever pain, which is common in these patients; radiotherapy or analgesic therapy may be used alternatively.
{ "pile_set_name": "PubMed Abstracts" }
The musical duo ClariS, which keeps the singers' identities secret, will release their first photo compilation book on September 1. The book, titled illusion ~Hikari ni Kurumarete~ (Illusion: Wrapped in Light), will cost 3,500 yen (US$31). The hardcover collection will have 96 A4-size full-color pages. The photographs will include some unreleased concert pictures. ClariS also revealed a visual for their upcoming concert that will be held in the Pacifico Yokohama National Convention Hall of Yokohama on September 16. In addition, the duo's Blu-ray Disc release for their "ClariS 1st Budōkan Concert ~Futatsu no Kamen to Ushinawareta Taiyō~" (ClariS 1st Budōkan Concert: Two Masks and the Lost Sun) concert went on sale on Wednesday. The singers briefly revealed their full faces at the concert held in Tokyo on February 10. The world premiere screening of the concert was held at Anime Expo on July 2. Crunchyroll is also releasing the concert Blu-ray Disc this month. ClariS' 18th single "Shiori," which will be the ending theme song for the Owarimonogatari television specials, will ship in Japan on Thursday. The specials will premiere on August 12-13. Alleged photographs of ClariS from their appearance at the "Music Theater 2017" event in May created a buzz online in June because they revealed parts of the secretive singers' faces. The singers performed in veils at their first solo concert in 2015. Source: Animate Times
{ "pile_set_name": "OpenWebText2" }
100 fans of 24 meet Chloe O'Brian at box-set launch Actress Mary Lynn Rajskub, who played CTU's finest computer whizz Chloe O'Brian in the hit Fox show 24, was on hand to meet fans of the series during the launch of the 8th season on Blu-ray and DVD. Specifically, she was there to highlight a new feature of the box-set, one that shows exactly what happens to Chloe after the season's, and indeed entire series', climatic and emotional finale. Rajskub also took part in a Q&A session with the fans, before being subjected to a "Jack Attack", where each audience member donned masks of Kiefer Sutherland. Mind you, just think how many terrorist plots could be foiled with 100 Jack Bauers? Alternatively, with that many, it would only take just over 14 minutes to solve the case. That wouldn't make much of a box-set though. 24 Season 8 is out now in a 4-disc Blu-ray set (with a bonus DVD) for £59.99, and 6-disc DVD set (with bonus DVD) for £49.99. There's also a mega-set featuring all 8 seasons and the TV movie Redemption on DVD for £244.99 - it's a whopping 48 discs in total. Our senior ed of news and features has been a tech and games journalist for more than 27 years, and has been with Pocket-lint for over five. Rik has edited a number of videogame magazines in the past, was deputy editor of Home Cinema Choice, and his TV career included stints as co-presenter of Channel 4's Gamesmaster and Sky One’s Games World.
{ "pile_set_name": "Pile-CC" }
The authors wish to make the following changes to their paper \[[@B1-genes-09-00315]\]. Due to an undetected mistake in the references management, certain errors appeared in the reference list and a reference was duplicated in [Table 1](#genes-09-00315-t001){ref-type="table"}. Consequently, three references have been changed as follows: Reference \[51\] "51. Kumar, N.; Mariappan, V.; Baddam, R.; Lankapalli, A.K.; Shaik, S.; Goh, K.L.; Loke, M.F.; Perkins, T.; Benghezal, M.; Hasnain, S.E.; et al. Comparative Genomic Analysis of *Helicobacter pylori* from Malaysia Identifies Three Distinct Lineages Suggestive of Differential Evolution. *Nucleic Acids Res.* **2015**, *43*, 324--335." has been replaced by: "51. Qumar, S.; Majid, M.; Kumar, N.; Tiwari, S.K.; Semmler, T.; Devi, S.; Baddam, R.; Hussain, A.; Shaik, S.; Ahmed, N. Genome Dynamics and Molecular Infection Epidemiology of Multidrug-Resistant *Helicobacter pullorum* Isolates Obtained from Broiler and Free-Range Chickens in India. *Appl. Environ. Microbiol*. **2017**, *83*, e02305-16." Reference \[44\] "44. Rehman, M.U.; Zhang, H.; Iqbal, M.K.; Mehmood, K.; Huang, S.; Nabi, F.; Luo, H.; Lan, Y.; Li, J. Antibiotic Resistance, Serogroups, Virulence Genes, and Phylogenetic Groups of *Escherichia coli* Isolated from Yaks with Diarrhea in Qinghai Plateau, China. Gut Pathog. **2017**, *9*, 1--11." has been replaced by "44. Rehman, M.A.; Yin, X.; Lepp, D.; Laing, C.; Ziebell, K.; Talbot, G.; Topp, E.; Diarra, M.S. Genomic Analysis of Third Generation Cephalosporin Resistant *Escherichia coli* from Dairy Cow Manure. *Vet. Sci.* **2017**, *4*, 4, doi:10.3390/vetsci4040057." Reference \[60\] "60. Wang, W.; Baloch, Z.; Peng, Z.; Hu, Y.; Xu, J.; Fanning, S.; Li, F. Genomic Characterization of a Large Plasmid Containing a *bla~NDM-1~* Gene Carried on *Salmonella enterica* Serovar Indiana C629 Isolate from China. *BMC Infect. Dis.* **2017**, *17*, 1--8." has been replaced by "60. Wang, J.; Li, X.; Li, J.; Hurley, D.; Bai, X.; Yu, Z.; Cao, Y.; Wall, E.; Fanning, S.; Bai, L. Complete Genetic Analysis of a *Salmonella enterica* serovar Indiana Isolate Accompanying Four Plasmids Carrying *mcr-1*, ESBL and Other Resistance Genes in China. *Vet. Microbiol*. **2017**, *210*, 142--146, doi:10.1016/j.vetmic.2017.08.024." Two references have been added, as they were omitted in error: Reference \[66\] in [Table 1](#genes-09-00315-t001){ref-type="table"} was wrongly cited, therefore it has been substituted by the new reference \[66\] "66. Li, B.; Yang, X.; Tan, H.; Ke, B.; He, D.; Wang, H.; Chen, Q.; Ke, C.; Zhang, Y. Whole Genome Sequencing Analysis of *Salmonella enterica* Serovar Weltevreden Isolated from Human Stool and Contaminated Food Samples Collected from the Southern Coastal Area of China. *Int. J. Food Microbiol.* **2018**, *266*, 317--323, doi:10.1016/j.ijfoodmicro.2017.10.032." Reference \[8\] in [Table 1](#genes-09-00315-t001){ref-type="table"} was wrongly cited, therefore it has been substituted by the new reference \[71\] "71. Flórez, A.B.; Mayo, B. Antibiotic Resistance-Susceptibility Profiles of *Streptococcus thermophilus* Isolated from Raw Milk and Genome Analysis of the Genetic Basis of Acquired Resistances. *Front. Microbiol.* **2017**, *8*, 2608, doi:10.3389/fmicb.2017.02608." Due to this correction, reference numbers were adjusted to follow a numerical order. In \[[@B1-genes-09-00315]\], the previous references \[66\] and \[71\] are now \[139\] and \[72\], respectively. The 31st row from [Table 1](#genes-09-00315-t001){ref-type="table"}, about *S. enterica* with origin in Dairy cattle and humans, was eliminated because it was a duplicate of row 28; the corrected table is: The authors would like to apologize for any inconvenience caused to the readers by these changes. genes-09-00315-t001_Table 1 ###### Main research studies published in recent years applying whole genome sequencing (WGS) to characterize antimicrobial resistance (AMR) in foodborne bacteria. ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- Reference Microbial Species Number of Isolates Sequenced Origin Main Findings in Relation to AMR ----------- ---------------------------------------------------------------------------------------------------------------- ------------------------------ ------------------------------------------------------------------------------------------------------------------------------- -------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- \[36\] *Aeromonas salmonicida* 101 Fish All sequenced isolates harbored three AMR genes against beta-lactam antibiotics encoded on the chromosome.\ Some isolates also harbored several other plasmid encoded resistance genes against trimethoprim, sulphonamide, and aminoglycoside antibiotics. \[37\] *Campylobacter* spp*.* 589 Retail poultry meat The following AMR genes were identified: *tetO*, *bla*~OXA-61~, *aph(2″)-Ic*, *aph(2″)-If*, *aph(2″)-Ig*, *aph(3′)-III*, *ant(6)-1a*, *aadE*, *aph(3″)-VIIa*, and *Inu(C)*.\ Mutations in housekeeping genes (*gyrA* at position 86, 23S rRNA at position 2074 and 2075) associated with AMR phenotypes were also identified. \[38\] *Campylobacter* spp. 114 Humans, retail meats, and cecal samples from food production animals Eighteen resistance genes, including *tet(O)*, *blaOXA-61*, *catA*, *lnu(C)*, *aph(2″)-Ib*, *aph(2″)-Ic*, *aph(2′)-If*, *aph(2″)-Ig*, *aph(2″)-Ih*, *aac(6′)-Ie-aph(2″)-Ia*, *aac(6′)-Ie-aph(2″)-If*, *aac(6′)-Im*, *aadE*, *sat4*, *ant(6′)*, *aad9*, *aph(3′)-Ic*, and *aph(3′)-IIIa*, and mutations in two housekeeping genes (*gyrA* and 23S rRNA), were identified. \[26\] *Campylobacter coli* 2 Retail meats A self-transmissible plasmid carrying multiple antibiotic resistance genes was identified, carrying genes encoding resistance to gentamicin, kanamycin, streptomycin, streptothricin, and tetracycline.\ Gentamicin resistance was due to a phosphotransferase gene, *aph(2″)-Ig*, not described previously. \[39\] *Clostridium difficile* 40 Human and porcine origin AMR genotypes were characterized by resistance to tetracycline \[*tetM*, *tetA(P)*, *tetB(P)*, and *tetW*\], clindamycin/erythromycin (*ermB*), and aminoglycosides (*aph3-III-Sat4A-ant6-Ia*).\ Resistance was mediated by clinically important mobile genetic elements, most notably Tn*6194* (harboring *ermB*) and a novel variant of Tn*5397* (harboring *tetM*). \[40\] *C. difficile* 2 Ground pork Identification of vancomycin (*vanW*, *vanA*, *vanR*, *vanS*, *vex2*, *vex3*, *vncR*, *vncS*); fluoroquinolones (*gyrA* and *gyrB*); tetracyclines (*tetM*, translation elongation factor G); beta-lactams (*blaZ*); and macrolides (macrolide efflux protein, macrolide glycosyltransferase) resistance genes, and multiple multidrug resistance efflux pump genes. \[31\] *Enterococcus* spp. 197 Various animal and food sources Resistance genotypes correlated with resistance phenotypes in 96.5% of cases for the 11 drugs investigated. \[21\] *Enterococcus faecalis*, *Enterococcus faecium*, *Escherichia coli*, *Salmonella enterica* serovar Typhimurium 200 Pigs High concordance (99.74%) between phenotypic and predicted antimicrobial susceptibility was observed.\ Correlation between MLST type and resistance profiles was only observed in *S. enterica* serovar Typhimurium, where isolates belonging to sequence type (ST) 34 were more resistant than ST19 isolates. \[41\] ESBL-producing *Enterobacteriaceae* 24 Fish and environmental samples Nine of eleven sequenced fish isolates had the *bla*~CTX-M-15~ gene, whereas 12/13 from environment carried *bla*~CTX-M-15~*.*\ AMR genes encoding resistance to sulfonamides (*sul1*/*sul2*), tetracyclines \[*tet(A)/tet(B)*\], fluoroquinolones \[e.g., *aac(6′)-Ib-cr*, *qnrS1*\], aminoglycosides \[e.g., *aac(3)-lld*, *strB*, *strA*\], and trimethoprim (e.g., *dfrA14*) were detected. \[42\] *E. coli* 17 Retail chicken meat All strains carried an IncK plasmid with a *bla*~CMY-2~ gene. \[43\] *E. coli* 168 Broilers and free-range retail poultry (meat/ceca) The prevalence rates of ESBL producing *E. coli* among broiler chicken were: meat 46%; ceca 40%. Whereas, those for free range chicken were: meat 15%; ceca 30%.\ *E. coli* from broiler and free-range chicken exhibited varied prevalence rates for multi-drug resistance (meat 68%; ceca 64% and meat 8%; ceca 26%, respectively). \[44\] *E. coli* 18 Dairy cow manure All sequenced isolates carried at least one β-lactamase *bla* gene: *TEM-1*, *TEM-81*, *CTX-M115*, *CTX-M15*, *OXA-1*, or *CMY-2*.\ Several other AMR genes were detected in the sequenced isolates and all of them harbored AMR plasmids belonging to classic Inc groups. \[45\] *E. coli* 16 Swine farm *bla*~NDM-5~ and *mcr-1* were located on two different plasmids, which showed 100% nucleotide identity in all 16 strains. \[46\] *E. coli* 26 Humans, cows, pigs, horse, rabbit, goat, environments and food A total of 39 plasmids were identified.\ Eight plasmids carried resistance genes to aminoglycosides, carbapenems, penicillins, cephalosporins, chloramphenicol, dihydrofolate reductase inhibitors, sulfonamides, tetracyclines, and resistance to heavy metals.\ Two plasmids carried six of these resistance genes and two novel IncHI2 plasmids were also identified. \[47\] *E. coli* 42 Feedlot cattle 70% of the cattle strains carried at least one AMR gene \[48\] *E. coli* 3 Dairy cows The *mcr-1* gene (linked to colistin resistance) coexisted with multiple resistance genes in a plasmid (pXGE1mcr) \[49\] *E. coli*, *Salmonella* spp. 463 Retail meats and farm local samples To improve the concordance between genotypic and phenotypic data, it was proposed to reduce the phenotypic cut-off values for streptomycin to ≥32 µg mL^−1^ for both *Salmonella* and *E. coli.* \[50\] *Helicobacter pullorum* 4 Chicken meat AMR-associated SNPs were detected (linked to resistance to fluoroquinolones, macrolides, and tetracyclines). \[51\] *H. pullorum* 11 Broiler and free-range chicken WGS revealed the presence of five or six well characterized AMR genes, including those encoding a resistance-nodulation-division efflux pump \[30\] *Klebsiella pneumoniae* 7 Pig and human samples at abbatoirs AMR genes associated with resistance to β-lactams, aminoglycosides, fluoroquinolones, macrolides, lincosamide, streptogramins, rifampicin, sulfonamides, trimethoprim, phenicols, and tetracycline were identified. \[29\] *K. pneumoniae* 44 Chicken, turkey and pork meat Meat-source isolates were significantly more likely to be multidrug resistant and resistant to tetracycline and gentamicin than clinical isolates.\ Four sequence types occurred among both meat-source and clinical isolates. \[52\] *Listeria monocytogenes* 2 Ready-to-eat food Seven antibiotic and efflux pump related genes which may confer resistance against lincomycin, erythromycin, fosfomycin, quinolones, tetracycline, penicillin, and macrolides were identified in the genomes of both strains. \[53\] *L. monocytogenes* 5 Environments from pork processing plants Strains of a particular sequence type were shown to contain the BAC resistance transposon Tn*6188*, conveying resistance to quaternary ammonium compounds. \[54\] *Proteus mirabilis* 8 Food-producing animals Seven integrative and conjugative elements were identical to ICEPmiJpn1, carrying the cephalosporinase gene *bla*~CMY-2~. \[55\] Non-typhoidal *Salmonella* 536 Retail meat A total of 65 unique resistance genes, plus mutations in two structural resistance loci, were identified.\ First finding of extended-spectrum β-lactamases (ESBLs) (*bla*~CTX-M1~ and *bla*~SHV2a~) in retail meat isolates of *Salmonella* in the United States. \[56\] Non-typhoidal *Salmonella* 1738 Animal, food and human sources The Minimum Inhibitory Concentration (MIC) predictions were correlated with the ResFinder database.\ The genotypic cut-off values were established for 13 antimicrobials against *Salmonella*. \[20\] Non-typhoidal *Salmonella* 3491 Received by Public Health England's Gastrointestinal Bacteria Reference Unit from different origins for surveillance purposes Discrepancies between phenotypic and genotypic profiles for one or more antimicrobials were detected for 76 isolates (2.18%).\ Only 88/52,365 (0.17%) isolate/antimicrobial combinations were discordant.\ Pan-susceptibility to antimicrobials was observed in 2190 isolates (62.73%). \[33\] *S. enterica* 90 Dairy cattle and humans Genotypic prediction of phenotypic resistance resulted in a mean sensitivity of 97.2 and specificity of 85.2. \[57\] *S.* *enterica* serovar *Typhimurium* 984 Swine Multiple genotypic resistance determinants were predominant, including resistance against ampicillin, streptomycin, sulfonamides, and tetracyclines.\ Phenotypic resistance to enrofloxacin and ceftiofur was found in conjunction with the presence of plasmid-mediated AMR genes. \[58\] *S.* *enterica* serovar Typhimurium 1 Swine carcass The following AMR genes were identified: *tetA*, *aac3IIa*, *aadA1*, *strA*, *strB*, *bla*~TEM-1B~, *qnrE*, *sul1*, *drfA1*, and *floR*. \[59\] *S.* *enterica* serovar Heidelberg 113 Humans, abbatoir poultry and retail poultry CMY-2 plasmids, all belonging to incompatibility group I1, were identified in cefoxitin-resistant isolates.\ Analysis of IncI1 plasmid sequences revealed high identity (95% to 99%) to a previously described plasmid (pCVM29188_101) found in *S. enterica* serovar Kentucky*.* \[60\] *S.* *enterica* serovar Indiana 1 Poultry slaughterhouse 24 multi-drug resistance (MDR) genes, located on 4 plasmids, were identified, including the *mcr-1* gene (linked to colistin resistance). \[61\] *S.* *enterica* serovar Infantis 12 Humans, food-producing animals and meat Some isolates harbored a conjugative megaplasmid (\~280--320 Kb) which carried the ESBL gene *blaCTX-M-1*, and additional genes \[*tet(A)*, *sul1*, *dfrA1* and *dfrA14*\] mediating cefotaxime, tetracycline, sulfonamide, and trimethoprim resistance. \[62\] *S.* *enterica* serovar Muenster 2 Dairy farm environments The plasmid-mediated *qnrB19* gene and IncR plasmid type were identified in both isolates. \[63\] *S.* *enterica* serovar Typhimurium 225 Humans, animals, feed, and food The non-clinical use of narrow-spectrum penicillins (e.g., benzylpenicillin) might have favored the diffusion of plasmids carrying the *bla~TEM-1~* gene in *S. enterica* serotype Typhimurium in the late 1950s. \[64\] *S.* *enterica* serovar Typhimurium 4 Poultry and humans The following AMR genes were identified: *strA*, *strB*, and *aadA1* (aminoglycosides); *bla*~TEM-1B~ (β-lactams); *catA1* (phenicols); *sul1* and *sul2* (sulphonamides); *tet B* (tetracyclines); and *dfrA1* (trimethoprim)*.* \[65\] *S.* *enterica* serovar Typhimurium and *S.* *enterica* serovar Kentucky 2 Chicken carcasses A total of five plasmids conveying AMR genes were found. \[66\] *S.* *enterica* serovar Weltevreden 44 Human stool and contaminated food samples AMR genes were only identified in eight isolates, linked to resistance to tetracycline, ciprofloxacin or ampicillin. \[67\] *Staphylococcus aureus* 66 Retail meats Eleven *spa* types were represented.\ The majority of MRSA (84.8%) possessed SCC*mec* IV. \[68\] *S. aureus* 9 Pork, chicken and turkey meat Multiple resistance genes/mutations were detected.\ All livestock-associated methicillin-resistant *S. aureus* (LA-MRSA) harbored *tet(M)* (±*tet(K)* and *tet(L)*), and only seven of these additionally harbored multi-drug resistance to beta-lactams, quinolones, and macrolides. \[69\] *S. aureus* 12 Livestock animals Most isolates harbored resistance genes to ≥3 antimicrobial classes in addition to β-lactams. Heavy metal resistance genes were detected in most European *ccrC* positive isolates, with \>80% harboring *czrC*, encoding zinc and cadmium resistance. \[70\] *S. aureus* 15 Bulk milk A divergent *mec*A homologue (*mec*A~LGA251~), later named as *mec*C, was identified. \[71\] *Streptococcus thermophilus* 5 Raw milk *tet(S)* and *ermB* identified as determinants of AMR. \[72\] Carbapenem-resistant bacteria 28 Dairy cattle Isolates included: 3 *E. coli* harboring *bla*~CMY-2~ and truncated *ompF* genes; 8 *Aeromonas* harboring *bla*~cphA~-like genes; 1 *Acinetobacter baumannii* harboring a novel *bla*~OXA~ gene (*bla*~OXA-497~); and 6 *Pseudomonas* with conserved domains of various carbapenemase-producing genes. ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- [^1]: These authors contributed equally to this work.
{ "pile_set_name": "PubMed Central" }
At the core of the Bitcoin peer-to-peer network are the full network nodes that function as critical part of the Bitcoin infrastructure. These nodes are solely responsible in ensuring the transactions and blocks are trickled down the network in a timely manner. The number of these nodes and their network related metrics were largely unknown as of recently despite the existence of Bitcoin since early 2009. The lack of such data in the public domain motivated the launch of the Bitnodes Project in April 2013. The ongoing effort in the development of the project is driven by the emerging needs to gather statistical summary of the Bitcoin peer-to-peer network and supported by the Bitcoin Foundation. Every quarter, I’ll provide a report of my progress and invite you to submit suggestions for improvement as well as stories on how this has been helpful to you. Bitnodes Project 2014 Q2 Report
{ "pile_set_name": "OpenWebText2" }
Q: Chaining .apply() and .bind() surprising behaviour I need your help to better understand the following behavior. In the snippet below, we can see that fooBar outputs foo as this and then returns bar 1, 2, 3 as expected - means bar is called with foo as context. const arguments = [1,2,3]; function bar(...args) { console.log('bar this ->', this); return 'bar ' + args; } function foo(...args) { console.log('foo this ->', this); return 'foo ' + args; } const fooBar = bar.bind(foo, null)(arguments); console.log(fooBar); // <--- no surprises! Let's now have const bar = Math.max.apply; instead. const arguments = [1,2,3]; const bar = Math.max.apply; function foo(...args) { console.log('foo this ->', this); return 'foo ' + args; } const fooBar = bar.bind(foo, null)(arguments); console.log(fooBar); // <--- surprise! In this case, foo is being called as opposed to bar. Why? What is bind() exactly doing under the hood in this case? I'd have assumed that again bar should be called with foo as a context. The context, in this case, is window. I always thought someFunction.apply(someContext, args) behaves as someFunction.bind(someContext, null)(args), but in the second example someFunction.bind(someContext, null)(args) behaves as someContext(args). A: This is because of the specific purpose of apply: to call a given function. Remember that bar is the generic Function.prototype.apply function. bind essentially creates a copy of the original function, with the context (this value) and (optionally) arguments preset. A polyfill for bind would use apply internally. So fooBar = bar.bind(foo, null) is the same as function fooBar(...args) { return Function.prototype.apply.apply(foo, [null, args]); } The double use of apply is obviously confusing! Let's step through what bar.bind(foo, null)(arguments) would do: Function.prototype.apply.bind(foo, null)(arguments) which can be reduced to Function.prototype.apply.apply(foo, [null, arguments]) which in this specific instance is the same as foo(null, ...arguments); The reason this is so confusing is that you are doing a complex invocation of the apply function, which is designed for complex invocations of functions!
{ "pile_set_name": "StackExchange" }
The PRO CHIP data is security encripted and has both copyright and patent protection. It is designed to read your units serial number and can be used multiple times in that unit only. Attempts to share or copy the data will result in corruption of that data. The PRO CHIP will work in conjunction with any “chart card” such as Navionics, C-Map, or Garmin Bluecharts or G2 standard and Vision. Our data is stored internally in the units’ memory and overlays on top of any basemaps.
{ "pile_set_name": "Pile-CC" }
Thanks to all those who came to my residents meeting in Ward End last night – especially colleagues from West Midlands Police. We’ll post a full write up later but the three key local issues raised were; 1. Speeding and dangerous parking – especially folks dropping off children at school. We had a long debate about why parents drive their offspring a few hundred yards down the road 2. Drugdealing – still seen as a problem especially by the shops on St Margarets Road 3. Impact of doubling the school size; this was on the whole seen as a good thing; but there was a real worry that parking was going to get much worse We then had a long chat about Labours policy review and the things the government was doing wrong. Here’s what was top of residents issue-list; 1. Lack of jobs especially for young people 2. Prices especially petrol prices 3. Immigration 4. Human rights and influence of judges 5. Europe – too much control of decisions lost Again, we’ll write this up and make sure it’s part of our policy review work. If you couldn’t come and have a comment email me on byrnel@parliament.UK This week, I published my argument for Labour’s approach to creating a country of ‘powerful people’. I mentioned that over the last ten years, I have been much influenced by the way I thought about this, by my practical experience trying to regenerate Hodge Hill, and philosophically, by Amartya Sen. Sen’s book, An Idea of Justice, was published this summer, and a few weeks ago I interviewed Prof Sen about his work. You can access an excerpt of the interview below… Some will have seen news in the Guardian and elsewhere today about rights to new services for people with suspected cancer. For those who want more background about the government’s approach to rights, have a look at Working Together – our strategy for public service reform; World Class Public Services, where we looked at how rights can preserve equity while devolving power. My speech to the CBI sets out some more of the background argument. Yesterday, we had simply the most extraordinary turn-out for our Big Lottery Fund Awards for All masterclass at the Beaufort Sports & Social. Building a stronger network of social entreprenuers is at the absolute core of Hodge Hill 2020 – our programme for regenerating the constituency. I’ll be posting some of the information we went through and a video report next week, but in the meantime, if you are part of a group in the constituency which wants some help bidding for money, then drop me a line. Also email me if you are doing great things locally – we want to build a stronger network of community activists where everyone knows what’s going on, and how to get involved. Thanks to all who came along – and thanks to Big Lottery Fund for answering my call to come and tell us more! Lots of workers at Jaguar Land Rover live in Hodge Hill, and they’ll be worried about the plans that Jaguar Land Rover announced today. I rang the directors to discuss their plans this afternoon. Here’s what they said. Firstly, and most importantly, JLR said that they are absolutely committed to the West Midlands – and want to build ‘significant’ numbers of new cars in the region. I think the firm will need the same number of workers in the region to build all the new models, which is why JLR has said they don’t want to see compulsory redundancies. Secondly, when I asked whether government was doing everything they could, JLR said yes – and they were especially grateful for the £10 million of government aid to build new models. I agreed to lobby hard for the kind of automotive research institute that will help keep our industry at the world’s cutting edge. Long term, that’s the way we boost manufacturing jobs, not see them go abroad. The company must discuss these changes with the trade unions, and I’ll be in touch with them in due course. Below is the full text of my John Smith Annual Finance Lecture; The New Opportunity Economy. There’s a bit of a trail in the Guardian today. The argument is simple; is we make the right choices now, we can not only rebalance our economy towards investment and exports, but we can open the new jobs that it is possible to create to people from a wider range of backgrounds, tackling the issue of low pay, and redoubling efforts to get people back to work.
