text
stringlengths 1
3.78M
| meta
dict |
|---|---|
Effect of nitric oxide in protective effect of melatonin against chronic constriction sciatic nerve injury induced neuropathic pain in rats.
Developing a successful treatment strategy for neuropathic pain has remained a challenge among researcher and clinicians. Various animal models have been employed to understand the pathogenic mechanism of neuropathic pain in experimental animals. The present study was designed to explore the possible nitric oxide mechanism in the protective effect of melatonin against chronic constriction injury (CCI) of sciatic nerve in rats. Following chronic constriction injury, various behavioral tests (thermal hyperalgesia, cold allodynia) and biochemical parameters (lipid peroxidation, reduced glutathione, catalase, and nitrite) were assessed in sciatic nerves. Drugs were administered for 21 consecutive days from the day of surgery. CCI significantly caused thermal hyperalgesia, cold allodynia and oxidative damage. Chronic administration of melatonin (2.5 or 5 mg/kg, ip) significantly attenuated hyperalgesia, cold allodynia and oxidative damage in sciatic nerves as compared to CCI group. Further, L-NAME (5 mg/kg) pretreatment with sub-effective dose of melatonin (2.5 mg/kg, ip) significantly potentiated melatonin's protective effect which was significant as compared to their individual effect per se. However, L-arginine (100 mg/kg) pretreatment with melatonin (2.5 mg/kg, ip) significantly reversed its protective effects. Results of the present study suggest the involvement of nitric oxide pathway in the protective effect of melatonin against CCI-induced behavioral and biochemical alterations in rats.
|
{
"pile_set_name": "PubMed Abstracts"
}
|
GURGAON | Google GSuite Reseller Partner | Buy Renew GSuite Services Gurgaon
With G-Suite also get the professional Email Solution that will help you connected with clients all over the world. Emails have become part of modern day human as an attachment that describes his address to check his global connectivity. These business emails will be served directly under Google and you can open them around the world with just connectivity to the internet. With world being connected with internet, these emails will give business values and way to meet new leads and way to meet opportunities.
Being Google you are assured with 99% guarantee uptime with highest secured available, spam filtering, backups, schedule and more to give comprehensive data protection with mail directed at your business only. Setup these professional Emails with your smartphones and keep connected with your clients all the time. Started storage will be 30GB to begin with than goes to 1 TB with premium corporate business solutions. You can also set auto forward and further add your signature to make a brand of your Business with every mail you send.
G-Suite Emails are charged at optimized pricing at ₹200/month only to give away with benefits that will aid in every step for your business to achieve growth tremendous height. You can also opt for large Business (₹700/month) and Corporate Email(₹1700/month ) Solutions that are priced as per the services offered.
Business Mail will help you connect with professional G Suite Solution for all the requirements to get your business started and get started linking with clients all over the world.
|
{
"pile_set_name": "OpenWebText2"
}
|
133 F.3d 932
98 CJ C.A.R. 127
NOTICE: Although citation of unpublished opinions remains unfavored, unpublished opinions may now be cited if the opinion has persuasive value on a material issue, and a copy is attached to the citing document or, if cited in oral argument, copies are furnished to the Court and all parties. See General Order of November 29, 1993, suspending 10th Cir. Rule 36.3 until December 31, 1995, or further order.
Mahbubur RAHMAN and Sonia P. Rahman, Petitioners-Appellants,v.IMMIGRATION & NATURALIZATION SERVICE, Respondent-Appellee.
No. 97-9527.Board of Immigration Appeals (Nos. Adf-jsm-xwj, Abx-cgm-esd).
United States Court of Appeals, Tenth Circuit.
Jan. 7, 1998.
Before TACHA, BRISCOE, LUCERO, Circuit Judges.
1
ORDER AND JUDGMENT*
2
Mahbubur Rahman (Mahbubur) and Sonia Rahman (Sonia) appeal the decision of the Board of Immigration Appeals (BIA) denying their applications for asylum and withholding of deportation. We affirm.
I.
3
The Rahmans are husband and wife and both are natives and citizens of Bangladesh. Mahbubur became involved in the student wing of the Jatiyo Party while he was a student at Titumir College in Dhaka, Bangladesh, and served as assistant general secretary and later as general secretary. The Jatiyo Party was the ruling party until 1991 when it lost control to the Bangladesh National Party (National Party). Mahbubur graduated from college in 1986, but continued to be active as a student leader of the Jatiyo Party until 1992.
4
Mahbubur testified that, as he returned from work in August 1991, he was attacked by five or six members of the National Party. The attackers used sticks and knives and told him he would be killed if he did not cease political activities. He escaped without serious injury when passers-by heard his screams. He was again attacked in September 1992 with sticks and knives, and he recognized Kamruzzaman Ratan, a famous leader of the National Party. The attackers ran away after a crowd gathered. He was hospitalized for ten days following the second attack, suffering epistaxis (nosebleed) and multiple bruising due to blunt injury, and was prescribed fifteen days' of complete bed rest upon his release. He went into hiding upon his release from the hospital.
5
Mahbubur entered the United States on January 1, 1993, and his visa expired May 5, 1993. He filed a request for asylum on April 19, 1993, and his request was denied on March 10, 1994, by the Houston INS office. In response to an order to show cause why he should not be deported, he conceded deportability on December 15, 1994, and requested withholding of deportation and asylum. He testified that if he returns to Bangladesh, he will be killed or put in jail. His family attorney has warned him the government has issued a warrant for his arrest on a weapons charge, of which he claims he is innocent.
6
Sonia's mother, Syeda Jahan, was vice president of the Jatiyo women's organization. She testified the National Party threw her out of her house, threatened her and her children, and put her in jail in mid-May 1991, and that she believed the National Party had beaten her son because of her political involvement. She entered the United States in August 1991 and, on March 24, 1994, INS determined she had a well-founded fear of persecution and granted asylum.
7
Sonia testified the National Party wanted to kill her because of her husband's and mother's ties to the Jatiyo Party. She went into hiding in 1991 after her mother left Bangladesh. She entered the United States on June 14, 1994, and her visa expired on December 13, 1994. In response to an order to show cause why she should not be deported, she filed an application for asylum and for withholding of deportation on March 16, 1995.
8
A deportation hearing was conducted on April 17, 1995, for Mahbubur, but the immigration judge (IJ) continued the case for consolidation with Sonia's case. Both cases were heard on January 4, 1996, and the Rahmans' applications for withholding of deportation and asylum were denied. The denial was affirmed by the BIA on May 14, 1997.
II.
9
The Immigration and Nationality Act established a two-part test for determining whether a deportable alien is statutorily eligible for asylum. Castaneda v. INS, 23 F.3d 1576, 1578 (10th Cir.1994). The alien must show he or she is a refugee by proving either past persecution or a well-founded fear of persecution on account of race, religion, nationality, membership in a particular social group, or political opinion. Id. Persecution is defined as "the offensive 'infliction of suffering or harm.' " Hadjimehdigholi v. INS, 49 F.3d 642, 646 (10th Cir.1995) (quoting Zalega v. INS, 916 F.2d 1257, 1260 (7th Cir.1990)).
10
If the alien establishes eligibility as a refugee, the Attorney General may, in her discretion, grant asylum. See Castaneda, 23 F.3d at 1578. The Attorney General may exercise her discretion to deny asylum if there is little likelihood of present persecution. Kapcia v. INS, 944 F.2d 702, 709 (10th Cir.1991). There is a rebuttable presumption, however, that an alien who has experienced past persecution has reason to fear similar persecution in the future. Id.
11
To establish eligibility for the withholding of deportation, an alien must prove a "clear probability of persecution" upon deportation. Rezai v. INS, 62 F.3d 1286, 1289 (10th Cir.1995). This "clear probability" test is more stringent than the well-founded fear test used in the asylum context. Id. at 1289. Unlike asylum determinations, however, the Attorney General has no discretion to deny withholding of deportation to aliens who demonstrate eligibility. Id.
12
We review factual findings by the BIA under the substantial evidence standard and do not weigh evidence or evaluate witnesses' credibility. Kapcia, 944 F.2d at 707. Even if we disagree with the BIA's conclusions, we will not reverse if its findings are supported by substantial evidence and are substantially reasonable. Id.
III.
Application of Correct Standard by IJ
13
In denying the Rahmans' applications, the IJ found they had not "submitted a credible record." Certified Admin. R. at 38. The IJ stated: "My finding is that even if I can believe this story, which is hard to believe, neither respondent has shown a well-founded fear of persecution." Id. at 39. The Rahmans infer from this statement that they were required to demonstrate both past persecution and a well-founded fear of future persecution. However, to be considered a refugee, an alien need only show past persecution or a well-founded fear of future persecution. The Rahmans argue the ruling was therefore erroneous and the BIA erred as a matter of law in affirming the IJ's ruling.
14
The IJ specifically found a lack of credibility concerning Mahbubur's past persecution and that he also failed to show a well-founded fear of persecution. In regard to Sonia, whose asylum claim was based solely on fear of persecution, the IJ found she did not have a well-founded fear. Therefore, the necessary findings were made. Further, the BIA clearly applied the correct law in affirming the ruling. It found Mahbubur's testimony, without corroborating testimony, was not sufficiently plausible, detailed, or internally consistent to support his claim of past persecution. The BIA also concluded neither Mahbubur nor Sonia had a well-founded fear of persecution. The Rahmans' argument that the BIA affirmed an erroneous conclusion by the IJ is therefore without merit.
Findings Regarding Mahbubur by BIA
15
The testimony of an applicant for asylum may be sufficient to sustain the burden of proof, without corroboration, if the testimony is credible. 8 C.F.R. § 208.13(a). The applicant must present specific, credible evidence to support a claim that he has been persecuted or will be persecuted if deported. Rezai, 62 F.3d at 1289. Inconsistencies in an applicant's testimony support a conclusion that testimony is not credible. Id. (statement in asylum application that applicant had been beaten on "one occasion" and testimony that applicant had been "beaten up many times" supported conclusion testimony was not credible).
16
Mahbubur's testimony regarding the number of people who attacked him in 1992 was inconsistent. In his January 12, 1995, affidavit, he stated he recognized members of the National Party and that Ratan "had with him a group of 4 to 5 younger individuals who [were] also [known] to be student[ ] leaders for the [National Party]." Certified Admin. R. at 145. At his April 17, 1995, hearing, however, he testified he saw nine or ten student leaders and that eight or nine people attacked him. With regard to his 1991 attack, he stated in his March 31, 1993, affidavit that Monu, his best friend at one time, participated in the attack. However, at his hearing he admitted he did not know Monu's last name. Most significant is the discrepancy regarding Ratan's participation in the two attacks. Mahbubur stated in his January 12, 1995, affidavit that he "saw no specific leader" in the 1991 attack, but that Ratan was present at the 1992 attack. At his hearing, he testified that Ratan, "the most famous leader" in the National Party, was involved in both attacks.
17
Mahbubur attributes some of the inconsistencies to his lack of fluency in English. An interpreter was used at the January 4, 1996, hearing, but none was used at the April 17, 1995, hearing. An interpreter is essential to the fundamental fairness of a deportation hearing when the alien cannot speak English fluently. Tejeda-Mata v. INS, 626 F.2d 721, 726 (9th Cir.1980). The record reveals the IJ offered an interpreter at the April 17, 1995, hearing, but Mahbubur declined the offer. Further, he did not raise the language problem before the BIA. Such failure constitutes a failure to exhaust administrative remedies with respect to the question and this court lacks jurisdiction to address the matter. Rivera-Zurita v. INS, 946 F.2d 118, 120 n. 2 (10th Cir.1991).
18
Mahbubur also submits the inconsistencies are not material to his claim for asylum. There is no dispute with regard to the most convincing evidence of past persecution, i.e., that he was hospitalized for ten days and then prescribed fifteen days' bed rest when he was discharged. The BIA rejected the claim of past persecution on the basis that, without corroborating evidence, the testimony was not sufficiently plausible, detailed, or internally consistent. However, the testimony of hospitalization was corroborated by a medical report. On the other hand, the record does not contain evidence to corroborate Mahbubur's testimony as to the reason for the attacks. An alien must show persecution "on account of race, religion, nationality, membership in a particular social group, or political opinion." 8 U.S.C. § 1101(a)(42). While the medical report corroborates Mahbubur's injuries, it does not corroborate his testimony that he was attacked because of his membership in the Jatiyo Party or his political opinions.
19
The IJ found Mahbubur was lacking in credibility. "Because the immigration judge is in the best position to evaluate an alien's testimony, his or her credibility determinations are to be given 'much weight.' " Dulane v. INS, 46 F.3d 988, 998 (10th Cir.1995) (quoting Estrada v. INS, 775 F.2d 1018, 1021 (9th Cir.1985)). The BIA agreed that Mahbubur had failed to provide sufficiently credible testimony to support his claim of past persecution. To reverse the BIA, this court must find the evidence compels a contrary conclusion. INS v. EliasZacarias, 502 U.S. 478, 481 n. 1 (1992). In light of Mahbubur's inconsistent and for the most part uncorroborated testimony regarding past persecution, we affirm the BIA's conclusion that Mahbubur did not prove he is entitled to refugee status on the basis of past persecution.1
Findings Regarding Sonia by BIA
20
Sonia contends the BIA erred in concluding she did not have a well-founded fear of persecution without making a finding of adverse credibility. The BIA affirmed the IJ's adverse credibility finding as to Mahbubur but it did not make the same finding as to Sonia. The BIA did note Sonia's testimony regarding her husband's hospitalization was inconsistent with the medical report. In any event, the BIA denied Sonia refugee status not because it did not believe her but because the record did not demonstrate the Bangladesh government was inclined to punish her because of her ties to the Jatiyo Party.
21
To be entitled to refugee status on the basis of a well-founded fear of persecution, an alien must prove the feared persecution is "on account of race, religion, nationality, membership in a particular social group, or political opinion." Castaneda, 23 F.3d at 1578. Persecution on account of membership in a particular social group encompasses persecution of an individual who is a member of a group of persons, all of whom share a common, immutable characteristic. Gebremichael v. INS, 10 F.3d 28, 36 (1st Cir.1993). The shared characteristic might be an innate one, such as sex, color, or kinship ties. Id.
22
Sonia argues the IJ and the BIA failed to address her membership in a particular social group, i.e., her family. See, e.g., Hernandez-Ortiz v. INS, 777 F.2d 509, 515 (9th Cir.1985); Ananeh-Firempong v. INS, 766 F.2d 621, 627 (1st Cir.1985) (noting relevance of treatment of petitioner's family members). She contends the BIA never inquired as to how her relationship with her mother affected her asylum claim.
23
Both the IJ and the BIA addressed the issue of Sonia's mother. Sonia testified at the January 4, 1996, hearing that her mother was granted asylum. Sonia's application for asylum, with an affidavit explaining the circumstances of her mother's asylum attached, was admitted into evidence. The IJ stated that he "very carefully" considered the fact that INS had granted Sonia's mother asylum. Certified Admin. R. at 40. The IJ discussed Sonia's claims that her mother had been politically active and had been politically harassed because of her involvement. The IJ examined the affidavit of Sonia's mother in which she stated the National Party threatened to kill her and kidnap her children, and that she believed her son had been beaten by National Party members. Sonia's affidavit contained no assertions of threats made directly to her, however, and she later testified that she had not been personally threatened because of her mother's activities.
24
The BIA addressed de novo the evidence of Sonia's fear of persecution because of her mother's activities.2 The BIA reviewed evidence that Sonia's mother was vice president of the Jatiyo Women's League, that her family had been threatened with death because of her activities, and that she had been granted asylum. There was also evidence that Sonia went into hiding after Mahbubur left Bangladesh and that the National Party was searching for Sonia with hopes of thereby getting Mahbubur and Sonia's mother back in Bangladesh. The BIA concluded Sonia did not have a well-founded fear of persecution as she was not herself politically active in Bangladesh.
25
The BIA reviewed the State Department's report on human rights practices in Bangladesh. U.S. Dep't of State, Country Reports on Human Rights Practices for 1994, S. Prt. 104-12 (1995) (Country Reports ). While the National Party won a plurality of seats in the 1991 election, the Jatiyo Party is a significant opposition party with members comprising twenty to thirty percent of the country's legislature. Country Reports did acknowledge that "[v]iolence, often resulting in killings, is a feature of the political process. Demonstrators from all parties, and even within parties, often clash." Certified Admin. R. at 135 (emphasis added). To be eligible for asylum, however, an alien's fear of persecution must be based on more than general conditions of upheaval and unrest in his native country. Huaman-Cornelio v. Board of Immigration Appeals, 979 F.2d 995, 1000 (4th Cir.1992). The BIA concluded the record did not demonstrate the government was inclined to punish Sonia because of her ties to the Jatiyo Party.
26
Family affiliation with an unpopular political movement, standing alone, is insufficient to warrant asylum. Refahiyat v. United States Dep't of Justice, 29 F.3d 553, 557 (10th Cir.1994). Further, a grant of asylum to an applicant's parent is relevant only to the Attorney General's discretionary decision to grant asylum to the applicant, not to the preliminary determination of the applicant's refugee status. Bereza v. INS, 115 F.3d 468, 476 (7th Cir.1997).
27
More significant than the grant of asylum to Sonia's mother is the fact that Sonia did not leave Bangladesh until almost three years after her mother left. Neither Sonia's testimony nor her mother's affidavit describes any threats or harassment directed to Sonia subsequent to her mother's departure. The fact that so much time passed without incident supports the BIA's conclusion that the government was not inclined to punish Sonia because of her ties to the Jatiyo Party. See Nazaraghaie v. INS, 102 F.3d 460, 463 (10th Cir.1996) (passage of eleven months without incident following alien's release from jail indicated alien's fear of persecution was not well founded); see also Chavarria v. United States Dep't of Justice, 722 F.2d 666, 670-71 (11th Cir.1984) (withholding of deportation denied where applicant remained in Nicaragua for two years after events which triggered persecution of fellow employees, and petitioner was not persecuted during that two-year period).
28
Finally, the Rahmans argue the BIA misapplied the criteria relevant to a determination of well-founded fear as enunciated by the BIA in In re Mogharrabi, 19 I. & N. Dec. 436, 446, 1987 WL 108943 (B.I.A.1987). Under Mogharrabi, the evidence must establish:
29
(1) the alien possesses a belief or characteristic a persecutor seeks to overcome in others by means of punishment of some sort; (2) the persecutor is already aware, or could easily become aware, that the alien possesses this belief or characteristic; (3) the persecutor has the capability of punishing the alien; and (4) the persecutor has the inclination to punish the alien.
30
Id. at * 15. The BIA assumed Sonia satisfied the second and third factors, but found she did not possess a belief or characteristic which the government sought to overcome by punishment. Sonia contends the government sought to overcome in her the characteristic of membership in her mother's family. She also maintains the government imputed her mother's political beliefs to her and sought to overcome those beliefs. See Lazo-Majano v. INS, 813 F.2d 1432, 1435 (9th Cir.1987) (recognizing persecutor's imputation of belief to alien can place alien at risk). Assuming, arguendo, Sonia satisfies the first factor, she does not show how she satisfies the fourth factor, i.e., that the National Party is inclined to punish her. As noted, the passage of three years without incident following Sonia's mother's departure supports the BIA's conclusion that the government is not inclined to punish Sonia because of her ties to the Jatiyo Party.
31
Because Mahbubur's testimony regarding his past persecution was insufficient to establish eligibility for asylum, Sonia's claim for asylum fails to the extent it relies on her association with him. Nor, as discussed above, has Sonia demonstrated eligibility for asylum based on her mother's political activities. There is substantial evidence to support the BIA's finding that Sonia did not have a well-founded fear of persecution upon her return to Bangladesh.
32
Since the Rahmans have failed to establish statutory eligibility for a grant of asylum, i.e., that they are refugees, they cannot meet the tougher standard required for withholding of deportation. Rezai, 62 F.3d at 1289. There is substantial evidence to support the BIA's denial of the withholding of deportation.
IV.
33
The decision of the Board of Immigration Appeals is AFFIRMED. Petitioners' motion to respond to respondent's supplemental citation is GRANTED. Petitioners' request to preclude our consideration of Elboukili v. INS, 125 F.3d 861 (Table), 1997 WL 616222 (10th Cir. Oct. 7, 1997) is DENIED.
*
This order and judgment is not binding precedent, except under the doctrines of law of the case, res judicata, and collateral estoppel. The court generally disfavors the citation of orders and judgments; nevertheless, an order and judgment may be cited under the terms and conditions of 10th Cir. R. 36.3
1
The BIA also concluded Mahbubur did not have a well-founded fear of future persecution. Mahbubur did not appeal this finding, however, and we do not address it
2
The Rahmans are troubled by the fact the BIA did not specifically refer to Jahan's affidavit. As the INS points out, however, this is likely because the Rahmans did not reference the affidavit in their brief to the BIA
|
{
"pile_set_name": "FreeLaw"
}
|
Site of Nature Conservation Interest
Site of Nature Conservation Interest (SNCI), Site of Importance for Nature Conservation (SINC) and regionally important geological site (RIGS) are designations used by local authorities in the United Kingdom for sites of substantive local nature conservation and geological value. The Department for Environment, Food and Rural Affairs has recommended the generic term 'local site', which is divided into 'local wildlife site' and 'local geological site'.
There are approximately 35,000 local sites, and according to the former Minister for Biodiversity, Jim Knight, they make a vital contribution to delivering the UK and Local Biodiversity Action Plans and the Geodiversity Action Plan, as well as maintaining local natural character and distinctiveness. Sites of Special Scientific Interest (SSSIs) and local nature reserves (LNRs) have statutory protection, but they are only intended to cover a representative selection of sites, and Local sites are intended to provide comprehensive coverage of sites of nature conservation value. Local sites do not have statutory protection (unless they are also SSSIs or LNRs), but local authorities are expected to take account of the need to protect them in deciding their planning and development policies.
Selection methodology
Local sites are designated by local authorities in cooperation with Wildlife Trusts, RIGS Groups or Geology Trusts, or their equivalents. For example, in Kent, local wildlife sites are identified by the Kent Wildlife Trust). Selection is objective and is normally based upon a recent survey specifically designed for SNCI, but selection on the basis of existing, published information may also occur. The approach is similar to that used for the selection of biological Sites of Special Scientific Interest (SSSI), but the thresholds are lower.
Selection is primarily for habitats of inherent wildlife interest, but some sites may be selected for supporting rare or scarce species of plants or animals outside such habitats. The areas concerned may be areas of 'natural' habitats, or they may be man-made – for example, the West Norwood Cemetery is designated a Site of Metropolitan Importance for Nature Conservation by the London Borough of Lambeth
Once identified, designation and protection of the areas are done by local authorities through planning policies in their development plans. National government guidance (PPS 9) requires all development plans to include such policies. The variation in names for the designation reflects its separate existence in the different development plans for different areas.
In some areas, the designation is subdivided, or additional, more local designations are also used. For example, in Greater London SINCs are divided into the following grades:
Site of Metropolitan Importance for Nature Conservation
Site of Borough Importance for Nature Conservation (Grade I and Grade II)
Site of Local Importance for Nature Conservation
See also
Site of Special Scientific Interest
Local nature reserve
References
External links
Greenspace Information for Greater London, a database which covers most publicly accessible London SINCs
Category:Nature reserves in the United Kingdom
Category:Protected areas of the United Kingdom
|
{
"pile_set_name": "Wikipedia (en)"
}
|
Download the official Manchester United Podcast for exclusive interviews from some of the biggest names in football as they reveal stories you will have never heard before. Sam Homewood, Helen Evans and David May sit down with legends from the past and present day to give you a unique insight to Manchester United and the sometimes unbelievable world of football.If you'd like to get in touch with the pod, e-mail utdpodcast@manutd.co.ukThis is the only official podcast for fans of the Red Devils. Stories from players who know what it’s like to walk out at Old Trafford, The Theatre of Dreams. Hear about player transfers, playing under Sir Alex Ferguson and playing with the biggest names, like David Beckham, Cristiano Ronaldo and Wayne Rooney. See acast.com/privacy for privacy and opt-out information.
|
{
"pile_set_name": "OpenWebText2"
}
|
On Wed, 4 Sep 2002, Ralf Baechle wrote:
> > It would be nice if we could keep a single set of syscalls for both (n)64
> > and n32. The address crop for n32 may be handled the Alpha way. I will
> > investigate the topic soon.
>
> Can you describe how this is handled on the Alpha?
I'm referring mostly to OSF/1 here as it was first to implement it.
Linux followed it in the sense it is able to execute OSF/1 binaries marked
as "32-bit", but native ELF binaries used to be fully 64-bit always. I
think by a popular demand GNU binutils are now able to create "cropped"
Alpha/Linux ELF binaries as well, but this is unverified for sure. The
implementation is two-fold.
First, the static linker (if given the "-taso" option) maps an executable
into the low 31-bit address space (coincidentally, this will probably be
suitable for MIPS as well) and sets a special flag in the executable (it
does it in a weird place, but this is ECOFF and we have suitable flags in
the ELF header already).
Second, seeing the "31-bit" flag set, the kernel returns any maps
requested within the low 31-bit address space. This way both shared
libraries (which thus need not be special, i.e. may be regular 64-bit
ones) and areas allocated by mmap() are addressable by the executable.
To summarize, nothing much complicated.
> The primary problem is the differnet calling sequence for o32 and N64.
But we handle that already.
> As it looks we'll be able to use either the o32 function or the native
> syscall to implement all of the necessary N32 syscalls.
The (n)64 versions seem suitable and the o32 ones do not as n32 only
crops addresses to 32-bit -- data may still be 64-bit (e.g. file position
pointers).
> The question is if we want to reserve another 1000 entries in our already
> huge syscall table for N32 or if we got a better solution ...
Aaarrgh, no more entries, please...
--
+ Maciej W. Rozycki, Technical University of Gdansk, Poland +
+--------------------------------------------------------------+
+ e-mail: macro@ds2.pg.gda.pl, PGP key available +
|
{
"pile_set_name": "Pile-CC"
}
|
Troedssonellidae
Troedssonellidae is a family of orthoceroid cephalopods from the Ordovician, derived from rod-bearing Baltoceratidae, that have a continuous lining within the siphuncle that resembles very thin and slender endocones. Shells are generally slender and orthoconic. The siphuncle is central or subcentral, composed of straight or slightly expanded segments. Septal necks generally short and connecting rings are thin. Thin cameral deposits (lining the chambers) are known, which along with the position of the siphuncle and thin connecting rings distinguishes them from the endocerids in which they have been included.
Troedsonnellids first appear high in Lower Ordovician (Cassinian) strata, beginning with Tajaroceras and extend at least through the Whiterock Stage of the Middle Ordovician. They also may have given rise to the Striatoceratidae and to the Narthecoceratidae of the Middle and Late Ordovician.
Genera include Tajaroceras, Buttsoceras, Oxfordoceras, Ctenoceras, Troedsonnella and possibly Glenisteroceras and Wolungoceras.
References
Category:Orthoceratoidea
|
{
"pile_set_name": "Wikipedia (en)"
}
|
The specific aims of this Administrative Core include: 1) to provide the administrative structure to permit the effective day to day operation of the MCRC, 2) to provide the scientific expertise and leadership to identify and focus projects on clinically relevant issues and to insure that important unmet needs of underserved and minority patient groups are addressed, 3) to maintain and enhance internal communication and cooperation among MCRC members and to promote novel approaches to address clinically relevant issues, and 4) to expand the influence of the MCRC within the institution and to identify and secure institutional support to promote and enhance the activities of the Center. The Administrative Core will be housed in the Division of Rheumatology in the Department of Medicine. This Unit will be responsible for the overall direction, organization, operation and integration of the MCRC. The MCRC director, Dr. Richard Pope, will be assisted on a routine basis by the associate director, Dr. Rosalind Ramsey-Goldman, and the Methodology/Data Management Core director, Dr. Rowland Chang. The MCRC administrator, Mr. Christopher Loertscher, will assist in supervising and monitoring all budgetary issues and the scheduling of meetings by the executive committee, as well as MCRC sponsored research meetings and seminars, assisting in the preparation of reports and in dealing with regulatory matters. The scientific expertise and leadership within the Northwestern MCRC occurs at the level of the executive committee, that is chaired by Dr. Richard Pope and includes Dr. Roz Ramsey-Goldman, RowlandChang, Alan Dyer, Thomas Schnitzer, W. Zev Rymer, Lauren Pachman, and Rex Chisholm. A strength of this group is that it is composed of individuals with a variety of interests in clinical research on diseases relevant to the mission of the MCRC. The background that each member brings to the committee is quite different, which allows a truly multidisciplinary view of each issue. The committee meets bimonthly and considers all issues relevant to the scientific direction of the MCRC. The committee is responsible for identifying and pursuing new opportunities for interaction and development. These opportunities are particularly enhanced because of the roles of members of the executive committee both within the university community and nationally. It is through these interactions that the members of the committee are able to identify and promote important issues of national importance.
|
{
"pile_set_name": "NIH ExPorter"
}
|
Albert Vickers Bryan
Albert Vickers Bryan (July 23, 1899 – March 13, 1984) was a United States Circuit Judge of the United States Court of Appeals for the Fourth Circuit and previously was a United States District Judge of the United States District Court for the Eastern District of Virginia and the father of another federal judge, Albert Vickers Bryan Jr.
Education and career
Born in Alexandria, Virginia, Bryan received a Bachelor of Laws from University of Virginia School of Law in 1921. He was in private practice of law in Alexandria from 1921 to 1947.
Federal judicial service
Bryan was nominated by President Harry S Truman on May 15, 1947, to a seat on the United States District Court for the Eastern District of Virginia vacated by Judge Robert Nelson Pollard. He was confirmed by the United States Senate on June 3, 1947, and received his commission on June 5, 1947. He served as Chief Judge from 1959 to 1961. His service was terminated on August 23, 1961, due to elevation to the Fourth Circuit.
Bryan was nominated by President John F. Kennedy on August 2, 1961, to the United States Court of Appeals for the Fourth Circuit, to a new seat created by 75 Stat. 80. He was confirmed by the Senate on August 15, 1961, and received his commission the same day. He assumed senior status on May 3, 1972. His service was terminated on March 13, 1984, due to his death in Fairfax, Virginia. He is interred in Ivy Hill Cemetery in Alexandria.
Notable case
Bryan's decisions on the Davis v. County School Board of Prince Edward County case were among those that served to implement the United States Supreme Court's ruling in Brown vs. Board of Education to force the desegregation of Virginia's public schools in the face of the so-called Massive Resistance to the ruling urged by Senator Harry F. Byrd and other Virginia political leaders.
Honor
The Albert V. Bryan United States Courthouse in Alexandria was named in Bryan's honor in 1986.
References
External links
Category:1899 births
Category:1984 deaths
Category:University of Virginia School of Law alumni
Category:Judges of the United States District Court for the Eastern District of Virginia
Category:United States district court judges appointed by Harry S. Truman
Category:20th-century American judges
Category:Judges of the United States Court of Appeals for the Fourth Circuit
Category:United States court of appeals judges appointed by John F. Kennedy
Category:Lawyers from Alexandria, Virginia
Category:Burials at Ivy Hill Cemetery (Alexandria, Virginia)
Category:Judges of the United States Foreign Intelligence Surveillance Court
|
{
"pile_set_name": "Wikipedia (en)"
}
|
Introduction {#Sec1}
============
The mutation of p53 protein is one of the frequent causes of human cancer since it has a key role in numerous cell stability and proliferation functions^[@CR1]^. On the other hand, MDM2 is an oncogene protein that negatively regulates p53^[@CR2]^. MDMX (MDM4) is also a homolog for MDM2 and acts as p53 inhibitor^[@CR3]^. In vivo and in vitro studies have shown the overexpression of both MDM2 and MDMX proteins in several cancer types^[@CR4]^ (e. g. MDMX overexpression up to 92% of AML cases^[@CR5]^). However, their mechanisms of action are slightly different as MDM2 mainly degrades p53 protein using its E3 ubiquitin ligase activity, while MDMX suppresses p53 by decreasing its transactivation activity and increasing MDM2 function^[@CR6]^.
Both MDM2 and MDMX (MDM2/X) are significantly overexpressed in cancer cells harboring wild type p53^[@CR7],[@CR8]^. As a result, the inhibition of MDM2/X-p53 interaction leads to the restoration of p53 activity and subsequent tumor suppression^[@CR9]^. From the structural point of view, MDM2/X share a similar p53-binding domain of the N-terminal hydrophobic pocket. This site engages hydrophobic bonds with p53 residues of Phe19, Trp23, and Leu26, which leads to the p53 transcriptional activity suppression^[@CR10],[@CR11]^.
To pharmacologically antagonize the MDM2/X-p53 interaction, several molecules have been developed. In this path, small molecule inhibitors, such as Nutlin-3 were mostly unsuccessful in clinical trials^[@CR12]^. Although its derivative, RG7112, has shown some promising results, its unsuitable inhibition of MDMX was one of the main drawbacks^[@CR13]--[@CR15]^. Alongside small molecules, some lead peptide sequences have also been developed, mostly by the alteration in the p53-MDM2/X binding site (ETFSDLWKLLPE), including 12/1 (MPRFMDYWEGLN)^[@CR16]^, \_ENREF_17PMI (TSFAEYWNLLSP)^[@CR17]^ and pDI (LTFEHYWAQLTS)^[@CR18]^. In what follows, there are several studies to improve the kinetics and dynamics of these peptides such as synthesizing stapled peptides^[@CR19],[@CR20]^. One of the first examples was SAH-8, designed by stapling p53-MDM2/X binding site sequence^[@CR21]^. More recently, ATSP-7041 has been developed as stapled pDI peptide which later led to ALRN-6924 peptide with promising anticancer results^[@CR22]^. Nevertheless, the main limitation in this area is the common low affinity of peptides to MDMX protein which reduces their effectiveness as anticancer agents^[@CR23],[@CR24]^. As a result, the optimization of lead peptides to obtain a "potent" and "dual" inhibitor of MDM2/X is an ongoing challenge. "Potent" is a common term for high affinity and stable therapeutic candidate which targets MDM2/X. On the other hand, any agent introduced to inhibit MDM2 is not robust enough to have an acceptable cytotoxic effect unless it could also inhibit MDMX.^[@CR18]^. Consequently, "dual" refers to the capability of the peptides to target both MDM2 and MDMX proteins. Most of the previous studies focused on the rational design of p53-based peptides are usually lacking the consideration of dual inhibition of MDM2/X^[@CR25],[@CR26]^. In this regard, one of the promising approaches is using in silico and theoretical workflows such as Molecular Dynamic (MD) simulation to optimize and verify drug candidate peptides^[@CR27]--[@CR29]^. Accordingly, in this study, we applied a computational structure-based approach inclusively on experimentally validated p53-based peptides, including p53, pDI, pDIQ, and pMI to; A) study their "potent" and "dual" inhibitor activities against MDM2/X, B) find critical residues playing roles in higher affinity to MDM2/X and helicity conservation, C) follow a computational high-throughput point mutation screening on pDI, (LTFEHYWAQLTS) and pDIQ, (ETFEHWWSQLLS) to analyze and validate structurally and functionally. To these ends, 27 different MD simulations and follow-up analyses were performed to assign the suitable features of native and mutated peptides against MDM2/X. The appropriate correlation between achieved theoretical and confirmed experimental results highlighted the suitability of the suggested methodology in this study, which could lead to the implicit rational peptide design in this area.
Materials and methods {#Sec2}
=====================
Atomic coordinates of peptide-MDM2/X structures {#Sec3}
-----------------------------------------------
The structures of peptides-MDM2/X complexes were extracted from Protein Data Bank (PDB). First, due to the lack of pDI-MDM2 structure with the total number of residues, the two close PDB codes of 3G03 and 3JZR (<https://www.rcsb.org/>) were taken. The final coordinates were achieved by the superimpositions and refinement of the mentioned PDB structures utilizing Chimera software. The coordinates of other structures were directly extracted from PDB codes of 3FDO, 4HFZ, 3DAB, 3EQS, 3EQY, 3JZS, and 3JZQ for pDI-MDMX, p53-MDM2, p53-MDMX, PMI-MDM2, PMI-MDMX, pDIQ-MDM2, and pDIQ-MDMX, respectively. The "repair PDB" command of FoldX v.3 program was employed to optimize the structures and add the missing atoms.
High-throughput mutation screening of pDI and pDIQ using FoldX {#Sec4}
--------------------------------------------------------------
To screen a large number of possible mutations of pDI and pDIQ peptides, the FoldX program was applied. The FoldX program computes the interaction energy robustly based on the empirical data extracted from protein engineering studies which makes it a notable assistance for peptide designing. First,\_ENREF_29 the "PSSM" interface of FoldX was utilized to mutate all the residues of peptides to 20 native amino acids (mutation to the residue itself was also carried out) in pDI-MDM2/X and pDIQ-MDM2/X complexes. Using BuildModel and AnalyseComplex interfaces upon each mutation, the final optimized structure and the interaction energy of the peptide-MDM2/X complexes were obtained. The FoldX force field was used to calculate the free energy of unfolding (ΔG) as described below.$$\documentclass[12pt]{minimal}
\usepackage{amsmath}
\usepackage{wasysym}
\usepackage{amsfonts}
\usepackage{amssymb}
\usepackage{amsbsy}
\usepackage{mathrsfs}
\usepackage{upgreek}
\setlength{\oddsidemargin}{-69pt}
\begin{document}$$\Delta G = \left( { 0.33 \times \Delta G_{{{\text{vdw}}}} } \right) + \Delta G_{{{\text{solvH}}}} + \Delta G_{{{\text{solvP}}}} + \Delta G_{{{\text{wb}}}} + \Delta G_{{{\text{hbond}}}} + \Delta G_{{{\text{el}}}} + \Delta G_{{{\text{kon}}}} + T\Delta S_{{{\text{mc}}}} + T\Delta S_{{{\text{sc}}}}$$\end{document}$$
where the terms are free energy difference of total van der Waals energy of all atoms (Δ*G*~vdw~); solvation energy for hydrophobic and polar groups (Δ*G*~solvH~ and Δ*G*~solvP~ , respectively); the water bridges (Δ*G*~wb~); the hydrogen bonds (Δ*G*~hbond~); the electrostatic bonds (Δ*G*~el~ and the electrostatic bonds of subunit molecules (Δ*G*~kon~). Meanwhile, Δ*S*~mc~ is defined as the entropy change when the backbone is changed to a particular conformation, and Δ*S*~sc~ is the entropy change when the side chain is transformed into an appropriate structure. *T* is the temperature^[@CR30]^.
The input structures of pDI-MDM2/X and pDIQ-MDM2/X for the FoldX program were described in the "[Atomic coordinates of peptide-MDM2/X structure](#Sec3){ref-type="sec"}s" section. After each mutation on the peptides' residues, the variance of interaction energy (ΔE) was calculated. Subsequently, the extracted structures with the lowest ΔE were selected for further studies. The final atomic coordinates of selected mutant peptides_MDM2/X complexes were used as reference structures for MD simulations.
Molecular dynamics simulations {#Sec5}
------------------------------
GROMACS-2018 package^[@CR31]^ was applied to perform 200 ns simulation on 27 different systems (total time of 5.4 μs) using the GROMOS96 54a7 force field. Solvation of each system was conducted via the SPC water model in the a triclinic box that the distances of molecules' centers to the edges were 15 Å. All the simulation systems were neutralized by the suitable number of Na + and Cl- ions with the final ionic concentration of 150 mM. The van der Waals interactions were truncated using energy and pressure correction of long-range dispersion. Particle Mesh Ewald (PME) technique and LINCS algorithm^[@CR32]^ were employed for the calculation of long-range electrostatic interactions and making all bond constraints, respectively. Furthermore, the integration time step was set up as 2 fs and periodic boundary conditions were utilized in all directions. Prior to MD simulation, 200 ps of energy minimization from 0 to 300 K was carried out using a method of steepest descent. Moreover, 200 ps of system equilibration at 300 K was conducted with constant volume (NVT) and constant pressure (NPT) ensembles. UCSF Chimera Viewers was used to visualize the simulation outcomes. In addition, the analysis of Dictionary of Secondary Structure for Proteins (DSSP) of all complexes was conducted during the simulation time. Follow-up "umbrella sampling" and "gRINN" analyses were also conducted as explained in the following sections.
Umbrella sampling {#Sec6}
-----------------
Umbrella sampling simulation has proven to be a robust method to obtain the ΔG of a protein--protein interaction using the extracted potential of mean force (PMF)^[@CR33]^. In this approach, after the converging of PMF curve at a large center of mass distance, the difference of PMF's highest and lowest values is calculated as ΔG. The center of mass is defined as the representing average point of the mass. Moreover, the "wham utility" of the GROMACS package is used to perform the Weighted Histogram Analysis Method (WHAM) to extract the values of PMF during the simulations.
The whole procedure is described as follows. For pulling simulations, the atomic coordinates resulted from the last trajectories of MD simulations, as described in the "[Molecular dynamics simulations](#Sec5){ref-type="sec"}" section, were used as starting structures. Prior to pulling simulation, energy minimization and the only 200 ps of NPT ensemble were conducted. Subsequently, immobile references were adjusted for pulling simulations via the induction of restraints on MDM2/X proteins. The pull rate of 0.001 nm ps^−1^ (0.01 Å ps^−1^) and the spring constant of 1,000 kJ mol^−1^ nm^−2^ were used in the pulling of the peptides outside the structures' centers along the corresponding axis over 2.5 ns. The final COM distance between peptides and MDM2/X proteins was approximately 5 nm. In the next step, an approximate number of 25 snapshots of pulling simulations' trajectories were taken to obtain the primary structures for the windows of umbrella sampling. Moreover, to have an asymmetric distribution of sampling windows, the window spacing was defined as 0.1 nm up to 0.2 nm, beyond 3 nm of COM separation. Afterward, each window was utilized for 5 ns of MD simulation which makes the total umbrella sampling simulation time of approximate 1,125 ns. Ultimately, the PMF curve was produced and the differences of the maximum and minimum values of PMF were used to obtain the ΔG~binding~ for different complexes of peptides_MDM2/X by WHAM utility analyses.
Analyses of residue interactions in peptide-MDM2/X complexes using gRINN tool {#Sec7}
-----------------------------------------------------------------------------
One of the significant outputs of MD simulations is the functioning behavior of each residue especially in the protein--protein interactions. As a result, to gain information about the peptide_MDM2/X interactions on the residue level, a post-simulation analysis, called gRINN (get Residue Interaction eNergies and Networks) v1.1.0.hf1 tool, was utilized^[@CR34]^. This software uses MD simulation trajectories for building any pairwise amino acids non-bonded interaction energies. Before introducing the files into the software, all water and non-protein molecules were removed. The outputs of MD simulations including "tpr", "top" and "xtc" files were used as input files for gRINN tool. The generated data from 2000 MD simulation trajectories were employed to extract important residues interaction energy based analysis.
Results and discussion {#Sec8}
======================
Mutant pDI and pDIQ peptides screening in the complex with MDM2/X {#Sec9}
-----------------------------------------------------------------
MDM2 and MDMX are considered as well-known oncoproteins with inhibitory activities on the p53 protein. In addition, they are overexpressed in several types of cancerous cells harboring wild type p53^[@CR4]^. Therefore, MDM2/X suppression strategies have been considered as promising approaches for cancer therapy over the last decade^[@CR7],[@CR9]^. In this path, anticancer peptides are the robust agents to inhibit MDM2/X proteins effectively^[@CR17],[@CR18],[@CR21]--[@CR23]^. Hence, we have studied some p53-based peptides computationally to obtain high affinity, stable, and valid anti-MDM2/X peptides. In addition, we aimed to qualify our theoretical methodology for the development of "dual" anti-MDM/X peptides. To this end, a lead peptide named pDI^[@CR18]^ and its more potent derivative, pDIQ^[@CR17]^ were used as starting peptides for the mutation screening using the FoldX program.
