text
stringlengths 1
3.78M
| meta
dict |
|---|---|
Budget again includes unpopular curb on MID, other deductions
The fiscal 2013 budget proposal President Barack Obama released this week includes proposals to trim the mortgage interest deduction (MID) and other itemized deductions for wealthier households. As in the previous three years, the proposal is expected to attract little support in Congress.
The proposed budget would reduce the value of itemized deductions to 28 percent for married couples with incomes over $250,000 and individuals with income over $200,000. Currently, depending on the tax bracket these households are in, the value of their deductions could be as high as 33 or 35 percent.
The proposal has never attracted sufficient support from either party, and National Association of REALTORS® President Moe Veissi in a statement yesterday said NAR would strongly oppose this or any proposal that would limit MID and other itemized deductions.
“The mortgage interest deduction is vital to the stability of the American housing market and economy,” Veissi said. “We urge the president and Congress to do no harm” to today’s fragile economic recovery. “The nation’s homeowners already pay 80 to 90 percent of U.S. federal income taxes. Raising taxes on them, now or in the future, could critically erode home values at all price levels.”
The budget request also includes a previously rejected proposal to tax the carried interest of general partners in investment partnerships, including real estate partnerships, as ordinary income rather than as capital gains, which is taxed at 15 percent. If taxed as ordinary income, it could be taxed at a higher rate, depending on the taxpayer’s tax bracket.
Analysts have said that this provision is mainly aimed at general partners of hedge funds, but general partners in real estate partnerships could get caught in it unintentionally. NAR in the past has opposed the tax change.
Overall, the budget request, which is just the opening step in a long process in which Congress will develop a budget for passage, envisions fiscal year 2013 spending of about $3.8 trillion. Of that amount, several hundred billion would be new spending for infrastructure, research and development, and other priorities of the administration. The budget envisions cutting about half a trillion dollars from the defense budget, and another roughly half a trillion dollars through tax law changes, including the NAR-opposed curbs to the value of MID for upper-income households. More savings would come from allowing tax cuts enacted during President George W. Bush’s administration to expire for all households, except those earning less than $250,000.
In all, the administration is saying it would cut the deficit by about $3 trillion over 10 years, plus another trillion dollars from legislation Congress passed in August of last year as part of the budget deal to raise the debt ceiling cap.
|
{
"pile_set_name": "Pile-CC"
}
|
– Genevieve San Miguel –
Hi my name is Genevieve San Miguel. I am 30 years old and I live with my beautiful family in gorgeous Albuquerque, New Mexico where the sunsets resemble the color of cotton candy. They are amazing!
Hopeless and broken, those are the two words I would describe myself as before I came to know Jesus as my Lord and Savior at the age of 19. I was lost and going nowhere fast. I was seeking my identity in about anything I could grasp. Longing just to fill the emptiness and the darkness that I felt. I tried it all the alcohol, partying, and guys; just weren’t satisfying the deep longing in my soul. Something had to change or I was going to end up dead or in jail. God was the answer, the answer that I was seeking all along, but, just didn’t know it at the time.
One night I had come home from a very scary night that changed the trajectory my life forever. I had hit absolute rock bottom. I knelt beside my bed and just sobbed. I was in such a bad place. I had grown accustomed to the party life. Drinking had become my vice and I was known as the “party girl”, not a title that I was proud of either. My dad walked into my room as I was crying and asked me a question that I will never forget. He asked me, “how are you doing life on your own”? And thats when it occurred to me that I was trying to do life on my own. I had pushed God so far away and I thought that there was no hope for me, I thought I was too far gone. It was then that I gave my life to Jesus and it was as if in that moment the whole world had been lifted off of my shoulders. I felt peace and relief and all the shame, guilt, mistakes, ugliness, the seeking acceptance, the world and my sins had melted away and I felt hope.
I wished I could say that from there on I had followed Jesus on a straight path but, sadly that is not the truth. I soon fell back into my old ways. My new found identity became more of a performance. I felt like I had to be perfect in order to be used by Jesus. I tried to be “good”. When I failed at this I felt like God was mad at me. I viewed God in such an unhealthy way. I viewed Him as only being happy with me when I was doing the “Christian” duties such as; reading my bible, praying, attending church, being kind, and listening to Christian music but when I failed at these things I felt like He was mad at me and I envisioned Him shaking His finger at me, shaming me.
Fast forward, too when I became a mom to my second son. The moment when I saw his sweet, perfect little face I was overcome with a love that I never knew and it was at that moment when God had reminded me of His love for me. No matter what I did, He took it on the cross. All of it! He didn’t see me as the frail state of being a human but, through a blood-stained filter. The blood of Jesus had been poured out for me and there is nothing I could do that would cause Jesus to love me anymore or any less. His love for us is so overwhelming. Motherhood has definetely been the tool that God has used to remind me of His grace and love.
Here I am now at 30 years old, a wife to an amazing youth pastor, we lead a group of amazing teens in a very poverty stricken area. In a culture that is ridden with drugs, alcoholism, prostitution, sex trafficking, and homelessness, we literally get to be the hands and feet of Jesus. We lead with some incredible people. We are also raising four beautiful world changers, who also happen to be incredible kids.
My heart is for women of all ages to experience freedom in Jesus Christ. Especially moms. I also help lead the group of young ladies in our ministry along with some incredible women of God, teaching these young ladies that their worth doesn’t come from this world, but from Christ alone.
Ephesians 2:8-10 For it is by grace that we have been saved, through faith. And This is not from yourselves, it is a gift from God. Not by works, so no one can boast. For we are Gods handiwork, created in Christ Jesus do good works, which God prepared in advance for us to do.
God has changed a broken girl who sought her identity in this world, into a woman who loves Him. He had refined me through my trials. He uses me to encourage others. One way He does this is through jewelry. He has blessed me with the talent of making faith-based jewelry. I started making jewelry as an out. I stay home with my four kids. and I needed something for myself. So I started making jewelry. What started as a hobby, has blossomed into a ministry. My hope and prayer is that my jewelry is used to remind women that they are fully known and loved by Jesus. I pray that women are reminded to walk confidently in the calling that He has placed in their life, no matter how insignificant it may look to those around us. I pray for revival in the hearts of women everywhere! I truly believe that this starts at home. It starts with you and it starts with me. We can be used to change the trajectory of this generation. We can be used by God to do amazing things! One life can make a difference.
-Verse of the day-
{ John 15:1-4 }
“I am the true vine, and My Father is the vinedresser. 2 Every branch in Me that does not bear fruit He takes away; and every branch that bears fruit He prunes, that it may bear more fruit. 3 You are already clean because of the word which I have spoken to you. 4 Abide in Me, and I in you. As the branch cannot bear fruit of itself, unless it abides in the vine, neither can you, unless you abide in Me.”
|
{
"pile_set_name": "Pile-CC"
}
|
LenovoMoto G5 series is one of the most expected phones, which will be launched at the upcoming Mobile World Congress (MWC) 2017. Motorola has already sent out invites for an event at MWC on February 26 in Barcelona, where the new Moto G5 series will be unveiled. We’ve seen quite a few leaks around the Moto G5, and now noted tipster Evan Blass has confirmed the full specifications of the upcoming phones.
Advertising
Blass shared photos and promotional images of the Moto G5 on his Twitter page (@evleaks). It seems the full specifications of the phone were listed online by e-tailer Ktronix, though the listing was later pulled down.
According to Blass’ report on Venture Beat, the Moto G5 won’t sport a 5.5-inch full HD display like the previous phones: instead it will come in a 5-inch full HD version and a 5.2-inch full HD version, which is called the Moto G5 Plus.
The report on Venture Beat confirms the processor for the phones as well: Snapdragon 625 on Moto G5 Plus, and Snapdragon 430 on the smaller Moto G5, and while RAM remains at 2GB RAM, the G5 Plus will have a 64GB storage option. On the camera front, the Moto G5 Plus gets 12-megapixel rear camera with dual autofocus pixels, while G5 will sport a 13MP rear camera, adds the report.
Advertising
The new report by Blass contradicts earlier claims of a 5.5-inch Moto G5 smartphone. However, the latest press renders resemble the recently leaked rear panel of the Moto G5 smartphone. Last week a post on Weibo claimed the Moto G5 Plus will have a Sony IMX362 sensor 12MP camera, with F1.7 aperture, PDAF support.
The rear panel of the phone was leaked on Weibo, and it had a metal finish. The latest pictures also confirm this, and it looks like Motorola is going for a big design change with the Moto G5 series.
Best Of Express
According to his tweets, Moto G5 will launch at 189 Euro (Rs 13,500 approx) for the 2GB RAM+16GB version, while the 3GB RAM version will be price 209 Euro (Rs 14,800 approx). But the latest report hints, Motorola is sticking with only 2GB RAM on both phones.
Moto G smartphones have typically done well in India in the past. The Moto G4 Plus in particular stood out for its 16MP camera in the under Rs 15,000 price segment. We’ll have to wait and see how soon the Moto G5 is launched in India and at what price.
|
{
"pile_set_name": "Pile-CC"
}
|
Centrifugal cytology of nipple aspirate cells.
Two improvements in the methodology for obtaining and preparing nipple aspirates from nonlactating women are reported. The first is the development and use of a new breast pump with a controllable vacuum and cups of various sizes. The second is the use of centrifugal cytology to prepare the dispersions. Twenty-one of 24 breasts of patients in the age range 30 to 49 years produced cellular dispersions which contained foam cells; of them, 13 contained ductal cells. A comparison of glutaraldehyde and ethanol fixation indicated that the cells appeared substantially the same.
|
{
"pile_set_name": "PubMed Abstracts"
}
|
Dallas Siren Hack Done by Radio, Not Computer – Dallas Observer - lightlyused
http://www.dallasobserver.com/news/dallas-siren-hack-done-by-radio-not-computer-9358087
======
lightlyused
"By hijacking the signal going into the transmitter, the hacker seemingly
managed to trigger all of the sirens at once."
This sentence doesn't make sense, more than likely they figured out the system
needed to trigger the sirens and broadcast it to trigger them. Reminds me of
the old days when all it would take to hack a radio stations remote broadcast
or a drive-thru order was an opened up vhf/uhf ham radio.
|
{
"pile_set_name": "HackerNews"
}
|
Rates of women who are opting for preventive mastectomies, such as Angeline Jolie, have increased by an estimated 50 percent in recent years, experts say. But many doctors are puzzled because the operation doesn't carry a 100 percent guarantee, it's major surgery -- and women have other options, from a once-a-day pill to careful monitoring.
The company says safety is the main reason it will drop the $30,000 surgery, which is considered a last resort for morbidly obese people.
About three in every 1,000 patients die and up to 20 percent of patients return to the hospital for a second procedure, said Dr. Robert Forster, the company’s chief medical officer and vice president for health care services.
There has also been a rise in demand for the surgery, which could cost the insurer about $200 million over the next few years and lead to higher premiums, Forster said.
Elsewhere, Blue Cross & Blue Shield of Nebraska, the state’s largest commercial insurer, has said it also will exclude weight loss surgeries.
The surgery’s popularity has grown because of the success that celebrities such as NBC “Today” weatherman Al Roker and singer Carnie Wilson have had with it.
That has prompted commercialization and the spread of information on how to get around strict guidelines as to who can safely undergo the surgery, Forster said. Doctors with limited experience also are jumping on the bandwagon to take advantage of the high demand, he said.
Forster acknowledged that successful surgery reduces other health problems such as diabetes, but he said some patients encounter new problems. About 30 percent of patients develop nutritional deficiencies such as anemia, osteoporosis and metabolic bone disease, according to the National Institutes of Health.
|
{
"pile_set_name": "Pile-CC"
}
|
Facts of the Matter: Story of Scripture
STORY OF SCRIPTURE
The Word in the World
Pentateuch
For thousands of years the people of God had no full copy of God’s Word. The Israelites of the Exodus had the word of Moses, and the books he was writing. Otherwise it was hearsay. The judges had a couple more books. The kings had the books of Moses up through Samuel.
God commanded Israel that when kings would finally reign:
“…when he sits on the throne of his kingdom, he shall write for himself in a book a copy of this law, approved by the Levitical priests. And it shall be with him, and he shall read in it all the days of his life, that he may learn to fear the Lord his God by keeping all the words of this law and these statutes, and doing them (Deut 17:18-19).
Historical
During the time of the kings the historical books and the wisdom books were pulled together: Ruth, Job, Psalms, Proverbs, Ecclesiastes, Song of Solomon. And the later kings required the prophetical books spoken against them. The more God spoke, it seems, the more people ignored him.
We can’t make a blanket statement that all people neglected the word of God, but the story of Israel is our story. We must draw from it the lessons and message God intends:
“We all like sheep have gone astray.”
Prophets
The prophets warned and Israel blocked their ears, so Assyria took away the northern kingdom. Yet God continued to speak. When Babylon came to take away Judah, the scrolls went with them. In Babylon and in Egypt (those who escaped) the scrolls were collected and compiled into the Old Testament we have today. While in Babylon during the exile and after Jews returned to Israel were added: the exilic prophets Jeremiah (Lamentations), Ezekiel, Daniel; and the post-exilic historical writings of Ezra, Nehemiah and Esther and prophetical writings of Zechariah, Haggai and Malachi. (see graphics below)
Post-exilic Prophets
In other words, by the time they came back to the land and were settled after the decree of Cyrus, they clearly knew God’s expectations for them and had a renewed and more-detailed promise about the rescuer who would come.
Four hundred years of silence later, one voice in the desert speaks:
“Repent, for the kingdom of God is at hand!” and “Behold the Lamb of God who takes away the sin of the world.”
400 Years of Silence
It should have been clear that this message (after that long silence) was the apex. But only some people were caught aware: Mary & Simeon in the birth narrative and James and John in the Baptism narrative.
By the end of the next three years we have a huddled mass of people in an upper room, afraid to open the door to whom a resurrected savior appears. Then everything changed.
Duplicated, Copied, Distributed
The LORD spoke, the church had his Word. Scholars could read it. Even early on scholars would make copies of Scripture for others. Eusebius wrote of his teacher Pamphilus who he gave (not merely lent) scholars copies of the Scriptures, of which he kept an extensive supply. (SOURCE)
But it wasn’t until the advent of the printing press and when the Bible was translated into the spoken language by men like Wycliffe and Luther that the common man finally could have their own copy.
Today
Now the Scripture is as close as our next phone call. Searching for a verse or a topic takes the click of a couple fingers.
Are we any better off than any of these people since the Israelites coming out of Egypt?
|
{
"pile_set_name": "Pile-CC"
}
|
Q:
COUNTA and INDIRECT together
Any help would be appreciated. I have seen the indirect formula used a lot but I'm not sure if I can string together all that I am trying to do here.
I have created within the X column of SS Sales a formula that calculates the data range based on install dates. So 1/1/13 to 4/1/13 may equal (DT14:BL41). The X column gives me this answer depending on dates that change.
I need to use the range determined by cell X2 in SS Sales(DT14:BL41) in a COUNTA formula to count what is actually open on the calendar, which is on a separate sheet within the same workbook.
This is what I am trying but it doesn't work:
=COUNTA('install calendar copy'!(INDIRECT('SS Sales'!X2))
A:
You need 'SS Sales'!X2 to contain the text string 'install calendar copy'!DT14:BL41 then =COUNTA(INDIRECT('SS Sales'!X2)) should give you what you want.
|
{
"pile_set_name": "StackExchange"
}
|
Synthesis and Semiconducting Characteristics of the BF2 Complexes of Bisbenzothiophene-Fused Azadipyrromethenes.
A novel type of dibenzothiophene [b]-fused core-expanded azaBODIPYs were obtained through an efficient post-functionalization of tetrabrominated azadipyrromethenes, using CuI-catalyzed cyclization, followed by BF2 complexation. These dyes show nearly planar skeletons, strong NIR absorption with maximum peaks up to 733 nm, and remarkable low-lying LUMO level of -4.15 eV. The field-effect transistor based on 1b exhibits bipolar transport properties, with the highest electron and hole mobilities up to 0.012 and 0.046 cm2 V-1 s-1, respectively.
|
{
"pile_set_name": "PubMed Abstracts"
}
|
Related Content
In contrast to a clash with police last week at the end of a wild police chase, Wrench, of Germantown, was subdued Thursday afternoon in court.
Wrench is charged with stealing a car from his former employer, Ernie Von Schledorn, recklessly endangering safety for the chase and several misdemeanors.
WISN 12 News learned he was also arrested last month at University School in River Hills where allegedly he drove up onto the lawn and into a flower bed blasting the stereo shouting, "I own this place" and "I own the world." It led to a restraining order by the school.
"This is a young man with a history of mental health issues. It's an unfortunate incident, and we will develop a mental health defense as this case progresses," Wrench's attorney, Michael Hart, said.
Hart said Wrench's threats to officers, telling one of them he'd eat his children, and threatening to kill the sales manager at Ernie Von Schledorn and "stuff him in the ceiling," are out of character.
"When he's medicated, he's really, really a very docile fellow, but he goes up and down, and it's a matter that needs professional treatment and help, and he'll get it," Hart said.
One officer is recovering from a broken leg from the scuffle last week.
According to a police report, a waitress in Germantown also recently filed a restraining order against Wrench, claiming he was stalking her.
|
{
"pile_set_name": "Pile-CC"
}
|
The Show Girl
The Show Girl is a 1927 American silent drama film directed by Charles J. Hunt and starring Mildred Harris, Gaston Glass and Mary Carr.
Cast
Mildred Harris as Maizie Udell
Gaston Glass as Billy Barton
Mary Carr as Mrs. Udell
Robert McKim as Edward Hayden
Eddie Borden as 'Breezy' Ayres
William H. Strauss as Moe Kenner
Sam Sidman as Heinie
Aryel Darma as Alma Dakin
References
Bibliography
Munden, Kenneth White. The American Film Institute Catalog of Motion Pictures Produced in the United States, Part 1. University of California Press, 1997.
External links
Category:1927 films
Category:1920s drama films
Category:English-language films
Category:American films
Category:American silent feature films
Category:American drama films
Category:American black-and-white films
Category:Films directed by Charles J. Hunt
Category:Rayart Pictures films
|
{
"pile_set_name": "Wikipedia (en)"
}
|
Phil Hosking
Thornton Randall Phillip Hosking (4 May 1894 - 6 August 1949) was an Australian rules footballer who played with Melbourne in the Victorian Football League (VFL).
Notes
External links
Category:1894 births
Category:Australian rules footballers from Victoria (Australia)
Category:Melbourne Football Club players
Category:1949 deaths
|
{
"pile_set_name": "Wikipedia (en)"
}
|
Benedicta Boccoli
Benedicta Boccoli (born 11 November 1966) is an Italian theater and movie actress.
Biography
Born in Milan on 11 November 1966 she moved to Rome with her family as a child. Her sister Brigitta is an actress, as well.
Known as an eclectic and versatile actress, she had her debut in television at a very early age (18 years). A few years later, she discovered that working in theater was where she truly belonged as an actress.
Actor and director Giorgio Albertazzi nicknamed her the Artistissima (the uber artist) because of her outstanding performances. She has also received favorable reviews in newspapers such as Corriere della Sera, la Repubblica, The Press, Time and La Gazzetta del Mezzogiorno.
Every Monday, in collaboration with Massimiliano Giovanetti, she writes on Il Fatto Quotidiano, the heading Cosa resterà: it's the diary of a teen-ager of years '80.
Career highlights
Film
Gli angeli di Borsellino, director Rocco Cesareo – 2003
Valzer, director Salvatore Maira – 2007
Pietralata, director Gianni Leacche – 2008
Theater
Blithe Spirit of Noël Coward, with Ugo Pagliai and Paola Gassman – 1992/1993 –
Cantando Cantando of Maurizio Micheli, with Maurizio Micheli, Aldo Ralli and Gianluca Guidi – 1994/1995 –
Buonanotte Bettina, of Pietro Garinei e Sandro Giovannini 1995/1996/1997 –
Can Can – Musical of Abe Burrows, 1998/1999 –
Orfeo all'inferno – Opera di Jacques Offenbach – 1999 – nel ruolo di Tersicore
Polvere di stelle, 2000/2001/2002
Le Pillole d'Ercole 2002/2003/2004
Anfitrione, of Plautus, 2004
Stalker of Rebecca Gillmann, 2004
Plutus of Aristofanes, 2004
Fiore di cactus 2004/2005/2006
Prova a farmi ridere of Alan Aykbourn, 2006
The Tempest of William Shakespeare, – 2006 – Ariel
Sunshine of William Mastrosimone, directed by Giorgio Albertazzi, 2007/2008
L'Appartamento, of Billy Wilder, 2009–2010
Vite private, of Noël Coward, with Corrado Tedeschi – 2012–2013
Dis-order, of Neil LaBute, dir. Marcello Cotugno, with Claudio Botosso – 2014
Incubi d'Amore, of Augusto Fornari, Toni Fornari, Andrea Maia, Vincenzo Sinopoli, dir. Augusto Fornari, with Sebastiano Somma and Morgana Forcella – 2014
Crimini del Cuore, of Beth Henley, dir. Marco Mattolini – 2015
A Room with a View, of E. M. Forster, dir. Stefano Artissunch – 2016
Cactus Flower of Pierre Barillet and Jean-Pierre Grédy, dir Piergiorgio Piccoli and Aristide Genovese - 2016
Il più brutto week-end della nostra vita of Norm Foster, dir. Maurizio Micheli - 2016
Television
Pronto, chi gioca?, directed by Gianni Boncompagni
Domenica In – with her sister Brigitta Boccoli from 1987 to 1990
Gelato al limone – with Massimiliano Pani
Unomattina – 1994
Due come noi – Co-starring with Wilma De Angelis – 1997
Incantesimo
Reality Circus – Reality show 2006/2007
Fotogallery
References
External links
Category:1966 births
Category:Living people
Category:Actresses from Rome
Category:Actresses from Milan
Category:Italian television actresses
Category:Italian film actresses
Category:Italian stage actresses
Category:20th-century Italian actresses
Category:21st-century Italian actresses
|
{
"pile_set_name": "Wikipedia (en)"
}
|
Dates & Rates
Dates
FALL SESSION:
October 22 - December 10th 2017
Rate
$125/Session
* It is our goal to ensure a formal Jewish education for every Jewish child in the Niagara Region. Every child deserves the gift of his own Heritage, regardless of his/her parents financial abilities. No one will be turned away to the lack of funds. Email Perla@JewishNiagara.com
|
{
"pile_set_name": "Pile-CC"
}
|
The Macintosh 128K, originally released as the Apple Macintosh, is the original Apple Macintosh personal computer. Its beige case consisted of a 9 in (23 cm) CRT monitor and came with a keyboard and mouse. A handle built into the top of the case made it easier for the computer to be lifted and carried. It had an initial selling price of $2,495 (equivalent to $5,752 in 2016). The Macintosh was introduced by the now-famous $370,000 (equivalent to $852,944 in 2016) television commercial by Ridley Scott, "1984," that most notably aired on CBS during the third quarter of Super Bowl XVIII on January 22, 1984. Sales of the Macintosh were strong from its initial release on January 24, 1984, and reached 70,000 units on May 3, 1984. Upon the release of its successor, the Macintosh 512K, it was rebranded as the Macintosh 128K.
Want to know more about the Mac computer patent print? We have created a description page here.
Printer:
Using Epson UltraChrome water based HDR ink-jet technology
Basis Weight: 192 gsm
Media Thickness: 10.3 mil (0.26 mm)
ISO Brightness: 104%
Opacity: 94%
Luster Paper:
Epson Ultra Premium Luster Photo Paper
Between a gloss and matte finish
Highly saturated, maximum ink coverage
Fingerprint resistant
Hardwood Deluxe Edition:
Premium plaque
High Definition hardwood print on hardwood
Glass like finish
No need for frame
Lifetime protective seal
Currently shipping in the U.S. only
Fast shipping: 3-10 business days. Designed with ❤️
|
{
"pile_set_name": "OpenWebText2"
}
|
PD-L1 Immunotherapy Delayed Triple Negative Breast Cancer Progression
Extending Life in Triple Negative Breast Cancer with atezolizumab Immunotherapy
MUNICH— Immunotherapy with the anti programmed death ligand 1 (PD-L1) checkpoint inhibitor atezolizumab in combination with nab-paclitaxel chemotherapy prolonged progression-free survival (PFS) among patients with metastatic triple-negative breast cancer in the randomized phase three IMpassion130 trial reported at the 2018 annual congress of the European Society for Medical Oncology, ESMO.
The experimental treatment also prolonged overall survival (OS) in patients who tested positive for PD-L1—the molecular target of atezolizumab.
Transformative
“For me this is practice-changing. This is a massive step. This is the first time—a clear improvement in overall survival, not just a marginal improvement. We see a transformative benefit of nearly ten months based on survival in the control group of only 15 months. So it’s more than a 50 per cent improvement in overall survival which is a very meaningful result for patients with this difficult-to-treat sub-type of breast cancer.”
So said first author of the IMpassion130 trial Peter Schmid MD PhD, Chair of Oncology at Barts Cancer Institute and Queen Mary University of London and Director of St. Bartholomew’s Breast Cancer Centre in London UK in conversation with the Audio Journal of Oncology.
|
{
"pile_set_name": "Pile-CC"
}
|
The present invention relates generally to a tandem axis vehicle and, more particularly, to a forward carrier assembly for a tandem axle vehicle.
It is ordinarily desirable that a vehicle have at least one reverse gear in addition to one or more forward gears. Typically, this is accomplished by providing a transmission including one or more countershafts with a plurality of countershaft gears thereon, the countershafts usually being driven by a geared connection with an input shaft driven by an engine. The gears on the countershaft mesh with gears mounted on, for example, an output shaft. At any given time, one of the gears on the output shaft drives is drivingly coupled to the output shaft, such as by a gear shift, to drive the output shaft. For the reverse gear, an idler gear is disposed between the countershaft gear and the output shaft gear so that rotation of the output shaft when the reverse gear is engaged is in the opposite direction from rotation of the output shaft when any of the forward gears is engaged, without having to alter the direction of rotation of the input shaft or the countershaft. Providing additional reverse gears adds complexity to the transmission.
It is desirable to provide a vehicle and powertrain that does not require a transmission with a separate reverse gear. It is also desirable to provide a vehicle and powertrain that permit provision of a substantial number of reverse gears without substantial additional transmission complexity.
According to an aspect of the present invention, a tandem axle vehicle comprises a powertrain, the powertrain comprising an input shaft, a forward drive axle assembly comprising a forward carrier assembly including a forward differential, a rear drive axle assembly coupled to the forward drive axle assembly via a connecting driveshaft and comprising a rear carrier assembly including a rear differential, the forward carrier assembly comprising an inter-axle differential (IAD), the IAD comprising an IAD housing, a differential spider comprising a plurality of legs attached to the IAD housing and a plurality of spider gears mounted on the legs, a first side gear engaged with the spider gears on a first side of the spider and arranged to drive a shaft for driving the driveshaft, and a second side gear engaged with the spider gears on a second side of the spider and arranged to drive the forward differential, and a clutch movable between an unlocked position, the clutch rotationally coupling the input shaft and the IAD housing when in the unlocked position, and a reverse position, the input shaft being rotationally decoupled from the IAD housing when the clutch is in the reverse position.
According to another aspect of the present invention, a forward carrier assembly for a tandem axle vehicle comprises an inter-axle differential (IAD), the IAD comprising an IAD housing having an internal spline, a differential spider comprising a plurality of legs attached to the IAD housing and a plurality of spider gears mounted on the legs, a first side gear engaged with the spider gears on a first side of the spider, the first side gear having an internal spline, a second side gear engaged with the spider gears on a second side of the spider, and a collar having one more external splines, the collar being movable between a first position in which the one or more external splines engage with the internal spline of the IAD housing and the internal spline of the first side gear, and a second position in which the one or more external splines is disengaged from the internal spline of the IAD housing and engaged with the internal spline of the first side gear.
|
{
"pile_set_name": "USPTO Backgrounds"
}
|
[An experimental infection of Hyalomma asiaticum and Ornithodoros papillipes ticks with a single and combined infection with Coxiella burnetii and Dermacentroxenus sibericus].
Experimental infection of H. asiaticum and O. papillipes with Coxiella burnetii and R. (D.) sibericus in different succession and individual study of these arthropods by means of the fluorescent antibodies method, ordinary microscopy and titration on laboratory animals have revealed an ambiguous outcome of the development of combined rickettsial infection in these ticks. The first agent obtained by the vector either prevents utterly the reproduction of the heterologous agent or inhibits its activity. At the concurrent infection of the ticks with two species of rickettsiae the reproduction of the both agents takes place but against a background of intersuppression of their reproduction. The development of the combined rickettsial infection in ticks is an example of "irregular competition" of species as one of the types of competitive relationships.
|
{
"pile_set_name": "PubMed Abstracts"
}
|
Photograph of St. Regis Reception Orange County
The use of mirrored tables always adds elegance to reception decor. In this case, florist Fayaz at Bloom Box Designs uses a combination of mirrored tables, lucite chairs, chivari chairs and candles to create a stunning reception in a blue and white palette. This was the second wedding I photographed in this family, so it was a pleasure to work with them again. This wedding ran on the Maharani Weddings blog.
|
{
"pile_set_name": "Pile-CC"
}
|
Current organ preservation techniques typically involve hypothermic storage of the organ in a chemical perfusate solution on ice. In the case of a heart, it is typically arrested, and cooled with the storage/cardioplegic solution in a hypothermic, non-functioning state. These techniques utilize a variety of cardioplegic solutions, none of which sufficiently protect the heart from myocardial damage resulting from ischemia. Such injuries are particularly undesirable when an organ, such as a heart, is intended to be transplanted from a donor into a recipient. In addition to myocardial damage resulting from ischemia, reperfusion of a heart may exacerbate the myocardial injury and may cause coronary vascular endothelial and smooth muscle injury, which may lead to coronary vasomotor dysfunction.
Using conventional approaches, such injuries increase as a function of the length of time an organ is maintained ex-vivo. For example, in the case of a heart, typically it may be maintained ex-vivo for only a few hours before it becomes unusable for transplantation. This relatively brief time period limits the number of recipients who can be reached from a given donor site, thereby restricting the recipient pool for a harvested heart. Even within the few hour time limit, the heart may nevertheless be significantly damaged. A significant issue is that there may not be any apparent indication of the damage. Because of this, less-than-optimal organs may be transplanted, resulting in post-transplant organ dysfunction or other injuries. Thus, it would be desirable to develop techniques that can extend the time during which an organ can be preserved in a healthy state ex-vivo. Such techniques would reduce the risk of transplantation failure and enlarge potential donor and recipient pools.
Effective preservation of an ex-vivo organ would also provide numerous other benefits. For instance, prolonged ex-vivo preservation would permit more careful monitoring and functional testing of the harvested organ. This would in turn allow earlier detection and potential repair of defects in the harvested organ, further reducing the likelihood of transplantation failure. The ability to perform simple repairs on the organ would also allow many organs with minor defects to be saved, whereas current transplantation techniques require them to be discarded.
In addition, more effective matching between the organ and a particular recipient may be achieved, further reducing the likelihood of eventual organ rejection. Current transplantation techniques rely mainly on matching donor and recipient blood types, which by itself is a relatively unreliable indicator of whether or not the organ will be rejected by the recipient. A more preferred test for organ compatibility is a Human Leukocyte Antigen (HLA) matching test, but current cold ischemic organ preservation approaches preclude the use of this test, which can often require 12 hours or more to complete.
Prolonged and reliable ex-vivo organ care would also provide benefits outside the context of organ transplantation. For example, a patient's body, as a whole, can typically tolerate much lower levels of chemo-, bio- and radiation therapy than many particular organs. An ex-vivo organ care system would permit an organ to be removed from the body and treated in isolation, reducing the risk of damage to other parts of the body.
In view of the foregoing, improved systems, methods, and devices for caring for an organ ex-vivo are needed.
|
{
"pile_set_name": "USPTO Backgrounds"
}
|
Onset of diradical character in small nanosized graphene patches.
A family of small graphene patches, i.e., rectangular polyaromatic hydrocarbons (PAHs), that have both zigzag and armchair edges is investigated to establish their ground state electronic structure. Broken symmetry density functional theory (DFT) and plane wave DFT were used to characterize the onset of diradical character via relative energies of open-shell and closed-shell singlet states. The perfect pairing (PP) active space approximation of coupled cluster theory was used to characterize diradical character on the basis of promotion of electrons from occupied to unoccupied molecular orbitals. The role of zigzag and armchair edges in the formation of open-shell singlet states is elucidated. In particular, it is found that elongation of the zigzag edge results in an increase of diradical character whereas elongation of the arm chair edge leads to a decrease of diradical character. Analysis of orbitals from PP calculations suggests that diradical states are formally Mobius aromatic multiconfigurational systems.
|
{
"pile_set_name": "PubMed Abstracts"
}
|
Carlos Brandt
Carlos Brandt (11 October 1875 – 27 February 1964) was a Venezuelan author, historian, philosopher and naturopath.
Background
Dr. Carlos Brandt Tortolero was an author, historian, doctor of philosophy, philosopher of vegetarianism, essayist, novelist, biographer, musicologist and naturopath, who was born in Miranda, a town in Carabobo State, Venezuela.
Early life
He was born in Miranda, Carabobo state, Venezuela, the son of a German immigrant Karl Brandt, a coffee planter and exporter, and Zoraida Tortolero, mother to Carlos, Juan Luis, Fernando, Augusto, Asteria and Mary. His younger brother (by 17 years) was the composer Augusto Brandt. He studied in Puerto Cabello Elementary School and was sent to Germany to join the Pro Gymnasium in Hamburg, aged 14 to 19. He toured German and France, and returned to Venezuela at 19, fluent in German, French and English. At 25, he met Leo Tolstoy, which encouraged his literary ambitions. In 1901, his first book appeared La Belleza de la Mujer.
Exile
Under the dictatorship of Juan Vicente Gómez, he was imprisoned and then exiled to Spain, Italy, Belgium, the Netherlands and then the United States. Protesting at the dictatorship, he encountered the anarchist organization "Generación Consciente" in Barcelona. He eventually returned to Venezuela, and died in Caracas, aged 88.
Writings
He promoted natural living, pacifism, free-thinking, liberty and spiritualism, in his writings, as well as being a novelist and biographer. Many of his books emerged during his time in exile. In 1913, Fundamentos de la Moral, also known as El Problema Vital (The Vital Problem), was published with a prologue by Albert Einstein. For his work, the American School of Naturopathy awarded him an honorary doctorate. With this and further writings, Brandt counted as one of the original founders of the Vegetarianism movement.
His books were published in Spanish, Italian, Flemish, Dutch, English, French and German. His first book published in English was Hight and Right.
As well as his historic and philosophical writings, Brandt generated extensive correspondence with authors such as George Bernard Shaw, Leo Tolstoy, Albert Einstein, Benedict Lust - one of the founders of natural medicine, Ernst Haeckel, Max Nordau, Gabriela Mistral, Raffaele Garofalo, Russell Wallace and Elmer Lee.
Naturopathy
Brandt, along with Arnold Ehret, Benedict Lust and Louis Kuhn, was one of the original pioneers of naturopathy. Brandt taught Nicolás Capó (born around 1902), who wrote his first book circa 1935. Many of Brandt's books were distributed through Capo's Instituto de Trofoterapia, in Barcelona.
Capó and José Castro (Galician naturopath), were pioneers of dietary health and healing in Spain, during the 1920s to 1940s, opening Escuela Naturo-Trofologica in Barcelona in 1925. Capo left Spain for Argentina around 1939, fleeing from Francoist Spain.
German pioneers of the nature cure and natural hygiene movements are featured in Children Of The Sun: A Pictorial Anthology From Germany to California 1883-1949 by Gordon Kennedy, Navaria Press 1998.
Brandt is listed in Who’s Who In Latin America.
Works
Análisis Critica De La Biblia / Critical Analysis Of The Bible
Bajo La Tiranía De Cipriano Castro / Under The Tyranny Of Cipriano Castro
Bajo la tiranía de Cipranio Castro, Tipografía Vargas, 1952
Beethoven, Su Vida, Su Obra, Y El Sentido De Su Música / Beethoven: His Life, His Work & The Sense Of His Music 1940, 1954
Belleza De La Mujer, Tratado De Las Proporciones Armoniosas Del Cuerpo Humano Y De La Importancia Filosófica, Artística Y Sociológica De La Belleza Física / The Beauty Of Woman: The Harmonious Proportions Of The Human Body & The Philosophical, Artistic & Sociological Importance Of Physical Beauty 1935
Camino De Perfección / The Way Of Perfection
Cervantes: El Titán De La Literatura Y Su Obra Maestra: El Quijote / Cervantes: The Titan Of Literature & His Masterpiece: Don Quixote, 1942, Las Novedades, Caracas
Colon / Columbus
Diógenes: El Atleta De La Voluntad / Diogenes: The Willing Athlete
El Anarquismo En América Latina / Anarchism In Latin America
El Estado Y La Iglesia / The Estate & The Church
El fanatismo religioso, Editorial Símbolo
El Fundamento De La Moral / The Fundamental Basis Of Morality 1918, 1926 Librería Sintes, Barcelona
El misterioso almirante y su enigmático descubrimiento by Carlos Brandt Ministerio de Educación Nacional, Dirección de Cultura, 1949
El Misterioso Almirante Y Su Enigmático Descubrimiento: Biografía Caracas / The Mysterious Admiral & His Enigmatic Discovery: A Biography Of Caracas
El Modernismo / Modernism 1994
El Problema Económico-Social / The Social-Economic Problem
El Problema Vital / The Vital Problem: The Path To Health, Wisdom & Universal Peace 1924, 1969, 1999, Instituto De Trofoterapia, Barcelona and Benedict Lust Publishers, New York (1924)
El Sendero De La Salud / The Path Of Health
El Vegetarianismo / Vegetarianism
Filosofía Del Vegetarismo / The Philosophy Of Vegetarianism 1927, Librería Sintes, Barcelona
Fundamentos de la Moral (The Vital Problem)
Giordano Bruno, El Mártir Más Auténtico De La Historia / Giordano Bruno: The Most Authentic Martyr Of History Kier, 1940
Hight and Right (in English)
Jesús, El Filósofo Por Excelencia / Jesus: The Philosopher Par Excellence 1939
La Belleza De La Mujer / The Beauty Of Women
La Clave Del Misterio / The Key To The Mystery
La Dictadura Gomecista / The Gomecist Dictatorship
La Época Del Terror: En El País De Gómez / The Age Of Terror: In The Country Of Gomez
La Paz Universal / Universal Peace
La Superstición Médica / Medical Superstition
Leonardo da Vinci: El Profeta De Los Profetas / Leonardo da Vinci: The Prophet Of Prophets, Editorial Latorre Caracas 1939, Simon & Schuster 1993
Los Enigmas De La Ciencia / The Enigmas Of Science
Naturaleza Frugivora Del Hombre / The Frugivorous Nature Of Man
Patología Racional: Las Enfermedades, Su Origen Y Curación / Rational Pathology: Illnesses, Their Origin & Cures 1942, 1949, Ediciones Universo, Toulouse
Pitágoras Y Vegetarianismo / Pythagoras & Vegetarianism, 1970, Instituto De Trofoterapia, Barcelona
Pitágoras, Padre De La Sabiduría Europea / Pythagoras, Father Of European Wisdom
Siluetas Luminosas / Luminous Silhouettes
Spinoza Y El Panteísmo / Spinoza & Pantheism 1972
Fundamentos de la Moral (The Vital Problem)
References
External links
Nicolas Capo Official Site
Category:Venezuelan philosophers
Category:People from Carabobo
Category:1875 births
Category:1964 deaths
Category:Naturopaths
|
{
"pile_set_name": "Wikipedia (en)"
}
|
This invention relates to shaft cracking and incipient pinion slip, and more particularly, to monitoring shaft cracking and incipient pinion slip in an operating system such as a geared system of a locomotive.
