text
stringlengths 1
3.78M
| meta
dict |
|---|---|
<?php
/**
* MIT License. This file is part of the Propel package.
* For the full copyright and license information, please view the LICENSE
* file that was distributed with this source code.
*/
namespace Propel\Generator\Model;
/**
* Object to hold vendor specific information.
*
* @author Hans Lellelid <hans@xmpl.org> (Propel)
* @author Hugo Hamon <webmaster@apprendre-php.com> (Propel)
*/
class VendorInfo extends MappingModel
{
/**
* @var string|null
*/
private $type;
/**
* @var array
*/
private $parameters;
/**
* Creates a new VendorInfo instance.
*
* @param string|null $type RDBMS type (optional)
* @param array $parameters An associative array of vendor's parameters (optional)
*/
public function __construct($type = null, array $parameters = [])
{
$this->parameters = [];
if ($type !== null) {
$this->setType($type);
}
if ($parameters) {
$this->setParameters($parameters);
}
}
/**
* Sets the RDBMS type for this vendor specific information.
*
* @param string $type
*
* @return void
*/
public function setType($type)
{
$this->type = $type;
}
/**
* Returns the RDBMS type for this vendor specific information.
*
* @return string
*/
public function getType()
{
return $this->type;
}
/**
* Sets a parameter value.
*
* @param string $name The parameter name
* @param mixed $value The parameter value
*
* @return void
*/
public function setParameter($name, $value)
{
$this->parameters[$name] = $value;
}
/**
* Returns a parameter value.
*
* @param string $name The parameter name
*
* @return mixed
*/
public function getParameter($name)
{
return isset($this->parameters[$name]) ? $this->parameters[$name] : null;
}
/**
* Returns whether or not a parameter exists.
*
* @param string $name
*
* @return bool
*/
public function hasParameter($name)
{
return isset($this->parameters[$name]);
}
/**
* Sets an associative array of parameters for vendor specific information.
*
* @param array $parameters Parameter data.
*
* @return void
*/
public function setParameters(array $parameters = [])
{
$this->parameters = $parameters;
}
/**
* Returns an associative array of parameters for
* vendor specific information.
*
* @return array
*/
public function getParameters()
{
return $this->parameters;
}
/**
* Returns whether or not this vendor info is empty.
*
* @return bool
*/
public function isEmpty()
{
return empty($this->parameters);
}
/**
* Returns a new VendorInfo object that combines two VendorInfo objects.
*
* @param \Propel\Generator\Model\VendorInfo $info
*
* @return \Propel\Generator\Model\VendorInfo
*/
public function getMergedVendorInfo(VendorInfo $info)
{
$params = array_merge($this->parameters, $info->getParameters());
$newInfo = new VendorInfo($this->type);
$newInfo->setParameters($params);
return $newInfo;
}
/**
* @return void
*/
protected function setupObject()
{
$this->type = $this->getAttribute('type');
}
}
|
{
"pile_set_name": "Github"
}
|
Reports surfaced today of the contents of Hillary Clinton's personal Gmail account, confirming suspicions that she is a senior citizen with shockingly normal behavior for someone in her age bracket. An anonymous hacker published nearly 21,000 messages sent to and from the former Secretary of State over the past ten years, including more than 3,000 unanswered emails sent to her daughter, Chelsea. Said the source, "We learned that Mrs. Clinton, a new grandmother, routinely accosted her daughter with message after message containing unsolicited parenting advice. Ideal first solid foods, night weaning techniques, treatments for baby's first cold. On one particularly prolific day, Clinton sent 22 messages inquiring about her granddaughter's diaper rash."
Also disclosed were details which revealed Clinton's utter disregard for standard best practices when using email. "We found hundreds of sent messages with a 'FW:' followed by a subject line written in all caps. 'WORLD'S MOST BEAUTIFUL BEACHES YOU HAVE TO SEE TO BELIEVE' and 'TOP 10 DIRTY LIMERICKS ABOUT REPUBLICANS' were listicles forwarded to her entire address book in 2013. As one might imagine, these forwards seldom inspired a reply, though Bill did take a moment to type ':P' to the limerick email."