Having used the PSSM interface of the FoldX program, the mutations were scored based on their primary interaction energy (∆E) of the mutated pDI and pDIQ peptides in complex with MDM2/X. The corresponding results were displayed in Tables S[1](#MOESM1){ref-type="media"}, S[2](#MOESM1){ref-type="media"}, S[3](#MOESM1){ref-type="media"}, and S[4](#MOESM1){ref-type="media"}. The criterion to select the mutant peptides was the appropriate ∆E for both MDM2/X to propose a dual inhibiting peptide. Excluding the neutral positions showing ineffective ∆E values, some point mutations on pDI with suitable interaction energies with MDM2/X were selected (Tables S[1](#MOESM1){ref-type="media"} and S[2](#MOESM1){ref-type="media"}). The same procedure was performed on pDIQ_MDM2/X complexes (Tables S[3](#MOESM1){ref-type="media"} and S[4](#MOESM1){ref-type="media"}). In summary, Leu1, His5, Ala8, Gln9, Ser12 were considered as neutral positions in pDI_MDM2 complexes as their ∆E showed neither negative nor positive value. Thr2 was also a neutral position to mutate in the pDI_MDMX complex. However, mutations on Phe3, Trp7, Leu10 residues were shown to be non-favorable. This finding is consistent with the key residues of Phe19, Trp23, and Leu26 as p53 binding segment with MDM2/X, mentioned in other studies^[@CR11]^. Conversely, single mutations on Glu4 and Thr11 were identified with favorable ∆Es in both MDM2/X complexes. Moreover, double mutations on the same positions of pDI were carried out and ∆Es were obtained. Accordingly, three pDI mutants, pDI_E4W (pDIm1) (∆E = −1.97 and − 2.89 kcal/mol), pDI_T11M (pDIm2) (∆E = −1.58 and − 2.02 kcal/mol) and the double mutant pDI_E4WT11M (pDIdm) (∆E = −1.40 and − 1.01 kcal/mol) were selected with the most suitable ΔEs for MDM2 and MDMX, respectively (Tables S[1](#MOESM1){ref-type="media"} and S[2](#MOESM1){ref-type="media"}). Regarding pDIQ, single mutations in Thr2 and Glu4 were shown to indicate favorable ∆Es in both MDM2/X complexes. As a result, the best mutant candidates of pDIQ were pDIQ_E4K (pDIQm1) (∆E = −1.26 and − 0.83 kcal/mol) and pDIQ_T2H (pDIQm2) (∆E = −1.28 and − 0.90 kcal/mol) with the best ΔEs for MDM2 and MDMX, respectively (Tables S3[3](#MOESM1){ref-type="media"}and S[4](#MOESM1){ref-type="media"}). The extracted atom coordinates from the mentioned mutants, as well as the p53, pDI, pDIQ, and PMI peptides were collected for further MD simulations in the free and MDM2/X bound states.
Secondary structural stability of peptides in the free state and complex with MDM2/X {#Sec10}
------------------------------------------------------------------------------------
The different experimentally validated anti-MDM2/X peptides, including p53, pMI, pDI, pDIQ, and also the selected mutant peptides (see the "[Mutant pDI and pDIQ peptides screening in the complex with MDM2/X](#Sec9){ref-type="sec"}" section) were entered into the MD simulations in the free and complex states. The sequences and available experimental IC~50~ of each peptide are shown in Table [1](#Tab1){ref-type="table"}.Table 1IC~50~ and computational ΔG~binding~ of the peptides_MDM2/X. The experimental IC~50~s recorded in the literature ^17^ for control studied peptides of p53, pDI, pDIQ, and PMI are presented. Also, ΔG~binding~s of all studied peptides of p53, pDI, pDIm1, pDIm2, pDIdm, pDIQ, pDIQm1, pDIQm2 and PMI in complex with MDM2/X using the "umbrella sampling" method are shown.PeptideSequenceIC~50~ (nM)ΔG~binding~^a^ (kCal/mol)MDM2MDMXMDM2MDMXp53ETFSDLWKLLPE2000600021NApDILTFEHYWAQLTS445502220pDIm1LTFWHYWAQLTS----2824pDIm2LTFEHYWAQLMS----2822pDIdmLTFWHYWAQLMS----2528pDIQETFEHWWSQLLS81103116pDIQm1EHFEHWWSQLLS----2519pDIQm2ETFKHWWSQLLS----1813PMITSFAEYWNLLSP20402519^a^The error with the calculated energy is 0.2 kcal/mol for every system.NA is not applicable.
Peptide-based agents, especially with the resemblance to the p53-MDM2/X binding site, have been shown promising dual inhibition of MDM2/X. The mentioned binding site consists of 12 residues with an alpha-helix structure. Helical peptides are usually unstable without a complete protein fold which reduces their affinity to the target protein. It is therefore highly significant to preserve the helicity of such peptides. In this regard, secondary structure analysis was performed on the studied peptides both in the free state and in complex with MDM2/X, using DSSP (Dictionary of Secondary Structure of Proteins) program^[@CR35]^. The results are depicted in Fig. [1](#Fig1){ref-type="fig"}.Figure 1Helicity probability of the studied peptides during MD simulation of different studied peptides of p53, pDI, pDIm1, pDIm2, pDIdm, pDIQ, pDIQm1, pDIQm2 and PMI using DSSP program in the free state (**A**), in complex with MDM2 (**B**) and in complex with MDMX (**C**).
As shown in Fig. [1](#Fig1){ref-type="fig"}A, the free p53 peptide interestingly showed one of the best conformational stability in the N-terminal residues (Thr2 and Phe3) compared to the same positions in other peptides. Likewise, in the pDIQm2 and PMI peptides, phe3, one of the conserved residues in the p53 binding site, preserved helicity.
The pDIQm1 peptide has the lowest helicity scores among all of the free mutant peptides. Regarding C-terminal residues, in the free p53 peptide, Leu9 has a score of 0.48, and Leu10 and Pro11 showed no helicity. In fact, Proline is known for destabilizing alpha-helix structures especially in the C-terminal residues^[@CR36]^ and this is one of the reasons p53 lost its helicity during the 200 ns simulation. However, other free peptides showed diverse range of stability in alpha-helix conformation in residues 8 to 11 (Fig. [1](#Fig1){ref-type="fig"}A). Overall, the mutant pDI and pDIQ peptides showed the best helicity in all Ala8, Gln9, Leu10, and Met11 compared to other studied free peptides. In the complex forms with MDM2/X, as expected, the conformational stability of most residues was increased (Fig. [1](#Fig1){ref-type="fig"}B, C). However, in contrast to the free states, residue 2 of the peptides in complex with MDM2/X showed no or very little score of helicity (Fig. [1](#Fig1){ref-type="fig"}B, C). Moreover, in residue 3, the helicity scores were less and were varied in the peptides_MDM2/X complexes (Fig. [1](#Fig1){ref-type="fig"}B, C). Residue 11 of PMI bound to MDM2 showed no helicity compared to its free state (Fig. [1](#Fig1){ref-type="fig"}B). In the p53_MDMX, peptide residues indicated lower helicity scores in the positions 3 to 5 rather than the scores of the same positions in the p53_MDM2. The conformational stability of pDIQm2 was also increased in complex forms possibly due to the favorable interaction energy between the peptide and MDM2/X. The overall results confirmed the improvement of the conformational stability of the previously designed peptides (pDI, pDIQ, and PMI) both in the free and complex forms compared to p53. Moreover, the newly developed mutant peptides especially pDIm2, pDIdm, and pDIQm1 have shown the best helicity score, particularly in the C-terminal residues. The importance of the C-terminal of p53-based peptides has previously been shown in the binding features to MDM2/X^[@CR37],[@CR38]^. Specifically, Pazgier et al*.* have shown that p53 peptides C-termini mutation from proline to other amino acids lead to an extended alpha-helical conformation in complex with MDM2^[@CR17]^. Overall, data in Fig. [1](#Fig1){ref-type="fig"} clearly displayed that; A) almost all peptides preserved their initial helicity structure during 200 ns simulation in the free and mainly in the complex forms. B) the helicity values of peptides in complex with MDM2 were more dominant than those of MDMX. C) The helicity probability had almost a similar pattern in residues 3 to 10 in the free state. However, the helicity score was higher in N-terminal residues rather than C-terminal residues in the complex states (mainly with MDM2).
It should be noted that the first two and the last residues did not participate in helix structure, neither in the free nor the complex states. However, their effect on the helicity extension especially on C-terminal residues was undeniable. The impact of the last residue on the peptides' structures will be discussed in the following sections.
Binding free energy analysis of peptides_MDM2/X using the umbrella sampling method {#Sec11}
----------------------------------------------------------------------------------
The binding affinity of the therapeutic agents to the target proteins is an important factor in predicting their effectiveness and value as promising drug candidates. It is therefore essential to precisely calculate the ΔG~binding~ of such interactions. The umbrella sampling method is a trustworthy approach for ΔG~binding~ computation especially for protein--protein interactions^[@CR33],[@CR39]^. Hence, in the current study, the interaction energies of all peptides-MDM2/X complexes were calculated using the umbrella sampling method. The method uses the PMF profile of a pulling simulation to estimate the binding energy between the two molecules. According to Fig. [2](#Fig2){ref-type="fig"} and Table [1](#Tab1){ref-type="table"}, the ΔG~binding~ of pDI mutant peptides to MDM2/X remarkably increased compared to the control peptides mainly p53 and pDI. The ΔG~binding~ results of pDIm1 and pDIm2 were also more suitable compared to the PMI peptide in complex with MDM2/X. The pDIQ peptide as an experimentally valid and potent inhibitory agent with previously measured IC~50~ of 8 and 110 nM^[@CR17]^ showed 31 and 16 kcal/mole ΔG~binding~ for MDM2 and MDMX, respectively (Table [1](#Tab1){ref-type="table"}). These results were highly consistent with the experimental results which were also plausible for p53, pDI, and PMI peptides. As shown in Table [1](#Tab1){ref-type="table"}, the order of peptides affinity to MDM2 is pDIQ \> PMI \> pDI \> p53 based on the experimental results. Interestingly, the computational calculation showed the same order. This was also applicable to MDMX complexes with a slight tolerance. As a result, the suitable binding energies of pDIm1, pDIm2, and pDIdm peptides with MDM2/X could acquire more validity. On the other hand, the pDIQm2 peptide had less binding energy to MDM2 and more affinity to MDMX compared to pDIQ itself. In addition, its binding energy was equal to PMI's. However, the pDIQm1 peptide did not have a suitable affinity to MDM2/X as the pDIQ peptide had. Given the fact that pDIQ is an optimized sequence, it seems more mutations such as E4K could not effectively improve the affinity to MDM2/X proteins.Figure 2Potential of mean force (PMF) curve compared to the mass center between studied peptides and (**A**) MDM2 and (**B**) MDMX using the "umbrella sampling" method. ξ is the center of mass between peptides and MDM2/X in angstrom.
Residual interaction analyses of peptides_MDM2/X using gRINN method {#Sec12}
-------------------------------------------------------------------
Each residue of a peptide can stimulate a dramatic structural and functional change in the peptide_protein complex. Additionally, every residual contact in protein--protein interactions could be either favorable or unfavorable regarding the binding and affinity points of view^[@CR40],[@CR41]^. Through MD simulations, the dynamicity of residue interactions is usually difficult to be delicately analyzed^[@CR36]^. However, a recently developed tool, named gRINN method, has been introduced to generate and extract residue by residue behavior of the biomolecules during MD simulation. Using gRINN tool, the interaction energies, the significant residues and the correlations of interaction energies are obtainable^[@CR34]^. The sum of total interaction energies in all residue-residue interactions was shown in each peptide_MDM2/X complexes (Fig. [3](#Fig3){ref-type="fig"}). Accordingly, as shown in Fig. [3](#Fig3){ref-type="fig"}A, the total interaction energies in pDIm1 (− 84.15 kcal/mol), pDIm2 (− 51.6 kcal/mol) and pDIdm (− 75.25 kcal/mol) decreased compared to that in pDI (− 95.89 kcal/mol) in complex with MDM2. However, the total interaction energy of pDIdm_MDMX was remarkably higher (− 87.5 kcal/mol) compared to the pDI_MDMX complex (− 32.65 kcal/mol) which made pDIdm peptide a potent dual inhibitor of MDM2/X. On the other hand, although the sum of interaction energies in pDIQ_MDM2 (− 85.7 kcal/mol) was comparable with pDI_MDM2 (− 95.89 kcal/mol), the level of interaction energies of pDIQ_MDMX (− 27.4 kcal/mol) was even lower than that of pDI_MDMX (− 32.65 kcal/mol). The interaction energy of pDIQm2 (− 23.4 kcal/mol) was lower in complex with MDM2 and was not different from that of MDMX (23.4 kcal/mol) compared to the pDIQ_MDM2/X interaction energies. In contrast, pDIQm1_MDM2 with total interaction energies of − 85.35 kcal/mol preserved the level of interaction energies of pDIQ_MDM2. However, its interaction energy quantity with MDMX was unremarkably higher (− 43.2 kcal/mole) compared to the pDIQ_MDMX complex. Overall, the top potent peptides against MDM2 in terms of the sum of residue-residue interaction energies were pDI (− 95.89 kcal/mol), PMI (− 92.6 kcal/mol), pDIQ (− 85.7 kcal/mol), pDIQm1 (− 85.35 kcal/mol) and pDIm1 (− 84.15 kcal/mol). However, regarding dual MDM2/X inhibition, the main potent peptide was pDIdm with − 75.25 kcal/mol and − 87.5 kcal/mol sums of interaction energies to MDM2 and MDMX, respectively.Figure 3Sum of interaction energies between studied peptides of p53, pDI, pDIm1, pDIm2, pDIdm, pDIQ, pDIQm1, pDIQm2, and PMI in complex with MDM2 and MDMX during MD simulation generated by gRINN tool. Black and Blue columns are MDM2 and MDMX complex forms, respectively. (**A**) illustrates the sum of all types of interaction energies, (**B**) indicates the total sum of electrostatic type of interaction energies, and (**C**) shows the total sum of van der Waals type of interaction energies in peptides_MDM2/X.
To get a better view of the type of intermolecular forces playing roles in the row of p53-based peptides bound to MDM2/X, the sum of interaction energies were illustrated in the Fig. [3](#Fig3){ref-type="fig"}B, C. As shown in Fig. [3](#Fig3){ref-type="fig"}B, electrostatic forces played an important role in the experimentally modified p53 sequences such as pDI, pDIQ, and PMI. The sum of electrostatic interaction energies of the p53_MDM2 complex increased from − 10.955 kcal/mol to − 64.165 kcal/mol, − 53.56 kcal/mol and − 65.35 kcal/mol in pDI_MDM2, pDIQ_MDM2, and PMI_MDM2 complexes, respectively. Similarly, the mutant pDI and pDIQ peptides showed strong electrostatic interaction energies with MDM2. Exceptions were pDIm2 and pDIQm1 with the lower electrostatic type of interaction energies. On the other hand, as shown in Fig. [3](#Fig3){ref-type="fig"}C, van der Waals forces had a higher level in the modified p53_MDM2 complexes compared to the native p53_MDM2. However, , van der Waals energy values were not much different among the peptides in MDM2 complexes. As shown in Fig. [3](#Fig3){ref-type="fig"}B, C, regarding the type of interaction energies with MDMX, there was a similar level of electrostatic and van der Waals interaction energies (with a slight favor for electrostatic bonds). The only exception was pDIdm which showed the electrostatic energy of − 63.2 kcal/mol for MDMX. This was possibly the reason for the its best binding energy to MDMX (see the previous section) and the highest residue-residue sum of interaction energies.
To show the important and specific residue-residue interactions in each peptide_MDM2/X structure, top interactions were illustrated in Fig. [4](#Fig4){ref-type="fig"}, Tables [2](#Tab2){ref-type="table"} and [3](#Tab3){ref-type="table"}. Accordingly, Phe3, as one of the three main residues of p53_MDM2/X binding site had the most top interaction energies with MDM2 residues of Gln72, Ile61, Val93, and Gly58. In the pDI_MDM2, the strong interactions were between Ser12 of pDI and Lys51 and Ser17 of MDM2. Ser12 of pDIm1, pDIm2, and pDIdm had also the highest interaction energies with Lys51, Ser17, and Gln18 residues of MDM2, respectively. The Ser12 interaction energy remained at the highest level in the pDIQ and pDIQm1 in complex with MDM2. The pDIQm2 peptide with no Ser12 showed the higher interaction energy in phe3 residue which might have been an important reason for total low binding energy in the pDIQm2_MDM2 complex (see the previous section). In the PMI_MDM2 structure, Ser11 indicated a strong interaction with Lys51 of MDM2. Regarding MDMX complexes (Table [3](#Tab3){ref-type="table"}), phe3 of p53 had a low level of interaction energy compared to that of p53_MDM2 complex. Modifying the p53 sequence, Tyr 6 and Trp7 of pDI with His72 and Met53 of MDMX showed the highest interaction energies in the pDI_MDMX complex. This was also the case in the pDIm1 and pDIm2 in complex with MDMX. However, in the pDIdm, the highest interaction energy was Ser12 with Lys50 of MDMX. On the other hand, Trp7 played an important role in the pDIQ and PMI interactions with MDMX. However, Glu4 and Leu11 were the critical residues of pDIQm1_MDMX and pDIQm2_MDMX complexes, respectively. The results were also depicted in Fig. [4](#Fig4){ref-type="fig"} highlighting the change of critical interacted residues during the modification of the peptide sequences from p53 to pDIdm. Given the fact that pDIdm have shown better results compared to other peptides, it can be implied that Ser12 plays a most critical role in dual inhibition of MDM2/X proteins.Figure 4200 ns snapshots of MD simulations for p53, pDI, and pDIdm in complex with MDM2 and MDMX. It illustrates the critical residues in the interactions of the peptides_MDM2/X complexes. Data are generated by gRINN tool and images have been developed using Chimera software. Table 2Top 10 residues-residue interactions in peptides_MDM2 complexes with the highest interaction energy extracted from gRINN tool. The left residue is relevant to the peptide sequence and the right one to the binding site of MDM2. If applicable, the FoldX mutations will be shown in **bold** letters.pDI-MDM2Ave total E (kcal/mol)pDIm1-MDM2Ave total E (kcal/mol)pDIm2-MDM2Ave total E (kcal/mol)pDIdm-MDM2Ave total E (kcal/mol)SER12-LYS51− 21.35SER12-LYS51− 19.03SER12-SER17− 9.43SER12-GLN18− 8.22SER12-SER17− 13.63SER12-SER17− 15.21PHE3-GLN72− 6.29PHE3-GLN72− 5.51THR11-LYS51− 9.02PHE3-GLN72− 5.59PHE3-TYR67− 2.98LEU10-ILE19− 5.07PHE3-GLN72− 5.99TRP7-LEU54− 3.99TYR6-HIS73− 2.90TRP7-LEU54− 4.77TRP7-PHE55− 3.89THR11-LYS51− 3.85TYR6-GLN72− 2.73GLN9-LYS94− 3.02TRP7-MET62− 3.13PHE3-TYR67− 2.70THR2-GLN72− 2.67GLN9-GLN18− 2.98TYR6-HIS73− 2.94TYR6-HIS73− 2.58TRP7-LEU54− 2.52**TRP4-MET62**− 2.77GLN9-SER17− 2.94THR2-GLN72− 2.40LEU10-SER17− 1.89PHE3-TYR67− 2.67LEU10-SER17− 2.89TYR6-GLN72− 2.26PHE3-MET62− 1.72SER12-PRO20− 2.60GLN9-HIS96− 2.73GLN9-SER17− 2.16**MET11-LEU54**− 1.61THR2-GLN72− 2.39pDIQ-MDM2Ave total E (kcal/mol)pDIQm1-MDM2Ave total E (kcal/mol)pDIQm2-MDM2Ave total E (kcal/mol)SER12-ALYS51− 29.41SER12-ALYS51− 25.49PHE3-GLN72− 6.61TRP6-AHIS96− 6.75SER12-AHIS96− 10.15PHE3-MET62− 2.33TRP7-LEU54− 6.19LEU11-LYS51− 6.05THR2-GLN72− 2.33PHE3-GLN72− 5.21PHE3-GLN72− 5.93TRP6-HIS73− 1.96LEU11-LYS51− 4.85TRP7-PHE55− 5.29TRP6-GLN72− 1.62THR2-GLN72− 2.37GLN9-HIS96− 3.62LEU11-LEU54− 1.45LEU10-LYS51− 2.34TRP7-LEU54− 3.06PHE3-ILE61− 1.28LEU10-LEU54− 1.95LEU10-HIS96− 2.48LEU11-PHE55− 1.25PHE3-TYR67− 1.87LEU10-LEU54− 2.36PHE3-VAL93− 1.04TRP7-PHE55− 1.69PHE3-MET62− 2.21SER12-LEU54− 0.77P53-MDM2Ave total E (kcal/mol)PMI-MDM2Ave total E (kcal/mol)PHE3-GLN72− 6.87SER11-ALYS51− 25.93PRO11-LEU54− 2.96SER11-AHIS96− 8.85THR2-GLN72− 2.78PHE3-AGLN72− 5.87LEU10-LEU54− 2.63LEU10-ALYS51− 5.41PRO11-PHE55− 2.23TRP7-APHE55− 4.09SER4-GLN72− 1.53TRP7-AMET62− 3.81PHE3-ILE61− 1.18TRP7-ALYS51− 3.70PHE3-VAL93− 1.02LEU10-ALEU54− 2.31PHE3-GLY58− 1.01TRP7-AGLY58− 2.28LEU10-VAL93− 1.00SER11-ALEU54− 2.27 Table 3Top 10 residues-residue interactions in peptides_MDMX complexes with the highest interaction energy extracted from gRINN tool. The left residue is related to the peptide sequence and the right one to the binding site of MDMX. If applicable, the FoldX mutations will be shown in **bold** letters.pDI-MDMXAve total E (kcal/mol)pDIm1-MDMXAve total E (kcal/mol)pDIm2-MDMXAve total E (kcal/mol)pDIdm-MDMXAve total E (kcal/mol)TYR6-HIS72− 4.41TYR6-HIS72− 5.40TRP7-HIS54− 7.67SER12-LYS50− 26.58TRP7-MET53− 3.12TRP7-MET53− 4.89PHE3-GLN71− 5.03ALA8-LYS50− 9.51PHE3-GLN71− 2.96PHE3-GLN71− 3.43LEU10-MET53− 2.98TRP7-MET53− 5.96TYR6-GLN71− 2.56PHE3-MET61− 2.69TYR6-HIS72− 2.83GLN9-LYS50− 4.78PHE3-TYR66− 2.55PHE3-TYR66− 2.43PHE3-MET61− 2.80**MET11-LYS50**− 4.13TRP7-ILE60− 1.84TYR6-GLN71− 2.33THR2-GLN71− 2.37LEU1-GLN71− 3.93TRP7-MET61− 1.61TRP7-LEU56− 1.77TRP7-MET61− 2.12SER12-MET53− 3.55PHE3-ILE60− 1.54PHE3-GLY57− 1.75TYR6-GLN71− 1.82PHE3-MET61− 2.92PHE3-MET61− 1.52THR2-GLN71− 1.70TRP7-MET53− 1.24**MET11-MET53**− 2.48THR2-HIS72− 1.44LEU10-PRO95− 1.61TRP7-GLY57− 1.09PHE3-TYR66− 2.10pDIQ-MDMXAve total E (kcal/mol)pDIQm1-MDMXAve total E (kcal/mol)pDIQm2-MDMXAve total E (kcal/mol)TRP7-MET53− 6.14GLU4-HIS54− 9.18LEU11-MET53− 2.25PHE3-GLN71− 3.21TRP7-MET53− 4.77TRP7-MET53− 2.12PHE3-MET61− 2.24TRP6-GLN71− 3.41PHE3-GLN71− 2.07TRP7-VAL92− 2.13PHE3-GLN71− 3.26TRP7-HIS54− 1.97LEU11-MET53− 2.08PHE3-TYR66− 2.40PHE3-MET61− 1.92PHE3-GLY57− 1.81LEU11-MET53− 2.19TRP7-VAL92− 1.62TRP7-LEU56− 1.32TRP7-GLN71− 1.63TRP7-ILE60− 1.54TRP7-ILE60− 1.23TRP7-ILE60− 1.52LEU11-HIS54− 0.96PHE3-ILE60− 1.21TRP7-HIS54− 1.38PHE3-TYR66− 0.86TRP7-GLY57− 0.86GLU4-GLY57− 1.36THR2-GLN71− 0.85P53-MDMXAve total E (kcal/mol)PMI-MDMXAve total E (kcal/mol)PHE3-GLN71− 3.19TRP7-HIS54− 8.41PHE3-MET61− 2.59PRO12-HIS54− 6.17THR2-GLN71− 1.92PHE3-GLN71− 6.04PHE3-ILE60− 1.90SER11-HIS54− 4.81LEU10-MET53− 1.16LEU10-MET53− 3.16LEU10-VAL92− 0.95TYR6-HIS72− 2.56THR2-MET61− 0.89PHE3-MET61− 2.30PHE3-GLY57− 0.89TRP7-MET61− 2.14PHE3-HIS72− 0.81TYR6-GLN71− 1.99PHE3-VAL92− 0.66SER2-GLN71− 1.89
The correlation of significant residues based on their location and interaction energies generated from the gRINN tool was shown in Figs. [5](#Fig5){ref-type="fig"} and [6](#Fig6){ref-type="fig"} for MDM2 and MDMX complexes, respectively. The dots in each graph have a color range of green to brown indicating the lower to higher residue-residue interaction energy, respectively. As shown in Fig. [5](#Fig5){ref-type="fig"}, the accumulation of interacted residues was higher in peptide_MDM2 regions. The intensity of brown dots in pDIm1, pDIm2, and pDIdm was remarkably higher compared to pDI bound to MDM2. On the other hand, in the pDIQm1_MDM2, while the dots accumulation was similar to pDIQ_MDM2, the level of green intensity was higher as well. However, the pDIQm2_MDM2 showed a decreased number of dots as well as higher brown intensity compared to the pDIQ_MDM2. Figure [6](#Fig6){ref-type="fig"} shows the residue-residue correlation in peptides_MDMX interactions. The pDIdm_MDMX graph indicated a highest mass of residue-residue dots with higher interaction energies which is in accordance with previous results.Figure 5Interaction energy matrix that displays the average interaction energies between residue pairs of two chains in the studied peptides of p53, pDI, pDIm1, pDIm2, pDIdm, pDIQ, pDIQm1, pDIQm2 and PMI in complex with MDM2. According to the color range and the number of dots, the number of interactions, and the strongest bindings are shown. Figure 6Interaction Energy Matrix that displays the average interaction energies between residue pairs of two chains in the studied peptides of p53, pDI, pDIm1, pDIm2, pDIdm, pDIQ, pDIQm1, pDIQm2 and PMI in complex with MDMX. According to the color range and the number of dots, the number of interactions, and the strongest bindings are shown.
Historically, several anti-cancer peptides based on the p53_MDM2/X binding site have been developed mostly by using the phage display method. Some important ones include 12/1^[@CR16]^, PMI^[@CR17]^ and pDI^[@CR18]^. The common limitation in all of the lead peptides was the lack of suitable affinity for MDMX. pDI, as one of the promising lead anti-MDM2/X peptides, was numerously applied for kinetics and dynamics improvements. In one of the first studies, in order to increase the affinity of the pDI, a structure--activity study was utilized by Phan et al.^[@CR23]^. In this study, the MDM2/X IC~50~s of different mutant sequences of pDI were obtained and compared with p53, PMI and pDI. Ultimately, the pDIQ with the sequence of ET**F**EHW**W**SQ**L**LS was introduced as the most efficient dual inhibitory peptide with IC~50~ of 8 and 110 nM for MDM2 and MDMX, respectively (Table [1](#Tab1){ref-type="table"}). Moreover, one of the clinically promising peptides, ALRN-6924, was originally optimized based on pDI sequence.
On the other hand, the suitable amount of experimental data regarding MDM2/X inhibitors over the last two decades has enabled scientists to feasibly use such data for the validation of theoretical methods. In one of the last attempts, Diller et al*.* described "CMDInventus" as a peptide design platform and a potent method to design inhibitory stapled peptides for MDM2/X^[@CR42]^. Stapled peptides are usually designed to overcome the limitations of native peptides such as short plasma half-life. However, one of the promising approaches to design an efficient stapled peptide is first to achieve a native peptide sequence (a lead peptide) as a robust inhibitor of the target protein^[@CR43]^. Afterward, synthetic modifications on the candidate peptides are likely to result in a more stable peptide-drug candidate. In the current study, it was attempted to study the p53-based lead peptides structurally in a way to guide the scientists to obtain more effective MDM2/X inhibitory peptides. In this path, the single or double mutations screening of known peptides was carried out. Mutant pDI and pDIQ, as well as, control peptides including p53, pDI, pDIQ, and PMI, went through MD simulations and corresponding analyses. Subsequently, the umbrella sampling method confirmed the experimental effectiveness pattern of the control peptides (Table [1](#Tab1){ref-type="table"}). As a result, the method was confirmed as a suitable predicting approach for new developed peptides. In the literature, the PMI is the best native dual lead peptide with *Kd* of 3.3 and 8.9 nM for MDM2 and MDMX, respectively^[@CR17]^. According to Table [1](#Tab1){ref-type="table"}, ΔG~binding~ for PMI was calculated as 25 and 19 kcal/mol for MDM2 and MDMX, respectively, which is in high agreement with the experimental data. This is also true about pDI and pDIQ. Therefore, the theoretically designed mutant peptides, especially, pDIm1, PDIm2, and pDIdm, indicated promising ΔG~binding~ in dual inhibition of MDM2/X proteins. Another key factor in suitable inhibition of MDM2/X proteins is the conformation stability of the peptides. As shown in Fig. [4](#Fig4){ref-type="fig"}, 200 ns snapshots indicated no helical conservation of p53 peptide when they are bound to MDM2/X compared to other peptides. This is strongly relevant to p53 C-terminal residues specifically Pro11. On the other hand, in the modified peptides, mutations such as Pro11Met enhanced the conformation stability in both MDM2/X complexes.
Other follow-up analyses provided valid atomic-scale views of the peptide_MDM2/X interactions and their effectiveness. Accordingly, the results highlighted the importance of electrostatic forces during the interaction of peptides with MDM2/X. Besides, our data showed that Ser12 of modified peptides plays a key role in the effective MDM2/X dual inhibition. Therefore, while the last residue does not protect the helicity directly, it changes the interaction pattern in a way that the stability and affinity of the peptides increase. Moreover, Tyr6 and Trp7 are critical residues in the interaction of peptides with MDMX. These data are in agreement with those of the study that developed ATSP-7041 peptide. It shows additional Tyr6 interaction with MDMX binding pocket is an assistant to increase peptides_MDMX affinity^[@CR22]^. Overall, the data confirmed the significance of the theoretical structure-based peptide development method for robust and rational dual anti-MDM2/X peptide design.
Conclusion {#Sec13}
==========
MDM2 and MDMX are cooperative oncoproteins blocking the action of wild type p53 in several types of cancerous cells. Therefore, several MDM2/X inhibitory compounds have been developed over the last two decades to restore the normal proliferation of malignant cells. Some well-established lead peptides such as pDI and PMI have shown promising results in this regard. However, the peptides' common limitation is the lack of dual inhibition of both MDM2/X proteins. As a result, in this study, it was attempted to develop a theoretical structure-based method fitting to the previous experimental data. This method was capable of analyzing the p53-based peptide_MDM2/X complexes in order to develop new native peptides with a higher affinity. In this path, previously tested peptides, including p53_MDM2/X binding site, pDI, pDIQ, and PMI as well as computationally screened mutants, named pDIm1, pDIm2, pDIQm1, and pDIQm2 in complex with MDM2/X were investigated using MD simulation. Detailed secondary structure analysis indicated that the peptides' N-terminal residues contribute significantly to their helicity conservation when bound to MDM2 complexes. However, in the MDMX structures, the C-terminal residues of the peptides were more stable in the alpha-helix conformation. This contradiction makes it difficult to reach a potent, dual and stable peptide against MDM2/X proteins. Nevertheless, mutant pDI peptides, theoretically designed in this study, have shown to overcome this limitation. In addition, the ΔG~binding~ results obtained from the umbrella sampling method were in agreement with the potency of experimentally confirmed MDM2/X inhibitory peptides includingp53, pDI, pDIQ, and PMI peptides. Accordingly, the ΔG~binding~ of other screened mutant peptides, especially pDIdm, was reasonably promising. Moreover, having extracted residue by residue interaction energies, the critical residues of peptides_MDM2/X interactions were determined. Phe3 of p53 binding site was replaced with Ser12 in the modified peptides as critical interacting residue with MDM2. Lys51, Ser17, and Gln18 were the most critical residues of the interacting site of MDM2. Furthermore, since the Ser12 in pDIdm was conserved its interaction with MDMX, this case shows a high affinity to MDMX as well as MDM2. In conclusion, the result of this study highlighted the importance of atomic-scale and structure-based theoretical analyses to design potent peptides more rationally and efficiently. In conclusion, suggested rules as prediction structural markers of a promising anti-cancer p53-based peptide are including a) the presence of suitable C-terminal residues of p53-based peptides especially Glu9, Leu10, and Met11, b) the use of serine as the last residue, c) the appropriate ΔG~binding~ to MDM2/X, generated by the umbrella sampling method.
Supplementary information
=========================
{#Sec14}
Supplementary file1 (PDF 650 kb)
**Publisher\'s note**
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Supplementary information
=========================
is available for this paper at 10.1038/s41598-020-67510-8.
The authors would like to acknowledge the Cancer Control Research Center, Cancer Control Foundation, Iran University of Medical Sciences, Tehran, Iran, as project No: CCF-97035 as well as the University of Tabriz for the financial supports.
A.B. and E.M.A. designed the research project. N.R. performed the computational experiments. A.B. and N.R. and E.M.A. analyzed the data. A.B and N.R and E.M.A. prepared the manuscript. All authors have read, checked and approved the manuscript.
The authors declare no competing interests.
|
{
"pile_set_name": "PubMed Central"
}
|
<!-- iso-amsr.ent produced by Norman Walsh for the XML version of DocBook -->
<!-- Derived from the corresponding ISO 8879 standard entity set
and the Unicode character mappings provided by Sebastian Rahtz -->
<!ENTITY ape "≊"> <!-- -->
<!ENTITY asymp "≍"> <!-- EQUIVALENT TO -->
<!ENTITY bcong "≌"> <!-- ALL EQUAL TO -->
<!ENTITY bepsi ""> <!-- -->
<!ENTITY bowtie "⋈"> <!-- -->
<!ENTITY bsim "∽"> <!-- -->
<!ENTITY bsime "⋍"> <!-- -->
<!ENTITY bump "≎"> <!-- -->
<!ENTITY bumpe "≏"> <!-- -->
<!ENTITY cire "≗"> <!-- -->
<!ENTITY colone "≔"> <!-- -->
<!ENTITY cuepr "⋞"> <!-- -->
<!ENTITY cuesc "⋟"> <!-- -->
<!ENTITY cupre "≼"> <!-- -->
<!ENTITY dashv "⊣"> <!-- -->
<!ENTITY ecir "≖"> <!-- -->
<!ENTITY ecolon "≕"> <!-- -->
<!ENTITY eDot "≑"> <!-- -->
<!ENTITY esdot "≐"> <!-- -->
<!ENTITY efDot "≒"> <!-- -->
<!ENTITY egs "⋝"> <!-- -->
<!ENTITY els "⋜"> <!-- -->
<!ENTITY erDot "≓"> <!-- -->
<!ENTITY fork "⋔"> <!-- -->
<!ENTITY frown "⌢"> <!-- -->
<!ENTITY gap "≳"> <!-- GREATER-THAN OR EQUIVALENT TO -->
<!ENTITY gsdot "⋗"> <!-- -->
<!ENTITY gE "≧"> <!-- -->
<!ENTITY gel "⋛"> <!-- -->
<!ENTITY gEl "⋛"> <!-- -->
<!ENTITY ges ""> <!-- -->
<!ENTITY Gg "⋙"> <!-- VERY MUCH GREATER-THAN -->
<!ENTITY gl "≷"> <!-- -->
<!ENTITY gsim "≳"> <!-- GREATER-THAN OR EQUIVALENT TO -->
<!ENTITY Gt "≫"> <!-- MUCH GREATER-THAN -->
<!ENTITY lap "≲"> <!-- LESS-THAN OR EQUIVALENT TO -->
<!ENTITY ldot "⋖"> <!-- -->
<!ENTITY lE "≦"> <!-- -->
<!ENTITY lEg "⋚"> <!-- -->
<!ENTITY leg "⋚"> <!-- -->
<!ENTITY les ""> <!-- -->
<!ENTITY lg "≶"> <!-- LESS-THAN OR GREATER-THAN -->
<!ENTITY Ll "⋘"> <!-- -->
<!ENTITY lsim "≲"> <!-- LESS-THAN OR EQUIVALENT TO -->
<!ENTITY Lt "≪"> <!-- MUCH LESS-THAN -->
<!ENTITY ltrie "⊴"> <!-- -->
<!ENTITY mid "∣"> <!-- -->
<!ENTITY models "⊧"> <!-- MODELS -->
<!ENTITY pr "≺"> <!-- -->
<!ENTITY prap "≾"> <!-- -->
<!ENTITY pre "≼"> <!-- -->
<!ENTITY prsim "≾"> <!-- -->
<!ENTITY rtrie "⊵"> <!-- -->
<!-- samalg Unknown unicode character -->
<!ENTITY sc "≻"> <!-- -->
<!ENTITY scap "≿"> <!-- -->
<!ENTITY sccue "≽"> <!-- -->
<!ENTITY sce "≽"> <!-- -->
<!ENTITY scsim "≿"> <!-- -->
<!ENTITY sfrown ""> <!-- -->
<!ENTITY smid ""> <!-- -->
<!ENTITY smile "⌣"> <!-- -->
<!ENTITY spar ""> <!-- -->
<!ENTITY sqsub "⊏"> <!-- -->
<!ENTITY sqsube "⊑"> <!-- -->
<!ENTITY sqsup "⊐"> <!-- -->
<!ENTITY sqsupe "⊒"> <!-- -->
<!ENTITY ssmile ""> <!-- -->
<!ENTITY Sub "⋐"> <!-- -->
<!ENTITY subE "⊆"> <!-- -->
<!ENTITY Sup "⋑"> <!-- -->
<!ENTITY supE "⊇"> <!-- -->
<!ENTITY thkap ""> <!-- -->
<!ENTITY thksim ""> <!-- -->
<!ENTITY trie "≜"> <!-- -->
<!ENTITY twixt "≬"> <!-- BETWEEN -->
<!ENTITY vdash "⊢"> <!-- -->
<!ENTITY Vdash "⊩"> <!-- -->
<!ENTITY vDash "⊨"> <!-- -->
<!ENTITY veebar "⊻"> <!-- -->
<!ENTITY vltri "⊲"> <!-- -->
<!ENTITY vprop "∝"> <!-- -->
<!ENTITY vrtri "⊳"> <!-- -->
<!ENTITY Vvdash "⊪"> <!-- -->
|
{
"pile_set_name": "Github"
}
|
Q:
how to apply filter in angular js which is not visible?
I am trying to apply filter in list view .Whenever I typed anything in input field it filter my list .I am able to filter when I write username which is visible to user .example when I write "pa" it sort my list and display only one row .that is correct.but when I write on "keyword filter" which is not visible to user it doesn't filter .In other words when I type "Angular js" on second input field ("keyword filter") ..It should display pab..Because "pab" have Angular js keyword .
here is my code
http://plnkr.co/edit/TccgJydcZNkXQGpnbbP0?p=preview
// Code goes here
angular.module('myApp', [])
.controller('myCtrl', function($scope){
$scope.users = [
{firstname: 'john', lastname: 'smith',
keywords: ["HTML", "CSS", "JavaScript", "jQuery", "Photoshop"]
},
{firstname: 'pab', lastname: 'due',
keywords: ["Ruby on Rails", "PostgreSQL", "AngularJS", "Node.js"]
},
{firstname: 'bob', lastname: 'rand', keywords: ["java", "php", "test", "jira"]
}
];
});
A:
In your ng-repeat you are not filtering after your keyword input - you missed it. Just include it as follows:
<div ng-repeat="user in users | filter:userSearch | filter:{ keywords: keyword }">
|
{
"pile_set_name": "StackExchange"
}
|
We are in a better position than we were this time last season but I was disappointed with last weekend’s performance.
It’s given us a kick up the backside and it might be just what we needed. We’ve come into training this week knowing we have to step our game up quite a lot.
Leinster preview
We have huge respect for them in the way they play.
They have an international 15 with more on the bench and some seasoned stars too.
You’ve got to have a quality squad to be able to win the Cup. We won’t be favourites but we’re looking forward to it.
We’re going to the home of the champions and we’re going there to try and win. But we have to play to our potential because if we don’t we won’t be near. You can’t limp over the line against Leinster.
We’ve got to try and come out of every European game with something because if you have two bad results, you’re going to struggle to get through the pool stages.
Injury news
Dan Robson (ankle) is to have a scan today and will see a specialist on Wednesday. He certainly won’t be fit for the weekend.
Joe Launchbury (knee) will run tomorrow and if he comes through that okay he will hopefully be fit for Friday. He had an injection in his knee to settle it down.
Brad Shields (cheekbone) should be available for the weekend. He is up to speed with everything and has been training.
Willie Le Roux (concussion) arrives back today. He failed an HIA during the Springboks game at the weekend but passed the second test. He’s not concussed but as long as he passes the protocol this week, he should be fit to play on Friday.
Thomas Young is back to full fitness and came through the Gloucester game okay.
Lima Sopoaga is back in full training after a neck spasm and should be available for Friday.
|
{
"pile_set_name": "Pile-CC"
}
|
// Copyright (C) 2004-2013 Free Software Foundation, Inc.
//
// This file is part of the GNU ISO C++ Library. This library is free
// software; you can redistribute it and/or modify it under the
// terms of the GNU General Public License as published by the
// Free Software Foundation; either version 3, or (at your option)
// any later version.
// This library is distributed in the hope that it will be useful,
// but WITHOUT ANY WARRANTY; without even the implied warranty of
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
// GNU General Public License for more details.
// You should have received a copy of the GNU General Public License along
// with this library; see the file COPYING3. If not see
// <http://www.gnu.org/licenses/>.
#include <ext/vstring.h>
#include <ext/array_allocator.h>
#include <testsuite_hooks.h>
typedef char char_type;
typedef std::char_traits<char_type> traits_type;
typedef std::tr1::array<char_type, 4> array_type;
array_type extern_array;
void test01()
{
bool test __attribute__((unused)) = true;
using __gnu_cxx::__versa_string;
typedef __gnu_cxx::array_allocator<char_type, array_type> allocator_type;
typedef __versa_string<char_type, traits_type, allocator_type> string_type;
// Construct array_allocator without underlying array.
allocator_type a;
string_type s(a);
try
{
s.reserve(4); // Actually need 4 + 1 + sizeof(std::string::_Rep).
}
catch(std::bad_alloc& obj)
{
VERIFY( true );
}
catch(...)
{
VERIFY( false );
}
}
int main()
{
test01();
return 0;
}
|
{
"pile_set_name": "Github"
}
|
All about Pet Articles
The Beginner’s Guide to Rv
Factors To Consider When Choosing A Camping Site
There are a number of reasons that you may consider going camping. You may want to get your mind off work and therefore want an activity that you may engage in You may also want to undertake an activity that you can engage your family members. There are some individuals who are much in love with camping, For you to enjoy the camping exercise, you will require to choose a great venue. This article highlights the factors to consider when choosing the best camping site.
