text
stringlengths
1
3.78M
meta
dict
Knowledge Base Creating a Self-Service Advertiser account (as an existing Publisher) Created: September 7, 2015 /Author: Adcash Support If you have a website or app that you are already monetising with Adcash, a great way of boosting your revenue is to promote online. Rather than just relying on organic growth, spending some of your earnings on marketing your site or app will really help you drive users and boost your ad impressions, thereby making you more money. If you’re already an Adcash publisher, it only takes a few clicks to create an advertiser self-service account. To get started, just follow the steps below: Sign in to your adcash.com publisher account. Click on the Account tab, then, in the top right-hand corner you’ll see a blue button saying Create Advertiser Account. After clicking Create Advertiser Account you’ll see this dialogue box: Check the two confirmation boxes, select which currency you want to use for your advertiser account and then click create. That’s it, you’re done. You’re now ready to start advertising your site or app on the Adcash network! To get started, you can check out these articles to walk you through the process and how to optimise your campaigns:
{ "pile_set_name": "Pile-CC" }
The E4 allele of the Apolipoprotein E (ApoE) gene is the strongest genetic risk factor for the onset of sporadic Alzheimer's disease (AD) identified to date. The roles by which ApoE influences amyloid-beta (A2) metabolism and non-A2-mediated mechanisms in AD pathogenesis, however, remain to be fully clarified. The literature, and our preliminary data, suggest that early alterations in peripheral lipids (sphingolipids, fatty acids, cholesterol and cholesterol esters) reflect brain functioning and pathology, and may interact with ApoE genotype in the development of AD pathogenesis, warranting human studies. Clinical and epidemiological studies of short duration, while important, will not contribute to our understanding of the earliest phases of AD pathogenesis because Alzheimer's pathology (A2 plaques and neurofibrillary tangles) begins decades before the emergence of symptoms and substantial neurodegeneration. Identifying factors years before the onset of AD that may modify the effects of ApoE4 in initiating and promoting AD pathology and the subsequent emergence of symptoms will uniquely contribute to the development of prevention strategies. Longitudinal studies of cognitively normal individuals with serial measures of Alzheimer's pathology in the living brain, as proposed here in the unique cohort of the Baltimore Longitudinal Study of Aging (BLSA), initiated in 1958, are necessary to understand the relationship between ApoE4 genotype, perturbations in peripheral lipids, their interaction, and later development of AD clinical symptoms and brain alterations. The BLSA is one of few human studies that could provide the unprecedented opportunity to systematically examine this relationship over a long follow-up. BLSA participants, cognitively normal at their first visit in the study (mean age: 63.4), have a mean follow-up of 14.3 years (SD = 6.5) and a maximum follow-up of 38.9 years. In the proposed study we will measure plasma lipid levels (sphingolipids, fatty acids, cholesterol and cholesterol esters) at three early visit in the BLSA study, roughly 5 years apart, for those aged 55 and over (n=1095), and at the last visit, as well as during the neuroimaging sub-study. The specific aims include examining the proposed peripheral lipids, changes in these lipids over a long follow-up, and their interaction with ApoE to predict: 1) decline in tests of memory; 2) incident MCI, all-cause dementia, and AD; 3) change in serial MRI measures of brain atrophy and white matter lesion burden over 10 years; and 4) amyloid-beta deposition on 11C-PIB PET scans. The lipids will be assayed using an already-developed targeted and quantitative lipidomic approach. PUBLIC HEALTH RELEVANCE: Many potent risk factors for Alzheimer's disease (AD), including hypertension and high cholesterol, are most detrimental in mid-life, presumably at the emergence of AD pathology, but have less of an effect on AD risk in late-life. Identifying factors in mid-life that may modify the effects of APOE E4 in initiating AD pathology, and the subsequent emergence of symptoms, will uniquely contribute to the development of prevention strategies. The overall aim of the proposed study is to examine, in the 50-year Baltimore Longitudinal Study of Aging, whether plasma lipids measured in mid-life (sphingolipids, gangliosides, fatty acids, cholesterol and cholesterol esters) modify the association between APOE and cognitive decline, clinical onset of mild cognitive impairment or AD, and neuroimaging measures of brain atrophy and brain pathology.
{ "pile_set_name": "NIH ExPorter" }
Q: Generating function for the partition function Could someone explain what is the reasoning behind the following equality? Or maybe direct me to a proof of the following equality? $$\sum_{n=0}^{\infty}p(n)x^n = \prod_{k=1}^{\infty}(1-x^k)^{-1}$$ where $\sum_{n=0}^{\infty}p(n)x^n$ is the generating function for the partition function. A: For the basic generating functions in term of $(1 - x^k) ^ {-1}$, we can write them out as a infinite sum. $(1 - x) ^ {-1}$ = $1 + x + x^2 + x^3 + ....$ $(1 - x^2) ^ {-1}$ = $1 + x^2 + x^4 + x^6....$ $(1 - x^3) ^ {-1}$ = $1 + x^3 + x^6 + x^9....$ and so on. So $\prod(1 - x^k) ^ {-1}$ is just an infinite product of ($1 + x + x^2 + x^3 + ....$)( $1 + x^2 + x^4 + x^6....$)($1 + x^3 + x^6 + x^9....$).... The for each power term $x^n$, there is a corresponding coefficient p(n). And we need to sum up all these power terms.
{ "pile_set_name": "StackExchange" }
Q: Swap two characters in the cell array of strings I have a cell array of string and I want to swap A and B in a percentage of the cell array , like 20%, 30% of the total number of strings in the cell array For example : A_in={ 'ABCDE' 'ACD' 'ABCDE' 'ABCD' 'CDE' }; Now, we need to swap A and B in 40% of the sequences in A (2/5 sequences ). There are some sequences which do not contain A and B so we just skip them, and we will swap the sequences which contain AB . The pickup sequences in A are chosen randomly. I appropriate someone can tell me how to do this . The expected output is: A_out={ 'ABCDE' 'ACD' 'BACDE' 'BACD' 'CDE' } A: Get the random precent index with randsample and swap with strrep % Input swapStr = 'AB'; swapPerc = 0.4; % 40% % Get index to swap hasPair = find(~cellfun('isempty', regexp(A_in, swapStr))); swapIdx = randsample(hasPair, ceil(numel(hasPair) * swapPerc)); % Swap char pair A_out = A_in; A_out(swapIdx) = strrep(A_out(swapIdx), swapStr, fliplr(swapStr));
{ "pile_set_name": "StackExchange" }
The central theme of my research is the integration of robotics and humans. This interactionholds promise to facilitate critical advancementsin a variety of emerging domains includingmedical rehabilitation, physical therapy, and assistance of elderly and weak individuals. Pastrobots have been very successful at repetitive,position-control tasks, but interaction betweenrobotic devices and users has not been emphasized until recently. My research program addressesthis need in several promising areas such as the development of wearable robotic systems used inthe fields of medical rehabilitation and assistance, and the understandingof human navigation.My vision is to develop future generations of robotic systems that interact with, aid, and enrichhumans in medical and health care tasks.The principal challenge in order for robots tobe seamlessly integrated into the humanenvironment is to be able to achieve human-like characteristics for intelligence, motion, sensoryperception, and communication. Currently, robots do not store information and move in a safecompliant manner that interacts with the intentions of a user. They have limited intelligence tolearn and adapt and have difficulty communicating in a way that people find natural.I focus on the integration of robots to assist inrehabilitation and medical therapies, such asthe design of compliant spring actuators that can safely assist human movement, and thedevelopment of intelligent controllers based onhuman perception. (I am not focusing on othercritical areas such as intelligence and communication.) I am designing wearable robotic systemsfor stroke therapy, ankle prosthetic systems, and am collaborating with psychologists tounderstand human perception and navigation. I will outline 3 areas that I believe should beincluded into a Roadmap for Medical and Healthcare Robotics. 1. StrokeOver 750,000 people each year in the United States suffer from stroke which can lead toserious long-term disability. In order to assist stroke survivors, new robotic research has focusedon designing exoskeletons. Studies have recently shown that repetitive task therapy using robotsallow neural re-training of the brain. These new robots allow for therapy at home and in theclinic. They are also able to efficiently gather data.A key component to developing wearable roboticsystems is the development of new actuatorsthat can provide compliant force control. Theproblem with current designs are their low powerand energy density and complicated control methodology. New actuators are a key challengetowards realizing biomimetic wearable devices. Generally most systems use powerful activemotors instead of adaptable, compliant devices.Once robust, take home devices are designedand researched, a key challenge is useracceptance and diligence at performing the therapy. Keeping the subjects motivated will alwaysbe a challenge. Important research areas: designof exoskeletons, design ofintelligent controllersthat can adapt their assistance level, development of motivational robots, and development ofrobots that can easily communicate with users and therapists. 2. Prosthetic systemsBecause today’s body armor is very good, manysoldiers are living, but are returning fromIraq with loss of limbs. In the civilian population, diabetes is growing rapidly causing manyindividuals to have limbs amputated as well.Today’s foot-ankle prosthetic devices are still largely passive and untunable. They typicallyuse rubber like springs or leaf springs madefrom carbon composite materials. They do notcontain powered elements that assist in locomotion. Amputees must rely on the limited spring-back passive devices provide and modify their gait to help propel themselves forward. Amputeescannot drastically change their locomotion conditionsdue to the unchangeableparameters of theirprostheses. Carrying heavy loads or transitioningfrom walking to running using a single deviceremains a challenge. Amputees frequently change from one device to another to meet theseconditions. Even though current powered systems represent a vast improvement from the rigidand damper based systems, they are inadequate for majority of high level amputees.Very sophisticated wearable robotics systemsare needed for the amputee population. Againsimilar challenges arise such as the need for powerful but lightweight and efficient actuators.Determination of the user’s intention is the greatest challenge. Researchers are using EMGsignals, neural interfaces, and Bions. 3. Studying Human Navigation – Collaboration with Psychologists “Robotics can also be used to augment and stimulate basic science to understand human health.The ability to create a robotic system that mimics biology is one way to test and possiblydemonstrate that we know how the human body and brain function.” Biomimetic robotic systems can aid researchersin biology and psychology to understand humanperception. We have found that mobile robots using human, perception-based algorithms caninstantiate the perception based research of psychologists. Interdisciplinary teams can testperception algorithms on robots to see if they are viable and roboticists can point to differentperception algorithms that are more feasible whenimplementing them on hardware. In this oneexample, medical systems could be developed for the visually impaired. 4. My expertise to the panel is in systems design,development, and control. I am developingexoskeletons for stroke survivors and transtibial amputees. I have served on SBIR panels onmedical assistance devices. I look forward to contributing to the panel in any way and amvery interested in the final results.
{ "pile_set_name": "Pile-CC" }
The Poetry of Limits states a hommage as well as a quest - a tactile exploration of spatial experience synchronized with a momentum of reassurance. Space is seen as a condition and relation, not as a location and ? as our bodies are thrown into motion - we continously construct it within a process of self-awareness and awareness of others. Positioning within space is positioning in beeing, a mutually dependency of body and space. Our hands are ours when they touch. Where to will our touch reflect? How warm will be the space between resistance and amplitude?Exploring limits is a journey, an exploration of our abilities to detect the outside, the other, the others. Limits are ephemeral. Limits are grammar, structuring layers of individual textures and contexts. Limits are fine lines (perforated ones) seperating, and at the same time defining inside and outsides, me, you, us. Limits are positioning and fixpoint to reach out to the universe. Within these video we try to explore our responsibilities to set and respect limits and be creators of space itself. We decided to use a not fully saturated color mode as a metaphor of a never-ending continuous process. The milky blue and translucent filter as well states our perception of limits within their latent state, revealing and dissolving in a dynamic way.
{ "pile_set_name": "Pile-CC" }
Q: System boots to a black screen after upgrade to 11.04 I was a similar situation to this user: Dual Boot 10.10 and 11.04 can't boot into 10.10 after an update Only many more GRUB entres. Natty still worked - and I could still access the natty partition, until I ran sudo apt-get dist-upgrade to install a kernel update. Now trying to boot natty gives me a black screen. Booting into the same kernel in 'recovery mode' gets me a little further: Plymouth appears and pressing any key shows me that it's stuck at 'CUPS printing... OK'. A: For Maverick users who have NVIDIA and/or ATI graphics together with activation of graphics drivers in the Additional Hardware Window are likely to suffer from the issue as described in the question. These drivers (especially nvidia) create a file called /etc/X11/xorg.conf. This file gives details about resolutions and describes the actual driver in use. However, during the upgrade to Natty, the file remains in place - but the proprietary driver from NVIDIA is replaced by an open-source driver called nouveau. Since the file is still in place, the underlying graphics system called "X" still tries to invoke the old NVIDIA driver because its relying on the instructions in the xorg.conf file - the NVIDIA driver is not there resulting in black-screens etc. For these users, the suggested route is to remove this file BEFORE upgrading. However, this can be overcome by booting from a Live CD - the desktop CD. Start a terminal and type gksudo nautilus then navigate to the folder /etc/X11/xorg.conf on your local hard-drive and either rename it or remove it.
{ "pile_set_name": "StackExchange" }
I just returned from the International Quilt Market trade show in Houston, and my head is buzzing with ideas. There was so much to see: so many colorful booths filled with the latest fabrics, embellishments, and tools for quilt making . Stitch Editor Amber Eden (left) and I make like mummies at International...
{ "pile_set_name": "Pile-CC" }
The role of executive function and social-emotional skills in the development of literacy and numeracy during preschool: a cross-lagged longitudinal study. The majority of evidence on the interplay between academic and non-academic skills comes from high-income countries. The aim of this study was to examine the bidirectional associations between Ghanaian children's executive function, social-emotional, literacy, and numeracy skills longitudinally. Children (N = 3,862; M age = 5.2 years at time 1) were assessed using direct assessment at three time points over the course of two school years. Controlling for earlier levels of the same skill, early executive function predicted higher subsequent literacy and numeracy skills, and early literacy and numeracy skills predicted higher subsequent executive function, indicating that the development of executive function and academic skills is inter-related and complementary over time. Early literacy and numeracy predicted subsequent social-emotional skills, but early social-emotional skills did not predict subsequent literacy and numeracy skills. The findings provide longitudinal evidence on children's learning and development in West Africa and contribute to a global understanding of the relations between various developmental skills over time.
{ "pile_set_name": "PubMed Abstracts" }
1. Introduction {#sec1} =============== The role of growth hormone (GH) in growth promotion is well known by clinicians, however, less appreciated is its effect on metabolism in the well state. In 1936, Bernardo Houssay, M.D. in the New England Journal of Medicine, proposed that the anterior pituitary gland after the liver and pancreas plays a key role in glucose metabolism. That key role was later shown to be due in part to GH \[[@B1]\]. The effect of GH on glucose metabolism involves two phases: an initial phase which involves a decrease in glucose (an insulin-like effect) and a second phase which includes its effects on gluconeogenesis and fat mobilization \[[@B2]\]. In both states of growth hormone deficiency and excess, these effects on glucose metabolism will be altered. Altered glucose and fat metabolism are important components of fatty liver (FL) and type 2 diabetes (T2DM), both states of hepatic insulin resistance (IR). In fact, a seminal case of fatty liver (FL) resolution with GH administration in a 17-year-old patient with panhypopituitarism treated initially with levothyroxine and hydrocortisone alone was reported by*Takano*et al. in 1997 \[[@B3]\]. This suggests that GH treatment of T2DM which may be associated with GHD has the potential to reduce the IR which may be present. We outline a case of untreated childhood onset growth hormone deficiency (CO-GHD) who presented with type 2 diabetes mellitus (T2DM) and also steatohepatitis. We discuss her management and evidence from the basic sciences and clinical studies which show that her presentation with T2DM and steatohepatitis was likely associated with untreated GHD and that with GH supplementation her condition was ameliorated. Lastly, we discuss the implications of this case. 2. Case Presentation {#sec2} ==================== A 17-year-old nonobese Caucasian female who had a history of a medulloblastoma diagnosed at 7 years of age was treated with radiation therapy. She subsequently developed TSH and GnRH deficiencies. Though GHD was suspected based on height (z-score of -- 3.1; see [Figure 1](#fig1){ref-type="fig"}), treatment had not been initiated based on the initial management focus being to treat her medulloblastoma. At 15 years of age when her bone age showed full skeletal maturity, her parents were informed that GH therapy could not be pursued because her linear growth was complete. On presentation, the patient\'s height was 141.3 cm (z= -3.1) and weight was 53 kgs (36^th^ percentile for age). Body mass index was 25.8 kg/m^−2^ (86^th^ percentile for age). Surveillance labs done at the oncology clinic showed glucosuria. Further testing showed HbA1c of 9.6% and on another day her fasting glucose was 277 mg/dL. Based on these results, diabetes mellitus was diagnosed. When glutamic acid decarboxylase (GAD-65; Esoterix), islet-cell (Esoterix), insulin (Esoterix), and zinc transporter 8 (ARUP Laboratories) antibodies as well as DNA panel for maturity onset diabetes of youth (MODY) genes (HNF4*α*, GCK, IPF1, HNF1*α*, and HNF1*β*, \[Athena Diagnostics\]) returned all negative along with an elevated fasting C-peptide level of 3 ng/mL (normal: 0.4 - 2.1), T2DM was diagnosed. With the initiation of traditional basal/bolus insulin therapy using conventional dosing, a rapid escalation to peak total daily insulin dose of 2.9 units/kg/day (\~ 155 units/day) was required to treat her refractory hyperglycemia. Treatment nonadherence was thought to be the unlikely cause of her increased insulin requirements based on the agreement between her insulin dosing and prescription refill data. A comprehensive evaluation for conditions associated with IR was negative. However, based on Arginine/Clonidine stimulation testing showing peak GH level of 0.8 (normal: ≥ 10 ng/mL), a diagnosis of GHD was made. GH supplementation was initiated at 0.3 mgs daily and titrated based on IGF-1 levels. After GH was started, her systolic and diastolic blood pressures (BP) which were mildly elevated between 124-136 and 77-89, respectively, became more normal. Despite this, lisinopril 5 mgs once daily was added for microalbuminuria. With the diagnosis of T2DM and our patient having a significant family history of adverse cardiovascular risk factors, she was started on atorvastatin 10 mgs once daily. Within 2 months of therapy, her LDL cholesterol (LDL-C) decreased to 74 mg/dL. [Table 1](#tab1){ref-type="table"} shows serial lipid profiles. Though her diabetes was not fully reversed with GH, her HbA1c decreased to 5.9% and 5.8% at 6 and 19 months, respectively. Her insulin therapy requirement decreased to 1.9 units/kg/day (\~ 100 units) at 12 months after the start of GH. Magnetic Resonance Imaging (MRI) of the brain and abdomen indicated a small anterior pituitary gland and liver masses, respectively. Liver biopsy showed steatohepatitis with bridging fibrosis ([Figure 2](#fig2){ref-type="fig"}). With GH therapy, her liver transaminases trended to normalcy ([Table 1](#tab1){ref-type="table"}). Repeat MRI abdomen at 20 months after the start of GH showed stability of the liver lesions when compared to that done at 14 months. These hyperintense lesions like the initial ones were located in the liver\'s parenchyma and the appearance of the liver was otherwise normal. With GH therapy, the patient\'s stamina improved. She was now able to work for 20 hours weekly without becoming fully exhausted and her Quality of Life-Assessment of Growth Hormone Deficiency in Adults (QoL-AGHDA) and Quality of Life Satisfaction (QLS) scores, both questionnaire-based, improved ([Figure 3](#fig3){ref-type="fig"}). 3. Discussion {#sec3} ============= This case demonstrates that GH supplementation in an adolescent with CO-GHD led to improvements in transaminases, insulin requirements, and glucose control. Several mouse models have corroborated the association of GHD with IR. In mice with liver GH receptor (GH-R) knockout, metabolic syndrome (MetS), steatohepatitis, increased inflammation, liver fibrosis, and hepatic tumor develop \[[@B4]\]. Additionally, a similar mouse model resulted in hyperinsulinemia, hyperglycemia, and IR. With the restoration of the liver\'s IGF-1 expression, there was an improvement in both insulin sensitivity and serum lipid profile. This, however, did not protect against hepatic inflammation induced by steatosis. This shows that GH and not IGF-1 directly affects lipid uptake and lipogenesis \[[@B5]\]. Also in a prior study again involving a liver specific GH receptor knockout mice, de novo lipogenesis was increased; however, this increase was not associated with the classic insulin mediated pathway \[[@B6]\]. So, our patient\'s IR and hepatic steatosis can be explained by her GHD based on data from some studies as well as the effect of GH in inhibiting this. Evidence for the association of hepatic steatosis with GHD is also provided by the abnormalities involving the downstream pathway of GH signal transduction. Mice with hepatocyte-specific deletion of Janus kinase 2 (JAK2L), involved in the postreceptor phase of GH signaling, were lean but had FL. They also showed increased levels of GH, triglycerides, and plasma free fatty acids. Since GH in some instances can cause lipolysis, GH-deficient*little*mice which were crossed to JAK2L mice had both a rescuing of the FL and an increased expression of a fatty acid transporter \[[@B7]\]. Though this provides a mechanism for the FL observed with the liver specific disruption of GH signaling, in the same mice, elevated GH levels occurring as a consequence of disrupted signaling can cause an increase in resting energy expenditure \[[@B8]\]. In this situation, steatohepatitis is prevented based on increased fatty acid utilization. So the putative lipolytic action of GH can be offset by hyperinsulinemia; hence, the action of GH is variable and depends on the physiological context. Additionally, mice with signal transducer and activator of transcription (STAT) 5 mutations, another downstream signal from GH, also develop steatohepatitis \[[@B9]\]. Since pathologies involving the downstream pathways in GH signal transduction are associated with steatohepatitis, this supports the role of GH in lipid metabolism and the notion that the FL changes in our patient may be due to GHD. Clinical reports about Laron syndrome, primary GH insensitivity involving a molecular defect in human GH-R, have also documented the development of FL, IR, and T2DM \[[@B10]\]. In addition, men with hypopituitarism have a high prevalence of nonalcoholic FL disease (NAFLD) in the absence of GH therapy. When these men were treated with GH, there was histological improvement in the liver. This demonstrates that NAFLD is predominantly attributable to GH \[[@B11]\]. Though a follow-up liver biopsy was not done, the trend to normal in our patient\'s transaminases ([Table 1](#tab1){ref-type="table"}) supports the effect of GH on the liver and the likelihood that these changes were induced by GHD. Since our patient\'s steatohepatitis improved with GH treatment, she likely had a reduction in her hepatic IR. The evidence for this was seen in her decreased insulin requirements. This reduction in IR also was associated with her decreased blood pressures and these decreased pressures can be explained since IR negatively impacts endothelial cell function \[[@B12]\]. Moreover, the decrease in our patient\'s insulin resistance may also be explained by the positive impact of GH on *β*-cell function which is well described. In adults with lifetime congenital untreated GHD, there is reduced *β*-cell function \[[@B13]\]. In children with GHD who are supplemented with GH, *β*-cell secretory capacity is enhanced \[[@B14]\]. Additionally, studies in mice have shown that, with isolated GHD, *β*-cell function deteriorates. This deterioration is not due to changes in *β*-cell mass \[[@B15]\]. Studies by*Nielsen* et al. have shown that GH stimulates *β*-cell proliferation, glucose induced insulin release, and insulin gene expression*in vitro*\[[@B16]\]. These also provide a possible mechanism for the decrease in our patient\'s IR. Atorvastatin was added to our patient\'s treatment because although an amelioration of her LDL-C was expected with GH therapy, this did not happen. Plausible explanations for this include a genetic basis for her hyperlipidemia. This could have been superimposed on an accumulated adverse CV risk profile which developed based on the time period of her untreated CO-GHD \[[@B17]\]. Atorvastatin was also added to her treatment as well since based on her history of T2DM, her LDL-C levels needed improvement. Based on the points discussed, with evidence from adult studies, clinical reports, and, more recently, mouse models (even with the lack of pediatric studies, especially long-term ones) explaining the important contribution of GH to normal lipid and glucose metabolism, there is enough data to reinforce the benefits of treating GHD even when linear growth is completed. Pediatric clinicians should highlight and reinforce that GH supplementation has the potential to prevent adverse metabolic consequences in untreated states of severe deficiency. Also important is the fact that, even with growth cessation, supplementation with GH may improve QoL-AGHDA and QLS scores \[[@B18]\]. These questionnaire-based scores address the impact of GHD on issues of relevance to patients with GHD and can be useful for tracking the patient\'s response to treatment. The QoL-AGHDA tool addresses the general impact of GHD on each patient whereas the QLS score accounts for the level of importance which each individual may place on the issues affecting his/her life and gives a summarized weighted score based on these. In conclusion, this case illustrates not only that both NAFLD and T2DM are potential associations of untreated GHD but also that they may represent points along the natural history of hepatic IR secondary to untreated GHD. Furthermore, clinicians should ensure that patients with CO-GHD are not only treated in childhood but also appropriately transitioned to adult GH dosing after growth has ceased. This is important as GH can have a crucial role beyond the period of linear growth. With delayed GH initiation, it is possible that, with irreversible hepatic injury (such as bridging fibrosis in this patient), there may not be total amelioration of the metabolic manifestations seen in patients with GHD. The authors would like to thank Robert Hoffman, M.D., for his critical review of this manuscript. Additional Points ================= *Learning Points.* (i) Growth hormone is integral to both glucose and lipid metabolism even after the period of linear growth. (ii) Insulin resistance (IR) can be a feature of untreated growth hormone deficiency (GHD). (iii) Hepatic steatosis and type 2 diabetes mellitus (T2DM) being both hepatic IR states could be a feature of the natural history of untreated GHD. (iv) While growth hormone supplementation may ameliorate IR seen in the setting of T2DM and GHD, it is likely that delayed supplementation may not fully ameliorate IR if simple steatosis progresses to steatohepatitis with fibrosis. Ethical Approval ================ No IRB approval was required by our institutions. Consent ======= Consent was obtained from the patient prior to the submission of this publication. Conflicts of Interest ===================== The authors have no conflicts of interest relevant to this article to disclose. Authors\' Contributions ======================= Rohan K. Henry and Ram K. Menon contributed to drafting the article. Rohan K. Henry contributed to the critical revision of the article. All authors approved the final version of the article to be published. ![Patient\'s weight for age and height for age on CDC growth charts after being 17 years old.](CRIE2018-4748750.001){#fig1} ![Slides from the patient\'s liver biopsy.**(a)** Low power liver section,**(b)** ballooning hepatocyte degeneration, a feature of hepatic cell death, and**(c)** intervening fibrous tissue seen as a terminal stage of liver injury. These all constitute steatohepatis with moderate steatosis.](CRIE2018-4748750.002){#fig2} ![The patient\'s Quality of Life (QoL) scores with time. QoL-AGHDA: Quality of Life-Assessment of Growth Hormone Deficiency in Adults. QLS: Quality of Life Satisfaction. ~1~A decrease in score for QoL-AGHDA indicates an improvement in QoL-AGHDA, whereas an increase in QLS indicates an improvement while taking GH therapy.](CRIE2018-4748750.003){#fig3} ###### Some of the patient\'s lab tests with reference to growth hormone start. TEST RESULT REFERENCE RANGE -------------------------------- -------- ----------------- ----- --------------- **Aspartate aminotransferase** 92 36 33 \< 40 U/L **Alanine aminotransferase** 87 24 56 15- 50 U//L **Total Cholesterol** 247 99 132 95- 195 mg/dL **HDL Cholesterol** 32 27 43 40- 58 ng/dL **LDL Cholesterol** 171 57 65 73- 117 mg/dL **Triglyceride** 267 70 120 20-200 mg/dL **IGF-1** 74 146 294 121-566 ng/mL [^1]: Academic Editor: Lucy Mastrandrea
{ "pile_set_name": "PubMed Central" }
Barely a month goes by without someone muttering optimistically about what Apple might be planning with Apple TV, or talking up how set top boxes, smart TVs and even game sticks could eventually usurp consoles as our living room gaming systems.The assumption seems to be that the technology at the heart of the current (and future) generation of these devices is already more than powerful enough to produce a great gaming experience.But while that's true, the appetite from the industry to support these platforms seems to be limited to say the least.A less polite assessment of the scene as it stands is that it's a bit of a joke. It's now a full year since Apple last updated its Apple TV range, and the initial momentum behind it - from a gaming perspective - has dwindled to a crawl.A year ago, Apple received plenty of praise for the promise of AirPlay gaming, with groundbreaking apps like Real Racing 2 showing the promise of dual screen gaming fully nine months before the Wii U came along and showed the world how to do it properly.After the initial flurry of support from a couple of dozen of games last Spring, it was evident that developers weren't focusing on AirPlay gaming at all.At least in part, this collective industry shrug was because Apple made it a strangely convoluted process for gamers to access this innovative feature, but also no doubt because of the control lag that tended to blight the experience.It was perhaps telling that Real Racing 3 launched a couple of weeks back without the much-trumpeted feature. If Apple's not getting behind the feature, why should anyone else?You'd imagine that other platforms would be taking full advantage of Apple's disinterest, but it's just as bad in smart TV land.Take the latest range of Samsung Smart TVs.In terms of design and functionality, they're a thing of great beauty. And if the bundled version of Angry Birds is anything to go by, they're fully capable of running familiar gaming apps in HD without really breaking sweat.Who knows what else these TVs could run? It's hard to tell, because right now the only other games available on the system are junk free apps that were considered crap in the early noughties. Why is there so little gaming content available? No-one's saying.Meanwhile, there are plenty of other set top boxes dabbling in the app gaming market with varying degrees of commitment.The Apple TV-esque Roku is one such example that I've played around with lately, and is probably one of the few to consider the potential outside of basic TV, movie and music streaming.Without delving too deep, you can find the likes of Fieldrunners, Storm In A Teacup, Pac-Man CE, Super Stickman Golf alongside the ubiquitous Angry Birds games.Sure, it's hardly going to keep Sony, Nintendo and Microsoft up all night, but it has always seemed like a no-brainer to offer simple games like these to the millions of casual gamers out there.Taking that a step further are upcoming platforms like Ouya and PlayJam's GameStick, which plan to take full advantage of the oceans of Android-compatible content out there.But while being able to access a vast catalogue of great games is theoretically attractive to gamers, both devices involve investing in another platform.I can't help but think that if you're that bothered about playing Android games on a big screen, you'll hook up your existing device to a TV and maybe grab a third party controller.To make this rather peculiar segment of the games market work for everyone, there needs to be an ease and ubiquity to it that is currently lacking.Only Android and iOS can legitimately claim to offer this to consumers, and the moment a TV or set top box takes advantage of this, consumers will doubtlessly get on board in compelling numbers.The basic point is that millions of consumers have spent years buying games and apps, and don't really appreciate having to start over.If they can seamlessly integrate their apps and purchasing history with that device without arbitrary gouging and penalties, they will gladly remain within that expanding content ecosystem.Apple must know this all-too-well. Like many millions of people out there, I've been locked into its ecosystem for years. With apps, it's approaching five years, and with other content it's nearly ten.However much I might like the look of a Galaxy S III or Windows Phone 8 device, I'm not going to kiss goodbye to that content archive lightly. The moment Apple pushes the button on a proper gaming-capable Apple TV, it's going to be extremely difficult to resist getting involved.I'm fully invested, and so are millions of others.But right now it's all ifs, buts and maybes. People might report on the latest rumours and try valiantly to read between the lines, but such all-encompassing entertainment systems won't launch until all the dots are joined up.In this case, these involve convincing vast, unyielding, unwieldy old media giants to buy into the idea, while also making devices cheap enough for us to want to replace our existing kit.Whoever manages to make this nightmarishly complicated scenario work internationally deserves to win, frankly. Until then, let's continue to endure this fractured no-man's land and wonder how it's all going to pan out.
{ "pile_set_name": "OpenWebText2" }
Welcome to the Rivers of Grue – Citadel of the Elusive White Rabbit, L.H. Grey, and Keeper of the Crimson Quill, Richard Charles Stevens. Our humble home is yours too and we trust you will enjoy your stay here. Feel free to dive into any one of our rabbit holes and we'll see you on the other side. Post navigation Suggested Audio: Like, what’s going on man? Scoobs? Old buddy, old pal? Zoinks! Something tells me this is gonna be a long night. Who’s bright idea was it to spend the night in a supposedly haunted house anyway? Don’t go looking at me as I was the first person to get the chilly willies when we pulled up outside this place and would much rather have just stayed in the van. If that makes me a chicken then… bwok, bwok, BWAK! I may have a yellow belly but I also have a fair idea what plays out in these kind of creepy mansions and it traditionally entails having the pants scared off you. I mean, what kind of name is Bloodstone Manor if not as sinister as hell? I’d already told Fred that me and Scoobs don’t go near places with spooky, haunted, forbidden or creepy in the name but I guess I should have been more specific. There’s little appeal to me in any building that contains pictures with eyes that follow you around or suits of armor that try and get the sneak on you every time your back is turned. But do you think Fred listened? Of course Fred didn’t listen and do you know why that is? It’s because Fred never listens once he’s got an idea in his head and it always seems to lead us to hell holes like this. To be fair, we did put it to the vote and it was a close-run thing. Naturally Daphne was up for it as we all have a fair idea what goes on between her and Fred behind closed doors. Scoobs had his eye on a foot long pastrami sub he’d spotted at the last service station we passed and raised his paw for turning back without a second’s delay. So the casting vote was left down to Velma and I had high hopes for a 3-2 swing in our favor as everyone knows the dorky chick in glasses gets it first. What I didn’t realize was that Velma has been taking self-defense classes in an attempt to shake her nerdy image and this overnight stay presented her the ideal opportunity to be part of the “cool gang”. Alas, while me and Scoobs may be a lot of things, hungry mostly, that list doesn’t happen to include cool. The decision was made, The Mystery Machine parked right outside the front door just to let any resident ghouls know we were coming, and into Bloodstone Manor we ventured. That was an hour ago now and it took only a fraction of that time for strange things to start happening. First Fred and Daphne wandered off together to investigate, although there was not a lot peculiar about that one. What I did find odd was that, ten minutes later, they still hadn’t returned. It usually takes Fred around 180 seconds to do his business and there’s often a wet patch in his pants before they’ve even made their excuses. Something didn’t feel right, and when something doesn’t feel right, it’s normally because it’s like wrong. I may not be the sharpest fork in the cutlery set, but I know a five-strong bloodbath when it’s brewing. When I die, I want to be in my early fifties and midway through a hamburger, not shut in an Iron Maiden in some medieval torture chamber. That’s no way to go. Scoobs would already be long dead by then anyway, but I’m fairly certain he wouldn’t choose this demise either. Couldn’t we just slip out for a quick bite to eat and leave Velma to hold the fort? No slap up meals, just a quick Scooby snack or two to raise morale before we rid this place of its evil. Velma? Old buddy, old pal? I believe “Zoiks!” was the term used to explain my unease as I glanced around for Velma’s blessing and was greeted by a chilly silence. No Fred, no Daphne, and now no Velma either – unless my pocket calculator was busted, that left just me and Scoobs right? That’s not ideal when we were the only two opposed to this little moonlit masquerade in the first place. In situations like these it is customary for the spineless to huddle up in blind terror and shiver uncontrollably. It’s always seemed to work in the past. However, the suit of armor to my left had clearly moved at least six inches since we first let ourselves in and that was all the clue required to look my old pal dead in his puppy dog eyes, calmly exhale a breath, and scream “RUN SCOOBS!” at the very top of my voice. At this point, it becomes every man or dog for themselves, and the only priority is finding a hiding spot before the axe falls. Fortunately for us, we both had the exact same idea. Fred always said we share a brain but I’d put our dual arrival in the pantry down to our joint appreciation of dairy produce on this occasion. What can I say? We get peckish when we’re scared. Can I tell you a secret? It’s actually more like the munchies. Come on, tell me you haven’t noticed the thick smoke billowing from the van when me and Scoobs are on our snack breaks or heard Buffalo Soldier playing on loop. We reserved the right to pack out the bong the very moment Fred had the bright idea that we should all solve mysteries for a living. The downside to getting high is the whole paranoia gig and that isn’t helped by three of your friends going missing in close succession. The pantry seemed like the thinking man and dog’s choice, or at least, it was until Scoobs let his shattered nerves get the better of him. You ever had your leg humped by a Great Dane in a confined space and pitch darkness? Man’s best friend I’m down with, but I distinctly recall never once mentioning benefits. Needless to say, I found the whole experience deeply uncomfortable but, if it was good for Scoobs, then there was simply no choice but to grin and bear it. I think they call it taking one for the team. From what Fred tells me, Daphne takes plenty. Five whole minutes this went on and I was starting to feel a tiny bit used, when the leg humping just stopped without warning. I didn’t know whether to be relieved that the ordeal was finally over or annoyed at yet another pair of corduroys being fit for the bin. But there was a third emotion doing the rounds as I was suddenly more than aware that I might actually be alone. Either Scoobs had fallen asleep on the job or I’d been well and truly diddled by my best friend in the whole wide world. Whatever the reason for his disappearance, this is easily tied for the most terrifying day of my life. Tied with what, you may ask and I won’t keep you waiting for an answer. Tied with every other freaking day of my life! It’s not that I go looking for trouble. Okay, perhaps that’s not strictly true. But that doesn’t mean I want to find it. Without my old pal Scoobs to shake and shiver alongside me, I’m done for. Just another face on a milk carton. More importantly, I’m currently staring directly into a set of evil-looking eyes that say only one thing to me – G-g-g-GHOST! Andy and Mandy make dandy candy. Andy and Mandy make dandy candy. Have they gone yet? Like, what do I do? I know what Scoobs would say if he were here now. He’d say “raggy, rold me right” and I’d squeeze him so tight he’d suspect I was a seeded bun and break out the salad garnish before I could say “hold the anchovies”. But with Scoobs gone AWOL, there’s only one other four-legged friend I can call upon and I’d much rather refer to this pint-sized pooch as an acquaintance. It’s because of Scrappy-Doo that I keep my Facebook notifications turned off at all times. Do you have any idea how many times that dinky dork pokes me daily? He may be Scoob’s nephew, but he’s also the greatest irritant since the asbestos jockstrap and the very last mutt on planet earth and all orbiting stars I wanna be locked in the pantry with. It’s all well and good telling spooks you’re gonna rock ’em and sock ’em, but it helps if you can see above the low-level mist. I believe the correct medical term is “small man syndrome” but I’ve got a far better word for it and would compromise our PG-rating if I was to share that with you. Okay, you’ve dragged it out of me – he’s a cunt. Like, it actually felt pretty good saying that out loud. Scrappy, let’s face it. And I’m not being funny. I mean no disrespect, but you’re a cunt. You’re a cunt now, and you’ve always been a cunt. And the only thing that’s going to change is that you’re going to be an even bigger cunt. Maybe have some cunt puppies. Now fuck off back to your kennel before I strangle you with your flea collar, you little cunt. Like, did I just say that? Is this going out live? Zoiks! I don’t know what to say other than that I get like this sometimes when I’m hungry. Personally I never understood why we have to split up in the first place. I get that many hands make light work and that mysteries don’t solve themselves. But me and Scoobs ain’t like the others. Searching for clues is all hunky dory when trying to locate the nearest Domino’s but not so fun when it involves rattling chains and things that go bump in the night. Whatever was shuffling around in that pantry with me back there clearly wasn’t looking for someone to play Scrabble with. It was trying to decide how to strip the skin from my bones and I kinda like that where it is. Oh Scooby-Doo, where are you? The others I can live without, but not you. Not my old buddy… old pal… old friend. Please Scoobs, give me a sign. Or alternatively you could just continue your vow of silence and leave me to clean up all this mess, which appears to be the state of play here. I get it. Let’s all dump on Shaggy, shall we? You think I haven’t heard the cruel jibes? Oh look, here comes Norville Rogers. Quick, offer him an eggplant burger and he’ll dress up like a French maid and varnish your mahogany. It makes me sick to the very pit of my stomach and perhaps that would explain the explosive diarrhea I’ve been suffering. Well I’m like just about done with it. Who cares if the curator of Bloodstone Manor is acting ever so slightly sinister? So what if the library books have a life of their own? Big whoop if things have a tendency to go bump in the night. You should try catching a solitary wink of sleep in the Mystery Machine when Fred and Daphne are going at it hammer and tong. I’d much rather be hanging out with Captain Caveman. He may be like Neanderthal, but at least he’s got a trio of hot chicks on the payroll. Can I get a “Zowie” girls? I don’t know why I’m even bothering. No girl gives me a second look unless she mistakes me for Matthew Lillard and that happens more than you’d think. If Brad Pitt decides to grow a goatie, everyone’s all like “me so horny” whereas three weeks of stubble for me equates to a thorough pounding outside 7-Eleven and not so much as a sympathy screw for my troubles. Why else do you think I binge eat daily? I wouldn’t mind but I only have one set of clothes as the van’s filled up with all Daphne’s crap. I happen to be rather fond of brown corduroy but it was a far more potent weapon back in the sixties, when it was still vaguely fashionable. I distinctly recall the dude in the thrift store saying “these will get you laid sonny”. That was seven freaking years ago and the closest I’ve come to action since was when Scoobs took one too many hits on the bong, mistook me for a twig, and buried me at the bottom of the garden. So you see, I’m done with it all and this is where the profanities come back into play, I’m afraid. Fuck Fred with his perfect hair, fuck Daphne with her shapely thighs and come hither eyes, fuck Velma with her Pythagoras rule, fuck Scooby for being related to Scrappy if for no other reason, fuck Bloodstone Manor as it’s a dank piss hole with lousy central heating, fuck the suit of armor that has been following me since I stepped into this cess pit, fuck the pair of eyes on that painting for looking at me funny, fuck Hannah & Barbera for saddling me with a group of narcissistic losers, fuck Fred Flintstone for driving around in a car with no engine, fuck his wife Betty for taking Dino for granted, and fuck The Jetsons for not once sending a postcard. Like, fuck the whole lot of them man. If anyone needs me, I’ll be back at the van rolling a big fat one. Should Scoobs get his act together, then he’s very welcome to join me in the festivities but I’ll be charging two bucks a puff from now on, just to be clear. What can I say? Inflation’s a bitch on heat my old buddy…old pal… old friend. Tell you what, bash Scrappy’s brains into mushy pulp with a lump of 4×4, sever his head with a rusty sickle, then return it to me while it’s still warm, and I’ll make it one fifty. Call it mate’s rates. That’s how I’m rolling. I’ve tried being the nice guy, the meddling kid, the harmless stoner, the affable dolt, the most stupid person in the room, the weakest link in the chain, the fashion disaster, the reason why the toilet’s blocked, the one least likely to succeed, and the man most destined to remain a virgin his whole life. Where did that get me? Fondled in some musty pantry and without a token happy ending in sight, that’s where. As for the whole mystery of Bloodstone Manor thing, well that’s some other poor sap’s problem. I’d recommend keeping an eye on the curator though as I caught him changing into a merman costume earlier whilst laughing to himself maniacally. He would’ve got away with it too, if it weren’t for yours truly. Speaking of which, that would mean I’ve cracked the case, would it not? With none of my four associates stepping up to claim the reward, that means the eggplant burgers are on me. Hell, may as well throw in some cheesy nachos while you’re at it. But hold the anchovies remember. So what do you say? Shall we get high and go beat the living twat out of Scrappy? I rock him, you sock him, everybody wins. Last I heard, we was hanging out with Pauly Shore and Rob Schneider in the reject’s lounge. And if we run into Matthew Lillard on our travels, I want my brown corduroys back dammit. I hear they’re like due to make a comeback. “Raggy?” Hold on. That couldn’t be Scoobs, could it? But I’d already written him off and blocked him on Twitter. I thought he’d abandoned me, left me to rot, forsaken his oldest friend in the world for a handful of premium dog biscuits. “Scoobs? Scooby Doo? Where are you buddy?” “Ri ron’t row” “What do you mean you don’t know?” “Ri’m rost Raggy” “Lost? Give me strength. Head for the light” “Rere ris ro right” “Then I’m sorry old buddy… old pal… old friend. But I can’t help you” “Rhat ro rou rean roo ran’t relp me?” “Bye-Bye Scoobs” “Raggy? Raggy? RAGGY RO!” That’s right punks, there’s a new Norville Rogers in town. From now on, I’d thank you not to call me Shaggy as I’ll no longer grace it with a dignified response. The new Norville Rogers wouldn’t think of associating with a sidekick who drinks out of the toilet bowl; neither would he waste his time solving pointless mysteries when he could be baking hash brownies and picking up cheap hookers in Chinatown. The new Norville Rogers is getting a shave, buying a pair of pea-green corduroys and brown T-shirt just to mess with your heads, and getting his balls out whenever he bloody well feels like it. You like got a problem with that? Then please feel free to take it up with Scrappy. I’m not even kidding. I’ll pay you. I don’t suppose you accept Scooby Snacks, do you?
{ "pile_set_name": "Pile-CC" }
Breastfeeding in Women on Opioid Maintenance Therapy: A Review of Policy and Practice. Opioid use is epidemic in the United States. Opioid use disorder (OUD) in pregnancy, as well as neonatal abstinence syndrome, has quadrupled in the last decade, and opioid maintenance therapy is recommended for pregnant women with OUD. Breastfeeding is an important means of improving outcomes for these vulnerable women and newborns. The purpose of this study was to review current policy on breastfeeding and opioid maintenance therapy, the rates of breastfeeding among women in this population, and facilitators and barriers to implementing policy recommendations. CINAHL, PubMed, the Cochrane Database of Systematic Reviews, Embase, and Web of Science were searched. Inclusion criteria included publication between 2013 and 2018, English language, human only, and original data (except for policy statements). Studies were excluded if they did not report original data and did not examine breastfeeding for women on opioid maintenance therapy. Eight policy statements and 17 original research studies were identified that met the search criteria. All the policy statements support breastfeeding for women who are stable on opioid maintenance therapy and do not have HIV. Despite this, rates of breastfeeding among women receiving opioid maintenance therapy remain low compared with women in the general population. Results of qualitative research indicates that women on opioid maintenance therapy face numerous barriers to breastfeeding, including misinformation from health care professionals. Quantitative research has only begun to identify interventions to improve breastfeeding outcomes in this population. Research was conducted primarily with white women receiving care at urban health care centers. Practice lags behind policy in terms of supporting breastfeeding in women receiving opioid maintenance therapy. There is a need for more research that includes African American and rural women on opioid maintenance therapy, as well as quantitative research that uses findings from qualitative research to identify the best possible interventions for improving breastfeeding outcomes for women on opioid maintenance therapy and their newborns. One significant need is for health care provider education regarding these policies as well as best practices for providing breastfeeding education and support to this population.
{ "pile_set_name": "PubMed Abstracts" }
12 things I learned from pitching VCs this past week - scrollinondubs http://www.scrollinondubs.com/2007/12/12/lessons-from-vc-pitches/ ====== dhouston good stuff. sam altman told us the most important thing for him was to remember #8 -- they need you as much as you need them. they _want_ to believe that you're the next google; think of how much it would make their lives easier if you were, and think of how hard it would be to spend your life saying no 90+% of the time and telling people their babies are ugly. they want to say yes. i'd also say spend a lot of time coming up with a story and framing your opportunity in the biggest possible way. this was something i really underestimated -- initially we'd just show a list of features and expect everyone to arrive at the vision we had in our heads, but really it's the other way around -- the features drive a more important story and vision. a story is also a lot easier for an investor to retell and get other people excited about than a laundry list of "um, it does this, and this, and this..." remember, VCs have to then turn around and sell their own general partnership on the idea, so give them the ammo they need to do this effectively. also -- practice your pitch until it becomes mechanical. not so much by standing in front of a mirror (though that helps too) but rather by debugging it with individual angels or mentors, so that by the time you pitch the investors you really want you've already seen most of the universe of possible objections and surprises and can handle them effectively. ~~~ scrollinondubs dhouston- good call on having a big story. The VC's could literally care less about the features of your product, they want to know how it's going to be thing that will be a common-place word in 4 yrs and you have to paint that picture vividly for them. I would disagree on the pitching in front of a mirror thing. And actually i should add this as #14- I recommend that you _don't_ have a scripted pitch. Have a deck of slides that serves as a framework for the conversation but just talk about it naturally. If you truly believe in it, this should become second nature and they'll smell the candidness whereas a scripted pitch comes off as brittle and less engaging. You want it to be anything but mechanical IMHO. sean ~~~ aswanson The pimped out mouse gives you instant cred, scrollin. ------ brlewis Much of this article seems like good advice about pitching in general, not only to investors. I like it. ------ jsjenkins168 Valuable lessons, thanks for sharing them! You mention in #4 that a quality referral is critical. Do you mind sharing your experiences meeting/using a referral to get face time with VCs? ~~~ scrollinondubs sure, in generic terms. Our lawyer was instrumental in getting 3 - we splurged a bit and hired a very reputable firm in Palo Alto that is well-connected. We paid more than we would have liked for the legal work a year ago but it's paying dividends now in terms of introductions. The other intros came from just random networking. We live in AZ but I drove my truck up to SF and couch surfed the past month just going to events, shaking hands and meeting people. I had a list of people I know through various user group involvement and presence on listserv's so i contacted them and tried to have a different lunch lined up everyday. I used Meetup, Upcoming and googled "Bay Area User Groups" and tried to lineup a different event every night. I actively used Facebook and my blog to solicit intros and tell people what I was doing, switching my network to Silicon Valley temporarily and finding events via that. I met great contacts at the Startup Weekend that was held in SF. And the whole time I was writing a series of posts on my trip essentially live-blogging it to meet more contacts. You can read those here if you're interested-> <http://www.scrollinondubs.com/tags/sfroadtrip> There is no "typical intro" to describe - they happened in the most unpredictable/serendipitous ways, but having the conversation-starter of "so I drove here from Phoenix and have been sleeping on friends couches so i can be in the mix for our startup" was a powerful lead-in to be able to talk with people and get them to listen. I know PG is a big fan of the idea you should really be in the Bay Area to give your startup the best chance of success. We have our company in AZ right now and moving wasn't an option so this was the next best thing we figured we could do. Definitely very happy with the choice. sean ------ davidw > one meeting that ran 30min over- the VC was deferring calls from his wife > who was waiting for him in the parking lot Nice guy:-/ ~~~ mrtron The wifey can complain when she is driving her new Bentley. Sometimes business has to come before pleasure, I know my lady would wait in the parking lot for 3 days if she knew it was important. But if I was a VC, I would give everyone X amount of time, but have a plan B to talk all day if things went well. ~~~ davidw It would have cost him nothing (and he's the one with the money, in any case) to say "hey, I'm running late, it's important, it'll be a while longer" rather than simply not answering, as the article seems to say. ~~~ downer Ah, but interrupting business for personal _looks bad_ ; and the thing about (possibly most) women is they _want_ you to have something that's more important than them. If you drop everything for them they won't respect you. So he did the right thing from both perspectives. Which is probably why he's rich and has a (presumably) hot wife. (I know that sounds politically incorrect, but alas, reality often is. To be fair, it probably works both ways: a man won't respect a woman who drops everything for _him_ , either.) ~~~ davidw I have a hot Italian wife, and would never leave her stewing like that. It's not about dropping everything for the other person - I don't think anyone can expect that. It's about picking up the phone and saying "sorry, got to keep you waiting, it's important". Communicating and managing expectations. It's a pretty minor quibble, I guess, but it just struck me as something rude. ~~~ scrollinondubs guys, lemme clarify this- when i said "deferring calls from his wife," he was politely saying "honey, gimme 15 more min" because he was so into it. It really wasn't rude at all and perhaps I should have better explained it or left that out altogether. sean ------ edw519 On a subject overflowing with "advice", this seems like a particularly helpful post. I especially like the running theme of "putting yourself into their shoes". Great stuff! Thank you.
{ "pile_set_name": "HackerNews" }
[Prevalence of hepatitis C virus markers in Polish blood donors in 1994-2003]. The results of serological and molecular screening tests for HCV performed by Polish Blood Transfusion Service between 1994 and 2003 are presented. Serological tests were performed in 4,233,119 donors. The average frequency of anti-HCV was 0,48%. The frequency of anti-HCV was higher in first time donors (0,86%) than in repeat donors (0,23%). In both groups a decreasing trend in anti-HCV frequency was observed--4% annually in the group of candidates for donors and 21% annually in repeat donors. Molecular methods for identification of HCV infection in serologic window period were introduced in 2000. RNA HCV was detected in 51 out of 2,915,299 (0,002%) anti-HCV negative plasma samples. The frequency of HCV infection markers is in Poland higher than in most European countries. However, a decreasing tendency of HCV markers detection, especially in repeat donors is observed.
{ "pile_set_name": "PubMed Abstracts" }
Q: Column is NULL when printed as individual field or column, filled when whole data frame is printed When I create a column of counts using dplyr, it appears to be filled correctly, until I try to use the counts column on its own. Example: I create this dataframe: V1 <- c("TEST", "test", "tEsT", "tesT", "TesTing", "testing","ME-TESTED", "re tested", "RE testing") V2 <- c("othertest", "anothertest", "testing", "123", "random stuff", "irrelevant", "tested", "re-test", "tests") V3 <- c("type1", "type2", "type1", "type2", "type3", "type2", "type2", "type2", "type1") df <- data.frame(V1, V2, V3) Then, I use dplyr to create a column of counts: df$counts <- df %>% group_by(V3) %>% mutate(count = n()) This gives the expected result: > df V1 V2 V3 counts.V1 counts.V2 counts.V3 counts.count 1 TEST othertest type1 TEST othertest type1 3 2 test anothertest type2 test anothertest type2 5 3 tEsT testing type1 tEsT testing type1 3 4 tesT 123 type2 tesT 123 type2 5 5 TesTing random stuff type3 TesTing random stuff type3 1 6 testing irrelevant type2 testing irrelevant type2 5 7 ME-TESTED tested type2 ME-TESTED tested type2 5 8 re tested re-test type2 re tested re-test type2 5 9 RE testing tests type1 RE testing tests type1 3 But, when I try to use the counts.count column in any way, the result is null: > df$counts.count NULL Same result for the other columns created by dplyr. But the rest of the data frame seems normal: > df$V1 [1] TEST test tEsT tesT TesTing testing ME-TESTED re tested RE testing Levels: ME-TESTED re tested RE testing test tesT tEsT TEST testing TesTing I am totally confused about why printing the whole df gives me a different output than printing just the column of interest. What am I missing here? A: If you rewind and recreate the dataframe and then don't do an assignment but just print the result to the screen you see this: df %>% group_by(V3) %>% mutate(count = n()) Source: local data frame [9 x 4] Groups: V3 [3] V1 V2 V3 count <fctr> <fctr> <fctr> <int> 1 TEST othertest type1 3 2 test anothertest type2 5 3 tEsT testing type1 3 4 tesT 123 type2 5 5 TesTing random stuff type3 1 6 testing irrelevant type2 5 7 ME-TESTED tested type2 5 8 re tested re-test type2 5 9 RE testing tests type1 3 If you now do the assgnment the structure is rather confused and I think you might have gotten a more informative error if there had been fewer unique values of V1 or V2: df$counts <- df %>% group_by(V3) %>% mutate(count = n()) # snipped what you already showed str(df) #----- 'data.frame': 9 obs. of 4 variables: $ V1 : Factor w/ 9 levels "ME-TESTED","re tested",..: 7 4 6 5 9 8 1 2 3 $ V2 : Factor w/ 9 levels "123","anothertest",..: 4 2 8 1 5 3 7 6 9 $ V3 : Factor w/ 3 levels "type1","type2",..: 1 2 1 2 3 2 2 2 1 $ counts:Classes ‘grouped_df’, ‘tbl_df’, ‘tbl’ and 'data.frame': 9 obs. of 4 variables: ..$ V1 : Factor w/ 9 levels "ME-TESTED","re tested",..: 7 4 6 5 9 8 1 2 3 ..$ V2 : Factor w/ 9 levels "123","anothertest",..: 4 2 8 1 5 3 7 6 9 ..$ V3 : Factor w/ 3 levels "type1","type2",..: 1 2 1 2 3 2 2 2 1 ..$ count: int 3 5 3 5 1 5 5 5 3 ..- attr(*, "vars")=List of 1 .. ..$ : symbol V3 ..- attr(*, "labels")='data.frame': 3 obs. of 1 variable: .. ..$ V3: Factor w/ 3 levels "type1","type2",..: 1 2 3 .. ..- attr(*, "vars")=List of 1 .. .. ..$ : symbol V3 .. ..- attr(*, "drop")= logi TRUE ..- attr(*, "indices")=List of 3 .. ..$ : int 0 2 8 .. ..$ : int 1 3 5 6 7 .. ..$ : int 4 ..- attr(*, "drop")= logi TRUE ..- attr(*, "group_sizes")= int 3 5 1 ..- attr(*, "biggest_group_size")= int 5 The format you are seeing is how R displays a matrix that is embedded in a dataframe. Objects of class table (and perhaps tbl?) inherit from the matrix-class.
{ "pile_set_name": "StackExchange" }
I cannot contain my excitement. I read a LOT as a kid. Tons. All kinds of stuff. I loved the older books, Cheaper by the Dozen, Nancy Drew, the intrepid Boxcar Children. You know what kids in those books often had? Green Stamps. Booklets, and stamps, and the store was involved, and you saved for stuff. Sisters fought with brothers over roller skates vs. microscopes. I remember wishing that somehow my grocery store would give me a microscope for collecting things. It’s possible the stamps were part of the war effort and my horrendous history education is confusing fiction with the era of women drawing lines on the back of their calves to emulate stockings. It’s possible romance novels have played too large a part in my history education. I’m still happy. Randalls is bringing back green stamps! For knives and stuff. I can’t believe I spent $80 there today and the damn thing starts tomorrow. More on that later. There was a reason, I swear. If you’re also now very excited, every $10 gets you a stamp. Stamps get you stuff. That’s all I know at this point because I’m a tiny blogger and Randalls isn’t sending me press releases (though they should, since I’m one of the few that hate them in a mocking way, rather that just hate them). Yes, I know it’s not a solid investment, But as someone that spends dollars at Randalls, between this and the gas rewards I’m amused by the weird way grocery pricing works. Here are the deals. Nothing too striking, just a few swipes at the Apple Wars to come. I hope you’ve stocked up on meat, since we’ve got a dry spell heading into the poultry bonanza of November. Cheep Cheep! Fiesta large avocados 69c/ea (C15) Fiesta long grain rice, 4lb sack $1.50/ea chicken drumsticks, large bag 39c/lb (Fiesta limit) center cut pork chops, bone in, value pack $1.79/lb (Fiesta limit) Randalls pork chops, assorted, bone-in, value pack $1.79/lb Pantry Essentials milk, gallon $1.99/ea Campbell’s condensed soup, selected varieties 50c/ea HEB red seedless grapes 87c/lb (DD) Gala, Fuji or Pink Lady apples 77c/lb (DD) organic Gala apples $1.97/lb (DD) whole pork butt or country style ribs $1.27/lb Sprouts seedless grapes 88c/lb (DD) cantaloupes 88c/ea (C15) organic Gala apples 98c/lb (DD) bulk oats 69c/lb frozen organic fruit/veg, selected, 12-16oz $2/ea Weekly Flyer Links
{ "pile_set_name": "OpenWebText2" }
I got back to watching the tape today of yet another loss. It’s becoming a familiar exercise, but to be fair, getting a result against the Galaxy at The Home Depot Center is a tall task. That said, the first 25-30 minutes were crazy one-sided. The field seemed tilted in the hosts’ favor and L.A. was playing in another gear. Per Coach Schmid’s postgame comments, I kept an eye out for defensive pressure and it was definitely lacking. That said, I thought there were some scattered good performances on offense. * * * STARTERS GK Kasey Keller — Was under pressure quite a bit early on. Handled some corner kicks well, but was troubled by one or two of ’em. Really couldn’t be blamed for any of the goals, but didn’t have any saves of note either, maybe the deflected Birchall shot. 5 D James Riley — The own goal was definitely unlucky and unfortunate. Truth be told, I thought he had a good night defensively. On the other side of the ball, however, it was very shaky. It took a second look to see it, but most of his passes and crosses were poor. Maybe playing 300 minutes in eight days will do that. 4.5 D Jeff Parke — Was fighting and scrapping with Buddle all night. Unfortunately the L.A. forward was his mark on the decisive corner-kick in the 19th minute. Had a handful of other shaky moments. It wasn’t all bad and he nearly headed in a corner kick at the end. 4.5 D Tyrone Marshall — Much improved from last game. Actually had several moments of solid defending — nothing flashy, just strong. Long balls from the back were above-average. Did get beat on the build-up to the third goal and is also one booking from a suspension after receiving a late yellow card. 5 D Leo Gonzalez — No chance he was going to get too involved in the attack with Donovan attacking from his side. Actually was a pleasant surprise in watching the replays. Had lots of critical tackles and saves. Very few mistakes. Did get caught ahead on the third goal allowed, much like he did against Philly when the goal came through the space he vacated. 5.5 M Patrick Ianni — Lots of giveaways. Also gave up a lot of space to Galaxy attackers. Committed a lot of fouls in the defensive third. Was slow to pressure Juninho on that wonder-goal, but it’s hard to determine how much blame goes on the defense after a strike like that. Always good for some headers won and should be considered a target on set pieces, but didn’t have a strong impact in the game I felt. 4 M Peter Vagenas (off 51′) — Probably earned the least amount of notes from me while watching the replay. Not what you want from the engine running things in the middle. Had some giveaways and passing wasn’t strong. Was also someone that gave away a lot of space in the middle. Got replaced pretty early. 4 M Freddie Ljungberg (off 83′) — I think it was probably the worst passing performance I’ve seen from him in a while, particularly because he’s set a high standard. Passes and crosses always seemed just a tick off. Combined well at times, battled well, had a toe-poke shot on goal. Definitely more involved in the middle later on. Think he’ll move back to a central role soon? I do. 4.5 M Steve Zakuani — In the live blog of the game, I think I was definitely too harsh on him after a second look. Had a slow start, but definitely finished stronger. Was more involved defensively than I remember, including in the extended build-up to his goal. Speaking of that goal, I thought it was a spectacular one-two. Had some good crosses and other moments. Needs to do better at winning balls that aren’t played perfectly to him. 6 F Fredy Montero — Another performance that was much better on a second look. Really did well when he had the ball, setting up his teammates. Very few giveaways. Was able to find Ljungberg on the right many times, also set up Noonan for a chance. Displayed tremendous patience and touch on the assist to Zakuani. This is his fourth game in a row with either a goal or assist. 6 F Pat Noonan (off 45′) — A rough night for him, I thought. When Jaqua isn’t in the lineup, he’s clearly the best offensive player in the air to battle for long balls, and he did that well. Produced nothing out of two great chances in the first half, whiffing on both attempts set up by Zakuani and Montero. Buddle wasn’t his mark, but might’ve challenged him stronger on the CK goal. Was taken off early. 3.5 SUBSTITUTES F Nate Jaqua (on 45′) — Does very well at controlling long balls and distributing. Strong in the air. Definitely seemed to play a part in Seattle changing the momentum of the game around the 60-minute mark. A step in the right direction I thought. 5.5 M Michael Seamon (on 51′) — Certainly could’ve produced better touches, passes and crosses in the offensive third. Killed some goal-scoring moments a couple times. That said was very active all over the field. Really the best box-to-box central midfielder that’s healthy right now. You can see why he’s rising up the depth chart. 5.5 M Miguel Montano (on 83′) — Provided some bits of skill and danger. Not really involved enough to earn a rating. Just wait for Wednesday… INC COACH SIGI SCHMID During the replay of the game, I saw he had a chat with Arlo White at about the 30-minute mark. He mentioned how he’d like to make a couple changes right then, which means he was probably questioning his own lineup choice at that time. His side wasn’t ready to play early on. Lack of energy combined with a defensive approach? I don’t know the exact reasons. Subs had an impact. Though the debate is if they — Jaqua with his fitness issues and Seamon’s inexperience — should be starting. 4 REFEREE SILVIO PETRESCU Again, no qualms from me. Seattle definitely hasn’t had the officiating to blame for this rough stretch. The Dallas game on the other hand… But I digress. I thought he was in control. Only had to pull out the cards late, which is a good sign for being in charge and keeping things cool. Seemed fair and was a forgotten figure, which is a high compliment. 7.5
{ "pile_set_name": "Pile-CC" }
Detection of Borrelia afzelii, Borrelia burgdorferi sensu stricto, Borrelia garinii and group VS116 by PCR in skin biopsies of patients with erythema migrans and acrodermatitis chronica atrophicans. OBJECTIVE: To evaluate the diagnostic performance of two polymerase chain reaction (PCR) procedures using skin biopsies of 20 erythema migrans (EM) and 24 acrodermatitis chronica atrophicans (ACA) patients. METHODS: One assay amplified a fragment of the outer surface protein (Osp) A gene. The second method amplified the spacer region between the 5S and 23S rRNA genes; hybridization of this fragment allowed identification of Borrelia burgdorferi sensu lato species. RESULTS: Among EM patients, both assays detected Borrelia DNA in 15 samples. Among ACA patients, the ospA PCR detected 15 positives and 10 samples were positive by 5S-23S PCR. In 19 samples one species was detected, 15 skin biopsies contained Borrelia afzelii, and Borrelia garinii was found in two patients. Group VS116 was detected in two EM patients, and therefore this group has pathogenic potential. Mixed infections of B. afzelii and B. garinii, group VS116 or B. burgdorferi sensu stricto were found in three EM and three ACA patients. CONCLUSIONS: Diagnosis of EM and ACA by PCR is useful and knowledge of the presence of species may be used to predict the course of disease or the need for further antibiotics.
{ "pile_set_name": "PubMed Abstracts" }
NEW YORK (Reuters) - Goldman Sachs Group Inc is expanding a financial advisory service for top executives to target millions of other affluent employees at some of the biggest U.S. companies, as it seeks to build its retail and wealth management businesses. FILE PHOTO: The logo of Dow Jones Industrial Average stock market index listed company Goldman Sachs (GS) is seen on the clothing of a trader working at the Goldman Sachs stall on the floor of the New York Stock Exchange, United States April 16, 2012. REUTERS/Brendan McDermid Goldman’s Ayco unit provides high-end tax and wealth advice to top executives at some 400 companies, including 60 Fortune 100 companies. According to the bank’s estimates these firms employ at least 8 million people and Goldman now wants them as clients, too. Goldman began rolling out a new Ayco personal finance website for rank-and-file workers in October and has so far signed up 70 companies. By the end of 2019, the bank hopes to have signed up around 100 companies, which employ 2 million employees, Larry Restieri, the unit’s chief executive, said in an interview this month. In recent weeks, it has also started pitching high-yield savings accounts and personal loans from its online bank Marcus through the Ayco website, Restieri added. The rollout is the latest effort of the Wall Street trading and advisory firm to reposition itself as a traditional bank. Goldman seeks to reach a wider customer base. Its trading business has been shrinking. In the first quarter, the bank’s corporate clients helped it grow mergers and acquisitions revenue but overall revenue slumped. Chief Executive David Solomon must deliver on a target of $5 billion in new annual revenue by 2020 or risk getting squeezed by rival behemoths like JPMorgan Chase & Co and Bank of America Corp . [tmsnrt.rs/2H81K9a] The bank took its first step toward that goal with the creation of Marcus in 2016. In March, Goldman announced a co-branded credit card with Apple Inc, which will connect it to hundreds of millions of iPhone users. Expanding Ayco is the next step into the $9 trillion U.S. mass affluent customer market and offers the bank an opportunity to gain new clients cheaply. The primary cost to the bank - developing the online platform - will be offset by fees companies will pay to offer the service to their workers, Goldman executives said. Some investors fret Goldman is expanding into an area where it has little experience. They worry the bank is making $40,000 personal loans and extending credit card debt to iPhone users when the economy is showing signs of slowing. Goldman thinks otherwise. Executives there say the Ayco expansion is part of a bigger plan, culminating with the launch of a retail wealth management offering later this year. Restieri said it is too early to put numbers on the contribution the expanded Ayco could make toward Goldman’s $5 billion goal. In November, the bank said that it was halfway toward meeting that target and that Ayco, along with private wealth management and asset management, had so far contributed $400 million. ONLINE QUESTIONNAIRE Ayco’s website, called Financial Wellness, starts with an online questionnaire. Employees of corporate clients such as Google’s parent Alphabet Inc answer questions like, “Do you generally live within your means?” and “Do you have an emergency fund?” After workers answer questions about their savings, credit card debt, student loans and other finances, Ayco offers what it calls solutions such as Marcus savings accounts, personal loans or products from other financial institutions. Adoption rates are a question. One company that offered a financial incentive got as much as 60 percent of its employees to use Financial Wellness. Others have seen lower pick-up rates. But as Ayco rolls out its mass-market offering, Restieri thinks it will benefit from brand cachet of having already served the bosses. “When this offering is presented to employees, the top C-suite of those companies would have already been using us for 10-15 years,” Restieri said.