In a geared system, the motion or torque from one shaft is transmitted to another shaft by means of direct contact between toothed wheels or gears. FIG. 1 illustrates one example of a geared system 10 for propelling a locomotive. Geared system 10 includes an electric motor 12 having a drive shaft 14 rotatably supported by bearings 16 which are attached to the locomotive, a rotor 11, a stator 19 with stator windings 21 and leads 23. Attached to one end of drive shaft 14 is a pinion 18. Typically, pinion 18 is fitted and shrunk onto a tapered end 15 of drive shaft 14. Pinion 18 engages a bull gear 20 which attaches to and drives a wheel shaft 22 rotatably supported by bearings 24. The ends of wheel shaft 22 are attached to respective wheels 26 of the locomotive.
Although electric motor 12 is resiliently supported to the locomotive, geared system 10 experiences large mechanical vibrations, e.g., shock loadings due to uneven portions of rails 30. Often, after some period of heavy usage, drive shaft 14 may crack due to fatigue. Similarly, pinion 18 may slip relative to drive shaft 14 without any advanced warning so that torque is no longer transmitted to wheels 26. Such failures can be catastrophic, and repairs such as removal of electric motor 12, refitting of pinion 18, or replacement of drive shaft 14, are expensive, labor intensive, and require that the locomotive be temporarily pulled from service.
Therefore, there is a need for an apparatus and method for low cost, on-line monitoring of an operating geared system in which the apparatus and method are capable of warning of shaft cracking or incipient pinion slip.
The above-mentioned need is met by the present invention which relates to diagnostic techniques for monitoring shaft cracking or incipient pinion slip in an operating system. In one aspect of the present invention, a method for monitoring shaft cracking or incipient pinion slip in an operating system includes the steps of determining a characteristic natural frequency of the operating system at a first time, determining the characteristic natural frequency at a second time, and comparing the characteristic natural frequency determined at the first time to the characteristic natural frequency determined at the second time to detect a shift in the characteristic natural frequency in response to at least one of shaft cracking and incipient pinion slip.
For monitoring shaft cracking, the characteristic natural frequency is a natural frequency of a shaft of the operating system. For monitoring pinion slip, the characteristic natural frequency is a natural frequency of an assembly including a pinion of the operating system or the characteristic natural frequencies of two coupled assemblies which includes the pinion.
The steps of determining the characteristic natural frequency may include measuring vibrations of the operating system, measuring current of a motor of the operating system, measuring torsional oscillations of the operating system, or measuring current and voltage of a motor of the operating system. Advantageously, the steps of determining the characteristic natural frequency may include the step of performing a fast Fourier transform analysis.
In another aspect of the present invention, an apparatus for monitoring shaft cracking or incipient pinion slip in an operating system, includes a controller adapted to determine a characteristic natural frequency of the operating system at a first time, determine the characteristic natural frequency at a second time, and compare the characteristic natural frequency determined at the first time to the characteristic natural frequency determined at the second time to detect a shift in the characteristic natural frequency in response to at least one of shaft cracking and incipient pinion slip.
In still another aspect of the present invention, an article of manufacture comprises at least one computer usable medium having computer readable program code means embodied therein for causing the monitoring of shaft cracking or incipient pinion slip in an operating system. The computer readable program code means in the article of manufacture comprises computer readable program code means for determining a characteristic natural frequency of the operating system at a first time, determining the characteristic natural frequency at a second time, and comparing the characteristic natural frequency determined at the first time to the characteristic natural frequency determined at the second time to detect a shift in the characteristic natural frequency in response to at least one of shaft cracking and incipient pinion slip.
In yet another aspect of the present invention, at least one program storage device readable by a machine, tangibly embodying at least one program of instructions executable by the machine, performs a method for monitoring shaft cracking or incipient pinion slip in an operating system, as noted above.
|
{
"pile_set_name": "USPTO Backgrounds"
}
|
Q:
Jenkins + SonarQube 4.0 ClassNotFoundException occurs durng XHTML validation check using XML profile
I am getting a ClassNotFoundException while attempting to run a SonarQube 4.0 analysis from Jenkins on a Maven project using Sonar's XML language profile. Within the SonarQube analysis, the exception is occurring while attempting to perform the XML Schema Validation check. What might be wrong?
This is the exception from the Jenkins build job:
0.0.0.0 ERROR - Could not analyze the file D:\Jenkins_home\.jenkins\jobs\XXX with Sonar Runner\workspace\XXX\WebContent\Login.xhtml
org.sonar.api.utils.SonarException: java.lang.ClassNotFoundException: org.apache.xerces.dom.DOMImplementationSourceImpl
at org.sonar.plugins.xml.schemas.SchemaResolver.createLSInput(SchemaResolver.java:122) ~[na:na]
at org.sonar.plugins.xml.schemas.SchemaResolver.resolveResource(SchemaResolver.java:269) ~[na:na]
at com.sun.org.apache.xerces.internal.util.DOMEntityResolverWrapper.resolveEntity(DOMEntityResolverWrapper.java:106) ~[na:1.6.0_24]
at com.sun.org.apache.xerces.internal.impl.XMLEntityManager.resolveEntity(XMLEntityManager.java:1100) ~[na:1.6.0_24]
at com.sun.org.apache.xerces.internal.impl.xs.XMLSchemaLoader.resolveDocument(XMLSchemaLoader.java:595) ~[na:1.6.0_24]
at com.sun.org.apache.xerces.internal.impl.xs.traversers.XSDHandler.resolveSchema(XSDHandler.java:1671) ~[na:1.6.0_24]
at com.sun.org.apache.xerces.internal.impl.xs.traversers.XSDHandler.constructTrees(XSDHandler.java:909) ~[na:1.6.0_24]
at com.sun.org.apache.xerces.internal.impl.xs.traversers.XSDHandler.parseSchema(XSDHandler.java:569) ~[na:1.6.0_24]
at com.sun.org.apache.xerces.internal.impl.xs.XMLSchemaLoader.loadSchema(XMLSchemaLoader.java:552) ~[na:1.6.0_24]
at com.sun.org.apache.xerces.internal.impl.xs.XMLSchemaLoader.loadGrammar(XMLSchemaLoader.java:519) ~[na:1.6.0_24]
at com.sun.org.apache.xerces.internal.impl.xs.XMLSchemaLoader.loadGrammar(XMLSchemaLoader.java:485) ~[na:1.6.0_24]
at com.sun.org.apache.xerces.internal.jaxp.validation.XMLSchemaFactory.newSchema(XMLSchemaFactory.java:211) ~[na:1.6.0_24]
at org.sonar.plugins.xml.checks.XmlSchemaCheck.createSchema(XmlSchemaCheck.java:147) ~[na:na]
at org.sonar.plugins.xml.checks.XmlSchemaCheck.validate(XmlSchemaCheck.java:234) ~[na:na]
at org.sonar.plugins.xml.checks.XmlSchemaCheck.validate(XmlSchemaCheck.java:227) ~[na:na]
at org.sonar.plugins.xml.checks.XmlSchemaCheck.validate(XmlSchemaCheck.java:259) ~[na:na]
at org.sonar.plugins.xml.XmlSensor.analyse(XmlSensor.java:69) ~[na:na]
at org.sonar.batch.phases.SensorsExecutor.execute(SensorsExecutor.java:72) [sonar-batch-4.0.jar:na]
at org.sonar.batch.phases.PhaseExecutor.execute(PhaseExecutor.java:114) [sonar-batch-4.0.jar:na]
at org.sonar.batch.scan.ModuleScanContainer.doAfterStart(ModuleScanContainer.java:150) [sonar-batch-4.0.jar:na]
at org.sonar.api.platform.ComponentContainer.startComponents(ComponentContainer.java:92) [sonar-plugin-api-4.0.jar:na]
at org.sonar.api.platform.ComponentContainer.execute(ComponentContainer.java:77) [sonar-plugin-api-4.0.jar:na]
at org.sonar.batch.scan.ProjectScanContainer.scan(ProjectScanContainer.java:190) [sonar-batch-4.0.jar:na]
at org.sonar.batch.scan.ProjectScanContainer.scanRecursively(ProjectScanContainer.java:185) [sonar-batch-4.0.jar:na]
at org.sonar.batch.scan.ProjectScanContainer.doAfterStart(ProjectScanContainer.java:178) [sonar-batch-4.0.jar:na]
at org.sonar.api.platform.ComponentContainer.startComponents(ComponentContainer.java:92) [sonar-plugin-api-4.0.jar:na]
at org.sonar.api.platform.ComponentContainer.execute(ComponentContainer.java:77) [sonar-plugin-api-4.0.jar:na]
at org.sonar.batch.scan.ScanTask.scan(ScanTask.java:58) [sonar-batch-4.0.jar:na]
at org.sonar.batch.scan.ScanTask.execute(ScanTask.java:45) [sonar-batch-4.0.jar:na]
at org.sonar.batch.bootstrap.TaskContainer.doAfterStart(TaskContainer.java:82) [sonar-batch-4.0.jar:na]
at org.sonar.api.platform.ComponentContainer.startComponents(ComponentContainer.java:92) [sonar-plugin-api-4.0.jar:na]
at org.sonar.api.platform.ComponentContainer.execute(ComponentContainer.java:77) [sonar-plugin-api-4.0.jar:na]
at org.sonar.batch.bootstrap.BootstrapContainer.executeTask(BootstrapContainer.java:155) [sonar-batch-4.0.jar:na]
at org.sonar.batch.bootstrap.BootstrapContainer.doAfterStart(BootstrapContainer.java:143) [sonar-batch-4.0.jar:na]
at org.sonar.api.platform.ComponentContainer.startComponents(ComponentContainer.java:92) [sonar-plugin-api-4.0.jar:na]
at org.sonar.api.platform.ComponentContainer.execute(ComponentContainer.java:77) [sonar-plugin-api-4.0.jar:na]
at org.sonar.batch.bootstrapper.Batch.startBatch(Batch.java:92) [sonar-batch-4.0.jar:na]
at org.sonar.batch.bootstrapper.Batch.execute(Batch.java:74) [sonar-batch-4.0.jar:na]
at org.sonar.runner.batch.IsolatedLauncher.execute(IsolatedLauncher.java:45) [sonar-runner-batch1703873637256551857.jar:na]
at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method) ~[na:1.6.0_24]
at sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:39) ~[na:1.6.0_24]
at sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:25) ~[na:1.6.0_24]
at java.lang.reflect.Method.invoke(Method.java:597) ~[na:1.6.0_24]
at org.sonar.runner.impl.BatchLauncher$1.delegateExecution(BatchLauncher.java:87) [sonar-runner-dist-2.3.jar:na]
at org.sonar.runner.impl.BatchLauncher$1.run(BatchLauncher.java:75) [sonar-runner-dist-2.3.jar:na]
at java.security.AccessController.doPrivileged(Native Method) [na:1.6.0_24]
at org.sonar.runner.impl.BatchLauncher.doExecute(BatchLauncher.java:69) [sonar-runner-dist-2.3.jar:na]
at org.sonar.runner.impl.BatchLauncher.execute(BatchLauncher.java:50) [sonar-runner-dist-2.3.jar:na]
at org.sonar.runner.api.EmbeddedRunner.doExecute(EmbeddedRunner.java:102) [sonar-runner-dist-2.3.jar:na]
at org.sonar.runner.api.Runner.execute(Runner.java:90) [sonar-runner-dist-2.3.jar:na]
at org.sonar.runner.Main.executeTask(Main.java:70) [sonar-runner-dist-2.3.jar:na]
at org.sonar.runner.Main.execute(Main.java:59) [sonar-runner-dist-2.3.jar:na]
at org.sonar.runner.Main.main(Main.java:41) [sonar-runner-dist-2.3.jar:na]
Caused by: java.lang.ClassNotFoundException: org.apache.xerces.dom.DOMImplementationSourceImpl
at java.net.URLClassLoader$1.run(URLClassLoader.java:202) ~[na:1.6.0_24]
at java.security.AccessController.doPrivileged(Native Method) [na:1.6.0_24]
at java.net.URLClassLoader.findClass(URLClassLoader.java:190) ~[na:1.6.0_24]
at java.lang.ClassLoader.loadClass(ClassLoader.java:307) ~[na:1.6.0_24]
at java.lang.ClassLoader.loadClass(ClassLoader.java:248) ~[na:1.6.0_24]
at org.w3c.dom.bootstrap.DOMImplementationRegistry.newInstance(DOMImplementationRegistry.java:146) ~[na:1.6.0_24]
at org.sonar.plugins.xml.schemas.SchemaResolver.createLSInput(SchemaResolver.java:115) ~[na:na]
... 52 common frames omitted
Configuration:
Jenkins 1.509.2 job using Maven 2.2.1.
Jenkins is running under Tomcat 7.0.11.
Jenkins Sonar plugin version 2.1.
Sonar XML plugin version 1.0.1.
SonarQube 4.0 analysis using XML language profile.
I tried initiating the Sonar analysis from the Jenkins job using both a) SonarQube runner 2.3 via Maven post-build step; and b) directly using a Sonar post-build action. Both give the same result. Note that the SonarQube analysis still completes and I can see the results in SonarQube. I also tried running the job using Maven 3.0.3. Same result.
A:
Ticket created, indeed I've managed to reproduce this issue locally : https://jira.codehaus.org/browse/SONARPLUGINS-3356
Thanks for your feedback.
|
{
"pile_set_name": "StackExchange"
}
|
Q:
Little bit confusing about free pointer inside function
some weeks ago I learn about proper way how pointers should be allocated and dealocated inside function so given in example linkedList:
typedef struct _node {
void *data;
struct _node *next;
} Node;
typedef struct _linkedList {
Node *head;
Node *tail;
Node *current;
} LinkedList;
In My opinion right way to destroy queue is by using function that get pointer to pointer to node which I want to delete:
void destroy (Node ** node)
Or in more real world example pointer to pointer and pointer to list to delete.
void destroy (LinkedList * list, Node ** node)
but now I am reading book "Understanding C pointers" and I encounter to problem because In chapter 6 pointers to structures there is followed example of function destroyList:
void delete(LinkedList *list, Node *node) {
if (node == list->head) {
if (list->head->next == NULL) {
list->head = list->tail = NULL;
} else {
list->head = list->head->next;
}
} else {
Node *tmp = list->head;
while (tmp != NULL && tmp->next != node) {
tmp = tmp->next;
}
if (tmp != NULL) {
tmp->next = node->next;
}
}
free(node); //free on pointer copy value not pointer
}
So in this example author run free on pointer that is passed by value, so in my opinion this shouldn't work. But I looked into errata and there is no notes about this example.
In this case I understand that List is function argument to use correct instance of list, but is should be rather that:
free(list->head) ; //It should work?
And then also free memory for allocated List.
Am I right? Because reading this example I have a feeling that I have a problem with good understanding of this topic.
Also I went to Linux Man Page and I saw free prototype:
void free(void *ptr); // http://linux.die.net/man/3/free
So why everybody told to pass pointer to pointer when You want to free memory but in standard library same free function take as parameter not pointer to pointer but pointer, how it work correctly?
A:
as you state correctly, free( void *p ) frees the memory p points to but as the address is passed by value it will remain unchanged for the caller. Thus you could run into problems like this:
int *p = malloc( sizeof *p );
*p = 1;
free( p );
...
if( p )
*p = 2; // Undefined Behaviour!!! although p is free()'d it's still != NULL
So you will often find
free( p );
p = NULL;
Nevertheless in my opinion it's ok to write a free() like function where you pass a pointer by value as long as the function's description states clearly that the pointer must not be used afterwards (no matter wht type of pointer that may be). But of course you're free to define the function with double pointers and set everything you have free()'d to NULL inside, like in this very simple example:
void myfree( void **pp )
{
free( *p );
*p = NULL;
}
...
int *p = malloc( sizeof *p );
...
myfree( &p );
// now p == NULL
|
{
"pile_set_name": "StackExchange"
}
|
<?xml version="1.0" encoding="UTF-8"?>
<project xmlns="http://maven.apache.org/POM/4.0.0" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
xsi:schemaLocation="http://maven.apache.org/POM/4.0.0 http://maven.apache.org/maven-v4_0_0.xsd">
<modelVersion>4.0.0</modelVersion>
<parent>
<artifactId>oss-parent</artifactId>
<groupId>org.sonatype.oss</groupId>
<version>9</version>
</parent>
<prerequisites>
<maven>${required.maven.version}</maven>
</prerequisites>
<groupId>com.lazerycode.jmeter</groupId>
<artifactId>jmeter-maven-plugin</artifactId>
<version>DEV-SNAPSHOT</version>
<packaging>maven-plugin</packaging>
<name>JMeter Maven Plugin</name>
<description>A plugin to allow you to run Apache JMeter tests with Maven.</description>
<url>https://jmeter.lazerycode.com</url>
<properties>
<project.build.sourceEncoding>UTF-8</project.build.sourceEncoding>
<project.reporting.outputEncoding>UTF-8</project.reporting.outputEncoding>
<required.maven.version>3.5.2</required.maven.version>
<supported.java.version>1.8</supported.java.version>
<!--Dependency versions-->
<assertj-core.version>3.15.0</assertj-core.version>
<commons-io.version>2.6</commons-io.version>
<jackson.version>2.11.0</jackson.version>
<json-path.version>2.4.0</json-path.version>
<junit.version>4.13</junit.version>
<logback.version>1.2.3</logback.version>
<maven-resolver.version>1.4.2</maven-resolver.version>
<mockito-core.version>2.28.2</mockito-core.version>
<slf4j-api.version>1.7.30</slf4j-api.version>
<!--Plugin versions-->
<maven-compiler-plugin.version>3.8.0</maven-compiler-plugin.version>
<maven-enforcer-plugin.version>3.0.0-M3</maven-enforcer-plugin.version>
<maven-invoker-plugin.version>3.2.0</maven-invoker-plugin.version>
<maven-javadoc-plugin.version>3.0.1</maven-javadoc-plugin.version>
<maven-source-plugin.version>3.0.1</maven-source-plugin.version>
<maven-surefire-failsafe-plugin.version>2.22.2</maven-surefire-failsafe-plugin.version>
<jacoco-maven-plugin.version>0.8.5</jacoco-maven-plugin.version>
<nexus-staging-maven-plugin.version>1.6.8</nexus-staging-maven-plugin.version>
<pgp-maven-plugin.version>1.1</pgp-maven-plugin.version>
</properties>
<licenses>
<license>
<name>Apache 2</name>
<url>http://www.apache.org/licenses/LICENSE-2.0.txt</url>
<distribution>repo</distribution>
<comments>A business-friendly OSS license</comments>
</license>
</licenses>
<scm>
<connection>scm:git:git@github.com:jmeter-maven-plugin/jmeter-maven-plugin.git</connection>
<developerConnection>scm:git:git@github.com:jmeter-maven-plugin/jmeter-maven-plugin.git</developerConnection>
<url>https://github.com/jmeter-maven-plugin/jmeter-maven-plugin</url>
<tag>HEAD</tag>
</scm>
<issueManagement>
<system>GitHub</system>
<url>https://github.com/jmeter-maven-plugin/jmeter-maven-plugin/issues</url>
</issueManagement>
<ciManagement>
<system>Travis CI</system>
<url>https://travis-ci.org/jmeter-maven-plugin/jmeter-maven-plugin</url>
</ciManagement>
<mailingLists>
<mailingList>
<name>JMeter Maven Plugin Users</name>
<post>maven-jmeter-plugin-users@googlegroups.com</post>
<archive>https://groups.google.com/forum/?fromgroups#!forum/maven-jmeter-plugin-users</archive>
</mailingList>
<mailingList>
<name>JMeter Maven Plugin Devs</name>
<post>maven-jmeter-plugin-devs@googlegroups.com</post>
<archive>https://groups.google.com/forum/?fromgroups#!forum/maven-jmeter-plugin-devs</archive>
</mailingList>
</mailingLists>
<developers>
<developer>
<id>Ardesco</id>
<name>Mark Collin</name>
<timezone>GMT</timezone>
<roles>
<role>Comitter</role>
</roles>
</developer>
<developer>
<id>pmouawad</id>
<name>Philippe Mouawad</name>
<roles>
<role>Comitter</role>
</roles>
<organizationUrl>https://www.ubik-ingenierie.com/blog/</organizationUrl>
<url>https://ubikloadpack.com</url>
<organization>Ubik-Ingenierie</organization>
</developer>
</developers>
<contributors>
<contributor>
<name>Arne Franken</name>
<timezone>CET</timezone>
</contributor>
<contributor>
<name>Ron Alleva</name>
</contributor>
<contributor>
<name>Tom Coupland</name>
</contributor>
<contributor>
<name>Daniel Yokomizo</name>
</contributor>
<contributor>
<name>Gerd Aschemann</name>
</contributor>
<contributor>
<name>Yoann Ciabaud</name>
</contributor>
<contributor>
<name>Tim McCune</name>
</contributor>
<contributor>
<name>Jon Roberts</name>
</contributor>
<contributor>
<name>Jarrod Ribble</name>
</contributor>
<contributor>
<name>Fabrice Daugan</name>
</contributor>
<contributor>
<name>Dmytro Pishchukhin</name>
</contributor>
<contributor>
<name>Erik G. H. Meade</name>
</contributor>
<contributor>
<name>Zmicier Zaleznicenka</name>
</contributor>
<contributor>
<name>Michael Lex</name>
</contributor>
<contributor>
<name>Mike Patel</name>
</contributor>
<contributor>
<name>Peter Murray</name>
</contributor>
<contributor>
<name>Sascha Theves</name>
</contributor>
<contributor>
<name>gordon00</name>
</contributor>
<contributor>
<name>Irek Pastusiak</name>
</contributor>
<contributor>
<name>Nanne</name>
</contributor>
<contributor>
<name>Pascal Treilhes</name>
</contributor>
<contributor>
<name>https://github.com/kostd</name>
</contributor>
</contributors>
<distributionManagement>
<snapshotRepository>
<id>sonatype-nexus-snapshots</id>
<url>https://oss.sonatype.org/content/repositories/snapshots/</url>
</snapshotRepository>
</distributionManagement>
<dependencies>
<dependency>
<groupId>org.apache.maven</groupId>
<artifactId>maven-plugin-api</artifactId>
<version>${required.maven.version}</version>
</dependency>
<dependency>
<groupId>org.apache.maven</groupId>
<artifactId>maven-core</artifactId>
<version>${required.maven.version}</version>
</dependency>
<dependency>
<groupId>org.apache.maven.plugin-tools</groupId>
<artifactId>maven-plugin-annotations</artifactId>
<version>${required.maven.version}</version>
<scope>provided</scope>
</dependency>
<dependency>
<groupId>org.apache.maven.resolver</groupId>
<artifactId>maven-resolver-api</artifactId>
<version>${maven-resolver.version}</version>
</dependency>
<dependency>
<groupId>commons-io</groupId>
<artifactId>commons-io</artifactId>
<version>${commons-io.version}</version>
</dependency>
<dependency>
<groupId>com.fasterxml.jackson.core</groupId>
<artifactId>jackson-core</artifactId>
<version>${jackson.version}</version>
</dependency>
<dependency>
<groupId>com.fasterxml.jackson.core</groupId>
<artifactId>jackson-databind</artifactId>
<version>${jackson.version}</version>
</dependency>
<dependency>
<groupId>com.fasterxml.jackson.core</groupId>
<artifactId>jackson-annotations</artifactId>
<version>${jackson.version}</version>
</dependency>
<dependency>
<groupId>com.fasterxml.jackson.dataformat</groupId>
<artifactId>jackson-dataformat-csv</artifactId>
<version>${jackson.version}</version>
</dependency>
<dependency>
<groupId>com.jayway.jsonpath</groupId>
<artifactId>json-path</artifactId>
<version>${json-path.version}</version>
</dependency>
<!--Test Dependencies-->
<dependency>
<groupId>junit</groupId>
<artifactId>junit</artifactId>
<version>${junit.version}</version>
<scope>test</scope>
</dependency>
<dependency>
<groupId>org.assertj</groupId>
<artifactId>assertj-core</artifactId>
<version>${assertj-core.version}</version>
<scope>test</scope>
</dependency>
<dependency>
<groupId>org.mockito</groupId>
<artifactId>mockito-core</artifactId>
<version>${mockito-core.version}</version>
<scope>test</scope>
</dependency>
<!--Logging-->
<dependency>
<groupId>org.slf4j</groupId>
<artifactId>slf4j-api</artifactId>
<version>${slf4j-api.version}</version>
</dependency>
<dependency>
<groupId>ch.qos.logback</groupId>
<artifactId>logback-core</artifactId>
<version>${logback.version}</version>
</dependency>
<dependency>
<groupId>ch.qos.logback</groupId>
<artifactId>logback-classic</artifactId>
<version>${logback.version}</version>
</dependency>
</dependencies>
<build>
<pluginManagement>
<plugins>
<plugin>
<groupId>org.apache.maven.plugins</groupId>
<artifactId>maven-compiler-plugin</artifactId>
<version>${maven-compiler-plugin.version}</version>
<configuration>
<source>${supported.java.version}</source>
<target>${supported.java.version}</target>
</configuration>
<dependencies>
<dependency>
<groupId>org.ow2.asm</groupId>
<artifactId>asm</artifactId>
<version>6.2</version>
</dependency>
</dependencies>
</plugin>
<plugin>
<groupId>org.apache.maven.plugins</groupId>
<artifactId>maven-plugin-plugin</artifactId>
<version>${required.maven.version}</version>
<executions>
<execution>
<id>mojo-descriptor</id>
<goals>
<goal>descriptor</goal>
</goals>
</execution>
<execution>
<id>help-goal</id>
<goals>
<goal>helpmojo</goal>
</goals>
</execution>
</executions>
</plugin>
<plugin>
<artifactId>maven-enforcer-plugin</artifactId>
<version>${maven-enforcer-plugin.version}</version>
<executions>
<execution>
<id>enforce-maven-version</id>
<goals>
<goal>enforce</goal>
</goals>
<configuration>
<rules>
<requireMavenVersion>
<version>${required.maven.version}</version>
</requireMavenVersion>
</rules>
</configuration>
</execution>
</executions>
</plugin>
</plugins>
</pluginManagement>
</build>
<profiles>
<profile>
<id>integration</id>
<activation>
<activeByDefault>true</activeByDefault>
</activation>
<build>
<plugins>
<plugin>
<groupId>org.apache.maven.plugins</groupId>
<artifactId>maven-invoker-plugin</artifactId>
<version>${maven-invoker-plugin.version}</version>
<configuration>
<skipInstallation>${skipTests}</skipInstallation>
<skipInvocation>${skipTests}</skipInvocation>
<cloneProjectsTo>${project.build.directory}/it</cloneProjectsTo>
<settingsFile>src/it/settings.xml</settingsFile>
<localRepositoryPath>${project.build.directory}/local-repo</localRepositoryPath>
<postBuildHookScript>verify</postBuildHookScript>
<streamLogs>true</streamLogs>
<showErrors>true</showErrors>
<mavenOpts>${argLine} -Dorg.slf4j.simpleLogger.log.org.apache.maven.cli.transfer.Slf4jMavenTransferListener=warn</mavenOpts>
<properties>
<jmeter.version>${jmeter.version}</jmeter.version>
</properties>
</configuration>
<executions>
<execution>
<id>integration-test</id>
<goals>
<goal>install</goal>
<goal>run</goal>
</goals>
</execution>
<execution>
<id>verify</id>
<goals>
<goal>verify</goal>
</goals>
</execution>
</executions>
</plugin>
<plugin>
<artifactId>maven-surefire-plugin</artifactId>
<version>${maven-surefire-failsafe-plugin.version}</version>
<dependencies>
<dependency>
<groupId>org.ow2.asm</groupId>
<artifactId>asm</artifactId>
<version>6.2.1</version>
</dependency>
</dependencies>
</plugin>
<plugin>
<artifactId>maven-failsafe-plugin</artifactId>
<version>${maven-surefire-failsafe-plugin.version}</version>
<executions>
<execution>
<id>integration-test</id>
<goals>
<goal>integration-test</goal>
</goals>
</execution>
<execution>
<id>verify</id>
<goals>
<goal>verify</goal>
</goals>
</execution>
</executions>
<configuration>
<argLine>@{argLine}</argLine>
</configuration>
</plugin>
<plugin>
<groupId>org.jacoco</groupId>
<artifactId>jacoco-maven-plugin</artifactId>
<version>${jacoco-maven-plugin.version}</version>
<executions>
<execution>
<id>pre-unit-test</id>
<goals>
<goal>prepare-agent</goal>
</goals>
</execution>
<execution>
<phase>pre-integration-test</phase>
<goals>
<goal>prepare-agent-integration</goal>
</goals>
</execution>
<execution>
<id>default-report</id>
<phase>test</phase>
<goals>
<goal>report</goal>
</goals>
</execution>
<execution>
<id>default-report-integration</id>
<phase>post-integration-test</phase>
<goals>
<goal>report-integration</goal>
</goals>
</execution>
</executions>
<configuration>
<propertyName>argLine</propertyName>
</configuration>
</plugin>
</plugins>
</build>
</profile>
<profile>
<id>release</id>
<repositories>
<repository>
<id>sonatype-nexus-snapshots</id>
<name>Sonatype Nexus Snapshots</name>
<url>https://oss.sonatype.org/content/repositories/snapshots</url>
<snapshots>
<enabled>false</enabled>
</snapshots>
</repository>
</repositories>
<distributionManagement>
<repository>
<id>sonatype-nexus-staging</id>
<url>https://oss.sonatype.org/service/local/staging/deploy/maven2/</url>
</repository>
</distributionManagement>
<build>
<plugins>
<plugin>
<groupId>org.apache.maven.plugins</groupId>
<artifactId>maven-javadoc-plugin</artifactId>
<version>${maven-javadoc-plugin.version}</version>
<executions>
<execution>
<id>attach-javadocs</id>
<goals>
<goal>jar</goal>
</goals>
</execution>
</executions>
</plugin>
<plugin>
<groupId>org.apache.maven.plugins</groupId>
<artifactId>maven-source-plugin</artifactId>
<version>${maven-source-plugin.version}</version>
<executions>
<execution>
<id>attach-sources</id>
<goals>
<goal>jar-no-fork</goal>
</goals>
</execution>
</executions>
</plugin>
<plugin>
<groupId>org.kohsuke</groupId>
<artifactId>pgp-maven-plugin</artifactId>
<version>${pgp-maven-plugin.version}</version>
<configuration>
<secretkey>keyfile:${gpg.key.location}</secretkey>
<passphrase>literal:${gpg.passphrase}</passphrase>
</configuration>
<executions>
<execution>
<goals>
<goal>sign</goal>
</goals>
</execution>
</executions>
</plugin>
<plugin>
<groupId>org.sonatype.plugins</groupId>
<artifactId>nexus-staging-maven-plugin</artifactId>
<version>${nexus-staging-maven-plugin.version}</version>
<extensions>true</extensions>
<configuration>
<serverId>sonatype-nexus-staging</serverId>
<nexusUrl>https://oss.sonatype.org/</nexusUrl>
<autoReleaseAfterClose>true</autoReleaseAfterClose>
<stagingProgressPauseDurationSeconds>10</stagingProgressPauseDurationSeconds>
<stagingProgressTimeoutMinutes>10</stagingProgressTimeoutMinutes>
</configuration>
</plugin>
<plugin>
<artifactId>maven-enforcer-plugin</artifactId>
<version>${maven-enforcer-plugin.version}</version>
<executions>
<execution>
<id>enforce-maven-version</id>
<goals>
<goal>enforce</goal>
</goals>
<configuration>
<rules>
<requireMavenVersion>
<version>${required.maven.version}</version>
</requireMavenVersion>
<requireJavaVersion>
<version>${supported.java.version}}</version>
</requireJavaVersion>
</rules>
</configuration>
</execution>
</executions>
</plugin>
</plugins>
</build>
</profile>
</profiles>
</project>
|
{
"pile_set_name": "Github"
}
|
Iraqi Prime Minister Haider al-Abadi attends a meeting with officials in Baghdad, Iraq August 28, 2018. Iraqi Prime Minister Office/Handout via REUTERS
BAGHDAD (Reuters) - Iraq will send a delegation to the United States seeking an agreement on financial transactions with Iran following Washington’s reimposition of sanctions on Tehran, Prime Minister Haider al-Abadi said on Tuesday.
His statement was the first by an Iraqi official since Reuters reported last week Baghdad was going to ask Washington for exemptions from some of the sanctions because Iraq’s economy is closely linked with neighboring Iran.
“We have requests for the American side, we have presented them and a delegation will go to negotiate within that framework,” Abadi told a weekly news conference.
“We have presented a clear vision of what Iraq really needs. This includes Iranian (natural) gas, which is very important, as well as other trade and the electricity sector.”
U.S. President Donald Trump withdrew the United States in May from world powers’ 2015 nuclear deal with Iran, calling it flawed, and reimposed trade sanctions on the Islamic Republic.
The Trump administration has warned of consequences for countries including European allies that co-signed the nuclear accord, that do not respect the new sanctions. Baghdad is in a difficult position - its two biggest allies are the United States and Iran, themselves arch-adversaries.
“We have had good promises initially but as you know the American situation is complicated; you do not deal with one person, there are several institutions,” Abadi said.
He called the sanctions “unilateral” and “oppressive”, adding that Iraq would not be “part of a blockade” due to its own painful experience with international sanctions during the era of Saddam Hussein.
Iraqi government and central bank officials said the delegation would travel to Washington to ask for exemptions in applying the sanctions. They did not say when that trip would take place.
|
{
"pile_set_name": "OpenWebText2"
}
|
Q:
Encrypt web.config file using Data Protection API
I have encrypted part of my web.config file using the Data Protection API.
Now, my question is, what does a hacker need in order to decrypt the web.config file?
Does he require physical access to the machine in order to decrypt it? Or can he decrypt it from a remote location?
A:
It depends.
If the attacker gains access to your web.config alone, then he's not able to decrypt it without the key, which we're assuming he doesn't possess.
If you've set useMachineProtection to true in your DpapiProtectedConfigurationProvider configurations, and the attacker gains access to your machine (remote or not) with any account, then any process running on the machine could decrypt the web.config file, including anything the attacker could run.
If you've set useMachineProtection to false in your DpapiProtectedConfigurationProvider configurations, then the attacker needs access to the user account used for the process (remote or not).
You need to know that DPAPI provides password-based protection. So, assuming you're using option #3, then even if the attacker gains physical access to the machine, they still need the account's password to decrypt encryption keys which will decrypt the data. Of course, the attacker can easily reset the password, but that would render the encrypted keys useless and leaves your data inaccessible.
Note that until .Net 3.5 SP1, useMachineProtection is set to true (bad) by default. I have no information on later versions.
Update: .Net 4.0 uses the default value true for useMachineProtection as well.
A:
I'm assuming that you are working in .Net or perhaps lower level like C++. From having recently consumed those APIs here is what I would recommend.
There are 2 Protected Configuration Providers available, DPAPI (more appropriate for client side desktop applications) and the RSA Provider. The latter is more appropriate for encrypting web.configs as this is a public key configuration where only the ASP.NET service has the private key to decrypt the data, this can be scoped at both user and machine, similar to DPAPI.
Here is an old but sound walkthrough of it in ASP.Net. Apologies if you are not using .Net, it was unclear. Still though I think the RSA provider is the correct way to go here.
With regards to breaking the DPAPI encryption, yes most of the attacks would need to be orchestrated on the target machine, usually involving either an attempt at the password SAM files or password reset scripts targeted at systems admins. Related conference paper - breaking DPAPI offline : BlackHat 2010.
|
{
"pile_set_name": "StackExchange"
}
|
/*
Copyright 2016 The Kubernetes Authors.
Licensed under the Apache License, Version 2.0 (the "License");
you may not use this file except in compliance with the License.
You may obtain a copy of the License at
http://www.apache.org/licenses/LICENSE-2.0
Unless required by applicable law or agreed to in writing, software
distributed under the License is distributed on an "AS IS" BASIS,
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
See the License for the specific language governing permissions and
limitations under the License.
*/
package net
import (
"net"
"net/url"
"os"
"reflect"
"syscall"
)
// IPNetEqual checks if the two input IPNets are representing the same subnet.
