text
stringlengths 1
3.78M
| meta
dict |
|---|---|
Regulation of Jumonji-domain-containing histone demethylases by hypoxia-inducible factor (HIF)-1alpha.
The transcription factor HIF (hypoxia-inducible factor) mediates a highly pleiotrophic response to hypoxia. Many recent studies have focused on defining the extent of this transcriptional response. In the present study we have analysed regulation by hypoxia among transcripts encoding human Fe(II)- and 2-oxoglutarate-dependent oxygenases. Our results show that many of these genes are regulated by hypoxia and define two groups of histone demethylases as new classes of hypoxia-regulated genes. Patterns of induction were consistent across a range of cell lines with JMJD1A (where JMJD is Jumonji-domain containing) and JMJD2B demonstrating robust, and JMJD2C more modest, up-regulation by hypoxia. Functional genetic and chromatin immunoprecipitation studies demonstrated the importance of HIF-1alpha in mediating these responses. Given the importance of histone methylation status in defining patterns of gene expression under different physiological and pathophysiological conditions, these findings predict a role for the HIF system in epigenetic regulation.
|
{
"pile_set_name": "PubMed Abstracts"
}
|
How do you keep tabs on an ailing family member if you don’t both live in the same community? And how do you make sure all of the healthcare professionals looking after your loved one are kept up to date about their condition and treatment?
A Tyze network can certainly help. Tyze is an online community centred around one person and it is often described as a secure ‘Facebook’ for caregiving. By using technology, family members, friends and health care professionals can share care, wisdom and knowledge. Best of all, Saint Elizabeth is making Tyze available free to individual patients and their “online care teams”.
Donna Thomson is a well-known author and blogger on caregiving issues. Her son requires a good deal of health care and support. Here’s how she uses Tyze in her family.
“We began by inviting members of our family to the site, simply to keep them up to date on the health and daily life activities of Nick. At that time, Nicholas’ nursing needs were very high. We were running a home hospital and trying to ensure important messages got through to all his care staff was increasingly difficult and frustrating. I would leave notes about medication changes or other critical directives in a bedside chart, on a white board above Nick’s bed and still they would be missed.
I began to think that perhaps I could use Tyze for caregivers, our doctor, social worker and any other professionals on an as-needed basis. Now, we keep the family in touch with Nick’s news via emails and Facebook. Tyze became, for us, a secure way to let everyone know about medical or rehab issues, to alert the team to things like skin breakdown and bowel protocol, and to keep a daily seizure record.
We are very fortunate that Nick’s GP agreed to participate in our Tyze site - he can check in anytime to see how Nick is doing, especially if there are fluctuating symptoms, which there often are.
We have a Tyze site for my Mom's care too. In her case, we use it to coordinate the support she needs between members of our extended family. If and when her needs increase, we'll invite paid caregivers to her network.”
As Canada’s largest non-profit charitable provider of home health care services, Saint Elizabeth empowers people with access to knowledge, support and care in their homes, through technology and an unparalleled care experience. Tyze is an excellent example of a product aimed at reducing social isolation, encouraging community support and helping organize care in a person’s time of need.
You can read more from Donna Thomson on the subject of caregiving on her website: www.donnathomson.com. Her book, “The Four Walls of My Freedom: Lessons I’ve Learned from a Lifetime of Caregiving” was published this year by House of Anansi Press.
For more information on setting up your own Tyze network, please visit www.tyze.com.
|
{
"pile_set_name": "Pile-CC"
}
|
Today I’m reviewing Dash, a governance/privacy focused coin. Dash forked off from Bitcoin with the name DarkCoin and later re-branded to Dash.
TL;DR: Dash is easy to use and has exciting governance/privacy features.
The Dash (DarkCoin) project launched January 2014 and was mostly ignored until the Bitcoin civil war made investors look to governance coins.
The DASH token has a market cap of $2.2 billion (1 DASH = $300). It processes around 5,000 transactions per day.
I usually write these reviews on the weekend. This one is different. The goals are many and time consuming. It took weeks to complete the review. Enjoy!
Max Keiser has been a Dash supporter for some time.
You can skip to the end of this 2,100 word review by searching this page for the word conclusion.
EDIT: Some HackerNews readers think gifs are used excessively. To remove them, type this in the browser console: document.querySelectorAll(‘img[src$=”gif”]’).forEach(_ => _.parentNode.parentNode.remove())
Goals for the Review
Compile and install Dash from source-code Download the Dash blockchain Buy DASH and send it to my node Install a mobile Dash wallet Send DASH to the mobile wallet Buy a product or service with DASH BONUS: Become a masternode BONUS: Vote with the masternode for a proposal BONUS: Create a proposal using the masternode
The Dash Landing Page
The Dash landing page has stock photos of business people and uses a “business blue” color. 😓
The Shake debit card looks interesting. It probably has low limits and high fees like all other cryptocurrency debit cards. Maybe I’ll look at it later. Or just go straight for the Misconduct Wine.
Compiling and installing Dash from source-code
I scroll to the bottom and find a link to the Github page.
That is one of the busiest footers I’ve ever seen. I also see a link to “Masternode”. I’ll look at that later.
The Dash Github Project
I notice a few things here. There are 13,337 commits. This reads as “elite” in leetspeak. I wonder if it’s a joke or accident.
The last commit to Dash was April 5th. That’s 172 days ago. I’ll see if there are other branches with more recent changes.
I look at the v0.12.2.x branch.
The Dash v0.12.2.x branch was changed only 4 hours ago! The Dash project must be actively developed.
Downloading the Dash node source-code
I go back to the master (latest stable) branch on Github and look for instructions.
I don’t see any install instructions in the README . I’ll look in the INSTALL file.
The INSTALL file asks me to look in the doc folder.
I check out build-unix.md .
Easy enough. I’ll use Amazon AWS to create a cloud computer.
I pick Ubuntu 16.04 as the operating system.
I choose a computer with 2 CPU cores and 8 GB ram. This will make compiling Dash from source-code and syncing the Dash blockchain fast.
My Linux machine is running. I go back to the Dash GitHub page to find a download link.
I copy the link and clone the project using git .
I realize I forgot to install the dependencies. I’ll do that now.
The dependencies install without any problems. 👍 Next I’ll build the Dash node binaries.
cd dash
./autogen.sh
./configure
make
make install
Building the Dash node from source-code takes around 20 minutes.
OBJECTIVE 1 SUCCESS!
Compile and install Dash from source-code
I start the Dash node.
The Dash node is downloading the blockchain. I’ll go have lunch. 🍔
The Dash blockchain is downloaded.
OBJECTIVE 2 SUCCESS!
Download the Dash blockchain
Buying DASH Tokens
To buy DASH tokens I need a wallet address. I’ll find one with terminal.
I forgot to set the RPC username and password in the Dash config.
Much better. I can now see my Dash address.
I use ShapeShift to buy a small amount of DASH like in my Monero review.
|
{
"pile_set_name": "OpenWebText2"
}
|
Various types of aerobic exercise devices exist for developing different muscles. One form of device includes the use of adjustable steps to provide the user with the ability to alter the height of the exercise platform in accordance with the user's particular needs. Other types of aerobic exercises are also known including, for example, treadmills, steppers and stairmasters.
It would be desirable to provide a device which is inexpensive and easy to use, yet which permits the development of, for example, the chest, arms, back, shoulders, legs, abdominal and aerobic training in a simple and easy manner so as to enhance cardiovascular and strength gains. It would also be desirable to provide such a device which could be conveniently stored during periods of non-use by sliding the device under a bed or sofa.
It would further be desirable if such a device could be provided which permits different types of exercises taking place while the user is off the device but the user pulls cords on the device to enhance the exercises. It would further be desirable if such devices could also be used by persons having physical impairments such as being confined to wheelchairs.
|
{
"pile_set_name": "USPTO Backgrounds"
}
|
/*
* Copyright (c) 2012-2014 HockeyApp, Bit Stadium GmbH.
* All rights reserved.
*
* Permission is hereby granted, free of charge, to any person
* obtaining a copy of this software and associated documentation
* files (the "Software"), to deal in the Software without
* restriction, including without limitation the rights to use,
* copy, modify, merge, publish, distribute, sublicense, and/or sell
* copies of the Software, and to permit persons to whom the
* Software is furnished to do so, subject to the following
* conditions:
*
* The above copyright notice and this permission notice shall be
* included in all copies or substantial portions of the Software.
*
* THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND,
* EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES
* OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND
* NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT
* HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY,
* WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING
* FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR
* OTHER DEALINGS IN THE SOFTWARE.
*/
#import "HockeySDK.h"
#if HOCKEYSDK_FEATURE_FEEDBACK
#import "BITActivityIndicatorButton.h"
@interface BITActivityIndicatorButton()
@property (nonatomic, strong) UIActivityIndicatorView *indicator;
@property (nonatomic) BOOL indicatorVisible;
@end
@implementation BITActivityIndicatorButton
- (void)setShowsActivityIndicator:(BOOL)showsIndicator {
if (self.indicatorVisible == showsIndicator){
return;
}
if (!self.indicator){
self.indicator = [[UIActivityIndicatorView alloc] initWithFrame:self.bounds];
[self addSubview:self.indicator];
[self.indicator setColor:[UIColor blackColor]];
}
self.indicatorVisible = showsIndicator;
if (showsIndicator){
[self.indicator startAnimating];
self.indicator.alpha = 1;
self.layer.borderWidth = 1;
self.layer.borderColor = [UIColor lightGrayColor].CGColor;
self.layer.cornerRadius = 5;
self.imageView.image = nil;
} else {
[self.indicator stopAnimating];
self.layer.cornerRadius = 0;
self.indicator.alpha = 0;
self.layer.borderWidth = 0;
}
}
- (void)layoutSubviews {
[super layoutSubviews];
[self.indicator setFrame:self.bounds];
}
@end
#endif /* HOCKEYSDK_FEATURE_FEEDBACK */
|
{
"pile_set_name": "Github"
}
|
Senators Warren, Markey offer beer in Super Bowl bet
There are some things that happen every year the week leading up to the Super Bowl. One of those things is politicians making bets with each other, and often they involve beer.
On Wednesday, Senators Elizabeth Warren and Edward Markey of Massachusetts and Senators Bob Casey and Pat Toomey have made such a bet.
If the Eagles win, Warren and Markey will have to send the Pennsylvania pair an assortment of Massachusetts beers, including brews from Jack’s Abby Craft Lagers in Framingham, Flying Dreams from Worcester, Notch Brewing from Salem and Cisco from Nantucket.
If the Patriots win, Casey and Toomey have to send Philly Cheesesteaks and beer from Yards Brewing Company to their Massachusetts brethren.
“John Adams once said, ‘Facts are stubborn things.’ So here are some facts: Tom Brady is the GOAT, the Patriots are Not Done, and New England is ready to win our sixth Super Bowl,” said Senators Warren and Markey. “In consolation to Senators Toomey and Casey, we will be united at game’s end when our team lifts the Lombardi Trophy and says, ‘Tonight, we are all Patriots.’”
Norman Miller can be reached at 508-626-3823 or nmiller@wickedlocal.com. For beer news and info, follow Norman Miller on Twitter and Instagram @RealBeerNut or on Facebook at facebook.com/NormanMillerBeerNut
|
{
"pile_set_name": "Pile-CC"
}
|
Artapanus of Alexandria
Artapanus of Alexandria (Gk. Ἀρτάπανος ὁ Ἀλεξανδρεύς) was a historian, of Jewish origin, who is believed to have lived in Alexandria, during the later half of the 3rd or 2nd century BCE. Although most scholars assume Artapanus lived in Alexandria, others argue he resided in the countryside. Regardless, Artapanus lived in Egypt. His name, however, is a rather curious one; for Hystaspes' son, and the Achaemenian king Darius the Great's brother's name was also Artap/banus. It is also the name of several Iranian historical personalities, including five (six, including the Parthian ruler of Armenia) of the Parthian kings'. In modern Persian it is Ardavān (اردوان in Persian script).
Artapanus wrote Concerning The Jews, a history of the Jews, in Greek between 250 and 100 BCE, but this text has not survived to the present. Artapanus’s writings may be interpreted as a response to those such as Manetho writing as early as the 3rd century BCE; therefore, Artapanus most likely wrote no earlier than the middle of the 3rd century. It is arguable that Artapanus wrote in the second half of the 3rd century BCE under the influence of Ptolemy IV Philopator’s reign between 221 and 204 BCE; however, Alexander Polyhistor’s citation of Artapanus in the middle of the 1st century BCE makes it likely that Artapanus wrote no later than the end of the 2nd century BCE. Polyhistor’s writings have not survived to the present.
Parts of Artapanus's work have been preserved in the books of two later historians: Clement of Alexandria in Stromata (Book I, chapter 23) and Eusebius of Caesarea in Præparatio Evangelica (Book IX, chapters 18, 23, and 27).
Works and portrayal of Moses
There is general scholarly consensus that Artapanus used the Septuagint as a framework for his historical narrative, liberally manipulating its stories to create his own unique account. He describes the Egyptian adventures of the three major Jewish patriarchs, Abraham, Joseph, and Moses, depicting them as heroes responsible for many of the cultural innovations of the ancient Near East.
According to Artapanus, Abraham taught an Egyptian pharaoh the science of astrology, while Moses bestowed many “useful benefits on mankind” by inventing boats, Egyptian weapons, and philosophy. (Eusebius, PrEv 9.27.4) He also recounts that the Greeks called Moses Musaeus and that he taught Orpheus, who was widely considered to be the father of Greek culture. Similarly, Artapanus credits Moses with the division of Egypt into 36 nomes as well as the successful conquest of Ethiopia, two accomplishments traditionally attributed to the Egyptian folk hero Sesostris. Throughout the narrative Artapanus insists that the public loved these Jewish figures for their impressive innovations and achievements. In fact, he remarks that the Ethiopians went so far as to circumcise themselves out of admiration for Moses. While some of Artapanus’ history clearly references accounts in Genesis and Exodus, such as his description of the plagues, most of his story lacks evidence.
One of the most striking aspects of Artapanus' works is the ease with which he syncretizes Jewish and Egyptian culture and religion. Artapanus also writes that Moses is responsible for appointing "for each of the [36] nomes the god to be worshipped, and that they should be cats and dogs and ibises." There is no doubt that Artapanus was familiar with the animal cults of Egypt and many cult centers for the worship of cats, such as Tell el-Bubastis, and ibises, such as Tuna el-Gebel (outside of Hermopolis), were flourishing in the time Artapanus was writing. Unfortunately, the mention of "cats and dogs and ibises" does not give us enough knowledge about the various cult centers that might be used for dating the work. However, we cannot know from only Artapanus' account the extent to which this religious syncretism existed in the minds of other Jews or Egyptians writing or living at this time. Although Artapanus credits Moses with the foundation of the animal cults, he also claims that the "consecrated animals" were destroyed during the crossing of the Red Sea. This suggests that, according to Artapanus, Moses' contributions to Egyptian society were ultimately less important than the original purpose of this folk hero: to lead the Israelites out of Egypt.
Moses is also identified with Hermes in 9.27.6 (Eusebius, PrEv): "On account of these things Moses was loved by the masses, and was deemed worthy of godlike honor by the priests and called Hermes, on account of the interpretation of sacred letters." Hermes was a Greek messenger god who was in Egyptian traditions associated with Thoth (Djehuty), the god of wisdom and time who invented writing. John J. Collins points out the Greek linguistic play that must have existed in Artapanus' day of Moses, Thoth, and the common name Thutmosis; yet this is not why Artapanus associates Moses with Thoth. Instead, Artapanus makes the connection between the Jewish patriarchs who taught the Egyptians skills such as astrology (Abraham, Eusebius PrEv 9.18.1) and Moses who, by interpreting the sacred letters (presumably Hebrew Script), attained the godlike knowledge of Thoth. Moses' connection to the obscure Jewish figure Enoch has also been made by some scholars, as Enoch was said to have taught human beings the "right" kind of astrology (for instance, the solar calendar; 1 Enoch 1–36), however Artapanus only clearly denotes Moses' association with Hermes/Thoth. This makes sense, because Artapanus is not trying to reconcile Moses with Jewish mythological figures, but rather with Egyptian history, culture, and religion in general.
Theology and motivation
Artapanus’ theology is an issue of extreme contention among the scholarly community. Some scholars take him to be a polytheistic Jew. John Barclay, for example, sees Artapanus’ acceptance of the Egyptian animal cults and his depiction of Moses as divine as signs of his polytheism. Others observe that his fascination with the miraculous powers of Moses are reminiscent of Hellenistic paganism. A different group of scholars, however, believes that Artapanus practiced monolatry – he himself worshipped only one god but acknowledged the possible existence of others. They argue that Artapanus maintains the superiority of YHVH throughout his text, and that his depiction of Moses as divine actually has biblical origins.
Artapanus’ motivation for writing his history is equally debated. One branch of analysis emphasizes the underlying tension between the diaspora Jews and their Hellenistic neighbors. For example, some scholars, such as Carl Holladay, see Artapanus’ writings as “competitive historiography.” These scholars argue that Artapanus aimed to defend the Jews from the attacks of gentile historians such as Manetho, and this explains his superior depiction of the Jewish patriarchs. James Charlesworth of Princeton University, for example, argues Artapanus composed a “pro-Jewish apology” in response to anti-Moses and other anti-Jewish Egyptian stereotypes. Others refute the former argument, claiming it is highly unlikely that any gentiles would read an embellished history of the Jews that disparaged their own cultures’ accomplishments. Instead, these scholars insist that Artapanus’ target audience was primarily the Jews themselves, and he wrote this romantic history to bolster their national pride. Some scholars accept both of these arguments, claiming that Artapanus’ narrative at once represents an apologetic historiography and a romantic piece of national propaganda.
On the other hand, Erich Gruen insists that these arguments completely miss Artapanus’ humor and thus his major motivation. He argues that Artapanus did not intend for his readers to take his imaginative tale literally, since anyone familiar with the biblical stories would quickly recognize his fantastical additions and manipulations. Instead, Gruen insists that Artanpanus playfully teases the pharaohs and exaggerates the accomplishments of the Jewish patriarchs to “comic proportions” in order to demonstrate his own self-confidence as a diaspora Jew. It is this sense of comfort that he aimed to give his Jewish readers.
Literary impact
Although it is possible that Artapanus influenced the Jewish historian Josephus, it seems that he generally had little impact on later Jewish literature.
References
Bibliography
H. M. Zellentin, "The End of Jewish Egypt: Artapanus and the Second Exodus," in Gregg Gardner and Kevin L Osterloh (eds), Antiquity in Antiquity: Jewish and Christian Pasts in the Greco-Roman World (Tuebingen, Mohr Siebeck, 2008) (Texte und Studien zum antiken Judentum, 123), 27–73.
Category:Hellenistic-era historians
Category:Ancient Greek grammarians
Category:Hellenistic Jewish writers
Category:Jews of Ptolemaic Alexandria
Category:2nd-century BC historians
Category:Year of birth unknown
Category:Year of death unknown
|
{
"pile_set_name": "Wikipedia (en)"
}
|
[Management of severe Budd-Chiari syndrome by spleen-internal jugular venous shunt].
To study the operative method for severe Budd-Chiari syndrome. 17 patients with severe Budd-Chiari syndrome were treated with splenectomy and spleen-internal jugular venous shunt. Follow up for 3 to 20 months 11 patients showed excellent results, 5 good results and 1 died. Spleen-internal jugular shunt is effective for the patients with severe Budd-Chiari syndrome.
|
{
"pile_set_name": "PubMed Abstracts"
}
|
early
|
{
"pile_set_name": "Github"
}
|
/*
* Intel Sunrisepoint PCH pinctrl/GPIO driver
*
* Copyright (C) 2015, Intel Corporation
* Authors: Mathias Nyman <mathias.nyman@linux.intel.com>
* Mika Westerberg <mika.westerberg@linux.intel.com>
*
* This program is free software; you can redistribute it and/or modify
* it under the terms of the GNU General Public License version 2 as
* published by the Free Software Foundation.
*/
#include <linux/acpi.h>
#include <linux/module.h>
#include <linux/platform_device.h>
#include <linux/pm.h>
#include <linux/pinctrl/pinctrl.h>
#include "pinctrl-intel.h"
#define SPT_PAD_OWN 0x020
#define SPT_PADCFGLOCK 0x0a0
#define SPT_HOSTSW_OWN 0x0d0
#define SPT_GPI_IE 0x120
#define SPT_COMMUNITY(b, s, e) \
{ \
.barno = (b), \
.padown_offset = SPT_PAD_OWN, \
.padcfglock_offset = SPT_PADCFGLOCK, \
.hostown_offset = SPT_HOSTSW_OWN, \
.ie_offset = SPT_GPI_IE, \
.gpp_size = 24, \
.pin_base = (s), \
.npins = ((e) - (s) + 1), \
}
/* Sunrisepoint-LP */
static const struct pinctrl_pin_desc sptlp_pins[] = {
/* GPP_A */
PINCTRL_PIN(0, "RCINB"),
PINCTRL_PIN(1, "LAD_0"),
PINCTRL_PIN(2, "LAD_1"),
PINCTRL_PIN(3, "LAD_2"),
PINCTRL_PIN(4, "LAD_3"),
PINCTRL_PIN(5, "LFRAMEB"),
PINCTRL_PIN(6, "SERIQ"),
PINCTRL_PIN(7, "PIRQAB"),
PINCTRL_PIN(8, "CLKRUNB"),
PINCTRL_PIN(9, "CLKOUT_LPC_0"),
PINCTRL_PIN(10, "CLKOUT_LPC_1"),
PINCTRL_PIN(11, "PMEB"),
PINCTRL_PIN(12, "BM_BUSYB"),
PINCTRL_PIN(13, "SUSWARNB_SUS_PWRDNACK"),
PINCTRL_PIN(14, "SUS_STATB"),
PINCTRL_PIN(15, "SUSACKB"),
PINCTRL_PIN(16, "SD_1P8_SEL"),
PINCTRL_PIN(17, "SD_PWR_EN_B"),
PINCTRL_PIN(18, "ISH_GP_0"),
PINCTRL_PIN(19, "ISH_GP_1"),
PINCTRL_PIN(20, "ISH_GP_2"),
PINCTRL_PIN(21, "ISH_GP_3"),
PINCTRL_PIN(22, "ISH_GP_4"),
PINCTRL_PIN(23, "ISH_GP_5"),
/* GPP_B */
PINCTRL_PIN(24, "CORE_VID_0"),
PINCTRL_PIN(25, "CORE_VID_1"),
PINCTRL_PIN(26, "VRALERTB"),
PINCTRL_PIN(27, "CPU_GP_2"),
PINCTRL_PIN(28, "CPU_GP_3"),
PINCTRL_PIN(29, "SRCCLKREQB_0"),
PINCTRL_PIN(30, "SRCCLKREQB_1"),
PINCTRL_PIN(31, "SRCCLKREQB_2"),
PINCTRL_PIN(32, "SRCCLKREQB_3"),
PINCTRL_PIN(33, "SRCCLKREQB_4"),
PINCTRL_PIN(34, "SRCCLKREQB_5"),
PINCTRL_PIN(35, "EXT_PWR_GATEB"),
PINCTRL_PIN(36, "SLP_S0B"),
PINCTRL_PIN(37, "PLTRSTB"),
PINCTRL_PIN(38, "SPKR"),
PINCTRL_PIN(39, "GSPI0_CSB"),
PINCTRL_PIN(40, "GSPI0_CLK"),
PINCTRL_PIN(41, "GSPI0_MISO"),
PINCTRL_PIN(42, "GSPI0_MOSI"),
PINCTRL_PIN(43, "GSPI1_CSB"),
PINCTRL_PIN(44, "GSPI1_CLK"),
PINCTRL_PIN(45, "GSPI1_MISO"),
PINCTRL_PIN(46, "GSPI1_MOSI"),
PINCTRL_PIN(47, "SML1ALERTB"),
/* GPP_C */
PINCTRL_PIN(48, "SMBCLK"),
PINCTRL_PIN(49, "SMBDATA"),
PINCTRL_PIN(50, "SMBALERTB"),
PINCTRL_PIN(51, "SML0CLK"),
PINCTRL_PIN(52, "SML0DATA"),
PINCTRL_PIN(53, "SML0ALERTB"),
PINCTRL_PIN(54, "SML1CLK"),
PINCTRL_PIN(55, "SML1DATA"),
PINCTRL_PIN(56, "UART0_RXD"),
PINCTRL_PIN(57, "UART0_TXD"),
PINCTRL_PIN(58, "UART0_RTSB"),
PINCTRL_PIN(59, "UART0_CTSB"),
PINCTRL_PIN(60, "UART1_RXD"),
PINCTRL_PIN(61, "UART1_TXD"),
PINCTRL_PIN(62, "UART1_RTSB"),
PINCTRL_PIN(63, "UART1_CTSB"),
PINCTRL_PIN(64, "I2C0_SDA"),
PINCTRL_PIN(65, "I2C0_SCL"),
PINCTRL_PIN(66, "I2C1_SDA"),
PINCTRL_PIN(67, "I2C1_SCL"),
PINCTRL_PIN(68, "UART2_RXD"),
PINCTRL_PIN(69, "UART2_TXD"),
PINCTRL_PIN(70, "UART2_RTSB"),
PINCTRL_PIN(71, "UART2_CTSB"),
/* GPP_D */
PINCTRL_PIN(72, "SPI1_CSB"),
PINCTRL_PIN(73, "SPI1_CLK"),
PINCTRL_PIN(74, "SPI1_MISO_IO_1"),
PINCTRL_PIN(75, "SPI1_MOSI_IO_0"),
PINCTRL_PIN(76, "FLASHTRIG"),
PINCTRL_PIN(77, "ISH_I2C0_SDA"),
PINCTRL_PIN(78, "ISH_I2C0_SCL"),
PINCTRL_PIN(79, "ISH_I2C1_SDA"),
PINCTRL_PIN(80, "ISH_I2C1_SCL"),
PINCTRL_PIN(81, "ISH_SPI_CSB"),
PINCTRL_PIN(82, "ISH_SPI_CLK"),
PINCTRL_PIN(83, "ISH_SPI_MISO"),
PINCTRL_PIN(84, "ISH_SPI_MOSI"),
PINCTRL_PIN(85, "ISH_UART0_RXD"),
PINCTRL_PIN(86, "ISH_UART0_TXD"),
PINCTRL_PIN(87, "ISH_UART0_RTSB"),
PINCTRL_PIN(88, "ISH_UART0_CTSB"),
PINCTRL_PIN(89, "DMIC_CLK_1"),
PINCTRL_PIN(90, "DMIC_DATA_1"),
PINCTRL_PIN(91, "DMIC_CLK_0"),
PINCTRL_PIN(92, "DMIC_DATA_0"),
PINCTRL_PIN(93, "SPI1_IO_2"),
PINCTRL_PIN(94, "SPI1_IO_3"),
PINCTRL_PIN(95, "SSP_MCLK"),
/* GPP_E */
PINCTRL_PIN(96, "SATAXPCIE_0"),
PINCTRL_PIN(97, "SATAXPCIE_1"),
PINCTRL_PIN(98, "SATAXPCIE_2"),
PINCTRL_PIN(99, "CPU_GP_0"),
PINCTRL_PIN(100, "SATA_DEVSLP_0"),
PINCTRL_PIN(101, "SATA_DEVSLP_1"),
PINCTRL_PIN(102, "SATA_DEVSLP_2"),
PINCTRL_PIN(103, "CPU_GP_1"),
PINCTRL_PIN(104, "SATA_LEDB"),
PINCTRL_PIN(105, "USB2_OCB_0"),
PINCTRL_PIN(106, "USB2_OCB_1"),
PINCTRL_PIN(107, "USB2_OCB_2"),
PINCTRL_PIN(108, "USB2_OCB_3"),
PINCTRL_PIN(109, "DDSP_HPD_0"),
PINCTRL_PIN(110, "DDSP_HPD_1"),
PINCTRL_PIN(111, "DDSP_HPD_2"),
PINCTRL_PIN(112, "DDSP_HPD_3"),
PINCTRL_PIN(113, "EDP_HPD"),
PINCTRL_PIN(114, "DDPB_CTRLCLK"),
PINCTRL_PIN(115, "DDPB_CTRLDATA"),
PINCTRL_PIN(116, "DDPC_CTRLCLK"),
PINCTRL_PIN(117, "DDPC_CTRLDATA"),
PINCTRL_PIN(118, "DDPD_CTRLCLK"),
PINCTRL_PIN(119, "DDPD_CTRLDATA"),
/* GPP_F */
PINCTRL_PIN(120, "SSP2_SCLK"),
PINCTRL_PIN(121, "SSP2_SFRM"),
PINCTRL_PIN(122, "SSP2_TXD"),
PINCTRL_PIN(123, "SSP2_RXD"),
PINCTRL_PIN(124, "I2C2_SDA"),
PINCTRL_PIN(125, "I2C2_SCL"),
PINCTRL_PIN(126, "I2C3_SDA"),
PINCTRL_PIN(127, "I2C3_SCL"),
PINCTRL_PIN(128, "I2C4_SDA"),
PINCTRL_PIN(129, "I2C4_SCL"),
PINCTRL_PIN(130, "I2C5_SDA"),
PINCTRL_PIN(131, "I2C5_SCL"),
PINCTRL_PIN(132, "EMMC_CMD"),
PINCTRL_PIN(133, "EMMC_DATA_0"),
PINCTRL_PIN(134, "EMMC_DATA_1"),
PINCTRL_PIN(135, "EMMC_DATA_2"),
PINCTRL_PIN(136, "EMMC_DATA_3"),
PINCTRL_PIN(137, "EMMC_DATA_4"),
PINCTRL_PIN(138, "EMMC_DATA_5"),
PINCTRL_PIN(139, "EMMC_DATA_6"),
PINCTRL_PIN(140, "EMMC_DATA_7"),
PINCTRL_PIN(141, "EMMC_RCLK"),
PINCTRL_PIN(142, "EMMC_CLK"),
PINCTRL_PIN(143, "GPP_F_23"),
/* GPP_G */
PINCTRL_PIN(144, "SD_CMD"),
PINCTRL_PIN(145, "SD_DATA_0"),
PINCTRL_PIN(146, "SD_DATA_1"),
PINCTRL_PIN(147, "SD_DATA_2"),
PINCTRL_PIN(148, "SD_DATA_3"),
PINCTRL_PIN(149, "SD_CDB"),
PINCTRL_PIN(150, "SD_CLK"),
PINCTRL_PIN(151, "SD_WP"),
};
static const unsigned sptlp_spi0_pins[] = { 39, 40, 41, 42 };
static const unsigned sptlp_spi1_pins[] = { 43, 44, 45, 46 };
static const unsigned sptlp_uart0_pins[] = { 56, 57, 58, 59 };
static const unsigned sptlp_uart1_pins[] = { 60, 61, 62, 63 };
static const unsigned sptlp_uart2_pins[] = { 68, 69, 71, 71 };
static const unsigned sptlp_i2c0_pins[] = { 64, 65 };
static const unsigned sptlp_i2c1_pins[] = { 66, 67 };
static const unsigned sptlp_i2c2_pins[] = { 124, 125 };
static const unsigned sptlp_i2c3_pins[] = { 126, 127 };
static const unsigned sptlp_i2c4_pins[] = { 128, 129 };
static const unsigned sptlp_i2c4b_pins[] = { 85, 86 };
static const unsigned sptlp_i2c5_pins[] = { 130, 131 };
static const unsigned sptlp_ssp2_pins[] = { 120, 121, 122, 123 };
static const unsigned sptlp_emmc_pins[] = {
132, 133, 134, 135, 136, 137, 138, 139, 140, 141, 142,
};
static const unsigned sptlp_sd_pins[] = {
144, 145, 146, 147, 148, 149, 150, 151,
};
static const struct intel_pingroup sptlp_groups[] = {
PIN_GROUP("spi0_grp", sptlp_spi0_pins, 1),
PIN_GROUP("spi1_grp", sptlp_spi1_pins, 1),
PIN_GROUP("uart0_grp", sptlp_uart0_pins, 1),
PIN_GROUP("uart1_grp", sptlp_uart1_pins, 1),
PIN_GROUP("uart2_grp", sptlp_uart2_pins, 1),
PIN_GROUP("i2c0_grp", sptlp_i2c0_pins, 1),
PIN_GROUP("i2c1_grp", sptlp_i2c1_pins, 1),
PIN_GROUP("i2c2_grp", sptlp_i2c2_pins, 1),
PIN_GROUP("i2c3_grp", sptlp_i2c3_pins, 1),
PIN_GROUP("i2c4_grp", sptlp_i2c4_pins, 1),
PIN_GROUP("i2c4b_grp", sptlp_i2c4b_pins, 3),
PIN_GROUP("i2c5_grp", sptlp_i2c5_pins, 1),
PIN_GROUP("ssp2_grp", sptlp_ssp2_pins, 1),
PIN_GROUP("emmc_grp", sptlp_emmc_pins, 1),
PIN_GROUP("sd_grp", sptlp_sd_pins, 1),
};
static const char * const sptlp_spi0_groups[] = { "spi0_grp" };
static const char * const sptlp_spi1_groups[] = { "spi0_grp" };
static const char * const sptlp_uart0_groups[] = { "uart0_grp" };
static const char * const sptlp_uart1_groups[] = { "uart1_grp" };
static const char * const sptlp_uart2_groups[] = { "uart2_grp" };
static const char * const sptlp_i2c0_groups[] = { "i2c0_grp" };
static const char * const sptlp_i2c1_groups[] = { "i2c1_grp" };
static const char * const sptlp_i2c2_groups[] = { "i2c2_grp" };
static const char * const sptlp_i2c3_groups[] = { "i2c3_grp" };
static const char * const sptlp_i2c4_groups[] = { "i2c4_grp", "i2c4b_grp" };
static const char * const sptlp_i2c5_groups[] = { "i2c5_grp" };
static const char * const sptlp_ssp2_groups[] = { "ssp2_grp" };
static const char * const sptlp_emmc_groups[] = { "emmc_grp" };
static const char * const sptlp_sd_groups[] = { "sd_grp" };
static const struct intel_function sptlp_functions[] = {
FUNCTION("spi0", sptlp_spi0_groups),
FUNCTION("spi1", sptlp_spi1_groups),
FUNCTION("uart0", sptlp_uart0_groups),
FUNCTION("uart1", sptlp_uart1_groups),
FUNCTION("uart2", sptlp_uart2_groups),
FUNCTION("i2c0", sptlp_i2c0_groups),
FUNCTION("i2c1", sptlp_i2c1_groups),
FUNCTION("i2c2", sptlp_i2c2_groups),
FUNCTION("i2c3", sptlp_i2c3_groups),
FUNCTION("i2c4", sptlp_i2c4_groups),
FUNCTION("i2c5", sptlp_i2c5_groups),
FUNCTION("ssp2", sptlp_ssp2_groups),
FUNCTION("emmc", sptlp_emmc_groups),
FUNCTION("sd", sptlp_sd_groups),
};
static const struct intel_community sptlp_communities[] = {
SPT_COMMUNITY(0, 0, 47),
SPT_COMMUNITY(1, 48, 119),
SPT_COMMUNITY(2, 120, 151),
};
static const struct intel_pinctrl_soc_data sptlp_soc_data = {
.pins = sptlp_pins,
.npins = ARRAY_SIZE(sptlp_pins),
.groups = sptlp_groups,
.ngroups = ARRAY_SIZE(sptlp_groups),
.functions = sptlp_functions,
.nfunctions = ARRAY_SIZE(sptlp_functions),
.communities = sptlp_communities,
.ncommunities = ARRAY_SIZE(sptlp_communities),
};
/* Sunrisepoint-H */
static const struct pinctrl_pin_desc spth_pins[] = {
/* GPP_A */
PINCTRL_PIN(0, "RCINB"),
PINCTRL_PIN(1, "LAD_0"),
PINCTRL_PIN(2, "LAD_1"),
PINCTRL_PIN(3, "LAD_2"),
PINCTRL_PIN(4, "LAD_3"),
PINCTRL_PIN(5, "LFRAMEB"),
PINCTRL_PIN(6, "SERIQ"),
PINCTRL_PIN(7, "PIRQAB"),
PINCTRL_PIN(8, "CLKRUNB"),
PINCTRL_PIN(9, "CLKOUT_LPC_0"),
PINCTRL_PIN(10, "CLKOUT_LPC_1"),
PINCTRL_PIN(11, "PMEB"),
PINCTRL_PIN(12, "BM_BUSYB"),
PINCTRL_PIN(13, "SUSWARNB_SUS_PWRDNACK"),
PINCTRL_PIN(14, "SUS_STATB"),
PINCTRL_PIN(15, "SUSACKB"),
PINCTRL_PIN(16, "CLKOUT_48"),
PINCTRL_PIN(17, "ISH_GP_7"),
PINCTRL_PIN(18, "ISH_GP_0"),
PINCTRL_PIN(19, "ISH_GP_1"),
PINCTRL_PIN(20, "ISH_GP_2"),
PINCTRL_PIN(21, "ISH_GP_3"),
PINCTRL_PIN(22, "ISH_GP_4"),
PINCTRL_PIN(23, "ISH_GP_5"),
/* GPP_B */
PINCTRL_PIN(24, "CORE_VID_0"),
PINCTRL_PIN(25, "CORE_VID_1"),
PINCTRL_PIN(26, "VRALERTB"),
PINCTRL_PIN(27, "CPU_GP_2"),
PINCTRL_PIN(28, "CPU_GP_3"),
PINCTRL_PIN(29, "SRCCLKREQB_0"),
PINCTRL_PIN(30, "SRCCLKREQB_1"),
PINCTRL_PIN(31, "SRCCLKREQB_2"),
PINCTRL_PIN(32, "SRCCLKREQB_3"),
PINCTRL_PIN(33, "SRCCLKREQB_4"),
PINCTRL_PIN(34, "SRCCLKREQB_5"),
PINCTRL_PIN(35, "EXT_PWR_GATEB"),
PINCTRL_PIN(36, "SLP_S0B"),
PINCTRL_PIN(37, "PLTRSTB"),
PINCTRL_PIN(38, "SPKR"),
PINCTRL_PIN(39, "GSPI0_CSB"),
PINCTRL_PIN(40, "GSPI0_CLK"),
PINCTRL_PIN(41, "GSPI0_MISO"),
PINCTRL_PIN(42, "GSPI0_MOSI"),
PINCTRL_PIN(43, "GSPI1_CSB"),
PINCTRL_PIN(44, "GSPI1_CLK"),
PINCTRL_PIN(45, "GSPI1_MISO"),
PINCTRL_PIN(46, "GSPI1_MOSI"),
PINCTRL_PIN(47, "SML1ALERTB"),
/* GPP_C */
PINCTRL_PIN(48, "SMBCLK"),
PINCTRL_PIN(49, "SMBDATA"),
PINCTRL_PIN(50, "SMBALERTB"),
PINCTRL_PIN(51, "SML0CLK"),
PINCTRL_PIN(52, "SML0DATA"),
PINCTRL_PIN(53, "SML0ALERTB"),
PINCTRL_PIN(54, "SML1CLK"),
PINCTRL_PIN(55, "SML1DATA"),
PINCTRL_PIN(56, "UART0_RXD"),
PINCTRL_PIN(57, "UART0_TXD"),
PINCTRL_PIN(58, "UART0_RTSB"),
PINCTRL_PIN(59, "UART0_CTSB"),
PINCTRL_PIN(60, "UART1_RXD"),
PINCTRL_PIN(61, "UART1_TXD"),
PINCTRL_PIN(62, "UART1_RTSB"),
PINCTRL_PIN(63, "UART1_CTSB"),
PINCTRL_PIN(64, "I2C0_SDA"),
PINCTRL_PIN(65, "I2C0_SCL"),
PINCTRL_PIN(66, "I2C1_SDA"),
PINCTRL_PIN(67, "I2C1_SCL"),
PINCTRL_PIN(68, "UART2_RXD"),
PINCTRL_PIN(69, "UART2_TXD"),
PINCTRL_PIN(70, "UART2_RTSB"),
PINCTRL_PIN(71, "UART2_CTSB"),
/* GPP_D */
PINCTRL_PIN(72, "SPI1_CSB"),
PINCTRL_PIN(73, "SPI1_CLK"),
PINCTRL_PIN(74, "SPI1_MISO_IO_1"),
PINCTRL_PIN(75, "SPI1_MOSI_IO_0"),
PINCTRL_PIN(76, "ISH_I2C2_SDA"),
PINCTRL_PIN(77, "SSP0_SFRM"),
PINCTRL_PIN(78, "SSP0_TXD"),
PINCTRL_PIN(79, "SSP0_RXD"),
PINCTRL_PIN(80, "SSP0_SCLK"),
PINCTRL_PIN(81, "ISH_SPI_CSB"),
PINCTRL_PIN(82, "ISH_SPI_CLK"),
PINCTRL_PIN(83, "ISH_SPI_MISO"),
PINCTRL_PIN(84, "ISH_SPI_MOSI"),
PINCTRL_PIN(85, "ISH_UART0_RXD"),
PINCTRL_PIN(86, "ISH_UART0_TXD"),
PINCTRL_PIN(87, "ISH_UART0_RTSB"),
PINCTRL_PIN(88, "ISH_UART0_CTSB"),
PINCTRL_PIN(89, "DMIC_CLK_1"),
PINCTRL_PIN(90, "DMIC_DATA_1"),
PINCTRL_PIN(91, "DMIC_CLK_0"),
PINCTRL_PIN(92, "DMIC_DATA_0"),
PINCTRL_PIN(93, "SPI1_IO_2"),
PINCTRL_PIN(94, "SPI1_IO_3"),
PINCTRL_PIN(95, "ISH_I2C2_SCL"),
/* GPP_E */
PINCTRL_PIN(96, "SATAXPCIE_0"),
PINCTRL_PIN(97, "SATAXPCIE_1"),
PINCTRL_PIN(98, "SATAXPCIE_2"),
PINCTRL_PIN(99, "CPU_GP_0"),
PINCTRL_PIN(100, "SATA_DEVSLP_0"),
PINCTRL_PIN(101, "SATA_DEVSLP_1"),
PINCTRL_PIN(102, "SATA_DEVSLP_2"),
PINCTRL_PIN(103, "CPU_GP_1"),
PINCTRL_PIN(104, "SATA_LEDB"),
PINCTRL_PIN(105, "USB2_OCB_0"),
PINCTRL_PIN(106, "USB2_OCB_1"),
PINCTRL_PIN(107, "USB2_OCB_2"),
PINCTRL_PIN(108, "USB2_OCB_3"),
/* GPP_F */
PINCTRL_PIN(109, "SATAXPCIE_3"),
PINCTRL_PIN(110, "SATAXPCIE_4"),
PINCTRL_PIN(111, "SATAXPCIE_5"),
PINCTRL_PIN(112, "SATAXPCIE_6"),
PINCTRL_PIN(113, "SATAXPCIE_7"),
PINCTRL_PIN(114, "SATA_DEVSLP_3"),
PINCTRL_PIN(115, "SATA_DEVSLP_4"),
PINCTRL_PIN(116, "SATA_DEVSLP_5"),
PINCTRL_PIN(117, "SATA_DEVSLP_6"),
PINCTRL_PIN(118, "SATA_DEVSLP_7"),
PINCTRL_PIN(119, "SATA_SCLOCK"),
PINCTRL_PIN(120, "SATA_SLOAD"),
PINCTRL_PIN(121, "SATA_SDATAOUT1"),
PINCTRL_PIN(122, "SATA_SDATAOUT0"),
PINCTRL_PIN(123, "GPP_F_14"),
PINCTRL_PIN(124, "USB_OCB_4"),
PINCTRL_PIN(125, "USB_OCB_5"),
PINCTRL_PIN(126, "USB_OCB_6"),
PINCTRL_PIN(127, "USB_OCB_7"),
PINCTRL_PIN(128, "L_VDDEN"),
PINCTRL_PIN(129, "L_BKLTEN"),
PINCTRL_PIN(130, "L_BKLTCTL"),
PINCTRL_PIN(131, "GPP_F_22"),
PINCTRL_PIN(132, "GPP_F_23"),
/* GPP_G */
PINCTRL_PIN(133, "FAN_TACH_0"),
PINCTRL_PIN(134, "FAN_TACH_1"),
PINCTRL_PIN(135, "FAN_TACH_2"),
PINCTRL_PIN(136, "FAN_TACH_3"),
PINCTRL_PIN(137, "FAN_TACH_4"),
PINCTRL_PIN(138, "FAN_TACH_5"),
PINCTRL_PIN(139, "FAN_TACH_6"),
PINCTRL_PIN(140, "FAN_TACH_7"),
PINCTRL_PIN(141, "FAN_PWM_0"),
PINCTRL_PIN(142, "FAN_PWM_1"),
PINCTRL_PIN(143, "FAN_PWM_2"),
PINCTRL_PIN(144, "FAN_PWM_3"),
PINCTRL_PIN(145, "GSXDOUT"),
PINCTRL_PIN(146, "GSXSLOAD"),
PINCTRL_PIN(147, "GSXDIN"),
PINCTRL_PIN(148, "GSXRESETB"),
PINCTRL_PIN(149, "GSXCLK"),
PINCTRL_PIN(150, "ADR_COMPLETE"),
PINCTRL_PIN(151, "NMIB"),
PINCTRL_PIN(152, "SMIB"),
PINCTRL_PIN(153, "GPP_G_20"),
PINCTRL_PIN(154, "GPP_G_21"),
PINCTRL_PIN(155, "GPP_G_22"),
PINCTRL_PIN(156, "GPP_G_23"),
/* GPP_H */
PINCTRL_PIN(157, "SRCCLKREQB_6"),
PINCTRL_PIN(158, "SRCCLKREQB_7"),
PINCTRL_PIN(159, "SRCCLKREQB_8"),
PINCTRL_PIN(160, "SRCCLKREQB_9"),
PINCTRL_PIN(161, "SRCCLKREQB_10"),
PINCTRL_PIN(162, "SRCCLKREQB_11"),
PINCTRL_PIN(163, "SRCCLKREQB_12"),
PINCTRL_PIN(164, "SRCCLKREQB_13"),
PINCTRL_PIN(165, "SRCCLKREQB_14"),
PINCTRL_PIN(166, "SRCCLKREQB_15"),
PINCTRL_PIN(167, "SML2CLK"),
PINCTRL_PIN(168, "SML2DATA"),
PINCTRL_PIN(169, "SML2ALERTB"),
PINCTRL_PIN(170, "SML3CLK"),
PINCTRL_PIN(171, "SML3DATA"),
PINCTRL_PIN(172, "SML3ALERTB"),
PINCTRL_PIN(173, "SML4CLK"),
PINCTRL_PIN(174, "SML4DATA"),
PINCTRL_PIN(175, "SML4ALERTB"),
PINCTRL_PIN(176, "ISH_I2C0_SDA"),
PINCTRL_PIN(177, "ISH_I2C0_SCL"),
PINCTRL_PIN(178, "ISH_I2C1_SDA"),
PINCTRL_PIN(179, "ISH_I2C1_SCL"),
PINCTRL_PIN(180, "GPP_H_23"),
/* GPP_I */
PINCTRL_PIN(181, "DDSP_HDP_0"),
PINCTRL_PIN(182, "DDSP_HDP_1"),
PINCTRL_PIN(183, "DDSP_HDP_2"),
PINCTRL_PIN(184, "DDSP_HDP_3"),
PINCTRL_PIN(185, "EDP_HPD"),
PINCTRL_PIN(186, "DDPB_CTRLCLK"),
PINCTRL_PIN(187, "DDPB_CTRLDATA"),
PINCTRL_PIN(188, "DDPC_CTRLCLK"),
PINCTRL_PIN(189, "DDPC_CTRLDATA"),
PINCTRL_PIN(190, "DDPD_CTRLCLK"),
PINCTRL_PIN(191, "DDPD_CTRLDATA"),
};
static const unsigned spth_spi0_pins[] = { 39, 40, 41, 42 };
static const unsigned spth_spi1_pins[] = { 43, 44, 45, 46 };
static const unsigned spth_uart0_pins[] = { 56, 57, 58, 59 };
static const unsigned spth_uart1_pins[] = { 60, 61, 62, 63 };
static const unsigned spth_uart2_pins[] = { 68, 69, 71, 71 };
static const unsigned spth_i2c0_pins[] = { 64, 65 };
static const unsigned spth_i2c1_pins[] = { 66, 67 };
static const unsigned spth_i2c2_pins[] = { 76, 95 };
static const struct intel_pingroup spth_groups[] = {
PIN_GROUP("spi0_grp", spth_spi0_pins, 1),
PIN_GROUP("spi1_grp", spth_spi1_pins, 1),
PIN_GROUP("uart0_grp", spth_uart0_pins, 1),
PIN_GROUP("uart1_grp", spth_uart1_pins, 1),
PIN_GROUP("uart2_grp", spth_uart2_pins, 1),
PIN_GROUP("i2c0_grp", spth_i2c0_pins, 1),
PIN_GROUP("i2c1_grp", spth_i2c1_pins, 1),
PIN_GROUP("i2c2_grp", spth_i2c2_pins, 2),
};
static const char * const spth_spi0_groups[] = { "spi0_grp" };
static const char * const spth_spi1_groups[] = { "spi0_grp" };
static const char * const spth_uart0_groups[] = { "uart0_grp" };
static const char * const spth_uart1_groups[] = { "uart1_grp" };
static const char * const spth_uart2_groups[] = { "uart2_grp" };
static const char * const spth_i2c0_groups[] = { "i2c0_grp" };
static const char * const spth_i2c1_groups[] = { "i2c1_grp" };
static const char * const spth_i2c2_groups[] = { "i2c2_grp" };
static const struct intel_function spth_functions[] = {
FUNCTION("spi0", spth_spi0_groups),
FUNCTION("spi1", spth_spi1_groups),
FUNCTION("uart0", spth_uart0_groups),
FUNCTION("uart1", spth_uart1_groups),
FUNCTION("uart2", spth_uart2_groups),
FUNCTION("i2c0", spth_i2c0_groups),
FUNCTION("i2c1", spth_i2c1_groups),
FUNCTION("i2c2", spth_i2c2_groups),
};
static const struct intel_community spth_communities[] = {
SPT_COMMUNITY(0, 0, 47),
SPT_COMMUNITY(1, 48, 180),
SPT_COMMUNITY(2, 181, 191),
};
static const struct intel_pinctrl_soc_data spth_soc_data = {
.pins = spth_pins,
.npins = ARRAY_SIZE(spth_pins),
.groups = spth_groups,
.ngroups = ARRAY_SIZE(spth_groups),
.functions = spth_functions,
.nfunctions = ARRAY_SIZE(spth_functions),
.communities = spth_communities,
.ncommunities = ARRAY_SIZE(spth_communities),
};
static const struct acpi_device_id spt_pinctrl_acpi_match[] = {
{ "INT344B", (kernel_ulong_t)&sptlp_soc_data },
{ "INT345D", (kernel_ulong_t)&spth_soc_data },
{ }
};
MODULE_DEVICE_TABLE(acpi, spt_pinctrl_acpi_match);
static int spt_pinctrl_probe(struct platform_device *pdev)
{
const struct intel_pinctrl_soc_data *soc_data;
const struct acpi_device_id *id;
id = acpi_match_device(spt_pinctrl_acpi_match, &pdev->dev);
if (!id || !id->driver_data)
return -ENODEV;
soc_data = (const struct intel_pinctrl_soc_data *)id->driver_data;
return intel_pinctrl_probe(pdev, soc_data);
}
static const struct dev_pm_ops spt_pinctrl_pm_ops = {
SET_LATE_SYSTEM_SLEEP_PM_OPS(intel_pinctrl_suspend,
intel_pinctrl_resume)
};
static struct platform_driver spt_pinctrl_driver = {
.probe = spt_pinctrl_probe,
.remove = intel_pinctrl_remove,
.driver = {
.name = "sunrisepoint-pinctrl",
.acpi_match_table = spt_pinctrl_acpi_match,
.pm = &spt_pinctrl_pm_ops,
},
};
static int __init spt_pinctrl_init(void)
{
return platform_driver_register(&spt_pinctrl_driver);
}
subsys_initcall(spt_pinctrl_init);
static void __exit spt_pinctrl_exit(void)
{
platform_driver_unregister(&spt_pinctrl_driver);
}
module_exit(spt_pinctrl_exit);
MODULE_AUTHOR("Mathias Nyman <mathias.nyman@linux.intel.com>");
MODULE_AUTHOR("Mika Westerberg <mika.westerberg@linux.intel.com>");
MODULE_DESCRIPTION("Intel Sunrisepoint PCH pinctrl/GPIO driver");
MODULE_LICENSE("GPL v2");
|
{
"pile_set_name": "Github"
}
|
"I got you a present." "Thanks." "classical music" "You like that, don't you?" "Thanks." "Now you have to give me a present in return." "I still need to practice." "Belle speaking." "Thank you." "I get to audition." "Really?" "Sander, hold off on the penetration for now, please." "What is it?" "I'm in the next round." "Darling, that's fantastic." "That's good of you." "I'II see you in a little while." "Good, Sander." "You can start touching her a bit more now." "Where did we leave off?" "Mr Wolf." "You applied for the entrance exam?" "That's fiendishly difficult." "You're competing against top talent." "Like you said:" "Talent is only half of it." "The rest is just practice." "With emotion, Belle." "Try to feel the piece." "Let yourself go." "Try to play it slowly first." "Then the notes will follow automatically." "Then you can create something." "Belle, I hate telling you this, but I don't think the exam is a good idea." "Play for your own pleasure." "You'll fall flat on your face." "Do you know that piece?" "Yes, it's nice." "I'd really like to be able to play that." "Yes, it's pretty hard." "What did you have to play for the audition?" "We had to play a slow piece by Schubert and I messed up." "I have to play the first movement of a piece by Bruch." "Wolf says I shouldn't audition." "You should just go for it." "Keep practicing." "I really want to get in, Yukshi." "You can do it, if you really want it." "I'm going to practice again." "See you soon." "I'm looking forward to seeing you again." "Ciao, bella." "Can I come to the graduation party tonight?" "And then what?" "We can ride our bikes together." "Then we can stay longer." "I don't know how long I'II stay." "Belle, don't be such a spoilsport." "So, how's Hendrik?" "Does he really have a crooked dick?" "What gave you that idea?" "That's what I heard." "I don't know." "He can come over and spend the night here." "That's not a problem." "We have no secrets here." "I'd know what to do with him." "You're nuts." "Can I have the chocolate flakes?" "Playing the violin isn't all that matters." "Go to the party tonight and enjoy yourself." "You enjoy Hendrik and he can enjoy you." "Just experiment around a bit." "I did that too." "I'm not you." "No, I know that, but..." "You're such an open person and you know it starts here." "It starts here." "It all starts in your abdomen." "Open your chakra's, and once you can open those... the world will look very different." "Open them up." "Look at how beautiful you are." "I know it, Hendrik knows it, but you don't." "You're so gorgeous." "You know, you can always..." "There's Karin and her new boyfriend." "Darling, my sexual openness is unique." "Use it." "Hello, come in." "I feel like getting my present." "We could go now." "Later on, okay?" "I don't want any more." "Can we go now?" "Come on, let's go." "Now." "You're simply scared." "And you're simply drunk." "Not at all." "I'm just a little bit tipsy." "I'm going to the bathroom." "Push." "Thanks." "Belle Daatselaar." "They're coming to pick this up." "Thank you." "Good luck later on." "Thank you." "Can I borrow your rosin?" "Thanks." "How are you?" "I'm really nervous." "You'll be fine." "I made it too." "I practiced very hard, despite Wolf's comments." "Loose shoulders and knees and relax." "Next Belle Daatselaar." "Good luck." "Thanks." "Will I see you afterwards?" "Yes." "Bye." "That's enough, thank you." "Can I please start again?" "Yes, go ahead." "That's enough." "Thank you." "No, I think we should..." "Sorry." "It's my nerves." "It's fine." "Thank you." "We'll take that into account." "We're taking a break." "Everybody be quiet for a sound check." "I need coffee." "Everybody please be quiet." "silence" "Are you okay?" "That was beautiful." "I was really very nervous earlier." "I've never taken an entrance exam." "You played well just now." "But very different than during the audition." "One of my colleagues called your performance 'frigid'." "Frigid?" "It's her personal hang-up." "Hey, I heard you play just now." "You were very good." "I hope they'll accept you." "Sugar or milk?" "It's going to be close, but I will give you the benefit of the doubt." "You're through to the second round." "Maybe I can give you an extra lesson." "Just give me a call." "Mum, it's me." "I made it." "That's fabulous." "I'm in the second round." "That's great." "Mum, what does frigid mean?" "Frigid is a nasty word for chronically blocked chakra's." "Am I that?" "Why do you say that?" "Am I?" "Yes or no?" "You're just a bit sexless." "Sexless?" "Do you know what you need to do?" "Experiment around." "That's all." "I'II call you later." "Bye, darling." "Belle?" "Hello?" "Hey, all the way up, on the right." "What a huge room." "It's still a bit of a mess." "I need to tidy up a bit." "Hello, little parrot." "Are you still alive?" "Have you heard from them yet?" "I'm through." "You see?" "I knew it." "I've never heard you play that well before." "You must have practiced a lot." "That's not what I heard this afternoon." "I don't know why." "I need to practice a lot." "You're constantly busy memorizing the notes." "You need to let yourself go." "So you think I'm a control freak?" "Have you ever taken a pill?" "Before a performance?" "No, just for fun." "Have you?" "Yes." "And what happened?" "I felt like having sex." "Something happened during the entrance exam." "What happened?" "I don't know exactly what happened." "It was very dark." "Someone came up behind me." "What?" "I'm so ashamed." "It could have been anybody." "I completely lost control, I just grabbed him." "Did you have sex?" "I started playing very well all of a sudden." "Maybe I need to have sex with complete strangers." "John: everything women want" "Are you going to call him?" "Why would John know what women want?" "Bye." "Have fun." "Have fun at work." "Are you alone?" "Don't you have a boyfriend?" "No." "No, I don't." "A beautiful girl like you?" "I'm John." "Anka." "What a beautiful name." "Shall I put on some music?" "Can I change somewhere?" "Right then, Anka." "I'm ready, how about you?" "His name is Wilco." "You can say hi to him if you want." "Aren't you going to give him a kiss?" "Maybe later." "Good taste." "Lie on your stomach." "I've never done it before." "It's your first time?" "You're in good hands." "I'm very experienced." "This isn't working for me." "Do you want to put on Wilco's jacket?" "You can do it." "Is it okay?" "It's not you." "I'm just not very good at this." "Maybe we should stop." "Thanks." "Bye." "Here you are." "So?" "I did it." "It doesn't work." "I told you so." "Here." "Cheers." "Come in." "Beautiful place." "Thanks." "Are you nervous?" "A little bit." "What can you tell me about the piece you have to play?" "It's Bach, the second partita." "It's a sarabande in D minor." "It's an old dance." "Yes, but what is it about?" "What is the piece about for you?" "What do you hear when you play it?" "What do you see?" "That's the secret behind good playing." "What's your story?" "And who are you playing for?" "For your lover?" "For your ex?" "For your mother?" "That's important." "Breathe in and out." "A correct posture is more than half of what matters." "Show yourself." "Now you can play." "Close your eyes." "Tell yourself what the story is about and who it's for." "The story is about..." "To yourself, not to me." "It's your own secret." "That's beautiful." "I think that's enough for a first lesson." "That was beautiful." "A beer?" "Great." "Do you come here often?" "Yes, this is where we rehearse." "That's Cato, Sophie." "Sander, Simon, Pim, Daniel, Chris and Jesse who lives next door." "Pervert." "I don't think I have to introduce you?" "No, we already know each other." "Are you going to play too?" "No." "Why don't you play?" "I prefer watching." "I'm glad you're here." "Are you and Jesse involved?" "Jesse and I?" "Of course not." "I never had boyfriends at school either." "Who did?" "They're a bunch of boors." "Are you tired?" "No." "Yukshi, my ear." "Good morning." "Great." "My head." "I think I'm in love." "Jesse is really a nice guy, but I don't know what he'll think after last night." "Where are you going?" "Yukshi, where are you?" "Can you call me back?" "Have you seen Yukshi?" "She isn't here." "Did you have fun last night?" "Yes, it was fun." "I wouldn't have expected that from you." "But you're right." "Yukshi is a very nice girl." "She's a good friend of mine." "Sing something." "I want to sing, but I can't." "I want, I want, I want, I want" "I don't like it anymore." "More." "I want more." "Do you want coffee?" "Nice." "Shall I plug it in for you?" "Give me." "You can press it when I nod." "We shouldn't do this." "Yukshi is my friend." "Good luck with the audition." "Get lost." "I don't want you to stay here anymore." "I want us to stay friends." "This is Vincent Schaap's voice mail." "It's Belle." "I'd really like a lesson tomorrow, before the second round." "Could you please call me back on this number?" "I'm looking for Vincent Schaap." "Violin and cello auditions will start in five minutes in the Franz Liszt Room." "He's not answering." "I saw that you called me." "What is it?" "I want a lesson." "I want to be able to play well." "Tell me what you want." "The same thing as last time." "It's time." "Don't stop." "Thank you." "You're through to the final round." "Good luck with your preparations." "Thank you." "And?" "Did you make it?" "Yes." "Yes?" "Congratulations." "Thanks." "Shall we celebrate together?" "Together?" "You mean just the two of us?" "We could invite some other people as well if you want." "I'd like that." "And your girlfriend?" "What girlfriend?" "I'II be right back." "I need to tell him something." "I won't be long." "I want to thank you." "Belle, darling." "What a surprise." "My darling." "How nice to see you." "Let me hold you." "You smell great." "Hello, Mr Wolf." "Belle, what are you doing here?" "I've stopped playing." "This is for the school." "Bye, Mr Wolf." "Mum, what time tonight?" "The guests will be here around seven." "Is the full moon celebration tonight?" "Yes." "Will you be here on time?" "See you later." "Mum, I'm looking for a job." "Maybe you have something for me?" "Behind the bar, perhaps?" "Are you sure?" "Yes." "I'd love it." "That's wonderful." "Can I ask you something?" "Of course." "We're new here and we're looking for the relax area." "I'II walk with you." "I'II be right back." "Darling." "Darling, what's wrong?" "Tell me." "I don't know." "You need to go inside." "No, we need to sit down." "Talk to me." "I made it to the final round, but I'm not going." "I can't play." "Not on my own." "What do you mean?" "I met this boy, Jesse." "But there's also a teacher and Jesse saw me with the teacher." "This teacher did this thing to me, with my ear." "With my ear lobe." "If somebody touches my ear lobe, I lose control." "Honey..." "Everybody loses control sometimes, but you can't let that get you down." "What about Jesse?" "Do you like him?" "Shall we call him?" "Darling, come here." "This is Jesse's voice mail." "Leave a message after the beep." "Hey Jesse, it's Belle." "I wanted to talk to you." "You're not there." "Bye." "I never meant to hurt you." "I love you, but not like that." "It's okay, Belle." "Jesse is in his studio." "I want to talk to you." "The thing with Vincent wasn't genuine." "It wasn't my intention." "If somebody touches my ear lobe, I lose control." "It's very sensitive." "I like you." "I think about you all day long." "I want you to know that." "Are you going to the auditions?" "Can I borrow your violin?" "Of course." "Thanks." "Can I borrow your boots?" "Sure." "She's here for the final round." "Belle Daatselaar." "Do you want me to..." "I'd like to use this one." "Hold on, we haven't been informed." "Did you get a note on that?" "Nothing." "I think..." "Ladies..." "How will we judge this?" "Go ahead." "That's all very well, but..." "Are you okay?"