The area that the camping site covers should be the first thing to look at. There are some camping sites that are big while others are small. Each and every camping site is meant to accommodate a certain number of people. That is why you should make sure that you settle for a camping site that will comfortably host your entire family. If you choose a small campsite, you will end up squeezing all your stuff and not have adequate room to engage in different activities. You should also ensure that you do not go for a very large site as you may end up feeling much lonely.
Secondly, you should consider the amenities that you would want the site to have. There are some people that do not want a camping site that has all amenities. This is because camping to them is more surviving. There are some people who choose to go camping just to have outdoor fun. Such people would not mind having a camping site that is inclusive of all amenities. This is why you should make sure you select a camping site that will accommodate your style of camping.
Camping to many is an outdoor activity that they can have with their family in the quest to adventure. It might come as a surprise but mingling with other families at the campus site is much fun. In some camping sites, seasonal engagements are included. This will make the children get to play. The parents are not left out too.
You may also consider browsing through different web pages in order to discover more info. In the website platform, people get to give an honest experience with a certain camping site. In the process, you will get more info about different camping sites. This will help you distinguish good venues from pathetic ones.
Lastly, you should look at the cost of renting the site. Each and every company has their own prices. Some camping venues are quite costly. This is why you should ensure that you settle for a camping venue that is pocket-friendly. There are some camping venues that are charged very little amount of money. In most cases, the camping sites standards are likely to be poor.
|
{
"pile_set_name": "Pile-CC"
}
|
According to a Weibo post made from QG Reapers' account, Li "LiNkO" Linke, who managed QG Reapers before they were acquired by Newbee and who left after the team was rebranded earlier this month, will lead a new League of Legends Secondary Pro League team that will operate under the name QG Reapers.
The post says the club has acquired the roster and LSPL spot of Newbee Young, and will play in the Summer Split.
Newbee acquired QG and all its assets in January, though the team played as QG Reapers in the LPL Spring Split before being rebranded as Newbee this month. It's not clear yet whether the new QG Reapers that will play in the LSPL is an independent organization that has acquired the rights to the QG brand, or a new subsidiary of Newbee.
Newbee Young placed sixth in the LSPL 2016 Spring Season. In its post, QG announced a new lineup for LSPL that includes players from Newbee Young, as well as subs from QG Reapers' original 2015 LSPL Spring lineup, and other LSPL players.
Kim " Khan " Dongha at top lane
" Dongha at top lane Xu " ss17 " Zhao at top lane
" Zhao at top lane Kim " Clid " Taemin in jungle
" Taemin in jungle Kim " Doinb " Taesang at mid lane
" Taesang at mid lane Cherish " Cherish " Zhe at mid lane
" Zhe at mid lane Wang " Alone " Zijun at AD carry
" Zijun at AD carry Liu "AhrI" Xudong at support
The most interesting pickup is Korean mid laner Doinb, who joins the new QG after the drawn out drama between him and Baek "Swift" Dahoon on the previous, Newbee-owned iteration of QG. Doinb will share the mid lane role with Cherish, who has played on many LSPL teams in the past.
Khan and Clid both played for Newbee Young in the previous split as the team's Korean duo. Khan has experience playing both in Champions and the League of Legends Pro League. ss17, the Chinese top laner for Hyper Youth Gaming last year, also has LPL experience on two separate teams.
Alone and AhrI round out the bottom lane. Alone played for QG Reapers Reserve team, and AhrI played for WE Academy before a very public conflict with Han "S1mlz" Jin. He has since spent time as a caster for the LSPL.
|
{
"pile_set_name": "OpenWebText2"
}
|
Q:
VBS output in column format
I am trying to have my .vbs output be put into columns. However, when I try write the code to organize the output into columns I continue to get an error - Invalid Procedure call or argument: 'Space'
I'm looking for some help on this, thanks!!
Call FindPCsThatUserLoggedInto
Sub FindPCsThatUserLoggedInto()
strUser = InputBox("Enter First Name")
strLast = InputBox("Enter Last Name")
Const ADS_SCOPE_SUBTREE = 2
Set objConnection = CreateObject("ADODB.Connection")
Set objCommand = CreateObject("ADODB.Command")
objConnection.Provider = "ADsDSOObject"
objConnection.Open "Active Directory Provider"
Set objCommand.ActiveConnection = objConnection
objCommand.Properties("Page Size") = 1000
objCommand.Properties("Searchscope") = ADS_SCOPE_SUBTREE
's = "Name" & Chr(9) & "Account Name" & Chr(9) & "Location" & Chr(10) & Chr(13)
's = s & "----" & Chr(9) & "------------" & Chr(9) & "--------" & Chr(10) & Chr(13)
s = RightJustified("Name", 10) & _
RightJustified("Account Name", 15) & _
RightJustified("Location", 15) & _
vbCrLf
objCommand.CommandText = "SELECT ADSPath FROM 'LDAP://dc=hc,dc=company,dc=com' WHERE givenName = '" & strUser & "*' AND sn = '" & strLast & "*'"
Set objRecordSet = objCommand.Execute
If objRecordSet.Recordcount > 0 Then
objRecordSet.MoveFirst
Do Until objRecordSet.EOF
Set objUser = GetObject(objRecordSet.Fields("ADSPath").Value)
's = s & objUser.DisplayName & Chr(9) & objUser.samaccountname & Chr(9) & objUser.PhysicalDeliveryOfficeName & Chr(10) & Chr(13)
' objRecordSet.MoveNext
s = s & _
RightJustified(objUser.DisplayName, 10) & _
RightJustified(objUser.samaccountname, 15) & _
RightJustified(objUser.PhysicalDeliveryOfficeName, 15) & _
vbCrLf
Loop
MsgBox s
Else
MsgBox "No users matching that criteria exist in the HC domain in AD."
End If
End Sub
Function RightJustified(ColumnValue, ColumnWidth)
RightJustified = Space(ColumnWidth - Len(ColumnValue)) & ColumnValue
End Function
This is the code that I added to organize the outputs into columns:
s = RightJustified("Name", 10) & _
RightJustified("Account Name", 15) & _
RightJustified("Location", 15) & _
vbCrLf
And
s = s & _
RightJustified(objUser.DisplayName, 10) & _
RightJustified(objUser.samaccountname, 15) & _
RightJustified(objUser.PhysicalDeliveryOfficeName, 15) & _
vbCrLf
Here is my output:
A:
My guess would be that this is a runtime error due to your data exceeding the specified size?
RightJustified(objUser.DisplayName, 10) & _
RightJustified(objUser.samaccountname, 15) & _
RightJustified(objUser.PhysicalDeliveryOfficeName, 15) & _
vbCrLf
Perhaps this change would be needed:
Function RightJustified(ColumnValue, ColumnWidth)
If Len(ColumnValue) > ColumnWidth Then
ColumnValue = Left(ColumnValue,ColumnWidth)
End If
RightJustified = Space(ColumnWidth - Len(ColumnValue)) & ColumnValue
End Function
|
{
"pile_set_name": "StackExchange"
}
|
Theme from Doctor Detroit
Theme From Doctor Detroit is an EP by the American new wave band Devo, released in 1983 on MCA Records. It includes the two songs from the Doctor Detroit movie soundtrack recorded by the band (the title song and "Luv-Luv"), plus a dance mix of the title theme. A music video of the song, containing scenes from the movie as well as footage of the band, was released on the We're All Devo home video in 1984 and also appears on the 2014 re-release of the Complete Truth About De-Evolution video collection.
Availability
The title track and "Luv-Luv" were both issued on the soundtrack album of the movie, while the dance mix of the song was re-released in 2000 on the compilation Pioneers Who Got Scalped.
Track listing
All songs written by Mark Mothersbaugh and Gerald Casale
Side one
"Theme from Doctor Detroit (Dance Mix)" – 6:00
Side two
"Luv-Luv" – 3:36
"Theme From Doctor Detroit" – 3:10
Personnel
Devo
Mark Mothersbaugh – lead vocals; keyboards
Gerald Casale – lead and background vocals; bass guitar; keyboards
Bob Casale – guitar; keyboards; backing vocals
Bob Mothersbaugh – guitar; backing vocals
Alan Myers – drums
Production
Devo – producers
External links
Category:Devo EPs
Category:1983 EPs
|
{
"pile_set_name": "Wikipedia (en)"
}
|
You are here
television
Empathy is important for navigating complex social situations, and is considered a highly desirable trait. Raymond Mar, a psychologist at York University in Canada, discussed how exposure to narrative fiction may improve our ability to understand what other people are thinking or feeling in his session at the American Psychological Association's 122nd Annual Convention.
|
{
"pile_set_name": "Pile-CC"
}
|
Épicure (opera)
Épicure (Epicurus) is an opera in three acts with music by the composers Étienne Méhul and Luigi Cherubini. The libretto is by Charles-Albert Demoustier. It was first performed at the Opéra-Comique, Paris on 14 March 1800. It was a complete failure, enjoying only three performances. For the third and final performance on 20 March the opera was reduced from three acts to two. Cherubini wrote the overture, the first act and half of the third; Méhul the second act and the rest of the third.
Roles
Synopsis
Epicurus is loved by his pupil Aspasia but he believes she feels no more than friendship for him. Four suitors compete for Aspasia's hand in marriage: Narcissus, the Sybarite; Ruston, the Stoic; Heraclitus ("the weeping philosopher"); and Democritus ("the laughing philosopher"). When Aspasia receives them coldly they suspect Epicurus is the cause and they denounce him to the Areopagus. Epicurus is taken to prison where his philosophy helps him to survive and he converts his warder. He falls asleep and has a vision of Wisdom descending from heaven. The next day, Epicurus is led before the Areopagus, where he is accused of seducing young people and preaching corruption. Epicurus proves his philosophy is based on moral principles. Aspasia comes to his aid and exposes the criminal motives behind the denunciation. Epicurus is found not guilty and pardons his accusers.
References
Sources
Arthur Pougin Méhul: sa vie, son génie, son caractère (Fischbacher, 1889)
General introduction to Méhul's operas in the introduction to the edition of Stratonice by M. Elizabeth C. Bartlet (Pendragon Press, 1997)
Leorigildo Salerno, "Les mésaventures de L'amour fugitif: Genèse de Anacréon de Luigi Cherubini (1803)" in Schweizer Jahrbuch für Musikwissenschaft 2008/2009 (Peter Lang, 2009)
Category:Operas by multiple composers
Category:Operas by Étienne Méhul
Category:Operas by Luigi Cherubini
Category:1800 operas
Category:Opéras comiques
Category:French-language operas
Category:Operas
Category:Opera world premieres at the Opéra-Comique
|
{
"pile_set_name": "Wikipedia (en)"
}
|
President Trump is ratcheting up a contentious dispute with two of America's most popular professional sports leagues, opening a new front in a culture war over free speech and First Amendment rights.
Mr. Trump angered many NFL players and fans when he said at a rally in Alabama on Friday that athletes who refuse to stand for the national anthem should be fired. Former 49ers quarterback Colin Kaepernick began kneeling during the national anthem in 2016 to protest racism and police violence against minorities.
"Wouldn't you love to see one of these NFL owners, when somebody disrespects our flag, you'd say, 'Get that son of a b---- off the field right now. Out! He's fired," Mr. Trump said to loud applause.
Get Breaking News Delivered to Your Inbox
Mr. Trump brought the NBA into the fray Saturday morning when he rescinded an invitation for the Golden State Warriors' star Stephen Curry to visit the White House with the championship team. NBA players rallied around Curry, with LeBron James calling the president a "bum" in a tweet that's been retweeted hundreds of thousands of times.
On Saturday afternoon, Mr. Trump continued the barrage in a pair of tweets, writing players "making millions of dollars in the NFL" should "find something else to do" if they refuse to stand during "The Star-Spangled Banner."
If a player wants the privilege of making millions of dollars in the NFL,or other leagues, he or she should not be allowed to disrespect.... — Donald J. Trump (@realDonaldTrump) September 23, 2017
...our Great American Flag (or Country) and should stand for the National Anthem. If not, YOU'RE FIRED. Find something else to do! — Donald J. Trump (@realDonaldTrump) September 23, 2017
In a statement Saturday afternoon, the Golden State Warriors said they would not be visiting the White House and "accept that President Trump has made it clear that we are not invited."
"We believe there is nothing more American than our citizens having the right to express themselves freely on matters important to them," the team wrote. "We're disappointed that we did not have an opportunity during this process to share our views or have open dialogue on issues impacting our communities that we felt would be important to raise."
The team said it plans to "constructively use our trip to the nation's capital in February to celebrate equality. diversity and inclusion -- the values that we embrace as an organization."
The president's campaign against protesting NFL players spurred NFL Commissioner Roger Goodell to issue a statement defending the players.
"Divisive comments like these demonstrate an unfortunate lack of respect for the NFL, our great game and all of our players, and a failure to understand the overwhelming force for good our clubs and players represent in our communities," Goodell said.
|
{
"pile_set_name": "OpenWebText2"
}
|
Several publications and patent documents are referenced in this application in order to more fully describe the state of the art to which this invention pertains. The disclosure of each of these publications is incorporated by reference herein.
Several research groups have reported that immunization with negatively charged transition state analogs (TSAs) results in the synthesis of antibodies (Abs) with esterase activity (1,2). These attempts to prepare transacylase Abs relied on creating catalytic sites de novo over the course of somatic diversification of antibody (Ab) genes. In this strategy, induction of noncovalent shape complementary between Ab combining sites and a negatively charged oxygen atom in tetrahedral TSAs was proposed to be sufficient to achieve catalytic activity (Table 1). However, there are no examples of proteolytic Abs identified by this strategy in the peer-reviewed literature, although patents claiming peptide bond hydrolysis by Abs raised to negatively charged TSAs have been granted (e.g., U.S. Pat. No. 5,952,462). One report describes a side-by-side examination of esterase and proteolytic activities in antibodies raised to a TSA (3). The former activity was readily detected, but no peptide bond cleaving activity was observed. The failure to prepare proteolytic Abs by this approach is generally attributed to the greater energetic demands of peptide bond hydrolysis and the more complex reaction pathways for this reaction, including formation of multiple transition states in which the catalyst must form transient covalent complexes with the peptide substrates for the reaction to proceed to completion.
A breakthrough has emerged from observations that naturally occurring Abs can express proteolytic activities. Observations that vasoactive intestinal peptide (VIP) is cleaved by Abs from asthma patients provided early evidence that Abs may possess peptidase activity (4). The generality of this observation is supported by additional reports showing cleavage of thyroglobulin by auto antibodies in Hashimoto's thyroiditis (5). Further evidence for the bias towards catalytic Ab synthesis in autoimmune disease is supported by observations of DNase activity in Abs from lupus patients (6) and mouse strains with a genetic predisposition to autoimmune disease (7). More recently antibodies isolated from certain hemophilia patients were observed to hydrolyze Factor VIII, a cofactor in blood coagulation (8). Certain antibody fragments to the HIV protein gp41 are also described to hydrolyze this protein (9).
Disclosed in the present invention are data indicating that the potential for cleaving peptide bonds by a covalent catalytic mechanisms is distributed broadly in most naturally occurring Abs. Covalent catalytic mechanisms reminiscent of those utilized by non-Ab serine proteases are a distinguishing feature of the naturally occurring proteolytic Abs (10). In comparison, Abs raised to TSAs utilize noncovalent binding of the transition state, and the emergence of covalent catalytic pathways is not predicted, expect by accident.
One aspect of the present invention is to strengthen the covalent reactivity of naturally occurring Abs. This results in two outcomes: (a) the increased covalent reactivity allows emergence of Abs that can form stable bonds with polypeptides, due to the covalent character of the bonding reaction; and (b) When a water molecule is properly accommodated in the Ab active sites, the covalent Ab-polypeptide complexes can be hydrolyzed to complete the reaction cycle. To favor the latter outcome, immunization is done using polypeptide analogs that contain a bound water molecule, allowing induction of Ab active sites with sufficient room to accommodate the desired water molecule.
Proteolytic Abs can not be identified using traditional binding assays, as the catalytic cleavage of polypeptides does not allow formation of stable Ab-antigen complexes. Analogs of antigens employed previously to identify catalytic Abs have assumed that the chemical reaction center in the analogs must simulate precisely the location of the bond in polypeptide antigens that is cleaved by catalytic Abs. Disclosed in the present invention are data that the covalently reactive groups in proteolytic Abs, the serine protease-like nucleophiles, enjoys considerable conformational flexibility relative to the noncovalent binding forces responsible for the specificity of Abs for individual polypeptide epitopes.
This discovery has resulted in another major aspect of the present invention, that is, the development of polypeptide analogs in which a covalently reactive electrophile can readily be located in side chains of the amino acids instead of the polypeptide backbone. Disclosed in this invention are methods using these analogs for coordination of the Ab nucleophilic reactivity with specificity for the linear and discontinuous epitopes expressed by polypeptides, allowing the occurrence of epitope-specific nucleophilic reactions between Abs and antigens. These methods remove an important bottle-neck in development of covalent and catalytic Abs, because preparation of such antibodies to large polypeptides is presently not possible by conventional methods. Synthesis of large polypeptides with electrophiles incorporated with the backbone is outside the scope of current chemical synthesis technology, whereas the electrophiles can readily be placed on the amino acid side chains by chemical conjugation without unduly disturbing the native antigenic structure of proteins. An alternative approach to preparing electrophilic polypeptides within the backbone is the utilization of unnatural electrophilic amino acid analogs for protein synthesis by natural synthetic procedures, for example by correct recognition of the electrophilic amino acid analog by the appropriate tRNA species during the translation of mRNA in the polyribosome complex.
The proteolytic activity of naturally occurring Abs is reported to derive heritable germline lines encoding serine protease-like nucleophilic sites (11). The first Abs made by B cells over the course of their differentiation into cells that synthesize specific Abs to individual antigenic epitopes belong to the IgM class, with class switching to IgG Abs occurring at a later stage, concomitant with ongoing somatic diversification of the Ab variable domains. Disclosed in the present invention are observations indicating that IgM Abs are superior catalysts compared to IgG Abs. Also disclosed are methods to identify and induce the synthesis of antigen-specific Abs of the IgM with proteolytic activity.
|
{
"pile_set_name": "USPTO Backgrounds"
}
|
Q:
TThread and inheritance
I am having a hard time implementing multi-tier inheritance from the basic TThread class.
Based on my knowledge of OOP it should be possible but maybe it just can't be applied to threads.
My goal is to use TMyBaseThread to implement all the code that will be common to descendent classes. This is what I have have tried:
TMyBaseThread = class(TThread)
private
procedure BuildBaseObjects(aParam : TParam);
procedure Execute; virtual; abstract;
protected
constructor Create(Param : TParam); reintroduce; virtual;
end;
TMyFileThread = class(TMyBaseThread)
private
procedure Execute; reintroduce;
public
constructor Create(OtherParam : TOtherParam); reintroduce; overload;
end;
TMyDBThread = class(TMyBaseThread)
private
procedure Execute; reintroduce;
public
constructor Create(aDB : TDatabase); reintroduce; overload;
end;
implementation
constructor TMyBaseThread.Create(Param : TParam);
begin
inherited Create(False);
Self.BuildBaseObjects(Param);
[do some stuff]
end;
constructor TMyFileThread.Create(OtherParam : TOtherParam);
var
param : TParam;
begin
inherited Create(param);
[do some other stuff]
end;
procedure TMyFileThread.Execute;
begin
while not Terminated do
doWork(); <-- this is never called
end;
constructor TMyDBThread.Create(aDB : TDatabase);
var
param : TParam;
begin
inherited Create(param);
end;
procedure TMyDBThread.Execute;
begin
while not Terminated do
doDatabaseWork(); <-- this is never called
end;
I see in TThread's implementation that the Executed method is called automatically in the AfterConstruction but how can I have it point to the one declared in the derived classes?
Thanks!
A:
First, I can't support more Craig's comment about using composition instead of inheritance for implementing the common functionality.
And although the architecture choice is under question, there is a lot to learn from your example.
Before inheriting a class, you should investigate the interface of the parent class that you want to inherit. To do that you can either look for the class definition in the interface section of the source code or look up the relevant documentation - System.Classes.TThread.
It seems you have already read the documentation, so let's take a look at an except from the class definition of TThread:
TThread = class
private
...
protected
procedure CheckThreadError(ErrCode: Integer); overload;
procedure CheckThreadError(Success: Boolean); overload;
procedure DoTerminate; virtual;
procedure Execute; virtual; abstract;
procedure Queue(AMethod: TThreadMethod); overload;
procedure Synchronize(AMethod: TThreadMethod); overload;
property ReturnValue: Integer read FReturnValue write FReturnValue;
property Terminated: Boolean read FTerminated;
public
constructor Create(CreateSuspended: Boolean);
destructor Destroy; override;
procedure AfterConstruction; override;
procedure Resume;
procedure Suspend;
procedure Terminate;
function WaitFor: LongWord;
class procedure Queue(AThread: TThread; AMethod: TThreadMethod); overload;
class procedure RemoveQueuedEvents(AThread: TThread; AMethod: TThreadMethod);
class procedure StaticQueue(AThread: TThread; AMethod: TThreadMethod);
class procedure Synchronize(AThread: TThread; AMethod: TThreadMethod); overload;
class procedure StaticSynchronize(AThread: TThread; AMethod: TThreadMethod);
property FatalException: TObject read FFatalException;
property FreeOnTerminate: Boolean read FFreeOnTerminate write FFreeOnTerminate;
property Handle: THandle read FHandle;
property Priority: TThreadPriority read GetPriority write SetPriority;
property Suspended: Boolean read FSuspended write SetSuspended;
property ThreadID: THandle read FThreadID;
property OnTerminate: TNotifyEvent read FOnTerminate write FOnTerminate;
end;
First, ignore anything that is in the private section of the class. If those fields and methods were marked as private, we are not supposed to be able to use them at all in descendant classes.
Then, look for any abstract methods. The implementation of abstract methods is left for descendant classes. So those are the methods you are expected to implement in your code. Abstract methods are usually called indirectly by using one of the methods from the parent class.
In your case the TThread class has only one abstract method:
procedure Execute; virtual; abstract;
The documentation says that you need to
Define the thread object's Execute method by inserting the code that
should execute when the thread is executed.
It's true that the documentation sounds a bit vague, but the right way to do that is to "override" the method in the interface, and not to "reintroduce" it:
TMyFileThread = class(TMyBaseThread)
...
protected
procedure Execute; override;
...
and then implement it in the implementation:
procedure TMyFileThread.Execute;
begin
while not Terminated do
Sleep(1); // do some other stuff
end;
You probably notice how we declared the overrided definition of Execute method in the protected section. This is required as the definition of the method in the parent class is also in the protected section, so we can only override it in a section with higher visibility (protected or public).
You rarely need to increase the visibility when overriding a method, so we just keep the same visibility.
We used the override keyword to tell the base class to use this variant of the method instead of its own. If you miss the override keyword the Execute method will not be called at all, and the base class will try calling it's own Execute method, if there is any.
Another thing to note is that you don't need to redeclare the Execute method in your base class as you are not implementing it there. That's why you should remove the following definition:
TMyBaseThread = class(TThread)
...
//procedure Execute; virtual; abstract; <- remove this
...
The execute method is already defined in the TThread class.
Now, let's look at the constructors. The base class has a regular constructor that is neither virtual, nor dynamic:
public
constructor Create(CreateSuspended: Boolean);
This means you cannot override those constructors and if you want to add additional logic on object creation, you should create your own constructors that wrap those.
The proper way to do that is to just declare a constructor with a different set of parameters, without reintroducing, overloading or overriding the base one:
public
//constructor Create(Param : TParam); reintroduce; virtual;
constructor Create(Param : TParam);
Also, remember that constructors should almost always be in the public section.
You also don't need to make the constructor virtual. You could do that if your TMyFileThread and TMyDBThread classes needed to add some logic inside the constructor, without changing the constructor parameters.
When you change the set of parameters all that is required is that you call the inherited constructor as first thing inside the new one:
constructor TMyFileThread.Create(OtherParam : TOtherParam);
var
param : TParam;
begin
inherited Create(param); // It is enough to call the base constructor at the top
// do some other stuff
end;
The definition requires no keywords:
TMyFileThread = class(TMyBaseThread)
...
public
constructor Create(OtherParam : TOtherParam);
Did you notice how we used inherited Create(param) to call the base constructor, but we did not use inherited Execute;? That's because the Execute method was marked as abstract and have no default implementation in the base class. Using inherited on an abstract method would cause an exception as there is no default method to call.
As a general rule calling inherited Create is a must if the base constructor you are calling is marked as virtual, but is almost always required even if it is not marked so.
Finally, I want to formulate a summary of the relevant keywords and their most common use:
virtual - declare a method that can be reimplemented in descendant classes. That is descendant classes can change the behaviour of the method. They can replace all the code inside it with their own, or can both call the base method and then add additional behaviour before/after that. This keyword is used only in the base class that defines the method for the first time. Descendant classes use the other keywords.
dynamic - consider it the same as virtual. Can save some memory resources, but only if the method is not reimplemented in all descendant classes and there are many objects created from such classes. Rarely used.
override - declare a method that reimplements the base class by providing code that replaces the default one in the base class. You use override in descendant classes. You can use the inherited keyword inside your implementation to call the base method.
overload - You declare an alternative variant of the method with another set of parameters. Note that overloading a method has nothing to do with inheritance. An overloaded version of the method is not executed when the base class is calling the original method. Usually overloaded methods normalize the parameters (converting them to other types, adding default values for some parameters) and then call one of the other overloaded methods. Again, this has nothing to do with inheritance and the virtual, override keywords. Although sometimes you can combine both effects.
reintroduce - This again is not inheritance. You use this keyword in descendant classes. The purpose is to make calls to the method from inside your class (and only calls from your class, not calls from the base class) to execute that reintroduced version of the method instead of the base one. Calls from the base class still execute the original version. Rarely used.
Having said that, here is my interpretation of your code:
interface
uses
Classes, SysUtils;
type
TParam = class
end;
TOtherParam = class
end;
TDatabase = class
end;
TMyBaseThread = class(TThread)
private
procedure BuildBaseObjects(aParam : TParam);
protected
public
constructor Create(Param : TParam);
end;
TMyFileThread = class(TMyBaseThread)
private
protected
procedure Execute; override;
public
constructor Create(OtherParam : TOtherParam);
end;
TMyDBThread = class(TMyBaseThread)
private
protected
procedure Execute; override;
public
constructor Create(aDB : TDatabase);
end;
implementation
{ TMyBaseThread }
constructor TMyBaseThread.Create(Param : TParam);
begin
inherited Create(False);
Self.BuildBaseObjects(Param);
// Do some stuff
end;
procedure TMyBaseThread.BuildBaseObjects(aParam : TParam);
begin
// Do some stuff
end;
{ TMyFileThread }
constructor TMyFileThread.Create(OtherParam : TOtherParam);
var
param : TParam;
begin
inherited Create(param); // Remember to initialize param somehow
// Do some other stuff
end;
procedure TMyFileThread.Execute;
begin
while not Terminated do
Sleep(1);
end;
{ TMyDBThread }
constructor TMyDBThread.Create(aDB : TDatabase);
var
param : TParam;
begin
inherited Create(param); // Remember to initialize param somehow
end;
procedure TMyDBThread.Execute;
begin
while not Terminated do
Sleep(1);
end;
PS. Actually using inheritance on TThread is mostly useful for plugin architectures or task workers. You can look up for examples on that.
|
{
"pile_set_name": "StackExchange"
}
|
Once again we have serious conflict between Israel and Hamas. Hamas fires rockets, Israel fires back. Repeat daily.
Israel seems to be getting hammered by the U.S. media this time around – at least from what I have seen on NBC. Formerly very pro-Israel, NBC now seems to be covering the story from the Hamas side; giving heavy play to the destruction and loss of so-called innocent life in Gaza while devoting little airtime to the Israeli point-of-view.
Don’t get me wrong, I oppose America’s blind, no-questions-asked support of Israel. It’s a ridiculous policy that has fostered hate against America around the world and has served as a foundation for Israeli bad behavior like building illegal settlements, illegal land appropriation and the flagrant mistreatment of Palestinians.
But what Palestinians and their supporters around the world need to understand is that their problems are completely and concisely rooted in their staunch determination to destroy Israel and their refusal to recognize Israel’s right to exist. This one thing represents the impediment to peace.
I doubt America’s relationships with Canada or Mexico would be so friendly if they were sworn to our destruction and murder.
So, America’s blind support of Israel is not even the issue at hand. The issue is Israel’s right to exist and to defend itself against those who seek to destroy it. Hamas has insidiously woven its weaponry and military through the neighborhoods, schools, hospitals and markets of its own people. Of course Israel’s attacks to destroy Hamas’s military capability and weaponry will result in civilian casualties. That was Hamas’s plan from the start along with its plan to use those casualties as propaganda to weaken support for Israel.
But Israel is not the aggressor here. Israel has been under siege for weeks and has exercised great patience and discipline in its responses to Hamas. The time for patience, however, is ending and Israel must do what it must do – what we all know it must do.
NBC News and the world media need to stop buying into the Hamas propaganda that Israel is killing innocents. Those so-called innocents are all sworn to annihilate Israel. Those so-called innocents elected Hamas as their leadership and, in doing so, endorsed Hamas’s methods. They are no more innocent than the Germans who elected Hitler and then stood by while he committed the worst genocide in history.
If the Palestinians truly care for the innocent women and children who are in harm’s way, they have the power to remove Hamas from leadership and denounce the destruction of Israel. If they do that, I am quite confident that Israel will be the first ones to the peace table.
“Call out the National Guard.” “Lock down the border.” “Not in our town.” These are just a few of the friendly and heartwarming welcome phrases uttered by the loving Americans in Murrieta, CA this week in protest of illegal immigrants being brought to the border patrol facility located there. The buses carrying the immigrants were turned away by the angry mob; another proud American moment destined to be inducted into the American Hypocrisy Hall of Fame. It will look terrific right next to the Cliven Bundy statue. “Where is the AHHoF,” you ask? It’s located in Washington, D.C. right at the intersection of Constitution Ave. and Independence Ave.
Well, actually Constitution and Independence don’t intersect in Washington; and they don’t seem to intersect in Murrieta either. Except for a handful of Native Americans in Murrieta, everyone there is either an immigrant or descended from immigrants. It’s an interesting human quirk that we feel entitled to the things we need while simultaneously oppressing others with the same needs. It was ok for my ancestors to flee poverty and oppression in search of a better life in America, but it’s not ok for today’s oppressed to do the same.
American’s have been historically schizophrenic about immigration. On one hand, we love to hold ourselves out as the great beacon of hope; erecting statues and enshrining poems that solicit the world to send us its tired, poor and homeless. On the other hand, when said tired, poor and homeless take us up on our offer, we work zealously to repel them and treat them badly while doing so. At best it’s false advertising; at worst it’s just plain inhumane.
The good folk in Murrieta are quick to point out that this is not about immigration, but rather illegal immigration. But, the nuances and legalities of American immigration policy may not weigh strongly on the mind of a Honduran mother whose survival instinct is to flee with her children – just as mothers have done since the dawn of humankind. And if respecting the law was the message of the Murrieta mob, they might consider the laws they violated while refusing to let those buses pass.
It’s true, America’s immigration policy is a shameful patchwork of conflicting, politically-motivated, discriminatory laws and rules that place bigotry, greed and fear above human compassion. Consider that, in South Florida, a Cuban refugee and a Haitian refugee both arrive near the shoreline on the same raft. The police are waiting on the beach to repel them. The two refugee’s jump off the raft and swim in to shore, trying desperately to dodge the police officers. Through sheer determination, both get past the police and then collapse on the beach – exhausted. The Cuban is welcomed and released into the country. The Haitian is deported. How is that fair?
I understand the anger of the ignorant mob in Murrieta, but I don’t understand why they are directing their anger at these poor, tired, homeless people; you know, the ones mentioned in the poem by Emma Lazarus on the Statue of Liberty. America has invited these people to come. It is disingenuous and un-American to treat them like invaders. If the people of Murrieta don’t want them, then perhaps the people of Murrieta should make a journey of their own. They could start by hopping on some buses to the Statue of Liberty to take down the damn poem that is causing all the problems. They could even put up a new plaque of their own. It could read: NO TRESPASSING. WE HATE YOU. STAY THE HELL OUT!
Or, they could travel to Washington DC and direct their anger at the Congress whose politics and petty differences are responsible for an immigration system that mistreats immigrants and places undue hardship on border communities and states. One thing is certain: We’re not going to solve the immigration issue by hating immigrants.
So, the kids are out of school and getting restless and the hot weather has got you looking for something to do that’s cool. It may be time to grab a cool drink, a tub of popcorn and settle in for a great movie! Here’s a list of the best Movies of 2014…so far.
In HBO’s new series, Silicon Valley, quirky billionaire Peter Gregory (played by the late Christopher Evan Welch) tries to convince college students to drop out of school with a promise of $100,000 to pursue their own ideas. The show is a comedy, but Gregory’s message is painfully close to reality. College students are graduating in greater numbers than ever, with higher debt than ever and with fewer job options than ever. They are going to college seeking the American Dream and are instead graduating into an economic mess.
College is a given for the wealthy in America but, for the poor and working class, obtaining a college education is a struggle. There was a time when college was worth the sacrifice because it was a ticket out of poverty; it meant being able to get a better job and live a better life. Going to college became one of the great pillars of the American Dream and, for working class families, it was a symbol of success and achievement. Generations of parents worked hard and sacrificed in order to see their children have that better life.
Yes, college is still worth the sacrifice; it’s just that nowadays, it takes a lot more sacrificing. Decades ago, politicians began to see college education as a means to get votes among the working class. In campaign after campaign they promised tuition assistance, grants and low-cost loans – popular items that helped seduce votes from parents who wanted better futures for their children. Before then, banks had never viewed college education as a cash cow because the rich didn’t need to borrow to send their kids to school. But, as the ranks of poor and working class students swelled over the years, the banking industry began to see opportunities. Using well-funded lobbyists, the banking industry pushed Congress for reductions in government funding and increases in private, government-backed student loans. For the banks, it was a win-win scenario; they made money on interest and were exposed to little risk. The lobbying didn’t stop there however. During the 1980’s and 1990’s the banking industry pressured Congress to pass legislation preventing student loans from being discharged in personal bankruptcies.
The banking industry however, is not alone in this student loan shakedown. Colleges themselves are complicit too. During the last 40 years, the message that college is required for success has been steadily hammered into the American consciousness while, during that same time, the average cost of college tuition has risen by 1,120% according to Bloomberg News. CNN Money says that the average college graduate today is about $30,000 in debt. The impact of this enormous debt will have far-reaching consequences as graduates begin their adult lives and careers. Even with the better job that a college degree may deliver, most graduates will find it financially daunting to get married, buy a home, buy cars, have children, and save for retirement which, ironically, are many of the key attributes associated with achieving the American Dream.
Additionally, the U.S. birthrate has been declining for decades and, with so much student loan debt, millions of graduates are expected to put off starting families for years while they struggle to pay bills; a trend that will have a devastating impact on the Social Security system since fewer and fewer people will be paying into it.
Winning the lottery aside, the only financial relief for many graduates may come from inheriting their parents’ estates when they depart. But, not so fast; banks have set their sights on these too. In recent years, the banking industry has ramped up one of its newer money-making schemes: “reverse mortgages.” A reverse mortgage allows retirees to borrow the equity out of their homes and use it to pay bills. In exchange, the bank owns the home when they die. Yes, the banks are now offering to lend your parents their own equity so, when they are gone, their home won’t go to the kids, it will have already been signed over to the bank.
So what is a student to do in this depressing and bleak landscape? If you’re determined to go to college and pursue the American Dream, here’s a few real-world tips that may help you avoid the student loan swindle:
Choose a school that gives the most education bang for the buck. Yes, big name schools can be more fun, but if your goal is to have fun, go to Disney World. If you want an education, pick a school that will provide you with an education that doesn’t cost an arm and a leg. In many areas of study, your local community college can deliver the same education as a big box school at half the price! And, if you’re worried about prestige, don’t be. Most employers want legit degrees but seldom care what school they are from.
Consider a regionally accredited online school. They’re not for everyone and require extra discipline however, if you have the discipline to do it, attending online is far more flexible and will allow you the time to work and earn money to help keep student loans at a minimum.
Live at home if possible. Avoiding the cost of housing will help keep your borrowing down.
Work. Get some kind of job and put as much money toward your tuition as you can. Every dollar you pay up front will probably save you two dollars or more in student loan payments later. Plus, the experience you get from working a job will be invaluable no matter what your career field is.
Pick a major that is employable. You can be idealistic and major in “aboriginal interpretations of celestial bodies,” but that may not get you hired at most companies. Choose a major that will get you in the door at the biggest number of companies and chase your ideals as a minor – or better still – as a post graduate once you’re already employed.
Avoid other debt. Banks are not your friends! Throw those credit card offers in the trash and don’t make any major purchases – like a car. You are already making a major purchase – college!
Look for scholarships and grants – but don’t be afraid to beg also! Ask friends and relatives, but be creative too. Go to Wal-Mart and buy 12 cheap 8” x 10” picture frames. Insert your picture with a strip across the bottom that reads “This establishment is proudly helping –your name here- with college tuition.” Now, go around to all the mom and pop businesses in your area and ask if they will gift $100 to help you pay for school. You’ll be surprised at how many may agree. Give them your portrait and let them display it where customers can see it. If they are suspicious, have them make the check payable directly to the school. Businesses love supporting good causes – especially when they get promotional value out of it. It’s a win-win! Stay in touch with them as your education continues. Show them your grades. They are likely to make an additional gift each year if you keep them up-to-date on your success.
|
{
"pile_set_name": "Pile-CC"
}
|
Newsbrief: BlueStacks, the company behind the PC-based Android emulator of the same name, is rolling out an SDK that it says gives developers the ability to launch their mobile games on Steam in a single step and without any lengthy porting process.
That SDK is BlueStacks Inside and the company says it offers a 1-step integration that allows mobile games to launch on Steam and route all in-game transactions through the platform’s Steam Wallet.
Games brought to Steam through the SDK run in their own, game-branded windows without any additional BlueStack branding and can work with native Steam features as well. Devs are able to self-publish the BlueStacks Inside-powered games on Steam, though the company does take a percentage of in-app purchases and charge a separate fee for its use.
Inside is currently only in soft launch, but BlueStacks says it's already used the SDK to bring games like Pirates Outlaws from mobile to Steam.
|
{
"pile_set_name": "OpenWebText2"
}
|
Changes in the organization of membrane lipids during human platelet activation. Study by fluorescent and freeze-fracture cytochemistry.
Modifications in the membrane lipid organization of human platelets activated with different agents (adenosine 5'-diphosphate, thrombin, collagen type I, and monosaccharides such as fucose, mannose, and galactose) were analyzed in vitro by using three lipid markers. Cholesterol was detected upon interaction with filipin, the anionic phospholipids were reacted with polymyxin B, and alterations in the degree of lipid packing were evaluated with the lipophilic fluorescent probe merocyanine 540, which reportedly inserts into bilayer domains whose lipids are more disordered. Filipin-sterol complexes and polymyxin B-anionic phospholipid complexes form characteristic membrane deformations which were examined in freeze-fracture preparations, whereas the merocyanine 540 binding to platelet membrane was recorded by fluorescent microscopy. In contrast to the resting cells, thrombin-stimulated platelets displayed an uneven distribution of filipin-sterol complexes which occurred in much higher density on the cell body than on pseudopods: on the latter, apparently cholesterol-free domains were very common. Unlike the non-stimulated cells, the platelets aggregated with the various agents employed showed characteristic polymixin B-anionic phospholipid complexes deformations of plasmalemma suggesting the appearance in uneven concentration of anionic phospholipids in the outer membrane leaflet. Incubation with merocyanine 540 did not result in staining of resting platelets when these were maintained in plasma, but a slight fluorescence was observed when platelets were kept in Tyrode buffer. However, platelets stimulated with thrombin, collagen type I, and monosaccharides bound very heavily the fluorescent dye; platelets aggregated with adenosine-5'-diphosphate bound only small amounts of merocyanine 540. The results showed that, during activation by different agents, modifications in lipid membrane organization include alterations in cholesterol and anionic phospholipid distribution, transbilayer movement of anionic phospholipids accompanied by more disordered membrane.
|
{
"pile_set_name": "PubMed Abstracts"
}
|
HIV wears Prada
Apr 6, 2006
Dr. Frascino,
I have been faithfully coming to this site for the past month, trying to get up the nerve to get an HIV test. While I have never been promiscuous, I know the risk that I put myself in each and every time I had unprotected sex in the past. I am a college-educated, professional, heterosexual female. I've never used drugs, abused alcohol, or voted republican. Unfortunately, I live in a large city in Europe where most of the anonymous HIV testing centers are ran by the Government and located in dilapidated buildings; which only serves to add to the ominous mood.
I finally got up the nerve to drive downtown to the testing facility and circled the block almost 10 times before leaving. What I saw were kids, adults, men, women, and those in between, and I was afraid to get out of the car. My perception was that every one of these persons sitting on the sidewalk waiting for the testing center to open HAD to be HIV +. I wear suits to work and drive a BMW - - why the hell was I worried about HIV? The truth is, one night I was out with my girlfriends at an upscale bar. I had one too many glasses (or bottles) of Prosceco, blacked out, and woke up not remember the guy I had left the bar with that night. Last week, I finally got up the nerve to walk into the clinic and get tested and I was ashamed. The people in this building were kind, helpful, and encouraging. Everyone, from the volunteer staff to the patients, went out of their way to reassure me that even if the test came back positive, I would learn to live again. As luck, fate, karma, God, would have it, I am negative.
I just wanted to write and let you know that this experience has changed my life. I know that the outcome could have been worse, because HIV does not discriminate. Since I spent countless hours on the internet researching HIV, I am looking for some way I can pay back the community that helped me in my time of need and educate others like myself about the risks and preventative measures for HIV.
Thank you for all that you do; you are a true inspiration to your profession and to the human race!
Changed Forever but still wearing Prada
Response from Dr. Frascino
Hi,
Having just returned form participating in an HIV conference, I too happen to be wearing Prada at the moment! Thank you for taking time to write in and share your story. Congratulations on your negative test! WOO-HOO!
I'm also delighted the experience has changed your life and that you plan to help with HIV/AIDS awareness, education and prevention. That's a wonderful way to rack up some excellent cosmic karma.
This forum is designed for educational purposes only, and experts are not rendering medical, mental health, legal or other professional advice or services. If you have or suspect you may have a medical, mental health, legal or other problem that requires advice, consult your own caregiver, attorney or other qualified professional.
Experts appearing on this page are independent and are solely responsible for editing and fact-checking their material. Neither TheBody.com nor any advertiser is the publisher or speaker of posted visitors' questions or the experts' material.
The Body is a service of Remedy Health Media, LLC, 750 3rd Avenue, 6th Floor, New York, NY 10017. The Body and its logos are trademarks of Remedy Health Media, LLC, and its subsidiaries, which owns the copyright of The Body's homepage, topic pages, page designs and HTML code. General Disclaimer: The Body is designed for educational purposes only and is not engaged in rendering medical advice or professional services. The information provided through The Body should not be used for diagnosing or treating a health problem or a disease. It is not a substitute for professional care. If you have or suspect you may have a health problem, consult your health care provider.
|
{
"pile_set_name": "Pile-CC"
}
|
Transcriptome profiling of the meristem tissue of Saccharina japonica (Phaeophyceae, Laminariales) under severe stress of copper.