Further cementing her status as a senior citizen with a tenuous grasp of how to even use email were dozens of unsent drafts that appeared to be failed attempts at Google searches. As the source explained, "It took some time to determine what we were looking at, but we have confirmed that Hillary ventured to search for 'How to accessorize a pant suit' by entering that exact string of text into the body of an unsent email in December of 2010."
When asked to comment on these allegations, a Clinton spokesperson admitted that the former secretary's staff members were currently "hard at work trying to pry Hillary away from a lolcats animated gif."
|
{
"pile_set_name": "OpenWebText2"
}
|
You might also try selecting 'part' in the top tool bar then left click on any parts you may want to hide. Once parts have turned green right click, select' hide', dimension your job as required then right click and select'show hidden items'
|
{
"pile_set_name": "Pile-CC"
}
|
Unlocking your smartphone will soon be illegal, and other DMCA new rule insanity
Every three years, the Register of Copyrights at the Library of Congress reviews the ways in which consumers may or may not circumvent Digital Rights Management (DRM) of copyrighted products covered under the Digital Millennium Copyright Act (DMCA) — what you can and cannot do, legally, with the gadgets and digital content you buy. And yesterday, the latest rulings (see below) came in — some of it good, some bad, some decidedly insane. Here is a quick breakdown of what you cannot do with your smartphones, tablets, DVDs, game-consoles, and more, according to the law.
Note: The new rules below go into effect on Sunday, October 28, 2012.
Jailbreaking smartphones: Allowed
Jailbreaking smartphones to allow users to download “unauthorized” apps has been legal under DMCA since 2010, and nothing changes for this year.
Jailbreaking tablets: Illegal
In a decision that some might call “crazy,” the Register has decided that tablets may not be jailbroken, even though smartphones are exempt. Their reason? Because dang near anything could be considered a “tablet” these days, including e-readers, handheld game consoles, or even laptops. Because of this so-called lack of definition, the Register says that jailbreaking your tablet (or “tablet”) is against the law.
Unlocking smartphones: Illegal
That’s right — unlocking your smartphone so you can take it to another wireless carrier will soon be illegal, unless authorized by your carrier. This, despite the fact that the Register has allowed unlocking since 2006.
There are some exceptions to this rule — but they aren’t worth cheering for. Specifically, you may unlock any phone you own now, or buy between now and “ninety days after the effective date of this exemption.” As of January 2013, however, unlocking your device without permission is decidedly against the law.
Now, you’re probably asking “Why in tarnation did they change this?” Because, according to the Register, the firmware on your phone — the software that, among other things, locks you into a specific carrier — is copyrighted, and therefore cannot be changed without violating the law. And since there are many more unlocked handsets on the market nowadays, and wireless carriers often provide ways for customers to unlock their phones, there’s really no reason for you to do what you want with your device. Makes sense, right? Right?! Sigh…
DVD ripping: Illegal (mostly)
Ripping a DVD you legally own so you can watch the movie or TV shows on a device that cannot play DVDs, like a tablet or laptop without an optical drive, is illegal. Same goes for CDs. As Michael Weinberg of consumer advocacy group Public Knowledge notes, this rule “flies in the face of reality,” especially given the fact that both the MPAA and RIAA agree that consumers should be allowed to do this.
There are some exceptions to this rule, however: The Register now allows ripping DVDs in order to use “short portions of motion pictures for the purpose of criticism or comment,” as long as the clips are used in noncommercial videos, documentaries, and videos used for teaching purposes in kindergarten through college.
Game console modding: Illegal
Modding your game console to run software other than what came on the device is still illegal for the same reason that unlocking a smartphone is illegal — it requires changes to the firmware, which are copyright protected.