|
{
"pile_set_name": "OpenSubtitles"
}
|
[Leveling the hyperlipidemic effect of beta-adrenoblockers by means of antiatherogenic vegetarian diet].
The purpose of the study was to examine the capacities of correction of impaired lipid metabolism in patients with CHD receiving selective beta-adrenoblockers (beta-AB) by using an antiatherogenic milk-and-vegetable diet. According to the type of antiatherogenic diet, 67 patients were divided into 2 groups: 1) 42 patients were on an antiatherogenic vegetarian diet (a vegetarian group--VG) and 2) 25 patients received routine mixed diet No. 10c (a control group--CG). At the same time all the patients received similar antianginal drug therapy including the selective beta-AB atenolol in a dose of 50 mg/day. The vegetarian diet without special hypolipidemic therapy had a marked normalizing effect on the serum lipid spectrum in patients with CHD. Thus, in VG, by the end of treatment, the level of total cholesterol significantly decreased by 16% while in the controls it increased by 13%. High-density lipoprotein cholesterol increased in VG and decreased in CG, therefore the atherogenicity coefficient considerably rose. These were true for triglycerides and very low-density lipoprotein cholesterol. These parameters significantly decreased in VG (by more than 30%) and increased in CG (by 16%). Among the clinical symptoms, a more pronounced decrease in blood pressure in the patients on vegetarian diet and a more significant increase in their exercise tolerance. Balanced antiatherogenic milk-and-vegetable diet in patients with coronary heart disease prevents the hyperlipidemic effect caused by the selective beta-AB atenolol and it is an agent for preventing its negative effect on lipid metabolism.
|
{
"pile_set_name": "PubMed Abstracts"
}
|
A World of Whisky Events by WhiskyCast – Scotch Whisky News
A World of Whisky EventsPRESENTED BY LAPHROAIG
Here are some of the events going on over the next few weeks. There’s a full calendar at the WhiskyCast web site, and it’s brought to you by Laphroaig!
May 26: …Whisky Live, Madrid, Spain
May 26: Jolly Top
|
{
"pile_set_name": "Pile-CC"
}
|
In this episode, Brit returns to tell us stories of his travel, and he, along with Sam, Cork, and Peaches, talk about the last couple games and look ahead to NYCFC
|
{
"pile_set_name": "OpenWebText2"
}
|
Q:
Jenkins DSL add secret file
I would like to add secret file to my job, but I can't find which keyword from Jenkis DSL it is, any suggestions?
In xml it looks like this:
<project>
...
<properties>...</properties>
<scm class="hudson.scm.NullSCM"/>
<builders>...</builders>
<buildWrappers>
<org.jenkinsci.plugins.credentialsbinding.impl.SecretBuildWrapper plugin="credentials-binding@1.10">
<bindings>
<org.jenkinsci.plugins.credentialsbinding.impl.FileBinding>
<credentialsId>my-keytab</credentialsId>
<variable>KEYTAB</variable>
</org.jenkinsci.plugins.credentialsbinding.impl.FileBinding>
</bindings>
</org.jenkinsci.plugins.credentialsbinding.impl.SecretBuildWrapper>
</buildWrappers>
</project>
A:
You can use file within the credentialsBinding context.
job('example') {
wrappers {
credentialsBinding {
file('KEYTAB', 'my-keytab')
}
}
}
See the API Viewer for details.
|
{
"pile_set_name": "StackExchange"
}
|
Is a Medical Mistake an Error or a Crime?
The case of a Tennessee nurse has rekindled an old debate.
|
{
"pile_set_name": "PubMed Abstracts"
}
|
Ryan Yamane
Ryan I. Yamane (born October 24, 1969 in Honolulu, Hawaii) is an American politician and a Democratic member of the Hawaii House of Representatives since January 2005 representing District 37.
Education
Yamane earned his BA in psychology, his MSW, and his MBA from the University of Hawaii.
Elections
2002 Yamane attempted to challenge incumbent Republican Representative Guy Ontai for the District 35 seat, but lost the four-way September 21, 2002 Democratic Primary.
2004 Yamane and Representative Ontai were both unopposed for their September 18, 2004 primaries, setting up a rematch; Yamane won the November 2, 2004 General election against Ontai.
2008 Yamane was unopposed for both the September 20, 2008 Democratic Primary, winning with 4,036 votes, and the November 4, 2008 General election.
2010 Yamane was unopposed for the September 18, 2010 Democratic Primary, winning with 4,493 votes, and won the November 2, 2010 General election with 5,092 votes (54.8%) against Republican nominee Beth Fukumoto.
2012 Yamane was unopposed for the August 11, 2012 Democratic Primary, winning with 5,510 votes, and won the November 6, 2012 General election with 8,660 votes (75.1%) against Republican nominee Emil Svrcina.
References
External links
Official page at the Hawaii State Legislature
Category:1969 births
Category:Living people
Category:Hawaii Democrats
Category:Members of the Hawaii House of Representatives
Category:Politicians from Honolulu
Category:University of Hawaii alumni
Category:21st-century American politicians
Category:Hawaii politicians of Japanese descent
|
{
"pile_set_name": "Wikipedia (en)"
}
|
A gunman opened fire on two plain-clothes police officers in a south London street this morning.
The officers were shot at after confronting two men “acting suspiciously” in Sandmere Road, Clapham, at about 4.20am on Sunday.
Police said a man aimed a gun in their direction.
A single shot was fired but fortunately the bullet missed and neither policeman was injured.
A police helicopter was scrambled and armed officers descended on the area this morning.
One local tweeted: “There's police blocking my road and a helicopter circling above. What's happening?
“The police have got guns, massive ones, and are hovering outside of their cars.”
No weapons were found after police scoured the area.
Chief Inspector Roy Smith, who is based in Brixton, also tweeted about the incident.
“I have just seen the two officers who were shot at during the early hours of this morning,” he said.
“Pleased to report both officers are uninjured.”
A man has been arrested in connection with the incident.
A Scotland Yard spokeswoman said enquiries were ongoing.
|
{
"pile_set_name": "OpenWebText2"
}
|
Q:
Insert multiple rows from one AJAX POST into database using PHP?
Post header:
seasonString: Sommer,Hebst,Frühling,Winter
holidaywishString: 3,4,7,8
PHP:
//Insert Seasons data
$sqli="INSERT INTO seasons(season)VALUES('{$mysqli->real_escape_string($_POST['seasonString'])}')";
$insert=$mysqli->query($sql);
// $userID = mysqli_insert_id($mysqli);
//Insert Desires data
$sqli="INSERT INTO desires(desires)VALUES('{$mysqli->real_escape_string($_POST['holidaywishString'])}')";
$insert=$mysqli->query($sql);
// $userID = mysqli_insert_id($mysqli);
In this case the data is inserted into my database table tbl_season on one column:
Sommer, Hebst, Frühling, Winter
holidaywishString:3, 4, 7, 8
But I want it to be this way:
tbl_season;
id season
-1 Sommer
-1 Hebst
-2 winter
-3 hebst
How can I achieve that?
A:
$arrSeason = explode(',', $_POST['seasonString']);
foreach($arrSeason as $season ){
$sqlSeason = "INSERT INTO seasons(season,iduserinfo)VALUES('".$mysqli->real_escape_string($season)."','$userID')";
$mysqli->query($sqlSeason);
}
/problem solved Thanx a lot
|
{
"pile_set_name": "StackExchange"
}
|
Direct visuomotor mapping for fast visually-evoked arm movements.
In contrast to conventional reaction time (RT) tasks, saccadic RT's to visual targets are very fast and unaffected by the number of possible targets. This can be explained by the sub-cortical circuitry underlying eye movements, which involves direct mapping between retinal input and motor output in the superior colliculus. Here we asked if the choice-invariance established for the eyes also applies to a special class of fast visuomotor responses of the upper limb. Using a target-pointing paradigm we observed very fast reaction times (<150 ms) which were completely unaffected as the number of possible target choices was increased from 1 to 4. When we introduced a condition of altered stimulus-response mapping, RT went up and a cost of choice was observed. These results can be explained by direct mapping between visual input and motor output, compatible with a sub-cortical pathway for visual control of the upper limb.
|
{
"pile_set_name": "PubMed Abstracts"
}
|
Q:
What exactly is an instance in Java?
What is the difference between an object, instance, and reference? They say that they have to create an instance to their application? What does that mean?
A:
An object and an instance are the same thing.
Personally I prefer to use the word "instance" when referring to a specific object of a specific type, for example "an instance of type Foo". But when talking about objects in general I would say "objects" rather than "instances".
A reference either refers to a specific object or else it can be a null reference.
They say that they have to create an instance to their application. What does it mean?
They probably mean you have to write something like this:
Foo foo = new Foo();
If you are unsure what type you should instantiate you should contact the developers of the application and ask for a more complete example.
A:
"instance to an application" means nothing.
"object" and "instance" are the same thing. There is a "class" that defines structure, and instances of that class (obtained with new ClassName()). For example there is the class Car, and there are instance with different properties like mileage, max speed, horse-power, brand, etc.
Reference is, in the Java context, a variable* - it is something pointing to an object/instance. For example, String s = null; - s is a reference, that currently references no instance, but can reference an instance of the String class.
*Jon Skeet made a note about the difference between a variable and a reference. See his comment. It is an important distinction about how Java works when you invoke a method - pass-by-value.
The value of s is a reference. It's very important to distinguish between variables and values, and objects and references.
A:
When you use the keyword new for example JFrame j = new JFrame(); you are creating an instance of the class JFrame.
The new operator instantiates a
class by allocating memory for a new
object and returning a reference to
that memory.
Note: The phrase "instantiating a class" means the same thing as
"creating an object." When you create
an object, you are creating an
"instance" of a class, therefore
"instantiating" a class.
Take a look here
Creating Objects
The types of the Java programming
language are divided into two
categories: primitive types and
reference types.
The reference types
are class types, interface types, and
array types.
There is also a special
null type.
An object is a
dynamically created instance of a
class type or a dynamically created
array.
The values of a reference
type are references to objects.
Refer Types, Values, and Variables for more information
|
{
"pile_set_name": "StackExchange"
}
|
--TEST--
phpunit EmptyTestCaseTest ../_files/EmptyTestCaseTest.php
--FILE--
<?php
$_SERVER['argv'][1] = '--no-configuration';
$_SERVER['argv'][2] = 'EmptyTestCaseTest';
$_SERVER['argv'][3] = dirname(dirname(__FILE__)) . '/_files/EmptyTestCaseTest.php';
require __DIR__ . '/../bootstrap.php';
PHPUnit_TextUI_Command::main();
?>
--EXPECTF--
PHPUnit %s by Sebastian Bergmann and contributors.
F
Time: %s, Memory: %s
There was 1 failure:
1) Warning
No tests found in class "EmptyTestCaseTest".
FAILURES!
Tests: 1, Assertions: 0, Failures: 1.
|
{
"pile_set_name": "Github"
}
|
Kagoshima Meibutsu (Local Specialities): Top 5 Foods!
Thinking of visiting Kagoshima? Make sure to try out these Kagoshima meibutsu!
(1) Satsuma Age (薩摩揚げ)
Satsuma-age is a fried fishcake from Kagoshima, Japan. The paste is made from fish and seasoned with salt, sugar, and other spices and moulded into various shapes.
While Kagoshima prefecture is famous for Satsuma Age, it was originally brought from Okinawa in 1864 when the two areas were hostile.
These days, however, the fishcake can be seen all over Japan. There’s a good chance you will have seen them in instant soba noodles.
(2) Shirokuma “Polar Bear Shaved Ice”(シロクマ)
Kagoshima is Japan’s most southernly prefecture bar Okinawa, so you can imagine has it has quite a warm climate. What better to keep cool than Kagoshima’s famous shirokuma shaved ice. The icy dessert is served with fruit and sweets sprinkled on.
(3) Silver-stripe herring sashimi (きびなごの刺身)
Sashimi is raw fish that is often eaten with soy sauce and wasabi. Kagoshima is known for doing this with silver-stripe herring, a small white fish. Raw fish may put some of you off, but you really should try it before deciding.
(4) Chicken Sashi (鳥刺し)
You’re not mistaken, this really is raw chicken. You’ve always been told to be careful when handling raw chicken, let alone trying to eat it, right? But in Kagoshima, people do.
Of course, the chicken will have been specially taken care of to reduce salmonella to the lowest amount possible – but would you risk it?
I have actually tried this, and well, I’m not in any rush to try it again.
(5) Pork Shabu (豚しゃぶ)
You may have heard of the Japanese cuisine known as ‘shabu-shabu’. Shabu-shabu is a Chinese-Japanese nabemono hotpot dish of thinly sliced meat and vegetables boiled in water. In Kagoshima, it is often done with pork instead of beef.
There are many restaurants that specialize in shabu-shabu all around Japan. While it isn’t the cheapest gourmet, it’s sure to be a great experience.
These are arguably the top 5 Kagoshima meibutsu, but how many do you want to try?
|
{
"pile_set_name": "Pile-CC"
}
|
<?xml version="1.0" encoding="UTF-8"?>
<module type="JAVA_MODULE" version="4">
<component name="NewModuleRootManager" inherit-compiler-output="true">
<exclude-output />
<content url="file://$MODULE_DIR$">
<sourceFolder url="file://$MODULE_DIR$" isTestSource="false" />
</content>
<orderEntry type="inheritedJdk" />
<orderEntry type="sourceFolder" forTests="false" />
</component>
</module>
|
{
"pile_set_name": "Github"
}
|
#!/bin/sh
node server.js &
#node server.js &
#node server.js &
#node server.js &
node --debug pub.js
|
{
"pile_set_name": "Github"
}
|
Shelley King
Shelley King (born 25 September 1955) is a British-Indian actress, known for her roles as Jay Harper on Angels and Yasmeen Nazir on the ITV soap opera Coronation Street.
Early life
King was born in Calcutta, India in 1955 to Kelly King, a much respected photographer in India and the UK. King attended La Martinere for Girls and learnt English and French but not her ancestral languages. On 18 April 2018 during an interview on ITV's This Morning King opened up about being a gay woman and discussed her own struggles and difficulties which she had with her own sexuality.
Coronation Street
Yasmeen Nazir, played by Shelley King, made her first on-screen appearance on 4 July 2014. The character and King's casting was announced on 15 May 2014. Yasmeen is established character Kal Nazir's (Jimi Mistry) mother and the wife of Sharif Nazir (Marc Anwar). The Nazirs were the show's first Muslim family. Formerly a librarian, Yasmeen runs Jamila House; a community centre, on Victoria Street.
Filmography
References
Category:1955 births
Category:Living people
Category:British people of Indian descent
Category:British people of South Asian descent
Category:English people of Portuguese descent
Category:English people of Irish descent
Category:English people of Scottish descent
Category:British people of English descent
Category:Anglo-Indian people
Category:British soap opera actresses
Category:British television actresses
Category:British stage actresses
Category:Lesbian actresses
Category:LGBT entertainers from England
|
{
"pile_set_name": "Wikipedia (en)"
}
|
Indications and results of pleuropulmonary decortications in the university hospital of Kinshasa.
In a retrospective and prospective study the authors assess factors influencing postoperative results in patients operated on for pachypleuritis with late referral to the hospital. There were 78 cases in the retrospective (1970-1984) and 28 cases in the prospective (1985-1992) parts of the study. The total number of treated cases is 106 (75 males and 31 females). There were 32 children (> 15 years of age) and 74 adults (< or = 15 years). General condition was good in 45 patients (11 children and 34 adults) and poor in 61 patients (21 children and 40 adults). Ninety percent of the patients were operated on at least one month after the appearance of their symptoms. Eighty-one patients (75.4%) had an empyema secondary to bronchopulmonary infection (34 tuberculous). Other etiologies were: thoracic trauma: 23 cases (19 open and 4 internal); miscellaneous: 2 cases. The commonest isolated organisms were S. aureus, (21.4%), Klebsiella (21.4%) Pseudomonas (13%), Proteus mirabilis, P. vulgaris, P. aeruginosa (11.9%), E. coli (8.4%) and Pyocyaneus (5.9%). In all cases, a total decortication was performed. Good result was achieved in 55/106 (51.8%). There were 39/106 (36.9%) poor results and 12 operative deaths (11.3%). No correlation could be found between results and age, sex or etiology. A significant correlation appeared between duration of symptoms and postoperative results. The longer the delay; the worse the results.
|
{
"pile_set_name": "PubMed Abstracts"
}
|
Q:
Spring/Angular get current user and save post to that user
Sorry, I am back with just one more question. I have am using Spring security and Angular front end. My question is once I log in, how do I save a post to the current user.
Post model:
@Id
@GeneratedValue
private Long id;
private String title;
@Column(columnDefinition = "TEXT")
private String body;
@JsonFormat(pattern = "yyyy-MM-dd hh:mm:ss a", timezone = "America/New_York")
private Date createdAt;
private String pictureUrl;
@ManyToOne(fetch = FetchType.LAZY)
@JoinColumn(name = "user")
private User user;
UserDetailsServiceImpl:
@Service
public class UserDetailsServiceImpl implements UserDetailsService {
@Autowired
private UserRepository repository;
@Override
public UserDetails loadUserByUsername(String username) throws
UsernameNotFoundException {
// Get the user's username
User currentUser = repository.findByUsername(username);
// Create a new UserDetails called user and set to user's :
// username, current users password, user is enabled, account Non expired, creds non expired
// account non locked,
UserDetails user = new org.springframework.security.core.userdetails.User(username, currentUser.getPassword(),
true, true, true, true,
AuthorityUtils.createAuthorityList(currentUser.getRole()));
return user;
}
}
Obviously this works fine with the command line runner:
Post post1 = new Post("Title", "Some content", date, user1);
Angular:
addPost() {
const title = this.eventForm.get('title').value;
const body = this.eventForm.get('body').value;
const newTask: Task = {
post,
body
};
this.data.addPost(newPost).subscribe((res) => {
console.log(res);
this.getPost();
});
}
How can I, once logged in, get the actual user object to save the post object.
A:
I have no idea if this is the correct way to do this, but it works at least! Lol...
It works for now anyways, haha.
@Autowired
private PostRepository repository;
@Autowired
UserRepository userRepository;
@PostMapping("/posts")
public void addPost(@RequestBody Post post) {
Authentication auth = SecurityContextHolder.getContext().getAuthentication();
User user = userRepository.findByUsername(auth.getName());
post.setUser(user);
this.repository.save(post);
}
|
{
"pile_set_name": "StackExchange"
}
|
An equatorial storm on Neptune has caught astronomers' eyes.
Astronomers studying Neptune have been following a large storm on the ice giant unlike any seen in the past.
Using one of the Keck Observatory's 10-meter adaptive-optics-equipped telescopes, Imke de Pater and graduate student Ned Molter (both at University of California, Berkeley) spotted a bright storm complex spanning at least 30° in both latitude and longitude centered near the planet's equator. The storm brightened between observations taken on June 26th and July 2nd.
The storm was initially thought to be the same Northern Cloud Complex first seen by the Hubble Space telescope in 1994, after the Great Dark Spot imaged by the Voyager 2 spacecraft in its 1989 flyby had disappeared. But measurements of this storm's location show it to be something completely different.
A large, high-pressure vortex system deep within Neptune’s atmosphere is thought to drive the white storm clouds. As methane gases rise up in the vortex, they cool below the condensation temperature, forming clouds in the same way that water vapor does on Earth.
The location of the vortex caught astronomers by surprise, though. “Historically, bright clouds have occasionally been seen on Neptune, but usually at latitudes closer to the poles, around 10 to 60 degrees north or south” says de Pater. “Never before has a cloud been seen at, nor close to the equator, or anything so bright.”
Neptune is the windiest planet in the solar system, with observed equatorial wind speeds of up to 1,000 miles per hour (450 m/s). Since wind speeds vary drastically with latitude, a storm crossing more than 30° of latitude should quickly break apart. Something, such as an underlying vortex, must be holding it together. But a long-lasting vortex right at the equator would be hard to reconcile with our current understanding of the planet’s atmosphere.
It's possible, given the storm's extent, that it's not a vortex after all but rather a huge convective cloud, similar to the one spotted on Saturn in 2010.
“This shows that there are extremely drastic changes in the dynamics of Neptune’s atmosphere, and perhaps this is a seasonal weather event that may happen every few decades or so,” de Pater says.
Neptune orbits the Sun every 160 years, with each season lasting 40 years. We’ve only had a close look at the planet for less than 30 years.
Amateur Observations
Some intrepid amateurs also detected the storm in the weeks preceding the Keck observations using telescopes of 10 inches or more. Experienced planetary imagers using high-speed video cameras and frame-stacking software have a good chance of capturing the storm (appearing as a bright off-center spot) on the diminutive disk of the planet.
Read Keck Observatory's press release here.
|
{
"pile_set_name": "OpenWebText2"
}
|
Somatosensory-evoked potentials in term neonates with postasphyxial encephalopathy.
This article reviews the use of median nerve somatosensory-evoked potentials in full-term neonates with postasphyxial encephalopathy. The predictive value of this technique with regard to neurodevelopmental outcome is compared with that of clinical assessment and cranial ultrasonography.
|
{
"pile_set_name": "PubMed Abstracts"
}
|
Inhibitory role of the serotonergic system on estrogen receptor α expression in the female rat hypothalamus.
The role of the serotonergic system in regulating the expression of estrogen receptor (ER) α in the hypothalamus was investigated in ovariectomized rats by injecting a serotonin synthesis inhibitor, parachlorophenylalanine (PCPA), or by destroying the dorsal raphe nucleus (DR). The number of ERα-immunoreactive (ir) cells was counted in the anteroventral periventricular nucleus in the preoptic area (AVPV), ventrolateral ventromedial hypothalamic nucleus (vlVMN), and arcuate nucleus (ARCN). Seven days after ovariectomy, 100mg/kg PCPA or saline was injected daily for 4 days. Alternatively, radiofrequency lesioning of the DR (DRL) or sham lesions were made on the same time of ovariectomy. One-day after the last injection of PCPA or 7 days after brain surgery, the brain was fixed for immunostaining of ERα and the number of ERα-ir cell were counted in the nuclei of interest. The mean number of ERα-ir cells/mm(3) (density) in the AVPV of the PCPA or DRL groups was statistically higher than that in the saline or sham group. In the vlVMN and ARCN of the PCPA or DRL groups, the mean density of ERα-ir cells was comparable to the saline or sham groups. These results suggest that the serotonergic system of the DR plays an inhibitory role on the expression of ERα in the AVPV, but not in the vlVMN and ARCN.
|
{
"pile_set_name": "PubMed Abstracts"
}
|
Cryptocurrency was what made an entry into the financial sector to address the concerns raised by the centralized infrastructure. It helped in achieving anonymous transactions and thus aided in reducing the charges levied by the third party service providers. Subsequent launches of cryptocurrencies were aimed at resolving a host of issues and in fact, worked through every aspect of human community at large. Bitcore is one such capable crypto coin that plans to change the scenario where crypto assets are going through a panicky situation.
Bitcore – What Exactly is It?
Bitcore is essentially a fork for Bitcoin and aims at solving a few issues plaguing the Bitcoin. It copies almost all the features of Bitcoin but runs on its own platform. In fact, it does come with a host of features that would make it a better option than Bitcoin.
It was rather difficult and challenging plans ahead through its roadmap. It has plans to surpass Bitcoin and looking to position itself as the number one payment coin in the future ahead. The focus of now has been to make the currency available to as many people as possible. There are regular airdrops every week.
The Future Ahead
How will Bitcore function is indeed an interesting option. It will be able to succeed if it comes up with the really unique features. It has a faster mining mechanism in place as of now and uses a completely different mining algorithm.
The hybrid fork nature of Bitcore makes it one of the fastest options. The association with SegWit and Bloom can make it one of the fastest cryptocurrencies with just 2.5 minute block time. The 10 MB block size will allow it to mine a whopping 17.6 billion transactions per year. It can be estimated that it can theoretically perform the transactions that Bitcoin can perform in a year, in just three days.
The speed is what can make Bitcore a capable currency for the day to day transactions. Moreover, running the Bitcore would take small storage space and as such, it can even run on smartphones. They will soon be launching BTXM machines for the two-way transactions and a unique FIAT gateway. The BTXM will work like an ATM transaction that we are used to.
Is it worth the Efforts?
Well, should be ideally. They already have a well-designed roadmap quite well planned. The focus right now has been to integrate with multiple wallet platforms. It will soon integrate itself into the payment processors for an efficient and hassle free usage for the real world purposes. It has been working on a few cutting edge technologies to stay ahead in the march.
The unique features would be what would help any new cryptocurrency to stay afloat. We would expect Bitcore to come up with such specialised applications soon. In fact, they have already been through the road with initiatives like lightening network, atomic swaps and similar options. The exact outcome will only be visible once the entire platform is ready.
|
{
"pile_set_name": "OpenWebText2"
}
|
//===----------------------------------------------------------------------===//
//
// The LLVM Compiler Infrastructure
//
// This file is dual licensed under the MIT and the University of Illinois Open
// Source Licenses. See LICENSE.TXT for details.
//
//===----------------------------------------------------------------------===//
// <iterator>
// move_iterator
// template <class U>
// requires HasAssign<Iter, const U&>
// move_iterator&
// operator=(const move_iterator<U>& u);
// test requires
#include <iterator>
template <class It, class U>
void
test(U u)
{
const std::move_iterator<U> r2(u);
std::move_iterator<It> r1;
r1 = r2;
}
struct base {};
struct derived {};
int main()
{
derived d;
test<base*>(&d);
}
|
{
"pile_set_name": "Github"
}
|
Pages
Tuesday, 22 March 2016
The pancake batter dispenser,the stainless steel mixing bowl and the 9 inch balloon whisk would make ideal utensils to have in your kitchen for baking. I was sent the samples to review by OXO and I really find them handy in my Kitchen. The stainless steel bowl is sturdy with a non slip base. Made with a steel interior and a plastic exterior it is perfect to retain heat but also safe enough to handle from the outside.It is dishwasher safe too.
The OXO mini 9 inch balloon whisk is neat and handy for whisking small quantities. It is made from polished stainless steel wires, has a teardrop shape and is perfect for aerating ingredients. It is dishwasher safe too.
The Batter Dispenser is a godsend you can use it to store your pancake batter without it dripping everywhere. It has a soft contoured body and a silicon valve that allows you to dispense just the right amount of batter as needed.The batter dispenser is great for filling cupcake cases, waffles and also for piping fun designs.
As always I love my readers to try out everything I use in my kitchen . Oxo have been generous and they will send one simplyfood reader a pancake batter dispenser, a mixing bowl and a whisk so that they too can whizz up some great bakes in their kitchens.
How To Enter:
Simply complete the Rafflecopter widget below to verify your entries
Entries can be via blog comment, Facebook, Twitter etc
This competition is open to UK residents only over the age of 18 .Please read the rules below.
Leaving a blog comment is mandatory and failure to do so will void any other entries.
Closing date - 2nd April 2016 12.00 am
How Rafflecopter works:
You will need to complete the mandatory entry first – usually making a blog comment. You can do this by clicking on leave a comment at the bottom of the post and leaving your reply in the comment box.Please note your comment will not show immediately as it needs to be moderated however rest assured it will appear on the site, so carry on with rest of entries.
Login to Rafflecopter – click to see what the question is. Make a comment answering the question on the blog.
Go back to Rafflecopter and click the green button to tell me you have made a comment, this will unlock all the other options. All entries are checked to see that the mandatory question is answered, if its not all bonus entries will become void.
A food fanatic with a passion for creating , cooking and sharing mouth watering recipes to tickle and tantalise your taste buds. A "homecook" without culinary school training striving to make my dishes feel complete without being complicated.
"Too often we underestimate the power of a touch, a smile, a kind word, a listening ear, an honest compliment, or the smallest act of caring, all of which have the potential to motivate.”Thankyou for taking the time to post "that kind word" , its very inspiring.If you enjoyed your visit and would like regular updates please take a moment to join via google connect widget in the side bar.If you leave a question that needs answering please make sure your profile has an email ID enabled so I can reply to it.
Please do not leave your site URL in comment section.Please note any spam comment using this space as free advertising will be PROMPTLY deleted as will all anonymous comments.
|
{
"pile_set_name": "Pile-CC"
}
|
An update on Pwit. He now has a sweater for when he wants to get comfy and fire claws for when you insult his poetry.
|
{
"pile_set_name": "OpenWebText2"
}
|
Q:
Interacting with box2D objects
How can I interact with an object in box2d, I'm completely new to this so I have no clue what to do. The box is created like this:
bodyDef.type = b2Body.b2_dynamicBody;
fixDef.shape = new b2PolygonShape;
fixDef.shape.SetAsBox(0.5, 0.5); // Half-Width, Half-Height
bodyDef.position.x = 5;
bodyDef.position.y = 5;
world.CreateBody(bodyDef).CreateFixture(fixDef);
How can I change the x, y positions of that box, tried bodyDef.position.x--; but it returned "bodyDef is not defined". How do I access this?
A:
For moving here is SetTransform, for interacting MouseJoint. BodyDef is used to make creation of bodies easier, so it is used just in that function, you have to store value returned by CreateBody, and read documentation first.
|
{
"pile_set_name": "StackExchange"
}
|
Q:
Core Data Detail View from To-Many relationship
I'm struggling with some aspects of Core Data, namely setting up a UITableView to list data from a to-many relationship.
I have three entities, Teams, TeamDetails and Players:
In the first view, I list the names of all the teams in the Teams entity, then tapping each cell segues to an intermediate view with buttons to either edit a team's details or edit a team's players. Tapping on a button segues to another UITableView that lists the Team's details or Players.
Listing the TeamDetails works, since it is a one-to-one relationship and a static cell table.
I'm trying to set up a UITableViewController that lists all the players that are associated with the selected team. So I pass the ManagedObjectContext etc to the table view controller via the segue as shown below:
else if ([segue.identifier isEqualToString:@"ShowPlayersSegue"]){
NSLog(@"Setting ShowPlayersTVC as a delegate of EditPlayerTVC");
ShowPlayersTVC *showPlayerTVC = segue.destinationViewController;
showPlayerTVC.delegate = self;
showPlayerTVC.managedObjectContext = self.managedObjectContext;
showPlayerTVC.team = self.team;
showPlayerTVC.player = self.team.playerDetails;
}
So, in my showPlayerTVC I want to get the set of players for that specific team, then have a row for each one that shows the playerName attribute as the cell textlabel.text.
I've been reading tutorials and playing around for ages without getting much success. I think I need to create an array of Player objects from the NSSet, which I can do, but I can't get the UITableview to list the objects. I'm probably missing something fundamental here, but any suggestions would be appreciated.
A:
First, there are some issues with your data model.
The one-to-one to details I do not understand - why not just add attributes to the Team entity? Also, you may want to transform some of these into more flexible relationships, such as a Trainer entity, etc.
Also, your naming is flawed and will lead to programming errors or at least make your code difficult to read. Note the singular / plural confusion. Here is my suggestion for naming your entities / relationships:
Team - players <--------------->> team - Player
To display data in an a table view you should use NSFetchedResultsController. Let the FRC fetch the Player entity and give its fetch request the following predicate:
[NSPredicate predicateWithFormat:@"team = %@", teamObject];
Your segue code is almost correct. Give the new view controller a team attribute and use this in the above predicate of its fetched results controller. You do not need any player or "playerDetails" information (they are linked to the team anyway).
|
{
"pile_set_name": "StackExchange"
}
|
From the outside, not much distinguishes Jerry Williams Jr.’s ranch-style home from those around it on a quiet suburban street in Northridge.
Step through the front door, though, and it’s apparent that somebody unusual lives here.
There’s the entryway lined with gold and platinum records. There’s the cozy bedroom into which a white grand piano has been squeezed. And out back there’s the swimming pool, empty of all but a few inches of murky water, with a painting on the bottom depicting Williams astride an enormous white rat.
The image will be familiar to fans of Williams’ alter ego, the funk eccentric Swamp Dogg, who put it on the cover of his cult-favorite 1971 album “Rat On!” Back then, this skilled singer and pianist was looking to rebrand himself after years as a journeyman R&B act and producer for the likes of Gene Pitney (“She’s a Heartbreaker”) and Doris Duke (“To the Other Woman [I’m the Other Woman]”).
“Total Destruction to Your Mind,” which came out in 1970, announced the arrival of an outspoken sonic adventurer; “Rat On!” doubled down on Swamp Dogg’s outré vision with a heartfelt provocation called “God Bless America — for What?”
Now, at age 76, Williams is taking another hard left with “Love, Loss, and Auto-Tune,” a surprising new album that maintains his experimental streak even as it demonstrates his perseverance in an unforgiving business.
Due Friday, the record was produced by Ryan Olson of the Minneapolis synth-pop band Poliça and features input by Olson’s frequent collaborator Justin Vernon of Bon Iver. And as its title promises, it leans heavily on the vocal-processing software made famous by T-Pain (in hits like “Buy U a Drank”) and Kanye West (on his album “808s & Heartbreak”).
The strangely touching result, laced with electronic bleeps and beats that make Williams sound like a bummed-out android, represents a radical reframing of the psychedelic Swamp Dogg style.
“Yeah, I suppose it does,” Williams acknowledged on a recent afternoon. “I like it, though. It’s the best thing I’ve done since the ’70s.”
Sitting in his blue-carpeted living room next to a vintage jukebox stocked with tunes he wrote or produced — including Johnny Paycheck’s “She’s All I Got” and “In Between Tears” by Irma Thomas — Williams said the album grew out of a typically wacky impulse: What would happen if, like so many veteran singers, he made an old-school crooner’s album — but warped the vocal performances in the manner of Zapp and George Clinton?
“Love, Loss, and Auto-Tune” opens with a rendition of “Answer Me, My Love,” the winsome ballad popularized by Nat King Cole, and closes with a take on Hoagy Carmichael’s indelible “Stardust”; in between are originals about romance and loneliness and the hard luck of a man trying to make a buck.
Each is as solidly built as you’d expect from someone who estimates he’s written nearly 2,000 songs. Yet the startling production takes the music far away from the land of “So-and-So Sings the Great American Songbook.”
Swamp Dogg in his pool, which features a painting inspired by the cover of his 1971 album “Rat On!” (Mel Melcon / Los Angeles Times)
Olson said Williams encouraged him to go as wild as he wanted with his arrangements, which he created out of material Williams had originally recorded at home. (The two met when Williams approached Olson about possibly reissuing an old record through Olson’s label, Totally Gross National Product.)
“I warned Swamp — I was like, ‘This is kind of messed up,’” the producer said. “But I sent it back and he was all for it: ‘This is insane and I love it.’”
For all the artistic daring of their collaboration, Williams was forthright about why he sought out Olson and Vernon to oversee “Love, Loss, and Auto-Tune,” and that’s the clear-cut commercial success the two men have enjoyed with the Grammy-winning Bon Iver.
“He sold way over a million units on his first album,” Williams said of Vernon’s 2007 debut under the Bon Iver name. “So I said, ‘He’s got something going on, and I want some of it.’”
Asked whether he worried that the new album’s highly doctored sound might turn off fans accustomed to a more organic approach, Williams scoffed.
“My last album sold 4,000,” he replied. “I ain’t got no people to turn off.”
Williams’ close attention to numbers makes sense for a guy with decades’ worth of stories about all the times he’s been ripped off in the record industry.
Among them, in his view, is the lousy deal he got when 50 Cent sampled an old track of his a few years back: a measly $25,000 up front, he said, with no residuals. (Having learned his lesson, he claims he asked for a 10-cent royalty on each record sold when Drake’s team recently tried to clear a sample — a request he’s pretty sure scared off the Canadian rapper.)
Still, you have to scratch your head at some of Williams’ reasoning. Setting aside its quality — and of course the fact that its back story has led to publicity like the article you’re reading — “Love, Loss, and Auto-Tune” is an improbable blockbuster.
From anyone else, an album this weird would represent a passion project, not a cash grab.
In a way, though, Williams’ self-belief seems key to the whole over-the-top Swamp Dogg enterprise. Without it, it’s hard to imagine how he ever would’ve climbed on that giant white rat, which here we are still talking about nearly half a century later.
At his house, where a small dog slept at his feet — the dog’s name is Lowe because Williams’ granddaughter “either found him or stole him” in front of a Lowe’s store — the singer grew uncharacteristically soft as he remembered how his wife and longtime manager, Yvonne, showed him the ropes of Swamp Dogg Inc. before her death in 2003.
“She was laying in the hospital, had me bring her the books saying what we owe,” he recalled quietly. “She said, ‘Look, you know I’m-a leave you — I got to go.’” Williams said he didn’t believe her. “But she was right.”
Was it hard to pick back up after she died?
“Nah,” he said. “She told me, ‘Don’t let nobody deter you — you’re on the right road.’”
The phone rang; it was Williams’ physical therapist, calling about an appointment to work on a back injury.
He couldn’t come today, Williams said. He had some business he had to attend to.
mikael.wood@latimes.com
Twitter: @mikaelwood
|
{
"pile_set_name": "OpenWebText2"
}
|
GPW
GPW may refer to:
Ford GPW, an automobile
Government Polytechnic Hindupur or Government Polytechnic For Women, Hindupur (GPW Hindupur), Hindupur, Andhra Pradesh, India
Grand Prix Wrestling, a defunct Canadian professional wrestling
Grand Pro Wrestling, a British professional wrestling promotion
Warsaw Stock Exchange (Polish: )
Gachimuchi, a shorter term for Gachimuchi Pants Wrestling; related to Billy Herrington
See also
Ground proximity warning system
|
{
"pile_set_name": "Wikipedia (en)"
}
|
The GROBAT is a small-diameter bat featuring a movable Sweetspot Simulator pad that tells the batter that he (or she) is using the correct area on the bat, the sweetspot. Since this area is smaller than that of a regular bat, hand-eye coordination and confidence of the batter improves dramatically!
Unlike other hitting “sticks” however, the GROBAT is unique because of its variable length AND weight, and thus can be used by multiple persons of different age and size, or by one person who is growing quickly! It is critically important that during extended batting practice, the hitter use his GAME BAT to maintain proper timing and mechanics. Use of any training device that does NOT mimic the dynamics of the game bat is detrimental to developing consistent swing mechanics. Using lighter or heavier bats in extended practice can defeat their intended purpose — better hitting!
Unlike other bats, GROBAT can be easily modified in both length AND weight, and comes equipped with a movable choke/collar and a set of weights from 2 to 9 ounces. The GROBAT can mimic any bat, from 28"/19oz. to 34"/33oz., or anything in between!
The GROBAT collar can also be used on the handle of a regular bat (see photo above), so that when you purchase your next bat, you can get a 1" or 2" larger bat which will “grow” with your son (or daughter), saving money and maintaining familiarity.
The GROBAT is available in 30", 32", 33" and 34" standard lengths and, un-weighted, are 19, 20, 21, and 22 oz. respectively. The coin-removable threaded end plug allows insertion of any combination of 2, 3, or 4-ounce weights (see photo).
These features allow the GROBAT to be used as a light weight “stick” to develop quick speed through the zone, or it can be over-loaded to develop and stretch the large muscle groups. This type of practice should be between 20 and 30 percent of your practice regimen, with the remainder using your GROBAT with the same weight and length as your game bat. This practice technique optimizes the most important aspects of your hitting game - batspeed, power, and hand-eye coordination!
Proper selection of your GROBAT length is important so it can be used for the maximum number of years by your oldest child. It can always be downsized for smaller players coming up.
If you need a 27" - 29" bat ...then order a 30" GroBat JR.
If you need a 30" - 31" bat ...then order a 32" GroBat
If you need a 32" - 34" bat ...then order a 33" or 34"
Weight-Pac & Choke Collar are included with all bats except the GroBat JR (comes with Choke Collar only). Developed and Tested by Chris Richard, Major League Baseball Player. Recommended for use with Wiffle balls ONLY.
|
{
"pile_set_name": "Pile-CC"
}
|
<?php
namespace OSS\Tests;
use OSS\Http\ResponseCore;
use OSS\Core\OssException;
use OSS\Model\LifecycleConfig;
use OSS\Result\GetLifecycleResult;
class GetLifecycleResultTest extends \PHPUnit_Framework_TestCase
{
private $validXml = <<<BBBB
<?xml version="1.0" encoding="utf-8"?>
<LifecycleConfiguration>
<Rule>
<ID>delete obsoleted files</ID>
<Prefix>obsoleted/</Prefix>
<Status>Enabled</Status>
<Expiration><Days>3</Days></Expiration>
</Rule>
<Rule>
<ID>delete temporary files</ID>
<Prefix>temporary/</Prefix>
<Status>Enabled</Status>
<Expiration><Date>2022-10-12T00:00:00.000Z</Date></Expiration>
<Expiration2><Date>2022-10-12T00:00:00.000Z</Date></Expiration2>
</Rule>
</LifecycleConfiguration>
BBBB;
public function testParseValidXml()
{
$response = new ResponseCore(array(), $this->validXml, 200);
$result = new GetLifecycleResult($response);
$this->assertTrue($result->isOK());
$this->assertNotNull($result->getData());
$this->assertNotNull($result->getRawResponse());
$lifecycleConfig = $result->getData();
$this->assertEquals($this->cleanXml($this->validXml), $this->cleanXml($lifecycleConfig->serializeToXml()));
}
private function cleanXml($xml)
{
return str_replace("\n", "", str_replace("\r", "", $xml));
}
public function testInvalidResponse()
{
$response = new ResponseCore(array(), $this->validXml, 300);
try {
new GetLifecycleResult($response);
$this->assertTrue(false);
} catch (OssException $e) {
}
}
}
|
{
"pile_set_name": "Github"
}
|
Farah News Online
http://www.farah.net.au/
Jumblat: Fear-inciting Remarks on Islamists a 'Scarecrow'
| 13.09,11. 05:39 AM |
Jumblat: Fear-inciting Remarks on Islamists a 'Scarecrow'
Progressive Socialist Party leader MP Walid Jumblat on Monday noted that the latest “fear-inciting remarks on the rise of Salafist or fundamentalist (Islamist) movements … are being used as a ‘scarecrow’.”
“These remarks remind us of the old-new approach that calls for an alliance of minorities” in the region, Jumblat said, adding that such an approach “has destroyed Lebanon.”
In his weekly column in his party’s Al-Anbaa newspaper, the Druze leader hit back at Maronite Patriarch Beshara al-Rahi without naming him, warning that “linking the issue of arms to the issue of naturalization (of Palestinian refugees) will keep Lebanon endlessly entangled in regional conflicts.”
“Linking Lebanon’s fate to the liberation of the Shebaa Farms and the entire conflicts in the region is rejected,” Jumblat added.
He stressed “the importance of the Resistance’s weapons concerning national defense,” but noted that it is also “necessary to come up with a defense plan, through which arms would be gradually incorporated into the Lebanese state, as stipulated by the Doha Accord, in order to strengthen the Lebanese state’s capability to deter any possible Israeli aggression.”
“Domestically, the best way to tackle the issue of naturalization would be through improving the temporary living conditions of the Palestinians … and ending the siege on the (Palestinian) camps,” Jumblat noted.
Tackling the Syrian crisis, the PSP leader reiterated that “only a political solution would pull Syria out of this dilemma,” rejecting “any foreign intervention.”
“The demand for freedom, democracy, pluralism and justice cannot be segregated,” he added.
|
{
"pile_set_name": "Pile-CC"
}
|
FUCK IT MAYBE THE SHELL IS GOOD FOR YOU
111 shares
|
{
"pile_set_name": "OpenWebText2"
}
|
The invention relates to producing smoothed clock and data signals from gapped clock and data signals.
In many modern communication systems, timing information, in the form of clock signals, plays a critical role in system performance. In these applications, the clock signals are used to drive circuitry such as mixers and sampling circuits for which consistency in the sampling instant is an important performance parameter. Minimizing timing errors requires minimizing the noise introduced during the distribution and buffering of clock signals in the system.
Some communication devices, such as cable modems, derive clock signals from timestamps embedded in data streams. In addition to timestamps, these data streams usually include error correction and synchronization information to ensure integrity and synchronization. In processing the data stream, the cable modem removes the error correction and synchronization bits, leaving a reference clock that is gapped or jittered where the error correction and other information were located. In general, these communication systems must smooth the reference clock for accurate data recovery.
Many systems use phase-locked loops (PLLs), or other similar circuits, to smooth the reference clock and the incoming data signal. A PLL uses a voltage-controlled oscillator (VCO) to produce an output frequency that is proportional to the voltage at the PLL output. As a result, PLLs require signal feedback and filtering. A PLL also requires careful attention to all sources of noise in the system and overall interaction of system components to minimize timing errors. Therefore, attaining high performance levels with PLLs may contribute considerable expense and complexity to the systems in which PLLs are used.
Direct digital synthesizers (DDSs) also are used to produce clock signals by accumulating phase changes at one clock frequency to generate highly accurate waveforms at a lower frequency. The DDS allows high resolution frequency and phase control, producing frequency steps on the order of mHz and phase increments on the order of nHz. To produce a particular frequency, an associated phase increment value is loaded into an input frequency register. The generated frequency and the DDS reference frequency are related to the phase increment value by the following equation:
Fgen=N/2kxc2x7Fref
k=number of bits in phase accumulator
N=phase increment value
A desired frequency is generated by programming the phase change within the bit resolution of the phase accumulator. However, a conventional k-bit DDS has a resolution limited by the number of bits, k. Furthermore, sampling theory limits the generated frequency to no more than one-half the frequency of the incoming reference clock (the Nyquist rate).
The inventors have developed a clock and data smoothing technique that allows generation of a clock of virtually any frequency up to the frequency of a reference clock. This technique is capable of generating exact frequencies and thus does not require approximations that normally involve the monitoring of feedback. Elimination of feedback obviates the need for a PLL circuit in many cases. This, in turn, allows the use of lower cost materials and fewer gate elements than are required for standard DDS clocks. This clock and data smoothing technique provides fully deterministic and pre-calculated phase errors of a given ratio N/M.
In addition, this technique produces a smooth clock up to the reference frequency, with a timing jitter less than the period of the reference clock. This technique also eliminates the need to maintain jitter statistics, acquisition times, and bandwidth for statistical performance analysis.