// For example,
// 10.0.0.1/24 and 10.0.0.0/24 are the same subnet.
// 10.0.0.1/24 and 10.0.0.0/25 are not the same subnet.
func IPNetEqual(ipnet1, ipnet2 *net.IPNet) bool {
if ipnet1 == nil || ipnet2 == nil {
return false
}
if reflect.DeepEqual(ipnet1.Mask, ipnet2.Mask) && ipnet1.Contains(ipnet2.IP) && ipnet2.Contains(ipnet1.IP) {
return true
}
return false
}
// Returns if the given err is "connection reset by peer" error.
func IsConnectionReset(err error) bool {
if urlErr, ok := err.(*url.Error); ok {
err = urlErr.Err
}
if opErr, ok := err.(*net.OpError); ok {
err = opErr.Err
}
if osErr, ok := err.(*os.SyscallError); ok {
err = osErr.Err
}
if errno, ok := err.(syscall.Errno); ok && errno == syscall.ECONNRESET {
return true
}
return false
}
|
{
"pile_set_name": "Github"
}
|
The task of improving financial management across Whitehall is to be taken out of the hands of the Treasury, Philip Hammond has decided, in a move criticised as potentially likely to undermine efficiency for taxpayers.
In 2014, ministers implemented reforms to inject more business discipline into the civil service after a series of costly public spending errors. These included a significant procurement overspend at the Ministry of Defence, revealed by the National Audit Office in 2010, which put the MoD billions of pounds into debt; and the 2004 contract that allowed GPs to opt out of providing out-of-hours care but still gain large bonuses for hitting other targets.
One of the main planks of the reforms was to shift responsibility for financial management from the Department of Health, where the issue had appeared sidelined, to the heart of government in the Treasury.
The chancellor has now reversed that change so that the Treasury can concentrate on cutting spending and reducing the deficit. The leadership role for financial management — ensuring that taxpayers get value for money — will move to another, as yet unspecified, department.
Rob Whiteman, chief executive of the Chartered Institute of Public Finance and Accountancy, called Mr Hammond’s decision a “backwards step”. He said: “Good progress has been made to improve the timeliness of year-end accounts, but in the opinion of most independent experts there are still further improvements to be made that will now be harder to achieve.”
He cited the planning of efficiency measures and investment projects, to ensure they had been fully costed and more effectively implemented. “We have seen, for example, that in areas like prisons and social services, money is taken out only then to be reversed by the chancellor because the savings agreed were found to not be achievable.”
Julian McCrae, deputy director of the Institute for Government think-tank, said: “The evidence clearly shows that the post-2013 leadership structure was working. It is also clear that this was not a case of ‘job done’. While there have been some tangible improvements, core ambitions such as ensuring that financial insights flow into all Whitehall’s decisions are still a long way off.”
In 2013, a financial management review commissioned by George Osborne, the chancellor at the time, concluded that the Whitehall model was out of line with the private sector, where the chief financial officer sits at the heart of the organisation and its decision-making.
The following year Julian Kelly, a qualified accountant, was promoted from his position as director of public spending to also take on the role of controlling financial management.
Mr Hammond is splitting Mr Kelly’s role in two. The head of public spending will remain in the Treasury while the leading official on financial management will combine this with a similar role at another department.
James Bowler, the current Treasury director-general for tax, will take up the former position. Although Mr Bowler is a highly regarded Treasury generalist, his appointment reverses the commitment in the review to have a financially qualified civil servant doing the public spending job.
Mr Whiteman said: “Before 2013 one of the departmental CFOs took the leadership role across the civil service on top of their day job, and this is now about to happen again.”
Treasury officials said the personnel changes did not mean the government was failing to take financial management seriously. “There will continue to be dedicated staff and resources in place to deliver what the government needs in terms of financial management across Whitehall and there is no let up in our commitment in this area,” said an official.
Whitehall needs resources for Brexit, say MPs The government should ensure the civil service is sufficiently skilled and resourced to meet the significant challenges it faces over Brexit, a Commons committee has urged. The 26 per cent reduction in the number of civil servants since 2006 would put a strain on Whitehall as it gears up for negotiations with Brussels and prepares to take back responsibility for policy and regulation in several areas such as agriculture, said MPs on the public administration and constitutional affairs committee. MPs highlighted concerns raised last year by the Institute for Government think-tank, which said: “The challenge for the civil service is not skills but capacity.” The MPs also noted that the Brexit-related strain on Whitehall could arguably be seen in other areas of government business, including hundreds of outsourcing contracts that were due to expire but were renewed or extended because civil servants are too preoccupied with Brexit to focus on them. The committee also called for an in-depth consideration of the relationship between ministers and civil servants, with a clarification of rules setting out boundaries between them. Brexit made it all the more important the civil service was clear about its mission and role, MPs added. Bernard Jenkin MP, chair of the committee, said: “We believe that this is the first time that there has been select committee consideration of the relationship between ministers and officials with the active support of government and the civil service. The findings were welcomed by the FDA union, which represents the UK senior civil servants. Dave Penman, FDA general secretary, said: “The report is a welcome addition to mounting evidence that the government is failing to match commitments with the resources it provides to the civil service — and is compounding this error by insisting on Brexit on the cheap.” Jane Croft
Copyright The Financial Times Limited . All rights reserved. Please don't copy articles from FT.com and redistribute by email or post to the web.
|
{
"pile_set_name": "OpenWebText2"
}
|
[Lid reconstruction: functional and aesthetic aspects].
There are numerous different procedures for eyelid reconstruction, one of them being the transfer of pedicled full eyelid flaps. With regard to the increasing demands of the patients the so-called sandwich techniques in most cases offer the chance to get the best functional and aesthetic result in a individual situation. Some of these techniques are presented here.
|
{
"pile_set_name": "PubMed Abstracts"
}
|
This is the finding of a new study by researchers at Johns Hopkins Bloomberg School of Public Health, published yesterday in Environmental Health Perspectives.
The plume from a man vaping an e-cigarette (Courtesy of Shutterstock)
While the study is small—evaluating devices in a random sample of 56 users—it revealed that a significant number of the devices produced aerosols with potentially dangerous levels of lead, as well as other important metals such as chromium, manganese and nickel. Chronic exposure to such metals by inhalation has been linked to wide ranging effects--including cancer--on multiple organ systems including the lungs, brain, heart, liver, as well as the immune system.
Even though the FDA has the ability to regulate e-cigarettes, there has been no firm indication if, or how, it may choose to address findings by this and previous studies regarding the toxicity of the contents of the vapor. But it’s fair to say that the FDA will likely have a say by issuing future rulings on this important matter.
"It's important for the FDA, the e-cigarette companies and vapers themselves to know that these heating coils, as currently made, seem to be leaking toxic metals--which then get into the aerosols that vapers inhale," said Ana María Rule, PhD, MHS, the senior author of the study in a press release.
In a typical e-cigarette, an electric current produced by a battery passes through a metal coil to heat nicotine-based e-liquids to create an aerosol. What’s clear is that vaping has not only emerged as an alternative among former smokers, but also teens and even those in middle school. In fact, according to a 2017 survey by the National Institute on Drug Abuse (NIDA), nearly 15% of 8th, 10th and 12th grade students in public and private schools has used e-cigarettes in the past month.
Vaping is considered a form of “harm-reduction” because it reduces the risk of cancer and heart disease associated with combustion of tobacco products, but it still delivers the “hit” of nicotine along with its characteristic “look and feel”. Yet, there are studies which have found that vaping does carry medical risks. In fact, there are studies which have noted that animals (mice) and animal cells grown in standard culture in laboratory settings may both be harmed by e-cigarette liquids. Rule has previously published data last year which demonstrated elevated levels of toxic metals in e-liquids exposed to the e-cigarette heating coil.
Rule’s current study selected 56 daily e-cigarette users recruited from vaping conventions and e-cigarette stores in Baltimore, Maryland during late 2015. The research team analyzed their devices for 15 metals in their refilling dispensers, the e-cigarette reservoirs, as well as in the aerosols generated from their devices.
The researchers found small amounts of metals in the e-liquids inside refilling dispensers, just as in previous studies. However, there were significantly greater amounts of some metals in the e-liquids that had been exposed to the heating coils within e-cigarette reservoirs. The metals accounting for the difference had, most likely, originated from the coils. But another key finding of the researchers was that the higher metal concentrations were also evident in the aerosols that were generated by heating the e-liquids.
The levels of lead, chromium, nickel and manganese were noted to be elevated, and certainly toxic when inhaled. The median lead concentration in the aerosols was close to 15 μg/kg--25 times greater than the median level in the refill dispensers.
And nearly half of all aerosol samples had lead concentrations higher than health limits set by the Environmental Protection Agency (EPA). The median aerosol concentrations of nickel, chromium and manganese were also at risk, or exceeded safe levels set by the EPA.
"These were median levels only," said Rule. "The actual levels of these metals varied greatly from sample to sample, and often were much higher than safe limits."
The e-cigarette heating coils are generally composed of nickel, chromium and other metals, indicating them to be the clear source of metal contamination. But the source of the lead is unclear, according to Rule. "We don't know yet whether metals are chemically leaching from the coil or vaporizing when it's heated," offered Rule.
What’s even more concerning is that the investigators also found significant levels of the toxic chemical arsenic not only in in e-liquid refills, but also in reservoir e-liquid and aerosol samples from 10 of the 56 vapers studied.
But it’s the long-term effects of vaping and metal exposures which must be systematically studied. "We've established with this study that there are exposures to these metals, which is the first step, but we need also to determine the actual health effects," she concluded.
“This important study lends confirmation to the growing concern of clinicians, healthcare officials, and concerned citizens that current vaping instruments and e-cigarettes are not a safe and efficacious delivery modality for tobacco, and other loose leaf and oil based substrates,” said Rich Able, a medical device marketing consultant with over 20 years of experience.
“The metal and parts composition of these devices must be stringently tested for toxic analytes and corrosive compounds,” offered Able. “The FDA does not currently test any of the most popular vaping and e-cigarette instruments being manufactured at unregulated factories in Asia that source low-grade parts, batteries, and materials for the production of these devices.”
Able explained that “the metals detected in this study have been associated with multiple adverse health effects under chronic conditions of exposure. Neurotoxins such as lead are linked to increased risk of cardiovascular and kidney disease. The other metals listed are even more nefarious to human organs. The strong oxidative effects of manganese can lead to necrosis (tissue death) of the mucous membrane and esophagus. Arsenic was detected in 17.9% of the aerosolized samples which can lead to significant multiple end organ damage with long term exposure.”
Able believes that this and prior research is a wake-up call to the vaping industry-- in short, that it’s time for things to change.
“It is critical for manufacturers of these delivery systems to design, engineer and manufacture these devices to FDA medical device quality standards. To continue manufacturing and marketing these devices to the smoking population without further diligence and clinical review is unethical and unconscionable,” said Able.
Lessnau explained that nicotine vapor devices are used as harm reduction treatment for people who have trouble quitting tobacco products.
"It is currently believed that vapor smoking has less exposure to harmful chemical substances. However, many delivery devices use heated metal coils and aerosolize metals such as lead, chromium, manganese, nickel, arsenic and others. The vapors themselves have added chemical substances to make the smell more palatable and possible endocrine disruptor molecules are of concern," said Lessnau.
"The delivery devices and the vapors are proprietary to large companies and is currently unknown how dangerous they can be to lung health and other organs. The FDA should regulate these devices to have better knowledge about adverse effects. There is no reason to keep this information secret," added Lessnau.
I am an emergency physician on staff at Lenox Hill Hospital in New York City, where I have practiced for the past 15 years. I also serve as an adviser and editor to Medscape Emergency Medicine, an educational portal for physicians, and an affiliate of WebMD. My other time i...
|
{
"pile_set_name": "Pile-CC"
}
|
Bowker's Law Books and Serials in Print
Bowker's Law Books and Serials in Print is a descriptive legal bibliography, and is one of the two main publications of this type. Law libraries often use it as an aid to collection development. It is a "standard reference work". It is "irresistible". It is complemented by International Legal Books in Print. It is published by R R Bowker.
References
Sources
Editions:La21_QklGBcC - digitized copies in snippet view from Google Books.
80 Law Library Journal 340.
Yirka, Carl. "Best Legal Reference Books" (1989) 81 Law Library Journal 305 at 309 and 328 and 329.
Pagel, Scott B. "The Legal Bibliography and User Needs" (1989) 81 Law Library Journal 387 at 426.
Miller, Ellen J. "The Video Collection: Selection and Evaluation". 85 Law Library Journal 591 at 592.
Category:Legal bibliographies
|
{
"pile_set_name": "Wikipedia (en)"
}
|
AuthorTopic: Blondes on Everest joke! (Read 10183 times)
There were 12 people climbing up the Lhotse Face. 11 were blondes, 1 a brunette. Half way up, the fixed ropes started tearing. They decided one person needed to jump off and sacrifice themself in order for them all to survive. The brunette gave a long, heart-warming speech of how she was going to sacrifice herself for the others. Everyone started crying. Once she was through, all the blondes clapped loudly.
|
{
"pile_set_name": "Pile-CC"
}
|
Two ways of estimating the euro value of the illicit market for cannabis in France.
The most recent health surveys in general population are used in order to estimate the annual market size for cannabis in France in 2005. Two methods for arriving at an estimate are proposed: the first based on reported consumption, the other on reported expenditure on cannabis. The annual sales figure for cannabis in France is between 746 and 832 million euro. Men's expenditure accounts for between 80 and 85% of total expenditure and those aged between 15 and 24 years account for the greatest part of the size of the cannabis market, between 57 and 60%, depending upon the method. According to these estimates, consumers' average annual expenditure on cannabis is around euro 202 in France, compared to estimates obtained for New Zealand and Holland (euro 124) and the United States (euro 362).
|
{
"pile_set_name": "PubMed Abstracts"
}
|
class FixMaintainersWithAlumnusFalse < ActiveRecord::Migration[5.1]
def up
Maintainer.where(alumnus: "0").update_all(alumnus: nil)
end
def down
raise ActiveRecord::IrreversibleMigration
end
end
|
{
"pile_set_name": "Github"
}
|
Q:
Datatable on row-reorder data oldData and newData is undefined
I am currently rewriting my datatable from CodeIgniter (datatables v1.10.12 and RowReorder v1.1.2) to Laravel 6 (datatables v1.10.20 and RowReorder v1.2.6). On the event 'row-reorder' i need to collect data about the changes. Therefore i use this script.
$('#category-table').on('row-reorder.dt', function (dragEvent, data, nodes) {
var newSequences = [];
$.each(data, function(key, change) {
console.log(change);
newSequences.push({
id: $(change.oldData).data('id'),
sequence: $(change.newData).data('sequence')
});
});
doThingsWithTheResult(newSequences);
}
In the old situation (CodeIgniter) 'change.oldData' and 'change.newData' are filled with the old and new elements that are affected by the 'row-reorder' event but in the new situation (Laravel) both 'change.oldData' and 'change.newData' are 'undefined'.
Old/working situation
New/ not working situation
What could be the reason why these crucial properties are 'undefined'?
A:
Problem solved!
Although it worked out-of-the-box in the old situation in de new situation i needed to add/provide the rowReorder.dataSrc setting.
|
{
"pile_set_name": "StackExchange"
}
|
dairy suppliers
There are major health and safety issues involving Chinese milk tainted with melamine, a chemical used in making furniture and other goods, and it appears little is being done to solve the p... Read more
|
{
"pile_set_name": "Pile-CC"
}
|
Whole Genome DNA Methylation Analysis Using Next-Generation Sequencing (BS-seq).
Plant methylation is widely evident and has played crucial roles ranging in defining the epi-genome variations during abiotic and biotic stress. Variations in epi-genomic level has observed not only in the symmetrical as well as the non-symmetrical sequences. Plethora of these epi-genomic variations have been widely also demonstrated at the flowering, tissue-specific, and also at developmental stages revealing a strong association of the observed epi-alleles to the physiological state. In the present chapter, epi-genomic analysis of the s has been described with functional workflow and illustrated methodology.
|
{
"pile_set_name": "PubMed Abstracts"
}
|
# Contributor: Bart Ribbers <bribbers@disroot.org>
# Maintainer: Bart Ribbers <bribbers@disroot.org>
pkgname=calendarsupport
pkgver=20.08.1
pkgrel=0
pkgdesc="Library providing calendar support"
arch="all !ppc64le !s390x !armhf !mips !mips64" # Limited by akonadi-calendar-dev -> kmailtransport -> libkgapi -> qt5-qtwebengine
url="https://kontact.kde.org"
license="GPL-2.0-or-later AND Qt-GPL-exception-1.0 AND LGPL-2.0-or-later"
depends_dev="
akonadi-calendar-dev
akonadi-dev
akonadi-mime-dev
akonadi-notes-dev
kcalendarcore-dev
kcalutils-dev
kcodecs-dev
kguiaddons-dev
kholidays-dev
ki18n-dev
kidentitymanagement-dev
kio-dev
kmime-dev
pimcommon-dev
qt5-qtbase-dev
"
makedepends="$depends_dev
extra-cmake-modules
qt5-qttools-dev
qt5-qttools-static
"
checkdepends="xvfb-run"
source="https://download.kde.org/stable/release-service/$pkgver/src/calendarsupport-$pkgver.tar.xz"
subpackages="$pkgname-dev $pkgname-lang"
build() {
cmake -B build \
-DCMAKE_BUILD_TYPE=None \
-DCMAKE_INSTALL_PREFIX=/usr \
-DCMAKE_INSTALL_LIBDIR=lib
cmake --build build
}
check() {
cd build
CTEST_OUTPUT_ON_FAILURE=TRUE xvfb-run ctest
}
package() {
DESTDIR="$pkgdir" cmake --build build --target install
}
sha512sums="65849b524534b154ad45413ee35f6da2e9ce5edc4c3dc516f868adf70098793c609b726c4b484d9106c6b31fca830fd575b9671abb006173a00f2ccadc44551e calendarsupport-20.08.1.tar.xz"
|
{
"pile_set_name": "Github"
}
|
Tesco Eyes U.S. for Expansion
September 25, 2005
London, Although Tesco has denied interest in supermarket giant Albertson’s, interest in some kind of U.S. expansion is clear, as Tesco has installed a 65-member team of top executives in America to weigh the acquisition possibilities of a leading U.S. grocery chain.
According to a Tesco source, chief executive Sir Terry Leahy is talking about creating a “second engine for growth,” and identified America, Canada and Japan as targets.
Newsletter Registration
Solutions Spotlight
To support consumers’ omnichannel shopping behaviors, product information, inventory availability, and customer profile and order information must be current and available throughout the enterprise to enable real-time visibility. In this white paper, you'll learn all about the new demands of a harmonized shopping experience; the new generation of network-centric information systems with access to rich information; and the perceived value of new store-level technology.
Store of the Week
Kleinfeld Hudson’s Bay, a luxurious 14,000-sq.-ft. bridal shop on the top floor of the Hudson’s Bay flagship and headquarters building in Toronto, took the top prize — Store of the Year — in the Association for Retail Environments 2015 Design Award.More...
|
{
"pile_set_name": "Pile-CC"
}
|
On Thu, Nov 29, 2012 at 1:40 PM, Johan Tibell <johan.tibell at gmail.com> wrote:
> This version works around the Word->Double conversion bug and shows
> good performance:
I'd also like to point out that I've removed lots of bang patterns
that weren't needed. This program runs fine without any bang patterns
(but I've kept the one that can possibly have any performance
implication at all).
-- Johan
|
{
"pile_set_name": "Pile-CC"
}
|
Xbox 360 Console, Halo 3 Edition. The hard drive still has all of the preloaded content ALONG WITH extra themes and gamer pictures that were available during launch week of Halo 3. I have original box with controller, head seat, play and charge, and all of the accessories, most still in there plastic bags. If you have any questions don't hesitate to ask!
|
{
"pile_set_name": "Pile-CC"
}
|
Grant Boone ('91)
Alumni Relations Officer
Grant joined the Alumni Relations Office in June 2009. His responsibilities include managing the Alumni website, the Homecoming Golf Classic and spending time with alumni in the Austin and San Antonio areas.
Grant is also the play-by-play voice of ACU sporting events heard on local radio in Abilene and worldwide on acusports.com.
A 1991 graduate of the Journalism/Mass Communication Department, Grant has worked in TV, radio, internet and print as a broadcaster and writer for a variety of media outlets, including CBS Sports, ESPN, Fox Sports, TNT, Golf Channel, CBS Radio Sports and PGA.com. He received the Gutenberg Award from the ACU Journalism/Mass Communication Department in 2001 for distinguished journalistic achievement.
Grant and his wife, Amy (Nichols '92), have three children: Andrew, Nick and Anna Claire.
|
{
"pile_set_name": "Pile-CC"
}
|
EXCLUSIVE INTERVIEW: GORELUST (CANADA).
GORELUST from Rimouski, Quebec (Canada) was one of the most brutal bands around at that time (1995) and were regarded as one of the very best live act in the province, kicking everbody’s ass everywhere they played. Then, quickly, to everyone’s irony they disbanded right after their first album ‘Reign of Lunacy’ but after almost 18 years the same album will be re-issued via PRC MUSIC.
During a time when so called ‘Bigger’ Old School Death Metal bands have failed to deliver the traditional tunes, this re-issue will please many OSDM fans for sure. Listening to ‘Reign of Lunacy’ is like injecting molten lava into your veins. It’ll burn you down to ashes. Mark my fucking words!!! The record isn’t trying to sound old school because it is old school.
I caught up with Jean (Vocals) to talk about the past and the near future plans of GORELUST, the re-issue of Reign of Lunacy’ and much more. Check:
.
.
Hello Jean, thank you for your time. How is GORELUST doing after all these years of silence?
-Hi! Actually about a few weeks ago Gorelust was still in coma since 1996..:-) The band
has been awake for a few weeks now… And its doing very good! Everything is at an early stage
right now but we have a strong desire to be heard again.
.The band split up after its first Kick Ass FL ‘Reign of Lunacy’, what went wrong?
-At the time we were very young and everyone was trying to make plans for the future.
We had a few really killers songs ready to be recorded but were missing another 5-6 tracks to
complete a second album. I remember the writing process was so long and everyone in the band
was planning their own life. We began to lose hope for a possible future for the band… Actually
not every members was ready for the next step; more gigs or touring. You got to understand that
we were so young a the times… We were still living with our parents… Hahahaha..:-)
We played a lot of gigs but not real touring on a long duration. Ressources were also very limited
at the times… No internet to comunicate and organized things for the band. We were located in a
small city about 5-6 hours drive from the main city. So we were kind of sucessfull locally but to
expand our boundaries was kind of hard.I really would have like to go out with the band, to
reach the next step. But it never happened. I decided to make different plans for my future and i
left the band in 1996. I moved to Montreal city to study sound enginneering. The band tried to
replaced me at first but it was just not the same and a few months after that the band call it quit.
.…and thankfully the band has reformed now. What took it 18 odd years to come out with such a noblethought and idea? It’s great news for old fans who have known the band since its earlier days and for the newlisteners alike.
-With internet now everything is so different. I’ve always kept a close look on the Reign of Lunacy album. Always found different reviews and peoples talking about it over the world. I was reading about it and I was saying to myself that it would be amazing to do other album. In all honestly, I think that the newer material was even better than Reign of Lunacy. I really like the 1st album but with the new material the band had find their own style. It was just more brutal and more mature.The band was young and everyone were evolving musically.
About a year ago I met with the drummer Francis Marmen. He was playing with another band in Montreal. I went there to see him and we had a few beers together talking about the past but also about a possible future for a second album. So we kept that in mind and a month ago we decided to actually doing it. To clarify thing, we are not reforming as a touring band. The goal is to make a second album. A kick-ass second album. Like we supposed to do back in 1996. Everyone has their own lives now and just the fact to do a follow-up album is actually an amazing thing for us. We’ll see about others possible things after that. I really can’t wait to do it!
Who else from the original line-up can we find in this reformation?
-For the moment we have myself Jean Beaulieu on vocals, Francis Marmen on drums
and Pascal Chevrier on bass. Only the guitarist needs to be confirmed. There is the possibility to
also have the original guitarist onboard with us. We’ll see. The goal was to have the most original
members as possible and its looking very good! It will sound like Gorelust. This is the point of
doing it.
.Can you recall the ‘Reign of Lunacy’ days? The same scene has grown bigger now. How was it backthen?
-It was amazing. Death metal was still evolving and we were buying a lot of new albums
and discovering new brutal music every weeks. The band was pretty succesfull in the Rimouski
(our hometown) area and the shows were very special moments. We had the chance to play with a lot of big names bands and we have so great memories of that. We played also in a lot of different cities in the province of Quebec and a lot of peoples were coming to the shows. I will always remember the gigs we played with Deicide, Suffocation, Gorguts, Cannibal Corpse and a lof of others. The big mosh pits, everything was crazy.
Brutal music was more of an underground thing and death metal fans were really into their
music. They were proud of it actually. The scene today is not that different. What really changed
the scene was the coming of internet in our everyday lifes. It opened so many possibilities. Back
in the days, I was answering every interviews by the mail, everything was slower. With internet,
communication between bands, labels, distributors is so different now…
.The Reissue of your debut FL (a must have for all OSDM fans) is a great news indeed. How excitedis the band and how do you think the new listeners will take it?
-To see the album reissued is a really cool thing for us. Copies of the original edition
were selling for 60-80 US $ so it was really limited to death metal collector’s. Now new peoples
can discover it and hear what mid 90’s death metal was about…Everything was played by the
band and not digitally enhanced. This is a raw and straight to the face underground death metal
album. Back in the days that was the point of playing death metal. Brutal and technical music
played by extreme music musicians. I hope that the reissue will bring new fans for the band. Yes,
it is oldschool but the album did aged pretty well I think. Songs are made of lot of riffs and
different parts so peoples have to listen to it a few times before getting it. The production has a
interesting direct approach. Everything was recorded and mixed in 7 days. Old school way.
Everything on analog tape. No protools or enhanced performances.
We really have to thank Rémi Côté who is the owner of PRC music who decided to re-release it.
He was also the man responsible for the original release of the album in 1995. On New World
Symphony records. So he always believed in this brutal underground album and we can’t thank
him enough for that. All our respect to him.
.Talking about your upcoming new release, when can we expect it to come out? –For now everything is at an early stage. It was decided just a few weeks ago. We are
finalizing the line-up and after that will begin the writting process. I would say near the end of
2013. Maybe faster but we’ll wait to see how things are going before announcing release date.
.What can we expect in terms of sound and influence of the band in the new releases? Have youplanned to stick to the roots and old sound or there are surprises in coming?
-This will be the 2nd Gorelust album and it will sound like Gorelust. This is the point of doing this.
Peoples who loves the first album wants to hear a second album and we’ll give them what they want! Brutal death metal music. The goal is to push the brutality and technicality.Everything
needs to be better, and we’ll see to that. So we will stick to the roots but we also want to upgrade the product. We don’t want to only use the name of the band, the music has to be the logical
sequel of the Reign of Lunacy album.
.What are your personal thoughts on Metal sub-genres especially on Metal core and Djent?
-I’ll be very honest with you on your next questions.:-)
I actually don’t know what Djent is and I don’t listen to metal core at all. So I can’t really give
you any personal thoughts on them. I’m almost 36 years old right now and I’ve listened to metal
since I was 6-7 but I’m pretty picky about what I like or not. I also don’t really care for the
different terms of the differents category of metal. For me great music is great music. It’s all a
matter of tastes.What about the more extreme form of Metal like Goregrind,pornogrind etc?
-Just like I said terms are not important for me. Too much category and its all get
confusing. I don’t know why peoples want to categorize everything… 🙂 I prefer to say brutal
music. Death metal or black metal. But pornogrind….I can’t say…. 🙂
.Do you think Death Metal as a genre is still ‘Underground’?
-Yes, completely. It will always be. Mainstream is what the the majority of the peoples
are listening and death metal is definitely not that.
.Well again I would like to thank you for your time. We at DSU and BRUTAL POKHARA wish theband all the best for ‘Reign in Lunacy’ and the upcoming releases. Any last shout outs?
-Thanks a lot for this nice interview.I also want to say a big thank you to everyone who is
reading this. Thanks for your support. Don’t forget to “likes” the Gorelust offical facebook page
or the group page and you’ll hear from us. Any news on the new release will be post there. We
can’t wait to give you the next Gorelust chapter. Stay brutal! Cheers from Canada.
|
{
"pile_set_name": "Pile-CC"
}
|
Adverse health events associated with domestic violence during pregnancy among Brazilian women.
domestic violence during pregnancy remains an unsolved and neglected social problem despite the recognised adverse physical and mental health consequences. to examine the association between domestic violence (psychological violence and physical or sexual violence) and health problems self-reported by pregnant women. a cross-sectional analysis from a cohort study of 1,379 pregnant women attending prenatal care in public primary care units in Campinas, São Paulo, Brazil. Data were collected by interviewing women when they enroled for prenatal care. Domestic violence and alcohol abuse were ascertained by validated questionnaires. Referred morbidities, undesirable behaviours and sociodemographic characteristics were also recorded. Univariate analyses were used to estimate prevalence and unadjusted odd ratios. Multivariate logistic regression was used to identify the independent association between psychological violence and physical or sexual violence during pregnancy and women's health outcomes. psychological violence and physical or sexual violence were reported by 19.1% (n=263) and 6.5% (n=89) of the pregnant women, respectively. Psychological violence was significantly associated with obstetric problems [odds ratio (OR) 1.95; 95% confidence interval (CI) 1.39-2.73], premature rupture of membranes (OR 1.64, 95% CI 1.01-2.68), urinary tract infection (OR 1.71, 95% CI 1.19-2.42), headache (OR 1.75, 95% CI 1.25-2.40) and sexual risk behaviours (OR 2.28, 95% CI 1.18-4.41). Physical or sexual violence was significantly associated with: obstetric problems (OR 1.72, 95% CI 1.08-2.75), premature rupture of membranes (OR 2.11, 95% CI 1.14-3.88), urinary tract infection (OR 2.05, 95% CI 1.26-3.34), vaginal bleeding (OR 1.95, 95% CI 1.10-3.43) and lack of sexual desire (OR 3.67, 95% CI 2.23-6.09). domestic violence during pregnancy was associated with adverse clinical and psychological outcomes for women. These results suggest that a well-organised health-care system and trained health professionals, as well as multisectorial social support, are necessary to prevent or address the negative influence of domestic violence on women's health in Brazil.
|
{
"pile_set_name": "PubMed Abstracts"
}
|
Q:
Do I have to use the entire loan amount?
I am 18 and I want to apply for a loan for a used car. I do not plan on paying more than $4000 for the car but the bank has a minimum of $7500 for car loans. If I only used $4000 could I just use the rest to pay it off? I also do not have any credit.
A:
I doubt they will let you even get an auto loan for almost double what the car is worth. A car loan is secured by the car. If it isn't worth what you borrowed they wouldn't be able to recover their money by repossessing the car if you didn't make your payments.
A:
You should shop for a car loan at another bank or credit union. There are lots of lenders willing to lend just the amount you need. According to Craigslist, you can buy a very nice 15-20 year old vehicle for the amount you have budgeted.
Perhaps you can borrow against a credit card or other personal line of credit. That might even be cheaper. If so, it will be much more convenient -- you won't have any hassles getting a car lender's name added to, or removed from, the title. It would also eliminate the possibility of repossession.
Have you set up a checking account and a savings account? If so, ask your bank or credit union about a car loan or credit card or personal line of credit. If not, shop for all of them at the same time.
If you can get a $ 4,000 car loan at 7 % APR for 36 months, your monthly payment would be about $ 125 per month. There is a major U.S. on-line bank that (as of December 2015) offers these terms for some U.S. buyers with "rebuilding" credit (on approved credit). The bank has a risk-free on-line pre-qualification process. They don't actually make the loan until after you submit your loan application at the dealer.
An Oregon credit union that posted its rate sheet in October 2015 was offering (on approved credit) a $ 4,000 unsecured loan at 17% APR for up to 48 months to members with credit ratings of "559 or below". This works out to 36 monthly payments of about $ 145/month, or 48 monthly payments of about $ 120/month. (They also offered auto loans at 15.5% APR with a substantial downpayment.)
|
{
"pile_set_name": "StackExchange"
}
|
After eight years away, Robyn is returning as one of pop’s modern icons with new album ‘Honey’, no longer content with running head first through heartbreak but searching for a deeper connection.
There’s a specific moment a few minutes into Robyn’s new album ‘Honey’ that perfectly encapsulates her new world. “I’m a human being,” she states, introducing its second track, also titled ‘Human Being’, with desperation seeping into her voice slowly but surely. It’s sung as a projection of self-realisation, just one that also happens to make her utterly terrified. “My heart can’t stop beating / Don’t know what to do,” she continues, before a warm, soft wave of synths rush in to back her up like a sonic hug. She repeats the track’s title again, but this time more softly, and with confidence: “I’m a human being.” Her last album - 2010’s ‘Body Talk’ - was a thudding rush of robotic lust, taking inspiration from all things digital to crush heartbreak and despair with pummelling synths and choruses to bellow ‘til the air runs out, fists clenched. It’s the feeling most closely associated with Robyn as an artist and as a person, someone whose music you put on in the throes of gutting heartache, to help you power through it at full pelt. When the tour for that album came to an end at the beginning of 2014, however, she found herself physically and emotionally drained, disconnected with the idea of what she had left to say as an artist, and finding the well of her previous methods of communication and connection to be running dry. “I think in the past I’ve been more…” she begins today, before pausing. “My instinct has been to push through [feelings] and face things head on, but this time it wasn’t an option for me. It felt like a dead end. I just couldn’t push this any further. It’s not gonna go anywhere. I can’t be writing sad love songs for the rest of my life - that’s just gonna be pathetic!” she chuckles. It’s an idea that she also lays out plainly on ‘Human Being’, too: “All these emotions are out of date.” She returned home from the road to a turbulent period in her life. She was in the process of exiting a long-term relationship, and attending therapy. Then her friend and long-term collaborator Christian Falk died after a short illness. If the sense of needing a re-evaluation of her life and career wasn’t already prominent enough in her mind, it soon became unavoidable. It all spills out on comeback single, ‘Missing U’. “I was very sad and upset when I wrote it,” she says of the song now. “It was the beginning of a really tough period for me. Then as I kept writing, my songwriting and what I was actually doing myself was trying to find a soft space of self-care and enjoying my life again, so I think that that’s how the arc of the album is, but it’s also exactly what my life was like.” Using ‘Missing U’ to relaunch herself was a no-brainer, then. “It was the first song I wrote for the album, it’s the first song on the album, it’s the first part of what the story of the album is,” she explains. “It’s also a little bit of a moment that explains the space that I was in while I was away. Also just the beginning of the song,” she continues, before raising her arms like a rainbow and humming the shimmering first notes to the album: “that sound, the arpeggio - it feels like a sunrise to me.” It was a familiar enough reintroduction, those synths pummelling away with the power they’ve always harnessed, but it also served as an initial kick open of the door into a whole new world that ‘Honey’ goes on to explore. Writing it enabled the singer to dive deeper into herself, and begin carving out an entirely new form of connection. To do so, she headed home.
“I can’t be writing sad love songs for the rest of my life.”
After the 'Body Talk' tour finished, and following a few preliminary sessions with Metronomy’s Joe Mount for what would eventually become 'Honey', Robyn realised that she needed to isolate herself in order to rediscover the core of her purpose as an artist, and how she was to move forward. Setting up shop in a new studio in her hometown of Stockholm for the vast majority of 2015, the singer set about working on an album alone for the first time. "I felt a bit lost," she lays out simply, speaking of her mindset when faced with a blank slate. "When I did the 'Body Talk' album I’d just finished the other album before it [2005’s self-titled effort], so I was up to speed and just continuing. With ['Honey'], it really felt like a new start, and that was a little nervewracking. I knew that I had to take my time, and I wasn’t in a space where I could force it. I really didn’t have a choice, it was just the way it was." It’s an approach that, again, manifests itself audibly in 'Human Being', which serves - in its finished form at least - as an anthem for self-acceptance, even if it was initially borne out of completely opposing feelings. "I was really sad, and I was trying to come to terms with things," she states, the isolation of the studio allowing her to dig into emotions that had been buried under touring schedules, non-stop travelling and - to a certain extent - the unwavering defiance of her own older songs. "Being a human being is automatically being flawed and limited, both physically - because you have a body that you have to take care of and exist in - but also [because] you’re gonna die! It’s all just going to hell, basically, and yeah…" she says before pausing and looking slowly towards the floor. "Maybe it was some kind of mid-life crisis…" she near-whispers, before raising her head and chuckling. It was only when the singer afforded herself the space and time to confront these niggling feelings, though, that themes of self-acceptance and self-care placed themselves at the heart of 'Honey'. "I think I know myself a lot better [now]," she reflects. "It wasn’t about even coming back to what I was before - for me, I feel like I really changed. It was a restart, but not a restart to get back to what things were like before. It was a total re-evaluation of life - a new outlook that’s a bit more complicated, but also calmer."
“It was a total re-evaluation of life.”