Wins for disabled customers
As maddening as some of the changes listed above may be, the Register did make some good exemptions for customers with vision and hearing impairments. Namely, hearing impaired customers may circumvent any “technological measures” included in e-books that prevent them from using read-aloud technology. Also, it is now legal to crack DVDs in order to create DVD players “capable of rendering visual representations of the audible portions of such works and/or audible representations or descriptions of the visual portions of such works to enable an individual who is blind, visually impaired, deaf, or hard of hearing” — as long as the DVD was obtained legally, of course. Researchers are also allowed to crack DVDs for research purposes.
DMCA facepalm
Clearly, some of these new rules (no jailbreaking tablets, no ripping DVDs so you can watch them on tablets, no unlocking phones without permission) are ridiculous from a user standpoint. But such is the complicated (some would say “broken”) nature of copyright law. Let us know your thoughts on the new rules in the comments. And check out the full ruling below.
|
{
"pile_set_name": "Pile-CC"
}
|
[Progressive decrease of the causes that maintain ventricular fibrillation after experimental coronary occlusion].
Progressive diminution of the causes that maintain ventricular fibrillation after coronary occlusion. Extracorporeal circulation was performed on a group of normal dogs in which a ligature was placed on the left anterior descending coronary artery, immediately beneath the bifurcation of the left coronary artery. The incidence of ventricular fibrillation was of 15 dogs out of 20 (table 1). In a control group without extracorporeal circulation ventricular fibrillation appeared in 24 dogs out of 30 (table 2). These results demonstrate that extracorporeal circulation performed with the idea of improving coronary circulation does not prevent ventricular fibrillation in coronary occlusion. In those dogs with the cross circulation, attempts to defibrillate the ventricles with an electric a.c. defibrillator (three electrical shocks applied directly on the myocardium every 4 or 5 minutes) were uniformly unsuccessful until a period ranging from 12 to 80 minutes elapsed after the onset of ventricular fibrillation. After these periods all fibrillating dogs were defibrillated and recovered either normal or idioventricular rhythm. It is assumed that a "fibrillator substance" liberated by the injury in the initial state of infarction is washed out of the myocardium, or a zone of increased excitability and conduction disturbance is progressively eliminated so that the chances of originating circus movements are diminished.
|
{
"pile_set_name": "PubMed Abstracts"
}
|
The present invention improves wire terminal connectors of the related art by improving the clamping force of a terminal for clamping an aluminum wire and reducing a weight of a vehicle by improving connection strength between an aluminum wire and a terminal. Technical subjects of the present disclosure are not limited to the foregoing technical subjects and any other technical subjects not mentioned will be clearly understood by a skilled person in the art from the following description.
|
{
"pile_set_name": "USPTO Backgrounds"
}
|
The effect of Piétrain sire on the performance of the progeny of two commercial dam breeds: a pig intervention study.
Genetic evaluation of Piétrain sires in Flanders occurs under standardized conditions, on test stations with fixed dam breeds, standardized diets and uniform management practices. As environmental conditions vary on commercial farms and differ from the test stations, this study aimed at understanding to what extent the sire, the dam breed and the interaction between both affects the translation of breeding values to practice. Dams of two commercial breeds were inseminated with semen from one of five different sires selected for contrasting breeding values (daily gain, feed conversion ratio and carcass quality). For each sire by dam breed combination, six pen replicates (with three gilts and three barrows per pen) were evaluated for growth performance from 9 weeks of age (20 kg) to slaughter (110 kg), and for carcass and meat quality. In our experimental setup, both sire and dam breed affected growth, carcass and meat quality traits. No significant sire×dam breed interactions on performance could be detected. Though a tendency for interaction on average daily feed intake between 20 and 110 kg (P=0.087), and on pork colour (lightness) (P=0.093) was present. In general, offspring of all tested sires behaved similarly in both dam breeds, indicating that estimated breeding values for Piétrain sires determined in one dam breed are representative in other dam breeds as well.
|
{
"pile_set_name": "PubMed Abstracts"
}
|
Q:
Why is my class variable changing its value between methods?