In one aspect, the invention involves the generation of a smoothed clock signal from a gapped clock signal having unevenly spaced pulses separated by gaps that result from the removal of data bits and from a reference clock signal having evenly spaced pulses that create a predetermined reference frequency. The smoothed clock signal includes one pulse for each of the pulses in the gapped clock signal and has a frequency that is greater than one-half of the predetermined reference frequency. Each pulse in the smoothed clock signal is synchronized with a pulse in the reference clock signal.
In some embodiments, the smoothed clock signal has a frequency equal to (Mxe2x88x92N)/M of the predetermined reference frequency, where M represents the total number of pulses of the reference clock signal during a period of predetermined length, and where N equals the total number of these pulses that coincide with the gaps in the gapped clock signal. In other embodiments, an accumulator counts the pulses of the reference clock signal, and a modulo element resets the accumulator to a particular reset value when a predetermined number of pulses is reached. An output element produces one pulse of the smoothed clock signal for each pulse of the reference clock signal on which the modulo element does not reset the accumulator.
In another aspect of the invention, the smoothed clock signal is generated from the gapped clock signal and the reference clock signal by using an accumulator to count the pulses of the reference clock signal and by resetting the accumulator to a particular reset value when a predetermined number of pulses M is reached. One pulse of the smoothed clock signal is produced for each pulse of the reference clock signal on which the accumulator is not reset.
In some embodiments, the particular reset value equals a number of counted pulses minus the predetermined number. In other embodiments, resetting the accumulator involves comparing a number of counted pulses to the predetermined number N and asserting a modulo signal when the number of counted pulses reaches the predetermined number M. An output element produces a pulse of the smoothed clock signal at each pulse of the reference clock signal when enabled. The output element is disabled when the modulo signal is asserted. In other embodiments, the accumulator increments by a predetermined number N at each pulse of the reference clock signal, such that N/M equals a proportion of the gapped clock signal that is consumed by the gaps.
In another aspect, the invention features a system for use in removing jitter from a signal having gaps that result from the removal of error correction and synchronization information. The system includes a reference signal having a plurality of periodic pulses and a counting mechanism configured to count the periodic pulses in the reference signal by incrementing a count value by a first predetermined number. A reset mechanism resets the count value to a particular reset value when the count reaches a second predetermined number such that the ratio of the second predetermined number to the first predetermined number represents the ratio of the total amount of information in the input signal before removal of the error correction and synchronization information to the amount of error correction and synchronization information removed from the input signal. A pulse generating mechanism generates an output signal pulse on each pulse of the reference signal for which the count value has not reached the second predetermined number and leaves a gap in the output signal on pulses for which the reset mechanism resets the count value, where each pulse of the output signal is synchronized with one of the pulses of the reference signal.
|
{
"pile_set_name": "USPTO Backgrounds"
}
|
Coast guards in Australia
Responsibilities for traditional coast guard duties in Australia are distributed across various federal, state and community agencies. The de facto coast guard of Australia is the Maritime Border Command, a joint command of the Australian Defence Force and the Australian Border Force which works alongside the Australian Federal Police, the Australian Fisheries Management Authority, and the Australian Maritime Safety Authority. Each state and territory government have specific maritime safety agencies and police marine units. In addition, there are several private volunteer coast guard organisations which act as auxiliary search and rescue services and maritime safety educators with the largest organisations being the Royal Volunteer Coastal Patrol established in 1937, the Australian Volunteer Coast Guard established in 1961, and Marine Rescue New South Wales established in 2009.
Federal agencies
Maritime Border Command
The Maritime Border Command is the de facto coast guard of Australia. The Maritime Border Command is a joint unit of the Australian Defence Force (the Royal Australian Navy Patrol Force and the Royal Australian Air Force Surveillance and Response Group) and the Australian Border Force (Marine Unit and Coastwatch aircraft). It is responsible for border protection in the exclusive economic zone of Australia and its 19,650 kilometres of coastline and issues such as illegal fishing and exploitation of natural resources, maritime terrorism and piracy, biosecurity threats, and marine pollution. The Australian Federal Police supports the Maritime Border Command and particularly the Australian Border Force with criminal investigations, law enforcement and national security matters.
Australian Maritime Safety Authority
The Australian Maritime Safety Authority is responsible for maritime safety and seaworthiness of Australian and foreign vessels in Australian waters including compulsory pilotage, aids to navigation, the Australian Rescue Coordination Centre and coordination of search and rescue operations, and management of Australia's international maritime obligations.
Australian Fisheries Management Authority
The Australian Fisheries Management Authority is responsible for the management and sustainable use of fisheries resources and for combating illegal fishing activities in the Australian Fishing Zone.
Office of Transport Security
The Office of Transport Security has various responsibilities for maritime security.
State agencies
Each State Government also has agencies with coast guard responsibilities.
Queensland
Maritime Safety Queensland is responsible for maritime safety and the Queensland Police Service has a water police unit for law enforcement along the coastline, in waterways, and for Queensland islands.
Western Australia
Neither the Royal Volunteer Coastal Patrol nor the Australian Volunteer Coastguard are active in Western Australia, which is the largest state with the longest coastline. Inshore close to towns the West Australian Police co-ordinate local search and rescue between various state agencies (such as DOT, Fisheries and Water Police), Volunteer Sea Rescue Groups (VSRGs) who provide the majority of the assets and not for profit companies such as Westpac helicopter. Volunteer Marine Rescue Groups (VMRs) form the core of the system with three main areas of emergency response / search And rescue (SAR), education, and radio monitoring. VMRs (37) are affiliated to DFES (Department of Fire and Emergency Services) or two maintain independence from government and act as charities (in much the same way as the RNLI in UK work). The 3 largest VMRs are part of DFES including Mandurah the oldest VMR group in WA.
Community organisations
In addition, there are several private volunteer coast guard organizations, the two largest organizations being the Royal Volunteer Coastal Patrol (established in 1937) and the Australian Volunteer Coast Guard (established in 1961). These volunteer organizations have no law enforcement powers, and are essentially auxiliary Search and Rescue services. In NSW these two organisations have joined to become Marine Rescue in 2009.
Marine Rescue NSW
In November 2008, the NSW Government announced the establishment of a new volunteer marine rescue organisation to be called Marine Rescue NSW, (MRNSW) which was incorporated in July 2009. Royal Volunteer Coastal Patrol, Australian Volunteer Coast Guard (NSW units) and Volunteer Rescue Association (marine units) united under the new organisation which began operation on 1 January 2010.
Marine Rescue NSW is a charitable organisation similar to the RNLI in Britain. It provides radio and rescue services over New South Wales with 44 units along the coast including two inland units and has over 3000 volunteers. It is also a registered training organisation ensuring that its members are trained and maintain competencies.
The NSW Government imposes an annual levy of $7 both on boat registration and on boat driver licences to provide funds for MRNSW to refurbish and replace old boats and equipment. As at 1 January 2016, MRNSW has refurbished a number of boats and purchased many new purpose built boats.
MRNSW members are volunteer and in addition to their duties as radio operators, boat crew and many other tasks spend large amounts of time raising funds needed in addition to those provided by the government.
Australian Volunteer Coast Guard
The Australian Volunteer Coast Guard Association was established in 1961, and modelled on the US Coast Guard Auxiliary, the association is an organisation composed entirely of volunteers. It guards the coast in the most effective way - initially by education, example, examination and finally by search and rescue. The Australian Volunteer Coast Guard has no law enforcement powers. Flotillas and radio bases are located from the Skardon River in the Gulf of Carpentaria, down the eastern seaboard to Ceduna in South Australia, including Tasmania and major inland lakes and weirs. Coast Guard currently has more than 2,500 Regular members and 9,000 Associate members. Expansion is continuing in areas of need.
Australian Volunteer Coast Guard resources across Australia include:
107 Association-owned rescue vessels
147 radio bases under the control of 72 local flotillas
30 communication and display vans and 4WD vehicles
Registered Training Organisations delivering competency based training
Formal affiliations and collaborations with similar organisations in Australia, New Zealand, North America, the Philippines and Europe.
Royal Volunteer Coastal Patrol
In 1936 Commander Rupert Long, OBE, RAN, Director of Naval Intelligence raised with retired Captain Maurice Blackwood, DSO, RN the possibility of raising a group of trained yachtsmen as a Naval Auxiliary Service. Discussions were held with HWG Nobbs and W Giles, both Sydney yachtsmen and a proposal sent to the Australian Commonwealth Naval Board that a Volunteer Coastal Patrol be established under the command of Captain Blackwood. The Naval Board supported this and on 27 March 1937 the Volunteer Coastal Patrol was established under the command of Captain Blackwood, DSO, RN (rtd) with H.W.G. Nobbs as Staff Officer Operations and W Giles as Staff Officer Administration.
During World War II Coastal Patrol members became special constables and guarded commercial wharves, oil installations and bridges. By the war's end, patrol vessels had patrolled 128,000 miles of harbour and coastal waters and donated 393,000-man-hours of unpaid war service. They were granted the right to fly the Police Nemesis pennant as recognition of this service and the right to fly the New South Wales State Flag as their ensign.
Post war development saw the Patrol undertake civilian search and rescue operations as their primary role but maintain their original Royal Australian Navy inspired organisation structure, ranks and uniform. 1955 saw a democratically elected council formed which directed the development and administration of the Patrol and appointed the Officer Commanding. 1963 saw the Patrol become an incorporated company and the articles of association written. In 1974, Her Majesty the Queen granted the Patrol the privilege of adding the Royal prefix to its title when it became the Royal Volunteer Coastal Patrol (RVCP).
In 2008 the NSW State Government after strong representations by RVCP agreed to the amalgamation of the three volunteer rescue organisations (RVCP, Volunteer Rescue Association (marine sections) and Australian Volunteer Coast Guard (NSW units) into one organisation which became Volunteer Marine Rescue NSW (VMRNSW) and commenced operation on 1 January 2010.
Today VMRNSW works closely with all government agencies in search and rescue and education to the boating public. They maintain constant watch in Radio Bases for marine traffic, work with the Water Police in search and rescue as well as crowd control at major maritime events, run education classes in seamanship, navigation, first aid and meteorology for the public as well as providing constant information to Radio Stations and TV stations regarding sea conditions etc.
The NSW Government imposes an annual levy of $7 on boat registration and boat driver licences to fund the operation of VMRNSW which has enabled the replacement and refurbishment of many old boats and equipment. All members of the Patrol are volunteers with a large proportion of their time devoted to raising funds needed in addition to the government provision.
Proposals for an Australian Coast Guard
After the Tampa affair, and the declaration of the War on Terrorism, in 2001 Kim Beazley announced that the Australian Labor Party, if in government, would establish an Australian Coast Guard "responsible for conducting Australia's coastal surveillance and meeting Australia's maritime protection needs, including in relation to illegal immigration, drugs, fisheries, and quarantine-related issues". This plan met with criticism. Peter Reith criticised Beazley for stating that an Australian Coast Guard both will and will not be an "answer to the question of people smuggling". The plan was criticised by the Australian government, on the grounds that it would either be prohibitively expensive or inadequate to the task. Later, the motives for the establishment of an Australian Coast Guard were interpreted by some as "a plan to extend the capabilities of the Australian Federal Police."
References
Further reading
External links
Marine Rescue NSW Official Website
Coastwatch Official Website
Australian Volunteer Coast Guard official web site
Royal Volunteer Coastal Patrol official web site
Category:Coast guards
Category:Sea rescue organizations
Category:Organisations based in Australia with royal patronage
Category:Emergency services in Victoria (Australia)
Category:Marine occupations
Category:Coastline of Australia
|
{
"pile_set_name": "Wikipedia (en)"
}
|
ABO blood groups and age groups in surgical venous thromboembolism.
In a series of cases of surgical thromboembolism there were significant age differences in the ratio of cases of blood group A to those of blood group O, the ratio being highest in the youngest age groups.
|
{
"pile_set_name": "PubMed Abstracts"
}
|
Jim Jones LIVE @SoBe Live NYE 2012 & BET DJ Q45
ONLINE TICKET SALES FOR THIS EVENT ARE NOW CLOSED, BUT YOU MAY STILL BE ABLE TO GET TICKETS AT THE EVENT BOX OFFICE.
Description
Party Type
After Hours
,
Nightclub
,
Open Bar
Dress
Dress To Impress
Ages
Music
Hip Hop and R&B, Urban Upscale
Come ring in the New Years with SoBe Live! Voted #1 Hip hop venue in the USA, so you will listen to the best hip hop, R&B and latest music with BET Rapcity DJ Q45! There will be a 3 hour premium open bar (unlike others just offering bottom shelf liquor)and a gourmet buffet! Watch the Balloon Drop Live from NYC and enjoy a complimentary champagne toast at midnight with party favors! Top it all off with Love and Hip Hop Star Jim Jones Live!!! You can't go wrong! No one does it like SoBe Live New Years Eve for an unforgettable, most memorable event. Get your discount tickets now before they go up!
Who is Going
Videos
Jim Jones endorses NYE 2012 at SoBe Live!
Love and Hip Hop star Jim Jones will be at SoBe Live celebrating the New Year 2012 big with bottle poppin, balloon drops and……BALLIN! SoBe Live is the only place to be with a 3 hour Premium open bar (others offer just bottom shelf liquor), a catered gourmet buffet, party favors and best of all….its JIM JONES LIVE!
Sponsored By
Photo Gallery Space
The Wantickets Affiliate Program provides a convenient way for your website or social component to link to thousands of events. Join the affiliate program and earn a commission on all qualifying ticket sales.
|
{
"pile_set_name": "Pile-CC"
}
|
Aprilia, Lazio
Aprilia is a city and comune (municipality) in the province of Latina, now incorporated in the conurbation of Rome, in the Lazio region of central Italy. It is the fifth town for population in the region and the tenth for its area.
Territory
Aprilia is located at above sea level, in the Agro Romano, and is away from the Anzio and Nettuno sea side towns, from Rome and from Colli Albani.
Although Aprilia is effectively part of the province of Latina, because of its strategic position at the far north of the Pontinian province, Aprilia is commonly associated to Rome. It has been considered whether Aprilia should be included in the Rome metropolitan area.
History
In ancient times the territory of Aprilia was under the dominion of Ardea and Rome.
In modern age Aprilia was founded on April 25, 1936, during the Fascist government. The project of the land reclamation, wanted by Benito Mussolini, where the Duce proposed new areas for Italian citizens to live and work in not so far from the big cities. Aprilia was part of the project called 2PST by(Concezio Petrucci, Mario (Mosè) Tufaroli, Emanuele Filiberto Paolini e Riccardo Silenzi.) The area where the city has been built belonged to the Rome county, is the fourth in order of foundation after Littoria, Sabaudia e Pontinia.
The name of the city come from the Latin Venus Aprilia - "Fruitful Venus"
With a surface of 17,774 hectares and 71,150 inhabitants , the municipality comprises the city center and the following settlements: Agip, Bellavista, Buon Riposo, Caffarelli, Campo del Fico, Campo di Carne, Campoleone, Campoverde, Carano-Garibaldi, Carroceto, Casalazzara, Fossignano, Gattone, Genio Civile, Giannottola, Guardapasso, Isole, La Gogna, Montarelli, Pantanelle, Pian di Frasso, Rosatelli, Spaccasassi, Torre Bruna, Toscanini, Torre del Padiglione, Tufello, Vallelata, Valli.
In 1929, after repeated attempts, began the work of land reclamation in the area that attracted a significant number of people coming from Trentino, Veneto, from Friuli, and from Emilia Romagna.
At the end of 1931 started the real transformation of the land with deforestation in the whole area, the marsh was drained, the land was plowed and houses were built with estates ranging from . Only then a stable population settled in living for a small part in the new urban center, most of them in rural houses.
Aprilia was an integral part of the reclamation Pontina including Littoria (then Latina), Sabaudia, Pontinia and Pomezia.
At its foundation, the Urban Center was composed of four main buildings: City, post office, church and casa del Fascio, to which were later added Cinema Littorio and the inn.
Things became critical with the advance of World War II and the beginning of the Battle of Rome.
In January 1944 Aprilia called "la fabbrica", "the factory" by the Allies, was reduced to a pile of rubble and the population took refuge in Campania and Calabria.
In the 1950s, Italians from North Africa colonies who built extensive vineyards to produce wines with Denominazione di origine controllata and some of the best grapes in Italy.
With the establishment of the Cassa per il Mezzogiorno and, subsequently, the Consortium for the area of industrial development in Lazio, the future of Aprilia changed completely: it went from agriculture to a consumer 'market-oriented agriculture, and new and more technically advanced farms emerged. This was the first step toward industrialization itself.
At the end of 1951 settled in Aprilia's first factory, the Simmenthal, which was followed by many other national and international workshops. The town changed its face and gave work to many workers. Aprilia currently houses about one hundred plants, including some major corporations.
On Aprili 26, 1996, Aprilia became the sister city of Mostardas, a town of Rio Grande do Sul, Brazil, where the national hero Menotti Garibaldi was born, and whose remains rest in Aprilia after some parts of the neighbouring town Velletri switched to Aprilia in the same year.
Geography
Frazioni
Agip, Bellavista, Buon Riposo, Caffarelli, Campo del Fico, Campo di Carne, Campoleone, Campoverde, Carano - Garibaldi, Carroceto, Casalazzara, Fossignano, Gattone, Genio Civile, Giannottola, Guardapasso, Isole, La Cogna, Montarelli, Pantanelle, Pian di Frasso, Rosatelli, Spaccasassi, Torre Bruna, Toscanini, Torre del Padiglione, Tufello, Vallelata, Valli.
Aprilia DOC
The Aprilia region is home to a Denominazione di origine controllata DOC that is noted for its varietal wines from varieties such as Trebbiano, Merlot, Sangiovese and Abbuoto. Under DOC regulations, the wine must be labeled correctly for the grape variety in order to qualify for the DOC designation. Nearly 75% of the DOC production is centered around Trebbiano.
Additional DOC requirements include:
Merlot and Trebbiano grapes must be harvested to a yield no greater than 15 tonnes per hectare with the finished wine needing to attain a minimum alcohol level of at least 11%
Sangiovese have a maximum yield restriction of 14 t/ha with the finished wine needing at least 11.5% alcohol by volume.
Twin towns — sister cities
Aprilia is twinned with:
Mostardas, Brazil (1996)
Buja, Italy (1997)
Montorio al Vomano, Italy (2000)
Sciacca, Italy (2003)
Ben Arous, Tunisia (2003)
Tulcea, Romania (2003)
Cingoli, Italy (2004)
References
External links
Category:Cities and towns in Lazio
Category:Populated places established in 1936
Category:1936 establishments in Italy
Category:Italian fascist architecture
|
{
"pile_set_name": "Wikipedia (en)"
}
|
The plaintiff in last summer’s historic Supreme Court case legalizing gay marriage nationwide is backing Hillary Clinton Hillary Diane Rodham ClintonButtigieg stands in as Pence for Harris's debate practice Senate GOP sees early Supreme Court vote as political booster shot Poll: 51 percent of voters want to abolish the electoral college MORE in 2016.
Jim Obergefell announced his support for the Democratic presidential front-runner on Monday.
ADVERTISEMENT
“We have fought not only to change laws, but to change hearts, and now we need a president who will help us fight to eliminate the injustices that occur regularly in our community,” he said in a statement, according to The Guardian.
“The best person to do that is Hillary Clinton,” Obergefell continued. "I refuse to let Republicans undo the progress that we’ve made, and that is why we need Hillary Clinton in the White House because she will be by our side as we break down barriers and finally reach full equality.”
Clinton then argued Monday that she plans to defend same-sex marriages should she win the Oval Office next year. She also promised that she would expand protections for gay, lesbian, bisexual and transgender Americans as well.
“There are still too many places where LGBT Americans are targeted for harassment and violence, and there are too many young people who are uncertain and scared of what their future might hold,” Clinton said in the same statement.
"Right now in America, you can get married on Saturday and be fired from your job on Monday just because of who you love,” she said.
“I see the injustices that are happening in our country, and that is why I’m committed to working with Jim and others to end discrimination against the LGBT community once and for all,” the former secretary of State added.
The Supreme Court issued a landmark 5-4 decision last June legalizing same-sex marriage nationwide.
Obergefell v. Hodges requires that every state recognize the practice nationwide under the 14th Amendment’s Equal Protections Clause.
Clinton currently leads the race for next year’s Democratic presidential nomination by a wide margin, boasting a 21-point lead nationally over Sen. Bernie Sanders (I-Vt.), according to the latest RealClearPolitics average of samplings.
|
{
"pile_set_name": "OpenWebText2"
}
|
Mobilis in mobili Part 3
The Nautilus
Some new images, the hull plating is modelled and I will look at textures soon.I retained the Disney Nautilus look around the helm control area. I just did not want to use a box shape that’s implied in the book.
I have also added the lounge windows with sliding panels that move to the side to reveal.
|
{
"pile_set_name": "Pile-CC"
}
|
Q:
Its or Their to refer to a company?
The company will issue (their, its) annual report next month.
In this case, should I use "its" or "their"?
A:
Both its and their are pronouns. While its is a singular pronoun, their is a plural pronoun.
A company is a collective noun. In AmE, Company takes a singular verb form and singular pronoun. While in BrE, Company takes a plural verb form and plural pronoun.
So, depending on that, both are correct.
In AmE:
The company will issue its annual report next month.
In BrE:
The company will issue their annual report next month.
A:
Your question: should I use its or their in: The company will issue their/its annual report next month?
In this instance, I'd recommend using its:
The company will issue its annual report next month.
This, among other things, echoes Kelly's answer and Fantasier's answer to an old question: "If a collective noun is seen as a whole, sole, impersonal unit, then singular verbs are more common. If it is seen as a collection of people doing personal things, then plural verbs are more common. In American English the verb for the noun is usually singular in all cases except family (if you don't quantify it with members of, people in etc)."
Which also echoes an old answer by FumbleFingers: "(in "British English") [W]e quite naturally use singular or plural for things like company, family, group, according to context", and information relating to collective nouns which is relatively to find around the web, including on English Language & Usage Stack Exchange.
Back to your sentence, it's clear that it's safer to use its in either British or American English. Even though it may be possible to use their in British English (and also in American English), I'd personally use it in that specific instance; and though I can't say exactly why, this Google Ngram chart appears to support my choice:
A:
For what it's worth, Google Books Ngram Viewer would suggest that company is more often treated as singular.
But all you can really draw from this is that it's acceptable to treat company as either singular or plural.
I think it comes down to whether or not you want to emphasise the single legal entity or the group of people who make up the company.
In the case of an annual report, it is issued by the single legal entity and so I would use the singular:
The company will issue its annual report next month.
|
{
"pile_set_name": "StackExchange"
}
|
Praveen Nischol
Praveen Nischol is a producer, director and writer. He has made Feature Films, T.V. Serials and T.V. Commercials. He is the younger brother of Late Bollywood Actor Navin Nischol.
Early life and education
Praveen Nischol was born in Delhi and had his early education in Park English School in Calcutta, wherein Class 8 he was awarded the Gold medal for the most outstanding student of the year. From his early years, he was very active on stage in acting and debates in which he won many awards. After class 8 he shifted to Delhi and finished his schooling at Delhi Public School, Mathura Rd., where he got many awards in debates and was also awarded the best actor award, on the school's annual day function, by the then President of India Dr. Zakir Hussain.
He did his graduation in BSc from St. Stephen's College in Delhi University. He then joined M.A. in Philosophy in Hindu College (Delhi University), but left it halfway and came to Mumbai to work in films and join his brother Navin Nischol, who was then playing the lead man in his first Bollywood Movie, "Sawan Bhadon".
Career
Praveen started his career as a Chief Assistant Director to Mohan Sehgal in the film "Woh Main Nahin’ which again starred the "Sawan Bhadon’ pair Navin Nischol and Rekha. He also helped Mohan Sehgal in Production and for many years was the Business Agent for his brother Navin.
He started his career as a Director in a film "Jaan Se Pyara" starring Navin, Rekha, Reena Roy, Amjad Khan, Prem Chopra etc., with music by R.D.Burman. The movie started with the recording of two Songs sung by Asha Bhonsle. It was on the lines of an International James Bond with Indian emotions. The most expensive film of its time. The Special effects of this movie were to be done by John Dykstra of Apogee Studios, Los Angeles, who had made the epic film "Star Wars" in partnership with George Lucas. There were many discussions for the same. Praveen had shot seven reels of the film but then unfortunately the movie was abandoned by the Producer as he ran into financial difficulties. These were of a nature which unfortunately did not allow the film to be taken over by any other Production house either.
After this initial setback, Praveen took the rights of the four volumes of the Bengali literary Classic "Shrikant", by Sarat Chandra Chatterji. He made the first two volumes in a sponsored T.V. Serial for Doordarshan, called "Shrikant", starring Farooque Shaikh, Sujata Mehta, Priyadarshani, Bharat Bhushan etc. It was written by Ali Raza, had music by Jaidev and was Produced jointly with Manmohan Shetty and Pradeep Uppoor. The Serial was of 18 Episodes of half-hour each and was the first Serial to be shot entirely on film. It went on to be a big success and got huge critical acclaim. This was the first Asian Serial ever to feature on Channels 1 and 2 of BBC.
Using some portions of the above Serial, Praveen shot some more and made a feature film "Rajlaxmi". This was sold to Mr. F.C. Mehra, mainly for foreign markets.
After the success of the Serial, Doordarshan then invited Praveen to do the third Volume of the Classic Novel, and then Commissioned him to make ‘Shrikant II’ in 24 Episodes of half-hour each. Farooque Shaikh again played the role of Shrikant and joining him in the cast were Irfan Khan, Mrinal Kulkarni, Ravinder Mankani, A.K. Hangal etc.
Praveen then went on to Produce and Direct a Feature film "English Babu Desi Mem", starring Shah Rukh Khan, Sonali Bendre, Saeed Jaffery etc.
He Produced, Wrote and Directed a TV Film "Jahan Pyar Miley" of 90 mins. duration, for the programme ‘Director's Cut’ on Channel 9.
In 2002 he joined Manmohan Shetty’s Company, Adlabs, and started a Film Production Division named Entertainment One. The Company funded and Co Produced about 20 Feature Films.
The first film to release from the Company was Gangajal in 2003, in which Praveen shared the Producer's National Award with Prakash Jha.
In 2007 Praveen left Adlabs (which had become Reliance Adlabs), and became a Partner with Ram Gopal Varma. Together they Produced three films. The first was ‘Sarkar Raj’ starring Amitabh Bachchan, Abhishek Bachchan and Aishwarya Rai, followed by ‘Contract’ and ‘Phoonk’. They separated in 2009, after which Praveen started an Ad Film Company ‘White Onion Films’ with two Partners, E. Niwas and Ryan Suares and Produced many T.V. Commercials.
Praveen is also Producing a Feature Film. The Script of the film has been written by him. Praveen also has a Line Production Company which does Line Production, Cost Reporting and Accounting for Feature Films, T.V. Commercials, Photo Shoots etc.
Filmography
Feature Films
TV Serials
References
Category:Living people
Category:Film producers from Delhi
Category:Indian writers
Category:St. Stephen's College, Delhi alumni
Category:Year of birth missing (living people)
|
{
"pile_set_name": "Wikipedia (en)"
}
|
Rue de Rome
Rue de Rome is the name of a number of streets:
Belgium
Rue de Rome (Brussels), in Brussels
France
Rue de Rome (Marseille), in Marseille
Rue de Rome (Paris), in Paris
Rue de Rome (Tampon), in Le Tampon, Réunion
Tunisia
Rue de Rome (Tunis), in Tunis
|
{
"pile_set_name": "Wikipedia (en)"
}
|
Photodegradation of acetone over V-Gd-O composite catalysts under visible light.
A series of visible light active catalysts, V-Gd-O composites, were prepared by the impregnation method. In the photodegradation of acetone, the highest acetone conversion was obtained on V(1)Gd(1)O(x) catalyst under visible light. The physical and photophysical properties of the composite catalyst have been characterized by XRD, FT-IR, Raman, BET surface area, UV-vis diffuse reflectance spectra, and photoluminescence (PL) spectra. The characterization indicates the V-Gd-O photocatalyst exhibits three phases: Gd(2)O(3), GdVO(4) and V(2)O(5). On the basis of the calculated energy band positions and PL spectra, the high activity of the V-Gd-O catalysts could be attributed to the coupling effect between GdVO(4) and V(2)O(5) in retarding the recombination of electron-hole pairs.
|
{
"pile_set_name": "PubMed Abstracts"
}
|
---
abstract: 'It was shown by Gruslys, Leader and Tan that any finite subset of $\mathbb{Z}^n$ tiles $\mathbb{Z}^d$ for some $d$. The first non-trivial case is the punctured interval, which consists of the interval $\{-k,\ldots,k\} \subset \mathbb{Z}$ with its middle point removed: they showed that this tiles $\mathbb{Z}^d$ for $d = 2k^2$, and they asked if the dimension needed tends to infinity with $k$. In this note we answer this question: we show that, perhaps surprisingly, every punctured interval tiles $\mathbb{Z}^4$.'
author:
- Harry Metrebian
title: Tiling with punctured intervals
---
Introduction
============
A *tile* is a finite non-empty subset of $\mathbb{Z}^n$ for some $n$. We say that a tile $T$ *tiles* $\mathbb{Z}^d$ if $\mathbb{Z}^d$ can be partitioned into copies of $T$, that is, subsets that are translations, rotations or reflections, or any combination of these, of $T$.
For example, the tile $\texttt{X.X} = \{-1,1\} \subset \mathbb{Z}$ tiles $\mathbb{Z}$. The tile $\texttt{XX.XX} = \{-2,-1,1,2\} \subset \mathbb{Z}$ does not tile $\mathbb{Z}$, but we can also regard it as a tile in $\mathbb{Z}^2$, and indeed it tiles $\mathbb{Z}^2$, as shown, for example, in [@gltan16].
Chalcraft [@chalcraft1; @chalcraft2] conjectured that, for any tile $T \subset \mathbb{Z}^n$, there is some dimension $d$ for which $T$ tiles $\mathbb{Z}^d$. This was proved by Gruslys, Leader and Tan [@gltan16]. The first non-trivial case is the *punctured interval* $T = \underbrace{\texttt{XXXXX}}_{k}\!\texttt{.}\!\underbrace{\texttt{XXXXX}}_{k}$. The authors of [@gltan16] showed that $T$ tiles $\mathbb{Z}^d$ for $d = 2k^2$, but they were unable to prove that the smallest required dimension $d$ was quadratic in $k$, or even that $d \to \infty$ as $k \to \infty$. They therefore asked the following question:
Let $T$ be the punctured interval $\underbrace{\texttt{\emph{XXXXX}}}_{k}\!\texttt{.}\!\underbrace{\texttt{\emph{XXXXX}}}_{k}$, and let $d$ be the least number such that $T$ tiles $\mathbb{Z}^d$. Does $d \to \infty$ as $k \to \infty$?
In this paper we will show that, rather unexpectedly, $d$ does not tend to $\infty$:
\[mainthm\] Let $T$ be the punctured interval $\underbrace{\texttt{\emph{XXXXX}}}_{k}\!\texttt{.}\!\underbrace{\texttt{\emph{XXXXX}}}_{k}$. Then $T$ tiles $\mathbb{Z}^4$. Furthermore, if $k$ is odd or congruent to $4 \pmod 8$, then $T$ tiles $\mathbb{Z}^3$.
We have already noted that `X.X` tiles $\mathbb{Z}$, and `XX.XX` tiles $\mathbb{Z}^2$ but not $\mathbb{Z}$. It can be shown via case analysis that, for $k \geq 3$, the tile $T$ does not tile $\mathbb{Z}^2$. However, this proof is tedious and provides little insight, and since it is not the focus of this paper, we omit it. For odd $k \geq 3$ and for $k \equiv 4 \pmod 8$, 3 is therefore the least $d$ such that $T$ tiles $\mathbb{Z}^d$. For the remaining cases, namely $k \equiv 0, 2, 6 \pmod 8$, $k \geq 6$, it is unknown whether the least possible $d$ is 3 or 4.
In this paper, we will first prove the result for odd $k$. This will introduce some key ideas, which we will develop to prove the result for general $k$, and then to improve the dimension from 4 to 3 for $k \equiv 4 \pmod 8$.
Finally, we give some background. Tilings of $\mathbb{Z}^2$ by polyominoes (edge-connected tiles in $\mathbb{Z}^2$) have been thoroughly investigated. For example, Golomb [@golomb70] showed that results of Berger [@berger66] implied that there is no algorithm which decides whether copies of a given finite set of polyominoes tile $\mathbb{Z}^2$. It is unknown whether the same is true for tilings by a single polyomino. For tilings of $\mathbb{Z}$ by sets of general one-dimensional tiles, such an algorithm does exist, as demonstrated by Adler and Holroyd [@ah81]. Kisisel [@kisisel01] introduced an ingenious technique for proving that certain tiles do not tile $\mathbb{Z}^2$ without having to resort to case analysis.
A similar problem is to consider whether a tile $T$ tiles certain finite regions, such as cuboids. There is a significant body of research, sometimes involving computer searches, on tilings of rectangles in $\mathbb{Z}^2$ by polyominoes (see, for example, Conway and Lagarias [@cl90] and Dahlke [@dahlke]). Friedman [@friedman] has collected some results on tilings of rectangles by small one-dimensional tiles. More recently, Gruslys, Leader and Tomon [@gltomon16] and Tomon [@tomon16] considered the related problem of partitioning the Boolean lattice into copies of a poset, and similarly Gruslys [@gruslys16] and Gruslys and Letzter [@gl16] have worked on the problem of partitioning the hypercube into copies of a graph.
Preliminaries and the odd case
==============================
We begin with the case of $k$ odd. This is technically much simpler than the general case, and allows us to demonstrate some of the main ideas in the proof of Theorem \[mainthm\] in a less complicated setting.
\[kodd\] Let $T$ be the punctured interval $\underbrace{\texttt{\emph{XXXXX}}}_{k}\!\texttt{.}\!\underbrace{\texttt{\emph{XXXXX}}}_{k}$, with $k$ odd. Then $T$ tiles $\mathbb{Z}^3$.
Throughout this section, $T$ is fixed, and $k \geq 3$. We will not yet assume that $k$ is odd, because the tools that we are about to develop will be relevant to the general case too.
We start with an important definition from [@gltan16]: a *string* is a one-dimensional infinite line in $\mathbb{Z}^d$ with every $(k+1)$th point removed. Crucially, a string is a disjoint union of copies of $T$.
We cannot tile $\mathbb{Z}^d$ with strings, as each string intersects $[k+1]^d$ in either 0 or $k$ points, and $(k+1)^d$ is not divisible by $k$. However, we could try to tile $\mathbb{Z}^d$ by using strings in $d-1$ of the $d$ possible directions, leaving holes that can be filled with copies of $T$ in the final direction. We therefore consider $\mathbb{Z}^d$ as consisting of slices equivalent to $\mathbb{Z}^{d-1}$, each of which will be partially tiled by strings.
Any partial tiling of the discrete torus $\mathbb{Z}_{k+1}^{d-1} = (\mathbb{Z}/(k+1)\mathbb{Z})^{d-1}$ by lines with one point removed corresponds to a partial tiling of $\mathbb{Z}^{d-1}$ by strings. We will restrict our attention to these tilings at first, as they are easy to work with.
We will call a set $X \subset \mathbb{Z}_{k+1}^{d-1}$ a *hole* in $\mathbb{Z}_{k+1}^{d-1}$ if $\mathbb{Z}_{k+1}^{d-1} \setminus X$ can be tiled with strings. One particularly useful case of this is when $d = 3$ and $X$ either has exactly one point in each row of $\mathbb{Z}_{k+1}^2$ or exactly one point in each column of $\mathbb{Z}_{k+1}^2$. Then $X$ is clearly a hole, since a string in $\mathbb{Z}_{k+1}^2$ is just a row or column minus a point.
The following result will allow us to fill the gaps in the final direction, assuming we have chosen the partial tilings of the $\mathbb{Z}^{d-1}$ slices carefully:
\[biglemma\] Let $S \subset \mathbb{Z}^d$, $|S| = 3$. Then there exists $Y \subset S \times \mathbb{Z}$ such that $T$ tiles $Y$, and for every $n \in \mathbb{Z}$, $|Y \cap (S \times \{n\})| = 2$.
Let $S = \{x_1, x_2, x_3\}$. For $i = 1,2,3$, place a copy of $T$ beginning at $\{x_i\} \times \{n\}$ for every $n \equiv ik \pmod {3k}$. The union $Y$ of these tiles has the required property:\
For $n \equiv 0, k+1, \ldots, 2k-1 \pmod{3k}$, $Y \cap (S \times \{n\}) = \{x_1, x_3\} \times \{n\}$.\
For $n \equiv k, 2k+1, \ldots, 3k-1 \pmod{3k}$, $Y \cap (S \times \{n\}) = \{x_1, x_2\} \times \{n\}$.\
For $n \equiv 2k, 1, \ldots, k-1 \pmod{3k}$, $Y \cap (S \times \{n\}) = \{x_2, x_3\} \times \{n\}$.\
We will now prove Theorem \[kodd\]. We know that if $X \subset \mathbb{Z}_{k+1}^2$ has one point in each row or column then $X$ is a hole of size $k+1$. Since $k+1$ is even, we can try to choose $X_n$ in each slice $\mathbb{Z}_{k+1}^2 \times \{n\}$ so that $\bigcup_{n\in\mathbb{Z}}X_n$ is the disjoint union of $\frac{k+1}{2}$ sets $Y_i$ of the form in Lemma \[biglemma\].
We can do this as follows:\
For $n \equiv 0, k+1, \ldots, 2k-1 \pmod{3k}$, let $X_n = \{(0,0),(1,1),\ldots,(k-1,k-1),(k,k)\}$.\
For $n \equiv k, 2k+1, \ldots, 3k-1 \pmod{3k}$, let $X_n = \{(0,0),(0,1),(2,2),(2,3),\ldots,(k-1,k-1),\newline(k-1,k)\}$.\
For $n \equiv 2k, 1, \ldots, k-1 \pmod{3k}$, let $X_n = \{(0,1),(1,1),(2,3),(3,3),\ldots,(k-1,k),(k,k)\}$.\
Then let $X = \bigcup\limits_{n\in\mathbb{Z}} (X_n \times \{n\}) \subset \mathbb{Z}_{k+1}^2 \times \mathbb{Z}$.
Each $X_n$ is a hole, so we can tile $(\mathbb{Z}_{k+1}^2 \times \mathbb{Z})\setminus X$ with strings. Also, $X$ is the disjoint union of sets of the form $Y$ from Lemma \[biglemma\]: for $0 \leq i \leq \frac{k-1}{2}$, let $S_i = \{(2i,2i),(2i,2i+1),(2i+1,2i+1)\}$. Then $X \cap (S_i \times \mathbb{Z})$ is precisely the set $Y$ generated from $S_i$ in the proof of Lemma \[biglemma\]. Hence $T$ tiles $X$.
Since $(\mathbb{Z}_{k+1}^2 \times \mathbb{Z})\setminus X$ can be tiled with strings, we can partially tile $\mathbb{Z}^3$ with strings, leaving a copy of $X$ empty in each copy of $\mathbb{Z}_{k+1}^2 \times \mathbb{Z}$. We can tile all of these copies of $X$ with $T$, so $T$ tiles $\mathbb{Z}^3$, completing the proof of Theorem \[kodd\].
The general case
================
We now move on to general $k$:
\[generalk\] Let $T$ be the tile $\underbrace{\texttt{\emph{XXXXX}}}_{k}\!\texttt{.}\!\underbrace{\texttt{\emph{XXXXX}}}_{k}$. Then $T$ tiles $\mathbb{Z}^4$.
We will assume throughout that $T$ is fixed and $k \geq 3$.
For even $k$, the construction used to prove Theorem \[kodd\] does not work, as all holes in $\mathbb{Z}_{k+1}^2$ have size $(k+1)^2-mk$ for some $m$, and this is always odd, so we cannot use Lemma \[biglemma\]. The same is true if we replace 2 with a larger dimension, or if, as in [@gltan16], we use strings in which every $(2k+1)$th point, rather than every $(k+1)$th point, is removed. We will therefore need a new idea.
Instead of using strings in $d-1$ out of $d$ directions, we could only use them in $d-2$ directions and fill the gaps with copies of $T$ in the 2 remaining directions. We will show that this approach works in the case $d = 2$, giving a tiling of $\mathbb{Z}^4$. The strategy will be to produce a partial tiling of each $\mathbb{Z}^3$ slice and use the construction from Lemma \[biglemma\] to fill the gaps with tiles in the fourth direction.
We will again build partial tilings of $\mathbb{Z}^{2}$, and therefore of higher dimensions, from partial tilings of the discrete torus $\mathbb{Z}_{k+1}^{2}$. The following result is a special case of one proved in [@gltan16]:
\[onepoint\] If $x \in \mathbb{Z}_{k+1}^{2}$, then $\mathbb{Z}_{k+1}^{2}\setminus\{x\}$ can be tiled with strings.
Let $x = (x_1,x_2)$, where the first coordinate is horizontal and the second vertical. Since a string is a row or column minus one point, we can place a string $(\{n\} \times \mathbb{Z}_{k+1})\setminus\{(n,x_2)\}$ in each column, leaving only the row $\mathbb{Z}_{k+1} \times \{x_2\}$ empty. Placing the string $(\mathbb{Z}_{k+1} \times \{x_2\})\setminus \{x\}$ in this row completes the tiling of $\mathbb{Z}_{k+1}^{2}\setminus\{x\}$.
The sets $S$ of size 3 that we will use in Lemma \[biglemma\] will have 2 points, say $x_1$ and $x_2$, in one $\mathbb{Z}_{k+1}^{2}$ layer and one point, say $x_3$, in another layer. Every layer will contain points from exactly one such set $S$. Let $Y$ be the set constructed from $S$ in the proof of Lemma \[biglemma\]. In a given slice $\mathbb{Z}^3 \times \{n\}$, there are therefore two cases:
1. $Y \cap (S \times \{n\}) = \{x_1, x_3\} \times \{n\}$ or $\{x_2, x_3\} \times \{n\}$.
2. $Y \cap (S \times \{n\}) = \{x_1, x_2\} \times \{n\}$.
In Case 1, each $\mathbb{Z}_{k+1}^{2}$ layer contains exactly one point of $Y$. $T$ then tiles the rest of the layer by Proposition \[onepoint\].
In Case 2, some of the layers contain two points of $Y$, and some of the layers contain no points. Holes of size 0 and 2 do not exist, so we will need copies of $T$ in the third direction to fill some gaps (where $Y$ consists of copies of $T$ in the fourth direction). The following lemma provides us with a way to do this:
\[otherlemma\] Let $A \subset \mathbb{Z}^d$, $|S| = 3k$. Then there exists $B \subset S \times \mathbb{Z}$ such that $T$ tiles $B$, and $$|B \cap (S \times \{n\})| =
\begin{cases}
k+1 & \text{\emph{if} } n \equiv 1, \ldots, k \pmod{2k}\\
k-1 & \text{\emph{if} } n \equiv k+1, \ldots, 2k \pmod{2k}
\end{cases}$$
Let $A = \{a_1, \ldots, a_{3k}\}$. Then:\
For $i = 1, \ldots, k$, place a copy of $T$ beginning at $\{a_i\} \times \{n\}$ for every $n \equiv i \pmod{6k}$.\
For $i = k+1, \ldots, 2k$, place a copy of $T$ beginning at $\{a_i\} \times \{n\}$ for every $n \equiv i+k \pmod{6k}$.\
For $i = 2k+1, \ldots, 3k$, place a copy of $T$ beginning at $\{a_i\} \times \{n\}$ for every $n \equiv i+2k \pmod{6k}$.\
We now observe that the union $B$ of these tiles has the required property.\
For $n \equiv 1, \ldots, k \pmod{6k}$, $B \cap (A \times \{n\}) = \{a_{2k+n}, \ldots, a_{3k}, a_1, \ldots, a_n\}$ (size $k+1$).\
For $n \equiv k+1, \ldots, 2k \pmod{6k}$, $B \cap (A \times \{n\}) = \{a_1, \ldots, a_k\}\setminus\{a_{n-k}\}$ (size $k-1$).\
For $n \equiv 2k+1, \ldots, 3k \pmod{6k}$, $B \cap (A \times \{n\}) = \{a_{n-2k}, \ldots, a_{n-k}\}$ (size $k+1$).\
For $n \equiv 3k+1, \ldots, 4k \pmod{6k}$, $B \cap (A \times \{n\}) = \{a_{k+1}, \ldots, a_{2k}\}\setminus\{a_{n-2k}\}$ (size $k-1$).\
For $n \equiv 4k+1, \ldots, 5k \pmod{6k}$, $B \cap (A \times \{n\}) = \{a_{n-3k}, \ldots, a_{n-2k}\}$ (size $k+1$).\
For $n \equiv 5k+1, \ldots, 6k \pmod{6k}$, $B \cap (A \times \{n\}) = \{a_{2k+1}, \ldots, a_{3k}\}\setminus\{a_{n-3k}\}$ (size $k-1$).
The reasoning behind this lemma is that there exist sets $X \subset \mathbb{Z}_{k+1}^{2} \times \mathbb{Z}$ that are missing exactly $k+1$ points in every $\mathbb{Z}_{k+1}^{2}$ layer and can be tiled with strings. If we take $d = 2$ in Lemma \[otherlemma\], we would like to choose such a set $X$ and a set $A \subset \mathbb{Z}_{k+1}^{2}$ (abusing notation slightly, as $\mathbb{Z}_{k+1}^{2}$ is not actually a subset of $\mathbb{Z}^2$) such that the resulting $B$ in Lemma \[otherlemma\] is disjoint from $X$. Then $(\mathbb{Z}_{k+1}^{2} \times \mathbb{Z})\setminus(B \cup X)$ contains either 2 or 0 points in each $\mathbb{Z}_{k+1}^{2}$ layer, which is what we wanted.
In order for this construction to work, we need the set $B \cap (A \times \{n\})$ to be a hole whenever it has size $k+1$, and to be a subset of a hole of size $k+1$ whenever it has size $k-1$, so that we actually can tile the required points with strings. By observing the forms of the sets $B \cap (A \times \{n\})$ in the proof of Lemma \[otherlemma\], we see that it is sufficient to choose the $a_n$ such that for all $n$, $\{a_n, \ldots, a_{n+k}\}$ is a hole. Here we regard the indices $n$ of the points $a_n$ of $A$ as integers mod $3k$, so $a_{3k+1} = a_1$ and so on. The following proposition says that we can do this.
\[anprop\] There exists a set $A = \{a_1, \ldots, a_{3k}\} \subset \mathbb{Z}_{k+1}^{2}$ such that for all $n$, $\{a_n, \ldots, a_{n+k}\}$ contains either one point in every row or one point in every column. Here the indices are regarded as integers *mod* $3k$.
For $n = 1, \ldots, k+1$, let $a_n = (n-1,n-1)$.\
For $n = k+2, \ldots, 2k-1$, let $a_n = (n-k-2,n-k-1)$.\
For $n = 2k, 2k+1, 2k+2$, let $a_n = (n-k-2,n-2k)$.\
For $n = 2k+3, \ldots, 3k$, let $a_n = (n-2k-3,n-2k)$.\
Note that all the $a_n$ are distinct. Let us regard the first coordinate as horizontal and the second as vertical.\
Then, for $n = 1, \ldots, 2k$, $\{a_n, \ldots, a_{n+k}\}$ contains one point in every column.\
For $n = 2k+1, \ldots, 3k$, $\{a_n, \ldots, a_{n+k}\}$ contains one point in every row.
From now on, $a_n$ refers to the points defined in the above proof. This proposition is the motivation for choosing the value $6k$ in the proof of Lemma \[otherlemma\].
We can now prove Theorem \[generalk\]. We will need 3 distinct partial tilings of $\mathbb{Z}^3$ slices, corresponding to the 3 cases in the proof of Lemma \[biglemma\] with $d = 3$. The repeating unit in each of these partial tilings will have size $(k+1) \times (k+1) \times 6k$, so we will work in $\mathbb{Z}_{k+1}^2 \times \mathbb{Z}_{6k}$.
We start by choosing the sets $S$ as in Lemma \[biglemma\]. These will be as follows:\
For $n = 1, \ldots, k$, $S_n = \{(0,0,n),(a_n,n+k),(a_{k+1},n+k)\}$.\
For $n = k+1, \ldots, 2k$, $S_n = \{(0,0,n+k),(a_n,n+2k),(a_{2k+1},n+2k)\}$.\
For $n = 2k+1, \ldots, 3k$, $S_n = \{(0,0,n+2k),(a_n,n+3k),(a_1,n+3k)\}$.\
We will refer to the points in $S_n$ as $x_{n,1},x_{n,2},x_{n,3}$ in the order given.
We can construct a set $Y_n \subset \mathbb{Z}^4$ from each $S_n$ using the construction in the proof of Lemma \[biglemma\]. Let $Y = \bigcup_{1 \leq n \leq 3k} Y_n$. For a given $m \in \mathbb{Z}$, there are two possibilities for the structure of $Y \cap (\mathbb{Z}_{k+1}^2 \times \mathbb{Z}_{6k} \times \{m\})$:
1. $Y \cap (\mathbb{Z}_{k+1}^2 \times \mathbb{Z}_{6k} \times \{m\})$ consists of pairs of the form $\{x_{n,1},x_{n,2}\}$ or $\{x_{n,1},x_{n,3}\}$. Then it contains exactly one point in each $\mathbb{Z}_{k+1}^2$ layer. We can therefore tile $(\mathbb{Z}_{k+1}^2 \times \mathbb{Z}_{6k} \times \{m\}) \setminus Y$ entirely with strings, by Proposition \[onepoint\].
2. $Y \cap (\mathbb{Z}_{k+1}^2 \times \mathbb{Z}_{6k} \times \{m\})$ consists of pairs of the form $\{x_{n,2},x_{n,3}\}$. Then it contains either 2 or 0 points in each $\mathbb{Z}_{k+1}^2$ layer.\
If $A = \{a_1, \ldots, a_{3k}\}$, and $B$ is the set constructed from $A$ in the proof of Lemma \[otherlemma\], then, by the choice of the $S_n$, the sets $B$ and $Y \cap (\mathbb{Z}_{k+1}^2 \times \mathbb{Z}_{6k} \times \{m\})$ are disjoint. Furthermore, if $C$ is the union of these two sets, then, for every $n$, $C \cap (\mathbb{Z}_{k+1}^2 \times \{n\} \times \{m\}) = \{a_r, \ldots, a_{r+k}\}$ for some $r$, and by Proposition \[anprop\], this contains either one point in every row or one point in every column and is therefore a hole.\
Since $T$ tiles $B$, it also tiles $(\mathbb{Z}_{k+1}^2 \times \mathbb{Z}_{6k} \times \{m\}) \setminus Y$.
$T$ tiles $Y$ by Lemma \[biglemma\]. Hence $T$ tiles $\mathbb{Z}_{k+1}^2 \times \mathbb{Z}_{6k} \times \mathbb{Z}$, and therefore also $\mathbb{Z}^4$, completing the proof of Theorem \[generalk\].
The 4 mod 8 case
================
To finish the proof of Theorem \[mainthm\], all that remains is to prove the following:
\[4mod8\] Let $T$ be the tile $\underbrace{\texttt{\emph{XXXXX}}}_{k}\!\texttt{.}\!\underbrace{\texttt{\emph{XXXXX}}}_{k}$, with $k \equiv 4 \pmod 8$. Then $T$ tiles $\mathbb{Z}^3$.
We will prove this by constructing partial tilings of each $\mathbb{Z}^2$ slice and filling in the gaps using the construction from the proof of Lemma \[biglemma\]. We will define 3 subsets $X_1$, $X_2$, $X_3$ of $\mathbb{Z}^2$ and show that $T$ tiles each of them. However, two of these tilings will not make use of strings.
Let $S_1 = \{(x,x+n(k+1)) \; | \; n \in \mathbb{Z}, x \equiv 2n,2n+1,2n+2,2n+3 \pmod 8\}$.
Let $S_2 = \{(x,x+n(k+1)) \; | \; n\in \mathbb{Z}, x \equiv 2n+4,2n+5,2n+6,2n+7 \pmod 8\}$.
Let $S_3 = \{(x,x+n(k+1)+1) \; | \; n \in \mathbb{Z}, x \equiv 2n+2,2n+3,2n+4,2n+5 \pmod 8\}$.
Let $X_1 = \mathbb{Z}^2 \setminus (S_2 \cup S_3)$, $X_2 = \mathbb{Z}^2 \setminus (S_1 \cup S_3)$, $X_3 = \mathbb{Z}^2 \setminus (S_1 \cup S_2)$.
Let the first coordinate be horizontal and the second vertical.
$X_3$ is $\mathbb{Z}^2$ with every $(k+1)$th diagonal removed, so each row (or column) is $Z$ with every $(k+1)$th point removed, that is, a string. Hence $T$ tiles $X_3$.
We will show that $X_1$ can be tiled with vertical copies of $T$ and $X_2$ can be tiled with horizontal copies of $T$.
Note that $(x,x+n(k+1))+(2,k+3) = (x+2,(x+2)+(n+1)(k+1))$. Also, if $x \equiv 2n+r \pmod 8$, then $x+2 \equiv 2(n+1)+r \pmod 8$. Hence, by the definitions of $S_2$ and $S_3$, we see that $X_1$ is invariant under translation by $(2,k+3)$. To show that vertical copies of $T$ tile $X_1$, it therefore suffices to show that $T$ tiles the columns $X_1 \cap (\{0\} \times \mathbb{Z})$ and $X_1 \cap (\{1\} \times \mathbb{Z})$.
But in fact, if $(0,y) \in S_2$, then $0 \equiv 2n+4$ or $2n+6 \pmod 8$, so $1 \equiv 2n+5$ or $2n+7 \pmod 8$, so also $(1,y+1) \in S_2$. The converse also holds, and the same is true for $S_3$. Thus we only need to check the case $x = 0$.
$(0,n(k+1)) \in S_2$ for $n \equiv 1,2,5,6 \pmod 8$, that is, $n \equiv 1,2 \pmod 4$.
$(0,n(k+1)+1) \in S_3$ for $n \equiv 2,3,6,7 \pmod 8$, that is, $n \equiv 2,3 \pmod 4$.
Therefore $(0,y) \notin X_1$ for $y \equiv k+1, 2(k+1), 2(k+1)+1, 3(k+1)+1 \pmod{4(k+1)}$, so copies of $T$ beginning at positions $1$ and $2(k+1)+2 \pmod{4(k+1)}$ tile $X_1 \cap (\{0\} \times \mathbb{Z})$.
Hence $T$ tiles $X_1$.