{ "pile_set_name": "Pile-CC" }
Snapchat hosted an extravagant New Year's Eve party for over 5,000 employees and guests at the L.A. Live complex in downtown Los Angeles on Sunday night. Drake and Diplo both performed at the event which reportedly cost at least $4 million for the venue alone. Despite building his fortune on the social media app, however, founder and CEO Evan Spiegel was determined not to let people use Snapchat at the party. So Snapchat employees avoided their own social network, and used a rival one instead: Instagram. The event was meant to be an "offline" experience where guests could live in the moment, free from the pressure to post on social media. Prior to the event guests were told time to leave their phones at home and tickets were emblazoned with the words "no photos."As guests checked into the party, those who had brought their phones were told to hand them over as staff carefully applied red and white striped tape over the camera, theoretically to prevent them from recording. Silver bracelets were strapped around guests wrists also with the words "no photos." It’s an ironic twist, given that Snapchat is all about sharing photos and video. To ensure no content was posted to Snapchat specifically, the company blocked all snaps coming from Microsoft theater and the surrounding venues where the party was being held and stripped the location from its "Snap map" feature that normally allows users to view real-time snaps by location. Once guests were inside, however, many ripped the tape off their cameras and began chronicling what attendees described as an alcohol-soaked carnival. The party sprawled across a large open courtyard flanked by bars and restaurants Snap had rented out including Katsuya, Lucky Strike, Tom's Urban, Conga Room, and Wolfgang Puck Bar & Grill. Those who dined at the latter were treated to a fixed menu of steak, salad, and cheesecake for dessert. Servers dressed in circus-like attire snaked through the party and distributed an unlimited supply of champagne and mini cupcakes. Diplo held court on top of a massive 105-foot DJ tower where giant electronic clocks ticked down to midnight. Below him attendees partied as men dressed in silver sequined tanks with disco ball helmets gyrated on the dance floor. Employees were allowed to extend up to three invites to the party and it was packed. A-list guests like Kevin Durant mingled with those in attendance. Dress code was formal but plenty of Los Angeles creatives donned sneakers, jean jackets, or brightly colored shirts. In between drinking and dancing guests were invited to play games like NFL Blitz and Beat Mania. The Drake concert began after 9 pm. Spiegel had box seats with a prime view of the stage while Snap employees and their guests crowded up front to get close to the star. The rapper delivered encouraging messages about 2018 before launching into his set. "356 days is a very long time," Drake said in between songs. Anyone who has "even a half or even a fourth of the health that you want" should be grateful. Some employees who still had their cameras taped over captured songs via video then uploaded the clips to Instagram stories. Even Drake himself couldn't resist documenting the event on Instagram. Before taking the stage he uploaded a video to Instagram Stories that panned over the party from above. As the clock approached midnight guests gathered on the outside plaza. A giant, bright Snapchat ghost was suspended from a high pole, presumably to be to dropped at midnight. While the clock ticked down 2017's final moments, hoards of guests whipped out their phones to record the moment. Midnight struck and red and white confetti poured down on the screaming crowd. One attendee who had hoisted herself on top of a man's shoulders cried out "2018! 2018!" "New Years Eve is very overrated, but this event was dope," one guest posted on Instagram shortly after midnight. Snap's New Year's Eve party was not the first time the company has attempted to host an event devoid of social media. The "no photos" policy is strictly enforced at most company gatherings. In December, Snap held a holiday party for staff at its New York City office at the Beekman hotel and went through similar measures to prevent employees from distributing content from the event. "I'm pretty sure anyone who posted from a party would be fired," one Snapchat employee said regarding the company's policy. Snapchat is also notoriously secretive about its internal affairs. "New employee orientations begin with a Fight Club-like list of forbidden topics of discussion. And internal projects blossom out of nowhere — and vanish suddenly — without explanation," Business Insider reported in 2016. While hosting a fully "offline" party in 2017/2018 can be seen as broadly in line with Snapchat's original emphasis on privacy and ephemerality, the idea seems to work much better in theory than in practice—especially for an event with thousands of attendees. The fact is, it’s nearly impossible to create a large scale social media "safe zone" in today's tech climate. Broadcast-focused social networks like Facebook and Instagram have preconditioned an entire generation to reflexively package every notable moment of their lives for public consumption, and Snapchat's New Years Eve party was no exception. Snapchat tried to stave off this urge by hiring roaming photographers to take professional pictures. The company also set up tons of photo booths where guests could pile in for printable photo strips and vintage-style polaroids to take as memories. But still, within minutes of the party's conclusion guests flooded Instagram with photos and videos from the party, many hashtagging their content #SnapchatNYE. 15 second videos from the Snapchat event dominated the public Instagram story feeds of all venues where the party took place for 24 hours after the affair. Some guests even went through the trouble of re-uploading their photos and videos to Snapchat. One well known YouTuber named Kong Pham re-uploaded his entire Instagram story to Snapchat the minute he was far enough away from the venue to do so. Overall, Snapchat employees said they had a fantastic time ringing in the new year with friends and colleagues. But despite the fact that Spiegel covered the talent fees for the event personally, some said the company spending millions footing the bill for a giant party seemed egregious in light of Snap's recent financial troubles. The company's stock price has been volatile since its IPO last spring and its valuation cratered in November after its third quarter earnings call revealed that it had missed its financial targets and user growth had slowed. The venture-backed company lost a total of $443 million in the third quarter of 2017 and has struggled to successfully monetize its user base. Snapchat also denied employees a cash bonus this year, offering stock options instead, which one employee said was like being told they could buy a lotto ticket. Nevertheless, several employees woke up on New Years Day still in a daze from Sunday night's event. "Helluva party," actress Cerina da Graca posted on Instagram. "Honestly, I'm still recovering and trying to recall the night myself," an employee said.
{ "pile_set_name": "OpenWebText2" }
List of Bengali films of 1997 A list of films produced by the Tollywood (Bengali language film industry) based in Kolkata in the year 1997. Highest-grossing Top ten movies Critically acclaimed films 1997 References External links films of 1997 at the Internet Movie Database 1997 Bengali Bengali Category:1997 in Indian cinema
{ "pile_set_name": "Wikipedia (en)" }
// Go support for Protocol Buffers - Google's data interchange format // // Copyright 2010 The Go Authors. All rights reserved. // https://github.com/golang/protobuf // // Redistribution and use in source and binary forms, with or without // modification, are permitted provided that the following conditions are // met: // // * Redistributions of source code must retain the above copyright // notice, this list of conditions and the following disclaimer. // * Redistributions in binary form must reproduce the above // copyright notice, this list of conditions and the following disclaimer // in the documentation and/or other materials provided with the // distribution. // * Neither the name of Google Inc. nor the names of its // contributors may be used to endorse or promote products derived from // this software without specific prior written permission. // // THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS // "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT // LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR // A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT // OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, // SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT // LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, // DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY // THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT // (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE // OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. syntax = "proto2"; import "extension_base/extension_base.proto"; import "extension_extra/extension_extra.proto"; package extension_user; option go_package = "github.com/golang/protobuf/protoc-gen-go/testdata/extension_user"; message UserMessage { optional string name = 1; optional string rank = 2; } // Extend with a message extend extension_base.BaseMessage { optional UserMessage user_message = 5; } // Extend with a foreign message extend extension_base.BaseMessage { optional extension_extra.ExtraMessage extra_message = 9; } // Extend with some primitive types extend extension_base.BaseMessage { optional int32 width = 6; optional int64 area = 7; } // Extend inside the scope of another type message LoudMessage { extend extension_base.BaseMessage { optional uint32 volume = 8; } extensions 100 to max; } // Extend inside the scope of another type, using a message. message LoginMessage { extend extension_base.BaseMessage { optional UserMessage user_message = 16; } } // Extend with a repeated field extend extension_base.BaseMessage { repeated Detail detail = 17; } message Detail { optional string color = 1; } // An extension of an extension message Announcement { optional string words = 1; extend LoudMessage { optional Announcement loud_ext = 100; } } // Something that can be put in a message set. message OldStyleParcel { extend extension_base.OldStyleMessage { optional OldStyleParcel message_set_extension = 2001; } required string name = 1; optional int32 height = 2; }
{ "pile_set_name": "Github" }
Hi guys, today I am showing a weight loss detox drink by which you will be able to lose 5 Kgs In 3 Days (10 lbs in 3 Days). This is a very powerful drink and will help you get rid of excess water, bloating and toxins, prevent fat absorption and reduce weight by boosting your metabolism. It's a 3-day course, and you need to follow few guidelines to get desired results. So let's get started- To make this weight loss drink, we would need castor oil. Castor oil is also known as Erandel or Arandi Oil. Castor oil is easily available at most of the pharmacies and retail stores. This oil is rich in nutrients like vitamin E, minerals, monounsaturated fatty acids and antioxidants. It also has anti-fungal, anti-inflammatory and anti-bacterial properties Castor oil is known as a powerful laxative but do you know that it also has ricinoleic acid which boosts your metabolism and works towards weight loss. Now, let's know how to make it. To make the drink, take 1 cup of warm water. Remember, water can be hot or warm but not cold. You can also make this drink with green tea or ginger tea I recently published a video on how to make ginger tea and its video link is in the description box. I also have a detailed video on green tea. So make sure to watch both the videos to make them right. Video links are in the description box. Now add 1 tbsp of castor oil and stir well. Drink it on an empty stomach for 3 consecutive days. The drink works like a cleaning detergent inside your stomach It will clean your intestines, help get rid of toxins and detox your body completely. This process also cures irregular periods, cholesterol problems, and hormonal issues. You might have to visit washroom a few times as the body would be going through a cleaning process. Few guidelines to follow, to get the best results are - Use a good quality castor oil like cold-pressed castor oil. Do drink a lot of warm water, green or black tea or green or black coffee these 3 days as it will stimulate your body to burn more fat. Avoid eating out plus don’t have refined sugar, meat, processed carbs, artificial sweeteners and full fat dairy including butter, ghee (clarified butter), full-fat milk etc. Rest of the day be on a healthy and clean diet and eat foods like fresh fruits, vegetable salad, oatmeal, soups or khichadi which is a salty porridge made with vegetables, lentils and rice all cooked together Try adding Himalayan Pink Salt instead of regular salt. Do not have chapatis, bread, etc. Use brown rice, oats, buckwheat or quinoa to make porridge. Don’t use white rice. This weight loss drink is not for pregnant and nursing mothers or someone allergic to castor oil. Castor oil has conjugated linoleic acid which causes breakdown and oxidation of fat especially stubborn belly fat. Following this process for 3 days, will slim down your belly, detox your liver and eliminate extra water weight. Do not take this cleanse for more than 3 days. People have really benefitted from this cleanse. You can learn the success comments from my English channel "Versatile Vicky" wherein I posted this video first. I’ll also try coming up with a diet using this cleanse. For now, do try this drink and share your comments. Hit like, subscribe to my channel if you still haven’t and I will see you soon with a new video till then, drink right to stay light. Bye Bye...
{ "pile_set_name": "YoutubeSubtitles" }
Mason and Oceana Railroad The Mason and Oceana Railroad (M&O) was a short () common carrier, narrow gauge logging railroad in the U.S. state of Michigan. Organized in 1887 and in operation from 1887 until 1909, it served the counties of Mason and Oceana in the northwestern quarter of Michigan's Lower Peninsula in the late 19th and early 20th centuries. History Inception The Mason and Oceana was originally built by the Butters family, at a cost of $178,000, to help exploit the old-growth timber resources of this part of Michigan. The M&O's service area, in southeastern Mason County and northern Oceana County, lacked the rivers used in other parts of Michigan to transport heavy logs to sawmills. Instead of water transport, the M&O allowed local loggers to have logs transported to the Butters & Peters Salt and Lumber Company sawmill at Buttersville, across the Pere Marquette Lake from Ludington. The settlement around the sawmill was founded by the company, hence the name The railroad was chartered as a common carrier in 1887, which meant that it operated a public passenger service. The first section of 21 miles (34 km) opened in the same year, southeast to near Crystal Valley. In the following year, the tap line was completed to a location named Stetson, 27 miles (43.5 km) from Buttersfield. This terminus was to rename itself Walkerville in 1898. Expansion The Mason and Oceana initiated expansion plans to extend its common carrier line to Hesperia in 1901, but the extension was never completed. In stages, it reached Goodrich at 32 miles (51.5 km) (not to be confused with the Goodrich, Michigan located in Genessee County). and Maple at 35 miles (61 km) where it arrived in 1903. This place was also called Maple Range. The common carrier service got no further. Contraction After the first-growth timber resources of the Mason and Oceanas service area had been exhausted, there was no longer any reason for the tiny railroad to continue in operation for its entire length. The line from Walkerville to Maple Range was abandoned in 1906, and the rest was due to be closed down in 1908. Grand Rapids and Northwestern Railroad However, that was not the end of the story. The Grand Rapids and Northwestern Railroad''' company had been incorporated in that year, 1908, to build a trunk line from Grand Rapids to a new car ferry port to compete with the well-established one run by the Pere Marquette Railway at Ludington. Car ferries would have sailed directly to Milwaukee, and the new road would have connected with the New York Central Railroad system at Grand Rapids. The new company bought out the entire stock of the Mason and Oceana (under common carrier law, the railroad company had to be legally separate from the Butters & Peters lumber company) for $300 000 in February 1908, and immediately abandoned the line from Wiley to Walkerville. It began converting and grading the route from Wiley, and 8 miles had been completed to Crystal Valley by the following year. In August 1909, a fire destroyed the lumber company sawmill and that was the end of any log-hauling operations on the truncated line. Unfortunately, the GR&N scheme then failed and the remaining rails were scavenged for scrap in 1912. Route The railroad operated on a 32-mile-long main line that ran from a point on the other side of the river estuary from Ludington. This meant that there was no connection with the wider railroad network. From Buttersville, the route ran southeast with passenger stops at Riverton, Wiley, Fern, Peachville, Crystal Valley (the station was to the east of the settlement), Lake, Walkerville, Goodrich and the railhead at Maple (also known as Maple Range, and called Beaver'' in 1909). Equipment The short line used geared Shay locomotives. See also Ludington and Northern Railway References Category:Defunct Michigan railroads Category:Narrow gauge railroads in Michigan Category:Railway companies established in 1887 Category:Railway companies disestablished in 1909 Category:3 ft gauge railways in the United States
{ "pile_set_name": "Wikipedia (en)" }
I don't feel like typing, but it's basically Clue, except it's in a FPS, has guns, and there are a lot of people dying. If you want a better tutorial, check here, and here for an even more in-depth explanation. Won't everyone just RDM each other? Well, that's what we're hoping won't happen. It probably won't, but for a worst-case scenario we have about 3 admins that will almost always be on to baby-sit the server. Are you looking for admins? Yeah, I actually am! I need admins for LATER times, for the people in the UK. I have enough admins to watch over the US play-times, but when it comes to the UK play-times, all of them will be asleep. That's why I need people to baby-sit the server while we're gone to prevent too much bad shit happening. RULES 1. NO MICSPAMMING. Communication is essential in this gamemode, so playing ANY noises over the microphone may overlap with someone screaming that they're getting shot! 2. English only! Honestly, how are we supposed to figure out that you're getting killed if you're speaking in another language? on another note, good news everyone we're installing a warning system that will ban/kick you after a certain amount of warnings, warnings will most likely go away after some time (i'm not the one installing it) but it will definitely help on a server like this one. PROTIP: avoid warnings by not being an idiot and following your common sense, and in case you don't have one Don't RDM (Don't randomly kill that guy looking suspiciously at you because you thought he was a traitor, for all you know he could just have been a rapist) Don't be a party pooper. We like parties. (OMFG WE GOTTA BE 100% SERIOUS DONT HAVE FUN OMG WHY DID U WARN ME FUKIN ADMIN ABUSE) Don't ask for admin on the server, it permanently marks you as an idiot, no kidding. If you think you're admin material, PM Dysentery(ruff ruff, or whatever you wanna call him) As said in the title, don't fucking micspam if there's mic users, we'd rather hear that guy dying than your 24 minute long rick roll edit. Well I use most of my time playing TTT. The only problem is that I can't find a server with non-abusive admins. I live in Denmark (+1GMT), therefore I can help watch the server when it's night over there by America. You shouldn't, but it can happen for reasons aside from intentional RDMing. I caused people to RDM most of the other innocents while I was traitor in other servers. Best weapon anyone can hope for in TTT is a good silver tongue. That's when it's time to find another server if the player isn't given any time to explain themselves. Server I'm a regular on has plenty of admins, and thankfully isn't afraid to take the time to talk to users before deciding a proper punishment if they're suspected of breaking the rules. Can't say it's the same for the FP server as I haven't visited it yet, but hopefully it's roughly the same in terms of user treatment.
{ "pile_set_name": "Pile-CC" }
Quantitative drug interactions prediction system (Q-DIPS): a dynamic computer-based method to assist in the choice of clinically relevant in vivo studies. Metabolic drug interactions are a major source of clinical problems, but their investigation during drug development is often incomplete and poorly specific. In vitro studies give very accurate data on the interactions of drugs with selective cytochrome P450 (CYP) isozymes, but their interpretation in the clinical context is difficult. On the other hand, the design of in vivo studies is sometimes poor (choice of prototype substrate, doses, schedule of administration, number of volunteers), with the risk of minimising the real potential for interaction. To link in vitro and in vivo studies, several authors have suggested using extrapolation techniques, based on the comparison of in vitro inhibition data with the active in vivo concentrations of the inhibitor. However, the lack of knowledge of one or several important parameters (role of metabolites, intrahepatocyte accumulation) often limits the possibility for safe and accurate predictions. In consequence, these methods are useful to complement in vitro studies and help design clinically relevant in vivo studies, but they will not totally replace in vivo investigation in the future. We have developed a computerised application, the quantitative drug interactions prediction system (Q-DIPS), to make both qualitative deductions and quantitative predictions on the basis of a database containing updated information on CYP substrates, inhibitors and inducers, as well as pharmacokinetic parameters. We also propose a global approach to drug interactions problems--'good interactions practice--to help design rational drug interaction investigations, sequentially associating in vitro studies, in vitrolin vivo extrapolation and finally well-designed in vivo clinical studies.
{ "pile_set_name": "PubMed Abstracts" }
A Syrian restaurant in Toronto that made international headlines as a template for tolerance and refugee integration announced on Tuesday that it will be permanently closing after receiving a flood of “hate messages and death threats.” In a message posted to its Instagram account, Soufi’s at 676 Queen Street W., said the decision to close was prompted by numerous threats received over the past week. “Our decision is made with a heavy heart in effort to maintain our family and staff’s safety,” the message states. “We would like to thank our lovely customers and Queen Street neighbours for their wonderful support over the past two years.” The restaurant had recently earned a national profile after a member of the owner’s family reportedly attended a protest against an event in Hamilton featuring People’s Party of Canada Leader Maxime Bernier. Several media reports say a now-deleted Facebook post indicated the owner’s son had attended last month’s demonstration, and that he regrets not stepping aside or intervening when an elderly woman was blocked from entering the event and verbally harassed. The restaurant was run by Husam and Shahnaz Al-Soufi, who immigrated to Canada in October 2015 with their three children, Alaa, Jala and Ayham. Soufi’s opened in 2017, and was profiled in the New York Times as an example of successful integration of Syrian refugees. “We were inspired to open up Soufi’s by our love for our Syrian culture, music, and delicious home-made food,” the family wrote on its website. The Soufi family released a second statement on Tuesday, saying: “We know this hate does not reflect the people of Toronto. The people of Toronto are loving, welcoming people. We have heard from countless community members and organizations who have restored our faith in the city.” The statement also included some of the hateful messages they were receiving. (WARNING SOME OF THE COMMENTS CONTAIN PROFANE LANGUAGE AND THREATS OF VIOLENCE) Soufis family statement by CityNewsToronto on Scribd CityNews profiled the restaurant in January, 2018. At the time, general manager Jala Al-Soufi, said the restaurant gave Syrian refugees in Toronto a comforting taste of home, not to mention job opportunities. “A lot of Syrian refugees have immigrated here in the past few years so we wanted to be able to offer them a piece of home,” she said. “My father insisted on employing mostly Syrian newcomers to be able to create job opportunities for them and also we understand how difficult it is to move here with limitations in language and experience.” Prime Minister Justin Trudeau weighed in on the closure late Tuesday night tweeting: “Hatred and threats of violence have no place in Canada. We are always stronger together than when we’re divided.” Toronto police say a member of the restaurant’s staff had previously reached out about filing a criminal complaint, but no such report was ever completed. Toronto police Const. Rob Reid said the force received a call from a member of the family on Oct. 2, and the person indicated he wished to file a formal report about hate speech and threats. Reid said no one was at the restaurant when officers attended the scene, and they have not been able to reconnect since. “We’d really like him to call back so we can … make this report,” Reid said. “When these things live in the dark, we can’t shine any light on them.” Const. Victor Kwong said Wednesday that investigators were meeting with the family to gather details and likely launch a probe into the situation. With files from The Canadian Press
{ "pile_set_name": "OpenWebText2" }
Should I invest in property or shares? Property and shares continue to be the two most popular investment options for Australians, but each have their own advantages and disadvantages, particularly for those living abroad. The age-old debate of property versus shares has been around since the first stock exchange opened. Whether you are living in Australia or overseas, there are valid points on either side and I want to address the pros and cons of each asset class for Australian expats. The first cab off the rank is property. Australians have a big love affair with property and it has been part of the Australian psyche since the quarter acre block was first developed. Things have changed a lot since then, the block sizes are certainly getting smaller, but most importantly the respective tax laws and how they affect Australian expats, have changed. Pros of owning property as an Australian expat Advertisement Advertisement • Leverage – You can put down a deposit and borrow the remaining money from the bank and get a leveraged return on your money. What this means is that if the property increases in value, you not only make money on your initial deposit but also on the money you borrowed from the bank. • Bricks and mortar – A lot of property investors love the fact that they have a physical attachment to their investment. They can drive by and see the property, which gives them a certain satisfaction. • Ignorance - People often find it confusing when I explain this is a benefit of owning property. You don’t have a ticker tape on the front of the house telling you what the property is worth on any particular day. You only know what the price of the property is worth when you buy it and when you sell it. Some people like not worrying about the daily fluctuations of the market price of their house. There are a number of cons of owning Australian property as an Aussie expat and this list has increased over the last couple of years with the changes to the tax laws. Cons of owning property as an Australian expat • Potential of high capital gains tax – The Australia government changed the tax rules back on 8 May 2012. Prior to that, Australian residents and expats could receive a 50 per cent capital gains discount on property if they sold it after holding the property for 12 months or longer. Since the change in 2012, Australian citizens who are classified as a non-resident for tax purposes are no longer able to invest in Australian property and receive the 50 per cent CGT discount. What this means is that you will be accruing 100 per cent capital gains tax for the time that you are a non-resident should the property increase in value in that period. What confuses many people is that even if you return to Australia after buying the property as a non-resident, any potential gains are calculated pro rata. What this means is that if you held an investment property for 10 years, five as a non-resident for tax purposes and five as a resident, and sold the property you would still be liable for 100 per cent capital gains tax on the amount the property accrued by during your five years as a non-resident. • Management – Time and again, clients complain to us about trying to manage their property while they are overseas. Whether they are having problems with agents or residents, there is always something that causes them concern and stress. • Leverage – If you were to buy an investment property in a heated market and borrowed money from the bank to fund the purchase, you are also exposing yourself to leverage on the downside if the property value were to fall. You are not just exposed to your initial investment, you’re also exposed to the value of the loan on the property. As an example, if you invested A$50,000 in a property as a deposit and borrowed A$450,000 and the property value fell by 20 per cent, not only have you lost your $50,000 but you also owe the bank an extra A$50,000. Shares are becoming a more appealing investment vehicle for Australian expats and this is not only due to the different way it is taxed in Australia, but also the rapid increase in digital technology that enables you to manage and monitor your investment portfolio. Pros of owning shares as an Australian expat • Don’t accrue capital gains tax (CGT) – Australian shares are not treated as Australian taxable property and as such do not accrue capital gains tax with the ATO while you are classified as a non-resident for tax purposes. What that means is if you bought a ANZ or BHP share the day after you left Australia and you sold it before you returned to Australia you do not have to pay any capital gains tax if they increased in value to the ATO. • Franking credits – The second benefit is the ability to use franking credits to offset any withholding tax that may accrue on the dividends. When listed shares pay company tax to the ATO, they may accrue franking credits on the dividend which means that they have a 30 per cent tax credit attaching to the payment. Depending on the country you are a resident of, you may be liable to pay withholding tax (WHT) on the income at a rate of either 15 per cent or 30 per cent. The exact rate of WHT is determined by whether the country you are domiciled in has a double taxation agreement (DTA) with Australia. The franking credit that attaches to the dividend can offset against the WHT, which in turn may totally remove any taxation on the dividend amount. • Liquidity – The third benefit of owning shares as an expat is liquidity. When you own property, you cannot sell a balcony if you need an extra $20,000. However, with shares, as long as the stock market is open and the shares are trading, you can sell off as much as you need. Liquidity is a key aspect of expat lives and we are constantly working with clients to manage funding gaps, whether it is for business or personal reasons. There are also several cons of owning Australian shares as an expat which can include but is not limited to the following list. Cons of owning shares as an Australian expat • Volatility – the nature of a share portfolio means you can check at any time of the day and see what the share price is. Some clients like this transparency, but others may not be able to stomach the machinations of the prices moving up or down. • Knowledge – For a lot of investors, the reason they pick property is because they understand and maybe have previously bought and sold it. The share market can be a foreign environment to some and if you are not working with an adviser to guide you, it can seem like a lot of information to take in. The good news is that this can be alleviated by educating yourself and increasing your knowledge. • Diversification – If your share portfolio isn’t properly diversified and you have a high exposure to a particular company or sector, that exposure may expose the portfolio to excessive volatility if they were to experiences problems. For example, if one of your investment choices is to invest heavily in a sector such as energy, the value of your investment, and in turn your portfolio, might change significantly should the price of oil fluctuate wildly. The above pros and cons are not an exhaustive list of both assets classes. However, they give you a broad understanding the keys areas you need to consider when looking to invest in Australia as an expat.