Copper (Cu) is an essential metal involved in many physiological processes of living organisms. However, beyond a certain threshold, Cu can become highly toxic. For instance, in the summer sporeling production of the economic kelp Saccharina japonica, the excess Cu accidently released from the low-quality alloys of the refrigerating machine was deadly to the seedlings and led to the failure of hatchery operations. However, the molecular basis underlying high toxicity of Cu remains unclear. In this study, juvenile sporophytes were cultured in seawater containing different concentrations of Cu2+ (10, 100, and 200 μg L-1). Bleaching was observed in the meristem of individuals in the 100 and 200 μg L-1 treatment groups on the third day, indicating that Cu has caused severe harm at these concentrations. RNA-Seq was used to profile transcriptomic changes under different Cu2+ concentrations. Compared with the control, the number of differentially expressed genes (DEGs) was 11,350 (4944 up- and 6406 down-regulated) in the 200 μg L-1 treatment group and 2868 (1075 up- and 1793 down-regulated) in the 100 μg L-1 treatment group, whereas much fewer DEGs were detected in the 10 μg L-1 treatment group. Genes coding for glutathione-S-transferase and vanadium-dependent bromoperoxidase and iodoperoxidase were found to be remarkably regulated, especially in the 200 μg L-1 treatment group. Gene Ontology (GO) and Kyoto Encyclopedia of Genes and Genomes (KEGG) analyses showed that only down-regulated DEGs were enriched. There were 45 enriched GO terms and four enriched KEGG pathways common to the 100 and 200 μg L-1 treatment groups, which were associated with diverse essential biological processes such as photosynthesis, protein synthesis, redox activity, and metabolism and biosynthesis of functional biomolecules, among others. Suppression of these biological processes at the transcriptional level likely contributes to the observed high toxicity of Cu2+ in S. japonica.
|
{
"pile_set_name": "PubMed Abstracts"
}
|
Former Vice President Joseph R. Biden, speaking to reporters after a union forum in suburban Des Moines, Iowa, said Sunday he did not discuss his son Hunter’s decision to resign from the board of a Chinese equity firm before the younger man’s attorney had posted the statement.
“No one has asserted my son did a single thing wrong,” Mr. Biden added, pounding his finger into the podium, “except a lying president.”
And Mr. Biden also promised to bar his family members from occupying any office within the White House and said they won’t “sit in meetings as if they are a Cabinet member.”
That was a jab at Mr. Trump, who tapped daughter Ivanka and her husband, Jared Kushner, as advisers.
But Mr. Biden did not say whether his pledge meant that his wife Jill Biden would not get the office traditionally assigned to first ladies, should he win.
He further vowed that no one in his family will have “any business relationship with anyone that relates to a foreign corporation or foreign country.”
Sign up for Daily Newsletters Manage Newsletters
Copyright © 2020 The Washington Times, LLC.
|
{
"pile_set_name": "OpenWebText2"
}
|
Q:
Adding function parameters using a single variable in jQuery
I was thinking the is it possible to pass a variable to function which is to be executed on clicking the button and the function is given by a variable.
Also the parameters of the functions could be more than one and so I separated them by ,.
So is there a way that I can put the parameters into function using any jQuery plugin or a function. Please help me out, cause I'm confuse big time! Here is my current jQuery Code:
function Func (a,b){
alert(a+' | '+b);
}
var Parameters = 'cool,123';
var Function = Func;
$('button').click(Function);
Problem demo
Thanks in advance
A:
You can use function.apply(). Pass your list of parameters in as an array and you can even set a scope if you wish to do so:
function myFunc(a,b){
alert(a+", "+b);
}
var args = ["one", "two"];
var func = myFunc;
$('button').click(function(){
func.apply(this, args);
});
A:
Is this what you're after?
function Func (a,b){
alert(a+' | '+b);
}
var Parameters = 'cool,123';
$('button').click(function() {
Func.apply(this, Parameters.split(","));
});
Demo: http://jsfiddle.net/6nJx7/14/
https://developer.mozilla.org/en/JavaScript/Reference/Global_Objects/function/apply
|
{
"pile_set_name": "StackExchange"
}
|
MTV has issued a statement insisting that they have not banned Kanye West's racy, gory video for "Monster." According to the network, they have been in "constant communication" with West's label Def Jam and are still waiting for edits requested in order for the clip to meet their decency standards.
West has yet to comment. An official finished version of the video hasn't been released and cannot be easily found online. It is possible that West and Def Jam may simply abandon the clip, as they just recently moved on to promoting "All of the Lights," the fourth single from My Beautiful Dark Twisted Fantasy.
|
{
"pile_set_name": "Pile-CC"
}
|
Midnight Express (book)
Midnight Express is a 1977 nonfiction book by Billy Hayes and William Hoffer about Hayes experience as a young American who was sent to a Turkish prison for trying to smuggle hashish out of Turkey. The book was adapted by Oliver Stone and directed by Alan Parker into a 1978 feature film of the same name that took many liberties with the book.
Editions
Dutton, 1977. (First edition)
Category:1977 non-fiction books
Category:Books adapted into films
Category:Law enforcement in Turkey
Category:Turkey–United States relations
Category:Works about cannabis trafficking
Category:Memoirs of imprisonment
Category:Illegal drug trade in Turkey
Category:Cannabis in Turkey
Category:E. P. Dutton books
|
{
"pile_set_name": "Wikipedia (en)"
}
|
Termination of a randomized controlled trial of two vasectomy techniques.
Family Health International (FHI) and EngenderHealth conducted a multicenter, randomized controlled trial to evaluate a fascial interposition (FI) component of a vas occlusion procedure for male sterilization. A data monitoring committee (DMC) was established to provide independent review of the interim report. The DMC met to review the interim report after enrollment of 552 men. As planned, an estimate of the hazard ratio (HR) for successful vasectomy for the FI group versus the no-FI group controlling for age of the participant and level of experience of the surgeon was obtained for the interim report using Cox's proportional hazards regression. The main analysis comparing time to vasectomy success, defined as two consecutive azoospermic semen samples, was highly significant and met the prespecified level for stopping enrollment (HR=1.54, p<0.01). However, a troublesome age by vasectomy technique interaction became apparent in the analysis. FI was clearly beneficial for younger males. However, the trend for older men was not as clear. The DMC recommended continuing the trial to better study this interaction and obtain more data to clarify the effect of FI for older men. After consulting further with the DMC, the study statisticians presented the interim report to senior management at FHI. A meeting between FHI senior management and the DMC followed. After much deliberation, trial enrollment was terminated. Follow-up of participants already enrolled in the study continued as planned. This paper presents the issues involved in the decision to terminate the study.
|
{
"pile_set_name": "PubMed Abstracts"
}
|
Q:
Who was the first "trap character"?
A "trap character"(UrbanDictionary entry, may be NSFW) is a character who appears to be a girl until you get in close enough (plot-wise) to discover they are, in fact, a boy. The inverse trope exists as well; a "reverse trap" character is a girl who appears to be a boy.
(Note: The word trap here is not intended to be offensive, or a slur; it is only used to refer to fictional characters of this type.)
Some examples are Ruka Urushibara of Steins;Gate and Sora Kamomeya of Tsui☆Teru (pictured below):
Who was the first trap character in anime and/or manga, and what media did the trope originate from?
A:
Tezuka's 1949 manga, Metropolis, features Michi, a synthesised human with a gender switch which can turn it from a boy into a girl and vice versa which is used as a plot device.
Tezuka's 1953 manga, Ribbon no Kishi (Princess Knight) features a reverse trap with a girl pretending to be a guy:
Taking place in a medieval European-like fairy-tale setting, Princess Knight is the story of young Princess Sapphire who must pretend to be a male prince so she can inherit the throne (as women are not eligible to do so). This deception begins as soon as she is born, as her father the King announces his baby is a boy instead of a girl. The reason for this is that the next-in-line to the throne, Duke Duralumon, is an evil man who would repress the people if he were to become king, and because of this the King will go to any length to prevent him from taking over.
Similarly, The Rose of Versailles (1972) is another that has a girl, pretending to be a guy, Oscar François de Jarjayes.
For a "straight" trap, 1973's Ara Waga Tono! appears to be the first to fit the bill.
This is a slapstick romance, where girls and boys clash in a ‘modern’ co-ed high school. There is a lot of romantic intrigue, quite a bit of gender-bending and some teenage angst when adults Just Don’t Understand. (source: goldbird)
Then there's 1974's Oira Sukeban:
Oira Sukeban (おいら女蛮?), sometimes called Sukeban Boy, is a Japanese manga created by Go Nagai in 1974. It is a comedy with several erotic touches, where the protagonist Banji Suke (or Sukeban) has to disguise himself as a girl in order to be able to attend an all-female school. As Suke Ban is a rebellious boy, this situation creates several comedic troubles.
The manga was adapted to an OVA in 1992 and was released by ADV Films in the US under the name Delinquent in Drag.
But my guess is that the trope really took off only after the publication and airing of Ranma ½ in the late 80s.
The story revolves around a 16-year old boy named Ranma Saotome who was trained from early childhood in martial arts. As a result of an accident during a training journey, he is cursed to become a girl when splashed with cold water, while hot water changes him back into a boy.
Ranma ½ had a comedic formula and a sex changing main character, who often willfully changes into a girl to advance his goals. The series also contains many other characters, whose intricate relationships with each other, unusual characteristics and eccentric personalities drive most of the stories. Although the characters and their relationships are complicated, they rarely change once the characters are firmly introduced and settled into the series.
|
{
"pile_set_name": "StackExchange"
}
|
Seven years on from the British-led NATO war in Libya in 2011 to remove leader Muammar Gaddafi, the country remains riddled with conflict and lacks effective governance. And one year on from terrorist attacks in the UK whose perpetrators are linked to that war, major questions remain about the links between British foreign policy and terrorism.
Rather than simply marking the terrorist attacks with a minute's silence and solemn pledges of defiance, what is really needed is a full public inquiry into the British role in that 2011 war and what has flowed from it.
The case for holding such an inquiry is overwhelming. The principles under scrutiny - whether the government violated international law, told parliament the truth and colluded with extremist forces - are as serious as over the invasion of Iraq.
Regime change
There are three main cases for the government to answer. First, British bombing in Libya, which began in March 2011, was a violation of UN Resolution 1973. This authorised member states to enforce a no-fly zone over Libya and to use "all necessary measures" to prevent attacks on civilians. What it did not authorise was the use of ground troops or regime change. Yet then prime minister David Cameron promoted both.
General David Richards, then chief of the defence staff, told a parliamentary inquiry in 2016 that Britain "had a few people embedded" with rebel forces in Libya, saying that they were “in the rear areas” and "would go forward and back". He also repeatedly told the inquiry that British policy amounted to regime change.
Did the LIFG receive UK assistance to fight in Libya at this time? Why were the Abedis allowed to return to the UK after fighting in Libya with no questions asked?
Indeed, British bombing clearly went beyond preventing attacks on civilians. Three weeks after Cameron assured parliament in March 2011 that the object of the intervention was not regime change, he signed a joint letter with US President Barack Obama and French President Nicolas Sarkozy committing to "a future without Gaddafi".
That these policies were illegal is confirmed by Cameron himself. He told Parliament on 21 March 2011 that the UN resolution "explicitly does not provide legal authority for action to bring about Gaddafi's removal from power by military means". This is, if anything, an even clearer-cut case than Iraq of a British government violating international law.
Collaboration with extremists
The second case to answer is over Britain's collaboration with Islamist extremists in the war. Britain saw such forces as its boots on the ground when it was prevented from, and didn’t want to, openly deploy forces of its own.
Two militants who had fought in Afghanistan led the military campaign against Gaddafi's forces in Derna, to the east of Benghazi. Abdel Hakim al-Hasidi, an influential Islamic preacher who spent five years at a jihadist training camp in eastern Afghanistan, oversaw the recruitment, training and deployment in the conflict of around 300 rebel fighters from Derna.
Both Hasidi and his field commander on the front lines, Salah al-Barrani, were former members of the Libyan Islamic Fighting Group (LIFG), the Islamist force that Britain covertly funded in a failed attempt to assassinate Gaddafi in 1996.
People grieve on the anniversary of the deadly attack at Manchester Arena on 22 May 2018 (AFP) In April, in answer to a parliamentary question, Alastair Burt, the British Foreign Office minister for the Middle East, revealed that the British government probably had contacts with the LIFG during the Libya war. The information is especially significant in that Salman Abedi, the terrorist who blew up 22 people in Manchester last year, and his father, Ramadan, had both fought with the LIFG in 2011. Ramadan Abedi is believed to have been a prominent member of the LIFG, which he joined in 1994.
As Middle East Eye revealed last year, the British government operated an "open door" policy that allowed Libyan exiles and British-Libyan citizens living in the UK to join the 2011 war, even though some had been subject to counterterrorism control orders. These dissidents were members of the LIFG, and most were from Manchester, like the Abedis.
Journalist Peter Oborne subsequently revealed that they were "undoubtedly encouraged" by MI6 to travel to Libya to oust Gaddafi. Indeed, after the Libyan leader was overthrown, these fighters were allowed back into Britain “without hesitation”.
Arms embargo
The third case to answer relates to the arms embargo imposed on Libya in 2011. Resolution 1973 called on UN member states to ensure the “strict implementation” of this embargo. A Foreign Affairs Committee inquiry concluded that the international community, without mentioning Britain, turned a “blind eye” to the supply of weapons to the rebels. This was a generous way of putting it. We might ask what those “embedded” British forces were actually doing in Libya, and whether they were involved in supplying arms to opposition forces.
Moreover, a massive $400m worth of arms was provided to the rebels by Britain’s ally, Qatar, much of which went to Islamist radicals. It is inconceivable that this military support was not known to British ministers, and backed by them, as they consistently supported Qatar’s prominent role in the campaign against Gaddafi.
What will be the blowback for UK government after Libya revelations? Mark Curtis Read More »
The Chilcot inquiry into the invasion of Iraq was launched in 2009 and reported in 2016. The key questions it addressed were: “whether it was right and necessary to invade Iraq in March 2003 and whether the UK could - and should - have been better prepared for what followed”. These are also key questions for the Libya war of 2011, so why has no such inquiry been launched in this case?
A key answer is that the Libya war is not regarded as so controversial or disastrous as Iraq in the mainstream media or politics. But this is wrong. Libya has also been plunged into chaos and has also seen the emergence of terrorist groups. If the 2005 7/7 bombings in London were blowback from Iraq, then the 2017 Manchester bombing was likely blowback from Libya.
Unanswered questions
The real reason for failing to hold an inquiry is that the government simply does not want to shed any light on this dirty, murky episode, which involves not only Cameron but also Theresa May, who was home secretary at the time. Did May in 2011 know about or authorise the despatch of Libyans living in the UK to Libya, and were Salman or Ramadan Abedi specifically part of this process? Did the LIFG receive UK assistance to fight in Libya at this time? Why were the Abedis allowed to return to the UK after fighting in Libya with no questions asked?
The Labour opposition should commit to holding a public inquiry into the Libya war if it attains office.
- Mark Curtis is a historian and analyst of UK foreign policy and international development and the author of six books, the latest being an updated edition of Secret Affairs: Britain's Collusion with Radical Islam.
The views expressed in this article belong to the author and do not necessarily reflect the editorial policy of Middle East Eye.
Photo: A Libyan rebel sits atop a vehicle patrolling the streets of the eastern Libyan city of Ajdabiya on 1 May 2011 (AFP)
|
{
"pile_set_name": "OpenWebText2"
}
|
Q:
Using arrays in function handler parametr
I have a problem with finding solution to my problem.
Is it possible to use arrays as argument in str2func?
Example:
A='@(X)10+(X(1)-2)^2+(X(2)+5)^2';
y=str2func(A);
y(someArray);
where X-array 1x2;
A:
sure:
A='@(X) 10+(X(1)-2)^2+(X(2)+5)^2';
y=str2func(A);
y([1 2])
just had to use the variable A instead of test in line 2. BTW, why are you using str2func? This is more straightforward:
y=@(X) 10+(X(1)-2)^2+(X(2)+5)^2;
y([1 2])
|
{
"pile_set_name": "StackExchange"
}
|
Q:
Why my javascript doesn't work from the server
I just uploaded my website on a free host server but it doesn't work properly. I don't know why...
can you help me please ?
see the link :
https://electrophotonique.000webhostapp.com/
A:
Your code is fine but you just need to put your scripts at the end of your code before the </body> tag Like this :
<html>
<head>
<link rel="stylesheet" href="CSS/style2.css">
<link rel="shortcut icon" href="IMAGES/PNG/favicon.png">
<meta charset="utf-8">
<title>Electrophotonique Ingenierie</title>
<meta name="viewport" content="width=device-width, initial-scale=1">
</head>
<body>
<!-- YOUR CODE - START -->
.....
<!-- YOUR CODE - END -->
<script src="https://cdnjs.cloudflare.com/ajax/libs/jquery/3.3.1/jquery.min.js"></script>
<script type="text/javascript" src="JS/sticky_navbar.js"></script>
<script src="js/button.js"></script>
<script src="js/index.js"></script>
</body>
</html>
|
{
"pile_set_name": "StackExchange"
}
|
Q:
Phonegap or steroid.js?
I recently started studying Phonegap when I happen to read about appgyver and steroids.js.The latter seems to be a really easy and fast way to create apps.Now I am confused,should I hop on and give my full focus on learning appgyver or is there an element of phonegap which I should learn as well ?
A:
It somehow depends on what platform you are going to use.
As far as I see, the iOS support of Steroids is much better than of Android, also with a higher priority on the developers future plans. Many important features are not supported on Android, like the Drawer native UI. Also, on one of my test phone(Moto G), the native UI calls in JavaScript are broken.
For me, the main reason to consider Steroids is about the native UI stuffs, but disappointing me on Android.
What's even worse, Steroids has only iOS simulator support for now. So for Android development, you can only use the AppGyver Scanner on your Android phone.
So I would suggest you to do further evaluation if you are only working for iOS, or on Android but doesn't care about native UIs. Anyway, Steroids has a better workflow though.
Update 10/18/2014:
I've been working on some PhoneGap apps recently, and I think I may have found some more things related to this topic.
Today's Steroids is having a much better Android support, with a fresh new Appgyver Scanner. Many native UI components are now working very well.
Steroids has a closed-source build system, i.e. you will have to use their build service every time you want to publish a new version of your apps. However, this is somehow necessary, as Steroids is famous for its native UI components and native transitions.
Steroids has a rather poor support for some of PhoneGap/Cordova plugins. This is also mainly because of the private build system. You can't build your final app by yourself in Eclipse/Android Studio/XCode like what we are doing for many other PhoneGap/Cordova apps.
If you want to take the advantage of native UI transitions provided by Steroids, your web project will be split into several parallel parts (who run in their own corresponding WebViews). This increases the complexity of your project, especially when you are using some web frameworks.
So, if you care a lot about native UIs, native transitions, and don't mind be bound to a proprietary platform, you can try Steroids. Otherwise, I would suggest you try Ionic(http://ionicframework.com/), which is a quite pure web implementation based on PhoneGap/Cordova.
|
{
"pile_set_name": "StackExchange"
}
|
lacP1 promoter with an extended -10 motif. Pleiotropic effects of cyclic AMP protein at different steps of transcription initiation.
The cyclic AMP receptor protein (CRP), which activates transcription from the wild-type lacP1 promoter and most of its mutants, represses productive RNA synthesis from a lacP1 promoter variant that contains an extended -10 element, although CRP enhances RNA polymerase binding as well as open complex formation in both promoters. Moreover, abortive RNA synthesis, which is already higher in the extended -10 variant compared with the parent promoter, was further enhanced by CRP. These results, together with the observed decrease in productive RNA synthesis, indicate that CRP, while facilitating the earlier steps of initiation, inhibits transcription from the extended -10 lacP1 by hindering promoter clearance. We propose that CRP decreases energetic barriers to RNA polymerase binding, isomerization, and abortive RNA synthesis but stabilizes the abortive RNA initiating complex, which results in increasing the activation energy of the transition state before the elongation complex. The results demonstrate for the first time that a DNA-binding regulatory protein acts as an activator or a repressor in different steps of the transcription initiation pathway because of the energetic differences of the intermediate complex in the same promoter.
|
{
"pile_set_name": "PubMed Abstracts"
}
|
[WANG Zhizhong and his Experience on Acupuncture and Moxibustion Therapy].
WANG Zhizhong, born in the Southern Song Dynasty, was proficient in TCM theory and enjoyed summarizing proved prescriptions. During his spare time, he wrote Experience on Acupuncture and Moxibustion Therapy with scientific writing structure, wide quote of references and attached medical reports, which modified and enriched the content of acupoint therapy. This book played an important role as a link between past and future; it included a considerable number of moxibustion methods and was considered as the greatest medical achievement before Song Dynasty. In addition, this book contained the greatest number of proved prescriptions among the ancient acupuncture books, so its academic value was self-evident. However, when examining and correcting the acupoints, WANG ignored the fact that acupuncture physicians had different clinical experience and their understanding on the body structure was discrepant, so the contradictions of location and indications of acupoints appeared in the book.
|
{
"pile_set_name": "PubMed Abstracts"
}
|
Sister Florence Edward Kearney – Died at St. Louise House, Albany, NY February 19, 2013; 81 years of age, 60 years of vocation
Sister Marie Yetter – Died at Villa St. Michael, Emmitsburg, MD, February 23, 2013; 94 years of age, 76 years of vocation
Sister Rose Anthony D’Alfonso – Died at Our Lady of Wisdom Healthcare Center, New Orleans, LA; February 25, 2013. 90 years of age, 59 years of vocation
|
{
"pile_set_name": "Pile-CC"
}
|
Archive | September, 2012
I love old sports cars. Performance cars are very different, model to model – some have flat-out speed, some corner like slot cars, some have lively steering, etc. Few cars have “everything desired” – each model has strengths and compromises.
Autocross racing intrigues me – it’s track racing made accessible to enthusiasts like me. Early on, a peer coach helped me understand how to get the best performance and most satisfying experiences while racing.
He said, “It’s not about pure speed. It’s about feeling the car ‘in the moment,’ every moment.” The best drivers are very attuned to the subtle weight shifts that signal where and how a car is poised on the track. Driving straight is easy. When you’re passing cars or turning to find the most efficient line through a corner, the car’s subtle weight shifts give you clues about how it’s handling.
Feeling the nuances of weight transfer, and leveraging that weight transfer for efficiency and speed, is much more art than science.
Proactive Culture Management Requires “Feel”
Managing your team or organization’s culture is also more art than science. Vital culture elements – clear performance expectations, clear values standards, and accountability for both – don’t make a team’s culture perfect. Just like a track car’s weight shifts in the race, your team’s culture shifts, moment to moment. To ensure your culture is serving your organization, customers, and employees equally well, you must learn to “feel” the subtle shifts that provide clues about how your culture is operating. Where you see clues of aligned behavior, celebrate and praise. Where you see clues of “less aligned” behavior, redirect the culture back “on track.”
Here are the top three “culture shifts” I coach leaders to pay attention to:
Values Demonstration – Are valued behaviors modeled daily, no matter the temptations to short cut a process or gain an unfair advantage? Stay attuned to values by observing leaders working with team members and team members interacting with each other and with customers. Promptly praise raise aligned behavior and redirect mis-aligned behavior.
Promises Kept – Are commitments made by the team and by team members diligently honored? Any promise not kept is an unhealthy action that can lead to further eroding of your team’s integrity, as well as the integrity of individual team members. Every day, observe and inquire about team members doing what they say they will do.
Celebrate Progress & Accomplishment – Do team members praise and encourage each other, day to day, or are they more interested in catching others doing things wrong than in doing things right? A validating culture looks for and celebrates things done well and going well.
Please join in THIS conversation! What are the culture shifts YOU pay attention to? Share your thoughts in the comments section below.
Get your FREE EXCERPT from my new book, #POSITIVITY AT WORK tweet, written with the delightful Lisa Zigarmi. View our video on why we wrote the book, understand the research on positivity in the workplace, and more!
Disclosure of Material Connection: Some of the links in the post above are “affiliate links.” This means if you click on the link and purchase the item, Chris will receive an affiliate commission. Regardless, Chris only recommend products or services he uses personally and believes will add value to his readers. Chris is disclosing this in accordance with the Federal Trade Commission’s 16 CFR, Part 255: “Guides Concerning the Use of Endorsements and Testimonials in Advertising.”
If you’re not, you may be surprised how quickly you can become their best boss. It’s not complicated.
Think about your own best boss – the person you worked for who created an environment where you were immensely productive and you loved going to work every day. What did your best boss do to create that environment for you and your team members?
I’ve asked this question of clients for over 20 years. The answers are remarkably consistent across a wide range of industries, organization size, country of origin, even personality. From my research, these are the most consistently reported “best boss” behaviors:
They care. Each team member is a valued person.
They celebrate. They give praise, encouragement, and credit.
They listen.
They validate others’ ideas, efforts, and accomplishment.
They’re available.
They inspire increasing performance in service to customers.
Notice the pattern of these great boss behaviors. They are primarily about support, validation, and connection – not about, for example, pay, goals, or metrics. Certainly great bosses must inspire terrific consistent performance. And, for these “best bosses,” they spend more time creating and maintaining positive personal relationships than they do driving results.
The payoff for leaders that connect through conversations with employees? Better results.
Knowing these consistent great boss behaviors is one thing – demonstrating them every day with team members is another! The simplest, most effective avenue for leaders to connect to employees is through regular conversations.
Two colleagues have written a terrific book that helps leaders have more authentic conversations with employees. Beverly Kaye and Julie Winkle Giulioni’s book, “Help Them Grow or Watch Them Go,” is available today. Beverly and Julie present a vibrant model that outlines the importance of proactive, frequent discussions about progress, opportunities, and career.
Their model describes conversations that engage leaders and employees in hindsight (learning from past effort and identifying what employees are good at AND love doing), foresight (considering the changing business environment and what those changes mean for the future), and finding insight, the “sweet spot” where hindsight overlaps foresight, illuminating paths to enhance employee skills, contribution, and career.
Being a great boss is not complicated. It simply requires proactive engagement on the leader’s part to invest time, attention, and conversation with each team member. Where those conversations enable the employee to feel cared for, listened to, validated, and inspired, the leader is on the path to being that team member’s best boss.
Please join in THIS conversation! What did your best boss do to create an inspiring work experience for you? How do your great bosses engage you in career conversations? Share your thoughts in the comments section below.
Get your FREE EXCERPT from my new book, #POSITIVITY AT WORK tweet, written with the delightful Lisa Zigarmi. View our video on why we wrote the book, understand the research on positivity in the workplace, and more!
Disclosure of Material Connection: Some of the links in the post above are “affiliate links.” This means if you click on the link and purchase the item, Chris will receive an affiliate commission. Regardless, Chris only recommend products or services he uses personally and believes will add value to his readers. Chris is disclosing this in accordance with the Federal Trade Commission’s 16 CFR, Part 255: “Guides Concerning the Use of Endorsements and Testimonials in Advertising.”
It felt like I had an invisible elephant sitting on my chest. I struggled to breathe. Shooting pains ran down my arms. Instead of thinking, “These are the classic symptoms of a heart attack,” I told myself, “Huh. I may not go into work today.”
It was December 17, 1993 and my life changed that day. I became a heart attack survivor and a heart patient for the rest of my life.
In the weeks before my myocardial infarction, I experienced symptoms that were consistent with clogged arteries. I ignored them. I had work to do. I had a job I loved – actually two jobs: internal consultant with the Federal Reserve Bank and director of the YMCA Pacific Region High School Conference, held each Thanksgiving weekend.
I was driven to succeed in those two jobs. That drive caused me to make lousy choices. I didn’t exercise. I didn’t eat healthy. I compromised my relationship with my family – all because of my focus on my work and my desire to be successful.
A heart attack gets your attention! It let me know that my current path wasn’t a good one.
Most importantly, I learned that unless I was my healthy, best self, I was of no earthly good to anybody. Not my clients, not my family – nobody.
Ohio State football coach Urban Meyer had a similar experience. His drive to succeed as the Florida Gators football coach caused him to experience a frightening health scare that caused him to leave that coveted job. After a year off, Ohio State pursued him for their head coach role. Meyer sought his family’s blessing to take the job. They gave their permission only after Urban signed an agreement that includes:
My family comes first.
I maintain good health.
I go no more than nine hours per day at the office.
I communicate daily with my kids.
I sleep with my cellphone on “mute.”
I trust God’s plan and am not overanxious.
I eat three meals a day.
Meyer says that meeting these requirements is a “work in progress.” He’s trying hard to be present and intentional with his health and his family relationships – so he can serve them and his football responsibilities equally well.
What gets in the way of YOUR best self today? How might you reduce the time you spend, boost your efficiency, or lower the anxiety you feel at or about work? How can you be more present for family, community, and friends so you can be of service and of grace, not discontent and anxious about work and life?
My health is good these days. I’ve lost another 20 pounds over the past two years on the slow carb diet. And, I am a work in progress!
Join in the conversation! What gets in the way of you being your best self? Share your thoughts in the comments section below.
Get your FREE EXCERPT from my new book, #POSITIVITY AT WORK tweet, written with the delightful Lisa Zigarmi. View our video on why we wrote the book, understand the research on positivity in the workplace, and more!
Disclosure of Material Connection: Some of the links in the post above are “affiliate links.” This means if you click on the link and purchase the item, Chris will receive an affiliate commission. Regardless, Chris only recommend products or services he uses personally and believes will add value to his readers. Chris is disclosing this in accordance with the Federal Trade Commission’s 16 CFR, Part 255: “Guides Concerning the Use of Endorsements and Testimonials in Advertising.”
Many of you know that I’m a working musician in my free time. I was invited to join the Jones and Raine band in 2007; it is the most talented, musical, and enjoyable band I’ve ever experienced. The reason why may surprise you. It’s not about musicianship or cool gear or great songs or even teamwork – though all those things certainly help. It’s about listening.
Live music is an interesting challenge. Great live performances are not created by individuals playing their parts at full volume! That creates noise and static which is not pleasurable to listen to.
Great live performances require well-prepared, skilled players who work WITH each other, listening carefully to leave space for others’ contributions, and not step on anyone’s toes with an unfortunately timed vocal or instrumental. Every note played, every word sung, needs to serve the song’s message and the listener’s receipt of it. Every tune played needs an intentional strategy to guide the players and the performance.
Recording in the studio is a different deal. In that sterile setting, individual players can lay down perfect tracks. The producer and engineer(s) mix and master those tracks to position parts (instruments, vocals, lead instrumentation, etc.) in the stereo soundstage, to ensure clarity of tracks, and to present the song in it’s best, final form. For performers, studio work is less complex than live shows – you come in, play your parts, and then leave the mixing and mastering (HOURS of hard work) to the pros.
In a live setting, it is all too easy to create a “wall of sound” that doesn’t distinguish vocals, keyboards, or guitar performances – or the song’s meaning. The best bands – like the best work teams – listen carefully, in the moment, to work together to present the best possible combination of skills and performance for the receiver(s).
Does Your Team Create Music or Noise?
In organizations, it is all too rare that a team cooperates, listens, and leverages team members’ best selves in service to internal and external customers. Most teams create noise – where individual performers do their thing without clear regard for the total package.
That noise may not be intentional. It could be that individual performers see themselves in a “sterile setting” much like that of a recording studio. They perform and leave the “mixing and mastering” to someone else.
In most cases and with most teams, there isn’t someone else to pull it all together. If you want your team’s live performance to be pleasurable to your “listeners” (customers), every team member needs to bring their best performance, listen for the right space to contribute, and offer space for team mates to contribute, too.
Please join in the conversation! What are your experiences with work teams – has it been music or noise or something in between? Share your thoughts in the comments section below.
Get your FREE EXCERPT from my new book, #POSITIVITY AT WORK tweet, written with the delightful Lisa Zigarmi. View our video on why we wrote the book, understand the research on positivity in the workplace, and more!
Disclosure of Material Connection: Some of the links in the post above are “affiliate links.” This means if you click on the link and purchase the item, Chris will receive an affiliate commission. Regardless, Chris only recommend products or services he uses personally and believes will add value to his readers. Chris is disclosing this in accordance with the Federal Trade Commission’s 16 CFR, Part 255: “Guides Concerning the Use of Endorsements and Testimonials in Advertising.”
|
{
"pile_set_name": "Pile-CC"
}
|
Tom Ropelewski
Tom Ropelewski is an American screenwriter, producer and director. He is best known for films Look Who's Talking Now, Loverboy, The Next Best Thing and The Kiss.
He is married to screenwriter/producer, Leslie Dixon.
In May 2006, The Hollywood Reporter reported that Ropelewski and Evan Katz were hired to write the script for an action film entitled Game Boys for Walt Disney Pictures and Jerry Bruckheimer Films. However, as of June 2018, the project remains in development hell.
External links
References
Category:American male screenwriters
Category:Living people
Category:Year of birth missing (living people)
|
{
"pile_set_name": "Wikipedia (en)"
}
|
Health Column: The doctor will see you now — at home
The biggest problem Medical House Calls of the North Fork has, owner Steven Templeton said recently, is that people assume it’s too good to be true.
But the Greenport physician assistant’s business, which provides health care to people from Riverhead to Orient in the comfort of their own homes, is the real deal.
“When you go the doctor now, it feels like a revolving door because they need to see so many patients,” said Mr. Templeton, who launched MHCNF in January. “House calls enable us to really spend time with our patients, to sit down and discuss what’s really bothering them.”
“We’re a little outside the box in terms of house calls,” Mr. Templeton said. “We kind of took it to a new level.”
Indeed, the term “house call” might evoke scenes from “Little House on the Prairie,” but there is nothing old-fashioned about this operation. MHCNF has its own ambulance and offers a flat-rate health insurance policy that includes a yearly physical, up to six additional visits, lab work, X-rays and more, Mr. Templeton said. And the concept is catching on: One day earlier this month, Mr. Templeton said he had already seen 10 patients by 2 p.m.
The idea for the business was born from a desire to streamline health care on the North Fork, particularly for the elderly and people who have difficulty leaving their homes.
Mr. Templeton, a Hauppauge native, said that when he visited his grandparents in Mattituck he “realized that when you see a provider [here], you have to make multiple stops to get seen and have labs and imaging done. And people who are geriatric, that can take a lot out of them. That’s when we realized there was an opportunity.”
One of the things MHCNF doesn’t treat are symptoms that require emergency care, like chest pain, shortness of breath, pregnancy complications or loss of consciousness, Mr. Templeton said. They also don’t treat acute breaks. But people who, say, cut a finger while cooking and don’t know whether they require emergency room care can text or email a photo of the injury to MHCNF for an assessment.
Medical House Calls of the North Fork is open 8 a.m. to 8 p.m. Monday through Saturday; Sunday appointments are reserved for sick visits and acute injuries. For more information and a full list of services, call 631-626-1006 or visit northforkhousecall.com.
|
{
"pile_set_name": "Pile-CC"
}
|
This invention relates to load conveying systems, and specifically to a type of load conveying system which is known as a moving floor.
Moving floors are used in a variety of material handling environments, such as warehouses and in over-the-road trailers which are used in the trucking industry. A basic concept of a moving floor or reciprocating conveyor is disclosed in my U.S. Pat. No. 4,143,760, for RECIPROCATING CONVEYOR, which describes a moving floor system having a plurality of groups of elongated slats. In that system, a hydraulic drive is operable to move all of the slats of each group from a start position simultaneously in a load-conveying direction, and then to move the slats of each group sequentially in the opposite direction from the advanced position back to the start position. In this fashion a load is conveyed in a predetermined direction.
Known reciprocating conveyor systems utilize rigid slats which are normally formed of extruded aluminum. The hydraulic drive system typically takes the form of a plurality of hydraulic cylinders, each of which is mounted to a transversely extending drive beam or cross drive, to which are mounted each of the slats of that group. Other forms which the drive system may take include a reciprocating rod extending between a pair of fixed cylinders, or a single cylinder mounted to reciprocate on a fixed shaft. With these systems the cross drives are mounted to the reciprocating rod or to the reciprocating cylinder, respectively, and the slats of each group are mounted to one of the cross drives.
Slat type conveyor systems have been extremely successful in providing a trailer-mounted loading and unloading capability for a reasonable expense, while taking up little space in the trailer. However, because the slats must extend the entire length of the trailer, and cover most of the floor thereof, even when a light weight material such as aluminum is used, the weight of the conveyor system is substantial. Also, because the load to be carried is often dropped onto the slats in the trailer, the slats will on occasion be damaged, thereby rendering the system inoperable. Also, when consideration is given to the amount of aluminum which must be used, the expense of the slats comprises a substantial percentage of the cost of the conveyor system. Finally, in order to render the conveyor system watertight, seals must be positioned between the various slats. These seals need to be replaced from time to time and thus increase the maintenance which is required to the system.
It is an object of the invention to overcome the limitations with the prior art proposals. Other more specific objects are as follows: (1) to develop a trailer-mounted reciprocating conveyor system which does not require the use of expensive slats with seals mounted therebetween; (2) the provision of a reciprocating conveyor system which can lend itself to watertight operation; (3) to provide a conveyor system which is similar to conventional slat type conveyors except that flexible bands are used in place of the slats, such bands being less susceptible to damage during loading operations; (4) to develop a reciprocating floor conveyor system in which slats may be operating in purely a pulling rather than a pushing mode, thereby reducing structural requirements for the slats; (5) the provision of a trailer-mounted conveyor system which uses less space and weighs less than conventional slat type conveyor systems; and (6) to develop a conveyor system which permits drive components to be mounted at various positions in or under the trailer, thereby providing a conveyor system which is usable in many different applications.
|
{
"pile_set_name": "USPTO Backgrounds"
}
|
Alexander Tamanian
Alexander Tamanian (, March 4, 1878 – February 20, 1936) was a Russian-born Armenian neoclassical architect, well known for his work in the city of Yerevan.
Life and work
Tamanian was born in the city of Yekaterinodar in 1878 in the family of a banker. He graduated from the St Petersburg Academy of Arts in 1904. His works portrayed sensitive and artistic neoclassical trends popular in those years. Some of his early works included the mansion of V. P. Kochubei in Tsarskoye Selo, 1911–1912; the house of Prince S. A. Scherbatov in Novinski Boulevard in Moscow, 1911–1913; the village railway employees housing and the tuberculosis sanatorium at the Prozorovskaya station (now Kratovo) near Moscow, 1913–1923; central workshops of Kazan railway in Lyubertsy, 1916).
He became an Academician of Architecture in 1914, in 1917 he was elected as the Vice-President of the Academy of Arts. In 1923 he moved to Yerevan, heading the new construction effort in the republic. He was the chief engineer of the local Council of People's Commissars and was a member of the CEC of the Armenian SSR (1925–1936), sponsored the construction industry, designed the layouts of towns and villages including Leninakan (now Gyumri) (1925), Stepanakert (1926), Nor-Bayazet (now Gavar) and Ahta-ahpara (both in 1927), Echmiadzin (1927–1928), and others. Tamanian created the first general plan of the modern city of Yerevan which was approved in 1924. Tamanian's style was instrumental in transforming what was essentially a small provincial city into the modern Armenian capital, a major industrial and cultural center. Neoclassicism dominated his designs but Tamanian also implemented a national flavor (red linings of tuff, traditional decorative carvings on stone etc.). Among his most famous designs in Yerevan are the hydroelectric station (ERGES-1, 1926), the Opera and Ballet house named after A. Spendiarian (1926–1953), the Republic Square (1926–1941) and others. He also played a major role in the development of restoration projects of historical landmarks in the country, chairing the Committee for the Protection of Historic Monuments in Armenia.
Tamanian was married to Camilla Edwards, a member of the Benois family. Their sons Gevorg (Georgi) and Yulius Tamanian also became noted architects and continued their father's work.
Tamanian died in Yerevan on February 20, 1936 and is buried at the Komitas Pantheon which is located in the city center of Yerevan.
Buildings
Aghasi Khanjian’s mansion, Hrazdan River gorge – 1920s
Andrei Sakharov Square – 1924 – Nalbandyan St., Pushkin St., Vardanants St.
Freedom Square – Mashtots Av., Teryan St., Sayat-Nova St. – 1924-1939
Republic Square – 1926-1977
University Observatory - Student Park (between Abovyan and Teryan streets) – 1926
First Hydroelectric Power Plant – Left bank of Hrazdan River – 1926
State Medical University – Koryun St. – 1927-1955
Institute of Zoology and Veterinary – Nalbandyan St. – 1928
Hospital of Obstetrics and Gynecology – Abovyan St. – 1929
Institute of Physiotherapy – Abovyan St. – 1930, 1932, 1939
Engineering University - Teryan St. – 1932, 1935
University of Architecture and Construction – Teryan St. – 1935
Children's Hospital – Abovyan St. – 1939
National Academic Opera and Ballet Theatre – Freedom Square – 1933, 1940, 1953
Government House – Republic Square – 1941, 1952
Projects
Tamanian also designed the layout of many towns and cities in Armenia, such as:
Yerevan
Nor Arabkir town
Nubarashen, 1926
Ejmiatsin
Stepanakert, 1926
Notes
References
Armenian Soviet Encyclopedia, v. 1, 1974 Yerevan
Category:Ethnic Armenian architects
Category:Russian Armenians
Category:Imperial Russian architects
Category:Soviet architects
Category:People from Krasnodar
Category:1878 births
Category:1936 deaths
Category:Burials at the Komitas Pantheon
|
{
"pile_set_name": "Wikipedia (en)"
}
|
Changes
=======
(See :doc:`roadmap` for future plans.)
Release History
---------------
1.2.10
^^^^^^^^^^^^^^^^^^
* Improved MidiFile.play to avoid time drift. (Implemented by John
Belmonte, pull request #161.)
* New ``repr()`` format. (Original implementation by John Belmonte,
pull request #164.)
* bugfix: MIDO_DEFAULT_INPUT was misspelled in mido-ports causing it
to be show as 'not set' even though it was set. (Fix by Bernhard
Wagner, pull request #192.)
* Updated linke in docs to point to the new home github.com/mido/
(Fixed by Joshua Mayers, pull request #177.)
1.2.9 (2018-10-05)
^^^^^^^^^^^^^^^^^^
* rewrote ``Parser`` class around a MIDI tokenizer. Should lead to
slight speedup and much cleaner code.
* bugfix: `data` attribute was missing for `UnknownMetaMessage`
objects. This caused `AttributeError` when the messages were printed
or saved to a file. Also, the documentation incorrectly listed the
attribute as `_data` instead of `data`. (Reported by Groowy.)
* bugfix: UnknownMetaMessage encoding was broken causing crashes when
saving a file with unknown meta messages. (Reported by exeex, issue
#159.)
* bugfix: inputs and outputs were switched around when opening named
ports with PortMidi backend. (Reproduced by Predrag Radovic, issue
#108, fix by Juan Antonio Aldea, pull request #109.)
* bugfix: time signature meta messages had wrong default value of
2/4. The default value is now 4/4. (Fix by Sebastian Böck, pull
request #104.)
* bugfix: ``msg.copy()`` didn't handle generators for sysex
data. ``msg.copy(data=(i for i in range(3)))`` would give
``data=()`` instead of ``data=(0,1,2)``.
(The code should be refactored so this is handled by the same
function everywhere, such as in ``__init__()``, in ``copy()`` and in
``parser.feed()``.)
* bugfix: ``MultiPort._receive()`` ignored the ``block``
parameter. (Fix by Tom Swirly, pull request #135.)
* bugfix: sequencer number meta message was incorrectly limited to
range 0..255 instead of 0..65335. (Reported by muranyia, issue
#144.)
* now using Tox for testing. (Implemented by Chris Apple, pull request
#123.)
* Travis integration up by Carl Thomé and Chris Apple.
1.2.8 (2017-06-30)
^^^^^^^^^^^^^^^^^^
* bugfix: nonblocking receive was broken for RtMidi IO
ports. (Reported by Chris Apple, issue #99.)
* bugfix: ``IOPort.poll()`` would block if another thread was waiting
for ``receive()``. Fixed the problem by removing the lock, which
was never needed in the first place as the embedded input port does
its own locking.