While these ideas of personal growth were beginning to present themselves to Robyn inside her Stockholm studio, things were also massively changing for her outside its walls. "I could definitely feel how the music industry was changing while I was making it," she nods, with the acknowledgement that whatever album she wrote would be released into an extremely different world, one she was currently hiding herself away from. "I had an urge to make a proper album," she continues, reflecting on the fragmented recording and release process for 'Body Talk', shared slowly in three parts which now exists as a 15-track compilation-of-sorts. The idea for 'Honey', instead, was an album that was "not too long and not too short" - it clocks in at the 40-minute mark - "and something that felt solid and quite soft. Maybe because things are consumed way faster," she reflects. "[The album was] a way of resisting that a little bit." As well as keeping tabs on an ever-changing industry, Robyn’s place in it was also beginning to shift. In the past half-decade, without any real input of her own, the singer’s music had started to quickly gain a significantly larger cultural importance. Communities began to be forged around her message and musical output - not least the Brooklyn-based, Robyn-themed club night that features heavily in 'Missing U - A Message To My Fans': a short documentary where fans detail the singer’s importance in helping them form like-minded groups, and, in one fan’s case, serving as the soundtrack to their coming out. "It was really amazing," she reflects simply on the increasing presence of her music in both mainstream and underground culture, as well as being held up as a prominent figure of adoration in the LGBT+ community. "I was so under the weather and not at all feeling like I could shoulder an official role of being an artist, and I really questioned how I could justify me demanding people’s attention in this way, while working out what I really wanted to say. Throughout that period, though, there were these things that kept popping up. People writing articles about my music or my fans telling me how they felt, and I didn’t expect that. It was very encouraging, and I wish everyone had that, and had people that cared about what they did in that way. It’s really amazing, and something that definitely got me excited about making music again, knowing that people were wanting more of it.” While 'Missing U' can be read as a message to her fans, and an admission of her absence, as well as a post-mortem on a relationship, or a reflection on the death of a friend, it came purely from the inside, and was part of a writing process that Robyn describes as "very introverted and kind of selfish". "I was thinking about myself and trying to understand myself. It was very secluded, and I wasn’t engaging in anything to do with my professional life. I wanted to make an album that felt sincere, and I knew that if I’m going to take up space again, and demand people’s attention, I better have something to say."
“I see it as an adventure, like going into space.”
The predictable next question then began to pose itself to Robyn: what exactly do I have to say? So, as well as spending a year tucked away in her hometown studio, the singer also threw herself back into the scene as a wide-eyed music lover once again. Poring over old Michael Jackson and Prince demos, going out dancing on weekends, DJing across the planet and digging through old disco and house records, a love for looser, less traditional song structures asserted itself as a major influence on 'Honey', and it’s felt in every sinew of the album. While 'Missing U' starts the record as a thundering pop song with a chorus that bursts through with dancefloor-ready intensity, the rest of the album feels more at home on the fringes of the party, or back home in the early hours. 'Because It’s In The Music' is a low-key sway, while highlight 'Beach 2k20' is a slow-burning house number punctuated with chopped-up spoken word vocals that feels perfect for lazy afternoons by a sun-soaked swimming pool. It’s a striking change for Robyn, but one that perfectly reflects her sense of calm, as well as the extensive time taken for it to come together: 'Honey' feels lived in, fuelled by an eclectic, crate-digging mentality that priorities structural freedom. As such, it’s an album so full of ideas and avenues that it could only have been created a) over such an extensive period and b) with such an open, unlimited state of mind. "What I usually do when I write a pop song is so focused on verse-chorus, and I wanted to break that up totally, and leave that way of thinking about songs," she affirms. Getting back in touch with the music she loved while starting out, as well as finding a new form of self-acceptance, 'Honey' sounds like a revelation, though perhaps not in the way many would have expected. "I think I really changed over the last few years," she reflects. "I don’t think I can go back to being [my old self]. I see it as an adventure, like going into space," she then quips with a smile, reaching outwards and inwards at once on an album that resets the parameters of who she is as an artist. "You figure things out, or you see things along the way, and you bring them back to earth and you show people what you’ve found. All the songs I’ve written are part of that story - they’re discoveries about what I’ve felt, and this album is as well." "There’s so much emotional intelligence in us," she continues, proudly. "Whatever is inside of you, it will come out in some way or other. You can make the time to listen before, or you have to listen afterwards, when you don’t have a choice!"
“Whatever is inside of you, it will come out in some way or other.”
"I think that was why I decided to isolate myself," she expands. "I needed to block things out, and to have space. It’s a very delicate process, when you have feelings. There are so many distractions, and noise, and people, and expectations, and I felt a responsibility towards myself. Sometimes, when you’re bored or whatever, and you don’t feel like there’s something there to stimulate you, or you don’t feel like you’re doing enough, it’s really an illusion. If you just calm down, you’ll realise how much there is out there. The less noise you have around you, the more you’re able to hear. It’s about choosing where you want to be on the spectrum." She has a new theory, too. "Boredom is such a great thing," she enthuses, clearly stimulated from her isolated time in the studio. "It’s what actually makes you realise what it is you want. If you’re totally stimulated all the time, there’s no way of knowing, but when you’re bored, that’s a moment to actually listen to something else." It’s in taking this time to listen that Robyn has emerged from her eight-year absence with a new-found assurance, no longer needing to barge down the door to get her feelings across, and drawing from all corners of the musical canon on an album that champions patience, community and self-care. In an increasingly instant, non-stop world, it’s a much-needed tonic; a deep breath and a re-evaluation. "I don’t know if music can change the world," she poses. "I don’t know if that’s what music’s supposed to do. I think what’s cool about it, for me, is if my music helps people to re-charge, or find some space where they can reflect, and then use that to do other things that are more important. Especially now when the world is so destructive, we need to look at stuff in a different way. It really requires a lot of us, and a real strength to deal with it."
'Honey' is out 26th October via Konichiwa / Island.
|
{
"pile_set_name": "OpenWebText2"
}
|
<?php
namespace PieCrust\Mock;
use PieCrust\IPieCrust;
use PieCrust\PieCrustConfiguration;
class MockPluginLoader
{
public $plugins;
public $formatters;
public $templateEngines;
public $dataProviders;
public $fileSystems;
public $processors;
public $importers;
public $commands;
public $twigExtensions;
public $bakerAssistants;
public function __construct()
{
$this->plugins = array();
$this->formatters = array();
$this->templateEngines = array();
$this->dataProviders = array();
$this->fileSystems = array();
$this->processors = array();
$this->importers = array();
$this->commands = array();
$this->twigExtensions = array();
$this->bakerAssistants = array();
}
public function getPlugins()
{
return $this->plugins;
}
public function getFormatters()
{
return $this->formatters;
}
public function getTemplateEngines()
{
return $this->templateEngines;
}
public function getDataProviders()
{
return $this->dataProviders;
}
public function getFileSystems()
{
return $this->fileSystems;
}
public function getProcessors()
{
return $this->processors;
}
public function getImporters()
{
return $this->importers;
}
public function getCommands()
{
return $this->commands;
}
public function getTwigExtensions()
{
return $this->twigExtensions;
}
public function getBakerAssistants()
{
return $this->bakerAssistants;
}
}
|
{
"pile_set_name": "Github"
}
|
Q:
sapply function(x) where x is subsetted argument
So, I want to generate a new vector from the information in two existing ones (numerical), one which sets the id for the participant, the other indicating the observation number. Each paticipant has been observed different times.
Now, the new vector should should state: 0 when obs_no=1; 1 when obs_no=last observation for that id; NA for cases in between.
id obs_no new_vector
1 1 0
1 2 NA
1 3 NA
1 4 NA
1 5 1
2 1 0
2 2 1
3 1 0
3 2 NA
3 3 1
I figure I could do this separatly for every id using code like this
new_vector <- c(0, rep(NA, times=length(obs_no[id==1])-2), 1)
Or I guess just using max() but it wouldn't make any difference.
But adding each participant manually is really inconvenient since I have a lot of cases. I can't figure out how to make a generic function. I tried to define a function(x) using sapply but cant get it to work since x is positioned within subsetting brackets.
Any advice would be helpful. Thanks.
A:
ave to the rescue:
dat$newvar <- NA
dat$newvar <- with(dat,
ave(newvar, id, FUN=function(x) replace(x, c(length(x),1), c(1,0)) )
)
Or use a bit of duplicated() fun:
dat$newvar <- NA
dat$newvar[!duplicated(dat$id, fromLast=TRUE)] <- 1
dat$newvar[!duplicated(dat$id)] <- 0
Both giving:
# id obs_no new_vector newvar
#1 1 1 0 0
#2 1 2 NA NA
#3 1 3 NA NA
#4 1 4 NA NA
#5 1 5 1 1
#6 2 1 0 0
#7 2 2 1 1
#8 3 1 0 0
#9 3 2 NA NA
#10 3 3 1 1
|
{
"pile_set_name": "StackExchange"
}
|
A novel method for material characterization of reusable products.
Product reuse contributes favorably to waste management and resource recovery by diverting products from terminal disposal to second-hand urban markets. Many organizations with social mission incorporate in their activities the process of reuse, thus making valuable products available to second-hand customers through their thrift stores. Data management and product classification are an important aspect of quantitative analysis of second-hand products circulating through reuse organizations. The New York City Center for Materials Reuse has, for the last 10years, organized the reuse activities of most not for profit organizations, and collected valuable information on the strengths and weaknesses of their operations. One such finding is the casual, and inconsistent approach used by these organizations to keep a record of the level and value of the reuse efforts they undertake. This paper describes a novel methodology developed to standardize record keeping and characterize commonly reused post-consumer products by assessing the outgoing product flow from reuse organizations. The approach groups material composition of individual products into main product categories, creating a simplified method to characterize products. Furthermore, by linking product categories and material composition, the method creates a matrix to help identify the material composition of products handled by reuse organizations. As part of the methodology, whenever adequate data are not available about certain types of products, a process identified as "field characterization study" is proposed and incorporated in the implementation to develop meaningful and useful data on the weight and material composition. Finally, the method incorporates the estimation of the environmental impact of reuse using standard models available through the U.S. Environmental Protection Agency and other worldwide entities. The diversified weight and size of products poses a challenge to the statistical significance of the estimated weights. A case study is presented, illustrating how the proposed methodology can be applied to estimate environmental benefits from the sale of second-hand products in reuse organizations.
|
{
"pile_set_name": "PubMed Abstracts"
}
|
Pakistan blocks YouTube website - muriithi
http://news.bbc.co.uk/2/hi/south_asia/7261727.stm
======
Electro
Hmm, I'd have thought the recordings of webcam girls and clips of porno's and
people talking about sex would have been the reason. Go figure, religion
doesn't censor on the basis of morals or the logic descending from their
morals, but on an abstract basis of insult.
|
{
"pile_set_name": "HackerNews"
}
|
GOP p.r. guy/proud Villanova grad Jonathan Grella has a great catch from Hardball at his alma mater: the kid who asked the smart aleck question I referenced below about Hillary "hitting the sauce" is the son of Fox anchor Steve Doocy.
Peter Doocy, who asks the question at about the 3:00 mark above, is a junior here and a spitting image of his father.
I can confirm that McCain did not, though, join the younger Doocy for a post-game shot.
comments closed
permalink
|
{
"pile_set_name": "OpenWebText2"
}
|
With All This Work, When Will Brad Pitt Marry?
http://archive.thetowntalk.com/VideoNetwork/3421119026001/With-All-This-Work-When-Will-Brad-Pitt-Marry-http://cdn.newslook.com/94/94b9046eeda72109094103ef6bdb1e98/mp4_low/94b9046eeda72109094103ef6bdb1e98-mp4_low.mp4http://archive.thetowntalk.com/VideoNetwork/3421119026001/With-All-This-Work-When-Will-Brad-Pitt-Marry-http://cdn.newslook.com/94/94b9046eeda72109094103ef6bdb1e98/images/frame_ext.jpgWith All This Work, When Will Brad Pitt Marry?With the amount of movies Brad Pitt has lined himself up to do, it's a wonder he'll get time to even walk down the aisle.4newslookentertainment00:56
|
{
"pile_set_name": "Pile-CC"
}
|
How to Get Rid of “Invite” From Facebook Messenger on iPhone
When you download the Facebook Messenger app, there will be an Invite button visible under every contact that you messaged. What is this button exactly? Simply put, the Invite is responsible for displaying under whoever that you’re talking to that doesn’t have the same Messenger app installed on their device.
Let it be an iPhone, iPad, or Android device. It could be annoying sometimes isn’t it? Especially if your contact usually uses the direct Message box right on their browser.
Picture Credit: DigitalNative
For iPhone and iPad users, I can totally understand how it feels like to have this annoying button present almost from every single person you’re in touch with. However, you can now get rid of it. This isn’t an official feature yet, but hopefully, Facebook will do something about it.
Jailbroken iOS users can now enjoy the minimal thread without the Invite button using a tweak called NoInviteFBMessenger. With it, the dialog that usually says, “Invite Bryan (example) to Messenger.”
Not only that this Invite button in Messenger is annoying to most iPhone users, but it also harasses or almost forces the other people to install the app as well. The NoInviteFBMessenger tweak is now available as a free package on the Cydia’s BigBoss repo. It works with any iOS devices running iOS 7 – 9.
Give it a go and be sure to let us know if the invite box is no longer there. For more cool tweaks for Facebook, check out this list.
|
{
"pile_set_name": "Pile-CC"
}
|
Safe Haven keeps doors open by reducing staff
The financially exhausted Safe Haven Animal Sanctuary in Georgetown has reduced its staff in an attempt to keep the shelter up and running.
By Sarah Lakesarah.lake@doverpost.com@Sussex_Sarah
The financially exhausted Safe Haven Animal Sanctuary in Georgetown has reduced its staff in an attempt to keep the shelter up and running.
“After restructuring the board and operations, Safe Haven is deferring closure and will continue to operate and to perform duties under the dog control contract with Kent County,” reads a statement released Tuesday by Safe Haven’s board of directors. “On Friday, staff was reduced to save costs.”
Board member Sharon Donovan said six or seven office staffers were laid off.
“We think it will help,” she said. “We’re going to try to do the best we can to stay open.”
However despite the layoffs on Friday, which has been confirmed as the driving force keeping Safe Haven afloat, the organization announced an Aug. 30 tentative closing date Sunday on its website and Facebook page.
“The final closure date is dependent upon when we are able to find adoptive homes or other suitable shelters to transfer our animals to,” the website states. “We are very grateful to the Best Friends Animal Society No More Homeless Pets Network for their assistance in helping us to locate to other shelters.”
Safe Haven has temporarily waived adoption fees for the more than 170 dogs and more than 80 cats currently living in the shelter. The organization is still desperately seeking permanent homes for these animals, as well as donations of money and supplies.
“Support from the public is now more important than ever if Safe Haven is to protect and re-home animals in their care, which is often the last hope these animals have for safety,” reads the board’s statement.
The shelter is pointing to its strict “no kill” policy as the impetus for its financial woes.
“Safe Haven has chosen to take a more difficult road by giving animals a chance for a new home and a good life,” the statement reads. “Euthanasia of any healthy animal is not an option. Second chances, however, are not without cost.”
According to the statement, Safe Haven has, under its dog contract with Kent County, adopted out more than 400 dogs and cats “who would have almost certainly been euthanized by the previous contractor.”
That previous contractor is the Kent County Society for the Prevention of Cruelty Animals, which holds the dog control contract for Sussex County and stood to re-absorb the Kent County contract if Safe Haven closed its doors.
Kent County Administrator Michael Petit de Mange said he was informed Saturday afternoon by Safe Haven Board President Rick Kirchhoff that the facility would more than likely be closing its doors in late August, therefore the county began looking for alternative dog control providers. Petit de Mange confirmed the Kent County SPCA would be on the list of options.
“There are not a whole lot of options to choose from in this arena,” Petit de Mange said. “Not a lot of people are in this business. One option may be to try to do dog control ourselves or we can try to partner with someone else. I’m certain that KSPCA is a very viable option.”
Petit de Mange said he’d planned to meet with all of the Levy Court commissioners to gather input and ensure everyone was on the same page. Whether or not that meeting is still happening has not been confirmed.
Roughly one month ago, Safe Haven officials squashed closure rumors but confirmed the shelter was experiencing financial difficulties. Since then, the shelter has been running low-cost adoption specials and several local fundraisers have been organized.
Karli Swope, a part-time employee at Safe Haven for the past three years, said the organization has “been in the hole” for quite some time.
“The dogs just kept coming in and not enough fundraising was being done to offset the costs,” Swope said. “As the dogs kept coming in, they had to be moved to boarding houses. The boarding costs were added to the vet and supply costs and it all became too much.”
Swope said 75 to 80 percent of Safe Haven’s dogs are pit bulls, which are difficult to adopt out due to their reputation as an aggressive breed.
|
{
"pile_set_name": "Pile-CC"
}
|
1834, In 1834, the fire department purchased a new ten-man hand-operated pumper known as the "Man Killer," as well as a horse drawn wagon to carry axes, a horse-drawn ladder wagon, a hand-operated pump with leather hose, and a water wagon.
1834, In 1834, the fire department purchased a new ten-man hand-operated pumper known as the "Man Killer," as well as a horse drawn wagon to carry axes, a horse-drawn ladder wagon, ...
1834, The Niagara Fire Department purchased this early apparatus in 1834. This hand pump engine was probably one of the first hand pumpers built by James Smith of New York City. Between 1810 and the 1860s, Smith manufactured close to 500 hand pumpers.
1834, The Niagara Fire Department purchased this early apparatus in 1834. This hand pump engine was probably one of the first hand pumpers built by James Smith of New York City. ...
|
{
"pile_set_name": "Pile-CC"
}
|
The Payback (song)
"The Payback" is a funk song by James Brown, the title track from his 1973 album of the same name. The song's lyrics, originally written by trombonist and bandleader Fred Wesley but heavily revised by Brown himself soon before it was recorded, concern the revenge he plans to take against a man who betrayed him. The song is notable for its sparse, open arrangement and its use of wah-wah guitar – a relative rarity in Brown's previous funk recordings. Released as a two-part single (featuring a radio announcer at the beginning of part one) in February 1974, it was the first in an unbroken succession of three singles by Brown to reach #1 on the R&B charts that year – the last chart-toppers of his career. It also peaked at number 26 on the Billboard Hot 100. It was his second, and final, single to be certified gold by the RIAA.
Background
The song and the album of the same name were originally recorded by Brown as the accompanying soundtrack to the blaxploitation film Hell Up in Harlem (1973), but was rejected by the movie's producers as "the same old James Brown stuff." An incensed Brown decided to release the album and let it stand on its own merits. The subsequent soundtrack was then recorded by Motown Records artist Edwin Starr. Later, Brown recorded "Rapp Payback (Where Iz Moses)", a reworking of "The Payback", in 1980.
Samples
"The Payback" song has been sampled by many musical artists, including numerous hip hop and R&B producers. En Vogue recorded two different hits, "Hold On" and "My Lovin' (You're Never Gonna Get It)", that were both based on loops from the song's rhythm track. LL Cool J sampled "The Payback" in his 1990 song "The Booming System". Guy used the enthusiastic whoops for Dog Me Out in 1991. Mary J. Blige sampled the song for her 1997 hit "Everything". Total and Brooklyn rapper Biggie Smalls sampled the song's intro in their 1995 hit "Can't You See". Keith Sweat's group Silk, in the song "Happy Days" sampled "The Payback" from their 1992 debut album, Lose Control, which was produced by Sweat and featured on the track. Big Black released a loose cover of the song on their 1984 Racer-X EP. Massive Attack also sampled the song on their title track "Protection" from the 1995 album of the same name. Eboni Foster of Nuttin' Nyce sampled the song on the single, "Crazy for You" in 1998. Compton rapper Kendrick Lamar used elements of the sample on the hit single "King Kunta" from his 2015 album To Pimp a Butterfly. Also sampled in Compton's Most Wanted's "Final Chapter" off of the album Straight Check'n Em.
Appearances in other media
The song was used tn the Grand Theft Auto: San Andreas soundtrack on the Rare groove radio station Master Sounds 98.3.
The song was used in the Guy Ritchie film Lock, Stock, and Two Smoking Barrels.
The song was used on the original soundtrack album for When We Were Kings (1997)
The song was used in the 2001 Jesse Dylan film How High.
The song was used in the 2002 Mars Callahan film Poolhall Junkies.
A sample of the song is used in the theme for ESPN's NBA Countdown.
The song was used in a season two episode of Everybody Hates Chris.
The song was used in season three of The Wire, the song is playing in the poolhall that the deacon frequents, when Cutty comes to him to discuss the boxing gym.
The song was used in the Hughes Brothers film Dead Presidents.
The song was used in season three episode 10 of The Blacklist.
The song was used in the first-season finale of the FX television show Damages.
The song was used in an episode of Scrubs, during one of J.D.'s fantasies about how cool it is to enter the hospital as a surgeon.
The song was used in the movie Hollywood Shuffle, the melody of the song is used during the dress rehearsal of the movie "Jivetime Jimmy's Revenge" – the movie in which Bobby (Robert Townsend) won the lead role as "Jimmy." Jimmy also uses the lyrics "I'm mad, I want revenge" when his brother dies in his arms.
The song is used in many professional boxing ring entrances, but most notably used by Lennox Lewis during the ringwalk prior to his heavyweight championship rematch with Hasim Rahman in 2001, which Lewis won by knockout.
The song was used in an episode of The Bernie Mac Show.
The song was used in the television show The Cleveland Show in the episode entitled "The Curious Case of Jr. Working at The Stool".
In May 1995, the song was featured prominently in the opening scene of "Catman Comes Back", the first-season finale of the FOX police drama television series New York Undercover.
The song was used in the 2012 Quentin Tarantino film Django Unchained, the song was remixed in a mashup with the 2Pac song "Untouchable".
The lyrics "I don't know karate, but I know crazy" was used by Magneto in the 2014 Bryan Singer film X-Men: Days of Future Past.
The song was used in season four episode five of Billions.
The song played during the end credits of the fourth episode of the second season of Titans.
References
External links
[ Song review] at Allmusic
List of hip hop songs that sample "The Payback"
Category:James Brown songs
Category:1974 singles
Category:Billboard Hot R&B/Hip-Hop Songs number-one singles
Category:Songs written by James Brown
Category:Songs written by Fred Wesley
Category:Songs written by John "Jabo" Starks
Category:Polydor Records singles
Category:1973 songs
|
{
"pile_set_name": "Wikipedia (en)"
}
|
Adventures in genealogy
K is for Księgi Parafialne
Continuing the Family History Through the Alphabet Challenge…K is for Księgi Parafialne (Polish for “Church Books”) via the website http://www.ksiegi-parafialne.pl/. If your family history is Polish, this site is a must and yet it is not mentioned very often among guides to Polish research or “best of” lists. What is it? A site that lists, by province, every town that has church books indexed. The indexes (indices) are all on other sites – this is merely an index of indexes and links are included to get you there. As such, this site is only helpful once you’ve discovered the name of the town from which your ancestors came.
First, click on “Województwa” to find the province. Since the entire site is in Polish, you must look for the Polish name of the province (Pomorskie for Pomerania, etc). Each province has a separate page with a list of towns. Find the town name in the first column, parafia / USC. If available at one of the online sites, it will be listed. The dates in the columns show what records have been indexed for Chrzty/Urodziny (Baptisms/Births), Małżeństwa (Marriages), and Zgony (Deaths). Under Strona www is a link to the web site with the indexed records. There are over a dozen sites that have images (or at least indexes) of the records available. Included among them are Geneteka, which I’ve praised here before, and the Polish church books included on FamilySearch.org. What’s not listed? Anything on microfilm available via FamilySearch – this site lists only records/indexes available online. As with any record site, some provinces have many more towns with online records available than others. But towns are added weekly and the site is a great way to keep track of what’s available for your ancestors’ towns. There are hundreds listed – is your ancestors town among them?
On the main page next to “Województwa” you will also see “II Rzeczpospolita” or “Second Republic”. This list includes areas once associated with Poland during the interwar period. There is also a heading “Dokumenty metrykalne” which offers documents that describe the format of the records. However, as the documents are in Polish, it will not nearly be as helpful as various translation guides in English.
For those of you with Polish ancestry, how cool is it to have a site that lists all available online records? I think it’s great…I just wish Germany had a similar site! Happy searching…
|
{
"pile_set_name": "Pile-CC"
}
|
Worsdell
Worsdell is a surname. Articles include:
Nathaniel Worsdell
Thomas Clarke Worsdell
Thomas William Worsdell
Wilson Worsdell
|
{
"pile_set_name": "Wikipedia (en)"
}
|
Assessing Infrastructure to Care for Pediatric Patients in the Prehospital Setting.
Pediatric patients represent a small proportion of emergency medical services (EMS) calls, challenging providers in maintaining skills in treating children. Having structural capacity to appropriately diagnose and treat pediatric patients is critical. Our study measured the availability of off-line and on-line medical direction and recommended pediatric equipment at EMS agencies. A Web-based survey was sent to EMS agencies in 2010 and 2013, and results were analyzed to determine availability of medical direction and equipment. Approximately 5000 agencies in 32 states responded, representing over 80% response. Availability of off-line medical direction increased between years (78% in 2010 to 85% in 2013), was lower for basic life support (BLS) (63% and 72%) than advanced life support (ALS) agencies (90% and 93%), and was generally higher in urban than rural or frontier locations. On-line medical direction was consistently available (90% both years) with slight increases for BLS agencies (87% to 90%) and slightly greater availability for urban and rural compared with frontier agencies. The majority of agencies carried most recommended equipment; however, less than one third of agencies reported carrying all equipment. Agencies with off-line medical direction, on-line medical direction, and with both off-line and on-line medical direction were respectively 1.69, 1.31, and 2.21 times more likely to report carrying all recommended equipment. Basic structural capacity exists in EMS for treating children, with improvements seen over time. However, gaps remain, particularly for BLS and nonurban agencies. Continuous attention to infrastructure is necessary, and the recent development of national performance measures should further promote quality emergency care for all children.
|
{
"pile_set_name": "PubMed Abstracts"
}
|
Gymnastics at the 2018 Summer Youth Olympics – Boys' artistic individual all-around
The boys' artistic individual all-around competition at the 2018 Summer Youth Olympics was held at the America Pavilion on 11 October.
Qualification
Eighteen gymnasts qualified into the final.
Final
References
External links
Qualification results
Final results
Boys' artistic individual all-around
|
{
"pile_set_name": "Wikipedia (en)"
}
|
PUTRAJAYA: The anti-graft body is not going to withdraw corruption charges against Finance Minister Lim Guan Eng.
Denying such a move, the Malaysian Anti-Corruption Commission (MACC) says it has no power to withdraw cases that have been taken to court.
“The authority to do so rests with the Attorney General’s Chambers,” said the MACC in a statement.
The agency was responding to a report by China Press which quoted sources saying that MACC is likely to withdraw charges against Lim when his corruption trial resumes next week.
Lim, then Chief Minister of Penang, had pleaded not guilty on June 30, 2016 to two counts of corruption involving the conversion of agricultural land to residential status and the purchase of a bungalow at below market value.
He was charged with using his position as chief minister to gain gratification for himself and wife Betty Chew Gek Cheng by approving the application for conversion of agricultural land to a public housing zone in Balik Pulau to Magnificent Emblem Sdn Bhd.
He faces a second charge of using his position to obtain a plot of land and bungalow at No. 25, Jalan Pinhorn, on July 28, 2015, from businesswoman Phang Li Koon for RM2.8mil, at below market value.
Lim was sworn in as Finance Minister on May 21, following Pakatan Harapan’s victory in the May 9 polls.
His trial resumes on Monday.
|
{
"pile_set_name": "OpenWebText2"
}
|
Brinsley
Brinsley is a village and civil parish in Nottinghamshire, England. The church of St James was built in 1837–38 from Mansfield stone, the chancel being added in 1877. The village is split into two sections, Old Brinsley which is within Broxtowe and New Brinsley which is in Ashfield. At the 2011 Census the population of the parish was 2,327.
2007 Local Election
Brinsley elected Sadie Graham, a British National Party candidate in the 2007 Broxtowe council elections. However, she sat as an independent until she was dismissed for failing to attend meetings.
Brinsley Headstocks
Brinsley used to be a major mining village. The only remainder of this heritage are the headstocks. They are not only of significance for the area but are also the only headstocks left of this kind. After the final closure of Brinsley Pit they had been moved to a museum but have recently been restored and brought back to near their original place. The Friends of Brinsley Headstocks have worked on turning the area into a nature reserve. There are several farms in the area that have gone organic. The countryside is often explored by leisure walkers with walks organised by D.H. Lawrence Heritage.
Brinsley Carnival
Originated in the early 1900s as a hospital parade, where local farmers and growers would dress their carts, and sell produce to raise money to send the sick and injured in Brinsley to hospital. The Carnival evolved into a family day out, fete or gala over many years, with enforced gaps over the two world wars. It was restarted in 1960 by George Mills of Broad Lane in Brinsley, the local postmaster, and has continued to this day.
Brinsley Carnival is traditionally held on Fathers day, at the recreation ground in Brinsley. It is organised by a group of volunteers who raise money at the carnival and throughout the year to finance the following years carnival and give away money to local good causes.
For over 50 years Brinsley Carnival has offered a day's entertainment for families from the village and surrounding areas. But it has also given thousands of pounds to local causes. It is an event organised by the community, for the community. For some local organisations it provides their annual opportunity to raise awareness about their activities and to provide a welcome boost to their funds.
The recipients of donations from Carnival proceeds are all either Brinsley based, or offer their services and membership to Brinsley residents.
References
External links
Category:Villages in Nottinghamshire
Category:Places in the Borough of Broxtowe
Category:Civil parishes in Nottinghamshire
|
{
"pile_set_name": "Wikipedia (en)"
}
|
Ibrutinib induces multiple functional defects in the neutrophil response against Aspergillus fumigatus.
Bruton's tyrosine kinase inhibitor ibrutinib has become a leading therapy against chronic lymphoid leukemia. Recently, ibrutinib has been associated with the occurrence of invasive fungal infections, in particular invasive aspergillosis. The mechanisms underlying the increased susceptibility to fungal infections associated with ibrutinib exposure are currently unknown. Innate immunity, in particular polymorphonuclear neutrophils, represents the cornerstone of anti-Aspergillus immunity however the potential impact of ibrutinib on neutrophils has been little studied. Our study investigated the response to Aspergillus fumigatus and neutrophil function in patients with chronic lymphoid leukemia or lymphoma, who were undergoing ibrutinib therapy. To answer this question, we studied the consequences of ibrutinib exposure on the functions and anti-Aspergillus responses of neutrophils obtained from healthy donors and 63 blood samples collected at different time points amongst 32 patients receiving ibrutinib for lymphoid malignancies. We used both flow cytometry and video-microscopy approaches to analyze neutrophils' cell surface molecule expression, cytokine production, oxidative burst, chemotaxis and killing activity against Aspergillus. Ibrutinib is associated, both in vitro and in patients under treatment, with multiple functional defects in neutrophils, including decreased reactive oxygen species production, impairment of their capacity to engulf Aspergillus and inability to efficiently kill germinating conidia. Our results demonstrate that ibrutinib-exposed neutrophils develop significant functional defects that impair their response against Aspergillus fumigatus, providing a plausible explanation for the emergence of invasive aspergillosis in ibrutinib-treated patients.
|
{
"pile_set_name": "PubMed Abstracts"
}
|
In the last year, five franchise contract records were toppled. How many will fall this offseason, with nine potential $100MM free agents? Here’s our list of the largest contracts for each of the 30 teams. If you’d like a trip down memory lane, each contract is linked to its MLBTR post, with the exception of those that predate the site’s existence.
|
{
"pile_set_name": "OpenWebText2"
}
|
Favorite Figures
The crew of the Nostromomo sits around a table laughing, happy that their friend Kane is back, and thankfully alive. Even Ripley seems uncharacteristically pleasant. And then Kane falls, back on their food, and gags. Something bulges underneath his shirt. They grab his arms and try to restrain him. Once he’s still, a jet of blood shoots out of his chest. He screams, louder. Something is eating its way out of him. The rest of the crew is panicking, letting out screams of their own. In the cacophony, a Xenemorph, the inspiration for my favorite action figure the NECA seven inch Alien, is born. In my estimation, there are three factors that play into what makes favorite figures: functionality, appearance, and emotional connection.
Functionality of an action figure can be a little tricky to define, because it really depends on what you want it to do. Some people use them for decoration (you can get a look at how I use mine to make my bookshelf look cool in last week’s column, “Why We Collect”). I also photograph and play with mine, so for me the most functional action figures are posable and durable, but depending on what you do with yours, that definition will vary.
The alien can do just about anything I want. It’s got more than twenty points of articulation so you can get it into nearly any pose, and one of those points of articulation is the jaw so you can bring out the inner mouth.
The elbows on my figure have broken off, but it’s hardly the fault of the figure, considering how much I play with it. In terms of functionality though, the figure is amazing because of how well it plays against my mostly 3 and ¾ inch collection. It overpowers them, making an already terrifying figure seem that much scarier.
Figures need to look like the character. We’ve all seen the figures without a passing resemblance to their inspiration (looking at you wrestling action figures). I would add that they also need to look cool on their own. For a favorite figure, someone with no familiarity with the character needs to still be impressed with the figure.
The sculpt of my alien is incredible, perfect to the H.R. Geiger character design. (If you’re as into the character as I am, there’s a soon to be published book of his concept art here). And better yet, the paint is pure black so it accentuates rather than overpowers the sculpt. In Laymen’s term, the figure looks horrifying.
Functionality and appearance only set the table for the emotional connection with the figure. There’s got be some affection for either the character or the experience of buying the figure for it to be a favorite.
I can remember the first time I saw the scene I described in the first paragraph. (If you haven’t seen it, you can watch it here). One night my father drove me to Blockbuster and rented the DVD for me because he said I had to see the chestburster scene. He was so right. Alien is still one of my favorite movies, and the six-inch Alien action figure is by far my favorite figure. Without a doubt, my father and my love of Alien and Aliens play a huge role in how much I love this figure.
A Call to Action (Figures) is a weekly column published every Wednesday, chronicling my rants and raves about all things action figure. Come back next week and find out why I collect 3 and ¾ inch action figures instead of 6 inch ones.
What’s your favorite figure? Let me know in the comments!
|
{
"pile_set_name": "OpenWebText2"
}
|
Docker: Not Even a Linker - nkurz
http://adamierymenko.com/docker-not-even-a-linker
======
btrask
Fantastic article. We need more deconstruction of "fads" (which I don't mean
in a pejorative sense) so that we can quickly understand them without
sacrificing tens of thousands of man-hours slowly coming to terms with each
one. It would be much better if we could reason about the exact differences
and benefits instead of getting bogged down in new terminology, etc.
More examples I've been thinking about:
\- Goroutines (fibers are equivalent to threads, but coroutines are different)
\- Safety and the unsafe keyword in Rust (not sure but the effective
difference seems to be default-allow versus default-deny)
~~~
pjmlp
Regarding those two examples, more than having explanations about them, it
would help if people cared about IT history and it was more accessible.
Coroutines are easily explained in Modula-2 literature.
Safe keyword in Rust goes back at very least to Ada and Modula-2. Also in
Oberon and its derivatives, Modula-3 (which inspired C#). The literature for
those systems also has lots of examples.
Being an old IT dog, that started when those technologies were new it is
sometimes hard to me to see how new generations fail to find such information,
even though it is available on the web. I guess the main cause is thatbone
needs to know what to search for.
~~~
pjc50
Tech is strangely ahistorical. Not just practitioners not reading the
literature, but it seemingly being forgotten entirely. Possibly this is a side
effect of so many of us being self-taught.
In another thread I've just been arguing with someone who thought that the
DOOM code should have been thread-safe.
~~~
wslh
I would say cyclical. Every day we read about a similar framework working in a
popular language when that solution already existed for long time.
But this happens in other areas outside computer science. For example, modern
medicine rediscovering old medicine "recipes".
The problem in our field is when people talk all day about Docker while
surpressing LXC from the discussion.
~~~
digi_owl
I think it happens for different reasons though.
With medicine it boils down to a dismissal of folk remedies as placebo.
But with computing its because the old ways were developed on mainframes and
minicomputers in an environment that current generation may only have heard
stories about.
This because the micro-computer era was pretty much a mental reboot for
computing, as little if any software crossed over (until fairly recently).
------
vezzy-fnord
It's been said several times before that a large incentive for Docker's
adoption was to get around the dynamic linking hell that is present in most
modern Unix-likes.
It's funny the author mentions a "world without linkers" with my posting of an
article about the TAOS operating system today. Go look there if you want some
primers on achieving that.
That said, the author greatly oversells Docker's novelty.
~~~
Galanwe
> "the dynamic linking hell that is present in most modern Unix-likes"
WTF are you talking about...
There has never been a "hell" of dynamic linking problems on Unixes, this used
to be a Windows problem. Even the "most modern unix-likes" doesn't make sense,
since "most modern unix-likes" do not even use similar linking models.
~~~
fapjacks
We have dependency management built into the package managers which hides that
from us these days. Unix and Linux before package managers was kind of a pain.
Now, I will totally give you that it was nothing like the "DLL hell" of
Windows.
~~~
reidrac
Then how can be that an incentive for Docker's adoption? Honest question; if,
as you say, this is a solved problem thanks to package managers.
I can't even remember the last time I had a real dependency problem deploying
an application (using Debian; and CentOS before that), other than myself not
doing things right (read: installing RPMs I found online and I shouldn't
install).
~~~
fapjacks
Well I wasn't originally speaking wrt Docker, but Docker doesn't magically
lose all the hard work done by package managers. You have total access to them
in your containers.
------
amirouche
> Had their developers known what they were actually writing, perhaps we'd
> have a lean and mean solution that did the right thing.
I am surprised nobody mentionned nix, nixos and guix.
~~~
pron
Can you explain what those are and what they do?
~~~
davexunit
Nix and Guix are purely functional package managers, meaning that software
builds are treated like a mathematical function: Input the same source code +
dependencies and receive the same build as output. They have features such as
reproducibile (often bit identical) builds, transactional package upgrades and
rollbacks, and unprivileged package management. They solve the dynamic linking
problem by allowing each package to refer _precisely_ to the dependencies that
it was built with. With this mechanism in place, it becomes very easy to use
applications that require different versions of some C library, or a different
Ruby/Python interpreter, or whatever else. Furthermore, it can do this without
relying on a specific type of file system, and without requiring that
applications be run inside containers or virtual machines. This makes it very
composable and general-purpose.
[https://nixos.org/](https://nixos.org/)
[http://www.gnu.org/software/guix/](http://www.gnu.org/software/guix/)
------
riquito
> Instead of building and filing away heaps of immutable (read: security
> nightmare) containers [...]