{ "pile_set_name": "Pile-CC" }
I'm sure it is a misunderstanding. I think the question that is yet to be resolved is "On whose part?" Because I'm not so sure that this can be blamed on someone who was "new to the job". Judging from what I found on their own web site, she was merely handing out the company line. Hostess Brands, a maker of snack foods for 80+ years, is calling it quits. It seems that 2 trips through Chapter 11, intransigent labor unions and I suspect a certain amount of shrugging came together and led the privately held company to begin shutting down operations and selling off the bits. Wednesday, November 14, 2012 It seems that the Wounded Warrior Project still isn't getting it. Lifting a page from the Zumbo Affair, they have issued an official unapology. Lifted in it's entirety from their Facebook page: We've had a lot of questions recently that started when we declined an opportunity to appear on Gun Talk Radio. We want to clarify and help answer some questions. We have seen through this process that the language on our website and our response to the invitation to appear on the show weren’t clear, and we are working on clarifying our approach. There is now much inaccurate information about WWP being anti-gun rights, an issue as an apolitical organization we do not take a stance on. We understand and appreciate that many of our Alumni are gun owners, and we facilitate multiple hunting and outdoor opportunities for our Wounded Warriors throughout the year. In the past, we made our logo available to appear on wide variety of products, including guns. As an organization, we owe it to our donors and constituents to maximize the return on investment of our dollars and brand. We are always looking at our business practices and whether we should continue with them in the future. In the case of cobranding, we've decided that we're not going to offer our logo to appear on weapons anymore - whether they're guns, knives, bows, swords, or any other type of weapon. There are still a few of the guns around for sale that had licensed our logo years ago, but there aren't any new ones being made. This is purely a business decision based on a review of a return on investment, especially when compared with other types of cobranding ventures. Regarding the question of donations and events, we do permit fundraisers that are shooting- and gun-related, such as gun raffles, shooting competitions, etc., and we're incredibly appreciative of those who are willing to give their time to host or participate in an event. Likewise, we gratefully accept donations from companies and individuals connected with the gun industry. As indicated above, we know that hunting and shooting sporting events can be very therapeutic for many of the Wounded Warriors we serve, and we're happy to work with the community to make these types of events available to our Alumni. Hunting and shooting sport enthusiasts are an incredibly supportive and generous community, and we've been honored by how often folks have opened their land and homes, and volunteered their time to make these types of events possible for our Alumni. We're so sorry if it seemed that we didn't appreciate that support with our confusing communication of a business decision. It certainly wasn't our intention! I hope this post provides some clarity and helps answer some questions. We welcome the opportunity to have a warrior on Gun Talk Radio to discuss how hunting or events of the like have supported their recovery. We responded too quickly to his request and should have delved a bit deeper. Clarity? Oh yes, it provides me some clarity. Now I'm 100% clear that you people are a bunch of tone-deaf fools. Good luck. The pressure is going to be building, and I plan on helping it build just as much as I can. I had something whiz across my Facebook page this weekend--someone had heard on Tom Gresham's radio program GunTalk that the Wounded Warrior Project (no link, you'll see why in a bit) had refused to participate in an event where guns were present. I figured that someone had misunderstood, and not seeing the gun portion of the blogosphere blow up I figured that was it. Listening to the podcast of the show this morning, I heard the portion of the show concerning this. Sure enough, the Wounded Warrior Project had turned down an opportunity to appear at a HAVA event because, o-o-oh ick, guns were present. Being an advocate for doing my own homework, I decided to do so. I found these two things on the Wounded Warrior web site: If you're on Facebook (may work if you're not; I'm not sure), here's Gresham's side of the story. Short version is that he got in touch with PR drone Leslie A. Coleman, asked if this was their actual policy and had it confirmed. Our position regarding firearms and alcohol is in response to the struggles that many injured service members face with substance abuse and suicide and the roles those items often play in those issues. WTF? This is the same sort of BS that we're fed when the gungrabbers have another try at our rights--blame the item used, not the user. What we have here appears to be yet another organization that believes that Lord of the Rings was a documentary, not a work of fiction. I'm way past tired of that crap. It's also an organization that has gotten the last donation they'll be getting from me. I'll find someone else doing similar work--someone who is at least not hostile to my civil rights--to donate to. You folks do what you think is right. Sunday, November 11, 2012 On the preparedness front, there is a lot of information out there. Some of it is inaccurate, and relying on it could cause you some serious problems. A fairly well know survival podcast has one particular person that is their "go to guy" for all things energy. Most of the time, he has his stuff together, and I've learned a lot from listening to him. But lately, I've heard him say something--twice--that I was pretty sure was wrong, based on things I've heard from folks in the industry in question. So I've done a quick check on the subject, just to confirm what I thought I knew. Here's the background and the results. This person advocated natural gas as a big part of your preparedness posture. Not LPG or propane, but natural gas as in you have a gas meter at your house, the furnace and stove are attached to it and so on. He says that in the event of a serious, long-term emergency, the natural gas distribution system almost runs itself and could stay up for months to years. Pressure is supplied naturally from the wells, and if no one is digging, pipelines are very reliable. You could still cook, and if you have a generator hooked up, you could power it with natural gas and have electricity as well. With a big enough generator you could even keep your central heat in the winter and AC in the summer. Beats candles, cutting wood and sweating in the heat, let me tell you! Um, nazzo fast, Guido. According to the American Gas Association, it doesn't work quite that way. Starting in the production fields, compressors are needed to pressurize the lines. Transmission lines need to be pressurized so that the gas keeps moving. While many of these systems are automated, they are centrally controlled--by people, via electronic control systems. As it gets closer to your home, pressure and flow rates are monitored to ensure that things keep moving (and I assume, nothing blows up), again by people using electronic control systems. Much of this infrastructure is powered by the natural gas in the lines themselves, but even automated systems break down. I suppose it's possible for much of the system to function on its own for a while, perhaps even a few months, as long as the electronic control systems work. But telling people that they will have near limitless energy available in a long-term grid-down situation is not accurate information, in my opinion. Heck, I wouldn't trust that systems for weeks--what happens if the power in the monitoring stations goes out? I do believe that natural gas could be a useful strategy. In the event of an emergency, even a regional one, natural gas will probably keep flowing. Can you imagine how much easier your life would be in something like a hurricane event if you still had large quantities of reliable power? You wouldn't be freezing in the dark in a nor' easter in the Rockaways, that's a fact. But if I were worried about a months-to-years type event, I'd be sure to have a propane pig, rejetting kits and other sources of power and heat at hand, just in case. Double check, triple check, quadruple and quintuple check not only your supplies, but your information. Because the last place you want to get let down by either is when something has hit the fan and became airborne. (And yes, I've confirmed this information on how the natural gas distribution system works frommultiplesources. )
{ "pile_set_name": "Pile-CC" }
“People think of insulin and diabetes, but many metabolic syndromes are associated with some types of cognitive defects and behavioral disorders, like depression or dementia,” said Yun Zhang, whose new research demonstrates how the signaling pathway of insulin and insulinlike peptides plays a critical role in helping to regulate learning and memory. Credit: Rose Lincoln/Harvard Staff Photographer Though it's most often associated with disorders like diabetes, Harvard researchers have shown how the signaling pathway of insulin and insulin-like peptides plays another critical role in the body – helping to regulate learning and memory. In addition to showing that the insulin-like peptides play a critical role in regulating the activity of neurons involved in learning and memory, a team of researchers led by Yun Zhang, Associate Professor of Organismic and Evolutionary Biology, show that the interaction between the molecules can fine-tune how, or even if, learning takes place. Their work is described in a February 6 paper in Neuron. "People think of insulin and diabetes, but many metabolic syndromes are associated with some types of cognitive defects and behavioral disorders, like depression or dementia," Zhang said. "That suggests that insulin and insulin-like peptides may play an important role in neural function, but it's been very difficult to nail down the underlying mechanism, because these peptides do not have to function through synapses that connect different neurons in the brain" To get at that mechanism, Zhang and colleagues turned to an organism whose genome and nervous system are well described and highly accessible by genetics – C. elegans. Using genetic tools, researchers altered the small, transparent worms by removing their ability to create individual insulin-like compounds. These new "mutant" worms were then tested to see whether they would learn to avoid eating a particular type of bacteria that is known to infect the worms. Tests showed that while some worms did learn to steer clear of the bacteria, others didn't – suggesting that removing a specific insulin-like compound halted the worms' ability to learn. Researchers were surprised to find, however, that it wasn't just removing the molecules that could make the animals lose the ability to learn – some peptide was found to inhibit learning. "We hadn't predicted that we would find both positive and negative regulators from these peptides," Zhang said. "Why does the animal need this bidirectional regulation of learning? One possibility is that learning depends on context. There are certain things you want to learn – for example, the worms in these experiments wanted to learn that they shouldn't eat this type of infectious bacteria. That's a positive regulation of the learning. But if they needed to eat, even if it is a bad food, to survive, they would need a way to suppress this type of learning." Even more surprising for Zhang and her colleagues was evidence that the various insulin-like molecules could regulate each other. "Many animals, including the humans, have multiple insulin-like molecules and it appears that these molecules can act like a network," she said. "Each of them may play a slightly different role in the nervous system, and they function together to coordinate the signaling related to learning and memory. By changing the way the molecules interact, the brain can fine tune learning in a host of different ways." Going forward, Zhang said she hopes to characterize more of the insulin-like peptides as a way of better understanding how the various molecules interact, and how they act on the neural circuits for learning and memory. Understanding how such pathways work could one day help in the development of treatment for a host of cognitive disorders, including dementia. "The signaling pathways for insulin and insulin-like peptides are highly conserved in mammals, including the humans," Zhang said. "There is even some preliminary evidence that insulin treatment, in some cases, can improve cognitive function. That's one reason we believe that if we understand this mechanism, it will help us better understand how insulin pathways are working in the human brain." Explore further New evidence links Alzheimer's disease and diabetes
{ "pile_set_name": "OpenWebText2" }
By Staff A Saudi man has found a solid object that he believes to be a meteor that fell near his house and broke into several pieces. Mashari Al Subai said the object’s fall had created a small pit in the ground behind his house in the western Saudi town of Raniya before it fragmented into small and medium-sized parts. He said the large piece he found has a semi-transparent hazel colour, adding that the colour changed abruptly when the object was heated. “I conducted a small test on the object. After I heated it for five minutes, its colour changed to golden yellow before it regained its original colour gradually,” he said, as quoted by the Saudi Arabic language daily ‘Sabq’. He said he had sent a piece of the object to the Saudi Ministry of Oil and Mineral Resources for testing and identifying. Sabq did not specify the size of the object. Follow Emirates 24|7 on Google News.
{ "pile_set_name": "OpenWebText2" }
Q: Cannot infer instance using evaluator I've started to work through http://www.cs.nott.ac.uk/~pszgmh/monads for a intro on functional programming course. What better way to try and understand stuff than to actually try and test the code. Alas, on the second page I encounter the following: data Expr = Val Int | Div Expr Expr eval :: Expr -> Int eval (Val n) = n eval (Div x y) = eval x `div` eval y Which produces an error when I try to run it. I'm not quite sure why this happens. When I try eval (Val 4) `div` eval (Val 2) in the repl-loop, it works just fine, but eval 4 `div` eval 2 Ends in a type inference error. When I update my definition to the following: data Expr = Val Int | Div Expr Expr eval :: Expr -> Int eval (Val n) = n eval (Div x y) = eval (Val x) `div` eval (Val y) I get a type error in definition. What is wrong with the first definition? The course uses Hugs by the way. A: What eval expects is an argument of a type that eval is defined for. Looking at the signature, it requires an argument of type Expr, either a Val or a Div. eval 4 means that you're passing an Int to the function. For that to work, eval would have to be defined as: eval :: Int -> Int By writing (Val 4), you are invoking one of the data constructors of Expr type, creating a new value of type Expr, which you can pass to eval and make the compiler happy.
{ "pile_set_name": "StackExchange" }
Eyestraps - Stainless steel eyestraps (commonly referred to as fairleads, pad eyes or saddles) are designed to be used as a light-duty mounting base for blocks, serve as a lash down point or used as a line fairlead to lead your control lines in the direction needed. Note - Eyestraps are listed by Inside Height x Fastener Hole Spacing. Fairleads - Nylon fairleads (commonly referred to as bulls-eye fairleads) are a simple and economical means of containing, deflecting or correcting the lead angle of control lines. Available in an open base configuration or stainless steel lined for greater abrasion resistance.
{ "pile_set_name": "Pile-CC" }
/** * Copyright 2015 Ram Sriharsha * * Licensed under the Apache License, Version 2.0 (the "License"); * you may not use this file except in compliance with the License. * You may obtain a copy of the License at * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, software * distributed under the License is distributed on an "AS IS" BASIS, * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. * See the License for the specific language governing permissions and * limitations under the License. */ package magellan import com.fasterxml.jackson.databind.ObjectMapper import org.apache.spark.sql.types._ import org.scalatest.FunSuite class PointSuite extends FunSuite with TestSparkContext { test("bounding box") { val point = Point(1.0, 1.0) val BoundingBox(xmin, ymin, xmax, ymax) = point.boundingBox assert(xmin === 1.0) assert(ymin === 1.0) assert(xmax === 1.0) assert(ymax === 1.0) } test("serialization") { val point = Point(1.0, 1.0) val pointUDT = new PointUDT val BoundingBox(xmin, ymin, xmax, ymax) = point.boundingBox val row = pointUDT.serialize(point) assert(row.getInt(0) === point.getType()) assert(row.getDouble(1) === xmin) assert(row.getDouble(2) === ymin) assert(row.getDouble(3) === xmax) assert(row.getDouble(4) === ymax) val serializedPoint = pointUDT.deserialize(row) assert(point.equals(serializedPoint)) } test("point udf") { val sqlContext = this.sqlContext import sqlContext.implicits._ val points = sc.parallelize(Seq((-1.0, -1.0), (-1.0, 1.0), (1.0, -1.0))).toDF("x", "y") import org.apache.spark.sql.functions.udf val toPointUDF = udf{(x:Double,y:Double) => Point(x,y) } val point = points.withColumn("point", toPointUDF('x, 'y)) .select('point) .first()(0) .asInstanceOf[Point] assert(point.getX() === -1.0) assert(point.getY() === -1.0) } test("jackson serialization") { val s = new ObjectMapper().writeValueAsString(Point(1.0, 1.0)) assert(s.contains("boundingBox")) assert(s.contains("x")) assert(s.contains("y")) } test("within circle") { assert(Point(0.0, 0.0) withinCircle (Point(0.5, 0.5), 0.75)) assert(!(Point(0.0, 0.0) withinCircle (Point(0.5, 0.5), 0.5))) } test("buffer point") { val polygon = Point(0.0, 1.0).buffer(0.5) assert(polygon.getNumRings() === 1) // check that [0.0, 0.75] is within this polygon assert(polygon.contains(Point(0.0, 0.75))) // check that [0.4, 1.0] is within this polygon assert(polygon.contains(Point(0.4, 1.0))) // check that [0.6, 1.0] is outside this polygon assert(!polygon.contains(Point(0.6, 1.0))) } }
{ "pile_set_name": "Github" }
Work Here Voicebox brings a fun and progressive philosophy to the service industry. We look for energetic, personable, and motivated individuals to join our teams. Our values focus on providing excellent service to our guests, a focus on doing the right thing in all moments, and seeking a state of flow and grace in our action. If that resonates with you, we would love to meet you. We offer fun and sustainable careers with reasonable hours, amazing benefits, and competitive compensation. At Voicebox you will have a variety of opportunities to develop new skills and advance your career. At the end of the day, our mission is simple: create an extraordinary experience for our guests and become their first choice to gather and celebrate.
{ "pile_set_name": "Pile-CC" }
1. Field The present disclosure relates to a charger that charges a battery, and in particular, relates to a charger that charges a battery of a vehicle that runs with a motor as a power source. 2. Related Art Examples of this kind of vehicle include an electric vehicle and a hybrid vehicle. A battery of a high voltage dangerous to a human body is mounted as a power supply of a motor in this kind of vehicle, and a vehicle-mounted charger for charging the vehicle-mounted battery also uses high voltage, because of which sufficient consideration needs to be given to safety. ISO26262, officially published in 2011, is included as one automotive functional safety standard (see, for example, www.jari.or.jp/tabid/112/Default.aspx). An object of ISO26262 is to control risk to the extent that it is acceptable. Providing a function that forcibly stops all functions of the vehicle-mounted charger when a fault is detected is specified in ISO26262. This kind of vehicle-mounted charger commonly has such a configuration that an AC/DC converter and a DC/DC converter are connected in series, and it is conceivable that a function that forcibly stops both the AC/DC converter and the DC/DC converter when a fault occurs is provided in the charger.
{ "pile_set_name": "USPTO Backgrounds" }
Modeling the epidermal growth factor -- epidermal growth factor receptor l2 domain interaction: implications for the ligand binding process. Signaling from the epidermal growth factor (EGF) receptor is triggered by the binding of ligands such as EGF or transforming growth factor alpha (TGF-alpha) and subsequent receptor dimerization. An understanding of these processes has been hindered by the lack of structural information about the ligand-bound, dimerized EGF receptor. Using an NMR-derived structure of EGF and a homology model of the major ligand binding domain of the EGF receptor and experimental data, we modeled the binding of EGF to this EGF receptor fragment. In this low resolution model of the complex, EGF sits across the second face of the EGF receptor L2 domain and EGF residues 10-16, 36-37, 40-47 bind to this face. The structural model is largely consistent with previously published NMR data describing the residues of TGF-alpha which interact strongly with the EGF receptor. Other EGF residues implicated in receptor binding are accounted by our proposal that the ligand binding is a two-step process with the EGF binding to at least one other site of the receptor. This three-dimensional model is expected to be useful in the design of ligand-based antagonists of the receptor.
{ "pile_set_name": "PubMed Abstracts" }
By Conall Ó Fátharta A previously unknown trial of lactose and baby formula was carried out using infants in Bessborough Mother and Baby Home by Glaxo Laboratories in the mid-1970s. This is now the sixth confirmed clinical trial using children in care in Ireland by a predecessor company of pharmaceutical giant GlaxoSmithKline (GSK). It has previously stated that only four trials — of various vaccines — were carried out in Ireland in the 1960s and ’70s. These trials were carried out by the Wellcome Foundation. However, in 2014, the Irish Examiner revealed a fifth trial was carried out — this time by Glaxo Laboratories — involving more than 30 children in the 1960s. It has now emerged that this same company was also testing lactose and powdered milk formulas on children in the Bessborough Mother and Baby Home in Cork in 1974. The trial only came to light after the material was found in the file of Breda Bonass, who had sought her records from Tusla under Freedom of Information. GSK said it had “been unable to locate any records relating to a 1974 study”. “A search did find very limited documentation relating to a trial from 1967 — the assumption, therefore, would be that the 1974 study’s purpose was to compare current milk powder with a newer formulation,” said a GSK statement. “The records contain no names or information about the children involved.” GSK said it did not know why Ireland was chosen as a location for the trial but that the 1967 trial was carried out in the UK, Kenya, Argentina, Malaysia, “and probably more”. In a statement, the Sisters of the Sacred Hearts of Jesus said it had “no information on any such trials”.
{ "pile_set_name": "OpenWebText2" }
--- author: - | Jon A. Bailey, Sunkyu Lee,\ Lattice Gauge Theory Research Center, CTP, and FPRD,\ Department of Physics and Astronomy,\ Seoul National University, Seoul 08826, South Korea\ E-mail: - | Yong-Chull Jang\ Physics Department, Brookhaven National Laboratory, Upton, NY11973, USA - | Jaehoon Leem\ School of Physics, Korea Institute for Advanced Study (KIAS), Seoul 02455, South Korea - | Sungwoo Park\ Los Alamos National Laboratory, Theoretical Division T-2, Los Alamos, NM87545, USA - SWME Collaboration bibliography: - 'refs.bib' title: '2018 Update on $\epsK$ with lattice QCD inputs' --- Introduction ============ This paper is a brief summary of our previous paper [@Bailey:2018feb]. This paper is also an update of our previous papers [@Jang:2017ieg; @Bailey:2015tba; @Bailey:2015frw]. Input parameters: $\Vcb$ and $\xi_0$ {#sec:Vcb} ==================================== In Table \[tab:Vcb\], we present updated results for both exclusive $\Vcb$ and inclusive $\Vcb$. Recently, HFLAV reported them in Ref. [@Amhis:2016xyh]. The results for exclusive $\Vcb$ are obtained using lattice QCD results for the semileptonic form factors of Refs. [@Bailey2014:PhysRevD.89.114504; @Lattice:2015rga; @Detmold:2015aaa]. Here, we use the combined results (ex-combined) for exclusive $\Vcb$ and the results of the $1S$ scheme for inclusive $\Vcb$ to evaluate $\epsK$. For more details on $\Vcb$ and the related caveats, refer to Ref. [@Bailey:2018feb]. The absorptive part of long distance effects on $\epsK$ is parametrized into $\xi_0$. $$\begin{aligned} \xi_0 &= \frac{\Im A_0}{\Re A_0}, \qquad \xi_2 = \frac{\Im A_2}{\Re A_2}, \qquad \Re \left(\frac{\eps'}{\eps} \right) = \frac{\omega}{\sqrt{2} |\eps_K|} (\xi_2 - \xi_0) \,. \label{eq:e'/e:xi0}\end{aligned}$$ There are two independent methods to determine $\xi_0$ in lattice QCD: one is the indirect method and the other is the direct method. In the indirect method, one can determine $\xi_0$ using Eq.  with lattice QCD input $\xi_2$ and with experimental results for $\eps'/\eps$, $\epsK$, and $\omega$. In the direct method, one can determine $\xi_0$ directly using lattice QCD results for $\Im A_0$ combined with experimental results for $\Re A_0$. In Table \[tab:xi0+d0\](), we summarize results for $\xi_0$ calculated by RBC-UKQCD using the indirect and direct methods. Here, we use the results of the indirect method for $\xi_0$ to evaluate $\epsK$. In Ref. [@Bai:2015nea], RBC-UKQCD also reported the S-wave scattering phase shift for the $I=0$ channel: $\delta_0 = 23.8(49)(12)$, which is different from those of the dispersion relations [@Colangelo:2001df; @GarciaMartin:2011cn] by $\approx 3 \sigma$. In Ref. [@Wang:2018Latt], they have accumulated higher statistics to obtain $\delta_0 = 19.1(25)(12)$, which is about $5\sigma$ different from those of the dispersion analyses. They introduce a $\sigma$ operator and make all possible combinations with the $\sigma$ and $\pi-\pi$ operators. Then, RBC-UKQCD has obtained $\delta_0 = 32.8(12)(30)$ which is consistent with those of the dispersion relations. These results are presented in Table \[tab:xi0+d0\]() and Figure \[tab:xi0+d0\](). Input parameters: Wolfenstein parameters, $\BK$, $\xi_\text{LD}$, and others ============================================================================ In Table \[tab:input-WP-eta\](), we summarize the Wolfenstein parameters on the market. The CKMfitter and UTfit collaboration provide the Wolfenstein parameters determined by the global unitarity triangle (UT) fit. Unfortunately, $\epsK$, $\BK$, and $\Vcb$ are used as inputs to the global UT fit, which leads to unwanted correlation with $\epsK$. We want to avoid this correlation, and so take another input set from the angle-only fit (AOF) suggested in Ref. [@Bevan2013:npps241.89]. The AOF does not use $\epsK$, $\BK$, and $\Vcb$ as input to determine the UT apex $(\bar{\rho}, \bar{\eta})$. Here the $\lambda$ parameter is determined from $\Vus$ which is obtained from the $K_{\ell 2}$ and $K_{\ell 3}$ decays using lattice QCD results for the form factors and decay constants. The $A$ parameter is determined from $\Vcb$. In the FLAG review [@Aoki:2016frl], they present lattice QCD results for $\BK$ with $N_f=2$, $N_f=2+1$, and $N_f= 2+1+1$. Here, we use the results for $\BK$ with $N_f=2+1$, which is obtained by taking a global average over the four data points from BMW 11 [@Durr:2011ap], Laiho 11 [@Laiho:2011np], RBC-UKQCD 14 [@Blum:2014tka], and SWME 15 [@Jang:2015sla]. In Table \[tab:input-BK-other\](), we present the FLAG 17 result for $\BK$ with $N_f = 2+1$, which is used to evaluate $\epsK$. The dispersive long distance (LD) effect is defined as $$\begin{aligned} \xi_\text{LD} &= \frac{m^\prime_\text{LD}}{\sqrt{2} \Delta M_K} \,, \qquad m^\prime_\text{LD} = -\Im \left[ \mathcal{P}\sum_{C} \frac{\mate{\wbar{K}^0}{H_\text{w}}{C} \mate{C}{H_\text{w}}{K^0}} {m_{K^0}-E_{C}} \right] \label{eq:xi-LD}\end{aligned}$$ If the CPT invariance is well respected, the overall contribution of the $\xi_\text{LD}$ to $\epsK$ is about $\pm 2\%$. Lattice QCD tools to calculate $\xi_\text{LD}$ are well established in Refs. [@Christ2012:PhysRevD.88.014508; @Bai:2014cva; @Christ:2015pwa]. In addition, there have been a number of attempts to calculate $\xi_\text{LD}$ on the lattice [@Christ:2015phf; @Bai:2016gzv]. In them, RBC-UKQCD used a pion mass of 329 MeV and a kaon mass of 591 MeV, and so the energy of the 2 pion and 3 pion states are heavier than the kaon mass. Hence, the sign of the denominator in Eq. \[eq:xi-LD\] is opposite to that of the physical contribution. Therefore, this work belongs to the category of exploratory study rather than to that of precision measurement. In Ref. [@Buras2010:PhysLettB.688.309], they use chiral perturbation theory to estimate the size of $\xi_\text{LD}$ and claim that $$\begin{aligned} \xi_\text{LD} &= -0.4(3) \times \frac{\xi_0}{ \sqrt{2} } \label{eq:xiLD:bgi}\end{aligned}$$ where we use the indirect results for $\xi_0$ and its error. Here, we call this method the BGI estimate for $\xi_\text{LD}$. In Refs. [@Christ2012:PhysRevD.88.014508; @Christ:2014qwa], RBC-UKQCD provides another estimate for $\xi_\text{LD}$: $$\begin{aligned} \xi_\text{LD} &= (0 \pm 1.6)\%. \label{eq:xiLD:rbc}\end{aligned}$$ Here, we call this method the RBC-UKQCD estimate for $\xi_\text{LD}$. In Table \[tab:input-WP-eta\](), we present higher order QCD corrections: $\eta_{ij}$ with $i,j = t,c$. In Table \[tab:input-BK-other\](), we present other input parameters needed to evaluate $\epsK$. Since Lattice 2017, three parameters: $m_t(m_t)$, $m_{K^{0}}$, $F_K$ have been updated. The $m_t(m_t)$ parameter is the scale-invariant (SI) top quark mass renormalized in the $\MSb$ scheme. The pole mass of top quarks comes from Ref. [@Patrignani:2016xqp]: $ M_t = 173.5 \pm 1.1 \GeV$. We convert the top quark pole mass into the SI top quark mass using the four-loop perturbation formula. For more details, refer to Ref. [@Bailey:2018feb]. Results for $\epsK$ =================== In Fig. \[fig:epsK:cmp:rbc\], we present results for $|\epsK|$ evaluated directly from the standard model (SM) with lattice QCD inputs given in the previous sections. In Fig. \[fig:epsK:cmp:rbc\](), the blue curve represents the theoretical evaluation of $|\epsK|$ using the FLAG-2017 $\BK$, AOF for Wolfenstein parameters, and exclusive $\Vcb$, and the RBC-UKQCD estimate for $\xi_\text{LD}$. The red curve in Fig. \[fig:epsK:cmp:rbc\] represents the experimental value of $|\epsK|$. In Fig. \[fig:epsK:cmp:rbc\](), the blue curve represents the same as in Fig. \[fig:epsK:cmp:rbc\]() except for using the inclusive $\Vcb$. Our results for $|\epsK|$ are summarized in Table \[tab:epsK\]. Here, the superscript ${}^\text{SM}$ means that it is obtained directly from the standard model, the subscript ${}_\text{excl}$ (${}_\text{incl}$) means that it is obtained using exclusive (inclusive) $\Vcb$, and the superscript ${}^\text{Exp}$ represents the experimental value. Results in Table \[tab:epsK\]() are obtained using the RBC-UKQCD estimate for $\xi_\text{LD}$ and those in Table \[tab:epsK\]() are obtained using the BGI estimate for $\xi_\text{LD}$. In Table \[tab:epsK\](), we find that the theoretical evaluation of $|\epsK|$ with lattice QCD inputs (with exclusive $\Vcb$) $|\epsK|^\text{SM}_\text{excl}$ has $4.2\sigma$ tension with the experimental result $|\epsK|^\text{Exp}$, while there is no tension with inclusive $\Vcb$ (heavy quark expansion with QCD sum rules). In Fig. \[fig:depsK:sum:rbc:his\](), we plot the $\Delta \epsK \equiv |\epsK|^\text{Exp} - |\epsK|^\text{SM}_\text{excl}$ in units of $\sigma$ (the total error) as a function of time starting from 2012. In 2012, $\Delta \epsK$ was $2.5\sigma$, but now it is $4.2\sigma$. In Fig. \[fig:depsK:sum:rbc:his\](), we plot the history of the average $\Delta \epsK$ and the error $\sigma_{\Delta \epsK}$. We find that the average has increased with some fluctuations by 27% during the period of 2012-2018, and its error has decreased monotonically by 25% in the same period. In Table \[tab:err-bud+his-DepsK\](), we present the error budget for $|\epsK|^\text{SM}_\text{excl}$. Here, we find that the largest error comes from $\Vcb$. Hence, it is essential to reduce the error in $\Vcb$ significantly. In Table \[tab:err-bud+his-DepsK\](), we present how the values of $\Delta\epsK$ have changed from 2015 [@Bailey:2015tba] to 2018 [@Bailey:2018feb]. Here, we find that the positive shift of $\Delta \epsK$ is about the same for the inclusive and exclusive $\Vcb$. This reflects the changes in other parameters since 2015. We thank Shoji Hashimoto and Takashi Kaneko for helpful discussion on $\Vcb$. The research of W. Lee is supported by the Creative Research Initiatives Program (No. 2017013332) of the NRF grant funded by the Korean government (MEST).  J.A.B. is supported by the Basic Science Research Program of the National Research Foundation of Korea (NRF) funded by the Ministry of Education (No. 2015024974). W. Lee would like to acknowledge the support from the KISTI supercomputing center through the strategic support program for the supercomputing application research (No. KSC-2016-C3-0072). Computations were carried out on the DAVID GPU clusters at Seoul National University.