1.2.7 (2017-05-31)
^^^^^^^^^^^^^^^^^^
* added max length when reading message from a MIDI file. This
prevents Python from running out of memory when reading a corrupt
file. Instead it will now raise an ``IOError`` with a descriptive
error message. (Implemented by Curtis Hawthorne, pull request #95.)
* removed dependency on ``python-rtmidi`` from tests. (Reported by
Josue Ortega, issue #96.)
1.2.6 (2017-05-04)
^^^^^^^^^^^^^^^^^^
* bugfix: Sending sysex with Pygame in Python 3 failed with
``"TypeError: array() argument 1 must be a unicode character, not
byte"``. (Reported by Harry Williamson.)
* now handles ``sequence_number`` and ``midi_port`` messages with 0
data bytes. These are incorrect but can occur in rare cases. See
``mido/midifiles/test_midifiles.py`` for more. (Reported by Gilthans
(issue #42) and hyst329 (issue #93)).
1.2.5 (2017-04-28)
^^^^^^^^^^^^^^^^^^
* bugfix: RtMidi backend ignored ``api`` argument. (Fix by Tom Feist,
pull request #91.)
1.2.4 (2017-03-19)
^^^^^^^^^^^^^^^^^^
* fixed outdated python-rtmidi install instructions. (Reported by
Christopher Arndt, issue #87.)
1.2.3 (2017-03-14)
^^^^^^^^^^^^^^^^^^
* typo and incorrect links in docs fixed by Michael (miketwo) (pull requests
#84 and #85).
1.2.2 (2017-03-14)
^^^^^^^^^^^^^^^^^^
* bugfix: sysex data was broken in string format encoding and decoding.
The data was encoded with spaces ('data=(1, 2, 3)') instead of as one word
('data=(1,2,3)').
* added some tests for string format.
* bugfix: ``BaseOutput.send()`` raised string instead of ``ValueError``.
1.2.1 (2017-03-10)
^^^^^^^^^^^^^^^^^^
* bugfix: IO port never received anything when used with RtMidi
backend. (Reported by dagargo, issue #83.)
This was caused by a very old bug introduced in 1.0.3. IOPort
mistakenly called the inner method ``self.input._receive()`` instead
of ``self.input.receive()``. This happens to work for ports that
override ``_receive()`` but not for the new RtMidi backend which
overrides ``receive()``. (The default implementation of
``_receive()`` just drops the message on the floor.)
* bugfix: PortMidi backend was broken due to missing import
(``ctypes.byref``). (Introduced in 1.2.0.)
1.2.0 (2017-03-07)
^^^^^^^^^^^^^^^^^^^
New implementation of messages and parser:
* completely reimplemented messages. The code is now much simpler,
clearer and easier to work with.
* new contructors ``Message.from_bytes()``, ``Message.from_hex()``,
``Message.from_str()``.
* new message attributes ``is_meta`` and ``is_realtime``.
Frozen (immutable) messages:
* added ``FrozenMessage`` and ``FrozenMetaMessage``. These are
immutable versions of ``Message`` and ``MetaMessage`` that are
hashable and thus can be used as dictionary keys. These are
available in ``mido.frozen``. (Requested by Jasper Lyons, issue
#36.)
RtMidi is now the default backend:
* switched default backend from PortMidi to RtMidi. RtMidi is easier
to install on most systems and better in every way.
If you want to stick to PortMidi you can either set the environment
variable ``$MIDO_BACKEND=mido.backends.portmidi`` or call
``mido.set_backend('mido.backends.portmidi')`` in your program.
* refactored the RtMidi backend to have a single ``Port`` class
instead of inheriting from base ports. It was getting hard to keep
track of it all. The code is now a lot easier to reason about.
* you can now pass ``client_name`` when opening RtMidi ports:
``open_output('Test', client_name='My Client')``. When
``client_name`` is passed the port will automatically be a virtual
port.
* with ``LINUX_ALSA`` you can now omit client name and ALSA
client/port number when opening ports, allowing you to do
``mido.open_output('TiMidity port 0')`` instead of
``mido.open_output('TiMidity:TiMidity port 0 128:0')``. (See RtMidi
backend docs for more.)
Changes to the port API:
* ports now have ``is_input`` and ``is_output`` attributes.
* new functions ``tick2second()`` and ``second2tick()``. (By Carl
Thomé, pull request #71.)
* added ``_locking`` attribute to ``BasePort``. You can set this to
``False`` in a subclass to do your own locking.
* ``_receive()`` is now allowed to return a messages. This makes the
API more consistent and makes it easier to implement thread safe
ports.
* ``pending()`` is gone. This had to be done to allow for the new
``_receive()`` behavior.
* improved MIDI file documentation. (Written by Carl Thomé.)
Other changes:
* bugfix: if a port inherited from both ``BaseInput`` and
``BaseOutput`` this would cause ``BasePort.__init__()`` to be called
twice, which means ``self._open()`` was also called twice. As a
workaround ``BasePort.__init__()`` will check if ``self.closed``
exists.
* added ``mido.version_info``.
* ``mido.set_backend()`` can now be called with ``load=True``.
* added ``multi_send()``.
* ``MIN_PITCHWHEEL``, ``MAX_PITCHWHEEL``, ``MIN_SONGPOS`` and
``MAX_SONGPOS`` are now available in the top level module (for
example ``mido.MIN_PITCHWHEEL``).
* added experimental new backend ``mido.backends.amidi``. This uses
the ALSA ``amidi`` command to send and receive messages, which makes
it very inefficient but possibly useful for sysex transfer.
* added new backend ``mido.backends.rtmidi_python`` (previously
available in the examples folder.) This uses the ``rtmidi-python``
package instead of ``python-rtmidi``. For now it lacks some of
features of the ``rtmidi`` backend, but can still be useful on
systems where ``python-rtmidi`` is not available. (Requested by
netchose, issue #55.)
1.1.24 (2017-02-16)
^^^^^^^^^^^^^^^^^^^
* bugfix: PortMidi backend was broken on macOS due to a typo. (Fix by
Sylvain Le Groux, pull request #81.)
1.1.23 (2017-01-31)
^^^^^^^^^^^^^^^^^^^
* bugfix: ``read_syx_file()`` didn't handle '\n' in text format file
causing it to crash. (Reported by Paul Forgey, issue #80.)
1.1.22 (2017-01-27)
^^^^^^^^^^^^^^^^^^^
* the bugfix in 1.1.20 broke blocking receive() for RtMidi. Reverting
the changes. This will need some more investigation.
1.1.21 (2017-01-26)
^^^^^^^^^^^^^^^^^^^
* bugfix: MidiFile save was broken in 1.1.20 due to a missing import.
1.1.20 (2017-01-26)
^^^^^^^^^^^^^^^^^^^
* bugfix: close() would sometimes hang for RtMidi input ports. (The
bug was introduced in 1.1.18 when the backend was rewritten to
support true blocking.)
* Numpy numbers can now be used for all message attributes. (Based on
implementation by Henry Mao, pull request #78.)
The code checks against numbers.Integral and numbers.Real (for the
time attribute) so values can be any subclass of these.
1.1.19 (2017-01-25)
^^^^^^^^^^^^^^^^^^^
* Pygame backend can now receive sysex messages. (Fix by Box of Stops.)
* bugfix: ``libportmidi.dylib`` was not found when using
MacPorts. (Fix by yam655, issue #77.)
* bugfix: ``SocketPort.__init()`` was not calling
``IOPort.__init__()`` which means it didn't get a
``self._lock``. (Fixed by K Lars Lohn, pull request #72. Also
reported by John J. Foerch, issue #79.)
* fixed typo in intro example (README and index.rst). Fix by Antonio
Ospite (pull request #70), James McDermott (pull request #73) and
Zdravko Bozakov (pull request #74).
* fixed typo in virtual ports example (Zdravko Bozakov, pull request #75.)
1.1.18 (2016-10-22)
^^^^^^^^^^^^^^^^^^^
* ``time`` is included in message comparison. ``msg1 == msg2`` will
now give the same result as ``str(msg1) == str(msg2)`` and
``repr(msg1)`` == ``repr(msg2)``.
This means you can now compare tracks wihout any trickery, for
example: ``mid1.tracks == mid2.tracks``.
If you need to leave out time the easiest was is ``msg1.bytes() ==
msg2.bytes()``.
This may in rare cases break code.
* bugfix: ``end_of_track`` messages in MIDI files were not handled correctly.
(Reported by Colin Raffel, issue #62).
* bugfix: ``merge_tracks()`` dropped messages after the first
``end_of_track`` message. The new implementation removes all
``end_of_track`` messages and adds one at the end, making sure to
adjust the delta times of the remaining messages.
* refactored MIDI file code.
* ``mido-play`` now has a new option ``-m / --print-messages`` which
prints messages as they are played back.
* renamed ``parser._parsed_messages`` to
``parser.messages``. ``BaseInput`` and ``SocketPort`` use it so it
should be public.
* ``Parser()`` now takes an option argument ``data`` which is passed
to ``feed()``.
1.1.17 (2016-10-06)
^^^^^^^^^^^^^^^^^^^
* RtMidi now supports true blocking ``receive()`` in Python 3. This
should result in better performance and lower latency. (Thanks to
Adam Roberts for helping research queue behavior. See issue #49 for
more.)
* bugfix: ``MidiTrack.copy()`` (Python 3 only) returned ``list``.
* fixed example ``queue_port.py`` which broke when locks where added.
1.1.16 (2016-09-27)
^^^^^^^^^^^^^^^^^^^
* bugfix: ``MidiTrack`` crashed instead of returning a message on
``track[index]``. Fix by Colin Raffel (pull request #61).
* added ``__add__()`` and ``__mul__()`` to ``MidiTrack`` so ``+`` and
``*`` will return tracks instead of lists.
* added ``poll()`` method to input ports as a shortcut for
``receive(block=False)``.
* added example ``rtmidi_python_backend.py``, a backend for the
rtmidi-python package (which is different from the python-rtmidi
backend that Mido currently uses.) This may at some point be added
to the package but for now it's in the examples folder. (Requested
by netchose, issue #55.)
* removed custom ``_import_module()``. Its only function was to make
import errors more informative by showing the full module path, such
as ``ImportError: mido.backends.rtmidi`` instead of just ``ImportError:
rtmidi``. Unfortunately it ended up masking import errors in the
backend module, causing confusion.
It turns ``importlib.import_module()`` can be called with the full
path, and on Python 3 it will also display the full path in the
``ImportError`` message.
1.1.15 (2016-08-24)
^^^^^^^^^^^^^^^^^^^
* Sending and receiving messages is now thread safe. (Initial
implementation by Adam Roberts.)
* Bugfix: ``PortServer`` called ``__init__`` from the wrong
class. (Fix by Nathan Hurst.)
* Changes to ``MidiTrack``:
* ``MidiTrack()`` now takes a as a parameter an iterable of
messages. Examples:
.. code-block:: python
MidiTrack(messages)
MidiTrack(port.iter_pending())
MidiTrack(msg for msg in some_generator)
* Slicing a ``MidiTrack`` returns a ``MidiTrack``. (It used to
return a ``list``.) Example:
.. code-block:: python
track[1:10]
* Added the ability to use file objects as well as filenames when reading,
writing and saving MIDI files. This allows you to create a MIDI file
dynamically, possibly *not* using mido, save it to an io.BytesIO, and
then play that in-memory file, without having to create an intermediate
external file. Of course the memory file (and/or the MidiFile) can still
be saved to an external file.
(Implemented by Brian O'Neill.)
* PortMidi backend now uses pm.lib.Pm_GetHostErrorText() to get host
error messages instead of just the generic "PortMidi: \`Host error\'".
(Implemented by Tom Manderson.)
Thanks to Richard Vogl and Tim Cook for reporting errors in the docs.
1.1.14 (2015-06-09)
^^^^^^^^^^^^^^^^^^^
* bugfix: merge_tracks() concatenated the tracks instead of merging
them. This caused tracks to be played back one by one. (Issue #28,
reported by Charles Gillingham.)
* added support for running status when writing MIDI files.
(Implemented by John Benediktsson.)
* rewrote the callback system in response to issues #23 and #25.
* there was no way to set a callback function if the port was opened
without one. (Issue#25, reported by Nils Werner.)
Callbacks can now be set and cleared at any time by either passing
one to ``open_input()`` or updating the ``callback`` attribute.
This causes some slight changes to the behavior of the port when
using callbacks. Previously if you opened the port with a callback
and then set ``port.callback = None`` the callback thread would keep
running but drop any incoming messages. If you do the same now the
callback thread will stop and the port will return normal
non-callback behavior. If you want the callback thread to drop
messages you can set ``port.callback = lambda message: None``.
Also, ``receive()`` no longer checks ``self.callback``. This was
inconsistent as it was the only method to do so. It also allows
ports that don't support callbacks to omit the ``callback``
attribute.
* bugfix: closing a port would sometimes cause a segfault when using
callbacks. (Issue #24, reported by Francesco Ceruti.)
* bugfix: Pygame ports were broken due to a faulty check for ``virtual=True``.
* now raises ``ValueError`` instead of ``IOError`` if you pass
``virtual`` or ``callback`` while opening a port and the backend
doesn't support them. (An unsupported argument is not an IO error.)
* fixed some errors in backend documentation. (Pull request #23 by
velolala.)
* ``MultiPort`` now has a ``yield_port`` argument just like
``multi_receive()``.
1.1.13 (2015-02-07)
^^^^^^^^^^^^^^^^^^^
* the PortMidi backend will now return refresh the port list when you
ask for port names are open a new port, which means you will see
devices that you plug in after loading the backend. (Due to
limitations in PortMidi the list will only be refreshed if there are
no open ports.)
* bugfix: ``tempo2bpm()`` was broken and returned the wrong value for
anything but 500000 microseconds per beat (120 BPM). (Reported and
fixed by Jorge Herrera, issue #21)
* bugfix: ``merge_tracks()`` didn't work with empty list of tracks.
* added proper keyword arguments and doc strings to open functions.
1.1.12 (2014-12-02)
^^^^^^^^^^^^^^^^^^^
* raises IOError if you try to open a virtual port with PortMidi or
Pygame. (They are not supported by these backends.)
* added ``merge_tracks()``.
* removed undocumented method ``MidiFile.get_messages()``.
(Replaced by ``merge_tracks(mid.tracks)``.)
* bugfix: ``receive()`` checked ``self.callback`` which didn't exist
for all ports, causing an ``AttributeError``.
1.1.11 (2014-10-15)
^^^^^^^^^^^^^^^^^^^
* added ``bpm2tempo()`` and ``tempo2bpm()``.
* fixed error in documentation (patch by Michael Silver).
* added notes about channel numbers to documentation (reported by
ludwig404 / leonh, issue #18).
1.1.10 (2014-10-09)
^^^^^^^^^^^^^^^^^^^
* bugfix: MidiFile.length was computer incorrectly.
* bugfix: tempo changes caused timing problems in MIDI file playback.
(Reported by Michelle Thompson.)
* mido-ports now prints port names in single ticks.
* MidiFile.__iter__() now yields end_of_track. This means playback
will end there instead of at the preceding message.
1.1.9 (2014-10-06)
^^^^^^^^^^^^^^^^^^
* bugfix: _compute_tick_time() was not renamed to
_compute_seconds_per_tick() everywhere.
* bugfix: sleep time in play() was sometimes negative.
1.1.8 (2014-09-29)
^^^^^^^^^^^^^^^^^^
* bugfix: timing in MIDI playback was broken from 1.1.7 on. Current
time was subtracted before time stamps were converted from ticks to
seconds, leading to absurdly large delta times. (Reported by Michelle
Thompson.)
* bugfix: ``read_syx_file()`` didn't handle empty file.
1.1.7 (2014-08-12)
^^^^^^^^^^^^^^^^^^
* some classes and functions have been moved to more accessible locations::
from mido import MidiFile, MidiTrack, MetaMessage
from mido.midifiles import MetaSpec, add_meta_spec
* you can now iterate over a MIDI file. This will generate all MIDI
messages in playback order. The ``time`` attribute of each message
is the number of seconds since the last message or the start of the
file. (Based on suggestion by trushkin in issue #16.)
* added get_sleep_time() to complement set_sleep_time().
* the Backend object no longer looks for the backend module exists on
startup, but will instead just import the module when you call one
of the ``open_*()`` or ``get_*()`` functions. This test didn't work
when the library was packaged in a zip file or executable.
This means that Mido can now be installed as Python egg and frozen
with tools like PyInstaller and py2exe. See "Freezing Mido Programs"
for more on this.
(Issue #17 reported by edauenhauer and issue #14 reported by
netchose.)
* switched to pytest for unit tests.
1.1.6 (2014-06-21)
^^^^^^^^^^^^^^^^^^
* bugfix: package didn't work with easy_install.
(Issue #14, reported by netchose.)
* bugfix: 100% memory consumption when calling blocking receive()
on a PortMidi input. (Issue #15, reported by Francesco Ceruti.)
* added wheel support: http://pythonwheels.com/
1.1.5 (2014-04-18)
^^^^^^^^^^^^^^^^^^
* removed the 'mode' attribute from key_signature messages. Minor keys
now have an 'm' appended, for example 'Cm'.
* bugfix: sysex was broken in MIDI files.
* bugfix: didn't handle MIDI files without track headers.
* bugfix: MIDI files didn't handle channel prefix > 15
* bugfix: MIDI files didn't handle SMPTE offset with frames > 29
1.1.4 (2014-10-04)
^^^^^^^^^^^^^^^^^^
* bugfix: files with key signatures Cb, Db and Gb failed due to faulty
error handling.
* bugfix: when reading some MIDI files Mido crashed with the message
"ValueError: attribute must be in range 0..255". The reason was that
Meta messages set running status, which caused the next statusless
message to be falsely interpreted as a meta message. (Reported by
Domino Marama).
* fixed a typo in MidiFile._read_track(). Sysex continuation should
work now.
* rewrote tests to make them more readable.
1.1.3 (2013-10-14)
^^^^^^^^^^^^^^^^^^
* messages are now copied on send. This allows the sender to modify the
message and send it to another port while the two ports receive their
own personal copies that they can modify without any side effects.
1.1.2 (2013-10-05)
^^^^^^^^^^^^^^^^^^
* bugfix: non-ASCII character caused trouble with installation when LC_ALL=C.
(Reported by Gene De Lisa)
* bugfix: used old exception handling syntax in rtmidi backend which
broke in 3.3
* fixed broken link in
1.1.1 (2013-10-04)
^^^^^^^^^^^^^^^^^^
* bugfix: mido.backends package was not included in distribution.
1.1.0 (2013-10-01)
^^^^^^^^^^^^^^^^^^
* added support for selectable backends (with MIDO_BACKEND) and
included python-rtmidi and pygame backends in the official library
(as mido.backend.rtmidi and mido.backend.pygame).
* added full support for MIDI files (read, write playback)
* added MIDI over TCP/IP (socket ports)
* added utility programs mido-play, mido-ports, mido-serve and mido-forward.
* added support for SMPTE time code quarter frames.
* port constructors and ``open_*()`` functions can now take keyword
arguments.
* output ports now have reset() and panic() methods.
* new environment variables MIDO_DEFAULT_INPUT, MIDO_DEFAULT_OUTPUT
and MIDO_DEFAULT_IOPORT. If these are set, the open_*() functions
will use them instead of the backend's default ports.
* added new meta ports MultiPort and EchoPort.
* added new examples and updated the old ones.
* format_as_string() now takes an include_time argument (defaults to True)
so you can leave out the time attribute.
* sleep time inside sockets can now be changed.
* Message() no longer accepts a status byte as its first argument. (This was
only meant to be used internally.)
* added callbacks for input ports (PortMidi and python-rtmidi)
* PortMidi and pygame input ports now actually block on the device
instead of polling and waiting.
* removed commas from repr() format of Message and MetaMessage to make
them more consistent with other classes.
1.0.4 (2013-08-15)
^^^^^^^^^^^^^^^^^^
* rewrote parser
1.0.3 (2013-07-12)
^^^^^^^^^^^^^^^^^^
* bugfix: __exit__() didn't close port.
* changed repr format of message to start with "message".
* removed support for undefined messages. (0xf4, 0xf5, 0xf7, 0xf9 and 0xfd.)
* default value of velocity is now 64 (0x40).
(This is the recommended default for devices that don't support velocity.)
1.0.2 (2013-07-31)
^^^^^^^^^^^^^^^^^^
* fixed some errors in the documentation.
1.0.1 (2013-07-31)
^^^^^^^^^^^^^^^^^^
* multi_receive() and multi_iter_pending() had wrong implementation.
They were supposed to yield only messages by default.
1.0.0 (2013-07-20)
^^^^^^^^^^^^^^^^^^
Initial release.
Basic functionality: messages, ports and parser.
|
{
"pile_set_name": "Github"
}
|
Installation
General for this release candidate: parallel installation LibreOffice release candidate builds always replace an old LibreOffice installation - unless: With this release candidate, you have to use the 'parallel installation' to install it alongside the stable LibreOffice, and not replace it. Please see here.
Linux deb and rpm : please, read detailed instructions for different distributions the Linux packages can be installed in parallel to LibreOffice 3.5, but not run simultaneously - documents will be opened in the version you've started first.
and :
Windows : If you notice undesirable interactions between LibreOffice and OpenOffice.org, please report this as a bug. LibreOffice windows installers are signed by The Document Foundation.
:
Help files
The Windows multi-language installer as well as the langpacks do only contain localized UI. By default, LibreOffice uses online help - if you need help files on your disk, please install the helppack for your language. If there is no helppack for your language (because help has not been translated to your language), then you can install and use the English helppack or check the online help in any available language.
ODF changes
In LibreOffice 3.6 a different encryption is enabled by default. Since version 3.4.5, LibreOffice is able to open those files. See the release notes page.
Starting with LibreOffice 3.6, there's more fine-grained control over ODF compatibility for legacy consumers, via a new ODF 1.2 compatibility mode. See the release notes page.
Reported Bugs
A list of annoying bugs still contained in this version is available from Bugzilla, the full list of reported bugs is here.
List of fixed bugs
Bugs fixed against 3.6.0 RC3 (never published)
tdf#51252 LO cannot start (reports runtime error with Visual C++ Runtime Library) [Stephan Bergmann] tdf#52393 FILEOPEN 3.5.x spreadsheet with wrong row height [Markus Mohrhard]
Bugs fixed against 3.6.0 RC2
|
{
"pile_set_name": "OpenWebText2"
}
|
fileFormatVersion: 2
guid: 222d3ab738ddda64284a4e37b238bce9
TextureImporter:
internalIDToNameTable: []
externalObjects: {}
serializedVersion: 10
mipmaps:
mipMapMode: 0
enableMipMap: 0
sRGBTexture: 1
linearTexture: 0
fadeOut: 0
borderMipMap: 0
mipMapsPreserveCoverage: 0
alphaTestReferenceValue: 0.5
mipMapFadeDistanceStart: 1
mipMapFadeDistanceEnd: 3
bumpmap:
convertToNormalMap: 0
externalNormalMap: 0
heightScale: 0.25
normalMapFilter: 0
isReadable: 0
streamingMipmaps: 0
streamingMipmapsPriority: 0
grayScaleToAlpha: 0
generateCubemap: 6
cubemapConvolution: 0
seamlessCubemap: 0
textureFormat: 1
maxTextureSize: 2048
textureSettings:
serializedVersion: 2
filterMode: -1
aniso: -1
mipBias: -100
wrapU: 1
wrapV: 1
wrapW: 1
nPOTScale: 0
lightmap: 0
compressionQuality: 50
spriteMode: 1
spriteExtrude: 1
spriteMeshType: 1
alignment: 0
spritePivot: {x: 0.5, y: 0.5}
spritePixelsToUnits: 100
spriteBorder: {x: 0, y: 0, z: 0, w: 0}
spriteGenerateFallbackPhysicsShape: 1
alphaUsage: 1
alphaIsTransparency: 1
spriteTessellationDetail: -1
textureType: 8
textureShape: 1
singleChannelComponent: 0
maxTextureSizeSet: 0
compressionQualitySet: 0
textureFormatSet: 0
platformSettings:
- serializedVersion: 3
buildTarget: DefaultTexturePlatform
maxTextureSize: 2048
resizeAlgorithm: 0
textureFormat: -1
textureCompression: 1
compressionQuality: 50
crunchedCompression: 0
allowsAlphaSplitting: 0
overridden: 0
androidETC2FallbackOverride: 0
forceMaximumCompressionQuality_BC6H_BC7: 0
spriteSheet:
serializedVersion: 2
sprites: []
outline: []
physicsShape: []
bones: []
spriteID: 5e97eb03825dee720800000000000000
internalID: 0
vertices: []
indices:
edges: []
weights: []
secondaryTextures: []
spritePackingTag:
pSDRemoveMatte: 0
pSDShowRemoveMatteOption: 0
userData:
assetBundleName:
assetBundleVariant:
|
{
"pile_set_name": "Github"
}
|
40 Chinese students from the School of Automobile and Mechanical Engineering, Changsha University of Science & Technology (CSUST) have used 3D printing to build a race car. The Chinese are pinning their hopes on 3D printing to boos their automotive and aerospace industries.
It’s been reported in a number of posts, news articles, and even on local television shows that two mysterious giant boxes have appeared in the San Francisco harbor next to Treasure Island and another one just like it is being constructed in the Portland Main harbor. The boxes are roughly four stories tall, 250 feet long, and 70 feet wide. They are made from cargo containers stacked on barges and, according to the reports, everyone is pretty sure the structures belong to Google.
When he was the god of code at iD Software, he would have Microsoft's DirectX developers begging him for his support. That was just 3D, now Carmack is going to spice up our reality and he is still the king of gaming.
Display technology hasn't kept up with the improvements in hardware graphics from the likes of companies like Nvidia. So, fully rendered 3D gaming experiences are not all they can be. Now, engineers at Nvidia want to make your display play ball with your graphics hardware to give you the best experience possible.
Chinese chip maker Allwinner has published a roadmap detailing its upcoming ARM-based processors, including the dual-core ARM Cortex-A7 chip for entry-level tables and the A80 octa-core SoC for higher-end devices.
It's code-named "Cinnamon," and it has no release date or intended price however, Amazon CEO Jeff Bezos likes to keep his hardware costs down. In that regard, we can expect him to enter into the fray against Apple TV at $99 and Roku at $50. I'll throw in Chromecast at $35 because, I like it better than the set-top box (STB) stuff.
This is a simple game made in 24 hours for the Microsoft Hack-a-Thon. The project uses an Arduino, Bluetooth module and Android phone. The project won first place in the hardware division and first overall. Check it out, it's pretty cool what these guys pulled off.
If Google starts to get really evil its redemption will come from having given us Chromecast. This $11 piece of hardware should, unless the world is insane, kill the attached computing display for ever. Because, we should never have to lug around a laptop, or set up a room with a projector or a TV for meetings, or even have to go through the nightmare that is Hulu Plus on Tivo Premier.
We decided to go old school when we saw this ranking for the best computer cases for airflow. So many memories. Good times. It made us nostalgic for the days when size mattered. When power mattered and you could roast a turkey in a high-end rig.
Teenage freshman at Stanford has a project that uses Google Glass to help people with autism to read another person's emotions. Autism is characterized by deficiencies in social interaction, emotional and non-verbal communication.
According to a report in Medical Daily:
Well, the Europeans, especially the Germans, are not taking the whole NSA thing lightly. They are not happy. But, real hackers claim it is all a publicity stunt and no one is going to be really safe. We are all doomed to being snooped.
Two of the largest ISPs in Germany are going to encrypt emails in response to German consumer concerns about US intelligence snooping:
If you count the promise of a 3 month subscription to Netflix then, maybe. The buzz on Chromecast is strong. At $11 it is pointless not to buy one or put your order in right now. Somewhere, at some cable company, an executive is falling and no one is there to hear him crash.
Yes, endoscopy devices are really useful. Less invasive than traditional surgical procedures, and with the addition of more things like 3D cameras, they will turn you inside and out. There's a lot of hidden financial booty for companies working their way up your booty.
|
{
"pile_set_name": "Pile-CC"
}
|
biggest value? (a) -0.3 (b) 64352 (c) -26 (d) -0.1
d
Which is the smallest value? (a) 1/3 (b) 2 (c) -38 (d) -30
c
Which is the second smallest value? (a) -13/67 (b) 42 (c) -0.1
c
What is the fifth biggest value in -1, 136, 2/13, 0.74, -2/3?
-1
What is the sixth smallest value in -6/419, -0.1, 1/3, 2/5, -0.3, -0.4?
2/5
Which is the second biggest value? (a) -2/19 (b) 1/4 (c) 69/2 (d) 0.4
d
What is the second biggest value in 6/71, 1.3, 3, -0.4, 5?
3
Which is the second smallest value? (a) -3 (b) 992 (c) 15/2 (d) 4
d
What is the biggest value in 2.434, -0.2, -348?
2.434
What is the fourth smallest value in 3, -5, -7, -119?
3
Which is the third smallest value? (a) 0 (b) 3 (c) 21946
c
What is the biggest value in 1029452, 4, -1?
1029452
Which is the third smallest value? (a) 2/7 (b) -0.05332 (c) -2
a
Which is the second biggest value? (a) 0.4 (b) -272 (c) 0.2
c
What is the third smallest value in 2/3, 1, -6.314?
1
What is the fourth biggest value in 2, -3, 2/187, 92/7?
-3
What is the smallest value in -0.2, -0.1, 27/11?
-0.2
What is the second biggest value in 3/7, -2, 3/5, 300, 1?
1
What is the smallest value in 89, 95, -4.7?
-4.7
Which is the fourth biggest value? (a) -3/8 (b) 0.4 (c) -4/565 (d) 4
a
What is the second smallest value in -2/5, 1/2, -89?
-2/5
Which is the sixth smallest value? (a) -1 (b) 7560 (c) 2/11 (d) -2/15 (e) 0 (f) 1/5
b
What is the fourth smallest value in 60.8, -1/4, -1, -7, 0?
0
What is the third smallest value in -3/68, -172, -0.13?
-3/68
Which is the fourth smallest value? (a) -37 (b) -3 (c) -0.322 (d) 3
d
Which is the fourth biggest value? (a) 5 (b) 4/63 (c) 0.2 (d) 69 (e) -5 (f) -1
b
What is the second biggest value in -6065, 2, 0.2, -4, -1/3?
0.2
What is the biggest value in -4, 1/30, 2, -3.6, -1/3?
2
What is the second smallest value in -5, 2262/7, -2/15?
-2/15
Which is the second biggest value? (a) 3/8 (b) -0.086 (c) -1/29 (d) -2
c
Which is the fourth smallest value? (a) 11 (b) 268 (c) 0.3 (d) -5
b
What is the second smallest value in 1, -2.78, 1/3, 86?
1/3
Which is the fifth smallest value? (a) 1 (b) 5 (c) 15 (d) 6/23 (e) -42
c
Which is the fifth smallest value? (a) -0.01 (b) -1/2 (c) 5 (d) 153 (e) 4
d
Which is the fourth smallest value? (a) -0.044 (b) 0.1 (c) 1/2 (d) 342/13
d
What is the smallest value in -4/13, -1/2, 1429?
-1/2
Which is the second biggest value? (a) 3 (b) 0.4 (c) -0.81
b
What is the third smallest value in 9/2, 0, -6/7, 58.57, -0.1?
0
What is the biggest value in -2, -0.4, 4540, 5, -2/11, -1?
4540
What is the third smallest value in -132, 125, -2?
125
Which is the fifth biggest value? (a) -30 (b) -6 (c) -0.1 (d) 2 (e) -2/3 (f) 1
b
What is the fifth smallest value in 0.04, 2/21, -5, -11, 4, -9?
2/21
What is the fifth biggest value in -0.4, -2824, -4, -3, 3/17?
-2824
Which is the fourth biggest value? (a) -3 (b) -0.3 (c) 4 (d) -3/7 (e) 3917/12
d
Which is the fourth smallest value? (a) 1 (b) -5/2 (c) 310889 (d) 0 (e) 2
e
Which is the biggest value? (a) 0.2 (b) 2996 (c) -6 (d) -0.3
b
Which is the biggest value? (a) 1/11 (b) -0.216237 (c) -1/2
a
Which is the fifth biggest value? (a) 0 (b) 8 (c) -7/2 (d) 10 (e) 0.2
c
Which is the smallest value? (a) -2/21 (b) -2 (c) 1/5 (d) -6/17 (e) 3 (f) -0.08
b
What is the third smallest value in 6/11, 4, 0.857?
4
What is the sixth smallest value in 1, -11/5, -1, 4/7, -1/4, 2433/5?
2433/5
Which is the third biggest value? (a) 314/5 (b) -0.11 (c) 0.2
b
What is the fourth smallest value in 1, -2/13, 5, -86182?
5
What is the second smallest value in -5, 2/3, 6, -0.3, 477?
-0.3
What is the smallest value in -7, 0.4, -47, -5/6, -0.1, -4?
-47
What is the smallest value in -20/49, -1286, 0.3?
-1286
What is the smallest value in -3, -42, -673, 0.05?
-673
Which is the third smallest value? (a) 12 (b) -0.2 (c) -2032
a
Which is the second biggest value? (a) 25.8 (b) 5 (c) -1
b
What is the third smallest value in -448, -3, -22, -1/6?
-3
What is the second smallest value in 11/5, -101, -0.2, 4, 0.4?
-0.2
Which is the fourth smallest value? (a) -2 (b) -25 (c) 3/235 (d) 1
d
What is the third smallest value in -2, 38338, 5?
38338
What is the fifth biggest value in -2, -10, 0.4, 1, -5/4?
-10
Which is the smallest value? (a) -2/5 (b) 0 (c) 3 (d) 6/19 (e) 0.08
a
Which is the third smallest value? (a) -43 (b) 0 (c) -0.4 (d) -3 (e) 14/25
c
Which is the second biggest value? (a) -891 (b) -2 (c) 8 (d) 2/7
d
What is the second smallest value in 0.4, -0.399, -7/2, 10?
-0.399
Which is the second smallest value? (a) -54793 (b) -2 (c) -2/3
b
What is the smallest value in -0.096, 60, -19, 2/3?
-19
Which is the second biggest value? (a) -4 (b) -23 (c) 4.2
a
Which is the second biggest value? (a) -12 (b) 0.4 (c) 1018 (d) 2/11 (e) 0.03
b
Which is the third smallest value? (a) -1 (b) -17475 (c) -89
a
What is the third biggest value in 0.2, 2/19, 1/4, 4, -0.2?
0.2
Which is the third smallest value? (a) -0.2 (b) 3 (c) -5 (d) 32 (e) 4/15 (f) -0.1
f
Which is the third smallest value? (a) -5 (b) 1 (c) -1.1 (d) 7
b
Which is the smallest value? (a) 1/11 (b) -4/2475 (c) 1.5
b
What is the smallest value in 14, -6, 77, -2/15, -0.4?
-6
What is the second biggest value in 29/13, 17, -1?
29/13
What is the third smallest value in -0.053, -5, -1.6, -13?
-1.6
What is the second biggest value in -60, 44, 4/5?
4/5
What is the third biggest value in 0, 5, 2421/5, -0.6?
0
What is the biggest value in -8.1, -85, -0.07?
-0.07
What is the fourth smallest value in 1/2, 16, 12.4, 2, 0.2?
12.4
Which is the second smallest value? (a) 11 (b) -6/11 (c) 2 (d) 252 (e) -1
b
Which is the fifth biggest value? (a) 0.06 (b) 1/7 (c) 5 (d) -63 (e) -0.2
d
What is the smallest value in -0.1401, -2, -0.5?
-2
What is the third biggest value in -2553, 0.098, -1?
-2553
What is the fourth biggest value in 0.5, 70.1, 0.066, 3?
0.066
Which is the smallest value? (a) 194 (b) -0.04 (c) -16
c
What is the smallest value in 2/19, 4, 5, 0.020561, 2?
0.020561
Which is the third smallest value? (a) 2 (b) 1/6 (c) -3 (d) 0.26 (e) 0.01
b
What is the smallest value in -2/5383, -1/8, -4?
-4
What is the fourth biggest value in 2/41, -3975, 2, -1/2?
-3975
What is the fourth biggest value in 3/8, -16, -54/5, 5, -1?
-54/5
Which is the third biggest value? (a) -3 (b) -4 (c) -5 (d) 3 (e) -1207 (f) -0.1
a
What is the third biggest value in -15, 0.05, 3, -2, -103, 5?
0.05
Which is the second smallest value? (a) 31 (b) -0.5 (c) -17/3 (d) 2
b
Which is the second smallest value? (a) -2/15 (b) 0 (c) 0.37 (d) -224
a
What is the third smallest value in -2/321, 0.5, 2.2?
2.2
Which is the fourth smallest value? (a) 85 (b) -4 (c) 3 (d) 0.2 (e) -0.3 (f) -0.4
d
Which is the fourth smallest value? (a) 4 (b) -6 (c) 29/4 (d) -5 (e) -0.16 (f) -1/4
e
What is the second biggest value in 3, 1, 109, -0.4, -5, -1?
3
Which is the third smallest value? (a) 8 (b) 32 (c) -1980
b
Which is the smallest value? (a) 1.7 (b) 0.04 (c) -22.71
c
Which is the biggest value? (a) 1/9 (b) 0.004 (c) 107 (d) -2/5 (e) 2
c
Which is the second smallest value? (a) 12/11 (b) 4 (c) 22/3 (d) -4
a
What is the third biggest value in -466, -9, -3/2, -3/5?
-9
What is the fourth biggest value in -0.3, 23, -2/17, 2/13, -1, 0.4?
-2/17
Which is the biggest value? (a) -105568 (b) -9 (c) 1/2
c
Which is the third smallest value? (a) -1.5 (b) 13.6 (c) -4 (d) 0
d
What is the biggest value in 9.9, 0, 2/3, 1/12, 4, 0.02?
9.9
What is the smallest value in -1, 125.3, -282?
-282
Which is the fifth biggest value? (a) -3/124 (b) -4 (c) 0.06 (d) -1 (e) 0.03
b
Which is the smallest value? (a) 0 (b) -268 (c) 2/25
b
Which is the fifth biggest value? (a) 0 (b) -7 (c) 2/15 (d) 1/33 (e) -1
b
What is the smallest value in -11, -1/6, -84?
-84
Which is the third smallest value? (a) 2560/3 (b) 3 (c) 0.2 (d) 1/2
b
Which is the sixth biggest value? (a) -4 (b) -1 (c) -2 (d) 3845 (e) 4 (f) 2
a
Which is the biggest value? (a) -1 (b) 276 (c) 2/23 (d) 1 (e) 0.5
b
What is the second biggest value in -3, -6, 0.1, 1, 25/4?
1
What is the fourth smallest value in 2.5, 5, -2, -0.05?
5
What is the
|
{
"pile_set_name": "DM Mathematics"
}
|
// ==========================================================================
// Squidex Headless CMS
// ==========================================================================
// Copyright (c) Squidex UG (haftungsbeschraenkt)
// All rights reserved. Licensed under the MIT license.
// ==========================================================================
using System.Collections.Generic;
namespace Squidex.Infrastructure.Migrations
{
public interface IMigrationPath
{
(int Version, IEnumerable<IMigration>? Migrations) GetNext(int version);
}
}
|
{
"pile_set_name": "Github"
}
|
Automated polysomnogram artifact compensation using the generalized singular value decomposition algorithm.
Manual/visual polysomnogram (psg) analysis is a standard and commonly implemented procedure utilized in the diagnosis and treatment of sleep related human pathologies. Current technological trends in psg analysis focus upon translating manual psg analysis into automated/computerized approaches. A necessary first step in establishing efficient automated human sleep analysis systems is the development of reliable pre-processing tools to discriminate between outlier/artifact instances and data of interest. This paper investigates the application of an automated approach, using the generalized singular value decomposition algorithm, to compensate for specific psg artifacts.
|
{
"pile_set_name": "PubMed Abstracts"
}
|
// Code generated by linux/mkall.go generatePtracePair(mipsle, mips64le). DO NOT EDIT.
// +build linux
// +build mipsle mips64le
package unix
import "unsafe"
// PtraceRegsMipsle is the registers used by mipsle binaries.
type PtraceRegsMipsle struct {
Regs [32]uint64
Lo uint64
Hi uint64
Epc uint64
Badvaddr uint64
Status uint64
Cause uint64
}
// PtraceGetRegsMipsle fetches the registers used by mipsle binaries.
func PtraceGetRegsMipsle(pid int, regsout *PtraceRegsMipsle) error {
return ptrace(PTRACE_GETREGS, pid, 0, uintptr(unsafe.Pointer(regsout)))
}
// PtraceSetRegsMipsle sets the registers used by mipsle binaries.
func PtraceSetRegsMipsle(pid int, regs *PtraceRegsMipsle) error {
return ptrace(PTRACE_SETREGS, pid, 0, uintptr(unsafe.Pointer(regs)))
}
// PtraceRegsMips64le is the registers used by mips64le binaries.
type PtraceRegsMips64le struct {
Regs [32]uint64
Lo uint64
Hi uint64
Epc uint64
Badvaddr uint64
Status uint64
Cause uint64
}
// PtraceGetRegsMips64le fetches the registers used by mips64le binaries.
func PtraceGetRegsMips64le(pid int, regsout *PtraceRegsMips64le) error {
return ptrace(PTRACE_GETREGS, pid, 0, uintptr(unsafe.Pointer(regsout)))
}
// PtraceSetRegsMips64le sets the registers used by mips64le binaries.
func PtraceSetRegsMips64le(pid int, regs *PtraceRegsMips64le) error {
return ptrace(PTRACE_SETREGS, pid, 0, uintptr(unsafe.Pointer(regs)))
}
|
{
"pile_set_name": "Github"
}
|
Q:
Could you create a game for an older system (say, SNES) and sell it with an emulator as well as the game?
I was looking into development for the SNES in assembly, as programming in assembly is my hobby. I then had the thought: what if I could sell my native SNES games for modern use (on steam, bundled with an emulator for example)?
A:
Yes there should be nothing illegal about emulation in itself (any virtual machines such as Java VM would similarly be illegal, if unsure ask a lawyer) and in this instance the SNES has no BIOS so that isn't an issue either but you'll need to license the rights to the emulator (if it does not permit commercial use freely already) or write the emulator yourself.
And you'll likely have to add some custom features to make the emulator and emulated game more user-friendly for the computer user experience, for example:
Auto-boot your game with the emulator locked to your game.
Allow the game to give achievements?
Cloud saves?
It certainly has been done before with other platforms. For example Castlevania: Symphony of the Night for XBox 360, and classic games released on Steam already use bundled emulators such as those by Sega.
|
{
"pile_set_name": "StackExchange"
}
|
Q:
workflow task summary throwing error specified cast is not valid using spmetal layer
I have created share point data access layer with spmetal, everything is works fine but when I try to query with task summary list through SPMETAL it throws error I tried several techniques to cast , directly use this Iqueryable list but as I try to access it, "it throws error specified cast is not valid"
Any help or clue why is throwing this error
A:
Its solved by changing the types of event type to string and duration field with double .
that error was produced by SPMETAL wrong mapping while generating the layer form SharePoint.
|
{
"pile_set_name": "StackExchange"
}
|
// Copyright (c) Microsoft Corporation. All rights reserved.
// Licensed under the MIT License.
using Microsoft.Bot.Builder;
namespace Microsoft.Bot.Builder.AI.LuisV3.Tests
{
public class TelemetryConvertResult : IRecognizerConvert
{
public TelemetryConvertResult()
{
}
public void Convert(dynamic @dynamic)
{
}
}
}
|
{
"pile_set_name": "Github"
}
|
Creswell Crags
Creswell Crags is an enclosed limestone gorge on the border between Derbyshire and Nottinghamshire, England, near the villages of Creswell and Whitwell. The cliffs in the ravine contain several caves that were occupied during the last ice age, between around 43,000 and 10,000 years ago. Its caves contain the northernmost cave art in Europe. The evidence of occupation found in the rich series of sediments that accumulated over many thousands of years is regarded as internationally unique in demonstrating how prehistoric people managed to live at the extreme northernmost limits of their territory during the Late Pleistocene period.