Note that $(x,x+n(k+1))+(k+2,1) = (x+k+2,(x+k+2)+(n-1)(k+1))$.\
Since $k \equiv 4 \pmod 8$, if $x \equiv 2n+r \pmod 8$ then $x+k+2 \equiv 2(n-1)+r \pmod 8$. Hence $X_2$ is invariant under translation by $(k+2,1)$, by the definitions of $S_1$ and $S_3$. To show that horizontal copies of $T$ tile $X_2$, it is therefore enough to show that $T$ tiles the row $X_2 \cap (\mathbb{Z} \times \{0\})$.
We can express $S_1$ as $\{(y-n(k+1),y) \; | \; y \equiv -n,1-n,2-n,3-n \pmod 8\}$.
Similarly $S_3 = \{(y-n(k+1)-1,y) \; | \; y \equiv 3-n,4-n,5-n,6-n \pmod 8\}$.
Therefore $(-n(k+1),0) \in S_1$ for $n \equiv 0,1,2,3 \pmod 8$, and $(-n(k+1)-1,0) \in S_3$ for $n \equiv 3,4,5,6 \pmod 8$.
Hence $(x,0) \notin X_2$ for $x \equiv 0, 2(k+1)-1, 3(k+1)-1, 4(k+1)-1, 5(k+1)-1, 5(k+1), 6(k+1), \newline 7(k+1) \pmod{8(k+1)}$, so copies of $T$ beginning at positions $k+1, 3(k+1), 5(k+1)+1, 7(k+1)+1 \pmod{8(k+1)}$ tile $X_2 \cap (\mathbb{Z} \times \{0\})$.
Hence $T$ tiles $X_2$.
$S_1 \cup S_2 \cup S_3$ can be partitioned into sets of the form $S = \{x_1, x_2, x_3\}$, where $x_1 = (x,y) \in S_1$, $x_2 = (x+4,y+4) \in S_2$, $x_3 = (x+2,y+3) \in S_3$. Then $|S| = 3$, so we can construct the corresponding set $Y \subset \mathbb{Z}^3$ as in Lemma \[biglemma\]. Now, given $n \in \mathbb{Z}$, $(S \times \{n\}) \setminus Y = \{x_i\}$ for some $i \in \{1,2,3\}$. Then $Y \cap (X_i \times \{n\}) = \emptyset$. If we do this for all such sets $S$, and let $U$ be the (disjoint) union of the resulting sets $Y$, then $U \cap (X_i \times \{n\}) = \emptyset$, and $\mathbb{Z}^2 \times \{n\} \subset U \cup (X_i \times \{n\})$. Recall that $T$ tiles each $Y$ and therefore $U$.
We can do this for every $n$, choosing a partial tiling $X_i$ for the corresponding $\mathbb{Z}^2$ layer. Together with $U$, these form a tiling of $\mathbb{Z}^3$ by $T$. This completes the proof of Theorem \[4mod8\], and therefore also the proof of Theorem \[mainthm\].
Open problems
=============
Theorem \[mainthm\], together with the result that a punctured interval $T = \underbrace{\texttt{XXXXX}}_{k}\!\texttt{.}\!\underbrace{\texttt{XXXXX}}_{k}$ does not tile $\mathbb{Z}^2$ for $k \geq 3$, determines the smallest dimension $d$ such that $T$ tiles $\mathbb{Z}^d$ in the cases $k$ odd and $k \equiv 4 \pmod 8$. However, for other values of $k$, it is still unknown whether the smallest such dimension $d$ is 3 or 4:
Let $T$ be the punctured interval $\underbrace{\texttt{\emph{XXXXX}}}_{k}\!\texttt{.}\!\underbrace{\texttt{\emph{XXXXX}}}_{k}$, where $k \equiv 0, 2, 6 \pmod 8$, $k \geq 6$. Does $T$ tile $\mathbb{Z}^3$?
It is also natural to consider more general tiles. The next non-trivial case is that of an interval with a non-central point removed. One might wonder if there is an analogue of Theorem \[mainthm\] for these tiles:
Does there exist a number $d$ such that, for any tile $T$ consisting of an interval in $\mathbb{Z}$ with one point removed, $T$ tiles $\mathbb{Z}^d$?
For general one-dimensional tiles, Gruslys, Leader and Tan [@gltan16] conjectured that there is a bound on the dimension in terms of the size of the tile:
For any positive integer $t$, there exists a number $d$ such that any tile $T \subset \mathbb{Z}$ with $|T| \leq t$ tiles $\mathbb{Z}^d$.
This conjecture remains unresolved. The authors of [@gltan16] showed that if $d$ always exists then $d \to \infty$ as $t \to \infty$, by exhibiting a tile of size $3d-1$ that does not tile $\mathbb{Z}^d$. This gives a simple lower bound on $d$; better bounds would be of great interest.
Acknowledgements {#acknowledgements .unnumbered}
================
I would like to thank Vytautas Gruslys for suggesting this problem and for many helpful discussions, and Imre Leader for his encouragement and useful comments.
[99]{}
A. Adler and F. C. Holroyd, ‘Some results on one-dimensional tilings’, *Geom. Dedicata* 10 (1981) 49–58.
R. Berger, ‘The undecidability of the domino problem’, *Mem. Amer. Math. Soc.* 66 (1966) 1–72.
J. H. Conway and J. C. Lagarias, ‘Tiling with polyominoes and combinatorial group theory’, *J. Combin. Theory Ser. A* 53 (1990) 183–208.
K. Dahkle, ‘Tiling rectangles with polyominoes’, http://eklhad.net/polyomino/index.html (retrieved 7 May 2018)
E. Friedman, ‘Problem of the Month (February 1999)’,\
https://www2.stetson.edu/\~efriedma/mathmagic/0299.html (retrieved 7 May 2018)
S. W. Golomb, ‘Tiling with sets of polyominoes’, *J. Combin. Theory* 9 (1970) 60–71.
V. Gruslys, ‘Decomposing the vertex set of a hypercube into isomorphic subgraphs’, arXiv:1611.02021.
V. Gruslys, I. Leader, T. S. Tan, ‘Tiling with arbitrary tiles’, *Proc. London Math. Soc.* (3) 112 (2016) 1019–1039.
V. Gruslys, I. Leader, I. Tomon, ‘Partitioning the Boolean lattice into copies of a poset’, arXiv:1609.02520.
V. Gruslys, S. Letzter, ‘Almost partitioning the hypercube into copies of a graph’, arXiv:1612.04603.
A. U. O. Kisisel, ‘Polyomino convolutions and tiling problems’, *J. Combin. Theory Ser. A* 95 (2001) 373–380.
The Math Forum, ‘Two tiling problems’,\
http://mathforum.org/kb/message.jspa?messageID=6223965 (retrieved 7 May 2018)
MathOverflow, ‘Does every polyomino tile $\mathbb{R}^n$ for some $n$?’\
https://mathoverflow.net/questions/49915/does-every-polyomino-tile-rn-for-some-n (retrieved 7 May 2018)
I. Tomon, ‘Almost tiling of the Boolean lattice with copies of a poset’, arXiv:1611.06842.
Harry Metrebian\
Trinity College\
Cambridge\
CB2 1TQ\
United Kingdom
rhkbm2@cam.ac.uk
|
{
"pile_set_name": "ArXiv"
}
|
Media playback is unsupported on your device Media caption Former UKIP councillor Kerry Smith was asked whether he would apologise for the comments that led to his resignation
A UKIP candidate who resigned on Sunday has said he may have been a victim of "black arts" within the party.
Kerry Smith stepped down as a candidate for South Basildon and East Thurrock after the Mail on Sunday reported leaked phone calls in which he made offensive comments about gay people.
Mr Smith told the BBC that his comments were no worse than the language in the TV comedy Only Fools and Horses.
UKIP said he was no longer a party member and "can do what he likes".
In a recording obtained by the newspaper, Mr Smith made offensive remarks about gay people, other UKIP members and Chigwell in Essex.
In his first broadcast interview since resigning as a party member, Mr Smith said ambitious people in UKIP needed to be "very, very afraid" in case more secret recordings existed.
Speaking to the BBC's Tom Barton, he said his comments were no worse than the language in the TV comedy Only Fools and Horses, and said he had been "too politically incorrect".
After apologising "unreservedly" he added: "My language, for the record, was no worse than watching an old episode of Fools and Horses to be fair. I come from the East End, the word was never offensive and if you talked politically correct where I grew up you were battered for being a boffin." He said this was no excuse.
Mr Smith said the constituency had "become a real farce as far as the national party's concerned".
Before Mr Smith was chosen last week, the former Conservative MP Neil Hamilton withdrew from the selection process for the seat after a letter querying his expenses claims was leaked to the media.
A UKIP spokesman said of Mr Smith: "He's not a member of the party. He can do what he likes. We don't recognise that story."
|
{
"pile_set_name": "OpenWebText2"
}
|
Rawlsian Self-Respect1 cynthia a. stark Self-respect is a good whose value seems undeniable. As a consequence, it presents itself as a notion capable of justifying the value of other goods. Indeed it has been employed in this way by a number of philosophers (Boxill 1976; Held 1973; Postow 1979; Miller 1982; Mohr 1988). The most prominent of these is John Rawls. Rawls appeals to the good of self-respect to justify many features of "justice as fairness"-the highly influential account of distributive justice presented in A Theory of Justice. Most who have considered the role of self-respect in Rawls's theory, throughout the four decades since the publication of A Theory of Justice, have agreed that Rawls's argument rests upon an irreparable equivocation between two different ideals of self-respect (Doppelt 2009; Eyal 2009; Moriarty 2009; Thomas 1978a, 1978b).2 In the face of this critical consensus, I attempt to resurrect Rawls's approach. I show first that Rawls relies upon an unambiguous notion of self-respect, though he sometimes is unclear as to whether this notion has merely instrumental or also intrinsic value. I show second that Rawls's main objective in arguing that justice as fairness supports citizens' self-respect is not, as many have thought, to show that his principles support citizens' self-respect generally, but to show that his principles counter the effects of the market on lower class citizens' sense of worth. This discussion 1 I owe thanks to Jeffrey Moriarty and the participants in the Second Annual Arizona Workshop in Normative Ethics, especially Ernesto Garcia, Thomas Hurka, and Elijah Millgram, for their feedback on this paper. I am also grateful to two anonymous referees for their helpful comments. 2 See also, Deigh 1983; Labukt 2009; Lane 1982; McKinnon 2003; and Yanal 1987. Distinctions among different types of self-respect that have bearing upon the supposed equivocation contained in Rawls's account are discussed in Darwall 1977; Dillon 1992; Hudson 1980; Massey 1983; Middleton 2006; and Sachs 1981. OUP CORRECTED PROOF – FINAL, 2/11/2012, SPi establishes that Rawls, in the end, sees self-respect primarily as an intrinsic good. I proceed as follows. First I outline the equivocation objection. Second I argue that that Rawls's view of self-respect should be interpreted as the belief that the activities that make up one's contribution to a scheme of social cooperation matter. Third I establish that this interpretation is consistent with all of Rawls's arguments justifying justice as fairness by appeal to self-respect. Finally, I show that these arguments are primarily designed to demonstrate that justice as fairness upholds the self-respect of lower class citizens in spite of their diminished class position. the argument and the standard critique Rawls's argument that his principles of justice preserve citizens' selfrespect has the following structure. First, Rawls claims that selfrespect-the secure conviction that one's plan of life is worth carrying out-is what he calls a "primary social good." It is, along with wealth, liberties, and opportunities, a necessary all-purpose means for citizens (as moral persons) to achieve their ends. He maintains, second, that because self-respect has this special role, the provision of self-respect is a matter of justice. Indeed, political arrangements can be judged just or unjust in part on the basis of whether those arrangements sustain selfrespect. Third, he argues that the arrangements proposed by justice as fairness indeed secure citizens' self-respect.3 He concludes that those arrangements are, to that extent, just. Rawls's critics claim that this argument breaks down because the attitude Rawls identifies as a primary social good, and hence as necessary for agents to achieve their ends, is not the same attitude as the one he shows his principles to promote.4 The former attitude consists in believing one's conception of the good to have value; the latter consists in recognizing one's equal standing as a citizen. So, Rawls has not shown 3 For a discussion of the ways in which Rawls's two principles of distributive justice support citizens' self-respect see Cohen 1989. 4 Though there are subtle differences in meaning between such terms as "support," "promote," "secure," "advance," and the like, for stylistic reasons, I use these interchangeably when discussing Rawls's idea that social arrangements and principles of justice can contribute to or detract from citizens' self-respect. OUP CORRECTED PROOF – FINAL, 2/11/2012, SPi Rawlsian Self-Respect 239 that his principles ensure that citizens have the sense of worth they need to pursue their ends. Furthermore, the argument goes, this problem cannot be fixed because the attitude said to be supported by justice as fairness is not plausibly counted a primary social good: one need not recognize one's equal civil status in order to pursue one's ends. And, the attitude Rawls identifies as a primary social good is not plausibly supported by his principles of justice. While the equal distribution of liberty, for example, might help citizens recognize their equal civil status, it will not likely cause them to believe their conceptions of the good to be valuable. rawls's account of our sense of worth In A Theory of Justice, Rawls defines self-respect (or self-esteem-he uses the terms interchangeably) as follows: "First," he says, ". . . [I]t includes a person's sense of his own value, his secure conviction that his conception of the good, his plan of life, is worth carrying out. And second, selfrespect implies a confidence in one's ability, so far as it is within one's power, to fulfill one's intentions" (1971: 440). Later, in Political Liberalism, Rawls characterizes self-respect5 thusly: "Self-respect is rooted in our self-confidence as a fully cooperating member of society capable of pursuing a worthwhile conception of the good over a complete life . . . The importance of self-respect is that it provides a secure sense of our own value, a firm conviction that our determinate conception of the good is worth carrying out" (1993: 318). So, there are two separate aspects to Rawls's account of self-respect. One involves confidence in one's capacity to pursue a conception of the good. Call this the "self-confidence aspect." The other involves a secure belief that one's conception of the good is worth pursuing. Call this the "sense of one's value aspect." Now, as it turns out, the self-confidence aspect of Rawls's account does very little justificatory work in his theory. His arguments that various features of justice as fairness support citizens' self-respect rarely invoke the self-confidence aspect. So, I will set aside, for the purposes of this paper, this aspect of Rawls's view and focus on the sense of worth aspect. 5 By now Rawls maintains that self-respect and self-esteem are not the same attitude and refers to the notion of self-worth that concerns him as "self-respect." See Freeman 1999: 260. OUP CORRECTED PROOF – FINAL, 2/11/2012, SPi 240 Cynthia A. Stark attitudes towards our activities Let us assume, then, that Rawls is primarily concerned that citizens see their conceptions of the good as worth carrying out. That is to say, for Rawls, self-respecting citizens attach value of some sort to their conceptions of the good. And those who lack self-respect fail to attach such value to their ends. As mundane as this idea might seem, it is actually puzzling as an account of self-respect, for it seems to render selfrespect an empty concept. To see this, consider someone-call him Marty-who has a career as a chef. Suppose Marty has adopted gourmet cooking as a substantial aspect of his conception of the good. Suppose, in other words, that Marty has adopted gourmet cooking as an end. Cooking for him is not merely an interest, an inclination, or a pastime. It is something to which he is committed. Surely it follows directly from the fact that Marty has taken gourmet cooking as an end, that he values (in some sense) gourmet cooking. Given that gourmet cooking is at the center of Marty's conception of the good, to state that he values it is not to make an additional claim about his relation to gourmet cooking, for the claim that one values the components of one's conception of the good is plausibly counted a conceptual truth. It is hard to see how one could not value something that is by definition part of his set of values. Taking a cue from Rawls's later characterization of self-respect, in which he invokes the idea of the citizen as a "fully cooperating member of society," I propose that we see Rawlsian self-respect not as a valuing stance toward one's ends or conception of the good, but as a valuing stance toward the activities that make up one's contribution to a scheme of social cooperation. There is no conceptual barrier to a person failing to value these activities-to one's failing to see these activities as worth pursuing. And one's failing to see these as worth pursuing would indeed be likely to hinder one's pursuit of one's ends. It follows that viewing as worth doing the activities that make up one's contribution to a scheme of social cooperation fits Rawls's characterization of a primary social good-a good that is necessary for one to pursue one's ends, whatever they are. There are three cases where we can see how a failure to value the activities that make up one's contribution to a scheme of social OUP CORRECTED PROOF – FINAL, 2/11/2012, SPi Rawlsian Self-Respect 241 cooperation would impede one's pursuit of one's ends. If I am right that it is a conceptual truth that persons value their ends, it follows that if a person fails to value her contribution to a scheme of social cooperation that contribution is not an end for her. If she has no other ends, then she is, at it were, "at loose ends" and is hindered in the pursuit of her ends simply by not having any. In the more likely case that she does have other ends-other activities that she values to which her contribution to a scheme of cooperation is a means-then not valuing her contribution will make it difficult for her to pursue her ends simply by making it difficult to undertake the activities she must in order to pursue her ends.6 Another way that not valuing one's contribution to a scheme of social cooperation can hinder one's pursuit of one's ends is that, in making one's (unvalued) contribution, one is not pursuing one's ends. One's ends and one's contribution pull apart and so one is deprived of the experience of fulfilling one's ends through the activities that one spends much of one's life doing. Indeed, I suspect that in claiming that social arrangements should encourage citizens to value their conceptions of the good what Rawls has in mind is that those arrangements should encourage, or at least allow, citizens to regard the activities that make up their contributions to society as among their ends. So, let us suppose that Rawls's concern about citizens' self-respect is the concern that citizens believe that the activities that make up their contribution to a scheme of social cooperation are in some sense valuable. There are three ways that we might understand the attitude of valuing that one might have toward one's contribution.7 A person might see his contribution as valuable 6 I realize that this interpretation represents a significant departure from Rawls's stated view and that this interpretation-or perhaps, more accurately, modification-ultimately requires more argument than I have provided. I think this modification can be supported by the link, suggested in Rawls's work, between self-respect and the ideal of reciprocity that Rawls claims is expressed by his principles of justice. He says, for instance, that while the least advantaged in society "control fewer resources, they are doing their full share on terms recognized by all as mutually advantageous and consistent with everyone's self-respect" (2001: 139). Thanks to Jeffrey Moriarty for pointing out to me this passage. 7 Larry Thomas has interpreted this valuing stance as seeing oneself as having worth for her success in the pursuit of her conception of the good. I do not think that interpretation is supported very well by Rawls's writings, though there are some grounds for thinking that this notion is what Rawls has in mind in his description of the self-confidence aspect of self-respect. See Thomas 1978a and 1978b. OUP CORRECTED PROOF – FINAL, 2/11/2012, SPi 242 Cynthia A. Stark (1) in the sense of being "meritorious,"8 or (2) in the sense of thinking it is good for him to undertake it, or (3) in the sense of judging that it matters. We can get a grasp on these different attitudes of valuing by appealing again to our example of Marty. Let us suppose now, for the sake of simplicity, that Marty does not value cooking as an end; it is not part of his conception of the good. (Let us say that his conception of the good revolves around coaching soccer, which is what he does much of the time when he's not cooking in a restaurant.) Cooking is simply the career Marty has chosen and he values it as a means to his ends. One way in which we might understand the valuing stance that Marty takes toward cooking is that he thinks that the activity of gourmet cooking has merit. He believes that gourmet cooking has high value in comparison with other activities as measured on an objective scale. Marty thinks, for example, that cooking endeavors, in comparison to, say, real estate sales endeavors have considerably more worth. Indeed, he has chosen cooking over real estate sales, let us say, for this reason. A different attitude of valuing that Marty might have toward his cooking activities is that he might see cooking as good for him. In this case, he does not think that cooking is objectively better than, e.g., real estate sales. He simply thinks that cooking is a better activity for him than, real estate sales, given his attributes, dispositions, etc. Perhaps he founds this judgment on the fact that he is good at cooking, or enjoys it, and that cooking does not require him, as real estate sales would, to talk to strangers, which he dislikes. This type of valuing is subjective in the following sense: one judges the value of an activity strictly in terms of its suitability for oneself without making a judgment about the value of the activity per se. The judgment is not "one ought to cook (rather than sell real estate)" but rather "given the sort of person I am, I ought to cook (rather than sell real estate)." Consider now the last attitude of valuing listed above. This is the belief that one's contribution matters. If Marty, our cook, has this attitude then he thinks that gourmet cooking is important-that it is not pointless or trivial or dispensable. He thinks that gourmet cooking is worthwhile; that it counts. He thinks that gourmet cooking meets a 8 Labukt 2009 and Yanal 1987 interpret Rawls along these lines. OUP CORRECTED PROOF – FINAL, 2/11/2012, SPi Rawlsian Self-Respect 243 threshold of being worth doing. He believes, in other words, that there is a place for it in society. In thinking this, he ascribes to gourmet cooking a kind of standing. Moreover, to be self-respecting, Marty need not think that he is making an especially significant contribution to society. If he later decided to join a monastery and take up the contemplative life, Marty would have to admit that the nature of his contribution is not significant compared, to, say, policing or manufacturing. Indeed if the mattering view required one to believe that one's contribution was significant, the view would begin to collapse into the merit view, for one would be judging one's contribution on a scale of merit that attaches merit to contributions in reference to how significant those contributions are for a given society.9 The value associated with mattering, as I am understanding it, is independent of various judgments about the relative virtues of various contributions. It is a type of valuing that is orthogonal to the type of valuing one engages in when assessing contributions on the basis of their merits. Whatever citizens believe about the merits of their contribution to a system of social cooperation, to be self-respecting, citizens believe that their contribution is legitimate-that it has weight. Now, if the source of the value of one's contribution on the mattering view is not its significance (or its other merits) but it nonetheless matters objectively, on what basis, one might ask, does it matter? Here, what I think Rawls has in mind is simply that one's contribution matters because it is what one has to offer. To deny that the contribution that one is suited or able to make to one's system of social cooperation matters is to say that one has nothing to offer to that system. So when Rawls claims that a just society preserves the self-respect of its citizens, he is saying that it is a matter of justice that citizens believe that they have something to offer-that they are never led to believe that, 9 An anonymous referee suggested to me that the mattering view might be understood along the following lines: one respects oneself when one judges oneself a good cooperator. One sees one's chosen activities as helping to form an overall better scheme of cooperation. My worry about such a view is that the notion that one ought to be a good cooperator seems as though it belongs to a comprehensive doctrine. It expresses a moral ideal of what sort of person one should strive to be. So, an ideal of self-respect founded upon this notion would be incompatible with Rawls's commitment to political liberalism. OUP CORRECTED PROOF – FINAL, 2/11/2012, SPi 244 Cynthia A. Stark though they are participating, they have no contribution to make.10 Self-respecting citizens, on my reading of Rawls, believe that whatever they are equipped to do to take part in their system of social cooperation is worth doing. grounds for the mattering interpretation We can reject the merit interpretation of Rawlsian self-respect fairly swiftly. There is plenty of textual evidence, which I consider below, that implies that the merit view is not what Rawls has in mind. More importantly, though, if this were what Rawls has in mind, his view of self-respect would conflict with his view of conceptions of the good. Because Rawls thinks that every citizen should have self-respect, he would be committed, on the merit interpretation, to the idea that every citizen should have as part of his conception of the good the idea that persons' contributions can be assessed on an objective scale of merit. He would not be committed to a particular view of which contributions have merit-he would not be, that is, committed to a particular standard of merit. But he would be committed to the notion that all persons should have an objectivist view about the merit of various types of human activities. In the language of the later Rawls, we can say that Rawls would be committed to the idea that a reasonable comprehensive doctrine as such must contain the view that the various sorts of contributions people make to a scheme of social cooperation can be ranked on a scale of merit. But Rawls clearly does not restrict reasonable comprehensive doctrines in this way (1993: 58–66). He counts among the reasonable comprehensive doctrines those that deny the existence of an objective standard for assessing the merit of various human activities. So, we have a fairly strong reason to conclude that Rawls does not see self-respect as a secure conviction in the merit of our contributions to a scheme of social cooperation. That leaves us with the good-for-oneself and the mattering interpretations of Rawlsian self-respect. Before outlining my argument for the 10 There may be, in rare cases, adult members of society who have virtually nothing to offer to a scheme of social cooperation. To encourage them to have self-respect, then, would be to encourage them to have a false belief. This problem is set aside by Rawls's conception of the citizen as a fully cooperating member of society. OUP CORRECTED PROOF – FINAL, 2/11/2012, SPi Rawlsian Self-Respect 245 mattering interpretation, I must make a distinction between two types of circumstances that Rawls thinks sustain citizens' self-respect. When he explains that self-respect is a primary social good, Rawls gives us what I will call the "personal circumstances" that support individuals' selfrespect. These include, first, the conformity of one's activities to the Aristotelian Principle and, second, the appreciation of one's activities by one's associates. When he explains why the tenets of justice as fairness secure citizens' self-respect, Rawls is identifying what I will call the "political circumstances" that support self-respect. There are three of these. The first is the duty of mutual respect, which Rawls thinks would be adopted by the parties in the original position along with his two principles of distributive justice. The two principles of distributive justice include, first, the equal liberty principle, which prescribes the equal distribution of the maximal degree of liberty compatible with its being distributed equally. The second allows inequalities of wealth provided that there is substantive equality of opportunity and that the inequalities maximally benefit the person with the least wealth. The second of these constraints on inequality is termed the "difference principle." The second political circumstance that supports citizens' self-respect, according to Rawls, is the difference principle and the third is the "lexical ordering" of his two principles, also known as the doctrine of the priority of liberty. This doctrine prohibits constraining liberty for the sake of increased wealth. In what follows, I examine Rawls's explanation of both the personal and political circumstances that sustain self-respect. I show that citizens' self-respect is supported by all of these circumstances when self-respect is understood as the mattering notion. However, citizens' self-respect is supported only by the personal circumstances, and perhaps by one of political circumstances, when self-respect is understood as the goodfor-oneself notion. It follows that if Rawls were offering the good-foroneself view in his account of self-respect as a primary social good, then he would indeed by offering an equivocal account of self-respect, as critics have maintained. Moreover, Rawls, to a certain degree, invites this objection because the passages explaining the political circumstances that secure selfrespect are often cryptic. Rawls is attempting in these passages to show that certain aspects of his view are justified by the fact that they OUP CORRECTED PROOF – FINAL, 2/11/2012, SPi 246 Cynthia A. Stark promote self-respect. Yet, in each case, he briefly describes the aspect that he wishes to justify and then simply asserts that this aspect advances citizens' self-respect. He does not make explicit the connection between the aspect and self-respect and he rarely speaks in terms of the definition of self-respect that he has proposed-the conviction that one's endeavors are worth carrying out. The reader, then, is left wondering how the feature of Rawls's view that is said to secure citizens' self-respect in fact advances the ideal of self-respect he has identified as primary social good. As I see it, critics have, first, taken Rawls to be defending the goodfor-oneself or the merit view when he describes the personal circumstances that support self-respect. Second, they have argued (not implausibly) that the political circumstances cannot be understood to promote self-respect when it is interpreted in this way. The political circumstances, they claim, suggest a different notion of self-respect, namely a belief in one's equal worth as a citizen.11 My contention is simply that all the circumstances that Rawls identifies as sustaining selfrespect are consistent with the mattering interpretation of self-respect. So the generous reading of Rawls attributes to him that interpretation. the personal circumstances supporting self-respect Rawls says, "[T]he circumstances that support the first aspect of selfesteem, the sense of our own worth, are essentially two: (1) having a rational plan of life, and in particular one that satisfies the Aristotelian principle; and (2) finding our person and deeds appreciated and confirmed by others who are likewise esteemed and their association enjoyed" (1971: 440). The Aristotelian Principle is a principle of human psychology that says "other things equal, human beings enjoy the exercise of their realized capacities (their innate and trained 11 Doppelt sees Rawls as characterizing self-respect as an appraisal of the value of the life one pursues and an appraisal of the standards that are most appropriate for judging that life. He claims that this ideal is "an empirical notion devoid of normative content" and that it is "subjective" (2009: 128, 134). Eyal characterizes Rawlsian self-respect as "confidence in the value of one's plans" but does not state what sort of value he thinks Rawls has in mind (2009: 202). He claims that, in any case, this confidence is distinct from the Kantian ideal of selfrespect as "confidence that one has the dignity of persons" (2009: 203). This is the ideal he thinks Rawls invokes throughout most of A Theory of Justice. Doppelt makes a similar claim (2009: 133). OUP CORRECTED PROOF – FINAL, 2/11/2012, SPi Rawlsian Self-Respect 247 abilities), and this enjoyment increases the more the capacity is realized, or the greater its complexity" (1971: 426).12 One's activities satisfy the Aristotelian Principle when they make sufficient use of and adequately contribute to the cultivation of one's capabilities. The Aristotelian Principle is related to self-respect in the following straightforward way: one is more likely to respect oneself to the extent that one undertakes activities that fulfill the Aristotelian Principle. Rawls says, I assume then that someone's plan of life will lack a certain attraction for him if it fails to call upon his natural capacities in an interesting fashion. When activities fail to satisfy the Aristotelian Principle, they are likely to seem dull and flat, and to give us no feeling of competence or a sense that they are worth doing. A person tends to be more confident in his value when his abilities are both fully realized and organized in ways of suitable complexity and refinement. (1971: 440) In other words, the more one's activities incorporate the exercise and development of one's talents, the more likely one is to value them and, in this sense, be sure of one's own worth. The second personal circumstance that supports individuals' selfrespect-others' appreciation of our life plans-is influenced by the Aristotelian Principle. Rawls asserts, For while it is true that unless our endeavors are appreciated by our associates it is impossible for us to maintain the conviction that they are worthwhile, it is also true that others tend to value them only if what we do elicits their admiration or gives them pleasure. Thus the activities that display intricate and subtle talents, and manifest discrimination and refinement, are valued both by the person himself and those around him. (1971: 441) So, the degree of complexity in the activities that make up one's life plan influences one's self-respect both directly and indirectly. One's sense of worth is bolstered by one's engaging in complex activities and by one's associates' appreciation of one's endeavors. But one's associates' appreciation of one's endeavors depends upon one's endeavors incorporating complex activities. 12 For a critical discussion of the Aristotelian Principle, see Shue 1975. OUP CORRECTED PROOF – FINAL, 2/11/2012, SPi 248 Cynthia A. Stark Now, Rawls is aware that it might seem that only very talented people who are surrounded by other very talented people are likely to have selfrespect on this view of what encourages self-respect. He denies that this is the case, however, because the Aristotelian Principle, he says, "is always relative to the individual" (1971: 441). A person's activities fulfill the Aristotelian Principle if they are suitably complex given his capabilities.13 Moreover, societies are diverse in their associations so a person can find a group of people with similar tastes and capability levels who will affirm his undertakings (1971: 441–2). As long as this is the case, then, each person, no matter the extent of his capabilities, will have the opportunity to come to value his endeavors. Rawls's account of the relation between self-respect and both the Aristotelian Principle and the appreciation of others is consistent with both the good-for-oneself and the mattering interpretations of selfrespect. If one finds one's activities challenging and engaging one will be lead to think that those activities are both suitable for oneself and that they matter. Insofar as Marty, for example, finds gourmet cooking challenging, he is inclined to think that gourmet cooking is an activity that he should pursue. He is inclined to think that gourmet cooking is good for him to do. But it is also likely that Marty would conclude from the fact that he finds cooking interesting and engaging that cooking itself matters-that cooking is good to do simpliciter. If our endeavors bring us satisfaction, we tend to think, as Rawls says, that they are worth doing. Likewise, if others appreciate our undertakings, we are likely to make a number of inferences about the worth of those undertakings. Suppose Marty's friends and neighbors appreciate his cooking skills. They commend him for his cooking, let us say, and seek out opportunities to sample his food. This fact might encourage Marty to believe that cooking is a good activity for him to engage in. He might interpret the appreciation of his associates as confirming his judgment that he ought to pursue cooking. It is certainly likely, though, that Marty will infer from the appreciation of his associates that cooking is worth pursuing in other senses. In particular, this appreciation is likely to cause him to think that cooking itself matters-that cooking is a worthwhile and 13 This notion strongly suggests that Rawls does not see self-respect as a belief in the objective merit of one's conception of the good. OUP CORRECTED PROOF – FINAL, 2/11/2012, SPi Rawlsian Self-Respect 249 important activity. Surely he is likely to think not just that gourmet cooking is good for him to do, nor merely that his gourmet cooking matters to his friends, but that gourmet cooking is a worthwhile activity. So, Rawls's appeal to the Aristotelian Principle and the appreciation of others as personal supports for self-respect is consistent with both the good-for-oneself and the mattering interpretations of self-respect. the political circumstances supporting self-respect The duty of mutual respect After describing the two personal circumstances that support citizens' self-respect, Rawls intimates that they are not sufficient to ensure citizens' self-respect. He suggests that they are sufficient only ". . . whenever in public life citizens respect one another's ends and adjudicate their political claims in ways that also support their self-esteem. It is precisely this background condition," he continues, "that is maintained by the principles of justice" (1971: 442). So, the public norm requiring citizens to respect one another's contributions referred to in this passage is to be distinguished from the appreciation of one another's contributions that takes place within associations. We can get an idea of what is involved in respecting one another's contributions by looking at Rawls's account of the duty of mutual respect, for Rawls claims that the parties in the original position would adopt the duty of mutual respect precisely because the self-respect of those whom they represent would be at risk in a society in which this duty is absent (1971: 178–9). So, it is reasonable to conclude that the attitude expressed through the observance of the duty of mutual respect is part of what is involved in the respecting of others' contributions that is necessary for citizens to have full self-respect. The duty of mutual respect, Rawls says, [I]s the duty to show a person the respect that is due to him as a moral being, that is, as a being with a sense of justice and a conception of the good. . . . Mutual respect is shown in several ways: in our willingness to see the situation of others from their point of view, from the perspective of their conception of their good; and in being prepared to give reasons for our actions whenever the interests of others are materially affected. (1971: 337) OUP CORRECTED PROOF – FINAL, 2/11/2012, SPi 250 Cynthia A. Stark If this duty is plausibly seen as encouraging citizens to believe, among other things, that their contributions to a scheme of cooperation matter, then we have grounds for thinking that the view of self-respect he describes as a primary social good consists in that belief. I submit that the passage above implies that showing respect includes recognizing that others' contributions matter. Moreover, if we assume that the kind of respect one is shown determines the kind of self-respect one acquires, then we can conclude that when one's contribution is judged by others to matter, one tends oneself to judge that one's contribution matters. It follows that Rawls's account of the duty of mutual respect gives us grounds for attributing to him a view of self-respect as the belief that the activities making up one's contribution to a scheme of cooperation matter. Consider the two actions or attitudes that Rawls identifies as paradigmatic of respecting others: being willing to see things from their point of view and being willing to give them reasons for our actions. A willingness to see things from another's perspective conveys one's belief in the legitimacy of that perspective. It conveys a sense that one regards the other's point of view as having standing. One may not fully understand the other's point of view or agree with it. One may in fact feel alienated from it. But in being willing to take it up, as it were, one shows that one regards it as significant or important, not trivial or silly. A willingness to provide reasons for one's actions expresses one's realization that we may act in ways that might interfere with or limit others' projects only if there are good reasons for doing so. It expresses, in other words, the idea that one sees another's projects, again, as having standing, and acknowledges that others are entitled, all things equal, to undertake their projects. Both of these attitudes would likely encourage individual citizens to think that their contributions to the cooperative scheme in which they are participating with other citizens matters. When one's fellow citizens acknowledge the standing of one's perspective and projects, they acknowledge that one's perspective and projects matter. Given that our perspectives and our projects are intimately bound up with our contributions to a cooperative scheme, acknowledging the standing of our perspectives and projects includes acknowledging the standing of our contributions, and hence recognizing that our contributions matter. For example, to see, in the public forum, Marty's situation from his OUP CORRECTED PROOF – FINAL, 2/11/2012, SPi Rawlsian Self-Respect 251 point of view, the fellow citizens of Marty would have to see things from the point of view of someone who has a career as a chef. And in being prepared to give reasons for their actions that affect others' interests, Marty's fellow citizens would have to be willing to justify their support for policies that might negatively affect restaurant workers. By acting in these ways, Marty's fellow citizens would fulfill the duty of mutual respect and in so doing convey their belief that Marty's contribution to the scheme of cooperation they share with him matters. So, by acting in these ways, Marty's fellow citizens encourage Marty to believe that his contribution matters. It follows that the duty of mutual respect can be seen to support citizens' self-respect where their self-respect is understood as the belief that their contribution to a scheme of social cooperation matters. Notice that a failure to be respected by one's fellow citizens would not typically cause one to cease to think that the activities making up one's contribution are good for oneself. That others disrespect those activities would not likely make one change one's mind about the suitability of those activities for oneself. One's judgment that an activity is good for oneself is founded primarily upon features of oneself, not upon factors such as the respect of other citizens who are not, in Rawls's words, one's associates. One might be dismayed that the activities one judges good for oneself to undertake are not respected by one's fellow citizens, but this is different from doubting whether one's activities are well suited to the kind of person one is. Being disrespected in the public forum, then, is not likely to diminish one's self-respect if self-respect is understood as a belief that one's contribution to a scheme of social cooperation is valuable for oneself. It follows that Rawls's discussion of the duty of mutual respect does not support the good-for-oneself interpretation of self-respect. The difference principle The difference principle, which is a principle governing the distribution of wealth, allows inequalities, but only those that maximally benefit the least well off. Part of Rawls's argument that the difference principle supports citizens' self-respect is contained in his remarks about envy. Envy, Rawls says, "is the propensity to view with hostility the greater good of others . . . .We envy those persons whose situation is superior to OUP CORRECTED PROOF – FINAL, 2/11/2012, SPi 252 Cynthia A. Stark ours . . . and we are willing to deprive them of their greater benefits even if it is necessary to give up something ourselves" (1971: 532). Rawls is concerned about envy because he thinks that the unequal distribution of wealth in a society can damage citizens' self-respect to an extent that gives rise to envy and in turn to instability. Indeed, he claims that the primary cause of envy is the absence of self-respect. "[T]he main psychological root of the liability to envy," Rawls says, "is a lack of selfconfidence in our own worth combined with a sense of impotence" (1971: 535). Moreover, according to Rawls, when people's self-respect is damaged by their having considerably less wealth than others, the envy that they feel toward the better off is excusable. That is to say, we cannot expect the less fortunate to overcome their envy in that case; rather we are obliged to change the political arrangements that reduce their selfrespect and foment envy. Because Rawls's theory allows for inequality of wealth, he must consider whether his theory recommends arrangements that are likely to induce excusable envy. In the end Rawls thinks that the difference principle will not generate excusable envy because, first, it does not encourage large disparities of wealth, and second it allows only those disparities that are to greatest advantage of those who have the least wealth. Citizens are not inclined toward envy when "the greater advantages of some are in return for compensating benefits for the less favored" (1971, 536). We can set aside the issue of whether or not this is a strong argument. I simply want to pinpoint the notion of self-respect that is at work in Rawls's claim that distributive inequality can seriously injure citizens' self-respect and that this injured self-respect tends to generate envy. A plausible reconstruction of the reasoning behind Rawls's contention that distributive inequality may damage the self-respect of the less well off is as follows. If one's contribution is remunerated far less than the contributions of others, then one will come to see one's endeavors as unimportant or insignificant. The relatively small reward one receives for making one's contribution inclines one to judge that others see one's contribution as mattering little and this leads one to doubt oneself that one's contribution matters. If "what we do in everyday life" brings us a scanty wage or salary, which in turn gives us access to few of the advantages our scheme of social cooperation creates, then we are inclined to conclude that what we do does not matter (1971: 441). This feeling that what we do does not matter can induce hostility toward OUP CORRECTED PROOF – FINAL, 2/11/2012, SPi Rawlsian Self-Respect 253 those who engage in activities that we see as mattering on account of the high compensation garnered by those activities. And this hostility can generate a desire to impose a loss, even at a cost to ourselves, on those who engage in those activities. Notice that if one's activities are poorly remunerated one does not typically cease to see those activities as good for oneself. If one thinks that e.g., gourmet cooking is good for oneself, the fact that one gets remunerated little for it is not likely to change that assessment. Again, this is because one's judgment that an activity is good for oneself is founded upon features of oneself, not upon factors such as prestige or compensation. One might, of course, choose to make a contribution that involves activities for which one is not well suited because one prefers wealth and prestige. But this phenomenon is compatible with the idea that one's judgment about what is good for oneself is generally unaffected by how well remunerated one is for one's activities. Having considerably less wealth than others, then, is not likely to diminish one's self-respect if self-respect is understood as a belief that one's contribution to a scheme of social cooperation is valuable for oneself. It follows that Rawls's discussion of envy does not support the good-for-oneself interpretation of self-respect. The priority of liberty The doctrine of the priority of liberty is justified by Rawls largely in terms of its support for citizens' self-respect. This doctrine states that, when a society has reached a level of wealth that allows all citizens a decent standard of living, constraints on liberty that would increase citizens' wealth should not be permitted. The merits of Rawls's argument for the priority of liberty have been much discussed (Doppelt 1981; Shue 1974/75; Hart 1979; Neilson 1979; Taylor 2003). I do not hope here to add anything to that discussion; I confine myself to showing that Rawls's argument for the doctrine supports the idea of self-respect as a conviction that one's contribution to a scheme of social cooperation matters. There are two types of restrictions on liberty, according to Rawls, that might be imposed for the sake of increasing wealth (1971: 244). First, liberty might be less extensive but still distributed equally. Second, liberty might be distributed unequally-it might be limited for only some citizens. The first type of restriction might seem justified if OUP CORRECTED PROOF – FINAL, 2/11/2012, SPi 254 Cynthia A. Stark it resulted in an increase in wealth, consistent with the difference principle, for all citizens. The second type of restriction might seem justified if it resulted in an increase in wealth, consistent with the difference principle, for those with less liberty. Both types of restriction, Rawls thinks, are in fact unjustified because they would damage citizens' self-respect. He argues that the parties in the original position, as they are concerned to promote the good of self-respect, would therefore adopt the doctrine of the priority of liberty. There is no doubt that Rawls's argument that an unequal distribution of liberty would damage citizens' self-respect invokes the importance of civil equality. Unequal liberty, he tells us, would damage the self-respect of those with fewer liberties by publicly establishing their inferiority as defined by the basic structure of society. This subordinate ranking in the public forum experienced in the attempt to take part in political and economic life, and felt in dealing with those who have a greater liberty, would indeed be humiliating and destructive of self-esteem. (1971: 545) The idea seems to be that people would lack self-respect if they were forced to see themselves as civilly inferior to their compatriots. This idea is compatible with a notion of self-respect as a secure conviction in one's civil equality. But it is also compatible with a notion of self-respect as a secure conviction that one's contribution to a scheme of social cooperation matters. The reason for this mutual compatibility is that the fact that civil inferiority can cause diminished self-respect, as the quoted passage suggests, does not entail that the content of self-respect is (or is only) a belief in one's civil equality. Indeed Rawls implies that it is not merely the civil inequality itself that undermines the self-respect of the civilly inferior but also "the hardships arising from political and civic inequality and from cultural and ethnic discrimination" (1971: 545). Surely having an inferior civil status has a host of effects on one's sense of oneself. And it seems reasonable to think that being marginalized and discriminated against can lead one to believe that one's more politically advantaged compatriots care little about one's contribution to society, and this can lead one to doubt oneself that one's contribution matters. Rawls's account of the injuries to self-respect that arise from civil inferiority strongly suggests that injuries to self-respect would arise also OUP CORRECTED PROOF – FINAL, 2/11/2012, SPi Rawlsian Self-Respect 255 from economic inferiority. Surely having a low rank in an economic hierarchy would impose hardships on citizens similar to those imposed by having a low rank in a political hierarchy. Though not literally second-class citizens, the poor are often politically powerless and disenfranchised. The poor no doubt feel their inferiority in attempting to take part in political and economic life alongside the wealthy and are prone to experience humiliation and diminished self-respect. So, it appears that inequality of wealth would also damage citizens' selfrespect. Yet Rawls's theory permits this kind of inequality. Rawls gets around this problem in the following way. His argument for the priority of liberty assumes that citizens have what he calls "a need for status." This is the need to be valued by others, which valuing, Rawls claims, is a prerequisite for self-respect. This need can be met in the political domain either by one's economic status or one's civil status. Rawls thinks political institutions should be arranged so that the need for status is met by something that gives people equal status, because this will support the self-respect of all citizens. Because there are independent reasons, according to Rawls, for allowing inequality of wealth, then if wealth is positioned as the ground for status, the need for status will be satisfied by something that gives people unequal status, and so will put the self-respect of those with less status at risk. It follows that the need for status should be satisfied by an equal distribution of liberty. Rawls concludes, In a well-ordered society then self-respect is secured by the public affirmation of the status of equal citizenship for all; the distribution of material means is left to take care of itself in accordance with pure procedural justice. Of course doing this assumes the requisite background conditions which narrow the range of inequalities so excusable envy does not arise. (1971: 545) Rawls's argument that an equal but less expansive liberty undermines self-respect also supports the mattering interpretation of self-respect. His argument is as follows. As the economic conditions of a society improve, so that everyone enjoys a comfortable standard of living, citizens' interests in pursuing their life plans as they see fit increases. They are no longer preoccupied with subsistence and so can focus on, e.g. their spiritual needs. Human beings, as such, develop and pursue their plans, Rawls says, within "communities of interest." They undertake their endeavors, that is, by means of attachments to others who OUP CORRECTED PROOF – FINAL, 2/11/2012, SPi 256 Cynthia A. Stark share their interests and ideals. The associations that are necessary for people to pursue their life plans flourish only when citizens are afforded extensive liberties (1971: 542–43).14 Liberty, in short, gives rise to pluralism. One of the reasons pluralism is required for citizens to undertake their projects is because it is within various associations that citizens come to attach value to their activities-to regard their activities as worth doing. One can pursue one's ends adequately only when one values the activities that make up one's contribution to a cooperative scheme, and the primary way one comes to value those activities is by being surrounded by similar others who confirm their value. Because liberty is required for the emergence and survival of communities of interest, liberty is required for citizens to experience their associates appreciating their endeavors, and it is therefore required for citizens believing in the worth of their endeavors. Liberty sustains citizens' selfrespect, then, by securing one of the personal circumstances that upholds self-respect. Because the mattering notion of self-respect is supported by Rawls's claim that self-respect depends upon the appreciation of others, the mattering notion is supported by Rawls's claim that self-respect depends upon a more expansive liberty since the role of liberty is to afford citizens the opportunity to feel that their activities are appreciated by others. (Notice that the good-for-oneself view of self-respect is also supported by Rawls's claim that liberty secures citizens' self-respect by creating one of the personal circumstances upholding self-respect. This follows from the fact that Rawls's account of the personal circumstances is compatible with both the good-for-oneself and the mattering interpretations of self-respect.) self-respect, primary goods, and social hierarchy I have argued that Rawls's theory of justice employs a univocal notion of self-respect as the belief that the activities that make up one's contribution to a scheme of social cooperation matter. In what follows, I maintain that Rawls nonetheless equivocates on the value 14 For the importance of social groups for the development of self-respect see McKinnon 2000. OUP CORRECTED PROOF – FINAL, 2/11/2012, SPi Rawlsian Self-Respect 257 of self-respect, sometimes regarding it as merely instrumental and other times as intrinsic. I argue further that his main interest in stressing the importance of self-respect is to explain how justice as fairness avoids what he sees as an objectionable outcome of markets-the specific sense of inferiority that might burden those at the bottom of class hierarchies. Rawls thinks, on my reading, that unless institutions within market societies are carefully designed, citizens who lose out in market competition will fail to see the worth of their contribution to a system of cooperation that nonetheless relies on their contribution. The centrality of this preoccupation reveals that Rawls sees self-respect, in the end, as having intrinsic worth. In identifying self-respect as a primary social good, Rawls claims that self-respect is good chiefly as a means-like wealth and opportunities, its value lies in its enabling us to carry out our ends, or at any rate to do with ease or with pleasure. Moreover, his account of the personal circumstances supporting self-respect suggests that Rawls sees the risk of diminished self-respect as equally distributed throughout the population. Each of us, to be fully self-respecting, he says, needs to undertake activities that are sufficiently complex and needs for our associates to affirm these activities. It seems that any of us might fail in these regards. But it is clear that the political circumstances are what really matter on Rawls's view, for he tells us that these personal circumstances are sufficient only in an environment of mutual respect, equal liberty, and limited inequality of wealth.15 His account of the political circumstances, moreover, suggests that Rawls is largely concerned with the self-respect of citizens who have less wealth and prestige than others. This is especially obvious in his treatment of envy where he assures us that under the difference principle the less fortunate will lack grounds to doubt their worth. This concern, however, is also implied by his discussions of the duty of mutual respect and the priority of liberty. In those passages Rawls strongly suggests that so long as the economically less well off are treated with respect by other citizens in the public forum and afforded equal liberty, they will have secure self-respect. 15 I leave out expansive liberty here because Rawls's argument for the importance of expansive liberty for sustaining self-respect is that such liberty is a precondition for one of the personal circumstances sustaining self-respect. OUP CORRECTED PROOF – FINAL, 2/11/2012, SPi 258 Cynthia A. Stark Now, if the value of self-respect resides merely in its enabling us to fulfill our ends, then we should expect that Rawls's concern for the security of the self-respect of the less fortunate would be a concern that the less fortunate will be hindered in fulfilling their ends. It appears from his discussion of the political circumstances, though, that Rawls is not worried that the less fortunate will be hindered in this way. Rather he seems concerned with the bare fact of the potentially diminished selfrespect of the less fortunate. Consider again his accounts of the connection between self-respect and the difference principle, the duty of mutual respect and the priority of liberty. In these accounts at no point does Rawls say or imply that self-respect is important so that citizens can adequately fulfill their ends. It seems quite clear that in these discussions Rawls takes a diminished or insecure sense of worth to be bad in itself. To be encouraged to think less of oneself by having one's projects publicly demoted or one's perspective ignored or by being given fewer rights is to be wronged, Rawls thinks, regardless of the effects of this damaged sense of worth upon one's ability to pursue one's ends. On my interpretation of Rawlsian self-respect, then, Rawls thinks that when citizens are encouraged by political institutions to believe that their contributions to society do not matter, they have been wronged. And this is regardless of the debilitating effects this belief may have on their carrying out their life plans. I have maintained that Rawls's account of self-respect does not have the major flaw that has been attributed to it. Rawls offers us one notion of self-respect. It is the conviction that the activities making up one's contribution to a scheme of social cooperation matter. Rawls suggests that this conviction is instrumentally good insofar as it helps us to pursue our ends, or at least to pursue them with pleasure. But that is not its chief importance. He thinks that this conviction is also intrinsically good, for he clearly regards its absence as bad in itself. It is the hallmark of just society, Rawls believes, that it secure this belief for everyone, especially lower class individuals who are at risk of thinking that their contributions are not worthwhile. OUP CORRECTED PROOF – FINAL, 2/11/2012, SPi Rawlsian Self-Respect 259 REFERENCES Boxill, Bernard (1976) "Self-Respect and Protest," Philosophy and Public Affairs 6, 58–69. Cohen, Joshua (1989) "Democratic Equality," Ethics 99, 727–51. Darwall, Stephen (1977) "Two Kinds of Respect," Ethics 88, 36–49. Reprinted in Dillon 1995, 181–97. Deigh, John (1983) "Shame and Self-Esteem," Ethics 93, 225–45. Reprinted in Dillon 1995, 133–56. Dillon, Robin (1992) "How to Lose Your Self-Respect," American Philosophical Quarterly 29, 125–39. --(ed.) (1995) Dignity, Character and Self-Respect (New York: Routledge). Doppelt, Gerald (1981) "Rawls' System of Justice: A Critique From the Left," Noûs 15, 259–307. --(2009) "The Place of Self-Respect in A Theory of Justice," Inquiry 52, 127–54. Eyal, Nir (2009) " 'Perhaps the Most Important Primary Social Good': SelfRespect and Rawls's Principles of Justice," Politics, Philosophy and Economics 4, 195–219. Freeman, Samuel (ed.) (1999) John Rawls: Collected Papers (Cambridge, MA: Harvard University Press). Hart, H. L. A. (1979) "Rawls on Liberty and Its Priority." In Norman Daniels (ed.), Reading Rawls (Stanford University Press), 230–52. Held, Virginia (1973) "Reasonable Progress and Self-Respect," The Monist 57, 12–27. Hudson, Stephen (1980) "The Nature of Respect," Social Theory and Practice 6, 69–90. Labukt, Ivar (2009) "Rawls on the Practicability of Utilitarianism," Politics, Economics and Philosophy 8, 201–21. Lane, Robert E. (1982) "Government and Self-Esteem," Political Theory 10, 5–31. McKinnon, Catriona (2000) "Exclusion Rules and Self-Respect," Journal of Value Inquiry 34, 491–505. --(2003) "Basic Income, Self-Respect and Reciprocity," Journal of Applied Philosophy 20, 143–58. Massey, Stephen (1983) "Is Self-Respect a Moral or a Psychological Concept?" Ethics 93, 246–61. Middleton, David (2006) "Three Types of Self-Respect," Res Publica 12, 59–76. Miller, David (1982) "Arguments for Equality,"Midwest Studies in Philosophy 7, 73–87. Mohr, Richard (1988) "Dignity vs. Politics: Strategy When Justice Fails." In Mohr, Gays/Justice: A Study of Ethics, Society and Law (New York: Columbia University Press), 315–27. OUP CORRECTED PROOF – FINAL, 2/11/2012, SPi 260 Cynthia A. Stark Moriarty, Jeffrey (2009) "Rawls, Self-Respect and the Opportunity for Meaningful Work," Social Theory and Practice 35, 441–59. Neilson, Kai (1979) "Radical Egalitarian Justice: Justice as Equality," Social Theory and Practice 5, 209–26. Postow, B. C. (1979) "Economic Dependence and Self-Respect," Philosophical Forum 10, 181–205. Rawls, John (1971) A Theory of Justice (Cambridge, MA: Harvard University Press). --(1993) Political Liberalism (New York: Columbia University Press). --(2001) Justice as Fairness: A Restatement, ed. Erin Kelly (Cambridge, MA: Harvard University Press). Sachs, David (1981) "How to Distinguish Self-Respect from Self-Esteem," Philosophy and Public Affairs 10, 346–60. Shue, Henry (1974/75) "Liberty and Self-Respect," Ethics 85, 195–203. --(1975) "Justice, Rationality and Desire: On the Logical Structure of Justice as Fairness," Southern Journal of Philosophy 13, 89–97. Taylor, Robert (2003) "Rawls' Defense of the Priority of Liberty: A Kantian Reconstruction," Philosophy and Public Affairs 31, 246–71. Thomas, Larry (1978a) "Morality and Our Self-Concept," Journal of Value Inquiry 12, 258–68. --(1978b) "Rawlsian Self-Respect and the Black Consciousness Movement," Philosophical Forum 9, 303–14. Yanal, Robert (1987) "Self-Esteem," Noûs 21, 363–79. OUP CORRECTED PROOF – FINAL, 2/11/2012, SPi Rawlsian Self-Respect
|
{
"pile_set_name": "PhilPapers"
}
|
The present invention relates to polymeric blends comprising crosslinking oligomer(s) and polymer(s) wherein the backbones of the oligomer(s) and polymer(s) are from different chemical families.