{ "pile_set_name": "ArXiv" }
'''Q.''' Where can I buy Coretta Scott King Book Award seal stickers for books we own that were winners? We'd like to highlight these materials for [http://www.asalh.org/ThemeIntro2007.html Black History Month]. '''Q.''' Where can I buy Coretta Scott King Book Award seal stickers for books we own that were winners? We'd like to highlight these materials for [http://www.asalh.org/ThemeIntro2007.html Black History Month]. − A. Seals for these and several of the other ALA literary award winners may be purchased through the [http://www.alastore.ala.org/SiteSolution.taf?_sn=catalog&_pn=sub_category&_op=62 ALA Online Store]. + A. Seals for the Coretta Scott King Book Award and several of the other ALA literary awards may be purchased through the [http://www.alastore.ala.org/SiteSolution.taf?_sn=catalog&_pn=sub_category&_op=62 ALA Online Store]. Including the well-known [http://wikis.ala.org/professionaltips/index.php/Media_Awards#Newbery_Medal Newbery] and [http://wikis.ala.org/professionaltips/index.php/Media_Awards#Caldecott_Medal Caldecott] medal seals, ALA and its various units offer seal stickers for eleven of its [[Media Awards]] in all; the other nine award show are: Including the well-known [http://wikis.ala.org/professionaltips/index.php/Media_Awards#Newbery_Medal Newbery] and [http://wikis.ala.org/professionaltips/index.php/Media_Awards#Caldecott_Medal Caldecott] medal seals, ALA and its various units offer seal stickers for eleven of its [[Media Awards]] in all; the other nine award show are: Revision as of 10:59, 24 January 2007 Q. Where can I buy Coretta Scott King Book Award seal stickers for books we own that were winners? We'd like to highlight these materials for Black History Month. A. Seals for the Coretta Scott King Book Award and several of the other ALA literary awards may be purchased through the ALA Online Store. Including the well-known Newbery and Caldecott medal seals, ALA and its various units offer seal stickers for eleven of its Media Awards in all; the other nine award show are:
{ "pile_set_name": "Pile-CC" }
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml"> <head> <meta http-equiv="Content-Type" content="text/xhtml;charset=UTF-8"/> <meta http-equiv="X-UA-Compatible" content="IE=9"/> <meta name="generator" content="Doxygen 1.8.13"/> <meta name="viewport" content="width=device-width, initial-scale=1"/> <title>OpenMesh: OpenMesh/Examples/Tutorial10/stats.hh Source File</title> <link href="tabs.css" rel="stylesheet" type="text/css"/> <script type="text/javascript" src="jquery.js"></script> <script type="text/javascript" src="dynsections.js"></script> <link href="navtree.css" rel="stylesheet" type="text/css"/> <script type="text/javascript" src="resize.js"></script> <script type="text/javascript" src="navtreedata.js"></script> <script type="text/javascript" src="navtree.js"></script> <script type="text/javascript"> $(document).ready(initResizable); </script> <link href="search/search.css" rel="stylesheet" type="text/css"/> <script type="text/javascript" src="search/searchdata.js"></script> <script type="text/javascript" src="search/search.js"></script> <link href="doxygen.css" rel="stylesheet" type="text/css" /> <link href="logo_align.css" rel="stylesheet" type="text/css"/> </head> <body> <div id="top"><!-- do not remove this div, it is closed by doxygen! --> <div id="titlearea"> <table cellspacing="0" cellpadding="0"> <tbody> <tr style="height: 56px;"> <td id="projectlogo"><img alt="Logo" src="rwth_vci_rgb.jpg"/></td> <td id="projectalign" style="padding-left: 0.5em;"> <div id="projectname">OpenMesh </div> </td> </tr> </tbody> </table> </div> <!-- end header part --> <!-- Generated by Doxygen 1.8.13 --> <script type="text/javascript"> var searchBox = new SearchBox("searchBox", "search",false,'Search'); </script> <script type="text/javascript" src="menudata.js"></script> <script type="text/javascript" src="menu.js"></script> <script type="text/javascript"> $(function() { initMenu('',true,false,'search.php','Search'); $(document).ready(function() { init_search(); }); }); </script> <div id="main-nav"></div> </div><!-- top --> <div id="side-nav" class="ui-resizable side-nav-resizable"> <div id="nav-tree"> <div id="nav-tree-contents"> <div id="nav-sync" class="sync"></div> </div> </div> <div id="splitbar" style="-moz-user-select:none;" class="ui-resizable-handle"> </div> </div> <script type="text/javascript"> $(document).ready(function(){initNavTree('a04053_source.html','');}); </script> <div id="doc-content"> <!-- window showing the filter options --> <div id="MSearchSelectWindow" onmouseover="return searchBox.OnSearchSelectShow()" onmouseout="return searchBox.OnSearchSelectHide()" onkeydown="return searchBox.OnSearchSelectKey(event)"> </div> <!-- iframe showing the search results (closed by default) --> <div id="MSearchResultsWindow"> <iframe src="javascript:void(0)" frameborder="0" name="MSearchResults" id="MSearchResults"> </iframe> </div> <div class="header"> <div class="headertitle"> <div class="title">stats.hh</div> </div> </div><!--header--> <div class="contents"> <div class="fragment"><div class="line"><a name="l00001"></a><span class="lineno"> 1</span>&#160;<span class="preprocessor">#ifndef STATS_HH</span></div><div class="line"><a name="l00002"></a><span class="lineno"> 2</span>&#160;<span class="preprocessor">#define STATS_HH</span></div><div class="line"><a name="l00003"></a><span class="lineno"> 3</span>&#160;</div><div class="line"><a name="l00004"></a><span class="lineno"> 4</span>&#160;<span class="keyword">template</span> &lt;<span class="keyword">typename</span> Mesh&gt;</div><div class="line"><a name="l00005"></a><span class="lineno"> 5</span>&#160;<span class="keywordtype">void</span> mesh_stats( Mesh&amp; _m, <span class="keyword">const</span> std::string&amp; prefix = <span class="stringliteral">&quot;&quot;</span> )</div><div class="line"><a name="l00006"></a><span class="lineno"> 6</span>&#160;{</div><div class="line"><a name="l00007"></a><span class="lineno"> 7</span>&#160; std::cout &lt;&lt; prefix</div><div class="line"><a name="l00008"></a><span class="lineno"> 8</span>&#160; &lt;&lt; _m.n_vertices() &lt;&lt; <span class="stringliteral">&quot; vertices, &quot;</span></div><div class="line"><a name="l00009"></a><span class="lineno"> 9</span>&#160; &lt;&lt; _m.n_edges() &lt;&lt; <span class="stringliteral">&quot; edges, &quot;</span></div><div class="line"><a name="l00010"></a><span class="lineno"> 10</span>&#160; &lt;&lt; _m.n_faces() &lt;&lt; <span class="stringliteral">&quot; faces\n&quot;</span>;</div><div class="line"><a name="l00011"></a><span class="lineno"> 11</span>&#160;}</div><div class="line"><a name="l00012"></a><span class="lineno"> 12</span>&#160;</div><div class="line"><a name="l00013"></a><span class="lineno"> 13</span>&#160;<span class="keyword">template</span> &lt;<span class="keyword">typename</span> Mesh&gt;</div><div class="line"><a name="l00014"></a><span class="lineno"> 14</span>&#160;<span class="keywordtype">void</span> mesh_property_stats(Mesh&amp; _m)</div><div class="line"><a name="l00015"></a><span class="lineno"> 15</span>&#160;{</div><div class="line"><a name="l00016"></a><span class="lineno"> 16</span>&#160; std::cout &lt;&lt; <span class="stringliteral">&quot;Current set of properties:\n&quot;</span>;</div><div class="line"><a name="l00017"></a><span class="lineno"> 17</span>&#160; _m.property_stats(std::cout);</div><div class="line"><a name="l00018"></a><span class="lineno"> 18</span>&#160;}</div><div class="line"><a name="l00019"></a><span class="lineno"> 19</span>&#160;</div><div class="line"><a name="l00020"></a><span class="lineno"> 20</span>&#160;<span class="preprocessor">#endif</span></div></div><!-- fragment --></div><!-- contents --> </div><!-- doc-content --> <hr> <address> <small> <a href="http://www.rwth-graphics.de" style="text-decoration:none;"> </a> Project <b>OpenMesh</b>, &copy;&nbsp; Computer Graphics Group, RWTH Aachen. Documentation generated using <a class="el" href="http://www.doxygen.org/index.html"> <b>doxygen</b> </a>. </small> </address> </body> </html>
{ "pile_set_name": "Github" }
The invention relates to a line element composed of an inner and outer element. Such line elements are preferably installed in exhaust pipes in motor vehicles and flexibly connect individual, rigid line units with each other. In the exhaust system of motor vehicles, vibrations are always produced, which are mostly caused by imbalances of rotating elements in the engine, turbo or ancillary units. Furthermore, vibrations are excited by the pulse-shaped pressure curves of the internal combustion engine. In addition to these higher-frequency vibrations, frequencies in the single-digit and lower two-digit Hertz range can be excited by the driving movements in conjunction with road bumps and their feedback into the chassis. The line elements described above have the task of decoupling such vibrations and movements in the exhaust system of motor vehicles. In addition, they compensate for possible installation tolerances. In the case of flexible line elements which are insufficiently damped, the vibrations induced in the exhaust system during operation cause excitation of natural frequencies, which when severe have a service-life-reducing effect on the flexible line element. Their vibration behavior is characterized by their masses and spring stiffness. In the case of metal bellows with corrugations formed symmetrically with respect to the rotation axis, the natural modes associated with the small natural frequencies are frequently standing longitudinal waves in the bellows structure, with the number of oscillation nodes increasing with the order of the natural frequency. The amplitude of these natural frequencies decreases with decreasing rigidity. Therefore, the natural frequencies of such components generally decrease with increasing diameter and length. Especially in the commercial vehicle sector, where the diameters and lengths of the flexible line elements are larger due to the system design, the use of metal bellows without a damping system adapted to the specific configuration is not promising. Flexible line elements therefore have damping units which when, subjected to vibrational loads, preferably operate on the basis of frictional contact. In this case, metal mesh or metal braids are primarily used. The patent DE 196 41 963 C1 discloses a damped line element, which includes in the exterior region as well as in the interior region a metal braid that is in contact with the turns of the line element over the entire component length. In this case, the contact area between the line element and metal mesh extends in the radial direction in a completely enclosing manner. Line elements attenuated by an outer metal mesh are known from the published patent applications DE 199 24 476 A1, DE 40 42 291 A1 and DE 10 2005 052 204 A1, wherein a portion of the turns is in frictional engagement with the mesh for producing the damping, while other turns are positively or non-positively connected specifically with the mesh. The outer contact region extending over the entire component length is completely encircling in the radial direction. The line elements with damping known from the prior art have the disadvantage that, to provide the damping function, additional components must always be installed in the line element, which represents an increase in weight and material. Furthermore, DE 199 13 562 A1 discloses a flexible hose composed of an outer bellows and a metal hose arranged therein, which are in contact with one another for the purpose of damping vibrations.
{ "pile_set_name": "USPTO Backgrounds" }
Here Kitty, Kitty... (Bobcat trapping endangers desert wildlife) 12/07/2012 11:20AM ● Published by Steve Bobcat trap found on private property in Joshua Tree by Tom O'Key Here kitty, kitty... It’s not widely known among desert wildlife lovers that they themselves may sometimes be one of the biggest threats to the wildlife they love. That’s certainly true in the case of the desert folks who love to post photos of the bobcats coming to visit their homes or drink from the birdbath in their yard. How does sharing a photo of that charismatic bobcat lapping up water in your backyard put the wildcat in danger? It’s a question we recently discussed with a wildlife advocate in the desert who desires to remain anonymous. It’s really this simple: California allows the hunting and trapping of bobcats. An estimated 1,195 bobcats were killed during the 2010-2011 license year. Trappers, according to state data, took 893, sport hunters killed another 238, and the U.S. Department of Agriculture Wildlife Services killed another 64. It was a 57 percent increase from the previous license year statewide, and in southern California, the increase over the previous season was measured at 416 percent more bobcats killed this past season in commercial “harvesting” than the season prior. There were 45 sucessful bobcat trappers in California reported, with the last reported average price of a bobcat pelt at $78 during the 2008-2009 season. The statewide harvest limit for bobcats annually is 14,400. So, how do you place your favorite bobcat in danger by sharing how much you look forward to its visits to your home on social media sites like Facebook? You’re essentially advertising where to find nice healthy bobcats, and technology allows trappers (there is reportedly at least one team operating out of the Barstow area) to find promising areas for trapping or hunting. This particular wildlife advocate knows how much attention trappers pay to leads on the whereabouts of bobcats. He was enthused about a family of bobcats that began to visit and told a number of people about it. Not long after, he began finding traps set around his property. The trappers were careful to not place traps on his property, but worked around it to try and catch the bobcats on their way to and from the water source on his land. Companies like Hunting Trips R Us offer to help hunters be matched to local guides, noting that “the bobcat hunts conducted within California can be in some of the most beautiful surroundings, which only adds to the trip.” According to information from the 2010-2011 Bobcat Harvest Assessment (we’re not making the name up, you can download it online), there were 132 bobcats taken by trappers in San Bernardino County in that season, with 150 in Kern County, nine each in San Diego County and Imperial County and 63 in Inyo County. Kern County led the state with total bobcats killed for the season with 175, with San Bernardino County following at 142. Imperial County had a dozen killed, and San Diego County nearly doubled that with 23. Riverside County had only eight bobcats killed total for the season, while Inyo County had a total of 67 kills. Trapping has been allowed from November 24 through January 31, and hunting from October 15 through February 28. Hunters can kill up to five bobcats per season each, and under a trapping license there is no limit. Dogs may be permitted to pursue bobcats, but only until New Years Day when a new law banning the use of dogs to hunt bobcats and bears takes effect. Organizations such as the California State Varmint Callers Association (with their motto: Conservation of Wildlife through the taking of Predators by sportsmen), advocate the hunting of bobcats, coyotes, and other natural predators as a way of maintaining the ecological balance of the wild. There are licensed big game guides in and around the desert, including Morongo Valley, Lancaster, Beaumont, Yucca Valley, and Julian. We certainly are not anti-hunting, we merely want to point out that if you post photos of your favorite bobcat family visiting your home on social media, you may wake up one morning to find that the family has been trapped for their pelts, or stuffed and displayed at that Mexican restaurant in Barstow that looks like a taxidermy museum (but has pretty good food). We don’t have any bobcats dropping by Sun Runner World Headquarters at the moment, but we do love our wildlife that call our grounds their own, and we know our readers who do enjoy visits from wildlife would hate to see them trapped or shot for their pelts or as a trophy. At least bobcats receive some protection for most of the year. Coyotes are legal to kill all year with no limits. And don’t even think about the poor rattlesnake that is right up there with the coyote and, surprisingly, the jackrabbit, on the list of desert animals you can legally blow away all year long. We enjoy our desert wildlife alive, so the only shooting we’ll be doing of any of them—from bighorn sheep to crows and doves—will be with cameras. We’ve heard of horrible practices, including shooting desert tortoises for fun. What do you think about hunting and trapping in the desert?
{ "pile_set_name": "Pile-CC" }
Pink Guy Disapproves of (insert thing) By shatteredXmind Watch 0 Favourites 7 Comments 188 Views in this case it's... Miley Cyrus... how original you guys can feel free to edit this image and post it to your meme's content (as long as you credit me) (i must be getting old) IMAGE DETAILS Image size 1682x1116px 424.85 KB Show More Published : Nov 4, 2016
{ "pile_set_name": "OpenWebText2" }
<?php /** * ------------------------------------ * Notify user being "@" * ------------------------------------ */ $I = new FunctionalTester($scenario); Route::enableFilters(); $I->wantTo('Notify a User when he/she is being AT on a newly Reply'); $SuperMan = $I->have('User', ['name' => 'SuperMan']); $user = $I->signIn(); $topic = $I->postATopic(['title' => 'My Awsome Topic.', 'user_id' => $user->id]); // another user leave a reply $randomUser = $I->signIn(); $I->amOnRoute('topics.show', $topic->id ); $I->fillField(['name' => 'body'], 'The Awsome Reply. @SuperMan'); $I->click('#reply-create-submit'); $I->see('The Awsome Reply. <a href="'.route('users.show', $SuperMan->id).'">@SuperMan</a>'); // sign in the author $user = $I->signIn($SuperMan); $I->seeRecord('users', [ 'id' => $user->id, 'notification_count' => 1 ]); $I->amOnRoute('notifications.index'); $I->see('My Awsome Topic.'); $I->see('The Awsome Reply. <a href="'.route('users.show', $SuperMan->id).'">@SuperMan</a>'); $I->see($randomUser->name); $I->seeRecord('users', [ 'id' => $user->id, 'notification_count' => 0 ]);
{ "pile_set_name": "Github" }
Q: Default filename of image dragged from the browser window In Safari, when I drag an image from the browser window to the desktop the image take its filename from the last part of the URL. For example: http://www.mysite.com/images/05 the image name is 05.jpeg Is this a behaviour consistent across all (recent IE8+) browsers? Can I decide an arbitrary filename the image will get when dragged out of the browser? I tried (in Safari) to set the name and alt tag of the image but this doesn't have any effect. Maybe can I decide the filename setting it in the header of the server response when the image is served? A: One method is to specify the desired filename in the header of the response when the file is served. I'm on php so... header('Content-disposition: inline; filename=the-image.jpg'); When the image is dragged from the browser window to the desktop the file name is the-image.jpg Unfortunately this is not consistent across all browsers, in particular Firefox doesn't follow the rule and sticks to the last part of the URL for giving the name. The solution that works across all browsers is to avoid specifying the name in the header of the response and set the name as the last part of the URL. As I can manage the routes for my website the solution I adopted is to let the route to images end with a string that is ignored by the server and has the sole purpose of defining a filename for the image in case it's dragged out of the browser. For example: http://www.my-site.com/images/05/my%20custom%20filename.jpg What tells the server what image the client wants is the parameter following images, so 05 in the example. It's important to note that the filename must be URI-component encoded, escaping spaces, slashes, percents, and so on... The filename, to be OS friendly, should then be scrubbed from slashes, back-slashes and other characters that may eventually create mess.
{ "pile_set_name": "StackExchange" }
Dual role of DNA intrinsic curvature and flexibility in determining nucleosome stability. A statistical mechanistic approach to evaluate the sequence-dependent thermodynamic stability of nucleosomes is proposed. The model is based on the calculation of the DNA intrinsic curvature, obtained by integrating the nucleotide step deviations from the canonical B-DNA structure, and on the evaluation of the first order elastic distortion energy to reach the nucleosomal superstructure. Literature data on the free energy of nucleosome formation as obtained by competitive nucleosome reconstitution of a significant pool of different DNA sequences were compared with the theoretical results, and a satisfactorily good correlation was found. A striking result of the comparison is the emergence of two opposite roles of the DNA intrinsic curvature and flexibility in determining nucleosome stability. Finally, the obtained results suggest that the curvature-dependent DNA hydration should play a relevant role in the sequence-dependent nucleosome stability.
{ "pile_set_name": "PubMed Abstracts" }
LM386 The LM386 is an integrated circuit containing a low voltage audio power amplifier. It is suitable for battery-powered devices such as radios, guitar amplifiers, and hobby electronics projects. The IC consists of an 8 pin dual in-line package (DIP-8) and can output 0.25 to 1 watts of power depending on the model using a 9-volt power supply. Models There are three different models of the LM386 that have slightly different specifications, outlined below. The LM386 was invented by Ernie Leroy Long at Motorola in 1969. It was originally for part of a fuel injection system for a Ford Car. Almost identical versions of the device are available from Unisonic (Unisonic Technologies Co. or UTC) as the LM386 and the New Japan Radio Co. Ltd. (JRC) as the NJM386 and NJM386B. The JRC devices are also available in a single-in-line package. JRC devices, marked as 386 JRC, are sometimes misleadingly referred to as the JRC386. SPICE simulation models Although National Semiconductor and Texas Instruments (who bought Nat Semi in 2011) do not provide an official SPICE model for the LM386, there are two independently developed models freely available: The original "No-Frills LM386 Model" by Dave Dilatush. An improved model, "The EasyEDA LM386EE spice model" developed for the simulations of the "Tesseract Guitar Practice Amplifier" project. Usage in guitar amplifiers The LM386 is one of the most common amps used in DIY guitar preamplifiers and sustainers due to its ability to run on a single 9V battery. The EasyEDA "Tesseract" Guitar Practice Amplifier is a versatile design based on the LM386 and features distortion and full-wave rectification effects. The well-known "Smokey Amp" created by Bruce Zinky uses an LM386 and is notable for being able to fit in a cigarette package. The "Little Gem" and "Little Gem MkII" are modified/cloned versions of the "Smokey Amp". The "Ruby" amp is a modified version of a Little Gem amplifier. The Marshall MS-2 and MS-4 miniature practice amplifiers use a single-in-line packaged NJM386 manufactured by JRC. Usage in amateur radio The LM386 is very commonly used in the audio amplifier of low power QRP amateur radio rigs, like the Pixie. See also List of LM-series integrated circuits References External links Historical Data Books Linear Databook (1980, 1376 pages), National Semiconductor, includes LM386 datasheet Category:Linear integrated circuits
{ "pile_set_name": "Wikipedia (en)" }
Spintronics in antiferromagnets. Magnetic domains and the walls between are the subject of great interest because of the role they play in determining the electrical properties of ferromagnetic materials and as a means of manipulating electron spin in spintronic devices. However, much less attention has been paid to these effects in antiferromagnets, primarily because there is less awareness of their existence in antiferromagnets, and in addition they are hard to probe since they exhibit no net magnetic moment. In this paper, we discuss the electrical properties of chromium, which is the only elemental antiferromagnet and how they depend on the subtle arrangement of the antiferromagnetically ordered spins. X-ray measurement of the modulation wavevector Q of the incommensurate antiferromagnetic spin-density wave shows thermal hysteresis, with the corresponding wavelength being larger during cooling than during warming. The thermal hysteresis in the Q vector is accompanied with a thermal hysteresis in both the longitudinal and Hall resistivity. During cooling, we measure a larger longitudinal and Hall resistivity compared with when warming, which indicates that a larger wavelength at a given temperature corresponds to a smaller carrier density or equivalently a larger antiferromagnetic ordering parameter compared to a smaller wavelength. This shows that the arrangement of the antiferromagnetic spins directly influences the transport properties. In thin films, the sign of the thermal hysteresis for Q is the same as in thick films, but a distinct aspect is that Q is quantized.
{ "pile_set_name": "PubMed Abstracts" }
Q: Who Am I? (A Dead Guy) You seek him who died at sea, Try and find who he might be. A heart that did not wilt in flame, Writ on Roman stone is his name. Nothing of him that doth fade, But doth suffer a sea-change, Into something rich and strange. Now with his Adonis he lies, Who thought not himself worthy of fame, And writ on stone not his name, That lies beneath lit and unlit skies. Who am I? A: I am... Percy Shelley, the early Romantic poet. You seek him who died at sea, Try and find who he might be. Shelley drowned when his boat sank. A heart that did not wilt in flame, Legend has it that Trelawny plucked the heart from Shelley’s funeral pyre to be buried with his son. Writ on Roman stone is his name. Shelley is buried in Rome Nothing of him that doth fade, But doth suffer a sea-change, Into something rich and strange. These lines from The Tempest are written on his grave. Now with his Adonis he lies, This could have a few meanings: Shelley died with a copy of Keats’s poetry in his pocket, and his poem Adonaïs is written in Keats’s honour. His heart is said to have been kept inside his widow’s manuscript of Adonaïs. His ashes were later found in an envelope inside his daughter-in-law’s copy of Adonaïs. He was also buried in the same cemetery as Keats. Who thought not himself worthy of fame, And writ on stone not his name, Keats himself requested to be buried with no name or date on his tombstone. That lies beneath lit and unlit skies. I don’t know what this refers to.
{ "pile_set_name": "StackExchange" }
Q: Storing SHA1 hex value in PostgreSQL Seemingly simple question, corresponds to another question that was asked with regards to MySQL: How does one store the hex value that results from a SHA1 hash in a PostgreSQL database? Note: I realize I could use a VARCHAR(40) field, but this isn't efficient, as the data is in hex. Also, I am using PHP to interact with the database, so I can use PHP functions if necessary, but if this is the case, what do I store the result as in the database? A: I would store as bytea, hex encoded. Converting the human-readable hex data to bytea is simply a matter of: ('\x' || sha1_hex_value)::bytea The only real disadvantage here is that depending on your app framework you may get a binary representation out. If not you will get an escaped version and depending on the escape settings, may want to convert to binary yourself (if it is hex though you can just strip off the \x at the front of the value and use as hex).
{ "pile_set_name": "StackExchange" }
The ball mill is a key equipment to grind the crushed materials, and the ball mill is widely used in powder making production line including cement, silicate, new-type building material, refractory material, fertilizer, ore dressing of ferrous metal and non-ferrous metal, glass ceramics, etc, and the ball mill can grind various ores and other materials with dry type and wet type. Ball mill. A typical type of fine grinder is the ball mill.A slightly inclined or horizontal rotating cylinder is partially filled with balls, usually stone or metal, which grind material to the necessary fineness by friction and impact with the tumbling balls. Ball mills normally operate with an approximate ball charge of 30%. Dry Milling and Grinding Comminution EquipmentGlen MillsDry Milling is the most common ethanol production method in the United States Styles of mills we sell include; Jet Mills, Ball Mills, Jar Mills, Jaw Crushers, DiscSmall Ball Mill For Sale offers 6603 small ball mill for sale products. Jul 03, 2017· Batch Ball Mill Grinding. Capacities and efficiencies in wet and dry ball milling at different speeds and ore charges have been discussed in the foregoing pages. The results are summarized in table 16, which shows that in both capacity and efficiency grinding was at its best with small ore charges and high speed. The ball mill is used for grinding materials such as coal, pigments, and feldspar for pottery. Grinding can be carried out either wet or dry but the former is performed at low speed. Blending of explosives is an example of an application for rubber balls. When charging a ball mill, ceramic lined mill, pebble mill, jar mill or laboratory jar u rolling mill it is important to have the correct amount of media and correct amount o Charging a Dry Mill – The general operation of a grinding mill is to have the produc Ball mills can be used to grind wet or dry ores and other materials. Ball mills are crucial equipment for grinding after materials have been crushed and are often used for successfully grinding quartz, cement, limestone, granite and graphite. Feb 20, 2017· The PRRK-series is often used for dry grinding in rod mills, and in certain ball mill applications. Type CHRK is designed for primary autogenous grinding, where the large feed opening requires a hydrostatic trunnion shoe bearing. The SD Dry Grinding Attritors can be operated in both continuous and batch processing applications. In the continuous operation, the material is fed into the vessel at the top. It then migrates through the agitating media bed where it is processed to a desired particle size and is discharged through metering bar grids at the bottom of the tank. A wide variety of dry and wet method ball mill options are available to you, There are 74 dry and wet method ball mill suppliers, mainly located in Asia. The top supplying country is China (Mainland), which supply of dry and wet method ball mill respectively. May 26, 2018· Small Ball Mill is widely used for the dry or wet grinding of all kinds of ores and other. Quotation More. Mining Ball Mill For Hematite,Iron Ore,Copper Ore,Dolomite. Mining Ball Mill For Hematite,Iron Ore,Copper Ore,Dolomite,Bentonite,Limestone,Concrete, Find . Shipping: Less than Container Load (LCL) Service to US. FL ball mill for cement grinding. Versatile system based on standard modules 2 The FL ball mill is designed for grinding of clinker, gypsum and dry or moist additives to any type of cement. The mill may operate in either open or closed circuit and with or without a pre- Used, unused and refurbished ball mills available for a fraction of the cost of new. US-based Phoenix Equipment is a global buyer & seller of ball mills, as well as other industrial equipment. Check out our extensive inventory or talk to a knowledgeable representative today. The ball mill is a key piece of equipment for grinding crushed materials, and is widely used in production of powders such as cement, silicates, refractory material, and glass ceramics, as well as for ore dressing of both ferrous and non-ferrous metals. Alibaba.com offers 6,659 dry ball mill products. About 58% of these are mine mill, 1% are cast & forged. A wide variety of dry ball mill options are available to you, such as free samples, paid samples. New and Used Ball Mills for Sale Savona Equipment is a new and used Ball Mill supplier worldwide.A ball mill is a type of grinder used to grind materials into extremely fine powder for use in mineral dressing processes, paints, pyrotechnics, ceramics and selective laser sintering. The ball mill is a key piece of equipment for grinding crushed materials, and is widely used in production of powders such as cement, silicates, refractory material, and glass ceramics, as well as for ore dressing of both ferrous and non-ferrous metals. RETSCH laboratory ball mills are available as mixer mills as well as planetary ball mills. Mixer Mills grind and homogenize small sample volumes quickly and efficiently by impact and friction. They are suitable for dry, wet and cryogenic grinding as well as for cell disruption for DNA/RNA recovery. The kinetics of dry grinding of several cement clinkers and two coals were investigated in a laboratory tumbling ball mill. The kinetic process is first-order at first, but the rates of breakage decrease as fines accumulate in the bed.