The caves contain occupation layers with evidence of flint tools from the Mousterian, proto-Solutrean, Creswellian and Maglemosian cultures. They were seasonally occupied by nomadic groups of people during the Upper Palaeolithic and Mesolithic periods. Evidence of Neolithic, Bronze Age, Roman and post-medieval activity has also been found there. There is evidence of Neanderthal occupation 50,000–60,000 years ago, a brief Gravettian occupation around 32,000 years ago and use of all the main caves during the Magdalenian around 14,000 years ago. The site is open to the public and has a visitor centre with a small museum of objects associated with the caves, including a stuffed cave hyena.
As a result of its unique features, Creswell Crags has been designated as a Site of Special Scientific Interest (SSSI). It has also been put forward as a potential World Heritage Site.
In 2006–07, the B6042 road was re-routed from its path through the gorge, by approximately to the north, to minimise traffic impact on the site.
Neanderthal and Upper Palaeolithic occupation
The gorge has been visited by Neanderthals, and people from the Gravettian and Magdalenian periods.
Caves
The most occupied caves were:
Mother Grundy's Parlour, which has produced numerous flint tools and split bones and was occupied until Mesolithic times.
Robin Hood's Cave, the location of a bone engraved with a horse's head and evidence that its occupants hunted and trapped woolly rhinoceros and Arctic hare.
The Pin Hole, the location of the Pinhole Cave Man, a human figure engraved on bone and discovered in the 1920s, and an ivory pin with etched lines.
Church Hole, with more than 80 engravings on its walls and occupied intermittently until Roman times.
Finds
A bone engraved with a horse's head and other worked bone items along with the remains of a variety of prehistoric animals have been found in excavations since 1876, including hyenas and hippopotami. The "Ochre Horse" was found on 29 June 1876 at the back of the western chamber in the Robin Hood Cave.
In 2003, the Ochre Horse was estimated to be between 11,000 and 13,000 years old.
Cave art
In April 2003, engravings and bas-reliefs were found on the walls and ceilings of some of the caves, an important find as it had previously been thought that no British cave art existed. The discoveries, made by Paul Bahn, Sergio Rippoll and Paul Pettitt, included an animal figure at first thought to be an ibex but later identified as a stag. Later finds included carvings on the ceiling of Church Hole Cave, the rarity of which made the site one of international importance.
To this day the finds at Creswell Crags represent the most northerly finds in Europe. Their subject matter includes representations of animals including bison and, arguably, several different bird species. Some workers, however, consider that the "bird" figures are more likely to be female anthropomorphs. The engravers seem to have made use of the naturally uneven cave surface in their carvings and it is likely that they relied on the early-morning sunlight entering the caves to illuminate the art.
Thin layers of calcium carbonate flowstone overlaying some of the engravings were dated using the uranium-series disequilibrium method, which showed the oldest of these flowstones to have formed at least 12,800 years ago. This provides a minimum age for the underlying engraving. The scientists and archaeologists concluded that it was most likely the engravings were contemporary with evidence for occupation at the site during the late glacial interstadial around 13,000–15,000 years ago. Most of the engravings are found in Church Hole Cave on the Nottinghamshire side of the gorge. Since this discovery, however, an engraved reindeer from a cave on the Gower peninsula has yielded two minimum dates (through uranium-series dating) of 12,572 years BP and 14,505 years BP.
Not all of the figures identified as prehistoric art are in fact human made. An example given by archaeologists Paul Bahn and Paul Pettitt is the 'horse-head', Which they say is ""highly visible and resembles a heavily maned horse-head... lacks any trace of work: it is a combination of erosion, black stains for the head, and natural burrow cast reliefs for the mane." Others are a 'bison-head' which they think may be natural and a 'bear' image which "lacks any evidence of human work." Notwithstanding they believe that more figures may be discovered in the future.
The site was the subject of the BBC Radio 4 documentaries Unearthing Mysteries, Nature and Drawings on the Wall, and featured in the 2005 BBC Two television programme Seven Natural Wonders, as one of the wonders of the Midlands. In the Drawings on the Wall (Episode 1) Dr Paul Pettitt was interviewed about the so-called 'naked ladies' engravings in Church Hole Cave.
World Heritage Site nomination
Creswell Crags first applied for World Heritage Site status in 1986, but was unsuccessful. Since then further research and development has been carried out and, in 2011, it was again put forward for consideration. In 2012 it was added to the United Kingdom's 'tentative list' – an essential prerequisite to formal nomination, evaluation and potential inscription as a World Heritage Site. The Tentative List identifies the universal outstanding value of Creswell Crags as being:The outstanding landscape of a narrow limestone gorge containing a complex of caves having long-intact palaeoenvironmental cave and gorge sediment sequences, containing rich cultural archaeological remains as well as diverse animal bone, plant macro- and micro-fossil assemblages
In situ Palaeolithic rock art on the walls and ceilings of caves, dated directly to 13,000 years ago, providing direct cultural associations with Late Magdalenian human groups operating at extreme northern latitudes
In addition, Creswell Crags' significance has been enhanced by the discovery of a number of pieces of portable art made of engraved bone – the UK's only known figurative Ice Age art – as well as assemblages of bone, stone and ivory tools.
See also
William Boyd Dawkins
Hamburg culture
Ahrensburg culture
Palaeolithic art
Swanscombe
References
Further reading
Bahn, P. "The Cresswell Caves Rock Art", Appendix VII in: Beckensall, S., (2009), Prehistoric Rock Art in Britain, Stroud, Amberley Publishing, .
A. W. G. Pike, M. Gilmour, P. Pettitt, R. Jacobi, S. Ripoll, P. Bahn and F. Muñoz (2005) "Verification of the age of the Palaeolithic rock art at Creswell," Journal of Archaeological Science 32, 1649–1655.
External links
Creswell Crags website
BBC News article on the cave art
Listen to a BBC Radio 4 Programme – Unearthing Mysteries
Listen to a BBC Radio 4 Programme – Nature, The Animal Image
Category:Archaeological sites in Derbyshire
Category:Caves of Derbyshire
Category:Sites of Special Scientific Interest in Derbyshire
Category:Sites of Special Scientific Interest in Nottinghamshire
Category:Escarpments of England
Category:Archaeological sites in England
Category:2003 archaeological discoveries
Category:Neanderthal sites
Category:Scheduled Ancient Monuments in Derbyshire
Category:Scheduled Ancient Monuments in Nottinghamshire
Category:Paleoanthropological sites
Category:Caves containing pictograms
|
{
"pile_set_name": "Wikipedia (en)"
}
|
SafeSport
SafeSport offers training to educate and inform coaches, sport club leaders and parents about misconduct in sport and measures you can take to protect athletes and your organization. Learning how an offender operates and understanding the six types of misconduct are critical steps in developing effective policies and procedures for your sport.
All CVYFA Coaches, Referees, and Volunteers are encouraged to take the FREE SafeSport Online Course (coming soon).
Parents are also encouraged to take the FREE SafeSport Online Course (coming soon).
|
{
"pile_set_name": "Pile-CC"
}
|
Frank Lee
Frank Lee may refer to:
Frank Lee (British politician) (1867–1941), British Labour Party politician
Frank Lee (cricketer) (1905–1982), English cricketer
Frank H. Lee (1873–1952), U.S. Representative from Missouri
Frank Lee (rugby league), rugby league footballer who played in the 1900s and 1910s for England, Lancashire, St Helens RLFC, and York
Frank Godbould Lee (1903–1971), British public servant and Master of Corpus Christi College, Cambridge
Frank Lee, the stage name for Lee Tung Foo
See also
Francis Lee (disambiguation)
Frank Lees (1931–1999), English chemical engineer
|
{
"pile_set_name": "Wikipedia (en)"
}
|
A Virginia high school boy who spent nine days in the hospital after a brutal antigay attack is being charged with assault because he reportedly snapped and made the mistake of throwing the first punch.
Richmond’s Channel 12 News reported that Eric Martin was attacked by at least four other boys who left him with a serious concussion and multiple broken bones.
ADVERTISEMENT
“A head injury,” noted Eric’s mother Mary Martin. “A broken hand. That’s not just a fight. That’s a beating. That’s a vicious beating.”
Mary Martin said that the gang assault was the culmination of a prolonged campaign of bullying, in which Martin’s tormentors regularly showered him with antigay slurs and epithets and catcalled him as they shadowed him through the halls of Highland Springs High School in Henrico.
The irate mom said that her son may have thrown the first punch, but school officials had consistently turned a blind eye to Eric’s constant abuse at the hands of certain boys at school.
Family advocate Tammy Mottola is working with the school district on behalf of the Martins.
“It’s always the perpetrators that get away with the crime,” she said. “When the victims have finally had enough, after being verbally attacked and bullied for years and they snap…they are the ones that are penalized.”
ADVERTISEMENT
Eric Martin was barred from returning to school pending a violence assessment and a signed confession that he threatened the school, which Eric claims he never did and which school officials admit they never heard firsthand.
Motola and Mary Martin have made initial legal moves toward a possible suit against the school.
“I feel like we have to set the tone,” said Motola to Channel 12. “We are not going to be bullied.”
ADVERTISEMENT
Eric has been allowed to attend a new school in the district, but is still facing two assault charges from the Henrico Police Department.
Mary Martin said that to bolster her son’s spirits, she has established a Letters to Eric program, where supporters can write to him at P.O. Box 993, Sandston, Va. 23150.
ADVERTISEMENT
Motola said, “It’s just to encourage Eric to know that he is loved by many and that he is supported by literally thousands of people.”
Watch video about this story, embedded below via Richmond’s Channel 12 News:
NBC12 – Richmond, VA News
|
{
"pile_set_name": "OpenWebText2"
}
|
President Trump’s Handshake With PM Justin Trudeau Went Viral
On February 23th, 2016, President Trump met Canada’s Prime Minister, Justin Trudeau, for the first time. And while we’re not going into detail about what came out of their meeting, people around the Internet are praising the PM for not giving into Trump’s ‘handshake’. Don’t know what that means? Take a look at the following imgur album:
You’ll notice that Trump always has a firm grip and at one point will pull the other person toward him an in act (probably) to assert his dominance. In Trudeau’s case, it looks like he came prepared. Just watch:
Now, let’s break it down. There were to things that worked for Trudeau. Firstly, he uses his left arm to brace himself for the pull. It’s a nice way of keeping the handshake in neutral territory. Secondly, Trudeau keeps his arm at a 90 degree angle and close to his body in order to maintain leverage. It would’ve been easier to get pulled if his arm was extended.
Arin calls Boston, Massachusetts, home and is a huge Red Sox fan. When she’s not enjoying a hot dog at Fenway Park, she’ll be out in nature with her camera. The one thing she can’t live without though, is the Internet. Always one to have a meme in handy, Arin is no slouch when it comes to entertainment and viral videos.
|
{
"pile_set_name": "Pile-CC"
}
|
Market curious about current GFC-like challenges, report finds
New data shows that Australia’s housing market is experiencing its most challenging period since the GFC, with, unsurprisingly, Sydney and Melbourne taking the most hits.
CoreLogic’s hedonic home value index for November is reporting that Australia recorded a dwelling value decline of 0.7 of a percentage point, down by 4.2 per cent since peaking in October last year.
GFC
According to CoreLogic’s head of research, Tim Lawless, the last time national values were down by this much was during 2010–2012, when the annual rate of decline fell by 4.3 per cent.
“Previous to that, the national market was falling at a faster rate during the GFC. However, that downturn was brought to a halt by federal government stimulus including lower interest rates, a boost to the first home buyer grant, [and] cash handouts,” Mr Lawless told REB sister publication Smart Property Investment.
Advertisement
Advertisement
The largest declines were recorded in Sydney and Melbourne, which fell by 1.4 per cent and 1 per cent, respectively. Mr Lawless said that these cities were mostly responsible for the overall conditions.
“The downwards pressure on national dwelling values is largely confined to Sydney and Melbourne which, together, comprise approximately 55 per cent of the value of Australia’s housing asset class,” Mr Lawless said.
Sydney’s housing market recorded a decline of 9.5 per cent, 0.1 of a percentage point away from the previous peak-to-tough decline of 9.6 per cent, set during the time period between 1989 and 1991. This new decline, Mr Lawless said, is expected to drop further in 2019.
“Considering the momentum in the market, Sydney will almost certainly surpass this previous record decline, and we expect dwelling values to continue their downwards trajectory through 2019,” the head of research told Smart Property Investment.
Melbourne’s house market was also down, albeit not as severely as Sydney, at 5.8 per cent, with Mr Lawless also seeing conditions to weaken through 2019.
The reasoning for Sydney and Melbourne’s conditions, Mr Lawless said, was due to the tightening of finance in these areas which see high levels of investment demand, housing affordably issues, lower rental yields, more supply and a reduction in foreign buying activity.
More premium houses were also dragging the market down, Mr Lawless said. In Sydney, the most expensive quarter of the market saw a value drop of 9.3 per cent over the last year and the least expensive quarter of the market also saw a decline of 5.7 per cent.
Meanwhile, Melbourne saw a larger decline in the most expensive quarter with a drop of 9.9 per cent, while the least expensive quarter rose by 1.7 per cent.
The impact of Sydney and Melbourne could also be felt in subregions, as the weakest capital city subregions were found to be centred across Sydney and Melbourne, according to CoreLogic data, with the largest fall for a subregion being Sydney’s Ryde at 14.4 per cent since its peak in August last year.
Curious
With these top markets set to soften, it was no doubt that the market would be curious about how far values could fall, according to Mr Lawless.
“If we see values decline by 15 per cent in Sydney, they will be back to levels last seen in June 2015. Considering this, most investors who purchased before this date should remain in a positive position,” the head of research said.
“The big question is how far will dwelling values fall. Considering this downturn is very much being fuelled by credit regulation and availability of finance, it really comes back to how long these tight credit conditions persist.
“No doubt policymakers will be looking for a reduction in household debt levels and a return to entrenched high-quality lending standards.”
Sample
However, just because values are down in Sydney and Melbourne, it does not represent the entire market, Mr Lawless said.
“Conditions across the Australian housing market are increasingly diverse. Dwelling values are trending higher across five of the eight capital cities, albeit at a relatively slow pace compared with the previous surge in Sydney and Melbourne,” Mr Lawless said.
“Hobart and regional Tasmania continue to be the standouts for capital gain, with values up by 1.7 per cent across both regions over the past three months.”
Meanwhile, the strongest subregions were found in Hobart, Canberra and select areas of Brisbane and Adelaide. The strongest of these, Hobart, saw dwelling values rise by 9.3 per cent, while Canberra rose by 4.1 per cent.
Other strong areas saw rises of 3.5 per cent or less, which indicated to CoreLogic that any growth is modest.
Upward
Rents saw a slight movement upward in November, rising by 0.7 of a percentage point Australia-wide. In Australia’s capital cities, they were up by 0.4 of a percentage point, while regional rental conditions were much more favourable as they were up by 2 per cent.
Darwin was considered by CoreLogic to have the weakest rental conditions of all the capital cities, with rents down by 5.1 per cent compared to this time last year, followed by Sydney’s drop of 2.7 per cent. Meanwhile, the largest gains were in Canberra with rents rising by 6.9 per cent, and then Hobart by 6.1 per cent.
Mr Lawless explained that when the housing market turns, there needs to be a change in interest rate or economic conditions, but the market in this instance has been mainly affected by credit policies and finance availability.
“Despite the recent out-of-cycle 15 basis point rise in mortgage rates, the cost of debt remains at the lowest level since the 1960s,” Mr Lawless said.
“From an economic perspective, GDP growth is tracking above expectations, unemployment is tracking well below average and at the lowest level since 2012, population growth remains strong (albeit showing signs of slowing) and wages growth is slowly lifting from a low base. These factors should help to support housing demand and offset a more material decline in dwelling values.
“We expect headwinds from tighter credit will continue for the foreseeable future and will continue to temper housing market activity. This will be especially the case for those markets where investment demand is most concentrated, and where housing costs are high relative to incomes, such as Sydney and Melbourne.”
|
{
"pile_set_name": "Pile-CC"
}
|
A blog by Regional Leader for the North East and Midlands Elim Churches UK
Navigation
Post navigation
We hide our rights
Acts 16:37 But Paul said to the officers: “They beat us publicly without a trial, even though we are Roman citizens, and threw us into prison. And now do they want to get rid of us quietly? No! Let them come themselves and escort us out.”
Paul had become a Roman citizen by birth. Although he was born into a Jewish family because this was in the city of Tarsus, a province of Cilicia, it granted him true citizenship because of its status by Rome. There were only 2 other ways you could gain citizenship: by giving a huge amount of money or by military service.
As a citizen Paul had the right to vote, the right to make legal contracts, have property and be immune from some tax duties. He also had the right to insist on a legal trial if he ever needed it and he could even appeal to Caesar himself.
Paul was protected because he could never be tortured or flogged and never receive the death penalty unless it could be proven he was guilty of treason. As a citizen he would probably carry around with him a birth certificate or a certificate of citizenship. Later on chapter 22 we will read how Paul would use his citizenship to prevent him being flogged in Jerusalem.
So why am I reminding you of this?
It is because Paul did not declare his citizenship until after they had been severely flogged and thrown into the prison! He kept it hidden until now, until he was going to be released.
He kept silent and surrendered his Roman right. By doing so he shared in the sufferings of Christ, he was beaten like his Lord and Saviour, he was carrying his own cross.
We have a citizenship in heaven. We have been born again, a new birth, new creations in Christ Jesus. We have been given power, rights and authority.
There are times when we will choose to move in those elements and we will know the protection and the power of God against circumstances that are unbearable.
But there are days when we need to surrender our rights. There are times when we know it is the right thing to do, when our immunity from suffering is waived, when we become dust again and we know the pain of living.
It is then as a citizen of heaven coming under the attack of the enemy that we truly know the fellowship of sharing in the sufferings of Christ, we know Him, we are on purpose, in destiny for something perhaps we do not yet know, but it is well with our soul because we know Him in a way we have never known.
|
{
"pile_set_name": "Pile-CC"
}
|
This is getting ridiculous people. Tebow is not any different from you or me except that he knows how to play football – quarterbacking aside. There is no doubt that he is an outstanding athlete. That’s why the NY Jets wanted him. His particular skill set and athletic ability open up possibilities on the field including the wildcat formation.
How unusual is it that the other sports mania in recent times just recently occurred in NYC when Jeremy Lin emerged as something of a cult hero after catapulting to stardom as the New York Knicks point guard. Linsanity swept the city like few events before it. What do Tebow and Lin have in common? They both have openly discussed their evangelical faith.
Personally, I don’t get it. What is the big deal that he bows down after a touchdown pass and gives thanks? I’ve seen players pray on the sideline. There are prayer gatherings after a game to give thanks. It must be that Tebow speaks openly about his faith. Perhaps some people are afraid of it. Their sons and daughters might seek to be like Tebow. I can think of worse role models for young people to emulate.
Critics have pointed out that God does not take sides in football games and to inject God’s name as a form of thanks after throwing a touchdown pass minimizes what God really stands for – it is with the poor; with the down and out; it is with those seeking forgiveness.
However, I did some research and found this quote from Psalm 121 (‘The Lord is Thy Keeper’) of The Holy Bible: King James Version:
“I will lift up mine eyes unto the hills,
from whence cometh my help.
My help cometh from the LORD,
which made heaven and earth”.
When viewed in this context I have to believe Tebow is being a good Christian. Now I’m not Christian, and I teach ethics but it is without a religious slant other than to say much of religious thought comes from the biblical passage: "Do unto others as you would have them do unto you." By extension, The Golden Rule calls on us to treat others the way we want to be treated – with respect, compassion, kindness, fairness, honesty, and so on.
I tell my students that it does not matter what are your religious beliefs. But, believe in something; believe that it matters what you do and say while on this Earth; know that your actions have consequences and how you treat others triggers those consequences; and embrace the notion that we should strive to leave this Earth a better place than when we arrived.
Tebow demonstrated great character at the news conference this past Monday that introduced him to NY media. When asked about his role on the Jets given Mark Sanchez is the starting quarterback, Tebow said: "However I can help the team, however I can make a difference, however they can use me, I'll be open to it and work as hard as I can every time I step on the field. I will give my whole heart and soul to being the best Jet I can possibly be in trying to help this team win football games."
One thing even Tebow’s most ardent critics can’t fault him for is his charity work. In addition to his missionary work with orphanages in the Philippines, he regularly brings sick children to his games through his foundation. Tebow brought Joey Norris, a young boy with cancer, to the playoff game against the New England Patriots, and where the Broncos suffered what he called a devastating loss.
“I was extremely disappointed,” Tebow said. “But I still have a kid who is fighting for his life, and I have a choice to make. I can choose to sulk and feel pity after this loss and this disappointment. I can choose to try to go invest in him and try to encourage him and make him smile and be a part of his life. That really changes your perspective as a young man and as an athlete. For me to try to invest in him, he helped me more than I helped him on that night.”
There is an old expression: "The true measure of a man is how he treats someone who can do him absolutely no good." When applied to Tebow we can see how he fits the mold of a good role model for youngsters striving to be...well, the next Tim Tebow.
This is getting ridiculous people. Tebow is not any different from you or me except that he knows how to play football – quarterbacking aside. There is no doubt that he is an outstanding athlete. That’s why the NY Jets wanted him. His particular skill set and athletic ability open up possibilities on the field including the wildcat formation.
How unusual is it that the other sports mania in recent times just recently occurred in NYC when Jeremy Lin emerged as something of a cult hero after catapulting to stardom as the New York Knicks point guard. Linsanity swept the city like few events before it. What do Tebow and Lin have in common? They both have openly discussed their evangelical faith.
Personally, I don’t get it. What is the big deal that he bows down after a touchdown pass and gives thanks? I’ve seen players pray on the sideline. There are prayer gatherings after a game to give thanks. It must be that Tebow speaks openly about his faith. Perhaps some people are afraid of it. Their sons and daughters might seek to be like Tebow. I can think of worse role models for young people to emulate.
Critics have pointed out that God does not take sides in football games and to inject God’s name as a form of thanks after throwing a touchdown pass minimizes what God really stands for – it is with the poor; with the down and out; it is with those seeking forgiveness.
However, I did some research and found this quote from Psalm 121 (‘The Lord is Thy Keeper’) of The Holy Bible: King James Version:
“I will lift up mine eyes unto the hills,
from whence cometh my help.
My help cometh from the LORD,
which made heaven and earth”.
When viewed in this context I have to believe Tebow is being a good Christian. Now I’m not Christian, and I teach ethics but it is without a religious slant other than to say much of religious thought comes from the biblical passage: "Do unto others as you would have them do unto you." By extension, The Golden Rule calls on us to treat others the way we want to be treated – with respect, compassion, kindness, fairness, honesty, and so on.
I tell my students that it does not matter what are your religious beliefs. But, believe in something; believe that it matters what you do and say while on this Earth; know that your actions have consequences and how you treat others triggers those consequences; and embrace the notion that we should strive to leave this Earth a better place than when we arrived.
Tebow demonstrated great character at the news conference this past Monday that introduced him to NY media. When asked about his role on the Jets given Mark Sanchez is the starting quarterback, Tebow said: "However I can help the team, however I can make a difference, however they can use me, I'll be open to it and work as hard as I can every time I step on the field. I will give my whole heart and soul to being the best Jet I can possibly be in trying to help this team win football games."
One thing even Tebow’s most ardent critics can’t fault him for is his charity work. In addition to his missionary work with orphanages in the Philippines, he regularly brings sick children to his games through his foundation. Tebow brought Joey Norris, a young boy with cancer, to the playoff game against the New England Patriots, and where the Broncos suffered what he called a devastating loss.
“I was extremely disappointed,” Tebow said. “But I still have a kid who is fighting for his life, and I have a choice to make. I can choose to sulk and feel pity after this loss and this disappointment. I can choose to try to go invest in him and try to encourage him and make him smile and be a part of his life. That really changes your perspective as a young man and as an athlete. For me to try to invest in him, he helped me more than I helped him on that night.”
There is an old expression: "The true measure of a man is how he treats someone who can do him absolutely no good." When applied to Tebow we can see how he fits the mold of a good role model for youngsters striving to be...well, the next Tim Tebow.
|
{
"pile_set_name": "Pile-CC"
}
|
Last updated on .From the section Northern Ireland
Ryan McBride's coffin, draped with his number five shirt, is carried to his home in the Brandywell area
Northern Ireland boss Michael O'Neill has led the tributes to Derry City captain Ryan McBride, who has died at the age of 27.
Defender McBride was found dead at home on Sunday, a day after he led his side in a 4-0 League of Ireland win over Drogheda United.
The cause of death is not yet known but a post mortem is being carried out.
"He epitomised everything about our club and our city," said Derry City chief executive Sean Barrett.
McBride's funeral will take place on Thursday at 10:00 GMT at St Columba's Church in Derry, after which the player will be buried in the city cemetery.
The league game between Derry City and Limerick, due to take place on 21 March, will be rescheduled.
McBride's death is the latest tragedy to befall the club following the death of striker Mark Farren and the Buncrana pier tragedy, which claimed the lives of members of winger Josh Daniels a year ago.
'He led boys to become men'
Northern Ireland manager O'Neill was manager of League of Ireland Premier Division side Shamrock Rovers when McBride joined Derry six years ago.
"When I first saw him play, I remember thinking, 'what a fantastic young defender'. He was strong, physical and hugely committed.
"His leadership qualities were evident even at such a young age and it was no surprise to me that he became such an inspirational player for his hometown club."
Ryan McBride: 'A perfect example to any young player'
Derry City manager Kenny Shiels said the death was "hard for everybody to take" and that he was "the perfect example to any young player coming through".
And chief executive Barrett added: "Of the words that have been thrown around probably my favourite one is 'warrior'.
"He led boys to become men and he was a man. He was everything that is associated with Derry City Football Club and, indeed, the whole city."
The Irish Football Association tweeted: external-link "Thoughts tonight with the family of Ryan McBride and everyone involved with Derry City FC."
Derry City released an official statement on Monday afternoon saying the team will "miss his inspiration and his leadership".
The statement went on to say: "In the hearts and minds of all of us, and long into the future, Ryan McBride will be remembered as one of the greats of Derry City Football Club."
Phil O'Doherty, Derry City Football Club chairman, said the team was "devastated" at the loss of a "leader on and off the field".
"He was incredibly respected. He was an ideal captain," he told the BBC. "He was from the Brandywell area and he walked across the road to his home after every game."
The CEO of the Football Association of Ireland (FAI), John Delaney, said Irish football was in mourning.
"Ryan's passing has left a deep shock throughout football," he said. "We will remember Ryan with a tribute at Friday night's World Cup qualifier against Wales."
Profile: Ryan McBride
Ryan McBride led Derry City to a 4-0 victory over Drogheda United on Saturday
Since his debut in 2011, McBride had not only become a mainstay of the club's defence, but a fans' favourite.
He made more than 170 appearances, with more than 50 as captain after he took over the role permanently two years ago.
A self-professed quiet man off the pitch, McBride said it was a "different story" on it. "I switch on and then I'm in game mode," he said.
'A lot of tragedy'
Heartbroken Derry City players leave a press conference following the death of Ryan McBride
Republic of Ireland footballer James McClean, a former team mate of McBride at Derry, said he was "a warrior that literally would throw his body on the line when he pulled on that Derry City jersey, a club that meant so much to him".
He said that McBride was a "big gentleman off the field", adding: "Sleep tight big man. May God bless you and your family."
Ireland manager Martin O'Neill has said West Brom's McClean will be permitted to leave the camp before Friday's game with Wales should he wish.
Former Derry City striker Liam Coyle said: "My brother phoned me to tell me and I was in total disbelief.
"I played football with Ryan's father and Ryan was always a rising star. Derry City has lost the best centre half in Ireland."
DUP leader Arlene Foster tweeted: "My deepest condolences to the family and all Derry City FC as they mourn the loss of the talented Ryan McBride. Such devastating news."
Archbishop Eamon Martin said: "Sad news from Derry. Praying for the family and for his many friends and supporters who will miss him. Lord have mercy. RIP."
The President of Ireland, Michael D Higgins, tweeted: "Along with all those who support Irish football, I express my sadness and condolences to the family of Derry City Football Club captain Ryan McBride."
|
{
"pile_set_name": "OpenWebText2"
}
|
787 F.2d 598
Tracon Intern., Inc.v.U.S.
85-1643
United States Court of Appeals,Ninth Circuit.
3/27/86
1
D.Ariz.
AFFIRMED
|
{
"pile_set_name": "FreeLaw"
}
|
Susceptibility of porin- and lipopolysaccharide-deficient strains of Escherichia coli to some antiseptics and disinfectants.
The sensitivities of some outer membrane protein (Omp) and/or lipopolysaccharide (LPS)-defective mutants of Escherichia coli to chlorhexidine and some quaternary ammonium compounds (QACs) were examined. Wild-type strains, with no defect in Omp or LPS were the most resistant to QACs, whereas LPS-deficient strains were the most sensitive. As expected, QAC resistance could not be related to the presence or absence of any specific porin(s). Chlorhexidine was highly active against all strains, inhibitory concentrations lying within the narrow range of 1 and 2 mg l-1.
|
{
"pile_set_name": "PubMed Abstracts"
}
|
Björn Berg
Björn Berg (born January 24, 1972 in Umeå) is a beach volleyball player from Sweden, who competed in two consecutive Summer Olympics for his native country, starting in 2000. In both tournaments he teamed up with Simon Dahl.
Playing Partners
Simon Dahl
Hannes Brinkborg
Robert Svensson
Emil Norberg
Tom Englen
References
External links
Category:1972 births
Category:Living people
Category:Beach volleyball players at the 2000 Summer Olympics
Category:Beach volleyball players at the 2004 Summer Olympics
Category:Swedish beach volleyball players
Category:Olympic beach volleyball players of Sweden
|
{
"pile_set_name": "Wikipedia (en)"
}
|
Q:
Price change for Configurable products in list
Scenario:
I have a configurable product with the price X (no special price).
One (or more but not all) of the simple products attached to the configurable products has a special price Y (lower than X).
In the product view page (works as desired):
when the page loads I see the lowest price (Y in my case) along with regular price.
when changing the configuration of the product and reaching a configuration that is not discounted I see only one price, the original one (X).
changing the configuration to reach the discounted price product I see again, regular price and special price.
In the product list page (does not work as desired):
when the page loads I see the minimal price of the configurable product (Y) but no regular price or "special price" label
changing the product configuration to anything else, changes the price to the price of the configuration (X or Y).
Desired Result in the product list page:
1. when page loads, display the minimal price and the regular price (Regular price: X, Special Price: Y).
2. When the configuration changes show/hide the regular price and the special price label according to the selected options. Example: When selecting the configuration for the discounted price show both regular and special price (bonus: any other price type I add custom). When selecting a non-discounted configuration just show one price.
Additional Info:
I can achieve point 1 from the desired result by editing the final_price.phtml template for configurable products and removing the condition !$block->isProductList().
But in this case, the special price label remains there no matter what configuration I choose.
Speculation:
Since the regular price is not shown in the product list (see the conditions mentioned above), it makes me thing that by design, not all prices are shown in the product list for configurable products.
Question:
Is there a reasonable way (not rewriting all the price display logic) to achieve point 2 in the desired result section?
A:
I kind of got this working.
I removed from the configurable product final_price.phtml the condition for not being in the product list !$block->isProductList().
This makes the prices change somehow. But there is a catch. Actually 2.
First: If the product is configurable by 2 or more attributes (let's say color and size) and in the product list I only have enabled 1 attribute (color) when changing the color, I see the price of the first product that has that color. If that product does not have a special price I won't see it. If you want to always select the product that has a special price, this can be changed in the file https://github.com/magento/magento2/blob/2.2-develop/app/code/Magento/Swatches/view/frontend/web/js/swatch-renderer.js. This line result = $widget.options.jsonConfig.optionPrices[_.findKey($widget.options.jsonConfig.index, options)]; can be changed to loop through all the matching products and select the one with a discount.
Second: When changing from a product with a discount to a product that does not have a discount, the "regular price" disappears, but the label "Special price" still remains. This can be overcome by changing Magento/Catalog/view/base/templates/product/price/amount/default.phtml.
change
<span class="price-label"><?= /* @escapeNotVerified */ $block->getDisplayLabel() ?></span>
to this
<span class="price-label <?= $block->getLabelClass()?>"><?= /* @escapeNotVerified */ $block->getDisplayLabel() ?></span>
and in the final_price.phtml for the configurable product for the special price renderer this attribute needs to be added label_class => 'sly-old-price'.
This kind of works as I need it to.
Notes:
This is only tested for configurable products. Haven't tested for downloadable or bundle.
by "changing" in the code I mean properly overriding the files either in a module or in a custom theme. NOT IN THE CORE.
|
{
"pile_set_name": "StackExchange"
}
|
Hungary election: Viktor Orban's Fidesz party hopes for third straight term Published duration 8 April 2018
image copyright AFP image caption Turnout for Sunday's election is reported to be higher than in the previous three votes
Voting is drawing to a close in Hungary, where opinion polls have pointed to a third consecutive term for right-wing Prime Minister Viktor Orban.
Before the vote, Mr Orban and his Fidesz party were polling at 20 points or more ahead of the far-right Jobbik party and the centre-left Socialists.
Polling stations were meant to close at 19:00 (17:00 GMT), but some are staying open hours later due to long queues.
Preliminary results will be announced later than expected, after 23:00.
While Fidesz is expected to win a parliamentary majority, analysts are watching to see if Mr Orban's party can regain the "supermajority" it once held.
This is the two-thirds control of the 199-seat legislature that allowed Fidesz to pass controversial laws putting pressure on the judiciary and the press.
Data at 16:30 GMT from the National Election Office showed voter turnout of 68% - around nine points higher than at the same point in the 2014 election.
Pollsters think a high turnout could benefit the opposition.
What are Viktor Orban's policies?
Mr Orban refused to publicly debate with his opponents during the campaign or speak to the independent media, speaking instead at rallies for his supporters.
These addresses focused on one core policy - stopping immigration.
"Migration is like rust that slowly but surely would consume Hungary," Mr Orban said at his final rally on Friday.
image copyright AFP/Getty image caption Mr Orban hammered home his anti-immigration stance at a number of campaign rallies
Under Mr Orban, Hungary built a fence along its borders with Serbia and Croatia in 2015 to stop illegal migrants.
His anti-immigration measures and tough rhetoric have seen him clash with the European Union in the past.
Mr Orban is an avowed Eurosceptic who opposes further EU integration. He refused to take part in the EU's refugee resettlement programme and he has praised Russian leader Vladimir Putin.
If he wins, as is likely, Mr Orban has promised to cut income tax and pass pro-growth economic policies.
His administration has presided over strong economic growth which, he says, would be threatened under the opposition.
Who are the opposition parties?
A poll on Friday put Fidesz on 46% among decided voters, more than 20 points ahead of their nearest rivals Jobbik, on 19%.
Formerly a far-right group who agitated against Hungary's Roma community, Jobbik has tried to claim the centre ground in recent years.
image copyright AFP/Getty image caption Jobbik leader Gabor Vona addressed supporters at an event commemorating the 1848-49 Hungarian revolution
Rebranding itself as a moderate "conservative people's party", its leader Gabor Vona has called for a change in government and railed against Mr Orban.
"Viktor Orban is a burnt-out politician, interested only in corruption and football," he once said.
The centre-left Socialists meanwhile were on 14% in Friday's poll and not thought to pose a threat to Fidesz.
However, one-third of voters remain undecided, and an upset is not being ruled out.
In February, the southern town of Hodmezovasarhely elected a mayor backed by all the main opposition parties. It had been considered a Fidesz stronghold.
Analysts suggest tactical voting could in theory strip the government of its 131-seat domination of Hungary's parliament.
However, given his commanding lead in the polls, an outright defeat for Mr Orban is unlikely.
|
{
"pile_set_name": "OpenWebText2"
}
|
Jus FM 103.9 and all the greatest hits music of Canada is related and bind together. As Juice FM 103.9 has one of Canada’s biggest collection of greatest hits music of all time and the listeners who enjoys the programs put together by the radio comes for that kind of greatest hits music all day long. Jus FM 103.9 alamat laman web rasmi adalah www.1039.juicefm.ca
|
{
"pile_set_name": "Pile-CC"
}
|
An investigation is underway after a Delaware man accused members of a University of Delaware fraternity of calling him a homophobic slur, attacking him and breaking his leg during an off-campus day party.
Rancel Valdez told NBC10 he was attending a party hosted by a University of Delaware frat Friday. Valdez said he was waiting for a friend to come out of the bathroom when a frat brother walked up to him and told him to leave.
When Valdez told him he was waiting for his friend, the frat member allegedly called him a homophobic slur and pushed him from behind as he walked away.
"They were just being rude, telling me to leave, calling me names," Valdez said.
Valdez said more members of the frat began to attack him and ultimately broke his leg.
“I didn’t even look their way or nothing,” Valdez said. “They all just came to me.”
Valdez was treated at the hospital and told NBC10 he’ll miss work for the next month due to his injuries.
“He didn’t even do anything wrong that day,” said Erica Bundsehuh, who attended the party with Valdez. “I ran over. I’m trying to pull these kids off. Literally felt like it wasn’t stopping because they were getting pulled off and then someone else would just come over.”
Newark Police and the University of Delaware Police are investigating the incident.
“This kind of reprehensible behavior is not tolerated at the University of Delaware,” University of Delaware President Dennis Assanis said in a released statement. “We will take all appropriate measures in the student conduct process to ensure any offenders are held accountable for their actions.”
Police are not investigating the incident as a hate crime at this time. If you have any information on the incident, please call Newark Police at 302-366-7111.
|
{
"pile_set_name": "OpenWebText2"
}
|
about this movie
Brown isn't black enough, as three friends pursue what they love for money in Brooklyn - Brooklove
Brooklyn columnist, Ian Bordeaux tussles with the thought of being an artist, or simply a sell out, when faced with a huge promotion. After releasing a controversial article, "Five Bullets that Kill Black America," his life and relationships take a consequential shift, forcing him to answer to his own mirror image.
|
{
"pile_set_name": "Pile-CC"
}
|
Can you love football and feminism? Yes, but it totally sucks sometimes
Wow, it is not fun to be a female football fan right now.
Let's consider the massive dumpster fire that is the fallout from the video of Ray Rice punching his fiancee. Let's talk about Jameis Winston, the FSU quarterback who brushed aside a rape accusation to go on and win the 2013 Heisman Trophy, despite the fact that FSU has now reopened a "student conduct" investigation into the incident. Let's talk about the multiple sexual assault allegations against Steelers QB Ben Roethlisberger. Or former UGA/LSU QB Zach Mettenberger. Let's talk about Steubenville.
That's all just pretty recent stuff. We could keep going. But really, holy crap, women. Why are we doing this to ourselves?
So how (or why) do we keeping turning on the game, buying a jersey, springing for tickets, using team-sponsored hashtags on Twitter when it's so clear we're buying into a culture of entitlement, of untold violence and questionable conduct that at times seems to ignore the fact women are people/even exist at all?
The answer is deceptively simple: We do, because we know.
As a female football fan, I know what I'm getting. I know the men I watch earn millions of dollars that they sometimes have no idea what to do with. I know, from a young age they have been groomed and coddled, cloyed with promises of fortune and yes, women — or more accurately — attention and wish-fulfillment. I knew a player at my alma mater who spoke with wonder at the things recruiters were willing to do for him if he would sign on the dotted line. Players with stories like his probably number in the tens of thousands.
I also know that football takes a toll on the body and the mind. That despite their free will and the fact they are adult men, players are taken advantage of and commodified by those who stand to make a buck off their fame. I'm not an apologist by any means, but I refuse to look at this in purely gendered terms. We want this institution we love to view women as people, so it's important we do the same to the men on the other side of this divide.
I know that there are roughly 2,000 players in the NFL, and a handful of them have been called out for criminal acts, against women and otherwise. In an ideal world, that number would be zero, but this is reality and it stands to reason a vast majority of the players you like and root for don't punch their wives in elevators and are in fact normal people just trying not to get their clocks cleaned on the field.
However, I know, when one of the commits a crime, even a heinous one, they are often afforded mind-blowing levels of privilege.
But all of this isn't a football problem. It's really not even a sports problem. If you must ask a feminist why she watches football, expect her to ask if you pay attention to fashion or movies or TV. Misogyny, objectification of the female form, entitlement and mitigation of punishment through privilege are certainly present in these art forms as well.
It's not an excuse, and enjoyment of culture shouldn't be a game of lesser evils. The point is, football is not the only institution marred by these problems. It just so happens it's an institution populated and run by mostly men; it's brutish and rough, it's a boys' club in the most literal sense.
If you want to be a feminist, and you want to watch football, you just need to not be ignorant of these issues. You must look upon these problems with a critical eye and demand change, because as a fan and a woman, that's what you deserve. Hold the people in charge to higher standards of conduct, because this is football, damn it, and we love it. And it's hard to love it when dumb, horrible stuff like this keeps happening.
But don't turn off the TV. Don't give up something you love because part of it sucks. Take hope in the fact that the tides seem to be turning, ever so slowly, in favor of our goals as feminists. We'll get there.
|
{
"pile_set_name": "Pile-CC"
}
|
Democratic pollster Stan Greenberg said Friday that his party is in position for “an earthquake election” come November 4. Dems predicting ‘earthquake’ election
Democratic pollster Stan Greenberg said Friday that his party is in position for “an earthquake election” come Nov. 4.
“Nothing is going to look the same,” Greenberg said, joined by Democratic strategist James Carville at a breakfast with reporters hosted by The Christian Science Monitor.
Carville likened the Washington political environment to pre-Hurricane Katrina New Orleans, saying that “there will be nothing left standing” after the election. He added that Republicans stand to lose “not just an election but a generation of voters.”
“[John] McCain and [Sarah] Palin are losing the argument,” Greenberg said, pointing to favorable numbers for Obama on the campaign’s central issue, the economy.
“They are losing on their central arguments,” the pollster said of the Republican’s focus on tax cuts. “They can’t see that what they take for granted loses them independents.”
Greenberg said the GOP has not adjusted to a changed electorate and is running toward a base that no longer has the numbers it once had.
“Republicans want McCain to keep running to the right,” he said. “This is a new map.”
Carville agreed, though he suggested that Democrats also have not fully adapted to a changed electorate.
“I don’t know if we’ve seen the full sweep of what is possible,” he said, listing a number of Republican House seats that are polling competitive despite received little or no money from Democratic committees.
Both said that, despite the tough environment Republicans face in this election, the McCain campaign was running a competitive race until selecting Palin as the Arizona senator’s running mate.
Greenberg said Palin has “changed the whole criteria of the race” by moving the debate from assessing Obama’s experience to change and reform.
“Attitudes toward Palin are now more of a factor than McCain,” he said.
“The Palin thing was just pretty dumb,” Carville added. “That looked good for, what, 48 hours? Seventy-two hours?”
The Democratic strategist also mocked the McCain campaign’s attempts to use Joe the Plumber to rally middle-class voters. “The reason the Republicans found Joe the Plumber was to find someone hanging around a toilet other than [Sen.] Larry Craig,” he said.
|
{
"pile_set_name": "OpenWebText2"
}
|
Obesity, emerging risk in China: trend of increasing prevalence of obesity and its association with hypertension and hypercholesterolaemia among the Chinese.