Recently, chemists have sought to synthesize oligomers for high performance advanced composites suitable for aerospace applications. These composites should exhibit solvent resistance; be tough, impact resistant, and strong; be easy to process; and be thermoplastic. Oligomers and composites that have thermo-oxidative stability and, accordingly, can be used at elevated temperatures are particularly desirable.
While epoxy-based composites are suitable for many applications, their brittle nature and susceptibility to thermal and hydrolytic degradation make them inadequate for many aerospace applications, especially those applications which require thermally stable, tough composites or service in harsh conditions. Accordingly, research has recently focused on polyimide composites to achieve an acceptable balance between thermal or hydrolytic stability, solvent resistance, and toughness. Still the maximum temperatures for use of the polyimide composites, such as PMR-15, are about 600-625xc2x0 F., since they have glass transition temperatures of about 690xc2x0 F. PMR-15 also suffers from brittleness.
There has been a progression of polyimide sulfone compounds synthesized to provide unique properties or combinations of properties. For example, Kwiatkowski and Brode synthesized maleic-capped linear polyarylimides as disclosed in U.S. Pat. No. 3,839,287. Holub and Evans synthesized maleic- or nadic-capped, imido-substituted polyester compositions as disclosed in U.S. Pat. No. 3,729,446. We synthesized thermally stable polysulfone oligomers as disclosed in U.S. Pat. No. 4,476,184 or U.S. Pat. No. 4,536,559, and have continued to make advances with polyetherimidesulfones, polybenzoxazolesulfones, polybutadienesulfones, and xe2x80x9cstarxe2x80x9d or xe2x80x9cstar-burstxe2x80x9d multidimensional oligomers. We have shown surprisingly high glass transition temperatures yet reasonable processing and desirable physical properties in many of these oligomers and their composites.
Polybenzoxazoles, such as those disclosed in our U.S. Pat. No. 4,965,336 (to Lubowitz and Sheppard) and U.S. Pat. No. 4,868,270 (to Lubowitz, Sheppard, and Stephenson), may be used at temperatures up to about 750-775xc2x0 F., since these composites have glass transition temperatures of about 840xc2x0 F. Some aerospace applications need composites which have even higher use temperatures while maintaining toughness, solvent resistance, ease of processing, formability, strength, and impact resistance.
Multidimensional oligomers, such as disclosed in U.S. Pat. No. 5,210,213, are easier to process than some advanced composite oligomers since they can be handled at lower temperatures. Upon curing, however, the oligomers chemically crosslink through their end caps in addition polymerization so that the thermal resistance of the resulting composite is markedly increased with only a minor loss of stiffness, matrix stress transfer (impact resistance), toughness, elasticity, and other mechanical properties. Glass transition temperatures above 950xc2x0 F. are achievable.
Commercial polyesters, when combined with well-known diluents, such as styrene, do not exhibit satisfactory thermal and oxidative resistance to be useful for aircraft or aerospace applications. Polyarylesters (i.e., arylates) are often unsatisfactory, also, since the resins often are semi-crystalline which may makes them insoluble in laminating solvents, intractable in fusion, and subject to shrinking or warping during composite fabrication. Those polyarylesters that are soluble in conventional laminating solvents remain so in composite form, thereby limiting their usefulness in structural composites. The high concentration of ester groups contributes to resin strength and tenacity, but also makes the resin susceptible to the damaging effects of water absorption. High moisture absorption by commercial polyesters can lead to distortion of the composite when it is loaded at elevated temperature.
High performance, aerospace, polyester advanced composites, however, can be prepared using crosslinkable, end capped polyester imide ether sulfone oligomers that have an acceptable combination of solvent resistance, toughness, impact resistance, strength, ease of processing, formability, and thermal resistance. By including Schiff base (xe2x80x94CHxe2x95x90Nxe2x80x94), imidazole, thiazole, or oxazole linkages in the oligomer chain, the linear, advanced composites formed with polyester oligomers of our copending application U.S. Ser. No. 07/137,493, now U.S. Pat. No. 5,705,598, can have semiconductive or conductive properties when appropriately doped.
Conductive and semiconductive plastics have been extensively studied (see, e.g., U.S. Pat. Nos. 4,375,427; 4,338,222; 3,966,987; 4,344,869; and 4,344,870), but these polymers do not possess the blend of properties which are essential for aerospace applications. That is, the conductive polymers do not possess the blend of (1) toughness, (2) stiffness, (3) elasticity, (4) ease of processing, (5) impact resistance (and other matrix stress transfer capabilities), (6) retention of properties over a broad range of temperatures, and (7) high temperature resistance that is desirable on aerospace advanced composites. The prior art composites are often too brittle.
Thermally stable multidimensional oligomers having semiconductive or conductive properties when doped with suitable dopants are also known and are described in our copending applications (including U.S. Ser. No. 07/212,404, now U.S. Pat. No. 5,817,738, to Lubowitz, Sheppard, and Torre). The linear arms of the oligomers contain conductive linkages, such as Schiff base (xe2x80x94Nxe2x95x90CHxe2x80x94) linkages, between aromatic groups. Sulfone and ether linkages are interspersed in the arms. Each arm is terminated with a mono- or difunctional end cap (i.e. an end cap having one or two crosslinking functionalities) to allow controlled crosslinking upon heat-induced or chemically-induced curing. Other xe2x80x9csemiconductivexe2x80x9d oligomers are described in our other copending applications.
Polyamide oligomers and blends are described in our U.S. Pat. Nos. 4,935,523; 4,847,333; and 4,876,328, and polyetherimide oligomers and blends are described in our U.S. Pat. No. 4,851,495.
Polyamideimides are generally injection-moldable, amorphous, engineering thermoplastics which absorb water (swell) when subjected to humid environments or immersed in water. Polyamideimides are generally described in the following patents: U.S. Pat. Nos. 3,658,938; 4,628,079; 4,599,383; 4,574,144; or 3,988,344. The thermal integrity and solvent-resistance can be greatly enhanced by capping amideimide backbones with monomers that present one or two crosslinking functionalities at each end of the oligomer, as described in U.S. Pat. No. 5,104,967.
Blends of these oligomers are described in many of our earlier applications and comprising a mixture of an oligomer and a compatible polymer, generally of the same family, of substantially the same backbone. The polymer is formed by an analogous condensation generally substituting a noncrosslinking end-cap monomer (such as phenol, benzoic acid chloride, or aniline) for the crosslinking end cap used in the oligomers.
Interpenetrating or semi-interpenetrating networks are also known, such as those described by Egli et al. in xe2x80x9cSemi-Interpenetrating Networks of LARC-TPIxe2x80x9d available from NASA-Langley Research Center.
Mixed polymer blends, such as an amideimide/phenoxyphenylsulfone blend, are described in U.S. Pat. No. 3,658,939.
Blends present promise for tailoring the mechanical properties of composites while retaining ease of processing. The present invention comprises advanced composite blends that are mixed chemical blends of a linear or; multi-dimensional crosslinking oligomer(s) of one chemical family, such as a heterocycle, and corresponding linear or multidimensional polymer(s), unable to crosslink, from a different chemical family, such as ethersulfone. Generally the polymer has an average formula weight that is initially higher than that of the oligomer, but the formula weight of the oligomeric portion of the blend will increase appreciably during curing through addition (i.e. homo-) polymerization between the crosslinking functionalities. The ratio of oligomer(s) to polymer(s) can be varied to achieve the desired combination of physical properties. Usually the ratio is such that the addition polymer formed during curing constitutes no more than about 50 mol % of the composite.
Briefly, therefore, the present invention is directed to an advanced composite blend comprising a mixture of at least one crosslinkable oligomer and at least one compatible, noncrosslinking polymer from a different chemical family. The oligomer comprises two ends, each of which comprises two unsaturated, crosslinkable end-cap moieties. In addition, prior to curing, the oligomer has an average formula weight which is less than that of the polymer.
While two component blends are preferred, the blends can be more complex mixtures of oligomers or polymers with coreactants, if desired. The blends may even include coreactive oligomers as will be explained.
The linear oligomers generally have the formula:
Yixe2x80x94Axe2x80x94Yi
wherein
i=1 or 2;
A=an aromatic, aliphatic, or aromatic/aliphatic hydrocarbon backbone;
Y=an unsaturated hydrocarbon residue including a segment selected from the group consisting of:
R1=lower alkyl, aryl, substituted alkyl, substituted aryl (including hydroxyl or halo-substituents), lower alkoxy, aryloxy, halogen, or mixtures thereof (preferably lower alkyl);
G=xe2x80x94SO2xe2x80x94, xe2x80x94Sxe2x80x94, xe2x80x94Oxe2x80x94, xe2x80x94CH2xe2x80x94, xe2x80x94COxe2x80x94, xe2x80x94SOxe2x80x94, xe2x80x94CHRxe2x80x94, or xe2x80x94CR2xe2x80x94 (preferably xe2x80x94Oxe2x80x94 or xe2x80x94CH2xe2x80x94);
j=0, 1, or 2;
T=methallyl or allyl;
R=hydrogen, lower alkyl, or phenyl; and
Me=methyl.
The backbone (A) is preferably selected from imidesulfone; ethersulfone; amide; imide; ether; ester; estersulfone; etherimide; amideimide; oxazole, thiazole, imidazole (i.e. heterocycles); or heterocycle sulfone.
In coreactive oligomer blends, Y preferably is selected from the group consisting of:
wherein
G=xe2x80x94CH2xe2x80x94, xe2x80x94SO2xe2x80x94, xe2x80x94Sxe2x80x94, xe2x80x94Oxe2x80x94, or xe2x80x94COxe2x80x94, and
R=hydrogen, lower alkyl, or phenyl, and the blend includes a second (coreactive) oligomer of the general formula:
Zixe2x80x94Bxe2x80x94Zi
wherein
i=1 or 2;
B=a hydrocarbon backbone that is the same or different from A;
Z=a hydrocarbon residue including a segment selected from the group consisting of:
xe2x80x83-xcfx86-NH2, or -xcfx86-XH;
xcfx86=phenyl; and
X=xe2x80x94Oxe2x80x94 or xe2x80x94Sxe2x80x94
Generally, the hydrocarbons (A or B) in these coreactive oligomer blends are entirely aromatic with phenyl radicals between the linkages, although aliphatic radicals can be used.
The coreactive oligomer blends, which can be cured, to form block copolymers, comprise any ratio of the coreactive oligomers. Changing the ratio changes the physical properties in the final composites. Curing the coreactive oligomers involves mutual (interlinking) polymerization and addition polymerization. Therefore, generally equimolar mixtures are used in the blends.
The individual oligomers should initially have relatively low average formula weights and, accordingly, should remain relatively easy to process until the curing reaction when the extended chain and block copolymers are formed to produce the composite. A complex mixture of at least three types of addition polymer are formed upon curing.
In the present invention, the oligomers or the coreactive oligomer blends are further blended with a noncrosslinking polymer having a backbone from a different chemical family. The polymer can be from any one of the families described for the oligomers, but the oligomeric and polymeric backbones must be different to form what we elect to call an advanced composite (i.e. mixed chemical) blend. The resulting blend may yield IPN,or semi-IPN morphology in the consolidated resin (composite) state.
Preferably the polymer has an average formula weight initially greater than that of the oligomer, because the formula weight of the oligomer in the cured composite will increase through addition polymerization. The cured composite will have a blend of two, xe2x80x9clongxe2x80x9d molecules, and will not suffer from a broad distribution of formula weights that reduce the physical properties obtainable in some prior art blends, such as suggested by Kwiatkowski in U.S. Pat. No. 3,658,939.
Preferred oligomer/polymer combinations in the advanced composites blends of the present invention include:
amideimide/imide;
amideimide/heterocycle:;
amideimide/heterocycle sulfone;
imide/heterocycle;
imide/heterocycle sulfone;
imide/amide;
ester/amide; and
ester/imide.
Multidimensional oligomers have an aromatic hub and three or more chains or arms radiating from the hub. The chains include backbones similar to those for the linear oligomers and are capped with the crosslinking end cap monomers previously described. Corresponding polymers are quenched with noncrosslinking radicals, as will be described. These oligomers can also be used to form advanced composite blends.
Advanced composite (mixed chemical) blends of the present invention comprise a mixture of a crosslinking oligomer from one chemical family, generally selected from the group consisting of:
imidesulfone;
ether;
ethersulfone;
amide;
imide;
ester;
estersulfone;
etherimide;
amideimide;
oxazole;
oxazole sulfone;
thiazole;
thiazole sulfone;
imidazole; and
imidazole sulfone,
and a noncrosslinking polymer from a different chemical family. Coreactants may be included in the blends, or they may comprise mixtures of three or more oligomers/polymers, as will be explained. Because the oligomer""s average formula weight will appreciably increase upon curing, generally the average formula weight of the polymer in the uncured blend will be greater than that of the oligomer. For example, a linear oligomer may have an average formula weight of about 500-5000 while the corresponding polymer has an average formula weight of about 20,000-40,000. Upon curing, the oligomer and polymer will generally have average formula weights that are closer because of addition polymerization of the oligomer. Therefore, the problems sometimes encountered with blends having components of widely different average formula weight are not as pronounced in composites formed from the advanced composite blends of the present invention.
Advanced composite blends allow tailoring of the properties of high performance composites. They allow averaging of the properties of resins from different families to provide composites that do not have as severe shortcomings as the pure compounds. For example, the rigid nature of heterocycles (oxazole, thiazole, or imidazole) can be reduced by an advanced composite blend comprising a heterocycle oligomer and an ethersulfone polymer. The resulting composite will have a use temperature (thermo-oxidative stability) higher than pure ethersulfone and a flexibility greater than the pure heterocycle. Accordingly, the resulting composites have a blending or averaging of physical properties, which makes them candidates for particularly harsh conditions.
Particularly preferred oligomer/polymer combinations include:
amideimide/imide;
amideimide/imidesulfone;
amideimide/heterocycle:;
amideimide/heterocycle sulfone;
imide/heterocycle;
imidesulfone/heterocycle;
imide/heterocycle sulfone;
imide/amide;
imidesulfone/amide;
ester/amide;
estersulfone/amide;
ester/imide;
ester/imidesulfone;
estersulfone/imide; or
estersulfone/imidesulfone.
In each case the oligomer can be either component in the mixture.
Linear oligomers have the general formula:
Dixe2x80x94Axe2x80x94Di
wherein
i=1 or 2;
A=a hydrocarbon residue, preferably from one of the families previously described and having an aromatic, aliphatic, or aromatic and aliphatic backbone; and
D=an unsaturated hydrocarbon radical that is suitable for crosslinking.
The oligomeric component may itself be a coreactive oligomer blend rather than a single oligomeric component. That is, the oligomer may include two precursors that polymerize to form block copolymers upon curing through mutually reactive end caps on the respective precursors. The resulting composites include a mix of addition polymers created by crosslinking chain extension and block copolymers formed through a resin interlinking reaction. The coreactive oligomer blends generally include at least one oligomer of the general formula:
Dixe2x80x94Axe2x80x94Di
wherein D preferably is selected from the group consisting of:
G=xe2x80x94SO2xe2x80x94, xe2x80x94Sxe2x80x94, xe2x80x94Oxe2x80x94, xe2x80x94COxe2x80x94, or xe2x80x94CH2xe2x80x94; and
R=hydrogen, lower alkyl, or phenyl and another oligomer of the general formula:
Zixe2x80x94Bxe2x80x94Zi
wherein
i=1 or 2;
B=a hydrocarbon backbone that is in the same or from a different chemical family as A; and
Z=a hydrocarbon residue including an end cap radical selected from the group consisting of:
X=xe2x80x94Oxe2x80x94 or xe2x80x94Sxe2x80x94.
The backbones (A or B) in this circumstance, as with the pure component oligomers, are generally individually selected from the group consisting of:
imidesulfones;
ethersulfones;
amides;
ethers;
esters;
estersulfones;
imides;
etherimides;
amideimides;
oxazoles;
thiazoles;
imidazoles, or
heterocycle (i.e.oxazole, thiazole imidazole) sulfones;
and generally include only aromatic (typically phenyl) radicals between linkages, although they may have other aromatic, aliphatic, or aromatic and aliphatic radicals. Although this description will primarily describe para isomers of these backbones, other isomers (particularly meta) can be used. The aromatic radicals in the backbones may also include nonreactive substituents in some cases, such as aryl, lower alkyl, or lower alkoxy.
Oligomers of the general formula: Dixe2x80x94Axe2x80x94Di or Zixe2x80x94Bxe2x80x94Zi are prepared by reacting suitable end cap monomers with the monomer reactants (polymer precursors) that are commonly used to form the desired backbones. For example, an imide or an imidesulfone is prepared by reacting an end cap monomer with a diamine with a dianhydride in accordance with the method described in U.S. Pat. No. 4,584,364. Ethersulfones or ethers can be prepared on reacting an end cap monomer with a suitable dialcohol (i.e. diol, bisphenol, or dihydric phenol) with a dihalogen as described in U.S. Pat. No. 4,414,269 or other ether condensation reactions.
The crosslinking end cap monomers are readily prepared by the condensation of the corresponding anhydride and a suitable amine, as described in U.S. Pat. No. 4,604,437 with respect to the allyl-substituted or methallyl-substituted methylbicyclo[2.2.1]hept-5-ene-2,3-dicarboximides.
For the coreactive oligomers, the end cap monomers generally are selected from the group consisting of:
wherein
i=1 or 2;
G=xe2x80x94SO2xe2x80x94, xe2x80x94Sxe2x80x94, xe2x80x94Oxe2x80x94, xe2x80x94COxe2x80x94, xe2x80x94CH2xe2x80x94, xe2x80x94SOxe2x80x94, xe2x80x94CHRxe2x80x94, or xe2x80x94CR2xe2x80x94;
R=hydrogen, lower alkyl, or phenyl;
W=xe2x80x94OH, xe2x80x94NH2, or xe2x80x94COX; and;
X=halogen.
Similarly, the end cap monomers for the Zixe2x80x94Bxe2x80x94Zi oligomers generally are selected from the group consisting of aminophenol, aminobenzoic acid halide, H2N-xcfx86-SH,
or the like, wherein xcfx86=phenyl and W=xe2x80x94OH, xe2x80x94NH2, or xe2x80x94COX.
Upon curing, the oligomers in coreactive oligomer blends addition polymerize by crosslinking and form block copolymers through the Michaels addition reaction between the hydrocarbon unsaturation of one oligomer and the amine, hydroxyl, or sulfhydryl group of the other. The reaction of the hydrocarbon unsaturation of one oligomer with the
functionality of the other follows the mechanism described in U.S. Pat. No. 4,719,283 to form a cyclohexane linkage by bridging across the double bond. With the acetylene (triple) unsaturation, a cyclohexene linkage would result.
The Michaels addition reaction is illustrated as follows:
wherein V=xe2x80x94NHxe2x80x94, xe2x80x94Oxe2x80x94, or xe2x80x94Sxe2x80x94. For the other end caps, we believe a reverse Diels-Alder decomposition reaction (induced by heating the oligomers) results in the formation of a reactive maleic moiety and the off-gassing of a cyclopentadiene. The methylene bridge: decomposes to the maleic compound at about 625-670xc2x0 F. (330-355xc2x0 C.) while the xe2x80x94Oxe2x80x94 bridge decomposes at the lower temperature of about 450xc2x0 F. (230xc2x0 C.)
The reactive group might also be xe2x80x94CNO instead of the amine, but we do not recommend use of this compound.
Thus, the linear oligomers in the present invention have the general formula: Dixe2x80x94Axe2x80x94Di; wherein A and i are as previously defined and
R1=lower alkyl, aryl, substituted alkyl or substituted aryl (including hydroxyl or halo-substituents), lower alkoxy, aryloxy, halogen, or mixtures thereof (preferably lower alkyl);
G=xe2x80x94Oxe2x80x94, xe2x80x94Sxe2x80x94, xe2x80x94SO2xe2x80x94, xe2x80x94CH2xe2x80x94, xe2x80x94COxe2x80x94, xe2x80x94SOxe2x80x94, xe2x80x94CHRxe2x80x94, or xe2x80x94CR2xe2x80x94;
i=1 or 2;
j=0, 1, or 2;
T=methallyl or allyl;
Me=methyl; and
R=hydrogen, lower alkyl, or phenyl.
All reactions used in the preparation of the oligomers should be carried out in suitable solvents and under an inert atmosphere. To prepare imide or imidesulfones, then, of the general formula Dixe2x80x94Axe2x80x94Di or Zixe2x80x94Bxe2x80x94Zi, the respective amine end cap preferably is mixed with a diamine and a dianhydride. To prepare ethers or ethersulfones, the respective hydroxy (i.e., phenol) end cap is mixed with suitable dialcohols (i.e., diols) and dihalogens or dinitrohydrocarbons. To prepare amides, the respective amide or acid halide end cap is mixed with suitable dicarboxylic acid halides and diamines. To prepare esters or estersulfones, the respective hydroxy or acid halide end cap is mixed with suitable dialcohols and dicarboxylic acid halides.
To prepare etherimides, the respective amine end caps are reacted with:
wherein Y=nitro- or halo-(i.e. nitrophthalic anhydride or halophthalic anhydride) to form an imide while leaving an active nitro- or halo-functionality. This intermediate is then mixed with suitable nitro/anhydrides and compounds of the formula: H2Nxe2x80x94Rxe2x80x94XH, as suggested in our U.S. Pat. Nos. 3,847,869, 4,107,147 or 4,851,495.
To prepare amideimides, the method of U.S. Ser. No. 07/092,740, now abandoned, is used, which comprises condensing simultaneously an amine or acid halide end cap with suitable dicarboxylic acid halides (i.e. dibasic acid halides) and diamines, wherein either or both of the diamines or diacid halides include intermediate imide linkages. Alternatively, the amideimides can be prepared by condensing the respective amine end cap with suitable dianhydrides and diamines, wherein either or both of the dianhydrides or diamines include amide linkages.
Heterocycle or heterocycle sulfone oligomers (i.e. oxazole, thiazoles, or imidazoles) are prepared by condensing acid halide end caps with four-functional compounds, like diaminodihydroxybenzene, and dicarboxylic acid halides (or the acids).
The synthesis of these oligomers and the representative classes of reactants will now be presented in greater detail to illustrate the scope of the invention and to describe the nature of the preferred reactants.
Amideimides are characterized by backbones of two general types, namely:
wherein
R3=an aromatic, aliphatic, or alicyclic radical, and preferably a phenoxyphenyl sulfone; and
R2=a trivalent organic radical, and preferably phenyl.
Accordingly, linear polyamideimides include oligomers of the general formula:
wherein
Y=an end cap residue of either type;
R2=a trivalent organic radical, and preferably phenyl;
R3=an aromatic, aliphatic, or alicyclic radical, and preferably a phenoxyphenyl sulfone.
R4=a divalent organic radical;
m=a small integer, usually from 0-5, but generally sufficiently large to impart thermoplastic properties in the oligomer;
xcfx86=phenyl; and
i=1 or 2.
The amideimides are generally made by condensing suitable end cap monomers, diacid halides, diamines, and dianhydrides. The dianhydrides can be prepared by condensing 2 moles of an acid halide anhydride of the formula:
with a diamine of the formula: H2Nxe2x80x94R3xe2x80x94NH2. The diamine, in this case, can be selected from the group consisting of:
q=xe2x80x94SO2xe2x80x94, xe2x80x94COxe2x80x94, xe2x80x94Sxe2x80x94, or xe2x80x94(CF3)2Cxe2x80x94;
Me=methyl;
m=a small integer; and
D=xe2x80x94COxe2x80x94, xe2x80x94SO2xe2x80x94, xe2x80x94(CF3)2Cxe2x80x94 or mixtures thereof.
Other diamines that may be used, but that are not preferred, include those described in U.S. Pat. Nos. 4,504,632; 4,058,505; 4,576,857; 4,251,417; and 4,215,418. The aryl or polyaryl xe2x80x9csulfonexe2x80x9d diamines previously described are preferred, since these diamines are soluble in conventional synthetic solvents and provide high thermal stability to the resulting oligomers and composites.
Diamines may include xe2x80x9cSchiff basexe2x80x9d conductive linkages (particularly xe2x80x94Nxe2x95x90CHxe2x80x94), analogous to diacid halides which will be described.
Particularly preferred ethersulfone (i.e. phenoxyphenyl sulfone) diamines are those in which R1 is
so that the phenoxyphenyl sulfone diamines include:
The molecular weights of these diamines varies from about 500 to about 2000. Using lower molecular weight diamines seems to enhance the mechanical properties of the difunctional polyamideimide oligomers, each of which has alternating ether xe2x80x9csulfonexe2x80x9d segments in the backbone.
Phenoxyphenyl sulfone diamines of this general nature can be prepared by reacting two moles of aminophenol with (n+1) moles of an aryl radical having terminal, reactive halo-functional groups (dihalogens), such as 4,4xe2x80x2-dichlorodiphenylsulfone, and a suitable bisphenol (i.e., dialcohol, dihydric phenol, or diol). The bisphenol is preferably selected from the group consisting of:
2,2-bis-(4-hydroxyphenyl)-propane (i.e., bisphenol-A);
bis-(2-hydroxyphenyl)-methane;
bis-(4-hydroxyphenyl)-methane;
1,1-bis-(4-hydroxyphenyl)-ethane;
1,2-bis-(4-hydroxyphenyl)-ethane;
1,1-bis-(3-chloro-4-hydroxyphenyl)-ethane;
1,1-bis-(3,5-dimethyl-4-hydroxyphenyl)-ethane;
2,2-bis-(3-phenyl-4-hydroxyphenyl)-propane;
2,2-bis-(4-hydroxynaphthyl)-propane
2,2-bis-(4-hydroxyphenyl)-pentane;
2,2-bis-(4-hydroxyphenyl)-hexane;
bis-(4-hydroxyphenyl)-phenylmethane;
bis-(4-hydroxyphenyl)-cyclohexylmethane;
1,2-bis-(4-hydroxyphenyl)-1,2-bis-(phenyl)-ethane;
2,2-bis-(4-hydroxyphenyl)-1-phenylpropane;
bis-(3-nitro-4-hydrophenyl)-methane;
bis-(4-hydroxy-2,6-dimethyl-3-methoxyphenyl)-methane;
2,2-bis-(3,5-dichloro-4-hydroxyphenyl)-propane;
2,2-bis-(3-bromo-4-hydroxyphenyl)-propane;
or mixtures thereof, as disclosed in U.S. Pat. No. 3,262,914. Bisphenols having aromatic character (i.e., absence of aliphatic segments), such as bisphenol-A, are preferred.
The dihalogens in this circumstance preferably are selected from the group consisting of:
wherein
X=halogen, preferably chlorine; and
q=xe2x80x94Sxe2x80x94, xe2x80x94SO2xe2x80x94, xe2x80x94COxe2x80x94, xe2x80x94(CH)2Cxe2x80x94, and xe2x80x94(CF3)2Cxe2x80x94, and preferably either xe2x80x94SO2xe2x80x94 or xe2x80x94COxe2x80x94.
The condensation reaction creates ether diamines that ordinarily include intermediate xe2x80x9csulfonexe2x80x9d linkages. The condensation generally occurs through a phenate mechanism in the presence of K2CO3 or another base in a DMSO/toluene solvent. The grain size of the K2CO3(s) should fall within the 100-250 ANSI mesh range.
Additional methods for preparing phenoxyphenysulfones of this general type are disclosed in U.S. Pat. Nos. 3,839,287 and 3,988,374.
The diacid halide or dicarboxylic acid (i.e. dibasic acid) may include an aromatic chain segment selected from the group consisting of:
(a) phenyl; (b) naphthyl; (c) biphenyl;
(d) a polyaryl xe2x80x9csulfonexe2x80x9d divalent radical of the general formula:
wherein D=xe2x80x94Sxe2x80x94, xe2x80x94Oxe2x80x94, xe2x80x94COxe2x80x94, xe2x80x94SO2xe2x80x94, xe2x80x94(CH3)2Cxe2x80x94, xe2x80x94(CF,)2Cxe2x80x94, or mixtures thereof throughout the chain; or
(e) a divalent radical having conductive linkages, illustrated by Schiff base compounds selected from the group consisting of:
wherein R is selected from the group consisting of:
phenyl; biphenyl; naphthyl; or
a divalent radical of the general formula:
wherein W=xe2x80x94SOxe2x80x94 or xe2x80x94CH2xe2x80x94; and q=0-4; or
(f) a divalent radical of the general formula:
wherein R1=a C2 to C12 divalent aliphatic alicyclic, or aromatic radical, and, preferably, phenyl (as described in U.S. Pat. No. 4,556,697).
Thiazole, oxazole, or imidazole linkages, especially between aryl groups, may also be used as the conductive linkages to form the conductive or semiconductive oligomers.
The preferred diacid halides include:
Schiff base dicarboxylic acids and diacid halides can be prepared by the condensation of aldehydes and aminobenzoic acid (or other amine acids) in the general reaction scheme:
or similar syntheses.
Other diacid halides that can be used, but that are not preferred, are disclosed in U.S. Pat. No. 4,504,632, and include:
adipylchloride,
malonyl chloride,
succinyl chloride,
glutaryl chloride,
pimelic acid dichloride,
suberic acid dichloride,
azelaic acid dichloride,
sebacic acid dichloride,
dodecandioic acid dichloride,
phthaloyl chloride,
isophthaloyl chloride,
terephthaloyl chloride,
1,4-naphthalene dicarboxylic ;acid dichloride, and
4,4xe2x80x2-diphenylether dicarboxylic acid dichloride.
Polyaryl or aryl diacid halides are preferred to achieve the highest thermal stabilities in the resulting oligomers and composites insofar as aliphatic bonds are not as thermally stable as aromatic bonds. Particularly preferred compounds include intermediate electronegative (i.e., xe2x80x9csulfonexe2x80x9d) linkages (such as xe2x80x94SO2xe2x80x94, xe2x80x94Sxe2x80x94, xe2x80x94COxe2x80x94, and xe2x80x94(CF3)2Cxe2x80x94) to improve toughness of the resulting oligomers.
The corresponding amideimide of the formula:
can be prepared if the acid anhydride:
is used instead of the acid halide anhydride. The resulting intermediate products are dicarboxylic acids rather than dianhydrides. These dicarboxylic acids (or their diacid halides) can be used with the diamines previously described.
Dianhydrides useful for the synthesis of amideimides also include:
(a) pyromellitic dianhydride,
(b) benzophenonetetracarboxylic dianhydride (BTDA), and
(c) 5-(2,5-diketotetrahydrofuryl)-3-methyl-cyclohexene-1,2-dicarboxylic anhydride (MCTC),
and may be any aromatic or aliphatic dianhydride, such as those disclosed in U.S. Pat. Nos. 3,933,862; 4,504,632; 4,577,034; 4,197,397; 4,251,417; 4,251,418; or U.S. Pat. No. 4,251,420. Mixtures of dianhydrides might be used. Lower molecular weight dianhydrides are preferred, and MCTC or other aliphatic dianhydrides are the most preferred for the lower curing polyamideimides having caps with two crosslinking functionalities.
Of course, the dianhydrides also include those intermediates resulting from the condensation of the acid halide anhydride with any of the diamines previously described. Similarly, the dicarboxylic acids and diacid halides include those intermediates prepared by the condensation of the acid anhydride with any of the diamines previously described. The corresponding dicarboxylic acid is converted to the diacid halide (i.e. chloride) in the presence of SOCl2 (i.e. thionyl chloride)
The amideimides of the present invention can be synthesized by several schemes, as previously described. To obtain repeating units of the general formula:
an acid halide anhydride particularly
can be mixed with a diamine and with an amine end cap in the ratio of n:n:2 wherein n an integer greater than or equal to 1. In this reaction, the acid halide anhydride will react with the diamine to form an intermediate dianhydride which will condense with the diamine and amine end cap. The reaction may be carried out in two distinct stages under which the dianhydride is first prepared by mixing substantially stoichiometric amounts (or excess diamine) of the acid halide anhydride and diamine followed by the addition of a mixture of more diamine and the end cap. Of course, the diamine used to form the dianhydride may differ from that used in the second stage of the reaction, or it may be a mixture of diamines from the outset.
The related amideimide having repeating units of the general formula:
can be synthesized by reacting the acid anhydride with the diamine to form intermediate dicarboxylic acids, which can then react with more diamine or an amine end cap to complete the oligomer. Again, the reaction can be separated into steps.
The amideimide oligomers (as with all oligomers) appear to possess greater solvent resistance if the condensation of the dianhydride/dicarboxylic acid with the diamine and end cap is done simultaneously rather than sequentially.
While use of an amine end cap has been described above, corresponding oligomers can be formed by using an acid halide end cap, if the diamine is provided in excess. In this case the reaction mixture generally comprises the acid halide anhydride or the acid anhydride, the end cap, and the diamine and the synthesis is completed generally in one step.
All reactions should be conducted under an inert atmosphere and at elevated temperatures, if the reaction rate needs to be increased. The reaction mixture should be well stirred throughout the synthesis. Chilling the reaction mixture can slow the reaction rate and can assist in controlling the oligomeric product.
As suggested in U.S. Pat. No. 4,599,383, the diamine may be in the form of its derivative OCNxe2x80x94Rxe2x80x94NCO, if desired.
The amideimides described in U.S. Pat. Nos. 4,599,383; 3,988,374; 4,628,079; 3,658,938; and 4,574,144 can all be capped with the crosslinking monomers to convert the polymers to oligomers that are suitable for forming advanced composite blends.
Polyetherimides and polysulfoneimides are capped to form oligomers that are suitable for use in the coreactive oligomer blends. Preferred compounds have the general formula:
wherein
X=xe2x80x94Oxe2x80x94 or xe2x80x94Sxe2x80x94;
n=1 or 2;
Z1=D or Z, as previously defined;
R=a trivalent C(6-13) aromatic organic radical; and
Rxe2x80x2=a divalent C(6-30) aromatic organic radical.
The polyetherimide oligomers can be prepared by several reaction schemes. One such method comprises the simultaneous condensation of:
in the ratio of I:II:III:IV=1:1:m:m+1, wherein m is an integer greater than or equal to one, and Y1=halo- or nitro-. The product has the general formula previously described. The reaction occurs in a suitable solvent under an inert atmosphere. If necessary, the reaction mixture can be heated to facilitate the reaction. The reaction conditions are generally comparable to those described in U.S. Pat. Nos. 3,847,869 and 4,107,147.
Alternatively, the polyetherimides can be prepared by reacting a polyetherimide polymer made by the self-condensation of a phthalimide salt of the formula:
with crosslinking end cap moieties of the formulae:
wherein
X=xe2x80x94Oxe2x80x94 or xe2x80x94Sxe2x80x94;
A1=
nxe2x88x921 or 2;
Z1=D or Z, as previously described;
Y1=halo- or nitro-;
Rxe2x80x2=a divalent C(6-30) aromatic organic radical, and
M=an alkali metal ion or ammonium salt or hydrogen.
The self-condensation proceeds as described in U.S. Pat. No. 4,297,474 in a dipolar aprotic solvent. The end cap moieties can be introduced during the self-condensation to quench the polymerization, or they might be added following completion of the polymerization and recovery of the polyetherimide polymer from methanol. Improved solvent resistance in the cured composites is best achieved, however, by the quenching sequence rather than by the capping sequence which follows polymerization.
Yet another preferred method for synthesizing the polyetherimides of the present invention involves the simultaneous condensation of about 2m+2 moles of nitrophthalic anhydride with about m+1 moles of diamine, about m moles of dialcohol (i.e., bisphenol, diol, or dihydric phenol), and 2 moles of A1xe2x80x94OH in a suitable solvent under an inert atmosphere. Here, the dialcohol may actually be in the form of a phenate.
In this reaction, the diamines (which preferably have aromatic ethersulfone backbones) react with the anhydride to form intermediates of thereof following nature in the backbone:
wherein R2=a residue of the diamine. Similarly, the dialcohol reacts with the nitro-functionality to form an ether linkage of the general formula:
wherein R3=a residue of the dialcohol.
The A1xe2x80x94OH end caps quench the polymerization. The resulting polyetherimides have the general formula:
Another preferred synthesis comprises the simultaneous condensation of about 2m+2 moles of nitrophthalic anhydride with about m+1 moles of dialcohol, m moles of diamine, and 2 moles A1xe2x80x94NH2 in a suitable solvent under an inert atmosphere. Again, the dialcohol may be in the phenate form. The resulting oligomer has a general formula:
Yet another preferred synthesis comprises the simultaneous condensation of 2m moles of nitrophthalic anhydride with about m+1 moles of dialcohol, m moles of diamine, and 2 moles of A1xe2x80x94NO2 (a nitro terminated end cap) in a suitable solvent under an inert atmosphere. Again, the dialcohol may be in the phenate form or a corresponding sulfhydryl (thio) can be used to form a thioether. The resulting oligomer has the general formula:
In any of the syntheses, the dialcohol can be replaced by a comparable disulfhydryl of the formula: HSxe2x80x94R2xe2x80x94SH. Mixtures of dialcohols, or disulfhydryls, or dialcohols and disulfhydryls can be used.
Although the bisphenols previously described can be used, for etherimides, the dialcohol is generally a polyaryl compound and preferably is selected from the group consisting of:
HOxe2x80x94Arxe2x80x94OH;
HOxe2x80x94Arxe2x80x94Lxe2x80x94Arxe2x80x2xe2x80x94Lxe2x80x94Arxe2x80x94OH;
HOxe2x80x94Arxe2x80x2xe2x80x94Lxe2x80x94Arxe2x80x94Lxe2x80x94Arxe2x80x2xe2x80x94OH;
xe2x80x83wherein
L=xe2x80x94CH2xe2x80x94, xe2x80x94(CH3)2Cxe2x80x94, xe2x80x94(CF3)2Cxe2x80x94, xe2x80x94Oxe2x80x94, xe2x80x94Sxe2x80x94, xe2x80x94SO2xe2x80x94 or xe2x80x94COxe2x80x94;
Arxe2x80x2=
T and T1=lower alkyl, lower alkoxy, aryl, aryloxy, substituted alkyl, substituted aryl, halogen, or mixtures thereof;
q=0-4;
k=0-3; and
j=0, 1, or 2.
The dialcohols also include hydroquinone; bisphenol-A; p,pxe2x80x2-biphenol; 4,4xe2x80x2-dihydroxydiphenylsulfide; 4,4xe2x80x2-dihydroxy-diphenylether; 4,4xe2x80x2-dihydroxydiphenylisopropane; 4,4xe2x80x2-dihydroxydiphenylhexafluoropropane; a dialcohol having a Schiff base segment, the radical being selected from the group consisting of:
wherein R is selected from the group consisting of:
phenyl;
biphenyl;
naphthyl; or
a radical of the general formula:
xe2x80x83wherein
W=xe2x80x94CH2xe2x80x94 or xe2x80x94SO2xe2x80x94; or
a dialcohol selected from the group:
xe2x80x83wherein
L is as previously defined;
Me=methyl;
m=an integer, generally less than 5, and preferably 0 or 1; and
D=any of xe2x80x94COxe2x80x94, xe2x80x94SO2xe2x80x94, or xe2x80x94(CF3)2Cxe2x80x94.
While bisphenol-A is preferred in the etherimide synthesis (because of cost and availability), the other dialcohols can be used to add rigidity to the oligomer without significantly increasing the average formula weight, and, therefore, can increase the solvent resistance. Random or a block copolymers are possible.
Furthermore, the dialcohols may also be selected from the those described in U.S. Pat. Nos. 4,584,364; 3,262,914; or U.S. Pat. NO. 4,611,048. The hydroxy-terminated etherimides of U.S. Pat. No. 4,611,048 can be reacted with A1xe2x80x94NO2 to provide crosslinking etherimides of the present invention.
Dialcohols of this nature are commercially available. Some may be easily synthesized by reacting halide intermediates with bis-phenates, such as by the reaction of 4,4xe2x80x2-dichlorodiphenylsulfone with bis(disodium biphenolate).
The oligomers can be synthesized in a homogeneous reaction scheme wherein all the reactants are mixed at one time (and this scheme is preferred), or in a stepwise reaction. The diamine and dialcohols can be mixed, for example, followed by addition of the nitrophthalic anhydride to initiate the polymerization and thereafter the end caps to quench it. Those skilled in the art will recognize the different methods that might be used. To the extent possible, undesirable competitive reactions should be minimized by controlling the reaction steps (i.e., addition of reactants) and the reaction conditions.
Suitable diamines include those diamines described with reference to the amideimide synthesis.
Anhydrides of the formula:
wherein
X=xe2x80x94Oxe2x80x94 or xe2x80x94Sxe2x80x94;
R=a trivalent C(6-13) aromatic organic radical;
A1=
n=1 or 2; and
Z1=D or Z, as previously defined,
are useful in the synthesis of the etherimides of the present invention, and are prepared by the condensation of the corresponding end cap phenol or thiol (xe2x80x94XH) with a nitro- or halo-anhydride that contains the R moiety.
In at least one synthesis of the etherimides, a compound of the formula:
is an intermediate or reactant, wherein:
R=a trivalent C(6-13) aromatic organic radical
A1=
Y1=halo or nitro;
n=1 or 2; and
Z1=D, Y, or Z.
This intermediate if formed by reacting Axe2x80x94NH2 with a substituted phthalic anhydride of the formula:
These substituted anhydrides are described in U.S. Pat. Nos. 4,297,474 and 3,847,869.
Polysulfoneimide oligomers corresponding to the etherimides can be prepared by reacting about m+1 moles of a dianhydride with about m moles of a diamine and about 2 moles of an amine end cap (A1xe2x80x94NH2). The resulting oligomer has the general formula:
wherein R and Rxe2x80x2 are divalent aromatic organic radicals having from 2-20 carbon atoms. R and Rxe2x80x2 may include halogenated aromatic C(6-20) hydrocarbon derivatives; alkylene radicals and cycloalkylene radicals having from 2-20 carbon atoms; C(2-8) alkylene terminated polydiorganosiloxanes; and radicals of the formula:
wherein
q=xe2x80x94CyH2yxe2x80x94, xe2x80x94COxe2x80x94, xe2x80x94SO2xe2x80x94, xe2x80x94Oxe2x80x94, or xe2x80x94Sxe2x80x94; and
y=1 to 5.
Comparable polymers, usable in blends of the sulfoneimides, are described in U.S. Pat. No. 4,107,147, which is incorporated by reference. Other aromatic dithiodianhydrides are described in U.S. Pat. No. 3,933,862.
Heterocycle or heterocycle sulfone oligomers can be prepared by the condensation of:
(a) 2 moles of an amine, phenol, or sulfhydryl end-cap monomer;
(b) n moles of a four-functional compound, and
(c) (n+1) moles of a suitable dicarboxylic acid halide,
or by the condensation of:
(a) 2 moles of an acid halide end-cap monomer;
(b) (n+1) moles of a four-functional compound; and
(c) n moles of a dicarboxylic acid halide.
Suitable diacid halides include those compounds described with the reference to the amideimide syntheses.
The four-functional compound has the general formula:
wherein R is an hydrocarbon radical (preferably, an aromatic radical, if the highest thermal stability is sought); Y=xe2x80x94OH, xe2x80x94NH2, or xe2x80x94SH; and the amine functionalities (xe2x80x94NH2) are not substituted on the same carbon atom as the Y substituents. The four-functional compound generally is selected from the group consisting of: dihydroxybenzidine, dimercaptobenzidine, dihydroxydiaminobenzene, dimercaptodiaminobenzene, diaminobenzidine, or a compound having the general formula:
wherein
M=xe2x80x94COxe2x80x94, xe2x80x94SO2, xe2x80x94(CF3)2Cxe2x80x94, xe2x80x94Sxe2x80x94, or xe2x80x94Oxe2x80x94; and
Y=xe2x80x94OH, xe2x80x94SH, or xe2x80x94NH2.
Isomers of the four-functional compound may also be used so long as the isomers include two pairs of an amine and a xe2x80x9cYxe2x80x9d functionality on adjacent carbons on an aromatic radical. The resulting oligomers include oxazole, thiazole, or imidazole linkages.
Capped polyimides are prepared by reacting diamines and dianhydrides, often having one crosslinking functionality on each end and ethersulfone segments alternating with segments formed from unsaturated, aliphatic dianhydrides, like MCTC, as described in U.S. Ser. No. 07/046,376, now abandoned. These polyimides having one crosslinking site are prepared by reacting:
(1) 2 moles of a monoanhydride end cap;
(2) n+1 moles of the diamine; and,
(3) n moles of the dianhydride;
wherein n is a small integer.
The monoanhydride end caps in this case have the general formula:
wherein P=
wherein R1, i, j, G, R, Me, and T are as previously defined.
Corresponding polyimide oligomers can be prepared using 2 moles of an amine end cap with n moles of diamine and (n+1) moles of dianhydride. These polyimides can have one or two crosslinking sites at each end of the molecules. Of course, aminophenol or its thio counterpart can be used to provide a monofunctional, capped oligomer that includes an active xe2x80x94OH or xe2x80x94SH functionality.
Preferred diamines for the polyimide condensation include ethersulfone diamines of the general formula:
wherein R and Rxe2x80x2 are aromatic radicals, at least one of R and Rxe2x80x2 being a diaryl radical wherein the aryl rings are joined by a xe2x80x9csulfonexe2x80x9d (i.e. electronegative) linkage, and q is an integer from 0 to 27 inclusive. Preferably R is selected from the group consisting of:
wherein L=xe2x80x94SO2xe2x80x94, xe2x80x94(CF3)2Cxe2x80x94, or xe2x80x94Sxe2x80x94. Rxe2x80x2 is preferably selected from the group consisting of:
wherein M=xe2x80x94SO2xe2x80x94, xe2x80x94Sxe2x80x94, xe2x80x94Oxe2x80x94, xe2x80x94(CH3)2Cxe2x80x94, or xe2x80x94(CF3)2Cxe2x80x94.
Preferred diamines are those in which R is
and Rxe2x80x2 is
Accordingly, the diamines generally contain at least one phenoxyphenylsulfone group, such as:
These diamines have alternating ether and xe2x80x9csulfonexe2x80x9d linkages, wherein xe2x80x9csulfonexe2x80x9d designates an electronegative linkage (xe2x80x94Mxe2x80x94) as previously defined.
In the monofunctional, thermoplastic, crosslinkable, polyimide oligomers, the dianhydride preferably is 5-(2,5-diketotetrahydrofuryl)-3-methyl-3-cyclohexene-1,2-dicarboxylic anhydride (MCTC), an unsaturated, aliphatic dianhydride.
The diamines and dianhydrides react to form repeating imide linkages along the generally linear backbone of the oligomers. Preferred properties in the oligomer are obtained when the backbone is periodically disrupted by the inclusion of an aliphatic moiety, especially an MCTC residue.
Diamines which include phenoxyphenylsulfone moieties are preferred, since these diamines provide the blend of physical properties in the oligomers which are desired. Impact resistance and toughness is afforded with the electronegative xe2x80x9csulfonexe2x80x9d linkages which act as joints or swivels between the aryl groups. The aliphatic residues, such as those from MCTC, provide lower melt temperatures, and allow the use of lower temperature end caps, such as oxynadic and dimethyl oxynadic (DONA) end caps. The resulting oligomers cure at lower temperatures than other solvent-resistant oligomers, have the desirable features of polyimides, and have better solvent-resistance than conventional polyimides, such as those described in U.S. Pat. Nos. 3,998,786 or U.S. Pat. No. 3,897,395 (D""Alelio).
These polyimide oligomers may be used to form prepregs by the conventional method of impregnating a suitable fabric with a mixture of the oligomer and a solvent. Suitable coreactants, such as p-phenylenediamine, benzidine, and 4,4xe2x80x2-methylenedianiline, may be added to the solvent when preparing prepregs.
The difunctional crosslinking polyimides constitute a broader class of oligomers than the corresponding class of monofunctional polyimides. That is, the diamines and dianhydrides for this difunctional class can be drawn from a broader list, and can include, typically, any aromatic or aliphatic diamine or dianhydride. Lower molecular weight aromatic diamines and dianhydrides are preferred.
To prepare the difunctional crosslinking polyimides the suitable diamines include all those previously described with respect to the amideimide condensation and those with respect to the monofunctional imide condensation. The dianhydridesihclude any or a mixture of the dianhydrides previously described.
The most preferred linear polyimides are prepared with dianhydrides selected from para- and meta-dianhydrides of the general formula:
wherein M=xe2x80x94SO2xe2x80x94 or xe2x80x94COxe2x80x94,
reacted with
or
Thermal stabilities in excess of 800xc2x0 F. are believed to be achievable with these oligomers.
Solvent resistant, thermoplastic aromatic poly(imidesulfone) oligomers are also described in U.S. Pat. Nos. 4,398,021 and 4,489,027. Melt-fusible polyimides made by the condensation of dianhydrides and diamines are described in U.S. Pat. No. 4,485,140.
Polyamides are prepared by condensing dicarboxylic acid halides with diamines and acid halide or amine end caps. There polyamides are generally formed from the diacid halides and diamines that have previously been described.
Polyesters or polyestersulfones are prepared by condensing the diacid halides and dialcohols (i.e., bisphenols, dihydric phenols, or diols) previously described. Polyethers or ethersulfones are prepared by condensing dinitro compounds or dihalogens and dialcohols or by other conventional syntheses wherein suitable end-cap monomers are added to quench the synthesis and to provide one or more coreactive functionalities at each end of the oligomers.
The dihalogens is generally a compound selected from those described previously with respect to the synthesis of diamines. Dinitro compounds are generally prepared by reacting nitrophthalic anhydride with the diamines. Of course, dihalogens can be prepared in the same way by replacing the nitrophthalic anhydride with halophthalic anhydride. Nitroaniline, nitrobenzoic acid, or nitrophenol may also be condensed with dianhydrides, dicarboxylic acid halides, diamines, dialcohols, or dihalogeus to prepare other dinitro compounds that include amide, imide, ether, or ester linkages between the terminal phenyl radicals and the precursor backbones. The synthesis of the dinitro compounds or dihalogens can occur prior to mixing the other reactants with these compounds or the steps can be combined in suitable circumstances to directly react all the precursors into the oligomers. For example, a polyether oligomer can be prepared by simultaneously condensing a mixture of an end cap imidophenol (such as a compound described in U.S. Pat. No. 4,661,604), nitrophthalic anhydride, phenylene diamine, and HO-xcfx86-O-xcfx86-O-xcfx86-O-xcfx86-OH, wherein xcfx86=phenyl.
While other common resin backbones may be capped in a corresponding manner and used in advanced composite blends of the present invention, the linear backbones described above are the most directly suited for aerospace applications.
Although the concept of advanced composite blends is probably best suited to linear morphology, the advanced composite blends of the present invention also include multidimensional oligomers and polymers. Linear morphology is preferred because the resulting composites have mixtures of polymers of relatively large and roughly equivalent average formula weight. The individual polymers are similar in structure. We have found it difficult in many circumstances to process multidimensional oligomers that have appreciable average formula weights, so the properties of composites made from multidimensional advanced composite blends might suffer because of diversity of formula weights. Furthermore, the addition polymerization reaction for multidimensional oligomers results in formation of a complex, 3-dimensional network of crosslinked oligomers that is difficult or impossible to match with the multidimensional polymers, because these polymers simply have extended chains or short chains. That is, upon curing, the multidimensional oligomers crosslink to chemically interconnect the arms or chains through the end caps, thereby forming a network of interconnected hubs with intermediate connecting chains. The connecting chains have moderate formula weight, although the cured oligomer can have appreciable formula weight. In contrast, the polymer (which does not crosslink) simply has a hub with arms of moderate formula weight. While, for linear morphology, the disadvantages of blended composites that have a wide diversity of average formula weight polymers as constituents can be overcome by curing relatively low formula weight oligomers into relatively high average formula weight cured polymers that are roughly equivalent to the polymer constituents, the polymers in the multidimensional morphology are likely to have average formula weights lower than the oligomeric component. Therefore, we believe that the best results for the present invention may be achieved with systems having linear morphology.
Although we have yet to verify our theory experimentally, it may be possible and desirable to synthesize the polymeric component of the multidimensional advanced composite blend when curing the oligomer, and, in that way, forming relatively comparable oligomeric and polymeric networks. To achieve this effect; we would mix, for example, a multidimensional oligomer with comparable polymeric precursors, such as triamines and tricarboxylic acid halides. Upon curing, the precursors would condense to form amide linkages to form bridges between hubs in a manner comparable to the oligomeric connecting chains.
The potential problem of structural mismatch and the proposed solution for achieving comparable average formula weights in multidimensional advanced composite blends will probably be better understood after the oligomers and blends are described in greater detail.
A multidimensional oligomer includes an aromatic hub and three or more radiating chains or arms, each chain terminating with a crosslinking end cap segment. Each chain includes the resin linkages previously described. Each chain is substantially the same. For example, a multidimensional ether can be prepared by the simultaneous condensation of phloroglucinol with a dihalogen and an imidophenol end cap monomer.
In multidimensional oligomers the higher density of crosslinking functionalities in a multidimensional array provides increased thermo-oxidative stability to the cured composites. Usually the hub will have three radiating chains to form a xe2x80x9cYxe2x80x9d pattern. In some cases, four chains may be used. Including more chains leads to steric hindrance as the hub is too small to accommodate the radiating chains. A trisubstituted phenyl hub is highly preferred with the chains being symmetrically placed about the hub. Biphenyl, naphthyl, azaline (e.g., melamine), or other aromatic moieties may also be used as the hub radical.
Details of the several preferred multidimensional oligomers will now be described in a manner similar to that used for the linear oligomers.
Multidimensional polyamideimide oligomers include oligomers of the general formula:
wherein Y, R2, R3, R4, and m are as previously defined with respect to the linear amideimides, Ar=an organic radical of valency w; xcfx86=phenyl, and w=3 or 4. Preferably, Ar is an aromatic radical (generally phenyl) generally selected from phenyl, naphthyl, biphenyl, azalinyl (such as melamine), or triazine derivatives of the general formula:
wherein R5=a divalent hydrocarbon residue containing 1-12 carbon atoms, as described in U.S. Pat. No. 4,574,154.
The hub may also be a residue of an etheranhydride of the formula:
or an etheramine of the formula:
xe2x80x83Arxe2x80x94[xe2x80x94O-xcfx86-NH2]w
The best results are likely to occur when the arm length of the oligomers is as short as possible (to allow ease of processing) and the oligomer has six crosslinking sites (to allow the highest density of crosslinking). The most preferred hub includes the phenyl radical, since these compounds are relatively inexpensive, are more readily obtained, and provide oligomers with high thermal stability.