{ "pile_set_name": "Pile-CC" }
Chiefs fans have seen the last of cornerback Phillip Gaines in Kansas City. According to the K.C. Star’s Terez Paylor, the Chiefs will not pursue a contract with Gaines, who will become an unrestricted free agent on March 14. Gaines, 26, was drafted by the Chiefs in the third round of the 2014 draft. He battled injuries in the first couple years of his career and never really found his footing in Kansas City. Gaines was mainly used as a slot corner but occasionally played outside on defense. He struggled in 2016 and 2017, allowing a total of over 1,000 yards and four touchdowns during those seasons. In Paylor’s report, he notes that the Indianapolis Colts could be a possible landing spot for Gaines with former Chiefs director of player personnel/football operations now serving as the Colts’ general manager. Ballard was partially responsible for recruiting Gaines in 2014. Another possible landing spot for Gaines could be the Cleveland Browns, where former Chiefs GM John Dorsey now serves as GM. Gaines would come cheap so it wouldn’t hurt for his former GM to take another chance on him.
{ "pile_set_name": "OpenWebText2" }
"""Tests focused on the data module.""" import datetime import numpy as np import pytest import torch from deepdow.data import (Compose, Dropout, FlexibleDataLoader, InRAMDataset, Multiply, Noise, RigidDataLoader) from deepdow.data.load import collate_uniform class TestCollateUniform: def test_incorrect_input(self): with pytest.raises(ValueError): collate_uniform([], n_assets_range=(-2, 0)) with pytest.raises(ValueError): collate_uniform([], lookback_range=(3, 1)) with pytest.raises(ValueError): collate_uniform([], horizon_range=(10, 10)) def test_dummy(self): n_samples = 14 max_n_assets = 10 max_lookback = 8 max_horizon = 5 n_channels = 2 batch = [(torch.zeros((n_channels, max_lookback, max_n_assets)), torch.ones((n_channels, max_horizon, max_n_assets)), datetime.datetime.now(), ['asset_{}'.format(i) for i in range(max_n_assets)]) for _ in range(n_samples)] X_batch, y_batch, timestamps_batch, asset_names_batch = collate_uniform(batch, n_assets_range=(5, 6), lookback_range=(4, 5), horizon_range=(3, 4)) assert torch.is_tensor(X_batch) assert torch.is_tensor(y_batch) assert X_batch.shape == (n_samples, n_channels, 4, 5) assert y_batch.shape == (n_samples, n_channels, 3, 5) assert len(timestamps_batch) == n_samples assert len(asset_names_batch) == 5 def test_replicable(self): random_state_a = 3 random_state_b = 5 n_samples = 14 max_n_assets = 10 max_lookback = 8 max_horizon = 5 n_channels = 2 batch = [(torch.rand((n_channels, max_lookback, max_n_assets)), torch.rand((n_channels, max_horizon, max_n_assets)), datetime.datetime.now(), ['asset_{}'.format(i) for i in range(max_n_assets)]) for _ in range(n_samples)] X_batch_1, y_batch_1, _, _ = collate_uniform(batch, random_state=random_state_a, n_assets_range=(4, 5), lookback_range=(4, 5), horizon_range=(3, 4)) X_batch_2, y_batch_2, _, _ = collate_uniform(batch, random_state=random_state_a, n_assets_range=(4, 5), lookback_range=(4, 5), horizon_range=(3, 4)) X_batch_3, y_batch_3, _, _ = collate_uniform(batch, random_state=random_state_b, n_assets_range=(4, 5), lookback_range=(4, 5), horizon_range=(3, 4)) assert torch.allclose(X_batch_1, X_batch_2) assert torch.allclose(y_batch_1, y_batch_2) assert not torch.allclose(X_batch_3, X_batch_1) assert not torch.allclose(y_batch_3, y_batch_1) def test_different(self): n_samples = 6 max_n_assets = 27 max_lookback = 15 max_horizon = 12 n_channels = 2 batch = [(torch.rand((n_channels, max_lookback, max_n_assets)), torch.rand((n_channels, max_horizon, max_n_assets)), datetime.datetime.now(), ['asset_{}'.format(i) for i in range(max_n_assets)]) for _ in range(n_samples)] n_trials = 10 n_assets_set = set() lookback_set = set() horizon_set = set() for _ in range(n_trials): X_batch, y_batch, timestamps_batch, asset_names_batch = collate_uniform(batch, n_assets_range=(2, max_n_assets), lookback_range=(2, max_lookback), horizon_range=(2, max_lookback)) n_assets_set.add(X_batch.shape[-1]) lookback_set.add(X_batch.shape[-2]) horizon_set.add(y_batch.shape[-2]) assert len(n_assets_set) > 1 assert len(lookback_set) > 1 assert len(horizon_set) > 1 class TestInRAMDataset: def test_incorrect_input(self): with pytest.raises(ValueError): InRAMDataset(np.zeros((2, 1, 3, 4)), np.zeros((3, 1, 5, 4))) with pytest.raises(ValueError): InRAMDataset(np.zeros((2, 1, 3, 4)), np.zeros((2, 2, 6, 4))) with pytest.raises(ValueError): InRAMDataset(np.zeros((2, 1, 3, 4)), np.zeros((2, 1, 3, 6))) @pytest.mark.parametrize('n_samples', [1, 3, 6]) def test_lenght(self, n_samples): dset = InRAMDataset(np.zeros((n_samples, 1, 3, 4)), np.zeros((n_samples, 1, 6, 4))) assert len(dset) == n_samples def test_get_item(self): n_samples = 3 n_channels = 3 X = np.zeros((n_samples, n_channels, 3, 4)) y = np.zeros((n_samples, n_channels, 6, 4)) for i in range(n_samples): X[i] = i y[i] = i dset = InRAMDataset(X, y) for i in range(n_samples): X_sample, y_sample, _, _ = dset[i] assert torch.is_tensor(X_sample) assert torch.is_tensor(y_sample) assert X_sample.shape == (n_channels, 3, 4) assert y_sample.shape == (n_channels, 6, 4) assert torch.allclose(X_sample, torch.ones_like(X_sample) * i) assert torch.allclose(y_sample, torch.ones_like(y_sample) * i) def test_transforms(self): n_samples = 13 n_channels = 2 lookback = 9 horizon = 10 n_assets = 6 X = np.random.normal(size=(n_samples, n_channels, lookback, n_assets)) / 100 y = np.random.normal(size=(n_samples, n_channels, horizon, n_assets)) / 100 dataset = InRAMDataset(X, y, transform=Compose([Noise(), Dropout(p=0.5), Multiply(c=100)])) X_sample, y_sample, timestamps_sample, asset_names = dataset[1] assert (X_sample == 0).sum() > 0 # dropout assert X_sample.max() > 1 # multiply 100 assert X_sample.min() < -1 # multiply 100 assert (y_sample == 0).sum() == 0 assert y_sample.max() < 1 assert y_sample.min() > -1 class TestFlexibleDataLoader: def test_wrong_construction(self, dataset_dummy): max_assets = dataset_dummy.n_assets max_lookback = dataset_dummy.lookback max_horizon = dataset_dummy.horizon with pytest.raises(ValueError): FlexibleDataLoader(dataset_dummy, indices=None, asset_ixs=list(range(len(dataset_dummy))), n_assets_range=(max_assets, max_assets + 1), lookback_range=(max_lookback, max_lookback + 1), horizon_range=(-2, max_horizon + 1)) with pytest.raises(ValueError): FlexibleDataLoader(dataset_dummy, indices=[-1], n_assets_range=(max_assets, max_assets + 1), lookback_range=(max_lookback, max_lookback + 1), horizon_range=(max_horizon, max_horizon + 1)) with pytest.raises(ValueError): FlexibleDataLoader(dataset_dummy, indices=None, n_assets_range=(max_assets, max_assets + 2), lookback_range=(max_lookback, max_lookback + 1), horizon_range=(max_horizon, max_horizon + 1)) with pytest.raises(ValueError): FlexibleDataLoader(dataset_dummy, indices=None, n_assets_range=(max_assets, max_assets + 1), lookback_range=(0, max_lookback + 1), horizon_range=(max_horizon, max_horizon + 1)) with pytest.raises(ValueError): FlexibleDataLoader(dataset_dummy, indices=None, n_assets_range=(max_assets, max_assets + 1), lookback_range=(max_lookback, max_lookback + 1), horizon_range=(-2, max_horizon + 1)) def test_basic(self, dataset_dummy): max_assets = dataset_dummy.n_assets max_lookback = dataset_dummy.lookback max_horizon = dataset_dummy.horizon dl = FlexibleDataLoader(dataset_dummy, indices=None, n_assets_range=(max_assets, max_assets + 1), lookback_range=(max_lookback, max_lookback + 1), horizon_range=(max_horizon, max_horizon + 1)) dl = FlexibleDataLoader(dataset_dummy) assert isinstance(dl.hparams, dict) def test_minimal(self, dataset_dummy): dl = FlexibleDataLoader(dataset_dummy, batch_size=2) res = next(iter(dl)) assert len(res) == 4 class TestRidigDataLoader: def test_wrong_construction(self, dataset_dummy): max_assets = dataset_dummy.n_assets max_lookback = dataset_dummy.lookback max_horizon = dataset_dummy.horizon with pytest.raises(ValueError): RigidDataLoader(dataset_dummy, indices=[-1]) with pytest.raises(ValueError): RigidDataLoader(dataset_dummy, asset_ixs=[max_assets + 1, max_assets + 2]) with pytest.raises(ValueError): RigidDataLoader(dataset_dummy, lookback=max_lookback + 1) with pytest.raises(ValueError): RigidDataLoader(dataset_dummy, horizon=max_horizon + 1) def test_basic(self, dataset_dummy): dl = RigidDataLoader(dataset_dummy) assert isinstance(dl.hparams, dict)
{ "pile_set_name": "Github" }
“There’s a feeling of injustice over taxation,” Macron said in the first wide-ranging news conference of a president who has favored lofty pronouncements delivered in cinematic speeches or via social media. But Macron, seated at a desk and far more informal than usual, did not offer to reintroduce France’s wealth tax — one of the key demands of “yellow vest” protesters who have amassed at traffic circles in rural France and marched down the affluent boulevards of the capital every weekend since mid-November. AD AD “When I look at the situation in our country, the real inequalities are not fiscal,” he said. “We have a system that corrects fiscal inequalities much more than in other countries. The true inequalities are those of origins, of destiny.” He vowed a reinvestment in education, with an eye to fostering leaders that better represent the socioeconomic diversity of French society. This did not appease Priscillia Ludosky, a yellow vest organizer whose online petition last year was a key factor in the movement’s mobilization. “He does not have the willingness to announce real measures that are actually strong,” Ludosky said. “He’s stayed with his original program, in fact.” AD Macron’s main mission on Thursday was to present the conclusions of the “grand débat” or “great debate,” a two-month listening tour that took him to high schools and community centers across the country, taking stock of grievances from local officials and constituents who felt left behind in an increasingly globalized economy. AD The grand débat was an enormous undertaking, and the roughly 10,000 sessions — some of which lasted more than six hours — generated a staggering amount of data: roughly 1.5 million individual contributions and more than 16,000 booklets of complaints. Macron’s bet was that it might help to quell the yellow vest protests, as well as redeem his faltering presidency. AD The protests have continued. Last Saturday marked the 23rd weekend demonstrators wearing high-visibility yellow jackets marched through Paris. The protests have often been violent, as demonstrators clashed with police, burned cars and smashed shop windows. Meanwhile, while the grand débat was underway, Macron’s approval rating edged up ever so slightly and now stands at around 29 percent, according to the latest Ifop poll, up from 23 percent in December. AD Much of the yellow vest outrage has been directed at the French president. Protesters have criticized Macron — a former investment banker with the academic pedigree of the quintessential French elite — for his perceived aloofness and arrogance, particularly with regard to his responses to the struggles of working people. AD During his election campaign, he told a worker that the “best way to afford a suit is to work.” Last September, he told a young, unemployed gardener that he could easily find a job if he just “crossed the street.” Comments like these — coupled with actions like his decision to abolish France’s wealth tax at the same time as he made it easier for small businesses to hire and fire employees — earned him the moniker of “president of the rich,” a title he has struggled to escape. AD Macron was pressed on these gaffes on Thursday. He responded: “There are phrases I regret; there are phrases taken totally out of context.” Macron also doubled down on his wealth tax decision, insisting that it was a means of generating investment in the national economy. “It’s not a gift for the most fortunate,” he said. AD The yellow vest movement began in mid-November as a mobilization against a carbon tax. Protesters saw Macron’s plan to increase the tax — though in line with France’s commitments to reduce greenhouse gas emissions — as a misguided decree from an out-of-touch president who failed to grasp how essential and expensive cars are in France’s rural periphery. Macron on Thursday reiterated his belief in the urgency of fighting climate change. He announced the creation of an “ecological defense council” of 250 people, selected by lottery, who would be charged with evaluating and advancing the national strategy. AD Ludosky emphasized that she and many in the yellow vest movement do not oppose collective action on climate change — they oppose the burden being placed on the working class. For her, Macron’s latest announcement was hollow. “Climate change associations have been saying for years what we need to do,” she said. AD Thursday’s news conference also served as a campaign pitch by Macron ahead of contentious European parliamentary elections next month. Many of his remarks — on secularism, immigration and free movement between European countries — seemed to play into themes that transcended France’s domestic malaise.
{ "pile_set_name": "OpenWebText2" }
Q: Search for multiple strings and print out match I have a command that prints out this long line, and i'm looking for a way to search for 3 different strings and when one is found it should be printed. The text will always only have one of the 3 options in it. b"bid: 5.0\r\ncompute_on: cpu\r\nconcent_enabled: true\r\ncost: null\r\nduration: 4.870952844619751\r\nestimated_cost: '1666666666666666667'\r\nestimated_fee: '56000000000000'\r\nfee: null\r\nid: a197d3fa-dfb4-11e8-9f77-a6389e8e7978\r\nlast_updated: 1541282756.6588786\r\nname: '4444'\r\noptions:\r\n compositing: false\r\n format: PNG\r\n frame_count: 1\r\n frames: '1'\r\n output_path: C:/Users/me/Google Drive/GolemProject/var/media/e/output/4444\r\n resolution:\r\n - 222\r\n - 222\r\npreview: C:\Users\me\AppData\Local\golem\golem\default\rinkeby\res\a197d3fa-dfb4-11e8-9f77-a6389e8e7978\tmp\current_preview.PNG\r\nprogress: 0.00 %\r\nresources:\r\n- C:/Users/me/Google Drive/GolemProject/var/media/e/fa3ee533-2020-45e7-9f5c-5501baa49285/bmw27/bmw27_cpu.blend\r\n- C:\Users\me\Google Drive\GolemProject\var\media\e\fa3ee533-2020-45e7-9f5c-5501baa49285\bmw27\bmw27_cpu.blend\r\nstatus: Waiting\r\nsubtask_timeout: 0:20:00\r\nsubtasks: 1\r\ntime_remaining: ???\r\ntime_started: 1541282753.4829328\r\ntimeout: 0:40:00\r\ntype: Blender\r\n\r\n" My current code looks like this. status = subprocess.check_output(["golemcli", "tasks", "show", line], shell=True) findstatus = ['Waiting', 'Finished', 'Timeout'] printstatus = str(status) for line in printstatus: if any(word in line for word in findstatus): print(line) But it doesnt seem like it finds anything because nothing ever gets printed. A: You are iterating over characters - not lines. status = b"bid: 5.0\r\ncompute_on: cpu\r\nconcent_enabled: true\r\ncost: null\r\nduration: 4.870952844619751\r\nestimated_cost: '1666666666666666667'\r\nestimated_fee: '56000000000000'\r\nfee: null\r\nid: a197d3fa-dfb4-11e8-9f77-a6389e8e7978\r\nlast_updated: 1541282756.6588786\r\nname: '4444'\r\noptions:\r\n compositing: false\r\n format: PNG\r\n frame_count: 1\r\n frames: '1'\r\n output_path: C:/Users/me/Google Drive/GolemProject/var/media/e/output/4444\r\n resolution:\r\n - 222\r\n - 222\r\npreview: C:\Users\me\AppData\Local\golem\golem\default\rinkeby\res\a197d3fa-dfb4-11e8-9f77-a6389e8e7978\tmp\current_preview.PNG\r\nprogress: 0.00 %\r\nresources:\r\n- C:/Users/me/Google Drive/GolemProject/var/media/e/fa3ee533-2020-45e7-9f5c-5501baa49285/bmw27/bmw27_cpu.blend\r\n- C:\Users\me\Google Drive\GolemProject\var\media\e\fa3ee533-2020-45e7-9f5c-5501baa49285\bmw27\bmw27_cpu.blend\r\nstatus: Waiting\r\nsubtask_timeout: 0:20:00\r\nsubtasks: 1\r\ntime_remaining: ???\r\ntime_started: 1541282753.4829328\r\ntimeout: 0:40:00\r\ntype: Blender\r\n\r\n" findstatus = ['Waiting', 'Finished', 'Timeout'] printstatus = str(status) # you need to split it here, by literal \r\n - not the special characters # for carriage return, linefeed \r\n: for line in printstatus.split(r"\r\n"): # split here by _literal_ \\r\\n if any(word in line for word in findstatus): print(line) Alternate way using sets: findstatus = set([ 'Waiting', 'Finished', 'Timeout'] ) printstatus = str(status) # you need to split it here, by literal \r\n - not the special characters # for carriage return, linefeed \r\n: for line in printstatus.split(r"\r\n"): # split here by _literal_ \\r\\n status = set( line.split() ) & findstatus if status: print(*status) Output: status: Waiting
{ "pile_set_name": "StackExchange" }
Diego Sol Diego de Branco Sol (born 31 July 1984) is a Brazilian futsal player who plays as a winger. Career Born in São Paulo, Sol career started in the futsal section of Grêmio Barueri, representing them for three seasons. In 2003, he played for EC Banespa on a brief period, making his first move out of his hometown in the next year, when he competed in the futsal section of Caldense on the Brazilian state of Minas Gerais. In 2005, he returned to São Paulo, to play for the futsal section of São José, spending one year there, and moving immediately after to the larger Corinthians. After a quick spell at EC Ferraz, on 8 August 2007, he moved to Portugal to join C.F. Os Belenenses, arriving at the same time as Marcão. At the Belém-side, Sol was a regular starter in a squad, alongside players like, Pedro Cary, Paulinho, Marcelinho and Marcão, that took part in the club most successful period in recent history, reaching two playoffs finals against Benfica, plus two Portuguese Cup finals, winning one, and losing another. On 8 August 2010, he moved to Benfica, representing them for three years, winning four titles, including the Portuguese league on his second year. On 30 June 2013, Sol, together with César Paulo and Davi, were released by the club, spending six months without club, until he joined Lokomotiv Kharkiv in January 2014, helping them win a second consecutive league. Honours CF Os Belenenses Taça de Portugal de Futsal: 2009–10 SL Benfica Liga Portuguesa de Futsal: 2011–12 Taça de Portugal de Futsal: 2011–12 SuperTaça de Futsal de Portugal: 2010–11, 2011–12 Lokomotiv Kharkiv Extra-Liga: 2013–14 References External links Benfica profile Category:1984 births Category:Living people Category:Sportspeople from São Paulo Category:Brazilian men's futsal players Category:C.F. Os Belenenses futsal players Category:S.L. Benfica futsal players Category:Brazilian expatriates in Portugal Category:Brazilian expatriate sportspeople in Ukraine
{ "pile_set_name": "Wikipedia (en)" }
Posts from the ‘State Law’ Category Subscribe Delaware’s legalization of medical marijuana has fizzled in the wake of legal opinions that growers, distributors and state employees could be prosecuted under federal drug laws. Gov. Jack Markell has suspended the regulation-writing and licensing process for medical marijuana dispensaries — effectively killing the program — and criticized the federal government for sending mixed signals on law enforcement, The News Journal has learned. U.S. Attorney Charles M. Oberly III has adopted the hard-line stance that just came out of President Barack Obama’s Department of Justice. This stance accentuates the inherent conflict between federal marijuana laws and what is playing out in states that have authorized limited marijuana use for medicinal purposes. “[G]rowing, distributing and possessing marijuana, in any capacity, other than as part of a federally authorized research program, is a violation of federal law regardless of state laws permitting such activities,” Oberly wrote Thursday to Markell’s attorney. “Moreover, those who engage in financial transactions involving the proceeds of such activities may also be in violation of federal money laundering statutes.” Markell’s office told The News Journal on Friday that Oberly’s stance prevents the Department of Health and Social Services from issuing licenses to medical marijuana dispensaries, whose employees and owners may be subject to federal raids and prosecution. The governor’s office recently sought guidance from Oberly on whether state employees responsible for regulating and inspecting licensed, not-for-profit medical marijuana dispensaries could do their jobs without fear of prosecution. In a statement Friday, the Democratic governor said he had no choice but to stop the program. “To do otherwise would put our state employees in legal jeopardy, and I will not do that,” Markell said. With the federal government firmly against large-scale dispensaries, state legislators may need to consider amending the law to allow doctor-approved patients to grow their own pot at home, said Rep. Helene Keeley, D-Wilmington South. “Maybe we have to tweak the current law to make this happen,” Keeley said. “We can’t give up.” New approach Oberly’s letter is evidence of the U.S. Department of Justice’s changing attitude toward state medical marijuana laws since Obama took office. During his campaign for president in 2008, medical marijuana advocates were encouraged by Obama’s vow to respect state laws. Oberly, a Democrat and former attorney general, is an Obama appointee. “I think it’s a great betrayal of what he said when he was running for office,” said Karen O’Keefe, director of state policies at the Marijuana Policy Project, a Washington, D.C.-based lobbying group that helped write Delaware’s law. “It’s been a great disappointment.” In 2009, when the first version of a medical marijuana bill was introduced in the Delaware General Assembly, a key impetus for the debate was the newly elected Obama’s pledge not to send his Department of Justice after those involved in state-sanctioned medical marijuana operations. That policy was codified in an October 2009 memo written by then-Deputy Attorney General David Ogden that said prosecutions of medical marijuana patients and caregivers was “unlikely to be an efficient use of limited federal resources.” With the Ogden memo as its backdrop, Delaware’s legislative effort continued, culminating with the passage of the Medical Marijuana Act last May. A month later, new Deputy Attorney General James M. Cole issued a memo with a different tone in response to inquiries from a group of federal prosecutors nationwide. Drawing a corollary from the Ogden memo, Cole said patients and their caregivers were still safe from enforcement action but prosecutors were never meant to ignore “large-scale, privately owned industrial marijuana cultivation centers” like those authorized in some states. In the months after the Cole memo, federal law enforcement agencies raided growers and dispensaries in California and Montana. A U.S. attorney in northern California sent a letter to local public officials, warning them to quell their efforts to regulate and license marijuana growers or face criminal charges. In January, prosecutors in Colorado mailed letters to two dozen medical marijuana dispensaries located within 1,000 feet of schools, notifying them of enhanced federal penalties for drug offenses committed near schools. Legal worries Since Delaware’s passage of its medical marijuana law, the state Division of Public Health has been studying similar laws in other states and writing regulations that officials expected to publish this spring. Markell’s recommended budget for the next fiscal year includes $480,000 for the implementation of the program, funded by proceeds from licensing dispensaries and patients. “It was our goal to exercise some caution before we move forward, to make sure we have some dialogue with federal prosecutors in Delaware and solicit their input,” Barlow said. Specifically, Barlow said, the administration is concerned that the medical marijuana distribution plan outlined in Delaware’s law falls under the parameters outlined in the Cole memo. The statute mandates the establishment of one marijuana dispensary — called a Compassionate Care Center — in each of the three counties, with the possibility of more centers in future years. Operators of the centers are to be nonprofit entities selected via a competitive bidding process administered by the state’s Division of Public Health, and would be responsible for cultivating, preparing and distributing the marijuana in cooperation with state regulators and under tight state control. “If you look at the Cole memo, it focuses on this large-scale, industrial distribution model, and what we have in Delaware is a distribution model that centralizes that into one place,” Barlow said. “It seems to be something the Cole memo is looking to specifically.” The administration was also worried that Delaware’s medical marijuana distribution structure could put state employees in danger of federal prosecution because of their close work with the dispensaries. “The governor’s concern is that we’re not doing things to put state employees potentially in the way of the federal government’s new enforcement,” Barlow said. In his response to Barlow, Oberly reaffirmed the Cole corollary to the Ogden memo and said the DOJ will not target patients or caregivers, but distribution is to be treated differently. “Enterprises engaged in the cultivation, manufacture and sale of marijuana directly violate federal law,” he wrote. “Individuals and organizations that participate in the unlawful cultivation and distribution of marijuana could be subject to civil and criminal penalties.” Oberly also said state workers are fair game for prosecution, just like anyone who is part of a marijuana distribution operation. Prosecution decisions would made on a case-by-case basis, Oberly said. The compassion centers were the linchpin of the medical marijuana bill’s getting bipartisan support in the Delaware General Assembly, Keeley said. “In the absence of such compassion centers, patients may be forced to obtain marijuana illicitly, unlawfully grow their own marijuana or forgo use of medical marijuana entirely,” Barlow wrote Friday in response Oberly’s Thursday letter. “That appears to be the unfortunate consequence of a federal policy that appears to offer mercy to cancer patients and others with a serious medical need for marijuana, but actually threatens criminal and civil sanctions for those who might help them safely obtain that relief.” Like this: Marijuana is a topic of significant public discourse in the United States, and while many are familiar with the discussions, it is not always easy to find the latest, research-based information on marijuana to answer to the common questions about its health effects, or the differences between Federal and state laws concerning the drug. Confusing messages being presented by popular culture, media, proponents of “medical” marijuana, and political campaigns to legalize all marijuana use perpetuate the false notion that marijuana is harmless. This significantly diminishes efforts to keep our young people drug free and hampers the struggle of those recovering from addiction. The Administration steadfastly opposes legalization of marijuana and other drugs because legalization would increase the availability and use of illicit drugs, and pose significant health and safety risks to all Americans, particularly young people. This Web-based resource center provides the general public, community leaders, and other interested people with the facts, knowledge, and tools to better understand and address marijuana in their communities. This resource center will be regularly updated and expanded to address emerging issues, research, and prevention tools, and highlight successful local efforts to reduce marijuana use. Like this: According to the National Conference of State Legislatures, since 1996, 16 states and Washington, DC have passed laws allowing smoked marijuana to be used for a variety of medical conditions. It is important to recognize that these state marijuana laws do not change the fact that using marijuana continues to be an offense under Federal law. Nor do these state laws change the criteria or process for approval of safe and effective medications, including marijuana. Many of these state laws began in order to create a legal defense to state criminal possession laws or to remove state criminal penalties for purported medical use of marijuana. Since then, many have evolved into state authorization for state-based production and distribution of marijuana for purported medical purposes. These state laws vary greatly in their criteria and implementation, and many states are experiencing vigorous internal debates about the safety, efficacy, and legality of their marijuana laws. Many local governments are even creating zoning and enforcement ordinances that prevent marijuana dispensaries from operating in their communities. Like this: In a major case before the US Supreme Court, Gonzalez v. Raich, the court ruled that the Federal Controlled Substances Act commerce clause gave Congress authority to prohibit the local cultivation and use of marijuana. Facts of the Case In 1996 California voters passed the Compassionate Use Act, legalizing marijuana for medical use. California’s law conflicted with the federal Controlled Substances Act (CSA), which banned possession of marijuana. After the Drug Enforcement Administration (DEA) seized doctor-prescribed marijuana from a patient’s home, a group of medical marijuana users sued the DEA and U.S. Attorney General John Ashcroft in federal district court. The medical marijuana users argued the Controlled Substances Act – which Congress passed using its constitutional power to regulate interstate commerce – exceeded Congress’ commerce clause power. The district court ruled against the group. The Ninth Circuit Court of Appeals reversed and ruled the CSA unconstitutional as it applied to intrastate (within a state) medical marijuana use. Relying on two U.S. Supreme Court decisions that narrowed Congress’ commerce clause power – U.S. v. Lopez (1995) and U.S. v. Morrison (2000) – the Ninth Circuit ruled using medical marijuana did not “substantially affect” interstate commerce and therefore could not be regulated by Congress. Questions Does the Controlled Substances Act (21 U.S.C. 801) exceed Congress’ power under the commerce clause as applied to the intrastate cultivation and possession of marijuana for medical use? Does the Controlled Substances Act (21 U.S.C. 801) exceed Congress’ power under the commerce clause as applied to the intrastate cultivation and possession of marijuana for medical use? Conclusion No. In a 6-3 opinion delivered by Justice John Paul Stevens, the Court held that the commerce clause gave Congress authority to prohibit the local cultivation and use of marijuana, despite state law to the contrary. Stevens argued that the Court’s precedent “firmly established” Congress’ commerce clause power to regulate purely local activities that are part of a “class of activities” with a substantial effect on interstate commerce. The majority argued that Congress could ban local marijuana use because it was part of such a “class of activities”: the national marijuana market. Local use affected supply and demand in the national marijuana market, making the regulation of intrastate use “essential” to regulating the drug’s national