Is there a consensus on what is(are) the best method(s) to handle security
patches automatically in Docker? For example, the official images at
[https://registry.hub.docker.com/](https://registry.hub.docker.com/) are fixed
in time and you should apply security patches before using them?
~~~
amouat
The official images aren't fixed in time, assuming you're pulling using a tag
e.g redis:3.0. That image may be updated at any point and should be updated
with minor patches and security updates. Rather than manually apply patches,
just pull the image again to get the updates. If the image hasn't been
updated, complain loudly.
If you want your image to be "fixed in time", pull by digest instead.
~~~
riquito
Thank you very much
------
craneca0
Very interesting. I'm not convinced this captures the core value of containers
though. Or at least not the only core value. Calling containers an evolution
of configuration management tools seems like an oversimplification just to
make a point. This may be one aspect of building a micro-service driven
architecture that containers make easier, but there are other very important
ones. Portability comes to mind. It's not just that you can build your stack
once and save it, but that you can then run that stack anywhere, and it
becomes much easier to share/borrow bits and pieces of other people's stacks.
~~~
falcolas
> you can then run that stack anywhere
Anywhere that runs Linux, at least.
> it becomes much easier to share/borrow bits and pieces of other people's
> stacks.
At the cost of not knowing what's really in them.
~~~
andybak
To a certain degree I don't _want_ to know what's in them. If I want to add
search to my stack - initially I'd rather not have to have an intimate
knowledge of Elastic Search, a task queue and whatever other moving parts
there are. In many cases a black box that just works would be a fantastic
option.
The reason hosted services are popular is for exactly this reason.
A wide understanding of different technologies is a wonderful thing but
sometimes you just need to ship.
------
bgilroy26
For any 'Early coders' like my self who want to learn more about linkers and
loaders based on this write up, Programming from the Ground Up by Jonathan
Bartlett is a good book.
~~~
vezzy-fnord
As well as Ian Lance Taylor's 20-part blog series on linkers:
[https://lwn.net/Articles/276782/](https://lwn.net/Articles/276782/)
------
twblalock
Shared libraries were considered a bad idea in Plan 9, and I really wish that
point of view had made it into commercial Unix and Linux.
~~~
davexunit
Shared libraries are a fantastic idea. Static linking wastes system resources
and makes system-wide library updates problematic. Docker's approach to things
is essentially a higher level form of static linking, which is to say that
it's not a very good approach. It's papering over the package management
problem. We need general-purpose package management systems that allow for
different applications to use different versions of shared libraries without
interference. Luckily, the Nix and GNU Guix projects solve this problem very
well, if only they could get some more "mindshare."
~~~
e40
Yeah, having to rebuild every app that uses OpenSSL when a new advisory is
issued... wow, that would be expensive!
~~~
adricnet
Thousands of mobile app developers feel this pain now, from that particular
library.
Not updating these applications is not acceptable to most organizations /
device operators.
Just in case anyone thought the parent was sarcasm or theory, some refs:
[http://www.digitaltrends.com/mobile/heartbleed-bug-apps-
affe...](http://www.digitaltrends.com/mobile/heartbleed-bug-apps-affected-
list/)
[http://blog.trendmicro.com/trendlabs-security-
intelligence/b...](http://blog.trendmicro.com/trendlabs-security-
intelligence/bundled-openssl-library-also-makes-apps-and-
android-411-vulnerable-to-heartbleed/)
------
berzemus
What's with the light-grey-text-on-white-background styling ? It may look
good, but it's a pain to read.
~~~
cthor
It looking "prettier" is pretty arguable.
The body text is as close to black as it is white. #444 is borderline
acceptable. #888 is absurd.
------
kstenerud
Sorry, no. I don't want a dynamic linker for my software stacks. I want a
complete, ready-to-deploy chunk of code, FROZEN IN TIME, that has a known and
predictable state that I can trust.
If I need to apply security fixes, I'll rebuild the chunk of code, also frozen
in time, and deploy.
Ideally, I want no dependencies between container and host, or container and
container. Or at least I want them kept to an absolute minimum.
Even more ideally, I want isolation to be so complete that I'd be able to run
my built stack 100 years from now and have it operate exactly the same as it
does today. That's a bit hyperbolic, of course.
Docker is not a linker; it is a system from which you build deployable code.
In fact, there's no reason why in theory you couldn't add support to deploy
Windows or BSD stacks (other than the fact that Windows and BSD kernels
haven't been added yet).
------
BurritoAlPastor
This is an interesting take, but it doesn't entirely make sense. Ierymenko's
'save your work' metaphor is a little misleading, since (I certainly hope)
nobody is creating docker images manually. But I like his idea that dockerfile
creation, by which you set up a stack in a way that's automatically
reproducible, is equivalent to the role of a linker in a compiled program.
Where he loses me is when he suggests that Puppet et al are closer to a 'pure'
linker. Configuration management systems are doing the _same thing_ as a
Dockerfile: instead of setting up your XYZ stack by hand, you write a Puppet
manifest that calls the modules for XYZ and sets them up the way you need.
Your final result isn't a server with the XYZ stack: it's an _abstracted
process_ that will _reproduce_ your XYZ stack. The main difference is the
implementation; Docker reproduces your stack in an isolated environment, and
configuration management tools reproduce your stack on an arbitrary platform.
But nobody thinks of Docker as a configuration management tool, and for the
most part I don't think people even think of Docker as a _competitor_ to
configuration management. Hell, Docker is a core component of many Puppet CI
workflows.
So there's something else going on here. What's the secret sauce? Is Docker
just two great things (config management + virtualization) glued together so
cohesively that it becomes greater than the sum of its parts?
------
d2xdy2
That's a very clever metaphor for that aspect of Docker. I hadn't considered
looking at it that way before.
------
williamsharkey
The author writes:
"Sometimes (unless I am writing in Go) I don't want to bundle all my code
together into one giant hulking binary."
I am unfamiliar with Go - can someone please offer why this technique might
especially desirable/feasible with Go?
~~~
agrover
Go only supports static linking. No dynamic linking means no linking issues
when deploying the same binary across a billion machines in the Googleplex.
------
glifchits
Is "gerschnorvels" really a word in any language?
~~~
digi_owl
My first though was that it was some sort of compound word.
------
leephillips
According to this article, Docker is a way to save your work after configuring
your server. Can't I do that with
rsync -a /etc /whatever backupserver:/backups/server1
?
~~~
fragmede
First off,
rsync -a / backupserver:/backups/server1
would be a better comparison; full server state never properly stays in /etc.
Do you actually do that though? Multiple times a day? How easy is it to roll
back to a previous state?
Given Dockerfiles, a better comparison would be rsnapshot, since intermediate
steps are important, and maybe that last "yum upgrade/apt-get update/whatever"
broke something (on dev, of course) and you want to roll back.
How do you compare two related file system images? Is there something more
advanced than "diff -u"? How does that handle binaries? Will that map
backwards and say what command resulted in changed binaries? Can I submit a
code review for the changes between the two states like I could for a
Dockerfile which is plain text?
Docker isn't quite a configuration management system like Chef or Puppet, but
there's a lot of overlap.
------
ForHackernews
> perhaps some quantum superposition of those that has yielded a New Thing.
Ugh. That's not what quantum superposition means.
|
{
"pile_set_name": "HackerNews"
}
|
Q:
ifElse statement with state?
Background
I am making an app that receives messages from several devices. Upon receiving a messages an event is fired with the given message:
on( "data", message => {
//doSomething
} );
Challenge
This function receives two types of messages: A and B:
message A has the id of the device
message B has some info about a deivce
My first approach to dealing with this was the following:
const { ifElse } = require("ramda");
const evalData = ifElse(
isTypeA, // Returns true if type A, false otherwise
evalTypeA, // Returns device Id
evalTypeB // Processes data in message and returns bytes read
);
on( "data", evalData );
Problem
The problem here is that messages of type B don't have the Id of the device they belong to. So to properly process the message I need the deviceId that evalTypeA returned in a previous message.
My idea to tackle this was to pass the Id to evalTypeB:
const evalData = messages => {
let id = undefined;
id = ifElse(
isTypeA, // Returns true if type A, false otherwise
evalTypeA, // Returns device Id
evalTypeB( id ) // Processes data in message and returns bytes read
)( message );
}
The problem here is that this wouldn't work! evalTypeB also returns a number and then I would have no idea if what the ifElse expression is given me is a number of bytes read or an Id!
Question
How would you solve this without mutation and side effects?
A:
By definition, a pure function that is called repeated times as the callback for on('data', callback) can not keep track of state from previous calls.
With that in mind, there are a couple of options to consider to help try to minimise or localise the side-effects:
Close over the state, keeping the logic free of side-effects:
const processMsg = ifElse(isTypeA, evalTypeA, evalTypeB)
const handler = initialState => {
let state = initialState
return msg => {
state = processMsg(state, msg)
}
}
on('data', handler(42))
Recursively attach a new handler that will only be called once for each message at the end of each call, limiting the effects to the handler registration (this assumes something like once is supported by the event emitter):
const processMsg = ifElse(isTypeA, evalTypeA, evalTypeB)
const handler = state => msg =>
once('data', handler(processMsg(state, msg)))
once('data', handler(42))
|
{
"pile_set_name": "StackExchange"
}
|
Q:
DistinctCount extension method
Here I go again. I have been finding a fairly common pattern in business logic code. And that pattern looks like this: int sprocketCount = datastore.GetSprocketOrders(parameters).Distinct().Count(); I decided I wanted to build DistinctCount() (again from "first principles") as Distinct() will create a second enumerable off of the first before Count() is executed. With that, here are four variations of DistinctCount():
public static int DistinctCount<TSource>(this IEnumerable<TSource> source) =>
source?.DistinctCount((IEqualityComparer<TSource>)null) ?? throw new ArgumentNullException(nameof(source));
public static int DistinctCount<TSource>(this IEnumerable<TSource> source, IEqualityComparer<TSource> comparer)
{
if (source is null)
{
throw new ArgumentNullException(nameof(source));
}
ISet<TSource> set = new HashSet<TSource>(comparer);
int num = 0;
using (IEnumerator<TSource> enumerator = source.GetEnumerator())
{
while (enumerator.MoveNext())
{
// ReSharper disable once AssignNullToNotNullAttribute
if (set.Add(enumerator.Current))
{
checked
{
++num;
}
}
}
}
return num;
}
public static int DistinctCount<TSource>(this IEnumerable<TSource> source, Func<TSource, bool> predicate)
{
if (source is null)
{
throw new ArgumentNullException(nameof(source));
}
if (predicate is null)
{
throw new ArgumentNullException(nameof(predicate));
}
return source.DistinctCount(predicate, null);
}
public static int DistinctCount<TSource>(
this IEnumerable<TSource> source,
Func<TSource, bool> predicate,
IEqualityComparer<TSource> comparer)
{
if (source is null)
{
throw new ArgumentNullException(nameof(source));
}
if (predicate is null)
{
throw new ArgumentNullException(nameof(predicate));
}
ISet<TSource> set = new HashSet<TSource>(comparer);
int num = 0;
foreach (TSource source1 in source)
{
if (predicate(source1) && set.Add(source1))
{
checked
{
++num;
}
}
}
return num;
}
And here are a battery of unit tests:
[TestMethod]
[ExpectedException(typeof(ArgumentNullException))]
public void TestNull()
{
int[] nullArray = null;
// ReSharper disable once ExpressionIsAlwaysNull
Assert.AreEqual(0, nullArray.DistinctCount());
}
[TestMethod]
[ExpectedException(typeof(ArgumentNullException))]
public void TestNullPredicate()
{
int[] zero = Array.Empty<int>();
Func<int, bool> predicate = null;
// ReSharper disable once ExpressionIsAlwaysNull
Assert.AreEqual(0, zero.DistinctCount(predicate));
}
[TestMethod]
public void TestZero()
{
int[] zero = Array.Empty<int>();
Assert.AreEqual(0, zero.DistinctCount());
}
[TestMethod]
public void TestOne()
{
int[] one = { 1 };
Assert.AreEqual(1, one.DistinctCount());
}
[TestMethod]
public void TestOneWithDuplicate()
{
int[] oneWithDuplicate = { 1, 1, 1, 1, 1 };
Assert.AreEqual(1, oneWithDuplicate.DistinctCount());
}
[TestMethod]
public void TestTwo()
{
int[] two = { 1, 2 };
Assert.AreEqual(2, two.DistinctCount());
}
[TestMethod]
public void TestTwoWithDuplicate()
{
int[] twoWithDuplicate = { 2, 1, 2, 1, 2, 2, 1, 2 };
Assert.AreEqual(2, twoWithDuplicate.DistinctCount());
}
[TestMethod]
public void TestTwoWithDuplicateUsingPredicate()
{
int[] twoWithDuplicate = { 2, 1, 3, 2, 1, 2, 2, 1, 2, 3 };
Assert.AreEqual(2, twoWithDuplicate.DistinctCount(x => x > 1));
}
[TestMethod]
public void TestTwoUsingNullComparer()
{
int[] two = { 1, 2 };
IEqualityComparer<int> comparer = null;
// ReSharper disable once ExpressionIsAlwaysNull
Assert.AreEqual(2, two.DistinctCount(comparer));
}
[TestMethod]
public void TestOneWithDuplicateUsingComparer()
{
string[] one = { "one", "One", "oNe", "ONE" };
Assert.AreEqual(1, one.DistinctCount(StringComparer.InvariantCultureIgnoreCase));
}
[TestMethod]
public void TestTwoWithDuplicateUsingPredicateAndComparer()
{
string[] two = { "one", "two", "One", "Two", "oNe", "TWO", "ONE", "tWo", "three" };
Assert.AreEqual(2, two.DistinctCount(x => x != "three", StringComparer.InvariantCultureIgnoreCase));
}
As always, ooking for overall review - is the code readable, maintainable, performant? Do the tests have the right amount of coverage or are there more particular cases to consider?
A:
As slepic in his comment, I also wonder why you use an enumerator in the first and foreach in the second place?
You can eliminate null checks in the versions that call other overrides:
public static int DistinctCount<TSource>(this IEnumerable<TSource> source) =>
source?.DistinctCount((IEqualityComparer<TSource>)null) ?? throw new ArgumentNullException(nameof(source));
can be reduced to:
public static int DistinctCount<TSource>(this IEnumerable<TSource> source) => DistinctCount(source, (IEqualityComparer<TSource>)null);
And the other to:
public static int DistinctCount<TSource>(this IEnumerable<TSource> source, Func<TSource, bool> predicate) => DistinctCount(source, predicate, null);
Do you really need num? Couldn't you just return set.Count?
By using ToHashSet<T>() directly as show below I only find a minor loss (if any) in performance compared to your versions:
public static class ExtensionsReview
{
public static int DistinctCount<TSource>(this IEnumerable<TSource> source) => DistinctCount(source, (IEqualityComparer<TSource>)null);
public static int DistinctCount<TSource>(this IEnumerable<TSource> source, IEqualityComparer<TSource> comparer)
{
if (source is null)
{
throw new ArgumentNullException(nameof(source));
}
return source.ToHashSet(comparer).Count;
}
public static int DistinctCount<TSource>(this IEnumerable<TSource> source, Func<TSource, bool> predicate) => DistinctCount(source, predicate, null);
public static int DistinctCount<TSource>(
this IEnumerable<TSource> source,
Func<TSource, bool> predicate,
IEqualityComparer<TSource> comparer)
{
if (source is null)
{
throw new ArgumentNullException(nameof(source));
}
if (predicate is null)
{
throw new ArgumentNullException(nameof(predicate));
}
return source.Where(predicate).ToHashSet(comparer).Count;
}
}
According to your tests, I think you should test reference types (classes) with override of Equals()/GetHashCode() (and implementation of IEquatable<T>) with and without a custom comparer.
A:
Slepic and Henrik are wondering about the use of foreach and enumerator, and I'm too.
Anyway, instead of having different versions with actual implementations for the same purpose (count the distinct elements), you can create one private method with the full implementation, and then, just call back this method on the other methods.
So, the main implementation would be like this :
private static int CountDistinctIterator<TSource>(IEnumerable<TSource> source, Func<TSource, bool> predicate, IEqualityComparer<TSource> comparer)
{
if (source == null) throw new ArgumentNullException(nameof(source));
var set = new HashSet<TSource>(comparer);
var count = 0;
foreach (TSource element in source)
{
checked
{
if (set.Add(element) && predicate(element))
{
count++;
}
}
}
return count;
}
Now, it's a matter of calling back this method with the appropriate arguments.
Like this :
public static int CountDistinct<TSource>(this IEnumerable<TSource> source)
{
return CountDistinctIterator<TSource>(source, (s) => true, null);
}
public static int CountDistinct<TSource>(this IEnumerable<TSource> source, IEqualityComparer<TSource> comparer)
{
return CountDistinctIterator<TSource>(source, (s) => true, comparer);
}
public static bool AnyDistinct<TSource>(this IEnumerable<TSource> source, Func<TSource, bool> predicate)
{
return CountDistinctIterator<TSource>(source, predicate, null) == 1;
}
public static bool AnyDistinct<TSource>(this IEnumerable<TSource> source)
{
return CountDistinctIterator<TSource>(source, (s) => true, null) == 1;
}
although, for this Distinct I don't see any usage for Func<TSource, bool> predicate except for checking if the element exists or not. As the Distinct would get the unique elements, and if you say element == xxx it'll always return 1 if exists, and 0 if not. Unless there is any other uses except this one, in my opinion, I find it beneficial if rename this method:
DistinctCount<TSource>(this IEnumerable<TSource> source, Func<TSource, bool> predicate)
to something meaningful other than DistinctCount like for instance DistinctAny which return boolean (true if DistinctCount returns 1, false if 0).
UPDATE :
I have changed the methods name from DistinctCount to CountDistinct the reason of this is because the method is Counting, so the Count needs to be first so it would be easier to picked up, the other reason is doing this will make it appear after Count on the intellisense list. I also added AnyDistinct methods which replaced the mentioned method (the one with Func<TSource, bool>).
A:
Just looking at your tests, there's a couple of points to consider...
Naming
Having Test at the front of every test case is usually redundant (public methods in test classes are tests...). The beginning of the test name is also quite valuable real-estate since your test runner/window is likely to truncate what it displays after a certain number of characters. Consider removing the 'Test'. A better prefix might be the name of the method under test (although you may be using the name of the `TestClass for that, since you don't include that part of your code).
Make it clear what you're testing
I found your test methods that are testing for exceptions to be less than clear.
[TestMethod]
[ExpectedException(typeof(ArgumentNullException))]
public void TestNullPredicate()
{
int[] zero = Array.Empty<int>();
Func<int, bool> predicate = null;
// ReSharper disable once ExpressionIsAlwaysNull
Assert.AreEqual(0, zero.DistinctCount(predicate));
}
Initially I skipped over the method annotation and just rest the test code. On the face of it, it look like if there was a null predicate, you are expecting the method to return 0. This seemed odd, however possible behaviour. There's nothing in the test name (such as DistinctCount_NullPredicate_Throws) to indicate what the expected outcome was, then eventually there's the ExpectedException attribute, which explains that actually the test is expecting an ArgumentNullException.
Having an Assert statement when you're not actually expecting a value to be returned from the call is misleading. It would be better to just call the method (zero.DistinctCount(predicate)). The lack of an assertion helps to make it more obvious that the attributes indicate the success criteria for the test.
|
{
"pile_set_name": "StackExchange"
}
|
Demonstration of luteotrophic responses of human recombinant gamma interferon in porcine corpora lutea using an in-vivo microdialysis system.
Conceptuses from several mammalian species prior to implantation secrete proteins belonging to the family of interferons. The main species of interferons known to be secreted by the pig blastocyst is interferon gamma (IFNgamma), the precise role of which is unclear. We decided to explore its effects on corpus luteum (CL) function using the novel microdialysis technique in vivo. Six cycling miniature pigs were monitored for estrus by daily plasma progesterone analysis and visual symptoms. On day nine of the cycle (day zero being the day of ovulation) the animals underwent surgery, and microdialysis tubing (vitafiber, Amicon U.S.A, cut off mol. wt. 1 million) were implanted in 17 corpora lutea. The inlets and outlets of all tubings were exteriorized and the entry and exit points of tubings in the CLs sealed with tissue glue. The afferent extension tubings were connected to a fraction collector and the system was continuously flushed with Ringer at a flow rate of 2.4 ml/h. After an initial flushout phase of 8 h, fractions were collected every half hour over 3 days. On days 10, 11 and 12 post estrus 12 CLs were stimulated for 4 h with 10(-7) M, 2 x 10(7) M and 4 x 10(-7) M human recombinant IFNgamma (Pharma Biotechnologie) respectively. Simultaneously, fractions were also collected from the remaining five unstimulated corpora lutea which served as controls. Progesterone concentrations in the dialysates were estimated by a sensitive enzymeimmunoassay (EIA). A significant increase (P < 0.01) in progesterone release was observed in all 3 days following stimulation. The progesterone increase was more marked on the first day of stimulation (1 x 10[-7] M) with the hormone levels rising further even after the end of stimulation. The overall increase in progesterone concentration was 2-fold on day 10 in comparison to 15-30% on subsequent days even though IFN concentrations for stimulation were 2- and 4-fold higher. In the unstimulated CLs, a gradual decline (P < 0.01) in progesterone levels were observed over days. In conclusion, these data provide evidence that the early conceptus signals its presence by way of IFNgamma to maintain the CL in pigs.
|
{
"pile_set_name": "PubMed Abstracts"
}
|
The process of exiting vegetarianism: an exploratory study.
The experience, reasons, and contexts associated with leaving vegetarianism were explored. Interviews were conducted with a convenience sample of 19 ex-vegetarians and 15 continuing vegetarians. Exiting vegetarianism is similar to the process of leaving other important individual identities, including exiting diets containing meat. It is a process, not an event, and partially a response to inconvenience, particularly when the person's table companions were not vegetarians. Major life changes and declines in self-perceived health provided occasions to reassess life choices, including the vegetarian commitment. Ex-vegetarians interpreted their vegetarianism as a transition to a new, healthier diet. Including a comparison group of continuing vegetarians revealed that the ex-vegetarians were more likely to have become vegetarians as a result of concern about the well-being of animals and the environment, not animal rights, a value more difficult to compromise. Exiting processes show the five central food values of taste, health, time, cost, and social relationships undermine people's commitment to a diet chosen largely for moral reasons.
|
{
"pile_set_name": "PubMed Abstracts"
}
|
Russell Crowe's 'Water Diviner' Is Top Homegrown Film of 2014 in Australia
The star's directorial debut brought in $5.65 million within the six days to the end of the year
Russell Crowe's directorial debut The Water Diviner is the top-grossing homegrown film of 2014 in Australia.
Released on Boxing Day, the film, set after the WWI battle of Gallipoli, brought in $5.65 million at the Australian box office within the six days to the end of 2014, distributor Entertainment One said on Monday. As of Sunday night, it had grossed $8.4 million.
Read more 'Predestination,' 'Water Diviner' Lead Australian Film Awards Nominations
The performance beat the box-office take of Greg McLean's Wolf Creek 2, which brought in $4.7 million in 2014, to make the movie the top homegrown release of the year in Australia.
"We are delighted that Australian audiences have responded with such enthusiasm to the film," said Mike Baard, managing director for Universal Pictures Australia and Sandie Don, head of distribution for Entertainment One. "It's that time of year when people are thinking about the future, and The Water Diviner reminds us of the possibility of hope. It is so fitting that in the year that we remember the 100th anniversary of Gallipoli, all Australians have a film [that] transports audiences to that time and place but does so with a fresh perspective and such a positive and uplifting message, which is relevant today."
Only four Australian movies crossed the million-dollar mark at the country's box office in 2014. Detailed, full-year figures are expected to be released in the coming weeks.
Read more Warner Bros. Picks Up Russell Crowe's Historical Drama 'Water Diviner'
The Water Diviner actress Olga Kurylenko recently told THR: "What I like about the film is that it doesn't take sides, and that is why I think people have loved it. Both the Turks and the Australian and New Zealand Army Corps soldiers are presented with such understanding and equally with such respect. It's really well done. And it's so hard to do so."
Email: Georg.Szalai@THR.com
Twitter: @georgszalai
|
{
"pile_set_name": "OpenWebText2"
}
|
The Ramiro Vaca Airwolf plays just like on FMan's C128.. which sounds like crap, but nonetheless "right" I guess. It sounds way more like Airwolf on a 8580 than on 6581 btw., so maybe this SID is tagged wrong.
That's actually what I was thinking. At first I thought it plays at a slightly wrong speed, but it's just a very distorted sound maybe. But I get this with a lot of tunes, also original ones - for example the beautiful slides of Cybernoid sound awful on my C128. They always have. Why is that?
I am thinking the Vaca wolf is supposed to be played at a call rate that is non-synchronous to the video. But even SIDPlay2 did not show the actual timer value, so I couldn't find out. I'm pretty sure it's something else than $4CC8. Is there a command line tool that dumps info on .sids?
wvl_kszen wrote:
This looks like what my flat 128 was doing... But my c64's were behaving totally different. I'll make a small movie tonight to show
Cool. Movie night! How does your C64 play this particular song? Is there any problem? I will test some more songs myself this evening. Somehow I don't think this is necessarily a categorical error in playing CIA-timed songs. Of course I can be wrong like I usually am.
Who is online
Users browsing this forum: No registered users and 2 guests
You cannot post new topics in this forumYou cannot reply to topics in this forumYou cannot edit your posts in this forumYou cannot delete your posts in this forumYou cannot post attachments in this forum
|
{
"pile_set_name": "Pile-CC"
}
|
Q:
proving convergence of this sequence and calculating limit
So i have this sequence:
$a_{n}=1+ \frac{1}{3}\cos1 +\frac{1}{3^2}\cos2+ ... +\frac{1}{3^n}\cos(n) $
I have to prove it is convergent, and then calculate the limit.
I'm not totally sure how to find the limit of this sequence, so i am stuck at the beginning.
Because of the 2nd task, it's probably not the best idea to try to prove it's a Cauchy's sequence, so i guess it's the best to find the limit(at least the candidate) and then prove that it's convergent with that limit by definition.
But i am stuck at the begining. Thanks in advance.
A:
Hint:
$$
\cos k=\operatorname{Re}\bigl(e^{ik}\bigr)
$$
and
$$
\sum_{k=0}^n\frac{\cos k}{3^k}=\operatorname{Re}\Bigl(\sum_{k=0}^n\Bigl(\frac{e^i}{3}\Bigr)^k\Bigr).
$$
The sum is the sum of a geometric progression of ratio $e^i/3$.
$$
\sum_{k=0}^n\Bigl(\frac{e^i}{3}\Bigr)^k=\frac{(e^i/3)^{n+1}-1}{e^i/3-1}.
$$
Since $|e^i/3|=1/3<1$ we have
$$
\lim_{n\to\infty}\sum_{k=0}^n\Bigl(\frac{e^i}{3}\Bigr)^k=\frac{1}{1-e^i/3}=\frac{3}{3-\cos1-i\sin1}.
$$
The desired limit is the real part, that is
$$
\frac{3(3-\cos1)}{(3-\cos1)^2+\sin^21}.
$$
|
{
"pile_set_name": "StackExchange"
}
|
Myeloablation and autologous peripheral blood stem cell rescue results in hematologic and clinical responses in patients with myeloid metaplasia with myelofibrosis.
Current therapeutic options for myeloid metaplasia with myelofibrosis (MMM) are limited. A pilot study was conducted of autologous peripheral blood stem cell (PBSC) collection in 27, followed by transplantation in 21 patients with MMM. The median age was 59 (range 45-75) years. PBSCs were mobilized at steady state (n = 2), after granulocyte colony-stimulating factor (G-CSF) alone (n = 17), or after anthracycline-cytarabine induction plus G-CSF (n = 8). A median of 11.6 x 10(6) (range 0 to 410 x 10(6)) CD34(+) cells per kilogram were collected. Twenty-one patients then underwent myeloablation with oral busulfan (16 mg/kg) and PBSC transplantation. The median times to neutrophil and platelet recovery after transplantation were 21 (range 10-96) and 21 (range, 13 to > or = 246) days, respectively. Five patients received back-up PBSC infusion because of delayed neutrophil or platelet recovery. The median follow-up is 390 (range 70-1623) days after transplantation, and the 2-year actuarial survival is 61%. After transplantion, 6 patients died: 3 of nonrelapse causes (1 within 100 days of PBSC infusion) and 3 of disease progression. Erythroid response (hemoglobin > or = 100 g/L [10 gm/dL] without transfusion for > or = 8 weeks) occurred in 10 of 17 anemic patients. Four of 8 patients with a platelet count less than 100 x 10(9)/L (100 000/microL) responded with a durable platelet count more than 100 x 10(9)/L (100 000/microL). Symptomatic splenomegaly improved in 7 of 10 patients. It is concluded that (1) PBSC collection was feasible and stable engraftment occurred after transplantation in most patients with MMM, (2) myeloablation with busulfan was associated with acceptable toxicity, (3) a significant proportion of patients derived clinical benefit after treatment, and (4) further investigation of this novel approach is warranted. (Blood. 2001;98:586-593)
|
{
"pile_set_name": "PubMed Abstracts"
}
|
HASTINGS CENTER REPORT September-October 2014 A Troublesome Inheritance, by Nicholas Wade, should be read by anyone interested in race and recent human evolution. Wade deserves credit for challenging the popular dogma that biological differences between groups either don't exist or cannot explain the relative success of different groups at different tasks. Wade's work should be read alongside another recent book, The 10,000 Year Explosion: How Civilization Accelerated Human Evolution, by Gregory Cochran and Henry Harpending. Together these books represent a major turning point in the public debate about the speed with which relatively isolated groups can evolve: both books suggest that small genetic differences between members of different groups can have large impacts on their abilities and propensities, which in turn affect the outcomes of the societies in which they live. Ever since the 1950s, Wade argues, many academics have denied the biological reality of race, and some have suggested that merely believing in racial differences constitutes a kind of racism. But the rejection of race as a useful concept is often more of a political pose than a serious scientific claim, and it became especially popular among academics after the Second World War, during which Nazi pseudoscientists used claims of racial superiority to justify mass murder. As it turns out, Ashkenazi Jews-generally, those Jews with roots in Russia, Poland, and Germany, the group nearly exterminated in the Holocaust-have been consistently found by intelligence researchers to have the highest average IQ in the world. The 10,000 Year Explosion and A Troublesome Inheritance each spend an entire chapter detailing the remarkable achievements of Ashkenazi Jews and hold them up as exhibit A in the argument that human evolution has been, in Wade's words, recent, copious, and regional. The example of Ashkenazi evolution is supposed to show the absurdity of the view, held by authors like Jared Diamond and Stephen Jay Gould, that human evolution either stopped one hundred thousand years ago or that natural selection has somehow continued to sculpt the bodies but not the brains of different groups of people. Wade uses "race" to refer to groups of people who have been separated long enough to have developed clusters of functionally significant genetic differences, and "ethnicity" to apply to groups within races who have small but significant genetic differences from other groups within a race. The concept of an ethnicity is made especially clear if we understand the coevolution of genes and culture. If within a culturally diverse but racially distinctive region like the Arabian Peninsula, nomadic Bedouins tend to marry Bedouins, while city dwellers marry each other, then Bedouins and city dwellers may begin to diverge into biologically and culturally different ethnicities as they face different selective pressures. For example, because Bedouins were nomads who increasingly depended on their camels for transportation and milk, those who produced the lactase enzyme (which facilitates milk digestion) into adulthood had a reproductive advantage over those who lacked this enzyme. As the allele for lactose tolerance spread through the population, reliance on camels became even more entrenched in Bedouin culture, and selective pressure increased for lactose tolerance. Despite being both Arab and Muslim, Bedouins have enough genetic and cultural differences to constitute a distinctive ethnic group throughout the Middle East. The important point is that cultural pressures can directly impact natural selection, and preexisting traits create propensities that shape culture. Wade ultimately invokes gene-culture coevolution to explain, among other things, how Tibetans evolved a greater capacity to tolerate life in the mountains than Indians, how Europeans who have depended on agriculture for thousands of years can consume more carbohydrates without succumbing to diabetes than Native Americans, and how Ashkenazi Jews could have evolved higher intelligence than Sephardic Jews in as little as one thousand years. Wade uses terms like "race" and "ethnicity" in a deliberately vague way, as shorthand for saying that there are relatively large or small genetic differences between groups of people-differences that are path dependent and arise from breeding within a discrete population. He also concedes that racial groups are separated by fuzzy borders rather than sharp lines. This is because of genetic exchange between groups and because most alleles are merely distributed with different frequencies in different populations (not all Bedouins, for example, are lactose tolerant). If scientists can uncover the genetic basis of group differences, shouldn't we worry that the study of race will promote racism? Wade takes this question up in the first and last chapters of the book, although his answers are only partially convincing. First, he says, racial differences are not all that big: "People review Genes, Race, and the Ethics of Belief by jonathan Anomaly A Troublesome Inheritance: Genes, Race and Human History. By Nicholas Wade. Penguin, 2014. 288 pages. Hardcover. $27.95. September-October 2014 HASTINGS CENTER REPORT 51 being so similar, no one has the right or reason to assert superiority over a person of a different race" (p. 9). While it is true that most genetic differences between groups are not large, this is less convincing than the analogous argument from individual differences. Wade should have said, "Individual people being so different, no one has the right or reason to assert superiority over a person of a different race." This is because there is tremendous genetic variation between individuals within a particular race, sometimes more than the average variation across races. Even if the average Asian has an IQ of 105 and the average African has an IQ of 90, two individual Asians may have an IQ of 120 and 80, respectively (it is important to separate genetic and environmental contributions to IQ and to note that IQ does not capture every aspect of intelligence, but assume for the moment that we are speaking only about the genetic component of IQ). The problem with saying that "Asians are smarter than Africans" or that "Africans are faster than Asians" is not simply that differences between groups are not very large. It's rather that, in any given case, there is a good chance that the assertion is factually incorrect, because of the bell-shaped distribution of traits like memory or muscle mass within a population. By contrast, the problem with saying that "Africans are superior to Asians" is that there is no widely agreed upon set of characteristics that composes "superiority." Computational skills and running speed are only some of the many things people care about. Compassion and kindness, creativity, aesthetic beauty, and a sense of humor are among the many other qualities people prize. Although a truly exceptional individual may possess more of these traits than another individual, no race or ethnicity possesses all or even most of them more than other races. And in a market society characterized by specialization and exchange, everyone benefits from the different talents of everyone else. Wade's second argument, more convincing than the first, is that claims about racial superiority are normative claims that cannot be undermined by appeals to group differences. Wade doesn't spend much time on this, but he does say that "the notion that any race has the right to dominate others or is superior in any absolute sense can be firmly rejected as a matter of principle and, being rooted in principle, is unassailable by science" (p. 8). This is not to say that Wade's book is unproblematic. Some of his more provocative hypotheses have the potential to comfort racists who wish to explain the relative success of different groups via biology alone rather than institutions. Wade is surely right that biological differences can create the preconditions for some institutions to succeed or fail, but he often pushes the argument well beyond what the evidence can support. For example, he ignores the role of fossil fuels in providing the cheap energy that facilitated English economic growth in the nineteenth century and concentrates instead on the role of the eugenic effects of the English social structure that preceded the Industrial Revolution. In discussing how differences in gene-culture coevolution can explain the trajectory of different groups, Wade argues that as hunter-gatherers moved into settled communities, changes occurred in certain genetically mediated traits, including a capacity to trust more people and a greater willingness to defer to impersonal social norms and punish norm-violators. This seems plausible enough, and it may explain why it took so long for humans to move from small and mobile hunter-gatherer societies to large and settled agricultural societies. But it has a troubling implication. Wade thinks that some groups of people, including modern hunter-gatherers and their recent descendants, will have a hard time living in modern nation states-not merely because they are accustomed to a different way of life, but because they are genetically ill-suited to live under alternative institutions. It is hard to know what to make of claims like this, especially without more knowledge of how genes mediate social behaviors. Although Wade cites studies that suggest that some groups have greater frequencies of alleles associated with violence and that hunter-gatherers who are more successful at violent warfare are often rewarded with more offspring, he warns his readers that he is going well beyond what the available evidence demonstrates and offering conjectures about why some groups have prospered under modern social and political institutions, while others have not. These claims raise compelling questions about the ethics of belief, as well as the justification of belief. For example, if some stereotypes turn out to have a biological basis, will this reduce our ability to treat each other fairly? It is not always unfair to use information about biological differences to make generalizations (for example, that men are more prone to violence than women or that West Africans are more prone to sickle cell anemia than East Africans), but sometimes information-even if it is accurate-can be used by some people to unfairly dominate others. Wade's speculation would be innocuous if it weren't likely to be read by people who will misinterpret it or use it to justify racist attitudes or policies. Assuming it is likely to be misunderstood or misused by some people, the question is whether such speculation should be part of a public discussion. As academics, we should follow the arguments wherever they lead us and pursue the truth even when it challenges our most cherished beliefs. As citizens, we should worry that arguments like Wade's will be used by demagogues to prey on people who are prone to fantasies about racial purity. The trick for thoughtful readers is to separate science from speculation and to highlight the difficulty of deriving normative conclusions from empirical claims. DOI: 10.1002/hast.
|
{
"pile_set_name": "PhilPapers"
}
|
Electric Lit relies on contributions from our readers to help make literature more exciting, relevant, and inclusive. Please support our work by becoming a member today, or making a one-time donation here .
Certain writers — or artists, or film-makers, etc.— are so embedded into their particular cultures that one doesn’t need to have consumed their work in order to understand its impact. In particular, there are a bunch of white male authors it is possible to just about forget you haven’t read if you’ve dated the type of dudes you meet at an n+1 party. Certain books are so central to this type of dude that getting through a relationship — or even a few dates—constitutes the same level of knowledge of these authors that one might get from actually reading them, and gives you just as much right to hard-earned lifelong knowledge about their books, knowledge that need not ever be fact-checked by actually reading the books themselves (unless, for some reason, you really want to). Presented below, 20 authors on whose work I have involuntarily ended up with a strong opinion due to my unfortunate heterosexuality.