1. The aim of the present study was to investigate the trend of the prevalence of obesity in China and its association with hypertension and hypercholesterolemia. 2. A multicentre cross-sectional study was conducted in Chinese men and women aged 48-56 years between 1985 and 2000. In the report, three study periods were classified as survey 1 (1985), survey 2 (1988-1989) and survey 3 (1997-2000) in order to describe the long-term trend. 3. The results show that: (i) mean body mass index (BMI), prevalence of obesity (BMI > or = 28 kg/m2) and overweight (BMI > or = 25 and < 28 kg/m2) increased significantly from 1985 to 2000 in both sexes (P < 0.001); (ii) similar to the trend for BMI, the prevalence of hypertension and hypercholesterolaemia (total cholesterol (TC) > or = 220 mg/dL) also increased significantly from 1985 to 2000 (P < 0.001); (iii) partial correlation and multiple linear regression analyses indicated that increased BMI was significantly positively correlated with blood pressure and TC and negatively correlated with serum high-density lipoprotein-cholesterol (P < 0.01 or P < 0.001); and (iv) multiple logistics regression analysis models indicated that obese subjects had a 3.9-fold higher risk of being hypertensive (relative risk (RR) 4.9; 95% confidence interval (CI) 3.4-7.3) compared with those subjects who had a BMI less than 25 kg/m2. The corresponding RR (95% CI) of obesity for hypercholesterolaemia was 2.63 (1.57-4.40). 4. In conclusion, the results highlight the epidemic of obesity, an emerging risk in China. Great efforts must be made to alter this unwelcome trend.
|
{
"pile_set_name": "PubMed Abstracts"
}
|
Q:
Сортировка выбранной строки двумерного массива
Пожалуйста, напишите кусок кода, который сортирует выбранную строку двумерного массива. Пишу - не работает, вставляю готовый код - не работает
#include "pch.h"
#include <iostream>
using namespace std;
int main()
{
setlocale(LC_ALL, "Russian");
const int n = 4; // размер массива
int arr[n][n];
cout << "Введите массив:" << endl;
for (int i = 0; i < n; i++)
{
for (int j = 0; j < n; j++)
{
cout << "arr[" << i << "]" << "[" << j << "]" << ": ";
cin >> arr[i][j]; // ввод элементов массива
}
}
cout << "=============================================" << endl;
cout << "Введенный массив:" << endl; // вывод заполненного массива
for (int i = 0; i < n; i++)
{
for (int j = 0; j < n; j++) {
cout << arr[i][j] << " ";
}
cout << '\n';
}
cout << "=============================================" << endl;
int choice = 0, temp;
cout << "Выберите строку, которую вы хотите отсортировать, выберите значение от 0 до 4:" << endl;
cin >> choice;
// сортировка
cout << "Полученный массив:" << endl; // вывод результата
for (int i = 0; i < n; i++)
{
for (int j = 0; j < n; j++) {
cout << arr[i][j] << " ";
}
cout << '\n';
}
}
A:
std::sort(arr[choice], arr[choice] + n);
Или, если же самому нужно написать, то:
int i = 0;
int* first = arr[choice], *last = first + n;
while (first != last) {
for (int* p = arr[choice]; p != last- i - 1; ++p)
if (*p > *(p + 1)) {
int temp = *p;
*p = *(p + 1);
*(p + 1) = temp;
}
++first;
++i;
}
Это один из самых простых вариантов сортировки.
То же самое без указателей(по просьбе автора):
int i = 0;
while(i < n) {
for (int j = 0; j < n - i - 1; ++j)
if (arr[choice][j] > arr[choice][j + 1]) {
int temp = arr[choice][j];
arr[choice][j] = arr[choice][j + 1];
arr[choice][j + 1] = temp;
}
++i;
}
P.S. рекомендую изучать разные альгоритмы сортировки. Для строки choice двумерного массива просто рассматриваются элементы от arr[choice][0] и до arr[choice][n], где n это количество столбцов.
|
{
"pile_set_name": "StackExchange"
}
|
@charset "utf-8";
/* Reset CSS */
html, body, div, span, applet, object, iframe,
h1, h2, h3, h4, h5, h6, p, blockquote, pre,
a, abbr, acronym, address, big, cite, code,
del, dfn, em, font, img, ins, kbd, q, s, samp,
small, strike, strong, sub, sup, tt, var,
b, u, i, center,
dl, dt, dd, ol, ul, li,
fieldset, form, label, legend,
table, caption, tbody, tfoot, thead, tr, th, td {
margin: 0;
padding: 0;
border: 0;
outline: 0;
font-size: 100%;
vertical-align: baseline;
background: transparent;
}
body {
background: #DCDDDF ;
color: #000;
font: 14px Arial;
margin: 0 auto;
padding: 0;
position: relative;
}
h1{ font-size:28px;}
h2{ font-size:26px;}
h3{ font-size:18px;}
h4{ font-size:16px;}
h5{ font-size:14px;}
h6{ font-size:12px;}
h1,h2,h3,h4,h5,h6{ color:#563D64;}
small{ font-size:10px;}
b, strong{ font-weight:bold;}
a{ text-decoration: none; }
a:hover{ text-decoration: underline; }
.clearfix:after,form:after {
content: ".";
display: block;
height: 0;
clear: both;
visibility: hidden;
}
.container { margin:75px auto 0 auto; position: relative; width: 900px; }
#content {
background: #f9f9f9;
background: -moz-linear-gradient(top, rgba(248,248,248,1) 0%, rgba(249,249,249,1) 100%);
background: -webkit-linear-gradient(top, rgba(248,248,248,1) 0%,rgba(249,249,249,1) 100%);
background: -o-linear-gradient(top, rgba(248,248,248,1) 0%,rgba(249,249,249,1) 100%);
background: -ms-linear-gradient(top, rgba(248,248,248,1) 0%,rgba(249,249,249,1) 100%);
background: linear-gradient(top, rgba(248,248,248,1) 0%,rgba(249,249,249,1) 100%);
/* filter: progid:DXImageTransform.Microsoft.gradient( startColorstr='#f8f8f8', endColorstr='#f9f9f9',GradientType=0 ); */
-webkit-box-shadow: 0 1px 0 #fff inset;
-moz-box-shadow: 0 1px 0 #fff inset;
-ms-box-shadow: 0 1px 0 #fff inset;
-o-box-shadow: 0 1px 0 #fff inset;
box-shadow: 0 1px 0 #fff inset;
border: 1px solid #c4c6ca;
margin: 0 auto;
padding: 25px 0 0;
position: relative;
text-align: center;
text-shadow: 0 1px 0 #fff;
width: 400px;
}
#content h1 {
color: #7E7E7E;
font: bold 25px Helvetica, Arial, sans-serif;
letter-spacing: -0.05em;
line-height: 20px;
margin: 10px 0 30px;
}
#content h1:before,
#content h1:after {
content: "";
height: 1px;
position: absolute;
top: 10px;
width: 27%;
}
#content h1:after {
background: rgb(126,126,126);
background: -moz-linear-gradient(left, rgba(126,126,126,1) 0%, rgba(255,255,255,1) 100%);
background: -webkit-linear-gradient(left, rgba(126,126,126,1) 0%,rgba(255,255,255,1) 100%);
background: -o-linear-gradient(left, rgba(126,126,126,1) 0%,rgba(255,255,255,1) 100%);
background: -ms-linear-gradient(left, rgba(126,126,126,1) 0%,rgba(255,255,255,1) 100%);
background: linear-gradient(left, rgba(126,126,126,1) 0%,rgba(255,255,255,1) 100%);
right: 0;
}
#content h1:before {
background: rgb(126,126,126);
background: -moz-linear-gradient(right, rgba(126,126,126,1) 0%, rgba(255,255,255,1) 100%);
background: -webkit-linear-gradient(right, rgba(126,126,126,1) 0%,rgba(255,255,255,1) 100%);
background: -o-linear-gradient(right, rgba(126,126,126,1) 0%,rgba(255,255,255,1) 100%);
background: -ms-linear-gradient(right, rgba(126,126,126,1) 0%,rgba(255,255,255,1) 100%);
background: linear-gradient(right, rgba(126,126,126,1) 0%,rgba(255,255,255,1) 100%);
left: 0;
}
#content:after,
#content:before {
background: #f9f9f9;
background: -moz-linear-gradient(top, rgba(248,248,248,1) 0%, rgba(249,249,249,1) 100%);
background: -webkit-linear-gradient(top, rgba(248,248,248,1) 0%,rgba(249,249,249,1) 100%);
background: -o-linear-gradient(top, rgba(248,248,248,1) 0%,rgba(249,249,249,1) 100%);
background: -ms-linear-gradient(top, rgba(248,248,248,1) 0%,rgba(249,249,249,1) 100%);
background: linear-gradient(top, rgba(248,248,248,1) 0%,rgba(249,249,249,1) 100%);
/* filter: progid:DXImageTransform.Microsoft.gradient( startColorstr='#f8f8f8', endColorstr='#f9f9f9',GradientType=0 ); */
border: 1px solid #c4c6ca;
content: "";
display: block;
height: 100%;
left: -1px;
position: absolute;
width: 100%;
}
#content:after {
-webkit-transform: rotate(2deg);
-moz-transform: rotate(2deg);
-ms-transform: rotate(2deg);
-o-transform: rotate(2deg);
transform: rotate(2deg);
top: 0;
z-index: -1;
}
#content:before {
-webkit-transform: rotate(-3deg);
-moz-transform: rotate(-3deg);
-ms-transform: rotate(-3deg);
-o-transform: rotate(-3deg);
transform: rotate(-3deg);
top: 0;
z-index: -2;
}
#content form { margin: 0 20px; position: relative }
#content form input[type="text"],
#content form input[type="password"] {
-webkit-border-radius: 3px;
-moz-border-radius: 3px;
-ms-border-radius: 3px;
-o-border-radius: 3px;
border-radius: 3px;
-webkit-box-shadow: 0 1px 0 #fff, 0 -2px 5px rgba(0,0,0,0.08) inset;
-moz-box-shadow: 0 1px 0 #fff, 0 -2px 5px rgba(0,0,0,0.08) inset;
-ms-box-shadow: 0 1px 0 #fff, 0 -2px 5px rgba(0,0,0,0.08) inset;
-o-box-shadow: 0 1px 0 #fff, 0 -2px 5px rgba(0,0,0,0.08) inset;
box-shadow: 0 1px 0 #fff, 0 -2px 5px rgba(0,0,0,0.08) inset;
-webkit-transition: all 0.5s ease;
-moz-transition: all 0.5s ease;
-ms-transition: all 0.5s ease;
-o-transition: all 0.5s ease;
transition: all 0.5s ease;
background: #eae7e7 url(../images/8bcLQqF.png) no-repeat;
border: 1px solid #c8c8c8;
color: #777;
font: 13px Helvetica, Arial, sans-serif;
margin: 0 0 10px;
padding: 15px 10px 15px 40px;
width: 80%;
}
#content form input[type="text"]:focus,
#content form input[type="password"]:focus {
-webkit-box-shadow: 0 0 2px #ed1c24 inset;
-moz-box-shadow: 0 0 2px #ed1c24 inset;
-ms-box-shadow: 0 0 2px #ed1c24 inset;
-o-box-shadow: 0 0 2px #ed1c24 inset;
box-shadow: 0 0 2px #ed1c24 inset;
background-color: #fff;
border: 1px solid #ed1c24;
outline: none;
}
#username { background-position: 10px 10px !important }
#password { background-position: 10px -53px !important }
#content form input[type="submit"] {
background: rgb(254,231,154);
background: -moz-linear-gradient(top, rgba(254,231,154,1) 0%, rgba(254,193,81,1) 100%);
background: -webkit-linear-gradient(top, rgba(254,231,154,1) 0%,rgba(254,193,81,1) 100%);
background: -o-linear-gradient(top, rgba(254,231,154,1) 0%,rgba(254,193,81,1) 100%);
background: -ms-linear-gradient(top, rgba(254,231,154,1) 0%,rgba(254,193,81,1) 100%);
background: linear-gradient(top, rgba(254,231,154,1) 0%,rgba(254,193,81,1) 100%);
/* filter: progid:DXImageTransform.Microsoft.gradient( startColorstr='#fee79a', endColorstr='#fec151',GradientType=0 ); */
-webkit-border-radius: 30px;
-moz-border-radius: 30px;
-ms-border-radius: 30px;
-o-border-radius: 30px;
border-radius: 30px;
-webkit-box-shadow: 0 1px 0 rgba(255,255,255,0.8) inset;
-moz-box-shadow: 0 1px 0 rgba(255,255,255,0.8) inset;
-ms-box-shadow: 0 1px 0 rgba(255,255,255,0.8) inset;
-o-box-shadow: 0 1px 0 rgba(255,255,255,0.8) inset;
box-shadow: 0 1px 0 rgba(255,255,255,0.8) inset;
border: 1px solid #D69E31;
color: #85592e;
cursor: pointer;
float: left;
font: bold 15px Helvetica, Arial, sans-serif;
height: 35px;
margin: 20px 0 35px 15px;
position: relative;
text-shadow: 0 1px 0 rgba(255,255,255,0.5);
width: 120px;
}
#content form input[type="submit"]:hover {
background: rgb(254,193,81);
background: -moz-linear-gradient(top, rgba(254,193,81,1) 0%, rgba(254,231,154,1) 100%);
background: -webkit-linear-gradient(top, rgba(254,193,81,1) 0%,rgba(254,231,154,1) 100%);
background: -o-linear-gradient(top, rgba(254,193,81,1) 0%,rgba(254,231,154,1) 100%);
background: -ms-linear-gradient(top, rgba(254,193,81,1) 0%,rgba(254,231,154,1) 100%);
background: linear-gradient(top, rgba(254,193,81,1) 0%,rgba(254,231,154,1) 100%);
/* filter: progid:DXImageTransform.Microsoft.gradient( startColorstr='#fec151', endColorstr='#fee79a',GradientType=0 ); */
}
#content form div a {
color: #004a80;
float: right;
font-size: 12px;
margin: 30px 15px 0 0;
text-decoration: underline;
}
.button {
background: rgb(247,249,250);
background: -moz-linear-gradient(top, rgba(247,249,250,1) 0%, rgba(240,240,240,1) 100%);
background: -webkit-linear-gradient(top, rgba(247,249,250,1) 0%,rgba(240,240,240,1) 100%);
background: -o-linear-gradient(top, rgba(247,249,250,1) 0%,rgba(240,240,240,1) 100%);
background: -ms-linear-gradient(top, rgba(247,249,250,1) 0%,rgba(240,240,240,1) 100%);
background: linear-gradient(top, rgba(247,249,250,1) 0%,rgba(240,240,240,1) 100%);
/* filter: progid:DXImageTransform.Microsoft.gradient( startColorstr='#f7f9fa', endColorstr='#f0f0f0',GradientType=0 ); */
-webkit-box-shadow: 0 1px 2px rgba(0,0,0,0.1) inset;
-moz-box-shadow: 0 1px 2px rgba(0,0,0,0.1) inset;
-ms-box-shadow: 0 1px 2px rgba(0,0,0,0.1) inset;
-o-box-shadow: 0 1px 2px rgba(0,0,0,0.1) inset;
box-shadow: 0 1px 2px rgba(0,0,0,0.1) inset;
-webkit-border-radius: 0 0 5px 5px;
-moz-border-radius: 0 0 5px 5px;
-o-border-radius: 0 0 5px 5px;
-ms-border-radius: 0 0 5px 5px;
border-radius: 0 0 5px 5px;
border-top: 1px solid #CFD5D9;
padding: 15px 0;
}
.button a {
background: url(../images/8bcLQqF.png) 0 -112px no-repeat;
color: #7E7E7E;
font-size: 17px;
padding: 2px 0 2px 40px;
text-decoration: none;
-webkit-transition: all 0.3s ease;
-moz-transition: all 0.3s ease;
-ms-transition: all 0.3s ease;
-o-transition: all 0.3s ease;
transition: all 0.3s ease;
}
.button a:hover {
background-position: 0 -135px;
color: #00aeef;
}
|
{
"pile_set_name": "Github"
}
|
I wanted to check in with you because I noticed that we've not heard from you since you first posted this question to the Canvas Community on August 29th. Have you had a chance to review the replies from Roxanne Conroy? Did either of those responses help to answer your question? Or, are you still looking for some help with discussions? Please mark one of Roxanne's responses as "Correct" if you feel that it helps to answer your question. But, if you are still looking for some help, please post a message below. For now, I'm going to mark your question as "Assumed Answered", but that won't prevent you or others from posting additional questions/comments below. I hope that's alright with you, Jacqueline. Looking forward to hearing from you soon!
|
{
"pile_set_name": "Pile-CC"
}
|
Post navigation
New Manager for Howard Hanna Toledo/Maumee Office
Cleveland, OH (September 6th, 2016) – It is with pleasure that Howard Hanna Real Estate Services announces the new manager of its Toledo office, Dawn Rose-Sohnly. Since January 2015, Howard Hanna has had a presence in Lucas County, where its market share has been continually increasing.
In July, the company moved to a new office with 4,500 square feet and space for more than 50 agents. Rose-Sohnly is excited to lead this office and offer exclusive Howard Hanna programs such as the 100% Money Back Guarantee, First Time Home Buyers program, and Apartment Dwellers Trade-In program, which have all been very popular in the Toledo/Maumee area.
“As a long-time resident of the Toledo area, I am honored and grateful for this opportunity to manage the Toledo/Maumee office. We will build a culture where agents are confident, empowered to drive innovation, inspired to succeed every day, and enthusiastic to deliver results to buyers and sellers,” said Rose-Sohnly. “I look forward to inspiring, motivating and energizing the Toledo/Maumee office. I know that working together, we can accomplish great things in this office!”
For 23 years, Rose-Sohnly has been working in the real estate. She’s a second generation real estate broker with expertise in Toledo and the surrounding areas. She’s a member of the Toledo Board of Realtors, Toledo Regional Association of Realtors, National Association of Realtors and Ohio Association of Realtors. In her spare time, she works with various non-profits, including the Diabetes Youth Service, Kidney Foundation of Northwest Ohio, and Feed My Starving Children.
Kristine Burdick, Executive Vice President and General Manager, Ohio Region, is happy to have Rose-Sohnly in this new role. “We are pleased to have Dawn join our management team as she will be a great leader as we continue to build and expand in the Toledo/Maumee marketplace,” she said.
As the third largest real estate company nationally and an industry leader, Howard Hanna takes its commitment to Lucas County seriously. Over the prior year, home listings are up 33%, homes sold are up over 90%, and agent count is up nearly 30%. We look forward to continuing to serve Toledo and the neighboring areas and are confident that with strong leadership we will continue our growth in 2016 and beyond.
Howard Hanna Real Estate Services is the 3rd largest real estate company in America, the #1 privately owned broker in the nation, and the largest home seller in Pennsylvania, Ohio, and New York. The family-owned and operated real estate company specializes in residential and commercial brokerage service, mortgages, closing and title insurance, land development, appraisal services, insurance services, corporate relocation and property management. With 270 offices across PA, OH, NY, VA, MI, WV, NC and MD, our more than 9,000 sales associates and staff are guided by a spirit of integrity in all aspects of the real estate process.
|
{
"pile_set_name": "Pile-CC"
}
|
NC IDEA FOUNDATION to Launch Ice House Entrepreneurship Program Statewide
Seeking Launch Partners for Entrepreneurial Mindset Training This December
DURHAM, NC – November 7, 2018 – NC IDEA, a private foundation committed to supporting entrepreneurial ambition and economic advancement in North Carolina, announced today that the organization is supporting a statewide rollout of the Ice House Entrepreneurship Program (IHEP) and seeking launch partners who want to offer entrepreneurial mindset programming to their constituents.
The Ice House Entrepreneurship Program (IHEP) is an experiential, problem-based program designed to inspire and engage learners in the fundamental aspects of an entrepreneurial mindset while immersing them in entrepreneurial experiences that will enable them to develop creativity and critical thinking, effective problem solving, teamwork and other entrepreneurial skills – skills that will enable them to succeed regardless of their chosen path. Created by the Entrepreneurial Learning Initiative (ELI), the program can be delivered in several formats: online or classroom, boot camp, multi-week or as a semester class. It does not require that the instructor is a subject matter expert, but rather a facilitator – the materials provide the expertise.
“NC IDEA has audacious goals: one of them is to expose 1,000,000 North Carolinians to entrepreneurship by 2025,” said Thom Ruhe, President, and CEO of NC IDEA. “We cannot do this alone, and are seeking partners who want to help us empower as many people as possible with an entrepreneurial mindset,” Ruhe concluded.
NC IDEA is hosting the three-day Ice House Facilitator Training for partners interested in offering the course to their constituents on December 12-14, 2008 at a location (TBD) in the Durham-Raleigh area. These partners will likely be entrepreneurially-minded organizations drawn from educational institutions (particularly community colleges), entrepreneurial support organizations, economic development organizations, CDFIs or government entities. Organizations with demonstratable intent and capacity to offer the program to individuals broadly will be given priority consideration. Because seating is limited, we will be admitting facilitators through an application process. NC IDEA will pay the training costs and participants will only have travel-related expenses. To learn more and apply to become an Ice House Launch Partner, visit www.ncidea.org/grants-programs/ice-house. The deadline to apply is December 1st.
NC IDEA supported Ice House Entrepreneurship Programs will be launching in the first quarter of 2019. Learn more about the powerful curriculum at www.elimindset.com.
About NC IDEA FOUNDATION
NC IDEA is an independent private foundation committed to supporting entrepreneurial ambition and economic advancement in North Carolina. Today, the organization fulfills this mission through a strategic combination of competitive grants and programs. NC IDEA ECOSYSTEM funds organizations across the state that execute creative programs to support entrepreneurs. Similarly, NC IDEA ENGAGE is a community-focused grant program supporting individuals and organizations that facilitate entrepreneurship activity. Over the last decade, the NC IDEA SEED program has awarded over $5.5 million in non-dilutive grants to 131 growth-oriented companies across the state, and most recently awarded nearly $150,000 in 15 micro-grants through a pilot program. Since 2011, over 150 companies have participated in NC IDEA LABS, formerly Groundwork Labs, to guide founders developing an idea or product. NC IDEA SOAR, a program founded in 2012, supports female entrepreneurs leading scalable businesses in raising capital through mentorship, strategic advice and connections. NC IDEA LEAD, the Foundation’s newest program, provides leadership training for founders of high-growth companies. Learn more at www.ncidea.org.
|
{
"pile_set_name": "Pile-CC"
}
|
As Twitchy noted over the weekend, it was only two weeks ago that former CIA Director John Brennan predicted with absolute certainty that Robert Mueller would be dropping the collusion hammer on Donald Trump. Obviously, it didn’t take too long for his predictions to be proven very, very wrong. And now, ABC News senior national correspondent Terry Moran thinks Brennan’s got some serious ‘splaining to do:
John Brennan has a lot to answer for—going before the American public for months, cloaked with CIA authority and openly suggesting he’s got secret info, and repeatedly turning in performances like this. pic.twitter.com/EziCxy9FVQ — Terry Moran (@TerryMoran) March 25, 2019
Moran is absolutely right, of course.
And good on Moran for calling Brennan out:
This tweet, perhaps hinting darkly that Brennan knows secrets harmful to Trump, struck me at the time as the kind of thing a former intel chief might not want to say. If his equivalent in, say, Argentina or Ukraine did it, we might well suspect an undemocratic impulse at work. https://t.co/luci4apjLt — Terry Moran (@TerryMoran) July 23, 2018
Nothing in that tweet says anything about Brennan having inside information about collusion with Russians. — Zach (@ad1220) March 25, 2019
If you interpreted that tweet as Brennan knowing harmful secrets specifically related to the Russia investigation, that's on you. — Zach (@ad1220) March 25, 2019
He used the prestige of his position as DCI to advance his argument that the president was a criminal and a traitor. What he did makes it harder for future DCIs to maintain the confidence of the country; he poisoned that high office with partisan hackery. — Terry Moran (@TerryMoran) March 25, 2019
Moran nailed it. Unfortunately, what Moran has failed to acknowledge is the media’s role in elevating Brennan’s “partisan hackery” by repeatedly and regularly giving him a platform to spew his nonsense.
As does the entire MSM. — SMR1128 (@SMR11281) March 25, 2019
Why did the media give this proven liar a platform? https://t.co/5iTgrofWWV — Phil Kerpen (@kerpen) March 25, 2019
Seems to me that the networks that gave him a platform have a lot to answer for. — Flyer (@bama_flyer) March 25, 2019
The media who give him the platform should be held to answer why the did so. — Doug Sheridan (@dougsheridan) March 25, 2019
Brennan has a lot to answer for, but so do the networks and “news” hosts who lapped up everything he said and pushed it out as gospel truth with no questions, no objective follow up research, no speculation. — HB Nisse (@Ofoeti8) March 25, 2019
GP Why did media allow him to do so unchallenged? Why put on a person who won't allow cross-examination on the basis for his statements? This a Brennan disaster, but media enabled him to do so. https://t.co/WMqwNpkjyY — The Gormogons (@Gormogons) March 25, 2019
There were a lot of the media (all of MSNBC & CNN, some like Sunny Hostin on your network, etc.) that were equally vociferous about forthcoming indictments. The media really needs some introspection. You've done such a disservice to people that trusted you. — Gopher4Mn (@Gopher4Mn) March 25, 2019
Indeed.
He lied. He had nothing and pretended to be in the know. He should be publicly rebuked by everyone who put him on TV and then never given a platform again. https://t.co/Ym0Hg4GV8n — RBe (@RBPundit) March 25, 2019
Makes sense to us.
|
{
"pile_set_name": "OpenWebText2"
}
|
We propose to study the development of drug resistance in the context of HIV protease inhibition to develop and test structural and synthetic strategies in response to this mechanism. The overall goal of this Program Project is to understand the mechanisms of viral resistance, enabling modeling and design of more sustainable anti-viral therapeutic strategies. The Program consist of four highly integrated Projects and three supporting Core facilities: Project 1, will enhance and extend a computational co-evolution approach to drug resistance by developing and applying detailed atomic models of drug/target interactions, modeling viral population dynamics and patient response under drug selection pressure, exploiting automated learning and hidden Markov modeling approaches to inform and refine these models; Project 2 will exploit the capabilities of high throughput crystallography to find and characterize novel binding sites on the protein target using fragment libraries to help construct new inhibitor leads to maintain efficacy against multi-site PR mutants, linking with optimization and synthetic efforts in Projects 1 and 3 respectively; Project 3 will utilize their "Click Chemistry" synthetic approaches for rapid development and evolution of novel fragment-based inhibitors in conjunction with Projects 1 and 2, and develop resistance probes with Project 4; Project 4 will experimentally characterize the evolution of HIV resistance in response to protease inhibition both within PR and in the rest of Gag-Pol, by exploiting tissue-culture time-course evaluation passaged virus in the presence of identified inhibitors, as well as from deep genetic analysis of selected patient samples; Core A will provide mutant and wildtype proteases, functional assays and chemical probes, and inhibitor analyses for the Program; Core B will provide the necessary x-ray structural data and computational analysis to integrate new information on protease mutants, and protease-inhibitor interactions; and Core C will assemble and make available to projects 1 and 4 time-course anti-retroviral treatment data on HIV infected patients as well as blood samples from highly resistant individuals for in-depth bioinformatic and viral genomic analyses. AIDS remains the major pandemic of our time. While patients infected with HIV can now be treated with drugs that enable them to live productive lives, the virus can subvert this treatment by developing resistance to these drugs. This study is aimed at a detailed understanding of HIV drug resistance, with the goal of developing new therapeutic strategies for more sustainable treatments to prevent AIDS. [unreadable]
|
{
"pile_set_name": "NIH ExPorter"
}
|
Big freeze in Europe shows no signs of letting up as Venice's famous waterways ice over
The big freeze shows no sign of letting up in Europe as Venice's famed waterways fell victim to sub zero temperatures this morning.
Water buses were stranded in some of the Italian city's canals after they froze solid in temperatures as low as -10C.
More than 60,000 homes were left without power in Milan and officials declared a gas supply emergency as the cold temperatures saw pipes burst.
Chilly attraction: A small passenger boat makes its way through ice on a Venice canal as temperatures dropped to -10C
Big freeze: A water bus makes slow progress of the ice-choked canals in the picturesque Italian city No go for gondolas: A view of the frozen north lagoon in Venice Ice breaker: Another boat struggles along a lagoon in Venice. In nearby Milan, more than 60,000 homes were left without power and officials declared a gas supply emergency A woman strolls down the street in the center of Skopje, capital of The Former Yugoslav Republic of Macedonia Winter wonderland: The frozen canals of Amsterdam became a giant playground as residents cycle, skate and walk along the ice Making use: People skate across frozen canals in Amsterdam, the Netherlands, which have been closed to commercial shipping Team effort: Dutch volunteers clear of the snow from the ice floor of the frozen river the Luts in Balk, north Netherlands
Seemply freezing: Two meerkats at London Zoo get to grips with the snowy conditions
Bath time: Two Ukrainian men take a dip in an ice hole in the Dnipro river in Kiev
Countries across Europe have been battling a severe cold snap for the last two weeks, with schools closed, public transport ground to a halt and snow melt threatening flooding to built up areas.
Another four people were killed by floods in southern Bulgaria, with 10 people still missing authorities said today, after a dam collapsed.
Temperatures have plummeted as low as -36C in Ukraine, the hardest-hit country, with hundreds of people - many homeless - reported to have died across Europe.
Last night, the Serbian government declared a state of emergency, after intense snowfall. Emergency officials said 70,000 people were cut off.
Schools will also be closed in the Italian capital of Rome on Tuesday, as Italy copes with unusually heavy snow for the Mediterranean country.
Rescue: A man is evacuated in Biser, southern Bulgaria, after a dam wall broke and flooded the town
Iced in: People walk along the promenade on Lake Geneva, Switzerland, as a 4x4 stands completely covered by ice Slippy: A woman walks on the frozen waterside of the boardwalk of the Lake Geneva, in Gland, Switzerland
Mush! A competitor speeds through the snow with his Siberian huskies during a dog race in Clausthal-Zellerfeld, Germany
One for the album: A tourist takes a picture of the Bartholdi fountain in Lyon, eastern France
Snow covered alpine houses on the mayen Lafet, 1,855 metres above sea level in the canton of Grisons, eastern Switzerland
So far, ten deaths have been linked to winter weather, including two people who were crushed under a collapsed roof south of Rome, and a 91-year-old woman in the northeast port of Trieste who was knocked down by strong winds.
In Bosnia, hundreds of villages were stuck behind snowed-in roads and avalanches and authorities were using helicopters to evacuate the sick and deliver food. Authorities said they have had no contact for 72 hours with about 120 people in the central village of Zijemlja, where residents have no electricity or phone lines.
In Poland, the Interior Ministry reported Monday that nine people died of hypothermia over the past 24 hours. Two elderly people were found frozen in Serbia and Bosnia, and Croatia reported four snow-related deaths.
Ukraine's Emergency Situation Ministry said today the country's death toll now stands at 135, including many homeless people. Some 2,000 have been hospitalized for frostbite or hypothermia, it said.
In the Netherlands, however, Europe's deep freeze means the country's almost mythical 'Eleven Cities Tour' ice skating marathon could be staged later this month for the first time in 15 years.
Thick ice covers of the anchor of a ferry ship making her way among ice-floes floating in River Danube in Budapest, Hungary
Unseasonably cold: Even Algeria, in north Africa, has borne the brunt of the freezing weather with rare snowfall A rare visit from Mr frosty: Two women walk past a snowman in Algiers, Algeria. Meteorology reports suggest that the last time Algiers saw this amount of snow was at least seven years ago in 2005
Cut off: An isolated village is surrounded by heavy snowfall in Bosnia and Herzegovinia. Hundreds of people have been killed as temperatures plummeted as low as -36C in Eastern Europe
A man walks past snow-covered trees on top of the 1,493-meter-high Feldberg mountain in the southern German Black Forest region
The race, held along a 125-mile network of canals connecting 11 towns and cities in Friesland province, would cause a national frenzy, drawing thousands of participants and more than a million spectators. It was last held in 1997.
Treacherous conditions threatened Britain's return to work today as the weekend snow that blanketed the country turned to ice, striking at transport on road, rail and in the air.
While thousands ventured outside to enjoy the snow at the weekend, the onset of the working week is likely to bring widespread disruption with problems reported on the roads, railways, at airports and even on the ground as people struggle with icy pavements.
On the roads the RAC today said it had had the busiest February weekend in its history, with 41 per cent more calls than usual, while the worst overnight problems saw a 25-mile long stretch of the A1 closed after a series of accidents that included four jack-knifed lorries. The A27 is also partly closed this afternoon after a serious crash involving three vehicles.
Icicles hang from a roof in Hochfilzen, in the Austrian province of Tyrol
Frozen: King's Troop, Royal Horse Artillery, perform a 41-gun salute to commemorate the 60th anniversary of the Queen's accession in the snow in Hyde Park, London
Monument: York Minister surrounded by snow. Britain has also been hit by snow as flights were cancelled at Heathrow and roads were blocked
In the air, Heathrow airport passengers were enraged that just three inches of snow led the third busiest airport in the world to cancel half of its flights over the weekend. However, the airport issued a statement this afternoon which read: 'We're operating a normal schedule today. Please continue to check your flight status with your airline.'
A Downing Street spokesman said the return to normal service was a victory for the airport's snow plan following major disruption in December 2010, when the Spanish-owned airport authority BAA was heavily criticised by an inquiry for its ‘low state of preparedness’ as thousands of passengers were stranded.
|
{
"pile_set_name": "OpenWebText2"
}
|
Gelaze by China Glaze Update
7.14.2014
So speaking of Gelaze, they are coming out with new colors! And more importantly for the professionals out there, Gelaze is finally launching their 0.5 fl oz PRO bottles!
The new PRO bottles are launching now at professional beauty supply stores but not at Sally Beauty Supply. Sally will continue to carry the mini sizes for the non-professional (like me!) to get their Gelaze fix.
Coming in January 2015, 23 new shades will be launched. Unlike Ever Glaze, Gelaze is the gel version OF existing China Glaze lacquers. These 23 shades will all launch as minis and as pro 0.5 bottles but just a quick heads up - of the above 23, Sally Beauty Supply will only be carrying 6. (The names were not available at press time.)
Also available now are the Gelaze starter kits for mini and pro which includes a lamp, remover and removal wraps. Larger bottles of the remover are also available.
|
{
"pile_set_name": "Pile-CC"
}
|
3
e
Which is the biggest value? (a) -2/3 (b) -7 (c) -0.1317 (d) 5/3
d
Which is the biggest value? (a) -7552342 (b) 5 (c) -1
b
What is the second smallest value in -18, -0.04, -2/5, 191, -0.5, -0.9, -0.1?
-0.9
What is the sixth biggest value in 1.56, 2, 1, -0.5, 1/2, -1/9?
-0.5
Which is the fourth biggest value? (a) 1/6 (b) 1 (c) -2/69 (d) 2 (e) 174
a
What is the second biggest value in -0.5, 12960.56, 2?
2
Which is the second smallest value? (a) -13/27210 (b) 13 (c) -3
a
What is the sixth biggest value in -1, 2/21, 1, 3, 1/4, -182.3, 1.1?
-1
Which is the fifth biggest value? (a) 0.28 (b) 3/8 (c) 0.16 (d) -0.4 (e) 107/7 (f) -0.3
f
What is the fifth smallest value in -2, 2, -0.8, 0, -0.2, 1/3, 3124/3?
1/3
What is the second smallest value in -0.3, -3, -8/1969, -2, -0.15?
-2
Which is the biggest value? (a) 0.4 (b) 2/13 (c) 0.0047 (d) -1/6 (e) 2.09 (f) 4
f
Which is the seventh biggest value? (a) 1/4 (b) -4 (c) 2/4575 (d) 2/5 (e) -0.3 (f) 19 (g) -4/5
b
Which is the third smallest value? (a) -0.2 (b) 29/9 (c) -0.04 (d) -38 (e) -2 (f) 0 (g) -1/7
a
Which is the third smallest value? (a) 3 (b) -2467487 (c) -0.05
a
What is the smallest value in 5, -38, -2, 16, 14, -14?
-38
What is the third biggest value in -2, -1017/2, -0.5, -11.47?
-11.47
What is the second smallest value in 2, -1/24, 0.1062691?
0.1062691
What is the sixth smallest value in 1528, 4, -4, 0.03, 2/3, -2/15?
1528
Which is the third smallest value? (a) 195 (b) -5/9 (c) -977
a
What is the biggest value in 2, 1137, -1.22, 3?
1137
What is the second biggest value in -0.013, -211.1, 40?
-0.013
What is the sixth biggest value in 6, 7, 1/11, -10/9, 2/11, 4, 0.03?
0.03
What is the second smallest value in -2/531, -52/21, -0.4?
-0.4
Which is the third biggest value? (a) 0.2 (b) 3 (c) -2 (d) -160 (e) -3 (f) 38/7
a
What is the fourth biggest value in 8, 0.1, -140, -0.3, -7?
-7
What is the third smallest value in 0.01, -2/3, 90, 0, 4, -2?
0
Which is the third biggest value? (a) 0.29 (b) 0.3 (c) -2 (d) -153 (e) 1/5
e
What is the second biggest value in -953/2, 7.3, 2, -1/3?
2
Which is the third smallest value? (a) 0.2 (b) 0.0042 (c) -395 (d) 1/3 (e) 1/2
a
What is the third biggest value in -5, 2.9377, -2, -0.06, 2/17?
-0.06
Which is the third biggest value? (a) 998 (b) -367 (c) -0.4 (d) -8
d
What is the fourth smallest value in -0.4, -84550, 3, 1.7, -2?
1.7
Which is the second smallest value? (a) -0.2 (b) -4560 (c) -2/3 (d) 2/5 (e) 5 (f) -2/253
c
What is the fifth biggest value in -0.2, 3/4, -9, -2731/5, -2/25?
-2731/5
Which is the second biggest value? (a) 0.14 (b) -3 (c) 238 (d) -27 (e) 1
e
Which is the third biggest value? (a) -5 (b) -10 (c) 5 (d) 2 (e) -1 (f) 222 (g) 157
c
Which is the second biggest value? (a) 164.69 (b) -0.777 (c) 0.2
c
Which is the third smallest value? (a) -0.04 (b) 34.75 (c) 44 (d) 1/10
b
What is the fourth smallest value in 47/9, 1/5, -4, -11/215?
47/9
Which is the fifth smallest value? (a) 11745 (b) 3 (c) 0.1627 (d) 1 (e) 2/7
a
What is the third biggest value in -27/5, -3/2, -0.4, -0.3, 1455, 1?
-0.3
What is the fourth biggest value in 2/159, -7.4, -0.1, -1/5?
-7.4
Which is the fourth biggest value? (a) 2/5 (b) 5 (c) -26/3 (d) -1 (e) -5 (f) 6 (g) 11
a
Which is the fifth biggest value? (a) -0.01 (b) -0.3 (c) 2/7 (d) -3 (e) 239 (f) 0.11 (g) 24
a
Which is the fifth biggest value? (a) -6 (b) -2.9 (c) 2/7 (d) 15/2131 (e) 5/2
a
Which is the second smallest value? (a) 0 (b) -225 (c) -2/11 (d) 8/7 (e) 0.3 (f) -154
f
Which is the smallest value? (a) -0.1 (b) -1 (c) -0.13 (d) -1072 (e) -0.5 (f) -0.15
d
Which is the third smallest value? (a) 105 (b) -34/231 (c) 0.4 (d) 2 (e) -2
c
What is the seventh smallest value in -1, -0.1, 1, 2/5, -121, -0.03, -700.8?
1
What is the third smallest value in 82, -1/3, 1/4, -0.1, -5, 1/5, 31?
-0.1
What is the fifth smallest value in 0.3, 5, -4.6, -3, -469?
5
Which is the smallest value? (a) 1.6 (b) 56 (c) 1/3 (d) 3 (e) -2 (f) 145
e
What is the sixth smallest value in -3/5, 1/4, 2/9, -7079/6, -19, -5, -4?
2/9
Which is the smallest value? (a) -6 (b) -2.92 (c) 2/57 (d) 52.4 (e) -4
a
Which is the smallest value? (a) -0.1 (b) -198 (c) 12/5 (d) -3 (e) 18
b
What is the sixth smallest value in -87, 2/9, 10, 0.04, -13, -4?
10
Which is the third smallest value? (a) 208 (b) 345 (c) 99
b
What is the smallest value in 3/32, 0.822, 1, 7, -4?
-4
What is the second smallest value in 3/7, 0.04, -265914, -0.6, -4?
-4
Which is the second smallest value? (a) 4 (b) 1/2 (c) -4 (d) 229 (e) 1 (f) -46
c
What is the smallest value in -1, -0.0087, 10/9, 3/935?
-1
Which is the smallest value? (a) 2/19 (b) -4 (c) -3 (d) 239 (e) -0.3 (f) 1/30 (g) -5
g
What is the biggest value in 1/4, 7, 10077154?
10077154
What is the biggest value in -92263, -1/4, 4?
4
What is the fourth biggest value in -4, 46, -2, 26653?
-4
What is the second smallest value in 1/4, -0.08436, -1/53?
-1/53
What is the fourth biggest value in -4, 1089, -17762, 5/6?
-17762
Which is the fourth biggest value? (a) -0.1705 (b) 95.7 (c) 3 (d) 5/3
a
Which is the fourth smallest value? (a) -23 (b) 421 (c) 0.5 (d) 1/4
b
What is the third biggest value in 3/7, -7, -5/4, 3194?
-5/4
What is the second biggest value in -2, 0, 2.1, -1217, 2, -2/7?
2
Which is the fourth smallest value? (a) 0.5 (b) 228 (c) 0.1 (d) -3/7 (e) 4 (f) -0.04 (g) 1/7
g
Which is the second biggest value? (a) -26/17 (b) 13964 (c) 4 (d) 0.3
c
What is the third biggest value in 1/6, 4, -8125.462?
-8125.462
Which is the biggest value? (a) 54.59 (b) 2 (c) 0 (d) -3.3
a
Which is the fifth smallest value? (a) 21 (b) 3 (c) 29 (d) -16/9 (e) 0.13
c
What is the third smallest value in -0.5811, -45, 83/9, 2?
2
Which is the smallest value? (a) -2508/223 (b) -0.4 (c) -2/7
a
Which is the fourth biggest value? (a) 3/2 (b) -2/1857 (c) 1 (d) -2/3 (e) 5 (f) 47.6
c
What is the smallest value in 5, 4636/7, 3/100, 2, -2, 0.5?
-2
Which is the smallest value? (a) -188006 (b) 15 (c) -0.1 (d) 0.2
a
What is the biggest value in 19/9, -3/7, 758, -2, 2?
758
Which is the third biggest value? (a) 9 (b) -3/13 (c) -0.81 (d) -1.486
c
What is the third smallest value in -3, -1/5, -13/25, -5, -190?
-3
Which is the third biggest value? (a) -3 (b) 2 (c) 2/17 (d) -1.89 (e) -5 (f) 9
c
What is the smallest value in 2, 18, 51880?
2
Which is the second smallest value? (a) -4 (b) 2/5 (c) 3 (d) -0.3 (e) 1444 (f) -9
a
Which is the sixth biggest value? (a) -65 (b) 2/7 (c) 52.6 (d) -4/9 (e) -0.5 (f) -3
a
Which is the third smallest value? (a) 15 (b) -4 (c) 2 (d) -0.4 (e) 3.544 (f) -1/4
f
Which is the second smallest value? (a) 11 (b) -2/7 (c) 5 (d) 109360 (e) 1
e
What is the third biggest value in -581356.3, 4, -2?
-581356.3
Which is the second smallest value? (a) -61.77 (b) -0.4 (c) -6 (d) 0.0255
c
What is the second biggest value in -527/516, 2/15, -77, 1, 2?