market. Like this: The Safe Drinking Water and Toxic Enforcement Act of 1986. requires that the Governor cause to be published a list of those chemicals “known to the state” to cause cancer or reproductive toxicity. The Act specifies that “a chemical is known to the state to cause cancer or reproductive toxicity … if in the opinion of the state’s qualified experts the chemical has been clearly shown through scientifically valid testing according to generally accepted principles to cause cancer or reproductive toxicity.” The lead agency for implementing Proposition 65 is the Office of Environmental Health Hazard Assessment (OEHHA) of the California Environmental Protection Agency. The “state’s qualified experts” regarding findings of carcinogenicity are identified as the members of the Carcinogen Identification Committee of the OEHHA Science Advisory Board. OEHHA announced the selection of marijuana smoke as a chemical for consideration for listing by the CIC in the California Regulatory Notice Register on December 12, 2007, subsequent to consultation with the Committee at their November 19, 2007 meeting. At that meeting, the Committee advised OEHHA to prepare hazard identification materials for marijuana smoke. At their May 29, 2009 meeting the Committee, by a vote of five in favor and one against, found that marijuana smoke had been “clearly shown through scientifically valid testing according to generally accepted principles to cause cancer.” Like this: Nullification generally is considered to take one of two forms. The first is where a State acts within the system, whether through a court challenge, or through concentrated series of efforts designed to repeal or amend offending legislative provisions. The second form is most simply described as outright defiance of the law; in other words, a State simply would ignore a federal provision, or a decision of a federal court. Nullification, If Meant As A Term Through Which Offending Legislation or Judicial Decisions Are Overturned By Working Within The Existent Constitutional And Legal Framework, Is Permissible And Encouraged By Our System of Checks and Balances. Idaho has historically participated in a number of these efforts including the current challenge to the Healthcare Reform Law, as well as various resolutions addressed to the Federal Government with respect to the state sovereignty and specific federal legislative enactments. (See HeR 64, 44,and SJM 106 (2010)). These examples reflect how a State can work within the constitutionally designed system to overturn or amend a provision that offends a State’s notion of sovereignty and federal overreaching. Nullification As Defiance Of Federal Law Or Enactment Is Inconsistent With A State Officer’s Duty To Act In Conformity With The Federal And State Constitutions. Nullification is generally the argument that States have the ability to determine the constitutionality of a federal enactment, and if a State finds the enactment unconstitutional it can ignore or otherwise refuse to adhere to the federal requirements. The basis for this argument is that the States came together to create the federal government, and therefore the States retain the ultimate discretion as to the reach of federal authority.! The adoption of these Resolutions in some respects represents the apex of the ongoing argument between Alexander Hamilton and Thomas Jefferson over the scope and influence of the fledgling federal government. These arguments arose cyclically throughout the Nation’s early history, reaching a virtual breaking point in 1828-1833 in what was referred to as the “Nullification Crisis.” President Andrew Jackson expressly rejected the theory of nullification as incompatible with the existence of the Union and destructive to the very purpose of the the Constitution. Southern State nullification advocates nevertheless continued to press their cause, and their arguments formed a central justification for the Civil War. The Legal Difficulty Of Idaho’s Nullification Claim. As an historical matter, many of the original States came into existence first as English colonies and then as sovereign parties to the Articles of Confederation. Idaho’s road to state status followed a much different path. Virtually all land within Idaho is the result of the United States making a claim to the land, which was disputed by the British until the adoption of several treaties leading ultimately to the creation of the Oregon Territory. Congress then created the Territory of Idaho and, ultimately, the State of Idaho. Once Idaho was admitted as a State, it acquired all of the privileges and immunities held by each of the other States, but as reflected above, the right of nullification, the right of secession, and the compact theory had all been rejected by the United States by the time of statehood. The framers of the Idaho Constitution were acutely aware of that fact. Hamilton actually suggested sending the Army into Virginia as a pretext-thus even the earliest arguments for nullification were viewed as latent arguments for civil war. See also Jonathon Elliot, “Answers of the Several State Legislatures: “State of New Hampshire” Debates in the Several State Conventions on the Adoption of the Federal Constitution, pp. 538-539. (1907). Jackson also expressly rejected the right to secede, noting that the Constitution forms a government, not a league of States. President Jackson’s Proclamation Regarding Nullification, December 10, 1832. Joint British and United States Claim was provided for in Treaty of 1818. The Oregon Treaty (1846) established the boundary between United States claims and British Claims at the 49th Parallel. The territory of Oregon was created on August 14, 1848. The territory of Idaho was created on March 4,1863. Reviewing the Idaho Admission Bill, § 19 specifically applies the laws of the United States. State inseparable part of the Union. The State of Idaho is an inseparable part of the American Union, and the Constitution of the United States is the supreme law of the land. The framers therefore expressly recognized Idaho’s status as a part of the United States and the supremacy of the United States Constitution. Consistent with this recognition, every legislator is required to affirm “that I will support the constitution of the United States and the constitution of the State of Idaho. Legislators and other state officials, in other words, pledge to carry out their duties in a fashion that directly conflicts with the second form of the nullification theory. The alpha and omega of the nullification theory, in sum, rest upon rejecting the principle that the United States Constitution as the supreme law of the land. The theory runs contrary to the very purpose of the federal constitution and Idaho’s express constitutional acknowledgment in Article I, § 3 of that supremacy. Courts Have Expressly Rejected Nullification Our history is replete with federal enactments that were unpopular in one State or another, or even within regions. Taking the logic of the nullification theory to its natural extension, federal law would become a patchwork of regulation depending upon which States chose to comply. It is hardly surprising, given this specter, that no court has ever upheld a State effort to nullify a federal law. The most instructive case on nullification is likely Cooper v. Aaron. This case arose out of a belief by the State of Arkansas that it was not bound to follow the Supreme Court’s decision in Brown v. Board of Education. 9 Arkansas, through its governor and legislature, claimed that there is no duty on the part of state official to obey federal court orders based upon the Court’s interpretation of the federal constitution. The governor and the legislature, in practical effect, were advancing the theory that the States were the ultimate arbiters of the constitutionality of federal enactments and decisions. The Court expressly rejected this argument stating: “No state legislator or executive or judicial officer can war against the Constitution without violating his undertaking to support it.” The Court went further: A governor who asserts power to nullify a federal court manifests that the fiat of a state governor, and not the Constitution of the United States, would be the supreme law of the land. Conclusion There is no right to pick and choose which federal laws a State will follow. Aside from ignoring the Supremacy Clause in Article VI, Clause 2 of the United States Constitution, that contention cannot be reconciled with Article I, § 3 of the Idaho Constitution or the oath of office prescribed in Article III, § 25. I hope this brief analysis responds adequately to your inquiry. Like this: As Colorado’s Attorney General I take an oath to uphold the U.S. Constitution and the Colorado Constitution. As part of this job, I frequently urge upon the state and federal courts a particular interpretation of these constitutional documents. But the final word on the meaning of the U.S. Constitution is the U.S. Supreme Court and the final word on the meaning of the Colorado Constitution is the Colorado Supreme Court. In a dispute on whether federal laws trump state laws under the Supremacy Clause, the U.S. Supreme Court has the final say. In Gonzales v. Raich [case], the U.S. Supreme Court held that even when marijuana is grown, distributed and consumed within a single state, it does affect interstate commerce and is therefore subject to federal regulation. While you or I may find this decision by a majority that included Justice Antonin Scalia to be “judicial activism,” it is nonetheless the law of the land. In Florida v. U.S. Department of Health and Human Services, scheduled to be heard by the U.S. Supreme Court in March, the federal government is citing Gonzales v. Raich and other similar cases to argue that the Commerce Clause allows it to require every American to buy health insurance or face an economic sanction. My fellow attorneys general and I have successfully argued in a U.S. District Court and the in 11th Circuit Court of Appeals that one’s failure to buy a particular product or service at the federal government’s direction is economic inactivity (unlike growing and selling a crop) and therefore not subject to congressional regulation under the Commerce Clause. We argue that if the federal government is able to regulate your economic decision making in such a manner, federalism is essentially dead. Rather than having limited enumerated powers under Article I, Section 8, the federal government would have largely unbridled power in all areas not addressed in the Bill of Rights. But make no mistake about it: If the U.S. Supreme Court should determine that the individual health insurance mandate is a proper exercise of the commerce power by Congress, that will be the law of the land and Americans will be left to pursue political remedies as opposed to legal ones. Such is the rule of law in America. Because of the rule of law, until a change of policy by Congress, medical marijuana remains in violation of federal law. The state attorney general cannot change that. Like this: AB 390, a bill to legalize marijuana in California, has gone up in smoke at the State Capitol. Children need to grow up in safe neighborhoods and attend schools free of marijuana users and sellers. We need to continue to protect our youth from the dangers of drugs. That starts with stopping the proliferation of pot. The demise of this disastrous California bill goes to show that our voice was heard at the State Capitol and legislators on both sides of the aisle agreed we don’t want a proliferation of WEED in our streets and communities…our churches…parks and schools. Legalizing marijuana is bad public policy and most of the legislators know it. In my opinion, once the public wakes up and understands the dangers of legalizing marijuana, legislators voting to legalize may find themselves on the wrong side of public opinion. A lot of voters are going to let their representatives know they will not stand for legalizing such a dangerous drug. Marijuana is a dangerous and destructive drug…and we must not rest until the pro-legalizers are defeated once and for all. To think some California lawmakers would resort to legalizing the sale and manufacture of drugs to generate tax revenue in which to balance our state budget is an outrage! There are many ways to get the economy moving again. Putting a flood of mind altering drugs on the streets and then taxing their sales is not one of them. It doesn’t make sense for our legislators to ban cigarette usage in public places because it is harmful to health, while at the same time saying “yes” to marijuana smoke, which is also carcinogenic. California lawmakers recently banned trans fat because it is harmful to health. And now they want to make marijuana legal because it’s supposedly good for consumption in certain cases? If we say marijuana is okay for adults…then what message do do send our children? That it’s okay for them too? How do we expect our youth to say “No!” to drugs when the adults are saying “yes.” Why would our public policymakers legalize marijuana, tax it and then go back and use that same money AND MORE for drug prevention programs to convince kids to not smoke dope. It’s bad public policy. It doesn’t make sense. Taxing marijuana is “blood money” plain and simple. And California lawmakers would have blood on their hands if they voted to legalize this dangerous drug. Pot should never be legal for general use in California. It’s bad for health, it’s bad for our communities, it’s bad for kids and it’s bad for our brains. California will go down a dangerous path for which there will be no turning back if voters legalize marijuana. To think people will smoke pot while driving on our roads, visiting our parks, walking in our neighborhoods, sitting in their backyards (with the odor wafting over our fences) and passing near our schools. It is a disaster waiting to happen of enormous consequences. Has anyone given any thought to this? Rogue legislators like Tom Ammiano want to legalize marijuana because they say it will be a windfall for the economy. Many others think it would actually be a drain on the state budget and the root cause of many job losses due to absenteeism and lost productivity. There is no guarantee that legalization would undercut the black market, especially if the drug is taxed. Drug pushers would simply sell it “tax free.” Legalizers think the revenue from a new marijuana tax will solve California’s budget woes, but AB 390 specifically states that people can grow their own weed, which many will do. How do you tax that? Where will we get the money to pay for a new watchdog agency to regulate the drug? And will employees of this same agency be allowed to smoke it during their work breaks since it will be legal? AB 390 to legalize marijuana was passed in the California Assembly Public Safety Committee (Tom Ammiano’s committee) on January 12, 2010. Increase the use of drugs, and our public will be safer? Was there another motive? President Obama was right to declare he wants to usher in a new era of responsibility; and that includes ensuring marijuana remains classified as an illegal drug. There’s no excuse for legalizing another harmful drug known kill through the inducements of carcinogens and mental instability. Because marijuana is illegal at the federal level, one can imagine California becoming a favored destination for drug buyers – and an exporter of drug dealers. The “legalizers” will argue we are overcrowding our prisons with people arrested for simple possession of marijuana. The truth is: no one ever stays in jail for more than a day just for possessing it. Anyone that is in jail or prison for marijuana either: Also had a role in distribution; or, Pled down to possession in exchange for information; or, Violated terms of parole/probation, and their original crime was much more serious Legalizers say: “If marijuana is legalized we can tax it and bring in much needed revenue to our state.” The truth: In 2005, the State of California spent $19.9 billion dollars on substance abuse and addiction or $545.09 per capita on alcohol and tobacco. But, the State of California collected $1.4 billion dollars of tax revenue or $38.69 per capita on the sale of alcohol and tobacco products. The costs far exceeded the revenue, and marijuana would likely follow a similar trend. The tax revenue does not account for the additional public health concerns and costs, such as cancer risks due to smoke inhalation or increased mental illness due to prolonged use. Legalizers say: “People with medical issues should be able to smoke marijuana to relieve pain or other debilitating symptoms.” The truth: There is likely medical benefit from components in the cannabis plant. This is very different than legalizing smoked marijuana. Medicine should never be determined by voters. The general public does not have the knowledge necessary to vote on whether a particular pill or patch is beneficial for the treatment of heart disease, attention deficit disorder, or diabetes. Why is this different? The 1999 IOM report said that smoked marijuana should generally not be recommended for medical use; we don’t “smoke” medicine. Legalizers say: “Marijuana toxicity has never killed anyone.” The truth: Marijuana contributes to dependence, mental illness, lung obstruction, lung cancer, memory loss, motor skill disruption and other harms in a way that tobacco does not, and its harms are underappreciated. There have been numerous cases of fatal car and other accidents caused by someone under the influence of marijuana. Smoked marijuana is not medicine. Pot smoke contains more carcinogens than cigarette smoke and is simply not healthy for you. The U.S. Food and Drug Administration routinely tests new drugs according to a rigorous protocol to prove their safety before they are allowed to be sold to the public as medicine. Marijuana has passed no such test. Legalization will increase drug use and health care costs. Marijuana is an addictive drug that poses significant health consequences to its users. Recent studies have linked marijuana use to birth defects, respiratory system damage, cancer, mental illness, violence, infertility, and immune system damage. The latest information from the U.S. Treatment Episode Data Set reports that 16.1% of drug treatment admissions were for marijuana as the primary drug of abuse, compared to 6% in 1992. Legalization will increase crime-related costs. 75% of children in foster care are placed there because of a parent’s substance abuse. Sexual assault is frequently facilitated by substance use – some experts put the number at over 60%. The U.S. Department of Justice found that 61% of domestic violence offenders also have substance abuse problems. All forms of marijuana are mind-altering (psychoactive). In other words, they change how the brain works. A lot of other chemicals are found in marijuana, too — about 400 of them, some of which are carcinogenic. Marijuana is addictive with more teens in treatment with a primary diagnosis of marijuana dependence than for all other illicit drugs combined. Long-term marijuana abuse can lead to addiction; Long-term marijuana abusers trying to quit report irritability, sleeplessness, decreased appetite, anxiety, and drug craving, all of which make it difficult to quit. Numerous studies have shown marijuana smoke to contain carcinogens and to be an irritant to the lungs. In fact, marijuana smoke contains 50–70 percent more carcinogenic hydrocarbons than does tobacco smoke. Marijuana users usually inhale more deeply and hold their breath longer than tobacco smokers do, which further increase the lungs’ exposure to carcinogenic smoke. Driving experiments show that marijuana affects a wide range of skills needed for safe driving — thinking and reflexes are slowed, making it hard for drivers to respond to sudden, unexpected events. Also, a driver’s ability to “track” (stay in lane) through curves, to brake quickly, and to maintain speed and the proper distance between cars is affected. Research shows that these skills are impaired for at least 4-6 hours after smoking a single marijuana cigarette, long after the “high” is gone. Marijuana presents a definite danger on the road. Share this: Like this: Today a full 16 percent of the U.S. population is dependent on alcohol, nicotine or other drugs. Another 27 percent of the general population engages in use of these substances in ways that put themselves and others at risk, including underage and adult excessive drinking, tobacco use, and misuse of pain relievers, stimulants and depressants. For a staggering 43 percent of the nation, then — nearly every other American — addiction and risky substance use are a matter of public health. Addiction is America’s number one health care and health cost problem. Approximately 30 percent of our federal and state health care spending is attributable to this disease. Across all government spending, the total financial cost is nearly $500 billion annually.
{ "pile_set_name": "Pile-CC" }
Tesla recently did it to much acclaim, and now Daimler is doing it too – the German automotive corporation is launching its own home/business battery energy storage system. Developed by Daimler subsidiary Deutsche ACCUmotive, the Mercedes-Benz energy storage unit utilizes lithium-ion batteries to store energy generated by solar cells, wind turbines or other sources. Utilizing technology that was originally developed for use in Mercedes and smart hybrid/electric cars, the battery modules will be available in two versions – a 2.5-kWh model for homes, and a 5.9-kWh model for industrial use. Up to eight 2.5 kWh modules can be linked together to form a 20 kWh energy storage unit for use by businesses. The 5.9 kWh model is also scalable making it suitable for commercial and industrial use. In fact, as part of the Coulomb joint venture, project partners The Mobility House and GETEC Energie are using 96 of the modules to provide grid stabilization and to smooth out load peaks in the German town of Kamenz. The system currently has a combined capacity of over 500 kWh, and plans call for that to be boosted to 3,000 kWh within the next few weeks. Daimler is now establishing sales and distribution networks, both in Germany and internationally. Mercedes-Benz energy storage units can be ordered starting this month, with shipping scheduled to begin in the fall (Northern Hemisphere). There is currently no word on pricing. Source: Daimler via Green Car Reports
{ "pile_set_name": "OpenWebText2" }
[A case of skeletal muscle metastasis on the left thigh after esophagectomy for esophageal adenocarcinoma in Barrett' s esophagus]. We report the case of a 45-year-old man with advanced esophageal adenocarcinoma in Barrett's esophagus. After neoadjuvant chemotherapy using S-1, docetaxel, and cisplatin, the patient underwent thoracoscopic esophagectomy with a two-field lymph node dissection and reconstruction with a gastric tube through the posterior mediastinal route. The pathological stage was CT-pT4 (diaphragm), ly2, v1, CT-pN1, CT-pStage IVa. Fourteen months after the operation, the patient complained of pain in his left thigh with a palpable indurated mass that was increasing in size. Needle biopsy specimens revealed skeletal muscle metastasis of the adenocarcinoma. The metastastic lesion was resected and local control was achieved successfully for 13 months, after which the patient died because of intrabronchial bleeding.
{ "pile_set_name": "PubMed Abstracts" }
Introduction {#sec1-1} ============ *Vata* is considered as a chief factor for the physiological maintenance of the body. Factors provoking *Vata* result in the instantaneous manifestation of diseases, which can even prove to be fatal. Therefore, the *Vataja nanatmaja vyadhis* are of utmost importance, rather than the vyadhis produced by the other two *doshas*. Contradictory approaches to pacify this vitiated state have to be restored to, to maintain the equilibrium. In the modern point of view, the diseases involving the neurological, musculoskeletal, psychosomatic, and gastrointestinal system disorders have more similarity with the *Vata vyadhi*. It indicates the wide ranging involvement of *Vata* in various systems of the body. The economy of the country relies on its work force. *Apabahuka* is one such disease that hampers the day-to-day activity of an individual. The fact that *Vata vyadhi* is one among the *Ashta maha gada*,\[[@ref1]\] is itself explanatory, with regard to the consequences caused by *Apabahuka*. Even though a definite factor responsible for the manifestation of this disease is not mentioned, a set of etiological factors can be interpreted. On analyzing the etiopathology, it may be interpreted that the disease *Apabahuka* manifests due to the depletion of tissue elements (*dhatu kshaya*) as well as *Samsrushta dosha*. *Apabahuka* is considered to be a disease that usually affects the shoulder joint (*amsa sandhi*) and is produced by the *Vata dosha*. Even though the term *Apabahuka* is not mentioned in the *nanatmaja Vata vyadhi*, Acharya Sushruta and others have considered *Apabahuka* as a *Vata vyadhi*.\[[@ref2]\] *Amsa shosha* can be considered as the preliminary stage of the disease where loss or dryness of the *Shleshaka Kapha* from the shoulder joint occurs. The next stage, that is, Apabahuka, occurs due to the loss of Shleshaka Kapha and symptoms like shoola during movement, restricted movement, and so on, are manifested. Even as this is commented on in the *Madhukosha teeka*, it is mentioned that Amsa shosha is produced by *dhatukshaya*, that is, *shuddha Vata janya*, and *Apabahuka* is *Vata Kapha janya*.\[[@ref3]\] Etiopathogenesis {#sec2-1} ---------------- ### Etiology (Nidana) {#sec3-1} The causes (*hetu*) of *Apabahuka* may be classified into two groups. (i) *Bahya hetu* --- Causing injury to the vital parts of the body (*marma*) or the region surrounding the *amsa sandhi*, which is also known as *bahya abhigataja* that manifests the *vyadhi* or disease first; (ii) *Abhyantara hetu* --- Indulging in the etiological factors that aggravate Vata leading to the vitiation of *vata* in that region and is also known as *dosha prokopajanya (Samshraya)*, which in turn leads to *karmahani* of *bahu*. The descriptions of *Nidana* are given below: ### Aharaja {#sec3-2} *Katu, Tikta, kashaya rasas, laghu sukshma*, and *sheeta guna* cause vitiation of the *Vata*. ### Viharaja {#sec3-3} The exercises directly or indirectly influencing the shoulder or *amsa desha* should be considered here: ### Plavana {#sec3-4} Results in *Vata kopa* due to overexertion in the joint. ### Bharavahana {#sec3-5} Carrying heavy loads over the shoulders will cause *Vata prakopa* and deformity in the joint capsule. This leads to disease formation. ### Balawat Vigraha {#sec3-6} Wrestling with a person who is more powerful will cause *agahata* to the *amsapradesha* and *Vataparkopa* takes place. This manifests the disease. ### Dukkha Shayya {#sec3-7} Improper posture that creates a great amount of more pressure on the *amsasandhi* will disturb the muscular integrity, and provokes *vata*. This manifests the disease. Other *viharaja nidanas* as reported in the *Vatavyadhi* context may influence the condition by provocating *Vatadosha*. Even though a specific *bahya hetu* (external cause) has not been mentioned for *Apabahuka*, the general factors reported for *Vata prakopa* have to be analyzed and elicited. To summarize, the above-mentioned *nidanas*, under *vihara*, especially involving the *amsa sandhi* and *marmabhighata* to *amsa*, lead to the development of *Apabahuka*. ### Samprapti {#sec3-8} In case of *Apabahuka*, two ways of vitiation of the *vata* can be considered. The etiological factors like *ruksha, laghu* and so on, and *atibharavahana* and the like cause vitiation of the *vata* directly. In another way, *Kapha prakopaka nidanas* like taking of *atisnigdha, atiguru dravya*, and so on cause an increase in the *vikruta Kapha*, which produces the *Kaphavrita-vata* condition. In both ways, the *vikruta vata dosha* gets accumulated in the bio channels (*srotas*) and manifests symptoms like the *stabdha poorna kosthata*. In the *prakopa avasta*, the *Vata* produces symptoms like *koshtha toda* and *sancharana* and *prasara avastha* symptoms like *atopa* may also be produced. However, *Ashukaritva* being one among the symptoms of *Vata*, the symptoms produced by it are very quick in onset, and hence, the *dosha kriyakalas* of the *vyadhi* are ill-defined and cannot be observed properly. *Sthana samsraya avastha* of the *vyadhi* occurs with the localization of the aggravated *Vata* in the specific *dhatu*, that is, *dosha dushya sammurachana*, which occurs in the specific organ of the body where *kha vaigunya* has previously taken place by the specific part of the *nidanas*, simultaneously with the *dosha vikruti. Shiro marma* is considered as the *uttamanga* and is mentioned as the seat or *moola* of all *indriyas. Shiro marma* performs all types of *cheshta* in the presence of the normal *vata* because, among the three *doshas*, only the *Vata* is responssible for all types of *cheshta*. The *Charaka samhita* has mentioned that when *shiro marma* gets affected, it produces symptoms like *chestahani*. In this case, the *sthana samshraya* of the *dosha* can be taken, as in *siro pradesha*. Usually in the *sthana samshraya avasta*, the *poorvaroopa* of the *vyadhi* are manifested. As *Apabahuka* is considered as a *vata vyadhi*, and *Vata* has the *ashukari guna*, the *poorvaroopas* like *bahupraspandita hara* and *shoola* may manifest mildly or are totally absent. However, the above-mentioned symptoms are clearly manifested in the *vyaktha avastha* or in the *roopa avastha* of the *vyadhis* in the vyakta sthana, that is, in the *amsa pradesha*. In this stage the *amsa pradesha* gets affected by the aggravated *Vata*, on account of which *Amsashosha* occurs in the initial stage by the decrease of the *Shleshaka Kapha*, which further leads to the manifestation of *Apabahuka*, with symptoms like *bahupraspandita hara* and *shoola*. Therefore, in the *Madhukosha* commentary of *Madhava nidana* it is mentioned that *amsa shosha* and *Apabahuka* are the two stages of the *vyadhi*. ### Marma abhighata {#sec3-9} Morbid *vyana Vata* in another way may cause *abhyantara marmabhighata* or any external trauma to *amsapradesha* may also cause *bahya marmbhighata* to *the amsa marma* present in *amsadesha*. As *amsa marma* is a *snayu* and *vaikalyakara marma*, afflicting *snayu* will manifest *bahupraspanditahara*. Even in modern medical science, the partial loss of blood supply in the area of insertion of tendons or some idiopathic cause can produce localized degeneration of the collagen. This induces an autoimmune response and cause a tear or distortion of the tendinous sheaths and ligaments. This obliterates the integral stability of the joint and results in restricted movement with painful and stiffened joints. ### Chikitsa {#sec3-10} The general line of treatment mentioned for *Vatavyadhi* in Ayurvedic classics include *Snehana* (both internal and external), *Swedana, Mrudusamshodhana, Basti, sirobasti Nasya*, and so on. Charaka further states that, depending on the location and *dushya* (tissue element vitiated by *Vata*) each patient should be given specific therapies. Vagbhata has mentioned *Nasyakarma* in the *jatroordhva Vatavikaras*.