{ "pile_set_name": "OpenWebText2" }
plify l/l**12*l**(2/7) assuming l is positive. l**(-75/7) Simplify (h/h**(-2/5)*h*h**(-2))/(h/h**(4/7)*h**(-1/2)) assuming h is positive. h**(33/70) Simplify (j**(-4/5))**39 assuming j is positive. j**(-156/5) Simplify p**24*p**(3/22) assuming p is positive. p**(531/22) Simplify (j*j**(-41))**35 assuming j is positive. j**(-1400) Simplify (m**(-1/4))**(1/8)*m**(1/7)*m*(m/m**(-3)*m)/m*m assuming m is positive. m**(1369/224) Simplify ((((o/(o/o**(-2)))/o)/o)/o)**(-20) assuming o is positive. o**100 Simplify ((k*k**(4/5)*k)/k*(k/(k/(k**(-8)*k)))/k)**(-2/69) assuming k is positive. k**(62/345) Simplify (y*y**(-23))**(-8) assuming y is positive. y**176 Simplify (a*a/a**(-4))**(-1/4) assuming a is positive. a**(-3/2) Simplify ((t*t/(t*t**(1/10))*t)/t)**(27/7) assuming t is positive. t**(243/70) Simplify d*d**(-2/3)*d*(d**0/d*d)/d assuming d is positive. d**(1/3) Simplify (((j/(j**(5/6)/j))/j)/j**(-2/7))/(j/(j*j*(j/((j/j**(-2))/j)*j)/j))**7 assuming j is positive. j**(19/42) Simplify (j**1/(j/(j/(j*j**(-5)*j))*j))**(3/7) assuming j is positive. j**(9/7) Simplify l/(l*l/(l/(l/((l*l*l**22*l)/l*l)))*l*l)*l*l*l**(-29)*l assuming l is positive. l**(-4) Simplify (v/(v*v**(-1/3)/v))**(-17)*v**4/(v*v**(-3)*v) assuming v is positive. v**(-53/3) Simplify p*p**(1/12)*p*p*p**(1/9) assuming p is positive. p**(115/36) Simplify g*g**(-1/2)*g*g*g/(g**9/g)*g*(g/(g*(g*g*g*g*(g*(((g**(-5)/g)/g)/g*g)/g*g*g)/g*g*g*g*g)/g))/(g*g**(-2/7)) assuming g is positive. g**(-73/14) Simplify (k**0)**(-2/21)/(k*k*k**(-1/5)/k*k*k**(2/5)) assuming k is positive. k**(-11/5) Simplify ((f/f**(2/9))/f**(-8))/(f*f/(f**(-1)*f*f*f*f))**13 assuming f is positive. f**(196/9) Simplify (k**(11/4)/(k*k**10*k))**33 assuming k is positive. k**(-1221/4) Simplify ((i*i**1/i)/i)**1/(i**(-2/9))**(-33) assuming i is positive. i**(-22/3) Simplify ((b*b**(1/5))/(b*b*((b/b**(2/5))/b)/b))**3 assuming b is positive. b**(9/5) Simplify (g*g**(2/49)*g)/g*g/(g/(g/g**(-1/12))) assuming g is positive. g**(1249/588) Simplify u**(-27)*u/(u*u**(1/59)) assuming u is positive. u**(-1594/59) Simplify ((y**(2/3))**(-2))**(-3/7) assuming y is positive. y**(4/7) Simplify ((v*v*(v*v*v**3*v)/v)**(-39))**19 assuming v is positive. v**(-5187) Simplify (t**6)**(3/8) assuming t is positive. t**(9/4) Simplify (o*o/o**(2/3))/o**2*(o**0)**(-10/3) assuming o is positive. o**(-2/3) Simplify p**(1/15)*p**(-6/5) assuming p is positive. p**(-17/15) Simplify (h**(1/5)/h**(5/6))**45 assuming h is positive. h**(-57/2) Simplify w**2*w**(4/13) assuming w is positive. w**(30/13) Simplify (r/(r/(r*r/(r*r**(3/5)))))/(r/r**(3/11)) assuming r is positive. r**(-18/55) Simplify (w/(w/(w/((w/w**(-21))/w))*w))/w**(-23/3) assuming w is positive. w**(-40/3) Simplify ((w**(1/2)*w)/w)**(9/13)*w**(3/4)/w*w**(-1) assuming w is positive. w**(-47/52) Simplify (b**0)**(-4/19)*b/b**(-2/5)*b*(b/b**7)/b*b assuming b is positive. b**(-18/5) Simplify (l**(1/6)*l**3/l)**(8/13) assuming l is positive. l**(4/3) Simplify w**13*w/(w**(1/2)*w) assuming w is positive. w**(25/2) Simplify (y**7*(y*y**5)/y)**(4/29) assuming y is positive. y**(48/29) Simplify (m/((m/(m/(m/(m*m/(m/m**9))*m)))/m))/(m/((m/(m*m/((m/(m*(m**(-10/3)/m*m)/m))/m)))/m*m)) assuming m is positive. m**(34/3) Simplify m**(-2/27)*m*m*m**(-11) assuming m is positive. m**(-245/27) Simplify (((k/k**(2/23))/k)/(k/(k/((k*k*k/(k/(k/k**1))*k*k)/k))))**(-1/5) assuming k is positive. k**(71/115) Simplify (o**2*o/(o/(o/o**(-1/7))))**(-5/2) assuming o is positive. o**(-55/7) Simplify (d**(1/4)*d)**46 assuming d is positive. d**(115/2) Simplify r/(r*r**25)*r**(-35) assuming r is positive. r**(-60) Simplify (g**(-6)*g**7)/(g**(1/7)/g**(-3)) assuming g is positive. g**(-15/7) Simplify (n**(-6))**(-21) assuming n is positive. n**126 Simplify (l*l**(1/4)*l**(2/23))/((l*l**(-3))/l**(-6/7)) assuming l is positive. l**(1597/644) Simplify (((q**(2/5)/q*q*q*q)/q)/q)**(-11)*q**(-2/7)*q*q**4 assuming q is positive. q**(11/35) Simplify (i*i**(-5))/((i*i/((i**(-7)*i)/i))/i*i)*(i**(-1)/i)/(i*i**(-3)) assuming i is positive. i**(-13) Simplify (w/(w/w**6)*w*w*w*w*w**(6/13)*w)/(w/w**(-2))**(-11) assuming w is positive. w**(578/13) Simplify s**(-1/6)*s**(-7/3) assuming s is positive. s**(-5/2) Simplify (k/((k/(k*k**(-20)))/k))/k*(k**(-3/5)*k)/k assuming k is positive. k**(-98/5) Simplify ((i*(i**(-1/6)/i)/i)/(i**6*i*i))/(i*i**(2/5)*i*i/(i**(1/3)/i)) assuming i is positive. i**(-397/30) Simplify (i**(-4))**(-44/7) assuming i is positive. i**(176/7) Simplify (p**(8/7)/(p*p/(p*((p*p*p**(1/5)*p)/p*p*p)/p)))**(14/15) assuming p is positive. p**(78/25) Simplify (a**(-2/31))**12 assuming a is positive. a**(-24/31) Simplify ((g*g/(g*g**15))/g)/g*g**(-17)/g*g assuming g is positive. g**(-33) Simplify (p*p*p**(-1/4)/p*p)**1*p**(1/3)/((p**(-2/9)*p)/p) assuming p is positive. p**(83/36) Simplify (k**(-3)*k**(2/9))/(k*k**(2/7)*k)**(-4/11) assuming k is positive. k**(-1349/693) Simplify (m/m**2)/(m*m*m/(m/m**(-2/25))*m)*(m*m/((m*m**(-5/2)*m)/m))/m*m*m/(m*m**(3/11))*m assuming m is positive. m**(169/550) Simplify (b**2/((b/b**(-1/5))/b))**10 assuming b is positive. b**18 Simplify n**(-3/14)/n**10 assuming n is positive. n**(-143/14) Simplify (b**(2/43)/(b*b*b**(-1/13)))**(1/4) assuming b is positive. b**(-1049/2236) Simplify ((g*g**(-1/2))**47)**24 assuming g is positive. g**564 Simplify (j**(2/17)*(j/(j**(-5)*j))/j)/(j**2/j)**32 assuming j is positive. j**(-474/17) Simplify (m**(1/10)/m**(-2/15))/((m/m**5)/m*m**1) assuming m is positive. m**(127/30) Simplify ((k/(k**(-2)/k*k))/(k*k/(k*k/k**(-2)*k)))**(-28) assuming k is positive. k**(-168) Simplify s**(-3)*s**(-8) assuming s is positive. s**(-11) Simplify (h*h**(-2/5))**24/(h**(2/23)*h/((h/((h*h**(2/5)/h)/h))/h)) assuming h is positive. h**(320/23) Simplify (q*(q/q**(-2/61)*q)/q)/(q/((q/(q/q**6))/q)) assuming q is positive. q**(368/61) Simplify (o*(o/(o/(((o/(o*o**(-2/19))*o*o)/o)/o)))/o*o)/((o**0/o)/o)*(o**1)**(-37) assuming o is positive. o**(-644/19) Simplify (h**(-8))**47 assuming h is positive. h**(-376) Simplify z**(-2/3)/((z*z/(z*z*z**(-1/10)*z))/z) assuming z is positive. z**(37/30) Simplify (x**(-4/3))**(13/2) assuming x is positive. x**(-26/3) Simplify (k**(-1/4)*k)**(-6/17) assuming k is positive. k**(-9/34) Simplify ((k*k**0/k)/k)**(2/5)*k**(-6)*k*k/k**3 assuming k is positive. k**(-37/5) Simplify j*j**(-2/3)*j**(-6)*j/(j*j**(2/11)*j*j)*j**4 assuming j is positive. j**(-127/33) Simplify b**(-12/13)*b**(14/5) assuming b is positive. b**(122/65) Simplify (w**(1/7)*w*w**(1/8)*w)**(-21) assuming w is positive. w**(-381/8) Simplify (q*q**(-4/7)*q*q**4)/(q*q**(-1/2)*q*q/((q*q*q**(-1/3))/q)) assuming q is positive. q**(151/42) Simplify (q*q*q*((((q/(q/(q/(q**(-3/10)*q))))/q*q)/q)/q)/q)/(q*q**19) assuming q is positive. q**(-197/10) Simplify ((c*c*c*c**(-1/2))**(-9))**(-25) assuming c is positive. c**(1125/2) Simplify ((u*u**(2/3))/u**5)/(u**(-4)*u**(2/5)) assuming u is positive. u**(4/15) Simplify ((g/(g*g**(2/5)))/g)**(-26) assuming g is positive. g**(182/5) Simplify ((w**(8/7)*w*w)/w)**(6/23) assuming w is positive. w**(90/161) Simplify (f**(-5)*f**4)**42 assuming f is positive. f**(-42) Simplify ((v/(v**(22/7)/v))/v*v)/(v/v**22) assuming v is positive. v**(139/7) Simplify m**(-15)*m*m**(-4)/m assuming m is positive. m**(-19) Simplify s*s/s**(-6/7)*(s*(s*s*s*s*(s*s*s**21/s)/s)/s)/s assuming s is positive. s**(188/7) Simplify q**(16/3)/q**(3/5) assuming q is positive. q**(71/15) Simplify (v**3*v)/v*v**(-2/9)/v assuming v is positive. v**(16/9) Simplify (g**(-2/33)*g)**(-13/5) assuming g is positive. g**(-403/165) Simplify b*b/(b*b**(2/15))*b*b**(-2/7)*b*b assuming b is positive. b**(376/105) Simplify (((f**4*f)/f)/(f**(5/4)*f*f*f))**(-4/15) assuming f is positive. f**(1/15) Simplify ((v*v**(-3))/v)**13 assuming v is positive. v**(-39) Simplify (n/n**(2/25))/n**(1/5)*n**(-4/3)/(n**(-1)*n) assuming n is positive. n**(-46/75) Simplify (g**(-26)/g)**4 assuming g is positive. g**(-108) Simplify ((h**(4/5)*h)**(-1/16))**(-10/3) assuming h is positive. h**(3/8) Simplify ((q*q*q**3*q)/q**(-2/49))**(3/13) assuming q is positive. q**(888/637) Simplify (r**(2/7)/r)**(-2/33) assuming r is positive. r**(10/231) Simplify (k**(-11)*k**11)**(-4/7) assuming k is positive. 1 Simplify b*b/b**(-16/3)*b**(-1/
{ "pile_set_name": "DM Mathematics" }
POPULAR MEGAPACKS Mano Job - Sage Evans Sage Evans - Please Blast Me!Released: August 4, 2015 Sage Evans is one sweet, fine piece of ass. She's 22 and was in the porno game for a bit...then opted-out in favor of having a boyfriend. Sluts don't make the best girlfriends, though, do they? Soon, she was tired and bored of the same dick, over and over, so guess what? No boyfriend no more! So it's back to Porn Valley and the porno circuit. We're glad one of our members made us aware of her. We love our member requests, and Sage didn't disappoint. She loves makings boy jizz in unconventional ways. As I said earlier, Sage Evens gets bored easily. Pussy and mouths and great for making a dick blast quick and easy...but that's just not how Ms. Evans rolls. Please Blast Me! The NaughtyBlog team is always updating and adding new porn videos and movies every day. You find it right here and can download everything 100% free. Just like this video Mano Job - Sage Evans. We have XXX Clips from all your favorite porn sites and also huge free adult DVD selection you can download from direct links. You don't have to use torrents anymore to download Please Blast Me! or watch stream tube sites. Because we offer free direct links to file sharing sites where you can download all the new 0day clips or full porn movies. Naughty Blog team is always working towards adding more features that will keep your love for porn alive and well. Send us feedback if you have any questions or comments. Naughty Blog does not store any files on its server. We only index and link to content provided by other sites. All models appearing on this website are 18 years or older. By entering this site you swear that you are of legal age in your area to view adult material and that you wish to view such material.
{ "pile_set_name": "Pile-CC" }
The south-central coastal province of Quang Nam has set a target of serving 8.1 million tourists in 2020. Hoi An by night (Photo: VNA) In 2019, the province welcomed nearly 7.7 million visitors, including over 4.6 million foreigners, and earned more than 6 trillion VND (259.1 million USD). Its top 10 markets comprised of the Republic of Korea (RoK), Australia, the UK, France, China, Germany, the US, Japan, Malaysia and Taiwan. Quang Nam is the only locality in the country having two sites recognised by UNESCO as the world cultural heritage sites, namely Hoi An ancient city and My Son sanctuary. Over the years, Hoi An has been a top global travel destination as a living museum of history and architecture. The number of tourists visiting Hoi An is increasing rapidly, from nearly 100,000 in 1999 to more than 2.5 million last year. In 2018, the US News Cable Network (CNN) selected Hoi An as one of the most beautiful old towns in Southeast Asia. My Son sanctuary, situated in a peaceful valley surrounded by mountains, has been well preserved since it was built thousands of years ago during the prosperous development of the Champa Kingdom between the 4th and 13th centuries. The ruins are now a popular destination because of their cultural relevance and architectural features. Quang Nam is also home to Cu Lao Cham (Cham Island) which was recognised as a World Biosphere Reserve by UNESCO in May 2009 thanks to its diverse eco-system and ancient cultural and historical sites./.
{ "pile_set_name": "Pile-CC" }
--- abstract: 'We introduce the notion of homotopy inner products for any cyclic quadratic Koszul operad $\mathcal O$, generalizing the construction already known for the associative operad. This is done by defining a colored operad $\widehat{\mathcal O}$, which describes modules over $\mathcal O$ with invariant inner products. We show that $\widehat{\mathcal O}$ satisfies Koszulness and identify algebras over a resolution of $\widehat{\mathcal O}$ in terms of derivations and module maps. As an application we construct a homotopy inner product over the commutative operad on the cochains of any Poincaré duality space.' address: - 'Dipartimento di Matematica “G. Castelnuovo”, Università di Roma “La Sapienza”, Piazzale Aldo Moro, 2 I-00185 Roma, Italy' - 'College of Technology of the City University of New York, Department of Mathematics, 300 Jay Street, Brooklyn, NY 11201, USA' author: - Riccardo Longoni - Thomas Tradler title: Homotopy Inner Products for Cyclic Operads --- Introduction ============ In [@GeK], the notion of cyclic operads and invariant inner product for such operads was defined. A homotopy version of these inner products for the associative operad was given in [@Tr] and the starting point for a similar version for the commutative operad was considered in [@Ginot]. It is natural to ask for a generalization of these constructions applicable to any cyclic operad. This is what is done in this paper. Starting with a cyclic operad $\mathcal O$, we use the notion of colored operads to incorporate the cyclic structure of $\mathcal O$ into the colored operad $\widehat{\mathcal O}$. Algebras over the colored operad $\widehat{\mathcal O}$ consist of pairs $(A,M)$, where $A$ is an algebra over $\mathcal O$ and $M$ is an $\mathcal O$-module over $A$ which has an invariant inner product. Section \[cyclic-op\] is devoted to explicitly defining $\widehat{\mathcal O}$, and in the case that $\mathcal O$ is given by quadratic generators and relations, we give a description of $\widehat{\mathcal O}$ in terms of generators and relations coming from those of $\mathcal O$. A major tool in the theory of operads is the notion of Koszul duality. Let us recall, that a (colored) operad $\mathcal P$ is called Koszul if there is a quasi-isomorphism of operads $\mathbf{D}(\mathcal P^!)\to \mathcal P$, where $\mathbf{D}(\mathcal P^!)$ denotes the dual operad (in the sense of [@GK (3.2.12)]) on the dual quadratic operad $\mathcal P^!$. This implies that the notion of algebras of $\mathcal P$ has a canonical infinity version given by algebras over $\mathcal P_\infty:=\mathbf{D}(\mathcal P^!)$. Our main theorem states, that the Koszulness property is preserved when going from $\mathcal O$ to $\widehat{\mathcal O}$. Let $\mathcal O$ be a cyclic quadratic operad. If $\mathcal O$ is Koszul, then so is $\widehat{\mathcal O}$, i.e. we have a resolution $\widehat{\mathcal O}_\infty:=\mathbf{D}(\widehat{\mathcal O^!})$ of $\widehat{\mathcal O}$. The proof of this theorem will be given in section \[quadrat-koszul\]. Theorem \[O\_hat\_Koszul\] justifies the concept of the infinity version of algebras and modules with invariant inner products over cyclic operads $\mathcal O$ as algebras over the operad $\widehat{\mathcal O}_\infty=\mathbf{D}(\widehat{\mathcal O^!})$. The concept of algebras over the operad $\widehat{\mathcal O}_\infty$ will be investigated in more detail in section \[homotop-ip\]. In particular, we explicitly reinterpret in proposition \[O\_hat\_algebras\] algebras over $\widehat{\mathcal O}_\infty$ in terms of derivations and module maps over free $\mathcal O^!$-algebras and modules. Recall that the associative operad $\mathcal Assoc$, the commutative operad $\mathcal Comm$ and the Lie operad $\mathcal Lie$ are all cyclic quadratic Koszul operads, so that theorem \[O\_hat\_Koszul\] may be applied to all these cases. As a particularly application of infinity inner products, we consider the examples of the associative operad $\mathcal Assoc$ and the commutative operad $\mathcal Comm$, which have an interesting application to the chain level of a Poincaré duality space $X$. In [@TZ], it was shown that the simplicial cochains $C^\ast(X)$ on $X$ with rational coefficients form an algebra over the operad $\widehat{\mathcal Assoc}_\infty$. This structure was then used in [@Tr2] and [@TZ2] to obtain string topology operations on the Hochschild cohomology, respectively the Hochschild cochain complex, of $C^\ast(X)$. Since the method of constructing the $\widehat{\mathcal Assoc}_\infty$ algebra on $C^\ast (X)$ easily transfers to the commutative case, we will show in section \[Comm-section\] that $C^\ast(X)$ also forms a $\widehat{\mathcal Comm}_\infty$-algebra. We expect that this stronger algebraic structure should induce even more string topology operations, which take into account the commutative nature of the cochains of the space $X$. A first step in this direction was done in [@TZ3], where the string topology operations for algebras over $\widehat{\mathcal Assoc}$ and $\widehat{\mathcal Comm}$ were investigated. We are grateful to Dennis Sullivan for many valuable suggestions and illuminating discussions. We also thank Domenico Fiorenza, Martin Markl, Jim Stasheff and Scott Wilson for useful comments and remarks regarding this topic. The second author was partially supported by the Max-Planck Institute in Bonn. $\widehat{\mathcal Comm}_\infty$ structure for Poincaré duality spaces {#Comm-section} ====================================================================== Before going into the details of the construction of homotopy inner products over a general cyclic quadratic operad $\mathcal O$, we give an application for the case of the commutative operad $\mathcal Comm$. More precisely, we show how a homotopy $\mathcal Comm$-inner product arises on the chain level of a Poincaré duality space $X$. In fact, the construction for the homotopy $\mathcal Comm$-algebra is taken from R. Lawrence and D. Sullivan’s paper [@S] on the construction of local infinity structures. In [@TZ], M. Zeinalian and the second author construct homotopy $\mathcal Assoc$-inner products on a Poincaré duality space $X$. The same reasoning may in fact be used to construct homotopy $\mathcal Comm$-inner products on $X$. The proof of the next proposition will be a sketch using these arguments. \[prop:comm-pd\] Let $X$ be a closed, finitely triangulated Poincaré duality space, such that the closure of every simplex is contractible. Denote by $C=C_\ast(X)$ the simplicial chains on $X$. Then its dual space $A:=C^*=Hom(C_*(X),k)$ has the structure of a $\widehat{\mathcal Comm}_\infty$ algebra, such that the lowest multiplication is the symmetrized Alexander-Whitney multiplication and the lowest inner product is given by capping with the fundamental cycle $\mu\in C$. Let $\mathcal Lie$ denote the Lie-operad, $F_{\mathcal Lie}V=\bigoplus_{n\geq 1} (\mathcal Lie(n)\otimes V^{\otimes n})_{S_n}$ denote the free Lie algebra generated by $V$, and $F_{\mathcal Lie,V}W=\bigoplus_{n\geq 1} (\bigoplus_{k+l=n-1}\mathcal Lie(n)\otimes V^{\otimes k}\otimes W\otimes V^{\otimes l})_{S_n}$ the canonical module over $F_{\mathcal Lie}V$. We will see in proposition \[O\_hat\_algebras\] and example \[exa-comm\], that the required data for a homotopy $\mathcal Comm$-inner product consists of, - a derivation $d\in \mathrm{Der}(F _{\mathcal Lie}\,C[1])$ of degree $1$, with $d^2=0$, - a derivation $g\in \mathrm{Der}_d (F_{\mathcal Lie,\,C[1]}C[1])$ over $d$ of degree $1$, with $g^2=0$, which imduces a derivation $h\in \mathrm{Der}_d (F_{\mathcal Lie,\,C[1]}C^*[1])$ over $d$ with $h^2=0$, - a module map $f\in \mathrm{Mod}(F_{\mathcal Lie, C[1]}C^*, F_{\mathcal Lie,C[1]}C[1])$ of degree $0$ such that $f\circ h = g \circ f$. In order to construct the derivation $d\in \mathrm{Der}(F _{\mathcal Lie}\,C[1])$ with $d^2=0$, let $F_{\mathcal Lie}C[1]=L_1\oplus L_2\oplus\dots$, where $L_n=(\mathcal Lie(n)\otimes C[1]^{\otimes n})_{S_n}$, be the decomposition of $F_{\mathcal Lie}C[1]$ by the monomial degree in $C[1]$. Then, $d:F_{\mathcal Lie}C[1]\to F_{\mathcal Lie}C[1]$ is determined by maps $d=d_1+d_2+\dots$, where $d_i:C[1]\to L_i$ is lifted to $F_{\mathcal Lie}(C[1])$ as a derivation. Let $d_1$ be the differential on $C[1]$, and $d_2$ be the symmetrized Alexander-Whitney comultiplication. For the general $d_i$, we use the inductive hypothesis that $d_1$, …, $d_{i-1}$ are local maps so that $\nabla_i:=d_1+ \dots+d_{i-1}$ has a square $\nabla_i^2$ mapping only into higher components $L_{i}\oplus L_{i+1}\oplus \dots$. Here, “local” means that every simplex maps into the sub-Lie algebra of its closure. Now, by the Jacobi-identity, it is true that $0=[\nabla_i, [\nabla_i,\nabla_i]]= [d_1,e_i]\text{+ higher terms}$, where $e_i:C[1]\to L_i$ is the lowest term of $[\nabla_i,\nabla_i]$. Thus $e_i$ is $[d_1,.]$-closed and thus, using the contractibility hypothesis of the proposition, also locally $[d_1,.]$-exact. These exact terms can be put together to give a map $d_i$, so that $[d_1,d_i]$ vanishes on $L_1\oplus \dots \oplus L_{i-1}$ and equals $- 1/2\cdot e_i$ on $L_i$. In other words, $(d_1+ \dots+d_i)^2=1/2\cdot [d_1+ \dots+d_i,d_1+ \dots+d_i]=1/2\cdot [\nabla_i ,\nabla_i ]+ [d_1,d_i]+\text{higher terms}$, maps only into $L_{i+1}\oplus L_{i+2}\oplus\dots$. This completes the inductive step, and thus produces the wanted derivation $d$ on $F_{\mathcal Lie}(C[1])$. In a similar way, we may produce the derivation $g$ of $F_{\mathcal Lie,\,C[1]}C[1]$ over $d$, by decomposing $F_{\mathcal Lie, C[1]} C[1]=L'_1\oplus L'_2\oplus\dots$, where $L'_n$ is given by the space $\left(\bigoplus_{k+l=n-1} \mathcal Lie(n) \otimes C[1]^{\otimes k} \otimes C[1] \otimes C[1]^{\otimes l}\right)_{S_{n}}$. With this notation, $g$ is written as a sum $g=g_1+g_2+\dots$, where $g_i:C[1]\to L'_i$ is lifted to $F_{\mathcal Lie, C[1]} C[1]$ as a derivation over $d$, and $(g_1+\dots+g_i)^2$ only maps into $L'_{i+1}\oplus L'_{i+2}\oplus\dots$. Using a slight variation of the above method, we may also construct the wanted homotopy $\mathcal Comm$-inner product, i.e. the module map $f$ stated above. More precisely, we build a map $\chi:C[1]\to Mod(F_{\mathcal Lie, C[1]}C^*[1],F_{\mathcal Lie, C[1]}C[1])$, so that $\chi$ is a chain map under the differential $d_1$ on $C[1]$, and the differential $\delta(f)=f\circ h - (-1)^{|f|} g\circ f$ on $Mod(F_{\mathcal Lie, C[1]}C^*[1],F_{\mathcal Lie, C[1]}C[1])$. Since a module map is given by the components $M_n=\bigoplus_{k+l=n-2} \mathcal Lie(n)\otimes C[1]^{\otimes k}\otimes C[1]\otimes C[1]^{\otimes l}\otimes C[1]$, it is enough to construct $\chi$ as a sum $\chi=\chi_2+\chi_3+\dots$, where $\chi_i:C[1]\to M_i$. Now, the lowest component $\chi_2:C[1]\to C[1]\otimes C[1]$ is defined to be the symmetrized Alexander-Whitney comultiplication. For the induction, we assume that $\Upsilon_i:=\chi_2+\dots+\chi_{i-1}$ are local maps such that $D(\Upsilon_i):=\Upsilon_i\circ d_1-\delta\circ \Upsilon_i$ maps only into higher components $M_i\oplus M_{i+1}\oplus\dots$. Let $\epsilon_i:C[1]\to M_i$ be the lowest term of $D(\Upsilon_i)$. Since $D^2=0$ and $\delta$ has $d_1$ as its lowest component, we see that $\epsilon_i$ is $[d_1,.]$-closed, and by the hypothesis of the proposition also locally $[d_1,.]$-exact. These exact terms can be put together as before to produce a map $\chi_i$, so that now $\Upsilon_{i+1}:=\chi_2+\dots+\chi_i$ only maps into $M_{i+1}\oplus M_{i+2}\oplus\dots $. We therefore obtain the chain map $\chi$, and with this, we define the homotopy $\mathcal Comm$-inner product as $f:=\chi(\mu)\in Mod(F_{\mathcal Lie, C[1]}C^*[1],F_{\mathcal Lie, C[1]}C[1]) $, where $\mu\in C$ denotes the fundamental cycle of the space $X$. Since $\mu$ is $d_1$-closed, it follows that $f\circ h-g\circ f=0$. The operad $\widehat{\mathcal O}$ {#cyclic-op} ================================= In this section, we define for any cyclic operad $\mathcal O$ the colored operad $\widehat{\mathcal O}$. In the case that $\mathcal O$ is cyclic quadratic, we give an explicit description of $\widehat{\mathcal O}$ in terms of generators and relations coming from generators and relations in $\mathcal O$. We assume that the reader is familiar with the notion of operads, colored operads and cyclic operads. For a good introduction to operads, we refer to [@Ad], [@GK] and [@MSS], for cyclic operads we recommend [@GeK] and [@MSS]. Colored operads were first introduced in [@BV] and appeared in many other places, see e.g. [@L] and [@BM]. Since in our case, we only need a special type of colored operad, it will be convenient to setup notation with the following definition. As in [@GK (1.2.1)] and [@GeK (1.1)], we assume throughout this paper that $k$ is a field of characteristic $0$. Note however, that for certain operads such as e.g. the associative operad, a more general setup is possible. \[0/1-operad\] Let $\mathcal P$ be a 3-colored operad in the category of (differential graded) vector spaces, where we use the three colors “full", “dashed" and “empty", in symbols written ${ \begin{pspicture}(0,0.1)(0.2,0.4) \psline[linewidth=1pt](0.1,0)(0.1,0.4) \end{pspicture}},{ \begin{pspicture}(0,0.1)(0.2,0.4) \psline[linewidth=1pt, linestyle=dashed,dash=4pt 3pt](0.1,0)(0.1,0.4) \end{pspicture}},\varnothing$. This means that to each finite sequence of symbols $x_1, \dots, x_n, x\in \{{ \begin{pspicture}(0,0.1)(0.2,0.4) \psline[linewidth=1pt](0.1,0)(0.1,0.4) \end{pspicture}},{ \begin{pspicture}(0,0.1)(0.2,0.4) \psline[linewidth=1pt, linestyle=dashed,dash=4pt 3pt](0.1,0)(0.1,0.4) \end{pspicture}},\varnothing \}$, we have (differential graded) vector spaces $\mathcal P(x_1,\dots, x_n; x_0)$ over $k$, which label the operations with $n$ inputs with colors $x_1,\dots, x_n$, and one output with color $x$. The operad $\mathcal P$ comes with maps $\circ_i: \mathcal P(x_1,\dots,x_n;x) \otimes \mathcal P(y_1,\dots,y_m;x_i) \to \mathcal P(x_1,\dots,x_{i-1},y_1,\dots, y_m,x_{i+1},\dots, x_n;x)$ which label the composition in $\mathcal P$, and with an action of the symmetric group $S_n$, which, for $\sigma\in S_n$, maps $\mathcal P(x_1,\dots, x_n;x)\to \mathcal P(x_{\sigma(1)},\dots,x_{\sigma(n)};x)$. These maps have to satisfy the usual associativity and equivariance axioms of colored operads. $\mathcal P$ is called a 0/1-operad if the color $\varnothing$ can appear only as an output, and the only nontrivial spaces with one input are $\mathcal P({ \begin{pspicture}(0,0.1)(0.2,0.4) \psline[linewidth=1pt](0.1,0)(0.1,0.4) \end{pspicture}};{ \begin{pspicture}(0,0.1)(0.2,0.4) \psline[linewidth=1pt](0.1,0)(0.1,0.4) \end{pspicture}})=k$ and $\mathcal P({ \begin{pspicture}(0,0.1)(0.2,0.4) \psline[linewidth=1pt, linestyle=dashed,dash=4pt 3pt](0.1,0)(0.1,0.4) \end{pspicture}};{ \begin{pspicture}(0,0.1)(0.2,0.4) \psline[linewidth=1pt, linestyle=dashed,dash=4pt 3pt](0.1,0)(0.1,0.4) \end{pspicture}})=k$. We assume furthermore, that there are fixed generators of the spaces $\mathcal P({ \begin{pspicture}(0,0.1)(0.2,0.4) \psline[linewidth=1pt](0.1,0)(0.1,0.4) \end{pspicture}};{ \begin{pspicture}(0,0.1)(0.2,0.4) \psline[linewidth=1pt](0.1,0)(0.1,0.4) \end{pspicture}})=k$ and $\mathcal P({ \begin{pspicture}(0,0.1)(0.2,0.4) \psline[linewidth=1pt, linestyle=dashed,dash=4pt 3pt](0.1,0)(0.1,0.4) \end{pspicture}};{ \begin{pspicture}(0,0.1)(0.2,0.4) \psline[linewidth=1pt, linestyle=dashed,dash=4pt 3pt](0.1,0)(0.1,0.4) \end{pspicture}})=k$. Graphically, we represent $\mathcal P(x_1,\dots,x_n;x)$ by a tree with $n$ inputs and one output of the given color. Since the color $\varnothing$ cannot appear as an input, we may use the following convention: we represent the output $\varnothing$ with a blank line, i.e., with no line, and we say that the operation “has no output”. $$\begin{pspicture}(0,.5)(4,4) \psline[linestyle=dashed, arrowsize=0.1, arrowinset=0](2,2)(1.2,3) \psline[arrowsize=0.1, arrowinset=0](2,2)(1.6,3) \psline[linestyle=dashed, arrowsize=0.1, arrowinset=0](2,2)(2,3) \psline[linestyle=dashed, arrowsize=0.1, arrowinset=0](2,2)(2.4,3) \psline[arrowsize=0.1, arrowinset=0](2,2)(2.8,3) \rput[b](2,.5){$\mathcal P ({ \begin{pspicture}(0,0.1)(0.2,0.4) \psline[linewidth=1pt, linestyle=dashed,dash=4pt 3pt](0.1,0)(0.1,0.4) \end{pspicture}},{ \begin{pspicture}(0,0.1)(0.2,0.4) \psline[linewidth=1pt](0.1,0)(0.1,0.4) \end{pspicture}},{ \begin{pspicture}(0,0.1)(0.2,0.4) \psline[linewidth=1pt, linestyle=dashed,dash=4pt 3pt](0.1,0)(0.1,0.4) \end{pspicture}},{ \begin{pspicture}(0,0.1)(0.2,0.4) \psline[linewidth=1pt, linestyle=dashed,dash=4pt 3pt](0.1,0)(0.1,0.4) \end{pspicture}},{ \begin{pspicture}(0,0.1)(0.2,0.4) \psline[linewidth=1pt](0.1,0)(0.1,0.4) \end{pspicture}};\varnothing)$} \rput[b](2,3.2){$1\,\,\, 2\,\,\, 3\,\,\, 4\,\,\, 5$} \end{pspicture} \quad \quad \quad \begin{pspicture}(0,0)(4,3.6) \psline[arrowsize=0.1, arrowinset=0](2,2)(1.2,3) \psline[linestyle=dashed, arrowsize=0.1, arrowinset=0](2,2)(1.6,3) \psline[linestyle=dashed, arrowsize=0.1, arrowinset=0](2,2)(2,3) \psline[arrowsize=0.1, arrowinset=0](2,2)(2.4,3) \psline[arrowsize=0.1, arrowinset=0](2,2)(2.8,3) \psline[linestyle=dashed, arrowsize=0.1, arrowinset=0](2,2)(2,1) \rput[b](2,0){$\mathcal P ({ \begin{pspicture}(0,0.1)(0.2,0.4) \psline[linewidth=1pt](0.1,0)(0.1,0.4) \end{pspicture}},{ \begin{pspicture}(0,0.1)(0.2,0.4) \psline[linewidth=1pt, linestyle=dashed,dash=4pt 3pt](0.1,0)(0.1,0.4) \end{pspicture}},{ \begin{pspicture}(0,0.1)(0.2,0.4) \psline[linewidth=1pt, linestyle=dashed,dash=4pt 3pt](0.1,0)(0.1,0.4) \end{pspicture}},{ \begin{pspicture}(0,0.1)(0.2,0.4) \psline[linewidth=1pt](0.1,0)(0.1,0.4) \end{pspicture}},{ \begin{pspicture}(0,0.1)(0.2,0.4) \psline[linewidth=1pt](0.1,0)(0.1,0.4) \end{pspicture}};{ \begin{pspicture}(0,0.1)(0.2,0.4) \psline[linewidth=1pt, linestyle=dashed,dash=4pt 3pt](0.1,0)(0.1,0.4) \end{pspicture}})$} \rput[b](2,3.2){$1\,\,\, 2\,\,\, 3\,\,\, 4\,\,\, 5$} \end{pspicture}$$ The canonical example of a 0/1-operad is the endomorphism 0/1-operad given for $k$-vector spaces $A$ and $M$ by $$\begin{aligned} {\mathcal E\!nd}^{A,M}(\vec X;{ \begin{pspicture}(0,0.1)(0.2,0.4) \psline[linewidth=1pt](0.1,0)(0.1,0.4) \end{pspicture}})=& Hom(\text{tensor products of $A$ and $M$},A)\\ {\mathcal E\!nd}^{A,M}(\vec X;{ \begin{pspicture}(0,0.1)(0.2,0.4) \psline[linewidth=1pt, linestyle=dashed,dash=4pt 3pt](0.1,0)(0.1,0.4) \end{pspicture}})=& Hom(\text{tensor products of $A$ and $M$},M)\\ {\mathcal E\!nd}^{A,M}(\vec X;\varnothing)=& Hom(\text{tensor products of $A$ and $M$},k).\end{aligned}$$ With this notation $(A,M,k)$ is an algebra over the 0/1-operad $\mathcal P$ if there exists a 0/1-operad map $\mathcal P \to {\mathcal E\!nd}^{A,M}$. By slight abuse of language we will also call the tuple $(A,M)$ an algebra over $\mathcal P$. It is our aim to define for each cyclic operad $\mathcal O$, the associated 0/1-operad $\widehat{ \mathcal O}$, which incorporates the cyclic structure as a colored operad. Before doing so, let us briefly recall the definition of a cyclic operad from [@GeK Theorem (2.2)]. Let $\mathcal O$ be a operad, i.e we have vector spaces $\mathcal O(n)$ for $n\geq 1$, composition maps $\circ_i:\mathcal O(n)\otimes \mathcal O(m)\to \mathcal O(n+m-1)$, and an $S_n$-action on $\mathcal O(n)$ for each $n$, satisfying the usual axioms, see [@GK (1.2.1)]. $\mathcal O$ is called [*cyclic*]{} if there is an action of the symmetric group $S_{n+1}$ on $\mathcal O(n)$, which extends the given $S_n$-action, and satisfies, for $1\in\mathcal O(1)$, $\alpha\in \mathcal O(m)$, $\beta\in \mathcal O(n)$ the following relations: $$\begin{aligned} \label{compos_cyclic1} \tau_2(1)&=&1,\\ \label{compos_cyclic2} \tau_{m+n}(\alpha\circ_k \beta)&=&\tau_{m+1}(\alpha)\circ_{k+1} \beta,\quad\quad\quad \text{ for } k<m \\ \label{compos_cyclic3} \tau_{m+n}(\alpha\circ_m \beta)&=&\tau_{n+1}(\beta)\circ_1 \tau_{m+1}(\alpha),\end{aligned}$$ where $\tau_{j}\in S_{j}$ denotes the cyclic rotation of $j$ elements $\tau_{j} :=1\in{\mathbb{Z}}_{j}\subset S_{j}$. \[def\_O\_hat\] Let $\mathcal O$ be a cyclic operad with $\mathcal O(1)=k$. For a sequence of $n$ input colors $\vec X=(x_1,\dots, x_n)$ and the output color $x$, where $x_1, \dots, x_n, x\in\{{ \begin{pspicture}(0,0.1)(0.2,0.4) \psline[linewidth=1pt](0.1,0)(0.1,0.4) \end{pspicture}},{ \begin{pspicture}(0,0.1)(0.2,0.4) \psline[linewidth=1pt, linestyle=dashed,dash=4pt 3pt](0.1,0)(0.1,0.4) \end{pspicture}},\varnothing\}$, let $$\widehat{\mathcal O}(\vec X;x):= \begin{cases} \mathcal O(n) & \text{if } x \text{ is ``full'', and } \vec X=({ \begin{pspicture}(0,0.1)(0.2,0.4) \psline[linewidth=1pt](0.1,0)(0.1,0.4) \end{pspicture}},\ldots,{ \begin{pspicture}(0,0.1)(0.2,0.4) \psline[linewidth=1pt](0.1,0)(0.1,0.4) \end{pspicture}}),\\ \mathcal O(n) & \text{if } x \text{ is ``dashed'', and $\vec X$ has exactly one ``dashed'' input}\\ \mathcal O(n-1) & \text{if } x=\varnothing \text{ and $\vec X$ has exactly two ``dashed' inputs,} \\ \{0\} & \text{otherwise}. \end{cases}$$ The definition of $\widehat{\mathcal O}(\vec X,\varnothing)$ is motivated by the idea that one considers trees with $n-1$ inputs and one output, and then uses the $S_{n+1}$ action to turn this output into a new input: $$\begin{pspicture}(0,0.8)(4,3.4) \psline[linestyle=dashed](2,2)(1.4,3) \psline(2,2)(1.8,3) \psline(2,2)(2.2,3) \psline(2,2)(2.6,3) \psline[linestyle=dashed](2,2)(2,1) \rput[b](2,3.2){$1\,\,\, 2\,\,\, 3\,\,\, 4$} \rput[b](4,2){$\rightsquigarrow$} \end{pspicture} \begin{pspicture}(0,0.8)(4,3.4) \psline[linestyle=dashed](2,2)(1.2,3) \psline(2,2)(1.6,3) \psline(2,2)(2,3) \psline(2,2)(2.4,3) \psline[linestyle=dashed](2,2)(2.8,3) \rput[b](2,3.2){$1\,\,\, 2\,\,\, 3\,\,\, 4\,\,\, 5$} \end{pspicture}$$ We define the $S_n$-action on $\widehat{\mathcal O}(\vec X;{ \begin{pspicture}(0,0.1)(0.2,0.4) \psline[linewidth=1pt](0.1,0)(0.1,0.4) \end{pspicture}})$ and $\widehat{\mathcal O}(\vec X;{ \begin{pspicture}(0,0.1)(0.2,0.4) \psline[linewidth=1pt, linestyle=dashed,dash=4pt 3pt](0.1,0)(0.1,0.4) \end{pspicture}})$ as before by using the $S_n$-action on $\mathcal O(n)$, and the $S_n$-action on $\widehat{\mathcal O} (\vec X;\varnothing)$ by using the $S_n$-action on $\mathcal O(n-1)$ given by the cyclicity of $\mathcal O$. Diagrams with different positions of the two “dashed” inputs can be mapped to each other using the action of the symmetric group. In fact, as each $\sigma\in S_{n+1}$ induces an isomorphism which preserves all the structure, any statement about diagrams with a fixed choice of position of “dashed” inputs immediately carries over to any other choice of positions of “dashed” inputs. We therefore often restrict our attention to the choice where the two “dashed” inputs are at the far left and the far right, as shown in the above picture. It is left to define the composition. On $\widehat{\mathcal O}(\vec X;{ \begin{pspicture}(0,0.1)(0.2,0.4) \psline[linewidth=1pt](0.1,0)(0.1,0.4) \end{pspicture}})$ and $\widehat{\mathcal O}(\vec X;{ \begin{pspicture}(0,0.1)(0.2,0.4) \psline[linewidth=1pt, linestyle=dashed,dash=4pt 3pt](0.1,0)(0.1,0.4) \end{pspicture}})$, the composition is simply the composition in $\mathcal O(n)$, so that it clearly satisfies associativity and equivariance. If $|\vec X|=n+1$, then on $\widehat{\mathcal O}(\vec X;\varnothing)=\mathcal O(n)$, the composition is predetermined on the first $n$ components by the usual composition in $\mathcal O$. As for the last component, we define $$\label{def_cyclic_compos} \alpha\circ_{m+1} \beta:=\tau_{n+m} (\tau^{-1}_{m+1}(\alpha)\circ_m \beta)\stackrel{\eqref{compos_cyclic3}}{=} \tau_{n+1}(\beta) \circ_1 \alpha$$ $$\begin{pspicture}(1,1.6)(10.5,5.6) \psline[linestyle=dashed](2,2)(1.2,2.9) \psline(2,2)(1.6,2.9) \psline(2,2)(2,2.9) \psline(2,2)(2.4,2.9) \psline[linestyle=dashed](2,2)(2.8,2.9) \rput[b](3,2){$\alpha$} \rput[b](2.4,3.4){$\beta$} \psline[linestyle=dashed](2.8,3)(2.8,3.5) \psline[linestyle=dashed](2.8,3.5)(3,4) \psline(2.8,3.5)(2.8,4) \psline(2.8,3.5)(2.6,4) \rput[b](3.5,3){$:=$} \psline[linestyle=dashed](5,2)(4.2,2.9) \psline[linestyle=dashed](4.2,3)(4.3,3.1)(5,3.25)(5.7,3.4)(5.8,3.5) \psline(5,2)(4.6,2.9) \psline(4.6,3)(4.2,3.5) \psline(5,2)(5,2.9) \psline(5,3)(4.6,3.5) \psline(5,2)(5.4,2.9) \psline(5.4,3)(5,3.5) \psline[linestyle=dashed](5,2)(5.8,2.9) \psline[linestyle=dashed](5.8,3)(5.4,3.5) \rput[b](6,2){$\alpha$} \rput[b](6.4,3.1){$\tau_{m+1}^{-1}$} \psline[linestyle=dashed](5.4,3.6)(5.4,4.1) \psline[linestyle=dashed](5.4,4.1)(5.6,4.5) \psline(5.4,4.1)(5.4,4.5) \psline(5.4,4.1)(5.2,4.5) \rput[b](5.2,3.8){$\beta$} \psline[linestyle=dashed](5.8,3.6)(5.8,4.5) \psline(4.2,3.6)(4.2,4.5) \psline(4.6,3.6)(4.6,4.5) \psline(5,3.6)(5,4.5) \psline(4.2,4.6)(4.4,5.3) \psline(4.6,4.6)(4.8,5.3) \psline(5 ,4.6)(5.2,5.3) \psline(5.2,4.6)(5.4,5.3) \psline(5.4,4.6)(5.6,5.3) \psline[linestyle=dashed](5.6,4.6)(5.8,5.3) \psline[linestyle=dashed](5.8,4.6)(5.6,4.8)(5,4.95)(4.4,5.1)(4.2,5.3) \rput[b](6.4,4.7){$\tau_{n+m}$} \rput[b](7.3,3){$=$} \psline[linestyle=dashed](8.55,2)(8.1,2.9) \psline(8.55,2)(8.4,2.9) \psline(8.55,2)(8.7,2.9) \psline[linestyle=dashed](8.55,2)(9,2.9) \rput[b](9.7,2){$\tau_{n+1}(\beta)$} \psline[linestyle=dashed](8.1,3)(8.1,3.5) \psline[linestyle=dashed](8.1,3.5)(7.8,4) \psline(8.1,3.5)(8 ,4) \psline(8.1,3.5)(8.2,4) \psline(8.1,3.5)(8.4,4) \rput[b](8.5,3.5){$\alpha$} \end{pspicture}$$ where the last equality follows form equation , $\alpha\in \widehat{\mathcal O}(\vec X;\varnothing) =\mathcal O(m)$ has $m+1$ inputs, and $\beta\in\widehat{\mathcal O}(\vec Y;{ \begin{pspicture}(0,0.1)(0.2,0.4) \psline[linewidth=1pt, linestyle=dashed,dash=4pt 3pt](0.1,0)(0.1,0.4) \end{pspicture}})=\mathcal O(n)$ (or similarly $\beta\in\widehat{\mathcal O}(\vec Y;{ \begin{pspicture}(0,0.1)(0.2,0.4) \psline[linewidth=1pt](0.1,0)(0.1,0.4) \end{pspicture}})$) has $n$ inputs. It is clear that this will satisfy equivariance, since equivariance was just used to define the composition. The next lemma establishes the final property for $\widehat{\mathcal O}$ being a 0/1-operad. The composition in $\widehat{\mathcal O}$ satisfies the associativity axiom. By definition the composition is just the usual composition in $\mathcal O(n)$, except for inserting trees in the last input of elements in $\widehat{\mathcal O}(\vec X;\varnothing)$. Thus, except for composition in the last spot, associativity of $\widehat{\mathcal O}$ follows from the associativity of $\mathcal O$. Now, let $\alpha\in \widehat{\mathcal O}(\vec X;\varnothing)\cong \mathcal O(m)$, $\beta\in \widehat{\mathcal O}(\vec Y;y)\cong \mathcal O(n)$, and $\gamma\in \widehat{\mathcal O} (\vec Z;z) \cong \mathcal O(p)$, where $y,z\in\{{ \begin{pspicture}(0,0.1)(0.2,0.4) \psline[linewidth=1pt](0.1,0)(0.1,0.4) \end{pspicture}},{ \begin{pspicture}(0,0.1)(0.2,0.4) \psline[linewidth=1pt, linestyle=dashed,dash=4pt 3pt](0.1,0)(0.1,0.4) \end{pspicture}}\}$. Then, associativity is satisfied, because for $1\leq j\leq m$, it is $$\begin{gathered} (\alpha\circ_{m+1}\beta)\circ_{j} \gamma \stackrel{\mathit{\eqref{def_cyclic_compos}}}{=} (\tau_{n+1}(\beta) \circ_1 \alpha)\circ_j \gamma \stackrel{\mathit{op.comp}}{=}\\ =\tau_{n+1}(\beta) \circ_1 (\alpha\circ_j \gamma ) \stackrel{\mathit{\eqref{def_cyclic_compos}}}{=} (\alpha\circ_j \gamma )\circ_{m+p}\beta,\end{gathered}$$ and for $m< j< m+n$, it is $$\begin{gathered} (\alpha\circ_{m+1}\beta)\circ_{j} \gamma \stackrel{\mathit{\eqref{def_cyclic_compos}}}{=} (\tau_{n+1}(\beta) \circ_1 \alpha)\circ_j \gamma \stackrel{\mathit{op.comp}}{=} (\tau_{n+1}(\beta) \circ_{j-m+1} \gamma)\circ_1 \alpha \stackrel{\eqref{compos_cyclic2}}{=}\\ = \tau_{n+p}(\beta \circ_{j-m}\gamma)\circ_1\alpha \stackrel{\mathit{ \eqref{def_cyclic_compos}}}{=} \alpha\circ_{m+1} (\beta\circ_{j-m}\gamma),\end{gathered}$$ while $$\begin{gathered} (\alpha\circ_{m+1}\beta)\circ_{m+n} \gamma \stackrel{\mathit{\eqref{def_cyclic_compos}}}{=} (\tau_{n+1}(\beta) \circ_1 \alpha)\circ_{m+n} \gamma \stackrel{\mathit{ \eqref{def_cyclic_compos}}}{=}\\ = \tau_{p+1}(\gamma)\circ_1 (\tau_{n+1}(\beta) \circ_1 \alpha) \stackrel{\mathit{op.comp}}{=} (\tau_{p+1}(\gamma)\circ_1 \tau_{n+1}(\beta)) \circ_1 \alpha \stackrel{\eqref{compos_cyclic3}}{=}\\ = \tau_{n+p}(\beta \circ_{n}\gamma) \circ_1 \alpha \stackrel{\mathit{ \eqref{def_cyclic_compos}}}{=} \alpha\circ_{m+1} (\beta \circ_{n}\gamma).\end{gathered}$$ We end this section by giving a presentation of $\widehat{\mathcal O}$ in terms of generators and relations, when $\mathcal O$ is given by quadratic generators and relations. Let us first recall the notion of operads given by generators and relations. Fix a set of colors $C$. Then let $E=\{E^{x,y}_z\}_{x,y,z\in C}$ be a collection of $k$-vector spaces, together with an $S_2$-action compatible with the colors. We want $E$ to be the binary generating set of a colored operad, where $x$, $y$ and $z$ correspond to the colors of the edges of a binary vertex, i.e. a vertex with exactly two incoming and one outgoing edge. Let $T$ be a rooted, colored tree where each vertex is binary, and let $v$ be a vertex with colors $(x,y;z)$ in $T$. Then, we define $E(v):= \left( E^{x,y}_z \oplus E^{y,x}_z \right)_{S_2}$, and with this, we set $E(T):=\bigotimes_{\text{vertex }v\text{ of }T} E(v)$. We define the free colored operad $\mathcal F(E)$ generated by $E$ to be $$\mathcal F(E)(\vec X;z):= \bigoplus_{ \text{binary trees $T$ of type }(\vec X;z) } E(T).$$ The $S_n$-action is given by an obvious permutation of the leaves of the tree using the $S_2$-action on $E$, and the composition maps are given by attaching trees. This definition can readily be seen to define a colored operad. An ideal $\mathcal I$ of a colored operad $\mathcal P$ is a collection of $S_n$-sub-modules $\mathcal I(\vec X;z)\subset \mathcal P(\vec X;z)$ such that $f\circ_{i} g$ belongs to the ideal whenever $f$ or $g$ or both belong to the ideal. A colored operad $\mathcal P$ is said to be quadratic if $\mathcal P=\mathcal F(E)/(R)$ where $\mathcal F(E)$ is the free colored operad on some generators $E$, and $(R)$ is the ideal in $\mathcal F(E)$ generated by a subspace with 3 inputs, called the relations, $R\subset \bigoplus_{w,x,y,z\in C} \mathcal F(E)(w,x,y;z)$. We recall from [@GeK (3.2)], that an operad $\mathcal O$ is called cyclic quadratic if it is quadratic, with generators $E$ and relations $R$, so that the $S_2$-action on $E$ is naturally extended to a $S_3$-action via the sign-representation $sgn:S_3\to S_2$, and $R\subset\mathcal F(E)(3)$ is an $S_4$-invariant subspace. In this case, $\mathcal O$ becomes a cyclic operad, see [@GeK (3.2)]. The following lemma is straight forward to check. \[O\_hat\_quadratic\] Let $\mathcal O$ be cyclic quadratic with generators $E$ and relations $R\subset\mathcal F(E)(3)$. Then $\widehat{\mathcal O}$ is generated by $\widehat{E}:=\widehat{E} ^{{ \begin{pspicture}(0,0)(0.2,0.2) \psline[linewidth=1pt](0.1,0)(0.1,0.2) \end{pspicture}},{ \begin{pspicture}(0,0)(0.2,0.2) \psline[linewidth=1pt](0.1,0)(0.1,0.2) \end{pspicture}}}_{{ \begin{pspicture}(0,0)(0.2,0.2) \psline[linewidth=1pt](0.1,0)(0.1,0.2) \end{pspicture}}}\oplus \widehat{E} ^{{ \begin{pspicture}(0,0)(0.2,0.2) \psline[linewidth=1pt](0.1,0)(0.1,0.2) \end{pspicture}},{ \begin{pspicture}(0,0)(0.2,0.2) \psline[linewidth=1pt, linestyle=dashed,dash=3pt 2pt](0.1,0)(0.1,0.2) \end{pspicture}}}_{{ \begin{pspicture}(0,0)(0.2,0.2) \psline[linewidth=1pt, linestyle=dashed,dash=3pt 2pt](0.1,0)(0.1,0.2) \end{pspicture}}} \oplus \widehat{E} ^{{ \begin{pspicture}(0,0)(0.2,0.2) \psline[linewidth=1pt, linestyle=dashed,dash=3pt 2pt](0.1,0)(0.1,0.2) \end{pspicture}},{ \begin{pspicture}(0,0)(0.2,0.2) \psline[linewidth=1pt](0.1,0)(0.1,0.2) \end{pspicture}}}_{{ \begin{pspicture}(0,0)(0.2,0.2) \psline[linewidth=1pt, linestyle=dashed,dash=3pt 2pt](0.1,0)(0.1,0.2) \end{pspicture}}} \oplus \widehat{E} ^{{ \begin{pspicture}(0,0)(0.2,0.2) \psline[linewidth=1pt, linestyle=dashed,dash=3pt 2pt](0.1,0)(0.1,0.2) \end{pspicture}},{ \begin{pspicture}(0,0)(0.2,0.2) \psline[linewidth=1pt, linestyle=dashed,dash=3pt 2pt](0.1,0)(0.1,0.2) \end{pspicture}}}$, defined as $$\begin{aligned} \widehat{E} ^{{ \begin{pspicture}(0,0)(0.2,0.2) \psline[linewidth=1pt](0.1,0)(0.1,0.2) \end{pspicture}},{ \begin{pspicture}(0,0)(0.2,0.2) \psline[linewidth=1pt](0.1,0)(0.1,0.2) \end{pspicture}}}_{{ \begin{pspicture}(0,0)(0.2,0.2) \psline[linewidth=1pt](0.1,0)(0.1,0.2) \end{pspicture}}}:=E&\subset \widehat {\mathcal O}({ \begin{pspicture}(0,0.1)(0.2,0.4) \psline[linewidth=1pt](0.1,0)(0.1,0.4) \end{pspicture}},{ \begin{pspicture}(0,0.1)(0.2,0.4) \psline[linewidth=1pt](0.1,0)(0.1,0.4) \end{pspicture}};{ \begin{pspicture}(0,0.1)(0.2,0.4) \psline[linewidth=1pt](0.1,0)(0.1,0.4) \end{pspicture}}),\\\widehat{E} ^{{ \begin{pspicture}(0,0)(0.2,0.2) \psline[linewidth=1pt](0.1,0)(0.1,0.2) \end{pspicture}},{ \begin{pspicture}(0,0)(0.2,0.2) \psline[linewidth=1pt, linestyle=dashed,dash=3pt 2pt](0.1,0)(0.1,0.2) \end{pspicture}}}_{{ \begin{pspicture}(0,0)(0.2,0.2) \psline[linewidth=1pt, linestyle=dashed,dash=3pt 2pt](0.1,0)(0.1,0.2) \end{pspicture}}}:=E&\subset \widehat {\mathcal O}({ \begin{pspicture}(0,0.1)(0.2,0.4) \psline[linewidth=1pt](0.1,0)(0.1,0.4) \end{pspicture}},{ \begin{pspicture}(0,0.1)(0.2,0.4) \psline[linewidth=1pt, linestyle=dashed,dash=4pt 3pt](0.1,0)(0.1,0.4) \end{pspicture}};{ \begin{pspicture}(0,0.1)(0.2,0.4) \psline[linewidth=1pt, linestyle=dashed,dash=4pt 3pt](0.1,0)(0.1,0.4) \end{pspicture}}) ,\\\widehat{E} ^{{ \begin{pspicture}(0,0)(0.2,0.2) \psline[linewidth=1pt, linestyle=dashed,dash=3pt 2pt](0.1,0)(0.1,0.2) \end{pspicture}},{ \begin{pspicture}(0,0)(0.2,0.2) \psline[linewidth=1pt](0.1,0)(0.1,0.2) \end{pspicture}}}_{{ \begin{pspicture}(0,0)(0.2,0.2) \psline[linewidth=1pt, linestyle=dashed,dash=3pt 2pt](0.1,0)(0.1,0.2) \end{pspicture}}}:= E&\subset \widehat {\mathcal O}({ \begin{pspicture}(0,0.1)(0.2,0.4) \psline[linewidth=1pt, linestyle=dashed,dash=4pt 3pt](0.1,0)(0.1,0.4) \end{pspicture}},{ \begin{pspicture}(0,0.1)(0.2,0.4) \psline[linewidth=1pt](0.1,0)(0.1,0.4) \end{pspicture}};{ \begin{pspicture}(0,0.1)(0.2,0.4) \psline[linewidth=1pt, linestyle=dashed,dash=4pt 3pt](0.1,0)(0.1,0.4) \end{pspicture}}),\\\widehat{E}^{{ \begin{pspicture}(0,0)(0.2,0.2) \psline[linewidth=1pt, linestyle=dashed,dash=3pt 2pt](0.1,0)(0.1,0.2) \end{pspicture}},{ \begin{pspicture}(0,0)(0.2,0.2) \psline[linewidth=1pt, linestyle=dashed,dash=3pt 2pt](0.1,0)(0.1,0.2) \end{pspicture}}}:=k&\subset \widehat {\mathcal O}({ \begin{pspicture}(0,0.1)(0.2,0.4) \psline[linewidth=1pt, linestyle=dashed,dash=4pt 3pt](0.1,0)(0.1,0.4) \end{pspicture}},{ \begin{pspicture}(0,0.1)(0.2,0.4) \psline[linewidth=1pt, linestyle=dashed,dash=4pt 3pt](0.1,0)(0.1,0.4) \end{pspicture}};\varnothing),\end{aligned}$$ and has relations $$\begin{aligned} R\subset\mathcal F(E)(3)\cong\mathcal F(\widehat{E})({ \begin{pspicture}(0,0.1)(0.2,0.4) \psline[linewidth=1pt](0.1,0)(0.1,0.4) \end{pspicture}},{ \begin{pspicture}(0,0.1)(0.2,0.4) \psline[linewidth=1pt](0.1,0)(0.1,0.4) \end{pspicture}},{ \begin{pspicture}(0,0.1)(0.2,0.4) \psline[linewidth=1pt](0.1,0)(0.1,0.4) \end{pspicture}};{ \begin{pspicture}(0,0.1)(0.2,0.4) \psline[linewidth=1pt](0.1,0)(0.1,0.4) \end{pspicture}}), \\ R\subset\mathcal F(E)(3)\cong\mathcal F(\widehat{E})({ \begin{pspicture}(0,0.1)(0.2,0.4) \psline[linewidth=1pt](0.1,0)(0.1,0.4) \end{pspicture}},{ \begin{pspicture}(0,0.1)(0.2,0.4) \psline[linewidth=1pt](0.1,0)(0.1,0.4) \end{pspicture}},{ \begin{pspicture}(0,0.1)(0.2,0.4) \psline[linewidth=1pt, linestyle=dashed,dash=4pt 3pt](0.1,0)(0.1,0.4) \end{pspicture}};{ \begin{pspicture}(0,0.1)(0.2,0.4) \psline[linewidth=1pt, linestyle=dashed,dash=4pt 3pt](0.1,0)(0.1,0.4) \end{pspicture}}), \\ R\subset\mathcal F(E)(3)\cong\mathcal F(\widehat{E})({ \begin{pspicture}(0,0.1)(0.2,0.4) \psline[linewidth=1pt](0.1,0)(0.1,0.4) \end{pspicture}},{ \begin{pspicture}(0,0.1)(0.2,0.4) \psline[linewidth=1pt, linestyle=dashed,dash=4pt 3pt](0.1,0)(0.1,0.4) \end{pspicture}},{ \begin{pspicture}(0,0.1)(0.2,0.4) \psline[linewidth=1pt](0.1,0)(0.1,0.4) \end{pspicture}};{ \begin{pspicture}(0,0.1)(0.2,0.4) \psline[linewidth=1pt, linestyle=dashed,dash=4pt 3pt](0.1,0)(0.1,0.4) \end{pspicture}}), \\ R\subset\mathcal F(E)(3)\cong\mathcal F(\widehat{E})({ \begin{pspicture}(0,0.1)(0.2,0.4) \psline[linewidth=1pt, linestyle=dashed,dash=4pt 3pt](0.1,0)(0.1,0.4) \end{pspicture}},{ \begin{pspicture}(0,0.1)(0.2,0.4) \psline[linewidth=1pt](0.1,0)(0.1,0.4) \end{pspicture}},{ \begin{pspicture}(0,0.1)(0.2,0.4) \psline[linewidth=1pt](0.1,0)(0.1,0.4) \end{pspicture}};{ \begin{pspicture}(0,0.1)(0.2,0.4) \psline[linewidth=1pt, linestyle=dashed,dash=4pt 3pt](0.1,0)(0.1,0.4) \end{pspicture}}).\end{aligned}$$ together with the relations $$\begin{aligned} G\subset \mathcal F(\widehat{E})({ \begin{pspicture}(0,0.1)(0.2,0.4) \psline[linewidth=1pt, linestyle=dashed,dash=4pt 3pt](0.1,0)(0.1,0.4) \end{pspicture}},{ \begin{pspicture}(0,0.1)(0.2,0.4) \psline[linewidth=1pt, linestyle=dashed,dash=4pt 3pt](0.1,0)(0.1,0.4) \end{pspicture}},{ \begin{pspicture}(0,0.1)(0.2,0.4) \psline[linewidth=1pt](0.1,0)(0.1,0.4) \end{pspicture}};\varnothing), \\ G\subset \mathcal F(\widehat{E})({ \begin{pspicture}(0,0.1)(0.2,0.4) \psline[linewidth=1pt, linestyle=dashed,dash=4pt 3pt](0.1,0)(0.1,0.4) \end{pspicture}},{ \begin{pspicture}(0,0.1)(0.2,0.4) \psline[linewidth=1pt](0.1,0)(0.1,0.4) \end{pspicture}},{ \begin{pspicture}(0,0.1)(0.2,0.4) \psline[linewidth=1pt, linestyle=dashed,dash=4pt 3pt](0.1,0)(0.1,0.4) \end{pspicture}};\varnothing), \\ G\subset \mathcal F(\widehat{E})({ \begin{pspicture}(0,0.1)(0.2,0.4) \psline[linewidth=1pt](0.1,0)(0.1,0.4) \end{pspicture}},{ \begin{pspicture}(0,0.1)(0.2,0.4) \psline[linewidth=1pt, linestyle=dashed,dash=4pt 3pt](0.1,0)(0.1,0.4) \end{pspicture}},{ \begin{pspicture}(0,0.1)(0.2,0.4) \psline[linewidth=1pt, linestyle=dashed,dash=4pt 3pt](0.1,0)(0.1,0.4) \end{pspicture}};\varnothing),\end{aligned}$$ where $G$ corresponds for a given coloring to the space $$G:= span \left< \begin{pspicture}(0,0.2)(1,1) \psline(0.5,0)(0.3,0.5) \psline(0.5,0)(0.7,0.5) \psline(0.3,0.5)(0.3,1) \psline(0.3,0.7)(0.1,1) \psline(0.3,0.7)(0.5,1) \rput[b](0.7,0.8){$\alpha$} \end{pspicture} - \begin{pspicture}(0,0.2)(2,1) \psline(0.5,0)(0.3,0.5) \psline(0.5,0)(0.7,0.5) \psline(0.7,0.5)(0.7,1) \psline(0.7,0.7)(0.9,1) \psline(0.7,0.7)(0.5,1) \rput[b](1.5,0.6){$\tau_3(\alpha)$} \end{pspicture} \text{ , for all } \alpha\in E^{{ \begin{pspicture}(0,0)(0.2,0.2) \psline[linewidth=1pt](0.1,0)(0.1,0.2) \end{pspicture}},{ \begin{pspicture}(0,0)(0.2,0.2) \psline[linewidth=1pt](0.1,0)(0.1,0.2) \end{pspicture}}}_{{ \begin{pspicture}(0,0)(0.2,0.2) \psline[linewidth=1pt](0.1,0)(0.1,0.2) \end{pspicture}}} \right>.$$ Koszulness of $\widehat{\mathcal O}$ {#quadrat-koszul} ==================================== This section is concerned with our main theorem, that Koszulness for $\mathcal O$ implies Koszulness for $\widehat{\mathcal O}$. To set up notation, we briefly recall the notion of quadratic dual, cobar dual and Koszulness of a (colored) operad. Recall that if the vector space $V$ is an $S_n$-module and $sgn_n$ is the sign representation, then we defined $V^\vee$ to be $V^*\otimes sgn_n$, where $V^*=Hom(V,k)$ denotes the dual space. Let $C$ be a set of colors. For every quadratic colored operad $\mathcal P$, we define the quadratic dual colored operad $\mathcal P^!:=\mathcal F(E)^\vee/(R^\perp)$, where $(R^\perp)$ is the ideal in $\mathcal F(E)^\vee$ generated by the orthogonal complement $R^\perp$ of $R$ as a subspace of $\left(\bigoplus_{w,x,y,z\in C} \mathcal F(E)(w,x,y;z) \right) ^\vee$. Notice that $\mathcal F(E)(\vec X;x)^\vee = \mathcal F(E^\vee) (\vec X;x)$, so that $\mathcal P^!$ is generated by $E^\vee$ with relations $R^\perp$, see [@GK (2.1.9)]. Now if $\mathcal P=\mathcal F(E)/(R)$ is a quadratic colored operad, then we can follow the definition from [@GK (3.2.12)], and define the cobar dual colored operad $\textbf{D} (\mathcal P)$ of $\mathcal P$, to be given by the complexes $\textbf{D} (\mathcal P)(\vec X;x)$ concentrated in non-positive degree, $\textbf{D} (\mathcal P)(\vec X;x):=$ $$\begin{gathered} \bigoplus_{ \substack{ \text{trees $T$ of}\\ \text{type $(\vec X;x)$},\\ \text{no internal edge}}} \mathcal P(T)^*\otimes {\mathrm{Det}}(T)\stackrel{{\partial}}{{{\longrightarrow}}} \bigoplus_{ \substack{ \text{trees } T \text{ of}\\ \text{type }(\vec X;x),\\ \text{1 internal edge}}} \mathcal P(T)^*\otimes {\mathrm{Det}}(T)\stackrel{{\partial}}{{{\longrightarrow}}}\\ {{\longrightarrow}}\dots\stackrel{{\partial}}{{{\longrightarrow}}} \bigoplus_{ \substack{ \text{trees } T \text{ of}\\ \text{type }(\vec X;x),\\ \text{binary tree}}} \mathcal P(T)^*\otimes {\mathrm{Det}}(T).\end{gathered}$$ Here, $\mathcal P(T)^*$ denotes the dual of $\mathcal P(T)$, and ${\mathrm{Det}}(T)$ denotes the top exterior power on the space $k^{Ed(T)}$, where $Ed(T)$ is the space of edges of the tree $T$. By definition, we let the furthest right space whose sum is over binary trees, be of degree zero, and all other spaces be in negative degree. In general, the zero-th homology of this complex is always canonically isomorphic to the quadratic dual $\mathcal P^!$, i.e. $H^0(\textbf{D}(\mathcal P)(\vec X;x))\cong \mathcal P^!(\vec X;x)$, see [@GK (4.1.2)]. The quadratic operad $\mathcal P$ is then said to be Koszul if the cobar dual on the quadratic dual $\textbf{D}(\mathcal P^!)(\vec X;x)$ is quasi-isomorphic to $\mathcal P(\vec X;x)$, i.e., by the above, $\textbf{D}(\mathcal P^!)(\vec X;x)$ has homology concentrated in degree zero. We now state our main theorem. \[O\_hat\_Koszul\] If $\mathcal O$ is cyclic quadratic and Koszul, then $\widehat{\mathcal O}$ has a resolution, which for a given sequence $\vec X$ of colors, with $|\vec X|=n$, is given by the quasi-isomorphisms $$\begin{aligned} \textbf{D}(\widehat{\mathcal O^!}) (\vec X;{ \begin{pspicture}(0,0.1)(0.2,0.4) \psline[linewidth=1pt](0.1,0)(0.1,0.4) \end{pspicture}})&\to& \widehat{ \mathcal O}(\vec X;{ \begin{pspicture}(0,0.1)(0.2,0.4) \psline[linewidth=1pt](0.1,0)(0.1,0.4) \end{pspicture}})=\mathcal O(n) \\ \textbf{D}(\widehat{\mathcal O^!}) (\vec X;{ \begin{pspicture}(0,0.1)(0.2,0.4) \psline[linewidth=1pt, linestyle=dashed,dash=4pt 3pt](0.1,0)(0.1,0.4) \end{pspicture}})&\to& \widehat{ \mathcal O}(\vec X;{ \begin{pspicture}(0,0.1)(0.2,0.4) \psline[linewidth=1pt, linestyle=dashed,dash=4pt 3pt](0.1,0)(0.1,0.4) \end{pspicture}})=\mathcal O(n) \\ \textbf{D}(\widehat{\mathcal O^!}) (\vec X;\varnothing) &\to& \widehat{ \mathcal O}(\vec X;\varnothing)=\mathcal O(n-1)\end{aligned}$$ Koszulness of $\mathcal O$ means exactly that the first and second maps are quasi-isomorphisms. The proof that the third map is also a quasi-isomorphism will concern the rest of this section. We need to show that the homology of $\textbf{D}(\widehat{\mathcal O^!}) (\vec X; \varnothing)$ is concentrated in degree $0$: $$\begin{aligned} \label{H0} H_0 \left(\textbf{D}(\widehat{\mathcal O^!}) (\vec X;\varnothing)\right )&=&\widehat{ \mathcal O}(\vec X;\varnothing)\\ \label{Hi<0} H_{i<0} \left(\textbf{D}(\widehat{\mathcal O^!}) (\vec X;\varnothing)\right)&=&\{0\}\end{aligned}$$ As mentioned in definition \[def\_O\_hat\], it is enough to restrict attention to the case where $\vec X = ({ \begin{pspicture}(0,0.1)(0.2,0.4) \psline[linewidth=1pt, linestyle=dashed,dash=4pt 3pt](0.1,0)(0.1,0.4) \end{pspicture}},{ \begin{pspicture}(0,0.1)(0.2,0.4) \psline[linewidth=1pt](0.1,0)(0.1,0.4) \end{pspicture}},\ldots,{ \begin{pspicture}(0,0.1)(0.2,0.4) \psline[linewidth=1pt](0.1,0)(0.1,0.4) \end{pspicture}},{ \begin{pspicture}(0,0.1)(0.2,0.4) \psline[linewidth=1pt, linestyle=dashed,dash=4pt 3pt](0.1,0)(0.1,0.4) \end{pspicture}})$. Let us first show the validity of equation . The map $\textbf{D} (\widehat{\mathcal O^!}) (\vec X;\varnothing)\to \widehat{ \mathcal O}(\vec X;\varnothing)$ expanded in degrees of $\textbf{D}(\widehat{\mathcal O^!})(\vec X;\varnothing)$ is written as $\cdots \stackrel{{\partial}}{{{\longrightarrow}}} \textbf{D}(\widehat{\mathcal O^!}) (\vec X;\varnothing)^{-1} \stackrel{{\partial}}{{{\longrightarrow}}} \textbf{D}(\widehat{\mathcal O^!}) (\vec X;\varnothing)^0 \stackrel{proj}{{\longrightarrow}}\widehat{\mathcal O}(\vec X;\varnothing)$. As $\mathcal O$ and thus $\mathcal O^!$ are quadratic, we have the following identification, using the language and results of lemma \[O\_hat\_quadratic\]: $$\begin{aligned} \widehat{\mathcal O}(\vec X;\varnothing)&=&\mathcal F( \widehat{E})/(R,G) (\vec X;\varnothing) \\ \textbf{D}(\widehat{\mathcal O^!}) (\vec X;\varnothing)^0&=& \bigoplus_{ \substack{ \text{binary trees }T \\ \text{of type }(\vec X;\varnothing) }} (\widehat{E^\vee}(T))\otimes {\mathrm{Det}}(T) =\mathcal F(\widehat{E})(\vec X;\varnothing)\\ \textbf{D}(\widehat{\mathcal O^!}) (\vec X;\varnothing)^{-1}&=&\bigoplus_{ \substack{ \text{trees }T\text{ of type }(\vec X;\varnothing), \\ \text{binary vertices, except}\\ \text{one ternary vertex} }} \left(\widehat{\mathcal O^!}(T)\right)\otimes {\mathrm{Det}}(T) \\ &=& \left\{ \begin{array}{c} \text{space of relations in $\mathcal F(\widehat{E})(\vec X;\varnothing)$}\\ \text{generated by $R$ and $G$} \end{array} \right\}\end{aligned}$$ The last equality follows, because the inner product relations for $\mathcal O^!$, which are the relation space $G$ for the cyclic quadratic operad $\mathcal O^!$ from lemma \[O\_hat\_quadratic\], are the orthogonal complement of the inner product relations for $\mathcal O$. Hence, the map $proj$ is surjective with kernel ${\partial}\big(\textbf{D}(\widehat{\mathcal O^!}) (\vec X; \varnothing )^{-1}\big)$. This implies equation . As for equation (\[Hi&lt;0\]), we will use an induction that shows that every closed element in $\textbf{D}(\widehat{\mathcal O^!}) (\vec X;\varnothing)^{-r}$, for $r\geq 1$ is also exact. The argument will use an induction which slides all of the “full” inputs from one of the two “dashed” inputs to the other. As a main ingredient of this, we will employ the products $*$ and $\#$ defined below, which are used to uniquely decompose an element in $\textbf{D}(\widehat {\mathcal O^!})(\vec X;\varnothing)$ as a sum of products of $*$ and $\#$. We need the following definition. Given two decorated trees $\varphi\in \textbf{D}(\mathcal O^!)(k), \psi \in \textbf{D}(\mathcal O^!)(l)$, we define new elements $\varphi * \psi$ and $\varphi \# \psi$ in $\textbf{D}(\widehat{ \mathcal O^!})({ \begin{pspicture}(0,0.1)(0.2,0.4) \psline[linewidth=1pt, linestyle=dashed,dash=4pt 3pt](0.1,0)(0.1,0.4) \end{pspicture}},{ \begin{pspicture}(0,0.1)(0.2,0.4) \psline[linewidth=1pt](0.1,0)(0.1,0.4) \end{pspicture}},\ldots,{ \begin{pspicture}(0,0.1)(0.2,0.4) \psline[linewidth=1pt](0.1,0)(0.1,0.4) \end{pspicture}},{ \begin{pspicture}(0,0.1)(0.2,0.4) \psline[linewidth=1pt, linestyle=dashed,dash=4pt 3pt](0.1,0)(0.1,0.4) \end{pspicture}};\varnothing)$ as follows. First, for $\varphi * \psi$ take the outputs of $\varphi$ and $\psi$ and insert them into the unique inner product decorated by the generator $1\in \widehat{\mathcal O^!}({ \begin{pspicture}(0,0.1)(0.2,0.4) \psline[linewidth=1pt, linestyle=dashed,dash=4pt 3pt](0.1,0)(0.1,0.4) \end{pspicture}},{ \begin{pspicture}(0,0.1)(0.2,0.4) \psline[linewidth=1pt, linestyle=dashed,dash=4pt 3pt](0.1,0)(0.1,0.4) \end{pspicture}};\varnothing)$: $$\begin{pspicture}(-3,0)(6,4) \psline[linestyle=dashed](2.5,0.5)(0,3) \psline[linestyle=dashed](2.5,0.5)(5,3) \rput(2.7,0.3){\tiny $1$} \pscircle[linestyle=dotted](4,2.2){1.4} \rput(-0.2,1){$\varphi$} \psline(1.5,1.5)(2,3) \psline(1.5,1.5)(1,3) \psline(1.3,2.1)(1.5,3) \psline(0.4,2.6)(0.4,3) \psline(0.7,2.3)(0.7,3) \rput(1.4,1.3){\tiny $\alpha_1$} \rput(0.2,2.4){\tiny $\alpha_2$} \rput(0.6,2.1){\tiny $\alpha_3$} \rput(1,2.3){\tiny $\alpha_4$} \pscircle[linestyle=dotted](1,2.2){1.4} \rput(5.2,1){$\psi$} \psline(3.5,1.5)(3,3) \psline(3.5,1.5)(4,3) \psline(4.5,2.5)(4.2,3) \psline(3.3,2.1)(3.3,3) \psline(3.3,2.1)(3.6,3) \rput(3.6,1.2){\tiny $\beta_1$} \rput(3,2){\tiny $\beta_2$} \rput(4.6,2.2){\tiny $\beta_3$} \rput(-1.5,2){$\varphi * \psi =$} \end{pspicture}$$ As for $\varphi\# \psi$, we assume, that $\varphi\in \textbf{D}(\mathcal O^!)(k)$ with $k\geq 2$. Then identify $\varphi$ with an element in $\textbf{D} (\widehat{ \mathcal O^!})({ \begin{pspicture}(0,0.1)(0.2,0.4) \psline[linewidth=1pt, linestyle=dashed,dash=4pt 3pt](0.1,0)(0.1,0.4) \end{pspicture}},{ \begin{pspicture}(0,0.1)(0.2,0.4) \psline[linewidth=1pt](0.1,0)(0.1,0.4) \end{pspicture}},\ldots,{ \begin{pspicture}(0,0.1)(0.2,0.4) \psline[linewidth=1pt](0.1,0)(0.1,0.4) \end{pspicture}},{ \begin{pspicture}(0,0.1)(0.2,0.4) \psline[linewidth=1pt, linestyle=dashed,dash=4pt 3pt](0.1,0)(0.1,0.4) \end{pspicture}};\varnothing)$ by interpreting the lowest decoration $\alpha_1\in O^!(m)$ of $\varphi$, as an inner product $\alpha_1\in \widehat{\mathcal O^!}({ \begin{pspicture}(0,0.1)(0.2,0.4) \psline[linewidth=1pt, linestyle=dashed,dash=4pt 3pt](0.1,0)(0.1,0.4) \end{pspicture}},{ \begin{pspicture}(0,0.1)(0.2,0.4) \psline[linewidth=1pt](0.1,0)(0.1,0.4) \end{pspicture}},\ldots,{ \begin{pspicture}(0,0.1)(0.2,0.4) \psline[linewidth=1pt](0.1,0)(0.1,0.4) \end{pspicture}},{ \begin{pspicture}(0,0.1)(0.2,0.4) \psline[linewidth=1pt, linestyle=dashed,dash=4pt 3pt](0.1,0)(0.1,0.4) \end{pspicture}};\varnothing)=\mathcal O^!(m)$. $\varphi\# \psi$ is defined by attaching $\psi$ to the dashed input labeled by $\alpha_1$: $$\begin{pspicture}(-3,0)(6,4) \psline[linestyle=dashed](2.5,0.5)(0,3) \psline[linestyle=dashed](2.5,0.5)(5,3) \rput(2.7,0.3){\tiny $\alpha_1$} \pscircle[linestyle=dotted](4,2.2){1.4} \rput(-0.2,1){$\varphi$} \psline(2.5,0.5)(2,3) \psline(2.5,0.5)(1.3,3) \psline(1.7,2.2)(1.7,3) \psline(0.4,2.6)(0.4,3) \psline(0.7,2.3)(0.7,3) \rput(0.2,2.4){\tiny $\alpha_2$} \rput(0.6,2.1){\tiny $\alpha_3$} \rput(1.4,2.1){\tiny $\alpha_4$} \psccurve[linestyle=dotted](0.5,0.8)(-0.5,3)(1,3.6)(2.4,3)(2.4,2)(2.7,1.2)(3.1,0.2)(2.4,0) \rput(5.2,1){$\psi$} \psline(3.5,1.5)(3,3) \psline(3.5,1.5)(4,3) \psline(4.5,2.5)(4.2,3) \psline(3.3,2.1)(3.3,3) \psline(3.3,2.1)(3.6,3) \rput(3.6,1.2){\tiny $\beta_1$} \rput(3,2){\tiny $\beta_2$} \rput(4.6,2.2){\tiny $\beta_3$} \rput(-1.5,2){$\varphi \# \psi =$} \end{pspicture}$$ Both $\varphi$ and $\psi$ are elements of $\textbf{D} (\mathcal O^!)$ and thus uncolored. The colorations for $\varphi *\psi$ and $\varphi\#\psi$ are uniquely determined by having the first and last entry dashed. The operations $*$ and $\#$ are extended to $\textbf{D} (\mathcal O^!)\otimes \textbf{D} (\mathcal O^!)\to \textbf{D} (\widehat{\mathcal O^!})(\vec X; \varnothing)$ by bilinearity. It is important to notice that every labeled tree, whose first and last inputs are “dashed", can uniquely be written as a product of $*$ or $\#$. To be more precise, suppose $\varphi$ and $\psi$ are labeled trees with $k+1$ and $l+1$ inputs respectively. We restrict our attention to the case of elements in $\textbf{D} (\widehat{\mathcal O^!})(\vec X; \varnothing)$ whose “dashed” inputs are labeled to be the first and the last input, and thus appear in the planar representation on the far left and the far right. Let $\sigma$ be a $(k,l)$-shuffle, i.e. a permutation of $\{1,\dots,k+l\}$ such that $\sigma(1)<\dots <\sigma(k)$ and $\sigma(k+1)<\dots <\sigma(k+l)$. Then define $\phi *_\sigma \psi$, resp. $\phi \#_\sigma \psi$, as the composition of $*$, resp. $\#$, with $\sigma$ applied to the “full” leaves of the resulting labeled tree. The “dashed” inputs remain far left and far right. With these notations it is now clear, that every labeled tree in $\textbf{D}(\widehat {\mathcal O^!})(\vec X;\varnothing)$ with “dashed” first and last inputs, can uniquely be written in the form $\varphi *_\sigma\psi$ or $\varphi\#_\sigma\psi$ for some $\varphi,\psi$ and $\sigma$. For each $r\geq 1$, we show that the $(-r)$th homology of $\textbf{D}(\widehat{\mathcal O^!})(\vec X;\varnothing)$ vanishes by decomposing every element in $\textbf{D}(\widehat{\mathcal O^!})(\vec X;\varnothing)^{-r}$ as a sum of terms of the form $\varphi *_\sigma\psi$ or $\varphi\#_\sigma\psi$, and then performing and induction on the degree of $\psi$. More precisely, let us define the order of $\varphi*_\sigma \psi$ or $\varphi\#_\sigma \psi$ to be the degree of $\psi$ in $\textbf{D}(\mathcal O^!)$. Then for $s\in \mathbb N$, we claim the following statement: - Let $\chi\in \textbf{D}(\widehat{\mathcal O^!}) (\vec X;\varnothing)^{-r}$ be a closed element ${\partial}(\chi)=0$. Then $\chi$ is homologous to a sum $\sum_i \sum_\sigma \varphi_i *_\sigma \psi_i+\sum_j \sum_\sigma \varphi'_j \#_\sigma\psi'_j$, where the order of each term is less or equal to $(-s)$. Rather intuitively this means, that for smaller $(-s)$, $\chi$ is homologous to decorated trees whose total degree is more and more concentrated on the right branch of the tree. It is easy to the that the above is true for $s=1$. As for the inductive step, let $\chi=\sum_i \sum_\sigma \varphi_i *_\sigma \psi_i+\sum_j\sum_\sigma \varphi'_j \#_\sigma\psi'_j$, where we assume an expansion so that $\{\varphi_i\}_i$ are linear independent, $\{\varphi'_j \}_j$ are linear independent, but the $\psi_i$ and the $\psi'_j$ are allowed to be linear combinations in $\textbf{D}(\mathcal O^!)$. We claim that those elements $\psi_i$ and $\psi'_j$, which are of degree $-s$, are closed in $\textbf{D} (\mathcal O^!)$. This follows from ${\partial}(\chi)=0$ and the inductive hypothesis, because the only terms of the boundary ${\partial}(\chi)$, which are of order $-s+1$, are terms of the form $\varphi_i *_\sigma {\partial}(\psi_i)$ and $\varphi'_j \#_\sigma {\partial}(\psi'_j)$. But then, $\psi_i$ and $\psi'_j$ are necessarily of degree $-s$. The exactness of $\textbf{D} (\mathcal O^!)$ at the degree $-s$ implies that $\psi$s of the degree $-s$ are exact, i.e. there are elements $\Psi_i, \Psi'_j\in \textbf{D}(\mathcal O^!)$ such that $\psi_i={\partial}(\Psi_i)$, $\psi'_j ={\partial}(\Psi'_j)$. Then, take $S:={\partial}\left( \sum_i\sum_\sigma \varphi_i *_\sigma \Psi_i+\sum_j \sum_\sigma \varphi'_j \#_\sigma\Psi'_j\right)$, where the sum is over those $i$’s and $j$’s which have the constructed $\Psi_i$’s and $\Psi'_j$’s. As the total degree of the $\Psi$’s is $-s-1$, we see that the only terms of $S$ with degree greater or equal to $-s$ are the terms $$\sum_i \sum_\sigma \varphi_i *_\sigma {\partial}(\Psi_i) + \sum_j\sum_\sigma \varphi'_j \#_\sigma{\partial}(\Psi'_j) =\sum_i \sum_\sigma \varphi_i *_\sigma \psi_i+ \sum_j \sum_\sigma \varphi'_j \#_\sigma\psi'_j.$$ It follows that $\chi-S$ only contains terms of degree less or equal to $-s-1$, and $\chi$ is homologous to $\chi-S$. This concludes the inductive step. We complete the proof of the theorem by noticing that $\textbf{D}(\mathcal O^!) (l)$ is concentrated in finite degrees, so that the $\psi_i$s and $\psi'_j$s eventually have to be identically $0$. As a consequence every closed element $\chi$ is eventually homologous to $0$. It follows that the complex $ \textbf{D}(\widehat{\mathcal O^!}) (\vec X;\varnothing)$ has no homology in degrees $r\neq 0$. Algebras over $\widehat{\mathcal O}_\infty$ {#homotop-ip} =========================================== In this section, we investigate algebras over $\widehat{\mathcal O}_\infty:=\textbf{D} (\widehat{\mathcal O^!})$. The particular cases of the associative operad $\mathcal Assoc$ and the commutative operad $\mathcal Comm$ will be considered. Before looking at $\widehat{\mathcal O}_\infty$, let us first consider algebras over $\widehat{\mathcal O}$. These are given by “algebra maps” $\mathcal O(n) \otimes A^{\otimes n}\to A$, “module maps” $\bigoplus_{r+s=n-1} \mathcal O(n) \otimes A^{\otimes r}\otimes M\otimes A^{\otimes s}\to M$, and since $\widehat{\mathcal O}(\vec X;\varnothing) =\mathcal O(n-1)$ for $|\vec X|=n$, we also have “inner product maps” $ \mathcal O(n-1) \to Hom(A^{\otimes i-1} \otimes M \otimes A ^{\otimes j-i-1} \otimes M \otimes A^{\otimes n-j} ,k)$. Notice that in the lowest case $n=2$, the “inner product map" $\mathcal O(1)\to Hom(M\otimes M,k)$ determines a map $<.,.>:M\otimes M\to k$, given by the image of the unit $1_k\in k=\mathcal O(1)$. Note that $<.,.>$ is invariant under the module maps mentioned above, and using the composition and the $S_n$-action of $\widehat{\mathcal O}$, all the higher inner product maps are determined by $<.,.>$ together with the module maps. We now describe algebras over the operad $\textbf{D} (\widehat{\mathcal O^!