The chains of the oligomers include crosslinking end caps which improve the solvent-resistance of the cured composites. These end caps may be thermally or chemically activated during the curing step to provide a strongly crosslinked, complex, multi-dimensional array of interconnected oligomers. When the goal is an advanced composite having a glass transition temperature above 900xc2x0 F. (and preferably above 950xc2x0 F.) each end cap should have high thermal stability and a high thermal activation temperature. End caps with two crosslinking functionalities (difunctional end caps) are expected to yield the highest crosslinked arrays, which may be the most stable.
The oligomers may be formed by the attachment of arms to the hub followed by chain extension and chain termination. For example, trihydroxybenzene may be mixed with p-aminophenol and 4,4xe2x80x2-dibromodiphenylsulfone and reacted under an inert atmosphere at an elevated temperature to achieve an amino-terminated xe2x80x9cstarxe2x80x9d of the general formula:
that can be reacted with suitable diacid halides, diamines, and end caps to yield a polyamideimide oligomer.
The etheranhydride hub can be synthesized by reacting nitrophthalic anhydride or halophthalic anhydride with Ar(xe2x80x94OH)w in a suitable solvent under an inert atmosphere, as described generally in U.S. Pat. Nos. 3,933,862 and 4,851,495 (thio-analogs).
The oligomers of course, might be made by reacting nitrophthalic anhydride with an amine end cap followed by the condensation with the hydroxy hub or in similar reaction schemes that will be understood by those of ordinary skill.
The oligomers can be synthesized in a homogeneous reaction scheme wherein all the reactants are mixed at one time, or in a stepwise reaction scheme wherein the radiating chains are affixed to the hub and the product of the first reaction is subsequently reacted with the end cap groups. Of course, the hub may be reacted with end-capped arms that include one reactive, terminal functionality for linking the arm to the hub. Homogeneous reaction is preferred, resulting undoubtedly in a mixture of oligomers because of the complexity of the reactions. The products of the processes (even without distillation or isolation of individual species) are preferred oligomer mixtures which can be used without further separation to form the desired advanced composites.
Linear or multidimensional oligomers can be synthesized from a mixture of four or more reactants so that extended chains may be formed. Adding components, however, adds to the complexity of the reaction and of its control. Undesirable competitive reactions may result or complex mixtures of macromolecules having widely different properties may be formed, because the chain extenders and chain terminators are mixed, and compete with one another.
Multidimensional etherimides can be made by reacting the etheranhydride hub with compounds of the formulae II, III, and IV previously described.
Multidimensional amides are prepared by condensing a nitro, amine, or acid halide hub with suitable diamines, dicarboxylic acid halides, and amine or acid halide end cap monomers to form oligomers of the general formulae:
Arxe2x80x94[xe2x80x94CONHxe2x80x94Pxe2x80x94NHCOxe2x80x94Qxe2x80x94CONH-xcfx86-Di]w;
Arxe2x80x94[xe2x80x94NHCOxe2x80x94Qxe2x80x94CONHxe2x80x94Pxe2x80x94NHCO-xcfx86-Di]w;
Arxe2x80x94[xe2x80x94CONH-xcfx86-Di]w;
Arxe2x80x94[xe2x80x94NHCO-xcfx86-Di]w;
Arxe2x80x94[xe2x80x94CONHxe2x80x94Pxe2x80x94NHCO-xcfx86-Di]w;
or
Arxe2x80x94[xe2x80x94NHCOxe2x80x94Qxe2x80x94CONH-xcfx86-Di]w,
wherein Ar, w, -xcfx86-, i, and D are as previously defined, P=a residue of a diamine, and Q=a residue a dicarboxylic acid halide. If made using anhydride end cap monomers, such as one selected from:
the multidimensional oligomers include those of the formulae:
wherein E=a residue of the above identified anhydrides, and P and Q as previously described.
Multidimensional imides can be made using the amine, etheranhydride, or etheramine hubs with suitable diamines, dianhydrides, and amine or anhydride end caps, as will be understood by those of ordinary skill. Particularly preferred multidimensional imides include those prepared by condensing anhydride end caps directly with the amine hubs.
Multidimensional polyesters can be made using hydroxy or carboxylic acid hubs (particularly cyuranic acid) with suitable diols and diacid halides. Carboxylic acid hubs include those compounds described in U.S. Pat. No. 4,617,390 and compounds prepared by reacting polyols, such as phloroglucinol, with nitrobenzoic acid or nitrophthalic acid to form ether linkages and active, terminal carboxylic acid funtionalities. The nitrobenzoic acid products would have three active sites while the nitrophthalic acid products would have six; each having the respective formula:
xcfx86-[xe2x80x94O-xcfx86-COOH]3 or xcfx86-[xe2x80x94O-xcfx86-(COOH)2]3
wherein xcfx86=phenyl. Of course other nitro/acids can be used.
Hubs can also be formed by reacting the corresponding halo-hub (such a tribromobenzene) with aminophenol to form triamine compounds represented by the formula:
which can then be reacted with an acid anhydride to form a polycarboxylic acid of the formula:
wherein xcfx86=phenyl; the hub being characterized by an intermediate ether and imide linkage connecting aromatic groups. Thio-analogs are also contemplated, in accordance with U.S. Pat. No. 3,933,862.
The hub may also be a polyol such as those described in U.S. Pat. No. 4,709,008 to tris(hydroxy-phenyl)alkanes of the general formula:
wherein R=hydrogen or methyl and can be the same or different. The polyols are made by reacting, for example, 4-hydroxybenzaldehyde or 4-hydroxyacetophenone with an excess of phenol under acid conditions (as disclosed in U.S. Pat. Nos. 4,709,008; 3,579,542; and 4,394,469).
The polyols may also be reacted with nitrophthalic anhydride, nitroaniline, nitrophenol, or nitrobenzoic acids to form other compounds suitable as hubs as will be understood by those of ordinary skill.
Phenoxyphenyl sulfone arms radiating from a hub with a terminal amine, carboxylic acid, or hydroxyl group are also precursors for making multidimensional polyester oligomers of the present invention.
The best results are likely to occur when the hub is phloroglucinol or cyuranic acid. In either case a suitable end-cap monomer (phenol or acid halide) can be reacted with the hub to form xe2x80x9cshort-armed,xe2x80x9d multidimensional oligomers having three or six crosslinking sites. These compounds are the simplest multidimensional oligomers and are relatively inexpensive to synthesize.
Multidimensional amides, amide imides, heterocycles, and heterocycle sulfones can be prepared using these carboxylic acid hubs, as will be understood by those of ordinary skill in the art.
Multidimensional oligomers of the formula:
can also be synthesized with an Ullmann aromatic ether synthesis followed by a Friedel-Crafts reaction, as will be further explained.
Here, Q=
q=xe2x80x94SO2xe2x80x94, xe2x80x94COxe2x80x94, xe2x80x94Sxe2x80x94, or xe2x80x94(CF3)2Cxe2x80x94, and preferably xe2x80x94SO2xe2x80x94, or xe2x80x94COxe2x80x94; and
Y1=a crosslinking end cap as previously defined (i.e. Di-xcfx86-)
To form the Arxe2x80x94O-xcfx86-COxe2x80x94Y1]w oligomers, preferably a halosubstituted hub is reacted with phenol in DMAC with a base (NaOH) over a Cu Ullmann catalyst to produce an ether xe2x80x9cstarxe2x80x9d with active hydrogens para- to the ether linkages.
End caps terminated with acid halide functionalities can react with these active aryl groups in a Friedel-Crafts reaction to yield the desired product. For example, 1 mole of trichlorobenzene can be reacted with about 3 moles of phenol in the Ullmann ether reaction to yield an intermediate of the general formula: xcfx86-(xe2x80x94O-xcfx86)3, which can be reacted with about 3 moles of (Y1)xe2x80x94COCl to produce the final, crosslinkable, ether/carbonyl oligomer.
Similarly, to form the Arxe2x80x94[xe2x80x94O-xcfx86-COxe2x80x94Qxe2x80x94COxe2x80x94Y1]w oligomers, the hub is extended preferably by reacting a halo-substituted hub with phenol in the Ullmann ether synthesis to yield the ether intermediate of the Arxe2x80x94[xe2x80x94O-xcfx86-COxe2x80x94Y1]w compounds. This intermediate is mixed with the appropriate stoichiometric amounts of a diacid halide of the formula XOCxe2x80x94Qxe2x80x94COX and an end cap of the formula Di-xcfx86 in the Friedel-Crafts reaction to yield the desired, chain-extended ether/carbonyl star and star-burst oligomers.
The end caps crosslink at different temperatures (i.e. their unsaturation is activated at different curing temperatures), so the cap should be selected to provide cured composites of the desired thermal stability. That is, the backbone of the oligomer should be stable to at least the cure temperature of the caps. The multidimensional morphology allows the oligomers to be cured at a temperature far below the use temperature of the resulting composite, so completely aromatic backbones connected by heteroatoms are preferred to enhance the thermal stability.
Blends can improve impact resistance of pure oligomer composites without causing a significant loss of solvent resistance. The advanced composite (i.e. mixed chemical) blends of the present invention comprise mixtures of one or more crosslinkable oligomer and one or more polymer from a different chemical family. The polymers are incapable of crosslinking. The crosslinkable oligomer and the compatible polymer can be blended together by mixing mutually soluble solutions of each. While the blend is often equimolar in the oligomer and polymer, the ratio of the oligomer and polymer can be adjusted to achieve the desired physical properties. The properties of the composite formed from the advanced composite blend can be adjusted by altering the ratio of formula weights for the polymer and oligomer.
In synthesizing the polymers, quenching compounds can be employed, if desired, to regulate the polymerization of the comparable polymer, so that, especially for linear systems, the polymer has an average formula weight initially substantially greater than the crosslinkable oligomer. For thermal stability, an aromatic quenching compound, such as aniline, phenol, or benzoic acid chloride is preferred. The noncrosslinking polymer can be made by the same synthetic method as the oligomer with the substitution of a quenching cap for the crosslinking end cap.
While the best advanced composite blends are probably those of modest formula weight and those in which the oligomer and polymer are in equimolar proportions, other compositions may be prepared, as will be recognized by those of ordinary skill in the art.
Solvent resistance of the cured composite may decrease markedly if the polymer is provided in large excess to the oligomer in the blend.
The advanced composite blends may, in the case of coreactive oligomers and in other cases, include multiple oligomers or multiple polymers, such as a mixture of an amideimide oligomer, an amide oligomer, and an imide polymer or a mixture of an amideimide oligomer, an amideimide polymer, and an imide polymer (i.e. blended amideimide further blended with imide). When polyimide oligomers are used, the advanced composite blend can include a coreactant, such as P-phenylenediamine, benzidine, or 4,4xe2x80x2-methylene-dianiline. Ethersulfone oligomers can include these imide coreactants or anhydride or anhydride-derivative coreactants, as described in U.S. Pat. No. 4,414,269. Other combinations of oligomers, polymers, and coreactants can be used, as will be recognized by those of ordinary skill in the art.
As discussed above, the oligomeric component of the advanced composite blend may itself be a blend of the oligomer and a compatible polymer from the same chemical family, further blended with the compatible polymer from the different family. The advanced composite blends, also, can simply be made from three or more oligomeric or polymeric components. They generally include only one oligomeric component unless coreactive oligomers are used.
The advanced composite blends may yield semi-interpenetrating networks of the general type described by Egli et al., xe2x80x9cSemi-Interpenetrating Networks of LARC-TPIxe2x80x9d available from NASA-Langley Research Center.
The coreactive oligomer blends used in the advanced composite blends of the present invention are prepared by mixing mutually soluble mixtures of the two (or more) resins, as with making oligomer-polymer blends.
As suggested at the outset of the discussion of multidimensional morphology, formula weight matching in the cured composite poses a problem. We have found it difficult to process high average formula weight multi-dimensional oligomers, so we suspect that it will be difficult to prepare an advanced composite blend that includes a polymer of relatively high average formula weight. To overcome this potential problem, we theorize that it may be possible to prepare a blend that includes the oligomer and polymeric precursors. For example, a polyether oligomer of the general formula:
might be mixed with polyamide polymeric precursors of the general formulae:
Arxe2x80x94[xe2x80x94CONH-xcfx86-SO2-xcfx86-O-xcfx86-NH2]3 and
Arxe2x80x94[xe2x80x94NHCOxe2x80x94Qxe2x80x94COOH]3
wherein Ar=an aromatic hub, xcfx86=phenyl, and Q=a residue of a dicarboxylic acid, so that, upon curing, the oligomer crosslinks and the polymeric precursors condense through the amine and acid to form a polyamide polymer. This approach may be best suited for the lower curing oligomers. The product may include addition polymers and block copolymers of the oligomer and one or both of the polymeric precursors.
Generally the coreactive oligomer blends are selected to tailor the physical properties of the resulting block copolymer composites. For example, stiffening can be achieved for a composite made from an ethersulfone oligomer by adding a benzoxazole oligomer as a coreactant. Those skilled in the art will recognize the benefits to be gained through coreactive oligomer blends. The relatively stiff and rigid heterocycle oligomers can be toughened in this way.
Dopants for creating semiconductive or conductive composites with xe2x80x9cSchiff basexe2x80x9d oligomers are preferably selected from compounds commonly used to dope other polymers, namely, (1) dispersions of alkali metals (for high activity) or (2) strong chemical oxidizers, particularly alkali perchlorates (for lower activity). Arsenic compounds and elemental halogens, while active dopants, are too dangerous for general usage, and are not recommended.
The dopants react with the oligomers or polymers to form charge transfer complexes. N-type semiconductors result from doping with alkali metal dispersions. P-type semi-conductors result from doping with elemental iodine or perchlorates. Dopant should be added to the oligomer or blend prior to forming the prepreg.
While research into conductive or semiconductive polymers has been active, the resulting compounds (mainly polyacetylenes, polyphenylenes, and polyvinylacetylenes) are unsatisfactory for aerospace applications because the polymers are:
(a) unstable in air;
(b) unstable at high temperatures;
(c) brittle after doping;
(d) toxic because of the dopants; or
(e) intractable.
These problems are overcome or significantly reduced with the conductive oligomers of the present invention.
As used in describing the suitable diacid halides and diamines, xe2x80x9cSchiff basexe2x80x9d is used throughout this specification in a generic way rather than in its typical chemical way, and is used to represent conductive linkages, such as xe2x80x94CHxe2x95x90Nxe2x80x94, oxazoles, thiazoles, imidazoles, or mixtures thereof. The heterocycle oligomers may simply need to be doped to exhibit semiconductive properties, and xe2x80x94CHxe2x95x90Nxe2x80x94 bonds may be unnecessary.
While conventional theory holds that semiconductive polymers should have (1) low ionization potentials, (2) long conjugation lengths, and (3) planar backbones, there is an inherent trade-off between conductivity and toughness or processibility, if these constraints are followed. To overcome the processing and toughness shortcomings common with Schiff base, oxazole, imidazole, or thiazole polymers, the oligomers of the present invention, include xe2x80x9csulfonexe2x80x9d (i.e., electronegative) linkages interspersed along the backbone providing a mechanical swivel for the rigid, conductive segments of the arms. Phenoxyphenylsulfone or phenoxyphenylketone moieties are preferred to provide added toughness.
The advanced composite blends of the present invention can be combined with reinforcing materials and cured to composite materials using heat or chemicals to activate crosslinking or interlinking between end caps. Prepregs can be prepared by conventional prepregging techniques. While woven fabrics are the typical reinforcement, the fibers can be continuous or discontinuous (in chopped or whisker form) and may be ceramic, organic, carbon (graphite), or glass, as suited for the desired application. Curing generally is conducted in conventional vacuum bagging techniques at elevated temperatures. The curing temperature varies with the choice of end cap. If desired, mixtures of end caps might be used.
The advanced composite blends of the present invention can also be used as adhesives, varnishes, films, and coatings.
Although polyaryl compounds are generally described, aliphatic moieties can be included in the backbones, in some cases, although the ultimate use temperatures of these oligomers or composites may be lower than those oligomers that have entirely polyaryl backbones.
While para isomerization has primarily been shown, other isomers are possible. Furthermore, the aryl groups can have substituents, if desired, such as halogen, lower alkyl up to about 4 carbon atoms, lower alkoxy up to about 4 carbon atoms, or aryl. Substituents may create steric hindrance problems in synthesizing the oligomers or in crosslinking the oligomers into the final composites.
|
{
"pile_set_name": "USPTO Backgrounds"
}
|
[Severe reactions to iodinated contrast agents: is anaphylaxis responsible?].
The etiology of severe reactions following injection of iodinated contrast agents is the subject of controversy. No consensus has been established regarding the management of patients at risk, risk factors and premedication because in most cases published no diagnostic exploration has been carried out on patients who have experienced a severe reaction. and Methods. Diagnosis of drug anaphylaxis is based on clinical history, proof of mediator release and drug-specific IgE antibodies (when the technique is available) or cutaneous tests (when direct technique is not available). This approach has been adopted for etiologic diagnosis of 5 clinical cases of severe anaphylactoid reactions (including one death) following the injection of ionic and non ionic contrast agents. Clinical symptoms, biology and cutaneous tests are consistent with anaphylaxis. Any patient who has had a severe anaphylactoid reaction following injection of a contrast agent should undergo an allergological assessment to confirm the diagnosis and identify the culprit contrast agent. Indeed, no premedication has proved efficient for the prevention of subsequent allergic reactions.
|
{
"pile_set_name": "PubMed Abstracts"
}
|
came home for Christmas break to find that my package has arrived!! she did a great job picking out my gifts!! im a huge Steelers fan! i love them and cant wait to use them.
|
{
"pile_set_name": "OpenWebText2"
}
|
2 killed when jet crashes in Indiana neighborhood
Tom Coyne, Associated Press | AP
Show Caption Hide Caption Two killed when private jet hits 3 homes Two people were killed and at least three injured, when a private jet hit three homes in South Bend, Indiana, Sunday afternoon. Authorities now say everyone on the ground is believed to be accounted for. (March 18)
A private jet crashed Sunday into homes in a northern Indiana neighborhood
The jet was apparently experiencing mechanical trouble
A coroner is saying people were killed when the plane crashed
SOUTH BEND, Indiana (AP) — A private jet apparently experiencing mechanical trouble crashed into an Indiana neighborhood, hitting three homes and leaving two people aboard the plane dead, authorities said.
The crash Sunday injured two other people aboard the Beechcraft Premier I twin-jet and one person on the ground, South Bend Assistant Fire Chief John Corthier said. Corthier said officials believe everyone connected with the damaged homes had been accounted for and there were no known missing people.
The jet had left Tulsa, Oklahoma's Riverside Airport and crashed late Sunday afternoon near South Bend Regional Airport, Federal Aviation Administration spokesman Roland Herwig in Oklahoma City said.
South Bend Memorial Hospital spokeswoman Maggie Scroope said three people injured in the crash were being treated there; one was in serious condition and two were in fair condition.
The plane was registered to 7700 Enterprises of Montana LLC in Helena, Montana. The company is owned by Wes Caves and does business as DigiCut Systems in Tulsa, Oklahoma. It makes window film and paint overlay for automobiles.
A woman identifying herself as Caves' wife answered the phone at their home Sunday and said, "I think he's dead," before hanging up.
Although authorities believe everyone was accounted for, Corthier said firefighters still want to search a heavily damaged home.
"I believe they said they're going to have to tear down a portion of the house to make it stable. That probably won't happen until (Monday)," he said.
Jet fuel inside another house posed a hazard, Corthier said.
"The leaking has stopped, but there is fuel in the basement. That is one of our major concerns, the fuel," Corthier said.
An engine company was en route to the airport when its members witnessed the crash, Corthier said.
"Our arrival on the scene was immediate. Our working to get the occupants out started immediately. We were able to get some of the occupants out of the plane right away," Corthier said.
A National Transportation Safety Board investigator arrived on the scene Sunday night.
Part of the neighborhood southwest of the airport was evacuated after the crash, and Corthier said it was possible some residents would return to their homes Sunday night.
Electricity was cut off to part of the neighborhood.
Mike Daigle, executive director of the St. Joseph County Airport Authority, said the jet attempted a landing about 4:15 p.m., went back up and maneuvered south to try another landing, but eight minutes later the airport learned the plane was no longer airborne.
"There was an indication of a mechanical problem," Herwig said.
Stan Klaybor, who lives across the street from the crash scene, said the jet clipped the top of one house, heavily damaged a second, and finally came to rest against a third. Neighbors did not know if a woman living in the most heavily damaged house was home at the time, and a young boy in the third house did not appear to be seriously injured, Klaybor said.
"Her little boy was in the kitchen and he got nicked here," Klaybor said, pointing to his forehead.
His wife, Mary Jane, regularly watches planes approach the airport.
"I was looking out my picture window. The plane's coming, and I go, 'Wait a minute,' and then, boom," she said.
"This one was coming straight at my house. I went, 'Huh?' and then there was a big crash, and all the insulation went flying," she said.
|
{
"pile_set_name": "OpenWebText2"
}
|
Q:
Android READ PHONE STATE?
I'm trying to make app to READ PHONE STATE and when the phone state is changed to display Toast with the current state. But when I start it, the app stops unexpectedly.
my class :
import android.app.Activity;
import android.content.Context;
import android.os.Bundle;
import android.telephony.PhoneStateListener;
import android.telephony.TelephonyManager;
import android.widget.TextView;
public class TelephonyDemo extends Activity {
TextView textOut;
TelephonyManager telephonyManager;
PhoneStateListener listener;
/** Called when the activity is first created. */
@Override
public void onCreate(Bundle savedInstanceState) {
super.onCreate(savedInstanceState);
setContentView(R.layout.main);
// Get the UI
textOut = (TextView) findViewById(R.id.textOut);
// Get the telephony manager
telephonyManager = (TelephonyManager) getSystemService(Context.TELEPHONY_SERVICE);
// Create a new PhoneStateListener
listener = new PhoneStateListener() {
@Override
public void onCallStateChanged(int state, String incomingNumber) {
String stateString = "N/A";
switch (state) {
case TelephonyManager.CALL_STATE_IDLE:
stateString = "Idle";
break;
case TelephonyManager.CALL_STATE_OFFHOOK:
stateString = "Off Hook";
break;
case TelephonyManager.CALL_STATE_RINGING:
stateString = "Ringing";
break;
}
textOut.append(String.format("\nonCallStateChanged: %s",
stateString));
}
};
// Register the listener with the telephony manager
telephonyManager.listen(listener, PhoneStateListener.LISTEN_CALL_STATE);
}
}
my manifest is :
<?xml version="1.0" encoding="utf-8"?>
<manifest xmlns:android="http://schemas.android.com/apk/res/android"
package="com.marakana"
android:versionCode="1"
android:versionName="1.0" >
<application
android:icon="@drawable/icon"
android:label="@string/app_name"
android:theme="@android:style/Theme.Light" >
<activity
android:name=".TelephonyDemo"
android:label="@string/app_name" >
<intent-filter>
<action android:name="android.intent.action.MAIN" />
<category android:name="android.intent.category.LAUNCHER" />
</intent-filter>
</activity>
</application>
<uses-sdk android:minSdkVersion="7" />
</manifest>
My layout is :
<?xml version="1.0" encoding="utf-8"?>
<LinearLayout xmlns:android="http://schemas.android.com/apk/res/android"
android:layout_width="fill_parent"
android:layout_height="fill_parent"
android:orientation="vertical" >
<TextView
android:layout_width="fill_parent"
android:layout_height="wrap_content"
android:text="Telephony Demo"
android:textSize="22sp" />
<TextView
android:id="@+id/textOut"
android:layout_width="wrap_content"
android:layout_height="wrap_content"
android:text="Output" >
</TextView>
</LinearLayout>
A:
I did not see <uses-permission android:name="android.permission.READ_PHONE_STATE" /> in your Manifest file.
It is required for your application to be able to read that state.
A:
<?xml version="1.0" encoding="utf-8"?>
<manifest xmlns:android="http://schemas.android.com/apk/res/android"
package="com.marakana"
android:versionCode="1"
android:versionName="1.0" >
/* permission should be added like below*/
<uses-permission android:name="android.permission.READ_PHONE_STATE"/>
<application
android:icon="@drawable/icon"
android:label="@string/app_name"
android:theme="@android:style/Theme.Light" >
<activity
android:name=".TelephonyDemo"
android:label="@string/app_name" >
<intent-filter>
<action android:name="android.intent.action.MAIN" />
<category android:name="android.intent.category.LAUNCHER" />
</intent-filter>
</activity>
</application>
<uses-sdk android:minSdkVersion="7" />
</manifest>
|
{
"pile_set_name": "StackExchange"
}
|
American Whiskey Gift
All inclusive pricing includes standard shipping and tax in the continental U.S.
American Whiskey Gift Online
Mister Katz grew up on the B&O railroad, spitting distance from the old Hannisville Distillery. In the days, before Prohibition there was all manner of entertainment to keep a young man’s fancy: the ponies, chewing tobacco, malts at the drugstore, and an evening’s treat of Rock & Rye.
An American classic, authentic Rock & Rye could once be found on the back bar of most noteworthy establishments. Over a century later we proudly present Mister Katz’s Rock & Rye. In service to the past and present, it marries our youthful rye whiskey and rock candy sugar with sour cherries, cinnamon, and a wisp of citrus. Enjoy it on its on or in a cocktail.
|
{
"pile_set_name": "Pile-CC"
}
|
Giorgio Calza
Giorgio Calza (20 July 1900 – 31 March 1970) was an Italian wrestler. He competed in the Greco-Roman heavyweight event at the 1920 Summer Olympics.
References
Category:1900 births
Category:1970 deaths
Category:Olympic wrestlers of Italy
Category:Wrestlers at the 1920 Summer Olympics
Category:Italian male sport wrestlers
Category:Sportspeople from Trieste
|
{
"pile_set_name": "Wikipedia (en)"
}
|
// Copyright 2016 Google, Inc. All rights reserved.
//
// Use of this source code is governed by a BSD-style license
// that can be found in the LICENSE file in the root of the source
// tree.
package layers
import (
"bytes"
"encoding/binary"
"fmt"
"net"
"github.com/google/gopacket"
)
// DHCPOp rerprents a bootp operation
type DHCPOp byte
// bootp operations
const (
DHCPOpRequest DHCPOp = 1
DHCPOpReply DHCPOp = 2
)
// String returns a string version of a DHCPOp.
func (o DHCPOp) String() string {
switch o {
case DHCPOpRequest:
return "Request"
case DHCPOpReply:
return "Reply"
default:
return "Unknown"
}
}
// DHCPMsgType represents a DHCP operation
type DHCPMsgType byte
// Constants that represent DHCP operations
const (
DHCPMsgTypeUnspecified DHCPMsgType = iota
DHCPMsgTypeDiscover
DHCPMsgTypeOffer
DHCPMsgTypeRequest
DHCPMsgTypeDecline
DHCPMsgTypeAck
DHCPMsgTypeNak
DHCPMsgTypeRelease
DHCPMsgTypeInform
)
// String returns a string version of a DHCPMsgType.
func (o DHCPMsgType) String() string {
switch o {
case DHCPMsgTypeUnspecified:
return "Unspecified"
case DHCPMsgTypeDiscover:
return "Discover"
case DHCPMsgTypeOffer:
return "Offer"
case DHCPMsgTypeRequest:
return "Request"
case DHCPMsgTypeDecline:
return "Decline"
case DHCPMsgTypeAck:
return "Ack"
case DHCPMsgTypeNak:
return "Nak"
case DHCPMsgTypeRelease:
return "Release"
case DHCPMsgTypeInform:
return "Inform"
default:
return "Unknown"
}
}
//DHCPMagic is the RFC 2131 "magic cooke" for DHCP.
var DHCPMagic uint32 = 0x63825363
// DHCPv4 contains data for a single DHCP packet.
type DHCPv4 struct {
BaseLayer
Operation DHCPOp
HardwareType LinkType
HardwareLen uint8
HardwareOpts uint8
Xid uint32
Secs uint16
Flags uint16
ClientIP net.IP
YourClientIP net.IP
NextServerIP net.IP
RelayAgentIP net.IP
ClientHWAddr net.HardwareAddr
ServerName []byte
File []byte
Options DHCPOptions
}
// DHCPOptions is used to get nicely printed option lists which would normally
// be cut off after 5 options.
type DHCPOptions []DHCPOption
// String returns a string version of the options list.
func (o DHCPOptions) String() string {
buf := &bytes.Buffer{}
buf.WriteByte('[')
for i, opt := range o {
buf.WriteString(opt.String())
if i+1 != len(o) {
buf.WriteString(", ")
}
}
buf.WriteByte(']')
return buf.String()
}
// LayerType returns gopacket.LayerTypeDHCPv4
func (d *DHCPv4) LayerType() gopacket.LayerType { return LayerTypeDHCPv4 }
// DecodeFromBytes decodes the given bytes into this layer.
func (d *DHCPv4) DecodeFromBytes(data []byte, df gopacket.DecodeFeedback) error {
if len(data) < 240 {
df.SetTruncated()
return fmt.Errorf("DHCPv4 length %d too short", len(data))
}
d.Options = d.Options[:0]
d.Operation = DHCPOp(data[0])
d.HardwareType = LinkType(data[1])
d.HardwareLen = data[2]
d.HardwareOpts = data[3]
d.Xid = binary.BigEndian.Uint32(data[4:8])
d.Secs = binary.BigEndian.Uint16(data[8:10])
d.Flags = binary.BigEndian.Uint16(data[10:12])
d.ClientIP = net.IP(data[12:16])
d.YourClientIP = net.IP(data[16:20])
d.NextServerIP = net.IP(data[20:24])
d.RelayAgentIP = net.IP(data[24:28])
d.ClientHWAddr = net.HardwareAddr(data[28 : 28+d.HardwareLen])
d.ServerName = data[44:108]
d.File = data[108:236]
if binary.BigEndian.Uint32(data[236:240]) != DHCPMagic {
return InvalidMagicCookie
}
if len(data) <= 240 {
// DHCP Packet could have no option (??)
return nil
}
options := data[240:]
stop := len(options)
start := 0
for start < stop {
o := DHCPOption{}
if err := o.decode(options[start:]); err != nil {
return err
}
if o.Type == DHCPOptEnd {
break
}
d.Options = append(d.Options, o)
// Check if the option is a single byte pad
if o.Type == DHCPOptPad {
start++
} else {
start += int(o.Length) + 2
}
}
d.Contents = data
return nil
}
// Len returns the length of a DHCPv4 packet.
func (d *DHCPv4) Len() uint16 {
n := uint16(240)
for _, o := range d.Options {
if o.Type == DHCPOptPad {
n++
} else {
n += uint16(o.Length) + 2
}
}
n++ // for opt end
return n
}
// SerializeTo writes the serialized form of this layer into the
// SerializationBuffer, implementing gopacket.SerializableLayer.
// See the docs for gopacket.SerializableLayer for more info.
func (d *DHCPv4) SerializeTo(b gopacket.SerializeBuffer, opts gopacket.SerializeOptions) error {
plen := int(d.Len())
data, err := b.PrependBytes(plen)
if err != nil {
return err
}
data[0] = byte(d.Operation)
data[1] = byte(d.HardwareType)
if opts.FixLengths {
d.HardwareLen = uint8(len(d.ClientHWAddr))
}
data[2] = d.HardwareLen
data[3] = d.HardwareOpts
binary.BigEndian.PutUint32(data[4:8], d.Xid)
binary.BigEndian.PutUint16(data[8:10], d.Secs)
binary.BigEndian.PutUint16(data[10:12], d.Flags)
copy(data[12:16], d.ClientIP.To4())
copy(data[16:20], d.YourClientIP.To4())
copy(data[20:24], d.NextServerIP.To4())
copy(data[24:28], d.RelayAgentIP.To4())
copy(data[28:44], d.ClientHWAddr)
copy(data[44:108], d.ServerName)
copy(data[108:236], d.File)
binary.BigEndian.PutUint32(data[236:240], DHCPMagic)
if len(d.Options) > 0 {
offset := 240
for _, o := range d.Options {
if err := o.encode(data[offset:]); err != nil {
return err
}
// A pad option is only a single byte
if o.Type == DHCPOptPad {
offset++
} else {
offset += 2 + len(o.Data)
}
}
optend := NewDHCPOption(DHCPOptEnd, nil)
if err := optend.encode(data[offset:]); err != nil {
return err
}
}
return nil
}
// CanDecode returns the set of layer types that this DecodingLayer can decode.
func (d *DHCPv4) CanDecode() gopacket.LayerClass {
return LayerTypeDHCPv4
}
// NextLayerType returns the layer type contained by this DecodingLayer.
func (d *DHCPv4) NextLayerType() gopacket.LayerType {
return gopacket.LayerTypePayload
}
func decodeDHCPv4(data []byte, p gopacket.PacketBuilder) error {
dhcp := &DHCPv4{}
err := dhcp.DecodeFromBytes(data, p)
if err != nil {
return err
}
p.AddLayer(dhcp)
return p.NextDecoder(gopacket.LayerTypePayload)
}
// DHCPOpt represents a DHCP option or parameter from RFC-2132
type DHCPOpt byte
// Constants for the DHCPOpt options.
const (
DHCPOptPad DHCPOpt = 0
DHCPOptSubnetMask DHCPOpt = 1 // 4, net.IP
DHCPOptTimeOffset DHCPOpt = 2 // 4, int32 (signed seconds from UTC)
DHCPOptRouter DHCPOpt = 3 // n*4, [n]net.IP
DHCPOptTimeServer DHCPOpt = 4 // n*4, [n]net.IP
DHCPOptNameServer DHCPOpt = 5 // n*4, [n]net.IP
DHCPOptDNS DHCPOpt = 6 // n*4, [n]net.IP
DHCPOptLogServer DHCPOpt = 7 // n*4, [n]net.IP
DHCPOptCookieServer DHCPOpt = 8 // n*4, [n]net.IP
DHCPOptLPRServer DHCPOpt = 9 // n*4, [n]net.IP
DHCPOptImpressServer DHCPOpt = 10 // n*4, [n]net.IP
DHCPOptResLocServer DHCPOpt = 11 // n*4, [n]net.IP
DHCPOptHostname DHCPOpt = 12 // n, string
DHCPOptBootfileSize DHCPOpt = 13 // 2, uint16
DHCPOptMeritDumpFile DHCPOpt = 14 // >1, string
DHCPOptDomainName DHCPOpt = 15 // n, string
DHCPOptSwapServer DHCPOpt = 16 // n*4, [n]net.IP
DHCPOptRootPath DHCPOpt = 17 // n, string
DHCPOptExtensionsPath DHCPOpt = 18 // n, string
DHCPOptIPForwarding DHCPOpt = 19 // 1, bool
DHCPOptSourceRouting DHCPOpt = 20 // 1, bool
DHCPOptPolicyFilter DHCPOpt = 21 // 8*n, [n]{net.IP/net.IP}
DHCPOptDatagramMTU DHCPOpt = 22 // 2, uint16
DHCPOptDefaultTTL DHCPOpt = 23 // 1, byte
DHCPOptPathMTUAgingTimeout DHCPOpt = 24 // 4, uint32
DHCPOptPathPlateuTableOption DHCPOpt = 25 // 2*n, []uint16
DHCPOptInterfaceMTU DHCPOpt = 26 // 2, uint16
DHCPOptAllSubsLocal DHCPOpt = 27 // 1, bool
DHCPOptBroadcastAddr DHCPOpt = 28 // 4, net.IP
DHCPOptMaskDiscovery DHCPOpt = 29 // 1, bool
DHCPOptMaskSupplier DHCPOpt = 30 // 1, bool
DHCPOptRouterDiscovery DHCPOpt = 31 // 1, bool
DHCPOptSolicitAddr DHCPOpt = 32 // 4, net.IP
DHCPOptStaticRoute DHCPOpt = 33 // n*8, [n]{net.IP/net.IP} -- note the 2nd is router not mask
DHCPOptARPTrailers DHCPOpt = 34 // 1, bool
DHCPOptARPTimeout DHCPOpt = 35 // 4, uint32
DHCPOptEthernetEncap DHCPOpt = 36 // 1, bool
DHCPOptTCPTTL DHCPOpt = 37 // 1, byte
DHCPOptTCPKeepAliveInt DHCPOpt = 38 // 4, uint32
DHCPOptTCPKeepAliveGarbage DHCPOpt = 39 // 1, bool
DHCPOptNISDomain DHCPOpt = 40 // n, string
DHCPOptNISServers DHCPOpt = 41 // 4*n, [n]net.IP
DHCPOptNTPServers DHCPOpt = 42 // 4*n, [n]net.IP
DHCPOptVendorOption DHCPOpt = 43 // n, [n]byte // may be encapsulated.
DHCPOptNetBIOSTCPNS DHCPOpt = 44 // 4*n, [n]net.IP
DHCPOptNetBIOSTCPDDS DHCPOpt = 45 // 4*n, [n]net.IP
DHCPOptNETBIOSTCPNodeType DHCPOpt = 46 // 1, magic byte
DHCPOptNetBIOSTCPScope DHCPOpt = 47 // n, string
DHCPOptXFontServer DHCPOpt = 48 // n, string
DHCPOptXDisplayManager DHCPOpt = 49 // n, string
DHCPOptRequestIP DHCPOpt = 50 // 4, net.IP
DHCPOptLeaseTime DHCPOpt = 51 // 4, uint32
DHCPOptExtOptions DHCPOpt = 52 // 1, 1/2/3
DHCPOptMessageType DHCPOpt = 53 // 1, 1-7
DHCPOptServerID DHCPOpt = 54 // 4, net.IP
DHCPOptParamsRequest DHCPOpt = 55 // n, []byte
DHCPOptMessage DHCPOpt = 56 // n, 3
DHCPOptMaxMessageSize DHCPOpt = 57 // 2, uint16
DHCPOptT1 DHCPOpt = 58 // 4, uint32
DHCPOptT2 DHCPOpt = 59 // 4, uint32
DHCPOptClassID DHCPOpt = 60 // n, []byte
DHCPOptClientID DHCPOpt = 61 // n >= 2, []byte
DHCPOptDomainSearch DHCPOpt = 119 // n, string
DHCPOptSIPServers DHCPOpt = 120 // n, url
DHCPOptClasslessStaticRoute DHCPOpt = 121 //
DHCPOptEnd DHCPOpt = 255
)
// String returns a string version of a DHCPOpt.
func (o DHCPOpt) String() string {
switch o {
case DHCPOptPad:
return "(padding)"
case DHCPOptSubnetMask:
return "SubnetMask"
case DHCPOptTimeOffset:
return "TimeOffset"
case DHCPOptRouter:
return "Router"
case DHCPOptTimeServer:
return "rfc868" // old time server protocol stringified to dissuade confusion w. NTP
case DHCPOptNameServer:
return "ien116" // obscure nameserver protocol stringified to dissuade confusion w. DNS
case DHCPOptDNS:
return "DNS"
case DHCPOptLogServer:
return "mitLCS" // MIT LCS server protocol yada yada w. Syslog
case DHCPOptCookieServer:
return "CookieServer"
case DHCPOptLPRServer:
return "LPRServer"
case DHCPOptImpressServer:
return "ImpressServer"
case DHCPOptResLocServer:
return "ResourceLocationServer"
case DHCPOptHostname:
return "Hostname"
case DHCPOptBootfileSize:
return "BootfileSize"
case DHCPOptMeritDumpFile:
return "MeritDumpFile"
case DHCPOptDomainName:
return "DomainName"
case DHCPOptSwapServer:
return "SwapServer"
case DHCPOptRootPath:
return "RootPath"
case DHCPOptExtensionsPath:
return "ExtensionsPath"
case DHCPOptIPForwarding:
return "IPForwarding"
case DHCPOptSourceRouting:
return "SourceRouting"
case DHCPOptPolicyFilter:
return "PolicyFilter"
case DHCPOptDatagramMTU:
return "DatagramMTU"
case DHCPOptDefaultTTL:
return "DefaultTTL"
case DHCPOptPathMTUAgingTimeout:
return "PathMTUAgingTimeout"
case DHCPOptPathPlateuTableOption:
return "PathPlateuTableOption"
case DHCPOptInterfaceMTU:
return "InterfaceMTU"
case DHCPOptAllSubsLocal:
return "AllSubsLocal"
case DHCPOptBroadcastAddr:
return "BroadcastAddress"
case DHCPOptMaskDiscovery:
return "MaskDiscovery"
case DHCPOptMaskSupplier:
return "MaskSupplier"
case DHCPOptRouterDiscovery:
return "RouterDiscovery"
case DHCPOptSolicitAddr:
return "SolicitAddr"
case DHCPOptStaticRoute:
return "StaticRoute"
case DHCPOptARPTrailers:
return "ARPTrailers"
case DHCPOptARPTimeout:
return "ARPTimeout"
case DHCPOptEthernetEncap:
return "EthernetEncap"
case DHCPOptTCPTTL:
return "TCPTTL"
case DHCPOptTCPKeepAliveInt:
return "TCPKeepAliveInt"
case DHCPOptTCPKeepAliveGarbage:
return "TCPKeepAliveGarbage"
case DHCPOptNISDomain:
return "NISDomain"
case DHCPOptNISServers:
return "NISServers"
case DHCPOptNTPServers:
return "NTPServers"
case DHCPOptVendorOption:
return "VendorOption"
case DHCPOptNetBIOSTCPNS:
return "NetBIOSOverTCPNS"
case DHCPOptNetBIOSTCPDDS:
return "NetBiosOverTCPDDS"
case DHCPOptNETBIOSTCPNodeType:
return "NetBIOSOverTCPNodeType"
case DHCPOptNetBIOSTCPScope:
return "NetBIOSOverTCPScope"
case DHCPOptXFontServer:
return "XFontServer"
case DHCPOptXDisplayManager:
return "XDisplayManager"
case DHCPOptEnd:
return "(end)"
case DHCPOptSIPServers:
return "SipServers"
case DHCPOptRequestIP:
return "RequestIP"
case DHCPOptLeaseTime:
return "LeaseTime"
case DHCPOptExtOptions:
return "ExtOpts"
case DHCPOptMessageType:
return "MessageType"
case DHCPOptServerID:
return "ServerID"
case DHCPOptParamsRequest:
return "ParamsRequest"
case DHCPOptMessage:
return "Message"
case DHCPOptMaxMessageSize:
return "MaxDHCPSize"
case DHCPOptT1:
return "Timer1"
case DHCPOptT2:
return "Timer2"
case DHCPOptClassID:
return "ClassID"
case DHCPOptClientID:
return "ClientID"
case DHCPOptDomainSearch:
return "DomainSearch"
case DHCPOptClasslessStaticRoute:
return "ClasslessStaticRoute"
default:
return "Unknown"
}
}
// DHCPOption rerpresents a DHCP option.
type DHCPOption struct {
Type DHCPOpt
Length uint8
Data []byte
}
// String returns a string version of a DHCP Option.
func (o DHCPOption) String() string {
switch o.Type {
case DHCPOptHostname, DHCPOptMeritDumpFile, DHCPOptDomainName, DHCPOptRootPath,
DHCPOptExtensionsPath, DHCPOptNISDomain, DHCPOptNetBIOSTCPScope, DHCPOptXFontServer,
DHCPOptXDisplayManager, DHCPOptMessage, DHCPOptDomainSearch: // string
return fmt.Sprintf("Option(%s:%s)", o.Type, string(o.Data))
case DHCPOptMessageType:
if len(o.Data) != 1 {
return fmt.Sprintf("Option(%s:INVALID)", o.Type)
}
return fmt.Sprintf("Option(%s:%s)", o.Type, DHCPMsgType(o.Data[0]))
case DHCPOptSubnetMask, DHCPOptServerID, DHCPOptBroadcastAddr,
DHCPOptSolicitAddr, DHCPOptRequestIP: // net.IP
if len(o.Data) < 4 {
return fmt.Sprintf("Option(%s:INVALID)", o.Type)
}
return fmt.Sprintf("Option(%s:%s)", o.Type, net.IP(o.Data))
case DHCPOptT1, DHCPOptT2, DHCPOptLeaseTime, DHCPOptPathMTUAgingTimeout,
DHCPOptARPTimeout, DHCPOptTCPKeepAliveInt: // uint32
if len(o.Data) != 4 {
return fmt.Sprintf("Option(%s:INVALID)", o.Type)
}
return fmt.Sprintf("Option(%s:%d)", o.Type,
uint32(o.Data[0])<<24|uint32(o.Data[1])<<16|uint32(o.Data[2])<<8|uint32(o.Data[3]))
case DHCPOptParamsRequest:
buf := &bytes.Buffer{}
buf.WriteString(fmt.Sprintf("Option(%s:", o.Type))
for i, v := range o.Data {
buf.WriteString(DHCPOpt(v).String())
if i+1 != len(o.Data) {
buf.WriteByte(',')
}
}
buf.WriteString(")")
return buf.String()
default:
return fmt.Sprintf("Option(%s:%v)", o.Type, o.Data)
}
}
// NewDHCPOption constructs a new DHCPOption with a given type and data.
func NewDHCPOption(t DHCPOpt, data []byte) DHCPOption {
o := DHCPOption{Type: t}
if data != nil {
o.Data = data
o.Length = uint8(len(data))
}
return o
}
func (o *DHCPOption) encode(b []byte) error {
switch o.Type {
case DHCPOptPad, DHCPOptEnd:
b[0] = byte(o.Type)
default:
b[0] = byte(o.Type)
b[1] = o.Length
copy(b[2:], o.Data)
}
return nil
}
func (o *DHCPOption) decode(data []byte) error {
if len(data) < 1 {
// Pad/End have a length of 1
return DecOptionNotEnoughData
}
o.Type = DHCPOpt(data[0])
switch o.Type {
case DHCPOptPad, DHCPOptEnd:
o.Data = nil
default:
if len(data) < 2 {
return DecOptionNotEnoughData
}
o.Length = data[1]
if int(o.Length) > len(data[2:]) {
return DecOptionMalformed
}
o.Data = data[2 : 2+int(o.Length)]
}
return nil
}
// DHCPv4Error is used for constant errors for DHCPv4. It is needed for test asserts.
type DHCPv4Error string
// DHCPv4Error implements error interface.
func (d DHCPv4Error) Error() string {
return string(d)
}
const (
// DecOptionNotEnoughData is returned when there is not enough data during option's decode process
DecOptionNotEnoughData = DHCPv4Error("Not enough data to decode")
// DecOptionMalformed is returned when the option is malformed
DecOptionMalformed = DHCPv4Error("Option is malformed")
// InvalidMagicCookie is returned when Magic cookie is missing into BOOTP header
InvalidMagicCookie = DHCPv4Error("Bad DHCP header")
)
|
{
"pile_set_name": "Github"
}
|
Fear of intracranial hemorrhage (ICH) is the primary reason that the only proven therapy for acute ischemic stroke is not provided to otherwise eligible patients. ICH also deters the development of more effective stroke therapies. New reperfusion strategies, using an intra-arterial (IA)approach, which may restore blood flow more effectively by providing therapy directly at the site of an occluded artery, are accompanied by higher rates of the mildest forms of ICH than proven intravenous thrombolytic therapy. While ICHs of all types have been considered adverse events in every acute stroke trial to date, the mechanistic significance and clinical impact of mild ICH subtypes is not known. The primary hypothesis is that acute ischemic stroke patients treated with IA therapies who have the mildest radiological subtype of ICH will be more likely to have early reperfusion and good clinical outcome than those without any ICH. Using the largest available trials with revascularization status, the PI will pursue the following specific aims: (1) determine the relationship between radiological subtypes of ICH and timing of successful revascularization and (2) determine the relationship of ICH subtypes to clinical outcome. The proposed work would: (1) guide the clinician's perceptions of the interplay between risk and benefit in the setting of reperfusion, (2) impact the interpretation of future Phase I and II reperfusion trial safety data, and (3) inform the design of future reperfusion strategies using hemorrhage prediction and hemorrhage prevention strategies. This research project will position the PI to independently design and implement an acute stroke trial with the goal of minimizing clinically significant hemorrhage. With this career development award, the PI will gain practical experience with a large-scale Phase III acute stroke clinical trial, obtain exposure to innovative reperfusion strategies, and pursue formal training in biostatistics and clinical trial methodology through introductory and advanced coursework. The PI will become an expert on acute stroke reperfusion therapies, and particularly hemorrhagic transformation, with the skills to implement an acute stroke clinical trial independently. Relevance to Public Health: Despite the availability of an effective treatment for strokes due to blocked arteries (88% of all strokes) since 1996, stroke remains the third leading cause of death and the leading cause of disability in the United States. Therapies that restore blood flow to more patients, and do so more effectively and safely, are greatly needed to improve outcomes after stroke.
|
{
"pile_set_name": "NIH ExPorter"
}
|
James Baker III is an American statesman and attorney. He served as White House Chief of Staff and the United States Secretary of the Treasury under President Ronald Reagan, and as U.S. Secretary of State and White House Chief of Staff under President George H. W. Bush. He is the best of what we want in a public statesman. He is the man who made Washington work. He is what Donald Trump can use now. I’m a product of Texas. … Continue reading "James Baker III – Did I Make Them Proud?"
Newsletter Signup
Join the Conversation
Name*
First
Last Name*
Last
Email
About Bernie
About Bernie
TEDx Speaker, Bernie Swain is co-founder and Chairman of Washington Speakers Bureau and today's foremost authority on the lecture industry. Over the past 35 years, he has represented former US Presidents, American and world leaders, journalists, authors, business visionaries, and sports legends. @Swain_Bernie
|
{
"pile_set_name": "Pile-CC"
}
|
As voters in Scotland readied for the polls Thursday to decide whether the country should break from the United Kingdom, headlines splashed across the front pages of UK and Scottish newspapers focused on the momentous decision and the divisive history behind the desire for independence.
The Guardian called it "The Day of Destiny" while The Independent referred to the situation as "The 307-Year Itch." The Times took a more straight-forward approach with the headline "Scotland Decides" and The Daily Mirror led with a pleading tone: "Don't Leave Us This Way."
|
{
"pile_set_name": "OpenWebText2"
}
|
Eh Hee
"Eh Hee" is a song written and recorded by Dave Matthews that was released as a digital single on September 4, 2007. An accompanying music video was also released on the same date, and was available as a free download from the iTunes Store for one week following its release. The music video was directed by Fenton Williams of Filament Productions.
Origins
"Eh Hee" was written as an evocation of the music and culture of the San people of southern Africa. In a story told to the Radio City audience (an edited version of which appears on the DVD version of Live at Radio City), Matthews recalls hearing the music of the Khoisan and, upon asking his guide what the words to their songs were, being told that "there are no words to these songs, because these songs, we've been singing since before people had words". He goes on to describe the song as his "homage to meeting... the most advanced people on the planet".
Live performance history
The song debuted in February 2006 on the Dave Matthews & Friends Caribbean cruise under the title "Ayhee". It was performed as part of a mini-performance on each individual ship after stormy conditions cut the main show short. Other than a solo performance by Matthews in Manchester a few months later, it was not performed again in full until 2007 at an acoustic concert at Radio City Music Hall by Matthews and Tim Reynolds. Beginning with that concert, the title was changed from "Ayhee" to "Eh Hee" on the setlist, and its performance was later released as part of the Live at Radio City album.
The next performance of the song was performed by the entire Dave Matthews Band in August 2007 in Noblesville, Indiana and became only the second to ever be performed by the band, as well as Matthews and Reynolds, Dave Matthews & Friends, and as a solo by Matthews. "Eh Hee" went on to become one of the most performed songs by the band during the summer 2007 tour, and live performances of the song were released on the albums Live at Piedmont Park and 2008's Live at Mile High Music Festival.