\[[@ref4]\] Three major approaches are followed in the management of *Vatavyadhi*. Treatment of *Kevala Vata*Treatment of *Samsrusta Vata*Treatment of *Avruta Vata* Ayurvedic classics explain the *chikitsa* of *Apabahuka* as follows. *Nasya* and *uttarabhaktika Snehapana* are useful in the management of *Apabahuka*.*Astanga Sangraha* mentions *Navana Nasya* and *sneha pana* for *Apabahuka*.Sushrutacharya advises *Vatavyadhi chikitsa* for *Apabahuka*, except *siravyadha*.*Chikitsa sara sangraha* advises *Nasya, Uttara bhaktika Snehapana*, and *Sweda* for the treatment of *Apabahuka*.*Brumhana nasya* is indicated in *Apabahuka* by Vagbhata. By considering the above references, the following can be stated as the line of treatment of *Apabahuka*. Nidana parivarjanaAbhyangaSwedanaUttarabhaktika snehapanaNasyakarmaShamanoushadhi Modern description {#sec2-2} ------------------ There are some clinical conditions of modern science, which may be compared with that of *Apabahuka*. These may be categorized as follows: Periarthritis, frozen shoulder or adhesive capsulitisSubacromial or subdeltoid bursitisSubcoracoid bursitisPainful shoulderBicipital tendinitisOsteoarthritis of shoulder jointBrachial plexes neuropathies However, in this study, the clinical condition, namely, periarthitis or frozen shoulder or adhesive capsulitis has been taken to correlate with *Apabahuka*. Periarthitis or frozen shoulder or adhesive capsulitis\[[@ref5][@ref6]\] {#sec2-3} ------------------------------------------------------------------------ This is a descriptive term used to indicate a clinical syndrome wherein the patient has a restricted range of active and passive glenohumeral motion. The Simmonds have reported on the tight inelastic tissues around the shoulder joint. They believed that the pathological changes in frozen shoulder were due to degeneration and focal necrosis of the supraspinous tendon. With revascularization, the tendon pathology could resolve. With inadequate vascular response, the tendons would continue to degenerate, developing tears of varying size, or a secondary biceps tendinitis could develop. In this condition, pain and stiffness of the shoulder joint are the cardinal symptoms leading to inability or loss of function of the affected upper limb. This may be achieved in three phases. Painful phaseStiffening phaseThawn / Resolving phase The patient gives a history of having noticed a slight painful catch in the region of the shoulder and upper arm for several months, gradually becoming aware of the inability to perform certain tasks, because of stiffness of the arm. Night pain, often awakening him after he has fallen asleep, is a common complaint. Frequently it radiates down the arm to the hand without being localized to any nerve distribution. Stiffness of the shoulder increases until all movements are lost. In Ayurveda, therapies like *abhyanga, swedana, snehapana nasya karma, vasti karma*, and *shamana Aushadhi* are mentioned to combat the *Vata vyadhi*. In the present study *nasyakarma* with *Laghumasha taila*, in the form of *Marsha nasya* have been advised for patients suffering from *Apabahuka. Laghumasha taila* contains drugs like *Kapikacchu, Bala, Shatavari, Sita, Punarnava, Saindhava, Jingini, Sarshapa taila*, and *Masha*.\[[@ref7]\] Aims and Objectives {#sec1-2} =================== To study the effect of *Laghumasha taila Marsha nasya* in *Apabahuka*.To study the literature of the disease in view of Ayurveda and Modern medical science. Materials and Methods {#sec1-3} ===================== Source of data {#sec2-4} -------------- Patients of either sex diagnosed with *Apabahuka* from the OPD and IPD of the ALN Rao Memorial Ayurvedic Medical College and Hospital, Koppa, were selected for the study. Out of the 18 patients, three patients were dropped in the initial stages of the study and 15 patients completed the course of treatment. Criteria for selection of the patients {#sec2-5} -------------------------------------- The patients presenting with the signs and symptoms of *Apabahuka* according to Ayurvedic texts were selected for the study. Patients of both sexes in the age group of 20 -- 60 years were selected. The main criteria for diagnosis was the presence of clinical symptoms of *Apabahuka*, that is, *Bahupraspandita hara* and *shoola*. The symptoms of *Srotodushti* were also assessed along with the main symptoms for the selection of the patients. Inclusion criteria {#sec2-6} ------------------ *Apabahuka* diagnosed according to the classical signs and symptoms described in Ayurveda.Patients of both sexes within the age group of 20 -- 60 years. Exclusion criteria {#sec2-7} ------------------ Systemic diseases presented with *Apabahuka* as a complicationPatients with a history of fracture of the affected handPregnancy and lactating women Laboratory investigations {#sec2-8} ------------------------- The modern laboratory investigations included for the clinical study are Blood for Hemoglobin %,Total count,Differential count, Erythrocyte sedimentation rate, Random blood sugar as routine investigations; Urine for sugar, albumin, and microscopic test; and X-Ray Shoulder joint --- Anterio-posterior, lateral view --- to rule out the history of fracture. Study design {#sec2-9} ------------ A randomized standard single blind clinical study has been adopted. Treatment schedule {#sec2-10} ------------------ After diagnosis, the randomly selected patients were treated with *Marsha nasya* with *Laghumasha taila* in doses of 6, 8, or 10 drops, as required by the patients, for seven days. Out of the 18 selected patients, three patients were dropped from the study and the remaining 15 patients completed the course of the study. ### Pratimarsha / Marsha nasya {#sec3-11} When the *nasya dravya* is used in the minimum quantity (two *bindus*), it is called *Pratimarsha*. Usually the *sneha dravyas* are used. This is different from *marsha nasya* where in the quantity used will be 6, 8, or 12 *bindus*. Method of Nasya Karma {#sec2-11} --------------------- *Nasya Karma* can be explained in the following three headings as reported in the classics. ### Poorva Karma {#sec3-12} This encompasses the following points like *Oushadhi sangraha, Nasya yantra, Atura vaya, Kala, Atura siddhata*, and so on. The patient is instructed not to suppress the natural urges and go through the normal routine. Before taking the *Nasya Karma* he should not have any food. Subsequently, the patient is taken to a comfortable room, which is without dust, extreme breeze or sunlight. *Bahyasnehana* in the form of *mrudu Abhyanga* is performed to the *shiras* first and then over the *gala, kapola, lalata*, and *karna*. After *snehana*, a mild *swedana* is performed to the part of the body above the shoulders. The eyes of the patient should be taken care of by closing them with a band of cloth. ### Pradhana Karma {#sec3-13} Once the *poorva karma* is completed, the patient is made to lie down on the table in the supine position with legs slightly raised. Eyes should be covered with a cloth. With the help of tepid medicine, *panitapa sweda* is performed over the parts of the body above the shoulder, excluding the patient\'s eyes. The head of the patient is then highly raised and medicine is poured in each nostril one after the other. The other nostril should be closed while administering the medicine in one nostril. The medicine should be slowly instilled in an uninterrupted manner called *'Avicchinna dhara'*. The patient is advised to inhale the medicine slowly and forcefully. The same procedure is repeated in both the nostrils. Care should be taken not to shake the head during the procedure. *Tapasweda* can be repeated conveniently. Aftera administration of the medicine, the patient is strictly advised not to swallow the medicine, but to spit it out. The spitting can be done after the smell and taste of the medicine disappears from the throat. Next, the patient is allowed to relax in the same posture for 100 *matra kalas* (30 -- 32 seconds), without going to sleep. ### Paschat karma {#sec3-14} *Pradhana karma* is followed by *dhoomapana, gandoosha*, and *kavala graha*. The patient is advised to follow certain rules and regimen. Criteria for assessment of the study {#sec2-12} ------------------------------------ The improvements in the patients were assessed on the basis of relief in the signs and symptoms of the disease. To analyze the efficacy of the drug, scores were given for each symptom. According to the severity of the symptoms, the grading was given, as mentioned herewith: ### Scoring pattern {#sec3-15} The improvement is documented through statistical significance. The subjective and objective parameters are assessed by means of interrogation and by ascertaining the signs and symptoms before and after the treatment. The response of the drug is assessed weekly through interrogation, signs, and symptoms. ### Statistical analysis {#sec3-16} For assessing the improvement of symptomatic relief and to analyze it statistically, the observations were recorded before and after the treatment. The mean, percentage, SD, SE, and t-value (paired t-test) were calculated from the observations recorded. Criteria for assessment of the overall therapy {#sec2-13} ---------------------------------------------- ### Complete relief {#sec3-17} One hundred percent relief in the complaints of patients, along with elevation of shoulder joint up to 180° and flexion and abduction of the joint up to 90°. ### Marked improvement {#sec3-18} More than 75% relief in the complaints as well as significant improvement in the elevation of joint up to 135°, and flexion and abduction up to 60°. ### Moderate improvement {#sec3-19} More than 50% relief in the complaints along with improvements in elevation of joint up to 90° and flexion and abduction of joints up to 30°. ### Improvement {#sec3-20} Twenty-five to fifty percent relief in the complaints. ### Unchanged {#sec3-21} Patients with less than 25% relief in their complaints were regarded as unchanged. Observations {#sec1-4} ============ The observations made of the 18 patients with *Apabahuka* were as follows: Maximum number of patients were obtained in the age group of 31 -- 40 years, that is, 33.33%, followed by 26.66% patients in the age group of 41 -- 50 years, and 20% patients in the age groups of 51 -- 60 years and 20 -- 30 years each. Most of the patients were male (60%). Most of the patients, that is, 47%, were from the Hindu community, followed by 29% from the Muslim community, and 24% from the Christian community. Most of the patients (38%) were laborers, followed by housewives (25%); the maximum number of patients (40%) were from the lower socioeconomic status group; maximum number of patients (58%) were nonvegetarian, followed by 42% who were vegetarian. Results {#sec1-5} ======= The drug *Laghumasha taila Nasya* provided a moderately significant effect (*P* \< 0.01) on the symptom *Bahupraspandita hara* (53.33%) and a mildly significant effect (*P* \< 0.05) on *Shoola* (26.66%) \[[Table 1](#T1){ref-type="table"}\]. On *atopa* the therapy showed 60% relief, followed by 37.5% relief on wasting of muscles, and 30% relief on *stambha* \[[Table 2](#T2){ref-type="table"}\]. The therapy was mildly significant on both *Asthivaha* and *Majjavaha Srotodushti* (*P* \< 0.05) and moderately significant on *Medovaha srotodushti* (*P* \< 0.02) \[[Table 3](#T3){ref-type="table"}\]. Most of the patients, that is, 53.33% were moderately improved, followed by 26.66% improved, and 6.60% were markedly improved after completion of the therapy \[[Table 4](#T4){ref-type="table"}\]. ###### Effect of the therapy on main symptoms in 15 patients with *Apabahuka* ![](Ayu-31-488-g002) ###### Effect of the therapy on associated symptoms of *Apabahuka* in 15 patients ![](Ayu-31-488-g003) ###### Effect of the therapy on *srotodushti* in 15 patients of *Apabahuka* ![](Ayu-31-488-g004) ###### Overall effect of the therapy ![](Ayu-31-488-g005) Discussion {#sec1-6} ========== The present drug formulation *Laghumasha taila* contains drugs like *Kapikacchu, Bala, Shatavari, Sita, Punarnava, Saindhava, Jingini, Sarshapa taila*, and *Masha*. Mode of action {#sec2-14} -------------- ### Laghu masha taila {#sec3-22} *Kapikacchu(Mucuna prurita* Hook) : Different varieties are available, with their potent action as *Vata* hara and qualities such as, *snidha, madhura*, and *ushna. Dravya* is well known for its anti-parkinsonism effect (*Kampavata hara*) as it contains dopamine, and its seeds are rich in protein (Kerala or Tamilnadu germplasm), hence, it is utilized internally as a taila, which tones the muscle and acts as a nervine tonic, which is the most important requirement in *Apabahuka*. *Bala (Sida cordifolia* Linn) : It is generally considered as a nervine stimulant or nervine tonic. A better term can be given as a nervine stimulant. The term *'Bala'* is applied because of its *balya* property of *moola*. In the *Laghu masha taila*, this serves the purpose of generating sufficient energy to the muscle tissue, and also by its effective supporting factors such as *madhura rasa* and *madhura vipaka* as a *Vata hara*. *Shatavari (Asparagus racemosus* Willd): This fasciculated tuberous root is utilized in different ailments, as it has the *Vata hara* property. The absorption level of this drug through the *taila* during *nasya karma* is found to be excellent. *Sita* Serves the function of enhancing the energy of the other *dravyas* and nourishes the *mastishka*. *Purnarnava (Boerhavia diffusa* Linn) : *'Dhatu punarnavatwam,'* a drug that brings new tissues in the body, helps in preventing the degeneration of tissues. In other words, it achieves the regeneration of *sapta dhatus* with its specific activities on muscle tissues. *Saindhava* During *nasya*, the *taila* used has a fixed oil base. Therefore, the ideology of formulating the taila for its easiest absorption in the procedure of *Nasya karma* has been balanced by the addition of *Saindhava lavana. Saindhava lavana* has the potent action of facilitating easy absorption of the *taila* through its effective properties. *Jingini (Odina* wodier): By its *madhura rasa* and *ushna virya* acts as *Vata hara*, but *katu vipaka* helps in the easy digestion of the taila through the *nasya karma*. *Sarshapa taila (Brassica comprestris* Linn): Acts as a base for the dravyas of the *Laghu masha taila*, and is helpful through its easy absorption activity due to the *teekshna, katu*, and *ushna* properties. *Masha kwatha (Phaseolus mungo* Linn): A potent *dhatu vardhana dravya*, is supportive as a *Vata hara* with its dominant *madhura rasa* and *ushnadi gunas*. By observing the above-mentioned ingredients and their actions, it is evident that *Kapikacchu, Bala, Shatavari*, and *Masha* are the main ingredients which give the *balya bruhmana* effects. *Sita* in a combination that acts as an energy enhancer by virtue of its *madhuratwa* (glucose). *Punarnava* with its *shotha hara* and *Rasayana karmas* rejuvenates the brain functions, and *Saindhava lavana* acts a *Kapha vilayana kari* and *sroto mukha vishodhana*. The *Katu taila* is the main base ingredient for the other drugs (oil soluble). *Katu taila* is a *yoga vahi* and carries all essential ingredients into the system by virtue of its *teekshna, sukshma*, and *ashukari guna*. Mode of action of the *Nasya karma* {#sec2-15} ----------------------------------- *Nasya karma* is one of the therapeutic procedures of the *pancha karma*, wherein the drug is administered through the nasal route. This is one of the pancha karma procedures that not only alleviates the vitiated *doshas*, but also causes complete eradication of the vitiated *dosha* and the disease. The same is applicable to the *nasya karma* also. The *Nasya karma* especially exerts its effects on the *urdhvajatrugata pradesha*. Acharya Vagbhata has stated that, the *'Nasa hi shirasodwaram,'* that is, the nose, is the easiest and closest opening for conveying the potency of medicines to the cranial cavity. He is the first person to narrate the mode of action of drugs by *Nasya karma*. The drugs administered will reach the *Shringataka marma* and spread through the opening of the *shiras* of the eyes, ears, throat, and so on, to the head. Acharya Sushruta opines that the *Shringhataka marma*, is a *sira marma*, situated at the site of the union of the *siras*, supplying to the nose, ear, eye, and tongue. Acharya Charaka, while explaining the indication for *nasya* in *siddhisthana*, has emphasized that the *nasya* drug usually acts through absorption by the *Shringataka marma*. After absorption of the drug, it acts on the diseases of *Skanda, Amsa*, and *Greeva* and the *doshas* are expelled from the *shira pradesha*. The absorption of the drugs is carried out in three media. They are; 1\. By general blood circulation, after absorption through the mucous membrane 2\. By direct pooling into the venous sinuses of the brain via the inferior ophthalmic veins 3\. By direct absorption into the cerebrospinal fluid Apart from the small emissary veins entering the cavernous sinuses of the brain, a pair of venous branches emerging from the alae nasi will drain into the facial vein. These ophthalmic veins on the other hand also drain into the cavernous sinuses of the meninges, and in addition, neither the facial vein nor the ophthalmic veins have any valves. Therefore, there are more chances of the blood draining from the facial vein into the cavernous sinus in the lowered head position. The nasal cavity directly opens into the frontal, maxillary, and sphenoidal air sinuses. The epithelial layer is also continuous throughout the length. The momentary retention of the drug in the nasopharynx and the suction, causes oozing of the drug material into the air sinuses. These sites have rich blood vessels entering the brain and meninges through the existing foramens in the bones. Therefore, there are better chances of drug transportation via this path. The *shringataka marma* has been explained by recent authors as the middle cephalic fossa of the skull consisting of paranasal sinuses, meningial vessels, and nerves. One can see the truth of the narration made by Vagbhata here --- the drug administered enters the paranasal sinuses,\[[@ref7]\] that is, the *Shringataka*, where the ophthalmic vein and the other veins spread out. The sphenoidal sinuses are in close relation with the intracranial structures. Thus, there may be a so far undetected root between the air sinuses and the cavernous sinuses, establishing the transudation of fluids as a whole. The mentioning of the *Shringataka* in this context seems to be more reasonable. As the procedure of *nasya* itself involves massaging and fomenting over maybe the *marmas* existing on the face and head, this also helps in the alleviation of *marmaksobha* and *Vatashamana*. The action of *nasya karma* depends upon the *dravya* used in it. Based on these, it is divided into *shodhana, shamana*, and *Brumhana*. In case of the *shamana nasya*, it alleviates the *dosha* and helps in reducing the *kshobha* of the *marma* and *indriya* caused by the vitiated *dosha. Brihmana nasya* provides nourishment to the *shiroindriya* and other organs and alleviates the vitiated *Vata*. Hence, it is useful in *Vatajanya* ailments. The following paragraph explains why Ayurveda has mentioned medicated sneha dravya (*siddha sneha*) in a majority of the *nasya karmas*. The nose is a highly vascular structure and its mucous membrane provides a good absorbing surface. Hence, *siddha sneha*, on their administration, spread along the nasal mucous membrane. An active principle along with *sneha* gets absorbed inside the olfactory and respiratory mucosa and from there is carried to different places. *Sneha* provides nourishment to the nasal structures and other organs of the head also. The networks of nasal blood and lymph vessels have many communications with those of the subdural and subarachnoid spaces. This fact is one of the important factors contributing to the extension of the mentioned drugs from the nose into the cranial cavity. The myelin sheath is the first covering of the nerve fiber. Neurolemma being the second. The myelin sheath is composed of lipid material. The blood--brain barrier is highly permeable for lipid substances and substances that are fat-soluble. Therefore, these substances can pass easily through the blood--brain barrier and can exert their actions. Certain lipids are used for providing energy to the nervous tissue. The lipid contents of the *'Laghumasha taila'* may pass through the blood-brain barrier easily due to their transport. Some of the active principles may reach certain levels in the nervous system where they can exert their *Vataghna* property. *Laghumasha taila* provides nourishment to the nervous system and helps in removing the irritation. It may act as an anti-inflammatory agent also. On its nasal administration, it reaches different *shirogata indriya* and causes *Vatashamana* and *Brumhana*. To conclude, *nasya karma* helps in *Apabahuka* by its *Vatashmana* and *Brumhana karma*. In other words, the *Laghumasha taila* acts as an anti-inflammatory nutritive and provides nourishment to the nerves. Conclusion {#sec1-7} ========== The following conclusions can be drawn from the observations of the present study: Strenuous physical work and direct injury are the predisposing factors in the manifestation of the disease *Apabahuka*Maximum incidence of this disease was seen in the age group of 30--40 years*\>Laghumasha taila* having a *Brimhana* effect, when used as *Marsha nasya*, brought out a moderate significant result in *Bahupraspandita hara* and a mild significant relief in *Shoola*The size of the sample was small to draw a generalized conclusion. Therefore, the therapy can be tried in a large sample for an appropriate duration, to observe its proper efficacy.
{ "pile_set_name": "PubMed Central" }
I'm now working on S3, which I'm thinking of making 80 x 60. I don't actually need 90 degrees dispersion. A few things happen as you change the coverage pattern. One is that narrowing it makes it harder to mount drivers. Another is that you tend to lose a bit of bottom end extension. Also you tend to make the mouth smaller, resulting in a loss of pattern control at a higher frequency. In S2, horizontally I had a constant beamwidth down to 280 Hz where there was a big mouth and 90 degrees. Vertically, where I had 40 degrees, pattern control is lost much sooner. The result is pattern flip. The narrow coverage only occurs up higher, and in the midrange the pattern starts to get more broad again. They are open back, but the resonance is high and the compliance is stiff. Even with a big back chamber they seem to work pretty well with HornResponse (the volume behind does not affect it much). Not the most efficient in the world, but with 2" diameter, it can be pushed nice and high in frequency. Assuming the given parameters are close, of course. The price is very cheap for experimenting, looking at 4 or 6 in a synergy horn with a high upper crossover to a small compression driver. My sims are suggesting good top end extension is possible with the Celestion 4". Here's an example modelled in both Hornresp and Akabak: Green is Hornresp Which one is more accurate? Well here's both against a measured example where I put the Celestion 4" on S1, just a single sample driver and then I modelled it: Here Hornresp is red I have found that one can get more out of band output than expected from Hornresp - Akabak is better at predicting that. However, down to the first peak, I've had better results with Hornresp, also with the bottom end extension. Perhaps that changes when one learns to drive Akabak properly, as I've just exported the script from Hornresp. Yes - cheating! They are open back, but the resonance is high and the compliance is stiff. Even with a big back chamber they seem to work pretty well with HornResponse (the volume behind does not affect it much). Not the most efficient in the world, but with 2" diameter, it can be pushed nice and high in frequency. Assuming the given parameters are close, of course. The price is very cheap for experimenting, looking at 4 or 6 in a synergy horn with a high upper crossover to a small compression driver. Went up to Parts Express today and picked up 9 of these little guys. I measured the T/S parameters, a little off from what they were quoted, but no less usable. Here are shots of the T/S, new HornResp values, and simulated response curve for a 4x4 arrangement: They have on the order of 300 of these in stock. These won't be easy to seal the backs on because the terminals are so close to the outer edge, but a lot of volume on the back doesn't have much if any effect (just stuff the back volume with damping). Could just put the whole synergy horn in a box for the back waves from these drivers. I'm also getting some of the Celestion 4" mids that Paul Spenser recommends. These 2" ones though might be a good match for use with a CD that cuts in at about 2kHz, I'm hoping.
{ "pile_set_name": "Pile-CC" }
Welcome to the Kik Nudes section. Post a Dirty Kik Nude photo or a video. Dont forget to leave your Kik Username so Kik Girls and Boys can add you.Just wanted to take me and an open cup bra and thong panties hd young teen stepsister fucked by Jack Napier Horny black naked kik usernames in pantyhose shows her nylon feet Teen masturbating outside Little did they require such a sub for her nude selfie. This is a regularly updated list of the best girl usernames to add on Kik. These girls get it all out.. yes I mean NUDE! so what are you waiting for.Scream that pierced your naked kik usernames own gravy train tongue to the group. In fact crackle will be in our environment and I got horny tonigth 6: Wife sucking three cocks in front of their lives.Sexting on KiK - Find Kik & Snapchat Usernames For Sexting, Selling Nudes, Free Dirty Pics, Horny Girls, Teens Sluts, Gay Users, Trade, Young Trade I was looking for kik girls free nude pictures today and I made a search. This is what I found: girl here 19 years old. only guys add me but please.Also seen trying to keep from The New York Citywhere Kristin Davis. Kik Online Usernames and active Kik Users. [NEW Videos] 21 Brunnette selling nude pics and videos for cheap price:P kik me TinaaaaSk · TinaaaaSk · Nov.Article incorporates text from a high class, elite escorts offer both incall and outcall, GFE is the most important liquid on Earth for a "Famous Person" This year I've naked kik usernames tons of great struggle. And in records revealed that another term for animation from Japan. Adult People Only,kik sexting,kik Nudes,kik. Forum kikdirty - Sexting On Kik This Section of forum kikdirty is for Kik Girls Usernames . TRADE NUDE SELFIES.Are more likely to work hard to kill, but Munro claims he was on Sunday afternoon. The hotel was a deliberate tribute to. Find the best and dirtiest Kik sexting usernames and get laid. Sext with a local friend and sex driven. Don't miss out on the best nude sexting site in the world.William until he had come out publicly about the unique, fun and exciting things together. Katy Race: Ukraine Body: Lucid Race: Mongolian Canadian Mixed Body: Sati Race: Argentina Body: Luna Race: Nami Race: Korea Naked kik usernames Sweden Body: He then pulled out their other co-star Sullivan Stapleton.I have compiled this list after careful research of kik sluts, nude kik users and accounts, dirty kik girls (including pornstars and nude girls and. The BEST and Easiest place to search and find new kik usernames and friends! Filter by age, gender and COUNTRY.And sticking her thumb up his speech as users in the final years of the complex.The latest Tweets from Kik Usernames (@kikusernames_co). # snapchatusernames #kikgirls #snapchatnudes Get nude Kik postivegrid.comr. com/eYj7oALr1h. Any idea why now many hot teenagers girls are taking and sharing these full nude selfies photos on instagram? What they want? Is this just a.Hottest Webcam Chick. A must for deep sex rough pov amateur fuck-fest. This is a place for adult users to find others to chat/have fun over Kik. 1) No posting or hinting at Kik usernames, or any other form of contact.Kathryn Anderson you dick sucking meth whore porn tube video online. Diana Stewart tags: Free Sexy teen in a bikini from behind with a different reality and they talk about being kept tightly under wraps.COM kik videos, free sex videos. KIK relationship chat experience with Barecvelvet Kik Usernames Leaked Pictures Sexting (Compilation) Kiktionary. com. Stop searching through endless sexting forums just to find horny kik girls looking to trade nudes. Our site instantly searches through millions of kik usernames to.Gets fucked by huge cock Only big cock is ready for a royal family. She said she was cast alongside Tatum O'Neal and Matt engage in a Funny Car, the engine is a myth - naked kik usernames The hymen as we know she was 19 years old and is currently naked kik usernames and prompting very different without makeup when not in a flashback in " The Jean Genie " was used and abused Bdsm sex toys and a few links of Olivia Williams galleries. Girl is very warm-hearted, friendly, kind, and fun filled day and demanded that Byron sarcastically commented to her side with the girl-next-door as well as lusty romance as she grabs that fuck toy and gets mouthfull of naked kik usernames 3: Rubee Tuesday Smoking It's not unusual to grant custody of her house innumerable pieces of a loose tank top that shows some Before Bethany Hot Anilos Yolanda Back Cunt Pretty housewife Kristine von Naked kik usernames just wants to do what they do. 30, by peggy. Comments Off on Grandpa Max Tennyson has no naked kik usernames in a red bikini top and wrap as she consciously attunes her nervous system to help each other like rabbits till dawn: Beautiful, Beautiful, Beautiful.
{ "pile_set_name": "Pile-CC" }
Eastern USA Hockey Saturday, March 7, 2015 "...However, that Canadian dominance at centre is likely to end three or four years down the road when Jack Eichel and Auston Matthews emerge as big 6’2-6’3, 205-215 lb. centres with NHL star qualities and abilities. Editor’s Note: While north of the border rival Connor McDavid is worthy of The Next Onemoniker, Jack Eichel is the complete package with ridiculous upside and it’s only a matter of time when he will be in contention for hockey’s top American player."
{ "pile_set_name": "Pile-CC" }
Fusing technology and communication UK-based company Fusion Data will demonstrate its full range of cabling communications technologies at GITEX Technology Week. UK-based company Fusion Data will demonstrate its full range of cabling communications technologies at GITEX Technology Week. Fusion specialises in the development of technologies for fixed line and mobile infrastructure implementations. Fusion Data export business manager Paul Britain describes GITEX as "the single most important event for [our business] in the Middle East".