1. Philip Roth: I’ve never read any of Philip Roth’s books, but I have dated enough men who have that I can carry on a decent small-talk conversation about why I don’t like them. (If you would like to achieve this without dating men, you could just read a description of one of Roth’s books, in particular the one in which a man is transformed into a boob). Roth and I live in the same neighborhood, and a friend of mine once ran into him in the local pharmacy, where he was buying hemorrhoid cream or Cialis or something equally embarrassing, and glared at my friend for noticing him. Telling this story, I always imagine Roth holding a box that just says BAD DICK CREAM.
I’m sure the thing I say where I call him ‘the manic pixie dream girl of American literature’ is probably wrong, but I’m not gonna stop saying it.
2. Kurt Vonnegut: Honestly, I feel pretty guilty that I’ve never finished a Kurt Vonnegut novel, and I’m sure the thing I say where I call him “the manic pixie dream girl of American literature” is probably wrong, but I’m not gonna stop saying it. Even if it isn’t an accurate description of Vonnegut himself, I stand by it absolutely, and in perpetuity, as a description of every single dude with a tattered copy of Breakfast of Champions on his nightstand.
3. Tom Robbins: On the other hand, I feel pretty guilty that I have ever read any Tom Robbins books.
4. Arthur Miller: I’m sorry about your dad.
5. Jonathan Franzen: Anyone who really, sincerely loves Franzen’s writing has also probably really, sincerely told someone that “learn to code” was the solution to all their problems. The Corrections also contributed to the obsession with the literal and figurative “big book,” in which the size and weight of a novel directly equals its importance, a concept applied almost exclusively to novels by men.
6. Jonathan Safran Foer: I think the general opinion is that the most Jonathan Jonathan, the Ur-Jonathan, is Franzen, but bear with me here, because it’s actually Foer. Foer is the most successful of the Jonathans, in financial terms, and his personal life is a like a movie about the Brooklyn book world created by the Sex and the City writers’ room. The only thing I know about his recent prose is that scene about the doorknob, which made me unable to have sex for a week after I read a review that excerpted it, which I guess is technically an example of “impactful” writing.
7. J.D. Salinger: I’ve never read Salinger because I suspect that his books are at least 30% descriptions of ways in which women can be small, but I have read the best thing he ever (inadvertently) produced, which is this tweet. A lot of wonderful people love Salinger, but so do a lot of people whose job seems to be staging their meals on Instagram.
8. Chuck Palahniuk: Fight clubs aren’t real, you aren’t in one. (The less flippant thing I have to say is that the horror of the human body is a deeply important and nearly inexhaustible topic for literature, but it is close to impossible to find a white, male, famous writer whose writing on this subject is anything but a thinly disguised demonstration of violent misogyny, and maybe you should read Angela Carter or Carmen Maria Machado instead.)
9. Charles Bukowski: Alcoholism is a disease, not a personality.
10. John Updike: I’m sure that short story was very sad but also you have never had to have a job.
11. Bret Easton Ellis: I don’t like cocaine which is great because it means I have mostly avoided the people who want to sincerely talk about Bret Easton Ellis. A favorite of dudes hoping their sociopathy will be mistaken for genius; a more obvious favorite of dudes who quit their MFA a year in to go to a second-tier business school. A super-favorite of a guy who doesn’t mention his real estate license is how he actually makes money until you’ve known him for a couple months.
12. Ayn Rand: I’m sorry about your start-up.
One of the greatest things about getting older is that nobody has tried to talk to me about Jack Kerouac in at least five years.
13. Jack Kerouac: One of the greatest things about getting older is that nobody has tried to talk to me about Jack Kerouac in at least five years.
14. Thomas Pynchon: I’m sorry about your unfinished novel. (I actually love Pynchon and this burn is very self-directed).
15. Norman Mailer: The favorite author of every guy who loves to talk about bar fights but has never been in one.
16. Tom Wolfe: The favorite author of every man with an unfinished novel and a “writing outfit.”
17. Martin Amis: The favorite author of every dude who hates women but loves telling people about the year* he lived* in London. (*three months) (*studied abroad)
18. Donald Barthelme: Barthelme is a beautiful, strange, important writer beloved by dudes who will interrupt two out of every three sentences you say to them.
19. David Foster Wallace: A list like this wouldn’t be complete without DFW, but at the same time his inclusion feels disingenuous, because when it comes to Wallace, I am the literary bro cornering you at a party to ask if you’ve read him and why not. I love DFW’s work in the same over-personal obsessive way this list is meant to mock. Wallace is also an author whose body of work defies the kind of easy summary that can be gleaned from listening to a dude talk at a party about his favorite writer, or applied independent of actual engagement with the writing. I came to his work on my own without the suggestion of any dude, and I’ve probably rhapsodised obnoxiously about his work to most everyone I’ve dated since then. Furthermore, the circumstances of his death render pretty much all of jokes I could make here distasteful. In a better world, DFW would still be alive and we’d all gleefully roast dudes who suddenly start wearing a sweaty bandana to their undergraduate creative writing classes for no reason. The problem with dudes who love DFW, though — not all of them, certainly, but too many of them — is that they miss the lesson in his work that’s most useful to the type of person — like these dudes, and like myself — who tends toward hero-worship of authors they admire. The things that dudes who aggressively love DFW tend to imitate in DFW’s life and work are the very things that are meant to be openly foolish, interrogative rather than proud, at once offering levity and intense self-skewering criticism. That this enormous vulnerability has been either utterly elided or turned toxic by any of his most fervent fans doesn’t come close to being the greatest tragedy regarding the author, but it’s still immensely regrettable. In unpopular opinions, however, I still think “Big Red Son” is the best essay he ever wrote about America, and I wish he had lived long enough to revise a Large Adult Son joke into it.
20. Ernest Hemingway: The only truly feminist thing I have ever done is never finishing a Hemingway novel.
|
{
"pile_set_name": "OpenWebText2"
}
|
Q:
CORS preflight request returning HTTP 401 with windows authentication
I searched a lot on Google and Stack overflow to find a solution for my problem, but nothing worked.
Here is my problem:
I use IIS 7 with a special programming environment called WebDEV that does not allow direct manipulation of OPTIONS HTTP method. So, all solutions suggesting some kind of server-side request handling using code are not feasible.
I have to use Window authentication and disable anonymous access
I have a page that uses CORS to POST to this server. As this POST should have Content-type: Octet-stream, a preflight is issued by the browser.
When I enable anonymous access, everything works fine (CORS is well configured)
When I disable anonymous access, the server replies with HTTP 401 unauthorized response to the preflight request, as it does not contain credentials information.
I tried to write a module for IIS that accepts OPTIONS requests like this, but it did not work (couldn't add the module correctly to IIS, maybe)
public class CORSModule : IHttpModule
{
public void Dispose() {
}
public void Init(HttpApplication context)
{
context.PreSendRequestHeaders += delegate
{
if (context.Request.HttpMethod == "OPTIONS")
{
var response = context.Response;
response.StatusCode = (int)HttpStatusCode.OK;
}
};
}
}
The question is: How can I make IIS respond with HTTP 200 to the preflight request without enabling anonymous access or writing some server-side code? Is there an easy configuration or a ready-made module for IIS to do so? At least, what are the detailed steps to install the above module into IIS 7?
A:
Here is the solution that uses "URL Rewrite" IIS module. It works perfectly.
1- Stop IIS service (maybe not necessary)
2- Install "web platform installer" from https://www.microsoft.com/web/downloads/platform.aspx
3- Go to "Applications" tab and search for "URL Rewrite" and download it
4- Install this hotfix KB2749660 (maybe not necessary)
5- Open IIS configuration tool, double click "URL Rewrite"
6- Add a new blankrule
7- Give it any name
8- In "Match URL", specify this pattern: .*
9- In "Conditions", specify this condition entry: {REQUEST_METHOD} and this pattern: ^OPTIONS$
10- In "Action", specify: action type Personalized response, state code 200, reason Preflight, description Preflight
11- Start the server
Now, the server should reply with a 200 status code response to the preflight request, regardless of the authentication.
Remarks: I also disabled all compression, I don't know if it matters.
A:
From AhmadWabbi's answer, easy XML pasting into your web.config:
<system.webServer>
<rewrite>
<rules>
<rule name="CORS Preflight Anonymous Authentication" stopProcessing="true">
<match url=".*" />
<conditions>
<add input="{REQUEST_METHOD}" pattern="^OPTIONS$" />
</conditions>
<action type="CustomResponse" statusCode="200" statusReason="Preflight" statusDescription="Preflight" />
</rule>
</rules>
</rewrite>
</system.webServer>
|
{
"pile_set_name": "StackExchange"
}
|
The present invention relates to an electric double layer capacitor of high electrostatic capacitance which utilizes the principles of an electric double layer that is composed of an interface between activated carbon and electrolyte.
Recently, high-capacitance capacitors based on the electric double layer principles have been developed as backup power supplies for memories in electronic systems, and are widely used with microcomputers and IC memories.
One type of electric double layer capacitor is disclosed in U.S. Pat. No. 3,536,936, for example. FIG. 11 of the accompanying drawings shows the structure of the disclosed electric double layer capacitor. The electric double layer capacitor comprises a single basic cell composed of a pair of current collectors 101 of an electron conductor which serves as a pair of collector electrodes, a pair of carbon electrodes 102 made of activated carbon particles, a pair of nonconductive gaskets 103, and an isolating plate 104 positioned between the carbon electrodes 102 for preventing electrons from moving between the electrodes 102. The carbon electrodes 102 are made as paste electrodes from a concentrated slurry which is a mixture of powdery or particulate activated carbon and an electrolyte. The electrolyte has three functions to perform. It serves as a promoter of ion conductivity, an ion source, and a binder for the carbon particles.
It is important that the internal resistance of an electric double layer capacitor be low. The internal resistance of an electric double layer capacitor is greatly affected by the contact resistance of active carbon of the polarized electrodes and the contact resistance between the collector electrodes and the polarized electrodes.
Therefore, in order to reduce the internal resistance of the polarized electrodes and the contact resistance between the collector and polarized electrodes, each basic cell should be kept under vertical pressure to bring the particles of the paste activated carbon into good electric contact with each other. Conventional electric double layer capacitors require each cell to be kept under a pressure of about 100 kg/cm.sup.2 though it depends on the size of the electrodes, the size of the particles of the carbon material, or the kind of the electrolyte used. In prior electric double layer capacitors, the cells are kept under pressure by deforming the outer cases of the capacitors or bonding the current collectors strongly to gaskets. If an electric double layer capacitor is to be used as a large-capacitance capacitor, e.g., a power supply for energizing a motor, then it is necessary to increase the cross-sectional areas of the electrodes of the basic cell. Therefore, the pressure to be applied to the basic cell has to be increased. Increasing the pressure, however, causes some practical problems such as the selection of means for applying the pressure and the need for high rigidity for the outer cell which houses the basic cell.
|
{
"pile_set_name": "USPTO Backgrounds"
}
|
Q:
pre-soaking tea in cold water prior to brewing
My friend recently gave me the advice that tea bag should be soaked in a little bit (barely enough to submerge the tea bag) of cold water for a couple of minutes. Then hot water should be added to the cold to brew it.
The idea is that scalding hot water is hot enough to burn flavour compounds and pre-soaking protects against this.
I tried googling to no avail. Does anyone have any references that prove/dis-prove this?
A:
I don't think the couple minutes of soaking is actually doing anything; it'll pull a bit of stuff out of the leaves, and get them wet, but what really matters is the hot water. It sounds like this is a way of getting lower temperature water, similar to your proposed "protect the tea from hot water" explanation. This is indeed good for green and white tea, and maybe oolong, but essentially unnecessary for most other teas.
You don't actually always want boiling water for tea. Joe provided this table of temperatures in his comment. Some temperatures for common types of tea, in decreasing order of temperature: maté, rooibos or herbal (208F / 98C); black (195-205F / 91-96C); oolong (195F / 91C); blooming (180F / 82C); white or green (175F / 80C). So for some teas (black, maté, rooibos, herbal), it's pretty close to boiling - by the time the water's poured in, and transfers some heat to the cup, it'll be a few degrees below boiling, so you don't need to worry about it much.
But other kinds of tea (green or white tea), you ideally want to add somewhat lower temperature water. If you have a way to get water somewhere around 80C - for example, some electric kettles can automatically turn off at a lower temperature - then just do that. But if it's easiest to make boiling water, then if you fill your cup a bit less than 1/4 of the way with water at room temperature (20C) then fill it the rest of the way with boiling water, the result will be around 80C, just right for green tea!
|
{
"pile_set_name": "StackExchange"
}
|
ERC Director Francisco "Jun" Villa Jr.
Three handwritten letters labelled as "suicide notes" were drafted by Energy Regulatory Commission (ERC) Director Francisco "Jun" Villa Jr. as early as August --- almost three months before he took his own life in their home in Parañaque City.
Villa killed himself on November 9 after allegedly being pressured to approve procurement contracts and hiring consultants without proper bidding and procedure, his younger sister Charie Villa said.
The letters that were dated August 23, 24, and 25 were shown by Villa's family during the late official's "pasiyam" on Thursday. All suicide notes seemed like prayers as all letters were addressed to the "Lord Jesus Christ."
FIRST NOTE
In his first note, Villa sought for the Lord's help as he "cannot physically bring himself to work" at the ERC due to "fears" about his work as chief of the agency's Bids and Awards Committee (BAC).
He said his biggest fear was being called out by the Commission on Audit (COA) on the contents of an audio-visual presentation "by Luis Morelos which the chairman and CEO Jose Vicente B. Salazar chose through a rigged selection process."
ERC chairman and CEO Jose Vicente B. Salazar. Photo courtesy of Energy Regulatory Commission
Despite being uncomfortable with his tasks as BAC chief, Villa said he could not afford to be unemployed because he still had bills to settle. In the same letter, he said he "might even commit suicide" due to his stressful situation at work.
SECOND NOTE
Villa wrote another "suicide note" the following day. He said he felt bad filing a sick leave as his "psychological frame of fear, aversion to pressure, and worrying makes him unfit for work."
He said he planned to continue to skip work to avoid attending the "August 26 planning session" with Salazar.
THIRD NOTE
In Villa's third and last letter, he said he felt that he was "being set up for failure," but was relieved that a certain "E.D." signed "the Iloilo contracts."
Villa said he still could bring himself to return to work as his "ailment is more psychological and moral rather than physical."
"I want to shoot myself in the temple by using Dad's .38 caliber Smith and Wesson gun," the late ERC official wrote.
EARLY RETIREMENT
Almost three months after he wrote the letters, Villa filed an "application for early retirement" on November 4 at the ERC, citing insomnia and health concerns as reason.
"With great apologies, I must inform you that my health situation does not permit me to perform effectively my functions. I suffer insomnia nightly due to stress factors experienced at work and such disables me from being mentally and physically capable to hurdle work challenges," Villa's retirement letter addressed to Salazar read.
Five days after he submitted his early retirement letter, Villa took his life the exact way he said in his third suicide note.
Meantime, Salazar said he is "baffled by the insinuations," but will "refrain from ascribing any motive to the allegations" while Villa's siblings are still mourning the death of their kin.
"I believe it would be fair to Director Villa’s memory and to our Office for an impartial inquiry into the allegations to be done by an objective body," Salazar said in a statement.
"We owe it to Director Villa that we go through this process. This would help bring the matter to a closure, as all those who are bereaved by his death hope for," he said.
Villa's family is seeking help to establish a foundation "where employees like Jun who felt pressured because he wanted to stand up for what is right, can go to to seek redress from harassment and legal help."
Editor's note:
A group in the Philippines is dedicated to addressing those who have suicidal tendencies.
The crisis hotlines of the Natasha Goulbourn Foundation aim to make these individuals feel that someone is ready to listen to them.
These are their hotline numbers:
Information and Crisis Intervention Center
(02) 804-HOPE (4673)
0917-558-HOPE (4673) or (632) 211-4550
0917-852-HOPE (4673) or (632) 964-6876
0917-842-HOPE (4673) or (632) 964-4084
In Touch Crisis Lines:
0917-572-HOPE or (632) 211-1305
(02) 893-7606 (24/7)
(02) 893-7603 (Mon-Fri, 9 am-5 pm)
Globe (63917) 800.1123 or (632) 506.7314
Sun (63922) 893.8944 or (632) 346.8776
|
{
"pile_set_name": "OpenWebText2"
}
|
After verdict, fallout from police beating trial
Bartender Karolina Obrycka, left, talks to the media while her attorney Terry Ekl, right, looks on during a news conference in Chicago on Tuesday, Nov. 13, 2012. Jurors awarded $850,000 in damages to Obrycka, who was beaten in February 2007 by off-duty Chicago police officer Anthony Abbate, who was admittedly drunk at the time. Surveillance video of the hulking Abbate pushing Obrycka to the ground behind the bar at Jesse's Shortstop Inn, then repeatedly punching and kicking her went viral online. (AP Photo/Paul Beaty)
Bartender Karolina Obrycka, left, talks to the media while her attorney Terry Ekl, right, looks on during a news conference in Chicago on Tuesday, Nov. 13, 2012. Jurors awarded $850,000 in damages to Obrycka, who was beaten in February 2007 by off-duty Chicago police officer Anthony Abbate, who was admittedly drunk at the time. Surveillance video of the hulking Abbate pushing Obrycka to the ground behind the bar at Jesse's Shortstop Inn, then repeatedly punching and kicking her went viral online. (AP Photo/Paul Beaty)
CHICAGO (AP) — Will the city act?
That's the question many Chicagoans will be asking Wednesday — a day after the dramatic conclusion of a civil trial that stemmed from a notorious 2007 beating of a female bartender by off-duty police officer Anthony Abbate. A video recording of the attack later went viral worldwide.
Jurors came back with a verdict Tuesday and gave voice to what has been whispered for years: That at least some Chicago police adhere to a code of silence to protect their fellow officers. And while the city all but promised an appeal of the verdict, Mayor Rahm Emanuel also suggested that anyone in the Police Department perpetuating a code of silence would face consequences.
The attorney for bartender Karolina Obrycka — whom the jury also awarded $850,000 in damages — described the verdict as a landmark, precedent-setting decision that proved the code of silence existed "at every level of the Chicago Police Department."
Now, Terry Ekl said, the onus is on Emanuel to end the culture of protection and silence.
"The question now becomes, what are they going to do about it?" he said. "If there's going to be change, it has to come from the mayor's office."
After the verdict, Emanuel's spokeswoman, Sarah Hamilton said in a statement that the mayor is confident that the police superintendent he selected, Garry McCarthy, and his leadership team, "would not approve of, let alone participate in a code of silence." But, she added, "to the extent there are members of the department who have a different view, the mayor is confident that McCarthy and his team will deal with that."
The city's law department, at the same time, issued a statement that the city strongly disagreed with the verdict and all but promised an appeal.
The jury's decision Tuesday is another blow to a department that for decades has struggled to overcome a reputation for brutality and a willingness to cover up the mistakes and even outright lawlessness of its officers.
This civil trial at a federal court in Chicago was unusual. It was the first of its kind to focus almost wholly on the question of whether there an ingrained code of silence — with most of the 2½ weeks of testimony devoted to that question.
In the end, jurors not only found that other officers and Abbate's superiors tried to cover up the attack at Jesse's Short Stop Inn, but they concluded that Abbate's knowledge of his fellow officers' willingness to cover him created an environment that led to the attack on Obrycka.
The surveillance video — which showed the drunk, hulking Abbate pushing Obrycka to the ground behind the bar, then repeatedly punching and kicking her — became a major embarrassment for Chicago police. Amid accusations that police dithered in the weeks after the beating, then-Superintendent Phil Cline retired and the department vowed to clean up its image.
For the beating, Abbate was convicted of aggravated battery in 2009, and sentenced to probation.
At the civil trial, Obrycka asked jurors to hold Abbate and the city liable for damages to compensate her for any pain or distress she suffered. And the core issue they had to decide was not whether Abbate beat her, but whether the police culture emboldened him and led him to act with impunity in attacking her.
During the civil trial, Obrycka's attorneys alleged that police sought to downplay and cover up the beating, in part out of an ingrained but shadowy culture among police of protecting their own.
City attorneys countered by telling jurors there was no evidence that such a secret code existed. The fact that Abbate was eventually charged and then convicted for the beating in 2009, they said, proved that the system worked.
But some police officials who testified contradicted each other, which Obrycka's attorney said proved their point about alleged cover-ups.
Debra Kirby, who headed the department's internal affairs division at the time, testified that she recommended during a phone call three days after the beating to a Cook County prosecutors that Abbate be charged with a serious felony.
But Joseph Stehlik, who was an internal affairs detective under Kirby's command, said he was next to his boss at the time of the call. Stehlik testified Kirby recommended the lesser charge.
Then the prosecutor in question, Tom Bilyk, told jurors the call never happened and that he never talked with Kirby about charges.
Abbate was on the witness stand himself for two days and asked by Obrycka's attorney about phone records showing he made dozens of calls to fellow officers in the hours after the beating. He said he was so drunk before the attack that he couldn't remember calling anyone or what he might have said, though he insisted he "didn't tell anyone to do anything regarding the incident."
Abbate's attorney on Tuesday said he wasn't surprised by the verdict, saying the video was too hard to overcome even though, he said, it provides no evidence of a code of silence.
"No matter what occurred, that video in terms of my client is the most damning thing," said Michael Malatesta.
|
{
"pile_set_name": "Pile-CC"
}
|
---
author:
- Atsuhisa Ota
- and Masahide Yamaguchi
bibliography:
- 'bib.bib'
title: Secondary isocurvature perturbations from acoustic reheating
---
Introduction
============
The conserved quantities on superhorizon scales play an important role in inflationary Universe because they connect the primordial perturbations generated during inflation with those at the late Universe. Even though most of characteristic signals of the early universe are washed away due to the thermalization processes, they keep the statistics of the primordial density fluctuations, which enables us to reveal the details of inflationary models. We usually evaluate such quantities when they exit horizons during inflation and consider them as initial conditions of the hot Big Bang universe. The curvature perturbation on the uniform density slice $\zeta$ is one of typical examples of such conserved quantities [@Malik:2003mv; @Lyth:2003im; @Lyth:2004gb]. Suppose the total energy momentum tensor is conserved and we drop the gradient terms, it is well-known that $\zeta$ is conserved even at nonlinear order when there are no non adiabatic pressure perturbations. We can also define the curvature perturbations $\zeta_{\alpha}$ on $\alpha$-fluid uniform density slice, where $\alpha=\nu,~b,~c$ represents neutrino, baryon, or cold dark matter (CDM) while $\gamma$ the photon fluid. Then, the isocurvature perturbations are introduced as $S_{\alpha \gamma}\equiv 3(\zeta_{\alpha}-\zeta_{\gamma})$. It should be noticed that $S_{\alpha \gamma}$ are also conserved at the leading order of the gradient expansion if the energy momentum tensors of $\alpha$- and $\gamma$-fluids are conserved, respectively. The conservation law of the total energy momentum tensor is universal so that the conservation laws of the curvature perturbations have been also considered to be robust as long as the other conditions are satisfied.
In this paper, we revisit the above two assumptions for the conservation laws of $\zeta_{\alpha}$: ignoring the gradient terms and the conservation laws of the energy momentum tensors. First, we point out that, at nonlinear order, we cannot justify to drop the gradient terms even when we consider the long wavelength modes; convolutions in Fourier space can pick up products of short wavelength modes, which might be significant. As a result, the total curvature perturbations might not be conserved at nonlinear order even without non-adiabatic pressure perturbations. We then newly introduce a second order conserved quantity in the presence of gradient terms. Second, we discuss energy transfer among components, that still conserves the total energy momentum but violates each one. This would lead to the evolution of superhorizon isocurvature perturbations. The typical example of the above process is acoustic reheating of the photon-baryon plasma [@Jeong:2014gna; @Nakama:2014vla; @Naruko:2015pva]. The short wavelength temperature fluctuations of the cosmic microwave background (CMB) are significantly damping due to imperfectness of the photon-baryon fluid, which produces the second order entropy production and the second order energy transfer between the photons and the baryons. These processes actually happen inside each diffusion scale; the secondary effects fluctuate on scales larger than those of corse graining. The distant patches are not necessarily reheated homogeneously if there exist three or four-point correlations of primordial density perturbations a priori [@Naruko:2015pva]. They are comparable to the non gradient terms at second order because the convolutions pick heat conduction and shear viscosity on small scales up. We investigate these diffusion effects in detail by employing the nonlinear cosmological perturbation theory, which enables us to follow the evolution of the photon distribution function directly.
We organize this paper as follows. First of all, we explain our set up for the second order perturbation theory in section \[nonlinearpert\]. Then, we discuss the non conservation of the curvature perturbations in the presence of gradient terms and introduce a new conserved quantity in section \[EMTevol\]. Section \[evophoton\] is devoted to describe the actual time evolution of the photon baryon plasma due to the weak Compton scattering. We comment on several definitions for the isocurvature perturbations during non-equilibrium periods in section \[sec:entropy\]. In the final section, we summarize our conclusions and describe future prospects related to the present results.
Set up for second order perturbation theory {#nonlinearpert}
===========================================
We need to perturb both the gravity and the matter sectors up to nonlinear order. Here, let us first define the nonlinear metric perturbations.
The metric perturbations {#section:metric}
------------------------
We start with writing the spacetime metric in the following 3+1 form: $$\begin{aligned}
ds^2&=-\mathcal N^2 d\eta^2 + \gamma_{ij}(\beta^i d\eta + dx^i)(\beta^j d\eta + dx^j)\notag \\
&=(-\mathcal N^2+\beta_k\beta^k) d\eta^2 +2\beta_i dx^i d\eta+ \gamma_{ij} dx^i dx^j.\label{def:metric}\end{aligned}$$ In other words, each component can be written as $$\begin{aligned}
g_{\mu\nu}&=\left(\begin{array}{cc}-\mathcal N^2+\beta_k\beta^k & \beta_j \\\beta_i & \gamma_{ij}\end{array}\right),\label{def:comp}\end{aligned}$$ where $\mathcal N$ and $\beta_i$ are the lapse and the shift, respectively. $\gamma_{ij}$ is the spatial metric. Let us consider nonlinear scalar perturbations introduced as $$\begin{aligned}
\mathcal N^2&=a^2 e^{2{A}},\\
\beta_i&=a^2e^{{D}}\partial_i e^{B},\label{def:shift}\\
\gamma_{ij}&=a^2e^{2{D}}\delta_{ij}\label{def:gamma},\end{aligned}$$ where $a$ is the scale factor, and we have fixed only the spacial coordinate by vanishing the anisotropic part of $\gamma_{ij}$. The nonlinear metric perturbations can be expanded as $X \equiv \sum_{n=1}
X^{(n)}$ for $X=A,B$ and $D$ with $n$ being the order in primordial perturbations. Note that the conformal Newtonian, the uniform density, the spatially flat and the velocity orthogonal isotropic gauges (comoving gauge) are mutually transformed by changing only the time slice. Here, we ignore the vector and the tensor perturbations for simplicity. This would be justified if the primordial vector perturbations and the primordial tensor ones are subdominant compared to the second order scalar ones. We include the curvature perturbation $D$ in Eq. (\[def:shift\]) to simplify the inverse matrix in the following discussions. The inverse matrixes for the induced metric and the shift vector are written as $$\begin{aligned}
\gamma^{ij}&=a^{-2}e^{-2{D}}\delta_{ij},\\
\beta^i&=e^{-{D}}\partial_ie^{B}.\end{aligned}$$ Then, we obtain $$\begin{aligned}
\beta^k\beta_k&=a^2\partial e^{{B}}\partial e^{{B}},\\
-\mathcal N^2+\beta_k\beta^k&=-a^2e^{2{A}}+a^2\partial e^{{B}}\partial e^{{B}},\label{def:lapse}\end{aligned}$$ where we write as $\partial X\partial Y\equiv \partial_i X\partial_i Y$ for notational simplicity. Eqs. (\[def:shift\]), (\[def:gamma\]) and (\[def:lapse\]) yield $$\begin{aligned}
g_{00}&=-a^2e^{2{A}}+a^2e^{2{B}}(\partial {{B}})^2,\\
g_{0i}&=a^2e^{{D}+{B}}\partial_i {B},\\
g_{ij}&=a^2e^{2{D}}\delta_{ij}.\end{aligned}$$ The inverse matrix of Eq. (\[def:comp\]) is well known: $$\begin{aligned}
g^{\mu\nu}&=\left(\begin{array}{cc}-\frac{1}{\mathcal N^2} & \frac{\beta^j}{\mathcal N^2} \\\frac{\beta^i}{\mathcal N^2} & \gamma^{ij}-\frac{\beta^i\beta^j}{\mathcal N^2}\end{array}\right).\end{aligned}$$ Then, each component of the inverse matrix can be obtained as
$$\begin{aligned}
g^{00}&=-a^{-2}e^{-2{A}},\\
g^{0i}&=a^{-2}e^{-2{A}-{D}+{B}}\partial_i{B},\\
g^{ij}&=a^{-2}e^{-2{D}}\delta^{ij}-a^{-2}e^{-2{A}-2{D}+2{B}}\partial_i{{B}}\partial_j{{B}}.\end{aligned}$$
The determinant of $g_{\mu\nu}$ can be also evaluated as $$\begin{aligned}
\sqrt{-g}=\mathcal N\sqrt{\gamma}=a^4 e^{{A}+3{D}}.\label{def:det}\end{aligned}$$
The Christoffel symbols at second order
---------------------------------------
Here and hereafter we consider only the perturbations up to second order. Up to second order, each component of the metric tensor can be rewritten as
$$\begin{aligned}
g_{00}&=-a^2e^{2{A}}+a^2(\partial {{B}})^2,\\
g_{0i}&=a^2e^{{D}+{B}}\partial_i {B},\\
g_{ij}&=a^2e^{2{D}}\delta_{ij},\end{aligned}$$
and the inverse matrix components are $$\begin{aligned}
g^{00}&=-a^{-2}e^{-2{A}},\\
g^{0i}&=a^{-2}e^{-2{A}-{D}+{B}}\partial_i{B},\\
g^{ij}&=a^{-2}e^{-2{D}}\delta^{ij}-a^{-2}\partial_i{{B}}\partial_j{{B}}.\end{aligned}$$ Let us evaluate the Christoffel symbol $$\begin{aligned}
\Gamma^\mu{}_{\nu\rho}\equiv \frac12g^{\mu\alpha}\left(\partial_\rho g_{\alpha\nu}+\partial_\nu g_{\alpha\rho}-\partial_\alpha g_{\nu\rho} \right).\end{aligned}$$ Each component of the symbols can be calculated as $$\begin{aligned}
\Gamma^0{}_{00}=&\mathcal H+{A}'+\mathcal H (\partial {B})^2+ \partial A\partial B,\\
\Gamma^0{}_{0i}=&\partial_i{A}+e^{-2{A}+{D}+B}(\mathcal H +{D}' )\partial_i {B}-\frac12\partial_i(\partial{B})^2,\\
\Gamma^0{}_{ij}=&
\frac12 \left[\partial_i {B}\partial_j{D}
+ \partial_j {B}\partial_i{D}\right]
-e^{-2{A}+{D}+{B}}\partial_i\partial_j{B}
\notag \\
&-\partial_i{B}\partial_j{B}
+e^{-2{A}+2{D}}\delta_{ij}\left[
\mathcal H+{D}'-\partial B\partial D\right],\\
\Gamma^{i}{}_{00}=&
e^{-{D}+{B}}(\mathcal H\partial_iB + \partial_iB')
+(-A'+D'+B')\partial_i B\notag\\
&+e^{-2{D}+2{A}}\partial_i{A}-\frac12\partial_i (\partial{B})^2,\\
\Gamma^i{}_{0j}=&(\mathcal H+{D}')\delta_{ij}-\partial_i {B}\partial_j {A}-\mathcal H\partial_i {B}\partial_j {B}\notag \\
& -\frac12(\partial_i{D}\partial_j {B}-\partial_j{D}\partial_i {B}) ,\\
\Gamma^i{}_{jk}=&-\partial_i{D}\delta_{jk}+\partial_k{D}\delta_{ij}+\partial_j{D}\delta_{ik}+(\partial_i{B})\partial_j\partial_k{B}\notag \\
&
-e^{-2{A}+{D}+{B}}(\mathcal H+{D}')\delta_{jk}\partial_i{B}.\end{aligned}$$
Conserved quantity at second order {#EMTevol}
==================================
In this section we show the conservation laws of the curvature perturbations and discuss the gradient corrections by full consideration of second order perturbation theory.
Divergence of the energy momentum tensor
----------------------------------------
Let $T^{(\alpha)\mu\nu}$ be energy momentum tensors of $\alpha$-fluid. Assuming the conservation of the energy momentum tensor for each fluid component $$\begin{aligned}
\nabla_\mu T^{(\alpha)\mu\nu}=0,\label{cons:colless}\end{aligned}$$ the curvature perturbations on $\alpha$-fluid uniform density slice $$\begin{aligned}
\zeta_\alpha\equiv D+\frac13\int^{\rho(\eta,\mathbf x)}_{\rho_{\rm rf}(\eta)} \frac{d \rho_\alpha}{\rho_\alpha+P_\alpha},\label{defzetatotal}\end{aligned}$$ are conserved as long as non-adiabatic pressure perturbations and the gradient terms are negligible [@Lyth:2004gb]. Let us first take a closer look at the above theorem. In this section, we do not specify a fluid component explicitly and drop the symbols from expressions. The time component of the covariant divergence can be given as $$\begin{aligned}
\nabla_\mu T^\mu{}_0=&\partial_\mu T^\mu{}_0 +T^\mu{}_0 \partial_\mu \ln\sqrt{-g}-\Gamma^\alpha{}_{\mu 0}T^\mu{}_\alpha.\label{tenkaicovemt}\end{aligned}$$ Note that only a spatial gradient term in $$\begin{aligned}
\partial_\mu T^\mu{}_0=\partial_0 T^0{}_0 + \partial_i T^i{}_0,\label{partderivs}\end{aligned}$$ is negligible on superhorizon scales. The other gradient terms arising in products of the linear perturbations cannot be dropped without their concrete evaluations since they may have significant contributions on small scales through convolutions in Fourier space. On the other hand, from Eq. (\[def:det\]), the second term in Eq. (\[tenkaicovemt\]) can be easily evaluated as $$\begin{aligned}
T^\mu{}_0 \partial_\mu \ln\sqrt{-g}=(4\mathcal H+{A}'+3{D}')T^0{}_0+T^i{}_0\partial_i({A}+3{D}).\label{volumefac}\end{aligned}$$ The term with the Christoffel symbol in Eq. (\[tenkaicovemt\]) is decomposed into 4 parts: $$\begin{aligned}
\Gamma^\alpha{}_{\mu 0}T^\mu{}_\alpha&=\Gamma^0{}_{0 0}T^0{}_0+\Gamma^0{}_{i 0}T^i{}_0+\Gamma^i{}_{0 0}T^0{}_i+\Gamma^i{}_{j 0}T^j{}_i.\end{aligned}$$ Each part can be easily calculated as $$\begin{aligned}
\Gamma^0{}_{0 0}T^0{}_0=&(\mathcal H+{A}')T^0{}_0+\mathcal H(\partial{B})^2T^0{}_0+(\partial A\partial B) T^0{}_0, \\
\Gamma^0{}_{i 0}T^i{}_0=&\mathcal H \partial_i{B} T^i{}_{0}+\partial_i{A} T^i{}_{0}, \\
\Gamma^i{}_{0 0}T^0{}_i=&
\mathcal H\partial_i BT^0{}_i+ \partial_i B'T^0{}_i + \partial_iAT^0{}_i\\
\Gamma^i{}_{j 0}T^j{}_i=&
3P(\mathcal H +{D}') -P(\partial{B}\partial{A})-P\mathcal H(\partial {B})^2,\label{Gamma0ijsubs}\end{aligned}$$ where we have decomposed $T^i{}_j$ into the trace part (that is, the pressure part) and the traceless part (the anisotropic pressure part), $$\begin{aligned}
T^i{}_j = P \delta^i{}_j + \widetilde{T}^i{}_j\end{aligned}$$ with $\widetilde{T}^i{}_i = 0$. Note that the anisotropic pressure is at least first order quantity, which would be included in the cubic order terms above; therefore, only the isotropic pressure arises in Eq. (\[Gamma0ijsubs\]). At linear order, the following relation is useful: $$\begin{aligned}
T^i{}_0+T^0{}_i=-\partial_iB(T^0{}_0 - P).\label{christoffelpart}\end{aligned}$$ Then, using Eqs. (\[partderivs\]), (\[volumefac\]) and (\[christoffelpart\]), we finally obtain
$$\begin{aligned}
\nabla_\mu T^\mu{}_0=&\partial_\mu T^\mu{}_0+3(\mathcal H+{D}')(T^0{}_0-P)-(T^0{}_0-P)\partial{B}\partial({A}+3D)-T^0{}_i\partial_i(A+3D+B').
\label{emtdiv0com}\end{aligned}$$
In most of the previous literatures where perfect fluid approximations are assumed, the gradient terms are automatically dropped. On the other hand, in our case, only the second term in Eq. (\[partderivs\]) is negligible, and products of the linear perturbations cannot be necessarily dropped. Let us introduce the energy density $\rho$ and the momentum transfer $q$ as $$\begin{aligned}
\rho&\equiv -T^0{}_0,\\
\partial_i q&\equiv \frac{ T^0{}_i}{\rho+P}.\end{aligned}$$ Then, (\[emtdiv0com\]) can be recast into $$\begin{aligned}
-\frac{1}{3(\rho+P)}\nabla_\mu T^\mu{}_0&=\mathcal H + D'+\frac{\rho'}{3(\rho+P)}-\frac13\partial{B}\partial({A}+3D)
+\frac13\partial q\partial(A+3D+B').