Track listing
"Eh Hee" - 4:31 (Dave Matthews)
References
Category:2007 singles
Category:Dave Matthews songs
Category:Songs written by Dave Matthews
Category:Live singles
Category:2007 songs
Category:RCA Records singles
|
{
"pile_set_name": "Wikipedia (en)"
}
|
/*****************************************************************
|
| Neptune - Trust Anchors
|
| This file is automatically generated by a script, do not edit!
|
| Copyright (c) 2002-2010, Axiomatic Systems, LLC.
| All rights reserved.
|
| Redistribution and use in source and binary forms, with or without
| modification, are permitted provided that the following conditions are met:
| * Redistributions of source code must retain the above copyright
| notice, this list of conditions and the following disclaimer.
| * Redistributions in binary form must reproduce the above copyright
| notice, this list of conditions and the following disclaimer in the
| documentation and/or other materials provided with the distribution.
| * Neither the name of Axiomatic Systems nor the
| names of its contributors may be used to endorse or promote products
| derived from this software without specific prior written permission.
|
| THIS SOFTWARE IS PROVIDED BY AXIOMATIC SYSTEMS ''AS IS'' AND ANY
| EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
| WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
| DISCLAIMED. IN NO EVENT SHALL AXIOMATIC SYSTEMS BE LIABLE FOR ANY
| DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES
| (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
| LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND
| ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
| (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
| SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
****************************************************************/
/* SwissSign Gold CA - G2 */
const unsigned char NptTlsTrustAnchor_Base_0109_Data[1470] = {
0x30,0x82,0x05,0xba,0x30,0x82,0x03,0xa2
,0xa0,0x03,0x02,0x01,0x02,0x02,0x09,0x00
,0xbb,0x40,0x1c,0x43,0xf5,0x5e,0x4f,0xb0
,0x30,0x0d,0x06,0x09,0x2a,0x86,0x48,0x86
,0xf7,0x0d,0x01,0x01,0x05,0x05,0x00,0x30
,0x45,0x31,0x0b,0x30,0x09,0x06,0x03,0x55
,0x04,0x06,0x13,0x02,0x43,0x48,0x31,0x15
,0x30,0x13,0x06,0x03,0x55,0x04,0x0a,0x13
,0x0c,0x53,0x77,0x69,0x73,0x73,0x53,0x69
,0x67,0x6e,0x20,0x41,0x47,0x31,0x1f,0x30
,0x1d,0x06,0x03,0x55,0x04,0x03,0x13,0x16
,0x53,0x77,0x69,0x73,0x73,0x53,0x69,0x67
,0x6e,0x20,0x47,0x6f,0x6c,0x64,0x20,0x43
,0x41,0x20,0x2d,0x20,0x47,0x32,0x30,0x1e
,0x17,0x0d,0x30,0x36,0x31,0x30,0x32,0x35
,0x30,0x38,0x33,0x30,0x33,0x35,0x5a,0x17
,0x0d,0x33,0x36,0x31,0x30,0x32,0x35,0x30
,0x38,0x33,0x30,0x33,0x35,0x5a,0x30,0x45
,0x31,0x0b,0x30,0x09,0x06,0x03,0x55,0x04
,0x06,0x13,0x02,0x43,0x48,0x31,0x15,0x30
,0x13,0x06,0x03,0x55,0x04,0x0a,0x13,0x0c
,0x53,0x77,0x69,0x73,0x73,0x53,0x69,0x67
,0x6e,0x20,0x41,0x47,0x31,0x1f,0x30,0x1d
,0x06,0x03,0x55,0x04,0x03,0x13,0x16,0x53
,0x77,0x69,0x73,0x73,0x53,0x69,0x67,0x6e
,0x20,0x47,0x6f,0x6c,0x64,0x20,0x43,0x41
,0x20,0x2d,0x20,0x47,0x32,0x30,0x82,0x02
,0x22,0x30,0x0d,0x06,0x09,0x2a,0x86,0x48
,0x86,0xf7,0x0d,0x01,0x01,0x01,0x05,0x00
,0x03,0x82,0x02,0x0f,0x00,0x30,0x82,0x02
,0x0a,0x02,0x82,0x02,0x01,0x00,0xaf,0xe4
,0xee,0x7e,0x8b,0x24,0x0e,0x12,0x6e,0xa9
,0x50,0x2d,0x16,0x44,0x3b,0x92,0x92,0x5c
,0xca,0xb8,0x5d,0x84,0x92,0x42,0x13,0x2a
,0xbc,0x65,0x57,0x82,0x40,0x3e,0x57,0x24
,0xcd,0x50,0x8b,0x25,0x2a,0xb7,0x6f,0xfc
,0xef,0xa2,0xd0,0xc0,0x1f,0x02,0x24,0x4a
,0x13,0x96,0x8f,0x23,0x13,0xe6,0x28,0x58
,0x00,0xa3,0x47,0xc7,0x06,0xa7,0x84,0x23
,0x2b,0xbb,0xbd,0x96,0x2b,0x7f,0x55,0xcc
,0x8b,0xc1,0x57,0x1f,0x0e,0x62,0x65,0x0f
,0xdd,0x3d,0x56,0x8a,0x73,0xda,0xae,0x7e
,0x6d,0xba,0x81,0x1c,0x7e,0x42,0x8c,0x20
,0x35,0xd9,0x43,0x4d,0x84,0xfa,0x84,0xdb
,0x52,0x2c,0xf3,0x0e,0x27,0x77,0x0b,0x6b
,0xbf,0x11,0x2f,0x72,0x78,0x9f,0x2e,0xd8
,0x3e,0xe6,0x18,0x37,0x5a,0x2a,0x72,0xf9
,0xda,0x62,0x90,0x92,0x95,0xca,0x1f,0x9c
,0xe9,0xb3,0x3c,0x2b,0xcb,0xf3,0x01,0x13
,0xbf,0x5a,0xcf,0xc1,0xb5,0x0a,0x60,0xbd
,0xdd,0xb5,0x99,0x64,0x53,0xb8,0xa0,0x96
,0xb3,0x6f,0xe2,0x26,0x77,0x91,0x8c,0xe0
,0x62,0x10,0x02,0x9f,0x34,0x0f,0xa4,0xd5
,0x92,0x33,0x51,0xde,0xbe,0x8d,0xba,0x84
,0x7a,0x60,0x3c,0x6a,0xdb,0x9f,0x2b,0xec
,0xde,0xde,0x01,0x3f,0x6e,0x4d,0xe5,0x50
,0x86,0xcb,0xb4,0xaf,0xed,0x44,0x40,0xc5
,0xca,0x5a,0x8c,0xda,0xd2,0x2b,0x7c,0xa8
,0xee,0xbe,0xa6,0xe5,0x0a,0xaa,0x0e,0xa5
,0xdf,0x05,0x52,0xb7,0x55,0xc7,0x22,0x5d
,0x32,0x6a,0x97,0x97,0x63,0x13,0xdb,0xc9
,0xdb,0x79,0x36,0x7b,0x85,0x3a,0x4a,0xc5
,0x52,0x89,0xf9,0x24,0xe7,0x9d,0x77,0xa9
,0x82,0xff,0x55,0x1c,0xa5,0x71,0x69,0x2b
,0xd1,0x02,0x24,0xf2,0xb3,0x26,0xd4,0x6b
,0xda,0x04,0x55,0xe5,0xc1,0x0a,0xc7,0x6d
,0x30,0x37,0x90,0x2a,0xe4,0x9e,0x14,0x33
,0x5e,0x16,0x17,0x55,0xc5,0x5b,0xb5,0xcb
,0x34,0x89,0x92,0xf1,0x9d,0x26,0x8f,0xa1
,0x07,0xd4,0xc6,0xb2,0x78,0x50,0xdb,0x0c
,0x0c,0x0b,0x7c,0x0b,0x8c,0x41,0xd7,0xb9
,0xe9,0xdd,0x8c,0x88,0xf7,0xa3,0x4d,0xb2
,0x32,0xcc,0xd8,0x17,0xda,0xcd,0xb7,0xce
,0x66,0x9d,0xd4,0xfd,0x5e,0xff,0xbd,0x97
,0x3e,0x29,0x75,0xe7,0x7e,0xa7,0x62,0x58
,0xaf,0x25,0x34,0xa5,0x41,0xc7,0x3d,0xbc
,0x0d,0x50,0xca,0x03,0x03,0x0f,0x08,0x5a
,0x1f,0x95,0x73,0x78,0x62,0xbf,0xaf,0x72
,0x14,0x69,0x0e,0xa5,0xe5,0x03,0x0e,0x78
,0x8e,0x26,0x28,0x42,0xf0,0x07,0x0b,0x62
,0x20,0x10,0x67,0x39,0x46,0xfa,0xa9,0x03
,0xcc,0x04,0x38,0x7a,0x66,0xef,0x20,0x83
,0xb5,0x8c,0x4a,0x56,0x8e,0x91,0x00,0xfc
,0x8e,0x5c,0x82,0xde,0x88,0xa0,0xc3,0xe2
,0x68,0x6e,0x7d,0x8d,0xef,0x3c,0xdd,0x65
,0xf4,0x5d,0xac,0x51,0xef,0x24,0x80,0xae
,0xaa,0x56,0x97,0x6f,0xf9,0xad,0x7d,0xda
,0x61,0x3f,0x98,0x77,0x3c,0xa5,0x91,0xb6
,0x1c,0x8c,0x26,0xda,0x65,0xa2,0x09,0x6d
,0xc1,0xe2,0x54,0xe3,0xb9,0xca,0x4c,0x4c
,0x80,0x8f,0x77,0x7b,0x60,0x9a,0x1e,0xdf
,0xb6,0xf2,0x48,0x1e,0x0e,0xba,0x4e,0x54
,0x6d,0x98,0xe0,0xe1,0xa2,0x1a,0xa2,0x77
,0x50,0xcf,0xc4,0x63,0x92,0xec,0x47,0x19
,0x9d,0xeb,0xe6,0x6b,0xce,0xc1,0x02,0x03
,0x01,0x00,0x01,0xa3,0x81,0xac,0x30,0x81
,0xa9,0x30,0x0e,0x06,0x03,0x55,0x1d,0x0f
,0x01,0x01,0xff,0x04,0x04,0x03,0x02,0x01
,0x06,0x30,0x0f,0x06,0x03,0x55,0x1d,0x13
,0x01,0x01,0xff,0x04,0x05,0x30,0x03,0x01
,0x01,0xff,0x30,0x1d,0x06,0x03,0x55,0x1d
,0x0e,0x04,0x16,0x04,0x14,0x5b,0x25,0x7b
,0x96,0xa4,0x65,0x51,0x7e,0xb8,0x39,0xf3
,0xc0,0x78,0x66,0x5e,0xe8,0x3a,0xe7,0xf0
,0xee,0x30,0x1f,0x06,0x03,0x55,0x1d,0x23
,0x04,0x18,0x30,0x16,0x80,0x14,0x5b,0x25
,0x7b,0x96,0xa4,0x65,0x51,0x7e,0xb8,0x39
,0xf3,0xc0,0x78,0x66,0x5e,0xe8,0x3a,0xe7
,0xf0,0xee,0x30,0x46,0x06,0x03,0x55,0x1d
,0x20,0x04,0x3f,0x30,0x3d,0x30,0x3b,0x06
,0x09,0x60,0x85,0x74,0x01,0x59,0x01,0x02
,0x01,0x01,0x30,0x2e,0x30,0x2c,0x06,0x08
,0x2b,0x06,0x01,0x05,0x05,0x07,0x02,0x01
,0x16,0x20,0x68,0x74,0x74,0x70,0x3a,0x2f
,0x2f,0x72,0x65,0x70,0x6f,0x73,0x69,0x74
,0x6f,0x72,0x79,0x2e,0x73,0x77,0x69,0x73
,0x73,0x73,0x69,0x67,0x6e,0x2e,0x63,0x6f
,0x6d,0x2f,0x30,0x0d,0x06,0x09,0x2a,0x86
,0x48,0x86,0xf7,0x0d,0x01,0x01,0x05,0x05
,0x00,0x03,0x82,0x02,0x01,0x00,0x27,0xba
,0xe3,0x94,0x7c,0xf1,0xae,0xc0,0xde,0x17
,0xe6,0xe5,0xd8,0xd5,0xf5,0x54,0xb0,0x83
,0xf4,0xbb,0xcd,0x5e,0x05,0x7b,0x4f,0x9f
,0x75,0x66,0xaf,0x3c,0xe8,0x56,0x7e,0xfc
,0x72,0x78,0x38,0x03,0xd9,0x2b,0x62,0x1b
,0x00,0xb9,0xf8,0xe9,0x60,0xcd,0xcc,0xce
,0x51,0x8a,0xc7,0x50,0x31,0x6e,0xe1,0x4a
,0x7e,0x18,0x2f,0x69,0x59,0xb6,0x3d,0x64
,0x81,0x2b,0xe3,0x83,0x84,0xe6,0x22,0x87
,0x8e,0x7d,0xe0,0xee,0x02,0x99,0x61,0xb8
,0x1e,0xf4,0xb8,0x2b,0x88,0x12,0x16,0x84
,0xc2,0x31,0x93,0x38,0x96,0x31,0xa6,0xb9
,0x3b,0x53,0x3f,0xc3,0x24,0x93,0x56,0x5b
,0x69,0x92,0xec,0xc5,0xc1,0xbb,0x38,0x00
,0xe3,0xec,0x17,0xa9,0xb8,0xdc,0xc7,0x7c
,0x01,0x83,0x9f,0x32,0x47,0xba,0x52,0x22
,0x34,0x1d,0x32,0x7a,0x09,0x56,0xa7,0x7c
,0x25,0x36,0xa9,0x3d,0x4b,0xda,0xc0,0x82
,0x6f,0x0a,0xbb,0x12,0xc8,0x87,0x4b,0x27
,0x11,0xf9,0x1e,0x2d,0xc7,0x93,0x3f,0x9e
,0xdb,0x5f,0x26,0x6b,0x52,0xd9,0x2e,0x8a
,0xf1,0x14,0xc6,0x44,0x8d,0x15,0xa9,0xb7
,0xbf,0xbd,0xde,0xa6,0x1a,0xee,0xae,0x2d
,0xfb,0x48,0x77,0x17,0xfe,0xbb,0xec,0xaf
,0x18,0xf5,0x2a,0x51,0xf0,0x39,0x84,0x97
,0x95,0x6c,0x6e,0x1b,0xc3,0x2b,0xc4,0x74
,0x60,0x79,0x25,0xb0,0x0a,0x27,0xdf,0xdf
,0x5e,0xd2,0x39,0xcf,0x45,0x7d,0x42,0x4b
,0xdf,0xb3,0x2c,0x1e,0xc5,0xc6,0x5d,0xca
,0x55,0x3a,0xa0,0x9c,0x69,0x9a,0x8f,0xda
,0xef,0xb2,0xb0,0x3c,0x9f,0x87,0x6c,0x12
,0x2b,0x65,0x70,0x15,0x52,0x31,0x1a,0x24
,0xcf,0x6f,0x31,0x23,0x50,0x1f,0x8c,0x4f
,0x8f,0x23,0xc3,0x74,0x41,0x63,0x1c,0x55
,0xa8,0x14,0xdd,0x3e,0xe0,0x51,0x50,0xcf
,0xf1,0x1b,0x30,0x56,0x0e,0x92,0xb0,0x82
,0x85,0xd8,0x83,0xcb,0x22,0x64,0xbc,0x2d
,0xb8,0x25,0xd5,0x54,0xa2,0xb8,0x06,0xea
,0xad,0x92,0xa4,0x24,0xa0,0xc1,0x86,0xb5
,0x4a,0x13,0x6a,0x47,0xcf,0x2e,0x0b,0x56
,0x95,0x54,0xcb,0xce,0x9a,0xdb,0x6a,0xb4
,0xa6,0xb2,0xdb,0x41,0x08,0x86,0x27,0x77
,0xf7,0x6a,0xa0,0x42,0x6c,0x0b,0x38,0xce
,0xd7,0x75,0x50,0x32,0x92,0xc2,0xdf,0x2b
,0x30,0x22,0x48,0xd0,0xd5,0x41,0x38,0x25
,0x5d,0xa4,0xe9,0x5d,0x9f,0xc6,0x94,0x75
,0xd0,0x45,0xfd,0x30,0x97,0x43,0x8f,0x90
,0xab,0x0a,0xc7,0x86,0x73,0x60,0x4a,0x69
,0x2d,0xde,0xa5,0x78,0xd7,0x06,0xda,0x6a
,0x9e,0x4b,0x3e,0x77,0x3a,0x20,0x13,0x22
,0x01,0xd0,0xbf,0x68,0x9e,0x63,0x60,0x6b
,0x35,0x4d,0x0b,0x6d,0xba,0xa1,0x3d,0xc0
,0x93,0xe0,0x7f,0x23,0xb3,0x55,0xad,0x72
,0x25,0x4e,0x46,0xf9,0xd2,0x16,0xef,0xb0
,0x64,0xc1,0x01,0x9e,0xe9,0xca,0xa0,0x6a
,0x98,0x0e,0xcf,0xd8,0x60,0xf2,0x2f,0x49
,0xb8,0xe4,0x42,0xe1,0x38,0x35,0x16,0xf4
,0xc8,0x6e,0x4f,0xf7,0x81,0x56,0xe8,0xba
,0xa3,0xbe,0x23,0xaf,0xae,0xfd,0x6f,0x03
,0xe0,0x02,0x3b,0x30,0x76,0xfa,0x1b,0x6d
,0x41,0xcf,0x01,0xb1,0xe9,0xb8,0xc9,0x66
,0xf4,0xdb,0x26,0xf3,0x3a,0xa4,0x74,0xf2
,0x49,0x24,0x5b,0xc9,0xb0,0xd0,0x57,0xc1
,0xfa,0x3e,0x7a,0xe1,0x97,0xc9};
const unsigned int NptTlsTrustAnchor_Base_0109_Size = 1470;
|
{
"pile_set_name": "Github"
}
|
U.S. Supreme Court
WEBB v. TEXAS, 409
U.S. 95 (1972)
409
U.S. 95
WEBB v. TEXAS
ON PETITION FOR WRIT OF CERTIORARI TO THE COURT OF CRIMINAL APPEALS OF
TEXAS
No. 71-6647.
Decided December 4, 1972
Trial court's extended admonition to petitioner's only witness to refrain from lying, coupled with threats of dire consequences if witness did lie, effectively discouraged the witness from testifying at all and deprived petitioner of due process of law by denying him the opportunity to present witnesses in his own defense.
Certiorari granted; 480 S. W. 2d 398, reversed.
PER CURIAM.
The petitioner was convicted of burglary in the Criminal District Court of Dallas County, Texas, and was sentenced to a term of imprisonment for 12 years. He appealed, raising several claims of error, among them an allegation that the trial court had violated his constitutional rights by "threatening and harassing" the sole witness for his defense, so that the witness refused to testify. The Court of Criminal Appeals of Texas affirmed his conviction, 480 S. W. 2d 398 (1972). We grant the motion for leave to proceed in forma pauperis and the petition for a writ of certiorari and reverse the petitioner's conviction.
The record shows that, after the prosecution had rested its case, the jury was temporarily excused. During this recess, the petitioner called his only witness, Leslie Max Mills, who had a prior criminal record and was then serving a prison sentence. At this point, the trial judge, on his own initiative, undertook to admonish the witness as follows:
"Now you have been called down as a witness in this case by the Defendant. It is the Court's duty to admonish you that you don't have to testify, that anything you say can and will be used against you.
[409
U.S. 95, 96]
If you take the witness stand and lie under oath, the Court will personally see that your case goes to the grand jury and you will be indicted for perjury and the liklihood [sic] is that you would get convicted of perjury and that it would be stacked onto what you have already got, so that is the matter you have got to make up your mind on. If you get on the witness stand and lie, it is probably going to mean several years and at least more time that you are going to have to serve. It will also be held against you in the penitentiary when you're up for parole and the Court wants you to thoroughly understand the chances you're taking by getting on that witness stand under oath. You may tell the truth and if you do, that is all right, but if you lie you can get into real trouble. The court wants you to know that. You don't owe anybody anything to testify and it must be done freely and voluntarily and with the thorough understanding that you know the hazard you are taking."
The petitioner's counsel objected to these comments, on the ground that the judge was exerting on the mind of the witness such duress that the witness could not freely and voluntarily decide whether or not to testify in the petitioner's behalf, and was thereby depriving the petitioner of his defense by coercing the only defense witness into refusing to testify. Counsel pointed out that none of the witnesses for the State had been so admonished. When the petitioner's counsel then indicated that he was nonetheless going to ask the witness to take the stand, the judge interrupted: "Counsel, you can state the facts, nobody is going to dispute it. Let him decline to testify." The witness then refused to testify for any purpose and was excused by the court. The petitioner's subsequent motion for a mistrial was overruled.
[409
U.S. 95, 97]
On appeal, the petitioner argued that the judge's conduct indicated a bias against the petitioner and deprived him of due process of law by driving his sole witness off the witness stand. The Court of Criminal Appeals rejected this contention, stating that, while it did not condone the manner of the admonition, the petitioner had made no objection until the admonition was completed, and there was no showing that the witness had been intimidated by the admonition or had refused to testify because of it.
We cannot agree. The suggestion that the petitioner or his counsel should have interrupted the judge in the middle of his remarks to object is, on this record, not a basis to ground a waiver of the petitioner's rights. The fact that Mills was willing to come to court to testify in the petitioner's behalf, refusing to do so only after the judge's lengthy and intimidating warning, strongly suggests that the judge's comments were the cause of Mills' refusal to testify.
The trial judge gratuitously singled out this one witness for a lengthy admonition on the dangers of perjury. But the judge did not stop at warning the witness of his right to refuse to testify and of the necessity to tell the truth.
*
Instead, the judge implied that he expected Mills to lie, and went on to assure him that if he lied, he would be prosecuted and probably convicted for perjury, that the sentence for that conviction would be added on to his present sentence, and that the result would be to impair his chances for parole. At least some of these threats may have been beyond the power of this judge to
[409
U.S. 95, 98]
carry out. Yet, in light of the great disparity between the posture of the presiding judge and that of a witness in these circumstances, the unnecessarily strong terms used by the judge could well have exerted such duress on the witness' mind as to preclude him from making a free and voluntary choice whether or not to testify.
"The right to offer the testimony of witnesses, and to compel their attendance, if necessary, is in plain terms the right to present a defense, the right to present the defendant's version of the facts as well as the prosecution's to the jury so it may decide where the truth lies. Just as an accused has the right to confront the prosecution's witnesses for the purpose of challenging their testimony, he has the right to present his own witnesses to establish a defense. This right is a fundamental element of due process of law."
In the circumstances of this case, we conclude that the judge's threatening remarks, directed only at the single witness for the defense, effectively drove that witness off the stand, and thus deprived the petitioner of due process of law under the Fourteenth Amendment. The admonition by the Texas Court of Criminal Appeals might well have given the trial judge guidance for future cases, but it did not serve to repair the infringement of the petitioner's due process rights under the Fourteenth Amendment.
"Once a witness swears to give truthful answers, there is no requirement to `warn him not to commit perjury or, conversely to direct him to tell the truth.' It would render the sanctity of the oath quite meaningless to require admonition to adhere to it."
The facts before us do not, in my opinion, justify the Court's summary disposition. Petitioner Webb (who, on a prior occasion, had been convicted on still another
[409
U.S. 95, 99]
burglary charge) was apprehended by the owner of a lumber business. The owner, armed with his shotgun, had driven to his office at three o'clock in the morning upon the activation of a burglar alarm. When he entered the building, the owner observed a broken window and an assortment of what he regarded as burglary tools on his desk. When men emerged from an adjacent room, a gun fight ensued. Two intruders escaped, but the owner, despite his having been shot twice, succeeded in holding the petitioner at gunpoint until police arrived.
Although the admonition given by the state trial judge to the sole witness proffered by the defense was obviously improper, sufficient facts have not been presented to this Court to demonstrate the depth of prejudice that requires a summary reversal. The admonition might prove far less offensive, and the conduct of the trial judge understandable, if, for example, as is indicated in petitioner's brief, p. 8, prepared by counsel and filed with the Texas Court of Criminal Appeals, the witness were known to have been called for the purpose of presenting an alibi defense. Against the backdrop of being caught on the premises and of apparently overwhelming evidence of guilt, offset only by a bare allegation of prejudice, I would deny the petition for certiorari and, as the Court so often has done, I would remit the petitioner to the relief available to him by way of a post-conviction proceeding with a full evidentiary hearing.
*
[
Footnote *
] Petitioner's counsel assured the Court of Criminal Appeals that the witness would not have been called "unless he had been previously interviewed and found to be helpful to the appellant's cause." Brief for Appellant on First Motion for Rehearing 7, Webb v. Texas, 480 S. W. 2d 398 (Ct. Crim. App. Tex. 1972). An evidentiary hearing would allow petitioner's trial counsel to outline the testimony that was expected from the witness.
A prior trial is mentioned in the record. An evidentiary hearing might reveal events at the prior trial that justified the trial judge's unusual concern about possible perjury.
[409
U.S. 95, 100]
|
{
"pile_set_name": "Pile-CC"
}
|
The Yankees will unveil their $155 million Japanese import on Wednesday night when they conclude their three-game series with the Baltimore Orioles.
Tanaka, who signed a seven-year, $155 million deal during the offseason after having a season for the ages in Nippon Professional Baseball, told reporters he was impressed by the stadium during the Yankees’ home opener on Monday.
“I got to see a glimpse of it when we came here for the big press conference back in February, but I was able to take a more thorough look at it (Monday) and I think this is just a very nice facility,” Tanaka said through an interpreter prior to Tuesday’s game, which the Orioles won 14-5.
“If you listen to the crowd, yes, of course it makes me feel at home,” Tanaka added.
Tanaka, who went 24-0 with a 1.27 ERA for Rakuten of the Japan Pacific League last season, made his major league debut on Friday night in Toronto and, following a shaky start, ended up ruining the Blue Jays’ home opener.
The 25-year-old right-hander allowed three runs in the first two innings, but eventually settled in, giving up just two earned over seven frames, with eight strikeouts and no walks in the Yankees’ 7-3 victory.
In all, Tanaka threw 97 pitches, including 65 for strikes, displaying a fastball that hovered around 92-93 mph, a splitter that fell off the table, and, especially as he went through the lineup a third time, a change of speeds that was enough to keep the Blue Jays’ power hitters off-balance.
The Orioles figure to pose the same kinds of problems as the Jays, as they feature a lineup with several players with power who feast on mistakes.
Tanaka said his success Wednesday will be predicated on making the types of adjustments he made in his first start.
“I always tell this to you guys, but for me, it’s all about the mechanics of how I pitch,” he said. “That said, I know what I need to fix.”
|
{
"pile_set_name": "Pile-CC"
}
|
San Juan Record Classifieds, Events, Businesses In Monticello, San Juan County, Utah
Sep 26, 2012 | 3907 views | 0 | 10 | |
The San Juan County Commission is instigating a new policy in an attempt to more effectively “transact the business of the county,” according to Commission Chairman Bruce Adams.
“Our meetings are open to the public, but they are not public hearings,” said Adams at the September 24 commission meeting.
Members of the public will not be allowed to speak, unless they are invited or during public comment periods. Public comment is limited to those who fill out a form and will be limited to three to five minutes.
A member of the public can reserve a spot on the commission agenda if they contact the county clerk by noon on Friday.
“Commission meetings are not a forum for political grandstanding,” said Adams, “and not a forum for lengthy expressions of personal opinion.”
Recent commission meetings have been marked by sometimes lengthy and wide-ranging comments by members of the audience. It has clearly been a source of frustration for Commissioners and other audience members alike.
The first order of business on the agenda was by Blanding resident Marilyn Boynton, who asked that the commission record budget work sessions and put official commission communications on the agenda.
Adams responded tersely, “We will refer the matter to our attorney and will abide by the law” before moving on to the next item on the agenda.
County Assessor Howard Randall asked the commission to address three property issues in the Board of Equalization (BOE). Commissioners approved lowering the value of a mobile home that caught fire early in the year and zeroing out taxes and abating previous taxes for a property that does not exist on the ground.
Commissioners rejected a request by Design Build Bluff to abate taxes on a property, primarily because the application window had passed. Commissioners suggested that they could be exempt from property tax in future years.
While in the BOE, Commissioners also adjusted the valuation of the car wash in Blanding owned by Shelby Seely.
The valuation listed nearly $200,000 in equipment at the car wash. Seely argues that the equipment does not exist.
Commissioner Phil Lyman expressed frustration at the process, stating that he thought it had been resolved in the past, but it keeps coming back.
Lyman mentioned that questions about the valuation had triggered an audit by the IRS. Seely is a client of Lyman’s private accounting firm.
“We need to get specific because this issue hinges on a specific piece of equipment that does not exist,” said Lyman.
Commissioners agreed to lower the valuation and refund taxes and penalties that had been paid on the property.
In other matters, Kim Palmer and Lisa Rarick were appointed to the Blanding Cemetery District.
Shane Shumway was appointed to a board that will make a recommendation for a new justice court judge in Blanding. Jim Harris will retire as judge in December.
County Clerk Norman Johnson outlined the process to prepare property tax notifications. After the BOE process, the tax rolls will be prepared, abatements will be applied, and notices sent to property owners by mid-October. Property taxes are due by December 1.
Johnson added that general election ballots have been mailed to overseas residents and military personnel.
Commissioners determined that the Utah Navajo Fair Board is responsible for expenditures related to the annual fair. Some fair board members are concerned about banking accounts held by the fair, which receives $50,000 from the county to help operate the Bluff-based event.
Commissioners suggested that the fair board is responsible for expenditures and added that if people have concerns, they should be referred to local law enforcement agencies. County Administrator Rick Bailey suggested that if the use of funds is questionable, the county may withhold funds for future fairs.
The fair board is set to meet on Thursday.
Commissioners approved how $912,795 in Safe Rural Schools (SRS) funding will be applied by the county. Of the total, 85 percent will be sent to the transportation service district, eight percent for US Forest Service RAC for transportation projects and the remainder for local projects such as laptop computers for fire vehicles and funds for community wildfire projects.
The county will forward $150,000 of the $223,000 due for a new Viper 911 system that is currently being installed by Frontier Communications.
The project is nearly complete, with a handful of items still on the punch list. Officials state that the new system is working well, with a few glitches.
Bailey stated that the signal for local Salt Lake City television stations will be interrupted overnight on October 13-15 for maintenance. The signals were also interrupted over the past weekend.
Commissioners submitted a letter to Senator Hatch asking to suspend US Department of Agriculture (USDA) rules in order to help local ranchers impacted by drought conditions.
The USDA can help defer the costs of shipping water to livestock in three of every ten years. Since local ranchers have used the program in 2006, 2007 and 2009, they are not eligible this year. Commissioners argue that the “3 in 10” rule was created to deal with flood conditions and not drought conditions. They ask that the rule be suspended.
Adams read a letter responding to Lyman’s letter last week regarding a November, 2011 commission letter of support to the US Fish and Wildlife Service. Lyman had rescinded his support of the 2011 letter, stating that he wasn’t aware the letter addressed the sale of private land owned by Adams.
Adams said that Lyman was fully aware of the sale of Gunnison sage grouse habitat to the Nature Conservancy. He added that there was “no attempt on my part to misrepresent any aspect of the project”.
He added that the effort to take steps to avoid a federal designation is consistent with local efforts for the past 15 years and said he is hopeful that Lyman will reinstate his support for the project.
Adams said it was “nothing more than clumsy political drama to suggest that there is a conflict of interest.”
The San Juan Record welcomes comments on our stories. Please be civil, respectful, focused and humane. Postings are not edited and are the responsibility of the author. You agree not to post comments that are abusive, threatening or obscene. Postings may be removed at the discretion of sjrnews.com
|
{
"pile_set_name": "Pile-CC"
}
|
Send me email updates about messages I've received
on the site and the latest news from The CafeMom Team.By signing up, you certify that
you are female and accept the Terms of Service and have read the
Privacy Policy.
OB call after ultrasound...?
Hi ladies.
I went for my second early internal ultrasound. I had to go at 5 weeks do to light spotting and all was well with a 101bpm. She did tell me I was 4.5 weeks which was a week behind what I'd estimated.Today at my second, the nurse assured me that all seemed well. It had a 164bpm which she said is normal and that I was ranging at 7.5 weeks. So now I'm back on track...not sure why I was a week behind the last time... Anyway, she looked at my ovaries and looked particularly long on the right side. She was quiet and I watched her patiently. She didn't say anything but afterwards said everything looked normal and to try and relax. I asked her about a due date and that's actually when she went into my being 7.5 weeks with a July 7th due date. She then told me that the doctor would look it over and call me tomorrow cause he has to do all that. He didn't last time, and I was wondering if it was because she thought something may be wrong. When I called them back to inquire about what he may be calling about, the receptionist just said nurses and ultrasound techs can't really tell much and the doctor goes over everything and calls with all the details.
Should I be concerned or does this sound routine? Did he not call last time because it was so early and I was scheduled for a follow up anyways? Just wanting some opinions!
techs will tell you stuff if you beg and promise not to tell the doc. they know a lot!! yeah it does sound concerning. i have had situations like - the ob is at the hospital when i get my second US ... so they are supposed to look it over and get back in touch with me - they never called me though - it was just mentioned at the next appt that everything was fine.... then again how big is the practice - they Could just be calling to tell you it was fine, or you havea long ovary or something... i would keep calling them until they got bothered enough to make the doc take the phone.
The doctor has to look at it too. The tech isnt suppose to tell you anything even if they see something.
Answer by
Anonymous
at 2:39 PM on Nov. 23, 2010
The only time i had a tech was when i had my 20 week and 37 week u/s, in the beginning my OB did it all and if something was wrong he said it then and there. So this is all new to me with them doing it that way. I personally wouldn't like going to a doctor that dosen't do u/s him or herself. but that's me. But i hope all is well for u and that everything work's out. Good Luck!!!
and after those visit the Dr would look over them and talk about them on the next visit if it wasn't bad, but if something was wrong the tech would call the Dr in the room while she was doing it. like the did with my sister-in-law.
|
{
"pile_set_name": "Pile-CC"
}
|
Q:
how to get a textbox value from dynamically created div
I am creating dynamic div with html elements and i need to get value that textbox
This is my dynamic created content now i need to get the
<div id="TextBoxContainer">
<div id="newtextbox1"> // this id is dynamic id
<div class="row cells2">
<div class="cell">
<label>Patient Name</label>
<div class="input-control text full-size">
<input type="text" id="PatientName1" placeholder="Patient Name"/> // this id is dynamic id
</div>
</div>
<div class="cell">
<label>Patient ICNo</label>
<div class="input-control text full-size" >
<input type="text" id="PatientICNo" placeholder="Patient ICNo"/>
</div>
</div>
</div>
</div>
</div>
here i am trying to get value in jquery
if ($("#TextBoxContainer") != null && $("#TextBoxContainer").length > 0) {
var count = 1;
$("#TextBoxContainer").each(function () {
debugger;
var Pid = "input#PatientName" + count;
var childdiv = "div#newtextbox" + count;
count++;
var patientname = $(this).closest(childdiv).children(Pid).val();
});
}
A:
Here you go with a solution https://jsfiddle.net/p9ywL4pm/1/
if ($("#TextBoxContainer") != null && $("#TextBoxContainer").length > 0) {
var count = 1;
$("#TextBoxContainer").children().each(function () {
var Pid = "input#PatientName" + count;
var patientname = $(this).find(Pid).val();
console.log(Pid, patientname);
count++;
});
}
<script src="https://ajax.googleapis.com/ajax/libs/jquery/2.1.1/jquery.min.js"></script>
<div id="TextBoxContainer">
<div id="newtextbox1">
<div class="row cells2">
<div class="cell">
<label>Patient Name</label>
<div class="input-control text full-size">
<input type="text" id="PatientName1" placeholder="Patient Name" />
</div>
</div>
<div class="cell">
<label>Patient ICNo</label>
<div class="input-control text full-size" >
<input type="text" id="PatientICNo" placeholder="Patient ICNo"/>
</div>
</div>
</div>
</div>
<div id="newtextbox2">
<div class="row cells2">
<div class="cell">
<label>Patient Name</label>
<div class="input-control text full-size">
<input type="text" id="PatientName2" placeholder="Patient Name"/>
</div>
</div>
<div class="cell">
<label>Patient ICNo</label>
<div class="input-control text full-size" >
<input type="text" id="PatientICNo" placeholder="Patient ICNo"/>
</div>
</div>
</div>
</div>
</div>
I considered two child elements inside #TextBoxContainer container.
Change the #PatientICNo input to
<input type="text" class="PatientICNo" placeholder="Patient ICNo"/>
Use class instead of ID because ID need to unique.
Hope this will help you.
|
{
"pile_set_name": "StackExchange"
}
|
Q:
NoSuchMethodError while parsing xsd to generate classes using JAXB
I'm new to JAXB. I'm trying to parse the xsd to generate the jaxb classes.
It works fine with other xsd files but the one I'm trying to parse now is generating exceptions.
This is the stack trace
parsing a schema...
Exception in thread "main" java.lang.NoSuchMethodError: com.sun.xml.bind.v2.runtime.JAXBContextImpl.<init>([Ljava/lang/Class;Ljava/util/Collection;Ljava/util/Map;Ljava/lang/String;ZLcom/sun/xml/bind/v2/model/annotation/RuntimeAnnotationReader;ZZ)V
at com.sun.tools.xjc.reader.xmlschema.bindinfo.BindInfo.getJAXBContext(BindInfo.java:332)
at com.sun.tools.xjc.reader.xmlschema.bindinfo.AnnotationParserFactoryImpl$1.<init>(AnnotationParserFactoryImpl.java:80)
at com.sun.tools.xjc.reader.xmlschema.bindinfo.AnnotationParserFactoryImpl.create(AnnotationParserFactoryImpl.java:79)
at com.sun.xml.xsom.impl.parser.NGCCRuntimeEx.createAnnotationParser(NGCCRuntimeEx.java:323)
at com.sun.xml.xsom.impl.parser.state.annotation.action0(annotation.java:48)
at com.sun.xml.xsom.impl.parser.state.annotation.enterElement(annotation.java:73)
at com.sun.xml.xsom.impl.parser.state.NGCCRuntime.sendEnterElement(NGCCRuntime.java:378)
at com.sun.xml.xsom.impl.parser.state.NGCCHandler.spawnChildFromEnterElement(NGCCHandler.java:74)
at com.sun.xml.xsom.impl.parser.state.complexType.enterElement(complexType.java:500)
at com.sun.xml.xsom.impl.parser.state.NGCCRuntime.sendEnterElement(NGCCRuntime.java:378)
at com.sun.xml.xsom.impl.parser.state.NGCCHandler.revertToParentFromEnterElement(NGCCHandler.java:111)
at com.sun.xml.xsom.impl.parser.state.foreignAttributes.enterElement(foreignAttributes.java:50)
at com.sun.xml.xsom.impl.parser.state.NGCCRuntime.sendEnterElement(NGCCRuntime.java:378)
at com.sun.xml.xsom.impl.parser.state.NGCCHandler.spawnChildFromEnterElement(NGCCHandler.java:74)
at com.sun.xml.xsom.impl.parser.state.complexType.enterElement(complexType.java:255)
at com.sun.xml.xsom.impl.parser.state.NGCCRuntime.sendEnterElement(NGCCRuntime.java:378)
at com.sun.xml.xsom.impl.parser.state.complexType.enterElement(complexType.java:373)
at com.sun.xml.xsom.impl.parser.state.NGCCRuntime.sendEnterElement(NGCCRuntime.java:378)
at com.sun.xml.xsom.impl.parser.state.complexType.enterElement(complexType.java:213)
at com.sun.xml.xsom.impl.parser.state.NGCCRuntime.sendEnterElement(NGCCRuntime.java:378)
at com.sun.xml.xsom.impl.parser.state.complexType.enterElement(complexType.java:347)
at com.sun.xml.xsom.impl.parser.state.NGCCRuntime.sendEnterElement(NGCCRuntime.java:378)
at com.sun.xml.xsom.impl.parser.state.complexType.enterElement(complexType.java:305)
at com.sun.xml.xsom.impl.parser.state.NGCCRuntime.sendEnterElement(NGCCRuntime.java:378)
at com.sun.xml.xsom.impl.parser.state.complexType.enterElement(complexType.java:464)
at com.sun.xml.xsom.impl.parser.state.NGCCRuntime.startElement(NGCCRuntime.java:219)
at org.xml.sax.helpers.XMLFilterImpl.startElement(XMLFilterImpl.java:551)
at com.sun.tools.xjc.util.SubtreeCutter.startElement(SubtreeCutter.java:104)
at com.sun.tools.xjc.reader.ExtensionBindingChecker.startElement(ExtensionBindingChecker.java:144)
at org.xml.sax.helpers.XMLFilterImpl.startElement(XMLFilterImpl.java:551)
at com.sun.tools.xjc.reader.xmlschema.parser.IncorrectNamespaceURIChecker.startElement(IncorrectNamespaceURIChecker.java:113)
at org.xml.sax.helpers.XMLFilterImpl.startElement(XMLFilterImpl.java:551)
at com.sun.tools.xjc.reader.xmlschema.parser.CustomizationContextChecker.startElement(CustomizationContextChecker.java:188)
at org.xml.sax.helpers.XMLFilterImpl.startElement(XMLFilterImpl.java:551)
at com.sun.tools.xjc.ModelLoader$SpeculationChecker.startElement(ModelLoader.java:455)
at org.xml.sax.helpers.XMLFilterImpl.startElement(XMLFilterImpl.java:551)
at com.sun.tools.xjc.reader.internalizer.VersionChecker.startElement(VersionChecker.java:98)
at org.xml.sax.helpers.XMLFilterImpl.startElement(XMLFilterImpl.java:551)
at com.sun.org.apache.xerces.internal.parsers.AbstractSAXParser.startElement(AbstractSAXParser.java:509)
at com.sun.org.apache.xerces.internal.impl.XMLNSDocumentScannerImpl.scanStartElement(XMLNSDocumentScannerImpl.java:380)
at com.sun.org.apache.xerces.internal.impl.XMLDocumentFragmentScannerImpl$FragmentContentDriver.next(XMLDocumentFragmentScannerImpl.java:2787)
at com.sun.org.apache.xerces.internal.impl.XMLDocumentScannerImpl.next(XMLDocumentScannerImpl.java:606)
at com.sun.org.apache.xerces.internal.impl.XMLNSDocumentScannerImpl.next(XMLNSDocumentScannerImpl.java:118)
at com.sun.org.apache.xerces.internal.impl.XMLDocumentFragmentScannerImpl.scanDocument(XMLDocumentFragmentScannerImpl.java:510)
at com.sun.org.apache.xerces.internal.parsers.XML11Configuration.parse(XML11Configuration.java:848)
at com.sun.org.apache.xerces.internal.parsers.XML11Configuration.parse(XML11Configuration.java:777)
at com.sun.org.apache.xerces.internal.parsers.XMLParser.parse(XMLParser.java:141)
at com.sun.org.apache.xerces.internal.parsers.AbstractSAXParser.parse(AbstractSAXParser.java:1213)
at com.sun.org.apache.xerces.internal.jaxp.SAXParserImpl$JAXPSAXParser.parse(SAXParserImpl.java:643)
at org.xml.sax.helpers.XMLFilterImpl.parse(XMLFilterImpl.java:357)
at com.sun.xml.xsom.parser.JAXPParser.parse(JAXPParser.java:79)
at com.sun.tools.xjc.ModelLoader$2.parse(ModelLoader.java:479)
at com.sun.tools.xjc.ModelLoader$XMLSchemaParser.parse(ModelLoader.java:262)
at com.sun.xml.xsom.impl.parser.NGCCRuntimeEx.parseEntity(NGCCRuntimeEx.java:301)
at com.sun.xml.xsom.impl.parser.ParserContext.parse(ParserContext.java:88)
at com.sun.xml.xsom.parser.XSOMParser.parse(XSOMParser.java:147)
at com.sun.tools.xjc.ModelLoader.createXSOMSpeculative(ModelLoader.java:496)
at com.sun.tools.xjc.ModelLoader.loadXMLSchema(ModelLoader.java:366)
at com.sun.tools.xjc.ModelLoader.load(ModelLoader.java:167)
at com.sun.tools.xjc.ModelLoader.load(ModelLoader.java:113)
at com.sun.tools.xjc.Driver.run(Driver.java:313)
at com.sun.tools.xjc.Driver.run(Driver.java:191)
at com.sun.tools.xjc.Driver._main(Driver.java:116)
at com.sun.tools.xjc.Driver.access$000(Driver.java:74)
at com.sun.tools.xjc.Driver$1.run(Driver.java:96)
here is the xsd link:XSD FILE
A:
It looks like you have incompatible libraries in your classpath.
Look which Version of jaxb-xjc.jar and jaxb-impl you have in your classpath
|
{
"pile_set_name": "StackExchange"
}
|
The Witcher is getting the anime film treatment from Netflix, which recently also launched a popular live-action series based on the books by Polish writer Andrzej Sapkowski. With the Henry Cavill-starring series proving to be a major success for the streaming service, Netflix is hoping that lightning strikes twice with the anime movie.
The animated film is called The Witcher: Nightmare of the Wolf and it comes from Lauren Hissrich and Beau DeMayo, who are both producers on the live-action series, as well as Studio Mir, the animation studio best known for Voltron: Legendary Defender and The Legend of Korra.
According to a description of the movie via Eurogamer, Nightmare of the Wolf will center on Geralt’s mentor, Vesemir: “Long before mentoring Geralt, Vesemir begins his own journey as a witcher after the mysterious Deglan claims him through the Law of Surprise.” This is a prequel, then, delving into the man who shaped Geralt into the witcher he would become.
No casting has been revealed yet, although fans have been petitioning for Mark Hamill to play Vesemir on the live-action series. Hamill, who is known for his excellent voice work, has said on Twitter that he’d be interested in the role, although he admitted that he hadn’t heard of The Witcher before the fan casting began. Time will tell if this particular dream comes true.
|
{
"pile_set_name": "OpenWebText2"
}
|
If this is your first visit, be sure to check out the FAQ by clicking the link above.
You may have to register before you can post: click the register link above to proceed.
To start viewing messages, select the forum that you want to visit from the selection below.
Modern (Wedge Head) Siamese has 2 types. First type is the regular
Modern (Wedge Head) Siamese. Second type is Modern (Wedge Head) Pure
Bred (Pedigreed) Siamese.
Yes the major difference between Modern (Wedge Head) Siamese cat and
Traditional (Apple Head) Siamese cat obvisouly is thier slander body
shape as well as the small wedge head with its exaggerated pair of big
ears and a pair of deep vivid blue eyes. Let me use the human body as
an example to illustrate the difference between them. Traditional
(Apple Head) Siamese is as if you are picturing a heavy weight (250
lbs and beyond) of a female body. On the other hand, Modern (Wedge
Head) Siamese as if you are picturing a slim, fit, athletic, and
healthy body with perfect proportional bone and muscle structures (110
lbs and less) of a female.
For the temperament and health, Modern (Wedge Head) Pure Bred
(Pedigreed) Siamese cats are far more better than Traditional (Apple
Head) Siamese cats and Modern (Wedge Head) Non Pure Bred (Non
Pedigreed) Siamese cats. Modern (Wedge Head) Pure Bred (Pedigreed)
Siamese cats are going back to its origin stage of the true Siamese.
Their origin stage has an excellent temperament with human beings from
the age of 0 years old to the age of 100 years old and beyond. This
origin stage temperament is very stable as if a guardian of human
beings. They used to be called the temple of guardian. Their origin
stage has a beyond excellent health, too. Otherwise, how to be the
temple of guardian without excellent health?
To own a Modern (Wedge Head) Pure Bred (Pedigreed) Siamese kitten is
very expensive. Each of their cost is more than USD $1,500. However,
not every person can actually afford it financially. Fortunatelly,
some breeders would like to introduce the most beautiful and
exceptional high quality Modern (Wedge Head) Pure Bred (Pedigreed)
Siamese to all cat lovers by sacrifing its expensive market price.
Therefore, there are still some but not very many of this kind of
experienced Modern (Wedge Haed) Pure Bred (Pedigreed) Siamese cat
breeders want to sell you thier kittens below the market price.
Modern Siame Cattery has over 50 years breeding experiences of Modern
(Wedge Head) Pure Bred (Pedigreed) Siamese. Modern Siame Cattery
registered under the world famous Cat Fanciers' Association (CFA) in
the United States. You may visit the world wide web http://www.kitten4u.com
to contact "Modern Siame Cattery" to own your very first Modern (Wedge
Haed) Pure Bred (Pedigreed) Siamese kitten by paying below the market
price ($650 per kitten with Grand Championship blood line from
kitten's parents and ancestors).
If you are truely Siamese cat lovers, you must inquire a Modern (Wedge
Head) Pure Bred (Pedigreed) Siamese kitten from Modern Siame Cattery
immediately. Good thing won't last!!!
"Kitten4u.com" wrote in message
...
Modern (Wedge Head) Siamese has 2 types. First type is the regular
Modern (Wedge Head) Siamese. Second type is Modern (Wedge Head) Pure
Bred (Pedigreed) Siamese.
Yes the major difference between Modern (Wedge Head) Siamese cat and
Traditional (Apple Head) Siamese cat obvisouly is thier slander body
shape as well as the small wedge head with its exaggerated pair of big
ears and a pair of deep vivid blue eyes. Let me use the human body as
an example to illustrate the difference between them. Traditional
(Apple Head) Siamese is as if you are picturing a heavy weight (250
lbs and beyond) of a female body. On the other hand, Modern (Wedge
Head) Siamese as if you are picturing a slim, fit, athletic, and
healthy body with perfect proportional bone and muscle structures (110
lbs and less) of a female.
For the temperament and health, Modern (Wedge Head) Pure Bred
(Pedigreed) Siamese cats are far more better than Traditional (Apple
Head) Siamese cats and Modern (Wedge Head) Non Pure Bred (Non
Pedigreed) Siamese cats. Modern (Wedge Head) Pure Bred (Pedigreed)
Siamese cats are going back to its origin stage of the true Siamese.
Their origin stage has an excellent temperament with human beings from
the age of 0 years old to the age of 100 years old and beyond. This
origin stage temperament is very stable as if a guardian of human
beings. They used to be called the temple of guardian. Their origin
stage has a beyond excellent health, too. Otherwise, how to be the
temple of guardian without excellent health?
To own a Modern (Wedge Head) Pure Bred (Pedigreed) Siamese kitten is
very expensive. Each of their cost is more than USD $1,500. However,
not every person can actually afford it financially. Fortunatelly,
some breeders would like to introduce the most beautiful and
exceptional high quality Modern (Wedge Head) Pure Bred (Pedigreed)
Siamese to all cat lovers by sacrifing its expensive market price.
Therefore, there are still some but not very many of this kind of
experienced Modern (Wedge Haed) Pure Bred (Pedigreed) Siamese cat
breeders want to sell you thier kittens below the market price.
Modern Siame Cattery has over 50 years breeding experiences of Modern
(Wedge Head) Pure Bred (Pedigreed) Siamese. Modern Siame Cattery
registered under the world famous Cat Fanciers' Association (CFA) in
the United States. You may visit the world wide web http://www.kitten4u.com
to contact "Modern Siame Cattery" to own your very first Modern (Wedge
Haed) Pure Bred (Pedigreed) Siamese kitten by paying below the market
price ($650 per kitten with Grand Championship blood line from
kitten's parents and ancestors).
If you are truely Siamese cat lovers, you must inquire a Modern (Wedge
Head) Pure Bred (Pedigreed) Siamese kitten from Modern Siame Cattery
immediately. Good thing won't last!!!
"Kitten4u.com" wrote in message
...
Modern (Wedge Head) Siamese has 2 types. First type is the regular
Modern (Wedge Head) Siamese. Second type is Modern (Wedge Head) Pure
Bred (Pedigreed) Siamese.
Yes the major difference between Modern (Wedge Head) Siamese cat and
Traditional (Apple Head) Siamese cat obvisouly is thier slander body
shape as well as the small wedge head with its exaggerated pair of big
ears and a pair of deep vivid blue eyes. Let me use the human body as
an example to illustrate the difference between them. Traditional
(Apple Head) Siamese is as if you are picturing a heavy weight (250
lbs and beyond) of a female body. On the other hand, Modern (Wedge
Head) Siamese as if you are picturing a slim, fit, athletic, and
healthy body with perfect proportional bone and muscle structures (110
lbs and less) of a female.
For the temperament and health, Modern (Wedge Head) Pure Bred
(Pedigreed) Siamese cats are far more better than Traditional (Apple
Head) Siamese cats and Modern (Wedge Head) Non Pure Bred (Non
Pedigreed) Siamese cats. Modern (Wedge Head) Pure Bred (Pedigreed)
Siamese cats are going back to its origin stage of the true Siamese.
Their origin stage has an excellent temperament with human beings from
the age of 0 years old to the age of 100 years old and beyond. This
origin stage temperament is very stable as if a guardian of human
beings. They used to be called the temple of guardian. Their origin
stage has a beyond excellent health, too. Otherwise, how to be the
temple of guardian without excellent health?
To own a Modern (Wedge Head) Pure Bred (Pedigreed) Siamese kitten is
very expensive. Each of their cost is more than USD $1,500. However,
not every person can actually afford it financially. Fortunatelly,
some breeders would like to introduce the most beautiful and
exceptional high quality Modern (Wedge Head) Pure Bred (Pedigreed)
Siamese to all cat lovers by sacrifing its expensive market price.
Therefore, there are still some but not very many of this kind of
experienced Modern (Wedge Haed) Pure Bred (Pedigreed) Siamese cat
breeders want to sell you thier kittens below the market price.
Modern Siame Cattery has over 50 years breeding experiences of Modern
(Wedge Head) Pure Bred (Pedigreed) Siamese. Modern Siame Cattery
registered under the world famous Cat Fanciers' Association (CFA) in
the United States. You may visit the world wide web http://www.kitten4u.com
to contact "Modern Siame Cattery" to own your very first Modern (Wedge
Haed) Pure Bred (Pedigreed) Siamese kitten by paying below the market
price ($650 per kitten with Grand Championship blood line from
kitten's parents and ancestors).
If you are truely Siamese cat lovers, you must inquire a Modern (Wedge
Head) Pure Bred (Pedigreed) Siamese kitten from Modern Siame Cattery
immediately. Good thing won't last!!!
"Kitten4u.com" wrote in message
....
Modern (Wedge Head) Siamese has 2 types. First type is the regular
Modern (Wedge Head) Siamese. Second type is Modern (Wedge Head) Pure
Bred (Pedigreed) Siamese.
Yes the major difference between Modern (Wedge Head) Siamese cat and
Traditional (Apple Head) Siamese cat obvisouly is thier slander body
shape as well as the small wedge head with its exaggerated pair of big
ears and a pair of deep vivid blue eyes. Let me use the human body as
an example to illustrate the difference between them. Traditional
(Apple Head) Siamese is as if you are picturing a heavy weight (250
lbs and beyond) of a female body. On the other hand, Modern (Wedge
Head) Siamese as if you are picturing a slim, fit, athletic, and
healthy body with perfect proportional bone and muscle structures (110
lbs and less) of a female.
For the temperament and health, Modern (Wedge Head) Pure Bred
(Pedigreed) Siamese cats are far more better than Traditional (Apple
Head) Siamese cats and Modern (Wedge Head) Non Pure Bred (Non
Pedigreed) Siamese cats. Modern (Wedge Head) Pure Bred (Pedigreed)
Siamese cats are going back to its origin stage of the true Siamese.
Their origin stage has an excellent temperament with human beings from
the age of 0 years old to the age of 100 years old and beyond. This
origin stage temperament is very stable as if a guardian of human
beings. They used to be called the temple of guardian. Their origin
stage has a beyond excellent health, too. Otherwise, how to be the
temple of guardian without excellent health?
To own a Modern (Wedge Head) Pure Bred (Pedigreed) Siamese kitten is
very expensive. Each of their cost is more than USD $1,500. However,
not every person can actually afford it financially. Fortunatelly,
some breeders would like to introduce the most beautiful and
exceptional high quality Modern (Wedge Head) Pure Bred (Pedigreed)
Siamese to all cat lovers by sacrifing its expensive market price.
Therefore, there are still some but not very many of this kind of
experienced Modern (Wedge Haed) Pure Bred (Pedigreed) Siamese cat
breeders want to sell you thier kittens below the market price.
Modern Siame Cattery has over 50 years breeding experiences of Modern
(Wedge Head) Pure Bred (Pedigreed) Siamese. Modern Siame Cattery
registered under the world famous Cat Fanciers' Association (CFA) in
the United States. You may visit the world wide web http://www.kitten4u.com
to contact "Modern Siame Cattery" to own your very first Modern (Wedge
Haed) Pure Bred (Pedigreed) Siamese kitten by paying below the market
price ($650 per kitten with Grand Championship blood line from
kitten's parents and ancestors).
If you are truely Siamese cat lovers, you must inquire a Modern (Wedge
Head) Pure Bred (Pedigreed) Siamese kitten from Modern Siame Cattery
immediately. Good thing won't last!!!
BREEDERS ARE SOME OF THE LOWEST FORM OF SCUM IN THE WORLD.
SAVE A PET ADOPT FROM A SHELTER AND DONATE TO SAVE OTHERS.
What Matthew said.
Some prospective owners are too jealous of other people who can actually own one of the most beautiful high quality Modern Pedigreed Siamese. Therefore, please forgive those jealous prospective owners' harsh words and poor attitude. Let's bless those jealous prospective owners' little hearts.
As we mentioned earlier that the cost of Modern Pedigreed Siamese is expensive because of its beauty and high quality. Should you try hard enough to have one in order to show off to your friends and families?
We urge and recommend you to visit http://www.kitten4u.com for the true beauty of high quality Modern Pedigreed Siamese. May you successfully inquire a high quality Modern Pedigreed Siamese kitten from "Modern Siame Cattery"..
|
{
"pile_set_name": "Pile-CC"
}
|
Opting out
Opting out is a political expression that was formulated in Canada to describe the intention of a province to remove itself from a program administered by the federal government, or to exempt itself from a constitutional amendment that would transfer its legislative powers to Parliament.