})$. This will be given in terms of derivations and maps of free $\mathcal O$-algebras and free $\mathcal O$-modules. Recall from [@GK (1.3.4)], that a free $\mathcal P$-algebra is generated by the $k$-vector space $A$ given by $F_{\mathcal P} A:=\bigoplus_{n\geq 1}(\mathcal P(n)\otimes A^{\otimes n})_{S_n}$. $F_{\mathcal P} A$ is an algebra over $\mathcal P$, i.e., there are maps $ \gamma:\mathcal P(n)\otimes (F_{\mathcal P} A )^{\otimes n} \to F_{\mathcal P} A$ coming from the composition in $\mathcal P$ and the tensor products, which satisfy the required compatibility conditions, see [@GK (1.3.2)]. An algebra derivation $d\in \mathrm{Der}(F_{\mathcal P}A)$ is defined to be a map from $F_{\mathcal P} A$ to itself, making the following diagram commute: $$\begin{CD} \mathcal P(k) \otimes (F_{\mathcal P}A)^{\otimes k}& @>\gamma>> & F_{\mathcal P}A\\ @V\sum_i \mathrm{id}\otimes \mathrm{id}^{\otimes i} \otimes d \otimes \mathrm{id}^{\otimes (k-i-1)}VV & & @VVdV\\ \mathcal P(k) \otimes (F_{\mathcal P}A)^{\otimes k}& @>\gamma>> & F_{\mathcal P}A \end{CD}$$ Similarly, if $A$ and $M$ are $k$-vector spaces, we define the free module $M$ over $A$ to be $F_{\mathcal P,A} M := \bigoplus_{n\geq 1} \left(\bigoplus_{r+s=n-1} \mathcal P(n) \otimes A^{\otimes r} \otimes M \otimes A^{\otimes s}\right)_{S_{n}}$. Then $F_{\mathcal P,A} M$ is a module over $F_{\mathcal P}A$ over $\mathcal P$, which means that there are maps $\gamma^M:\bigoplus_{r+s=n-1} \mathcal P(n)\otimes (F_{\mathcal P} A )^{\otimes r} \otimes F_{\mathcal P,A} M \otimes (F_{\mathcal P} A )^{\otimes s} \to F_{\mathcal P,A} M$ given by composition of elements of the operad and tensor product of elements of $A$. These maps satisfy the required module axioms, see [@GK (1.6.1)]. A module derivation $g\in \mathrm{Der}_d (F_{\mathcal P, A}M)$ over $d\in \mathrm{Der}(F_{\mathcal P}A)$, is define to be a map from $F_{\mathcal P, A}M$ to itself, making the following diagram commutative: $$\begin{CD} \mathcal P(k) \otimes (F_{\mathcal P}A)^{\otimes (k-1)}\otimes F_{\mathcal P, A}M & @>\gamma^M>> & F_{\mathcal P, A}M\\ @V\sum_{i<k} \mathrm{id}\otimes \mathrm{id}^{\otimes i} \otimes d \otimes \mathrm{id}^{\otimes (k-i-1)}+ \mathrm{id}\otimes \mathrm{id}^{\otimes (k-1)} \otimes g VV & & @VVgV\\ \mathcal P(k) \otimes (F_{\mathcal P}A)^{\otimes (k-1)}\otimes F_{\mathcal P, A}M & @>\gamma^M>> & F_{\mathcal P, A}M \end{CD}$$ Finally, a module map $f\in \mathrm{Mod}(F_{\mathcal P, A}M, F_{\mathcal P,A}N)$ is defined to be a map from $F_{\mathcal P,A}M$ to $F_{\mathcal P,A}N$ making the following diagram commutative: $$\begin{CD} \mathcal P(k) \otimes (F_{\mathcal P}A)^{\otimes (k-1)}\otimes F_{\mathcal P, A}M & @>\gamma^M>> & F_{\mathcal P, A}M\\ @V\mathrm{id}\otimes \mathrm{id}^{\otimes (k-1)} \otimes f VV & & @VVfV\\ \mathcal P(k) \otimes (F_{\mathcal P}A)^{\otimes (k-1)}\otimes F_{\mathcal P, A}N & @>\gamma^N>> & F_{\mathcal P, A}N \end{CD}$$ If $\mathcal P$ is a cyclic operad, then we can use this extra datum to associate to every derivation $g$ over a free module $M$ a derivation $h$ over the free module on the dual space $M^\ast=Hom(M,k)$. \[dual-module\] Let $\mathcal P$ be a cyclic operad, and let $A$ and $M$ be a vector space over $k$, which are finite dimensional in every degree. Assume furthermore, that there are derivations $d\in \mathrm{Der} (F_{\mathcal P}\,A)$, and $g\in \mathrm{Der}_d (F_{\mathcal P,A}M)$ over $d$. The maps $d$ and $g$ are determined by maps $$\begin{aligned} d_n:\,A&\to& \bigoplus_n \mathcal P (n)\otimes A^{\otimes n},\\ g_n:\,M&\to& \bigoplus_{k+l=n-2} \mathcal P (k+l+1)\otimes A^{\otimes k} \otimes \,M \otimes A^{\otimes l}.\end{aligned}$$ Then there is an induced derivation on $M^*$ over $d$ in the following way. Define $h\in \mathrm{Der}_d (F_{\mathcal P,A}M^*)$ by maps $h_n:\,M^* \to \bigoplus_{k+l=n-2} \mathcal P(k+l+1)\otimes A^{\otimes k} \otimes M^* \otimes A^{\otimes l} $, which are given by its application to $a^\ast_1,\dots,a^\ast_{k+l} \in \,A^\ast$, $m^*_1\in \,M^*$, $m_2\in \,M$ as $$\begin{gathered} h_n(m^*_1) (a^*_1,\dots,a^*_{k},m_2,a^*_{k+1},\dots,a^*_{k+l}) \\ :=(-1)^\epsilon \cdot \tau_{k+l+2}^{l+1}(g_n(m_2)(a^*_{k+1},\dots,a^*_{k+l},m^*_1,a^*_1,\dots, a^*_{k})) \in\mathcal P(k+l+1).\end{gathered}$$ $$\begin{pspicture}(0,-1)(5,2.5) \psline(2,1)(0.8,0) \psline(2,1)(1.2,0) \psline(2,1)(1.6,0) \psline(2,1)(2.4,0) \psline(2,1)(2.8,0) \psline(2,1)(3.2,0) \psline[arrowsize=0.2, arrowinset=0, linestyle=dashed](2,2)(2,1) \rput[l](2.5,1.35){$h$} \rput[m](2,2.2){$m^*_1$} \psline[linestyle=dashed](2,0)(2,1) \rput(2,-0.4){$a^*_{k+l}\dots a^*_{k+1}$ $m_2$ $a^*_{k} \dots a^*_{1}$\quad} \psline[linearc=0.3, arrowsize=0.15]{->}(1.6,1.2)(1.9,1.5)(2.4,1)(1.9,0.5)(1.5,0.9) \rput(4.5,1.5){$:=(-1)^\epsilon \cdot$} \end{pspicture} \begin{pspicture}(0,-1)(4,2.5) \psline(2,1)(0.8,0) \psline(2,1)(1.2,0) \psline(2,1)(1.6,0) \psline(2,1)(2.4,0) \psline(2,1)(2.8,0) \psline(2,1)(3.2,0) \psline[arrowsize=0.2, arrowinset=0, linestyle=dashed](2,2)(2,1) \rput[l](2.5,1.35){$\left(\tau_{k+l+2}^{l+1}\otimes id\right) (g)$} \rput[m](2,2.2){$m_2$} \psline[linestyle=dashed](2,0)(2,1) \rput(2,-0.4){\quad $a^*_{k} \dots a^*_{1}$ $m^*_1$ $a^*_{k+l} \dots a^*_{k+1}$} \psline[linearc=0.3, arrowsize=0.15]{->}(1.6,1.2)(1.9,1.5)(2.4,1)(1.9,0.5)(1.5,0.9) \end{pspicture}$$ Here $\tau_{k+l+2}^{l+1}$ denotes the $(l+1)$st iteration of $\tau_{k+l+2}$, and $\epsilon=(|m^*_1|+|a^*_1|+\dots+|a^*_k|)\cdot (|m_2|+|a^*_{k+1}|+\dots+|a^*_{k+l}|)$. A straightforward check shows that if $d^2=0$ and $g^2=0$, then it is also $h^2=0$. The following proposition identifies algebras over $\textbf{D} (\widehat{\mathcal O^!})$. Its proof is similar to that in [@GK Proposition (4.2.14)]. \[O\_hat\_algebras\] Let $\mathcal O$ be a cyclic quadratic operad, and let $A$ and $M$ be graded vector spaces over $k$, which are finite dimensional in every degree. Then giving $(A,M)$ the structure of an algebra over $\textbf{D} (\widehat{\mathcal O^!})$ is equivalent to the following data: - a derivation $d\in \mathrm{Der}(F _{\mathcal O^!}\,A^*[1])$ of degree $1$, with $d^2=0$, - a derivation $g\in \mathrm{Der}_d (F_{\mathcal O^!,\,A^*[1]}M^*[1])$ over $d$ of degree $1$, with $g^2=0$, which by definition \[dual-module\] also implies a derivation $h\in \mathrm{Der}_d (F_{\mathcal O^!,\,A^*[1]}M[1])$ over $d$ with $h^2=0$, - a module map $f\in \mathrm{Mod}(F_{\mathcal O^!, A^*[1]}M[1], F_{\mathcal O^!,A^*[1]}M^*[1])$ of degree $0$ such that $f\circ h = g \circ f$, and satisfying the following symmetry condition: let $f$ be given by maps $f_n:\,M[1]\to \bigoplus_{k+l=n-2} \mathcal O^!(k+l+1)\otimes A^*[1]^{\otimes k}\otimes \,M^*[1] \otimes A^*[1]^{\otimes l}$, then $$\begin{gathered} \label{eq:symm} f_n(m_2)(\alpha^*;a_1,\dots,a_i,m_1,a'_1,\dots,a'_j)=\\ = (-1)^\epsilon f_n(m_1)(\alpha^*\circ \tau_{i+j+2}^{j+1} ;a'_1,\dots,a'_j,m_2,a_1,\dots,a_i).\end{gathered}$$ where $\epsilon=(|m_2|+|a_1|+\dots+|a_i|+i+1)\cdot (|m_1|+ |a'_1|+\dots+ |a'_j|+j+1)$. If $\mathcal O$ is cyclic quadratic and Koszul, then, by theorem \[O\_hat\_Koszul\], $\textbf{D}( \widehat{\mathcal O^!} )\cong \widehat{\mathcal O}$ and we call $(A,M)$ a homotopy $\mathcal O$-algebra with homotopy $\mathcal O$-module and homotopy $\mathcal O$-inner product if there are derivations $d$ and $g$ together with a module map $f$ satisfying the conditions from proposition \[O\_hat\_algebras\]. \[assoc\] Let $\mathcal Assoc$ be the associative operad, see [@GK (1.3.7)] and [@GeK (2.3)]. In this case, $\mathcal Assoc^!=\mathcal Assoc$, and therefore the free $\mathcal Assoc^!$-algebra is given by the tensor algebra on the underlying vector space, i.e. $F_{\mathcal Assoc^!} A^*[1]=T(A^*[1])=\bigoplus_{n} A^*[1]^{\otimes n}$. Similarly, $F_{\mathcal Assoc^!, A^*[1]}M^*[1]=T^{A^*[1]}{M^*[1]}:=\bigoplus_{k,l} M^*[1]^{\otimes k}\otimes A^*[1]\otimes M^*[1]^{\otimes l}$. We see after dualizing, that $(A,M)$ is a homotopy $\mathcal Assoc$-algebra with homotopy $\mathcal Assoc$-module and homotopy $\mathcal Assoc$-inner product if there are coderivations $D:TA[1]\to TA[1]$ and $G:T^{A[1]} M[1]\to T^{A[1]} M[1]$ and a comodule map $F:T^{A[1]} M[1]\to T^{A[1]} M^*[1]$ satisfying $D^2=0, G^2=0, F\circ H=G\circ F$ and the symmetry condition , where $H$ is the induced coderivation on the dual space $M^*[1]$. Thus, we recover exactly the concept of $\infty$-inner product over an $A_\infty$-algebra as defined in [@Tr], which additionally satisfies the symmetry condition , coming from switching the factors of $M$. Furthermore, one can see from [@Tr2 Lemma 2.14], that this additional symmetry implies that the $\infty$-inner product is symmetric in the sense of [@Tr2 Definition 2.13]. In [@Tr2], it was shown that if a symmetric $\infty$-inner product is also non-degenerate, then it induces a BV-structure on the Hochschild-cohomology of the given $A_\infty$-algebra. It would be interesting to have a generalization of this result to any cyclic operad $\mathcal O$, which amounts to look for a similar “$\mathcal O$-BV-structure” on the homology of the chain complex $ C_n^{\mathcal O}(A)=\left(\mathcal O^!(n)^{\vee}\otimes A^{\otimes n} \right)_{S_n} $ of an $\mathcal O$-algebra $A$ from [@GK (4.2.1)]. \[exa-comm\] Let $\mathcal Comm$ be the commutative operad, see [@GK (1.3.8)] and [@GeK (3.9)]. It is well known, that $\mathcal Comm^!=\mathcal Lie$ is the Lie operad. Thus, we get $F_{\mathcal Comm^!} A^*[1]=L(A^*[1]):=\bigoplus_n \left(\mathcal Lie(n)\otimes A^*[1]^{\otimes n} \right)_{S_n}$ is the free Lie algebra generated by $A^*[1]$, and $F_{\mathcal Comm^!, A^*[1]}M^*[1]= \bigoplus_n \left(\bigoplus_{k+l=n-1} \mathcal Lie(n) \otimes A^*[1]^{\otimes k} \otimes M^*[1] \otimes A^*[1]^{\otimes l}\right)_{S_{n}}$. It is worth noting, that in [@Ginot Section 2], these spaces were already considered as $C_\infty$-algebras with $C_\infty$-modules. We thus have the concept of homotopy $\mathcal Comm$-inner products as module maps between $C_\infty$-modules $M$ and $M^*$. [99]{} J. F. Adams, “Infinite loop spaces”, Annals of Mathematics Studies, 90. Princeton University Press, Princeton, N.J.; University of Tokyo Press, Tokyo (1978) C. Berger, I. Moerdijk, “Resolution of coloured operads and rectification of homotopy algebras", Categories in algebra, geometry and mathematical physics, 31–58, Contemp. Math., 431, Amer. Math. Soc., Providence, RI (2007) J. M. Boardman, R. M. Vogt, “Homotopy Invariant Algebraic Structures on Topological Spaces” , Springer Verlag, (1973) E. Getzler, M. M. Kapranov, “Cyclic Operads and Cyclic Homology” Geometry, Topology, and Physics for Raoul Bott, International Press (1994) G. Ginot, “(Co)homology of $C_\infty$-algebras and applications to string topology", to be published in workshop proceedings “Algebraic and Geometric Deformation Spaces" V. Ginzburg, M. M. Kapranov, “Koszul duality for operads”, , no. 1, 203-272 (1994) P. van der Laan, “Coloured Koszul duality and strongly homotopy operads” `math.QA/0312147` R. Lawrence, D. Sullivan, “A free differential Lie algebra for the interval" `arXiv:math/0610949v2` M. Markl, S. Shnider, J. Stasheff, “Operads in Algebra, Topology and Physics” AMS Mathematical Surveys and Monographs [**96**]{} (2002) T. Tradler, “Infinity-inner-products on A-infinity-algebras”, to appear in Homotopy and Related Structures T. Tradler, “The BV algebra on Hochschild Cohomology induced by Infinity-inner products” to appear in Annales de L’institut Fourier T. Tradler, M. Zeinalian, “On the Cyclic Deligne Conjecture" , J. Pure Appl. Algebra 204, no. 2, p. 280-299, 2006 T. Tradler, M. Zeinalian, “Algebraic String Operations", K-Theory, vol. 38, no. 1, 2007 T. Tradler, M. Zeinalian, D. Sullivan, “Infinity Structure of Poincare Duality Spaces”, Algebraic and Geometric Topology, vol. 7, p. 233-260, 2007
{ "pile_set_name": "ArXiv" }
Ghost Recon Advanced Warfighter 2 The ground shakes beneath me as another mortar hits home close to my position. I adjust my stance slightly, pushing back harder against the sun warmed stone of the raised flower bed that remains the only thing protecting me from certain death. I cough as the smoke and dust that clouds the air fills my lungs, breathing is the least of my worries however. A small respite from the shooting gives me chance to peer quickly over the edge of my makeshift cover before a hail of bullets sends me quickly to my knees again. In the brief moment I had to take in my surroundings I was able to pick out three armoured tanks and at least five soldiers on foot shooting from positions of cover behind abandoned cars. A feeling of panic rises from the pit of my stomach, not a feeling I'm very familiar with its potency threatens to overwhelm me, I shut my eyes and force my body to relax, allowing my mind to clear before I open them again. Glancing to my right, to the next bullet scarred flower bed in the row, I can see three of my men also taking cover from the barrage of gunfire aimed at them. A wave of guilt washes over me, I've taken them safely this far, through the mess that northern Mexico seems to have become and they've followed me unquestioningly as I've asked them to risk their lives time and again in a conflict none of them instigated but are all duty bound to participate in. But now, laying there behind a pair of decorative flower beds in the middle of Juarez on a mission that the country they serve will insist never happened, I have no way of saving them, there's no way we can risk changing our position while under such heavy fire and we'd be slaughtered the moment we poke our heads up long enough to take any kind of meaningful aim at our assailants. I've failed them. My mind races thinking of ways I could have got us through this if only I'd approached it differently, if only I'd taken my sniper rifle to a rooftop and cleared the square myself before sending them in. If only. Another huge explosion causes a fresh shower of debris to fall over me bringing my thoughts sharply back into focus. The tanks have started firing again, it'll only be a matter of minutes now before they've either destroyed our cover and us along with it or sent men to out-flank us and pick us off as we cower behind these flower beds. Suddenly there's a crackle in my ear and a video feed is patched into the visor on my headset, General Keating appears on screen, his voice cutting through the chaos around me as he urgently barks a new set of orders. Air strike, he's authorising an air strike to save us! All he needs is the co-ordinates ASAP as the planes are only moments away. I swiftly overlay the map of the surrounding area on my headset display and pinpoint the locations of the three tanks. General Keating vanishes instantly from my display and for a brief moment I wonder if the co-ordinates have got through alright. I don't have to wait long to find out, less than twenty seconds later a series of massive explosions rip through the square as the unmistakable sound of jet fighters screaming overhead confirm the presence of the promised air strike, my world slows to a crawl, my vision blurs and I can feel the earth erupt around me as yet more missiles hit home. When the ringing in my ears finally dies down and is replaced by the thumping sound of my heartbeat I hold my breath, listening for the sound of hostiles. The smoke begins to clear and I can see my men, all alive, looking to me for instructions, I motion for them to remain in cover before slowly peering round the corner into the square. The fiercely burning remains of three tanks and the occasional sound of falling debris is all that punctuates the now almost eerie silence. I stand up, signalling for my men to follow me across the square to secure a better position. Amidst the sudden calm of the destruction I'm running through the familiar beeping noise that means new mission objectives are being downloaded startles me bringing a wry smile to my face. We were safe for now, but this isn't the end, time to see what the powers that be have in store for us next. And so ends the first act in Ubisoft's latest edition to the Ghost Recon series. It's often hard to describe to someone what makes a game great, what pushes it out from the packed ranks of whatever genre it falls into. Describe an average game and a great game to someone using the simple facts and it'll be hard for them to gain any real sense of what makes one better than the other, to do that you have to play them; you have to enter the game-world and take part in the events contained within them. In short, to understand them you have to experience them. The end of the first act, as I described above, isn't by any means the highlight of the game, its also clearly not the most difficult part, it was however one of the parts that's stuck in my head as being one of those gaming moments where I realised I'd become so submerged in the experience that it had ceased to be simply a game and had become instead an experience. Reviews, by their very nature, are personal. The reviewer does his or her best to convey the main features of a game, the bits they felt were innovative and the bits they felt weren't before drawing a conclusion about how much fun they'd had playing it and awarding a score that purports to tell the reader, at a glance, if the game is worthy of your hard earned money. What is harder to convey are those times when a game is so good you just want to tell all your friends about it, when you want to keep starting sentences with phrases like 'There's this cool bit where....' rather than going on about the detail of the textures on some guy's trousers and when you lay awake at night with bits of it replaying themselves over and over again in your head. Of course, for all my gushing praise you'll no doubt still want some traditional review style facts and some kind of objective critique to go with it, so here goes. For those of you who played last year's BAFTA award winning Ghost Recon Advanced Warfighter there will be a certain amount of familiarity, indeed one of the most nagging criticisms to befall GRAW 2 is that it can feel very much like version 1.5 rather than a true sequel, but then the original was one of the most critically acclaimed and commercially successful Xbox 360 titles of last year so that's not automatically a bad thing. There are also some very definite improvements over last year's offering, the eagle eyed amongst you will notice a certain amount of graphical polish on the already spectacular looking engine with improved lighting and explosions the most obvious and impressive. The checkpoint placing has also been overhauled which will come as a god send to those who'd become used to fighting through long treacherous sections only to die near the end and have to redo it all again, although still missing is the ability to re-load any passed checkpoint meaning you can't replay specific sections of a level. You can also now pick a medic as one of your Ghosts which means effectively having a walking-talking stack of health packs around which come in very handy at times. In the spirit of keeping you stocked up on the necessities there is also a new unit called the mule that is available on certain missions, this can be directed around the battlefield and contains a useful supply of ammo and health within its armoured shell. The cross-com method of controlling the units under your command reappears in its new updated version 2.0 guise. Left and right on the d-pad moves between selectable units and up and down issues context sensitive orders. The most significant update to it is the ability to, at the touch of the right bumper, effectively see through the eyes of the selected unit in glorious full screen allowing you to issue orders with much greater accuracy and effectiveness than before, it also significantly enhances the abilities of the UAV drone as you can now get a proper birds eye view of the battlefield to help plan your attacks. It's not all new though, and the series trademark tactical shooting remains firmly in place, honed to as near to perfection as it can be. Most missions revolve around getting from A to B making the best use of the available cover and killing everything in between but to GRAW 2's credit it rarely feels this simple in practice. The 'sticky' cover system works perfectly and when combined with the accuracy of the opposing forces certainly keeps the action tense, it would be cheap to mention Gears Of War at this point but there is an obvious surface similarity to the fluid duck and cover gameplay. The AI of your team mates is nicely up to scratch while not being always fool proof, you'll at least never find them rooted to the spot getting shot at simply because you asked them to go somewhere. One area where things haven't improved from last year is in the length of the single player campaign. As great as it is while it lasts it doesn't last anywhere near long enough, not even as long as the one in the original game which wasn't exactly epic in length itself. It's a shame and does take a small amount of gloss off the experience if for no other reason that like all good things you wish it could last forever. However, to make up for the brevity of its single player campaign GRAW 2 has a frankly stupendous multiplayer side to it. Making a welcome return is the separate co-op campaign full of entirely new missions following its own story based around the Panama Canal. With 16 players supported online these games can be truly epic in nature and are a sign of what can be so great about online play when structured well. Away from the co-op campaign more traditional multiplayer action is to be found amid the broad and impressive list of modes available from Territory, Objective Elimination to name a few, each with their own wide ranging set of different rules and settings that can be tweaked to create pretty much any kind of game you can think of. There are, to start with, 18 multiplayer maps available with an additional one available once you've linked your Live account to a Ubisoft one, and while some are more suited to certain types of game they're all uniformly well designed guaranteeing an evenly pitched battle. I'm sure there are many things I've not covered, new bit and improvements that warrant page space as much as any of the things I've mentioned here. But to go back to what I said earlier, it's really all about the experience, reading all the facts and features lists in the world isn't going to accurately convey the feeling of playing GRAW 2, the feeling of being sucked into a game world so beautifully formed and well designed that the individual features blur into the impressive whole. It may be a bit short, a bit similar to last years version and if you don't have access to Xbox Live then you'll be missing out on half the package, but as game experiences go this is up there with the best and as such comes very heartily recommended.
{ "pile_set_name": "Pile-CC" }
About Desmond Ability Resource Complex The Desmond Ability Resource Complex, based in Newcastle West, Co. Limerick provides facilities and services to a wide range of people experiencing disadvantage or social isolation in the West Limerick area
{ "pile_set_name": "Pile-CC" }
Strani sobota, 19. oktober 2013 Po treh tednih // After three weeks ... ... brez laka na mojih nohtih, sem se danes ponovno "opogumila" in ga nanesla.... without nail polish on my nails I find some courage and put it on again. Ugotovila sem namreč, da imam izredno slabe nohte, zato sem jim privoščila malo počitka. I found out that I have very bad nails, so I decided to take some "rest" with nail polish. Uma, Beauty UK Skoraj vsak večer sem jih mazala z Depend - myrrh oil in razlika je kar opazna. Verjetno je k temu pripomogla tako odsotnost laka in acetona, kot samo olje.Almost every night I put on Depend - myrrh oil and now I can see a difference. Probably also because I didn`t use any nail polish and acetone but just that oil.
{ "pile_set_name": "Pile-CC" }
57 Ill. App.2d 452 (1965) 206 N.E.2d 727 People of the State of Illinois, Defendant in Error, v. Larry Wheeler, Plaintiff in Error. Gen. No. 49,493. Illinois Appellate Court — First District, First Division. April 12, 1965. Rehearing denied May 10, 1965. *453 Jay M. Smyser, of Chicago, for plaintiff in error. Daniel P. Ward, State's Attorney of Cook County, of Chicago (Elmer C. Kissane and Joseph v. Roddy, Assistant State's Attorneys, of counsel), for defendant in error. MR. PRESIDING JUSTICE BURMAN delivered the opinion of the court. *454 This is an appeal from the conviction of Larry Wheeler for the murder of James Boleyn. The defendant was tried before a jury which found him guilty as charged in the indictment and fixed his sentence at imprisonment in the Illinois State Penitentiary for a term of twenty-five years. The trial court denied the defendant's post-trial motions and pronounced sentence. The Illinois Supreme Court issued its writ of error, appointed counsel to represent the indigent defendant in connection with the writ and subsequently transferred the appeal to this court. The defendant presents the following charges of error: (1) that the evidence was insufficient to establish his guilt beyond a reasonable doubt; (2) that the court improperly excluded certain testimony concerning the decedent's reputation for violence; (3) that the court improperly gave certain of the State's instructions and improperly refused to give the defendant's instruction on involuntary manslaughter. The defendant asks this court, on the basis of these errors, to reverse the conviction and discharge the defendant or to find the defendant guilty of manslaughter and order him to be discharged because he has already served a sufficient penalty for that crime, or to grant a new trial to determine the question of the defendant's guilt or innocence of manslaughter. Because the evidence is largely conflicting, we summarize the pertinent testimony of each of the principal witnesses. The State's chief witness, John Whitsett, testified that on the evening of November 1, 1959, when the events in question took place, he and the decedent were tending bar at Bill McGee's Tavern, located at 1764 North Larabee in Chicago. The defendant and his girl friend came into the tavern at about 8:30 or 9:00 p.m. and the decedent and Whitsett served them drinks until shortly before midnight, when the defendant's girl friend knocked an empty bottle *455 off the bar. As he picked up the bottle, Whitsett observed the decedent slapping the defendant with his hands. After several customers separated the decedent and defendant, the defendant and his girl friend left the tavern on the decedent's orders. In Whitsett's opinion, the defendant was not intoxicated at that time. About two hours later, the defendant and his girl friend returned to the tavern. As the defendant walked toward the back of the bar, the decedent came out from behind the bar toward the defendant carrying an eighteen-inch piece of insulated electrical cable which was ordinarily kept behind the bar. As the decedent approached him, the defendant said, "Don't hit me. I didn't come back to cause any trouble. I just came back to talk to you." Though Whitsett did not hear what else was said, he saw the decedent and defendant talk for a while and then shake hands. Then the defendant and his girl friend sat at the bar and the decedent ordered Whitsett to serve them, which he did. After a few minutes, however, Whitsett saw the decedent hitting the defendant on the side of the head with his fist. There was a scuffle and the decedent took the defendant by the neck and the seat of his pants, pushed him to the door and threw him out. Then the decedent ordered the defendant's girl friend to leave. Whitsett said that at the time of the scuffle, the decedent had nothing in his hands. He testified further that as the decedent was returning to the bar he (Whitsett) heard a voice outside the tavern; he could not hear what was said. The decedent then ran out the door and Whitsett heard four or five shots immediately thereafter. When Whitsett went outside he found the decedent lying on the sidewalk just outside the door and he saw a man, who he believed to be the defendant, running away carrying a gun. Whitsett said that he accompanied a police officer, Roland Harvey, *456 in search of the defendant whom he had known for seventeen months. They went to Tennessee Buck's Tavern, where only the officer went inside; after the officer came out again, the bartender came out and gave the officer a gun. Some time later, Whitsett saw the defendant and observed that there was blood running down his head and that there were blood stains on his shirt. Martin Curran, who was called by the State, testified that he went to Bill McGee's tavern at about 11:00 or 11:30 on the night in question. He said that the decedent "booted" the defendant out of the tavern with his foot and told him to stay out and not come back. Curran said he was standing at the bar at the time and after this incident he turned back to the bar to order a drink when he heard shots. He looked out the tavern window and saw a man with a gun. He went out the tavern door, saw the decedent lying on the ground two or three feet from the door; Curran saw nothing in the decedent's hand. Curran said that he saw a man running away and that he unsuccessfully chased him. On recross-examination, Curran further testified that his visit to the tavern on the night in question was the third occasion on which he had been in the tavern. When he was asked if he had ever seen the decedent put a man out of the tavern like he did on the night in question, the State objected on the ground that the defendant could only ask about the decedent's reputation; the court sustained the objection and the defendant withdrew the question. Curran was then asked if the decedent was in the habit of putting people out of the tavern; the State objected and the court sustained the objection. The questioning proceeded as follows: *457 Q. Do you know people in the community generally where this tavern is located? ... A. Not offhand, sir. Q. Are you acquainted at all with other people who frequent this tavern you went into? A. Just maybe a couple of my friends that I have went in with a couple of times or just by myself. Q. Based on this acquaintanceship, do you know the deceased's reputation as to his peacefulness — At this point the State objected on the ground that the foundation for the witness' testimony as to the decedent's reputation was insufficient. The court sustained the objection and the defendant withdrew the question. Police Officer Harvey, who was also called by the State, said that he arrived at the tavern about 2:30 in the morning. He found the decedent lying on the sidewalk. After speaking to the other bartender, Whitsett, they left the scene to search for the defendant. They first went to an apartment building where Whitsett said the defendant was living, but since the building was large and they did not know which apartment was the defendant's, they next proceeded to Tennessee Buck's Tavern where they had a conversation with the bartender, Gordon Williams. In the company of Whitsett and Williams, the officer went back to the defendant's apartment building where he saw a man walking out of the building. The officer called out "Larry" and when the man, whom he identified as the defendant, answered "yes," he put him under arrest. The officer further testified that he had obtained a gun at Tennessee Buck's Tavern and when he asked the defendant "if this was the gun he had left at Tennessee Buck's" *458 the defendant admitted that it was. The officer testified: "I then asked him why did he shoot James Boleyn. He says `I don't know why I did.'" Officer Harvey said that the gun smelled of smoke and that it contained six empty cartridges which he removed from the gun. Although, on cross-examination, he said that he ascertained that the defendant had been drinking, in his opinion, the defendant was not intoxicated. Another police officer, Charles Knapp, was called by the State. He testified that when the defendant was brought into the police station, he noticed a slight laceration on his head and several drops of blood on his shirt. Upon searching the person of the defendant, the officer found a sales slip showing that the defendant had purchased a gun on August 25, 1959, for $25.88. A comparison of the serial numbers on the slip and on the gun revealed that they were identical. Joseph Edward Campbell, the physician who performed the autopsy on the body of the decedent, testified that the decedent's body had four bullet wounds and that in his opinion internal bleeding resulting from the bullet wounds caused the decedent's death. The doctor also testified that an analysis of the decedent's blood revealed that at the time of death the decedent was intoxicated. The defendant took the stand as the only witness for his defense. He stated that he and his girl friend went to McGee's Tavern about six o'clock on the evening in question. He said that he was drinking beer and that he had no more than a couple of shots of whiskey. About midnight he heard something fall, but did not know what it was at the time. He testified that the decedent Boleyn, whom he had seen before in the neighborhood, came around the bar with what the defendant called a "blackjack" and beat him with it. Then the defendant and his girl friend left the tavern *459 and went to another bar where they had only one drink because the defendant was short of money. The defendant testified further that he returned to McGee's Tavern about two o'clock in the morning. He brought from home a gun on which he intended to borrow money from the owner of the tavern whom he had known for two years. He also intended to apologize to the decedent because he did not want any trouble. He said that he wanted to apologize because the decedent "was noted in the neighborhood, all the time beating up on people, and I was scared of him." The defendant testified that when he returned to McGee's Tavern, the decedent "came around the bar with this blackjack and I told him, I says, I put my hands up like that, I did not want him beating me there, and I told him I just wanted to make friends with him and didn't want no trouble. And he shook hands with me there and he said it was his fault and he thought I had throwed the bottle." The defendant said that he then ordered a drink and that when he asked the decedent whether the owner, McGee, was still there, the decedent jumped up, started swearing at the defendant and beat him over the head with the "blackjack," which the defendant described as a cable wrapped in tape. He said that when the decedent beat him out of the tavern door, "I was just lightheaded from the beating, and I was nervous and, well, I just turned around and started shooting. I couldn't see what I was shooting at, I was nervous." He said that he was scared then and ran. On cross-examination, the defendant testified that he had borrowed money from McGee on several previous occasions and that he had put the bill of sale for the gun in his pocket because he was going to sell it to McGee. The defendant admitted that the gun, which was received in evidence, was his and that when he *460 picked up the gun at home he knew that it was loaded with six bullets. In seeking reversal of his conviction, the defendant argues that the State did not produce sufficient evidence to establish beyond a reasonable doubt that the defendant was guilty of murder as charged in the indictment. Specifically the defendant argues that proof is lacking on the essential element of malice aforethought and that, in fact, the evidence proves that the defendant acted in self-defense. Furthermore, the defendant argues that there are also serious questions about the sufficiency of the evidence identifying the defendant as the person who shot the decedent and identifying the defendant's gun as the murder weapon. When all the evidence in the case is considered we are satisfied, as were the jury and judge who saw and heard the witnesses, that the evidence did prove that the defendant was guilty as charged beyond a reasonable doubt. The evidence shows that the defendant left McGee's Tavern after an altercation with the decedent; that the defendant went home and there obtained a gun which he knew was loaded; that some two hours after the first altercation, the defendant returned to the tavern carrying the loaded gun; that upon his return the defendant was beaten by the decedent who forced the defendant out of the tavern; that the decedent returned to the tavern to order the defendant's girl friend to leave; that the decedent, upon hearing a voice outside the tavern, ran out the front door and was immediately shot four times just outside the tavern door. The defendant admitted firing a gun outside the tavern and then fleeing. Whitsett identified the defendant as the man who was fleeing the scene. The uncontradicted evidence further shows that shortly after the shooting the police received a gun which the defendant admitted was his and that six bullets had been fired recently from the *461 gun. The jury could reasonably have disbelieved the defendant's story that the decedent continued to beat him with a "blackjack" outside the tavern. Indeed the evidence showed that immediately before the shooting, the decedent had returned to the tavern to order the defendant's girl friend to leave. The evidence of two witnesses indicates that during the time just before the shooting, the decedent was not carrying the so-called "blackjack." No "blackjack" was found in the vicinity of the decedent's body and Whitsett testified that on the morning following the shooting, he found the tape-wrapped cable in its usual place inside the bar. Furthermore, the jury could reasonably have disbelieved the defendant's story that he brought the gun back to the tavern in order to obtain a loan on it from McGee. The defendant admitted that McGee had loaned him money before and there was nothing to indicate that some collateral, such as a gun, was required to obtain the money on those previous occasions. [1] Hence the jury might reasonably conclude beyond a reasonable doubt that the defendant waited for the decedent to come outside the tavern and then shot him out of malice and not in self-defense. The cases cited by the defendant do not require a different result. The case which is primarily relied on by the defendant, People v. Motuzas, 352 Ill. 340, 185 NE 614, is not controlling. There the court concluded that the decedent and another person, acting according to a previously determined program between them, assaulted the defendant; that the decedent was carrying a weapon at the time; and that these circumstances induced in the defendant a reasonable and well founded belief that he was actually in danger of losing his life or of receiving great bodily harm. As we have already indicated the jury in the present case was justified in making findings directly opposite to those *462 which the court in Motuzas found to be reasonable. The other cases cited by the defendant are also inapplicable here. [2] The defendant next contends that the court erred in excluding evidence of the decedent's reputation for violence, which evidence would tend to prove the defendant's fear of the decedent thereby supporting his justification of self-defense. As indicated above, the defendant's counsel sought to elicit from Martin Curran, a customer who was in McGee's Tavern on the night in question, evidence concerning the decedent's reputation for peacefulness. Since Curran testified that he was not acquainted with the people in the community generally and had been in the tavern only "a couple of times," the court, on the proper objection by the State, excluded the testimony because of the lack of a sufficient foundation. We believe that the court committed no error in so ruling. [3] Evidence of the decedent's violent disposition and of his prior threats or misconduct is admissible in a murder case where the defendant relies on self-defense and the preliminary testimony establishes an act of aggression by the decedent. People v. Adams, 25 Ill.2d 568, 185 NE2d 676. However such testimony should not be heard unless the witness had an adequate knowledge of the decedent and those in the community who are acquainted with him. As the Supreme Court said in People v. Moretti, 6 Ill.2d 494, 129 NE2d 709: This court, on numerous occasions, has held that reputation witnesses must be shown to have adequate knowledge of the person queried about and that evidence of reputation, to be admissible, must be based upon contact with the subject's neighbors and associates rather than upon the personal opinion of the witness. (Citing cases.) (6 Ill2d at 523, 524) *463 We believe that the court properly excluded Curran's testimony concerning the decedent's reputation for peacefulness because Curran's own testimony showed that he did not have sufficient knowledge of the decedent and his neighbors and associates on which to base his testimony concerning the decedent's reputation for peacefulness. [4, 5] The defendant next contends that the court erred in giving an instruction on intoxication which stated "that drunkenness shall not be an excuse for any crime or misdemeanor, unless such drunkenness, be occasioned by the fraud, connivance, or force of some other person...." The defendant argues that this instruction is inapplicable since there was no contention that anyone had contributed to the defendant's intoxication. We find no error, however, in giving this instruction which pertains to the State's theory of the case. The defendant principally contends that by giving only this instruction, the jury was improperly led to believe that this instruction covered the entire subject of the effect of the defendant's intoxication. The defendant argues that the court erred in not giving an additional instruction that the defendant's drunkenness rendered him incapable of forming the intent necessary to prove murder. We cannot agree. The record does not show that the defendant offered such an instruction and he does not contend here that he did so. Under these circumstances, the trial court was under no duty to give the instruction on its own motion and the defendant's objection was thereby waived. People v. Carvin, 20 Ill.2d 32, 169 NE2d 260. [6, 7] The defendant also contends that the court erred in giving an instruction which informed the jury in essence that, even though they believed that the decedent made the first attack on the defendant, he was not acting in self-defense, if at the time of the *464 killing he was not in fear for his life or bodily safety. However, since this objection was not raised in the defendant's post trial motion, it is deemed to be waived. A party is limited to the errors alleged in the written motion and all other errors are waived. People v. Hunter, 23 Ill.2d 177, 177 NE2d 138. [8] Finally the defendant contends that it was error to refuse his tendered instruction on voluntary manslaughter. Voluntary manslaughter was defined by the statute, which was applicable at the time of this occurrence, as follows: In cases of voluntary manslaughter, there must be a serious and highly provoking injury inflicted upon the person killing, sufficient to excite an irresistible passion in a reasonable person, or an attempt by the person killed to commit a serious personal injury on the person killing. The killing must be the result of that sudden, violent impulse of passion supposed to be irresistible; for if there should appear to have been an interval between the assault or provocation given, and the killing, sufficient for the voice of reason and humanity to be heard, the killing shall be attributed to deliberate revenge, and punished as murder. (Ill Rev Stats 1959, c 38, § 362.) It is well established that where evidence in a murder prosecution would permit the jury to find the defendant guilty of manslaughter rather than murder, it is reversible error to refuse to give an instruction on manslaughter. People v. Canada, 26 Ill.2d 491, 187 NE2d 243. On the other hand, if there is no evidence upon which a verdict of manslaughter reasonably can be based, such an instruction should not be given. People v. Burnett, 27 Ill.2d 510, 190 NE2d 338; People v. Dukes, 19 Ill.2d 532, 169 NE2d 84. *465 [9] The defendant argues that the Canada case is on all fours with the case at bar. We believe, however, that in that case, unlike the present case, there was evidence which would permit the jury reasonably to find the defendant guilty of voluntary manslaughter. Here the evidence is clear that the decedent was not beating the defendant nor carrying a weapon at the time he was shot, but rather that he threw the defendant out of the tavern, returned to the tavern to order the defendant's girl friend to leave and only then was shot as he was going out of the tavern again. On such evidence, the jury could not reasonably have found the necessary elements of voluntary manslaughter as provided by statute. Moreover, it is apparent from the sentence they meted out that the jury took into consideration the previous encounter between the decedent and the defendant. Since the evidence establishes the defendant's guilt beyond all reasonable doubt and since we believe there were no errors in the trial, the judgment should be affirmed. Judgment affirmed. MURPHY and KLUCZYNSKI, JJ., concur.
{ "pile_set_name": "FreeLaw" }
Backstreet Boys, New Kids on the Block Join for 2011 Tour Receive the latest music updates in your inbox NEW YORK - JUNE 19: New Kids On The Block (Bottom L-R) Donnie Wahlberg, Danny Wood, Jordan Knight, Joey McIntyre and Jonathan Knight, with special guests Backstreet Boys top L-R) Brian Littrell, Nick Carter, AJ McLean and Howie Dorough perform on stage at Radio City Music Hall on June 19, 2010 in New York City. (Photo by Janette Pellegrini/WireImage) Updated at 1:15 AM PDT on Thursday, Nov 4, 2010 Get out the screen-printed t-shirts, Aquanet and hair scrunchies: two of the biggest boy bands of the last 20 years are ready to show the world that they've (still) got the right stuff and remain larger than life. Top Entertainment Photos Rumors of a joint tour have swirled since last summer after the Backstreet Boys made a special appearance at a New Kids show at Radio City Music Hall. The two groups combined to sing BSB's ubiquitous 1999 single, "I Want It That Way." Official confirmation of the news was first broken by Ryan Seacrest, reports EW. All nine active members of both bands will sit down to talk about the upcoming extravaganza with the "American Idol" host on November 8 in advance of a performance on the American Music Awards on November 21.
{ "pile_set_name": "Pile-CC" }
Q: How can I restrict gameobject from moving beyond line in unity I have this red apple that needs to move only inside the green apple line. If it tries to move beyond line it will be stopped at the green line and can' move beyond. How can I do that? This is the code I use to move a red apple. Camera mainCamera; float zAxis = 0; Vector3 clickOffset = Vector3.zero; // Use this for initialization void Start() { mainCamera = Camera.main; mainCamera.gameObject.AddComponent<Physics2DRaycaster>(); zAxis = transform.position.z; } public void OnBeginDrag(PointerEventData eventData) { clickOffset = transform.position - mainCamera.ScreenToWorldPoint(new Vector3(eventData.position.x, eventData.position.y, zAxis)); } public void OnDrag(PointerEventData eventData) { //Use Offset To Prevent Sprite from Jumping to where the finger is Vector3 tempVec = mainCamera.ScreenToWorldPoint(eventData.position) + clickOffset; tempVec.z = zAxis; //Make sure that the z zxis never change /* Debug.Log(tempVec.x); if (tempVec.x < 90) { tempVec.x = 90; } if (tempVec.x > 310) { tempVec.x = 310; } */ transform.position = tempVec; } public void OnEndDrag(PointerEventData eventData) { } A: Don't use code for this use colliders on both sides.
{ "pile_set_name": "StackExchange" }
In just more than a week, the Graham-Cassidy healthcare bill has gone from its introduction as a fringe proposal to a serious prospect for overhauling the US healthcare system. Despite its rapid rise, the latest Republican attempt at repealing and replacing the Affordable Care Act, the healthcare law better known as Obamacare, faces challenges both policy-based and political. Perhaps one of the biggest challenges for the bill will come next week when the Senate parliamentarian – an umpire of sorts for the chamber’s rules – takes a look at the bill. The parliamentarian will evaluate whether parts of the Graham-Cassidy bill violate a provision known as the Byrd rule – and if certain aspects of the bill run into trouble, it could throw the entire legislation into jeopardy. A bit about the Byrd rule The Byrd rule, named for the West Virginia senator Robert Byrd, was passed in 1985 to erect guardrails on the types of bills that could be brought up through budget reconciliation. Reconciliation allows a bill to pass the Senate with just 50 votes and no threat of a filibuster to block the bill. Republicans, who control 52 Senate seats, are using the process to try to pass the Graham-Cassidy bill through the Senate without any Democratic votes. Lees ook op Business Insider Zalando start in oktober met de verkoop van tweedehands kleding in Nederland – klanten krijgen geen geld, maar een cadeaubon The Byrd rule, however, restricts what can be considered under budget reconciliation. If a provision of a bill is considered an “extraneous matter” or something “merely incidental” to the federal budget, it can be stripped out of the legislation. Byrd hunting The Graham-Cassidy bill will most likely be reviewed under the Byrd rule – a process colloquially known as a “Byrd bath” – sometime next week. Most healthcare experts say the focus will be on the bill’s proposed waivers that would allow states to relax Obamacare regulations, most notably so-called essential health benefits. EHBs are health services, including emergency-room visits and prenatal care, that Obamacare mandated must be covered under insurance plans. Under Graham-Cassidy, states could ease these rules or even eliminate EHBs if they could show that doing so would bring down overall health costs. Foto: President Donald Trump and Senate Majority Leader Mitch McConnell. source Evan Vucci/AP Images A previous iteration of the Senate GOP’s healthcare bill, the Better Care Reconciliation Act, already showed what may happen with the waivers in the new bill. During the Byrd bath, the waivers in the BCRA that allowed the loosening of EHBs and other regulations were deemed to have nothing to do with the budget and were ordered stripped from the bill. Health-policy experts say this could indicate that the waivers in the Graham-Cassidy bill will also have to be stripped. “My own prediction is that the parliamentarian is likely to strike the waiver provision,” said Daniel Hermel, an assistant law professor at the University of Chicago. “The state innovation waivers were cloaked in budgetary language (a state could qualify for a waiver only if it produced a plan that would not add to the federal deficit), but the parliamentarian evidently saw that the intent was to transform health insurance markets rather than save the federal government money,” Hermel wrote in a post on Tuesday. Foto: source Jacquelyn Martin/AP Images The language for the waivers, however, has been slightly tweaked from the BCRA’s iteration, designed to hold up under the Byrd bath. As Vox’s Dylan Scott reported, some experts believe it could be successful. Others, like the University of Michigan law professor Nicholas Bagley, say the parliamentarian won’t be fooled by what they see as a rewrite with a crystal-clear purpose. “The waiver provision is not *exactly* the same; it’s been drafted to dodge reconciliation concerns,” Bagley tweeted Wednesday. “But the dodge is transparent.” If the waivers are eliminated, the bill would simply shift the funding from the current percentage-based system, which adjusts based on how much money states actually spend, to the lump-sum block grants in the Graham-Cassidy bill. The block grants are much less generous overall than the current system. In such a circumstance, states would get less funding for healthcare with little of the freedom proposed by the bill’s authors.
{ "pile_set_name": "OpenWebText2" }
Introduction {#sec1-1} ============ Liver cirrhosis has an increasing incidence in the general population. It is estimated that, in Europe, there are 170,000 annual deaths due to this cause with major differences between regions. Thus, in the south-east cirrhosis mortality rate is 10-20 times higher than the rest of the continent \[**[@R1]**\]. Romania is situated on the second place with figures of 64 males and 26,7 females considering the death rate per 100,000 population. The main causes of the disease are represented by chronic alcohol consumption, infections with hepatitis viruses B and C, and obesity related metabolic syndromes \[**[@R2]**\]. In these circumstances, abdominal surgery in patients with liver cirrhosis has an increasing frequency. Liver cirrhosis is a chronic and slowly progressive disease characterized by a replacement of normal liver tissue with scars. Liver function is progressively altered leading to hepatic failure. The effects of cirrhosis are not limited to liver function, but also affect other organs and systems. The renal, cardiac and respiratory functions are also adversely affected. These, along with coagulation disorders and immune deficiency create premises of a high-risk surgical ground \[**[@R3]**\]. Surgery for "acute abdomen" in such patients has a high mortality rate and requires special measures of resuscitation \[**[@R4]**\]. Copeland and al. proposed, in 1991, The Physiologic and Operative Score for enUmeration of Mortality and Morbidity (POSSUM) as a scoring system for the surgical audit \[**[@R5]**\]. Considering both pre- and intra-operative commonly measured parameters, this score is easy to use and has a wide application for general surgery in emergency and elective procedures \[**[@R6]**,**[@R7]**\]. The aim of the present study is to evaluate the accuracy of POSSUM score in predicting outcomes after emergency abdominal surgery in patients with liver cirrhosis. Material and method {#sec1-2} =================== Our study is based on a prospective analysis between January 2008 and December 2012 on 115 consecutive patients with liver cirrhosis hospitalized and operated for acute surgical abdomen in Surgery Clinic of "Sf. Pantelimon" Hospital in Bucharest. The criteria for the patients' inclusion in the group were the following: \- Liver cirrhosis as a background disease \- The presence of an abdominal surgical problem whose solution was imposed in the first 24 from admission as an emergency solution In order to assess the determinant factors of postoperative morbidity and mortality in these patients we considered the following: \- Evolutive stage of the liver disease \- Physiological status of the patient at the moment of operation \- Type and magnitude of the surgical procedure For the staging of the liver cirrhosis we choose Child -- Pugh classification. This classification is an useful instrument in emergency conditions because of its small number of parameters which can be rapidly evaluated -- serum albumin level, total bilirubin, prothrombin time INR, the presence and grade of ascites and grade of encephalopathy \[**[@R8]**\]. This score has proven its usefulness in many studies involving patients with liver cirrhosis, whether it was the rupture of esophageal varices, hepatocellular carcinoma, Budd-Chiari syndrome or portal subclinical encephalopathy \[**[@R9]**-**[@R12]**\]. In a study conducted over a period of 12 years Mansour used Child -- Pugh score as a prognosis factor for non hepatic abdominal surgery \[**[@R13]**\]. Despite the criticism that brings into question that the score is based upon components empirically chosen or that its variables are not independent predictors, studies show that the data obtained with this score have statistical significance \[**[@R14]**\]. In light of the above, Child-Pugh score remains an instrument which is easy to use in the evaluation of the prognosis of the patient with liver cirrhosis and its predictive value is at least comparable to some elaborated scores such as MELD \[**[@R15]**\], elements which have imposed their use in our study. The physiological status of patients and magnitude of surgery procedure were evaluated based on the POSSUM score. This score quantifies twelve significant and independent physiological variables which evaluate the physiological status of the patient at the time of surgery. The patient\'s respiratory and cardiac function are assessed by using information that can be obtained quickly and easily by clinical and laboratory common methods - the presence and degree of dyspnea and its degree of severity, chest X-ray appearance, presence of arrhythmias on the electrocardiogram, blood pressure, pulse, the presence of angina or an underlying heart disease requiring inotropic therapy or anticoagulant. In addition to these are the laboratory tests such as hemoglobin, WBC count, blood urea nitrogen, sodium and potassium. Moreover, the patient\'s age and Glasgow score are also considered. The values obtained for the physiological score calculated at the time of intervention can have values between 12 and 88 (**[Table 1](#F1){ref-type="fig"}**). ![POSSUM physiological score according to Copeland and al.](JMedLife-06-472-g001){#F1} Surgical trauma is evaluated based on six factors of the severity of procedure. This is classified into four categories taking into account the extent of surgery, emergency or elective nature of the operation, amount of blood lost during surgery, duration, peritoneal contamination and the presence / extension of a neoplasm (Table 2). Once the score is known, it is possible to estimate the risk of morbidity (R2) and mortality (R1) by using two equations. For morbidity the equation is the following: Log (R2 / (1-R2) = -5.91 + (O.16 X physiological score) + (0.19 X severity score of the surgical procedure) For mortality the equation is the following: Log (R1 / 1 R1) = -7.04 + (0.13 X physiological score) + (0.16 X severity score of the surgical procedure). The physiological score was assessed at the time of surgery and the operative score at the moment of the patient's discharge. Comparing the obtained results with those estimated by using POSSUM score, we tried an appreciation of the influence upon postoperative outcome of the physiological status and evolution stage of liver cirrhosis in these patients. Statistical data analysis was based on X²(chi-square) test and the p value of less than 0,05 was considered statistically significant. ![POSSUM operative severity score](JMedLife-06-472-g002){#F2} Results {#sec1-3} ======= Our group was composed of 115 patients, 45 females (39%) and 70 males (61%) and their ages ranged from 29 to 85 years, with an average of 60.27. The etiology of liver cirrhosis in patients represented in our group was especially chronic consumption of ethanol and hepatitis virus infections, groups including 102 cases - 60 and 42 patients, respectively. To these 8 cases of cardiac cirrhosis and other 5 in which the etiology could not be documented, being labeled as cryptogenic, were added. The classification of patients into Child groups depending on the evolutionary stage of liver disease was the following: 33 of them (28.7%) were classified in group Child A, 54 (47%) in Child B stage and 28 (24.3%) in group Child C(**[Fig. 1](#F3){ref-type="fig"}**). ![Distribution of patients with regard to Child Pugh score](JMedLife-06-472-g003){#F3} The preoperative assessment based on the physiological POSSUM score resulted in dividing the patients into the following groups score: below 15,5 cases; 23 cases with a score between 16 and 18, 28 cases with 19 to 21 points, 32 cases with 22 to 24 points, 18 cases with 25 to 27 points, 7 cases with 28 to 30 points, 2 cases over 30 points (**[Fig. 2](#F4){ref-type="fig"}**). ![Distribution of patients with regard to physiological score](JMedLife-06-472-g004){#F4} The pathological conditions in our group of 115 patients who required emergent surgery were the following: 22 cases of complicated umbilical hernias, 12 complicated postoperative incision hernias, 8 complicated inguinal hernia, 35 acute cholecystitis, 14 peptic ulcer bleeding, 6 perforated ulcer, 3 penetrating abdominal wounds, 4 acute appendicitis, 2 traumatic ruptures of spleen, 2 choledocholithiasis with cholangitis, 7 bowel obstructions. Surgery procedures practiced in emergency conditions -- in the first 24 hours from admission -- on our group of patients were the following: splenectomies -- 2 cases, umbilical hernia repair -- 22 cases, inguinal hernia repair -- 8 cases, incision hernia repair -- 12 cases, suture of ulcer perforation -- 3 cases, excision of ulcer -- 2 cases, gastric resection -- 5 cases, gastrotomy with hemostasis \"in situ\" for bleeding ulcer -- 10 cases, resection of small intestine -- 3 cases, appendectomy -- 4 cases, right hemicolectomy -- one case, transverse colon segmental resection -- one case, Hartmann operations -- 2 cases, laparoscopic cholecystectomy -- 21 cases, open cholecystectomy -- 14 cases, laparotomy -- 3 cases, choledochotomy with Kehr drainage -- 2 cases. Calculating POSSUM operator score for our patients resulted in a classification into the following groups: 31 patients with a POSSUM operator score below 10, 42 patients with a score between 11 and 13; 14 patients had a score of 14 to 16; 26 cases with 17 to 19 points; 2 patients with 20 -- 22 points (**[Fig. 3](#F5){ref-type="fig"}**). ![Distribution of patients with regard to operative score](JMedLife-06-472-g005){#F5} The estimated mortality risk in our group based on POSSUM score was the following: less than 5% - 22 patients (19%); risk between 6% and 10% - 37 patients (32%); risk 11% to 15% - 23 patients (20%); 16% to 20% mortality risk -- 9 patients (7,8%); 21% to 25% - 10 patients (8,7%); over 25% risk -- 14 patients (12%) (Fig. 4) ![Mortality estimated risk](JMedLife-06-472-g006){#F6} The average estimated risk of mortality for the entire group was 12.73%. The number of deaths observed in our group of patients was 52, representing 45.21%. This results in a report of cases observed / expected at 3.55 / 1 for the whole group. The bundling patients by Child evolutionary stages led to the observation that the reporting observed to the estimated results based on POSSUM score figure varies from one group to another (Table 3). ![POSSUM score according to groups](JMedLife-06-472-g007){#F7} The group of patients in stage Child A of liver cirrhosis had a morbidity of 48.5% (16 cases) and a mortality rate of 9.7% (4 cases). Based on POSSUM score estimation, morbidity in these patients would have a percentage of 42.54 and a mortality rate of 9.1%, values which are quite similar to those registered by us. The ratio O / E for patients with liver cirrhosis in stage Child A was 1.1 for morbidity and 1,2 for mortality. The null hypothesis was that the evolutionary stages of liver cirrhosis had no influence on POSSUM score prediction ability. The statistical analysis based on X² test (\"goodness of fit\") for mortality occurred in patients belonging to Child class A, which resulted in the following value: x² =(1, n=33) =0.36, p\<0,05 The critical value for X2 is 3.84, placing the result in the acceptance area. Regarding the capacity of POSSUM score to estimate morbidity for our patients in stage Child A of liver disease, the statistical analysis based on X² test resulted in the following value: x²=(1 , n=33)=0.35, p\<0.05 Consequently, the predictive value of POSSUM scores in patients with liver cirrhosis in stage Child A was satisfactory both in terms of morbidity and mortality. We found an exponential increase in the mortality rate -- 29 deaths from 54 -- for patients in Child B stage of liver cirrhosis representing 53,7%. The estimated rate of mortality based on POSSUM score for this group of patients was of 14% - 8 deaths. Thus, the observed/estimated ratio was 3,8/1 and the value for x²=(1, n=54)=64,7, p\<0,05, placing the result in the rejection area. Of the 25 patients of Child B group who were discharged, 22 had postoperative complications. Patients in stage Child C of liver disease had the highest death rates -- 19 from a total of 28, representing 67,85%. Compared to a total of 4 deaths expected in this group based on POSSUM score prediction the ratio O/E is 4,75 and the value for X² in rejection area. All 9 patients belonging to Child C stage who survived surgery had postoperative complications requiring prolonged hospitalization. Discussion {#sec1-4} ========== Surgery for acute abdomen in a patient with liver cirrhosis is an unavoidable risk, but its quantification is particularly significant given that modern medicine is based on analysis, objectivity and rigorous control of medical care quality. The outcome of surgery depends not only on the skills of the operator, but is the result of several factors such as the physiological status of the patient, the condition requiring surgery, type of operation, but also the resources for preoperative and postoperative resuscitation which the hospital unit can provide. Operative risk in a patient with cirrhosis can be approximated in a wide range on the evolutionary stage of the liver disease \[**[@R13]**,**[@R16]**\]. For the final result, the magnitude of the surgery and the patient\'s condition at the time of intervention are important factors to consider. POSSUM score has a satisfying predictive value quantifying and integrating in its equations both the physiological parameters and the magnitude of the procedure. Cirrhotic patients undergoing abdominal surgery are at a high risk of hepatic decompensation due to reduced hepatic blood flow during such interventions \[**[@R17]**,**[@R18]**\]. Considering all these elements in a 5-year study on a group of 115 patients hospitalized and operated in emergency for various conditions that can be defined as \"acute abdomen\" we assessed the grade of influence of underlying liver disease, physiological status and amplitude of surgical procedure on the postoperative outcome. The data obtained in our study showed that when there is a functional satisfactory hepatic reserve, as in stage Child A of liver cirrhosis, the patient can tolerate the surgical act satisfactorily. At this stage of liver disease, patients can fit in the same category with the other patients in terms of predictive ability of POSSUM score. For the advanced stages of cirrhosis the high rates of mortality brought out the results from the prediction area provided by the POSSUM score. It suggests that patients in stages Child B and C of liver cirrhosis, emergency abdominal surgery has a major impact on the homeostasis and the resources for compensation are overloaded. Thus, in advanced stages, the liver disease has a prominent value for prognosis as against the POSSUM score. Conclusions {#sec1-5} =========== Surgery for acute abdomen in patients with liver cirrhosis is a therapeutic challenge and for the surgeon it means taking an inevitably risk. The outcome of the surgical procedure is a resultant of multiple factors and some of them can be quantified and integrated in valuable predictive scores such as POSSUM. According to our study, POSSUM score offers a satisfactory prediction for morbidity and mortality in emergency abdominal surgery for patients in compensated stages of liver cirrhosis -- Child A. For the advanced cirrhosis stages, Child B and C, high levels of mortality cannot be predicted by using POSSUM score and liver disease has a prominent value in prognosis of this category of patients.