1
What is the third biggest value in 1.8, -2, -180, 0.191, -0.4?
-0.4
Which is the third smallest value? (a) -36843 (b) 6/37 (c) -0.2
b
What is the fourth smallest value in 24, -3, 2/15, -459.25, -2/7, 0.03?
0.03
Which is the fourth biggest value? (a) -0.1 (b) 0.1 (c) 4 (d) -7926/7
d
What is the fourth biggest value in -2/149, 7, -3/7, -785?
-785
Which is the second biggest value? (a) -3 (b) 29048 (c) -6 (d) -134
a
Which is the fourth smallest value? (a) -166/3 (b) -22 (c) -2/19 (d) -3 (e) -367 (f) -2/5
d
What is the second smallest value in 0.1, -4, 23, 14, -1/3, 2, -3/62?
-1/3
What is the third smallest value in -4, 15/11, 16, -154, -4/7?
-4/7
What is the third smallest value in -0.5, -0.06, 0.091, -24, -0.07, -1, 2/5?
-0.5
Which is the fourth smallest value? (a) 17 (b) -3 (c) 0.3 (d) 94921 (e) -1
a
What is the smallest value in 1/3, 5, -6, -196817?
-196817
Which is the third biggest value? (a) -0.1 (b) -1.9 (c) 31/80948
b
Which is the fourth smallest value? (a) -172/29 (b) 10 (c) 1/3 (d) -1018
b
What is the second smallest value in 5/33, -0.4, 1668, 0.5, -25?
-0.4
Which is the second smallest value? (a) 0.42041 (b) 1020 (c) 2/21
a
Which is the fifth smallest value? (
|
{
"pile_set_name": "DM Mathematics"
}
|
All walks of wealth.
Are you ready for an investment and financial growth strategy that’s as unique as you are?
At B|O|S, we’ve developed a powerfully personal, transparent approach to financial planning and wealth management.
We provide our clients with an array of financial services, including personal wealth management, customized financial planning, trust and estate planning, institutional investment strategies for attorneys, and all points in between. Since each client’s unique life and financial history requires its own roadmap, we custom-build a plan for every single client, designed specifically for their individual trajectory. We’re proud to have been in business for over 30 years and over those years we’ve developed some of the most experienced, comprehensive and technically sophisticated capabilities in our industry.
In June of 1930, the U.S. Congress passed the Smoot-Hawley Tariff Act with the goal of protecting American jobs and farmers from foreign competition during the early stages of the Great Depression. Shortly after the tariffs were applied, other countries began to retaliate and in just four years world trade de... continue reading
The Team
Our principals, portfolio managers, and the administrative support teams are exceptionally qualified to serve our clients. With prestigious educational degrees, industry certifications and professional honors, we’re frequently quoted in top national and local financial publications, and consistently recognized by many of those publications as being in their top tier of wealth managers.
B|O|S Recognition
B|O|S is proud to have been recognized as an industry leader in the registered investment advisor space. These accolades and peer-recognitions reflect not only our passion, but also our deep commitment to every aspect of our relationship with our clients.
|
{
"pile_set_name": "Pile-CC"
}
|
Q:
Proper way to say "Look at the sky"
I've been learning japanese for quite a few weeks but I'm still pretty new to it so maybe this question will sound silly, if that's the case, I'm sorry.
Because I really love the way it sounds and looks, I tryed learning japanese. And now, I'd like to get myself a tattoo.
"Look at the sky" (which is one of the last things someone told me before passing away).
Then again I'm learning with books (not the best way, is it?) so I'm running into a doubt.
Would you rather spell it :
空を見て - Sora o mite
or
空を見上げて - Sora wo miagete
I'm having a hard time figuring out the difference (as I'm still a newbie in japanese) and as it's an important decision (the tattoo I mean) I'd really like if someone could explain the difference.
A:
空を見て is "Looking at the sky," and 空を見上げて is "Looking up at the sky". Both are grammatical and make perfect sense as a Japanese sentence.
They are reasonable choices for a book title or a line in a poem, for example. This may also be acceptable on a souvenir T-shirt, a mug or a fan. However, I have to say such a tattoo looks weird and funny to the eye of Japanese people for several reasons.
First of all, Japanese people are very wary of tattoos in the first place, and traditional Japanese tattoos do not have any readable character. But I won't go into detail about cultural things for now. Even if we accept the idea of readable character tattoos, this sentence may not be suitable as the design of a tattoo. People usually expect something that looks cool and exotic in a tattoo. However 空を見(上げ)て is a very plain, casual and easy sentence even a 3-year-old Japanese kid can make. In general hiragana has a cute and/or childish image as a design element, which is probably not what you want for a tattoo. If you used this sentence, it might end up looking as if it were a tattoo in Comic Sans to those who can actually read it.
|
{
"pile_set_name": "StackExchange"
}
|
Clement Starmer
Clement Edwin Starmer (2 December 1895 – 25 July 1978) was an English cricketer active from 1924 to 1928 who played for Leicestershire. He was born in Cosby and died in North Shields. He appeared in three first-class matches as a righthanded batsman who bowled right arm fast medium. He scored nineteen runs with a highest score of 8.
Notes
Category:1895 births
Category:1978 deaths
Category:English cricketers
Category:Leicestershire cricketers
|
{
"pile_set_name": "Wikipedia (en)"
}
|
Thimphu District
Thimphu District (Dzongkha: ཐིམ་ཕུ་རྫོང་ཁག་; Wylie: Thim-phu rdzong-khag) is a dzongkhag (district) of Bhutan. Thimphu is also the capital of Bhutan and the largest city in the whole kingdom.
Languages
The dominant language throughout the district is Dzongkha; however, within the capital nearly every language of Bhutan may be encountered.
Administrative divisions
Thimphu District is divided into eight gewogs and one town (Thimphu):
Chang Gewog
Dagala Gewog
Genyekha Gewog
Kawang Gewog
Lingzhi Gewog
Mewang Gewog
Naro Gewog
Soe Gewog
Lingzhi, Soe and Naro Gewogs belong to the Lingzhi Dungkhag subdistrict, the only subdistrict within Thimphu District. The remaining gewogs do not belong to any subdistrict.
Environment
The northern half of Thimphu District (the gewogs of Kawang, Lingzhi, Naro and Soe – corresponding roughly to Lingzhi Dungkhag) is subject to environmental protection, falling within Jigme Dorji National Park.
See also
Districts of Bhutan
Dungkhag
Thimphu Province
References
External links
Category:Districts of Bhutan
|
{
"pile_set_name": "Wikipedia (en)"
}
|
1. Field of the Invention
The present invention relates to a semiconductor apparatus, and, more particularly, to a semiconductor apparatus including input signal terminals provided for each electrode so that a control signal is applied to a plurality of semiconductor apparatuses connected in parallel with each other.
2. Description of the Prior Art
This kind of semiconductor apparatus comprises a semiconductor power module. By way of an example, such semiconductor power module will be described in the following.
FIG. 1 shows a perspective view of a conventional semiconductor power module. The power module 1 contains two transistor devices therein. A common collector-emitter electrode terminal 2, an emitter electrode terminal 3 and a collector electrode terminal 4 are provided, as main electrode terminals, on the upper surface of the power module 1. An input signal terminal comprises a base signal terminal 5 and emitter signal terminal 6 for one transistor device, and a base signal terminal 8 and an emitter signal terminal 7 for the other transistor device, as shown in FIG. 1. A single input signal terminal is provided for each electrode.
In general, a plurality of semiconductor power modules have been often used in a parallel connected manner so that the plurality of semiconductor power modules are operated in response to a single control signal. FIG. 2 shows a conventional parallel connection of the plurality of power modules 1, 1, . . . in which each signal terminal is connected in parallel with each other. More particularly, a control signal generating apparatus 9 is connected to the base signal terminal 5 in the first power module 1 through a wire 11a. The base signal terminal 5 in the first power module 1 is also connected to the base signal terminal 5 in the second power module 1, which is, in turn, connected to the base signal terminal 5 in the third power module, and so on. Similarly, as shown in a dotted line, each of emitter signal terminals 6, 6, . . . of the power modules 1, 1, . . . is connected in parallel with each other. The signal terminals 7 and 8 in each power module are also connected in parallel in the same manner.
As described in the foregoing, each semiconductor power module 1 comprises a single signal terminal for each electrode and thus, a wiring apparatus 10 for parallel connection for transmitting a control signal from the control signal generating apparatus 9 is structured as shown in FIG. 3. The wiring apparatus 10 comprises a plurality of contacts 12, wires 11 connected therebetween and a wire 11a connected between the control signal generating apparatus and the first contact corresponding to the first power module. The number of contacts 12 corresponds to the number of the power modules to be connected in parallel. A serial connection of the plurality of contacts and the wires 11 and 11a constitutes a single continuous wiring apparatus 10 for parallel connection. By using such wiring apparatus 10, more particularly, by inserting each connecting contact 12 into a corresponding signal terminal, a plurality of power modules are connected in parallel with each other.
However, in the above described conventional power module 1, a continuous wiring apparatus structured as shown in FIG. 3 is required for connecting the signal terminals in the plurality of power modules in parallel with each other and, in addition, if the number of the parallel connections that is, the number of the power modules changes, the wiring apparatus 10 must be correspondingly reconstructed.
|
{
"pile_set_name": "USPTO Backgrounds"
}
|
Burns Lake’s new director of finance Susan Meeds explains in a recent report that the village’s accounting system is not well structured for reporting wages separately.
(Lakes District News file photo)
Burns Lake improving transparency
The Village of Burns Lake is taking steps to improve its transparency this budget season.
According to council members, administrative wages have not been clearly identifiable in the village’s budget reports. During a budget meeting earlier this year, council requested that administrative wages be reported separately in the future.
Burns Lake’s new director of finance Susan Meeds explains in a recent report that the village’s current accounting system is not well structured for reporting wages separately.
“In many cases, the wages are lumped in with materials and other costs for the various activities,” she said.
Meeds said she plans to gradually revise the system over the next year to make it “more suitable for the current reporting environment.”
“Once this is complete, the wages will be shown separately for each activity,” she said.
In the interim, a separate report on wages will be presented to council for review during upcoming budget meetings.
Burns Lake’s 2017 budget included a 1.5 per cent increase to all staff wages. Although union staff were entitled to a 1.5 per cent increase as per their union agreement, non-union staff were not.
The 1.5 per cent wage increase to union staff will cost the municipality an additional $12,500 per year while the 1.5 per cent wage increase to non-union staff will cost the village approximately $10,000 per year.
Some of Burns Lake’s staff wages have significantly increased over the past decade. Burns Lake’s chief administrative officer received $72,493 in 2006; $97,375 in 2009; and $115,460 in 2015. The village’s director of protective services received $60,637 in 2006; $72,420 in 2009; and $87,062 in 2015.
The wage rise over the years has been justified as bringing Burns Lake wages in line with other B.C. communities of similar size and population.
Earlier this year, Burns Lake councillors expressed concerns over an “unusual” financial transaction in the village’s financial statements. The statement in question was a loan in the amount of $80,000 to the Lakes District Family Enhancement Society (LDFES).
The village was acting as a financial intermediary between LDFES and granting agencies so that the funds could be passed on to the society. However, the loan was provided to LDFES before any grant funding was received by the municipality.
Councillor Michael Riis-Christianson said transactions of this type could expose the municipality to “unacceptable levels of risk.”
|
{
"pile_set_name": "Pile-CC"
}
|
Q:
strange IDE in Visual Studio
In my VS2015 there is a strange HTML tree nodes view of my MVC View. This tree nodes view occupies 1/4 of the screen all the time. I don't know what addon I added. There is no way to dismiss it. Does any know?
A:
I solved the problem by disable the suspected add-on one at a time until the problem goes away. Interestingly, when I re-enable each of the disabled add-on, the problem goes away without removing any add-on.
|
{
"pile_set_name": "StackExchange"
}
|
//
// RACSerialDisposable.m
// ReactiveCocoa
//
// Created by Justin Spahr-Summers on 2013-07-22.
// Copyright (c) 2013 GitHub, Inc. All rights reserved.
//
#import "RACSerialDisposable.h"
#import <libkern/OSAtomic.h>
@interface RACSerialDisposable () {
// A reference to the receiver's `disposable`. This variable must only be
// modified atomically.
//
// If this is `self`, no `disposable` has been set, but the receiver has not
// been disposed of yet. `self` is never stored retained.
//
// If this is `nil`, the receiver has been disposed.
//
// Otherwise, this is a retained reference to the inner disposable and the
// receiver has not been disposed of yet.
void * volatile _disposablePtr;
}
@end
@implementation RACSerialDisposable
#pragma mark Properties
- (BOOL)isDisposed {
return _disposablePtr == nil;
}
- (RACDisposable *)disposable {
RACDisposable *disposable = (__bridge id)_disposablePtr;
return (disposable == self ? nil : disposable);
}
- (void)setDisposable:(RACDisposable *)disposable {
[self swapInDisposable:disposable];
}
#pragma mark Lifecycle
+ (instancetype)serialDisposableWithDisposable:(RACDisposable *)disposable {
RACSerialDisposable *serialDisposable = [[self alloc] init];
serialDisposable.disposable = disposable;
return serialDisposable;
}
- (id)init {
self = [super init];
if (self == nil) return nil;
_disposablePtr = (__bridge void *)self;
OSMemoryBarrier();
return self;
}
- (id)initWithBlock:(void (^)(void))block {
self = [self init];
if (self == nil) return nil;
self.disposable = [RACDisposable disposableWithBlock:block];
return self;
}
- (void)dealloc {
self.disposable = nil;
}
#pragma mark Inner Disposable
- (RACDisposable *)swapInDisposable:(RACDisposable *)newDisposable {
void * const selfPtr = (__bridge void *)self;
// Only retain the new disposable if it's not `self`.
// Take ownership before attempting the swap so that a subsequent swap
// receives an owned reference.
void *newDisposablePtr = selfPtr;
if (newDisposable != nil) {
newDisposablePtr = (void *)CFBridgingRetain(newDisposable);
}
void *existingDisposablePtr;
// Keep trying while we're not disposed.
while ((existingDisposablePtr = _disposablePtr) != NULL) {
if (!OSAtomicCompareAndSwapPtrBarrier(existingDisposablePtr, newDisposablePtr, &_disposablePtr)) {
continue;
}
// Return nil if _disposablePtr was set to self. Otherwise, release
// the old value and return it as an object.
if (existingDisposablePtr == selfPtr) {
return nil;
} else {
return CFBridgingRelease(existingDisposablePtr);
}
}
// At this point, we've found out that we were already disposed.
[newDisposable dispose];
// Failed to swap, clean up the ownership we took prior to the swap.
if (newDisposable != nil) {
CFRelease(newDisposablePtr);
}
return nil;
}
#pragma mark Disposal
- (void)dispose {
void *existingDisposablePtr;
while ((existingDisposablePtr = _disposablePtr) != NULL) {
if (OSAtomicCompareAndSwapPtrBarrier(existingDisposablePtr, NULL, &_disposablePtr)) {
if (existingDisposablePtr != (__bridge void *)self) {
RACDisposable *existingDisposable = CFBridgingRelease(existingDisposablePtr);
[existingDisposable dispose];
}
break;
}
}
}
@end
|
{
"pile_set_name": "Github"
}
|
Si algo hemos aprendido en los meses que llevamos en la Asamblea de Madrid es a experimentar y vivir en primera persona que “las instituciones son un traje a medida de quien las ha diseñado” como dijo Teresa Rodríguez el domingo pasado. Que aquí todo está pensado y bien atado para que quienes entren acaben por no querer, o no poder, ser leales los intereses y las necesidades de las mayorías.
Pero también desde que estamos aquí hemos aprendido, al menos, dos cosas más. En primer lugar, que se pueden hacer y cambiar muchas cosas desde las comunidades. Hay que tener voluntad para ello. Y sobre todo si hablamos de los servicios sociales que consisten en garantizar derechos sociales y libertades civiles. Así lo entendió bien el gobierno de Esperanza Aguirre, que se puso manos a la obra para construir, desde “sus” instituciones, sociedad civil e ideología.
En segundo lugar, que podemos conocer desde una perspectiva diferente la misma realidad. La misma que denuncian los movimientos sociales, la misma que se vive en la calle. Gente que está excluida del bienestar, de los derechos humanos, de los recursos o de la igualdad. Muchas personas, con problemas diversos, unas veces organizadas y otras no, que piden que alguien les de voz. Por desgracia, conocemos casos que son realmente terroríficos.
Una de esas realidades es la de madres que llevan años denunciando que sus hijos o hijas han sufrido abusos sexuales por parte de sus padres. Son muchos los casos que ante la invisibilidad a la que son sometidos, ante el ninguneo, e incluso ante la amenaza en algunos casos, han constituido la asociación Infancia Libre. Son menores que sufren una permanente vulneración de sus derechos más básicos y para quienes el “interés superior del menor” no significa nada. Y esta vulneración de derechos se produce no sólo por parte de quienes han abusado sexualmente de ellos, sino también por parte de una administración que ni les protege ni garantiza sus derechos.
Es por ejemplo el caso de una menor de 6 años que declaraba en uno de los CAI (centro de atención a la infancia) como su padre le ponía la cabeza en la zona genital y le hacía daño. Él declaraba que “la niña es una manipuladora y mentirosa”. La situación sigue siendo la de que el padre tiene a la niña la mitad del tiempo y la Fiscalía no ha sentido que haya que aplicar medidas cautelares. Y como éste hay otros muchos casos terribles. Las madres han acudido a todo tipo de instancias para pedir ayuda y una solución. La respuesta por parte de la justicia ha sido archivar los casos de forma reiterada a pesar de las declaraciones de los y las menores de edad, que culpan claramente a sus padres de abusar sexualmente de ellos.
Detrás de estas decisiones de la justicia está el SAP. El síndrome de alienación parental dice describir un “desorden psicopatológico en el cual un niño, de forma permanente, denigra e insulta sin justificación alguna a uno de sus progenitores, generalmente, pero no exclusivamente, el padre”. La existencia del SAP no está probada científicamente. Se acuñó en 1985 en EEUU por parte del psiquiatra Richard Gardner, posteriormente probado pedófilo, a pesar de lo cual este síndrome sigue siendo defendido reiteradamente por asociaciones de Padres Separados por la Custodia Compartida y por asociaciones que bajo la defensa de “igualdad efectiva” instalan en la sociedad mitos que atentan contra los derechos de las mujeres. Si bien no suele utilizarse como prueba jurídica en la mayoría de los casos, la ideología machista y en concreto el convencimiento de que existe el SAP está detrás de muchas de las decisiones de los magistrados.
El machismo también está en las administraciones públicas y en los servicios sociales. La política de privatización y externalización llevada a cabo por los sucesivos gobiernos del PP tiene varios intereses: que sus amigos empresarios puedan hacer negocio –obviamente a cambio de recompensas como un puesto en un Consejo de administración o una buena donación-, construir un modelo de sociedad basado en la desigualdad y en la segregación, y su perpetuación en el poder. Por eso esta comunidad ha sido el laboratorio de las políticas neoliberales y también del conservadurismo y el pensamiento más reaccionario. Y por eso desde el Gobierno se ha llevado a cabo la cesión de la gestión de los servicios sociales a fundaciones y empresas relacionadas con la Iglesia Católica o con otras agrupaciones como los Legionarios de Cristo. Colegios concertados, centros de protección para menores de edad y centros de ejecución de medidas judiciales (nada menos que cárceles gestionadas por empresas privadas) o los CEPIS. Llama la atención especialmente el caso de los Centros de Apoyo y Encuentro Familiar (CAEF) o el Centro Especializado de Intervención en Abuso Sexual Infantil (CIASI), que nació ya privatizado en el año 2005 y que es el lugar al que deben acudir menores que han sufrido abusos sexuales.
Estas madres acudieron al CIASI con sus hijos e hijas. La respuesta que han encontrado en varias ocasiones ha sido la de “mejor no denunciéis porque os pueden quitar a vuestras hijas”. Da miedo que esa sea la respuesta por parte de un servicio público a unas madres que están desesperadas y solas ante la posibilidad de que quienes están abusando sexualmente de sus hijos se los lleven los fines de semana y que archiven los casos a pesar de las evidencias. Algunas de estas madres están teniendo que pagar a un abogado o abogada un dinero que no tienen, y en muchos casos multas de hasta 600 euros al mes por saltarse el régimen de visitas. Hay otras madres que no pueden ni denunciar por la falta de recursos y que se ven obligadas a una vida entera viendo como sus hijas son objeto de abusos sexuales.
El hecho de que estas madres tengan que soportar que un servicio social -que está para garantizar los derechos de la ciudadanía y en este caso de los menores de edad-les recomiende no denunciar por su propio bien, evidencia claramente que esta sociedad no está hoy preparada para dar una respuesta correcta a la violencia machista –ni sus instituciones, ni las administraciones, ni la justicia- , ni a la vulneración de los derechos de los y las menores de edad. En nuestras manos está cambiarlo.
|
{
"pile_set_name": "OpenWebText2"
}
|
Roseburg 50s bands
If sock hops and doo-wop have you ready to hand jive, a 50s Band could be the perfect choice for your next event: birthday parties, weddings, anniversary parties, and more. GigMasters will help you find the best bands in the Roseburg, OR area.
BOOK WITH CONFIDENCE
Best live Oldies bands on the west coast are the terms that would best describe this group and the sound samples you hear on the Demos are an exact replica of what you will hear when Your 50s Band (previously known for 10 years as the Dance Tonight Band) performs for your party! We will make your party come alive and we guarantee it!
If you love the oldies but goodies you will really enjoy this group because they play the best top of the chart oldies ever recorded! It wont take long for...(more)
Since 2010, Decades (Chico, CA) has been working (and rocking) around the clock to learn material spanning from the 1940's (Glenn Miller Orchestra's "In The Mood") to today (Bruno Mars' "Uptown Funk"). The band played 125 performances throughout the West Coast for 2015, and already have 75+ confirmed shows for 2016, earning its place as one of California's most in-demand bands. Its live shows are highly energetic and showcase the members' versatile instrumentation (including sax, harmonica,...(more)
The Cantaliers are Northern California's hottest new blend of early Rock & Roll, Rockabilly, and Surf. No venue is too large or too small for this band as they play to the crowd. For the last twenty years, band leader, Phil Grajeda, has been entertaining Northern California. Performances include the Burgie Men Car Club, Woodland Street Cruisers Car Club, Del Paso Country Club, Sutter Club, Double Tree Hotel New Years Eve Gala, Raley Field and countless others. Whether planning for a corporate...(more)
The Abe Train is a young professional and highly in demand Jazz Quartet based in the San Francisco Bay Area. Consisting of Piano, Upright Bass, Drums, and Saxophone, each member of the band is an expert at his instrument and together the band generates a dynamic and authentic Jazz sound, while constantly showcasing individuality in their music which is the main hallmark of Jazz. The band performs all the classics of Jazz with distinctive arrangements that are both faithful to the rich...(more)
The Alison Sharino Band is a high energy, versatile dance band that appeals to every age group. The band is an amazing group of musicians who love what they do. When people hear the band, they always comment on the incredible singing, both male and female. Guitar, keyboards, bass, drums, saxophone and four-part harmonies round out the full sound of this fun group. The result is a band with the kind of contagious energy to keep any crowd dancing all night long and a song list that covers every...(more)
We take pride in our name, Good Co is just that! We play swing, hot jazz, and Electro Swing to turn any night into a dance party but are equally at home performing standards to create the perfect atmosphere for any event. Our band is made up of some of the finest professional musicians in Seattle and we are able to be flexible to accommodate special requests.
Good Co has performed all over the US and Canada for music festivals, conventions, burlesque performances, and anywhere else...(more)
The Speakeasies are the perfect band to serve as either a soothing backdrop for an intimate evening with friends (soft acoustic jazz, 30's and 40's swing) or a sultry soundtrack of classic Soul and Blues from the 50's and 60's.
Comprised of some of the top jazz and world musicians in the San Francisco and North California area, The Speakeasies set themselves apart from other bands in their stylistic versatility and ability to adapt to your specific taste, budget, volume and space...(more)
Retro Jukebox Band is made up of world-class jazz musicians, who cover an immense repertoire in multiple genres. We pride ourselves in delivering a timeless sound that includes classic songs from the 20's- 60's Jazz, Blues, Motown/Soul and Retro versions of today's hits.
When you think back on those great concerts that you've seen in person or on video from the past, the main ingredient was "Entertainment". Well that is the mission at hand when Retro Jukebox takes the stage. Lively,...(more)
Authentic Touring New Orleans Jazz Brass Band, tours Internationally and performs for Concerts, Festivals, Fairs, Colleges, Dances, Weddings, Funerals, Life Celebrations, Corporate shows, Casinos, Parades and many other functions wanting High Energy Colorful Entertainment. Prices are relevant to the travel situation, number of players and related expenses, and can be Pro rated for engagements of multiple dates. Engagements within a 100 mile radius of San Francisco are negotiable for...(more)
A native of the Pacific Northwest, saxophonist Kareem Kandi is a performer, composer, and educator, in high demand for his talents both on and off the stage.
Kareem is a versatile musician with strong roots in the traditions of Jazz, Blues, and Funk, and has been performing on the scene for years, gaining attention from critics and audiences alike. While staying true to musical styles of the past, he also keeps an eye towards the future by composing original music as well as new...(more)
The Bay Area's Queen of Jazz, Blues, and R&B is known internationally as one of the premiere vocalists of her time. Ms. Carol has been a staple in Bay Area music for decades, and her most recent honors include 2014 Jazz Hero Award and induction into the Oakland Blues Walk of of Fame. Capable of bringing the party with a full band that will get your guests on the dance floor or providing background music for a chic cocktail party, we can work with you to provide exactly what you need for your...(more)
Campbell's Jazz Soup plays a fun blend of 1920s, 30s, 40s, and 50s jazz and swing at events, parties, festivals, and weddings throughout the San Francisco Bay Area and beyond. Leader Brian Campbell serves up a tasty stew of hot clarinet, swinging saxophone, and hearty vocals. Mixed in to provide a feast for the ears is bluesy guitar and driving string bass. We play everything from mellow background jazz to upbeat danceable swing.
The band can perform with up to seven members by including...(more)
If you are looking for an exciting professional live band to entertain your guests, then look no further.
Let us provide the music that brings out the JAZZ IN YOU.
Celebrate in style with the distinctive music of the Jacqueline Tabor Jazz Band. Our repertoire contains timeless jazz from the American Song Book. Our refined classic music beautifully embraces your guests to sets an inviting tone and creates an enjoyable atmosphere...(more)
The SF Bay Area's #1 rated jazz group! With recent notable public performances at San Francisco's Fillmore Jazz Festival, San Jose Jazz Festival, SF Lindy Exchange, San Francisco Symphony Opening Night Gala, and SF North Beach Festival, why hire anyone else? Go with the best!
Saxophonist/bandleader Fil Lorenz has performed with the top names in the business, from the Big Bands of Glenn Miller and Tommy Dorsey, to 60s icons Frankie Valli and The Four Seasons, Soul and Motown legends Gladys...(more)
Since 2010, Decades (based in Chico, CA) has been working (and rocking) around the clock to learn material spanning from the 1940's (Glenn Miller's Orchestra's "In The Mood") to today (Bruno Mars & Mark Ronson's "Uptown Funk"). The band played 125 shows throughout the West Coast in 2015, and have already confirmed 75+ shows for 2016, earning its place as one of California's most in-demand bands. Throughout a single show, they'll swap between several instruments, including saxophone,...(more)
Saxophonist/bandleader Fil Lorenz has performed with the top names in the business, from the Big Bands of Glenn Miller and Tommy Dorsey, to 60s icons Frankie Valli and The Four Seasons, Soul and Motown legends Gladys Knight and Mary Wilson (of the Supremes), Bobby Caldwell, modern day soul/R&B star, Seal...and many, many others.
He brings a vast array of musical experiences to the table and his band is always stocked with the area's A-list players, all of whom have equally extensive...(more)
Since 2010, Decades (Chico, CA) has been working (and rocking) around the clock to learn material spanning from the 1940's (Glenn Miller Orchestra's "In The Mood") to today (Robin Thicke's "Blurred Lines"). The band played 125 performances throughout the West Coast for 2015, and already have 75+ confirmed shows for 2016, earning its place as one of California's most in-demand bands. Its live shows are highly energetic and showcase the members' versatile instrumentation (including sax,...(more)
Raquel has been hired by wedding and corporate clients from France, England, Greece, and all over the United States as far as North Carolina, Florida, New York and more. Some of her clients: Apple, Adobe, Macy's, Mercedes Benz, Yoshi's Jazz Club, Whole Foods, Disney Museum, Academy of Sciences, Exploratorium, Cruise Ships, wineries, hotels, universities, restaurants, clubs, and more. Find out why clients hire her back again and again.
Vocals and Instrumental: Duo, Trio, Quartet,...(more)
THE COSMO ALLEYCATS BAND
Based in San Francisco, and serving Northern and Southern California, The Cosmo Alleycats Band is a full-service dance band that performs at Private Events, Corporate Parties, and Weddings. We perform a wide range of vintage dance music with a dynamic and soulful delivery. Our core repertoire highlights several decades of exciting music:
1920s & 30s JAZZ - NEW ORLEANS - BIG BAND SWING
MOTOWN - R&B - SOUL
CONTEMPORARY REMIX
Experienced and...(more)
The Apollo Trio has gained a well-deserved renown for their hepped-up, honest and eccentric interpretation of the Great American Songbook. Fiery renditions of favorites from Cole, Billie, Django and Nat are the matchsticks to light up any evening. The Apollo Trio is about more than sentiment. They're about beat. From the croon to the thump, its a heart that moves. They're giving audiences around the world a take home smile, If not a few sore feet.
Reading a room is a rare art. Some folks...(more)
Famous Players Band is Vancouver's best dance band, party band, cover band, and wedding band, offering live dance music for weddings and special events, corporate functions and private parties. Famous Players Band is composed of a group of talented musicians at the top of their craft who have been performing together for years, creating a powerful musical synergy that makes you and your guests want to get up and dance the night away! They have mastered every musical genre and can seamlessly...(more)
Recent inductee into"The Blues Hall of Fame"Guitarist/Singer/Songwriter Richie Blue's blistering guitar playing and heart and soul vocals have taken him to his current status as one of the top drawing acts on the club and festival circuit all over California, the northwestern states, Canada, and Mexico. His brand of music although rooted in the blues, is a blend of rock-a-billy, country swing, New Orleans swamp, and soul.
Born and raised in Washington State, Richie won his first...(more)
It's that Old Hollywood sound and feel you have been looking for. Classic standards from the 1920s,1930s, 1940s, 1950s. And let's not forget the Rat Pack Era of the 1960s. Frank, Dean, Ella, Bing, Nat 'King' Cole, Harry Connick Jr., Michael Buble, and so many more. Our artists preserves the timing, swagger and traditional style that made the songs of these eras so irresistible. We performs this timeless material in a flexible variety of ensemble sizes suited for your event. From a Duo to a...(more)
THE COSMO ALLEYCATS BAND - OUR SOUND
Based in San Francisco, and serving Northern and Southern California, The Cosmo Alleycats Band is a full-service dance band that performs at Private Events, Corporate Parties, and Weddings. We perform a wide range of vintage dance music with a dynamic and soulful delivery. Our core repertoire highlights several decades of exciting music:
1920s & 30s JAZZ - NEW ORLEANS - BIG BAND SWING
MOTOWN - R&B - SOUL
...(more)
The Screamin' End - Roots Rock, Rockabilly and Blues band. 4-8 piece band based in Chicago. We can add one or more horns for special events. Recorded at Sun Studio in Memphis, TN, Krazy Eddie and The Screamin' End came back to their sweet home Chicago to bring YOU that Juke Joint sound! From the roots of rock, to rockabilly, swing and jumpin' blues, you'll tap your feet and clap your hands - then jump up to dance! Come to a show and see what you've been missing. Well ........
Performing...(more)
|
{
"pile_set_name": "Pile-CC"
}
|
and Saeko acquire an amphibious vehicle to help evade the zombies and set up on a sand bank in the middle of the river. Later, they ditch their vehicle in a park fountain to lure the zombies whilst Saeko attacks them. However, Saeko freezes when she comes across some zombified children, forcing Takashi to help her. They decide to camp out at a shrine, where Saeko reveals that, four years ago, she almost killed an attacker and enjoyed it, saying she hasn't changed since that day and doesn't deserve love also as the scene cut out it shows Takashi kissing her. The next morning, as zombies start to surround them and Saeko becomes afraid, Takashi tells her that he's always admired her, giving her the motivation to defeat the zombies with a real sword. Accepting Saeko's dark side, she and Takashi safely make it to Saya's house...
|
{
"pile_set_name": "Pile-CC"
}
|
Are you looking for something interesting to do on a family night? Consider solving photo puzzles. Sit the kids and husband down on a weekend evening and try to put together pieces of a puzzle with cool themes. With Giving Assistant, you can save on custom photo puzzles featuring personalized images such as of yourself, your pets, your relatives and other interesting subjects. Use coupons to save on photo puzzles for kids with themes involving popular animated characters and video games. Apply a digital promo code on puzzle collections featuring photos of world-famous landmarks, beautiful landscapes and other natural wonders.
|
{
"pile_set_name": "Pile-CC"
}
|
61356074
-44345989 times 0.25
-11086497.25
-1.8*419424
-754963.2
Calculate -51864.64*-0.036.
1867.12704
Product of 140.929 and 431.
60740.399
Multiply 149483787 and -0.3.
-44845136.1
0.2784 * -5.88
-1.636992
3656.72 times -0.3
-1097.016
Multiply -2 and 22600.684.
-45201.368
What is -3 times -0.267082?
0.801246
Multiply -177 and -0.0254982.
4.5131814
Work out 156995 * -0.068.
-10675.66
Work out 0 * 12855950.
0
What is 17537 times -14.8?
-259547.6
6.271358*89
558.150862
-3 times -108.269565
324.808695
Work out 6483990 * -0.04.
-259359.6
-726*49.2
-35719.2
What is the product of 71618.6 and 1.6?
114589.76
Product of 1.513454 and 1173.
1775.281542
-0.7 times 242223.7
-169556.59
Product of -2 and 265014.677.
-530029.354
-2.773 * -15.0404
41.7070292
-61195 * -133
8138935
-35 times 274900
-9621500
Calculate 0.2041*-3918.42.
-799.749522
Product of 3.92 and -587225.
-2301922
What is the product of 3097197 and -31?
-96013107
-0.88*24266
-21354.08
18664 times 368
6868352
What is 5589 times 31.6?
176612.4
What is the product of -8 and -3212297?
25698376
Multiply 0.0764308 and 33.
2.5222164
What is the product of 308 and -641746?
-197657768
Product of 52677 and 171.
9007767
Calculate 0.26*-2697301.
-701298.26
Product of 0.2 and 2216215.
443243
-4.734355*-0.4
1.893742
What is the product of 3000 and 5.417?
16251
0.1276 * 134.6
17.17496
Calculate 2203.5802*0.4.
881.43208
What is -2958 times 464.4?
-1373695.2
What is 2 times 867632?
1735264
Calculate 4693.32*-28.6.
-134228.952
What is the product of 0.4 and -651.09213?
-260.436852
Work out 3 * -3164565.
-9493695
Work out -1.985 * -3766.
7475.51
Calculate -18988340*-0.01.
189883.4
Calculate -6363.8*2575.
-16386785
Product of 10131 and -97.3.
-985746.3
-34053971 * 2
-68107942
-0.26 * -865432
225012.32
What is the product of 2374.9082 and 0.1?
237.49082
7 * -406017.9
-2842125.3
What is the product of 0.04516 and 74?
3.34184
What is the product of -178227978 and -0.2?
35645595.6
Product of 0.2 and 102681616.
20536323.2
What is the product of -18.47234 and 0?
0
Product of 46 and -17.42828.
-801.70088
Work out -21.345 * -79.
1686.255
7135716*0.3
2140714.8
What is the product of 72.378 and -4.7?
-340.1766
Product of -0.1 and 2489706.
-248970.6
-0.0164 times 216.234
-3.5462376
Multiply 0.872897 and -1.4.
-1.2220558
Multiply -0.9 and 110.393308.
-99.3539772
14752 times 242.95
3583998.4
Product of 185946 and -0.118.
-21941.628
Product of 0.6977 and -906.
-632.1162
2204 times -41532
-91536528
82431 * 1082
89190342
-10 * -0.0695
0.695
4941373*-0.38
-1877721.74
878.0095*-3
-2634.0285
Multiply -64471656 and 0.1.
-6447165.6
Work out -0.008 * -360097.2.
2880.7776
Multiply 0.5300512 and 1.3.
0.68906656
27.888*-12301
-343050.288
Work out 2097975 * -36.8.
-77205480
What is -70475.04 times 3?
-211425.12
Product of -0.4 and 1093.3695.
-437.3478
Product of 4298913 and 0.1.
429891.3
-1444268*-0.1
144426.8
-1344 * 305.811
-411009.984
Calculate -2906977*6.
-17441862
Product of -0.7 and -724018.
506812.6
What is the product of -48107675 and 0.4?
-19243070
Work out -87 * 48330.
-4204710
Multiply 69 and -22505.6.
-1552886.4
-5.57 times -54695
304651.15
Multiply 0.1024644 and 3.
0.3073932
What is the product of -67547 and 242?
-16346374
0.212 times -692148
-146735.376
What is 646.06305 times 0?
0
0.1*18295282
1829528.2
56087587 * -14
-785226218
69 * 55895.3
3856775.7
What is the product of -166979542 and -4?
667918168
Product of 517 and -0.197.
-101.849
Work out -2362385 * 0.23.
-543348.55
Work out 0.2 * 5847477.
1169495.4
What is -1746.6 times -489?
854087.4
Multiply -0.0041 and -8111.5.
33.25715
Work out 0.8 * -0.1881982.
-0.15055856
Product of -1489259.6 and -1.3.
1936037.48
Product of -41700190 and 0.
0
-128059062 times -0.3
38417718.6
Multiply 72243 and 0.66.
47680.38
-561293 * 0.2
-112258.6
5.9*-178863
-1055291.7
Calculate -164325*260.
-42724500
Product of -5.0895 and 871.
-4432.9545
What is the product of 8 and 0.8923305?
7.138644
What is -2.018 times -281200?
567461.6
1.6 times -22688762
-36302019.2
What is the product of 0.1 and 63.5133?
6.35133
What is -2028 times -244746?
496344888
Product of -51.7 and 99723.
-5155679.1
Product of 0.66963 and -10764.
-7207.89732
What is the product of 1.1 and -0.14744103?
-0.162185133
What is the product of -7258 and 7516?
-54551128
What is the product of -532.68 and -0.762?
405.90216
What is 16 times 47.51561?
760.24976
Multiply 0.1649 and 7.6.
1.25324
Work out -818.1523 * 5.
-4090.7615
106.98936 * -5
-534.9468
Multiply 156 and -124611.
-19439316
46367117*4
185468468
Work out 0.169 * -7154278.
-1209072.982
-76714600 times 0.1
-7671460
Work out 488.01296 * -0.3.
-146.403888
Calculate -398789806*-0.4.
159515922.4
Calculate 560*3843.58.
2152404.8
-142569132*-1
142569132
Product of -0.00922 and -0.206822.
0.00190689884
-177 times 13892
-2458884
0.7*-0.1386
-0.09702
What is the product of 0.97113 and -25?
-24.27825
Product of -37.7 and 1.1195.
-42.20515
510 times -1.227
-625.77
6 * 0.84957
5.09742
3181189.4 * -0.3
-954356.82
Multiply -1.38 and -7.49748.
10.3465224
Work out 2.61483 * 1.
2.61483
Calculate 0.3*2410.777.
723.2331
Calculate -2169*-6.698.
14527.962
What is -1199945 times 2.6?
-3119857
Work out 0.16937067 * -7.1.
-1.202531757
What is the product of 965158.14 and -2?
-1930316.28
Work out -9.2 * -20.83249.
191.658908
Multiply -5467460 and 16.
-87479360
Multiply 240.26 and 1120.
269091.2
What is 1693042.25 times 0.1?
169304.225
Multiply 2.664095 and -16.
-42.62552
Calculate -0.536876*-28.4.
15.2472784
-2587.032 * 3
-7761.096
What is the product of 293301 and 4.7?
1378514.7
What is 11412 times 0.22446?
2561.53752
Multiply 3042181 and -19.
-57801439
Product of -0.6 and -8104514.
4862708.4
Multiply -7785 and 0.705.
-5488.425
Product of -0.5 and 13720932.
-6860466
0*-148.66903
0
Calculate -0.04*-443.8.
17.752
-4.2 times 195555
-821331
What is the product of -1114 and -0.076511?
85.233254
What is the product of 2154724 and -0.2?
-430944.8
Multiply 23803601 and 1.2.
28564321.2
Product of 239 and 2387.
570493
-16177616 times 2
-32355232
Calculate -4*134.134.
-536.536
Calculate 736.56*-71.
-52295.76
Multiply -5341.2 and 229.8.
-1227407.76
Product of 0 and 5718163.
0
What is 0.02 times -34448866?
-688977.32
Product of 392816 and 0.13.
51066.08
Work out 1734939 * -0.258.
-447614.262
48.5 * 21.7241
1053.61885
Multiply -31974144 and -0.3.
9592243.2
Multiply 2593.3 and -2439.
-6325058.7
Multiply 5 and -13347899.
-66739495
Calculate 25614143*4.
102456572
What is the product of 374.869 and 0.044?
16.494236
Calculate -0.00694*2.7283.
-0.018934402
Multiply 0.4288 and -11032.
-4730.5216
Multiply -0.06 and 3359465.
-201567.9
What is -2.2 times -2.4526507?
5.39583154
Product of -4 and 53.43351.
-213.73404
What is 0.3 times 0.58364685?
0.175094055
Product of -2830860.74 and -1.
2830860.74
-244 * 36329
-8864276
121 times 2508303
303504663
What is -8 times 22953370?
-183626960
-427269*1.8
-769084.2
1 * -25360397
-25360397
-4 * -4.640566
18.562264
Product of -10.0352 and -592.
5940.8384
0.102841 * 0.057
0.005861937
Multiply 38001658 and -2.
-76003316
-42 times -100818
4234356
Work out 2 * 10824447.1.
21648894.2
Product of 39256504 and -0.4.
-15702601.6
Calculate -3035821*23.
-69823883
-4*3357490
-13429960
What is 18.54 times -0.05971?
-1.1070234
14376*1234
17739984
What is the product of 7 and -2391201?
-16738407
Work out 183 * 4426.3.
810012.9
What is the product of -11574 and -534?
6180516
Multiply 8.2 and -3.90998.
-32.061836
-2.93 * 230677
-675883.61
Work out -0.095 * -0.237507.
0.022563165
Product of 17853 and 0.163.
2910.039
Multiply 4 and 1708.382.
6833.528
What is 0.2966 times -6876?
-2039.4216
What is the product of 1463 and -0.02198?
-32.15674
Calculate -474213.34*0.4.
-189685.336
What is the product of 0.273 and 0.041238?
0.011257974
Work out -0.7 * 84551.77.
-59186.239
0.06 * 29292207
1757532.42
20*857348
17146960
10758 times 3001
32284758
What is the product of 2 and 5882518?
11765036
What is -364087 times 0.017?
-6189.479
-16.6 times 0.14822
-2.460452
54404*803
43686412
What is -93 times -0.0696?
6.4728
What is the product of 2277 and 275?
626175
Multiply -0.1 and 23843116.
-2384311.6
Work out 15930974 * -0.06.
-955858.44
Product of -0.03531 and -7099.
250.66569
Calculate -14*6799.
-95186
Produc
|
{
"pile_set_name": "DM Mathematics"
}
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.