I am trying to load a bitmap animation to the screen. I have a float variable holdTime that is specified to hold the "holdtime" value for the animation. In my constructor I set the holdtimevariable to 0.1f but when I try to access the method in the class that is using the holdTime variable, the value of holdTime has changed to -107374176f. So somewhere between my constructor call and the method call the value has changed from 0.1f to -107374176f.
To make things a little bit more clearer let me show you some code:
Here is the header file for the Game class, this is where I call the constructor of the Animation class that has the holdTime variable.
#pragma once
#include "Graphics.h"
#include "Surface.h"
#include "Animation.h"
#include "FrameTimer.h"
class Game
{
public:
Game( class MainWindow& wnd );
void Go();
private:
void UpdateModel();
private:
MainWindow& wnd;
FrameTimer ft;
Surface surf = Surface("Test32x48.bmp");
Animation testAnimation = Animation(0, 0, 32, 48, 4, surf, 0.1f);
};
You see that I have this testAnimation at the bottom of the class. The last argument in the constructor call is the value that is ought be in holdTime.
This is how my Animation header file looks like:
#include "Surface.h"
#include "Graphics.h"
#include <vector>
class Animation {
public:
Animation(int x, int y, int width, int height, int count, const Surface& sprite, float holdtime, Color chroma = Colors::Magenta);
void Update(float dt);
private:
void Advance();
private:
std::vector<RectI> frames;
int iCurFrame = 0;
float holdTime = 0;
float curFrameTime = 0.0f;
};
And this is the Animation Cpp file:
#include "Animation.h"
Animation::Animation(int x, int y, int width, int height, int count,
const Surface& sprite, float holdtime, Color chroma)
:
sprite(sprite),
holdTime(holdTime),
chroma(chroma)
{
for (int i = 0; i < count; i++)
{
frames.emplace_back(x + i * width, x + (i + 1) * width,y, y + height);
}
}
void Animation::Update(float dt)
{
curFrameTime += dt;
while(curFrameTime >= holdTime) {
Advance();
curFrameTime -= holdTime;
}
}
void Animation::Advance()
{
if (++iCurFrame >= frames.size()) {
iCurFrame = 0;
}
}
There is only one method that is making use of holdTime and that is the method Update(float dt).
If we go back to the Game class and look at the Game.cpp file:
#include "MainWindow.h"
#include "Game.h"
Game::Game( MainWindow& wnd )
:
wnd( wnd ),
gfx( wnd )
{
}
void Game::Go()
{
UpdateModel();
}
void Game::UpdateModel()
{
testAnimation.Update(ft.Mark());
}
In the Method Go() we call the method UpdateModel() which in turn is calling the Update() method in the animation class. This means that the first method to be executed in the Animation class after the constructor call is the update() method. When I debug the program I can see that the value of holdtime has changed between the constructor call and the Update() method call. But I don't know how since it I am not modifying the value somewhere else. It also seemes that the new value of holdTime is garbage value.
It became a lot of code in this question and it looks a bit messy and even though I lack the skills of writing a good Title I hope I made you somewhat clear what my problem is.
Thanks!
Update:
Here is the code for the FrameTimer class since the value returned from one of its methods is passed in into the Update() method:
FrameTimer.H:
#pragma once
#include <chrono>
class FrameTimer
{
public:
FrameTimer();
float Mark();
private:
std::chrono::steady_clock::time_point last;
};
FrameTimer.cpp:
#include "FrameTimer.h"
using namespace std::chrono;
FrameTimer::FrameTimer()
{
last = steady_clock::now();
}
float FrameTimer::Mark()
{
const auto old = last;
last = steady_clock::now();
const duration<float> frameTime = last - old;
return frameTime.count();
}
Edit:
main.cpp:
int WINAPI wWinMain( HINSTANCE hInst,HINSTANCE,LPWSTR pArgs,INT )
{
MainWindow wnd( hInst,pArgs );
Game game( wnd );
while( wnd.ProcessMessage() )
{
game.Go();
}
}
As you can see the game.Go() method is the first method that is called in main.