{ "pile_set_name": "PubMed Central" }
The effect of subject awareness and prior slip experience on tribometer-based predictions of slip probability. Prior knowledge of potentially slippery conditions has been shown to alter normal human gait in slip and fall experiments. We sought to quantify how the empirical relationship between slip probability and available floor friction was affected by subject awareness and prior slip experience. Sixty-eight subjects (40 females, 28 males) walked over three different low-friction surfaces inserted periodically between non-slip control trials. Three increasing levels of prior knowledge were used: deceived (unaware of the slippery surface), aware (20% chance of a slippery surface, but no prior slip experience) and experienced (aware with prior slip experience). Available friction was measured using a drag sled and a variable incidence tribometer. Of 620 low-friction trials, 124 generated slips greater than 27mm. The proportion of slips, the slip distance and the required friction (taken from the control trial immediately before a low-friction trial) generally decreased with increasing levels of prior knowledge. These adaptations were accommodated by logistically regressing slip outcome (yes/no) against the normalized friction (available friction minus required friction) rather than against available friction alone. The regressions showed that subject awareness biased the slip probability curve toward a lower slip risk for a given normalized friction, but that the subsequent addition of slip experience generated a slip risk curve that was not significantly different from that of deceived (and presumably unprepared) subjects. These findings suggest that data to validate a tribometer's ability to predict the risk of slipping (but not falling) can be acquired from subjects with prior slip experience.
{ "pile_set_name": "PubMed Abstracts" }
Call for fellowship programs in stem cell-based regenerative and cellular medicine: new stem cell training is essential for physicians. Stem cell-based regenerative and cellular medicine is an exciting, emerging area of medical practice. While bone marrow transplantation, a stem cell-based therapy, has been a part of medicine for decades, in recent years newer and more diverse forms of stem cell-based therapies are being used to treat a rapidly growing population of patients in the USA as well as worldwide. Nonetheless, to this author's knowledge, there is currently not a single academic medical fellowship training program in the USA that specifically prepares physicians for treating patients with stem cell-based therapies other than bone marrow or hematopoietic stem cell transplantation. An increasing number of physicians untrained in stem cell-based regenerative and cellular medicine are nonetheless transplanting stem cells into hundreds if not thousands of patients for a striking diversity of conditions. Furthermore, as stem cell technology advances, a growing number of physicians with academic affiliations may look to legitimately practice regenerative and cellular medicine. What little training that physicians can currently obtain must be found on an ad hoc basis. This article should act as a call for the development of formal academic medical fellowship programs to train physicians in the practice of cellular and regenerative medicine. The USA is used here as an example of a medical sphere in which it can be argued that such training would be helpful, however such programs would be quite helpful globally. Scientific Abstract: Stem cell-based regenerative and cellular medicine is an exciting, emerging area of medical practice. While bone marrow transplantation, a stem cell-based therapy, has been a part of medicine for decades, in recent years newer and more diverse forms of stem cell-based therapies are being used to treat a rapidly growing population of patients in the USA as well as worldwide. Nonetheless, to this author's knowledge, there is currently not a single academic medical fellowship training program in the USA that specifically prepares physicians for treating patients with stem cell-based therapies other than bone marrow or hematopoietic stem cell transplantation. An increasing number of physicians untrained in stem cell-based regenerative and cellular medicine are nonetheless transplanting stem cells into hundreds if not thousands of patients for a striking diversity of conditions. Furthermore, as stem cell technology advances, a growing number of physicians with academic affiliations may look to legitimately practice regenerative and cellular medicine. What little training that physicians can currently obtain must be found on an ad hoc basis. This article should act as a call for the development of formal academic medical fellowship programs to train physicians in the practice of cellular and regenerative medicine. The USA is used here as an example of a medical sphere in which it can be argued that such training would be helpful, however such programs would be quite helpful globally.
{ "pile_set_name": "Pile-CC" }
Q: Using quotes in Twig ternary operators How does one prevent quotes from being escaped when used in a twig ternary operator? My desire is <div id="my_id">my div11</div> (or <div id='my_id'>my div11</div>), however, as seen my results are different. {% set id="my_id" %} <div{{ id?" id='"~id~"'" }}>my div1</div> <div{{ id?' id="'~id~'"' }}>my div2</div> <div{{ id?" id='#{id}'" }}>my div3</div> <div{{ id?" id=/'#{id}/'" }}>my div4</div> <div{{ id?' id='~"'"|raw~id~"'"|raw }}>my div5</div> <div{{ id?' id='~'"'|raw~id~"'"|raw }}>my div6</div> <div{{ id?" id="~id }}>my div7</div> <div{{ id?' id='~id }}>my div8</div> <div{{ id?" id=#{id}" }}>my div9</div> {% set id="" %} <div{{ id?" id='"~id~"'" }}>my div1</div> <div{{ id?' id="'~id~'"' }}>my div2</div> <div{{ id?" id='#{id}'" }}>my div3</div> <div{{ id?" id=/'#{id}/'" }}>my div4</div> <div{{ id?' id='~"'"|raw~id~"'"|raw }}>my div5</div> <div{{ id?' id='~'"'|raw~id~"'"|raw }}>my div6</div> <div{{ id?" id="~id }}>my div7</div> <div{{ id?' id='~id }}>my div8</div> <div{{ id?" id=#{id}" }}>my div9</div> Output: <div id=&#039;my_id&#039;>my div1</div> <div id=&quot;my_id&quot;>my div2</div> <div id=&#039;my_id&#039;>my div3</div> <div id=/&#039;my_id/&#039;>my div4</div> <div id=&#039;my_id&#039;>my div5</div> <div id=&quot;my_id&#039;>my div6</div> <div id=my_id>my div7</div> <div id=my_id>my div8</div> <div id=my_id>my div9</div> <div>my div1</div> <div>my div2</div> <div>my div3</div> <div>my div4</div> <div>my div5</div> <div>my div6</div> <div>my div7</div> <div>my div8</div> <div>my div9</div> A: try this <div{{ (id?' id="'~id~'"')|raw }}>my div1</div>
{ "pile_set_name": "StackExchange" }
Peo­ple get the chance to record the song that means most to them in a heart­warm­ing new show The 60s were in their in­fancy when Ge­orge ‘Joey’ Spruce led his band off-stage at The Cav­ern Club in Liver­pool and ex­changed a few words with the ner­vous singer pre­par­ing to go on. ‘We’d done a few songs I’d writ­ten my­self, and he said how good they were. I said, “Have you writ­ten any your­self?” And he said, “We have, but they’re not that good,”’ re­calls Joey, laugh­ing. Lit­tle won­der, given that the young man was Paul McCart­ney. Yes, that Paul McCart­ney. ‘I mean, those songs then went on to be­come some of the most fa­mous in the world,’ says Joey, now 75. ‘But at the time none of us had any idea.’ The Bea­tles be­came le­gends of course, Joey’s band less so. Earl Pre­ston And The TTs are still fondly re­mem­bered by a cer­tain gen­er­a­tion in their na­tive Liver­pool, but world­wide fame eluded them. Joey and the sur­viv­ing mem­bers of his band got an un­ex­pected chance to re­live their glory days, how­ever, when they were asked to take part in a new TV show that sees un­likely singers cut their very own record in a record­ing stu­dio. This Is My Song, a heart­warm­ing two-parter, gives mem­bers of the pub­lic a chance to make a record that is spe­cial to them, for what­ever rea­son. All sorts of sto­ries – some tear­jerk­ers – are told in the process. One of the most up­lift­ing ones comes from Charles Michael Duke, 23. He was born with cys­tic fi­bro­sis, and had just had a dou­ble lung trans­plant af­ter three years on the wait­ing list. See­ing him sing Ella Hen­der­son’s Yours, backed by a full choir, will have you reach­ing for the tis­sues. Then there’s Matt Bond, 26, who plays bass gui­tar in the in­die band Blue River. He takes the lead spot as a singer for the first time with a ren­di­tion of Bas­ket Case by Green Day. And what’s his mo­ti­va­tion? He has a pro­nounced stam­mer when speak­ing – but not when singing, and he wanted to raise aware­ness of the prob­lem. For Joey Spruce though, the ap­pear­ance was a trip down mem­ory lane. ‘I hadn’t been in a record­ing stu­dio for years – and never one like this,’ he says. ‘At first the other lads were a bit Charles in the vo­cal booth, record­ing his spe­cial track funny about do­ing it, but I said to them, “When are we, at our age, likely to be in­vited on TV again?”’ Joey was pretty ner­vous though. He’s been through the mill health-wise re­cently, fight­ing prostate cancer, and hadn’t sung for five years un­til tak­ing part in this pro­ject. ‘My con­fi­dence took a real hit be­cause of my ill­ness,’ he ad­mits. ‘I was a bag of nerves, but I’m glad I did it. It was fan­tas­tic to be back with the guys, with that mic in front of me. And to have an ac­tual copy of the record we cut too. It’s a lovely thing to have.’ The show is touch­ing , with the sur­viv­ing band mem­bers lay­ing down in­stru­men­tal tracks and vo­cals for Will You Still Love Me To­mor­row. All their wives are al­lowed into the stu­dio for the fi­nal per­for­mance – and the tears flow all round. ‘It was magic,’ says Joey. ‘What a thing for the grand­chil­dren to watch.’ Joey (cen­tre) record­ing vo­cals, with three of his band­mates from Earl Pre­ston And The TTs. Right: the band in 1963
{ "pile_set_name": "Pile-CC" }
Heterogeneity in the conformation of valine in the elastin mimetic (LGGVG)6 as shown by solid-state 13C NMR SPEctroscopy. Elastin is an abundant protein found in vertebrates and is the source of elasticity in connective tissues and blood vessels. The repeating polypeptide sequences found in the hydrophobic domains of elastin have been the focus of many studies that attempt to understand the function of the native protein on a molecular scale. In this communication, the (LGGVG)6 elastin mimetic is characterized by solid-state 13C NMR spectroscopy. Through the use of a combination of a statistical analysis based on the Protein Data Bank, one-dimensional cross-polarization magic-angle-spinning NMR spectroscopy, and two-dimensional off-magic-angle-spinning spin-diffusion experiments, it is determined that this tandem repeat does not form a regular, highly ordered structure. Instead, like the poly(VPGVG) elastin mimetics, the valine has a twofold heterogeneity, although the conformations of these two populations differ from one peptide to the other.
{ "pile_set_name": "PubMed Abstracts" }
Q: Are 'climb via a SID' instructions actually used in the US? In the USA, a departing aircraft is instructed to climb: to flight level and maintain, or via standard instrument departure (SID) That's according to US Aeronautical Information Publication (AIP). But pilots say they never hear climb via SID. Can anybody clarify if climb via SID instruction is really used by ATC? A: In my experience, I've received a climb via SID many times at airports like Las Vegas and Teterboro. This is common at certain airports, but a lot of airports don't use it because the procedures aren't designed that way. I think that a lot of pilots, especially those flying smaller non-turbine powered aircraft, don't receive this type of clearance because: They are flying at smaller airports that don't have a SID which uses it, or They are not assigned the SID's which do have it because the SID is only assigned to turbine-powered aircraft or aircraft capable of flight above a certain speed or altitude. It is also a relatively new procedure in the US. They were originally going to start using it in 2014, but it got delayed and was finally implemented a year or two ago (I don't remember exactly when). For a while, the US was only using "descend via" clearances, and not "climb via" clearances. Here are a couple of resources about this: NBAA PBN site FAA Climb Via/Descend Via Speed Clearances Frequently Asked Questions FAA “Climb Via” and “Descend Via” Procedures and Phraseology Air Traffic Policy Notice
{ "pile_set_name": "StackExchange" }
Memory game to work with syllables/phonemes using images and sound We developed a game for 6 year old children, following what kindergarten teachers say they want to see on the laptop. we are working with memory games. Considering the memosono activity, we developed games in Portuguese, to use in class.
{ "pile_set_name": "Pile-CC" }
249 P.3d 644 (2011) Christopher J.B. GRAY and Julie Lassonde-Gray, Appellants, v. BOURGETTE CONSTRUCTION, LLC, a Washington Limited Liability Company, Respondent. No. 64432-7-I. Court of Appeals of Washington, Division 1. February 28, 2011. *645 Dean Robert Sargent, Tarl Raud Oliason, Dainen N. Penta, McKisson Sargent & Olison PS, Seattle, WA, for Appellants. Bridget Bourgette Shaw, Shaw Law Group PLLC, Seattle, WA, for Respondent. LAU, J. ¶ 1 Prior to filing a construction lien, a lien claimant is required by RCW 60.04.031 to provide written notice of right to claim a lien to the property owner. But an exception applies to a lien claimant who contracts directly with the "owner or the owner's common law agent." RCW 60.04.031(2)(a). RCW 60.04.081's summary hearing procedure authorizes an owner who believes the lien is "frivolous and made without reasonable cause" to seek a court order releasing the lien. Homeowners Julie Lassonde-Gray and Christopher Gray (the Grays), allege that Bourgette Construction, LLC's (Bourgette) lien claim was frivolous based on Bourgette's failure to provide them notice of right *646 to claim the lien. Bourgette contends no notice is required based on the "common law agent" notice exception since he contracted directly with the Grays' common law agent to perform the remodeling work on the Grays' home. Because this lien dispute presents debatable issues of law and fact, it does not satisfy the requirements of frivolous and without reasonable cause justifying its release in the summary procedure. We affirm the trial court's order denying the Grays' lien release motion and awarding fees to Bourgette. FACTS ¶ 2 In the spring of 2008, the Grays hired Geoffrey James dba Wescott Development, LLC (James) to develop and manage the major remodel of their Mercer Island home (the project). Neither James nor Wescott Development is a Washington licensed contractor. James contracted with Bourgette to furnish labor, services, materials, and equipment for the project.[1] Bourgette furnished services and materials for the project from April 1, 2008, until March 15, 2009.[2] ¶ 3 On April 14 and 15, Bourgette obtained two permits from the city of Mercer Island for extensive rot repair and sheetrock replacement on the project. Five other subcontractors also obtained permits from the city to perform work on the project such as plumbing and electrical. When work began inside the house in May 2008, the Grays moved out. ¶ 4 In total, Bourgette invoiced James $294,631.35 for its work on the project. James, however, paid Bourgette only $178,146.86. This deficiency left Bourgette unable to pay subcontractors that it hired for the project. The following subcontractors claim moneys owed for their work: State Roofing $14,006.50[3] Todd Gardiner Landscaping Services $ 4,126.66 Joel Wood Hardwood Flooring $ 5,750.00 B & J Plumbing $11,072.45 Land Surveyors $ 1,750.00 ¶ 5 According to James and Bourgette, the Grays knew that Bourgette and other contractors were working on the project. On June 2, 2009, Bourgette filed and recorded a lien for $114,263 and notified the Grays of the lien by certified mail. The claim of lien identified the lien claimant as "Bourgette Construction, LLC" and the "person indebted to the claimant" as "Geoffrey W. James dba Wescott Development." Bourgette did not provide the Grays a notice of right to claim a lien. ¶ 6 The Grays claimed the lien was frivolous because Bourgette never gave them notice of right to claim a lien as required by RCW 60.04.031(1). The Grays demanded that Bourgette release the lien. Bourgette refused, asserting that under RCW 60.04.031(3)(a)'s common law agent exception, no notice was required because he contracted directly with the Grays' common law agent— Geoffrey James dba Wescott Development. ¶ 7 The Grays then filed a motion and supporting declarations to show cause why the lien should not be released as frivolous and without reasonable cause under RCW 60.04.081. The Grays argued (1) James contracted with Bourgette without their knowledge or consent, (2) James had no authority to act as their "attorney in fact or as a general agent for any purpose," (3) Bourgette failed to provide the written notice of its right to claim a lien, and (4) James is neither a "common law agent" nor "construction agent." Br. of Appellant, at 2, 8. ¶ 8 Bourgette and James submitted response declarations. Bourgette's declaration explained that he contracted with James to perform work on the project in the spring of 2008[4] He performed work on the project from April 1, 2008 until March 15, 2009. He further explained, At all times, based on my dealings and communications with James and directly with the Grays, it was my belief and understanding that James had actual authority *647 to act as the Grays' agent in managing the project.... . . . . ... [T]he Grays were aware of Bourgette Construction's extensive work at the project. Throughout the project I met with the Grays numerous times. We discussed the status of the project and specifics about the project. ¶ 9 Attached to Bourgette's declaration is e-mail correspondence between James and Christopher Gray, "confirming the Grays' knowledge of Bourgette Construction's work at the Property" and the invoices and permits related to the project. Bourgette's declaration also described the payments he received from James, the balance owed, and the subcontractors he hired for the project that remained unpaid. ¶ 10 James' declaration stated (1) he contracted with the Grays to develop and manage the major remodel of the Grays' home,[5] (2) he had actual authority as the Grays' agent to manage the project and contract directly with contractors to complete the project, (3) with the Grays' knowledge and authorization, he contracted with Bourgette to perform extensive work on the project, and (4) neither he nor his company, Wescott Development was a licensed contractor. ¶ 11 At a show cause hearing, the court entered a written order denying the Grays' motion and awarding fees to Bourgette. The court reasoned, The case of [S.D.] Deacon [Corp.] v. Gaston Brothers [Excavating, Inc., 150 Wash. App. 87, 89, 206 P.3d 689 (2009)] does caution trial courts that RCW 60.04.081 is only to be invoked when the lien is so devoid of merit that the lien has no possibility of succeeding.... ... And it's pretty easy for me to determine once I got through these materials that it's inappropriate to apply [RCW] 60.04.081 with respect to your argument that they failed to give a notice of claim of right to a lien in a case in which there was this middleman agent and in a case which there was so much contact between the contractor and the—and the project or the landowner. Report of Proceedings (Oct. 13, 2009) at 2526. ¶ 12 The Grays appeal.[6] DISCUSSION ¶ 13 The Grays argue that Bourgette was not hired by a property owner, a licensed contractor, or a common law agent. Therefore, he was required to provide the Grays with a written notice of right to claim a lien as a statutory prerequisite to recording the lien. RCW 60.04.011(1), .031(3). The Grays further argue that because the failure to give such notice makes the lien "frivolous and made without reasonable cause" within the meaning of RCW 60.04.081, the trial court erred by not releasing the lien. In essence, the Grays assert Bourgette failed to show he complied with statutory notice requirements or an exception to the notice requirement applied.[7] ¶ 14 Bourgette responds that the frivolous lien proceeding is limited in scope. He argues that the factual dispute over whether James was the Grays' common law agent— an exception to the notice requirement under RCW 60.04.031(3)(a)—precluded the lien's disposition in the summary proceeding. ¶ 15 Because the trial court did not resolve factual disputes, our review is de novo. W.R.P. Lake Union Ltd. P'ship v. Exterior Servs., Inc., 85 Wash.App. 744, 750, 934 P.2d 722 (1997). A court may make factual determinations in the summary proceeding. W.R.P., 85 Wash.App. at 750, 934 P.2d 722. But as we cautioned recently, "[t]rial courts should take care not to let the frivolous lien statute be misused to deprive *648 contractors of their right to a trial on a lien claim." S.D. Deacon, 150 Wash.App. at 89, 206 P.3d 689. Even if a lien is ultimately found to be invalid, it is frivolous "only if it presents no debatable issues and is so devoid of merit that it has no possibility of succeeding." Intermountain Elec., Inc. v. G-A-T Bros. Const., Inc., 115 Wash.App. 384, 394, 62 P.3d 548 (2003). Every frivolous lien is invalid, but not every invalid lien is frivolous. Intermountain, 115 Wash.App. at 394, 62 P.3d 548. A lien might be clearly meritless when it is not recorded by a proper party, not properly served, or not in compliance with the statutory content requirements. S.D. Deacon, 150 Wash.App. at 95, 206 P.3d 689. ¶ 16 The party seeking release of the lien in the summary proceeding bears the burden of proving that the lien was frivolous and made without reasonable cause. W.R.P., 85 Wash.App. at 751, 934 P.2d 722. The statute does not define "frivolous and made without reasonable cause." RCW 60.04.011. To be frivolous, a lien must be improperly filed beyond legitimate dispute. W.R.P., 85 Wash.App. at 752, 934 P.2d 722. As the party seeking release of the lien in this summary proceeding, the Grays bear the initial burden to provide a reason why the lien is frivolous and without reasonable cause. W.R.P., 85 Wash.App. at 751, 934 P.2d 722. Once the Grays provide a reason, the burden then shifts to Bourgette to make a prima facie showing that the lien is not frivolous. W.R.P., 85 Wash.App. at 752, 934 P.2d 722. Once Bourgette makes that prima facie showing, the burden shifts back to the Grays to prove the lien was frivolous. The ultimate burden to prove that the lien is frivolous at a show cause hearing to release the lien remains with the Grays—the party challenging the lien. W.R.P., 85 Wash.App. at 752, 934 P.2d 722. ¶ 17 Here, the parties' dispute centers on whether James was the Grays' "common law agent." "Notices of a right to claim a lien shall not be required of: (a) Persons who contract directly with the owner or the owner's common law agent." RCW 60.04.031(2)(a) (emphasis added). The Grays asserted that the lien was frivolous because Bourgette did not comply with the statutory notice requirement under RCW 60.04.031(1), and they submitted declarations claiming James lacked any authority to act as their agent. Bourgette then submitted opposing declarations supporting his argument that no notice was required because he contracted directly with the Grays' common law agent— Geoffrey James dba Wescott Development. ¶ 18 Bourgette's declaration explained that he contracted directly with James to perform extensive remodeling work on the Grays' property. From April 2008 until March 2009, he furnished labor, professional services, materials, and equipment for the project. He also explained that he met with the Grays numerous times to discuss and update them about the project. And based on dealings and communications with both James and the Grays, he understood that James had actual authority (as the Grays agent) to manage their project. Bourgette attached to the declaration (1) billing invoices dated April 6, 2008 to March 17, 2009, (2) bank statements showing monies paid by James for Bourgette's project work, (3) permits obtained for the project, and (4) e-mail correspondence between James and Christopher Gray showing Gray's knowledge of Bourgette's work on the project. Bourgette also testified that he provided significant labor and services for the project for which he has received only partial payment. ¶ 19 Like Bourgette's declaration, James's declaration explained that he contracted with the Grays to develop and manage their project. He also described his actual authority as the Grays' agent to contract with and pay others to accomplish the project. He described contracting with the project architect who designed the remodel, the window company that replaced the windows, and Bourgette. ¶ 20 Because Bourgette made a prima facie showing that the lien is not frivolous—the common law agent[8] exception applies—the *649 burden shifts back to the Grays to prove the lien is frivolous.[9] The Grays fail to demonstrate the lien is frivolous. "[A] determination that any given statutory requirement has not been satisfied [does not] necessarily mean[ ] the lien filing was frivolous." W.R.P., 85 Wash.App. at 752, 934 P.2d 722. "A case is not necessarily frivolous because a party ultimately loses on a factual or legal ground. Likewise, for a lien to be frivolous, the decision that the lien was improperly filed must be clear and beyond legitimate dispute." W.R.P., 85 Wash.App. at 752, 934 P.2d 722. Under the circumstances here, the parties' dispute over whether James is the Grays' common law agent is not the type of dispute that can be resolved in a summary proceeding. The record shows each side had evidence supporting its position. And "the more complex the underlying contractual relationship, the less appropriate will it be to conclude that a particular lien filing is frivolous." S.D. Deacon, 150 Wash.App. at 95, 206 P.3d 689. Because this lien dispute presents debatable issues of law and fact, it does not satisfy the requirements of "frivolous and without reasonable cause" justifying its release in this summary proceeding.[10] Attorney Fees ¶ 21 The Grays also assign error to the trial court's decision to award fees to Bourgette in the summary procedure. RCW 60.04.081(4) provides in relevant part, "If the court determines that the lien is not frivolous and was made with reasonable cause, and is not clearly excessive, the court shall issue an order so stating and awarding costs and reasonable attorneys' fees to the lien claimant to be paid by the applicant." Because the trial court did not err in denying the motion to release the lien, it properly awarded fees to Bourgette. ¶ 22 Bourgette requests attorney fees on appeal. "[I]n general, where a prevailing party is entitled to attorney fees below, they are entitled to attorney fees if they prevail on appeal." Sharbono v. Universal Underwriters Ins. Co., 139 Wash.App. 383, 423, 161 P.3d 406 (2007). The request is granted subject to compliance with RAP 18.1(d). CONCLUSION ¶ 23 At the show cause hearing, the Grays had the ultimate burden of proof to show that the lien was frivolous and made without reasonable cause. On this record, the Grays did not show beyond legitimate dispute that they were entitled to notice of right to claim a lien and that James was not their common law agent. Accordingly, we affirm the trial court's order denying motion to release lien and the fee award to Bourgette. WE CONCUR: SCHINDLER and BECKER, JJ. NOTES [1] The contract is not in the record. [2] The Grays concede this point for appeal purposes only. Br. of Appellant, at 3. [3] State Roofing, the roofer on the project, sued Bourgette for $14,006.50 in King County Superior Court, No. 09-2-16617-0. [4] Bradley Bourgette is a member and manager of Bourgette Construction, LLC. [5] This contract is not in the record. [6] Pursuant to RCW 60.04.161, the Grays posted a bond and have since sold the home. [7] On appeal, "[t]he Grays do not dispute that Bourgette provided labor and services in some amount, that Bourgette was the appropriate party to the action, or that Bourgette's lien complied with the statutory form and was served on the Grays. However, Bourgette failed to allege or demonstrate that it complied with the statutory notice requirements or that it was exempt." Reply Br. of Appellant, at 3. [8] While the statute provides no definition for "common law agent," the plain meaning is "the body of [agency] law derived from judicial decisions, rather than from statutes or constitutions." BLACK'S LAW DICTIONARY 293 (8th ed. 2004). "[A]n agency relationship results from the manifestation of consent by one person that another shall act on his behalf and subject to his control, with a correlative manifestation of consent by the other party to act on his behalf and subject to his control." Moss v. Vadman, 77 Wash.2d 396, 402-03, 463 P.2d 159 (1969). Both the principal and agent must consent to the relationship. Hewson Const., Inc. v. Reintree Corp., 101 Wash.2d 819, 823, 685 P.2d 1062 (1984). The crucial factor is the right to control the manner of performance that must exist to prove agency. Bloedel Timberlands Dev., Inc. v. Timber Indus., Inc., 28 Wash.App. 669, 674, 626 P.2d 30 (1981) (citations omitted). [9] Bourgette was sanctioned because he responded to the Grays' motion on the day of the show cause hearing, giving the Grays no time to reply. But the Grays did not ask for a continuance to provide more proof at the hearing on their motion, nor have they argued that they were denied the opportunity to prove their case or assigned error on this issue. [10] We do not address the circumstances under which a trial court may properly release a lien in a summary proceeding for failure to give notice of right to claim a lien.
{ "pile_set_name": "FreeLaw" }
2.15: Chandler Through the rain and increasing darkness of cloud cover, Chandler watched the beast. It was pursuing the soldiers that were retreating. None were attacking the beast outright anymore as Ace must have gotten the retreat order through. Glancing to the left, Chandler saw the portion of the army that had slipped under the wall. They were either incredibly brave or they hadn’t seen the beast. Running toward the beast without a second thought, Chandler surprised himself when he heard himself growl. Closing in on the beast, he picked up a shield and flung it. Not waiting to see the shield made contact, he picked up a spear and threw that as well. The beast looked up and dropped an armless soldier. Its eyes were a piercing red that sent a shiver down Chandler’s spine, despite the heat of the day. Without a warning, it charged. Chandler whirled around and sprinted for the oncoming traffic of hole-emerging Lurians. He ran passed them and a few of them shouted, confused. Until the beast came into view and slammed soldier after soldier into the stone wall, still pursuing Chandler. He heard the cracking of bones against the wall as he glanced over his shoulder. Chandler had just turned to look forward when a sword lunged for his head. In an utter panic, Chandler upper body fell back while he legs continued forward. The blade missed by a hair. Chandler landed on the ground with a squelching sound as the ground sucked him down. He did not expect to still be alive. His reactions had never been that effective. Splashing into the muddy soil, Chandler stumbled to his feet as quickly as possible, looking to stay ahead of the red-eyed beast. Another sword swipe never came as that soldier became yet another crunch against the wall. Still running, Chandler frantically searched for the hole in the wall as red-eyes gained on him. Its attention was still zeroed in on the boy. How could he lose it? Chandler turned as he reached the end of the line of soldiers as it now turned to go out through the wall. If he ran any further he’d have no soldiers to distract the beast with. Chandler stood, flexing his fingers as the beast rampaged through the Lurians, finally stopping briefly before the boy. Hopping forward, it swung a large army at his and he once again dove out of the way, landing it the mud. Chandler managed to get his head up as the beast approached. At least he had saved some of the retreating Ikalgans. He plopped his head back into the accepting mud and let the rain pour over his unresponsive body. “Hey!” a voice shouted from near the entry through the wall. “We can’t leave him!” One Lurian soldier broke formation and cautiously approached the beast. He turned and yelled to the men again, “Come on!” Three more soldiers joined him as they surrounded the beast. It ignored them, almost upon Chandler now. The man who yelled earlier charged the beast. The muddy boy willed the man to reach the beast in time before it’s red-eyes were the last thing Chandler saw. The creature raised its arms before a sword went into its back. Red-eyes growled in a low tone before swiping at its attacker. Chandler’s savior was thrown several feet and lay unmoving in a puddle. The other three closed in and rushed the beast. It crushed one attacker beneath its four arms and twirled, looking around wildly as a sword plunged into its neck. Chandler watched as the battle continued on. Now two soldiers facing off against the beast, its head creepily hanging on by a thread. Behind the beast, the rest of the Lurian army retreated, likely not wanting to see if Ikalgans had more than one of these beasts. Red-eyes charged one of the last two remaining soldiers. The man stood his ground and tried to sidestep the beast at the last moment. He successfully severed the beast’s head but was caught under the creature as it fell dying. The last soldier glanced around and upon seeing he was the last remaining one, took off through the hole without hesitation. Chandler laid there for what seemed like an eternity before he attempted to rise. He successfully got to one knee before collapsing face first into the mud. It was in that position that Chandler waited to be found, conscious and exhausted with a face full of mud. What Is This? The Eternity Acts is a serial web-novel that focuses on the aftermath of the Acts of King Rayon. All works on this WordPress will take place in this universe. The main story will keep to a Wednesday and Saturday posting schedule. I will also post short stories which will be one-offs of various people from the universe. The Whisperer Rayon cursed his villagers, summoned a Wall of Fire and created a Burning Sea to mold his kingdom into a place he deemed worth living in. 150 years later and the Whisperer Rayon is gone, but his acts remain. Will the villagers, whose curse changes them by night, be able to overcome the acts of this twisted madman to create a society free from his acts? It may take centuries, but a new King, an ex-slave, and the last Whisperer will certainly try...
{ "pile_set_name": "Pile-CC" }
EU: Mit "nuklearer Option" gegen Ungarn Thomas Pany EU-Fraktionen wollen ein Rechtsstaatsverfahren vorbereiten. Die EU-Kommission droht wegen der Nichteinhaltung der Flüchtlingsvereinbarung mit dem nächsten Vertragsverletzungsverfahren Ungarn stand in den letzten Wochen durch eine Reihe von politischen Maßnahmen in der Kritik, zuletzt durch das neue ungarische Hochschulgesetz und durch das Gesetz zu Transitzonen für Asylsuchende. Auch die im Herbst vergangenen Jahres gescheiterte Volksabstimmung Ansiedlung "nicht-ungarischer Bürger" kam bei der EU nicht wirklich gut an. Kein Wunder war ihre Fragestellung doch auch gegen die Europäische Union gerichtet. Immer wieder wird von Kritikern der nationalistischen, "illiberalen Demokratie" (Orbans Rede, August 2014) darauf verwiesen, dass dies doch schlecht vereinbar sei: eine Politik, die im grundsätzlichen Konflikt mit Vorgaben der EU stehe, und zugleich das Ausschöpfen von Vorteilen der Gemeinschaft. Als Kritiker mit der schärfsten Forderung tat sich der Luxemburgische Außenminister Asselborn hervor, der im vergangenen Jahr forderte, dass Ungarn "vorübergehend oder notfalls für immer aus der EU ausgeschlossen" werde, weil dort "massiv Grundwerte der Europäischen Union verletzt" würden. "Diesmal soll Orban nicht so einfach davonkommen" So deutlich ist die Resolution, über heute im europäischen Parlament verhandelt wird, nicht. Aber sie geht in diese Richtung. Laut einem Tagesschau-Bericht sind sich Sozialdemokraten, Grüne, Linke und Liberale einig: "Diesmal soll Viktor Orban nicht so einfach davonkommen." Sie drohen, wie es die Tagesschau formuliert mit der "Atombombe" unter allen möglichen Strafmaßnahmen, nämlich mit einem Verfahren nach Artikel 7 des EU-Vertrages. Darin geht es um die "eindeutige Gefahr einer schwerwiegenden Verletzung der in Artikel 2 genannten Werte durch einen Mitgliedstaat". Gemeint sind Werte wie "Achtung der Menschenwürde, Freiheit, Demokratie, Gleichheit, Rechtsstaatlichkeit und die Wahrung der Menschenrechte". Das ist ziemlich schweres Geschütz. Auch die deutschsprachige ungarische Zeitung Pester Lloyd spricht in diesem Zusammenhang von "nuklearer Option". Nach der Feststellung einer schwerwiegenden Verletzung könnte nämlich beschlossen werden, "bestimmte Rechte auszusetzen, einschließlich der Stimmrechte". Die SPD-Europaabgeordnete Birgit Sippel wird von der Tageschau damit zitiert, dass es nach mehr als sechs Jahren Gespräche über unterschiedliche Gesetze in Ungarn, die in eine falsche Richtung gingen, Zeit werde, um ein klares Signal zu setzen: "Deshalb ist Artikel 7 jetzt mal angesagt." Hohe Mehrheitshürden, fehlende Einigkeit Wahrscheinlich muss sich Orban aber nicht wirklich fürchten, denn die Entsendung der EU-rechtlichen "Atombombe" benötigt große Einigkeit in der Sache. Sie setzt sehr hohe Mehrheitshürden. Wie schwierig es ist, Einigkeit zu erreichen zeigt sich im EU-Parlament: Neben dem Resolutionsantrag der Fraktion S&D (Sozialdemokratien), ALDE (Liberale), den Grünen und weiteren linken Gruppen, die für ein Rechtsstaatsverfahren plädieren, gibt es einen weiteren Resolutionsantrag von Manfred Weber, dem Fraktionschef der konservativen EVP. Der CSU-Politiker Weber ist dagegen, die "härteste Waffe zu zücken". Es würden ja Gespräche laufen ja zwischen der Kommission und der ungarischen Regierung. Man müsse "im Verfahren fair bleiben, in der Sache aber hart sein." Allerdings besteht nach Informationen des EU-Observers auch im Lager der EVP Uneinigkeit. Nicht alle sind dem ungarischen Regierungschef gegenüber so konziliant eingestellt, wie es CSU-Politiker sind. Manchen Abgeordneten aus der rechten Mitte hätten genug davon, Orban zu verteidigen. So könnte heute aus dem EU-Parlament ein Stimmungssignal nach Budapest erfolgen, das Orban gewisse Toleranzgrenzen seiner gegenüber der EU "auf Krawall gebürsteten Politik" (Pester Lloyd) zu berücksichtigen hat.
{ "pile_set_name": "OpenWebText2" }
--- abstract: 'We present observations with the Cosmic Origins Spectrograph onboard the [*Hubble Space Telescope*]{} of eight compact star-forming galaxies at redshifts $z$ = 0.02811 – 0.06540, with low oxygen abundances 12 + log(O/H) = 7.43 – 7.82 and extremely high emission-line flux ratios O$_{32}$ = \[O [iii]{}\]$\lambda$5007/\[O [ii]{}\]$\lambda$3727 $\sim$ 22 – 39, aiming to study the properties of Ly$\alpha$ emission in such conditions. We find a diversity in Ly$\alpha$ properties. In five galaxies Ly$\alpha$ emission line is strong, with equivalent width (EW) in the range 45 – 190Å. In the remaining galaxies, weak Ly$\alpha$ emission with EW(Ly$\alpha$) $\sim$ 2 – 7Å is superposed on a broad Ly$\alpha$ absorption line, indicating a high neutral hydrogen column density $N$(H [i]{}) $\sim$ (1 – 3)$\times$10$^{21}$ cm$^{-2}$. We examine the relation between the Ly$\alpha$ escape fraction $f_{\rm esc}$(Ly$\alpha$) and the Lyman continuum escape fraction $f_{\rm esc}$(LyC), using direct measures of the latter in eleven low-redshift LyC leakers, to verify whether $f_{\rm esc}$(Ly$\alpha$) can be an indirect measure of escaping LyC radiation. The usefulness of O$_{32}$, of the Ly$\alpha$ equivalent width EW(Ly$\alpha$) and of the Ly$\alpha$ peak separation $V_{\rm sep}$ as indirect indicators of Ly$\alpha$ leakage is also discussed. It is shown that there is no correlation between O$_{32}$ and $f_{\rm esc}$(Ly$\alpha$). We find an increase of $f_{\rm esc}$(Ly$\alpha$) with increasing EW(Ly$\alpha$) for EW(Ly$\alpha$)$<$100Å, but for higher EW(Ly$\alpha$)$\ga$150Å  the $f_{\rm esc}$(Ly$\alpha$) is nearly constant attaining the value of $\sim$0.25. We find an anticorrelation between $f_{\rm esc}$(Ly$\alpha$) and $V_{\rm sep}$, though not as tight as the one found earlier between $f_{\rm esc}$(LyC) and $V_{\rm sep}$. This finding makes $V_{\rm sep}$ a promising indirect indicator of both the Ly$\alpha$ and ionizing radiation leakage.' author: - | Y. I. Izotov$^{1,2}$, D. Schaerer$^{3,4}$, G. Worseck$^{5}$, A. Verhamme$^{3}$, N. G. Guseva$^{1,2}$,  T. X. Thuan$^{6}$, I. Orlitová$^{7}$ & K. J. Fricke$^{8,2}$\ $^{1}$Bogolyubov Institute for Theoretical Physics, National Academy of Sciences of Ukraine, 14-b Metrolohichna str., Kyiv, 03143, Ukraine,\ E-mail: yizotov@bitp.kiev.ua, nguseva@bitp.kiev.ua\ $^{2}$Max-Planck-Institut für Radioastronomie, Auf dem Hügel 69, 53121 Bonn, Germany\ $^{3}$Observatoire de Genève, Université de Genève, 51 Ch. des Maillettes, 1290, Versoix, Switzerland,\ E-mail: daniel.schaerer@unige.ch, anne.verhamme@unige.ch\ $^{4}$IRAP/CNRS, 14, Av. E. Belin, 31400 Toulouse, France\ $^{5}$ Institut für Physik und Astronomie, Universität Potsdam, Karl-Liebknecht-Str. 24/25, D-14476 Potsdam, Germany,\ E-mail: gworseck@uni-potsdam.de\ $^{6}$Astronomy Department, University of Virginia, P.O. Box 400325, Charlottesville, VA 22904-4325, USA,\ E-mail: txt@virginia.edu\ $^{7}$Astronomical Institute, Czech Academy of Sciences, Bočn[í]{} II 1401, 141 00, Prague, Czech Republic,\ E-mail: orlitova@asu.cas.cz\ $^{8}$Institut für Astrophysik, Göttingen Universität, Friedrich-Hund-Platz 1, 37077 Göttingen, Germany,\ E-mail: kfricke@gwdg.de date: 'Accepted XXX. Received YYY; in original form ZZZ' title: 'Diverse properties of Ly$\alpha$ emission in low-redshift compact star-forming galaxies with extremely high \[O [iii]{}\]/\[O [ii]{}\] ratios' --- \[firstpage\] (cosmology:) dark ages, reionization, first stars — galaxies: abundances — galaxies: dwarf — galaxies: fundamental parameters — galaxies: ISM — galaxies: starburst Introduction {#intro} ============ The extremely high O$_{32}$ = \[O [iii]{}\]$\lambda$5007/\[O [ii]{}\]$\lambda$3727 ratio in spectra of low-redshift dwarf star-forming galaxies (SFGs) indicates the presence of either an ionization-bounded compact H [ii]{} region with intense ionizing radiation from a very young star-forming region or a density-bounded H [ii]{} region losing its ionizing radiation, or both [e.g. @JO13; @NO14; @S15; @I17]. The ionizing photon production efficiency $\xi_{\rm ion}$ = $N_{\rm LyC}$/$L_\nu$ in these galaxies could be very high, where $N_{\rm LyC}$ is the Lyman continuum photon production rate and $L_\nu$ is the monochromatic UV luminosity at $\lambda$ = 1500Å. Therefore, they are considered as the local counterparts of the dwarf SFGs at high redshifts, which are likely the main source of the last phase transition of the matter in the Universe, namely its reionization, which ends at $z$ $\sim$ 6 [@O09; @WC09; @K11; @J13; @M13; @Y11; @B15a; @Sm18; @N18; @St18; @K19]. An alternative hypothesis is the dominant role of active galactic nuclei (AGN) in the reionization of the Universe, as proposed e.g. by @Madau15. However, in recent years, growing evidence for a small contribution of AGN to reionization has accumulated [e.g. @H18; @M18; @P18; @Mat18; @Ku19]. On the other hand, SFGs can be considered as an important source of ionization only if the product $\xi_{\rm ion}$$\times$$f_{\rm esc}$(LyC) is sufficiently high, where $f_{\rm esc}$(LyC) is the escape fraction of Lyman continuum (LyC), i.e. the fraction of ionizing radiation emitted into the intergalactic medium (IGM). It has been estimated that $f_{\rm esc}$(LyC) should not be less than 10–20 per cent on average in order to accomplish reionization [e.g. @O09; @R13; @D15; @Robertson15; @K16]. Currently, direct observations of the LyC are available for only a limited number of galaxies at high and low redshifts. Searches for and confirmation of LyC emission from high redshift galaxies are difficult due to their faintness, contamination by lower-redshift interlopers and attenuation by residual H [i]{} in the highly ionized IGM. [e.g., @V10; @V12; @Inoue14; @Gr15]. They have resulted in the discovery of approximately three dozens of LyC leakers with reliably high escape fraction: [*Ion2*]{} [@Va15; @B16], Q1549-C25 [@Sh16], A2218-Flanking [@B17], [*Ion3*]{} [@Va18], SunBurst Arc [@RT19], 15 SFGs studied by @St18, and a dozen of galaxies at $z$ = 3.1 with strong \[O [iii]{}\] $\lambda$5007 emission [@F19]. At low redshifts, $z$ $\sim$ 0.3 - 0.4, @I16 [@I16b; @I18; @I18b] have detected LyC leaking emission in eleven compact SFGs with high O$_{32}$ $\sim$ 5 - 28 and derived $f_{\rm esc}$(LyC) ranging between 2 and 72 per cent. These values are higher than $f_{\rm esc}$(LyC) of $\la$ 1 per cent derived by @B14 and @C17 in SFGs with lower O$_{32}$, or by @He18 in SFGs with lower equivalent widths of the H$\beta$ emission line. There is hope that the number of low-$z$ LyC leakers will considerably be increased after the completion in 2020 of the [*HST*]{} Large Program GO 15626 (P.I. A. Jaskot), which includes more than 70 targets. The [*Hubble Space Telescope*]{} ([*HST*]{})/Cosmic Origins Spectrograph (COS) sensitivity curve limits LyC observations to $z \ga 0.25$. At lower redshifts, only very bright targets are accessible [e.g. @L16]. Therefore, for low-redshift SFGs, reliable indirect indicators of LyC leakage are needed. @NO14 proposed that high O$_{32}$ can be an indication of density-bounded H [ii]{} region and thus of LyC leakage. However, O$_{32}$ depends on some other parameters, such as ionization parameter and hardness of radiation which in turn depend on metallicity. @F16 has found a correlation between $f_{\rm esc}$(LyC) and O$_{32}$, using a small sample of galaxies which includes low-$z$ LyC leakers with O$_{32}$ $<$ 8. On the other hand, no correlation has been found by @I18b for eleven confirmed LyC leakers with O$_{32}$ in a wide range of $\sim$ 5 - 28. A similar conclusion was obtained by @N18 and @B19 [see also @R17]. However, this conclusion is based mainly on observations of galaxies with O$_{32}$ $\la$ 16. Only one observed galaxy has a higher value of O$_{32}$. It is thus important to observe LyC emission in more galaxies with higher O$_{32}$. The He [i]{} emission-line ratios in optical spectra of galaxies can also be used to estimate the column density of neutral gas and thus to indirectly estimate $f_{\rm esc}$(LyC) [@I17]. However, deep spectra in the optical range are needed since these lines are weak with intensities $\la$10 per cent of the H$\beta$ emission line. Finally, the properties of the Ly$\alpha$ emission line can serve as indirect indicators of escaping LyC emission. Its profile is double-peaked in the spectra of most of LyC leakers, with the separation between the peaks $V_{\rm sep}$ decreasing with decreasing neutral hydrogen column density $N$(H [i]{}) [e.g. @I16; @I16b; @I18; @I18b]. In rare cases, the Ly$\alpha$ profile is more complex and consists of three and more peaks [@RT17; @I18b; @Va18]. @V15 and @I18b have shown that there is a tight relation between the LyC escape fraction $f_{\rm esc}$(LyC) and the separation between Ly$\alpha$ peaks, making $V_{\rm sep}$ the most reliable indicator of escaping ionizing radiation. Furthermore, @V17 have shown for a limited sample of LyC leakers that the Ly$\alpha$ escape fractions $f_{\rm esc}$(Ly$\alpha$) are larger than the LyC escape fractions $f_{\rm esc}$(LyC), in accord with theoretical predictions of @D16. In this paper we present new [*HST*]{}/COS observations of the Ly$\alpha$ in eight low-redshift ($z$ $<$ 0.07) compact SFGs with the highest O$_{32}$ $\sim$ 22 – 39 found in the Sloan Digital Sky Survey (SDSS), aiming to examine the properties of Ly$\alpha$ emission in these galaxies and to verify possible indirect indicators of escaping Ly$\alpha$ and LyC emission. The studied galaxies have lower stellar masses than previously observed Ly$\alpha$ emitting galaxies such as the “green pea” (GP) galaxies at $z$ $\sim$ 0.1 – 0.3 studied e.g. by @J17, @Y17, @MK19, and the confirmed LyC leakers at $z$ $\sim$ 0.3 – 0.4 [@I16; @I16b; @I18; @I18b]. The selection criteria and the properties of the selected galaxies derived from observations in the optical range are presented in Section \[sec:select\]. The [*HST*]{} observations and data reduction are described in Section \[sec:obs\]. The surface brightness profiles in the UV range are discussed in Section \[sec:sbp\]. Ly$\alpha$ emission is considered in Section \[sec:lya\]. In Section \[discussion\], our results are compared with the Ly$\alpha$ escape fractions obtained for other galaxies in some recent studies. We summarize our findings in Section \[summary\]. Selection criteria and the integrated properties of selected galaxies {#sec:select} ====================================================================== Our galaxies were selected from the SDSS Data Release 14 (DR14) [@A18]. We adopted the following selection criteria for each galaxy: 1\) it has a very high O$_{32}$ $>$ 20, which is an indication of either a density-bounded H [ii]{} region or a high ionization parameter. 2\) it has a compact structure in the SDSS image in order to observe the total flux of the galaxy with the small 2.5 arcsec COS aperture. 3\) it is isolated from other sources to avoid contamination in the [*HST*]{}/COS spectra. 4\) it is sufficiently bright in the UV range ([*GALEX*]{} NUV magnitude brighter than 22 mag) to be acquired with COS. In total, we selected the 8 brightest galaxies satisfying the above conditions. The SDSS spectra of the selected galaxies reveal considerably lower oxygen abundances, in the range 12 + log(O/H) = 7.43 – 7.82 (see below), as compared to the confirmed LyC leakers [@I16; @I16b; @I18; @I18b]. They show comparably high rest-frame equivalent widths EW(H$\beta$) = 258 – 483 Å  (Table \[tab1\]), indicating very recent star formation. These galaxies are located at the extreme upper tip of the SFG branch in the Baldwin-Phillips-Terlevich (BPT) diagram (filled circles in Fig. \[fig2\]a) implying the presence of high-excitation H [ii]{} regions. They are considerably more extreme than the confirmed LyC leakers shown by open circles. It is seen in Fig. \[fig2\]b, which shows the O$_{32}$ – R$_{23}$ diagram, that the selected SFGs (filled circles) have the highest O$_{32}$ ratios among all SDSS SFGs, and that they are offset to low R$_{23}$ values compared to the main sequence of SFGs (grey dots) because of their lower metallicities. On the other hand, most of the confirmed LyC leakers with higher metallicities are located in the upper part of the main sequence (open circles). The SDSS spectra were used to derive the interstellar extinction from the hydrogen Balmer decrement and ionized gas metallicity using the prescriptions of @ITL94, @I06 and @G13. The extinction-corrected emission-line flux densities, the extinction coefficients $C$(H$\beta$), the rest-frame equivalent widths of H$\beta$, \[O [iii]{}\]$\lambda$5007 and H$\alpha$ emission lines, and the observed H$\beta$ flux densities are shown in Table \[taba1\]. We note that the H$\alpha$ emission line in the SDSS spectra of J0820$+$5431 and J1032$+$4919 and the \[O [iii]{}\]$\lambda$5007 emission line in the SDSS spectrum of J1032$+$4919 are clipped. Therefore, for J1032$+$4919, $I$(\[O [iii]{}\]$\lambda$5007) = 3$\times$$I$(\[O [iii]{}\]$\lambda$4959) is used to derive O$_{32}$, the electron temperature $T_{\rm e}$(O [iii]{}) and oxygen abundance. Furthermore, the H$\alpha$ emission line in this galaxy and in J0820$+$5431 is excluded in the calculation of extinction. The He [ii]{} $\lambda$4686Å emission line is detected in seven out of eight galaxies implying hard ionizing radiation. The flux densities from Table \[taba1\] and the direct $T_{\rm e}$ method are used to derive the electron temperature, electron number density and the element abundances in the H [ii]{} regions. These quantities are shown in Table \[taba2\]. The oxygen abundances of our galaxies are on average $\sim$ 0.2 - 0.3 dex lower than those in known low-redshift LyC leakers [@I16; @I16b; @I18; @I18b]. Four galaxies from our sample have been observed with the Large Binocular Telescope (LBT) by @I17. Those authors derived oxygen abundances that are in good agreement with the present determinations from SDSS spectra. The neon, sulfur and argon to oxygen abundance ratios (Fig. \[fig3\]) are similar to those in dwarf emission-line galaxies [e.g. @I06; @G13] and in confirmed LyC leakers, with similar small dispersions. On the other hand, the N/O ratios are scattered over a large range (Fig. \[fig3\]a) which can not be explained by N/O errors (Table \[taba2\]). Compared to SDSS SFGs (shown by grey dots), they tend to have systematically higher values both for the galaxies in our sample and for the confirmed LyC leakers. The emission-line luminosities and stellar masses of our galaxies were obtained adopting a luminosity distance [NED, @W06] with the cosmological parameters $H_0$=67.1 km s$^{-1}$Mpc$^{-1}$, $\Omega_\Lambda$=0.682, $\Omega_m$=0.318 [@P14]. Using these parameters and apparent magnitudes, we also derived absolute magnitudes $M_g$ and $M_{\rm FUV}$ in the SDSS $g$ and [*GALEX*]{} FUV bands (Table \[tab3\]), assuming negligible bandpass corrections and neglecting dust extinction. The H$\beta$ luminosity $L$(H$\beta$) and corresponding star-formation rates SFR shown in Table \[tab3\] were obtained from the extinction-corrected H$\beta$ flux densities using the relation by @K98 and adopting the value of 2.75 for the H$\alpha$/H$\beta$ flux ratio. They are one order of magnitude lower than the respective values for LyC leakers. Specific star formation rates sSFR = SFR/$M_\star$ of $\sim$ 100 Gyr$^{-1}$ are similar to sSFRs for LyC leakers [@I16; @I16b; @I18; @I18b] and are among the highest known for GPs and luminous compact galaxies [@Ca09; @I11], and dwarf SFGs at $z < 1$ [@I16c]. On the other hand, they are several orders of magnitude higher than the sSFRs of $\sim$ 0.01 - 1 Gyr$^{-1}$ of the SDSS main sequence galaxies. The extinction-corrected SDSS spectra of our galaxies were used to fit the spectral energy distribution (SED) of both the stellar and nebular components and to derive their stellar masses, starburst ages and the modelled intrinsic absolute magnitudes $M_{\rm FUV}^{\rm SED}$ in the FUV range. The fitting method, using a two-component model, is described in @I18. We find that the stellar masses and FUV luminosities of our galaxies are $\sim$ 2 orders of magnitude lower compared to the confirmed LyC leakers (Table \[tab3\]), but their extinction-corrected absolute FUV magnitudes are similar to those of the faintest detected galaxies at $z$ = 6 – 8 [e.g. @L17; @Bo17b]. [*HST*]{}/COS observations and data reduction {#sec:obs} ============================================= [*HST*]{}/COS spectroscopy of the eight galaxies was obtained in program GO 15136 (PI: Y. I. Izotov) during the period January 2018 – February 2019. The observational details are presented in Table \[tab4\]. The galaxies were acquired by COS near ultraviolet (NUV) imaging. Since our targets are compact but faint, as based on shallow [*GALEX*]{} imaging, a considerable fraction of one orbit was spent per object for deep NUV imaging and reliable acquisition. The NUV-brightest region of each target was centered in the 2.5arcsec diameter spectroscopic aperture (Fig. \[fig4\]). We note that acquisition observations failed for J1242$+$4851. We do not know the reason for that. The acquisition image has a flag raised in the header: EXPFLAG=‘INVALID CHECK IMAGE’. Possibly, something went wrong during one of the two acquisition exposures. Therefore, the imaging data for J1242$+$4851 are not present in this paper. However, the spectroscopic observations were not affected. For the other galaxies, some structure with an extended low-surface-brightness (LSB) component is seen. However, their sizes are smaller than the central unvignetted $0.8$arcsec diameter region of the spectroscopic aperture. Hence, the galaxy quantities derived from the COS spectra here do not require corrections for vignetting. In fact, most of the NUV continuum in these galaxies is concentrated in much smaller central regions, with full widths at half maximum $\la$ 0.1 arcsec. We obtained spectra of the Ly$\alpha$ emission lines with the COS G130M grating positioned at the central wavelength 1222Å and a small wavelength coverage of $\sim$ 300Å at COS Detector Lifetime Position 4, yielding a spectral resolving power $\lambda/\Delta\lambda\simeq 14,000$ in the wavelength range of interest. All four focal-plane offset positions were employed to correct grid wire shadows and detector blemishes. The individual exposures were reduced with the CALCOS pipeline v3.3.4, followed by accurate background subtraction and co-addition with custom software [@W16]. Apart from adjustments of the rectangular extraction aperture due to the wide spatial profile of the G130M 1222Å setup (57 pixels) and adjustments in the detector pulse-height thresholds to reflect the current detector state, the reduction procedures were analogous to @I16. We verified in the two-dimensional spectra that the extraction aperture contains all visible Ly$\alpha$ flux and preserves the spectrophotometry of the continuum. The estimated background uncertainties of a few per cent do not affect our analysis. The homogeneous reduction enables a fair comparison to our previous results [@I16; @I16b; @I18; @I18b]. Surface brightness distribution in the NUV range {#sec:sbp} ================================================ Using the COS NUV acquisition images and the routine [*ellipse*]{} in [iraf]{}[^1]/[stsdas]{}[^2] we obtain the surface brightness (SB) profiles of our galaxies in the UV continuum. The [*GALEX*]{} NUV magnitudes were used to express the profiles in the units mag arcsec$^{-2}$. For this, we have scaled the total NUV flux of the galaxy measured in the acquisition image to the flux corresponding to the [*GALEX*]{} NUV magnitude. The shape of the SB profiles (Fig. \[fig5\]) in our galaxies is similar to those of confirmed LyC leakers [@I16; @I16b; @I18; @I18b] with a sharp increase in the central part because of the presence of the bright star-forming region(s) and a linear decrease (in magnitudes) in the outer part, reminiscent of a disc structure. However, the scale lengths $\alpha$ of our galaxies in the range $\sim$ 0.09 – 0.48 kpc (Fig. \[fig5\]) are considerably lower than $\alpha$ = 0.6 – 1.8 kpc in LyC leakers [@I16; @I16b; @I18; @I18b], presumably because of their considerably lower stellar masses. The scale lengths of our galaxies are among the lowest found for local blue compact dwarf galaxies [@P02]. On the other hand, the corresponding surface densities of SFR in the studied galaxies $\Sigma$ = SFR/($\pi \alpha^2$) are comparable to those of LyC leakers. Because of the compactness of the bright star-forming regions, the half-light radii $r_{50}$ of our galaxies in the NUV are considerably smaller than $\alpha$ (see Table \[tab3\]). Adopting $r_{50}$ as a measure of the size of these galaxies (Table \[tab3\]), the corresponding $\Sigma$s are typically two orders of magnitude larger, and comparable to those found for low-redshift LyC leakers and SFGs at high redshifts [@CL16; @PA18; @Bo17]. Ly$\alpha$ emission {#sec:lya} =================== The LyC emission can not be directly observed in our galaxies because of their low redshifts. Therefore, we wish to use the Ly$\alpha$ profiles in their spectra to derive information about possible leaking LyC radiation for galaxies with much lower stellar masses than those of confirmed LyC leakers. @D16 and @V17 have proposed that the presence of a double-peaked Ly$\alpha$ profile, with a small peak separation, would be a good indicator of LyC leakage. According to the models of @V15, the peak separation decreases with decreasing column density of the neutral gas. This in turn would result in a higher escape fraction of the LyC radiation. Additionally, the role of the blue Ly$\alpha$ peak in the LyC escape has been discussed by e.g. @H15 and @O18. They found that the escape fraction of the Ly$\alpha$ radiation increases when the blue peak velocity decreases. The Ly$\alpha$ profiles in the medium-resolution spectra of the 8 observed galaxies are shown in Fig. \[fig6\]. In the upper panel for each object, both the flux and the wavelength are scaled so that the continuum behaviour can be seen over a broader wavelength range around the Ly$\alpha$ line, while in the lower panel both the flux and the wavelength scales are adjusted to examine the profile of the Ly$\alpha$ emission line. A strong Ly$\alpha$ $\lambda$1216Å emission-line without any evidence for an absorption profile is detected in five galaxies (Fig. \[fig6\]b,c,f,g,h), similarly to the low-$z$ LyC leakers [fig. 7 in @V17]. In the remaining 3 galaxies, the weak Ly$\alpha$ emission line is superposed on a broad absorption component (Fig. \[fig6\]a,d,e). The fraction of galaxies with a detected Ly$\alpha$ absorption line is similar to that obtained by @MK19. However, the intensity at the bottom of the absorption lines is above zero in these galaxies, indicating that the covering factor of the H [i]{} cloud surrounding the ionizing source is less than unity, allowing for some Ly$\alpha$ emission and some continuum emission in this wavelength range to escape. The full widths at zero intensity of the Ly$\alpha$ emission lines in all our galaxies are FWZI = 3 – 4Å  (Fig. \[fig6\]). On the other hand, the widths of the absorption lines at the bottom of their profiles are considerably broader, $\sim$ 10 – 20Å in the three galaxies J0007$+$0226, J0926$+$4504 and J1032$+$4919. Therefore, it is unlikely that the emission above zero at the bottom of the absorption profiles is due to the Ly$\alpha$ emission line. Six out of eight observed galaxies show double-peaked Ly$\alpha$ emission profiles with the peak separations much larger than the nominal COS spectral resolution of $\sim$ 20 km s$^{-1}$ for the G130M grating. The Ly$\alpha$ emission line in J0926$+$4504 is too weak to definitely derive its profile. The two-peak shape is similar to that observed in known LyC leakers [@I16; @I16b; @I18; @I18b; @V17] and in GP galaxies [@JO14; @H15; @Y17; @MK19]. The Ly$\alpha$ emission-line profile of J1032$+$4919 is more complex and consists of three peaks, similar to that of one low-$z$ LyC leaker [@I18b], and two $z$ $>$ 2 LyC leakers [@Va18; @RT17]. However, at variance with J1032$+$4919, all other triple-peaked spectra in the literature do not show clear signs of underlying Ly$\alpha$ absorption. Some parameters of the Ly$\alpha$ emission profile are presented in Table \[tab5\]. The Ly$\alpha$ emission-line fluxes in the spectra of galaxies with detected broad Ly$\alpha$ absorption are measured placing the continuum at the bottom of the absorption profiles. For J1032$+$4919, two separations (blue peak - centre peak and centre peak - red peak) are given. It is seen that the separation between the peaks is in a narrow range $\sim$ 240 – 310 km s$^{-1}$, indicating low neutral hydrogen column densities $N$(H [i]{}) and implying considerable fractions of escaping LyC emission. However, in the spectra of three galaxies, J0007$+$0226, J0926$+$4504 and J1032+4919, strong Ly$\alpha$ absorption is present as well. The flux in the central part of absorption profiles is above zero, although their shape indicates that they are clearly saturated. This appearance is in contrast to expectations for a single source surrounded by an uniform neutral gas cloud with high $N$(H [i]{}). We derive $N$(H [i]{}) using the relation $$I(\lambda)=I_{\rm cont} \exp{[-\tau(\lambda)]}, \label{profile}$$ where $I_{\rm cont}$ and $I(\lambda)$ are the flux of the continuum and the flux in the line at the wavelength $\lambda$, respectively, after subtraction of the flux at the bottom of the Ly$\alpha$ absorption line. The optical depth $\tau$($\lambda$) in the Ly$\alpha$ profile at the wavelength $\lambda$ is defined by the relation of @B75 $$\tau(\lambda) = 4.26\times 10^{-20} \frac{N({\rm H~I})}{6.04\times 10^{-10} + (\lambda - \lambda_0)^2}, \label{Lya}$$ where $N$(H [i]{}) is in cm$^{-2}$, $\lambda$ is in Å, $\lambda_0$ = 1215.67 Å, Using Eqs. \[profile\] and \[Lya\] we find $N$(H [i]{}) = 1.8$\times$10$^{21}$ cm$^{-2}$, 1.0$\times$10$^{21}$ cm$^{-2}$ and 3.0$\times$10$^{21}$ cm$^{-2}$ from the fit of wings of absorption Ly$\alpha$ profiles in the spectra of J0007$+$0226, J0926$+$4504 and J1032$+$4919, respectively (grey lines in the upper panels of Fig. \[fig6\]a, \[fig6\]d, and \[fig6\]e). We note that only the blue damped wing was used for fitting because the red wing is contaminated by the stellar N [v]{} $\lambda$1240Å  line with a P Cygni profile. Then the superposition of the Ly$\alpha$ absorption and emission lines could be explained by the emission of two star-forming regions, where the fainter one, with a flux in the continuum corresponding to the one at the bottom of the absorption profile, is surrounded by neutral gas with low $N$(H [i]{}), and the brighter one is surrounded by a neutral optically thick cloud. The flux of the continuum for the brighter region is determined by the difference between the observed flux outside the absorption profile and the flux at its bottom. The presence of Ly$\alpha$ emission in galaxies with broad Ly$\alpha$ absorption could also be explained by low-column-density holes in a thick cloud of neutral hydrogen. Discussion ========== Comparison with other galaxy samples ------------------------------------ We compare our galaxies with those studied in other recent papers. All galaxies from the sample in this paper are dwarf systems with SDSS $g$ absolute magnitudes $M_g$ $\sim$ –16 to –18 mag. Their absolute FUV magnitudes $M_{\rm FUV}$, in the range –14 to –16, compare well with the average $M_{\rm FUV}$ $\sim$ –15 mag of the faintest spectroscopically confirmed LAEs at redshifts 2.9 - 6.7, similar to those of the sources believed to reionize the Universe [@Ma18]. Our galaxies are much more compact in the NUV continuum (Fig. \[fig5\]) and have lower metallicities (Table \[tab1\]) than most Ly$\alpha$ emitters (LAEs) and LyC leakers. They have high ionizing photon production efficiencies $\xi_{\rm ion}$ (Table \[tab3\]), above the canonical value in log scale of $\log\xi_\mathrm{ion}\sim 25.2$ in units of log Hz erg$^{-1}$ adopted in high-$z$ studies [e.g. @R13] and similar to the values in LAEs at $z$ $\sim$ 3 - 7 [@Ha18; @Na18]. These high values are a natural consequence of a very young starburst age (Table \[tab3\]). High $\xi_{\rm ion}$ in our galaxies are also similar to those in confirmed low-$z$ LyC leakers [e.g. @S16]. If applicable to all high-$z$ galaxies, such $\xi_{\rm ion}$ values would suffice to reionize the Universe with a constant escape fraction $f_{\rm esc}$(LyC) $\sim$ 10 per cent [e.g. @O09; @R13; @D15; @Robertson15; @K16]. However, we note that the $\xi_{\rm ion}$ values in Table \[tab3\] should be considered only as lower limits, as including possible escaping LyC radiation, which is not taken into account, would somewhat increase these values. The high-$z$ LAEs show a tight relation between the Ly$\alpha$ luminosity $L$(Ly$\alpha$) and the absolute magnitude $M_{\rm FUV}$ at $\lambda$ = 1500Å(small open grey circles in Fig. \[fig7\]a). The confirmed LyC leakers [open black circles, @I16; @I16b; @I18; @I18b] follow the same relation. On the other hand, GPs at redshifts $\la$ 0.3 (grey asterisks) are offset to lower $L$(Ly$\alpha$) by one order of magnitude. This offset can be caused by aperture effects because GPs are on average closer to us and have larger angular sizes. Furthermore, the EW(Ly$\alpha$)s in GPs are considerably lower than in low-$z$ LyC leakers (Fig. \[fig7\]a), indicating older burst ages and thus lower Ly$\alpha$ luminosities. We note that for the LyC leakers and GPs we do not use the published values for Ly$\alpha$ in @I16 [@I16b; @I18; @I18b], @JO14, @H15, @J17 and @Y17. Instead for the sake of data homogeneity, we measured Ly$\alpha$ fluxes and equivalent widths using the public [*HST*]{} data, correcting the fluxes for Milky Way extinction and converting them to luminosities. As for the absolute FUV magnitudes, we derived them from the apparent [*GALEX*]{} FUV magnitudes. Our galaxies with extreme O$_{32}$ extend the range of $M_{\rm FUV}$ to appreciably lower FUV brightesses. Their low Ly$\alpha$ luminosities ($L$(Ly$\alpha$)$\la$10$^{42}$ erg s$^{-1}$) make the $L$(Ly$\alpha$)-$M_{\rm FUV}$ relation bend downwards at low $M_{\rm FUV}$ (Fig. \[fig7\]a)). We note that LAEs with low Ly$\alpha$ luminosities, similar to those of our galaxies, are also detected in the high-$z$ Universe [e.g. @L19]. A notable feature of the four galaxies with the highest EW(Ly$\alpha$) and highest $L$(Ly$\alpha$) in our sample is that their Ly$\alpha$ luminosities are lower by a factor $>$ 2 than the value derived from the extrapolation of the relation for high-$z$ galaxies to fainter absolute FUV magnitudes (dashed line). While they are consistent with the extrapolation of the trend defined by the GPs to fainter absolute UV magnitudes, the Ly$\alpha$ equivalent widths of the galaxies with extreme O$_{32}$ are similar to those of the low-$z$ LyC leakers [@I16; @I16b; @I18; @I18b] and are much higher than those of GPs. It was shown e.g. by @Wi16 [@Wi18] that high-$z$ galaxies at $z$ $>$ 3 are surrounded by extended diffuse Ly$\alpha$-emitting haloes tracing neutral gas up to several tens of kpc and contributing 40 – 90 per cent of the total Ly$\alpha$ flux. These extended haloes are seen even in low-mass SFGs with stellar masses down to 10$^{8}$ – 10$^{9}$ M$_\odot$ [@E18; @E19]. @Y17b have shown that Ly$\alpha$ emission in Ly$\alpha$-emitting galaxies at lower redshifts $z$ $\la$ 0.3 is spatially more extended compared to that of the UV continuum. The difference between our high-EW(Ly$\alpha$) and high-$z$ galaxies may possibly be caused by a low-intensity diffuse Ly$\alpha$ emission in our galaxies extending outside the extraction aperture used to obtain the one-dimensional spectrum. In this case, an aperture correction is needed for comparison of the Ly$\alpha$ flux with fluxes of other hydrogen emission lines. However, we do not expect a large aperture correction for $L$(Ly$\alpha$) ($>$ 2) because the adopted aperture for the extraction of one-dimensional spectra includes nearly all light from our galaxies. Additionally, we have compared Ly$\alpha$ fluxes in one-dimensional spectra obtained with different extraction apertures and reduced with the same custom and pipeline data reduction packages. We find that they differ by not more than 5 per cent. Ly$\alpha$ imaging of the lowest-mass SFGs, with stellar masses $\la$ 10$^{8}$ M$_\odot$, is needed to verify the importance of aperture corrections. Other factors may play a role in reducing $L$(Ly$\alpha$) in our low-mass galaxies, e.g. unaccounted contribution of underlying Ly$\alpha$ absorption, enhanced UV extinction due to a larger fraction of dust and/or a steeper reddening law in the UV range than in LyC leakers and high-$z$ galaxies. But these factors are unlikely to be enough to explain the observed large offset of our galaxies from the extrapolated value (dashed line in Fig. \[fig7\]a). We note that the H$\beta$ luminosities in our galaxies are more than one order of magnitude smaller than in the LyC leakers, corresponding to a smaller number of massive stars by the same factor. Probably, dynamical processes such as large-scale outflows due to the evolution of massive stars in our galaxies are considerably less energetic and may result in a reduced escaping Ly$\alpha$ emission. The distribution of the Ly$\alpha$ rest-frame equivalent widths EW(Ly$\alpha$) for the same samples of galaxies as in Fig. \[fig7\]a is shown in Fig. \[fig7\]b. The range of EW(Ly$\alpha$) for our objects is larger than that for LyC leakers with four galaxies having EW(Ly$\alpha$) smaller than those for LyC leakers, and four galaxies with EW(Ly$\alpha$) greater than the average value for LyC leakers. On the other hand, GPs from the literature have in general considerably lower EW(Ly$\alpha$). Comparing to high-$z$ galaxies we note that the EW(Ly$\alpha$)s of our galaxies are several times lower than of high-$z$ galaxies, due to the same reasons (i.e possible aperture effects) as for Ly$\alpha$ luminosities. @Ha17 found a trend of increasing EW(Ly$\alpha$) with decreasing UV luminosity. They attributed this trend to the lower metallicities of lower-luminosity galaxies. However, the distribution of our galaxies which extend the EW(Ly$\alpha$)-$M_{\rm FUV}$ relation to lower UV luminosities does not support the existence of this trend. Although a dependence of EW(Ly$\alpha$) on metallicity is not excluded, the relation in Fig. \[fig7\]b can also be explained by increasingly higher EW(Ly$\alpha$) errors at their high values for high-$z$ galaxies and by the fact that only galaxies with high EW(Ly$\alpha$) at high redshifts can be selected. The presence of many low-$z$ GPs with low EW(Ly$\alpha$) favours this selection effect. The Ly$\alpha$ escape fraction ------------------------------ An important quantity to consider is the escape fraction $f_{\rm esc}$(Ly$\alpha$). In this paper we define $f_{\rm esc}$(Ly$\alpha$) as the ratio of the extinction-corrected Ly$\alpha$ to H$\beta$ flux ratio to its Case B value of 23.3, corresponding to that at a low electron number density, $N_{\rm e}$ $\sim$ 10$^2$ cm$^{-3}$ [@SH95]: $$f_{\rm esc}({\rm Ly}\alpha) = \frac{1}{23.3}\frac{I({\rm Ly}\alpha)}{I({\rm H}\beta)}, \label{fesc}$$ where $I$(Ly$\alpha$) is the flux density corrected for the Milky Way extinction, and $I$(H$\beta$) is the flux density corrected for both the Milky Way and internal galaxy extinction. At higher electron densities, for example at $N_{\rm e}$ $\sim$ 10$^3$ cm$^{-3}$, the Case B Ly$\alpha$/H$\beta$ ratio is higher by $\sim$ 10 per cent, resulting in a lower $f_{\rm esc}$(Ly$\alpha$). Using Eq. \[fesc\], we calculate $f_{\rm esc}$(Ly$\alpha$) for the eleven LyC leakers from @I16 [@I16b; @I18; @I18b] and compare them with their directly measured $f_{\rm esc}$(LyC) in Fig. \[fig8\]. It is seen that there is a general trend of increasing $f_{\rm esc}$(LyC) with increasing $f_{\rm esc}$(Ly$\alpha$). That trend can be approximated by the maximum likelihood relation (solid line) $$\log f_{\rm esc}({\rm LyC})=(2.67\pm 0.51)\times \log f_{\rm esc}({\rm Ly}\alpha) + (0.40\pm 0.29), \label{LyC-Lya}$$ but with large uncertainties. The distribution of the data points in Fig. \[fig8\] is somewhat different from that of the dusty, clumpy interstellar medium models of @D16 (shaded region in Fig. \[fig8\]). Their models predict $f_{\rm esc}$(Ly$\alpha$) $\ga$ 2$\times$$f_{\rm esc}$(LyC) and a wide range of $f_{\rm esc}$(Ly$\alpha$) at fixed $f_{\rm esc}$(LyC), depending on the covering factor of the neutral gas. The observational data show a much narrower range of $f_{\rm esc}$(Ly$\alpha$) at fixed $f_{\rm esc}$(LyC), with some galaxies lying outside the model prediction regions. A relatively small dispersion of the data points in the observed relation in Fig. \[fig8\] gives hope that $f_{\rm esc}$(Ly$\alpha$) can be used to indirectly derive $f_{\rm esc}$(LyC). However, the number of confirmed LyC leakers is still very small and larger statistics are needed to verify the relation given by Eq. \[LyC-Lya\]. There is also the possibility that there exist sources with significant Ly$\alpha$ escape but with no leaking LyC radiation which would flatten the relation shown by the solid line. The filled circles in Fig. \[fig8\] show the galaxies from our sample with the exclusion of the three galaxies with Ly$\alpha$ absorption. For these galaxies, $f_{\rm esc}$(LyC) is derived using the velocity separation between the peaks of Ly$\alpha$ emission lines. It is seen that, for a given $f_{\rm esc}$(LyC), the galaxies are offset from the confirmed LyC leakers to lower $f_{\rm esc}$(Ly$\alpha$). Possible aperture corrections for Ly$\alpha$ emission would be too small to account for those offsets. On the other hand, corrections for unaccounted Ly$\alpha$ absorption would increase $f_{\rm esc}$(Ly$\alpha$). Overall, these corrections do not appear to be enough to account for the offsets. Alternatively, parts of the offsets could be due to an overestimation of the indirect value of $f_{\rm esc}$(LyC), as determined by eq. 2 of @I18b. It was suggested by @NO14 that the fraction of escaping ionizing radiation from galaxies correlates with the O$_{32}$ ratio. However, @I18b found that the O$_{32}$ – $f_{\rm esc}$(LyC) correlation for the confirmed LyC leakers is rather weak and a high O$_{32}$ does not garantee a high $f_{\rm esc}$(LyC). Adopting the correlation between the Ly$\alpha$ and LyC escape fractions (Fig. \[fig8\]), we investigate whether O$_{32}$ can be used as indirect indicator of escaping ionizing radiation for galaxies with the highest O$_{32}$. We show in Fig. \[fig9\]a the O$_{32}$ – $f_{\rm esc}$(Ly$\alpha$) diagram for the same galaxies as in Fig. \[fig7\], excluding the high-$z$ LAEs. The galaxies discussed in this paper (filled circles) extend the range of O$_{32}$ up to $\sim$ 40, a factor of two higher than in previous studies. However, no correlation is found. Thus, we confirm and strengthen the conclusion of @I18b that O$_{32}$ is not a reliable indicator of escaping Ly$\alpha$ emission and likely also of escaping LyC radiation. This conclusion is in agreement with the models of @B19 who have shown that galaxies with various metallicities and ionization parameters fill all the $f_{\rm esc}$(LyC) – O$_{32}$ space. However, we note that $f_{\rm esc}$(Ly$\alpha$) for our galaxies (filled circles in Fig. \[fig9\]) could be somewhat higher because of unaccounted possible aperture corrections for Ly$\alpha$ emission and underlying absorption. We discuss other possible indicators of $f_{\rm esc}$(Ly$\alpha$). A possible candidate is the rest-frame equivalent width EW(Ly$\alpha$). The diagram EW(Ly$\alpha$) – $f_{\rm esc}$(Ly$\alpha$) is shown in Fig. \[fig9\]b. This diagram is somewhat puzzling. At low EW(Ly$\alpha$), the Ly$\alpha$ escape fraction $f_{\rm esc}$(Ly$\alpha$) increases with increasing EW(Ly$\alpha$). However, no such dependence is found at high EW(Ly$\alpha$) $\ga$ 60Å for four of our galaxies and three confirmed LyC leakers with the highest EW(Ly$\alpha$). One possible explanation for that behavior has been proposed by @SM19. They have shown that the EW(Ly$\alpha$) – $f_{\rm esc}$(Ly$\alpha$) relation flattens considerably in the presence of dust absorption and is nearly independent of EW(Ly$\alpha$), given a varying ionizing photon production efficiency $\xi_{\rm ion}$. In particular, our data, in the flat part of the diagram at EW(Ly$\alpha$) $\ga$ 150Å, can be reproduced adopting $E(B-V)$ $\sim$ 0.2 mag, corresponding to $C$(H$\beta$) $\sim$ 0.3, given that log $\xi_{\rm ion}$ increases from $\sim$ 25.0 to $\sim$ 25.7 with increasing EW(Ly$\alpha$) (solid line in Fig. \[fig9\]b). This value of $C$(H$\beta$) is somewhat higher than the values derived from the SDSS spectra (Table \[tab5\]), but is consistent with the values obtained from the high signal-to-noise ratio LBT spectra for J0159$+$0751, J1032$+$4919, J1205$+$4551 and J1355$+$4651 [@I17]. Another indirect indicator of escaping radiation is the velocity separation between Ly$\alpha$ peaks $V_{\rm sep}$. @I18b have found a tight correlation between $f_{\rm esc}$(LyC) and $V_{\rm sep}$. Fig. \[fig9\]c shows a possible correlation between the peak separation $V_{\rm sep}$ and the Ly$\alpha$ escape fraction $f_{\rm esc}$(Ly$\alpha$), described by the maximum likelihood relation (solid line in Fig. \[fig9\]c): $$f_{\rm esc}({\rm Ly}\alpha)=6.56\times 10^{-7} V_{\rm sep}^2 -1.25\times 10^{-3}V_{\rm sep}+0.607. \label{fesc1}$$ The large scatter of the data around the relation found between an integrated property of Ly$\alpha$ ($f_{\rm esc}$(Ly$\alpha$)) and a characteristic of the Ly$\alpha$ profile ($V_{\rm sep}$) is probably to be expected, since several physical properties, such as dust content, H [i]{} column density, H [i]{} kinematics and geometry affect the Ly$\alpha$ radiative transfer [see e.g. @S11; @V15]. Finally, we consider whether He [i]{} emission lines in the optical range can be indicators of Ly$\alpha$ emission. @I17 have argued that He [i]{} emission line ratios are promising diagnostics because some of these lines can be optically thick, indicating a high column density of the neutral gas. The He [i]{} $\lambda$3889Å emission line is most sensitive to this effect. This line is blended with the hydrogen H8 $\lambda$3889Å emission line, and its intensity can be obtained by subtracting the H8 intensity equal to 0.107$\times$$I$(H$\beta$). The recombination intensity of the He [i]{} $\lambda$3889Å emission line is $\sim$ 0.1$\times$$I$(H$\beta$). This line can be enhanced by collisions with electrons but weakened if its optical depth is high. Therefore, the condition $I$(He [i]{} $\lambda$3889)/$I$(H$\beta$) $<$ 0.1, corresponding to $I$(H8 + He [i]{} $\lambda$3889)/$I$(H$\beta$) $<$ 0.2, would be an indication of high optical depth and high $N$(H [i]{}). It is seen in Table \[taba1\] that $I$(H8 + He [i]{} $\lambda$3889)/$I$(H$\beta$) is considerably lower than 0.2 in only two galaxies, J0926$+$4504 and J1032$+$4919. Both of these show broad Ly$\alpha$ absorption line in their spectra (Fig. \[fig6\]d,e), indicating high $N$(H [i]{}). For the remaining galaxies, this technique predicts lower $N$(H [i]{}) and thus stronger Ly$\alpha$ in emission. The technique fails for only one galaxy, J0007$+$0226, which shows Ly$\alpha$ absorption in its spectrum (Fig. \[fig6\]a), but has $I$(H8 + He [i]{} $\lambda$3889)/$I$(H$\beta$) $\sim$0.2. Thus we conclude that the He [i]{} $\lambda$3889Å emission line is generally a good indicator of $N$(H [i]{}), and hence of Ly$\alpha$ emission. Conclusions {#summary} =========== We present here new [*HST*]{}/COS observations of eight low-redshift ($z$ $<$ 0.07) compact star-forming galaxies (SFG) with extremely high O$_{32}$ in the range $\sim$ 22 – 39. All studied objects are compact low-mass (log ($M_\star$/M$_\odot$) = 5.8 – 8.6) and low-metallicity (12$+$log(O/H)= 7.43 – 7.82) galaxies with strong nebular emission lines in their spectra (EW(H$\beta$) = 258 - 483Å), indicating very young starburst ages of 0.5 – 3.3 Myr. The Ne/O, S/O and Ar/O abundance ratios in our galaxies are similar to the values for the bulk of compact SDSS SFGs. On the other hand, similarly to confirmed LyC leakers, the N/O abundance ratios in our galaxies are higher than those of the most compact SDSS SFGs. We also study the Ly$\alpha$ emission and indirect indicators of the escaping Ly$\alpha$ and Lyman continuum (LyC) radiation of these SFGs. Our main results are summarized as follows: 1\. A strong Ly$\alpha$ emission line with two peaks was observed in the spectra of five galaxies, while a Ly$\alpha$ emission line with a low equivalent width on top of a broad Ly$\alpha$ absorption profile is present in the remaining three galaxies. Using the damped wings of these absorption profiles, we derive neutral hydrogen column densities $N$(H [i]{}) in the range (1 – 3)$\times$10$^{21}$ cm$^{-2}$. 2\. We discuss various indirect indicators of escaping Ly$\alpha$ and ionizing radiation, such as the O$_{32}$ ratio, EW(Ly$\alpha$) and the velocity separation between Ly$\alpha$ emission line peaks $V_{\rm sep}$, assuming that the strength of the Ly$\alpha$ emission line is a measure of LyC leakage. We found that there is no correlation between O$_{32}$ and the Ly$\alpha$ escape fraction $f_{\rm esc}$(Ly$\alpha$). The dependence of $f_{\rm esc}$(Ly$\alpha$) on EW(Ly$\alpha$) is such that at low EW(Ly$\alpha$) $\la$ 100Å, there is a linear increase of $f_{\rm esc}$(Ly$\alpha$), while at high EW(Ly$\alpha$) $>$ 150Å, $f_{\rm esc}$(Ly$\alpha$) is nearly constant with a value $\sim$ 0.25. This behavior may be explained by dust absorption. We find a trend of increasing of $f_{\rm esc}$(Ly$\alpha$) with decreasing of $V_{\rm sep}$. However, even galaxies showing double-peaked Ly$\alpha$ profiles exhibit a large scatter between the Ly$\alpha$ escape fraction and the separation of their peaks $V_{\rm sep}$. The latter quantity has been shown to correlate more strongly with the LyC escape fraction [@I18b]. 3\. Bright compact star-forming regions are seen in the COS near ultraviolet (NUV) acquisition images. The surface brightness profile at the outskirts can be approximated by an exponential disc profile, with a scale length of $\sim$ 0.09 – 0.48 kpc. These scale lengths are several times lower than those of confirmed LyC leakers and are among the lowest ones found for local blue compact dwarf galaxies. The global properties of the selected galaxies are very similar to those of the lowest-mass high-$z$ galaxies. They are thus ideal nearby laboratories for investigating the mechanisms responsible for the escape of Ly$\alpha$ and ionizing radiation from galaxies during the epoch of the reionization of the Universe. Acknowledgements {#acknowledgements .unnumbered} ================ We thank the anonymous referee for valuable comments. These results are based on observations made with the NASA/ESA [*Hubble Space Telescope*]{}, obtained from the data archive at the Space Telescope Science Institute. STScI is operated by the Association of Universities for Research in Astronomy, Inc. under NASA contract NAS 5-26555. Support for this work was provided by NASA through grant number HST-GO-15136.002-A from the Space Telescope Science Institute, which is operated by AURA, Inc., under NASA contract NAS 5-26555. Y.I.I. and N.G.G. acknowledge support from the National Academy of Sciences of Ukraine (Project No. 0116U003191) and by its Program of Fundamental Research of the Department of Physics and Astronomy (Project No. 0117U000240) of the National Academy of Sciences of Ukraine. G.W. has been supported by the Deutsches Zentrum für Luft- und Raumfahrt (DLR) through grant number 50OR1720. I.O. acknowledges grants GACR 14-20666P and 17-06217Y of the Czech National Foundation. Funding for the Sloan Digital Sky Survey IV has been provided by the Alfred P. Sloan Foundation, the U.S. Department of Energy Office of Science, and the Participating Institutions. SDSS-IV acknowledges support and resources from the Center for High-Performance Computing at the University of Utah. The SDSS web site is www.sdss.org. SDSS-IV is managed by the Astrophysical Research Consortium for the Participating Institutions of the SDSS Collaboration. GALEX is a NASA mission managed by the Jet Propulsion Laboratory. This publication makes use of data products from the Wide-field Infrared Survey Explorer, which is a joint project of the University of California, Los Angeles, and the Jet Propulsion Laboratory/California Institute of Technology, funded by the National Aeronautics and Space AdministrationGALEX is a NASA mission managed by the Jet Propulsion Laboratory. This research has made use of the NASA/IPAC Extragalactic Database (NED) which is operated by the Jet Propulsion Laboratory, California Institute of Technology, under contract with the National Aeronautics and Space Administration. Emission-line fluxes in SDSS spectra and element abundances =========================================================== \[lastpage\] [^1]: [iraf]{} is distributed by the National Optical Astronomy Observatories, which are operated by the Association of Universities for Research in Astronomy, Inc., under cooperative agreement with the National Science Foundation. [^2]: [stsdas]{} is a product of the Space Telescope Science Institute, which is operated by AURA for NASA.