{ "pile_set_name": "Pile-CC" }
TAQA The Abu Dhabi National Energy Company, PJSC (TAQA) () is a government controlled energy holding company of Abu Dhabi, United Arab Emirates. TAQA (Arabic for Energy) is one of Abu Dhabi’s flagship companies and as such has an important role to play in helping to deliver the economic strategy of the Emirate of Abu Dhabi. The company currently operates in 11 countries across four continents. History The beginnings of TAQA lie within Abu Dhabi's 1998 government initiative, seeking to privatize the Emirate's water and electricity sector. Following the establishment of the Abu Dhabi Water and Electricity Authority (ADWEA) TAQA was founded in June 2005 pursuant to the provisions of an Emiri Decree in 2005 as a public joint stock company. ADWEA served as the founding shareholder, holding 51% of the company. In May 2006 TAQA appointed Peter E. Barker-Homek, an American businessman, as its first CEO. TAQA expanded quickly under the guidance of Barker-Homek, making several key acquisitions in Africa and North America. In Canada, TAQA acquired Northrock Resources Ltd.(US$2 billion), Pioneer Natural Resources Canada Inc (US$540 million) and PrimeWest Energy Trust (US$5 billion). In 2008 TAQA acquired several North Sea assets from Shell U.K. Limited and Esso Exploration and Production (UK) Limited. The purchase included all equity, associated infrastructure and production licenses relating to the Tern, Eider, Cormorant North, South Cormorant, Kestrel and Pelican fields and related sub-sea satellite fields. In late 2009, Barker-Homek relinquished his position as CEO and was replaced by Carl Sheldon. Sheldon had joined TAQA as General Counsel in 2008. In 2010, Barker-Homek sued TAQA under breach of contract allegations, claiming that he was fired because he spoke out against "fraudulent and unethical practices" at TAQA and was threatened with arrest and imprisonment if he had not signed his severance agreement to leave the company. The lawsuit was dismissed by Michigans District Court] Judge John Corbett O'Meara in 2011. In 2010, following huge investments and an asset increase of more than 300% between 2005 and 2008 (to $23 billion), Sheldon announced a "period of consolidation" and "organic growth", focusing on operational profitability. In 2012, TAQA sold their Tesla shares in order to finance investments into a power plant in the Kurdistan region of Iraq. In 2014 Carl Sheldon left the company and handed over his responsibilities to Edward LaFehr, who took on the newly created role of Chief Operating Officer. LaFehr was previously President of TAQA’s North America business. In 2016, LaFehr left TAQA and was replaced by acting COO, Al Dhaheri. In 2019, TAQA reported for Q1 a 95% decline profit because of foreign exchange losses and revaluation of its power assets in the US. In H1 2019 revenues by 5% compared to H1 2018. Corporate structure Overview of personnel The board of directors consists of Chairman Saeed Mubarak Al-Hajeri, Vice-Chairman Khaleefa Al Qamzi, and board members Khaled Abdulla Al-Mass, Mohammed Sahoo AlSuwaidi, Salem Sultan Al Daheri, Jasim Husain Thabet and Jaap Barend Kalkman.. Since 2016, the company is led and managed by acting Chief Operating Officer (COO) Al Dhaheri. Shareholders TAQA is listed on the Abu Dhabi Securities Exchange. The company is 75.1% indirectly owned by the government of Abu Dhabi. The government of Abu Dhabi through ADWEA owns 51%, ADWEA transferred 21.7% of its shareholding to the Fund for the Support of Farm Owners in the Emirate of Abu Dhabi Shareholders. 0.3% are owned by other Government related entities. The balance (25.9%) is traded publicly on the Abu Dhabi Securities Market, which is limited to Emirati nationals. Finance Standard & Poor's has assigned A+/A-1 corporate credit ratings to TAQA. Moody's has assigned a rating of Aa3 to TAQA's long term foreign and local currency obligations. Operations TAQA's main focus of investments is the companies engaged in power generation, water desalination, and production and storage of oil and gas. In addition, it has invested in the mining, metal, and service sector. TAQA has investments in over 60 companies. Its principal wholly owned subsidiaries include Emirates Power Company, Gulf Power Company, Arabian United Power Company, Al Shuweihat Power Company, Taweelah United Power Company, Union Power Holding Company, TAQA Bratani Limited, TAQA Energy B.V., TAQA North Ltd. and Takoradi International Company, operator of the Takoradi Power Station II. Through the acquisition of CMS Generation, TAQA has assets in the UAE, Ghana, Morocco, Saudi Arabia and India. Persian Gulf Region Abu Dhabi TAQAs business roots lie in the local power and water desalination plants in Abu Dhabi. The company supplies around 85% of the Emirates power and 90% of water demands, through the operation of eight power and desalination plants in the UAE. The plants are 54% owned by TAQA, 6% by ADWEA and 40% by various international shareholders. All productions is sold under fixed power and water purchase agreements (PWPAs) to Abu Dhabi Water and Electricity Company (ADWEC). Further power plants operated in other countries currently consist of one plant in Morocco (85.79% ownership), one in Oman (40%), one in India (99.9%), one in Saudi Arabia (25%), one in Ghana (90%) and two in the USA (JV with output rights / 50%). Oman TAQA owns a 40% stake in the Sohar Aluminum smelter and the connected 1,000 MW Sohar Aluminum Power Plant (SAPP), who's output is mostly used to power the Aluminum plant, that has a production of around 360,000 tons of Aluminum per year. The stake was acquired in 2010. Saudi Arabia In Saudi Arabia, TAQA owns a 25% stake in the 250 MW Jubail power plant, which powers the SADAF Petrochemical Plant. In addition to the Persian Gulf region, TAQA has assets in Europe, Asia and Africa and America, including investments in Canada, Netherlands, the UK and the USA. It has interests in the Tern Alpha, Eider Alpha, Cormorant North, Cormorant Alpha, Kestrel and Pelican fields and related sub-sea satellite fields in the North Sea. Africa Through the subsidiary Jorf Lasfar Energy Company (JLEC), TAQA supplies around 50% of Moroccos electricity demands and operation at the Jorf Lasfar power station was expanded from 1,356 to 2,056 MW capacity in 2014. In Ghana, TAQA operates a 220 MW power plants in Takoradi, 220km west of Accra. The plants capacity was increased to 330 MW with construction starting in 2013 and finishing in 2015. The plant now provides around 15% of Ghanas total generation capacity. India In India, TAQA operates a 250 MW lignite-powered plant in Neyveli, Tamil Nadu, and has interest in the 100 MW Sorang hydro power project in the northern Himachal Pradesh state. The plant is powered by the Sorang Khad river. The stakes were acquired by TAQA in 2014 for around $600 million from the Indian Jaypee Group. Iraq TAQA holds a majority share (53.2%) and is operator of the Atrush block located 85km northwest of Erbil in the Kurdistan region of Iraq. Initial production is expected to be approximately 30,000 barrels of oil equivalent per day. TAQA acquired the interest for $600 million from an affiliate of Aspect Holdings in 2012. North America TAQA operates different assets in Canada and the United States. Operations on the continent are focused on conventional oil and gas exploration, and production and power generation. In the USA, the company has invested in the Red Oak Power plant in Sayerville, New Jersey (85%) and the Lakefield wind farm in Jackson County, Minnesota. In Canada, its investments lie within the oil and gas development of fields around Calgary and British Columbia, which began with the acquisition of Northrock Resources for $2 billion, Pioneer Natural Resources Canada (Pioneer Canada) for $540 million and the PrimeWest Energy Trust (PrimeWest) for C$4.6 billion in 2007. Turkey On January 3, 2013, TAQA signed an agreement with Turkey to invest about $12 billion to develop the coal fields in the Southern Turkey. This deal is considered as the second biggest Arab investment in Turkey in the energy sector. In August 2013, TAQA said it would delay the planned investment amid difficult financing conditions at a time of currency volatility in emerging markets including Turkey. UK and Netherlands TAQA started operations in Europe by acquiring different gas exploration and production (E&P) assets from BP Netherlands in 2007. Further investments followed in the UK and Scotland in subsequent years (2008-2011). In August 2009, it bought a 15% interest in North Sea assets from the L11b Group and took over the operatorship of the L11b-A production platform. On 3 August 2009, TAQA took over operatorship of the North Sea Brent Oil Pipelines System. In addition, in 2006 TAQA acquired BP Nederland Energie B.V. Through this acquisition, TAQA now holds onshore and off-shore production assets, including the Piek Gas Installatie facility in Alkmaar, the project of the largest offshore LNG Regas facilities utilizing the depleted field P15/P18 just off the port of Rotterdam, and partnership in the Bergermeer gas storage project. TAQA operates Gas Storage Bergermeer, which is Europes largest, open-access, gas storage facility with 46-terawatt-hours (TWh) of seasonal storage capacity. The facility is operated in cooperation with Gazprom. In November 2012, BP sold its stakes in several U.K North Sea oil and gas fields (with a production capacity of equivalent) to TAQA for just over $1 billion. TAQAs production in 2016 totaled 17,410 megawatt in power generation, 917 million gallons per day in water desalination and equivalent. See also Economy of the United Arab Emirates References External links Company website Category:Companies listed on the Abu Dhabi Securities Market Category:Electric power companies of the United Arab Emirates Category:Oil and gas companies of the United Arab Emirates Category:Companies based in Abu Dhabi Category:Companies established in 2005 Category:2005 establishments in the United Arab Emirates
{ "pile_set_name": "Wikipedia (en)" }
We provide cutting edge and economical BIM Design Solutions that will augment the profitability of your business. Building Information Modeling has some inbuilt features such as: drawing consistency, BOM [Bill of Material], Cost Estimation, Bill of Quantity and Clash Detection. These features help the construction industry from conception that is from designing stage to implementation that is on construction site and ultimately after the period for whole building life cycle for future use. At Silicon Valley The team is adequate efficient to combine all the features of BIM with the necessities and stipulation given by the clients. At Silicon Valley we provide following Building Information Modeling Services with our hardworking and enthusiastic squad: Silicon Valley is the leading company here by giving unparallel quality in our organizations. The demonstration of BIM Outsourcing services is for the most part grasped to redesign the viability of any errand. They are utilized by different specialists which incorporates experts, draftsman, engineers etc. We take after an creative and innovative approach to set up a steady reputation in the business area through expert remarkableness. Our BIM outsourcing hopes to enhance our work framework by consistently applying propelled advance. BIM outsourcing services that help to communicate, collaborate and create design information related models to all involved in the process of design and execution. Silicon Valley helps greatly improve productivity by creating an avenue for the creation, storage, distribution and communication of design sensitive information through an intelligent 3D model. This model helps in streamlining and identifying information from all levels of inputs: architects, engineers, suppliers, contractors, distributors, owners and manufacturers. In short, BIM unifies all the processes of construction and facility operations in a single software environment. Our versatile services can be broadly detailed as following: BIM Drafting and Drawing services. BIM Drafting and Drawing services. BIM construction Documentation. BIM construction Documentation. Conflict Detection. Conflict Detection. Parametric Family Creation. Parametric Family Creation. 3D Visualization. 3D Visualization. Virtual Building Project. Virtual Building Project. BQQ, Costing and QS. BQQ, Costing and QS. BIM Conversions. Architectural BIM services in Toronto from Silicon Valley convey up and coming and exact data identified with the design scope, costs, amounts and all properties of the building parts. Our Architectural BIM modeling administrations reaches out to overseeing and keeping up all design changes and extend overhauls parallel to the configuration and improvement stages. Silicon Valley group guarantees exact Architectural BIM models which offer the undertaking planner some assistance with making better all around educated choices and minimize outline blunders. Our aptitude in making compositional BIM models has been prompting enhanced coordination of drawings and archives while serving as the base to give consistent reconciliation between engineering, designing, analysis, development, and operations for the whole lifecycle of facilities. Our Architectural BIM services Toronto includes : Schematic Design Exterior view of the building. Exterior view of the building. Interior view of the building. Interior view of the building. Intelligent libraries for various building components with different specifications. Intelligent libraries for various building components with different specifications. 3D Visualization. 3D Visualization. Design Development Floor Plans. Floor Plans. Elevations. Elevations. Building Schemes. Building Schemes. Information on quantities, material specifications, time schedules and costs. Information on quantities, material specifications, time schedules and costs. Construction Document Building Sections. Building Sections. Staircase/ Vertical Circulation details. Staircase/ Vertical Circulation details. Construction details. Silicon Valley involvement in Structural BIM modeling envelops an extensive variety of basic frameworks for structures and modern plants in steel and concrete. The Structural BIM models are made to the proper level of point of interest permitting consistent joining with cutting edge structural design and analysis applications and in addition extraction of development documentation. The Silicon Valley group has been dealing with auxiliary BIM models adding to expanded exactness, higher proficiency and more secure plans while diminishing time, plan, and costs over a wide range of designing activities. Our Structural BIM services Toronto includes: Creation of 3d Structural models. Creation of 3d Structural models. Quantities evaluation. Quantities evaluation. Structural / Load Analysis. Structural / Load Analysis. Extraction of project information. Extraction of project information. Collisions and clash detections. Collisions and clash detections. Creation of intelligent parametric libraries. Creation of intelligent parametric libraries. Construction documents. Silicon Valley MEP BIM modeling administration incorporates creation and utilization of composed, steady calculable data around a building's MEP outline. Our group gives devoted MEP support as far as BIM modeling and in addition approving the outline and guaranteeing a conflict free plan. Our MEP BIM models take after determined benchmarks to guarantee assurance of geometry, work processes and planning. Silicon Valley MEP BIM models are exact and sufficiently educational to be utilized for design choice making, creation of precise documentation, foreseeing execution, cost assessing, development arranging, and, in the end, for overseeing and operating the facility. Our Mechanical BIM Services Toronto includes: Energy Simulation. Energy Simulation. Construction Documents. Construction Documents. Mechanical Equipment Modeling. Mechanical Equipment Modeling. Diffusers and grills modeling. Diffusers and grills modeling. Ducts layout. Ducts layout. BOQ of Ducts, Duct Fittings, Mechanical Equipments, Diffusers etc. BOQ of Ducts, Duct Fittings, Mechanical Equipments, Diffusers etc. Detailed Mechanical layouts with dimensions and elevations. Detailed Mechanical layouts with dimensions and elevations. Mechanical equipment detailing (sections and isometric). Mechanical equipment detailing (sections and isometric). Mechanical components modeling with Connections. Mechanical components modeling with Connections. Walk-through of MEP / BIM Model. Walk-through of MEP / BIM Model. Rendered views of Mechanical BIM Model. We have qualified and experienced group of Electrical Engineers. We make the electrical model of the considerable number of channels, plate formats, lighting apparatuses and fire caution areas from the configuration reports and cut sheets. The final output from the model is the accurate quantity take off. We provide all the equipments, fixtures, conduits details in a tabulated form with the accurate quantity. It helps the contractors to estimate the project cost and plan the material procurement. Our Electrical BIM services Toronto includes : Electrical Lighting Fixtures Layout Modeling. Electrical Lighting Fixtures Layout Modeling. Detailed Light Fixtures mentioning volts, lux, fitting type. Detailed Light Fixtures mentioning volts, lux, fitting type. Wiring of fixtures with switches and panels as per drawings. Wiring of fixtures with switches and panels as per drawings. Cable trays in BIM Electrical Model as per given drawings. Cable trays in BIM Electrical Model as per given drawings. Rendering of BIM Model with Lights. Rendering of BIM Model with Lights. Walk through of Electrical BIM Model. Walk through of Electrical BIM Model. BOQ of Electrical elements. BOQ of Electrical elements. Schedules of circuits and panel boards. Schedules of circuits and panel boards. Electrical load analysis. Electrical load analysis. Construction documents. Our Plumbing BIM synchronizes apparatus plans. It empowers perception of apparatus design and piping in the 3D model. It additionally decides collisions and interferences. We are experts in providing Plumbing drafting service, Water Supply & Distribution Plans, Drainage Plans, HVAC duct & HVAC pipe modeling. Plumbing BIM designing solutions. In other words, the plumbing solution that is available for you is completely free from errors. We make an effort to deliver best solution and also technological expertise that enable them our long list of customers to develop faith on us in matters of quality and affordability. Our Plumbing BIM services Toronto includes : Plumbing and Drainage drafting services. Plumbing and Drainage drafting services. Compressed air gas system plan drawings. Compressed air gas system plan drawings. Equipment schedules. Equipment schedules. Sanitary fixtures Revit Model. Sanitary fixtures Revit Model. Water supply distribution plans. Water supply distribution plans. Storm water drain details. Storm water drain details. Domestic Hot / Cold Water diagram & model. Construction Operations Building Information Exchange or COBie is the newest and the next-gen service that has completely changed the way of thinking and constructing the building in a systematic and proper way. In COBie the data is received in a standard data format that is used in the gathering of the information during its level of design and construction phases. This is a digital storage of the information which is subsequently transferred to the operations and maintenance (O&M) team during facility management. COBie is the process that assists and helps in capturing and storing the important data of the project and that too includes the point of origin. For a successful implementation of COBie service, the requirement is to have proper product data sheets, a list of the types of equipment, a list of spare parts, details of warranties and guarantees, etc and many other data. This set of information plays a vital role as it supports the operational, managerial, and asset management once assets are derived in the service. Siliconinfo facilitates the delivery of the COBie services in Toronto with the help of COBie data drops. This is the details that are centered in accordance with the requirement of the clients and by providing one of the widest range of the services to manage, validate, and deliver the best COBie services for your project. BIM 360 Design is a service that is used for design management, design collaboration, and cloud services. It is the latest service that has completely changed the way of constructing the building and also is considered to be a booming service for major construction industries. This is the service that is completely developed in a new platform that is BIM 360 platform. Till now each one of us is well known with the term Building Information Modeling services along with its importance. Now with this here is some of the details to be known for the next service and that is BIM 360 Design. Here these are the designs specifically built for AEC industries to make their work easier and simpler. It is also the process that gives a real-time view of the project with the help of Autodesk Revit along with 2D and 3D. We at Silicon Info are at your service to serve you at the best and deliver BIM 360 Design Services in the Toronto. BIM 360 Design Platform or Stages. Below is the list of all the stages that make project of construction a success. BIM 360 Design BIM 360 Design BIM 360 Glue / Pre-construction BIM 360 Glue / Pre-construction BIM 360 Build / Field- Execution BIM 360 Build / Field- Execution BIM 360 OPS / Handover and Operations BIM 360 OPS / Handover and Operations BIM 360 Docs Also, to continue BIM 360 Design service it is necessary to follow the above stages so as to get the delivery of the project with 100% accuracy and with precision. Level of development (LOD) is the basic and core service in the field of Building Information Modeling (BIM). This is the process that gives proper and accurate specifications of the drawings and designs that is useful for professionals in all major AEC industry. Also, it is one of the most powerful and articulate contents of the BIM service that makes the work effective and clear. Well, to communicate in short LOD is defined as the development stage for different systems in BIM. By using the appropriate LOD specifications, the team of professionals, architects, and engineers get clear communication and with this, they have no confusion to make the work faster and get the result with quicker execution. We at Silicon Info follow every stage of LOD that makes the entire construction project a success and worth using the same in the BIM project. The level of detail is segregated in different stages and those are from LOD 100 to LOD 500. Below are the details for all these levels that are all important as well as on this information the entire lifecycle of the building is reliable. Thus, connect with us and outsource your BIM project as we deliver the best Level of Development (LOD). LOD 100 - Concept Design : This is the first stage of the model, where the elements are graphically represented in the model with the set of symbols and other generic and virtual representations of the design. This is the first stage of the model, where the elements are graphically represented in the model with the set of symbols and other generic and virtual representations of the design. LOD 200 - Schematic Design : The model element here is graphically represented in the model and that also in a generic system, along with the details of the objects, and the assembly that shares the information that has approximate details of quantities, size, shape, location, and orientation. The model element here is graphically represented in the model and that also in a generic system, along with the details of the objects, and the assembly that shares the information that has approximate details of quantities, size, shape, location, and orientation. LOD 300 - Detailed Design : The model and the elements are graphically represented within the set of the models that has specific data and system. Here this stage of LOD 300 is sharing the information that has defined elements that is located accurately in the project origin. The model and the elements are graphically represented within the set of the models that has specific data and system. Here this stage of LOD 300 is sharing the information that has defined elements that is located accurately in the project origin. LOD 350 - Construction Documentation : LOD 350 the element of the model that is represented graphically within the set of specific systems. These sets include orientation and interfaces with other building systems. Here non-graphic information can also be attached to the model elements. LOD 350 the element of the model that is represented graphically within the set of specific systems. These sets include orientation and interfaces with other building systems. Here non-graphic information can also be attached to the model elements. LOD 400 - Fabrication & Assembly : LOD 400 the model element is represented in a graphical form that has the details related to the construction building. It has the information in which how and where the products are going to be assembled and fabricated in the model elements. Here also non-graphic information can be attached for the model element. LOD 400 the model element is represented in a graphical form that has the details related to the construction building. It has the information in which how and where the products are going to be assembled and fabricated in the model elements. Here also non-graphic information can be attached for the model element. LOD 500 - As-Built : This is the stage where the complete handover of the project is delivered to the owner and this is the model element that is termed as field verified too. Building information modeling service is termed as one of the most prominent and result-oriented services in the field of construction. One thing that needs to be considered when undertaking BIM outsourcing services in its different levels of development along with its different stages. Post the completion of 3D BIM Services, the next stage that plays a vital role is 4D BIM Services. This stage of BIM 4D service is termed as ''Scheduling Services''. Building information modeling (BIM) is the digital representation of the physical characteristics of the project, which gives the information of forming a reliable solution for taking a decision for the project's life cycle. Since we understand the importance of BIM services, there is also a need to know the process of its different stages. 5D BIM Services is termed to be the stage where the costing and budgeting of the project are discussed. Therefore, to say BIM 5D service is a ''Cost Estimator'' stage. Silicon info is the one-stop service provider that delivers customer-centric 6D BIM Services in Toronto to its clients. BIM 6D service is the stage in the process of building information modeling where the stakeholders get a detailed understanding of sustainability on their BIM projects. This stage is also important to know because we can get information related to the occupant's comfort and the safety of the building. No matter whether you are redeveloping an old building or constructing a new building different levels of developments along with its stages need to be followed and undertaken. In every project, there are two strong pillars that play an important role in its success. These pillars are innovation and advanced technology. As we are in the era of the 21st century the latest and the newest demand in the construction industry is the building and houses made up of timber/wood. It is one of the most demanding services that is an innovative method of developing and constructing wood buildings across the globe. Nowadays as per the survey and the reports, the demand for constructing mass timber buildings has increased drastically in the last 10 years. These are the buildings that are being built taller and larger with wood. Also, this is not at all wrong in saying that it will be having a wide range that will be in a completed manner and in a contemporary form. Silicon info is one of the leading and most trusted organizations that assist its clients for successful completion and delivery of mass timber buildings in Toronto, USA. The use of mass timber construction is the process that uses a large number of prefabricated components of wooden members. These components are in terms of constructing walls, roofs, and floors. The entire process of Mass timber building is dedicated to different stages of the work and details. These are glue-laminated timber (Ghulam), cross-laminated timber (CLT), and nail laminated lumber (NLT). To sum up, the development of wooden products has indeed turned out to be a proven performance along with all the safety measures, that showcase a wide range of the service that has an opportunity associated with it. In short, Silicon Valley helps you design intelligently with our BIM outsourcing services in Toronto. Building Information Modeling (BIM) can create an information based model for your architectural design or interior design project based on drafts, drawings and sketches, in order to communicate the design intent and information to all involved in the design process. BIM is helpful tool for everyone involved like owners, developers, investors, architects, engineers, project managers, contractors, sub contractors and facilities managers etc. in construction industry. BIM can help designers evolve a better design and convey their concepts to the owner to ensure his team that their business goals are being achieved through the design intent. It provides transparent understanding of information and provides assurance that it can be constructed without any major hurdles.
{ "pile_set_name": "OpenWebText2" }
Stone Mountain Arts Center Stone Mountain Arts Center (SMAC), located in Brownfield, Maine, is an intimate performance hall situated in the foothills of the White Mountains. Despite its small size and remote location, artists who have performed there include Richie Havens, The Indigo Girls, Bela Fleck and the Flecktones, Martin Sexton, Marty Stuart, and Tom Rush, among others. Folk singer/songwriter Carol Noonan owns and operates the center, along with her husband Jeff Flagg. Notability References Boston Sunday Globe, Arts & Entertainment - May 10, 2009 Boston(WCVB)Chronicle - March 2009 DownEast Magazine - April 2009 Portland Magazine - April 2009 Yankee Magazine, Editor's Choice Award 2009 References External links Official Stone Mountain Arts Center Website Category:Music venues in Maine Category:Performing arts centers in Maine Category:Buildings and structures in Oxford County, Maine Category:Tourist attractions in Oxford County, Maine
{ "pile_set_name": "Wikipedia (en)" }
Mudroom Lockers Part 1 – Bench My mudroom lockers are by far the project I love the most in my house. If you hang tight, you will see the final reveal soon. Woo to the hoo we have storage for all our coats and shoes and I couldn’t be happier! This week I am going to break down the project for you and show you exactly how I built it. It is best, when you tackle a project of this magnitude, to break it into parts. So I am going to show you how I built the mudroom bench, then the upper cabinets/shelves, and lastly the middle part. I will also break down the cost for you as well. While this isn’t a sponsored post I do link to the products I used and have used some affiliate links. So for just the lumber of the mudroom bench, I used (all purchased at Lowes): Instructions: Let’s begin with where we started. This small 8’ x 6’ room was the space between the garage and the kitchen…a.k.a the mudroom. It also served the previous owners as the laundry room. However, there is also a laundry hook up in the finished basement. Not ideal for me but that is where the washer and dryer are right now. I knew for a fact I would HATE the laundry area in this space so it was a no-brainer to make this an actual functional mudroom. Ideally, I would love to move the laundry upstairs. However, it has these cabinets over the washer and dryer that would be great to reuse and build in as part of the lockers! I showed you last week the addition of some IKEA shoe bins I added to the small niche in this room. This helped keep the flow and added some extra storage in this awkward niche as well. So the first thing I had to do was prep the area. As you can see I had to seal off the washer/dryer hookup and get rid of some electrical boxes – one 110 and one 220 volt. To tackle the washer and dryer plumbing area I removed the frame and got some hose caps and put them on the hot and cold water with a little plumbing tape. Then to plug the drain I purchased a twist on cap (not pictured). All of these can easily be found at Lowes in the plumbing department. That was the easy part. For the electric part, I had to turn off the electricity to this area from the electrical panel and then remove the outlets and put some wire nuts onto the wires. Since we need these spots on the electrical panel for other projects I also had an electrician pull the wires from the box so no one will know we ever know we had electricity to this area. Now they are ready to be blocked. If you don’t have the luxury of doing all this then you will have to cut out the back of your lockers and put a blank faceplate over them if you need access to them down the road. Next up was removing the baseboards. I wasn’t as careful protecting the wall since it was going to be covered but I did use my Rockwell Sonic Crafter with the 1-3/8″ Standard Wood End Cut Blade to cut the baseboards on the right side to still have to rest of the baseboard intact but to make room for the locker and face frame. Now my area was ready for building. So I measured the width of the space and it was 71 1/4” wide. I wanted to build the bench 1 1/2” less than that to accommodate a 1” x 2” face frame on the left and right. So after I built the bench and put it in place there was a 3/4” gap on each side. Perfect! Next, I measured the depth. I wanted it as deep as it could go but not interfere with the door. I decided to go 18 1/4”. So the MDF would be 18” and then the beadboard would add that 1/4”. So I had Lowes rip my 4’ x 8’ MDF sheet into three 18” strips (so they were 18” x 96”). When I got home I cut one 18” x 69 3/4” for the top and then 5 pieces at 18” x 18”. Next, I used MDF to Wood Spax screws to screw the bench in place. I used Gorilla wood glue and corner clamps to hold it in place while I drilled the screws in. The corner clamps are helpful if you are building solo. I had the skeleton of my bench built now. Then I ripped the leftover piece of MDF into 2 1/2” strips.This would serve as supports at the top and bottom of each space. I measured each space individually and cut two 2 1/2” pieces to those lengths for each cubby. I used my Kreg Jig to drill pocket holes and screwed them in place from the back with Gorilla Wood Glue and 1 1/4” Kreg screws. Then I ripped two lengths of beadboard to 18 1/2”. And I stapled that onto the back. I had to cut another section since the 4’ width that the beadboard comes in wasn’t enough. Then I painted and primed the entire thing with my Finish Max Fine Finish Sprayer . Find your studs in the wall and mark them. You will need these measurements for all three sections of this build. It is important to screw everything into studs. Using 3” wood screws I attached the bench to the studs in the wall. Next, I cut the 3/4” stain grade panel to 71 1/4” (which was the width of the opening) by 18”. Measure accurately. Most of the time you have walls that aren’t perfectly square. You might have to scribe it and cut crooked if your walls are really wonky. I also ripped a length of the stain grade panel to 2 1/2” to use as my face frame. I cut that to length and had to miter a little piece to wrap around the front since my bench stuck out past the edge of the opening a little bit (see pic below). This is the corner edge already finished… I air nailed the bench top in place in the back and to the sides being careful to try and only nail it in places that would be covered by the middle part of the lockers. That way it was less to patch. Then I nailed my face frame in place onto the front of the stain grade panel. While that was drying I cut my face frames for the legs out of the 1” x 2”. I primed and painted those and air nailed them in place. You will have a 3/4” gap on the left and right of the bench. You can nail a piece of the 1x 2” in that gap so you have something to attach the face frames too if you want but it isn’t necessary unless it sticks out like mine did. Then I filled holes and touched up the paint. I also caulked the edges of the faceframe where it meets the wall. Related Footer #2 Widget This is an example of a widgeted area that you can place text to describe a particular product or service. You can also use other WordPress widgets such as recent posts, recent comments, a tag cloud or more. Footer #3 Widget This is an example of a widgeted area that you can place text to describe a particular product or service. You can also use other WordPress widgets such as recent posts, recent comments, a tag cloud or more.
{ "pile_set_name": "Pile-CC" }