\label{emtdiv0com3}\end{aligned}$$
Note that we have not taken the specific time slice other than the spacial coordinate; therefore Eq. (\[emtdiv0com\]) is useful for conformal Newtonian ($B=0$), uniform density ($\delta \rho=0$), spatially flat ($D=0$) or velocity orthogonal isotropic gauges ($q=0$), respectively.\
Gradient corrections
--------------------
We are now ready to discuss the superhorizon conserved quantities in the presence of gradient terms. From Eqs. (\[cons:colless\]), (\[defzetatotal\]), and (\[emtdiv0com3\]), we immediately obtain
$$\begin{aligned}
\zeta_\alpha'=&\frac13\partial{B}\partial({A}+3D)
-\frac13\partial q_\alpha \partial(A+3D+B').
\label{non:cons:zeta}\end{aligned}$$
Eq. (\[non:cons:zeta\]) apparently shows that $\zeta_{\alpha}$ is not conserved in the presence of second order gradient terms. Note that we cannot simply ignore the RHS even for long wavelength modes as we already mentioned.\
As explained in section \[section:metric\], the spacial coordinate is already fixed; the residual linear gauge freedom is given by a shift of the time coordinate $$\begin{aligned}
\eta &\to \eta+\alpha.\label{alphadefgauge}\end{aligned}$$ Here, it should be noticed that the source term is composed of the products of linear perturbations; therefore, we only consider the linear gauge transformation here. In response to the above transformation, the metric perturbations obey the following transformation laws [@Ma:1995ey]: $$\begin{aligned}
A&= \tilde A-\alpha'-\mathcal H\alpha,\\
B&= \tilde B+ \alpha,\\
D&= \tilde D-\mathcal H\alpha.\end{aligned}$$ On the other hand, the energy density, the pressure and the momentum transfer transform as $$\begin{aligned}
\delta \rho &= \delta\tilde \rho -\alpha\rho^{(0)}{}',\\
\delta P &= \delta\tilde P -\alpha P^{(0)}{}',\\
q &= \tilde q + \alpha.\label{gt:q}\end{aligned}$$ Then, we find $$\begin{aligned}
A+3D+B'&=\tilde A+3\tilde D+\tilde B'-4\mathcal H \alpha.\label{gauge:a3dbp}\end{aligned}$$ Eqs. (\[non:cons:zeta\]) and (\[gauge:a3dbp\]) motivate us to move on to the gauge which satisfies the following relation: $$\begin{aligned}
A+3D+B'=0.\label{mygauge}\end{aligned}$$ This condition is useful since the fluid components and metric perturbations decouple in the covariant derivative of the energy momentum tensor, and gauge fixing is complete from Eq. (\[gauge:a3dbp\]). In this gauge, we find following quantities are conserved: $$\begin{aligned}
\xi_{\alpha} \equiv D + \frac16\partial{B}\partial B+\frac13\int^{\rho(\eta,\mathbf x)}_{\rho_{\rm rf}(\eta)} \frac{d \rho_\alpha}{\rho_\alpha+P_\alpha}.\label{cons:grad:second}\end{aligned}$$ Note that $\xi_{\alpha}\to \zeta_{\alpha}$ if we ignore the gradient term. We define the isocurvature perturbations in terms of $\xi_{\alpha}$ in the similar way: $$\begin{aligned}
S_{\alpha \gamma}=3(\xi_{\alpha}-\xi_{\gamma}),\label{def:iso:xi}\end{aligned}$$ which are also conserved if the energy momentum tensors are conserved and non-adiabatic pressure perturbations are absent. Thus the curvature perturbations on the uniform density slice are no more conserved in the presence of gradient terms. Instead, we introduced another conserved quantity $\xi$ at second order. $\xi$ is no more the curvature perturbation on the uniform density slice since we moved to another specific time slicing. In the next section, we consider the time evolution of $\xi$ in the presence of a collision process.
Energy transfer and time evolution of the isocurvature perturbations {#evophoton}
====================================================================
The local Minkowski frame for collision processes
-------------------------------------------------
Here, we discuss the collision processes for the weak Compton scattering, which are described by the quantum electrodynamics (QED) in the local Minkowski coordinate. To relate the local frame with the global one defined in Eq. (\[def:metric\]), let us consider the following coordinate transformations [@Pitrou:2007jy; @Naruko:2013aaa]:
$$\begin{aligned}
g_{\mu\nu}=\eta_{\bar\alpha\bar\beta}e^{\bar\alpha}{}_\mu e^{\bar\beta}{}_\nu,\end{aligned}$$
where each vierbein is defined as $$\begin{aligned}
e^{\bar 0}{}_0&=ae^A,\\
e^{\bar 0}{}_i&=0,\\
e^{\bar a}{}_0&=ae^B\partial_{\bar a}B,\\
e^{\bar a}{}_i&=ae^{D}\delta_{\bar ai}.\end{aligned}$$ For the inverse matrix, the coordinate transformation becomes $$\begin{aligned}
g^{\mu\nu}=e^\mu{}_{\bar\alpha} e^\nu{}_{\bar\beta}\eta^{\bar\alpha\bar\beta},\end{aligned}$$ where we have introduced $$\begin{aligned}
e^{0}{}_{\bar 0}&=a^{-1}e^{-A},\\
e^{0}{}_{\bar a}&=0,\\
e^{i}{}_{\bar 0}&=-a^{-1}e^{-A-D+B}\partial_{i}B,\\
e^{i}{}_{\bar a}&=a^{-1}e^{-D}\delta_{i\bar a}.\end{aligned}$$
Next, let us consider the physical momentum $\tilde p_{\bar\alpha}$ of a particle in the local Minkowski frame. The momentum satisfies $$\begin{aligned}
\tilde p_{\bar\alpha}\tilde p^{\bar\alpha}=\eta^{\bar\alpha\bar\beta}\tilde p_{\bar\alpha}\tilde p_{\bar\beta}=\eta_{\bar\alpha\bar\beta}\tilde p^{\bar\alpha}\tilde p^{\bar\beta}=-m^2,\end{aligned}$$ where $m$ is the mass of the particle. The evolution of the photon momentum in the expanding universe is written as $$\begin{aligned}
\tilde p^{\bar\alpha}\propto \frac{1}{a}.\end{aligned}$$ Then, it would be more convenient to introduce the comoving momentum so as to subtract the background spacetime evolution. For this purpose, we define the comoving momentum of the conformal flat coordinate as $$\begin{aligned}
p^{\bar\alpha}\equiv a \tilde p^{\bar\alpha}.\end{aligned}$$ The energy and the spacial direction of the photon are also introduced as $$\begin{aligned}
p&\equiv p^{\bar 0},\label{pdef}\\
n^{\bar a}&\equiv \frac{p^{\bar a}}{p}.\end{aligned}$$ Then we can write the conjugate momentum, $P^\mu=e^\mu{}_{\bar\alpha}\tilde p^{\bar\alpha}$, associated with the spacial coordinate by using $p$ and $n^i$ as $$\begin{aligned}
P^0&=\frac{\tilde p^{\bar 0}}{ae^A}=\frac{p}{a^2e^A},\label{P0def}\\
P^i&=\frac{p}{a^2e^D}(n^i-e^{B-A}\partial_i B),\\
P_0&=-pe^{A}(1- e^{B-A} n\partial {B}).\end{aligned}$$ 0 Now let us consider the time derivative of $p$ that will arise in the Boltzmann equation. First, we straightforwardly write the time derivative of Eq. (\[P0def\]): $$\begin{aligned}
\frac{d}{d\eta}\ln P^0=\frac{d\ln p}{d\eta} -\frac{dA}{d\eta}-2\mathcal H.\label{logP0prime}\end{aligned}$$ Combining Eq. (\[logP0prime\]) with the zeroth component of the geodesic equation $$\begin{aligned}
\frac{1}{P^0}\frac{dP^0}{d\eta}=-\Gamma^0{}_{\alpha\beta}\frac{P^\alpha P^\beta}{{(P^0)}^2},\end{aligned}$$ we obtain $$\begin{aligned}
\frac{d\ln p}{d\eta}=&-\frac{\partial D}{\partial \eta}-e^{A-D}(n\partial)A+e^{B-D}(n\partial)^2B\notag \\
&+\partial A\partial B+\partial B\partial D-(n\partial B)(n\partial D)+(n\partial B)^2.\label{logpbibun}\end{aligned}$$
Time evolution of the photon energy momentum tensor
---------------------------------------------------
In order to elucidate a concrete collision process, we start with constructing the photon energy momentum tensor from the phase space distribution function $f_{\gamma}$: $$\begin{aligned}
T^{(\gamma)\mu\nu} &\equiv 2\int \frac{d^4P}{\sqrt{-g}(2\pi)^4}2\pi\delta(P_\alpha P^\alpha)\theta(P^0)2P^\mu P^{\nu} f_\gamma, \label{def:EMT}\end{aligned}$$ where $\theta$ is a step function, $P$’s in this expression are conjugate momenta $P_\mu$, and $\alpha$ implies a fluid component. Then the covariant derivative of Eq. (\[def:EMT\]) is given by $$\begin{aligned}
\nabla_\mu T^{(\gamma)\mu}{}_{\nu}=2 \int \frac{d^3 P}{\sqrt{-g}(2\pi)^3P^0} P_{\nu} \frac{df_\gamma}{d\lambda},\label{div:emt:f}\end{aligned}$$ where $\lambda$ is an affine parameter and $P^0=d\eta/d\lambda$. Under the non canonical coordinate transformation $P_i \to p^{\bar a}$ $$\begin{aligned}
P_i=g_{ij} e^{j}{}_{\bar a}\frac{p^{\bar a}}{\bar a},\end{aligned}$$ the Jacobian is transformed as $$\begin{aligned}
|g_{ij} e^{j}{}_{\bar a}a^{-1}|=e^{3D}.\end{aligned}$$ Then, the three dimensional volume element in momentum space can be expressed as $$\begin{aligned}
d^3P\equiv
dP_1dP_2dP_3 = e^{3D}p^2 dp d\mathbf n,\end{aligned}$$ in terms of the momentum in the local conformal Minkowski frame. Using the above expression, Eq. (\[div:emt:f\]) yields
$$\begin{aligned}
\nabla_\mu T^{(\gamma)\mu}{}_{0}=-\frac{2}{a^{4}} \int \frac{p^{2} dp d\mathbf n}{(2\pi)^3} p(1 - n\partial {B}+\cdots ) \frac{df_\gamma}{d\eta},\label{div:emt:f:loc}\end{aligned}$$
where dots imply second order corrections. The integrand of Eq. (\[div:emt:f:loc\]) is directly related to the collision process through the Boltzmann equation:
$$\begin{aligned}
\frac{df_\gamma}{d\eta}=\mathcal C[f_{\gamma},\cdots],\end{aligned}$$
where the dots imply the distribution functions of the fluids which interact with the photons. When we consider the weak Compton scattering up to second order, a solution to the above Boltzmann equation can written as the superposition of a local blackbody and the spectral $y$ distortion. In this case, the collision term can be decomposed into the following form [@Ota:2016esq] $$\begin{aligned}
\mathcal C[f]=\mathcal A \mathcal G(p) +\mathcal B\mathcal Y(p),\label{col:exp}\end{aligned}$$ where we have also introduced $$\begin{aligned}
\mathcal G(p)&\equiv \left(-p\frac{\partial }{\partial p}\right)f^{(0)}(p),\\
\mathcal Y(p)&\equiv \left(-p\frac{\partial }{\partial p}\right)^{2}f^{(0)}(p)- 3\mathcal G(p),\end{aligned}$$ with $f^{(0)}(p) \equiv (e^{p/T_{\rm rf}}-1)^{-1}.$ $p$ is the local frame comoving momentum defined in Eq. (\[pdef\]), and $T_{\rm rf}$ is a (constant) comoving temperature of reference blackbody whose number density and energy density are defined as $$\begin{aligned}
N_{\gamma \rm rf}&=2\int\frac{p^{2}dp}{2\pi^{2}}f^{(0)},\\
\rho_{\gamma \rm rf}&=2\int\frac{p^{2}dp}{2\pi^{2}}pf^{(0)}.\end{aligned}$$
We can show that the isotropic component of $\mathcal A$ is zero from the fact that the weak Compton scattering does not change the number of photons. Here we introduce the following number density flux $$\begin{aligned}
N^\mu_\gamma\equiv 2\int \frac{d^4P}{\sqrt{-g}(2\pi)^4}2\pi\delta(P_\alpha P^\alpha)\theta(P^0)2P^\mu f_\gamma. \label{def:Nflux}\end{aligned}$$ The covariant derivative of the number flux can be calculated as $$\begin{aligned}
\nabla_\mu N_\gamma^\mu=2\int \frac{d^3P}{\sqrt{-g}(2\pi)^3P^0}\frac{d f_\gamma}{d\lambda}.\label{tochu:covN}\end{aligned}$$ Then, substituting Eqs. (\[col:exp\]) into (\[tochu:covN\]), we obtain $$\begin{aligned}
\nabla_\mu N_\gamma^\mu=3N_{\gamma \rm rf}\frac{1}{e^{A}a^4}\int \frac{d\mathbf n}{4\pi}\mathcal A=0,\end{aligned}$$ where we have used $$\begin{aligned}
2\int\frac{p^{2}dp }{2\pi^{2}}\mathcal G &= 3N_{\gamma \rm rf}, \\
2\int\frac{p^{2}dp }{2\pi^{2}}\mathcal Y &= 0.\end{aligned}$$ On the other hand, the dipole component of $\mathcal A$ is not zero. In our notation, the dipole component of $\mathcal A$ and the monopole component of $\mathcal B$ are written as [@Pitrou:2009bc; @Naruko:2013aaa; @Chluba:2012gq; @Ota:2016esq] $$\begin{aligned}
\int \frac{d\mathbf n}{4\pi}\mathbf n\mathcal A &=\frac 13n_{\rm e} \sigma_{\rm T}a\hat \partial (v+3i\Theta_{1})+\cdots \label{dip:A} \\
\int \frac{d \mathbf n}{4\pi}\mathcal B&=\frac13n_{\rm e} \sigma_{\rm T}a\hat \partial v\hat\partial (v+3i\Theta_{1})\label{Monopo:B},\end{aligned}$$ where the dots represent the second order corrections, and $\hat \partial$ corresponds to $i\mathbf k/|\mathbf k|$ in Fourier space [^1]. $v=|\mathbf v|$ is the magnitude of the velocity of the baryon fluid, and $\Theta_{1}$ is the dipole component of the photon temperature perturbations. $n_{\rm e}$ is the electron density, $\sigma_{\rm T}$ is the Thomson scattering cross section, and $a$ is a scale factor. Using Eqs. (\[div:emt:f:loc\]), (\[col:exp\]), (\[dip:A\]) and (\[Monopo:B\]), we find $$\begin{aligned}
\nabla_\mu T^{(\gamma )\mu}{}_{0}=-
\frac{4}{3a^{4}}\rho_{\gamma,{\rm rf}}n_{\rm e} \sigma_{\rm T}a(\hat\partial v-\partial B)\hat\partial (v+3i\Theta_{1}),\label{res:cons:emt}\end{aligned}$$ where we have used $$\begin{aligned}
2\int\frac{p^{2}dp p}{2\pi^{2}}\mathcal G&=4\rho_{\gamma \rm rf},\\
2\int\frac{p^{2}dp p}{2\pi^{2}}\mathcal Y&=4\rho_{\gamma \rm rf}.\end{aligned}$$
We are now ready to discuss the superhorizon evolution of the isocurvature perturbations in the presence of heat conduction between electrons and photons. From Eqs. (\[emtdiv0com3\]), (\[cons:grad:second\]), and (\[res:cons:emt\]), we find $$\begin{aligned}
\xi_\gamma'=& \frac{1}{3} n_{\rm e} \sigma_{\rm T}a(\hat\partial v-\partial B)\hat\partial (v+3i\Theta_{1}),
\label{emtdiv0com4}\\
\xi_b'=&
-\frac{1}{3R} n_{\rm e} \sigma_{\rm T}a(\hat\partial v-\partial B)\hat\partial (v+3i\Theta_{1}),
\label{emtdiv0com5}\\
\xi_c'=&0,
\label{emtdiv0com6}\end{aligned}$$ where $R=3\rho_{b}/4\rho_{\gamma}=3a\rho_{b,{\rm rf}}/4\rho_{\gamma,{\rm rf}}$, and we used Eq. (\[emtdiv0com3\]) for the baryon fluid with $$\begin{aligned}
\nabla_\mu T^{(\gamma )\mu}{}_{0}+ \nabla_\mu T^{(b)\mu}{}_{0}=0.\end{aligned}$$ Then time derivatives of the isocurvature perturbations defined with Eq. (\[def:iso:xi\]) become $$\begin{aligned}
S_{b\gamma }'&=-\frac{(1+R)}{R} n_{\rm e} \sigma_{\rm T}a(\hat\partial v-\partial B)\hat\partial (v+3i\Theta_{1}),\label{Sgabbabprime}\\
S_{c\gamma }'&=- n_{\rm e} \sigma_{\rm T}a(\hat\partial v-\partial B)\hat\partial (v+3i\Theta_{1}).\label{Sgabbabprimec}\end{aligned}$$ These expressions imply that the heat conduction from electron fluid is responsible for the change of the total photon energy while the friction heat from the intrinsic photon shear viscosity $\Theta_2$ is not. This is because the friction heat from the photon anisotropic stress does not increase the net energy in a photon system as long as we deal with background and perturbations as a whole system. Some confusion may occur if one separates the background and perturbations as done in the previous literatures, in which energy transfers from perturbations to the background are discussed. In response to Eq. (\[res:cons:emt\]), the energy momentum conservation for baryons should be also broken while those of the total fluids and the other dark sectors remain conserved. Note that these expressions are independent of the gauge choice (\[mygauge\]) since Eq. (\[gt:q\]) for the baryons and the photons are written as $$\begin{aligned}
v&\to \tilde v=v+k\alpha,\\
\Theta_{1}&\to \tilde \Theta_{1}=\Theta_{1}+\frac{ik}{3}\alpha.\end{aligned}$$\
Role of the primordial non Gaussianity
--------------------------------------
Eqs. (\[Sgabbabprime\]) and (\[Sgabbabprimec\]) imply that the observed isocurvature perturbations are superposition of the primordial isocurvature and the secondary isocurvature. Suppose we only have the adiabatic perturbations at the beginning, the Fourier space isocurvature perturbations are simply given as $$\begin{aligned}
S_{\alpha \gamma,\mathbf k} &= \int \frac{d^{3}k_{1}d^{3}{k_{2}}}{(2\pi)^{6}}(2\pi)^{3}\delta^{(3)}(\mathbf k_{1}+\mathbf k_{2}-\mathbf k) \mathcal S_{\alpha}(\mathbf k_{1},\mathbf k_{2})\zeta_{\mathbf k_{1}}\zeta_{\mathbf k_{2}},\label{So:def}\end{aligned}$$ Here, the transfer functions in Fourier space are introduced as $$\begin{aligned}
\mathcal S_{\alpha }(\mathbf k_{1},\mathbf k_{2})= \hat k_{1}\cdot \hat k_{2} \int d\eta w_{\alpha} n_{\rm e}\sigma_{\rm T}a[v(k_{1})-k_{1} B(k_{1})][v(k_{2})+3i\Theta_{1}(k_{2})],\end{aligned}$$ where $w_{b}=(1+R)/R$, $w_{c}=1$. On the other hand, the statistics of the adiabatic perturbations in the Fourier spaces are written as $$\begin{aligned}
\langle \zeta_{\mathbf k_1}\zeta_{\mathbf k_2}\rangle
&=(2\pi)^3\delta^{(3)}\left[\sum_{i=1}^2 \mathbf k_i\right]P_\zeta(k_1),\label{power:zeta}\\
\langle \zeta_{\mathbf k_1}\zeta_{\mathbf k_2}\zeta_{\mathbf k_3}\rangle
&=(2\pi)^3\delta^{(3)}\left[\sum_{i=1}^3 \mathbf k_i\right]B_\zeta(\mathbf k_1,\mathbf k_2,\mathbf k_3),\label{bis:zeta}\\
\langle \zeta_{\mathbf k_1}\zeta_{\mathbf k_2}\zeta_{\mathbf k_3}\zeta_{\mathbf k_4}\rangle&=(2\pi)^3\delta^{(3)}\left[\sum_{i=1}^4 \mathbf k_i\right]T_\zeta(\mathbf k_1,\mathbf k_2,\mathbf k_3,\mathbf k_4).\label{tri:zeta}\end{aligned}$$ Then, the cross correlations with the adiabatic perturbations and the auto correlations become
$$\begin{aligned}
\langle S_{\alpha\gamma ,\mathbf k}\zeta_{\mathbf k'} \rangle &=(2\pi)^{3}\delta(\mathbf k+\mathbf k') P_{\alpha \zeta}(\mathbf k),\\
\langle S_{\alpha \gamma ,\mathbf k}S_{\beta \gamma\mathbf k'} \rangle &=(2\pi)^{3}\delta(\mathbf k+\mathbf k') P_{\alpha \beta}(\mathbf k),\end{aligned}$$
where the powerspectra are calculated as $$\begin{aligned}
P_{\alpha \zeta}&=\int \frac{d^{3}k_{1}}{(2\pi)^{3}} \mathcal S_{\alpha}(\mathbf k_{1},\mathbf k- \mathbf k_{1}) B_{\zeta}(\mathbf k_{1},\mathbf k-\mathbf k_{1},\mathbf k),\\
P_{\alpha \beta}&=\prod_{i=\alpha,\beta}\left[\int \frac{d^{3}k^{(i)}_{1}}{(2\pi)^{3}}\mathcal S_{i}(\mathbf k^{(i)}_{1},\mathbf k- \mathbf k^{(i)}_{1}) \right] T_{\zeta}(\mathbf k^{(\alpha)}_{1},\mathbf k-\mathbf k^{(\alpha)}_{1},\mathbf k^{(\beta)}_{1},\mathbf k-\mathbf k^{(\beta)}_{1}).\end{aligned}$$ The scale dependences of the secondary powerspectra depend on the shape of the primordial non Gaussianity. As an example, consider the local forms of bispectra and trispectra: $$\begin{aligned}
&B_\zeta(\mathbf k_1,\mathbf k_2,\mathbf k_3)=\frac65f^{\rm loc.}_{\rm NL}\left[P_{\zeta}(k_1)P_{\zeta}(k_2) + (\text{2 perms.}) \right],\label{def:fnl}\\
&T_\zeta(\mathbf k_1,\mathbf k_2,\mathbf k_3,\mathbf k_4)=\tau^{\rm loc.}_{\rm NL}\left[P_{\zeta}(k_1)P_{\zeta}(k_2)P_{\zeta}(|\mathbf k_1+\mathbf k_3|) + (\text{11 perms.}) \right]\label{def:tnl},\end{aligned}$$ where we have omitted terms proportional to $g^{\rm loc.}_{\rm NL}$ for simplicity. Then the dominant contributions become
$$\begin{aligned}
P_{\alpha \zeta}&\approx \frac{12}{5}f^{\rm loc.}_{\rm NL}P_{\zeta}(k)\times \int \frac{d^{3}k_{1}}{(2\pi)^{3}} \mathcal S_{\alpha}(\mathbf k_{1},-\mathbf k_{1})P_{\zeta}(k_{1}),\\
P_{\alpha \beta}&\approx 4\tau^{\rm loc.}_{\rm NL}P_{\zeta}(k) \times \prod_{i=\alpha,\beta}\left[\int \frac{d^{3}k^{(i)}_{1}}{(2\pi)^{3}}S_{i}(\mathbf k^{(i)}_{1},-\mathbf k^{(i)}_{1})P_{\zeta}(k^{(i)}_{1}) \right].\end{aligned}$$
0 In Eq. (\[So:def\]), the relative velocity $v+3i\Theta_{1}$ is strongly suppressed during tight coupling approximation, but we have a significant numerical factor coming from $n_{\rm e} \sigma_{\rm T}a$. As a result, the transfer function (\[So:def\]) becomes order of unity if there is no special cancellation. Therefore, the cross- and the auto correlation functions of the secondary isocurvature perturbations are expected to be $P_{\alpha \zeta}\approx f^{\rm loc.}_{\rm NL}\times 10^{-18}$ and $P_{\alpha \beta}\approx \tau^{\rm loc.}_{\rm NL}\times 10^{-27}$, respectively. Thus, the secondary effect on the isocurvature perturbations are negligible if we do not have significant local type primordial non Gaussianity. Thus, the powerspectra of the secondary isocurvature perturbations are the same form with the linear isocurvature powerspectrum. The disconnected part of the trispectrum leads to the following contribution for $\mathbf k\neq 0$ and $\mathbf k'\neq 0$:
$$\begin{aligned}
P^{(d)}_{\alpha \beta}&\approx \int \frac{d^{3}k_{1}}{(2\pi)^{3}} \prod_{i=\alpha,\beta}\ \mathcal S_{i}(\eta^{i},\mathbf k_{1},-\mathbf k_{1}) P_{\zeta}(k_{1})P_{\zeta}(k_{1}).\end{aligned}$$
Then we obtain $P^{(d)}_{\alpha \beta}\approx{\rm const.}$ for the disconnected trispectrum. This suggests the spectral index is 4, and the powerspectrum is mainly enhanced on scales where the physical process occurs. In other words, the Gaussian fluctuations cannot produce the superhorizon isocurvature modes.
0
Generation of Entropy perturbations {#sec:entropy}
===================================
Besides the conserved quantity (\[cons:grad:second\]), one may wonder if we could introduce the similar quantities by using the entropy flux. In this section, we introduce the secondary entropy perturbations, which are not identified with the isocurvature perturbations if we consider non equilibrium universe during recombination.
Entropy flux non conservation
-----------------------------
Suppose the universe is out of equilibrium states, the standard thermodynamic relation among the entropy density, the energy density and pressure is not applicable. Instead, we introduce the (Shannon) entropy flux, which is defined in terms of a logarithm of the number of states [@Khatri:2012rt], $$\begin{aligned}
S^\mu_\gamma&\equiv 2\int
\frac{d^4P}{\sqrt{-g}(2\pi)^4}2\pi\delta(P_\alpha
P^\alpha)\theta(P^0)2 P^\mu \mathcal F \label{def:shannon},\\
\mathcal F&\equiv \left[(f_\gamma+1)\ln(f_\gamma+1)-f_\gamma\ln f_\gamma \right].\label{def:calF}\end{aligned}$$ Note that this definition reproduces the thermodynamic entropy density for the Planck distribution. The covariant divergence of this entropy flux can be calculated as $$\begin{aligned}
\nabla_\mu S^\mu_\gamma =2\int \frac{d^3P}{\sqrt{-g}(2\pi)^3P^0}\frac{d
\mathcal F}{d\lambda}.\label{tochu:divS}\end{aligned}$$ A solution to the Boltzmann equation with the weak Compton collision process can be written as a superposition of the local blackbody and the spectral $y$ distortion up to the second order in the primordial fluctuations [@Pitrou:2009bc; @Naruko:2013aaa]. Such an ansatz can be expanded as follows: $$\begin{aligned}
f_{\gamma}=&f^{(0)}(p)+\left[\Theta +\frac32\Theta^2\right] \mathcal G(p) + \left[\frac12\Theta^2+y\right]\mathcal Y(p),\label{def:non-thermal_anz}\end{aligned}$$ where $\Theta=\Theta^{(1)}+\Theta^{(2)}$ and $y=y^{(2)}$ are the temperature perturbation and spectral $y$ distortion, respectively. Then, Eq. (\[tochu:divS\]) vanishes at zeroth and first orders of the perturbations, but there exist non-zero contributions at second order, which is manifest from the following expression, $$\begin{aligned}
\frac{1}{P^0}\frac{d \mathcal F}{d\lambda} &=
\frac{d \mathcal F}{d\eta}=\frac{p}{T_{\rm rf}}\left[ \left(1-\Theta\right)\mathcal A\mathcal G+\mathcal B\mathcal Y\right].\label{calc:F2}\end{aligned}$$ Here we have replaced the Liouville term with the collision terms by using the Boltzmann equation. Using the Boltzmann equation for the $y$ distortion [@Pitrou:2009bc; @Naruko:2013aaa; @Chluba:2012gq; @Ota:2016esq], $$\begin{aligned}
y'&=\mathcal B-\Theta\mathcal A,
\label{y:eq}\end{aligned}$$ with Eqs. (\[tochu:divS\]), and (\[calc:F2\]), we find $$\begin{aligned}
\nabla_\mu S^\mu_\gamma= \frac{4\pi^2}{15 a}\left(\frac{T_{\rm rf}}{a}\right)^3 y'_0.\label{eq:14}\end{aligned}$$ Thus, entropy increases with the generation of the spectral $y$ distortion. The physical entropy density can be defined as $S_\gamma\equiv - n_{\mu} S^{\mu}_\gamma$ with $ n_{\mu}\equiv
{\nabla_\mu \eta}(-\nabla_\nu\eta \nabla^\nu\eta)^{-\frac12}$ being the normalized 1-form orthogonal to a constant $\eta$ hypersurface. One may wonder if Eq. (\[eq:14\]) can also be derived from the standard thermodynamic relation, $$\begin{aligned}
\frac{dS_\gamma}{dt}=\frac{1}{T}\frac{dQ}{dt},\label{defthent}\end{aligned}$$ where $Q$ is thermodynamical heat. What we found is not a reinterpretation of this relation because we identify “heat” for the photon baryon fluid in the presence of non-equilibrium effect; thermodynamic arguments are not applicable to. Thus, the generation of $y$ distortion is not directly identified with the entropy perturbation production without a kinetic description based on the Boltzmann equation.\
Entropy perturbations at second order
-------------------------------------
We are now ready to introduce a quantity $$\begin{aligned}
\zeta^{(S)}_\gamma\equiv D+\frac{A}{3}+\frac13\ln \left(
\frac{S^0}{S^0_{\rm rf}}\right),\label{zeta_S}\end{aligned}$$ where $S^{0}_{\rm rf}= 4\pi^2T_{\rm rf}^3/(45a^4)$. This quantity is conserved as long as entropy flux conserves at leading order of the gradient expansion. Let us check this statement by considering the covariant derivative of the entropy flux: $$\begin{aligned}
\nabla_\mu S^\mu_\gamma=\partial_\mu S^{\mu}+S^\mu\partial_\mu\ln \sqrt{-g}.\end{aligned}$$ Dropping a gradient term $\partial_i S^i$, we find $$\begin{aligned}
\zeta_\gamma ^{(S)}{}'= -\frac{S^i}{3S^0}\partial_i(A+3D)+y'_0,\end{aligned}$$ where we have used Eq. (\[eq:14\]). The first term represents a volume effect, which is manifest only when we take into account the next leading order of the gradient expansion. $\zeta^{(S)}_{\gamma}$ is conserved even at second order when the scattering is negligible, but only if we move on to $A+3D=0$ gauge, where the volume element does not fluctuate. However, note that gauge is not completely fixed on this slice. The second term arises as a result of the entropy production, which, in this paper, we should keep since the imperfectness of a fluid on subhorizon scales could be non negligible due to convolutions.\
The entropy density is not necessarily proportional to the number density if both of them are evaluated for a non-equilibrium state. In our case, its discrepancy is expressed in terms of $y$ distortion, which characterizes the deviation from the thermodynamic system. The curvature perturbations on the uniform number density slice can be also defined through the same procedures with the entropy: $$\begin{aligned}
\zeta^{(N)}_\gamma\equiv D+\frac{A}{3}+\frac13\ln \left(
\frac{N^0}{N^0_{\rm rf}}\right),\end{aligned}$$ where $N^{0}_{\rm rf}= 2\zeta(3) T_{\rm rf}^3/(\pi^2 a^4)$. Using the number flux conservation laws and dropping $\partial_i N^i$, we find $$\begin{aligned}
\zeta_\gamma ^{(N)}{}'=-\frac{N^i}{3N^0}\partial_i(A+3D).\end{aligned}$$ Thus $\zeta_\gamma ^{(N)}$ is also a conserved quantity if we have the number conservation law and take the leading order of the gradient expansion. Note that $\zeta^{(N)}_\gamma$ is also conserved in $A+3D=0$ gauge even at second order without truncating the higher order gradient corrections.\
Now let us consider the following isocurvature perturbations: $$\begin{aligned}
S^{(NS)}_{\alpha \gamma} \equiv \zeta^{(N)}_{\alpha} - \zeta^{(S)}_{\gamma}.\label{def:iso:NS}\end{aligned}$$ This is a covariant extension of $\delta \left(N_{\alpha}/S_{\gamma}\right)$ at nonlinear order. It should be noticed that the following relation $$\begin{aligned}
\frac{N^i}{N^0}=\frac{S^i}{S^0},\end{aligned}$$ applies at linear order even for the present case since the spectral distortion is a second order effect. Then we obtain $$\begin{aligned}
S^{(NS)'}_{\alpha \gamma} = -y_{0}'.\end{aligned}$$ Thus, the entropy perturbations are also conserved quantity in the presence of gradient terms if the photon entropy flux and $\alpha$-fluid number density flux are conserved. We may also consider isocurvature perturbations defined as $$\begin{aligned}
S^{(N)}_{\alpha \gamma}\equiv 3(\zeta^{(N)}_\alpha-\zeta^{(N)}_\gamma),\label{def:photoniso:nn}\end{aligned}$$ which are conserved if each number density flux are conserved.
The above discordance between Eqs. (\[def:iso:NS\]) and (\[def:photoniso:nn\]) motivates us to newly define the *photon isocurvature perturbation* as a fluctuation of a fraction between the photon number density and the photon entropy density $$\begin{aligned}
S^{(NS)}_{\gamma\gamma}=-3y_0.\end{aligned}$$ This is nothing but the spectral $y$ distortion. For the chemical equilibrium period in the early universe where $y$ distortion is erased, it is obvious that $S^{(N-S)}_{\alpha\gamma}=S^{(N)}_{\alpha\gamma}=S_{\alpha\gamma}$ due to thermodynamic relations.\
Thus, Eqs. (\[def:iso:NS\]) and (\[def:photoniso:nn\]) can be also defined as superhorizon conserved quantities without scattering processes. However, in contrast to the conservation laws of energy momentum tensor, the conservation laws for the number flux and the entropy flux are not necessarily established in the whole cosmic history. Therefore, Eq. (\[def:iso:xi\]) is much more important than the others.
Conclusions {#conclusion}
===========
In this paper, we revisited the two assumptions for the conservation laws of the superhorizon isocurvature perturbations: the negligibility of the gradient terms and the energy conservation laws for the component fluids. We pointed out that the second order gradient terms are not necessarily dropped even if we consider the long wavelength modes. Then, we have introduced new second order quantities, which are conserved even in the presence of gradient terms if there are no non-adiabatic pressure perturbations. It should be noticed that they coincide with the curvature perturbations on the uniform density slice only when we can ignore the gradient terms. The total energy momentum tensor is always conserved, but that for each component fluid is not necessarily conserved. As such an example, we discuss the weak Compton scattering that transfers the energy between the photons and baryons. We found that the secondary isocurvature perturbations are generated due to this energy transfer. The powerspectra of secondary isocurvature perturbations become scale invariant if we consider the local form of the primordial tri- and bispectrum. On the other hand, the disconnected part of the trispectrum only produces the isocurvature perturbations on scales where the actual physical process occurs. We also commented on the entropy perturbations, which are usually equivalent to the isocurvature perturbations in thermal equilibrium states. However, in our case, we cannot identify these two quantities when the universe is dominated by the weak Compton scattering and is not in thermal equilibrium. We found that the entropy perturbations can be understood in terms of the spectral $y$ distortion, which is a non thermal deviation from the blackbody spectrum produced in the weak Compton scattering dominated universe.
The new quantity $\xi$ we have introduced in this paper is still gauge dependent. However, it should be noticed that we can always define the gauge invariant quantities recursively even at nonlinear order as pointed out in Ref. [@Nakamura:2014kza]. Using this formalism, the gauge invariant expressions for $\xi$ would be investigated in future works. Though we only consider the weak Compton scattering, it would also be interesting if we consider the similar heat conduction from the other species such as neutrinos in the earlier epoch. This would lead to a new constraint on curvature perturbations with extremely short wavelength though it requires explicit evaluation for each scattering process, which is left for our future works. So far, we have discussed the late epoch when the universe is in neither kinetic nor chemical equilibrium. In the early epoch, the full considerations of the Compton collision terms are necessary. When there exist relativistic electrons that can sufficiently transfer the photon energy, local kinetic equilibrium is expected. In this case, the $y$ distortion may be transformed into the $\mu$ distortion, which is defined as chemical potential of a Bose distribution function. In the earlier epoch, the number changing process such as the double Compton effects, Bremsstrahlung or pair annihilation are also non-negligible. They adjust the number density and erase the spectral distortions so as to realize chemical equilibrium. Referring to Eqs. (\[tochu:covN\]) and (\[div:emt:f\]), such violation of photon number density conservation would break photon energy conservation as well. Then, secondary isocurvature perturbations might be additionally generated on superhorizon scales, but further study is necessary to make a clearer statement.
We would like to thank Misao Sasaki and Atsushi Naruko for useful discussion on conservation of isocurvature perturbations on superhorizon scales. The authors are grateful to Kouji Nakamura and Karim Malik for helpful discussions. We also would like to thank Rampei Kimura for careful reading of our manuscript. This work was supported in part by JSPS Grant-in-Aid for PD Fellows (A.O.), JSPS Grant-in-Aid for Scientific Research Nos. 25287054 (M.Y.) and 26610062 (M.Y.), MEXT KAKENHI for Scientific Research on Innovative Areas “Cosmic Acceleration” No. 15H05888 (M.Y.).
[^1]: In Ref. [@Ota:2016esq], the angular dependence was not properly treated, and $\hat \partial$ was dropped.
|
{
"pile_set_name": "ArXiv"
}
|
Getty Images
Washington will have Case Keenum, who practiced fully the past two days despite a foot injury. The team also expects to have receiver Terry McLaurin despite his questionable status, JP Finlay of NBCSportsWashington.com reports.