{ "pile_set_name": "ArXiv" }
Blogging about international AML/CFT standards and implementation Welcome to the FATF Watch blog Some time ago (2009 to be more precise), we at John Howell & Co Ltd set up a website called FATF Watch. We offered news and analysis of AML/CFT matters around the world, focusing on developments and implementation of the international standards set by the FATF (Financial Action Task Force). At the time, it was difficult to find such information on official websites – our country pages offered valuable resources for those having to consider country risk and we highlighted the useful information hidden on FATF and FSRB (FATF Style Regional Bodies) websites and deep in long and often impenetrable Mutual Evaluation Reports. We provided this service alongside our consultancy business. Having been trailblazers, we found that not only did the ‘official’ side smarten up their act to provide much better information, but also that specialist publishers began to offer similar news services. We took the decision to focus on our core business. We have now decided to launch this blog. These are interesting times for the AML/CFT community. The revision of the FATF Recommendations, the increasing focus on effectiveness in implementation and the introduction of the risk based approach bring new challenges, which deserve and need debate. This blog will be our voice in that debate, as FATF watchers for many years, with frequently strongly held opinions and (hopefully) interesting and useful perspectives. We hope to relaunch FATF Watch itself in the near future, to provide a platform for useful information, white papers and more. Watch this space!
{ "pile_set_name": "Pile-CC" }
982 F.2d 529 NOTICE: Although citation of unpublished opinions remains unfavored, unpublished opinions may now be cited if the opinion has persuasive value on a material issue, and a copy is attached to the citing document or, if cited in oral argument, copies are furnished to the Court and all parties. See General Order of November 29, 1993, suspending 10th Cir. Rule 36.3 until December 31, 1995, or further order. Jimmy PHILLIPS, aka Isa Abd'allah Ramadan Shabazz,Petitioner-Appellant,v.Stephen KAISER, Respondent-Appellee. No. 92-6172. United States Court of Appeals, Tenth Circuit. Dec. 8, 1992. Before LOGAN and EBEL, Circuit Judges, and BARRETT, Senior Circuit Judge. ORDER AND JUDGMENT* LOGAN, Circuit Judge. 1 This matter is before us on appellant Jimmy Phillips' (aka Isa Abd'allah Ramadan Shabazz) motion for leave to proceed on appeal without prepayment of costs or fees and application for a certificate of probable cause. Appellant seeks review of the district court's denial of relief from that court's earlier judgment which rejected appellant's claims. The earlier judgment has previously been before this court on appellant's similar application. We denied relief by order entered June 1, 1989. Phillips v. Kaiser, No. 89-6082 (10th Cir.). 2 We have examined the district court's order of April 30, 1992, and are satisfied that it analyzed the matter correctly and properly denied relief. Appellant can make no rational argument on law or facts in support of the issues raised on appeal. See 28 U.S.C. § 1915(a); Coppedge v. United States, 369 U.S. 438 (1962). He can make no sufficient showing of a federal right necessary for the issuance of a certificate of probable cause under 28 U.S.C. § 2255. We therefore deny the motion for leave to proceed on appeal without prepayment of costs and fees and the application for a certificate of probable cause. The appeal is dismissed. 3 The mandate shall issue forthwith. * This order and judgment has no precedential value and shall not be cited, or used by any court within the Tenth Circuit, except for purposes of establishing the doctrines of the law of the case, res judicata, or collateral estoppel. 10th Cir.R. 36.3
{ "pile_set_name": "FreeLaw" }
A Blog of Personal Essays and Reflections on Grammar and Writing Do Religious Differences Matter? I met a congenial Quaker at a party. I didn’t know anybody else at the party except the hosts, and I always feel a bit awkward at parties, so I was happy to have the friendly Quaker to talk to. I can’t remember how his being a Quaker came up. Once it did, though, we began comparing religious traditions. A Quaker service lasts about an hour, and for the most part nobody says anything unless moved by the spirit, which often doesn’t happen. A Jewish service—at least at my synagogue—lasts about three hours, and nobody ever shuts up. There are a couple of silent prayers, but they don’t last very long. Quakers are Christians and pacifists. Jews are, well, Jews, and don’t have a pacifist tradition. The rest of our conversation covered personal background, travel stories, and politics. Our backgrounds and political judgements are remarkably similar. We had both been leftists in our youth and remain left of centre as adults. Both of us at some point had travelled to the former Soviet Union and to China. We were both happy to see Stephen Harper gone, although we were disappointed that the NDP hadn’t done better. We were both appalled by Donald Trump and the entire Republican field of candidates in the American presidential race, although the Quaker has no American connection, while I’m an ex-pat American. How can two people of such disparate religious traditions have so much in common and share so many political and social values? Could it be because religious doctrine and religious differences are no longer taken seriously, at least by a solid majority of religious adherents? It may be news to Richard Dawkins, but there are many reasons for religious adherence that have nothing to do with truth claims or religious conviction. In our liberal, secular society, whether one attends a church, a synagogue, or a mosque has more to do with family background or liturgical taste than is does with worldview. And if for most, religion provides little certainty about anything, it does provide community. Even so-called evangelical and fundamentalist Christians more or less share the same secular morality as the rest of us. To be sure, they may have a different moral perspective on abortion and gay marriage, but for the most part they aren’t adhering to a moral code derived from the Bible, which, among other things, sanctions slavery and genocide. Few have responded to Jesus’ call to give everything they own to the poor. Most—there were some at the party— happily socialize with non-believers, and if they think we’re all going to Hell, they keep it to themselves. These days one can encounter evangelicals who are left of centre, especially on the environment. Many Catholics and mainstream Protestants are politically progressive. Others embrace conservative ideologies that have little or nothing to do with Christian values. Jerry Falwell Jr., president of Liberty University, an evangelical Christian school, has endorsed Donald Trump, hardly a committed Christian. Republican Paul Ryan, the devout Catholic Speaker of the House, is a self-described follower of Ayn Rand, a convinced atheist who promoted a philosophy based on the notion that selfishness is a virtue. Of course there are fundamentalist Christians, devout Muslims, and ultra-Orthodox Jews whose worldviews and codes of morality are the antitheses of the secular, but they are small minorities who still take religion and religious differences very seriously. The rest of us can find so much common ground because we just don’t.
{ "pile_set_name": "Pile-CC" }
object Test { case class C(s: String) object C { def factory(): C = { val s = "hey!" wire[C] } } lazy val c: C = wireWith(C.factory _) } require(Test.c.s == "hey!")
{ "pile_set_name": "Github" }
{ "pile_set_name": "PubMed Central" }
He is Risen! (He is risen indeed!) This morning we celebrate the ressurection of the Lord, who suffered, died, was buried, and then on the third day rose again–and all for us! This morning, our whole team gathered at 6 am, walked to the top of a big hill, and had a time of worship, Scripture reading, and prayer. We all prayed that there would be many here in Funehiki that would come to know the good news of the gospel, and could experience with us the joy of Easter morning. May God bless your hearts with joyful confidence in the salvation that Christ has opened for all of us.
{ "pile_set_name": "Pile-CC" }
John Fielden John Fielden (17 January 1784 – 29 May 1849) was a British industrialist and Radical Member of Parliament for Oldham (1832–1847). He entered Parliament to support William Cobbett, whose election as fellow-MP for Oldham he helped to bring about. Like Cobbett, but unlike many other Radicals, he saw Radicalism as having little more in common with Whiggism than with Toryism: in the Commons he sat with the Whigs but frequently did not vote with them. Whigs and the more orthodox Whig-Radicals, therefore, thought the name of one of the machines used in his cotton-spinning business, "the self-acting mule," a highly appropriate soubriquet. Having started work in his father's cotton mill when little more than ten, he was a firm and generous supporter of the factory reform movement. He also urged repeal of the New Poor Law and pressed for action to be taken to alleviate the 'distress of the country' (in particular the plight of hand-loom weavers), but found little support in Parliament on these issues. Despairing that the concerns of the poor would never be given adequate attention by a 'Ten-Pound Parliament' (elected on the 1832 franchise), he became a 'moral force' Chartist. On the failure of the Chartist National Petition he argued for the movement to organise further petitions; when this advice was rejected he ceased to appear at Chartist events: whilst supporting the aims of Chartism, he concentrated on single issues, striving to attract wider support for reform (including those who would be deterred by any linkage to Chartism or its full agenda). In 1847 he introduced and piloted through the Commons the Ten Hours Act, limiting the hours of work of women and children in textile mills. "Prompted solely by humanity and a sense of justice, he spent much valuable time, much earnest labour, and much of his pecuniary means, in procuring an act of parliament for shortening the hours of labour of women and children in factories.". Family firm John Fielden was the third son of Joshua Fielden (1749–1811) a Quaker who about the time of John's birth set up as a cotton spinner in Todmorden. Joshua started cotton spinning in a small way, but by his exertions and those of his sons Fielden Brothers grew to be one of the largest cotton manufacturers in England. According to William Cobbett in 1832 they were involved in spinning weaving and printing and employing over 2500 persons. Cobbett also stressed that the brothers were "famed for their goodness to every creature who is in their employ ...let others do what they may, these gentlemen have preferred a little profit, and even no profit, to great gains from half starvation of the people from whose labour they derive those gains" John began working in the family mill "when I was little more than ten years old" and was, therefore, able in later life to speak from personal experience of the unsuitability for children of that age of even a ten-hour day. When slightly older, he assisted his father with the purchase of raw materials and sale of finished goods – attending market in Manchester involved a round trip of 40 miles on foot, and a twenty-hour day. After the death of his father in 1811, and of his eldest brother Samuel in 1822, John was responsible for purchasing and sales, his brother Thomas looked after a permanent warehouse Fieldens set up in Manchester, James looked after production, and the eldest surviving brother (Joshua) was responsible for machinery. Whilst Todmorden was at some distance from ports and home markets, the firm's main site at Waterside lay in a narrow valley used first by the Rochdale Canal and then by the Manchester and Leeds Railway (which the Fieldens helped establish, John being a member of the company's provisional committee) as part of an indirect but relatively low-level route between Manchester and Leeds, and the firms' expansion was helped by the consequent improvement in communications. In addition to the establishments owned by Fielden Brothers in and around Todmorden, individual members of the family also owned mills in their own right; for example in 1844 Robinwood Mill was bought (largely built, but unglazed and without motive power) by John Fielden - however he did not operate it as a separate concern, but let it to the family firm. In 1846, the firm was said to be processing 200,000 pounds of cotton per week; thought then to be the largest weekly consumption of cotton of any firm in the world. A correspondent for the Morning Post reported that within 2 miles of Todmorden there were thirty-three mills, eight of them operated by Fielden Brothers: Owing to the excellent example of the Messrs. Fielden, who employ upwards of 2,000 hands, the factories heres are much better regulated, and greater regard paid to the health and morals of the workpeople than in most other places which I have visited. This firm have always worked their mills less time than that sanctioned by the Legislature, and have done their utmost to sustain the wages and mitigate the toil of their workpeople. Whenever a man meets with an accident they give him half wages during his illness, and pay for medical aid. They also change to less laborious and more healthy employment those who have become incapacitated for great exertion. Private life In 1811, he married Ann Grindrod of Rochdale, and bought and converted the "Coach and Horses" public house (opposite the Fieldens' Waterside Mill) as a family home named Dawson Weir. They had 7 children: Jane (1814), Samuel (1816), Mary (1817), Ann (1819), John (1822), Joshua (1827) and Ellen (1829). Ann died in 1831; John remarried Elizabeth Dearden of Halifax in 1834; she survived him, dying in 1851. Fielden was a deeply religious man but always nonconformist in his affiliations. Born into a Quaker family, by the age of seventeen he was a teacher in a Methodist Sunday School. When the Methodist Unitarians (later simply Unitarians) seceded from the Methodists, John went with them. A Unitarian Chapel was built in Bank Street, Todmorden c 1823 but struggled financially. In 1828, John bought the Chapel, paid off its debts and supported its running costs throughout his life. He taught in the Sunday School for many years, eventually becoming its Superintendent. He founded several other Sunday Schools (and to allow genuine compliance with factory legislation requirements on the education of mill-children there was a school in the Fielden mill in Todmorden). He is buried in the small burial ground of the chapel (which is now flats). Politics Although their father had been a Tory, John and his brothers were Radicals, John in particular a follower of William Cobbett. The brothers supported in principle, and in practice (by donations from the family firm) both Parliamentary Reform, and factory reform ( including Michael Thomas Sadler’s Ten-Hour Bill ) Parliamentary Reform John was involved in Reform Bill agitation in Manchester. He was a member of the deputation which carried to London a petition calling upon the Commons to refuse to vote supply until the Reform Bill was passed. To resolve differences between local Radical and Whig supporters of the Bill he subsequently drafted - and at a great reform meeting moved adoption of - an address to the King declaring a preference for universal manhood suffrage but expressing willingness to settle for Lord Grey’s Reform Bill. It being intended to form a Manchester Reform Association a sub-committee was set up to draft rules and a statement of objects: Fielden was a member of the sub-committee and responsible for the draft produced. On passage of the Reform Act, Fielden Brothers gave a dinner for their entire workforce…" Two thousand pounds weight of beef of the choicest cuts… between three and four hundred puddings weighing 7 or 8 lbs each, and a proportionate quantity of other dishes, bread and vegetables. There were 24 barrels or 3456 quarts of good brown stout Messrs. Fieldens… assisted at the tables. After the workpeople had dined, nearly 2000 persons not connected with the works partook of the remainder of the repast." Election to Parliament As early as July 1831, hoping the Reform Bill would soon be passed, the Manchester Times (a Radical organ) had turned its thoughts to who should be Radical candidates for Manchester and other nearby newly enfranchised boroughs, asking "Can the people of Rochdale send a better representative than their neighbour Mr John Fielden?". For Manchester itself, it thought that only a very moderate Radical would stand a chance of election As for William Cobbett he should not seek election: he would be wasted in Parliament; he was a better speaker than a debater, and a better writer than either. Nonetheless, an election committee for Cobbett was formed in Manchester (John’s brother Thomas was chairman ) and invited Cobbett to a fund-raising dinner in his honour. Fielden was persuaded (against his objection that there were others better suited for the task) to take the chair for the meeting. His speech of welcome and introduction for Cobbett showed him to be a close adherent to Cobbett’s views. Cobbett thought it an able speech, said as much in his own speech, and printed it two weeks running in his Weekly Political Register. (The Manchester Guardian criticised his views on banking and paper money; he responded in a series of three letters, promptly published (together with his speech) as The Mischiefs and Iniquities of Paper Money.) Whilst preparations for Cobbett to stand for Manchester went ahead, Fielden decided to stand, not for Rochdale (which would elect only one MP), but for Oldham (which would elect two). He declared he would not wish to be an MP unless Cobbett had also been elected for Oldham or for some other place. Cobbett had high hopes of being elected for Manchester (failing that Preston) but allowed his name to go forward as the other Radical candidate for Oldham. "And is not the honour of being chosen by such a man as Mr John Fielden as his colleague… more than a reward for all that the hellish borough-mongers and their base and bloody press have been able to inflict upon me and upon my family?" Although in ill-health Fielden then devoted his energy, influence, and resources to securing the election of both himself and Cobbett for Oldham. Fielden and Cobbett were duly elected for Oldham, Fielden heading the poll. Cobbett came bottom of the poll in Manchester, with half the votes of the successful (Whig) candidates: he blamed this on the result of the Oldham election being known at an early stage of the Manchester poll. "Mr Cobbett’s ... political shadow" Fielden did not have a powerful voice, nor were his views congenial to more than a few MPs. Consequently, he found it difficult to command the House’s attention. : "it is not in my power to convey to you the difficulties which an unobtrusive member experiences in the discharge of his parliamentary duties - it must be seen to be believed - groaning, stamping, coughing, shuffling, in fact, a perfect cock-pit; and all this is experienced whilst statements are making as to the deprivations and sufferings of the poor, that would, or ought, to melt a heart of iron." However, he acted as a reliable second to Cobbett (who unfortunately largely bore out the Manchester Times's prognosis). In 1833 Cobbett sought to provoke debate on currency policy by moving a resolution to remove Sir Robert Peel from the Privy Council. "A motion more frivolous, more absurd, and ...more disreputable to its author, was never made within the walls of either house of parliament." Fielden loyally seconded the motion (in a long speech, quite inaudible in the reporters’ gallery because of the low tone in which he spoke and constant interruption). Cobbett and Fielden were tellers for the motion: only four other MPs voted for it: nearly 300 MPs voted against, then further voted to expunge it. The causes Cobbett took up included those close to Fielden's heart; 'the distress of the country' (Fielden was particularly concerned about Northern hand-loom weavers, rather than the agricultural labourers of the South with whose plight Cobbett was more familiar) and opposition to the New Poor Law. Fielden's support of Cobbett went beyond the purely Parliamentary: when Cobbett was on his deathbed in 1835, he was asked if he wished to draw up a will; he replied that he had made his arrangements, and "Mr Fielden knows all about it". At Cobbett’s funeral, Fielden was in the first coach of mourners (with Cobbett’s sons). Fielden later paid for a memorial tablet for Cobbett "The Curse of the Factory System" In 1833 Fielden supported Lord Ashley’s Ten-Hour Bill. Instead, Althorp’s Act (the 1833 Factory Act) was passed, Althorp commenting that if adult millworkers wanted to limit their hours of work they should do it themselves. Fielden joined with others to form a National Regeneration Society which intended to accumulate enough adherent millworkers to insist to mill-owners that adults as well as children should work no more than an eight-hour day . This led to a split with those factory reform leaders still pinning their hopes in securing a ten-hour act by legislation. A plan to coordinate presentation of demands to mill owners in spring 1834 came to nothing. It amounted to formation of a national trade union; this was difficult at the best of times (which 1834, the year of the conviction of the Tolpuddle Martyrs, was not) and the union was broken up by pre-emptive action by employers In 1835 he suggested that the government should set minimum piece-rates for hand-loom work. In response to hand-loom weavers doubting his sincerity and proposing instead other measures including a tax on power looms, Fielden concurred with the desirability of many of the other measures, but held that the best tax on machinery was to limit the hours it could be worked. In 1836 he opposed Poulet Thomson’s Bill, speaking against it in Parliament and producing a pamphlet The Curse of the Factory System ("A Short Account of the Origin of Factory Cruelties; of the Attempts to Protect the Children by Law; of Their Present Sufferings; Our Duty Towards Them; Injustice of Mr Thomson's Bill; the Folly of the Political Economists; a Warning Against Sending the Children of the South into the Factories of the North") whose object he summarised as "to show that the workpeople have been and are cruelly treated; that they have not idly asked for protection, but that humanity and justice require it; that we shall do ourselves no harm by granting it to them; but always avowing, that I would cast manufactures to the winds, rather than see the workpeople enslaved, maimed, vitiated, and broken in constitution and in heart, as these pages will but too amply prove they now are." He spoke of his own experience as a factory child forty years previous, and showed why the work was as (or more) onerous for children in the 1830s as he had found it in the 1790s: As I have been personally and from an early age engaged in the operations connected with factory labour; that is to say, for about 40 years, a short account of my own experience may not be useless in this place, as it is this experience which teaches me to scoff at the representations of those who speak of the labour of factories as " very light," and "so easy, as to require no muscular exertion." I well remember being set to work in my father's mill when I was little more than ten years old; my associates, too, in the labour and in recreation are fresh in my memory. Only a few of them are now alive; some dying very young, others living to become men and women; but many of those who lived have died off before they had attained the age of fifty years, having the appearance of being much older, a premature appearance of age which I verily believe was caused by the nature of the employment in which they had been brought up. For several years after I began to work in the mill, the hours of labour at our works did not exceed ten in the day, winter and summer, and even with the labour of those hours, I shall never forget the fatigue I often felt before the day ended, and the anxiety of us all to be relieved from the unvarying and irksome toil we had gone through before we could obtain relief by such play and amusements as we resorted to when liberated from our work. I allude to this fact, because it is not uncommon for persons to infer, that, because the children who work in factories are seen to play like other children when they have time to do so, the labour is, therefore, light, and does not fatigue them. The reverse of this conclusion I know to be the truth. I know the effect which ten hours' labour had upon myself; I who had the attention of parents better able than those of my companions to allow me extraordinary occasional indulgence. And he knows very little of human nature who does not know, that, to a child, diversion is so essential, that it will undergo, even exhaustion in its amusements. I protest, therefore, against the reasoning, that, because a child is not brought so low in spirit as to be incapable of enjoying the diversions of a child, it is not worked to the utmost that its feeble frame and constitution will bear. I well know, too, from my own experience, that the labour now undergone in the factories is much greater than it used to be, owing to the greater attention and activity required by the greatly-increased speed which is given to the machinery that the children have to attend to, when we compare it with what it was 30 to 40 years ago; and, therefore, I fully concur with the government commissioners, that a restriction to ten hours per day, is not a sufficient protection to children. The work at which I was employed in my boyhood, while it was limited to ten hours a day, was similar to the work that children have to do in the woollen mills of Yorkshire at the present time, with this difference, that wool is the manufacture in the Yorkshire mills to which I allude, and the manufacture that I was employed in was cotton, the mode of manufacturing which has been altogether changed since that period by the improvements made in machinery. These are facts which I mention, because the labour of the child in the woollen now, is what its labour in the cotton was then, the work being done on what are called "billies" and "jennies"; and I mention them, too, because the woollen manufacturers would have it believed that the work of children in woollen mills is still lighter than that in the cotton factories, and that children, much younger than those whose labour is now limited to eight hours a day, may without injury to their health, be worked 69 hours per week. Indeed, it is on this, that the Yorkshire mill-owners have petitioned the House of Commons to allow them to work children of eight years of age as many as 72 hours in the week, or 12 hours in the day ! The 'curse of the factory system' was not that the system existed, but that it had been left unregulated. Consequently, improvements in machinery allowed no improvement in hours and conditions for the workforce; instead there was a race to the bottom: Most of the masters are obliged to admit the excessive hours of labour imposed on children, and the ministers have done it in the most solemn manner; but they cannot interfere with the labour, the "free labour" of the adult, because that is against sound principle! According to their own showing, it is a choice of evils; but, contrary to reason, contrary to all acknowledged principle and to universal practice, they would choose the greater: they would overwork the child, though nature forbids it, rather than shorten the labour of the adult, who is also overworked. In short, their "principle", their true and scarcely disguised "principle " is the principle of self against nature. Here, then, is the "curse" of our factory system: as improvements in machinery have gone on, the "avarice of masters" has prompted many to exact more labour from their hands than they were fitted by nature to perform, and those who have wished for the hours of labour to be less for all ages than the legislature would even yet sanction, have had no alternative but to conform more or less to the prevailing practice, or abandon the trade altogether New Poor Law Fielden had voted against the Poor Law Amendment Act of 1834 at every stage; he then opposed its implementation in Todmorden and in Oldham. He was the only MP present at the great Yorkshire Anti-Poor Law Meeting at Hartshead Moor in May 1837 (and spoke at that meeting.) In 1837-8 he was a member of a Commons committee taking evidence on the working of the New Poor Law; when the committee reported favourably Fielden complained that it had taken evidence chiefly from members of the Poor Law Commission and from Poor Law Guardians known to be supportive of the new regime and that his attempts to submit them to hostile questioning had been obstructed. In Parliament, he moved repeatedly for repeal of the 1834 Act: "so long as he had a seat in that House, he would by speech and vote resist a law which was based upon the false and wicked assertion that the labouring people of England, or any material part of them, were inclined to idleness and vice" but he was always defeated by overwhelming majorities, most MPs with misgivings about the administration of the New Poor Law thinking its complete repeal too drastic a step. In 1842, when a Poor Law Amendment Act was required to extend the life of the Poor Law Commission, Fielden repeatedly attempted to obstruct this by procedural means: "Mr. Fielden moved that the Chairman do leave the Chair. Sir R. Peel protested against the course which the hon. Member was pursuing. He hoped that hon. Members would not thus endanger one of the most important privileges of the House. The course now adopted was calculated to obstruct the progress of legislation, to bring the House into great discredit, and to impair their authority as a deliberative assembly" Fielden attempted to prevent the New Poor Law from being implemented in his area, threatening to close the family firm down unless the Guardians of the Todmorden Poor Law Union resigned. When they didn't the Fielden mills duly closed, throwing nearly 3,000 out of work. The Guardians stood firm, troops were moved into the area, and after a week Fieldens re-opened (paying their employees as normal for the week not worked) However, some townships refused to recognise the authority of the Guardians. and instructed (or intimidated) their 'overseer of the poor' to ignore the Guardians' instructions. Two constables were sent from Halifax to distrain the goods of an overseer fined for disobeying the Guardians. The constables were surrounded by a mob summoned from two of Fielden's mills (supplemented by navvies building the Manchester & Leeds Railway), roughly treated and made to promise never to return. The following week a mob again gathered in the belief that another attempt at distraint was to be made; when this did not happen, they attacked the houses of various guardians and supporters of the New Poor Law, causing damage put at over £1000. The Manchester Guardian thought it significant that a JP in residence (meaning Fielden) had made no effort to quell the riot, even though the rioters had marched past his front door. Fielden was not a magistrate; he had been nominated in 1836, but made no attempt to qualify as he would 'have to sit in judgement on men driven to crime by poverty' which the Government had refused to relieve; furthermore, he had not been in Todmorden on the day of the riot. The Guardian thought this to also be significant, but Fielden was never implicated in the riots, although he was ostentatious in his non-cooperation with attempts to identify and arrest ringleaders and in his attempts to get those arrested released on bail. Chartism Fielden concurred with the aims of Chartism, and throughout was a good friend to the movement and to its more moderate leaders. He refused, however, to be associated with anything going beyond 'moral force' (meetings and petitions). Consequently, he was actively associated with the Chartist movement in 1838-1839, seeing its National Petition as a more hopeful route to reform than his efforts in Parliament: "He was sick of this piecemeal labouring for the last six years to benefit the people. In all his attempts he had failed…" He was chairman of a monster Chartist meeting at Kersal Moor (Manchester racecourse) in September, at which he warned his hearers against being bought-off by piecemeal reforms. This culminated with his involvement in the presentation of the National Petition to Parliament. When the National Petition was rejected, Fielden advised that another petition should be produced, but this time with greater care to collect only valid signatures; no representative legislature could for long withstand repeated petitioning. His advice was rejected as being a slow and uncertain route to success, and the Chartists turned towards 'physical force' methods (a general strike, or the acquisition of arms with the inherent threat of their eventual use, rather than an imminent uprising). Fielden was opposed to such methods and severed all formal links with the movement. Henceforth, he attended only meetings for reform on a single issue, and opposed any introduction of other Chartist demands into the meeting resolutions: any association of a specific reform with the Charter would drive away non-Chartist sympathisers. Ten Hour Act Fielden was critical of many aspects of the operation of the 1833 Act. Amongst its inherent problems was that it defined "children" and "young people" by age, but did so before there was any state system for registration of births; consequently age had to be certified by examination and a subjective judgement by surgeons. To assist this, a factory inspector promulgated a regulation using height as an objective test. Fielden objected,; the height criterion – unreviewed by Parliament - undermined Parliament’s intentions – Fielden’s nine-year-old son Joshua was tall enough to be certified as thirteen. More generally, Fielden publicised cases in which magistrates were reluctant to convict millowners of breaches of the Act, and keen to award costs against those bringing unsuccessful prosecutions. He opposed attempts to weaken the Act and continued to press for further restriction of working hours. In Parliament, Lord Ashley was the principal advocate of a Ten-Hour Act; his vulnerability (and that of other benevolent Conservatives) to the accusation of muddle-headed interference in matters he did not understand was greatly reduced by the support given him by Fielden: " They might accuse... (Lord John Manners or Lord Ashley) ... with wild enthusiasm or measureless philanthropy, and with a want of that interest which a stable Government must feel for every class of the community. But they could not accuse the late Sir Robert Peel, or the present hon. Member for Oldham, with visionary views. Both in the one case and the other, the parties must have been deeply interested in the prosperity of the manufacturing body." argued a supporter of Ashley's Bill of 1846. In 1846, Lord Ashley introduced a Ten-Hour Bill . However, this came two days after Peel's abandonment of the Corn Laws: Ashley supported Peel's volte-face but although he was not pledged to his Dorsetshire constituents to support the Corn Laws, considered that it had been an understanding with them that he would. He, therefore, resigned from Parliament rather than vote against his personal views or the wishes of his constituents; later further clarifying the situation by saying that he would not contest the by-election brought about by his resignation. Fielden then took charge of Ashley's Factory Bill. The Bill proposed a one-year experiment with an eleven-hour day before moving to a ten-hour day: however some of the Bill's supporters appeared to envisage settling for an eleven-hour limit: when an opponent contrasted this with Fielden's position of 'Ten Hours and no compromise' Fielden denied that he had said anything about a compromise. There was considerable agitation in the country for a Ten-Hour Bill and more petitions were presented to Parliament supporting the 1846 Bill than for repeal of the Corn Laws; however the Bill was defeated at Second Reading 193-203. Fielden's advice to the Short Time Committees was that they should continue to press for ten hours, submit a Ten-Hour Bill again in the next session, and reject any eleven-hour compromise; other MPs associated with the movement (such as Charles Hindley) were more prepared to consider an eleven-hour compromise. To answer two arguments which opponents of the 1846 Bill had made much of, meetings (twenty-one in all) were held in most of the major textile towns of Northern England (generally addressed by one or more of Lord Ashley, Fielden or Oastler): all were well attended, and at each motions were passed to declare that what was sought was a ten-hour day (not an eleven-hour one) that a reduction from a twelve-hour day to a ten-hour day was sought, even if this meant there was a corresponding reduction in wages In January 1847, Fielden introduced much the same bill as Ashley's Bill of the previous year. The 1847 Bill passed its Second Reading by 195 votes to 87 and its Third Reading by 151 to 88. Representation of Oldham after Cobbett At the by-election at Oldham consequent upon Cobbett’s death, Fielden supported the candidature of John Morgan Cobbett (one of Cobbett’s sons). J.M. Cobbett (like his father) favoured reform of the Church of England, but not its disestablishment, and thus was not entirely satisfactory to Dissenting electors. Feargus O'Connor presented himself at the hustings as a more genuinely Radical candidate: he withdrew but not before alleging that Fielden had not been straightforward with O’Connor and had been determined to impose the younger Cobbett on the constituency. Cobbett lost narrowly to a local ‘Liberal Conservative’ for whom Hansard does not record any speeches in the two years he sat for Oldham. In the 1837 General Election a fellow-Radical (General Johnson) was elected alongside Fielden. When Johnson announced he would not stand in the 1847 general election William Johnson Fox, a noted anti-Corn Law orator came forward as a Radical replacement for Gen Johnson; Fielden said he would only stand again if J.M. Cobbett was the other Radical candidate. Four candidates stood at the election; three Radicals (Fox, Fielden, Cobbett), and a Tory (Duncuft). Many electors cast their two votes for Duncuft and Fox (not natural political allies); neither Fielden nor Cobbett were elected. Fielden thought his defeat to have been engineered by Manchester School laissez-faire liberals in revenge for his success in obtaining a Ten-Hour Act, others thought that he had brought it upon himself by his 'dictation' of the choice of candidate: other local Ten-Hour advocates, such as Joseph Brotherton at Salford had had no similar problem. Fielden's defeat was part of a more general collapse of the Oldham Radical political machine. Last Years By 1847, Fielden was in poor health. Soon after his defeat at Oldham, he retired from business and (officially) from politics, moving from Todmorden to Skeynes Park near Edenbridge, Kent . Skeynes was convenient for London, and when problems emerged with implementation of the Ten-Hour Act and its potential circumvention by adoption of a relay system Fielden became involved in repeated lobbying of the Prime Minister and Home Secretary. These continued exertions on behalf of the millworkers were said to have hastened his death in May 1849. Fielden's children consequently took a poor view of the Compromise Act of 1850 (which retroceded some of the gains of their father's Ten Hours Act in order to end the relay system), and of Lord Shaftesbury who had forced the Compromise Act upon the Ten-Hour movement, thus (in the Fieldens' eyes) betraying the cause for which their father had given everything for two decades. Children's lives Jane (1814) died 11 October 1846. Samuel ('Black Sam') (1816 - 1889): Principal partner in the family firm. On his death the Manchester Guardian noted that he was from ‘first to last a Radical Reformer’, but ‘was not and never desired to be "a public man"’. In conjunction with his brothers John and Joshua, he built and endowed the magnificent Todmorden Unitarian Church at a cost of about £45,000, and Todmorden Town Hall at even greater cost. (Both are now Grade I listed buildings). He had donated liberally to national, regional and local charities (including the National Lifeboat Institution and Owens College Manchester). He was a director of, and the largest shareholder in, the Lancashire and Yorkshire Railway and left an estate worth £1.1m net, roughly equivalent in purchasing power to £120m in 2011. Mary: Married (1851) John Morgan Cobbett who had twice stood unsuccessfully for Oldham. Cobbett was a barrister, a Sussex JP and in his later years chairman of Quarter Sessions for West Sussex. He served as MP for Oldham 1852-1865: outside Oldham he was generally taken to be sitting as a Liberal, despite having been elected in 1852 as the Radical half of a Radical-Tory alliance, and in 1857 whilst admitting to supporting Lord Palmerston being careful to note that the Liberal Chief Whip had no confidence in him. In 1865 he stood unsuccessfully in conjunction with a Conservative and was opposed by two avowed Liberals. He was again elected as one of the MPs for Oldham in 1872, and served until his death in 1877 as an acknowledged Conservative (but one calling for annual Parliaments and manhood suffrage). Ann: Married Henry Brocklehurst, son of John Brocklehurst, MP for Macclesfield. Both Ann and Henry died 1870; their two youngest children being effectively adopted by their uncle John Fielden of Grimston Park. One of the other children of the marriage( John Fielden Brocklehurst) was raised to the peerage as Lord Ranksborough in 1914. John: Chairman of the Todmorden Local Board, and a JP. Married twice; firstly a Unitarian Power Loom Weaver, secondly the daughter of an Anglican clergyman. An accident at a meeting of the Bedale Hunt in 1873 confined him to a wheelchair thereafter. Not a public man, but having bought Grimston Park an estate near Tadcaster served for a year as High Sheriff of Yorkshire and launched an orphaned Brocklehurst niece in Yorkshire county society. A Conservative and an Anglican in his later years. Joshua: Married Ellen Brocklehurst, a niece of John Brocklehurst. From 1868 to 1880 Conservative MP for Eastern Division of West Riding, arguing Conservatism was a better home than Gladstonian Liberalism for a Cobbettite Radical such as himself. Bought and moved to Nutfield Priory, near Reigate in the early 1870s. Briefly a director of the South Eastern Railway, resigning after objecting to the chairman's autocratic regime. Retired from Parliament because of ill health which caused a prolonged absence from Parliament in 1876-1877 and dogged him to his death in 1887, leading to him wintering in Cannes and cruising in his steam yacht Zingara for his health. As a result of this extravagant lifestyle his estate when he died was valued at only slightly over half a million pounds. Ellen: Married William Charge Booth of Oran Hall Catterick,; two daughters (1862, 1864); died 1864. Notes References External links Fielden family papers at John Rylands Library, Manchester (Fielden did not have a powerful voice, and therefore was frequently inaudible in the reporters' gallery. Consequently, his contributions sometimes are noted to be inaudible in newspaper reports and go unrecorded by Hansard - see the accounts of the 1833 Factory Bill Committee stage debate of 18 July 1833 given by the Morning Post (inaudible contribution by Fielden) and by Hansard (no contribution by Fielden recorded)) Category:1784 births Category:1849 deaths Category:Liberal Party (UK) MPs for English constituencies Category:People from Todmorden Category:UK MPs 1832–1835 Category:UK MPs 1835–1837 Category:UK MPs 1837–1841 Category:UK MPs 1841–1847 Category:British Quakers Category:English Unitarians Category:Politics of the Metropolitan Borough of Oldham Category:British reformers Category:British social reformers
{ "pile_set_name": "Wikipedia (en)" }
Här kan du läsa om fler förutsättningar för skattereduktion och hur du gör för att få reduktionen. Max 1 500 kronor i skattereduktion Skattereduktionen är 25 procent av gåvobeloppet och får högst vara 1 500 kronor per år. Det motsvarar gåvor på totalt 6 000 kronor per år. Har du givit gåvor för mindre än 2 000 kronor på ett år får du ingen skattereduktion. Om gåvan För att du ska kunna få skattereduktion måste det vara en penninggåva. Ändamålet du ger till ska vara att främja social hjälpverksamhet vetenskaplig forskning. Hjälpverksamheten kan vara ekonomisk eller bestå av stöd och omsorg till exempelvis personer med psykisk funktionsnedsättning, asylsökande eller socialt utsatta personer. Det är viktigt att du talar om för gåvomottagaren vilket ändamål gåvan ska användas till. Gör det senast vid gåvotillfället för att mottagaren ska kunna avgöra om gåvan ska ingå i underlaget för skattereduktion och därmed särskiljas från eventuella övriga gåvor. Ofta kan gåvomottagaren hjälpa dig med hur du ska göra. Gåvomottagaren ska lämna kontrolluppgift för gåvor som är skattereduktionsgrundande. Om du inte vill att kontrolluppgift ska lämnas kan du lämna gåvan anonymt, eller skänka pengar till ändamål som inte omfattas av reglerna för skattereduktion för gåva. Ett tredje alternativ är att du ger en gåva som inte uppgår till 200 kronor per gåvotillfälle. De gåvor som du ger kan lämnas till en eller till flera gåvomottagare. Varje enskild gåva måste vara minst 200 kronor för att den ska räknas med i underlaget för skattereduktion. Om du delar upp betalningen ses varje inbetalning som ett gåvotillfälle, även om betalningarna går till samma gåvomottagare. Gåvomottagaren måste vara godkänd För att du ska kunna få skattereduktion måste gåvomottagaren vara godkänd av Skatteverket när du ger gåvan. Det är din skyldighet att kontrollera detta vid varje gåvotillfälle. Det är organisationen som själv ansöker om att bli godkänd gåvomottagare. Ett beslut om godkännande gäller från den dag beslutet fattats och tre år efter detta år. Godkännandet kan sedan förnyas. Om ett godkännande återkallas på mottagarens begäran eller på Skatteverkets initiativ, gäller godkännandet gentemot dig som givare fram till beslutet om återkallelse. Det betyder att du som givare är skyddad om du vid gåvotillfället kontrollerat att givaren var godkänd. Ett godkännande för en stiftelse, ideell förening eller registrerat trossamfund innebär inte alltid att all den verksamhet som de bedriver omfattas av godkännandet. En gåvomottagare kan nämligen både ha verksamhet som omfattas av godkännandet och verksamhet som inte omfattas. Det är viktigt att du senast vid gåvotillfället talar om för gåvomottagaren vilket ändamål gåvan ska användas till. På så sätt kan mottagaren avgöra om gåvan ska ingå i underlaget för skattereduktion och därmed särskiljas från eventuella övriga gåvor. Vem kan få skattereduktion? Det är bara privatpersoner som har rätt till skattereduktion för gåvor. Du måste fylla 18 år senast den 31 december det år du ger gåvan. Dessutom krävs det att du betalar skatt för alla dina inkomster i Sverige, oavsett vilket land inkomsterna kommer ifrån. Du kan också få skattereduktion om du inte är bosatt i Sverige men betalar skatt för alla dina inkomster, och har begärt att få betala skatt enligt inkomstskattelagen i stället för att betala särskild inkomstskatt. I så fall måste dina sammanlagda inkomster, uteslutande eller så gott som uteslutande, förvärvats i Sverige. För att kunna få skattereduktionen krävs det också att du har tillräckligt med skatt att räkna av skattereduktionen mot. Skattereduktion räknas av mot kommunal och statlig skatt, statlig fastighetsskatt och kommunal fastighetsavgift efter en särskild turordning. Ett dödsbo kan få skattereduktion om den avlidne själv har lämnat gåvan före dödsfallet. Dödsbons gåvor eller gåvor som lämnas i ett testamente ger inte rätt till skattereduktion. Du kan också få skattereduktion om du ska ta upp värdet av en gåva som inkomst i din inkomstdeklaration. Värdet av en gåva kan till exempel vara om din arbetsgivare ger en gåva på minst 200 kronor till en godkänd gåvomottagare i ditt namn. Då ses det som en skattepliktig löneförmån. Omkostnader för en gåva får inte räknas med i gåvounderlaget. Hur får jag skattereduktionen? För att få skattereduktion ska du lämna ditt personnummer till gåvomottagaren. Är alla förutsättningar för att få skattereduktion uppfyllda, behöver du inte göra något mer. Både svenska och utländska godkända gåvomottagarna är nämligen skyldiga att lämna kontrolluppgifter till Skatteverket för de gåvor som de har tagit emot och som omfattas av dessa bestämmelser. Gåvomottagaren ska också lämna ett meddelande till dig som gåvogivare med samma uppgifter som finns i kontrolluppgiften. Kontrolluppgifterna ligger sedan till grund för det underlag för skattereduktion som blir förifyllt i din inkomstdeklaration. Vet gåvomottagaren ditt personnummer ska de lämna kontrolluppgift till Skatteverket. Du kan inte tacka nej till att en kontrolluppgift lämnas. Lämnar du däremot gåvan anonymt har mottagaren vare sig skyldighet eller möjlighet att lämna kontrolluppgift. Om du inte vill att en kontrolluppgift ska lämnas kan du alltså lämna gåvan anonymt, alternativt till ändamål som inte omfattas av reglerna för skattereduktion för gåva. Ett tredje alternativ är att du ger en gåva som inte uppgår till 200 kronor per gåvotillfälle. I din inkomstdeklaration kommer ett sammanlagt gåvobelopp mellan 2 000 kronor och 6 000 kronor att vara förifyllt. Varje gåvomottagares namn respektive mottaget gåvobelopp kommer att finnas angivet, förutsatt att gåvobeloppet är minst 200 kronor vid varje gåvotillfälle. Skattereduktionen beräknas utifrån dessa uppgifter. Begära rättelse Har en gåvomottagare inte lämnat någon kontrolluppgift eller lämnat en felaktig kontrolluppgift till Skatteverket kan du begära rättelse under Övriga upplysningar i din inkomstdeklaration. Skriv namnet på den godkända gåvomottagaren och det totala gåvobeloppet. Du behöver inte skicka med utdrag från ditt konto eller liknande när du deklarerar; vid en eventuell förfrågan från Skatteverket ska du kunna visa att du har haft utgift för gåvan. Under Övriga upplysningar kan du även begära att ta bort redan förifyllt underlag om du inte önskar skattereduktion för de gåvor som du har lämnat.
{ "pile_set_name": "OpenWebText2" }
Q: Usando function dentro de Select Tenho um select, dentro dele tenho uma função : SELECT VAL1, VAL2, ".funcao('VAL1', 'VAL2')." AS soma FROM Conta WHERE soma < 100 Estrutura da tabela CONTA -------------------- | ID | VAL1 | VAL2 | -------------------- | 1 | 10 | 50 | -------------------- | 2 | 50 | 80 | -------------------- | 3 | 30 | 70 | -------------------- Se eu usar a seguinte estrutura na função : function funcao($valor1, $valor2) { $retorno = $valor1 + $valor2; return $retorno; }; Consigo retornar o valor de cada coluna numa boa, e ainda obtenho o resultado! Dai tentei trabalhar mais a função e aplicar o valor dentro de uma string. Ex: function funcao($valor1, $valor2) { $res = "Os números a ser somados são ".$valor1." e ".$valor2.""; echo $res ; //Esse echo serve apenas de exemplo, pra mostrar o retorno da variável }; Só que isso eu não conseguir fazer! Quando apliquei a variável $valor1 ou $valor2, em vez de mostrar o valor referente a coluna, ele mostrou o próprio nome da coluna, ou seja, VAL1 e VAL2 Minha dúvida é É possível trabalhar com essas variáveis em uma função mais complexa de acordo com o exemplo citado, sem que se perca o valor da coluna? Já que quando eu tento fazer isso o valor fica como "VAL1" em vez de 10 ou 50. Em modo mais simples! Mesmo que eu queira simplesmente fazer um "echo $valor1" dentro da função, o resultado é "VAL1" em vez de "10" A: Veja a aplicação do seu código: query( "SELECT VAL1, VAL2, ".funcao('VAL1', 'VAL2')." AS soma FROM Conta WHERE soma < 100" ); Neste caso, o PHP vai juntar estas três coisas, pois você usou o operador de concatenação (.): "SELECT VAL1, VAL2, " funcao('VAL1', 'VAL2') " AS soma FROM Conta WHERE soma < 100" A primeira e a última são strings. A do meio, é uma chamada de função. Então, o PHP vai obter seu valor antes de concatenar, chamando sua função com duas strings, que são 'VAL1' e 'VAL2', resultando em zero, que é a soma das duas strings que você passou no seu exemplo, que não tem relação nenhuma com os valores do SELECT (que sequer aconteceu ainda). Então o resultado será esse: query( "SELECT VAL1, VAL2, 0 AS soma FROM Conta WHERE soma < 100" ); Só depois de concatenada a string no PHP, ela será enviada para o MySQL. No segundo exemplo a coisa fica mais evidente: function funcao($valor1, $valor2) { $res = "Os números a ser somados são ".$valor1." e ".$valor2.""; echo $res ; }; Cpomo não tem return na função, só echo, fica mais fácil de perceber que 'VAR1' e 'VAR2' são somente strings para o PHP, portanto saem na tela como foram enviadas. E mesmo que pusesse um return, a string final não seria um SQL válido. Solução Se você quer usar funções no lado do DB, precisa que as funções sejam as do SQL, e não do PHP. Exemplo: query( "SELECT VAL1, VAL2, VAL1+VAL2 AS soma FROM Conta WHERE soma < 100" ); Outro exemplo, com strings do lado do SQL: query( "SELECT VAL1, VAL2, CONCAT( "Resultado:", VAL1+VAL2, "rea ) AS soma FROM Conta" ); Outra possibilidade seria pegar todo o resultado em um array, e depois fazer um loop no PHP chamando sua função (desta vez em PHP). Isto poderia ser feito na hora de mostrar os valores na tela. Exemplo: while ($row = $result->fetch_row()) { echo $row['VAL1'].' somado com '.$row['VAL2'].' resulta em '.($row['VAL1']+$row['VAL2']); }
{ "pile_set_name": "StackExchange" }
Come 12th June, the world will be seeing the commencement of the world's biggest Sporting championship in the form Of the FIFA World Cup to be held in Brazil this year. Brazil being the host has gone out of the way in upgrading and developing its infrastructure so as to make it comfortable for the players and well as the audience to have the most enjoyable experience in the their country. There are many facts related to the Soccer World Cup that most people have no idea about. For instance, not many know that the trophy went missing for almost one week before the commencement of the 1966 World Cup.
{ "pile_set_name": "OpenWebText2" }
eHarvestSensors’ Latest Product the eQUICK Mobile USB Battery Charger Stores 2 Smartphone Charges in Just 15 Minutes and is Now Available on Kickstarter Share Article The eQUICK Mobile USB Battery Charger is intended for busy individuals and families, who are constantly running out of batteries on their portable devices and who want to quickly charge a large capacity battery pack without being hostage to an AC power outlet. In just a 15-minute drive you can store 2 smartphone charges (10Whr). "Everyone who suffers from the low batteries on their mobile devices will want the eQUICK Mobile USB Battery Charger," says Kevin Brehmer, CEO and Founder of eHarvestSensors. Las Vegas, NV (PRWEB)March 03, 2014 eHarvestSensors Inc, a start-up company in Las Vegas, NV that develops free energy products announces their latest product the eQUICK Mobile USB Battery Charger is available on Kickstarter. In slightly less than 1-hour drive you can store 8 smartphone charges or 1 tablet with a 40Whr battery, which is the size of some slim notebook batteries. The battery pack in the eQUICK Mobile USB Battery Charger will charge ~10-12X faster than those battery packs charged by today’s AC/USB charging adapters. Fast charge the battery pack from any automobile power outlet or from a 12V AC Adaptor. Solar charge, under full sun, the battery pack at rates similar to AC/USB chargers. The eQUICK Mobile USB Battery Charger will charge tablets at full speed from the USB 2A output and can charge multiple devices simultaneously using the Twin USB Power Splitter. The eQUICK Mobile USB Battery Charger is a great complement to eHarvestSensors' eQUICK Phone and Tablet Portable USB Solar Battery Chargers. Kickstarter investors will be the first to receive eHarvestSensors' eQUICK Mobile USB Battery Charger so sign up now http://www.kickstarter.com and tell your friends about this amazing product and make the eQUICK Mobile Battery Charger a product for everyone. "Everyone who suffers from the low batteries on their mobile devices will want the eQUICKTM Mobile USB Battery Charger," says Kevin Brehmer, CEO and Founder of eHarvestSensors. Founded in March 2012, eHarvestSensors was founded by Kevin Brehmer with the vision to provide products that can be powered from free energy sources by leveraging energy harvesting and energy scavenging technology.
{ "pile_set_name": "Pile-CC" }
Worcester back-rower and former England captain Pat Sanderson has announced his retirement after failing to recover from a serious shoulder injury. The 33-year-old suffered the injury during the Championship play-off clash with Bristol in March and has had to give up the fight to regain full fitness, just a matter of weeks before the Warriors make their return to the Aviva Premiership after securing promotion. "I don't feel ready to retire so this is clearly a sad time for me as I feel I have more to give," said Sanderson. "It is something that is still sinking in and it will take time for me to get used to the fact I won't be playing a game that has given me so much and has been so much more than just a job over the last two decades. "I have to look back at my career and look at all the wonderful memories. How privileged I have been to play the sport for so long and for some fantastic rugby clubs." Sanderson played 16 Tests for England, making his debut in the first Test against New Zealand on the 'Tour from hell' in 1998. He captained the side on the 2006 tour to Australia during Andy Robinson's tenure as head coach. On the club front he also represented Sale and Harlequins before moving to Worcester in 2004 and leading the team for six seasons, going on to make 156 appearances and passing his 200th Premiership career appearance during the 2009-10 season. "I want to say thank you to all the people that have helped me along the way, in particular Worcester Warriors and all the fans for their support and the staff and players I have worked with," Sanderson added. "Ultimately this is where my rugby heart will remain. "I will miss the environment and miss playing rugby, but I plan to keep a close relationship with Warriors." Head coach Richard Hill said: "Pat's reputation as a player throughout the game is outstanding and he has been a true leader at Sixways over the years. From my perspective, I was delighted last year that he took up the challenge of two up and coming players, in Jake Abbott and Matt Kvesic. It was a really good battle for the starting shirt and Pat proved himself yet again as the fittest person at the club. "When you consider what his body has been through, that was an outstanding achievement."