Up until the 1960s, a province that did not participate in a shared-cost program would suffer a financial penalty for exercising this choice. The province of Quebec exercised this choice on occasion despite the financial cost. In the 1960s, negotiations between the federal and the Quebec governments led to tax abatements or fiscal compensation formulas which compensated the Quebec government when it opted out of federal programs.
Under the Constitution Act, 1982, the right for any province to opt out of future constitutional amendments that would transfer legislative powers from the provincial legislatures to Parliament is affirmed. Financial compensation is guaranteed for any province that opts out of such an amendment relating to education or other cultural matters. Under the Meech Lake and Charlottetown Accords, this financial compensation was to be extended to include any constitutional amendment that transferred any legislative powers, not just those relating to education or other cultural matters. However, neither the Meech Lake nor the Charlottetown Accords were ratified.
See also
Fiscal federalism
Opt-outs in the European Union
External links
website explaining the history of the opting out formulas
Category:Federalism
Category:Government in Canada
|
{
"pile_set_name": "Wikipedia (en)"
}
|
Selective tissue distribution of tibolone metabolites in mature ovariectomized female cynomolgus monkeys after multiple doses of tibolone.
Tibolone is a selective tissue estrogenic activity regulator (STEAR). In postmenopausal women, it acts as an estrogen on brain, vagina, and bone, but not on endometrium and breast. Despite ample supporting in vitro data for tissue-selective actions, confirmative tissue levels of tibolone metabolites are not available. Therefore, we analyzed tibolone and metabolites in plasma and tissues from six ovariectomized cynomolgus monkeys that received tibolone (0.5 mg/kg/day by gavage) for 36 days and were necropsied at 1, 1.25, 2.25, 4, 6, and 24 h after the final dose. The plasma and tissue levels of active, nonsulfated (tibolone, 3alpha-hydroxytibolone, 3beta-hydroxytibolone, and Delta(4)-tibolone), monosulfated (3alpha-sulfate,17beta-hydroxytibolone and 3beta-sulfate,17beta-hydroxytibolone), and disulfated (3alpha,17beta-disulfated-tibolone and 3beta,17betaS-disulfated-tibolone) metabolites were measured by validated gas chromatography with mass spectrometry and liquid chromatography with tandem mass spectrometry. Detection limits were 0.1 to 0.5 ng/ml (plasma) and 0.5 to 2 ng/g (tissues). In brain tissues, estrogenic 3alpha-hydroxytibolone was predominant with 3 to 8 times higher levels than in plasma; levels of sulfated metabolites were low. In vaginal tissues, major nonsulfated metabolites were 3alpha-hydroxytibolone and the androgenic/progestagenic Delta(4)-tibolone; disulfated metabolites were predominant. Remarkably high levels of monosulfated metabolites were found in the proximal vagina. In endometrium, myometrium, and mammary glands, levels of 3-hydroxymetabolites were low and those of sulfated metabolites were high (about 98% disulfated). Delta(4)-Tibolone/3-hydroxytibolone ratios were 2 to 3 in endometrium, about equal in breast and proximal vagina, and 0.1 in plasma and brain. It is concluded that tibolone metabolites show a unique tissue-specific distribution pattern explaining the tissue effects in monkeys and the clinical effects in postmenopausal women.
|
{
"pile_set_name": "PubMed Abstracts"
}
|
// Acorn is a tiny, fast JavaScript parser written in JavaScript.
//
// Acorn was written by Marijn Haverbeke, Ingvar Stepanyan, and
// various contributors and released under an MIT license.
//
// Git repositories for Acorn are available at
//
// http://marijnhaverbeke.nl/git/acorn
// https://github.com/ternjs/acorn.git
//
// Please use the [github bug tracker][ghbt] to report issues.
//
// [ghbt]: https://github.com/ternjs/acorn/issues
//
// This file defines the main parser interface. The library also comes
// with a [error-tolerant parser][dammit] and an
// [abstract syntax tree walker][walk], defined in other files.
//
// [dammit]: acorn_loose.js
// [walk]: util/walk.js
import {Parser} from "./state"
import "./parseutil"
import "./statement"
import "./lval"
import "./expression"
import "./location"
export {Parser, plugins} from "./state"
export {defaultOptions} from "./options"
export {Position, SourceLocation, getLineInfo} from "./locutil"
export {Node} from "./node"
export {TokenType, types as tokTypes} from "./tokentype"
export {TokContext, types as tokContexts} from "./tokencontext"
export {isIdentifierChar, isIdentifierStart} from "./identifier"
export {Token} from "./tokenize"
export {isNewLine, lineBreak, lineBreakG} from "./whitespace"
export const version = "2.7.0"
// The main exported interface (under `self.acorn` when in the
// browser) is a `parse` function that takes a code string and
// returns an abstract syntax tree as specified by [Mozilla parser
// API][api].
//
// [api]: https://developer.mozilla.org/en-US/docs/SpiderMonkey/Parser_API
export function parse(input, options) {
return new Parser(options, input).parse()
}
// This function tries to parse a single expression at a given
// offset in a string. Useful for parsing mixed-language formats
// that embed JavaScript expressions.
export function parseExpressionAt(input, pos, options) {
let p = new Parser(options, input, pos)
p.nextToken()
return p.parseExpression()
}
// Acorn is organized as a tokenizer and a recursive-descent parser.
// The `tokenizer` export provides an interface to the tokenizer.
export function tokenizer(input, options) {
return new Parser(options, input)
}
|
{
"pile_set_name": "Github"
}
|
Q:
Can ggplot change the direction of axis.ticks from downward to upward?
Something I want to realize is like the following:
You see the direction of the axis.ticks is upward.
So can ggplot make the direction of axis.ticks upward?
For now I can realize this
You can see the axis.ticks.length have been set to zero with the command of Axis Attributes · hadley/ggplot2 Wiki · GitHub
But this is not what I want and there seems little description of it online.
Thank you!
A:
I think this achieves your goal:
library(ggplot2)
library(grid)
gg <- ggplot(mtcars, aes(mpg, drat))
gg <- gg + geom_point(size=3)
gg <- gg + theme_bw()
gg <- gg + theme(axis.text.x=element_text(size=17, vjust=-0.25, color="black"))
gg <- gg + theme(axis.text.y=element_text(size=17, hjust=1, color="black"))
gg <- gg + theme(axis.ticks=element_line(color="black", size=0.5))
gg <- gg + theme(axis.ticks.length=unit(-0.25, "cm"))
gg <- gg + theme(axis.ticks.margin=unit(0.5, "cm"))
gg
We're just modifying the tick size and "reversing" the length then making sure the tick labels are positioned properly after that.
|
{
"pile_set_name": "StackExchange"
}
|
New York City’s school system is the largest in the country. It's also one of the most segregated.
One of the latest data points: Only seven black students were admitted to the elite Stuyvesant High School this year , out of 895 seats.
The system was already deeply divided when Mayor de Blasio, a former school board member whose children attended public schools, took office in 2014 .
Since then, he has made reducing inequality a cornerstone of his tenure.
Now, a panel he appointed wants to eliminate many of the gifted programs and selective admissions processes that have led to mostly white and Asian schools in a largely black and Hispanic school system.
[Eliminate gifted programs in New York? It’s a momentous decision for Mr. de Blasio.]
The problem
As The Times’s Eliza Shapiro wrote: “New York screens more students for its schools than any other city in the country, and those screened schools tend to have a disproportionately white and Asian enrollment.”
|
{
"pile_set_name": "OpenWebText2"
}
|
Q:
CSS framework with no Javascript
I need to built a website but I have specific instructions to not use javascript. In addition to that I also have to make one that work for iPhone/mobile devices (also no javascript). It's fine for me to switch style sheets base on devices with some PHP magic, so it doesn't have to be the same CSS file.
What I want to know is, what are some recommended CSS frameworks for either or both scenarios?
A:
You would use media queries to achieve this.
https://developer.mozilla.org/en-US/docs/CSS/Media_queries
The basic idea is to design from mobile up, or "responsive" design. You should google search that for more insight.
You then use such operators as
@media only screen and (max-width: 480px){
#content{
display:block;
}
}
for example, to define how a particular element changes for each view.
There are tons of resources for this that can be found with basic searches, so the need to outline in detail here is none.
You can also add in specific style sheets like so:
<link rel="stylesheet" media="all and (max-width: 480px)" href="http://foo.bar.com/stylesheet.css" />
if you want to separate the style sheets for each view.
good luck.
If you have specific questions, feel free to ask and I can update.
|
{
"pile_set_name": "StackExchange"
}
|
Q:
I am having trouble starting my node app in Bluemix
I am trying to start my node app in Bluemix and getting a weird error. My app works locally. I have copied a snippet out of my app below.
var express = require("express"),
app = express();
app.get("/", function (request, response) {
response.render("index");
});
app.listen(8080);
My app never starts in Bluemix. The error I am getting on Bluemix is below.
[11:07 AM] jsloyer@Jeffs-MacBook-Pro [testapp]>cf push myapp
Creating app myapp in org myemail@co.com / space demos as myemail@co.com...
OK
Creating route myapp.mybluemix.net...
OK
Binding myapp.mybluemix.net to myapp...
OK
Uploading myapp...
Uploading app files from: /Users/jsloyer/Downloads/testapp
Uploading 566, 2 files
Done uploading
OK
Starting app myapp in org myemail@co.com / space demos as myemail@co.com...
-----> Downloaded app package (4.0K)
-----> Node.js Buildpack Version: v1.15-20150331-2231
-----> Resetting git environment
TIP: Specify a node version in package.json
-----> Defaulting to latest stable node: 0.10.38
-----> Installing IBM SDK for Node.js from cache
-----> Checking and configuring service extensions
-----> Installing dependencies
npm WARN package.json bluemix-deploy@ No description
npm WARN package.json bluemix-deploy@ No repository field.
npm WARN package.json bluemix-deploy@ No README data
├── methods@0.1.0
├── parseurl@1.0.1
├── merge-descriptors@0.0.2
├── escape-html@1.0.1
├── debug@0.8.1
├── cookie-signature@1.0.3
├── fresh@0.2.2
├── range-parser@1.0.0
├── qs@0.6.6
├── buffer-crc32@0.2.1
├── cookie@0.1.0
├── path-to-regexp@0.1.2
├── accepts@1.0.0 (negotiator@0.3.0, mime@1.2.11)
├── send@0.2.0 (mime@1.2.11)
-----> Caching node_modules directory for future builds
-----> Cleaning up node-gyp and npm artifacts
-----> No Procfile found; Adding npm start to new Procfile
-----> Building runtime environment
-----> Checking and configuring service extensions
-----> Installing App Management
-----> Uploading droplet (8.9M)
0 of 1 instances running, 1 starting
0 of 1 instances running, 1 starting
0 of 1 instances running, 1 starting
0 of 1 instances running, 1 starting
0 of 1 instances running, 1 starting
0 of 1 instances running, 1 starting
0 of 1 instances running, 1 starting
0 of 1 instances running, 1 starting
0 of 1 instances running, 1 starting
0 of 1 instances running, 1 starting
0 of 1 instances running, 1 starting
0 of 1 instances running, 1 down
0 of 1 instances running, 1 down
0 of 1 instances running, 1 down
0 of 1 instances running, 1 starting
0 of 1 instances running, 1 starting
0 of 1 instances running, 1 starting
0 of 1 instances running, 1 starting
0 of 1 instances running, 1 starting
0 of 1 instances running, 1 starting
0 of 1 instances running, 1 starting
0 of 1 instances running, 1 starting
0 of 1 instances running, 1 starting
0 of 1 instances running, 1 starting
0 of 1 instances running, 1 down
0 of 1 instances running, 1 down
0 of 1 instances running, 1 down
0 of 1 instances running, 1 down
0 of 1 instances running, 1 starting
0 of 1 instances running, 1 starting
0 of 1 instances running, 1 starting
0 of 1 instances running, 1 starting
0 of 1 instances running, 1 starting
0 of 1 instances running, 1 starting
0 of 1 instances running, 1 starting
0 of 1 instances running, 1 starting
FAILED
Start app timeout
TIP: use 'cf logs myapp --recent' for more information
Here is the logs from when the app tries to deploy.
[11:10 AM] jeff@jeffs-mbp [node-red]>cf logs myapp --recent
Connected, dumping recent logs for app myapp in org myemail@co.com / space demos as myemail@co.com...
2015-04-09T11:07:12.97-0400 [API] OUT Created app with guid de2f73ce-e19a-4daa-b4a9-6ab59588a069
2015-04-09T11:07:16.60-0400 [API] OUT Updated app with guid de2f73ce-e19a-4daa-b4a9-6ab59588a069 ({"route"=>"e518e637-6b86-4110-8359-b8cdeda946e2"})
2015-04-09T11:07:48.28-0400 [DEA] OUT Got staging request for app with id de2f73ce-e19a-4daa-b4a9-6ab59588a069
2015-04-09T11:08:13.54-0400 [API] OUT Updated app with guid de2f73ce-e19a-4daa-b4a9-6ab59588a069 ({"state"=>"STARTED"})
2015-04-09T11:08:13.71-0400 [STG] OUT -----> Downloaded app package (4.0K)
2015-04-09T11:08:14.39-0400 [STG] OUT -----> Node.js Buildpack Version: v1.15-20150331-2231
2015-04-09T11:08:14.39-0400 [STG] OUT -----> Resetting git environment
2015-04-09T11:08:14.84-0400 [STG] OUT TIP: Specify a node version in package.json
2015-04-09T11:08:14.84-0400 [STG] OUT -----> Defaulting to latest stable node: 0.10.38
2015-04-09T11:08:14.84-0400 [STG] OUT -----> Installing IBM SDK for Node.js from cache
2015-04-09T11:08:15.27-0400 [STG] OUT -----> Checking and configuring service extensions
2015-04-09T11:08:15.39-0400 [STG] OUT -----> Installing dependencies
2015-04-09T11:08:16.14-0400 [STG] OUT npm WARN package.json bluemix-deploy@ No description
2015-04-09T11:08:16.14-0400 [STG] OUT npm WARN package.json bluemix-deploy@ No repository field.
2015-04-09T11:08:16.14-0400 [STG] OUT npm WARN package.json bluemix-deploy@ No README data
2015-04-09T11:08:18.57-0400 [STG] OUT ├── methods@0.1.0
2015-04-09T11:08:18.57-0400 [STG] OUT ├── parseurl@1.0.1
2015-04-09T11:08:18.57-0400 [STG] OUT ├── merge-descriptors@0.0.2
2015-04-09T11:08:18.57-0400 [STG] OUT ├── escape-html@1.0.1
2015-04-09T11:08:18.57-0400 [STG] OUT ├── debug@0.8.1
2015-04-09T11:08:18.57-0400 [STG] OUT ├── cookie-signature@1.0.3
2015-04-09T11:08:18.57-0400 [STG] OUT ├── fresh@0.2.2
2015-04-09T11:08:18.57-0400 [STG] OUT ├── range-parser@1.0.0
2015-04-09T11:08:18.57-0400 [STG] OUT ├── qs@0.6.6
2015-04-09T11:08:18.57-0400 [STG] OUT ├── buffer-crc32@0.2.1
2015-04-09T11:08:18.57-0400 [STG] OUT ├── cookie@0.1.0
2015-04-09T11:08:18.57-0400 [STG] OUT ├── path-to-regexp@0.1.2
2015-04-09T11:08:18.57-0400 [STG] OUT ├── accepts@1.0.0 (negotiator@0.3.0, mime@1.2.11)
2015-04-09T11:08:18.57-0400 [STG] OUT ├── send@0.2.0 (mime@1.2.11)
2015-04-09T11:08:18.64-0400 [STG] OUT -----> Caching node_modules directory for future builds
2015-04-09T11:08:18.69-0400 [STG] OUT -----> Cleaning up node-gyp and npm artifacts
2015-04-09T11:08:18.70-0400 [STG] OUT -----> No Procfile found; Adding npm start to new Procfile
2015-04-09T11:08:18.71-0400 [STG] OUT -----> Building runtime environment
2015-04-09T11:08:18.71-0400 [STG] OUT -----> Checking and configuring service extensions
2015-04-09T11:08:18.86-0400 [STG] OUT -----> Installing App Management
2015-04-09T11:08:19.07-0400 [STG] ERR
2015-04-09T11:08:22.56-0400 [STG] OUT -----> Uploading droplet (8.9M)
2015-04-09T11:08:29.25-0400 [DEA] OUT Starting app instance (index 0) with guid de2f73ce-e19a-4daa-b4a9-6ab59588a069
2015-04-09T11:08:56.16-0400 [App/0] OUT
2015-04-09T11:08:56.16-0400 [App/0] OUT > bluemix-deploy@ start /home/vcap/app
2015-04-09T11:08:56.16-0400 [App/0] OUT > node app.js
2015-04-09T11:09:55.54-0400 [DEA] ERR Instance (index 0) failed to start accepting connections
2015-04-09T11:09:55.58-0400 [API] OUT App instance exited with guid de2f73ce-e19a-4daa-b4a9-6ab59588a069 payload: {"cc_partition"=>"default", "droplet"=>"de2f73ce-e19a-4daa-b4a9-6ab59588a069", "version"=>"0d4e67c9-1c0c-4e11-bbfb-027bb45e0d67", "instance"=>"eab34911da3947a3bb1b9e2a5564da72", "index"=>0, "reason"=>"CRASHED", "exit_status"=>-1, "exit_description"=>"failed to accept connections within health check timeout", "crash_timestamp"=>1428592195}
2015-04-09T11:09:56.14-0400 [App/0] ERR
2015-04-09T11:10:28.80-0400 [DEA] OUT Starting app instance (index 0) with guid de2f73ce-e19a-4daa-b4a9-6ab59588a069
Any ideas?
A:
I found out it was an issue with Cloud Foundry starting my app.
In digging into my code I was trying to bind to port 8080 locally. That is fine, but however in Cloud Foundry you need to bind to a specified port. To do this you need to read an environment variable called VCAP_APP_PORT. I have pasted a code snippet below on how I fixed it.
var express = require("express"),
app = express();
var port = process.env.VCAP_APP_PORT || 8080;
app.get("/", function (request, response) {
response.render("index");
});
app.listen(port);
A:
Another suggestion: Add this prior to the call to app.listen(...)
process.on('uncaughtException', function (err) {
console.log(err);
});
Your console logs will then include a helpful stack trace if the startup code fails for an unforeseen reason instead of receiving the default "app crashed" message.
|
{
"pile_set_name": "StackExchange"
}
|
Special delivery! Busty Dominica Phoenix has a special package for you - but don't you have a special package for her, too? With those fantastic, just-right tits and long, silky smooth legs, she's the perfect brunette to get your juices flowing. And in true SexBabesVR fashion, this slutty star is a craven, cock-starved encounter just waiting to happen. Feast your eyes on her lips wrapping around your cock in glorious 5K+ resolution, listen to her slurp and lick you with the skills only a pro can have in binaural sound, and get a glimpse of her tits shaking as you bend her over and take her doggy style hard and fast. It's never enough for her, she'll beg for a good fucking as you turn her over and lay her back on the bed, feet up on your shoulders, with that smouldering gaze going straight into your eyes. Live out your fantasies with the help of SexBabesVR and get to know Dominica Phoenix like you never have before!
|
{
"pile_set_name": "OpenWebText2"
}
|
1. Field of the Invention
The present invention relates to a slurry recycling apparatus and method for a chemical-mechanical polishing technique (hereinafter referred to as a CMP technique).
2. Description of the Related Art
A CMP technique is employed for polishing semiconductor wafers and for obtaining planer surfaces thereof.
To polish an object (particularly, the semiconductor wafer, etc.) with the CMP technique, the object is pressed against a polishing pad, and the object and the polishing pad are rotated and moved relatively. A chemical solution, that is, slurry for polishing is supplied onto the polishing pad so as the object to be polished.
A by-product, and changes in a chemical composition and a pH of the slurry which are produced and caused during the polishing process entail a drawback that the object is not satisfactorily polished. Therefore, slurry which has optimum chemical properties such as concentration, pH, etc. needs to be supplied onto the polishing pad.
For the above-described reasons, new slurry is always supplied onto the polishing pad, resulting in consuming a large amount of slurry. However, slurry is expensive, therefore, various techniques have been proposed for recycling used slurry.
In the technique disclosed in Unexamined Japanese Patent Application No. H2-257627, the slurry is recycled by an apparatus having a structure shown in FIG. 5.
As shown in FIG. 5, slurry used in a polisher 101 is collected into a tank 103 via a tube 102. After silica contained in the used slurry is removed therefrom by a centrifugal separator 104 connected to the tank 103, the slurry is supplied back to the tank 103.
In order to recycle the used slurry, undiluted slurry having a high concentration is supplied into the tank 103 from an undiluted slurry tank 105, whereas water, etc., is supplied from a solvent tank 106 into the tank 103. An amount of undiluted slurry and water, etc., to be supplied is controlled based on a concentration of the slurry in the tank 103. The concentration of the slurry in the tank 103 is measured by a ultrasonic propagation speed measuring device 107. The slurry recycled within the tank 103 is supplied to the polisher 101 via a tube 109 by a pump 108.
In the technique disclosed in Unexamined Japanese Utility Model Application KOKAI Publication No. H5-49257, the used slurry is collected into a recycled fluid storage tank. In this case, a flow rate and a concentration of the used slurry are measured. Based on this measured result, an amount of coolant (a surface-active agent, a rustproof agent, a fluid addition agent, etc.) is supplied into the recycled fluid storage tank. Hence, the used slurry is recycled in the recycled fluid storage tank, and the recycled slurry is supplied therefrom to a polisher.
In the technique disclosed in Japanese Patent Application No. H10-58314, the slurry is recycled by an apparatus having the structure shown in FIG. 6.
A semiconductor wafer is placed with force on a polishing pad 201 and is made to rotate by a carrier 203 which is mounted with a shaft 202. Slurry 204 is supplied onto the polishing pad 201 from a tube 205 and is applied to polish the semiconductor wafer so as to be caught by a catch ring 206. The used slurry caught by the catch ring 206 is collected in a manifold 208 via a tube 207. New slurry is supplied into the manifold 208 via a tube 209, chemical components for recycling is supplied via a tube 210 and nonionic water is supplied via a tube 211. The new slurry, chemical components and nonionic water are added to the used slurry in the manifold 208 so as the slurry to be recycled.
The recycled slurry heats up or cools down at a predetermined temperature by a heat switcher 212. Afterward, the recycled slurry is measured and analyzed by sensors 213 to 215. An amount of new slurry, chemical components and nonionic water to be supplied is controlled by the measured and analyzed results of the sensors 213 to 215.
Further, the recycled slurry is filtered by a filter 216 and supplied onto the polishing pad 201 via the tube 205.
In the technique disclosed in Unexamined Japanese Patent Application KOKAI Publication No. H10-118899, the used slurry is concentrated by means of a ultrafiltration (UF) unit employing a ultrafilter. In such a case, a concentration of the concentrated slurry is measured, and if the concentration thereof is equal to or above a predetermined value, an alkali agent or an acid is added to the concentrated slurry. The used slurry which has been recycled in such a manner is once stored in a polishing agent bath and supplied to a polishing apparatus.
However, the above-described techniques entail problems described below.
According to the technique disclosed in Unexamined Japanese Patent Application KOKAI Publication No. H2-257627, there is provided a single tank (tank 103) for collecting the used slurry. Thus, while the used slurry is being recycled, more used slurry is continuously supplied into the tank 103. That is, collection of the used slurry and adjusting (recycling) the concentration of the slurry are parallelly and continuously performed. Accordingly, the used slurry and the centrifuged slurry each having various concentrations exist within the tank 103. This causes a drawback that adjusting the concentration of the slurry delays and the concentration thereof is hardly stable.
In addition to the above, the slurry is supplied to the polisher 101 from the tank 103 containing the used slurry together with the recycled slurry, that is, adjusting the concentration of the slurry (recycling the slurry) and supplying the slurry are parallelly and continuously performed. Hence, the slurry which has not been satisfactorily recycled may be supplied to the polisher 101, therefore, the to-be-polished object is polished with a low degree of accuracy.
In the technique disclosed in Unexamined Japanese Utility Model Application KOKAI Publication No. H5-49257, the flow rate and the concentration of the slurry to be supplied into the recycled fluid storage tank are measured, however, the concentration of the slurry recycled in the recycled storage tank is not measured. As a result of this, the concentration of the recycled slurry is not recognized. That is, even if the concentration of the recycled slurry does not satisfy a predetermined value, the slurry concentration value is not detected. Therefore, the concentration of the slurry may become unstable.
In the technique disclosed in Unexamined Japanese Patent Application KOKAI Publication No. H10-58314, each amount of new slurry, chemical components and nonionic water to be supplied into the manifold 208 is adjusted on the basis of the chemical properties and the concentration of the already-recycled slurry. However, the concentration of the slurry to be collected into the manifold 208 from the catch ring 206 is not constant, so that the concentration and the chemical properties of the to-be-recycled slurry are not stable. Accordingly, the to-be-polished object may not be preferably polished.
In the technique disclosed in Unexamined Japanese Patent Application KOKAI Publication No. H10-118899, the used slurry is concentrated by means of the ultrafiltration unit, thus, the alkali agent contained in the slurry is removed. Thus, the alkali agent needs to be added to the concentrated slurry, and it is required to arrange an apparatus for monitoring the addition amount, etc. This entails a problem that the structure of the recycling apparatus becomes comnplicated.
The recycled slurry is once collected in the polishing agent bath, and its concentration is not checked therein. The concentration of the slurry supplied to the polisher changes, without being detected. Therefore, the to-be-polished object may not preferably be polished.
|
{
"pile_set_name": "USPTO Backgrounds"
}
|
Valorization of crude glycerol and eggshell biowaste as media components for hydrogen production: A scale-up study using co-culture system.
The properties of eggshells (EGS) as neutralizing and immobilizing agent were investigated for hydrogen (H2) production using crude glycerol (CG) by co-culture system. Eggshells of different sizes and concentrations were used during batch and repeated-batch fermentation. For batch and repeated-batch fermentation, the maximum H2 production (36.53±0.53 and 41.16±0.95mmol/L, respectively) was obtained with the EGS size of 33μm<x5<75μm. Hydrogen production increased with the decreasing size of EGS. Eggshells maintained the fermentation pH (6.00-6.30) and provided immobilization support as confirmed by scanning electron microscopy. As media components, the EGS concentration of 0.25% (w/v) was found to be optimum for maximum H2 production (31.66±0.55mmol/L) and the production profile was comparable to H2 production (32.07±0.92mmol/L) obtained with all media components. In scale-up study with semi-continuous bioreactor (7.5L), almost 1.5-fold increase (in comparison to mono-culture) i.e. 312.12mmol-H2/L-of medium with 86.65% glycerol utilization was obtained.
|
{
"pile_set_name": "PubMed Abstracts"
}
|
Activation of AMP-activated protein kinase stimulates proopiomelanocortin gene transcription in AtT20 corticotroph cells.
Starvation is known to activate the hypothalamo-pituitary-adrenal (HPA) axis, a representative antistress system in the living organism. In this study, we investigated in vitro whether activation of the AMP-activated protein kinase (AMPK), which is known to occur in intracellular energy depletion, influences the expression of POMC gene that encodes adrenocorticotropin. We first confirmed that each subunit of AMPK was expressed in the AtT20 corticotroph cell line. We then found that AICAR, a cell-permeable AMP analog and an activator of AMPK, potently stimulated the 5'-promoter activity of POMC gene in a dose-dependent manner. The effects were promoter specific because AICAR enhanced the AP1-mediated POMC promoter activities but did not influence other transcription factor-induced transcription. The effect of AICAR on POMC gene transcription was completely eliminated by specific AMPK inhibitor compound C or by dominant negative AMPK, whereas overexpression of constitutively active AMPK mimicked the effect of AICAR. Finally, experiments using specific kinase inhibitors suggested that the PI 3-kinase-mediated signaling pathway is at least partly involved in the effect. Our results suggest that intracellular energy depletion with the resultant activation of AMPK directly stimulates the HPA axis at the pituitary level by increasing the expression of POMC gene.
|
{
"pile_set_name": "PubMed Abstracts"
}
|
Dell's UltraSharp 1909W does an awkward barrel roll into the realm of availability
Just when you thought Dell had every possible gap in its lineup of well-priced LCD monitors filled, here comes the UltraSharp 1909W to completely blow your mind. Featuring a 1440 x 900 19-inch panel, the 16:10 display boasts the mid-range sort of specs we've come to know and love, like a 5ms response time, 1,000:1 contrast ratio and 300 nits of brightness. On other unexciting fronts the display does VGA and DVI -- no HDMI here, folks -- and includes four USB plugs for bringing some crapgadget to your otherwise mundane existence. Luckily, the price is right: $239, sure to drop rapidly as the inevitable 1909X/Y/Z make their way onto the scene.
|
{
"pile_set_name": "Pile-CC"
}
|
State officials have long suspected that some of the most frequent winners are cashing lottery tickets for customers who don’t want to claim the money themselves because they owe taxes, child support, or other debts, which would be garnished from their winnings. In exchange, the professional cashers, known as “10 percenters,” are believed to keep a cut of the prize money, likely 10 percent.
Statistics suggest it’s nearly impossible to win the lottery that frequently. But Massachusetts has more repeat lottery winners than any other state, people who redeem so many winning tickets that they raise questions about the integrity and oversight of the $5 billion state lottery, according to a first-of-its-kind analysis of nearly 11 million lottery records from 34 states.
Over the last six years, four members of the Jaafar family of Watertown have cashed in more than 7,000 winning lottery tickets and collected a cool $11 million.
Reports from the state auditor’s office dating back nearly two decades have warned that such practices are rampant and may be costing the state and federal governments millions in lost tax revenue. But such warnings have not stopped Massachusetts from turning into a haven for lottery players who win more than 1,000 times a year, easily outpacing the most frequent winners in Georgia, Ohio, and other large states who typically redeem fewer than 100 tickets per year.
“I do not know if our oversight is lacking in comparison to other states,” said Michael R. Sweeney, executive director of the Massachusetts Lottery Commission. “What I do know is our oversight needs to do better, can be better, and I guarantee you will be better on this issue.”
Beginning Oct. 1, the lottery plans to institute a new policy designed to crack down on professional ticket cashers. The policy will allow the state to freeze payouts to customers who redeem six or more prizes of $1,000 or more during a 12-month period. Players who are suspended will have an opportunity to appeal and show they are not violating the law. Sweeney said it is legal to cash other people’s tickets, but illegal to do so if the goal is to help them dodge taxes or debts.
Despite that prohibition, Massachusetts has had more than 50 residents cash more than 200 lottery tickets worth at least $600 each over the last six years, giving the state more repeat winners than any other state for which data is available, according to the analysis by PennLive.com and students from Columbia University’s Graduate School of Journalism. The Fund for Investigative Journalism supported the project.
Some of the winners assert they are professional gamblers who spend most of their time and money buying scratch tickets, and barely break even. But the tickets they cash come from so many far-flung stores, officials say, it is hard to believe they are buying them alone, and not collecting them from others.
“In some instances, it almost makes you wonder if there would be enough hours in the day to even buy that number of tickets,” Sweeney said.
Ali M. Jaafar of Watertown is a typically quizzical case. A 59-year-old who has run his own taxi and phone-card businesses, he won the lottery more than 1,400 times last year, the highest total in Massachusetts and nationwide.
Over the last six years, he has won more than 5,800 times, collecting $8.9 million. But he wasn’t just buying from his local variety store. His tickets were purchased at 1,200 stores in 160 communities ranging from Springfield to Nantucket.
“Do not want to talk about it,” Jaafar said, and rolled up the window of his Ford Explorer, when asked by two reporters how he manages to win the lottery so frequently.
If Jaafar is buying thousands of tickets, he hasn’t made an impression at the four stores in Watertown, Somerville, and Allston where most of his winning tickets were purchased. Clerks at those stores said they had never heard of Jaafar.
Three other members of the Jaafar family — Yousef, Munif, and Mohamed — are also frequent lottery winners. Over the last six years, they’ve cashed 1,200 tickets worth more than $2.1 million.
And that’s not the only questionable activity they’ve been involved in.
Last October, Yousef and Mohamed Jaafar were among 47 people indicted by a New Jersey grand jury for allegedly taking part in a massive fraud ring. Prosecutors say the scheme involved residents of Florida, New Jersey, and Massachusetts who set up bogus companies, which demanded payments from other companies and individuals. Prosecutors say the victims were duped into handing over $50,000 to $450,000.
Yousef and Mohamed Jafaar each pleaded guilty to one count of second-degree conspiracy, and are due to be sentenced in November.
Lynn is home to the player who has cashed the most tickets nationwide over the last six years: a 79-year-old named Clarance W. Jones.
Jones, who calls himself a professional gambler, has cashed more than 7,300 tickets for more than $11 million over that time period. Perhaps improbably for a man of his age, his tickets were purchased at 1,400 stores in 150 cities and towns, including Nantucket.
In 2011, he successfully defeated an effort by state officials to collect taxes on his prize money by claiming that he spends as much on the lottery as he wins. As proof, he produced boxes of losing lottery, Keno, and horse-racing tickets that his attorney said had been kept in a storage locker. Professional gamblers are entitled to deduct their losses under federal and state tax rules.
Jones also submitted into evidence a manual he had written entitled “The Gambler,” which contained his “trade secrets” for beating the Massachusetts lottery, which he called “the easiest lottery system.” Those “secrets” included buying tickets in the middle of a pack, where he believed the winning tickets are grouped, and buying from stores that had recently sold prize winners, reasoning they had a greater chance of selling another jackpot.
Contacted by phone, Jones told a Globe reporter to call his attorney, who did not return phone messages.
Sweeney, of the state lottery, pointed out that Massachusetts may have more lottery winners because residents here spend $746 per person per year on the lottery, more than residents of any other state. Massachusetts also devotes the highest percentage of its lottery revenue to prizes, giving people more opportunities to win large sums.
Still, Sweeney acknowledged that some players rack up so many wins that they must be bending the rules. “It defies legal logic,” he said, “and it mandates a deeper drill-down, in my opinion, of all the appropriate agencies and state and federal organizations.”
Michael Levenson can be reached at mlevenson@
globe.com. Follow him on Twitter @mlevenson.
|
{
"pile_set_name": "OpenWebText2"
}
|
Treatment of early-stage gastric lymphoma.
The treatment of early-stage gastric lymphoma is controversial. This retrospective analysis reports on the outcome of 24 patients treated in our institution during the past 25 years. Fourteen patients had stage IEA, one patient had IEB, six patients IIEA1, and three patients had stage IIEA2 non-Hodgkin's lymphoma (NHL). Diffuse large cell intermediate-grade NHL was diagnosed in 17 patients, diffuse small cleaved cell in three patients, and diffuse mixed large and small cell lymphosarcoma, low-grade B-cell lymphoma, and unclassified lymphoma in one patient each. Fourteen patients underwent surgery, 21 had radiation therapy (XRT), and 10 patients received chemotherapy. Surgery + XRT were given to 7 patients, surgery + XRT + chemo and XRT alone were delivered to five patients each, and XRT + chemotherapy were employed in four patients. Surgery alone was the initial treatment in two patients and chemotherapy alone was given to one patient. Following treatment 22/24 achieved a complete response. During a mean follow-up period of 77.6 months (range 1-285), five patients relapsed. At 10 years, the actuarial survival of the 15 patients with stage I disease was 57.4% and for stage II it was 51.9% (Gehan P-value 0.33). Freedom from relapse (FFR) was 60.7% and 58.3%, respectively (P-value 0.56). No significant statistical differences in terms of survival and FFR were noted in patients treated with surgery, chemotherapy, or XRT. The outcome of patients treated with triple-modality therapy was similar to those treated with double-modality therapy and to patients treated with XRT alone. Gender, age, presenting symptoms, depth of tumor through the gastric wall, and stage were not statistically significant for prediction of either survival or FFR. Both surgery + XRT and chemotherapy + XRT are effective in the treatment of early-stage gastric disease. XRT alone is equally effective as two or three modality treatments in the subset of patients with early-stage gastric lymphoma. However, the low number of patients treated with various approaches over a long period precludes a firm conclusion. Until prospective randomized studies are initiated, management programs should be individually tailored.
|
{
"pile_set_name": "PubMed Abstracts"
}
|
Can Mr. Smith Get to Washington Anymore?
Can Mr. Smith Get to Washington Anymore? is a 2006 documentary film directed by Frank Popper, which follows Missouri politician Jeff Smith's 2004 Democratic primary election campaign to the United States House of Representatives after the retirement of Dick Gephardt from his seat. The film follows Smith as he challenges Russ Carnahan, a member of the Carnahan political family and the frontrunner of a crowded Democratic primary, to capture the Democratic nomination for the seat. The movie's title references Frank Capra's Mr. Smith Goes to Washington, a film in which a naive but well-meaning man (named "Jefferson Smith") becomes a Senator and fights the cynical nature of Washington.
Synopsis
The film follows Jeff Smith from inside his campaign during his bid to win the Democratic primary for the House seat of Representative Dick Gephardt, who announced his retirement. Smith, a 29-year-old teacher with no political experience, decided to run for the seat against 10 other Democratic candidates including Russ Carnahan, a member of the Carnahan political family. He was instantly dismissed by pundits who saw him as a no-name candidate due to his lack of political expertise and the presence of a Carnahan in the race.
Smith's campaign begins to gain more support as he mobilizes a large grassroots political campaign. He earns the endorsement of Howard Dean at one of his speaking events, and his campaign cuts into Carnahan's initial 30-point lead. Smith, however, loses the campaign by fewer than 2,000 votes.
Critical reception
Can Mr. Smith Get to Washington Anymore? earned mostly positive reviews from critics; it received an 83% based on 12 reviews at Rotten Tomatoes, and the film won the Audience Award at the 2006 Silverdocs Documentary Festival.
The Washington Posts Ann Horaday felt that it was a, "funny, engrossing and affectionate documentary." The Boston Globes Janice Page noted that the movie restored the viewer's faith in democracy, even if Jeff Smith failed to win the seat. Kevin Crust of The Los Angeles Times praised the movie: "... [the film] captures ground-level political machinations in an utterly fascinating way."
Scandal
In August 2009, Jeff Smith pleaded guilty and was sentenced to a year and a day in prison for his involvement in federal election law violations (committed during the congressional campaign depicted in the film) and the subsequent coverup.
References
External links
Category:2006 films
Category:2000s documentary films
Category:American documentary films
Category:American films
Category:Documentary films about American politics
Category:American independent films
Category:English-language films
Category:United States House of Representatives elections in Missouri
Category:2004 Missouri elections
Category:Films set in Missouri
Category:History of St. Louis
Category:Documentary films about Missouri
|
{
"pile_set_name": "Wikipedia (en)"
}
|
ds digit of 31208?
2
What is the units digit of 2236?
6
What is the tens digit of 79243?
4
What is the hundreds digit of 44462?
4
What is the hundreds digit of 2847?
8
What is the ten thousands digit of 20087?
2
What is the tens digit of 6573?
7
What is the units digit of 2344?
4
What is the tens digit of 29055?
5
What is the thousands digit of 4605?
4
What is the hundreds digit of 5883?
8
What is the tens digit of 3424?
2
What is the ten thousands digit of 101274?
0
What is the hundreds digit of 9283?
2
What is the tens digit of 6715?
1
What is the tens digit of 5079?
7
What is the units digit of 2971?
1
What is the tens digit of 55347?
4
What is the units digit of 30438?
8
What is the hundreds digit of 373?
3
What is the thousands digit of 4596?
4
What is the tens digit of 14333?
3
What is the tens digit of 477?
7
What is the hundreds digit of 874?
8
What is the hundreds digit of 1622?
6
What is the units digit of 119143?
3
What is the thousands digit of 28520?
8
What is the hundreds digit of 1161?
1
What is the units digit of 26815?
5
What is the units digit of 699?
9
What is the thousands digit of 1652?
1
What is the hundreds digit of 34339?
3
What is the thousands digit of 16264?
6
What is the units digit of 52711?
1
What is the thousands digit of 55548?
5
What is the units digit of 21006?
6
What is the hundreds digit of 121?
1
What is the hundreds digit of 1003?
0
What is the thousands digit of 15006?
5
What is the tens digit of 1381?
8
What is the hundreds digit of 30977?
9
What is the units digit of 1934?
4
What is the tens digit of 14543?
4
What is the tens digit of 8317?
1
What is the thousands digit of 3082?
3
What is the thousands digit of 3840?
3
What is the tens digit of 15064?
6
What is the tens digit of 15982?
8
What is the units digit of 45359?
9
What is the tens digit of 5058?
5
What is the tens digit of 8734?
3
What is the units digit of 1617?
7
What is the units digit of 169971?
1
What is the thousands digit of 1921?
1
What is the tens digit of 6533?
3
What is the units digit of 55894?
4
What is the ten thousands digit of 49179?
4
What is the hundreds digit of 2609?
6
What is the hundreds digit of 139?
1
What is the units digit of 12567?
7
What is the tens digit of 817?
1
What is the units digit of 2574?
4
What is the hundreds digit of 152?
1
What is the hundreds digit of 642?
6
What is the tens digit of 1473?
7
What is the hundreds digit of 1095?
0
What is the ten thousands digit of 13959?
1
What is the hundreds digit of 787?
7
What is the units digit of 919?
9
What is the units digit of 7581?
1
What is the hundreds digit of 21743?
7
What is the hundreds digit of 478?
4
What is the thousands digit of 2401?
2
What is the hundreds digit of 168?
1
What is the ten thousands digit of 37306?
3
What is the thousands digit of 2021?
2
What is the hundreds digit of 253?
2
What is the ten thousands digit of 10336?
1
What is the tens digit of 12068?
6
What is the tens digit of 1283?
8
What is the thousands digit of 7112?
7
What is the tens digit of 1589?
8
What is the hundreds digit of 1246?
2
What is the ten thousands digit of 11455?
1
What is the tens digit of 794?
9
What is the hundreds digit of 9937?
9
What is the tens digit of 40913?
1
What is the tens digit of 986?
8
What is the tens digit of 79?
7
What is the tens digit of 54591?
9
What is the tens digit of 26382?
8
What is the ten thousands digit of 28487?
2
What is the thousands digit of 5441?
5
What is the tens digit of 123289?
8
What is the thousands digit of 3539?
3
What is the units digit of 812?
2
What is the hundreds digit of 400?
4
What is the tens digit of 256?
5
What is the ten thousands digit of 49974?
4
What is the tens digit of 4953?
5
What is the units digit of 978?
8
What is the units digit of 8283?
3
What is the thousands digit of 1168?
1
What is the tens digit of 2988?
8
What is the units digit of 11133?
3
What is the units digit of 120143?
3
What is the units digit of 230?
0
What is the tens digit of 16662?
6
What is the hundreds digit of 353?
3
What is the units digit of 1573?
3
What is the hundreds digit of 42787?
7
What is the ten thousands digit of 53160?
5
What is the hundreds digit of 582?
5
What is the ten thousands digit of 22062?
2
What is the thousands digit of 119930?
9
What is the tens digit of 85?
8
What is the tens digit of 3068?
6
What is the hundreds digit of 63151?
1
What is the units digit of 535?
5
What is the tens digit of 811?
1
What is the thousands digit of 1793?
1
What is the hundreds digit of 101461?
4
What is the thousands digit of 1938?
1
What is the thousands digit of 1952?
1
What is the tens digit of 7177?
7
What is the tens digit of 252?
5
What is the units digit of 44?
4
What is the tens digit of 3460?
6
What is the hundreds digit of 5683?
6
What is the thousands digit of 16813?
6
What is the thousands digit of 5845?
5
What is the thousands digit of 5791?
5
What is the units digit of 8585?
5
What is the ten thousands digit of 42487?
4
What is the hundreds digit of 251?
2
What is the tens digit of 1330?
3
What is the tens digit of 995?
9
What is the units digit of 924?
4
What is the hundreds digit of 104339?
3
What is the tens digit of 7418?
1
What is the tens digit of 1274?
7
What is the thousands digit of 22095?
2
What is the hundreds digit of 3086?
0
What is the ten thousands digit of 11534?
1
What is the hundreds digit of 867?
8
What is the thousands digit of 2599?
2
What is the ten thousands digit of 69256?
6
What is the units digit of 507?
7
What is the units digit of 59132?
2
What is the hundreds digit of 3557?
5
What is the units digit of 5518?
8
What is the hundreds digit of 2840?
8
What is the units digit of 44281?
1
What is the thousands digit of 37233?
7
What is the hundreds digit of 2837?
8
What is the units digit of 3370?
0
What is the thousands digit of 21331?
1
What is the hundreds digit of 66524?
5
What is the tens digit of 49296?
9
What is the tens digit of 12982?
8
What is the tens digit of 12127?
2
What is the tens digit of 27821?
2
What is the ten thousands digit of 149200?
4
What is the units digit of 218?
8
What is the thousands digit of 11391?
1
What is the hundreds digit of 124335?
3
What is the tens digit of 6451?
5
What is the thousands digit of 1011?
1
What is the units digit of 261?
1
What is the tens digit of 1588?
8
What is the hundreds digit of 12631?
6
What is the tens digit of 26461?
6
What is the tens digit of 1633?
3
What is the tens digit of 10595?
9
What is the hundreds digit of 262?
2
What is the ten thousands digit of 18172?
1
What is the units digit of 1066?
6
What is the tens digit of 190?
9
What is the ten thousands digit of 13025?
1
What is the tens digit of 1901?
0
What is the tens digit of 473?
7
What is the tens digit of 7542?
4
What is the units digit of 15473?
3
What is the ten thousands digit of 26153?
2
What is the hundreds digit of 511?
5
What is the units digit of 6868?
8
What is the units digit of 37578?
8
What is the units digit of 1294?
4
What is the hundreds digit of 6513?
5
What is the tens digit of 28116?
1
What is the hundreds digit of 36827?
8
What is the thousands digit of 8139?
8
What is the units digit of 14300?
0
What is the thousands digit of 1032?
1
What is the hundreds digit of 28946?
9
What is the hundreds digit of 21352?
3
What is the tens digit of 55621?
2
What is the units digit of 820?
0
What is the units digit of 32873?
3
What is the tens digit of 1141?
4
What is the thousands digit of 47087?
7
What is the units digit of 36271?
1
What is the units digit of 843?
3
What is the tens digit of 147488?
8
What is the hundreds digit of 476?
4
What is the hundreds digit of 2338?
3
What is the ten thousands digit of 12675?
1
What is the tens digit of 22303?
0
What is the thousands digit of 14302?
4
What is the tens digit of 212?
1
What is the thousands digit of 4505?
4
What is the ten thousands digit of 53366?
5
What is the thousands digit of 1505?
1
What is the units digit of 7761?
1
What is the tens digit of 183?
8
What is the tens digit of 79194?
9
What is the units digit of 871?
1
What is the thousands digit of 7472?
7
What is the thousands digit of 1331?
1
What is the tens digit of 1240?
4
What is the units digit of 6630?
0
What is the tens digit of 7219?
1
|
{
"pile_set_name": "DM Mathematics"
}
|
Mary Katharine Ham
September 09, 2009
How far can the Weekly Standard sink? Time will tell, but the cover of its current issue gives a pretty good sense of its depth at the moment. Accompanied by the cover line "Here the People Rule," the illustration--it's a bit small here, but I'll gladly link to a larger version if I find one--is of, well, an angry white mob.
|
{
"pile_set_name": "Pile-CC"
}
|
A mulher negra que teve a bolsa revistada por um policial militar dentro de um ônibus, no dia 16 de janeiro em Curitiba, após ter sido acusada por um idoso de ter furtado uma carteira, está sendo investigada pela Polícia Civil por conta de denúncias anônimas. Em entrevista à RPC, nesta quarta-feira (29), o delegado Marcelo Magalhães afirma que a história pode ser diferente do que se sabia até então. Na ocasião, o objeto furtado foi encontrado com uma mulher branca e a mulher negra foi apontada por algumas pessoas como vítima de racismo.
Segundo Magalhães, as duas mulheres envolvidas na ocorrência seriam amigas e, inclusive, fariam parte de uma gangue criminosa. “As denúncias indicavam que essas duas mulheres envolvidas no vídeo que viralizou teriam participação em uma associação criminosa voltada para a prática de furtos em coletivos. Elas também diziam que elas seriam amigas”, disse o delegado.
Em outro trecho da entrevista à RPC, o delegado afirma que existem fotos que comprovam que as duas se conheciam. “No momento daquele vídeo, temos a informação de que elas afirmavam que não se conheciam. Mas isso contraria as fotos que recebemos através das denúncias que mostram elas no mesmo grupo de pessoas e em uma dessas fotos elas chegam a comentar ‘indo trabalhar'”, afirmou Magalhães que não sabe se o comentário na foto se refere a algum trabalho formal ou se seria um jargão utilizado por criminosos.
O caso
Toda a ação policial no dia dos fatos investigados foi registrada em vídeo por uma passageira e viralizou em uma rede social. As imagens mostram o momento em que os policiais vão até a mulher negra indicada pelo idoso e revistam sua bolsa em busca da carteira furtada. Pouco tempo depois, outra passageira se aproxima dos policiais dizendo que viu o furto e que na verdade a autora do crime seria uma mulher branca. Os policiais se dirigem até a jovem acusada, pedem para outra mulher puxar um objeto de dentro da calça da suspeita e confirmam tratar-se da carteira furtada.
A vítima que teve a carteira furtada, os passageiros que testemunharam toda a situação e as duas mulheres envolvidas serão ouvidas pela polícia para prestarem todos os esclarecimentos.
|
{
"pile_set_name": "OpenWebText2"
}
|
using System;
using JetBrains.Annotations;
// ReSharper disable once CheckNamespace
namespace BenchmarkDotNet.Horology
{
/// <summary>
/// <see cref="IClock"/> implementation over QueryThreadCycleTime().
/// WARNING: results are inaccurate (up to +/- 30% to actual time),
/// see https://blogs.msdn.microsoft.com/oldnewthing/20160429-00/?p=93385 for more.
/// </summary>
/// <seealso cref="IClock"/>
[PublicAPI]
public sealed class ThreadCycleTimeClock : IClock
{
#region Static members
private static readonly bool _isAvailable;
private static readonly long _frequency;
static ThreadCycleTimeClock() =>
_isAvailable = CycleClockHelpers.EstimateThreadCycleTimeFrequency(
Chronometer.BestClock,
1000 * 1000, out _frequency);
/// <summary>Default instance of <see cref="ThreadCycleTimeClock"/>.</summary>
public static readonly IClock Instance = new ThreadCycleTimeClock();
#endregion
/// <summary>Gets a value indicating whether this instance is available.</summary>
/// <value>
/// <c>true</c> if this instance is available; otherwise, <c>false</c>.
/// </value>
public bool IsAvailable => _isAvailable;
/// <summary>Gets the frequency.</summary>
/// <value>The frequency.</value>
public Frequency Frequency => new Frequency(_frequency);
/// <summary>Gets the timestamp.</summary>
/// <returns></returns>
public long GetTimestamp() =>
CycleClockHelpers.GetCurrentThreadTimestamp();
/// <summary>
/// Returns a <see cref="string"/> that represents this instance.
/// </summary>
/// <returns>
/// A <see cref="string"/> that represents this instance.
/// </returns>
public override string ToString() => GetType().Name;
}
}
|
{
"pile_set_name": "Github"
}
|
Perceptrons with Hebbian learning based on wave ensembles in spatially patterned potentials.
A general scheme to realize a perceptron for hardware neural networks is presented, where multiple interconnections are achieved by a superposition of Schrödinger waves. Spatially patterned potentials process information by coupling different points of reciprocal space. The necessary potential shape is obtained from the Hebbian learning rule, either through exact calculation or construction from a superposition of known optical inputs. This allows implementation in a wide range of compact optical systems, including (1) any nonlinear optical system, (2) optical systems patterned by optical lithography, and (3) exciton-polariton systems with phonon or nuclear spin interactions.
|
{
"pile_set_name": "PubMed Abstracts"
}
|
"""Wrapper to the POSIX crypt library call and associated functionality."""
import _crypt
import string as _string
from random import SystemRandom as _SystemRandom
from collections import namedtuple as _namedtuple
_saltchars = _string.ascii_letters + _string.digits + './'
_sr = _SystemRandom()
class _Method(_namedtuple('_Method', 'name ident salt_chars total_size')):
"""Class representing a salt method per the Modular Crypt Format or the
legacy 2-character crypt method."""
def __repr__(self):
return '<crypt.METHOD_{}>'.format(self.name)
def mksalt(method=None):
"""Generate a salt for the specified method.
If not specified, the strongest available method will be used.
"""
if method is None:
method = methods[0]
s = '${}$'.format(method.ident) if method.ident else ''
s += ''.join(_sr.choice(_saltchars) for char in range(method.salt_chars))
return s
def crypt(word, salt=None):
"""Return a string representing the one-way hash of a password, with a salt
prepended.
If ``salt`` is not specified or is ``None``, the strongest
available method will be selected and a salt generated. Otherwise,
``salt`` may be one of the ``crypt.METHOD_*`` values, or a string as
returned by ``crypt.mksalt()``.
"""
if salt is None or isinstance(salt, _Method):
salt = mksalt(salt)
return _crypt.crypt(word, salt)
# available salting/crypto methods
METHOD_CRYPT = _Method('CRYPT', None, 2, 13)
METHOD_MD5 = _Method('MD5', '1', 8, 34)
METHOD_SHA256 = _Method('SHA256', '5', 16, 63)
METHOD_SHA512 = _Method('SHA512', '6', 16, 106)
methods = []
for _method in (METHOD_SHA512, METHOD_SHA256, METHOD_MD5):
_result = crypt('', _method)
if _result and len(_result) == _method.total_size:
methods.append(_method)
methods.append(METHOD_CRYPT)
del _result, _method
|
{
"pile_set_name": "Github"
}
|
Q:
Graphite: How to make historic whisper data available through web app
I've recently reconfigured my graphite setup from a single carbon-cache instance to several carbon-cache instances. As I needed to cook this up on a new host without bringing down the old graphite server while setting up, I now have a whisper directory with the historic metrics from the old server that I need to make available through the webapp on the new host.
I copied the dir to the new host and added an entry in the webapp local_settings.py:
DATA_DIRS = ['/carbon1/whisper','/carbon2/whisper','/carbon3/whisper','/carbon4/whisper','/whisper-archive']
whisper-archive is the dir I'm talking about. Unfortunately, the data is not showing up. Am I doing something wrong or is there a better way to do this?
running graphite 0.10.0 source install
on freebsd 10.0-RELEASE-p12
A:
I think it's just going to look in these places and use the data from the first one it finds. If you want to have the old data in the same graphs as the new one, then I think you're going to have to use whisper-dump to dump the data out of both the old and new metrics and whisper-merge to combine them.
|
{
"pile_set_name": "StackExchange"
}
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.