McLaurin has a hamstring injury that kept him out of practice Friday after going onto the report Thursday as a limited participant. Finlay calls the hamstring injury a “minor pull.”
Coach Jay Gruden said earlier in the day that McLaurin and offensive guard Brandon Scherff (ankle) were likely game-day decisions.
“I think Terry and Brandon will both probably come down to an hour before the game, see how they’re doing,” Gruden said. “We’ll get a good workout in before the game and see where they’re at. If Terry can’t go, obviously we have Robert Davis here. He can play some spilt end. We can move Trey Quinn out there a little bit and move [Steven] Sims inside. We can do a lot of different things. Those guys are pretty versatile. [Kelvin] Harmon’s got some outside receiver work as well on both sides. They’ll be called to duty and expected to perform.”
Tight end Jordan Reed (concussion) and center Chase Roullier (knee) are out.
|
{
"pile_set_name": "OpenWebText2"
}
|
Luc Panissod
Luc Panissod born 1949, of France, was Secretary General of the World Organization of the Scout Movement (WOSM). He previously held the role of Deputy Secretary General of WOSM and was made acting WOSM Secretary General in mid-November 2007 in replacement of Eduardo Missoni, following an institutional crisis over leadership and finance. In March 2009 he was officially appointed to the position of Secretary General of WOSM. Panissod laid down his post on 31 December 2011.
Responsibilities at WOSM fall into two divisions, each headed by an Executive Director. In his role as Deputy Secretary General, Panissod was in charge of General Management, responsible for Administration, Finance, Personnel, Technology and Information, Resource Mobilization, Design, Partnerships, World Events, and Documents and Archiving.
Panissod studied at the Sorbonne University in Paris, and completed a Diploma in Economics, a Masters in Economics, and then a Certificat d'Aptitude à l'Administration des Entreprises CAAE-MBA at one of its affiliated institutes. He was preparing his PhD on the "Marketing of public and social causes" when he joined the World Scout Bureau in 1982.
In 1991 he was promoted to Deputy Secretary General of WOSM, responsible for the General Management of the World Scout Bureau.
Panissod was also the liaison for the Asia-Pacific, Eurasian and Africa offices.
In his role as the Secretary General, Panissod manages Institutional Support, Constitutional Affairs, Planning, Strategy and Strategic Evaluation, Communication and External Relations.
Panissod was awarded the Bronze Wolf in 1996.
References
https://web.archive.org/web/20120303013406/http://www.scout.org/our_organisation/governance/world_bureau/secretary_general
https://web.archive.org/web/20080512032311/http://www.scout.org/en/content/download/9680/82158/file/C0734WOSM_crisis_e.pdf
http://www.boyscouts-ncac.org/documents.cfm?documentID=1777
http://www.scout.org/ru/our_organisation/governance/world_bureau/secretary_general/luc_panissod_acting_secretary_general_nov_2007_present
Category:1949 births
Category:International Scouting leaders
Category:World Scout Committee members
Category:University of Paris alumni
Category:Living people
Category:Recipients of the Bronze Wolf Award
Category:Scouting and Guiding in Switzerland
Category:Recipients of the Silver World Award
|
{
"pile_set_name": "Wikipedia (en)"
}
|
Q:
array not getting values
I am running a script that changes values in a formula with a message box.
var searchtext = Browser.inputBox("Enter search text");
var replacetext = Browser.inputBox("Enter replace text");
var form = ss1.getRange("D3");
var formula = form.getFormula();
var updated =formula;
updated.indexOf(searchtext);
updated = updated.replace(searchtext, replacetext);
form.setFormula(updated);
var form2 = ss1.getRange("D10");
var formula2 = form2.getFormula();
var updated2 =formula2;
updated2.indexOf(searchtext);
updated2 = updated2.replace(searchtext, replacetext);
form2.setFormula(updated2);
As you notice I have to repeat the code for the different ranges I have. In the code above I have D3 and D10 ranges. I have around another 20 ranges that I need to replace formula from. I have created this array to hopefully do them all together while the script runs but I am not seeing any changes. Any ideas why would this be happening?
function dash(){
var ss1 = SpreadsheetApp.getActiveSpreadsheet();
var searchtext = Browser.inputBox("Enter search text");
var replacetext = Browser.inputBox("Enter replace text");
var rangeArray = ss1.setActiveSheet(ss1.getSheetByName("Ranges").getRange("A1:A5").getValues());
var daily = ss1.setActiveSheet(ss1.getSheetByName("Daily"));
for(var i in rangeArray){
var form = daily.getRange(rangeArray[i][0]);
var formula = getRange(form).getFormula();
var updated =formula;
updated.indexOf(searchtext);
updated = updated.replace(searchtext, replacetext);
form.setFormula(updated);}
}
A:
There are a few informtion about your sheet layout that I ignore so I had to make some assumptions...
I suppose the ranges you want to process are columns in the sheet so I would do something like this (see comments in code): (I didn't have the opportunity to test this code, it might need some debugging)
function dash(){
var ss1 = SpreadsheetApp.getActiveSpreadsheet();
var searchtext = Browser.inputBox("Enter search text");
var replacetext = Browser.inputBox("Enter replace text");
var rangeArray = ss1.getSheetByName("Ranges").getRange("A1:A4").getValues(); // I suppose these cells contains A1 notation of the useful ranges
var daily = ss1.setActiveSheet(ss1.getSheetByName("Daily"));
Logger.log(rangeArray)
for(var i in rangeArray){
var formula = daily.getRange(rangeArray[i][0].toString()).getFormula();//
Logger.log(formula)
var updated =formula.toString().replace(searchtext, replacetext);
Logger.log(updated)
}
daily.getRange(rangeArray[i][0].toString()).setFormula(updated);//
}
EDIT : removed first code and replaced following your comment and example sheet
|
{
"pile_set_name": "StackExchange"
}
|
<?php
class NamespaceCoverageNotPublicTest extends PHPUnit_Framework_TestCase
{
/**
* @covers Foo\CoveredClass::<!public>
*/
public function testSomething()
{
$o = new Foo\CoveredClass;
$o->publicMethod();
}
}
|
{
"pile_set_name": "Github"
}
|
Belavić M, Sotošek Tokmadžić V, Brozović Krijan A, et al. *Ther Clin Risk Manag*. 2018;14:741--751.
In this article, the author Josip Žunić did not meet the criteria for authorship and was erroneously included in the authors list. The authors wish to apologize for this error.
|
{
"pile_set_name": "PubMed Central"
}
|
Many modalities for measuring blood flow in the human body are in use today, including ultrasound and phase contrast magnetic resonance (PCMR), and the results of such measurements are usually displayed in a variety of ways. However, existing medical software for rendering blood flow information typically presents the information in a rather abstract form. A more clinically useful way of displaying blood information would allow the clinician to visualize the dynamics of a plurality of blood flows in an anatomical context. Such a display could be visually analyzed and utilized as a tool for diagnosis and surgery planning in order to treat medical problems such as stroke.
|
{
"pile_set_name": "USPTO Backgrounds"
}
|
Q:
"It was him" auf Deutsch
In English, we could answer the question "Who ate the cake?" with
It was him.
I don't know the reason why we use the accusative "him", even though the person is the subject of eating the cake, not the object.
In German, is it the same?
Wer aß den Kuchen? Es war ihn.
A:
German is different and uses the nominative:
Er war's. Er war es. Das war er.
Note the word order; es can't be in initial position here.
|
{
"pile_set_name": "StackExchange"
}
|
Laparoscopic fundoplication: a natural extension for the thoracic surgeon.
Thoracic surgeons have historically played a significant role in surgical treatment of benign esophageal disorders. With the advent of video-assisted thoracic surgical techniques, chest surgeons have also become adept at minimally invasive procedures. Thus, it seems appropriate that thoracic surgeons participate in minimally invasive antireflux operations, such as laparoscopic Nissen fundoplication. From February 1993 to May 1995, 66 patients (32 male, 34 female) with a mean age of 45.5 years (range, 15 to 82 years) underwent a laparoscopic fundoplication. Gastroesophageal reflux disease was diagnosed on the basis of history and endoscopically documented esophagitis or abnormal esophageal pH testing or both. There were 45 type I, 3 type II, and 7 type III hiatal hernias. Eleven patients had gastroesophageal reflux disease with no hernia. Conversion to laparotomy occurred in 6 patients (9%) due to bleeding in 2 patients, inability to expose the gastroesophageal junction in 3, and gastric laceration in 1 patient. All but 1 patient underwent a Nissen fundoplication performed over a 50F to 60F dilator. The remaining patient (type II hernia without gastroesophageal reflux disease) underwent a reduction, closure, and anterior gastropexy. There was no operative mortality. Immediate postoperative morbidity included moderate dysphagia in 7 patients (11%), ileus in 2 patients (3%), and deep venous thrombosis and atrial arrhythmia in 1 each (1.5%). Excluding 1 patient hospitalized for 42 days due to severe psychosis, the mean postoperative stay was 4.0 +/- 2.5 days (median, 3 days). Three patients (5%) required dilation for dysphagia, and 1 (1.5%) has noted recurrent reflux during follow-up (mean, 14.4 months; range, 6 to 30 months). A single patient has undergone reoperation for persistent dysphagia (1.5%). A laparoscopic Nissen procedure is safe, effective treatment for refractory gastroesophageal reflux disease when performed by thoracic surgeons experienced in minimally invasive surgical procedures.
|
{
"pile_set_name": "PubMed Abstracts"
}
|
Q:
QT 5.7 QML - Reference Error: Class is not defined
I get the "qrc:/main_left.qml:23: ReferenceError: CppClass is not defined" when I run the below code. This code tries to change the position of a rectangle in a window.
Main.cpp
#include <QGuiApplication>
#include <QQmlApplicationEngine>
#include <QQmlContext>
#include "cppclass.h"
#include "bcontroller.h"
#include <QApplication>
int main(int argc, char *argv[])
{
QApplication app(argc, argv);
//QGuiApplication app(argc, argv);
BController c;
CppClass cppClass;
QQmlApplicationEngine engine;
engine.rootContext()->setContextProperty("CppClass", &cppClass);
engine.load(QUrl(QStringLiteral("qrc:/main_left.qml")));
return app.exec();
}
main_left.qml
import QtQuick 2.7
import QtQuick.Window 2.2
import QtQuick.Controls 1.2
Rectangle {
visible: true
width: 640
height: 480
property int index: 0
Text {
text: controller.name
anchors.centerIn: parent
}
Image{
id:imageLeft
anchors.fill: parent
source:"imageLeft.jpg";
}
Connections {
target: CppClass
onPosUpdate: {
rect.x = currentPos
}
}
Button {
id: button1
x: 163
y: 357
text: qsTr("Change Position")
anchors.bottom: parent.bottom
anchors.bottomMargin: 20
anchors.horizontalCenter: parent.horizontalCenter
onClicked: CppClass.getCurrentPos()
}
Rectangle {
id: rect
width: parent.width/2
height: parent.height/2
color: "transparent"
border.color: "red"
border.width: 5
radius: 10
}
MouseArea {
anchors.fill: parent
onClicked: controller.setName(++index)
}
}
cppclass.cpp
#include "cppclass.h"
#include <QtQuick>
#include <string>
CppClass::CppClass(QObject *parent) : QObject(parent)
{
}
CppClass::~CppClass()
{
}
void CppClass::getCurrentPos()
{
int pos = rand() % 400;
std::string s = std::to_string(pos);
QString qstr = QString::fromStdString(s);
emit posUpdate(qstr);
}
Please help!
A:
I think there is a problem with CppClass declaration in your main.cpp => CppClass cppClass; and your CppClass constructor is CppClass::CppClass(QObejct *parent); which means that you are missing the constructor parameter.
Therefore,you have two possibilities
1st : Try use your class without QObject *parent
2nd: provide the QObject* parent for the contructor of CppClass when declaring it in main.cpp
|
{
"pile_set_name": "StackExchange"
}
|
Marigold balm 100ml
Already convinced of the benefits of "versatile" marigold? Try this extremely rich universal balm to help relieve a variety of skin problems.
100% natural balm, without preservatives, with high levels of CO2 extract of calendula and chamomile, and lavender essential oil.
It has a beneficial effect on red and sensitive skin. It softens and protects dry, rough and cracked skin. Promotes regeneration and soothes irritated skin after waxing, shaving. It is also recommended for the care and protection of the nipples during breastfeeding.
Advice for pregnant womenDuring the most beautiful period of life, during pregnancy, nourish the skin with completely natural Nourishing Butter.
Apply it daily to the skin of the body, especially to parts of the body that are prone to stretch marks (belly, chest, thighs).Prepare breast nipples for their most important role in breastfeeding. Nourish them with Neven conditioner in the last quarter and continue with daily breastfeeding care.
|
{
"pile_set_name": "Pile-CC"
}
|
Packaging | A Plastic Flower
posted on
August 27th, 2012 written by
Kristina category
Crafts, Packaging
Hello friends, here is another packaging idea. It’s my favorite reuse of a plastic bag. You can actually use a wax paper, but I prefer to make it with a already used plastic bag.
All you’ll need for this project is:
1. A used plastic bag (if possible find a bag that is in one color),
2. A soft wire,
3. A pair of Scissors.
The flower is easy to make, but before you start you’ll need to decide the size of your flower. This is very important because as the size of the flower increases so does the number of the square plastic bag pieces. The flower I made is small (5x5cm) and the number of square plastic bag pieces is 8.
Photos by Istok Photography
|
{
"pile_set_name": "OpenWebText2"
}
|
The "shrinking lung syndrome" in SLE, treatment with theophylline.
We report on a patient with systemic lupus erythematosus who developed a shrinking lung syndrome. The dyspnoea of the patient and the results of pulmonary function tests significantly improved during treatment with theophylline 750 mg daily. This is the first report of a successful treatment of the shrinking lung syndrome with theophylline.
|
{
"pile_set_name": "PubMed Abstracts"
}
|
Tzu Chi
Buddhist Compassion Relief Tzu Chi Foundation, Republic of China, known for short as the Tzu Chi Foundation (; literally "Compassionate Relief"), is a Taiwanese international humanitarian and non-governmental organization (NGO). The foundation has several sub-organizations such as the Tzu Chi International Medical Association (TIMA) and also the Tzu Chi Collegiate Youth Association (Tzu Ching) (. Tzu Chi volunteers and relief workers are mostly recognizable by their blue and white uniforms called, in , lántiān báiyún, ( lit. 'blue sky, white clouds'). The foundation's work includes medical aid, disaster relief, and environmental work such as recycling. It is operated by a worldwide network of volunteers and employees and has been awarded a special consultative status at the United Nations Economic and Social Council.
The Tzu Chi Foundation was founded by Master Cheng Yen, a Taiwanese Buddhist nun, or bhikkhuni, in 1966 as a Buddhist humanitarian organization. The organization began as a group of thirty housewives who saved money for needy families. Tzu Chi gradually expanded its services over time, opening a free medical clinic in 1972 and building its first hospital in 1986. The organization underwent a rapid expansion in the late 1980s and early 1990s, coinciding with a surge of popularity in Humanistic Buddhism in Taiwan. In the 1990s the organization started major international disaster relief efforts. Tzu Chi is known for undertaking long term projects such as building new homes, schools, hospitals, and places of worship (including churches and mosques for non-Buddhists) for victims following a disaster. As of 2013, the organization was estimated at over 10 million members worldwide throughout 47 countries.
Tzu Chi has a policy of being secular in its humanitarian work, however Dharma teachings are often integrated into its practices for volunteers. Cheng Yen is considered to be one of the "Four Heavenly Kings" of Taiwanese Buddhism, and Tzu Chi itself is considered to be one of the "Four Great Mountains", or four major Buddhist organizations of Taiwan along with Fo Guang Shan, Dharma Drum Mountain, and Chung Tai Shan.
History
The Tzu Chi Foundation was founded as a charity organization with Buddhist origins by the Buddhist nun Master Cheng Yen in 1966 in Hualien, Taiwan after Cheng Yen saw the humanitarian work of Christian missionaries in Taiwan in the post World War II period. She was inspired by her master and mentor, the late Venerable Master Yin Shun (印順導師, Yìn Shùn dǎoshī) a proponent of Humanistic Buddhism, who exhorted her to "work for Buddhism and for all sentient beings". The organization began with a motto of "instructing the rich and saving the poor" as a group of thirty housewives who saved fifty cents (US$0.02) every day and stored them in bamboo savings banks to donate to needy families.
Tzu Chi experienced modest growth in the first two decades of its establishment, it grew to 293 members in 1968 and by 1986 had just 8,000 members. The foundation gradually expanded its services since starting as a group of thirty housewives, raising money for disaster relief after a small fire in 1970 that destroyed 43 buildings and opening its first free medical clinic in 1972. In 1986 the foundation established its first hospital in Hualien City.
With the surge in popularity of Humanistic Buddhism in Taiwan in the late 1980s and 1990s, and the publicity from fundraising to build its first hospital, Tzu Chi enjoyed a rapid expansion in membership alongside several other major Taiwanese Buddhist organizations during this time. From 1987 to 1991, Tzu Chi membership doubled in size each year, by 1994, it boasted a membership of 4 million members. Tzu Chi's expanded its aid work to the People's Republic of China in 1991, during the eastern China floods. In 1993, the foundation created a bone marrow registry, an effort that eventually caused Taiwan to alter its bone marrow laws, and organized a nationwide volunteer program for Taiwan in 1996.
The foundation achieved much media attention in Taiwan in 2015 with a plan to develop a plot of land in Neihu District into a disaster relief center and cultural park which led to the destruction of parts of the Neihu conservation zone. The incident led to widespread critical coverage of Tzu Chi by the Taiwanese media, and scrutiny into its finances. During this time several unsubstantiated reports circulated in Taiwan about the foundation, including unfounded claims that the foundation invested in tobacco and weapons companies. Despite authorities not finding any illicit activity with its finances, calls for greater transparency were made.
Tzu Chi has grown to become a significant actor in civil society, Tzu Chi is not only the largest Buddhist organization in Taiwan, but also Taiwan's largest owner of private land. As of 2013, the organization was estimated to have approximately 10 million members worldwide, and chapters in 47 countries.
Organization
The four major causes of Tzu Chi are Charity, Medicine, Education, and Humanity, as highlighted by the official motto, or concept of "Four endeavors, eight footprints" (). The eight footprints are charity causes, medical contributions, education development, humanities, international disaster assistance, bone-marrow donation, community volunteerism, and environmental protection.
The official website for the organization states that the organization started with Charity, and then extended its aims to include Medicine, Education and Culture. Its stated goal is to promote "sincerity, integrity, trust, and honesty".
Tzu Chi is notably distinct from the other Four Great Mountains in respect to three main unique characteristics. First of all, the founder of the organization is a female. Secondly, the founder is not a Buddhist scholar who promotes a specific interpretation of Buddhism nor started any kind of religious movement. And finally, the organization is officially a charitable organization and Tzu Chi itself focuses primarily on humanitarianism and community service rather than Buddhist spiritual development.
Logo
Consisting of a ship that also simultaneously bears the lotus fruit and flower, the Tzu Chi logo symbolizes that the world can be made a better place by planting good karmic seeds. Followers believe that these seeds are required for flowers bloom and bear fruit, which is a metaphor for their beliefs that a better society can be created with good actions and pure thoughts. The ship represents Tzu Chi steering a ship of compassion, representing their goal in saving all beings that suffer, while the Eight Petals represent the Noble Eightfold Path in Buddhism, which Tzu Chi uses as their guide.
The Noble Eightfold Path consists of:
Right View
Right Thought
Right Speech
Right Action
Right Livelihood
Right Effort
Right Mindfulness
Right Focus
Tzu Chi's Ten Precepts
Tzu Chi also has its own customized version of the Buddhist Precepts as formulated by Master Cheng-Yen. The Ten Precepts of Tzu Chi are:
No killing
No stealing
No fornication
No lying
No drinking
No smoking or use of narcotics or betel nuts
No gambling
Practice filial piety and develop pleasant manners and speech
Abide by traffic laws
No participation in political activities or demonstrations
Master Cheng-Yen has stated that she developed these rules based on the new needs of modern society.
Medical Mission
One of the first major initiatives Tzu Chi took part in was the "Tzu Chi Medical Mission". This effort was inspired in 1970 after Cheng Yen noticed a link between poverty and illness after spending six years among the poor of eastern Taiwan.
Tzu Chi's first medical outreach occurred in 1972 when a free clinic was opened in Hualien.
Tzu Chi Hospital
The Foundation established its first Tzu Chi Hospital in Hualien in 1986. A 600-bed general hospital had been planned in 1979 to service the impoverished eastern coast of Taiwan. A primary concern for Cheng Yen was that the area was isolated and the people in the area were cut off from aid during disasters. Despite setbacks both in funding for the hospital and finding an acceptable site. Ground was broken on the site eventually chosen on 5 February 1983 at a ceremony officiated by then Provincial Governor (later President) Lee Teng-Hui. However, two weeks after ground was broken, Cheng Yen received a notice from the military telling her that the property was needed by the military and that construction would have to stop.
A new site was obtained for the hospital with help from Minister of the Interior Lin Yang-kang. A second groundbreaking occurred on 2 April 1984 at the new site. The publicity of the project to build the hospital led to a significant increase in the number of Tzu Chi volunteers, with Tzu Chi membership increasing six-fold by the time of the second groundbreaking since the announcement of the project in 1979. Construction was completed and the hospital opened on 17 August 1986.
Tzu Chi has since built hospitals in Yuli, Hualien County; Dalin, Jiayi County; Guanshan, Taidong County; Tanzi District, Taichung City; and Xindian, New Taipei City.
In addition to building hospitals the Tzu Chi College of Nursing was founded on 17 September 1989 in Hualien in order to address the shortage of nurses on Taiwan's east coast, with a focus on serving the poor. It was the first private nursing college in Taiwan to waive tuition for selected courses, in addition to providing full scholarships for qualified Taiwan aborigine students.
Bone Marrow registry
Tzu Chi created a bone marrow registry, the Tzu Chi Bone Marrow Bank, in 1993 after a young follower of Cheng Yen was diagnosed with Leukemia. Cheng Yen referred to the concept of bone marrow donation as a way to "save a life without harming yourself." This effort to register bone marrow donors from an organization with such massive membership like Tzu Chi caused Taiwan to change its laws regarding organ donations. This registry became a division of the new Tzu Chi Stem Cells Center, which was founded to improve research and treatment capabilities. By 2007 the program had saved the lives of almost 1,500 people in 25 different countries. By 2008, Tzu Chi had registered more than 307,657 bone marrow donors.
College of Medicine
Tzu Chi established the Tzu Chi College of Medicine in 1994. This college became Tzu Chi University in 2000. In the meantime Cheng-Yen appealed to the Taiwanese public to donate their bodies for medical training, attempting to dispel traditional taboos in the process. As a result of this appeal, public support for body donations surged nationwide. Consequently, at the Tzu Chi College of Medicine, there is one body for every four students to study as opposed to one body for every two hundred students at one school, the ratio is the lowest in the country.
In 1995, the Athletic Drug Testing Center was established at the request of the Ministry of Education and went into operation in 1996 during a national sporting event when gold medal winners were tested for banned drugs.
Disaster relief
Tzu Chi is most well known for its disaster relief efforts worldwide. In carrying out these projects, Tzu Chi has a policy that forbids public gatherings for the sole purpose of specific political, economic, and religious groups. Tzu Chi volunteers are not to discuss business, politics, or preach religion while giving aid. One of the most iconic attributes of Tzu Chi disaster relief efforts is that volunteers not only provide short term aid but also partake in long term projects to rebuild the communities affected. Tzu Chi often builds new homes, schools, hospitals, and places of worship (including churches and mosques for non-Buddhists) for victims following a disaster.
People's Republic of China
Tzu Chi's involvement with providing aid in the People's Republic of China was difficult at first. Cheng Yen has referred to relief work in China as "Building a Bridge of Love." The initial problems with providing aid in China involved the political tensions between Taiwan and China and Communist China's disdain for religion. In Taiwan, it was difficult to convince Taiwanese to help the Chinese, and in China, it was difficult to convince government officials normally wary of religious organizations to accept Tzu Chi.
Tzu Chi's involvement in the People's Republic of China began in 1991, when it undertook relief operations after severe floods hit central and eastern China. The aid provided to China was Tzu Chi's first major effort at international relief aid, it also allowed Tzu Chi to develop its principles of delivering aid and establish relations with the People's Republic of China. Since then, the foundation has built schools, nursing homes and entire villages, including infrastructure in poor inland areas, such as Guizhou province.
Over the past twenty years, Tzu Chi expanded their humanitarian work and influence to 28 provinces, municipalities and autonomous regions in China. Projects include relief work after major disasters like the Sichuan earthquake; distribution of rice and goods to the poor; social programs like regular visits to the needy; scholarship programs to the less privileged students; medical missions like bone marrow donation and free clinics; and educational outings of environmental protection and recycling activities.
In March 2008, Tzu Chi became the first organization represented by a non-Mainland resident to be registered with the Chinese government.
In the aftermath of the 2008 Sichuan earthquake, Tzu Chi sent food, blankets and medical aid to survivors, while volunteers in China set out for the disaster zone. Tzu Chi was also one of the few organizations the Chinese government allowed to bring in aid workers from overseas to join the relief effort. With the motto "First to arrive, last to leave," the organization has continued with long-term reconstruction work in Sichuan, and by 2010, had rebuilt thirteen schools in the region.
In August 2010, Tzu Chi became the first overseas NGO to receive permission from the Ministry of Civil Affairs to set up a nationwide charity foundation. Normally, overseas organizations must register with the Ministry of Commerce as businesses. The foundation received the China Charity Award from the Ministry of Civil Affairs for its work in charity and promoting the well-being of society in 2006 and again in 2008.
Aid in Taiwan
In 1996, Tzu Chi started a nationwide volunteer program where volunteers are registered according to where they live with the goal of "neighbors helping neighbors." The community volunteer initiative began as a disaster relief effort started in response to Typhoon Herb.
Tzu Chi volunteers were one of the first responders in the Chi-Chi earthquake (known in Taiwan as the 921 earthquake) of 1999, mobilizing within 2 hours to provide thousands of sets of food and relief supplies to victims. The volunteers followed a strict system of organization where commissioners and teams of volunteers were assigned to specific townships, and teams were assigned to specific areas within the townships. This organizational structure was what allowed the volunteers to be mobilized so quickly and efficiently. The earthquake prompted Cheng Yen to start "Project Hope", a long term project to rebuild 51 schools for those effected by the disaster. Tzu Chi raised more relief funds for the earthquake than any other religious organization in Taiwan, raising nearly sixty times as much funds for the relief effort than the next largest fund raiser, Fo Guang Shan. The 921 earthquake was credited for prompting Tzu Chi to create a disaster relief coordination center at its headquarters to organize quicker disaster response services.
Tzu Chi was also active in providing aid after Typhoon Nepartak struck Taiwan in 2016, providing relief supplies, rebuilding communities, and providing medical care through its medical support staff in Taimali, Taiwan which have been holding medical outreach free clinics in the area since 2006.
International Disaster Relief
Tzu Chi has participated in numerous other relief projects around the world, including sending teams to Indonesia and Sri Lanka in the wake of the tsunami resulting from the 2004 Indian Ocean earthquake as well as to Pakistan after the 2005 earthquake in their northern mountains. The later was done despite poor relations between the governments of the two countries.
In the aftermath of Hurricane Sandy, the organization announced on 18 November 2012 a donation of $10 million in the form of $300 and $600 Visa debit cards to those affected in the New York and New Jersey area. Volunteers handed out these cards in parts of Brooklyn, Queens, and Staten Island. Tzu Chi was also active in providing aid following the 2015 Nepal Earthquake. Tzu Chi was also active in relief efforts during Hurricane Harvey in 2017, the group provided aid, as well as cash gifts for those who helped the community during the disaster. In 2016, the organization distributed in the United States over $2 million in cash cards to disaster victims. As of 2015, Tzu Chi has provided disaster relief aid to over 85 countries worldwide.
Global presence
Tzu Chi's headquarters is in Hualien County, Taiwan.
Portfolios
Tzu Chi's portfolios include case management, medical, educational and disaster relief.
The organization builds and operates many hospitals and schools, with outreach efforts that range from visits to nursing homes to providing bone marrow surgery, as well as offering items such as washing machines to struggling single mothers. The television "Da Ai" network operates with its own news and television programming. Chinese schools have also been established abroad, such as in Australia and the United States, which apart from teaching Chinese and sign language also guides students in ways of compassion and community service.
Recycling
A significant fraction of funds raised by Tzu Chi revolves around environmentally friendly goals in encouraging the recycling of items such as water bottles as well as using reusable items or reusing items to reduce waste.
As of 2014, the foundation operates over 5,600 recycling stations. One of the foundation's projects is the recycling of polyethylene terephthalate (PET) plastic bottles for the production of textiles. The project, which was started in 2006, collects PET plastic bottles and recycles them into cloth. The project is handled by the Tzu Chi sponsored non-profit Da Ai Technology Co. The products are all designed by members of the paid staff and recycled plastic bottles make up about half of the raw materials for the products. The project collects about 2,000 tons of plastic bottles each year. Tzu Chi's recycling centers have been a source of criticism however, with critics arguing that Tzu Chi's recycling efforts result in lost income for poor trash collectors.
Since 2007, the foundation has produced over 460,000 polyester blankets out of recycled plastic bottles, many of which have been distributed as part of Tzu Chi's disaster relief programs throughout the world. Other items made with the recycled resins include thermal underwear, T-shirts, hospital bed sheets, medical gowns, suitcases, stuffed animals and uniforms for Tzu Chi volunteers. While the project relies on recycled plastic bottles for the production of its products, its leaders have stated that it is still best for people to not use plastic bottles at all.
Dharma
The teachings of the Buddha and founder Master Cheng Yen play a core role in the workings of the organization. "Tzu Chi Day" is celebrated every year on the second Sunday of May which generally coincides with the Buddha's birthday (Vesak Day), and Mother's Day (as recognised in Taiwan). Celebrations during Tzu Chi Day include the bathing of the Buddha ceremony, the tradition's message is that it is the people that need cleansing before they become better individuals. Tzu Chi promotes many of the teachings of Buddhism, in particular the Lotus Sutra,
and also has sutra adaptations through the use of sign language on the Sutra of the Innumerable Meanings, which teaches that sentient existence is challenging and filled with disasters in the absence of observations of virtue, as well as the Sutra of the Water Repentance, which advocates and symbolizes the need to repent karmic transgressions. Despite these activities, Tzu Chi has a policy of not proselytizing religion directly at its public activities. Apart from being non-proselytist, Tzu Chi's adaptation of Buddhist principles is apolitical.
In disaster regions where a particular religious faith is prominent, Tzu Chi regularly works together with local religious organizations. Tzu Chi has re-built mosques and churches in disaster zones where faith plays an important role in local society.
Tzu Chi nuns (bhikkhunis) do not rely on donations for their livelihood, something uncommon among most Buddhist orders. In earlier days, the nuns sustained themselves by farming, weaving and other handicrafts. More recently, they sustained themselves by the manufacture of electrical circuit breakers and other products.
International branches
Tzu Chi has branches in 47 countries and regions including USA, Canada, Australia, Thailand, Indonesia, Malaysia, Singapore, and various locations in Asia, Europe and Africa.
Television and Satellite Network
On 17 August 1999, a television network was formed in Taiwan under the Tzu Chi Foundation of the Culture of Communication, Inc with the slogan "Love to make the world light up". Formally known as Da Ai Television, the network grew into a global broadcasting presence with offerings of a radio service, Tzu Chi Channel 1, Tzu Chi Channel 2, Da Ai TV Indonesia, Da Ai TV Thailand, and Da Ai TV Egypt. Live streaming of Channel 1 and 2 can also be found on YouTube.
Jing Si Books & Café
Jing Si Books & Café is a chain of non-profit bookstores and cafes operated by Tzu Chi offering Tzu Chi merchandise and publications by Cheng Yen.
Youth
The Tzu Chi Collegiate Association (慈濟大專青年聯誼會) is the Foundation's college youth organization, and was officially established in Taiwan on 31 May 1992. With chapters at universities worldwide, its goal is to allow university students (known as Tzu Ching or 慈青, literally "compassionate youth") to be involved with Tzu Chi's activities. Tzu Ching volunteers are given the opportunity to participate in large-scale events such as disaster relief and international NGO conferences such as the annual UN Youth Assembly. Master Cheng Yen encourages the Tzu Ching volunteers to actively communicate with each other, with the goals of learning and improving. Each year an international Tzu Ching officer training retreat camp is held at the foundation headquarters in Hualien.
Tzu Shao (慈少) is the Tzu Chi branch for youths under the age of 18. People in this group do community services such as free clinics, soup kitchens, and nursery homes.
Year End Ceremonies
Each year Tzu Chi conducts a Year End Ceremony attended by Tzu Chi workers, volunteers and members in January or February where Master Cheng Yen distributes blessings in the form of red packets that embosses a coin in Taiwanese currency together with auspicious words for the coming year.
Notes
References
Further reading
Gombrich, Richard (2013). Review: Yu-Shuang Yao, Taiwan's Tzu Chi as Engaged Buddhism: Origins, Organization, Appeal and Social Impact, Global Oriental 2012. Marburg Journal of Religion 17 (1), 1-8
Jones, Charles B. (2009). Modernization and Traditionalism in Buddhist Almsgiving: The Case of the Buddhist Compassion Relief Tzu-chi Association in Taiwan. Journal of Global Buddhism 10, 291-319
External links
Official Site (Global Homepage)
Official Site (USA)
TzuChi, Serving with Compassion (English Guideline)
Category:Buddhist organizations based in Taiwan
Category:Charities based in Taiwan
Category:International charities
Category:International volunteer organizations
Category:Religious service organizations
Category:Religious organizations established in 1966
|
{
"pile_set_name": "Wikipedia (en)"
}
|
Chrysophanol attenuates nitrosative/oxidative stress injury in a mouse model of focal cerebral ischemia/reperfusion.
Nitrosative/oxidative stress plays an important role in neuronal death following cerebral ischemia/reperfusion (I/R). Chrysophanol (CHR) has been shown to afford significant neuroprotection on ischemic stroke, however, whether its mechanism is related to attenuating nitrosative/oxidative stress is not clear. In the present study, we investigated the effect of CHR on neuronal injury related to nitric oxide (NO) production by using mouse middle cerebral artery occlusion (MCAO) model. Our results revealed that nitrite plus nitrate (NOx-) and 3-nitrotyrosine (3-NT) levels increased in ischemic brain 14 days after reperfusion, and were subsequently attenuated by CHR treatment. Moreover, 3-NT is colocalized with NeuN and TUNEL, suggesting that neuronal apoptosis following I/R is associated with 3-NT and CHR suppresses NO-associated neuronal cell death. Accordingly, cleaved caspase-3 expression in ischemic brain was decreased by CHR treatment. I/R also decreased the activity of total superoxide dismutase (SOD) and manganese-dependent SOD (MnSOD), whilst increased reactive oxygen species (ROS) production significantly. Interestingly, CHR reversed this decrease in total SOD, and MnSOD activity, and inhibited ROS generation in the ischemic brain. Taken together, our results provide direct evidence suggesting that CHR attenuates nitrosative/oxidative stress injury induced by I/R, providing a novel therapeutic target in the treatment of acute ischemic stroke.
|
{
"pile_set_name": "PubMed Abstracts"
}
|
cmake_minimum_required(VERSION 3.3)
project(OpenGLESIMGTextureFilterCubic)
if(IOS)
message("Skipping OpenGLESIMGTextureFilterCubic : Not supported on iOS")
return()
endif()
add_subdirectory(../../.. ${CMAKE_CURRENT_BINARY_DIR}/sdk)
if(PVR_PREBUILT_DEPENDENCIES)
find_package(PVRShell REQUIRED MODULE)
find_package(PVRUtilsGles REQUIRED MODULE)
endif()
set(CMAKE_RUNTIME_OUTPUT_DIRECTORY "${CMAKE_BINARY_DIR}/bin")
set_property(DIRECTORY ${CMAKE_CURRENT_SOURCE_DIR} PROPERTY VS_STARTUP_PROJECT OpenGLESIMGTextureFilterCubic)
set(SRC_FILES OpenGLESIMGTextureFilterCubic.cpp)
set(ASSET_FOLDER ${CMAKE_RUNTIME_OUTPUT_DIRECTORY}/Assets_OpenGLESIMGTextureFilterCubic)
# Adds an executable (or ndk library for Android) and necessary files like plists for Mac/iOS etc.
add_platform_specific_executable(OpenGLESIMGTextureFilterCubic ${SRC_FILES})
#################################### ASSET FILES ##########################################
# For platforms supporting it, will be packaged with the executable for runtime use.
# Will be accessible from the app with their "relative path". One call per base path
### Textural shaders (OpenGL ES) ###
add_assets_to_target(OpenGLESIMGTextureFilterCubic
SOURCE_GROUP "shaders"
ASSET_FOLDER ${ASSET_FOLDER}
BASE_PATH ${CMAKE_CURRENT_SOURCE_DIR}/
FILE_LIST
FragShader.fsh
VertShader.vsh)
# Create and adds a Windows resource file (Resources.rc) with all the assets that have been added to the target with the previous functions
add_assets_resource_file(OpenGLESIMGTextureFilterCubic)
###########################################################################################
# Apply SDK example specific compile and linker options
apply_example_compile_options_to_target(OpenGLESIMGTextureFilterCubic)
target_link_libraries(OpenGLESIMGTextureFilterCubic PUBLIC
PVRShell
PVRUtilsGles
)
|
{
"pile_set_name": "Github"
}
|
LIBRARY libclamunrar_iface
EXPORTS libclamunrar_iface_LTX_unrar_open
EXPORTS libclamunrar_iface_LTX_unrar_peek_file_header
EXPORTS libclamunrar_iface_LTX_unrar_extract_file
EXPORTS libclamunrar_iface_LTX_unrar_skip_file
EXPORTS libclamunrar_iface_LTX_unrar_close
|
{
"pile_set_name": "Github"
}
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.