{ "pile_set_name": "Pile-CC" }
Salting out of chemicals in estuaries: implications for contaminant partitioning and modelling. Many neutral chemicals are salted out of aqueous solution via electrostriction and exhibit increased sorption with increasing concentration of dissolved salt. Salting out has significant implications for the reactivity, transport and fate of chemicals discharged to estuaries, but attempts to define or model the effect in such environments have been limited. This paper examines new and existing data on the sorption of neutral chemicals (specifically, a tetrachlorinated biphenyl, a phthalic acid ester, and neutral species of tributyltin) to estuarine suspended particles in order to evaluate the potential application and limitations of salting theory to estuarine chemical modelling. It is shown that the salinity dependence of sorption may be empirically modelled using a salting equation, but salting constants derived from data-fitting are often significantly greater than those derived by calculation or from conventional aqueous solubility studies. This suggests that the hydrophobicity of sediment organic matter is modified by interactions with dissolved seawater ions, and (or) chemical solubility is enhanced in river water via hydrophobic interactions with dissolved organic matter. In some estuaries, trace metals also appear to be salted out, suggesting that stable neutral complexes are formed between transition metals and a specific, but undefined pool of dissolved organic ligands. Despite successful empirical modelling of the effect in estuaries, predictive modelling of salting out is currently hampered by a lack of understanding or definition of the precise interactions between (i) neutral solute (or trace metal) and dissolved and sediment organic matter, and (ii) sediment organic matter and dissolved seawater ions.
{ "pile_set_name": "PubMed Abstracts" }
The association of early computed tomography scan findings and ambulation, self-care, and supervision needs at rehabilitation discharge and at 1 year after traumatic brain injury. To ascertain the association between early computed tomography (CT) scan findings and the need for assistance with ambulation, activities of daily living (ADLs), and supervision at rehabilitation discharge and at 1 year after traumatic brain injury (TBI). Prospective longitudinal design. Seventeen Traumatic Brain Injury Model Systems (TBIMS) centers. A total of 1,839 adults with TBI admitted to TBIMS trauma centers with subsequent acute rehabilitation; 849 were followed to 1 year after injury. Not applicable. Accumulated CT scan pathology from the first week after injury; FIM instrument and Disability Rating Scale at rehabilitation discharge and 1 year after injury; and Supervision Rating Scale at 1 year. Chi-square analyses showed that individuals with a midline shift greater than 5mm (lateral compression) were more likely to require the assistance of another person at discharge from acute rehabilitation with ambulation (29% vs 17%-19%, P=.02), toileting (47% vs 33%-38%, P=.05), lower-body dressing (57% vs 39%-46%, P=.015), bladder continence (32% vs 19%-23%, P=.03), and overall supervision (53% vs 44%, P=.0006) than patients with a midline shift of lesser degree. At 1 year, 57% of patients with a midline shift greater than 5mm on acute CT scans were being supervised in the home versus 30% to 39% of those with a shift of lesser degree (P=.003); there were no significant differences in the percentages of those needing assistance for ambulation or ADLs. The association of subdural hematoma with ambulation, self-care, and supervision needs was related to the degree of midline shift but not to the presence of subdural hematoma. Individuals with subcortical contusions were more likely to require assistance at rehabilitation discharge for ambulation (32% vs 18%, P<.0001), lower-body dressing (61% vs 44%), toileting (52% vs 35%), bladder continence (34% vs 22%), and overall supervision (61% vs 44%) than those without subcortical contusions (P<.0001). At 1 year, individuals with acute subcortical contusions were more likely to need assistance with ambulation (15% vs 8%, P=.004) and stair climbing (15% vs 9%, P=.03). Those with bilateral frontal (54% vs 46%, P=.009) or bilateral temporal (58% vs 46%, P=.03) contusions were more likely to need assistance with overall supervision at rehabilitation discharge, compared with those with unilateral or no cortical contusions. The presence of either a midline shift greater than 5mm or a subcortical contusion on acute CT scans is associated with a greater need of assistance with ambulation, ADLs, and global supervision at rehabilitation discharge. Patients with bilateral cortical contusions require more global supervision at rehabilitation discharge but no more supervision for ambulation and ADLs. These findings may aid health care professionals and potential caregivers in planning for rehabilitation and supervision needs after rehabilitation discharge and, to a lesser extent, at 1 year after TBI.
{ "pile_set_name": "PubMed Abstracts" }
Broken bones and apocalyptic destruction are as inseparable as preppers and bug-out-bags. So in this, our second post on fracture care (click here to review our first), we’ll be showing you everything you need to know about treating broken bones when medical help is not available. Treating Non-Union Fractures When a bone has been broken and its ends are still touching, it has a good chance of healing with a cast. If the broken ends are not aligned, or are not touching properly, the bone may not heal at all. This condition is called “non-union.” Some fractures may never heal if not reset to their proper positions. Bone setting is known as “reduction” in the medical world. Open reduction is something a surgeon does through an operation. A pin or metal fixation device is inserted, bringing the ends together, and fixing the bone in place. In the field, only closed reduction is possible. Here the bones are moved around by hand and worked back into correct alignment before the cast is applied. Doing this can be painful and challenging. It probably shouldn’t be entertained unless the broken bone has cut off the blood supply to the rest of the extremity. Some fractures will cause this, they’ll pinch or crowd off the blood supply distal to the break. Realigning the bone by moving the broken ends close to one another, should be attempted whenever this occurs (but only if medical help is not immediately available). Most people know how to feel for a radial pulse, if it’s present after a break, you’re probably okay. If not, try to set the bone with the intention of restoring the pulse. Treating Greenstick (Chalkstick) Fractures Greenstick fractures occur mostly in children and young adolescents. Their bones aren’t as brittle as adult’s, and the bone’s covering is thicker. The ends remain attached with this fracture, but are often offset at an angle. The bone covering, called periosteum, contains nerve endings and is responsible for the pain caused in fractures. Normally a physician will grasp both ends of the broken bone, and with a twist of the wrists, break the periosteal attachment so the bone doesn’t heal at an angle. This can be quite difficult to do without an X-ray and analgesia. It’s unlikely you would ever have to set a greenstick fracture, usually you’ll need an X-ray to know this type of break is present in the first place. Regardless of the fracture type, if you don’t feel comfortable setting it, then just cast the extremity when the swelling goes down (use a splint until then.) It may heal at an angle, but at least it will heal. Recent studies have shown that greenstick fractures that are not re-broken, may heal better in a removable splint than a cast. Take a few minutes and watch some YouTube videos on splinting, and casting with plaster. SAM Splint Application and other Splinting Techniques Casting is tricky in the field. You probably won’t have the plaster or fiberglass needed. Pre-manufactured aircasts and pneumatic splints are available, and take up little room. They work best if the patient can remain immobile. If you do cast, remember that before applying any constrictive casting, swelling in the extremity must be allowed to resolve, otherwise the cast will fit too loosely later. This video shows you a SAM splint technique known as the “sugar tong.” But you can also apply an aircast or plaster splint if that’s what you have available. SAM Splint Techniques and Modifications SAM Splints are some of the most versatile and space saving devices for treating orthopedic injuries. Sometimes you’ll need to immobilize two joints (remember you have to immobilize a joint above and below the fracture to ensure it heals correctly). So it makes sense to drop two into your med kit. Click the following link to learn more and / or purchase the SAM Splint kit which I and others most frequently recommend. Applying Improvised Splints – Magazines and Newspapers Magazines, even thick rolls of newspaper, can be used as a splint or makeshift cast. Reinforced with duct tape, they can be left on for the duration. In a psychiatric ward where I once worked, we had to cast (actually splint) patients with newspapers and tape, because they would often assault one another with their “fiber-glassed” arms. This worked well until a patient took off the newspaper and honed it into a cone, then stabbed a person in the abdomen with it. None of us saw that coming. But it’s something to keep in mind if you’re treating a person that’s a threat to themselves or someone else. If someone in your group has had a cast before, enlist their help with the technique. They will know how it should fit and feel, having worn one for two months themselves. If you do decide to buy casting material, purchase the old fashion plaster type. The fiberglass variety is difficult to remove, dries up in the package quickly, and is nearly impossible to remove without a special saw. Plaster casting comes apart when it gets wet, so it must be covered with plastic while bathing. But this can also work to your advantage. When the time comes to remove it, soak it instead of trying to saw it off. Children are in a constant and dynamic state of growth. Their fractures heal quickly, about twice the rate of an older adolescent or adult. For fractures of the arm, their casts should be removed after three or four weeks, while the adolescent and adult will require six to eight weeks before healing is complete. Treating Open Fractures Compound or open fractures occur when a sharp bone fragment has pierced through the skin. Fortunately these don’t occur often, as they usually require a tremendous amount of force. Often the real problem is in trying to figure out if the skin above the fracture has been broken by a sharp bone fragment, or by the trauma that caused the break. Without an X-ray it can be difficult. This is important because the natural impulse is to probe the wound to find out. Doing this is of little value. And almost guarantees the patient will get a deep infection of the bone. So keep the wound sterile, especially for the first 24-48 hours while it’s sealing over. My recommendation would be to use a SAM splint technique, and not cast a simple open fracture (where the skin is broken but the bone is not sticking out). Try to keep the extremity immobilized. If you put a cast over it, you won’t be able to see if the wound has become infected. Also put a sterile dressing over the wound, and do not take it off any more than necessary to look at it. Studies have shown this increases the rate at which the bone gets infected. The person can become septic and die before you even know what’s happening. To review our first post on fracture care Click Here. The above is adapted from: Click to order from Amazon.com -ThePrepperPages.com
{ "pile_set_name": "OpenWebText2" }
"No, honey, I'm fine." "Never better." "You just, uh-You told me to call after the jump, so here I am." "See?" "You worried for nothing." "Not sure when I'm gonna be home exactly." "Um, things are a little bit... up in the air right now." "Um, I'm just- I'm waitin' on the other guys." "N-Nothing." "Nothing." "Just, uh, still stoked from the jump is all." "Honey, don't worry." "Okay?" "I'm fine." "I'm just" "Peekaboo." "Christine, look." "Mommy's gone." "Peekaboo." " Peekaboo." " What are you doing?" "I don't understand." "She was lunging forward at six months, waving good-bye at seven months." "She routinely masters tasks... several months beyond her age group." "Ah, she's brilliant." "Very smart, just like her dad." "Mom." "Then she should be able to grasp... the conceptual elements of peekaboo before the others in day care." "Is that some kind of, like, “Baby Mensa” requirement or something?" "It demonstrates an infant's ability to understand object permanence." "Peekaboo." "Peekaboo!" "Morning." "How is everyone?" "Christine-she doesn't understand peekaboo." " Beg your pardon?" " Peekaboo." "Her cognitive recognition skills... belie her inability to engage in the game." "Peekaboo." "You're scarin' her." "Peekaboo." "Now you're both scaring' her." "Peekaboo." "Peekaboo." " Peekaboo." " Bones, it really is a ridiculous game." "I agree." "It's no hide-and-seek." "The Kazurinsky child loves peekaboo, and she's one month younger than Christine." "Kazurinsky?" "What does that have to do with anything?" "Booth." "Peekaboo." "Peekaboo." "Right, right." "Okay." "On our way." "So, Mommy and Daddy gotta go catch the bad guys." "Boom, boom, boom, boom, boom." "Okay, Uncle Sweets here- right here-this guy?" " He's gonna take you to day care." " Uncle Sweets?" "I love you even if you can't" "Peekaboo." "Okay." "Bones?" "Peekaboo." "Bones, okay." "Let's go." "Peekaboo." "Bones, she'll probably be playing poker when we get back." "I'll make sure she plays with the Kazurinsky kid." "Good idea." "Peekaboo." "Nothin'?" "Nothin'." "What the hell happened here?" "It's quite intriguing." "Well, you're not kidding." "Okay." "What the hell is that thing?" "I'm thinkin', uh, it's Mothman." "Of course you would, bug boy." "All right, Bones, just be careful on that thing." "Take it up." "So what have we got here?" "Blood on the passenger seat's been wiped clean." "More than just a cut finger, that's for sure." "Somebody drove a bleeding cocoon here and just took off?" " Yeah. it makes you long for a simple stabbing, doesn't it?" " Not really." "You know what I'm thinking?" "Reports indicate that Mothman is a flying creature... with a 10-foot wingspan and red eyes." "Those witnesses saw... what was most likely a sandhill crane, which can grow to be as tall as a man and has red feathers around its eyes." "How do you explain this, huh?" "We could be witnessing the birth of a new species." "Mothman?" "You are a scientist, Dr. Hodgins." "And these remains are undeniably human." "The prominent brow ridge and the slanted frontal bone... indicate the victim is a Caucasian male." "Yeah, it does look humany." "Sorry to disappoint you." "So perhaps you can find a reasonable, scientific explanation for the cocoon." "What are you gonna do, cut the seats open?" "Someone thought they wiped the blood away from the seat, but look at this." "Blood." "This is no accident." "You know what?" "The gear shifter's in neutral." "Somebody pushed this car down here." "The car slammed into the boulder, catapulted the whatever-that-is into the tree." "Whoever drove this car really went through a lot of trouble... to make it look like an accident, that's for sure." "Whoa!" "What are you doing?" "We have to cut into the cocoon to get to the remains." "We don't even know what we're dealing with yet." "I don't want to hear about Mothman anymore, Dr. Hodgins." "Something spun this cocoon around our victim, okay?" "I'm not saying it's Mothman... yet." "But, you know, until I determine exactly what did do it" "I won't disturb it." "I'll just cut a small opening... to see if I can determine cause of death or any other markers... that might be of immediate value." "Just be careful." "Oh, my God." "Dr. Hodgins, can you please get the bugs off my eyes?" " Yeah." " It's difficult to see." "Huh." "Could you, please?" "Right, yes." "I'm sorry." "I think there's a couple more." "Yeah." "Okay, hold on." "The crashed vehicle was registered to a James Sutton." "James Sutton?" "You know him?" "Yeah." "Well, adventurer, archaeologist, book writer" "Temple of Doom guy." "I read his work on the Mayan calendar and end of the world." " Guess what." " Didn't happen?" "Plus, he misspelled “Mayan” and “calendar, ” so" "Well, Sutton's physician provided us with his medical records." "Sutton suffered from chronic sinusitis." "Note the distinctive scalloping." "Now these are the X-rays from our victim's sinuses." "They match?" "Why is he wrapped in a shroud?" "Hyphantria cunea- webworms." "The larvae spin webs over the branches... to support them while they consume the foliage." "Ah." "And since Sutton was caught in the leaves, he was encased." "Yeah." "Can you estimate how long ago they started on him?" "Five days, give or take." "Dr. Hodgins?" "Yeah?" "How long is this gonna take?" "Yeah, it's gonna be a while." " Is there an alternative?" " Actually, there is." " Will I be sorry I asked?" " Oh." "I'm sorry I asked if I'll be sorry I asked." "Carry on." "So I was working up a psych profile on our victim using these." "He likes to read cheesy books." "No, no." "He likes to write 'em." "Stuff on dinosaurs, Atlantis, magnetic vortexes, the bride of Jesus." " Adventurous type, huh?" " Adventurous types get killed all the time." "Usually by jealous husbands or cannibals in New Guinea." "At what age does a kid master peekaboo?" "Okay." "Gear change." "Um, if you're asking about Christine" " Why the hesitation?" " Mmm. it's not about Christine." "Why is it when I ask you something, it's never about what I'm asking you about?" " It's about Dr. Brennan." " Ah, no, Sweets." "Listen to me." "She is very competitive- extraordinarily competitive." "If I were a parent, I would be a little concerned... about the kind of pressure that that places on a growing child." "Thank you." "You're welcome." "Um, okay." "So what Sutton does... is he writes these books, and then he-he tries to sell... the artifacts that are front and center, like dinosaur eggs, um, manuscripts, ancient tools and weapons, fossils, et cetera." " So competition is contagious?" " Yeah." "You asked." "I need a list of people... who bought this guy's bogus artifacts." "That's my cue to get the hell out of here." "Why are there still creepy-crawlies on our victim?" "Wait till you see this." "This is gonna be fun." "What is this?" " Crows." " I know what they are." "Why are they here?" "They happen to have a voracious appetite for webworms." "[ Cawiflg 1" "They're fun, right?" "Let me know when I can have my tissue." "Feed, my children." "Feed." "Okay, that's not funny when you're alone." "Yeah." "No, that was just creepy." "Okay." "All right." "what is she saying?" "She misunderstood." "She thought James died in motor vehicle accident." "I told her it was not an accident." "Our records show that you only came to the U.S. about a month ago." "Marina and James met in Chechnya Republic... in village outside of Grozny." "In the mountains." "Lake Kezenoi." "They got married in Grozny, then came back here to live." " How about you?" " I been in U.S. five years." "First on student visa." "Then I graduate, find work." "I live in Cleveland." "I came here when James is disappear." " So, uh, what do you do?" " Engineering." " This matters?" " It matters, yeah." "Did your husband say or do anything differently in the past few weeks?" "Uh, we brought things back with us from Russia." "James was, um" "Anxiety." "Also, um" " Excited." " It sounds like someone taking a big risk for a big reward." " What did he bring into the country?" " I don't know." "Old things." "[ Coughs 1" "My sister is very sad that the man she loved will never know his child." "This is the nicest storage facility I've ever seen." "Well, it's climate controlled, 24-hour security." "You store something here, you care about it." "Whatever Sutton brought back from Russia... must have been very valuable." "Well, let's go find out." "Okay." "It looks like he worked here, Booth." "Mmm." "Hey, Bones, bones." "Get it?" "What are you doin'?" " You don't know where that's been." " It's been- it's been in Russia." "It's human." "You can tell by licking the bone?" "Because of its porosity, human bone sticks to the tongue while animal bone doesn't." "No, no, no, no, no." "There's gotta be another test." "You don't lick bones." "Who licks bones?" "This place is starting to look like a serial killer's lair." "This must be the manifesto." "No." "These bones are not the victims of a serial killer." "Oh, what, you can tell that by licking them too?" "If this documentation is correct, these remains date back to Paleolithic times." "What do you mean, like dinosaur times?" "No, Booth." "Homo sap/ens and dinosaurs never coexisted, but" "These remains are thousands of years old." "Thousands?" "This is an amazing find." "According to the victim's notes, all the remains were found... at the same dig site near Lake Kezenoi in Chechnya." "So Dr. Sutton might not have been such a hack after all." "Just because he had them doesn't mean he knew their importance." "All of his notes are well organized." "I think he knew exactly how valuable they are." "Why are you even here, Dr. Edison?" "He's the resident anthropologist in charge of ancient remains." "I told him to take the remains back to his lab." "But this could be a very important find." "And since I have written extensively... on ancient remains and was recognized by the Cambridge Archaeological Society... for my work on the Lagar Velho finds, I should be examining these." "But we have a murder to solve, Dr. Brennan." "Crime, you." "Ancient history, me." "Remember?" "Yes." "But I would think you would want nothing more than my expertise." "I'm well aware you would think that." "But I don't want to take you from your murder." "Could you please pack these up and take these down to 407... in the anthropology suite, please?" "No, I don't believe this." "ltaughtyou." "And I'm very grateful." "I promise, you'll be thanked when I publish." "The tests on the remaining tissue... show no signs of contusions." "Excuse me?" "Our murder victim." "From this millennium." "Fine." "But I just hope that I'm available when Dr. Edison needs help." "Hey." "Hi." "I'm almost done." "Just removing the last of the particulates that I found." "Where's Dr. B.?" "Oh, in her office, trying to accept that Dr. Edison is in charge of the old bones." " Oh." " Yeah." "She'll be okay." " Yeah, that's not true." " I know." "She's very competitive." "You think?" "Clark has no idea what he's getting himself into." " Now, Dr. Brennan knows the boundaries." " You really believe that?" "Absolutely." "Not." "Can we get back to the murder?" "It's so much easier to deal with." "Right." "So, I found some particulates embedded in the scraping wound on the back of the ribs." "Any idea what it is?" "Well, no." "Dr. Brennan thought that there was evidence" "That animals might have gotten to the remains." "So maybe they left 'em." "I'll run it through the mass spec and" "Oh, man." "Clark says that he needs me." "I don't want to get in between him and Dr. Brennan." "And you also have particulates to analyze, don't you?" "Right." "Yes." "Good." "Thank you." "I am on it." "The last appointment that Sutton had before he died was with his publisher." "Hey, look, maybe she can give us something." "Dr. Edison is going to make a fool of himself without my help." "Right." "Okay." "Are you even listening to me?" " What?" " Oh, wow, okay." "I guess not." "Look, it's Clark's job." "It's Clark's job, not yours." "Just let it go." "Do you think it's right not to have the best person analyze the remains?" "Maybe you're afraid that he'll do just fine without you." " Excuse me?" " I'm just saying, it's" "Is this about the bones, or is this about you?" "I believe they are one and the same." "Does that apply to Christine too?" "What?" "Are you saying that I use Christine to make myself look good?" "Oh, your words, not mine." "I am just saying that Clark might do things his own way, and the same holds true for Christine." " Shouldn't we be focusing on the case?" " That's a good idea." "These books Sutton wrote are dreadful." "What publisher would allow such inaccuracies?" "Well, I'm thinking one that wanted to make money off a modern-day Indiana Jones, huh?" "It's all about the cash." "I still can't believe Jim's dead." "We fixed time of death at three days ago." "When was the last time you spoke to him?" "Um, about a month ago." "He called from Grozny, said that he had made an important find." "We were supposed to talk about it last Friday." "Did he say exactly what it was that he found in Chechnya?" "No." "But he was very excited, and he said that he was finally going to be able... to publish something of real scientific merit." "So he knew that his previous books were sensationalistic nonsense." " Bones." " We prefer to view them as... an accessible way for the public to get introduced to archaeology." "But an entire book on fossilized dinosaur eggs?" "It was quite successful in the youth market." "The profits from these books-did they pay for his expeditions?" "Not exactly." "What he would do is feature... an artifact in the book and then sell it." "Tell you the truth, it was almost always to the same guy." " Who was this man?" " All I know is he's a businessman in Texas." " L-I never got his name." " And these artifacts were legal?" "I don't know." "I have absolutely nothing to do with that part of the business." "25,000 years-you'd think that they'd just have a fire pit." "Homo sap/ens already had tens of thousands of years of working with fire." "The stones found at the site indicate a domed hearth." "This is all just becoming so real." "I just want to put faces on them all." "Well, the skulls are there for you." "My paper would definitely be enhanced with illustrations." "Hi, Angie." "I got your text." "What are you doing here?" "Making history live, and you are gonna help." "Oh." "Urn," "I'd rather not get between Clark and Dr. Brennan." "Hodgins, we just need to know the plant and insect life... in the Northern Caucasus 25,000 years ago." "Wait a minute." "Wait." "Are you actually afraid of Brennan?" "Yeah." "More than you are of me?" "Epigaea gaultheroides was common, as was Betula medwedewii." "Could you put that in the binder?" "Mm-hmm." "We tracked down the guy that Sutton sold his artifacts to." "Wayne Wilson." "Texas oil money." "Spends a lot of time in D.C." "Wilson is a fundamentalist." "He's the sole support of the country's largest creationist museum." "Are you saying he's one of those guys who believes that the world is 6,000 years old?" "And yet he routinely bought artifacts from Sutton that were way older." "Why would a true believer buy artifacts that he refuses to believe even exist?" "Perhaps he suffered a crisis of faith." "The psychological stability of the true believer... rests entirely on a superior posited authority." "Now if that authority is removed or questioned" " The guy goes wacky." " I was gonna use a more technical term." "That's why I interrupted you." "All right, look." "According to Sutton's e-mails," "Wilson funded his entire trip and was getting angry... 'cause Sutton wouldn't turn over the bones." "I tell you what." "You to talk to Wilson, do your “shrinky” thing." "See if he, you know, flipped out." "Gonna do my “shrinky” thing." "Go." "These conifers would have provided cover... so that the fire wouldn't be seen by predators." "Width of distal epiphysis is 3.74 centimeters." "Dr. Brennan, hi." "You know, I was just leaving." "There would be a shelter next to the hearth... made from branches and animal skins... with a ground cover made of leaves." "I know." "We were just getting that stuff" "And moss should be used in the fire as well as wood." "Yeah-I was told that you found particulates... in the scraping wound on the rib, Dr. Hodgins." "Yes." "Yeah." "Dried tissue." "Some kind of hide." "Um, I'm-I'm assembling a list of potential objects that could be made from it." "Seems to me you are gardening." "We are in the middle of a murder investigation, Dr. Hodgins." "It's my fault." "I'm sorry." "I begged him." "Look, this is becoming an extraordinary find." "I've discovered the remains of four" "No need to explain to me, Dr. Edison." "Crime is my domain." "This is yours." "I know." "But as a fellow anthropologist," "I thought you would be interested to know... that these remains are both Neanderthal and Homo sap/ens." "In the same site?" "No, I don't think so." "These pieces are from a skull of a Homo sap/ens male." "And we have the 0s coxae and various metacarpals... and phalanges of a Homo sap/ens female." "And the rib and femur of a Neanderthal male." " This is remarkable." " And I have the femur, mandible, humerus and skull... of a female child, approximately three years old." "Yeah, it's very sad." "She was only a toddler." "Do you know what this means?" "Homo sap/ens and Neanderthals living together... in the same cave, using the same resources." "Look at you two, sharing." "It's beautiful." "Mixed tribe cohabitating." "This is unprecedented." "Oh-I do plan on crediting you, Dr. Brennan." "In a secondary capacity, of course." "I believe it is I who will be crediting you in a secondary capacity, Dr. Edison." "Excuse me?" "The injury to the parietal was caused by a blow with a sharp weapon." "This Homo sap/ens was murdered, which is a crime." "So these bones are now mine." "Violence has plagued the human race from the very beginning-before language, before fire." "It is the source of the Cain and Abel myth." "Yes, violence sucks." "But what sucks even more... is that the most fascinating thing that's ever happened to me in my career... turns out to be a mere crime." "So you agree that the investigation of this crime should fall to me." " Oh, you would like that, wouldn't you?" " Yes." "That's why I suggested it." "The crimes you solve are just mere current events." "This is history." "Are you able to define the exact moment at which current events become history?" " Yes. 100 years." " You just made that up on the spot." "This-This happened over 25 millennia ago, Dr. Brennan." "Even you can't count that as “current events.”" " it does in geologic terms." " Well, luckily, neither one of us is a geologist." "Well, as it happens, I had a paper published by the Geological Society of America." "And I've had two published by Geophysical Systems." " Which is for dilettantes and amateurs." " Oh, really?" "Whoa, whoa." "Stop, stop." "What is going on here?" "Well, Dr. Brennan here feels that because these ancient individuals... died in a violent manner, that somehow it's a forensic concern." "And Dr. Edison feels that history began a hundred years ago." "What?" "That's not even an accurate representation of my meaning." " You can stop all this by simply declaring this a homicide." " Oh, no, she can't." "Yes, I can." "It's a technicality, but we live in a world of technicalities." " World of technicalities." " But..." "I'm not gonna do that." "Clark can keep the bones here." " Dr. Brennan can have access" " No." "But" "And if either one of you says another word, I'm gonna rule in favor of the other." "Now drop the egos and figure out what happened to this poor caveman." "Could you believe she just called him a caveman?" "Unforgivable." "But I'm not saying anything else until I'm completely certain she's gone." "I can hear you." "Damn." "Mr. Wilson, how long ago was the Earth created?" "I believe you're asking me if I believe in the Book of Genesis, which I do." "Mm-hmm." "So 6,000 years?" "According to the Bible." "Scientists tell us that the universe is 13 billion years old, and the Earth four-and-a-half billion years old." "Well, who you gonna believe?" "God or a bunch of scientists?" "You own an oil company?" "Does God tell you where to dig, or do you count on a bunch of scientists to tell you?" "Oh." "I get what's happening here." "What's happening here?" "The F.B.l. sent a psychologist to ask me questions... because they want to know if I am a religious fanatic." "Well, I know that you're religious, sir." "What I'm trying to figure out is if your religious convictions led you to kill James Sutton." "€œFear them not therefore:" "for there is nothing covered... that shall not be revealed, and hid that shall not be known.”" " Book of Matthew." " “Thou shalt not murder.” Deuteronomy." "I keep the Commandments, Dr. Sweets, all 10 of 'em." "You bought these fossilized dinosaur eggs from Sutton." "Correction." "I bought those rocks from Mr. Sutton." "Mmm." "You also bought this figurine that Sutton found in northern Germany... dated at approximately 32,000 years." "Who doesn't like a pretty girl?" "Plus, I love history." "I own a museum." "None of the artifacts you bought from Sutton made it in your museum." "It's my museum, Dr. Sweets." "I decide what does and does not get into it." "Do you destroy the items that contradict your creationist views, or do you simply lock them away where they can't do any harm?" "We all do what we can do to make the world a better place." "You fronted Sutton money to go to Chechnya... because he was after bones that were 25,000 years old." "They call it the Chechen Republic now." "Right." "Now Sutton refused to sell you... what he found and for which you'd already paid." "Probably because he knew that you'd destroy 'em or lock 'em away." "He stole from me." "That's a fact." "The Bible calls lying “bearing false witness, ” right?" "So I have to ask, did God tell you to kill James Sutton?" "You know what God is telling me right now?" " To get a lawyer?" " See there?" "The word of God is audible to all of those who listen." "Why are you so depressed?" "You run out of your marshmallows?" "Well, my “happy tribe” theory is kaput." "The Homo sap/ens male was clearly murdered by a Neanderthal ax." "Hmm." "What have you got there?" "My sketches of people who lived 25,000 years ago." "Wow, these are good." "You can see us in 'em." "Yeah." "We could be looking at our own family, right?" " No." " Because this family stopped here?" "Yes." "You don't know that." "There could have been a brother out hunting that day... or a sister gathering nuts and" "I don't actually know what people did for a living back then, so" "This is wrong." "No, I don't think so." "This child is way too short for a Homo sap/ens three-year-old, especially compared to the height of the two Homo sap/ens parents." "Well, I got the measurements from you, Clark." "So if anybody's wrong, I think it was you." "The only way a Homo sap/ens child could be this short and stocky... is if she inherited traits from" "Oh, my God." "Wh-What?" "A shorter, thicker tibia is more suited to a Neanderthal than a human, which can only mean that" "That the child is Neanderthal." "Half Neanderthal." "Well, yeah, but then her father isn't her father." "This is her father." "See, that's not" "I mean, I don't think that" "I'm freaking out right now." " Is this a new thing?" " Yeah, Angela." "This is a new thing." "Dr. Brennan?" "Yes?" "You seem to be looking at both Sutton's remains and his notes." "That's accurate." "Those are two different cases." "One's a murder from a few days ago." "The other is a murder from 25,000 years ago." "Yes." "Dr. Brennan, I know the Neanderthal case is historic and exciting, but this man was murdered, and he left behind a widow and a fatherless child." "I think we should find out who did it." "I've cataloged the injuries to the ribs and spine." "Yes, there are traces of animal tissue in the bone." "When I was in the Maldives, I examined the remains of a woman... who'd been tied to a tree and whipped for cheating on her husband." "You think the animal tissue is leather?" "Yes, I believe that approximately two months before he was killed," "Dr. Sutton was flogged." "I think I found it." "Ouch." "Yeah, I got this from the Russian History Room." "It's called a knout in English, pronounced “ka-noot” in Russian." "Here's an interesting fact." "Most Germanic languages still pronounce the silent" "So knight is “ka-night, ” knife is “ka-nife”" "Fascinating." "So you think this is what Sutton was beaten with?" "Flogged." "Oh, yeah." "The tissue was a tanned hide." "Leather?" "Um, yeah." "It was from a Siberian musk ox." "Now, I ran it through the isotopic mass spec... and was able to isolate the geographic origin to the Chechen Republic in Russia." "That's the area where his dig was." "Yeah." "What did you find?" "Well, I have tissue samples from his back." "There's scarring on them that indicates that the flogging took place about two months ago." "Which would definitely place him in Chechnya." "The areas of impact on the flesh are pale with abrasions, bruising along both sides." "It's amazing that he survived a beating like this." "His wife was pregnant." "He had something to live for." "I'm surprised your brother didn't come with you this time." "He's working." "Mrs. Sutton, I know this is difficult, but telling us what happened to your husband might help us find who killed him." "Are you in danger?" "[Crying 1 No.No, no." "You know, he was flogged." "He was whipped." "You understand?" "Who did that to him?" "Our son will be named Valentine." "Is that name significant in some way?" "Yes." "It is a family name." "My family is, um" "I'm sorry." "I don't understand." "Do things... the old way." "Oh, traditional." "Okay." "Your family didn't want you to marry a foreigner, but you're pregnant." "Your father had Sutton whipped." "[Crying 1 We get to Grozny." "Hide." "James, when he gets better, we come here, to America." "Now is it possible that your father followed you here?" "No." "I have dishonored my family." "I am dead to him." "And now I can't go home." "And James is gone." "May I help you, Dr. Brennan?" "Dr. Edison." "No, I knocked, but I haven't touched anything." "It's okay." "You can examine anything you want." "I should have spotted it earlier, but apparently I was too busy competing with you to really see anything." "The child's large, pronounced brow ridge... is characteristically Neanderthal... while the radius and ulna appear to be Homo sap/ens." "I was stunned myself." "I thought Angela made a mistake." "Not Angela." "This was an interspecies family, the first of its kind, and I didn't take the time to notice." " Yeah, but you trained me to" " Congratulations belong to you." "Deservedly so, Dr. Edison." "Thank you." "It's no wonder Sutton didn't want to give these up." "I know." "I never thought I'd be part of a discovery like this." "Well, you probably wouldn't if you hadn't been trained so well." "I'll let you get back to work." "Okay." "Initially, I thought all of these markings... came from predators, but look at this." "The nick on the coracoid process." "That's not from a predator?" "The teeth would have to be very small." "And young predators don't usually feed with adults." "The adults bring the food back to them." "This injury had to have been caused by a weapon of some kind." "The coracoid process could only be exposed if the arm was raised." "As if the victim were warding off an attack." "The first blow must have been to the scapula." "Which caused this indentation here." "Then the victim turns to face the assailant, raises his arm in a defensive posture" "The murder weapon nicks the coracoid process, then travels downward into the armpit, slicing the axillary artery." "He died of exsanguination." "Exsanguination." "A completely severed axillary would pump about 100 c.c.'s of blood per heartbeat." "At that rate, the victim would have lost consciousness in less than 30 seconds." "And died in under a minute." "Dr. Brennan, I do believe we found cause of death." "Yes." "Together." "So, you were V.D.V. in the Russian army." " I'm a patriot." "So?" " That's like our Special Forces." "I'm sure you were taught how to target major arteries in hand-to-hand combat?" "I know how to defend myself." "Right." "According to your bank account, there's some major withdrawals in the past three months." "One bigger than the other." "You like to gamble?" "I play the horses once in a while." "Yeah, I know." "I've been there." "When you bet, you lose." "You get desperate." "You bet more just to get that rush." "I don't know what you're talking about." "No?" "I mean, you were broke two weeks ago." "Then you get this." "Electronic transfer from a Russian bank... for $20,000." "Someone paid off an old debt." "Yeah, it's possible." "I could see that." "But do you want to hear my theory?" "I'm thinking you come here and you want to make it big." "But you fall into debt." "So what do you do?" "You go to Daddy to bail you out." "And he agrees on one condition." "To restore the family honor, you had to take out your sister's husband." "You shouldn't talk about my family like that." "I can see that family means a lot to you." "You would do anything to protect their honor." "Am I right?" "I know my rights." "And I don't have to talk to you anymore." "So the nick to the coracoid process revealed microscopic fibers... of a dyed and coated linen." " Parts of the victim's clothing?" " No, because... the linen has been suffused with polyurethane." " I don't know what that means." " Well, it's" "I know what it means, obviously." "What I don't understand is its significance." "Bookbinding." "How could a book cut through the muscle tissue and sever a major artery?" "I guess we're looking for something that's covered in bookbinder's linen... that's sharper than a book." "That is correct." "I know what killed James Sutton." "Wha-Would you care to share it with me?" "I have to get Booth." "Nope." "Yeah, okay." "I'll just find out later." "Just because I don't have an alibi does not mean that I killed Jim." "Doesn't exactly clear you either." "These books." " What about them?" " They cover a wide range of topics... that would've been useful in this killing." " Really?" "Like what?" " This book is about... how to commit the perfect murder." "Why would you publish something like that?" "It was written by a man on death row." "How could he possibly be an expert on the perfect murder?" "Hmm." "What else we got here?" "Oh." "Oh, look at this." "You missed one, Bones." ""L-low to Remove Stains.” There's blood on the floor here." "I bet it says to use bleach on blood." "That doesn't work." "You publish trash." "I cut my foot on a rock in the garden." "It bled a lot." " I estimate about two liters." " Two liters." "I'm surprised you didn't pass out." "Okay, I'm sorry." "The bookends- they come in pairs?" " I only ever had one." " Really?" "Not in this picture you didn't." "I see two." "This is a likely match for the indentation... on the posterior surface of Sutton's scapula." "So you're saying that I killed Jim with a bookend?" "That's ludicrous." "D.N.A. will tell us if the blood on the floor matches Sutton's." "It's only a matter of time." "You come clean with us, I'll tell the judge you cooperated." "When he called me from Russia, I could hear it in his voice." " Something changed." " He'd fallen in love." "Oh, no." "It was never about her." "We were a team." "Until he decided to publish in some ridiculous journal for no pay... and leave me out of it." "He betrayed me." "He wanted to be taken seriously as an archaeologist, which is a very high calling." "You should've let him have that." "Well, you're under arrest for the murder of Dr. James Sutton." "Hello, everybody." "We are extremely gratified... that there are so many people who are interested in what happened 25,000 years ago." "Even the F.B.l. is interested." " It was a crime." " Well, F.B.l.'s all about crime." " So can we get goin' here?" " But I think this is Clark's story to tell." "Dr. Edison." "O-Okay, all right." "Yes, uh" "Are you gonna let Clark have all this glory?" "He put it together." "I only helped." "Dr. Hodgins, would you stand in for the Neanderthal father?" "Yes." "Dr. Saroyan, would you be the Homo sap/ens mother?" " And, um" " No." " No?" " Don't even think about it." "Okay." " Dr. Sweets, would you be our interloper?" " Okay." "All right, gentlemen, could you go this way?" "And I'll call you when I need you." "It was a warmish morning in the late fall... in the foothills of the Caucasus Mountains." " E-Excuse me, if I may?" " Oh, boy." "How do you know it was a warmish morning?" "Uh, spores and fungi tell us that it was a very warm autumn." "Bug boy." "Mom was grinding acorns into paste between rocks." "The grinding rocks were a part of Sutton's find, as were some acorn husks." "A very warm autumn." " Yes." " Now, there was a little girl, only three years old, who was sleeping under some skins here in the shelter." "Which is our cue for Dad to come in with dinner." "Right, good." "Hark!" "I bring thee meat, which we thus shall feast upon and" "Hey, honey- it's not Shakespeare." "Right." "Yes." "Good." "Sorry." "Um-Um-Rah, caveman." "Please don't say “caveman.”" "This is not a family like others." "They were outcasts." "This family lived apart because they were not accepted." "Time for the interloper." " What do I do?" " Throw your spear at Dad." " Why?" " We found a greenstick fracture... on the father's left ninth rib... that is consistent with the ballistic trajectory of a thrown weapon." "Homo sap/ens were the first to throw a spear at their prey... rather than simplyjab at it." "Well, Homo sap/ens can go straight to hell then." "Oh, everyone in this room's Homo sap/ens." "Not me-I'm Neanderthal." "Mom then attacked the interloper with her grinding stone, fracturing his left humerus." "He then retaliated by striking her in the face." "And down Mom went with a broken jaw, and very likely a crushed larynx." "But her actions gave Dad time to pick up his stone hatchet" "[ Grunts I and strike the interloper." "Dude, lie down." "You're dead." " I'm not gonna lie down." " Well, you should." "I just split your skull wide open." "Okay." "All right." "We got it." "The bad guy is dead." "What happened next?" "As I was saying, the interloper was killed instantly." "The father bled out in less than three minutes." "What happened to the mother?" "Her larynx was crushed." "She suffocated to death." "Okay, but the little girl- she was okay, right?" "No, actually, she was only three years old and" "She was all alone." "What the hell?" "Why didn't the other villagers take her in?" "Because she was h a If Homo sap/Zens and half Neanderthal." "No one wanted her." "The lines of arrest on the child's teeth... indicate that she starved to death." "Wow." "So you're saying the world's first hate crime... ended with the starvation of a little girl?" "No." "Booth, it doesn't end in hate." "No, before he died," "Dad crawled over to the mom where they died together." " And then" " The little girl's last action... was to come over... and lie down with her parents." "Which is how Sutton found the bones." "Together." "You know, that was really nice of you to let Clark have his moment, Bones." "Well, I'm a very nice person." "Yes, you are." "You know what?" "You're very nice." "You gotta work on your modesty though." "Well, I am being modest because I actually did something even nicer." " Oh, really?" "What was that?" " I told Clark... to replace my authorship credit with Dr. James Sutton." "That way, one day Sutton's son will see what a great discovery he made." "You're right." "It was very nice." "I don't want to pass my failings on to Christine, Booth." " What failings?" " Hyper-competitiveness, arrogance, insensitivity to the feelings of others." "You know what?" "Thumbs-up for self-realization there, Bones." "Actually, two thumbs up." "You should make a similar effort." " What?" " Not to pass on your failings." "Whoa, whoa, whoa." "What do you mean?" "What failings?" "Oh, it's time for bed." " Wait, what failings?" " You know." "We're gonna have a bath." "We'll get yourjammies on." "What, is this because I won't walk under ladders?" "We'll have some milk, wash your hair." "Oh." "What is this, my sweet tooth?" "Yeah." "So I like to have a beer every once in a while in the bathtub." "What's so bad about that?" "What failings?" "What's that mean?"
{ "pile_set_name": "OpenSubtitles" }
Q: Spring 4 @Transactional doesn't work I have a Spring 4.3 Application with simple configuration and I expect my methods from service classes to be transactional so I enable transaction management in my configuration and then annotate my service methods with @Transactional. I call service methods from my controlles but they don't behave as expected. When some part of a method throws exception rollback is never called AppInitializer.class: @EnableTransactionManagement public class AppInitializer extends AbstractAnnotationConfigDispatcherServletInitializer { @Override protected Class<?>[] getServletConfigClasses() { return new Class<?>[]{WebConfig.class}; } @Override protected Class<?>[] getRootConfigClasses() { return new Class<?>[]{RootConfig.class, SecurityConfig.class}; } @Override protected String[] getServletMappings() { return new String[]{"/"}; } } RootConfig.class: @Configuration @EnableJpaRepositories(basePackages"package.repository"}) public class RootConfig { @Bean public DataSource dataSource() { ... return dataSource; } @Bean public JpaVendorAdapter jpaVendorAdapter() { ... return hibernateJpaVendorAdapter; } @Bean public EntityManagerFactory entityManagerFactory() { LocalContainerEntityManagerFactoryBean factory = new LocalContainerEntityManagerFactoryBean(); ... return factory.getObject(); } @Bean public JpaTransactionManager transactionManager() { return new JpaTransactionManager(entityManagerFactory()); } } Does anybody have idea what is wrong here GitHub link https://github.com/VadOs1/TRANSACTIONAL-ISSUE/ Thanks A: can you remove the @EnableTransactionManagement annotation from the AppInitializer class and enable it in RootConfig class and let me know if this worked for you ie @Configuration @EnableTransactionManagement @EnableJpaRepositories(basePackages"package.repository"}) public class RootConfig { @Bean public DataSource dataSource() { ... return dataSource; } @Bean public JpaVendorAdapter jpaVendorAdapter() { ... return hibernateJpaVendorAdapter; } @Bean public EntityManagerFactory entityManagerFactory() { LocalContainerEntityManagerFactoryBean factory = new LocalContainerEntityManagerFactoryBean(); ... return factory.getObject(); } @Bean public JpaTransactionManager transactionManager() { return new JpaTransactionManager(entityManagerFactory()); } }
{ "pile_set_name": "StackExchange" }
Hypnotic (Wild Orchid album) Hypnotic is the fourth and final album by Wild Orchid. It is the first album released by Wild Orchid since Stacy Ferguson, a former member of the band, left and became a member of the hip hop group The Black Eyed Peas. There are no singles released from this album. Album information After the departure of Ferguson, Ridel and Sands recorded "Hypnotic" under the label Yellow Brick Records throughout 2002. The album was released directly on the band's website on January 15, 2003. The duo hoped that they could get a deal with a major label and officially release the album, but it never happened. The album was only available online, and only 5,000 were copies printed and sold. They intended for "All The Way" to be the first single, followed by Hypnotic however none of the songs were released to radio. Wild Orchid performed a couple of concerts in support of the album, but never got major publicity for the album. Track listing All songs co-written by Stefanie Ridel or Renee Sands unless noted. Kiss the Sky - 3:52 All the Way (Stacy Ferguson, Ridel, Sands) - 2:54 Hypnotic - 3:29 It's On - 2:42 On the Floor - 3:12 My Lover - 3:17 Sugarfly - 2:59 Simon Sez (Ferguson, Ridel, Sands) - 3:47 Contagious (Ferguson, Ridel, Sands) - 3:27 All Night Long (Ferguson, Ridel, Sands) - 3:29 Love in All Control - 2:59 Let the Record Spin (Ferguson, Ridel, Sands) - 3:14 Hypnotic (Remix) - 4:00 References Category:2004 albums Category:RCA Records albums Category:Wild Orchid (band) albums Category:Unreleased albums
{ "pile_set_name": "Wikipedia (en)" }
Effects of acute olanzapine exposure on central insulin-mediated regulation of whole body fuel selection and feeding. The use of antipsychotics is associated with severe disruptions in whole body glucose and lipid metabolism which may in part occur through the central nervous system and impaired insulin action at the brain. Here we investigated whether olanzapine treatment might also affect the ability of central insulin treatment to regulate food intake and fuel preference in the light and dark cycle. Male Sprague-Dawley rats were treated with olanzapine (or vehicle solution; 3 mg/kg, subcutaneous) and a simultaneous acute intracerebral ventricular (ICV) infusion of insulin (or vehicle; 3 μL at 10mU; ICV) at the beginning of the 12-h light and dark cycles. Olanzapine treatment reduced RER in the dark and light phases (most consistently in the 4-hours post-treatment), while ICV insulin reduced average RER predominantly in the dark phase, but also at the end of the light cycle. The RER lowering effect of ICV-insulin during the light cycle was absent in the group co-administered olanzapine. The reduction in RER during the dark phase was mirrored by decreased food intake with ICV insulin, but not olanzapine treated rats. The reduction in food intake by ICV-insulin was abolished in rats co-administered olanzapine suggesting rapid induction of central insulin resistance. A combination of ICV-insulin and olanzapine similarly reduced RER in the dark phase, independent of changes in food intake. Olanzapine treatment, alone or in combination with ICV-insulin, significantly reduced VCO2 at regular intervals in the dark phase (specifically 3 h post-treatment), while VO2 was not significantly altered by either treatment. Finally, heat production was increased by olanzapine treatment in the light phase, though this effect was not consistent. The findings confirm that acute olanzapine treatment directly reduces RER and suggest that treatment with this drug may also override central insulin-mediated reductions in food intake at the hypothalamus (while still independently favoring fatty acid oxidation). Acute central insulin similarly reduces RER, but in contrast to olanzapine, this may represent a physiologically appropriate response to reduction in food intake.
{ "pile_set_name": "PubMed Abstracts" }
(CNN) At the age of 19, a young woman from Hoover, Alabama traveled to Syria to join ISIS -- the so-called "Islamic State." Five years and three husbands later, she says she regrets what she did and is begging to return to the US. In a recent handwritten note obtained by CNN from a family representative, Hoda Muthana writes , "When I left to Syria I was a naive, angry, and arrogant young woman. I thought that I understood my religious beliefs." But after witnessing the devastation of war, including the death of two husbands, Muthana said she became disillusioned. "During my years in Syria I would see and experience a way of life and the terrible effects of war which changed me. Seeing bloodshed up close changed me. Motherhood changed me. Seeing friends, children, and the men I married dying changed me," the now 24-year-old wrote. "Seeing how different a society could be compared to the beloved America I was born and raised into changed me. Being where I was and seeing the (people) around me scared me because I realized I didn't want to be a part of this. My beliefs weren't the same as theirs." CNN has not yet been able to speak with her directly. Outspoken support Once described as shy and reserved by a high school classmate, Muthana was fiercely outspoken in her support for jihad after joining ISIS. During the height of the self-declared caliphate, Muthana posted tweets calling for violence, according to the Program on Extremism at the George Washington University. "Hoda was right in the mix for English language propagandists," said terror researcher Seamus Hughes. "We followed her for a number of years. She was a key node." She demanded more Americans come to the self-proclaimed Caliphate and join the fight with ISIS. Coalition jets hit ISIS positions in Susa, Syria, in January. "Soooo many Aussies and Brits here, but where are the Americans, wake up u cowards," she posted in January 2015. And under the name Umm Jihad, she encouraged attacks in the US, tweeting this exhortation in March 2015: "Go on drive-bys and spill all of their blood, or rent a big truck and drive all over them." According to Mia Bloom, who tracks female jihadis at Georgia State University, "She was one advocating for extreme violence, especially against American military and servicemen." JUST WATCHED ISIS wife: It was like Tinder Replay More Videos ... MUST WATCH ISIS wife: It was like Tinder 05:43 Regret In a February 19 interview with ABC News, Muthana said she is now ashamed of those posts, and wishes she could take them back. She said she feels remorse and sorrow and regret, and begged to return home. "I hope America doesn't think I'm a threat to them and I hope they can accept me," she told ABC. But if she does end up returning to the US, it may not be on her own terms. Hassan Shibly, head of Florida's Council on American-Islamic Relations and a representative for her family, said the family understands Muthana may be prosecuted, believes in the legal system, and asks only for due process. The Justice Department did not comment on whether she would be extradited or prosecuted. State Department spokesman Robert Palladino said Tuesday that he could not discuss her particular case, but said that for any ISIS members in Syria, the department's policy, "in this regard, would be to repatriate them -- and that's what we call on all countries to do." Asked if ISIS members could be sent to the detention facility at Guantanamo Bay, Palladino would only say: "The US government is considering various alternative disposition options, for foreign terrorist fighters who cannot be repatriated." JUST WATCHED CNN goes inside last ISIS enclave Replay More Videos ... MUST WATCH CNN goes inside last ISIS enclave 01:55 Kurdish refuge According to Muthana, she ran away from ISIS a few weeks ago and headed for the Kurdish area in northern Syria, where she is now in a camp for the displaced with her 18-month-old son. In her note, she speaks of her son's future. "In my quiet moments -- in between bombings, starvation, cold, and fear -- I would look at my beautiful little boy, and know that I didn't belong here, and neither did he," she wrote. Only now does she "really understand how important the freedoms that we have in America are." But Hughes, the researcher, has words of caution. "Let's not put a rosy color on what she did," he said. "She joined a foreign terrorist organization."
{ "pile_set_name": "OpenWebText2" }
A particular challenge presented in surgical instrumentation relates to the delivery of non-viscous or viscous solutions such as pharmaceutical agents, hemostatic solutions, anti-adhesives, wound-healing agents, analgesics, and the like. Non-viscous solutions can be sprayed into a surgery site using various instruments, but the solutions often drip off desired target site and pool in the body cavity before the active component can provide its intended benefit. For example, when bleeding occurs during surgery, it may obstruct the surgeon's vision, and increase patient risks from loss of blood. Thus, the surgeon may deliver an active hemostat component, such as thrombin compositions reconstituted in saline, or other tissue sealant to a bleeding target site. For example, a thrombin solution can be sprayed into an insufflated lumen using a laparoscopic tool, but the solution typically does not adhere to the bleeding target site and instead pools to the floor of the cavity. In contrast, a more viscous, tacky thrombin solution may adhere better to a bleeding target site, but such viscous solutions are often opaque and obstruct the surgeon's view. Hence, there remains a need for a fluid-delivery apparatus for use in surgery for administering a continuous infusion of beneficial fluids, such as thrombin solutions, optionally with the application of pressure, at the site in need. Tissue sealants (or tissue adhesives) are used for providing hemostasis and closing incisions during many surgical procedures. Tissue sealants may include fibrin, comprised of thrombin and a fibrinogen material, although other multiple component materials are available. Tissue adhesives for making fibrin clots use different concentrations of fibrinogen solution in conjunction with a thrombin solution. Depending upon the percentages of fibrin and thrombin in each respective tissue adhesive solution, as well as the other components found in each solution, various factors impact the mixing and application of the components. These factors include viscosity of the initial fibrinogen and thrombin solutions and of the final mixed solution. When mixed together, thrombin and fibrinogen components usually coagulate very quickly, often yielding an adhesive gel within 10 or 20 seconds. When applied to a body's exterior, or when considerable access to the application site is possible, the tissue sealant's rapid coagulative properties are welcomed. Conversely, when a fibrin sealant is used during internal surgical procedures, such fast-acting properties may cause problems such as fouling or clogging of the applicator device during application. Additionally, other considerations for laparoscopic instrument-based delivery of fibrin sealants include diameters or sizes of the fluid passages and the mixing compartment of the laparoscopic instrument, and mixing rate of the fibrinogen and thrombin solutions particularly in comparison to ejection rate if mixing occurs within the system. Typically, the individual components of the adhesive material are stored in isolated reservoirs. There remains a need, however, for a fluid applictor system that is useful in surgery for delivering viscous fluids, or fluids that should be well-mixed for maximal activity. There is also a need for an applicator tip useful for both applying the fluid and holding it against the target site with a desired amount of pressure. Additionally, in particular cases, it may be beneficial to leave a biodegradable, bioadsorbable, fluid-laden applicator tip or pledget at a desired surgical site as a sustained release implant.
{ "pile_set_name": "USPTO Backgrounds" }
Q: PHP what does it mean when using this '$$var'? I am trying to learn php, and I saw this in a foreach loop what does it mean? I understand &$var which its a direct reference to the memory address of the object. But what does $$var means? what is it exactly? This is the example. foreach($this->vars as $key => $value) { $$key = $value; echo "$$Key: " . $$key; echo "Key: " . $key; echo "<br/>"; echo "Value: " . $value; } A: You're looking at a variable variable. e.g. // original variable named 'foo' $foo = "bar"; // reference $foo dynamically by evaluating $x $x = "foo"; echo $$x; // "bar"; echo ${$x}; // "bar" as well but the {} allows you to perform concatenation // different version of {} to show a more "complex" operation $y = "fo"; $z = "o"; echo ${$y . $z}; // "bar" also ("fo" . "o" = "foo") To show an example more closely matching your question: $foo = "foo"; $bar = "bar"; $baz = "baz"; $ary = array('foo' => 'FOO','bar' => 'BAR','baz' => 'BAZ'); foreach ($ary as $key => $value){ $$key = $value; } // end result is: // $foo = "FOO"; // $bar = "BAR"; // $baz = "BAZ";
{ "pile_set_name": "StackExchange" }
Q: WordNet - Parts-Of-Speech required? To figure out if the two words are SYNONYMS (SIMILAR_TO), do I need to find the Parts-Of-Speech for the two words first? Can I do this in a single 'operation' in the WordNet or will I have to loop through the senses first for each word? A: Synsets are categorized according to the POS. So there is no way to avoid it.
{ "pile_set_name": "StackExchange" }
Transcript heterogeneity of the human gene for Ca2+-binding protein regucalcin. Regucalcin is a Ca2+-binding protein which plays a regulatory role in liver cell functions related to Ca2+. In this study we have cloned and characterized cDNA for regucalcin from human liver and human hepatoma cell line Hep G2 by screening and rapid amplification of cDNA ends (RACE). The nucleotide sequences of the clones revealed that they were identical in their coding region and differed only in their 5' untranslated regions (UTRs). Northern blot analysis showed that regucalcin mRNA in the Hep G2 was longer than that of the liver. The present study demonstrates the existence of transcript heterogeneity of the human gene for regucalcin.
{ "pile_set_name": "PubMed Abstracts" }
Segmental hypersensitivity and spinothalamic function in spinal cord injury pain. The mechanisms underlying central pain following spinal cord injury (SCI) are unsettled. The purpose of the present study was to examine differences in spinothalamic tract function below injury level and evoked pain in incomplete SCI patients with neuropathic pain below injury level (central pain) versus those without such pain. A clinical examination, quantitative sensory testing and magnetic resonance imaging (MRI) were performed in 10 SCI patients with below-level pain and in 11 SCI patients without neuropathic pain. Patients with and without pain had similar reductions of mechanical and thermal detection thresholds below injury level. SCI patients with central pain had sensory hypersensitivity in dermatomes corresponding to the lesion level more frequently than SCI patients without pain, but this may in part be explained by the exclusion of at-level spontaneous pain in the pain-free group. The rostral-caudal extent of the lesion measured by MRI did not differ between the two patient groups, and there were no statistically significant differences in any of the predefined areas of interest on the axial plane images. This study suggests that neuronal hyperexcitability plays a key role in central SCI pain and furthermore - in contrast to previous findings - that loss of spinothalamic functions does not appear to be a predictor for central neuropathic pain in spinal cord injury.
{ "pile_set_name": "PubMed Abstracts" }
Reflections Of You Testo Testo Reflections Of You I spent my time Trying to find A way to lose your shadow I shut you out I let you down How could I be so shallow? I never thought of the consequences Until the water was over my head All along I built these walls Now I'm gonna let them fall ~Chorus 1~ I'm seeing for the first time The changes on the inside shining through Your love is the reason I'm alive So as I live my life In everything I do I hope you see reflections of you You watched me make all my mistakes And you always took me back Time and again you were my friend Show me how to be like that I wanna love you the way you love me I wanna learn to forgive and forget All along I built these walls I'm breaking free Let them fall ~Chorus 2~ I'm seeing on the outside The changes on the inside shining through Your love is the reason I'm alive So as I live my life In everything I do I hope you see reflections of you I know that I'm not perfect But in your eyes you see something more In everything I do I hope you see reflections of you
{ "pile_set_name": "Pile-CC" }
/* ============================================================================== This file is part of the JUCE library. Copyright (c) 2015 - ROLI Ltd. Permission is granted to use this software under the terms of either: a) the GPL v2 (or any later version) b) the Affero GPL v3 Details of these licenses can be found at: www.gnu.org/licenses JUCE is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details. ------------------------------------------------------------------------------ To release a closed-source product which uses JUCE, commercial licenses are available: visit www.juce.com for more information. ============================================================================== */ struct PropertyPanel::SectionComponent : public Component { SectionComponent (const String& sectionTitle, const Array<PropertyComponent*>& newProperties, const bool sectionIsOpen) : Component (sectionTitle), titleHeight (sectionTitle.isNotEmpty() ? 22 : 0), isOpen (sectionIsOpen) { propertyComps.addArray (newProperties); for (int i = propertyComps.size(); --i >= 0;) { addAndMakeVisible (propertyComps.getUnchecked(i)); propertyComps.getUnchecked(i)->refresh(); } } ~SectionComponent() { propertyComps.clear(); } void paint (Graphics& g) override { if (titleHeight > 0) getLookAndFeel().drawPropertyPanelSectionHeader (g, getName(), isOpen, getWidth(), titleHeight); } void resized() override { int y = titleHeight; for (int i = 0; i < propertyComps.size(); ++i) { PropertyComponent* const pec = propertyComps.getUnchecked (i); pec->setBounds (1, y, getWidth() - 2, pec->getPreferredHeight()); y = pec->getBottom(); } } int getPreferredHeight() const { int y = titleHeight; if (isOpen) for (int i = propertyComps.size(); --i >= 0;) y += propertyComps.getUnchecked(i)->getPreferredHeight(); return y; } void setOpen (const bool open) { if (isOpen != open) { isOpen = open; for (int i = propertyComps.size(); --i >= 0;) propertyComps.getUnchecked(i)->setVisible (open); if (PropertyPanel* const pp = findParentComponentOfClass<PropertyPanel>()) pp->resized(); } } void refreshAll() const { for (int i = propertyComps.size(); --i >= 0;) propertyComps.getUnchecked (i)->refresh(); } void mouseUp (const MouseEvent& e) override { if (e.getMouseDownX() < titleHeight && e.x < titleHeight && e.getNumberOfClicks() != 2) mouseDoubleClick (e); } void mouseDoubleClick (const MouseEvent& e) override { if (e.y < titleHeight) setOpen (! isOpen); } OwnedArray<PropertyComponent> propertyComps; const int titleHeight; bool isOpen; JUCE_DECLARE_NON_COPYABLE (SectionComponent) }; //============================================================================== struct PropertyPanel::PropertyHolderComponent : public Component { PropertyHolderComponent() {} void paint (Graphics&) override {} void updateLayout (int width) { int y = 0; for (int i = 0; i < sections.size(); ++i) { SectionComponent* const section = sections.getUnchecked(i); section->setBounds (0, y, width, section->getPreferredHeight()); y = section->getBottom(); } setSize (width, y); repaint(); } void refreshAll() const { for (int i = 0; i < sections.size(); ++i) sections.getUnchecked(i)->refreshAll(); } void insertSection (int indexToInsertAt, SectionComponent* newSection) { sections.insert (indexToInsertAt, newSection); addAndMakeVisible (newSection, 0); } SectionComponent* getSectionWithNonEmptyName (const int targetIndex) const noexcept { for (int index = 0, i = 0; i < sections.size(); ++i) { SectionComponent* const section = sections.getUnchecked (i); if (section->getName().isNotEmpty()) if (index++ == targetIndex) return section; } return nullptr; } OwnedArray<SectionComponent> sections; JUCE_DECLARE_NON_COPYABLE (PropertyHolderComponent) }; //============================================================================== PropertyPanel::PropertyPanel() { init(); } PropertyPanel::PropertyPanel (const String& name) : Component (name) { init(); } void PropertyPanel::init() { messageWhenEmpty = TRANS("(nothing selected)"); addAndMakeVisible (viewport); viewport.setViewedComponent (propertyHolderComponent = new PropertyHolderComponent()); viewport.setFocusContainer (true); } PropertyPanel::~PropertyPanel() { clear(); } //============================================================================== void PropertyPanel::paint (Graphics& g) { if (isEmpty()) { g.setColour (Colours::black.withAlpha (0.5f)); g.setFont (14.0f); g.drawText (messageWhenEmpty, getLocalBounds().withHeight (30), Justification::centred, true); } } void PropertyPanel::resized() { viewport.setBounds (getLocalBounds()); updatePropHolderLayout(); } //============================================================================== void PropertyPanel::clear() { if (! isEmpty()) { propertyHolderComponent->sections.clear(); updatePropHolderLayout(); } } bool PropertyPanel::isEmpty() const { return propertyHolderComponent->sections.size() == 0; } int PropertyPanel::getTotalContentHeight() const { return propertyHolderComponent->getHeight(); } void PropertyPanel::addProperties (const Array<PropertyComponent*>& newProperties) { if (isEmpty()) repaint(); propertyHolderComponent->insertSection (-1, new SectionComponent (String(), newProperties, true)); updatePropHolderLayout(); } void PropertyPanel::addSection (const String& sectionTitle, const Array<PropertyComponent*>& newProperties, const bool shouldBeOpen, const int indexToInsertAt) { jassert (sectionTitle.isNotEmpty()); if (isEmpty()) repaint(); propertyHolderComponent->insertSection (indexToInsertAt, new SectionComponent (sectionTitle, newProperties, shouldBeOpen)); updatePropHolderLayout(); } void PropertyPanel::updatePropHolderLayout() const { const int maxWidth = viewport.getMaximumVisibleWidth(); propertyHolderComponent->updateLayout (maxWidth); const int newMaxWidth = viewport.getMaximumVisibleWidth(); if (maxWidth != newMaxWidth) { // need to do this twice because of scrollbars changing the size, etc. propertyHolderComponent->updateLayout (newMaxWidth); } } void PropertyPanel::refreshAll() const { propertyHolderComponent->refreshAll(); } //============================================================================== StringArray PropertyPanel::getSectionNames() const { StringArray s; for (int i = 0; i < propertyHolderComponent->sections.size(); ++i) { SectionComponent* const section = propertyHolderComponent->sections.getUnchecked(i); if (section->getName().isNotEmpty()) s.add (section->getName()); } return s; } bool PropertyPanel::isSectionOpen (const int sectionIndex) const { if (SectionComponent* s = propertyHolderComponent->getSectionWithNonEmptyName (sectionIndex)) return s->isOpen; return false; } void PropertyPanel::setSectionOpen (const int sectionIndex, const bool shouldBeOpen) { if (SectionComponent* s = propertyHolderComponent->getSectionWithNonEmptyName (sectionIndex)) s->setOpen (shouldBeOpen); } void PropertyPanel::setSectionEnabled (const int sectionIndex, const bool shouldBeEnabled) { if (SectionComponent* s = propertyHolderComponent->getSectionWithNonEmptyName (sectionIndex)) s->setEnabled (shouldBeEnabled); } void PropertyPanel::removeSection (int sectionIndex) { if (SectionComponent* s = propertyHolderComponent->getSectionWithNonEmptyName (sectionIndex)) { propertyHolderComponent->sections.removeObject (s); updatePropHolderLayout(); } } //============================================================================== XmlElement* PropertyPanel::getOpennessState() const { XmlElement* const xml = new XmlElement ("PROPERTYPANELSTATE"); xml->setAttribute ("scrollPos", viewport.getViewPositionY()); const StringArray sections (getSectionNames()); for (int i = 0; i < sections.size(); ++i) { if (sections[i].isNotEmpty()) { XmlElement* const e = xml->createNewChildElement ("SECTION"); e->setAttribute ("name", sections[i]); e->setAttribute ("open", isSectionOpen (i) ? 1 : 0); } } return xml; } void PropertyPanel::restoreOpennessState (const XmlElement& xml) { if (xml.hasTagName ("PROPERTYPANELSTATE")) { const StringArray sections (getSectionNames()); forEachXmlChildElementWithTagName (xml, e, "SECTION") { setSectionOpen (sections.indexOf (e->getStringAttribute ("name")), e->getBoolAttribute ("open")); } viewport.setViewPosition (viewport.getViewPositionX(), xml.getIntAttribute ("scrollPos", viewport.getViewPositionY())); } } //============================================================================== void PropertyPanel::setMessageWhenEmpty (const String& newMessage) { if (messageWhenEmpty != newMessage) { messageWhenEmpty = newMessage; repaint(); } } const String& PropertyPanel::getMessageWhenEmpty() const noexcept { return messageWhenEmpty; }
{ "pile_set_name": "Github" }
Health maintenance strategies for women of different ages. An overview. Preventive health strategies for screening for specific illnesses, counseling, and immunization are discussed. Emphasis is given to cardiovascular screening and risk reduction, screening for malignancies, and immunization practices. A framework for designing periodic health examinations for patients is detailed.
{ "pile_set_name": "PubMed Abstracts" }
Happening Now Jul102012 "Over the last two years, I have worked side by side with Chuck Fleischmann to get our fiscal house in order, advancing solutions that would reduce our nation's crushing burden of debt and get our economy growing. I have been proud to stand with Chuck as House Republicans have changed the culture in Washington from one that prioritizes spending taxpayer dollars, to one that prioritizes saving them. If we're going to avoid President Obama's future of debt, doubt, and decline - we will need proven conservatives like Chuck Fleischmann in Congress and I’m honored to support him," Congressman Ryan said.
{ "pile_set_name": "Pile-CC" }
Show HN: Bon – programming language designed for simplicity, performance, safety - FBMachine https://github.com/FBMachine/bon ====== ngcc_hk Have a quick look. Quite easy to read. Just not sure does it have an advantage over swift which seems quite easy to read, cross 2 platform at least (linux and macOS, the windows seems not on equal footing and five code not working), target llvm. The basic features of a new language is hard as you can see the posting what expected. Macro (may not be lisp level but template), memory Managrment, purpose (embedded, os, driver and application, ai library, CUDA, mobile app etc.), library, platform, examples and q&a under stackoverflow etc. ... wonder what is the point of learning a new one. ------ ubertaco This is really neat! I'm a big fan of Crystal-lang, and I dig the similarity in the sense of "let's start with Ruby-like syntax, and add more static structure". I can see the difference here as being that Bon appears to _behave_ more like Haskell or OCaml rather than like Ruby, which means that there's still a good niche here. I hope this neat language finds success! ~~~ FBMachine Thanks, I really appreciate it! ------ chrislopez How is memory managed? I'm assuming some form of garbage collection. So this can be used in any instance C or C++ can? Can it use C and C++ libraries because it runs on clang? Sorry if these are n00b questions. Bon seems like it could be a nice mix of the wonderful syntax of a python or ruby, and the speed of a C or C++ (or at least a compiled language) ~~~ FBMachine Hi Chris, thanks for checking it out. The first code push for Bon was today, so many things are of course rough around the edges. Memory will be garbage collected, though I am aiming for zero-cost as much as possible. At the moment it just leaks memory like a sieve as I work out the semantics. You can indeed import standard c library calls by using a cdef. You can find examples in the stdlib, e.g.: cdef sqrt(x:float) -> float Thanks again for taking a look! ~~~ bendmorris What is "zero-cost" garbage collection? ~~~ swiftcoder I've seen both Rust's lifetimes/borrow-checker and Objective-C/Swift's automatic reference counting described as "zero cost" (since the bulk of the work is done at compile time). ~~~ m0th87 Rust's borrow checker is zero-cost because it's not doing runtime analysis. But it's not a garbage collector, unless you're using Steve Klabnik's "static garbage collector" terminology [1]. Reference counting is definitely not zero cost. It reduces GC runtime latency for most workloads, but not to zero, and it does so at the cost of reduced bandwidth. 1: [https://words.steveklabnik.com/borrow-checking-escape- analys...](https://words.steveklabnik.com/borrow-checking-escape-analysis-and- the-generational-hypothesis) ------ CJefferson Simplicity, performance and safety? That's everything! What's it bad at? ~~~ orthoxerox Having an stdlib, having a dependency manager and overall stability. ~~~ giancarlostoro Yeah Rust and Go (and D) all have: decent standard libraries (Go exceeds the other two, somewhat resembling Python), a package manager of sorts (Go needsa improve in this aspect, but the strong standard library makes up for it for now, and they are working on it atm), and they're all usually stable. I think the biggest game changers for any new language is a highly competitive standard library out of the box: web server of sorts that can somewhat scale out of the box is usually a must, but at least a simple enough one is ok too, file IO, crypto, etc are also useful, the less code I have to write the more productive I feel. Package management is a must too, even if primitive at first (Go's approach is clean and decentralized to some degree, I love that). ------ charlesetc It seems a bit premature to claim high performance without having a story for memory. I'm sure ocaml, swift, and basically all languages that do any type of runtime garbage collection would be significantly faster without it. ~~~ bunderbunder It's complicated. The best runtime GC nowadays tends to take on some of the performance characteristics of a stack, including that finding a new memory slot is O(1). Heap allocation in many non-GC languages, by contrast, ends up involving some sort of relatively gross search for free memory. The same mechanisms also mean that, if you aren't doing anything in particular to manage your memory layout, the GC language is likely to achieve better locality of reference at run time. This isn't to say that better performance isn't achievable in languages with manual memory management, but doing so often requires a special effort that just isn't going to happen most the time, for reasons of practicality. That said, there are certain classes of program where the story is different: [https://en.wikipedia.org/wiki/The_Computer_Language_Benchmar...](https://en.wikipedia.org/wiki/The_Computer_Language_Benchmarks_Game#Benchmark_programs) ~~~ zokier I think the point was that you can make memory allocation _very fast_ if you do not care about ever freeing memory, but obviously that is not exactly sustainable strategy. So that is why making claims about performance before figuring out memory management story is bit premature. ------ Q6T46nT668w6i3m Is this an extension of Kaleidoscope (the language implemented in the LLVM tutorial)? ~~~ FBMachine I wouldn't call it an extension, but I did use the tutorial to quickly prototype from. There are still some remnants left in the code, but I don't expect much if any to be left in the near future. ------ zestyping I'm curious about scoping. How come `main` in the typeclass.bon example gets to call `norm()` unqualified? Do all the functions in all `impl` definitions just get tossed in one global namespace? If `Norm` is a class, then why are there no `Norm` objects? ~~~ perfunctory This seems to be straight from Haskell. `class` here doesn't mean what it means in oop languages. ~~~ FBMachine Yeah, 'class' in Bon defines a typeclass. While I plan on adding x.norm() as syntactic sugar for norm(x), typeclasses in general are a bit more flexible. For example, while you can use it for polymorphic operator overloading [0], you can also overload a function by changing the types of multiple parameters [1] (as in multiple dispatch). [0] [https://github.com/FBMachine/bon/blob/master/examples/equali...](https://github.com/FBMachine/bon/blob/master/examples/equality.bon) [1] [https://github.com/FBMachine/bon/blob/master/examples/multip...](https://github.com/FBMachine/bon/blob/master/examples/multiple_dispatch.bon) ~~~ bausshf You should look into UFCS from dlang, maybe that can give you some inspiration. [https://dlang.org/spec/function.html#pseudo- member](https://dlang.org/spec/function.html#pseudo-member) ------ FBMachine For those who had questions about how memory is to be managed, the documentation for that work is being tracked here: [https://github.com/FBMachine/bon/blob/auto_mem/docs/ch02-01-...](https://github.com/FBMachine/bon/blob/auto_mem/docs/ch02-01-memory.md) Thanks for all of the feedback! ------ RivieraKid I would love if there was a language combining the strengths of Julia and Swift. Swift has: much nicer handling of optional values, static typing, better for OOP, function calls via dot notation, zero-based indexing. Julia has: better ecosystem for scientific computing, the standard library makes lot of things easier, better REPL, working with arrays is easier. (Just from the top of my head, there are other things.) ------ tropo This is a terrible name conflict. Bon, along with New B, was an immediate ancestor to C. The history gets more confusing with another Bon showing up half a century later. Bon was created for Multics by Ken Thompson. His wife Bonnie, like this other person's mother, was the inspiration for the name. Ken Thompson has naming priority. ~~~ chrislopez Ken Thompson is a person, plain and simple. He is not a god. Naming priority doesn't matter when most programmers haven't heard of old Bon. No one is going to think that new Bon is old Bon if no one knows about old Bon. Maybe there will confusion looking at the history if new Bon takes off, but when is there not in computer science? A simple footnote could suffice to avoid confusion. ------ rurban I esp. like the multiple dispatch and the unifying typesystem. I'll definitely steal something from it ------ IshKebab Looks nicely designed, but are lists really implemented as linked lists? That's surely going to be very slow. ~~~ FBMachine Thanks for checking it out. They are currently implemented similarly to OCaml, so yes they are linked lists. This was purely for simplicity (they can be implemented in a couple of lines of code with algebraic data types). Simplicity of implementation is certainly not my priority, just a short term drive, so it will be revisited in the near future. Thanks! ------ chrislopez Looks interesting! I'll give it a spin.
{ "pile_set_name": "HackerNews" }
Q: Validation of EditText's does not work I have a signup screen. It contains a place for the user's full name, email address and password (the user has to confirm their password). However, it does not work as expected. For the signup button to be enabled the fields have to filled in, in order: top to bottom (this wasn't intended). Moreover, the red colour on the confirm password field does not go away and the signup button does not enable unless the characters are shown. The checking to see if there are characters in all the fields seem to be malfunctioning and I am not sure why. The checking works sometimes and doesn't work other times. Please can someone help me optimize this. There are comments in the code to show what each method does. This is the Layout: <LinearLayout xmlns:android="http://schemas.android.com/apk/res/android" xmlns:tools="http://schemas.android.com/tools" android:layout_width="match_parent" android:layout_height="match_parent" android:paddingLeft="@dimen/activity_horizontal_margin" android:paddingRight="@dimen/activity_horizontal_margin" android:paddingTop="@dimen/activity_vertical_margin" android:paddingBottom="@dimen/activity_vertical_margin" android:orientation="vertical"> <EditText android:layout_width="fill_parent" android:layout_height="wrap_content" android:inputType="textPersonName" android:hint="@string/hintNameField" android:ems="10" android:id="@+id/txtSName" android:layout_marginTop="30dp" android:layout_marginLeft="5dp" android:layout_marginRight="5dp" /> <EditText android:layout_width="fill_parent" android:layout_height="wrap_content" android:inputType="textEmailAddress" android:hint="@string/hintEmailField" android:ems="10" android:id="@+id/txtSEmailAddress" android:layout_marginTop="15dp" android:layout_marginLeft="5dp" android:layout_marginRight="5dp" /> <EditText android:layout_width="fill_parent" android:layout_height="wrap_content" android:inputType="textPassword" android:ems="10" android:id="@+id/txtSPassword" android:hint="@string/hintPasswordField" android:layout_marginTop="15dp" android:layout_marginLeft="5dp" android:layout_marginRight="5dp"/> <EditText android:layout_width="fill_parent" android:layout_height="wrap_content" android:inputType="textPassword" android:ems="10" android:id="@+id/txtSPasswordConfirm" android:hint="@string/hintPasswordConfirmField" android:layout_marginTop="15dp" android:layout_marginLeft="5dp" android:layout_marginRight="5dp" /> <CheckBox android:layout_width="wrap_content" android:layout_height="wrap_content" android:text="@string/showPasswordCheckBox" android:id="@+id/showPasswordCheckBox" android:layout_marginTop="10dp" android:layout_marginLeft="5dp"/> <Button android:layout_width="200dp" android:layout_height="wrap_content" android:text="@string/btnSignUp" android:id="@+id/btnSignUp" android:layout_gravity="center_horizontal" android:layout_marginTop="10dp" android:enabled="false" /> </LinearLayout> This is the Java class for the layout: //this is the full name field snameTxt = (EditText) findViewById(R.id.txtSName); snameTxt.addTextChangedListener(new TextWatcher() { @Override public void beforeTextChanged(CharSequence s, int start, int count, int after) { } @Override public void onTextChanged(CharSequence s, int start, int before, int count) { } @Override public void afterTextChanged(Editable s) { } }); snameTxt.setOnLongClickListener(new View.OnLongClickListener() { @Override public boolean onLongClick(View v) { Toast.makeText(getApplicationContext(), "Please enter your full name", Toast.LENGTH_SHORT).show(); return false; } }); //this is the email address field semailTxt = (EditText) findViewById(R.id.txtSEmailAddress); semailTxt.addTextChangedListener(new TextWatcher() { @Override public void beforeTextChanged(CharSequence s, int start, int count, int after) { } @Override public void onTextChanged(CharSequence s, int start, int before, int count) { } @Override public void afterTextChanged(Editable s) { } }); semailTxt.setOnLongClickListener(new View.OnLongClickListener() { @Override public boolean onLongClick(View v) { Toast.makeText(getApplicationContext(), "Please enter the email address to be associated with your account", Toast.LENGTH_SHORT).show(); return false; } }); //this is the password field spasswordTxt = (EditText) findViewById(R.id.txtSPassword); spasswordTxt.addTextChangedListener(new TextWatcher() { @Override public void beforeTextChanged(CharSequence s, int start, int count, int after) { } @Override public void onTextChanged(CharSequence s, int start, int before, int count) { //the code to enable the button. This needs the most optimization if (String.valueOf(spasswordTxt.getText()).trim().length() > 3 && String.valueOf(snameTxt.getText()).trim().length() > 0 && String.valueOf(semailTxt.getText()).trim().length() > 0) { signupBtn.setEnabled(true); } else { signupBtn.setEnabled(false); } if (String.valueOf(spasswordTxt.getText()).trim().length() < 3) { signupBtn.setEnabled(false); } if (String.valueOf(snameTxt.getText()).trim().length() < 1) { signupBtn.setEnabled(false); } if (String.valueOf(semailTxt.getText()).trim().length() < 1) { signupBtn.setEnabled(false); } } @Override public void afterTextChanged(Editable s) { } }); spasswordTxt.setOnLongClickListener(new View.OnLongClickListener() { @Override public boolean onLongClick(View v) { Toast.makeText(getApplicationContext(), "Please enter a password with a minimum of 4 characters", Toast.LENGTH_SHORT).show(); return false; } }); spasswordconfirmTxt = (EditText) findViewById(R.id.txtSPasswordConfirm); spasswordconfirmTxt.addTextChangedListener(new TextWatcher() { @Override public void beforeTextChanged(CharSequence s, int start, int count, int after) { } @Override public void onTextChanged(CharSequence s, int start, int before, int count) { //if the password and the password confirm fields do not match //then the password confirm field goes red. This also needs optimization if (spasswordconfirmTxt.getText().toString().equals(spasswordTxt.getText().toString())) { spasswordconfirmTxt.getBackground().clearColorFilter(); } else { spasswordconfirmTxt.getBackground().setColorFilter(Color.RED, PorterDuff.Mode.SRC_ATOP); signupBtn.setEnabled(false); } } @Override public void afterTextChanged(Editable s) { } }); //this allows the password field characters to be shown final CheckBox showPasswordCheckBox = (CheckBox) findViewById(R.id.showPasswordCheckBox); showPasswordCheckBox.setOnCheckedChangeListener(new CompoundButton.OnCheckedChangeListener() { @Override public void onCheckedChanged(CompoundButton buttonView, boolean isChecked) { if(!isChecked){ spasswordTxt.setTransformationMethod(PasswordTransformationMethod.getInstance()); spasswordconfirmTxt.setTransformationMethod(PasswordTransformationMethod.getInstance()); } else { spasswordTxt.setTransformationMethod(HideReturnsTransformationMethod.getInstance()); spasswordconfirmTxt.setTransformationMethod(HideReturnsTransformationMethod.getInstance()); } } }); A: I sugget you to use some convenience methods, this would help you to write code which is clearer. For example use this method to check if a field contains a valid strihg: / Checks if a String actually carries information public static boolean isValidString(String string) { if (string == null) { return false; } else { String s = string.trim(); // Remove blank spaces at start and at end if ((s.length() == 0) || (s.equalsIgnoreCase(""))) return false; else return true; } } Going specifically to your problem, I see that the actual validation of the fields is done in the onTextChanged(...) method of the password field, therefore it's obvious that filling the password field at last would carry out the validation, otherwise if you fill the password for first and then go to the other fields, their onTextChanged(...) simply does nothing, therefore the validation isn't carried out. You should add a method which is called in every single onTextChanged(...) callback! For the red colored field, I am not sure if that's the correct approach to adopt, just try to use some different ways to give visual clues, See my blog post for example. However I see that you're not doing the check and therefore not enabling properly the submit button when onTextChanged(...) is fired in the confirmation field, I think you forgot something: @Override public void onTextChanged(CharSequence s, int start, int before, int count) { //if the password and the password confirm fields do not match //then the password confirm field goes red. This also needs optimization if (spasswordconfirmTxt.getText().toString().equals(spasswordTxt.getText().toString())) { spasswordconfirmTxt.getBackground().clearColorFilter(); signupBtn.setEnabled(true); // Enable the button if everything is ok } else { spasswordconfirmTxt.getBackground().setColorFilter(Color.RED, PorterDuff.Mode.SRC_ATOP); signupBtn.setEnabled(false); } } So bottom line is, create another method from which you check all the fields together, which will also enable the button if all check are ok, and make a call to that method whenever ANY of onTextChanged(...) callbacks is fired! Cheers!
{ "pile_set_name": "StackExchange" }
Q: Connection with Wi Fi in android device I am facing a strange problem with my Android ACE phone. I am able to connect to Wi-Fi and able to browse Google. But unable to connect to my Internal Servers / network. What is the problem? Will it be an issue with the device or is it the problem with router? Same Server is accessible through my IPAD2!! My client is telling me that they have not blocked my device from accessing their network.. But my device displays "DNS Error" when i try hitting their server. So is there any way that I can detect if my user agent or device is blocked by the internal router or network?? Thanks in advance, Sneha A: First of all this is not the place to ask this type of questions. This site is for development/programming related questions. Why don't you use https://android.stackexchange.com/. However I think your issue can be fixed by using custom DNS servers like 8.8.8.8 or 8.8.8.4. Or you could run a port scan on your network and see if they have a DNS server.
{ "pile_set_name": "StackExchange" }
1. In a high-resolution, high-speed three dimensional radiation ablation system having an ablation station equipped with means to position a current substrate for processing, means to provide actinic radiation for treating such current substrate at an ablation site, whereby controlled radiation ablation by a sequence of pulses may be inhibited by dynamically produced ablation debris, such ablation station is equipped with a high-speed vacuum debris removal system (DRS) for effective and efficient engulfing and removal of such dynamically produced debris of various sizes, between each pulse of controlled radiation ablation process, characterized by: an improved DRS having a multiplicity of essentially sealed coaxial chambers from a first chamber having a actinic beam admission means (14), and each subsequent chamber similarly having beam admission means, as a composite leading to such ablation site (7) where ablation may take place with the possibility of producing inhibiting particulate debris, such chambers including a plurality of chambers (1, 2 . . . n), the chamber having closest to the ablation site being equipped with means (16) for controlled flow of sweeping gas providing turbulence and flow sufficient to sweep ablation-inhibiting particles (18) at a velocity sufficient to propel such an inhibiting particle (18) selectively into one of said first chamber an intervening chamber, and with diminishing velocity and turbulence to continue sweeping gas flow propelling such ablation-inhibiting particles further from said first chamber and said intervening chamber into an exhaust chamber for disposal. 4. A radiation ablation system with a debris removal subsystem according to claim 1, further characterized by: metering holes interconnecting adjacent chambers for controlling partial pressures to carry particulate debris (18) along both a direct path of diminishing vacuum partial pressures and turbulence and a bypass path. A 5. A radiation ablation system with a debris removal subsystem according to claim 1, further characterized by: metering holes interconnecting adjacent chambers, such metering holes being in such numbers and having such volumetric characteristics as to control partial pressures to carry particulate debris (18) along at least one path of diminishing vacuum partial pressures and turbulence, at least some of such metering holes being capable of passing an inhibiting particle produceable by ablation. 6. A method for debris removal in photoablation, for carrying away products, including particulate debris which inhibit photoablation, according to the following steps: (a) Providing a series of nested gasflow-interconnected chambers in an enclosure generally sealed for vacuum partial pressure differentials between adjacent chambers and permitting passage of photoablation light through all nested chambers, the most distant of such chambers from the photoablation light source being closed by a current substrate for ablation by an actinic light beam, thus providing a final virtual chamber; (c) Providing sweeping gas into an intermediate chamber adjacent to such final virtual chamber, so as to provide circumpetal entry of sweeping gas and particulate debris from the ablation site and into the chamber most distant from the ablation site, such chamber being of expansive volume to serve as a debris collection chamber with diminished turbulence of sweeping gas; and (d) Providing a sweeping gas partial pressure by such metering holes, at least some of which are large enough to pass particulate debris, into an intermediate chamber which severs as a debris exhaust chamber. 7. A method for debris removal in photoablation, for carrying away products, including particulate debris which inhibit photoablation, according to the following steps: (a) Providing a series of nested gasflow-interconnected chambers in an enclosure generally sealed for vacuum partial pressure differentials between adjacent chambers and permitting passage of photoablation light from an ablation riser tube through all nested chambers, the most distant of such chambers from the photoablation light source being closed by a current substrate for ablation by an actinic light beam, thus providing a final virtual chamber at substantially atmospheric pressure; (b) Providing metering holes interconnecting metering gas into such final virtual chamber from an adjacent chamber having an inlet for flowing metering gas at a pressure substantially higher than atmospheric pressure, such metering holes having composite characteristics providing sweeping gas flow at substantially atmospheric pressure flowing circumpedially into an ablation opening and into said ablaton riser tube with minimal lateral flow to carry particulate ablation products gently along a set of paths for diminishing turbulence and diminishing partial pressure from entry of sweeping gas to exit of sweeping gas carrying such ablation-inhibiting particulate debris; and (c) Providing a sweeping gas partial pressure by metering holes positioned beyond said ablation riser tube, at least some of which are large enough to pass particulate debris toward a debris exhaust. Description BACKGROUND OF THE INVENTION (1) Field of the Invention The present invention relates to an inert gas debris removal subsystem to carry off particulate contaminants from the radiation-ablated region of a substrate being treated in a photo-ablation system. and specially relates to such a subsystem with multiple chambers having openings which meter a flow of inert gas in a plurality of chambers through openings for controlled partial pressure differentials in such chambers for particulate-flushing gas flow which does not interfere with the ablation beam or cause contaminant build-up. (2) Description of Related Art Semiconductor devices and integrated circuits are manufactured using multiple layers of different types of materials. These conductive, semi-conductive and insulation type material are deposited or formed on substrate, semiconductor die, wafer, may be used even simply on their own. The predetermined patterns for packaging electronics, biomaterials, etc are then made by removing material by etching, photolithography, photo-ablation, or other material removal techniques. During photo-ablation, the resonant energy is directly coupled into bond vibrational frequencies. This is done by quickly forcing violent vibrations between atoms so that the bonds break. A by-product of the laser ablation process is the formation of laser “debris.” The material that is ejected by the laser ablation process consists of gaseous by-products, carbon, and polymer fragments. It is shown that the macroscopic debris does not appear until more than 0.5 μs after the laser pulse is incident on the surface. Since the excimer laser pulse widths are typically less than 50 ns, the ejected debris does not interfere with the incoming light. The functionality of the imaging is reduced by gaseous and particulate matter and the contamination of the lens elements with the out-gassed particles from the substrate will cause lens distortion and scattering of light from the lens element. Gaseous materials are relatively easier to remove using vacuum, compared with the solid debris material, which is of a greater concern if left unattended. The solids contribute to greater contamination of the surface and may also interfere with incoming light from subsequent pulses. It is therefore advantageous to remove as much as possible of the ejected debris from the ablation area before the next laser pulse begins. Vacuum alone is typically not strong enough to remove the debris from the large volume above the exposed area. A system consisting of forced gas such as nitrogen or helium combined with an exhaust is devised to minimize the effects of the debris and ensure that the exposure site is free of debris prior to the arrival of the next laser pulse. One common practice for carrying off ablation debris involves the use of an inert gas flow across the laser ablation site. Flushing with an inert gas, or with a semi-inert gas such as nitrogen, is intended to prevent oxidizing reactions, cooling the plume and substrate, and flushing the ablated material away from the ablation site. Without debris elimination, large carbon fragments can agglomerate or be redeposited into an area under exposure. Most redeposited fragments can be ablated by subsequent pulses. However, under certain conditions (laser fluence, particle dimensions, and mask defects) some of the fragments may be too large for the laser to remove. Under these circumstances, the carbon cluster will prevent ablation of the polymer layer beneath, which results in a carbon-encapsulated “cone” of un-ablated polymer. The task of effectively removing debris becomes even more challenging where vacuum chucks are employed to hold down the substrate material due to the peeling effect of flexible substrates. These issues pose serious reduction in throughput due to reduced efficiencies of the laser in removing material and producing cleaner vias. However, this invention discloses a vacuum debris removal system designed right around the ablation site to work optimally between pulses to effectively remove debris material to produce clean features without affecting the position of a flexible substrate coating. BRIEF SUMMARY OF THE INVENTION This invention provides a vacuum debris removal system which can continuously remove debris and gases from the process region. The design of the vacuum debris removal system is such that it envelopes the process region, and especially the ablation site on the currently-positioned substrate, concentrically. This allows the radiation beam to be centered in a relatively large opening about the ablation site, so the radiation beam can go through the center of the radiation site opening while the flushing gas and particulates flow about the inner periphery of the radiation site opening. This concentric configuration enables rapid debris removal between pulses and provides a debris-free region for effective material removal using a laser. The flow is directed by differential vacuum partial pressure, and conductances all the way from vacuum pump (lowest partial pressure) to the orifice around the ablation site is designed and calculated such that an optimal speed and vacuum pressure for effective removal is obtained. The throughput of the process is related to speed of traversal and by the rate of ablation or other removal process, but they in turn depend directly on the effective removal of microscopic material before they agglomerate into macro particles and hinder material removal. An object of this invention is to enable the cost-effective fabrication of microelectronic packaging products, biomaterials, micro-fluidics, and thus to enable high throughputs. A feature of this invention is the use of multiple chambers with metering orifices to optimize vacuum partial pressure differentials for the desired sweeping flow. However, this also enables customization for different substrates held by vacuum chucks, and deliver optimal vacuum partial pressures for effective debris removal. Another feature of this invention is that it provides a clear path for the radiation of the ablation beam to go right through the center region of the debris removal region. This is of prime concern due to the ineffectiveness of the debris removal systems acting across the ablation site from the sides. Another feature of the system is that it is designed to surround the ablation site and the chambers of the ablation region from all sides, making it the most effective design for debris removal. Another feature of the invention is the provision for the movement of the debris removal system from the surface of the substrate. This is crucial in optimizing for varying substrate surface materials, particle ejection characteristics and substrate peeling from the substrate vacuum chucks (prevalent in any processing industry). An advantage of this invention is that a virtual chamber formed by the closely-spaced current substrate and the bottom surface of the adjacent metering chamber enclose an envelope of sweeping gas around the ablation site, which keeps ablation debris from escaping to another location on the substrate, but Instead curtail ablation particulate drifting and deliver ablation particulates from the current substrate into the mouth of the ablation orifice in the adjacent metering chamber. Other objects, features, and advantages of the invention will be apparent from the following written description, claims, abstract, and the annexed drawings. FIG. 2 shows the operation of the vacuum debris removal system, showing the three sweeping gas metering chambers R1, R2 and R3 and the virtual centripetal sweeping gas chamber vR4. The debris exhaust chamber R2 is connected to the vacuum pump and a sweeping inert gas inlet is connected to the sweeping gas entry chamber R3. In this case, the sweeping gas is shown as Helium. FIG. 3 shows logically the connections between the three metering chambers of the debris removal subsystem and the flow pattern, in which O1, O2, O3 and O4 represent the composite effect of orifices connecting R3, R2, and R1, and between R1 and R2 respectively. FIG. 5 shows a schematic of pressure differential of the chamber R3 expunging inert gas. In this case Helium. FIG. 6 illustrates the flow of inert sweeping gas from R3, debris and gases into chambers R1 and R2. FIG. 7 illustrates the flow of the mixture of sweeping gases and particulates settled into chambers R1 and thence into R2, and to some extent passing into R2 directly, exhaust chamber R2 being connected to the vacuum pump which maintains lowest partial pressure. Individual items and representative individual items in groups of such items, are shown in the following table: debris collection chamber (R1) 1 debris exhaust chamber (R2) 2 sweeping gas entry chamber (R3) 3 representative atmospheric pressue metering hole 4 ablation opening 5 ablation radiation beam 6 ablation site 7 ablation opening riser tube 8 representative bypass metering hole 9 0 representative direct metering hole 10 1 exhaust outlet 11 2 housing 12 3 housing window seal 13 4 housing window 14 5 currently positioned substrate 15 6 sweeping gas inlet 16 7 representative housing chamber seal 8 representative particle 18 9 virtual sweeping gas chamber vR4 19 DETAILED DESCRIPTION OF THE INVENTION FIG. 1 shows a sectional view of the vacuum debris removal subsystem in context of a photoablation system. A clear path for the ablation radiation beam, which typically is ultraviolet tradiation, and may be generalized in discussion as “UV” or simply “light.” This light could preferably be from an excimer laser or other type of pulsed laser source. The ablation radiation beam 6 is provided generally along the axis line, essentially the centroid of the ablation opening 8, which provides access to the ablation site 7 through all four intervening chambers. Chamber 1, otherwise called the debris collection chamber R1, acts as the turbulence eliminating low pressure region directly in line but most remote from above the processing area, ablation site 7. Its large volume and relatively low partial pressure permit particulate debris to slow down and be carried through the only slightly larger metering holes 10 to the debris exhaust chamber R2. Debris exhaust chamber 2 is connected to the vacuum pump (not shown) through the exhaust outlet 11 which maintains vacuum partial pressure at the lowest level in all of the debris removal subsystem. The air film above the processing region 7 of the current substrate 15, which is so closely adjacent to the bottom surface of housing 12 as to form a virtual chamber vR4 about ablation opening 5. Chamber vR4 is identified as virtual sweeping gas chamber vR4 at reference numeral 19 in the chart. The entry path of the sweeping gas flows circumpetally, that is, radially into ablation opening 5 and away from the substrate 15 in ablation opening riser tube 8. Because the sweeping gas, now carrying particulate matter and gaseous exhaust, enters into the lower partial pressure of debris collection chamber 1, the flow follows the walls of ablation riser tube 8, leaving little interference with the ablation radiation beam 6, which follows the axis at a central position. The sweeping gas with its gaseous and particulate products, collectively “waste,” is sucked primarily into debris exhaust chamber 1, and to a lesser extent, bypasses chamber 1 and passes directly into debris exhaust chamber 2. Sweeping gas entry chamber 3 is connected to an inert gas inlet 16 supplying inert gas at high partial pressure. The sweeping gas is typically one or a mixture of air, nitrogen and helium. Helium is preferred in our embodiment. The sweeping gas, already reduced to a relatively high partial pressure, is fed through multiple atmospheric pressure metering holes 4. The sweeping gas forms an enveloping gas virtual fence around the process region ablation site 7 over the substrate 15. The combination of inert gas, debris particles 18 and air are all removed circumferentially out through the ablation opening 5 between chamber 2 and extension of chamber 1 and through the chamber 2. This keeps the light path clear from any debris, under uniform gas density and free of turbulence. Holes 9 and 10 are used to provide metering gas flow. This flow, in the direction of diminishing partial pressure, constantly but slowly passes from chamber 1, which is sealed away from chamber 2 by o-rings 17. Interim Summary of Structure and Method of Operation The nested chambers provide a balanced path between: (First) high velocity sweeping gas flow to carry debris particles 18 from the processing area ablation site 7; and This method ensures high conductance, and provides the most effective debris 18 removal without contaminating the surrounding optics. Clear optical window 14 is provided on top of the chamber 1 housing 12 and held in place by a housing window seal 13, which in turn seals the chamber 1 away from atmospheric pressure. Scientific Discussion FIG. 2 shows a schematic of the vacuum debris removal subsystem of FIG. 1. FIG. 2 will be helpful for conductance computation, which will follow in the written description text and in the following figures. The flow pattern is clearly illustrated where an envelope of gases from sweeping gas entry chamber 3 would hit the surface of substrate 15 and surround the processing region ablation site 7. The sweeping gas flows through ablation opening 5 and in small measure through bypass metering holes 9 into debris exhaust chamber 2, and primarily through region above ablation opening 8 into debris collection chamber 1. The sweeping gas loses turbulence and any passenger particulate debris settles down in the large debris collection chamber 1. The sweeping gas and passenger particles 18 continue into the debris exhaust chamber 2, through direct metering holes 9 and 10. Desired partial pressures are listed as well as the vacuum pump connection 11 and sweeping gas inlet connection 16. The chambers 1, 2 and 3 will also be referred to as R1, R2 and R3 respectively for ease of understanding, especially with respect to formulations. Conductance of vacuum line leading to the vacuum debris removal system shown in FIGS. 1 and 2 is based on achieving low pressure. In order to achieve low pressure in a vacuum line, gases must be removed by pumping each molecule out; as it is removed it must flow from one end of the tube to the other. The rate of flow of a gas, called the throughput Q, is defined as Q=PVt where P is the pressure at which it is measured, and dV/dt is the volume flow rate. Notice that throughput does not have the same units as ordinary gas flow rate (unit volume/unit time). The units of throughput are pressure×volume/time or energy/time, that is, L atm min−1 (sometimes Torr L/sec or in SI units, Pa m3 s−1, or J s−1, or watts). The throughput depends directly on the resistance to flow and the pressure drop between the entrance and exit to a tube or channel: Q=P2-P1Z=C(P2-P1) where P1 is the downstream pressure (measured at the exit). P2 is the upstream pressure (measured at the entrance), Z=1/C is the resistance and C is the conductance. The conductance is the throughput per unit pressure difference between the tube entrance and exit. The units of conductance are the same that of volume rate or pumping speed, so conductance can be expressed in L/min, L/sec, m3/hour, etc. Therefore, the cumulative conductance is calculated as 1CT=1C1+1C2+1C3+… The nature of gas flow through a tube is quite different at low pressures than at high pressures. In addition, the flow characteristics depend on the flow rate and the geometry of the tube, pipe, chamber or channel through which the gas flows. Three kinds of flow are recognized: turbulent, viscous (laminar), and molecular. The rough ranges of flow for each are summarized in the table. TABLE 1 Summarizes the types of gas flow and their range Flow Type Pressure Reynolds No. Knudsen No. Turbulent High >2200 — Viscous Medium <1200 <0.01 Molecular Low — >1.00 As a result, at any pressure in Molecular Flow, the conductances of tubes, valves, traps, and other passive components is constant and at their lowest value. In Transition Flow, the conductance increases non-linearly as the pressure increase. In Continuum Flow (viscous flow) the conductances increases linearly (and sharply) with pressure. At atmospheric pressure, a particular component's conductance may be 104 times higher than its Molecular Flow value In the region of viscous flow about 10−3 Torr, gas properties depend upon collisions between molecules, which occur much more frequently than between molecules and their container. For viscous flow, the Poiseuille equation gives the throughput through a straight tube of circular cross section. Q=πd4128ηlPave(P2-P1) Where d and l are the tube diameter and length, η is the gas viscosity, and Pave is the average of P2 and P1. If we combine equations, we obtain an equation for the viscous flow conductance in a tube of circular cross section: C=πd4128ηlPave Note that unit of viscosity is the CGS unit, the poise: 1 poise=1 g cm−1 sec−1. The SI unit is the Pa s: 1 Pa s=1 kg m−1 s−1. Thus 1 poise=0.1 Pa s. The viscosity of air at 25° C. is 1.845×10−4 poise=1.845×10−5 Pa s. If d and l are given in centimeters and Pave in torr, then conductance of tube, C in L/sec for air at 25° C. is: C=182d4lPave FIG. 3 shows logically the connections between the three chambers of debris removal system for conductance computation in the following sections. Flow schematic for the debris removal system between the chambers and the substrate is shown, which will be used to compute effective conductance of the system. Here Inert gas from 3 flows through orifice O1 and forms an envelope around the process region 7 and flows both through orifices O2 and O3 into region 2 and 3 respectively. Which in turn is connected to each other though orifice O4. The vacuum pump 11 exhausts debris and gas mixture from the region 2. The concept of choked flow between these orifices is explained below. The conductance computation example along with the formulations will be further employed to describe the invention. FIG. 4 shows orifices and flow through two sections maintained at pressures P1 and P2. For an orifice area A in cm2 and for viscous flow the following equations (after Prandtl) apply to air at 25° C. where δ=p2/p1. Cumulative conductance of 45 orifices from chamber R3 to substrate, all in parallel to each other. C=45 (no. of orifices)*0.1910=8.6 l/s FIG. 6 shows flow through two chambers from the surface of the substrate. Chambers R3, R2 and R1 are maintained at pressures P1, P2 and P3 respectively. The effect of low pressure gas in 1, the chamber R1 is understood by considering two cases, a) Gas at 300 torr and b) Gas at atmospheric pressure. The range of Cumulative conductance of 48 orifices from region R1 to R2, all in parallel to each other. C=48 (no. of orifices)*0.3958=19 l/s The overall conductance of the system is computed with the required conductance from the module connected to vacuum pump is represented as CVP which incorporates pumping speed and conductances of valves, filters etc. The boxes 1 to 8 of the schematic diagram shown in figure represent module independent of the DRS model design. In fact, reducing the requirement for higher flow rate from the vacuum pump and in turn providing a range of velocities for effective debris removal. DRS Gap DRS gap and control of velocity, in turn controlling force required in picking up of debris is equally important in comparison with maintaining of desired conductance. Throughput Q=C*□P =C*F/A since, difference in pressure=Force per unit area F=(Q*A)/C =throughput*area/conductance F∝Q F∝/C F∝A but Q∝C C∝d4/l A∝d2 It can be said for a constant throughput maintained in the lines and DRS F∝l/d2 This is clearly against the requirement for maintaining better conductance. This means that with higher particle ejection rate the increase in particle size makes the conductance and velocity inversely proportional to each other. Thus this unique chamber design accommodates varying velocities and conductance thus delivering a steady state. Optimization over these interdependent chambers for maximizing velocity and conductance and customization depending upon the process, debris size and rate of removal can be done While the invention has been shown preferably through the embodiments illustrated in the FIGS. 1-7, it will be clear to those skilled in the art that the modifications described as alternatives, and other alternatives, may be pursued without departing from the spirit and the scope of the invention, as defined in the following claims.
{ "pile_set_name": "Pile-CC" }
Tell Us About Your Event I look forward to hearing all about your event! Fact: This takes most people less than 20 seconds to fill out. The fastest way I know to get all the info we need in order to help you is by having you fill out the form to the right. Once I review the information, I will put together a proposal and reach out to discuss details. - Ryan TetzloffSales DirectorVirtualRealityRental.co “As an event planner, I found the entire experience very easy to execute, I didn’t have to worry about a thing, VirtualRealityRental.co made it all so seamless and smooth." Melissa CarpenterCapitalOne “The folks at VirtualRealityRental.co are true professionals. They helped us understand what’s possible and guided us to pick the very best VR experiences for our event."
{ "pile_set_name": "Pile-CC" }
I'd love to hear your opinion on what this means, not only for Medicaid, but for this broad swath of federal programs that use incentives to get cooperation from the states. My initial reaction is it probably isn't going to mean a whole lot for the Medicaid expansion in the Affordable Care Act, because the Medicaid expansion is such a good deal for the states. You'll probably hear a lot of complaining about it, and then quiet acceptance by the complaining states. The $64,000 question as to Medicaid is how many states are going to decide that they don't want to cover this expanded population, even with the very substantial financial incentive. I think the bigger concern is for other cooperative federal spending programs. This is the first time the Supreme Court has ever invalidated a condition on federal spending on the grounds that it coerced the states. That's a big deal. That's a really big deal. The court has a couple times in the past suggested that there might possibly be a condition that's coercive. But it's never found something coercive until now. The grounds on which they found this Medicaid expansion to be coercive are not entirely easy to figure out. But they are problematic for other federal spending laws, for other cooperative federal programs. I could foresee, and I do foresee, that there will be a number of challenges over the next months and years to a number of cooperative federal spending programs, like the Elementary and Secondary Education Act, particularly depending on what changes ultimately get made to No Child Left Behind and what kind of regulations get imposed on states for federal education funds. I think there could be challenges to the Individuals with Disabilities Education Act. There could be challenges to the civil rights statutes that impose conditions on the states that accept federal funds, like the Rehabilitation Act, which prohibits disabilities discrimination. So there are lots of possibilities that are opened up by this ruling to challenge well-entrenched cooperative federal spending programs. Those opportunities didn't exist before today because the court had never a condition on federal spending coercive to the states. If this part of the ruling were its own separate decision, it would be a landmark case in the history of federalism jurisprudence. Or that's how it seemed to me. Do you agree? So it is a fractured opinion, there is no majority opinion on the question. So we don't know exactly how much of a watershed this will be. But yes, I will say that if the Medicaid issue were not in the same case as the individual mandate, people would be talking today about what looks like a very significant decision to potentially significantly limit federal conditional spending power, absolutely. We still have to work out exactly what it means. But it is seven justices who voted to conclude that Congress has coerced the states by threatening to take away Medicaid funds from states that don't want to expand Medicaid.
{ "pile_set_name": "OpenWebText2" }
During the drilling, completion, and production phases of wells for petroleum extraction, the downhole use of compositions having high viscosities, including gels, is important for a wide variety of purposes. Higher viscosity fluids can more effectively carry materials (e.g., proppants) to a desired location downhole. Similarly, higher viscosity fluids can more effectively carry materials away from a drilling location downhole. Further, the use of higher viscosity fluids during hydraulic fracturing generally results in larger, more dominant fractures. Higher viscosity fluids are often prepared using fresh water, brine or sea water as base component. Fresh water, however, can be a scarce and costly resource, depending on where the fluid is being prepared or used. Further, brine, sea water or fluids (e.g., water) generally containing high total dissolved solids (TDS), including seawater, flowback water, produced water, formation water, salt-fortified fresh water, salt-fortified sea water, and heavy brine solutions, can adversely affect the viscosity of the fluids.
{ "pile_set_name": "USPTO Backgrounds" }
Status of this Memo This document is an Internet-Draft and is subject to all provisions of section 3 of RFC 3667. By submitting this Internet-Draft, each author represents that any applicable patent or other IPR claims of which he or she is aware have been or will be disclosed, and any of which he or she become aware will be disclosed, in accordance with RFC 3668. Internet-Drafts are working documents of the Internet Engineering Task Force (IETF), its areas, and its working groups. Note that other groups may also distribute working documents as Internet-Drafts. Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as "work in progress." Copyright Notice Copyright (C) The Internet Society (2004). Abstract This document describes the syslog protocol which is used to convey event notification messages. It describes a layered architecture for an easily extensible syslog protocol. It also describes the basic message format and structured elements used to provide meta-information about the message. 1. Introduction This document describes a layered architecture for syslog. The goal of this architecture is to separate functionality into different layers and thus provide easy extensibility. This document describes the semantics of the syslog protocol, outlines the concept of transport mappings and provides a standard format for all syslog messages. It also describes structured data elements, which can be used to transmit easy parsable, structured information. 3. Definitions An application that can receive a message will be called a "receiver". An application that can receive the message and forward it to another receiver will be called a "relay". An application that receives the message and does not relay it to any other receivers will be called a "collector". Please note that a single application can have multiple roles at the same time. The following principles apply to syslog communication: Senders send messages blindly. They do not receive any notification if the recipient received the message nor do they receive any error notifications. Though some transports may provide limited status information, conceptionally syslog is pure simplex communication. Senders send messages to relays or collectors with no knowledge of whether it is a collector or relay. Senders may be configured to send the same message to multiple receivers. Relays may send all or some of the messages that they receive to a subsequent relay or collector. They may also store - or otherwise locally process - some or all messages without forwarding. In those cases, they are acting as both a collector and a relay. Relays may also generate their own messages and send them on to subsequent relays or collectors. In that case it is acting as a sender and a relay. The following deployment scenarios shown in Diagram 1 are valid while the first one has been known to be the most prevalent. Other arrangements of these examples are also acceptable. As noted, in the following diagram relays may pass along all or some of the messages that they receive along with passing along messages that they internally generate. The boxes represent syslog-enabled applications. 4. Transport Layer Protocol This document does not specify any transport layer protocol. Instead, it describes the format of a syslog message in a transport layer independent way. This will require that syslog transports be defined in other documents. The first transport is defined in [13]Okmianski, A., Transmission of syslog messages over UDP, August 2004. and is consistent with the traditional UDP transport. Other transport mappings must ensure that all messages MUST be transmitted unaltered to the destination. If the mapping needs to perform temporary transformations, it MUST be guaranteed that the message received at the final destination is an exact copy of the message sent from the initial originator. Otherwise cryptographic verifiers (like signatures) will be broken. The maximum length of any syslog message is 16,777,216 octets. Any receiver receiving a larger message MUST discard the message. A diagnostic message SHOULD be logged in this case. A receiver MUST be able to receive messages of a length of 480 octets or less. A receiver SHOULD be able to receive messages of a length of 65,535 octets or less. It is RECOMMENDED that receivers have the ability to receive messages up to the maximum message length. If a receiver receives messages within the maximum length, but with a length larger than it handles, the receiver MAY discard or truncate it. The VERSION field denotes the version of the syslog protocol specification. The version number MUST be incremented for each new syslog protocol specification that changes the format. The value specified for the value in this document is version "1". Some additional information about this is specified in Section 9IANA Considerations. FACILITY is an integer that can be used for filtering by the receiver. There exist some traditional FACILITY code semantics for the codes in the range from 0 to 23. These semantics are not closely followed by all senders. Therefore, no specific semantics for FACILITY codes are implied in this document. A syslog sender being incapable of obtaining system time MUST use the following TIMESTAMP: 2000-01-01T00:00:60Z This TIMESTAMP is in the past and it shows a time that never existed, because 1 January 2000 had no leap second. It can never have existed in a valid syslog message of a time-aware sender. A receiver receiving that TIMESTAMP MUST treat it as being well-formed. This represents 20 minutes and 50.52 seconds after the 23rd hour of 12 April 1985 in UTC. Example 2 1985-04-12T18:20:50.52-06:00 This represents the same time as in example 1, but expressed in the eastern US time zone (daylight savings time being observed). Example 3 2003-10-11T22:14:15.003Z This represents 11 October 2003 at 10:14:15pm, 3 milliseconds into the next second. The timestamp is in UTC. The timestamp provides millisecond resolution. The creator may have actually had a better resolution, but by providing just three digits for the fractional settings, it does not tell us. Example 4 2003-08-24T05:14:15.000003-09:00 This represents 24 August 2003 at 05:14:15am, 3 microseconds into the next second. The microsecond resolution is indicated by the additional digits in time-secfrac. The timestamp indicates that its local time is -9 hours from UTC. This timestamp might be created in the US Pacific time zone during daylight savings time. Example 5 - An Invalid TIMESTAMP 2003-08-24T05:14:15.000000003-09:00 This example nearly the same as Example 4, but it is specifying time-secfrac in nanoseconds. This will result in time-secfrac to be longer than the allowed 6 digits, which invalidates it. If the FQDN is not known to the originator, but it knows its IP address and knows that address is statically assigned, it SHOULD use that IP address. If the sender does not know its IP address or if it is statically assigned and the FQDN is not known, it SHOULD specify its host name without domain name. If the FQDN and the host name are not known, and the IP address is not statically assigned or it is not known if it is statically assigned, the sender SHOULD specify the IPv4 or IPv6 address it knows, even if it may be dynamically assigned. If the sender does not know any identifying information, it SHOULD provide the value "0:0:0:0:0:0:0:0". If a sender has multiple IP addresses, it SHOULD use a consistent value in the HOSTNAME field. This consistent value MUST be one of its actual IP addresses. If a sender is running on a machine which has both statically and dynamically assigned addressed, then that consistent value SHOULD be from the statically assigned addresses. As an alternative, the sender MAY use the IP address of the interface that is used to send the message. The SENDER-INST SHOULD identify a specific instance of the sender. It is RECOMMENDED that SENDER-INST contains the operating system process ID, together with a thread ID, if these things exist. No specific format is REQUIRED. The dash character ("-") is a reserved character that MUST only be used to indicate an unidentified instance. STRUCTURED-DATA transports data in a well defined, easily parsable and interpretable format. There are multiple usage scenarios. For example, it may transport meta-information about the syslog message or application-specific information such as traffic counters or IP addresses. STRUCURED-DATA contains none, one or multiple structured data elements, which are referred to as "STR-DATA-ELT" in this document. A STR-DATA-ELT consists of a name and parameter name-value pairs. The name is referred to as SD-ID. It is case-sensitive and uniquely identifies the type and purpose of the element. The name-value pairs are referred to as "SD-PARAM". SD-IDs MUST NOT contain SP or the characters '=', '"', or ']'. IANA controls ALL SD-IDs without a hyphen ('-') in the second character position. Experimental or vendor-specific SD-IDs MUST start with "x-". Values with a hyphen on the second character position and the first character position not being a lower case "x" are undefined and SHOULD NOT be used. Receivers MAY accept them. If a receiver receives a well-formed but unknown SD-ID, it SHOULD ignore the element. Each SD-PARAM consist of a name, referred to as PARAM-NAME, and a value, referred to as PARAM-VALUE. PARAM-NAME is case-sensitive and MUST NOT contain SP or the characters '=', '"', or ']'. Inside PARAM-VALUE, the characters '"', '\' and ']' MUST be escaped. This is necessary to avoid parsing errors. Escaping ']' would not strictly be necessary but is REQUIRED by this specification to avoid parser implementation errors. Each of these three characters MUST be escaped as '\"', '\\' and '\]' respectively. A backslash ('\') followed by none of the three described characters is considered an invalid escape sequence. Upon reception of such an invalid escape sequence, the receiver MUST replace the two-character sequence with only the second character received. It is RECOMMENDED that the receivers logs a diagnostic in this case. All examples in this section only show the structured data part of the message. Examples should be considered to be on one line. They are wrapped on multiple lines for readability purposes only. A description is given after each example. Example 1 - Valid [x-example-iut iut="3" EventSource="Application" EventID="1011"] This example is a structured data element with an experimental SD-ID of type "x-example-iut" which has three parameters. This is nearly the same example as 2, but it has a subtle error. Please note that there is a SP character between the two structured data elements ("]SP["). This is invalid. It will cause the STRUCTURED-DATA field to end after the first element. The second element will be interpreted as part of the MSG field. This example again is nearly the same as 2. It has another subtle error. Please note the SP character after the initial bracket. A structured data element SD-ID must immediately follow the beginning bracket, so the SP character invalidates the STRUCTURED-DATA. Thus, the receiver MAY discard this message. Example 5 - Valid [sigSig Ver="1" RSID="1234" ... Signature="......"] Example 5 is a valid example. It shows a hypothetical IANA assigned SD-I. Please note that the dots denote missing fields, which have been left out for brevity. In this example, the VERSION is 1 and the FACILITY has the value of 888. The message was created on October, 11th 2003 at 10:14:15pm UTC, 3 milliseconds into the next second. The message originated from a host that identifies itself as "mymachine.example.com". The SENDER-NAME is "su" and the SENDER-INST is unknown. Note the two SP characters following SENDER-INST. The second SP character is the STRUCTURED-DATA delimiter. It tells that no STRUCTURED-DATA is present in this message. The MSG is "'su root' failed for lonvick...". In this example, the VERSION is again 1. The FACILITY is within the legacy syslog range (20). The severity is 6 ("Notice" semantics). It was created on 24 August 2003 at 5:14:15am, with a -9 hour offset from UTC, 3 microseconds into the next second. The HOSTNAME is "192.0.2.1", so the sender did not know its FQDN and used the IPv4 address instead. The SENDER-NAME is "myproc" and the SENDER-INST is "10". The message is "%% It's time to make the do-nuts......". This example is modeled after example 1. However, this time it contains STRUCTURED-DATA, a single element with the value "[x-example-iut iut="3" EventSource="Application" EventID="1011"]". The MSG itself is "An application event log entry..." 6. Structured Data IDs The SD-ID "time" MAY be used by the original sender to describe its notion of system time. This SD-ID SHOULD be written if the sender is not properly synchronized with a reliable external time source or if it does not know if its time zone information is correct. The main use of this structured data element is to provide some information on the level of trust of the TIMESTAMP described in Section 5.2.4TIMESTAMP. The "tzknown" parameter indicates if the original sender knows its time zone. If it does so, the value "1" MUST be used. If the time zone information is in doubt, the value "0" MUST be used. If the sender knows its time zone but decides to emit UTC, the value "1" MUST be used (because the time zone is known). The "issynced" parameter indicates if the original sender is synchronized to a reliable external time source, e.g. via NTP. If the original sender is time synchronized, the value "1" SHOULD be used. If not, the value "0" MUST be used. The "syncaccuracy" parameter indicates how accurate the original sender thinks the time synchronization it participates in is. It is an integer describing the maximum number of milliseconds that the clock may be off between synchronization intervals. If the value "0" is used for "issynced", this parameter MUST NOT be specified. If the value "1" is used for "issynced" but the "syncaccuracy" parameter is absent, a receiver SHOULD assume that the time information provided is accurate enough to be considered correct. The "syncaccuracy" parameter SHOULD ONLY be written if the original sender actually has knowledge of the reliability of the external time source. In practice, in most cases, it will gain this in-depth knowledge only through operator configuration. The following is an example of a system that knows that it does neither know its time zone nor if it is being synchronized: [time tzknown="0" issynced="0"] With this information, the sender indicates that its time information cannot be trusted. This may be a hint for the receiver to use its local time instead of the message-provided TIMESTAMP for correlation of multiple messages from different senders. The following is an example of a system that knows its time zone and knows that it is properly synchronized to a reliable external source: [time tzknown="1" issynced="1"] Note: this case SHOULD be assumed by a receiver if no "time" SD-ID is provided by the sender. The following is an example of a system that knows both its time zone and that it is externally synchronized. It also knows the accuracy of the external synchronization: [time tzknown="1" issynced="1" syncaccuracy="60000"] The difference between this and the previous example is that the sender expects that its clock will be kept within 60 seconds of the official time. So if the sender reports it is 9:00:00, it is no earlier than 8:59:00 and no later then 9:01:00. The "ip" parameter denotes the IP address that the sender knows it had at the time of sending this message. It MUST contain the textual representation of an IP address as outlined in Section 5.2.5HOSTNAME. If a sender has multiple IP addresses, it MAY either use a single of its IP addresses in the "ip" parameter or it MAY include multiple "ip" parameters in a single "origin" structured data element. The "enterpriseID" parameter MUST be an 'SMI Network Management Private Enterprise Code', maintained by IANA, whose prefix is iso.org.dod.internet.private.enterprise (1.3.6.1.4.1). The number which follows is unique and may be registered by an on-line form at http://www.iana.org/. Only that number MUST be specified in the "enterpriseID" parameter. The complete up-to-date list of Enterprise Numbers is maintained by IANA at http://www.iana.org/assignments/enterprise-numbers. By specifying an enterpriseID, the vendor allows more specific parsing of the message. This may be of aid to log analyzers and similar processes. The "software" parameter uniquely identifies the software that generated this message. If it is used, "enterpriseID" SHOULD also be specified, so that a specific vendor's software can be identified. The "software" parameter is not the same as the SENDER-NAME header parameter. It always contains the name of the generating software while SENDER-NAME can contain anything else, including an operator-configured value. Specifying the "software" parameter is an aid to log analyzers and similar processes. The "software" parameter is a string. It MUST NOT be longer than 48 characters. 7. Security Considerations This document, in multiple sections, recommends that an implementation writes a diagnostic message to indicate unusual situations or other things noteworthy. Diagnostic messages are a useful tool in finding configuration issues as well as a system penetration. Unfortunately, diagnostic logging can cause issues by itself, for example if an attacker tries to create a denial of service condition by willingly sending malformed messages that will lead to the creation of diagnostic log entries. Due to sheer volume, the resulting diagnostic log entries may exhaust system resources, e.g. processing power, I/O capability or simply storage space. For example, an attacker could flood a system with messages generating diagnostic log entries after he has compromised a system. If the log entries are stored for example in a circular buffer, the flood of diagnostic log entries would eventually overwrite useful previous diagnostics. Besides this risk, diagnostic message, if they occur too frequently, can become meaningless. Common practice is to turn off diagnostic logging if it is too verbose. This potentially removes important diagnostic information which could aid the operator. This document does not impose any restrictions on the MSG content. As such, MSG MAY contain control characters, including the NUL character. In some programming languages (most notably C and C++), the NUL (0x00) character traditionally has a special significance as string terminator. Most, if not all, implementations of these languages assume that a string will not extend beyond the first NUL character. This is primarily a restriction of the supporting run-time libraries. Please note that this restriction is often carried over to programs and script languages written in those languages. As such, NUL characters must be considered with great care and be properly handled. An attacker may deliberately include NUL characters to hide information after them. Incorrect handling of the NUL character may also invalidate cryptographic checksums that are transmitted inside the message. Many popular text editors are also written in languages with this restriction. This means that NUL characters SHOULD NOT be written to a file in an unencoded way - otherwise it would potentially render the file unreadable. The same is true for other control characters. For example, deliberately included backspace characters may be used by an attacker to render parts of the log message unreadable. Similar approaches exist for almost all control characters. Finally, invalid UTF-8 sequences may be used by an attacker to inject ASCII control characters. This is why invalid UTF-8 sequences are not allowed and MUST be rejected. The message length MUST NOT exceed the maximum value outlined in Section 5Required syslog Format. Various problems may result if a sender sends out messages with a greater length. While this document forbids oversize messages, an attacker may deliberately introduce them. As such, it is vital that each receiver performs the necessary sanity checks. An attacker might deliberately send message with the maximum size. This could lead to massive resource consumption and potentially denial of service on the receiver or an interim system. Besides the DoS itself, this could result in the loss of vital log data. As such, a DoS attack could be used as a way to hide another attack. To avoid this problem, the network operator may limit the size of the received message to some value below the maximum supported by the protocol. An implementation may also provide a feature where only a configured number of maximum size messages are allowed and truncation occurs if these occur too frequently. Messages over the minimum to be supported size may be discarded or truncated by the receiver or interim systems. As such, vital log information may be lost. Even messages within that size may be lost if a non-reliable transport mapping is used. In order to prevent information loss, messages should be less then the minimum supported size outlined in Section 5.1Message Length. For best performance and reliability, messages SHOULD be as small as possible. Important information SHOULD be placed as early in the message as possible, as the information at the begin of the message is less likely to be discarded by a size-limited receiver. In case an application includes some user-supplied data within a syslog message, this application should limit the size of this data. Otherwise, an attacker may provide large data in the hope to exploit this potential weakness. The syslog messages are usually presented (placed in a file, displayed on the console, etc.) in the order in which they are received. This is not always in accordance with the sequence in which they were generated. As they are transmitted across an IP network, some out of order receipt should be expected. This may lead to some confusion as messages may be received that would indicate that a process has stopped before it was started. This is somewhat rectified by the TIMESTAMP. However, the accuracy of the TIMESTAMP may not always be sufficiently enough. It is desirable to use a transport with guaranteed delivery, if one is available. In syslog, there is no concept of unified event numbering. Single senders are free to include a sequence number within the MSG but that can hardly be coordinated between multiple senders. In such cases, multiple senders may report that each one is sending message number one. Again, this may be rectified somewhat by the TIMESTAMP. As has been noted, however, even messages from a single sender to a single collector may be received out of order. This situation is compounded when there are several senders configured to send their syslog messages to a single collector. Messages from one sender may be delayed so the collector receives messages from another sender first even though the messages from the first sender were generated before the messages from the second. If there is no sufficiently-precise timestamp or coordinated sequence number, then the messages may be presented in the order in which they were received which may give an inaccurate view of the sequence of actual events. The plethora of configuration options available to the network administrators may further skew the perception of the order of events. It is possible to configure a group of senders to send status messages -or other informative messages- to one collector, while sending messages of relatively higher importance to another collector. Additionally, the messages may be sent to different files on the same collector. If the messages do not contain sufficiently-precise timestamps from the source, it may be difficult to order the messages if they are kept in different places. An administrator may not be able to determine if a record in one file occurred before or after a record in a different file. This may be somewhat alleviated by placing marking messages with a timestamp into all destination files. If these have coordinated timestamps, then there will be some indication of the time of receipt of the individual messages. As such, it is highly recommended to use the best available precision in the TIMESTAMP and use automatic time synchronization on each systems (as, for example, can be done via NTP). Messages may be recorded and replayed at a later time. An attacker may record a set of messages that indicate normal activity of a machine. At a later time, that attacker may remove that machine from the network and replay the syslog messages to the collector. Even with a TIMESTAMP field in the HEADER part, an attacker may record the packets and could simply modify them to reflect the current time before retransmitting them. The administrators may find nothing unusual in the received messages and their receipt would falsely indicate normal activity of the machine. Cryptographically signing messages could prevent the alteration of TIMESTAMPs and thus the reply attack. As there is no mechanism described within this document to ensure delivery, and since the underlying transport may be lossey (e.g. UDP), some messages may be lost. They may either be dropped through network congestion, or they may be maliciously intercepted and discarded. The consequences of the drop of one or more syslog messages cannot be determined. If the messages are simple status updates, then their non-receipt may either not be noticed, or it may cause an annoyance for the system operators. On the other hand, if the messages are more critical, then the administrators may not become aware of a developing and potentially serious problem. Messages may also be intercepted and discarded by an attacker as a way to hide unauthorized activities. It is RECOMMENDED to use a reliable transport mapping to prevent this problem. Besides being discarded, syslog messages may be damaged in transit, or an attacker may maliciously modify them. In such cases, the original contents of the message will not be delivered to the collector. Additionally, if an attacker is positioned between the sender and collector of syslog messages, they may be able to intercept and modify those messages while in-transit to hide unauthorized activities. While there are no strict guidelines pertaining to the MSG format, most syslog messages are generated in human readable form with the assumption that capable administrators should be able to read them and understand their meaning. Neither the syslog protocol nor the syslog application have mechanisms to provide confidentiality of the messages in transit. In most cases passing clear-text messages is a benefit to the operations staff if they are sniffing the packets off of the wire. The operations staff may be able to read the messages and associate them with other events seen from other packets crossing the wire to track down and correct problems. Unfortunately, an attacker may also be able to observe the human-readable contents of syslog messages. The attacker may then use the knowledge gained from those messages to compromise a machine or do other damage. Since there is no control information distributed about any messages or configurations, it is wholly the responsibility of the network administrator to ensure that the messages are actually going to the intended recipient. Cases have been noted where senders were inadvertently configured to send syslog messages to the wrong receiver. In many cases, the inadvertent receiver may not be configured to receive syslog messages and it will probably discard them. In certain other cases, the receipt of syslog messages has been known to cause problems for the unintended recipient. If messages are not going to the intended recipient, then they cannot be reviewed or processed. As it is shown in Figure 1, machines may be configured to relay syslog messages to subsequent relays before reaching a collector. In one particular case, an administrator found that he had mistakenly configured two relays to forward messages with certain Priority values to each other. When either of these machines either received or generated that type of message, it would forward it to the other relay. That relay would, in turn, forward it back. This cycle did cause degradation to the intervening network as well as to the processing availability on the two devices. Network administrators must take care to not cause such a death spiral. Network administrators must take the time to estimate the appropriate size of the syslog receivers. An attacker may perform a Denial of Service attack by filling the disk of the collector with false messages. Placing the records in a circular file may alleviate this but that has the consequence of not ensuring that an administrator will be able to review the records in the future. Along this line, a receiver or collector must have a network interface capable of receiving all messages sent to it. Administrators and network planners must also critically review the network paths between the devices, the relays, and the collectors. Generated syslog messages should not overwhelm any of the network links. In order to reduce the impact of this issue, it is recommended to use transports with guaranteed delivery. As with any system, an attacker may just overwhelm a receiver by sending more messages to it than can be handled by the infrastructure or the device itself. Implementors should attempt to provide features that minimize this threat. Such as only receiving syslog messages from known IP addresses. Nothing in this protocol attempts to eliminate covert channels. Indeed, the unformatted message syntax in the packets could be very amenable to sending embedded secret messages. In fact, just about every aspect of syslog messages lends itself to the conveyance of covert signals. For example, a collusionist could send odd and even PRI values to indicate Morse Code dashes and dots. 8. Notice to RFC Editor This is a note to the RFC editor. This ID is submitted along with ID draft-ietf-syslog-transport-udp and they cross-reference each other. When RFC numbers are determined for each of these IDs, these references will be updated to use the RFC numbers. This section will be removed at that time. Author's Address Appendix A. Implementor Guidelines Information in this section is given as an aid to implementors. While this information is considered to be helpful, it is not normative. As such, an implementation is NOT REQUIRED to implement it in order to claim compliance to this specification. Implementors should note the message size limitations outlined in Section 5.1Message Length and try to keep the most important parts early in the message (within the minimum guaranteed length). This ensures they will be seen by the receiver even if it (or a relay on the message path) truncates the message. The section RECOMMENDS a message header parsing method based on the VERSION field described in Section 5.2.1VERSION. The receiver MUST check the VERSION. If the VERSION is within the set of versions supported by the receiver, it MUST parse the message according to the correct syslog protocol specification. If the receiver does not support the specified VERSION, it SHOULD log a diagnostic message. It SHOULD NOT parse beyond the VERSION field. This is because the header format may have changed in a newer version. It SHOULD NOT try to process the message, but it MAY try this if the administrator has configured the receiver to do so. In the latter case, the results may be undefined. If the administrator has configured the receiver to parse a non-supported version, it SHOULD assume that these messages are legacy syslog messages and parse and process them with respect to RFC 3164Lonvick, C., The BSD Syslog Protocol, August 2001.[11]. To be precise, a receiver receiving an unknown VERSION number, or a message without a valid VERSION, MUST discard the message by default. However, the administrator may configure it to not discard these messages. If that happens, the receiver MUST parse it according to RFC 3164Lonvick, C., The BSD Syslog Protocol, August 2001.[11]. The administrator may again override this setting and configure the receiver to parse the messages in any way. It would be considered good form if the receiver were to attempt to ensure that no application reliability issues occur. The spirit behind these guidelines is that the administrator may sometime need the power to allow overriding of version-specific parsing, but this should be done in the most secure and reliable way. Therefore, the receiver MUST use the appropriate defaults specified above. This document is specific on this point because it is common experience that parsing unknown formats often leads to security issues. All implementations SHOULD try to assign the most appropriate severity to their message. Most importantly, messages designed to enable debugging or testing of software SHOULD be assigned severity 7. Severity 0 SHOULD be reserved for messages of very high importance (like serious hardware failures or imminent power failure). An implementation MAY use severities 0 and 7 for other purposes if this is configured by the administrator. Since severities are very subjective, the receiver SHOULD NOT assume that all senders have the same definition of severity. The TIMESTAMP described in Section 5.2.4TIMESTAMP supports fractional seconds. This provides ground for a very common coding error, where leading zeros are removed from the fractional seconds. For example, the TIMESTAMP "2003-10-11T22:13:14.003" may be erroneously written as "2003-10-11T22:13:14.3". This would indicate 300 milliseconds instead of the 3 milliseconds actually meant. The value "60" in the time-second field is used to indicate a leap second. This MUST NOT be misinterpreted. Developers and implementors are advised to replace the value "60" if seen in the header, with the value "59" if it otherwise can not be processed, e.g. stored to a database. It SHOULD NOT be converted to the first second of the next minute. Please note that such a conversion, if done on the message text itself, will cause cryptographic signatures to become invalid. As such, it is suggested that the adjustment is not performed when the plain message text is to be stored (e.g. for later verification of signatures). In Section 5.2.4.1Syslog Senders Without Knowledge of Time, a specific TIMESTAMP for usage by senders without knowledge of time is defined. This is done to support a special case when a sender is not aware of time at all. It can be argued whether or not such a sender is something that can actually be found in today's IT infrastructure. However, discussion has indicated that those things may exist in practice and as such there should be a guideline established for this case. It may also be assumed that this class of senders will most probably be found in embedded devices. Note well: an implementation MUST emit a valid TIMESTAMP if the underlying operating system, programming system and hardware supports the clock function. A proper TIMESTAMP MUST be emitted even if it is difficult, but doable, to obtain the system time. The TIMESTAMP described in Section 5.2.4.1Syslog Senders Without Knowledge of Time MUST only be used when it is actually impossible to obtain time information. This rule SHOULD NOT be used as an excuse for lazy implementations. If a receiver receives that special TIMESTAMP, it SHOULD know that the sender had no idea of what the time actually is and act accordingly. The objective behind SENDER-INSTSENDER-INST is to provide a quick way to detect a new instance of the same sender. It must be noted that this is not reliable as a second incarnation of a SENDER-INST may actually be able to use the same SENDER-INST value as the prior one. Properly used, the SENDER-INST can be helpful for analysis purposes. It is RECOMMENDED that the value of "0" be the default for the "tzknown"tzknown parameter. It SHOULD only be changed to "1" after the administrator has specifically configured the time zone. The value "1" MAY be used as the default if the underlying operating system provides accurate time zone information. It is still advised that the administrator explicitly acknowledges the correctness of the time zone information. It is important not to create a false impression of accuracy with the time SD-IDtime. A sender MUST only indicate a given accuracy if it actually knows it is within these bounds. It is generally assumed that the sender gains this in-depth knowledge through operator configuration. As such, by default, an accuracy SHOULD NOT be provided. In Section 7.1Diagnostic Logging, this document describes the need as well as potential problems of diagnostic logging. In this section, a real-world approach to useful diagnostic logging is RECOMMENDED. While this document recommends to write meaningful diagnostic logs, it also recommends to allow an operator to limit the amount of diagnostic logging. At least, an implementation SHOULD differentiate between critical, informational and debugging diagnostic message. Critical messages should only be issued in real critical states, e.g. expected or happening malfunction of the application or parts of it. A strong indication of an ongoing attack may also be considered critical. As a guideline, there should be very few critical messages. Informational messages should indicate all conditions not fully correct, but still within the bounds of normal processing. A diagnostic message logging the fact that a malformed message has been received is a good example of this category. A debug diagnostic message should not be needed during normal operation, but merely as a tool for setting up or testing a system (which includes the process of an operator configuring multiple syslog applications in a complex environment). An application may decide to not provide any debugging diagnostic messages. An administrator should be able to configure the level for which diagnostic messages will be written. Non-configured diagnostic should not be written but discarded. An implementor may create as many different levels of diagnostic messages as he see useful - the above recommendation is just based on real-world experience of what is considered useful. Please note that experience also shows that too many levels of diagnostics typically do no good, because the typical administrator may no longer be able to understand what each level means. Even with this categorization, a single diagnostic (or a set of them) may frequently be generated when a specific condition exists (or a system is being attacked). It will lead to the security issues outlined at the beginning of this section. To solve this, it is recommended that an implementation be allowed to set a limit of how many duplicate diagnostic messages will be generated within a limited amount of time. For example, an administrator should be able to configure that groups of 50 identical messages are logged within a specified time period with only a single diagnostic message. All subsequent identical messages will be discarded until the next time interval. It is usually considered good form to generate a subsequent message identifying the number of duplicate messages that were discarded. While this causes some information loss, it is considered a good compromise between avoiding overruns and providing most in-depth diagnostic information. An implementation offering this feature should allow the administrator to configure the number of duplicate messages as well as the time interval to whatever the administrator thinks to be reasonable for his needs. It is up to the implementor of what the term "duplicate" means. Some may decide that only totally identical (in byte-to-byte comparison) messages are actually duplicate, some other may say that a message which is of identical type but with just some changed parameter (e.g. changed remote host address) is also considered to be a duplicate. Both approaches have their advantages and disadvantages. Probably, it is best to also leave this configurable and allow the administrator to set the parameters. Intellectual Property Statement The IETF takes no position regarding the validity or scope of any Intellectual Property Rights or other rights that might be claimed to pertain to the implementation or use of the technology described in this document or the extent to which any license under such rights might or might not be available; nor does it represent that it has made any independent effort to identify any such rights. Information on the procedures with respect to rights in RFC documents can be found in BCP 78 and BCP 79. Copies of IPR disclosures made to the IETF Secretariat and any assurances of licenses to be made available, or the result of an attempt made to obtain a general license or permission for the use of such proprietary rights by implementers or users of this specification can be obtained from the IETF on-line IPR repository at http://www.ietf.org/ipr. The IETF invites any interested party to bring to its attention any copyrights, patents or patent applications, or other proprietary rights that may cover technology that may be required to implement this standard. Please address the information to the IETF at ietf-ipr@ietf.org. Disclaimer of Validity This document and the information contained herein are provided on an "AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY AND THE INTERNET ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Copyright Statement Copyright (C) The Internet Society (2004). This document is subject to the rights, licenses and restrictions contained in BCP 78, and except as set forth therein, the authors retain all their rights. Acknowledgment Funding for the RFC Editor function is currently provided by the Internet Society.
{ "pile_set_name": "Pile-CC" }
FOXO3a: a novel player in thyroid carcinogenesis? The forkhead box transcription factor FOXO3a has recently been identified as central mediator of the cellular response to oxidative stress inducing cell cycle arrest or apoptosis. The aim of our study was to investigate the regulation of FOXO3a in the thyroid and to determine whether alterations in FOXO3a activity occur in thyroid carcinogenesis. In vitro, we demonstrate that FOXO3a activity is negatively regulated by the PI3K/Akt cascade promoting increased phosphorylation and cytoplasmatic accumulation of FOXO3a with decreased transcription of the target genes p27kip (CDKN1B) and Bim (BCL2L11), but increased expression of GADD45A. By contrast, we show that H(2)O(2) exposure activates FOXO3a in thyrocytes with JNK (MAPK8)-mediated nuclear accumulation of FOXO3a and increased expression of the cell cycle arrest genes p27kip and GADD45A. In vivo, we observed a marked cytoplasmatic accumulation of FOXO3a in differentiated thyroid cancers versus an exclusive nuclear accumulation in follicular adenoma and normal thyroid tissue. Moreover, this cytosolic accumulation of FOXO3a correlated with an increased phospho-Akt expression in thyroid malignancies and was accompanied by decreased expression of the FOXO targets p27kip and Bim and an increase in GADD45A mRNA expression in the thyroid cancers. Our data suggest FOXO3a as a novel player of cellular stress response in the thyroid, mediating the thyrocyte's fate either to survive or to undergo apoptosis. Furthermore, PI3K-dependent FOXO3a inactivation may be a novel pathomechanism for the escape from apoptosis in thyroid cancer cells, in particular in follicular thyroid carcinoma.
{ "pile_set_name": "PubMed Abstracts" }
105 F.2d 157 (1939) In re POVILL. Appeal of PEOPLE'S NAT. BANK OF BROOKLYN, N. Y. No. 373. Circuit Court of Appeals, Second Circuit. June 26, 1939. *158 McLean, Ferris, Ely & Fain, of New York City (Marshall McLean and Sarah H. McLean, both of New York City, of counsel), for appellant. Max D. Frant, of Brooklyn, N. Y. (Joseph W. Gottlieb and I. Louis Kottler, both of Brooklyn, N. Y., of counsel), for appellee. Before SWAN, CHASE, and PATTERSON, Circuit Judges. PATTERSON, Circuit Judge. The chief question is whether the listing of an outlawed claim in the bankrupt's schedules was an acknowledgment sufficient to revive the claim. The bankrupt filed voluntary petition in bankruptcy in December, 1937, listing People's National Bank as a creditor for $5,445. In due course the bank filed proof of claim for that amount, based on two demand notes made in 1928. Unless the transactions referred to below are to be deemed payments made by the bankrupt, the last payments on account of the notes occurred more than six years before bankruptcy. No other claims were filed. The bankrupt having applied for discharge, the bank entered specifications in opposition. The bankrupt countered by a motion to have the bank's claim expunged as barred by the statute of limitations. In resisting the motion the bank relied on the inclusion of the claim in the schedule of debts filed by the bankrupt. The bank also gave proof that within six years prior to bankruptcy it had applied balances in a checking account maintained with it by the bankrupt against overdue interest on the notes, and that the bankrupt had made no protest when informed of such action. It urged that these transactions *159 amounted to payments by the bankrupt within six years. The referee who heard the matter expunged the claim, and the district court affirmed. The preliminary point is raised that the bankrupt had no standing to object to the claim. By section 57d of the Bankruptcy Act, 11 U.S.C.A. § 93(d), the right to object to claims is accorded to "parties in interest". It was held in Gregg Grain Co. v. Walker Grain Co., 5 Cir., 285 F. 156; certiorari denied, 262 U.S. 746, 43 S.Ct. 522, 67 L.Ed. 1212, that in cases where the estate was insolvent the bankrupt would not be permitted to contest claims. The holding had some support in General Order XXI(6), 11 U.S.C.A. following section 53, which at that time provided that "the trustee or any creditor" might have reexamination of a claim. But General Order XXI(6), as amended in 1933, 11 U.S.C.A. following section 53, now provides that claims will be reexamined at the instance of "the trustee or any creditor or the bankrupt or debtor". This order is expository of section 57(d) of the Act, and it would seem that a bankrupt may now move to expunge a claim filed against the estate, whether the estate be solvent or insolvent. Whether that is the rule in all cases, however, need not be decided. In the present case no other claims were filed. Any assets that might be discovered would go, subject to expenses, to the bankrupt himself if the bank's claim were invalid. The bankrupt thus had a direct interest in having the bank's claim disallowed. It is worth noting that the controversy between the parties arose when the bank opposed the bankrupt's discharge, and while a creditor who has no claim on file in the bankruptcy proceeding may oppose discharge, In re Ruhlman, 2 Cir., 279 F. 250; In re Ulrich, D.C., 18 F.Supp. 919, a decision of the motion to expunge the claim on the ground urged here, that it was outlawed, would in effect be decisive of the bank's right to be heard in opposition to discharge. We are of opinion that the bankrupt was a party in interest and might properly demand that the bank's claim be reexamined. A claim already outlawed by limitation when a bankruptcy proceeding is commenced may not be allowed as a claim against the bankrupt estate where appropriate objection is made. The pertinent statute of limitations is that of the state where the district court in which the bankruptcy proceedings are pending sits. Hargadine-McKittrick Dry Goods Co. v. Hudson, 8 Cir., 122 F. 232; In re Weidenfeld, 2 Cir., 277 F. 59; In re German-American Improvement Co., 2 Cir., 3 F. 2d 572. In New York the statutory period for claims on promissory notes is six years. More than six years having elapsed between the last payments made by the bankrupt on the notes and the commencement of the bankruptcy proceeding, the claim was properly disallowed unless there be merit in the one or the other of the claimant's points in rebuttal. The claimant's main position is that the bankrupt's scheduling of the claim was an acknowledgment of it and sufficed to take it out of the statute of limitations. At common law an acknowledgment by the debtor of a barred debt operated as a revival of the debt, but only if the acknowledgment were such that a promise to pay might fairly be implied. Bloodgood v. Bruen, 8 N.Y. 362; Wakeman v. Sherman, 9 N.Y. 85; Bell v. Morrison, 1 Pet. 351, 7 L.Ed. 174. An oral acknowledgment was enough. Shapley v. Abbott, 42 N.Y. 443, 1 Am.Rep. 548. A New York statute, originally section 110 of the Code of Procedure and now section 59 of the Civil Practice Act, provides that "an acknowledgment or promise contained in a writing signed by the party to be charged" is the only competent evidence (other than a payment on account of principal or interest) of a new or continuing contract whereby to take a case out of the operation of the statutes of limitations. The act, like similar acts in other states, was taken from Lord Tenterden's Act, 9 Geo. IV, c. 14. While it speaks broadly of an acknowledgment taking a case out of limitations, the common law as to the character of the acknowledgment was carried over, save that an unwritten acknowledgment would no longer serve. The act changed nothing but the mode of proof. Haydon v. Williams, 7 Bing. 163; Shapley v. Abbott, supra; Kincaid v. Archibald, 73 N.Y. 189. Under the act, as at common law, an acknowledgment is effective only if it imports an intention to pay or at least contains nothing inconsistent with an intention to pay. Manchester v. Braedner, 107 N.Y. 346, 14 N.E. 405, 1 Am.St.Rep. 829; Connecticut Trust & Safe Deposit Co. v. Wead, 172 N.Y. 497, 65 N.E. 261, 92 Am.St.Rep. 756. *160 The listing of a claim in a bankrupt's schedules, without notation that it is disputed or barred, is an acknowledgment of the debt in a literal sense. Section 7 of the Bankruptcy Act, 11 U.S.C.A. § 25 as it then read, made it the duty of a bankrupt to prepare, swear to and file a list of "his creditors", showing the amounts due each of them. The listing is not, however, an acknowledgment that implies an intention by the bankrupt to pay the debt. On the contrary, it signifies an intention by the bankrupt not to pay. We take the New York statute as construed by the court of last resort of that state and are brought to the conclusion that the scheduling of a debt by a bankrupt in his schedule of debts is not an acknowledgment that revives an outlawed debt. There are early cases in New York to the effect that the listing of a barred claim by an insolvent debtor is an acknowledgment that revives the claim. Bryar v. Willcocks, 3 Cow. 159; Stuart v. Foster, 18 Abb.Prac. 305, 28 How.Prac. 273. Later statements, while only dicta, are the other way. See Pickett v. Leonard, 34 N.Y. 175, 179; Hyde Park Flint Bottle Co. v. Miller, 179 App.Div. 73, 74, 166 N.Y.S. 110. The soundness of these later statements cannot be doubted in view of the general principle recognized in Manchester v. Braedner, supra, and Connecticut Trust & Safe Deposit Co. v. Wead, supra. Our conclusion is in line with numerous decisions in other courts that the listing of a claim by a bankrupt or insolvent debtor is not an acknowledgment that takes the claim out of the statute of limitations. Georgia Insurance & Trust Co. v. Ellicott, Fed. Cas. No. 5,354, Taney 130; In re Kingsley, Fed.Cas. No. 7,819, 1 Lowell 216; In re Ray, Fed.Cas. No. 11,589, 2 Ben. 53; In re Lipman, D.C., 94 F. 353; In re Resler, D.C., 95 F. 804; In re Wooten, D. C., 118 F. 670; In re Sanders, D.C., 20 F.Supp. 98; Roscoe v. Hale, 7 Gray 274; Stoddard v. Doane, 7 Gray 387; Richardson v. Thomas, 13 Gray 381, 74 Am.Dec. 636; Christy v. Flemington, 10 Pa. 129, 49 Am.Dec. 590; Hidden v. Cozzens, 2 R. I. 401, 60 Am.Dec. 93. See, also, Wood on Limitations, § 71; Remington on Bankruptcy, 962. The distinction attempted in In re Currier, D.C., 192 F. 695, that the bankrupt's scheduling of a barred claim takes the claim out of the statute as to the bankrupt but not as to other creditors, cannot be supported. The claimant also submits that its application of the bankrupt's balance in his checking account against the amount owing on the notes was equivalent to a payment made by the bankrupt and started the statute anew. It is law in New York that the creditor's use of moneys received by him from collateral security toward payment of the debt does not interrupt the running of limitations. Brooklyn Bank v. Barnaby, 197 N.Y. 210, 90 N.E. 834, 27 L.R.A.,N.S., 843; Security Bank v. Finkelstein, 160 App.Div. 315, affirmed 217 N.Y. 707, 112 N.E. 1076. There is no substantial difference between those cases and the present one. The bank's use of the bankrupt's checking balance to reduce his indebtedness on the notes did not interrupt the running of limitations. The order of the district court was right and will be affirmed.
{ "pile_set_name": "FreeLaw" }
Q: Changing URL through html select What is the best way to change your URL through an html select? <select> <option selected="selected">Change to URL X</option> <option>Change to URL Y</option> </select> What Javascript should be used? A: <script type="text/javascript"> function navigateTo(sel, target, newWindow) { var url = sel.options[sel.selectedIndex].value; if (newWindow) { window.open(url, target, '--- attributes here, see below ---'); } else { window[target].location.href = url; } } </script> <select onchange="navigateTo(this, 'window', false);"> <option selected="selected" value="http://www.example.com/#X">Change to URL X</option> <option value="http://www.example.com/#Y">Change to URL Y</option> </select> Some useful values of target might be 'window' (the current window) or 'top' (to break out of a frameset or iframe). If you want to open a new window instead, you could use navigateTo(this, 'someWindow', true); The value of '--- attributes ---' is set using various properties as documented here for Mozilla and here for IE. For example: 'height=300,width=400,top=100,left=100,statusbar=0,toolbar=1' A: If you have jQuery you could do... javascript: $('#select_url').change(function(evnt){ location.href = $(this).val(); }); html: ...
{ "pile_set_name": "StackExchange" }
New Zealand at the 1980 Summer Olympics New Zealand competed in the 1980 Summer Olympics in Moscow, USSR. In partial support of the US-led boycott, the banner of the NZOCGA was used instead of its national flag. Tay Wilson was the chef de mission. New Zealand's then largest team had been nominated with 99 competitors. However, only four New Zealand athletes competed as independents after the New Zealand government applied pressure to support the boycott. Background The 1980 Summer Olympics were hosted by the Soviet Union. After the host country invaded Afghanistan in December 1979, American president Jimmy Carter called for a boycott of the Moscow Games. On 8 May 1980, the New Zealand Olympic and Commonwealth Games Organising Committee (NZOCGA) accepted the invitation for New Zealand to participate in the Olympic Games. The Muldoon government stepped in and threatened the NZOCGA with funding cuts and cancelled leave for competitors who were in the public service. On 29 May, the NZOCGA announced that no sponsorship or government funds would be used to fund the New Zealand team in Moscow. On 3 June, the NZOCGA announced that it would not send the New Zealand team. Four athletes decided to go as independents: a modern pentathlete and three canoers. The decision for the canoers was based on the fact that they did not receive funding from the NZOCGA anyway so were not subject to their (or the government's) threat of funding cuts. An estimated 200 New Zealand spectators travelled to Moscow in support of the New Zealand team. By the time it became known that New Zealanders competed in two sports only those events had sold out. Of the other athletes, 61 attended other Olympic Games but the remaining 34 missed out completely; the 34 were: Archery Garry Wright Athletics Karen Page Mike Parker Kim Robertson Cycling Kevin Blackwell Eric Mackenzie Jack Swart Gymnastics Rowena Davis Hockey Pat Barwick Christine Berry Sue Emerson Marianne Gray Allana Hiha Karen Thomas Janice Neil Judith Phillips Gail Rodbourn Edith Weber Jeff Gibson Judo David Clark Rowing Tony Brook Alan Cotter Stephen Donaldson Duncan Holland Peter Jansen Robert Robinson Anthony Russell Shooting Jack Scott Wayne Williams Swimming Melanie Jones Paul Rowe Yachting Rick Dodson Andrew Knowles Gerald Sly Results by event Canoeing Modern pentathlon References External links sports-reference Category:Nations at the 1980 Summer Olympics 1980 Summer Olympics Summer Olympics
{ "pile_set_name": "Wikipedia (en)" }
op { graph_op_name: "Print" visibility: SKIP }
{ "pile_set_name": "Github" }
// boost::compressed_pair test program // (C) Copyright John Maddock 2000. // Use, modification and distribution are subject to the Boost Software License, // Version 1.0. (See accompanying file LICENSE_1_0.txt or copy at // http://www.boost.org/LICENSE_1_0.txt). // standalone test program for <boost/call_traits.hpp> // 18 Mar 2002: // Changed some names to prevent conflicts with some new type_traits additions. // 03 Oct 2000: // Enabled extra tests for VC6. #include <iostream> #include <iomanip> #include <algorithm> #include <typeinfo> #include <boost/call_traits.hpp> #include <libs/type_traits/test/test.hpp> #include <libs/type_traits/test/check_type.hpp> #ifdef BOOST_MSVC #pragma warning(disable:4181) // : warning C4181: qualifier applied to reference type; ignored #endif // a way prevent warnings for unused variables template<class T> inline void unused_variable(const T&) {} // // struct contained models a type that contains a type (for example std::pair) // arrays are contained by value, and have to be treated as a special case: // template <class T> struct contained { // define our typedefs first, arrays are stored by value // so value_type is not the same as result_type: typedef typename boost::call_traits<T>::param_type param_type; typedef typename boost::call_traits<T>::reference reference; typedef typename boost::call_traits<T>::const_reference const_reference; typedef T value_type; typedef typename boost::call_traits<T>::value_type result_type; // stored value: value_type v_; // constructors: contained() {} contained(param_type p) : v_(p){} // return byval: result_type value()const { return v_; } // return by_ref: reference get() { return v_; } const_reference const_get()const { return v_; } // pass value: void call(param_type){} private: contained& operator=(const contained&); }; #ifndef BOOST_NO_TEMPLATE_PARTIAL_SPECIALIZATION template <class T, std::size_t N> struct contained<T[N]> { typedef typename boost::call_traits<T[N]>::param_type param_type; typedef typename boost::call_traits<T[N]>::reference reference; typedef typename boost::call_traits<T[N]>::const_reference const_reference; typedef T value_type[N]; typedef typename boost::call_traits<T[N]>::value_type result_type; value_type v_; contained(param_type p) { std::copy(p, p+N, v_); } // return byval: result_type value()const { return v_; } // return by_ref: reference get() { return v_; } const_reference const_get()const { return v_; } void call(param_type){} private: contained& operator=(const contained&); }; #endif template <class T> contained<typename boost::call_traits<T>::value_type> test_wrap_type(const T& t) { typedef typename boost::call_traits<T>::value_type ct; return contained<ct>(t); } namespace test{ template <class T1, class T2> std::pair< typename boost::call_traits<T1>::value_type, typename boost::call_traits<T2>::value_type> make_pair(const T1& t1, const T2& t2) { return std::pair< typename boost::call_traits<T1>::value_type, typename boost::call_traits<T2>::value_type>(t1, t2); } } // namespace test using namespace std; // // struct call_traits_checker: // verifies behaviour of contained example: // template <class T> struct call_traits_checker { typedef typename boost::call_traits<T>::param_type param_type; void operator()(param_type); }; template <class T> void call_traits_checker<T>::operator()(param_type p) { T t(p); contained<T> c(t); cout << "checking contained<" << typeid(T).name() << ">..." << endl; BOOST_CHECK(t == c.value()); BOOST_CHECK(t == c.get()); BOOST_CHECK(t == c.const_get()); #ifndef __ICL //cout << "typeof contained<" << typeid(T).name() << ">::v_ is: " << typeid(&contained<T>::v_).name() << endl; cout << "typeof contained<" << typeid(T).name() << ">::value() is: " << typeid(&contained<T>::value).name() << endl; cout << "typeof contained<" << typeid(T).name() << ">::get() is: " << typeid(&contained<T>::get).name() << endl; cout << "typeof contained<" << typeid(T).name() << ">::const_get() is: " << typeid(&contained<T>::const_get).name() << endl; cout << "typeof contained<" << typeid(T).name() << ">::call() is: " << typeid(&contained<T>::call).name() << endl; cout << endl; #endif } #ifndef BOOST_NO_TEMPLATE_PARTIAL_SPECIALIZATION template <class T, std::size_t N> struct call_traits_checker<T[N]> { typedef typename boost::call_traits<T[N]>::param_type param_type; void operator()(param_type t) { contained<T[N]> c(t); cout << "checking contained<" << typeid(T[N]).name() << ">..." << endl; unsigned int i = 0; for(i = 0; i < N; ++i) BOOST_CHECK(t[i] == c.value()[i]); for(i = 0; i < N; ++i) BOOST_CHECK(t[i] == c.get()[i]); for(i = 0; i < N; ++i) BOOST_CHECK(t[i] == c.const_get()[i]); cout << "typeof contained<" << typeid(T[N]).name() << ">::v_ is: " << typeid(&contained<T[N]>::v_).name() << endl; cout << "typeof contained<" << typeid(T[N]).name() << ">::value is: " << typeid(&contained<T[N]>::value).name() << endl; cout << "typeof contained<" << typeid(T[N]).name() << ">::get is: " << typeid(&contained<T[N]>::get).name() << endl; cout << "typeof contained<" << typeid(T[N]).name() << ">::const_get is: " << typeid(&contained<T[N]>::const_get).name() << endl; cout << "typeof contained<" << typeid(T[N]).name() << ">::call is: " << typeid(&contained<T[N]>::call).name() << endl; cout << endl; } }; #endif // // check_wrap: template <class W, class U> void check_wrap(const W& w, const U& u) { cout << "checking " << typeid(W).name() << "..." << endl; BOOST_CHECK(w.value() == u); } // // check_make_pair: // verifies behaviour of "make_pair": // template <class T, class U, class V> void check_make_pair(T c, U u, V v) { cout << "checking std::pair<" << typeid(c.first).name() << ", " << typeid(c.second).name() << ">..." << endl; BOOST_CHECK(c.first == u); BOOST_CHECK(c.second == v); cout << endl; } struct comparible_UDT { int i_; comparible_UDT() : i_(2){} comparible_UDT(const comparible_UDT& other) : i_(other.i_){} comparible_UDT& operator=(const comparible_UDT& other) { i_ = other.i_; return *this; } bool operator == (const comparible_UDT& v){ return v.i_ == i_; } }; int main() { call_traits_checker<comparible_UDT> c1; comparible_UDT u; c1(u); call_traits_checker<int> c2; call_traits_checker<enum_UDT> c2b; int i = 2; c2(i); c2b(one); int* pi = &i; int a[2] = {1,2}; #if defined(BOOST_MSVC6_MEMBER_TEMPLATES) && !defined(__ICL) call_traits_checker<int*> c3; c3(pi); call_traits_checker<int&> c4; c4(i); call_traits_checker<const int&> c5; c5(i); #if !defined (BOOST_NO_TEMPLATE_PARTIAL_SPECIALIZATION) && !defined(__MWERKS__) && !defined(__SUNPRO_CC) call_traits_checker<int[2]> c6; c6(a); #endif #endif check_wrap(test_wrap_type(2), 2); #if !defined(BOOST_NO_TEMPLATE_PARTIAL_SPECIALIZATION) && !defined(__SUNPRO_CC) check_wrap(test_wrap_type(a), a); check_make_pair(test::make_pair(a, a), a, a); #endif // cv-qualifiers applied to reference types should have no effect // declare these here for later use with is_reference and remove_reference: typedef int& r_type; typedef const r_type cr_type; BOOST_CHECK_TYPE(comparible_UDT, boost::call_traits<comparible_UDT>::value_type); BOOST_CHECK_TYPE(comparible_UDT&, boost::call_traits<comparible_UDT>::reference); BOOST_CHECK_TYPE(const comparible_UDT&, boost::call_traits<comparible_UDT>::const_reference); BOOST_CHECK_TYPE(const comparible_UDT&, boost::call_traits<comparible_UDT>::param_type); BOOST_CHECK_TYPE(int, boost::call_traits<int>::value_type); BOOST_CHECK_TYPE(int&, boost::call_traits<int>::reference); BOOST_CHECK_TYPE(const int&, boost::call_traits<int>::const_reference); BOOST_CHECK_TYPE(const int, boost::call_traits<int>::param_type); BOOST_CHECK_TYPE(int*, boost::call_traits<int*>::value_type); BOOST_CHECK_TYPE(int*&, boost::call_traits<int*>::reference); BOOST_CHECK_TYPE(int*const&, boost::call_traits<int*>::const_reference); BOOST_CHECK_TYPE(int*const, boost::call_traits<int*>::param_type); #if defined(BOOST_MSVC6_MEMBER_TEMPLATES) BOOST_CHECK_TYPE(int&, boost::call_traits<int&>::value_type); BOOST_CHECK_TYPE(int&, boost::call_traits<int&>::reference); BOOST_CHECK_TYPE(const int&, boost::call_traits<int&>::const_reference); BOOST_CHECK_TYPE(int&, boost::call_traits<int&>::param_type); #if !(defined(__GNUC__) && ((__GNUC__ < 3) || (__GNUC__ == 3) && (__GNUC_MINOR__ < 1))) BOOST_CHECK_TYPE(int&, boost::call_traits<cr_type>::value_type); BOOST_CHECK_TYPE(int&, boost::call_traits<cr_type>::reference); BOOST_CHECK_TYPE(const int&, boost::call_traits<cr_type>::const_reference); BOOST_CHECK_TYPE(int&, boost::call_traits<cr_type>::param_type); #else std::cout << "Your compiler cannot instantiate call_traits<int&const>, skipping four tests (4 errors)" << std::endl; #endif BOOST_CHECK_TYPE(const int&, boost::call_traits<const int&>::value_type); BOOST_CHECK_TYPE(const int&, boost::call_traits<const int&>::reference); BOOST_CHECK_TYPE(const int&, boost::call_traits<const int&>::const_reference); BOOST_CHECK_TYPE(const int&, boost::call_traits<const int&>::param_type); #ifndef BOOST_NO_TEMPLATE_PARTIAL_SPECIALIZATION BOOST_CHECK_TYPE(const int*, boost::call_traits<int[3]>::value_type); BOOST_CHECK_TYPE(int(&)[3], boost::call_traits<int[3]>::reference); BOOST_CHECK_TYPE(const int(&)[3], boost::call_traits<int[3]>::const_reference); BOOST_CHECK_TYPE(const int*const, boost::call_traits<int[3]>::param_type); BOOST_CHECK_TYPE(const int*, boost::call_traits<const int[3]>::value_type); BOOST_CHECK_TYPE(const int(&)[3], boost::call_traits<const int[3]>::reference); BOOST_CHECK_TYPE(const int(&)[3], boost::call_traits<const int[3]>::const_reference); BOOST_CHECK_TYPE(const int*const, boost::call_traits<const int[3]>::param_type); // test with abstract base class: BOOST_CHECK_TYPE(test_abc1, boost::call_traits<test_abc1>::value_type); BOOST_CHECK_TYPE(test_abc1&, boost::call_traits<test_abc1>::reference); BOOST_CHECK_TYPE(const test_abc1&, boost::call_traits<test_abc1>::const_reference); BOOST_CHECK_TYPE(const test_abc1&, boost::call_traits<test_abc1>::param_type); #else std::cout << "You're compiler does not support partial template specialiation, skipping 8 tests (8 errors)" << std::endl; #endif #else std::cout << "You're compiler does not support partial template specialiation, skipping 20 tests (20 errors)" << std::endl; #endif // test with an incomplete type: BOOST_CHECK_TYPE(incomplete_type, boost::call_traits<incomplete_type>::value_type); BOOST_CHECK_TYPE(incomplete_type&, boost::call_traits<incomplete_type>::reference); BOOST_CHECK_TYPE(const incomplete_type&, boost::call_traits<incomplete_type>::const_reference); BOOST_CHECK_TYPE(const incomplete_type&, boost::call_traits<incomplete_type>::param_type); // test enum: BOOST_CHECK_TYPE(enum_UDT, boost::call_traits<enum_UDT>::value_type); BOOST_CHECK_TYPE(enum_UDT&, boost::call_traits<enum_UDT>::reference); BOOST_CHECK_TYPE(const enum_UDT&, boost::call_traits<enum_UDT>::const_reference); BOOST_CHECK_TYPE(const enum_UDT, boost::call_traits<enum_UDT>::param_type); return 0; } // // define call_traits tests to check that the assertions in the docs do actually work // this is an compile-time only set of tests: // template <typename T, bool isarray = false> struct call_traits_test { typedef ::boost::call_traits<T> ct; typedef typename ct::param_type param_type; typedef typename ct::reference reference; typedef typename ct::const_reference const_reference; typedef typename ct::value_type value_type; static void assert_construct(param_type val); }; template <typename T, bool isarray> void call_traits_test<T, isarray>::assert_construct(typename call_traits_test<T, isarray>::param_type val) { // // this is to check that the call_traits assertions are valid: T t(val); value_type v(t); reference r(t); const_reference cr(t); param_type p(t); value_type v2(v); value_type v3(r); value_type v4(p); reference r2(v); reference r3(r); const_reference cr2(v); const_reference cr3(r); const_reference cr4(cr); const_reference cr5(p); param_type p2(v); param_type p3(r); param_type p4(p); unused_variable(v2); unused_variable(v3); unused_variable(v4); unused_variable(r2); unused_variable(r3); unused_variable(cr2); unused_variable(cr3); unused_variable(cr4); unused_variable(cr5); unused_variable(p2); unused_variable(p3); unused_variable(p4); } #ifndef BOOST_NO_TEMPLATE_PARTIAL_SPECIALIZATION template <typename T> struct call_traits_test<T, true> { typedef ::boost::call_traits<T> ct; typedef typename ct::param_type param_type; typedef typename ct::reference reference; typedef typename ct::const_reference const_reference; typedef typename ct::value_type value_type; static void assert_construct(param_type val); }; template <typename T> void call_traits_test<T, true>::assert_construct(typename boost::call_traits<T>::param_type val) { // // this is to check that the call_traits assertions are valid: T t; value_type v(t); value_type v5(val); reference r = t; const_reference cr = t; reference r2 = r; #ifndef __BORLANDC__ // C++ Builder buglet: const_reference cr2 = r; #endif param_type p(t); value_type v2(v); const_reference cr3 = cr; value_type v3(r); value_type v4(p); param_type p2(v); param_type p3(r); param_type p4(p); unused_variable(v2); unused_variable(v3); unused_variable(v4); unused_variable(v5); #ifndef __BORLANDC__ unused_variable(r2); unused_variable(cr2); #endif unused_variable(cr3); unused_variable(p2); unused_variable(p3); unused_variable(p4); } #endif //BOOST_NO_TEMPLATE_PARTIAL_SPECIALIZATION // // now check call_traits assertions by instantiating call_traits_test: template struct call_traits_test<int>; template struct call_traits_test<const int>; template struct call_traits_test<int*>; #if defined(BOOST_MSVC6_MEMBER_TEMPLATES) template struct call_traits_test<int&>; template struct call_traits_test<const int&>; #if !defined(BOOST_NO_TEMPLATE_PARTIAL_SPECIALIZATION) && !defined(__SUNPRO_CC) template struct call_traits_test<int[2], true>; #endif #endif
{ "pile_set_name": "Github" }
Transantral-ethmoidal decompression of optic canal fracture. A case of indirect trauma to the optic nerve was successfully treated with transethmoidal decompression. The literature was reviewed, and reports of poor results from neurosurgical procedures are cited. Improved results from transethmoidal decompression of the optic nerve have been reported by Japanese authors but, in our opinion, without proper selection of cases. Early diagnosis of traumatic compression of the intracanalicular optic nerve as evidenced by delayed and/or progressive vision loss following injury, coupled with prompt transantral-ethmoidal surgical decompression, should yield gratifying results in the treatment of this uncommon condition.
{ "pile_set_name": "PubMed Abstracts" }
Canfor to keep MacKenzie, British Columbia, mill open By Following a shutdown of its mill in MacKenzie, British Columbia, forest products company Canfor will reopen the mill on a modified shift schedule. While the move will bring back 320 jobs, 130 jobs will be eliminated. Canfor reported losses of $38.8 million in the second quarter, compared with $39.2 million in earnings last year. This decision will result in the reduction of 150 million board feet of capacity, the company said, and is part of an overall cost-savings strategy. The mill's closure initially was slated for mid-August. The company is planning to have the mill operating under the new configuration by the end of next month. “We have been very clear that we needed to significantly reduce our delivered log costs and improve efficiency at the mill in order for us to continue operation,” said Jim Shepard, interim CEO for Canfor. “Through the hard work of our employees and the valuable support of the union and the Provincial government for improving access to fiber, we have made tremendous progress in this regard."
{ "pile_set_name": "Pile-CC" }
Roller coasters are pretty scary. Some of them go fast, some of them go upside down. And some of them make your son, Callum, disappear. Well, maybe not the roller coaster itself, but in The Park, a new single-player horror game from Funcom, you play as a mother whose son goes missing in a creepy amusement park. It’s their first single-player game since 2006’s Dreamfall: The Longest Journey and draws upon the existing narrative universe in their MMO The Secret World. Funcom CEO Rui Casais implies The Park might not actually be the last in potential series of short, single-player experiments in the press release: "[It’s] actually the outcome of what started with a small group of developers experimenting with new concepts and looking at how we could draw upon the universes we have built for our massively multiplayer online games and expand upon them into smaller-scale single-player games.” While the trailer and release don’t detail how The Park will play, I’m into the premise and idea of pulling stories from existing universes as a place to experiment with shorter narrative games. The Park comes out this October.
{ "pile_set_name": "OpenWebText2" }
Maire Rose Connor A 1930s Tube Train Is Returning To London... And You Can Ride It! Join us to chat about all things related to London transport on our new Facebook group, Londonist Roundel Ramblings — everyone welcome. Woo! Woooo! Start perfecting those pin curls and brushing up on your vintage slang — you could be taking a trip to 1930s London. On Sunday 19 May, London Transport Museum is hosting one of its famous heritage vehicle outings: meaning you've got the rare chance to ride a genuine 1938 art deco tube train. Three trips along the Piccadilly line run as follows: Northfields to Oakwood and back to Northfields. Two trips to Northfields, Heathrow Terminals 4 and back to Northfields. Mmmm... we can practically feel that retro moquette already. The journey to Oakwood aboard the beautifully restored train costs £35 for adults and £25 for kids over 11 and concessions. The shorter trips to Heathrow cost £25 for adults and £20 for kids and concessions. Keep an eye on the website for tickets.
{ "pile_set_name": "OpenWebText2" }
Dustin Cooper Dustin Cooper (born 8 May 1981) is an Australian former professional rugby league footballer who last played for Lézignan Sangliers in the French Elite One Championship, the Boston 13s in the USA Rugby League. He returned to league after a two-year stint in rugby union with Toyota Verblitz in the Japan Top League. Rugby League Career Cooper made his debut in the NRL with the Melbourne Storm where he played the 2003 and 2004 seasons on the wing. He then moved to Newcastle Knights in 2005-2006, starting as a fullback but eventually filling the utility role. In 2005, Cooper was one of 11 players fined by Newcastle for misconduct after a pre-season game in Bathurst. It was alleged that some of the Newcastle players had broken curfew to visit dormitories at Charles Sturt University. It was reported that one of the players had jumped on a student as she slept in her bed and touched her inappropriately. One of the Newcastle players Dane Tilse was deregistered by the NRL for 12 months. Cooper played 14 games for Newcastle in the 2005 NRL season as the club finished last on the table. In 2007 and 2008 Cooper played with Cronulla-Sutherland Sharks in the second row, finishing his NRL career at the end of the 2008 NRL season. He returned to league in 2011 with the Pia Donkeys, where he plays in the second row. In 2012 Cooper began playing five-eighth for the Boston Thirteens in the USARL and helped them to win a national championship in 2015. Rugby Union Career Cooper played as a centre/winger for Toyota Verblitz 2009-2011 in the Japan Top League., and was selected in the Japan Top League All Stars match 2011. He is also an inaugural member of the Asia Pacific Barbarians, participating in the annual Hong Kong rugby tens tournament in 2011. References Category:1981 births Category:Australian rugby union players Category:Australian rugby league players Category:Melbourne Storm players Category:Newcastle Knights players Category:Cronulla-Sutherland Sharks players Category:Lézignan Sangliers players Category:Baroudeurs de Pia XIII players Category:Rugby league second-rows Category:Expatriate rugby union players in Japan Category:Australian expatriate rugby union players Category:Expatriate rugby union players in France Category:Australian expatriate sportspeople in France Category:Australian expatriate sportspeople in the United States Category:Boston 13s players Category:Living people Category:Australian expatriate sportspeople in Japan Category:Rugby league players from Queensland
{ "pile_set_name": "Wikipedia (en)" }
1. Field of the Invention The present invention relates generally to the field of soybean breeding. In particular, the invention relates to the novel soybean variety 4782157. 2. Description of Related Art There are numerous steps in the development of any novel, desirable plant germplasm. Plant breeding begins with the analysis and definition of problems and weaknesses of the current germplasm, the establishment of program goals, and the definition of specific breeding objectives. The next step is selection of germplasm that possess the traits to meet the program goals. The goal is to combine in a single variety an improved combination of desirable traits from the parental germplasm. These important traits may include higher seed yield, resistance to diseases and insects, better stems and roots, tolerance to drought and heat, better agronomic quality, resistance to herbicides, and improvements in compositional traits. Choice of breeding or selection methods depends on the mode of plant reproduction, the heritability of the trait(s) being improved, and the type of variety used commercially (e.g., F1 hybrid variety, pureline variety, etc.). For highly heritable traits, a choice of superior individual plants evaluated at a single location will be effective, whereas for traits with low heritability, selection should be based on mean values obtained from replicated evaluations of families of related plants. Popular selection methods commonly include pedigree selection, modified pedigree selection, mass selection, recurrent selection and backcrossing. The complexity of inheritance influences choice of the breeding method. Backcross breeding is used to transfer one or a few favorable genes for a highly heritable trait into a desirable variety. This approach has been used extensively for breeding disease-resistant varieties (Bowers et al., 1992; Nickell and Bernard, 1992). Various recurrent selection techniques are used to improve quantitatively inherited traits controlled by numerous genes. The use of recurrent selection in self-pollinating crops depends on the ease of pollination, the frequency of successful hybrids from each pollination, and the number of hybrid offspring from each successful cross. Each breeding program should include a periodic, objective evaluation of the efficiency of the breeding procedure. Evaluation criteria vary depending on the goal and objectives, but should include gain from selection per year based on comparisons to an appropriate standard, overall value of the advanced breeding lines, and number of successful varieties produced per unit of input (e.g., per year, per dollar expended, etc.). Promising advanced breeding lines are thoroughly tested and compared to appropriate standards in environments representative of the commercial target area(s) for generally three or more years. The best lines are candidates for new commercial varieties. Those still deficient in a few traits may be used as parents to produce new populations for further selection. These processes, which lead to the final step of marketing and distribution, may take as much as eight to 12 years from the time the first cross is made. Therefore, development of new varieties is a time-consuming process that requires precise forward planning, efficient use of resources, and a minimum of changes in direction. A most difficult task is the identification of individuals that are genetically superior, because for most traits the true genotypic value is masked by other confounding plant traits or environmental factors. One method of identifying a superior plant is to observe its performance relative to other experimental plants and to one or more widely grown standard varieties. Single observations are generally inconclusive, while replicated observations provide a better estimate of genetic worth. The goal of plant breeding is to develop new, unique and superior soybean varieties and hybrids. The breeder initially selects and crosses two or more parental lines, followed by repeated selfing and selection, producing many new genetic combinations. Each year, the plant breeder selects the germplasm to advance to the next generation. This germplasm is grown under unique and different geographical, climatic and soil conditions, and further selections are then made, during and at the end of the growing season. The varieties which are developed are unpredictable. This unpredictability is because the breeder's selection occurs in unique environments, with no control at the DNA level (using conventional breeding procedures), and with millions of different possible genetic combinations being generated. A breeder of ordinary skill in the art cannot predict the final resulting lines he develops, except possibly in a very gross and general fashion. The same breeder cannot produce the same variety twice by using the exact same original parents and the same selection techniques. This unpredictability results in the expenditure of large amounts of research monies to develop superior new soybean varieties. The development of new soybean varieties requires the development and selection of soybean varieties, the crossing of these varieties and selection of progeny from the superior hybrid crosses. The hybrid seed is produced by manual crosses between selected male-fertile parents or by using male sterility systems. Hybrids may be identified by using certain single locus traits such as pod color, flower color, pubescence color or herbicide resistance which indicate that the seed is truly a hybrid. Additional data on parental lines as well as the phenotype of the hybrid influence the breeder's decision whether to continue with the specific hybrid cross. Pedigree breeding and recurrent selection breeding methods are used to develop varieties from breeding populations. Breeding programs combine desirable traits from two or more varieties or various broad-based sources into breeding pools from which varieties are developed by selfing and selection of desired phenotypes. The new varieties are evaluated to determine which have commercial potential. Pedigree breeding is commonly used for the improvement of self-pollinating crops. Two parents which possess favorable, complementary traits are crossed to produce an F1. An F2 population is produced by selfing one or several F1's. Selection of the best individuals may begin in the F2 population (or later depending upon the breeders objectives); then, beginning in the F3, the best individuals in the best families can be selected. Replicated testing of families can begin in the F3 or F4 generation to improve the effectiveness of selection for traits with low heritability. At an advanced stage of inbreeding (i.e., F6 and F7), the best lines or mixtures of phenotypically similar lines are tested for potential release as new varieties. Mass and recurrent selections can be used to improve populations of either self-or cross-pollinating crops. A genetically variable population of heterozygous individuals is either identified or created by intercrossing several different parents. The best plants are selected based on individual superiority, outstanding progeny, or excellent combining ability. The selected plants are intercrossed to produce a new population in which further cycles of selection are continued. Backcross breeding has been used to transfer genetic loci for simply inherited, highly heritable traits into a desirable homozygous variety which is the recurrent parent. The source of the trait to be transferred is called the donor or nonrecurent parent. The resulting plant is expected to have the attributes of the recurrent parent (e.g., variety) and the desirable trait transferred from the donor parent. After the initial cross, individuals possessing the phenotype of the donor parent are selected and repeatedly crossed (backcrossed) to the recurrent parent. The resulting plant is expected to have the attributes of the recurrent parent (e.g., variety) and the desirable trait transferred from the donor parent. The single-seed descent procedure in the strict sense refers to planting a segregating population, harvesting a sample of one seed per plant, and using the one-seed sample to plant the next generation. When the population has been advanced from the F2 to the desired level of inbreeding, the plants from which lines are derived will each trace to different F2 individuals. The number of plants in a population declines each generation due to failure of some seeds to germinate or some plants to produce at least one seed. As a result, not all of the F2 plants originally sampled in the population will be represented by a progeny when generation advance is completed. In a multiple-seed procedure, soybean breeders commonly harvest one or more pods from each plant in a population and thresh them together to form a bulk. Part of the bulk is used to plant the next generation and part is put in reserve. The procedure has been referred to as modified single-seed descent or the pod-bulk technique. The multiple-seed procedure has been used to save labor at harvest. It is considerably faster to thresh pods with a machine than to remove one seed from each by hand for the single-seed procedure. The multiple-seed procedure also makes it possible to plant the same number of seeds of a population each generation of inbreeding. Enough seeds are harvested to make up for those plants that did not germinate or produce seed. Descriptions of other breeding methods that are commonly used for different traits and crops can be found in one of several reference books (e.g., Allard, 1960; Simmonds, 1979; Sneep et al., 1979; Fehr, 1987a,b). Proper testing should detect any major faults and establish the level of superiority or improvement over current varieties. In addition to showing superior performance, there must be a demand for a new variety that is compatible with industry standards or which creates a new market. The introduction of a new variety will incur additional costs to the seed producer, the grower, processor and consumer; for special advertising and marketing, altered seed and commercial production practices, and new product utilization. The testing preceding release of a new variety should take into consideration research and development costs as well as technical superiority of the final variety. For seed-propagated varieties, it must be feasible to produce seed easily and economically. Soybean, Glycine max (L), is an important and valuable field crop. Thus, a continuing goal of plant breeders is to develop stable, high yielding soybean varieties that are agronomically sound. The reasons for this goal are to maximize the amount of grain produced on the land used and to supply food for both animals and humans. To accomplish this goal, the soybean breeder must select and develop soybean plants that have the traits that result in superior varieties.
{ "pile_set_name": "USPTO Backgrounds" }
Walls Are Meant For Climbing Endless Summer Membership Package is Back! What is the Endless Summer Special? It is 3 months of unlimited climbing at the River Rock for one flat rate. It is perfect for a hassle free summer of climbing. What makes it a good deal? You get 20% off of our regular prepaid membership rates and it INCLUDES rental gear for the duration of the 3 months. How do we sign-up? Just ask at the front counter and we will have your membership card in a flash. What else do I get with the Endless Summer special? You get full member benefits: guest passes each month, free yoga classes, reduced rates on programs and classes, local discounts to partner businesses, and more. Read about all the benefits to being a member HERE. Sale will end on June 30th and all memberships must be activated by that date. This is a nonrefundable special deal. However, if you do not activate your Endless Summer membership by the 30th of June we will happily apply that money towards one of regular prepaid or EFT memberships. The class will utilize kettlebells and bodyweight to deliver a powerful combination of exercises that will build lean muscle, burn fat, and strengthen your core. The hour will be separated into three parts: warm-up, proper... Read more » Special Member’s Only Hours: 6:00am – 10:00am Must be a current River Rock Member to access the facility during these times. The gym will open to the public (and remain open to member’s) starting at... Read more » Have you ever wondered how good nutrition can help you get the most of your climbing, hiking, or camping adventures? Learn how to best fuel your outdoor trips with Registered Dietitian Claire Chewning of Yours... Read more » The class will utilize kettlebells and bodyweight to deliver a powerful combination of exercises that will build lean muscle, burn fat, and strengthen your core. The hour will be separated into three parts: warm-up, proper... Read more » In the Basic Belay Class you will work with our instructor and learn the technique of belaying. After taking the class and before your first time climbing, you will be required to take a belay... Read more » This clinic is specifically designed for, and required for, youth under the age of 14 who want to learn how to top out in our bouldering area. It takes approximately 30 minutes. A parent or... Read more » Special Member’s Only Hours: 8:30am – 10:00am Must be a current River Rock Member to access the facility during these times. The gym will open to the public (and remain open to member’s) starting at... Read more » This clinic is specifically designed for, and required for, youth under the age of 14 who want to learn how to top out in our bouldering area. It takes approximately 30 minutes. A parent or... Read more » In the Basic Belay Class you will work with our instructor and learn the technique of belaying. After taking the class and before your first time climbing, you will be required to take a belay... Read more » Looking for like-minded people to climb with? Join us for Boulders & Brunch, every Sunday morning from 10am to noon. All skill levels are welcome! Often a staff member will be around to climb with... Read more » This clinic is specifically designed for, and required for, youth under the age of 14 who want to learn how to top out in our bouldering area. It takes approximately 30 minutes. A parent or... Read more » In the Basic Belay Class you will work with our instructor and learn the technique of belaying. After taking the class and before your first time climbing, you will be required to take a belay... Read more » The class will utilize kettlebells and bodyweight to deliver a powerful combination of exercises that will build lean muscle, burn fat, and strengthen your core. The hour will be separated into three parts: warm-up, proper... Read more »
{ "pile_set_name": "Pile-CC" }
Q: How to sum up this series or find a closed expression or argument? We know the following (Taylor expansion) $$\sum_{n=0}^\infty \frac{(-1)^n}{n!} (x^2)^n = e^{-x^2}.$$ Which is integrable in $x$ on $\mathbb{R}$. Nevertheless, imagine we instead have: $$\sum_{n=0}^\infty \frac{(-1)^n}{n!} (x^2)^n \frac{\Gamma(1+n)}{\Gamma(1+a+n)},$$ where $a>0$ is some fixed value. Clearly, $$\frac{\Gamma(1+n)}{\Gamma(1+a+n)}\leq 1$$ so one should expect that this factor does not contibute to the sum and that the remaining function in $x$ is still integrable on $\mathbb{R}$. Of course, one can say: $$\sum_{n=0}^\infty \frac{(-1)^n}{n!} (x^2)^n \frac{\Gamma(1+n)}{\Gamma(1+a+n)}\leq e^{x^2}.$$ Using the inequality, but this implies destroying the $-1$ which is crucial. Does any one have an idea or argument that can help to either "keep" the $-1$ or to conclude that the remaining function is integrable on $\mathbb{R}$? Thanks a lot for any ideas you may have! :) A: For $a\in\mathbb N$ and $n\in\mathbb N$, we have $$\frac{\Gamma(1+n)}{\Gamma(1+a+n)}=\frac{n!}{(n+a)!}$$ Notice that $$\frac{x^n}{n!}\frac{\Gamma(1+n)}{\Gamma(1+a+n)}=\frac{x^n}{n!}\frac{n!}{(n+a)!}=\frac{x^n}{(n+a)!}$$ $$\sum_{n\ge0}\frac{x^n}{n!}\frac{\Gamma(1+n)}{\Gamma(1+a+n)}=\sum_{n\ge0}\frac{x^n}{(n+a)!}=\frac1{x^a}\left(e^x-\sum_{n=0}^{a-1}\frac{x^n}{n!}\right)$$ And one can set bounds on this by seeing that $$\frac{\Gamma(1+n)}{\Gamma(1+\lceil a\rceil+n)}\le\frac{\Gamma(1+n)}{\Gamma(1+a+n)}\le\frac{\Gamma(1+n)}{\Gamma(1+\lfloor a\rfloor+n)}$$ So your series/function is bounded by $$\left|\frac1{x^{\lceil a\rceil}}\left(e^x-\sum_{n=0}^{\lceil a\rceil-1}\frac{x^n}{n!}\right)\right|\le|S|\le\left|\frac1{x^{\lfloor a\rfloor}}\left(e^x-\sum_{n=0}^{\lfloor a\rfloor-1}\frac{x^n}{n!}\right)\right|$$ For $x>0$. And finally let $x\to-x^2$ (Note that the negative sign may cause some problems with the bounds on this.)
{ "pile_set_name": "StackExchange" }
Regulation of chitinase production by the 5'-untranslated region of the ybfM in Serratia marcescens 2170. Serratia marcescens 2170 produces three chitinases and the chitin-binding protein CBP21, and efficiently degrades insoluble and crystalline chitin. The three chitinases and CBP21 are induced by N,N'-diacetylchitobiose [(GlcNAc)₂], the major product of chitin hydrolysis by S. marcescens chitinases. We have found that uptake of both (GlcNAc)₂ and N-acetylglucosamine (GlcNAc) is important for the efficient utilization of (GlcNAc)₂ because (GlcNAc)₂ is less efficiently fermented by S. marcescens 2170 in the absence of chitobiase. In order to determine the mechanism of utilization of the degradation products of chitin by S. marcescens, chitobiase deficient transposon mutants were screened. A transposon present in chitobiase-deficient mutants was inserted into the ybfMN-ctb cluster. The mutants produced chitinases, except for TT327, in which a transposon was inserted into the 5'-untranslated region (5'-UTR) of ybfM. Ectopic expression of this region in TT327 restored chitinase production. These results indicate that the 5'-UTR of ybfM is important for chitinase induction in S. marcescens.
{ "pile_set_name": "PubMed Abstracts" }
[![MIT Licensed][icon-mit]][license] [![Awesome][icon-awesome]][awesome] &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; [![Telegram][icon-chat]][chat] # Offline Web Applications (optional) > Note: this task is optional because most likely, you will not use knowledge obtained from it during our course. But, you will need this information when you will work as a developer. At least a general understanding of the concept. That's why finishing this task is up to you. [Offline Web Applications](https://www.udacity.com/course/offline-web-applications--ud899) If you decide to complete the task then do the following after you're done: 1. Make screenshots of your progress in the course and put the screenshots in `task_offline_web_app` folder in your `kottans-frontend` repo 1. In your `kottans-frontend` repo `README.md`: * add header `## Offline Web Applications` * embed the screenshots or add links to the screenshots * list your reflections on the course (_what was new to you_, _what surprised you_, _what you intend to use in future_) 1. You did an extra effort! Go ahead share your progress with others – post a message in [course channel][chat]: `Offline Web Apps — #done` (or `Offline Web Apps — #p2p_done` if you are p2p course student) and add the link to your repo. **This step is important, as it helps mentors to track your progress!** 1. Study Extra Materials below to improve your skills. If you feel it affects your overall course performance consider reverting to those later e.g. when you have all mandatory tasks completed. 1. You may skip Optional materials from this task (if any). When you finish this task you can proceed to the next one. ## Extra materials - [15 тривиальных фактов о правильной работе с протоколом HTTP](https://habrahabr.ru/company/yandex/blog/265569/) - [How the Internet works](https://www.khanacademy.org/computing/computer-science/computers-and-internet-code-org/internet-works-intro/v/what-is-the-internet) - [HTTP/2 101 (Chrome Dev Summit 2015)](https://www.youtube.com/watch?v=r5oT_2ndjms) - [Introduction to HTTP/2](https://developers.google.com/web/fundamentals/performance/http2/) - [Serviceworkies mastery games(by the author of Flexbox Zombies)](https://serviceworkies.com/) ## Done? ➡️ Go forward to [Memory – Pair Game](memory-pair-game.md) ⤴️ Back to [Contents](../contents.md) [icon-chat]: https://img.shields.io/badge/chat-on%20telegram-blue.svg [icon-mit]: https://img.shields.io/badge/license-MIT-blue.svg [icon-awesome]: https://cdn.rawgit.com/sindresorhus/awesome/d7305f38d29fed78fa85652e3a63e154dd8e8829/media/badge.svg [license]: https://github.com/Kottans/web/blob/master/LICENSE.md [awesome]: https://github.com/sindresorhus/awesome#front-end-development [chat]: https://t.me/joinchat/CX8EF1JmLm9IM6J6oy2U7Q
{ "pile_set_name": "Github" }
She had recently announced her retirement from the Pakistan film industry in an interview, and said that she wants to work on a new image of herself by working with productions outside the Lollywood circle. She had recently announced her retirement from the Pakistan film industry in an interview, and said that she wants to work on a new image of herself by working with productions outside the Lollywood circle. She had recently announced her retirement from the Pakistan film industry in an interview, and said that she wants to work on a new image of herself by working with productions outside the Lollywood circle. She said in a recent interview to a Pak newspaper, "Two years ago the media spread rumours about my affair with Shoaib Akhtar, and I admit I was involved with him. However, Shoaib does not take his relationships seriously. He proposed to my cousin and me on the same day. He even hit me in front of TV staff. He is a man who wasted a year of my life and hurt me tremendously." She said in a recent interview to a Pak newspaper, "Two years ago the media spread rumours about my affair with Shoaib Akhtar, and I admit I was involved with him. However, Shoaib does not take his relationships seriously. He proposed to my cousin and me on the same day. He even hit me in front of TV staff. He is a man who wasted a year of my life and hurt me tremendously." She said in a recent interview to a Pak newspaper, "Two years ago the media spread rumours about my affair with Shoaib Akhtar, and I admit I was involved with him. However, Shoaib does not take his relationships seriously. He proposed to my cousin and me on the same day. He even hit me in front of TV staff. He is a man who wasted a year of my life and hurt me tremendously."
{ "pile_set_name": "Pile-CC" }
IN THE COURT OF CRIMINAL APPEALS OF TENNESSEE AT NASHVILLE May 8, 2012 Session STATE OF TENNESSEE v. TERRY SANDERS Direct Appeal from the Circuit Court for Houston County No. CR-5130 George C. Sexton, Judge No. M2011-00426-CCA-R3-CD - Filed November 15, 2012 The defendant, Terry Sanders, was convicted after a jury trial of two counts of the sale of less than 0.5 grams of cocaine, a Class C felony, in violation of Tennessee Code Annotated section 39-17-417. He was sentenced, as a Range III persistent offender, to fifteen years for each count, to be run consecutively, for an effective sentence of thirty years. The defendant appeals his convictions, asserting that the trial court should have granted his motions for a mistrial based on testimony introduced at trial that the defendant was on community corrections and based on juror bias. After a careful review of the record, we conclude that the defendant is not entitled to a new trial and affirm the judgment of the trial court. Tenn. R. App. P. 3 Appeal as of Right; Judgment of the Circuit Court Affirmed J OHN E VERETT W ILLIAMS, J., delivered the opinion of the Court, in which J AMES C URWOOD W ITT, J R., AND J EFFERY S. B IVINGS, JJ., joined. Michael J. Flanagan, Nashville, Tennessee, for the appellant, Terry Sanders. Robert E. Cooper, Attorney General and Reporter; Clark B. Thornton, Assistant Attorney General; Dan M. Alsobrooks, District Attorney General; and Craig Monsue, Assistant District Attorney General, for the appellee, State of Tennessee. OPINION The defendant was the subject of a drug investigation in which police sent a confidential informant to buy crack cocaine from the defendant at his home. The defendant was on house arrest at the time as part of his participation in a community corrections program. The confidential informant was wired for sound and video at a location close to the defendant’s residence and then drove to the defendant’s residence to buy the drugs. The confidential informant was furnished with $60 on one occasion and $40 on another occasion to use in the purchase of the drugs, and he received $100 on each occasion as payment for his participation. The confidential informant received payment only if he was successful in purchasing drugs from the defendant. On the occasion of the first drug purchase, a police officer followed the informant to a location close to the defendant’s house, but did not follow him down the defendant’s street because it was a dead end and the officer did not want to raise suspicions regarding the informant. The informant testified that, on the way, he made a telephone call to the defendant to let him know he was coming to purchase drugs. The informant and his vehicle were searched before and after both purchases. At trial, the police officer who had conducted the search acknowledged that an object the size of the rocks of cocaine which the confidential informant turned over to police would not necessarily be found in the type of search conducted on the informant. Although the informant was wired for video and sound, the video equipment malfunctioned during the second purchase. The remaining video did not capture any image of the defendant during the purchase, and neither audio recording captured the defendant saying anything. The confidential informant testified that, on the occasion of the first purchase, he arrived and told the defendant he had the money. “At that point in time he told me – put his finger up to his mouth telling me that I needed to be quiet and pointed down towards his ankle.” At the commencement of the trial, the trial court noted outside the jury’s presence that this testimony had previously been ruled admissible,1 but the court would not allow the informant to mention that the defendant was on community corrections at the time. The defense objected to the admission of the testimony that the defendant pointed to his ankle but did not challenge it in the motion for a new trial. The informant testified he did not say anything further after the defendant pointed to his ankle and did not speak during the subsequent buy because the defendant had shushed him on the first occasion. The informant acknowledged that in the second audio recording, his knocking on the defendant’s door was also not audible. The informant was cross-examined regarding the fact that in the recording, the informant did not mention to police that the defendant had pointed to his ankle, but instead stated that the defendant had indicated he should be quiet and speculated that the defendant had company. During the vigorous cross-examination, the confidential informant referred to the defendant’s participation in the community corrections program: Q. Okay. Now if you didn’t call Terry Sanders until you were on your way and there was no discussion of the amount of drugs to be bought or the amount of money you were going to take, 1 Apparently, the defendant had previously been tried in connection with these charges, and a mistrial was declared. -2- how much money did you know to take or to ask the agents for? A. That was just a decision that was made – once I met up with [the police officer], he made a decision as to how much to carry and that’s what we carried. Q. So [the defendant] would have no idea of knowing how much money you’re coming with or how much crack cocaine he needed to have ready for you. A. Correct. Q. You just showed up and that’s the way it went down. A. Yes, sir. Q. That’s the way a professional drug buyer does it, he just shows up, doesn’t set up anything ahead of time. A. Because you don’t call and set things like that up ahead of time. Q. You don’t? A. You might call them and let them know that you’re on your way and that’s it. Q. With no phone call ahead of time to even know that he was home. A. [The defendant] had to be home. Q. He had to be home? A. He was on community corrections. The defendant moved for a mistrial, and the court denied the motion, finding that “[y]ou didn’t sling the door wide open but you sort of cracked it.” After a recess, the court gave a curative instruction, admonishing the jury that although the witness had mentioned community corrections, the jury was “to disregard that and . . . not consider that at all for any -3- reason in . . . deliberations.” The jury found the defendant guilty on both counts. During voir dire, the jurors were asked if they knew, had been represented by, or had friends or family represented by the defendant’s attorney. No juror answered in the affirmative. After the verdict, defense counsel submitted an affidavit that one of the jurors was in fact a current client of his who had failed to disclose the fact that she knew him. Defense counsel asserted he did not recognize the juror.2 Furthermore, defense counsel asserted that this same juror was the sister of the district director of the community corrections program. The juror was not called to testify at any subsequent hearing. The defendant filed a renewed motion for mistrial on January 25, 2010, based on the testimony regarding community corrections and the juror issues. The trial court denied the renewed motion for a mistrial. The defendant also filed a motion for a new trial on March 4, 2010, asserting, among other issues, that the trial court erred in denying the motion for a mistrial based on the testimony regarding community corrections and that the trial court erred in denying the renewed motion for a mistrial based on the juror’s familial relationship to the director of community corrections. At the hearing on the motion for a new trial, the defendant moved the court to orally amend the motion to additionally assert that the defendant was also entitled to a new trial because of the juror’s failure to reveal her relationship with defense counsel. Although defense counsel stated his intention to make a written amendment, the record is devoid of any amendment in writing. The court denied the motion for a new trial. The defendant appeals the trial court’s decision, contending that the court should have granted him a mistrial based on (1) the testimony regarding community corrections; (2) the juror’s relationship to the district director of the community corrections program; and (3) the juror’s failure to reveal that defense counsel represented her in a civil matter. Analysis A. Testimony Regarding Community Corrections The defendant asserts that the trial court erred in not granting a mistrial after the confidential informant testified that the defendant was participating in community corrections at the time of the purchase. A mistrial is a procedural device through which the court stops the trial, discharges the jury, and holds a new trial with a new jury to determine the defendant’s guilt. See State v. McPherson, 882 S.W.2d 365, 370 (Tenn. Crim. App. 1994). 2 At the defendant’s sentencing hearing, defense counsel explained that he had spoken to the juror by phone and written a letter on her behalf but had never met her. He became aware that he represented her when, after trial, the juror asked the clerk to summon him to discuss her case. -4- A mistrial is declared in order to “to correct damage done to the judicial process when some event has occurred which precludes an impartial verdict.” State v. Welcome, 280 S.W.3d 215, 222 (Tenn. Crim. App. 2007). Only manifest necessity justifies the declaration of a mistrial, and the defendant bears the burden of showing manifest necessity. State v. Williams, 929 S.W.2d 385, 388 (Tenn. Crim. App. 1996). A mistrial is appropriate where a trial cannot continue, or the trial’s continuation would be a miscarriage of justice. State v. Robinson, 146 S.W.3d 469, 494 (Tenn. 2004). The decision to grant a mistrial rests in the sound discretion of the trial court, and the trial court’s decision will not be overturned on appeal absent an abuse of discretion. State v. Reid, 91 S.W.3d 247, 279 (Tenn. 2002). In determining whether the trial court has abused its discretion, an appellate court considers: (1) whether the State elicited the testimony; (2) whether the trial court gave a curative instruction; and (3) the relative strength or weakness of the State’s proof. Welcome, 280 S.W.3d at 222. In the present case, the damaging testimony was neither elicited by the State nor volunteered by the witness. Instead, it was given in response to defense counsel’s probing into the witness’s statement that the defendant “had to be home.” The trial court gave prompt and appropriate curative instructions. Both these factors weigh in favor of not granting a mistrial. Much of the strength of the prosecution’s case turned on the testimony of the confidential informant. The defense vigorously cross-examined the informant regarding the financial incentive he had for returning with drugs; discrepancies in his memory of the events; the fact that the defendant is never visible on the video or audible on the audio recordings; and the fact that the informant did not mention the defendant’s pointing to his ankle to the police immediately following the purchase. While the evidence of the defendant’s guilt was not overwhelming, we conclude that, considering all three factors in conjunction, the trial court did not abuse its discretion in denying the motion for a mistrial. Moreover, the defendant does not appeal the informant’s prior testimony that the defendant shushed the informant while pointing to his ankle, and the testimony regarding the defendant’s participation in the community corrections program therefore “provided little new information to the jury.” Reid, 91 S.W.3d at 279 (holding that the defendant was not entitled to a mistrial when evidence regarding the defendant’s prior crimes was already before the jury and the trial court gave curative instructions). Accordingly, we affirm the trial court’s denial of a mistrial on this basis. B. Juror’s Familial Relationship to the District Director of Community Corrections The defendant next asserts that the trial court improperly denied his motion for a mistrial based on the fact that one juror was the sister of the district director of the community corrections program. This issue was first raised in the defendant’s renewed motion for a mistrial, filed after the verdict was returned. “A mistrial is granted in a case in -5- which the jury is discharged without a verdict; a motion for new trial is made after a judgment has been rendered.” Howell v. Davis, 299 S.E.2d 336, 337 (S.C. 1983); see McPherson, 882 S.W.2d at 370 (“A motion for the entry of a mistrial is a procedural device which requests the trial court to stop the trial, discharge the jury, and impanel another jury to determine the guilt of the accused.” (emphasis added). The trial court’s denial of the motion was raised in the defendant’s motion for a new trial. We will review the juror bias issues as the basis for a motion for a new trial. The right to an impartial jury is guaranteed by the Sixth Amendment to the United States Constitution and Article I, section 9 of the Tennessee Constitution. Challenges to juror qualifications generally fall into one of two categories: propter affectum challenges based on bias, prejudice or partiality, which may be brought after the return of the verdict, and propter defectum challenges based on a disqualification due to circumstances such as alienage, family relationship, or statutory mandate, which must be brought prior to the verdict. Carruthers v. State, 145 S.W.3d 85, 94 (Tenn. Crim. App. 2003). Insofar as the defendant brings a propter defectum challenge based on the juror’s familial relationship with the district director of community corrections, the challenge should have been brought prior to the return of the verdict. However, insofar as the defendant alleges that the juror was actually biased due to her sister’s position, he may be entitled to relief. The defendant bears the burden to establish a prima facie case of juror bias. Robinson, 146 S.W.3d at 523 (appendix). A propter affectum challenge is sustained where the defendant either demonstrates actual bias or bias is presumed. State v. Hugueley, 185 S.W.3d 356, 378 (Tenn. 2006). Bias is presumed where in cases where “a juror willfully conceals (or fails to disclose) information on voir dire which reflects on the juror’s lack of impartiality.” Smith v. State, 357 S.W.3d 322, 348 (Tenn. 2011). Here, the juror was never asked a question that would have obligated her to reveal her relationship to the community corrections director. As neither the defendant nor the State chose to ask about a possible family relationship with community corrections personnel, the juror was not required to volunteer the information. “Juror bias must be shown, not just suspected.” Hugueley, 185 S.W.3d at 380 (Tenn. 2006) (quoting State v. Lawson, 794 S.W.2d 363, 367 (Tenn. Crim. App. 1990)). No presumption of bias arises, and at the hearing on the motion for a new trial, the defendant introduced no proof showing actual bias on the part of the juror. Accordingly, the defendant is not entitled to a new trial based on the juror’s familial relationship to community corrections personnel. C. Juror’s Relationship with Defense Counsel Although the juror was not asked any questions that would have obligated her to reveal her relationship with the district director of community corrections, the same was not -6- true regarding her relationship with defense counsel. During voir dire, the State asked if any potential jurors knew defense counsel, and the juror did not respond. “[W]hen a juror’s response to relevant, direct voir dire questioning . . . does not fully and fairly inform counsel of the matters which reflect on a potential juror’s possible bias, a presumption of bias arises.” State v. Akins, 867 S.W.2d 350, 355 (Tenn. Crim. App. 1993). Silence in the face of a material question reasonably calculated to elicit the responses is equivalent to a negative answer. Smith, 357 S.W.3d at 348. However, the State correctly notes that this issue was not raised in the defendant’s motion for a new trial. At the hearing on the motion for a new trial, defense counsel informed the court that he wished to orally amend his motion to add juror bias based on defense counsel’s representation of the juror. While defense counsel stated his intention to reduce this amendment to writing, there is no indication in the record that he ever did. Tennessee Rule of Appellate Procedure 3 provides: [I]n all cases tried by a jury, no issue presented for review shall be predicated upon error in the admission or exclusion of evidence, jury instructions granted or refused, misconduct of jurors, parties or counsel, or other action committed or occurring during the trial of the case, or other ground upon which a new trial is sought, unless the same was specifically stated in a motion for a new trial; otherwise such issues will be treated as waived. Tenn. R. App. P. 3(e). The Advisory Commission Comment to subsection (e) further clarifies that “matters that can only be made a part of the record by a new trial motion must be so included in order to gain appellate review. Jury misconduct provides one example.” Tenn. R. App. P. 3(e) Advisory Comm’n cmt. Tennessee Rule of Criminal Procedure 33 allows a motion for a new trial to be raised orally, but requires that it be “be reduced to writing, within thirty days of the date the order of sentence is entered.” Tenn. R. Crim. P. 33(b). The trial court must “liberally grant” motions to amend “until the day of the hearing on the motion for a new trial.” Id. While the structure of the rule makes it unclear if the requirement that the motion be in writing applies with equal force to amendments, this Court has previously held that an issue raised orally in a motion for a new trial and not subsequently reduced to writing is waived. State v. Stewart, No. M2008-00337-CCA-R3-CD, 2010 WL 2025407, at *4 (Tenn. Crim. App. May 21, 2010); State v. Noles, No. M2006-01534-CCA-R3-CD, 2007 WL 3274422, at *11 (Tenn. Crim. App. Nov. 6, 2007); State v. Watson, No. W2001-03084-CCA-R3-CD, 2002 WL 31258011, at *2 (Tenn. Crim. App. Sept. 16, 2002); State v. Lanier, No. W2001-00379-CCA-R3-CD, 2002 WL 1482712, -7- at *4 (Tenn. Crim. App. Feb. 1, 2002) (concluding issue was waived and then analyzing issue to determine whether the interest of justice justifies appellate review under Tennessee Rule of Appellate Procedure 4(a)). We conclude that the defendant waived review of the issue by failing to reduce it to writing. Although an issue is waived, an appellate court may consider it if it rises to the level of plain error. State v. Cooper, No. E2011-00590-CCA-R3-CD, 2012 WL 950103, at *4 (Tenn. Crim. App. Mar. 20, 2012) (concluding that an oral amendment to a motion for a new trial which was not reduced to writing was waived and then conducting plain error analysis). However, in the instant case, there has been no allegation of plain error, and the issue has not been briefed. See Waters v. Coker, 229 S.W.3d 682, 690 (Tenn. 2007) (holding that an issue not raised in a motion for a new trial was waived and declining plain error analysis when plain error was not alleged or argued); see also Tenn. Ct. Crim. App. R. 10(b). In any case, the facts here do not establish plain error. The Tennessee Supreme Court has noted that the authority to grant plain error relief should “be sparingly exercised.” State v. Bledsoe, 226 S.W.3d 349, 354 (Tenn. 2007) (quoting Tenn. R.App. P. 13(b), Advisory Comm’n cmt.). Relief should be granted only where it appears that the error was of such magnitude that it probably changed the outcome of the trial. Id.; see also Tenn. R. App. P. 36(b) (stating that a judgment shall not be set aside unless “error involving a substantial right more probably than not affected the judgment or would result in prejudice to the judicial process”); Tenn. R. App. P. 36(b) Advisory Comm’n cmt. (noting that a judgment would be prejudicial to the judicial process if the decisionmaker were “obviously biased”). In analyzing plain error, the court looks to five factors: (1) the record must clearly establish what occurred in the trial court; (2) a clear and unequivocal rule of law must have been breached; (3) a substantial right of the defendant must have been adversely affected; (4) the accused must not have waived the issue for tactical reasons; and (5) consideration of the error must be necessary to do substantial justice. State v. Smith, 24 S.W.3d 274, 282 (Tenn. 2000); State v. Adkisson, 899 S.W.2d 626, 641-42 (Tenn. Crim. App. 1994). Here, defense counsel’s relationship with the juror was so superficial that he did not recognize her at trial. The juror knew nothing about the defendant in particular, and it is unclear what effect, if any, her relationship with defense counsel was likely to have on the outcome. The defendant has not established that any substantial right was affected or that the error probably changed the outcome of the trial. Bledsoe, 226 S.W.3d at 354. We conclude that the defendant’s claim that the juror was biased due to her relationship with defense counsel is waived, and the defendant has not demonstrated plain error. CONCLUSION -8- For the foregoing reasons, the judgment of the trial court is affirmed. _________________________________ JOHN EVERETT WILLIAMS, JUDGE -9-
{ "pile_set_name": "FreeLaw" }
Job Description: Professional YouTuber I first started making videos and posting them on YouTube just for the fun of it and to share my video game highlights with my friends at school, this was back in 2009. YouTube was the easiest place to share the clips online and I didn't think much of it at the time...now creating YouTube videos is my full time job! After finishing Sixth Form College in 2012 I was planning on going on to study Maths and Computer Science at University. However just before I finished college I decided to take a risk and take a gap year to focus on my YouTube channel. During my college years I was juggling creating YouTube content whilst balancing my studies, therefore taking a gap year gave me the time and flexibility I needed to concentrate on making YouTube videos. Since I started creating videos for my channel full time, I have grown my YouTube following from 300,000 to three million subscribers.... I'm pretty pleased I decided to take a gap year after all! I am very lucky to have done a lot of travelling over the past 12 months, including being able to attend Electronic Entertainment Expo 2013 (E3) which is an annual trade show for the computer and video games industry. It was here that I was able to take a look at both the PS4 and the Xbox One before launch. Before I took my gap year, I had never flown abroad by myself but since then I have been lucky enough to travel to the US, Canada, Spain and more. Leading up to the trips I have to prepare videos that will cover each day I am away from home. On the actual trips most of my time is spent recording video content but it is always a lot of fun and I often get to meet up with other YouTubers. It's a privilege to be able make a career out of creating YouTube content which gives me the freedom to create my own work schedule- I don't have to answer to anyone else; I can just post videos when I see fit and create content that I enjoy! None of this comes without hard work though because YouTube is an extremely competitive space and in order to stay in the game I make sure I upload at least one video every single day. Anyone across the world can post video content to YouTube which means I am technically competing against anyone else in the world that's posting Call of Duty videos. I devote as much time as possible to creating videos, so that my content can stand out. I have a worldwide fan base, so when it's 3am in the UK (where I live) it's anywhere between 10pm and 7pm in the US (where the majority of my fans live). I often stay up late to make sure I am interacting with fans across the world via social media sites like Twitter and posting content to suit all time zones. My focus is primarily on the Call of Duty franchise. It's my job to make sure my fans always have the latest information, such as changes to the game and bring them entertaining gameplays and consistent video uploads. For example, I'll communicate that Call of Duty: Ghosts moves away from the Modern Warfare series and starts a new story to my subscribers. I then played through the whole of the campaign and its different modes, including 'Extinction' and multiplayer on my YouTube channel and really enjoyed it - It feels like an interactive movie! Taking a looking at the bigger picture outside my work, YouTube has had a big effect on the videogame world. The rise of Minecraft, a Sandbox indie game, is one great example of the impact YouTube can have on a game. Minecraft was played by several YouTubers when the game was in Beta and very few people knew about it. The YouTube videos acted as a catalyst for Minecraft's success, with more and more YouTubers playing the game and more viewers buying Minecraft to experience the game for themselves. Minecraft is now a global success, played by millions of people and there are many YouTubers who base their channels solely around Minecraft videos. When asked what I do, I try to explain it in its simplest form; I record videos of myself playing games and upload it to YouTube for people around the globe to watch. I often get asked why someone would want to watch another person play a video game, when they can play it themselves. It's a hard question to answer but I believe it comes down to the "YOU" in "YouTube" - viewers build a connection with the YouTuber creating the video content and start to invest in them, and come back to watch more videos to see THEM play video games and have fun as they do it.
{ "pile_set_name": "Pile-CC" }
Production management platforms for the development, debugging and deployment of software packages are known. For instance, software developers can utilize package management platforms which permit a developer to code, test, debug, iterate and deploy a software application or an undated version of a software application, operating system, or other software types. In general, at different stages of development the developer can complete and store various versions of the software in different repositories, such as network-accessible databases. The set of repositories can be named or labeled according to the various stages of development stored in that storage location, such as “Beta,” “Test”, “Stable,” “Quality Assurance (QA),” or “Production.” Existing package management platforms and related development tools suffer from a number of operational or technical drawbacks, however. For one, in existing package management platforms the developer or other user may be required to reinstall a given set of resources to a virtual machine when a new stage is entered, for instance to ensure compatibility with a new application or operating system. For another, the developer or other user may be required to manually store different versions of the software as is progresses through various stages of the development life cycle, which can among other things create a risk of inconsistent versions. For still another drawback, existing platforms are configured to manage the development of individual packages, but not the overall configuration management of the virtual machine, itself. Thus, to configure or update the processor, storage, or other resources assigned to a virtual machine functioning as a test bed for the software package under development, the developer or other user may need to invoke a separate configuration management tool to track the resource settings of and updates to the underlying virtual machine. It may be desirable to provide systems and methods for integrated package development and machine configuration management, in which both software packages and machine configurations can be generated, tracked, and moved through all phases of the development cycle using an integrated development tool.
{ "pile_set_name": "USPTO Backgrounds" }