A:
Your Animation constructor is at fault:
Animation::Animation(int x, int y, int width, int height, int count,
const Surface& sprite, float holdtime, Color chroma)
:
sprite(sprite),
holdTime(holdTime),
chroma(chroma)
{
for (int i = 0; i < count; i++)
{
frames.emplace_back(x + i * width, x + (i + 1) * width,y, y + height);
}
}
Here you attempt to initialise the member holdTime from the parameter holdTime.
Except, there is no parameter holdTime. There is only the parameter holdtime.
Hence instead you are actually initialising the member holdTime from itself (the next nearest "match" for that name), so it only retains its original, unspecified value (and in fact, reading an uninitialised variable results in your program having undefined behaviour).
So, you see, your member variable doesn't "change" at all — you never set it correctly. You'd have known that had you put some diagnostic output inside that constructor to examine the value and see whether it's what you thought it should be. None of the rest of the code was relevant or necessary.
A properly-configured compiler should have warned you about this.
|
{
"pile_set_name": "StackExchange"
}
|
How to Identify a MongoDB Performance Anti Pattern in Five Minutes
The other day I was looking at a web application that was using MongoDB as its central database. We were analyzing the application for potential performance problems and inside five minutes I detected what I must consider to be a MongoDB anti pattern and had a 40% impact on response time. The funny thing: It was a Java best practice that triggered it.
Analyzing the ApplicationThe first thing I always do is look at the topology of an application to get a feel for it.
Overall Transaction Flow of the Application
As we see it's a modestly complex web application and it's using MongoDB as its datastore. Overall MongoDB contributes about 7% to the response time of the application. I noticed that about half of all transactions are actually calling MongoDB so I took a closer look.
Flow of Transactions that access MongoDB, showing 10% response time contribution of MongoDB
Those transactions that actually do call MongoDB spend about 10% of their response time in that popular document database. As a next step I wanted to know what was being executed against MongoDB.
Overview of all MongoDB commands. This shows that the JourneyCollection find and getCount contribute the most to response time
One immediately notices the first two lines, which contribute much more to the response time per transaction than all the others. What was interesting was that thegetCount on the JourneyCollection had the highest contribution time, but the developer responsible was not aware that he was even using it anywhere.
Things get interesting - the mysterious getCount callTaking things one level deeper, we looked at all transactions that were executing the ominous getCount on the JourneyCollection.
Transactions that call JourneyCollection.getCount spend nearly half their time in MongoDB
CIO, CTO & Developer Resources
What jumps out is that those particular transactions spend indeed over 40% of their time in MongoDB, so there was a big potential for improvement here. Another click and we looked at all MongoDB calls that were executed within the context of the same transaction as the getCount call we found so mysterious.
All MongoDB Statements that run within the same transaction context as the JourneyCollection.getCount
What struck us as interesting was that the number of executions per transaction of thefind and getCount on the JourneyCollection seemed closely connected. At this point we decided to look at the transactions themselves - we needed to understand why that particular MongoDB call was executed.
Single Transactions that execute the ominous getCount call
It's immediately clear that several different transaction types are executing that particulargetCount. What that meant for us is that the problem was likely in the core framework of that particular application rather than being specific to any one user action. Here is the interesting snippet:
The Transaction Trace shows where the getCount is executed exactly
We see that the WebService findJourneys spends all its time in the two MongoDB calls. The first is the actual find call to the Journey Collection. The MongoDB client is good at lazy loading, so the find does not actually do much yet. It only calls the server once we access the result set. We can see the round trip to MongoDB visualized in the call node at the end.
We also see the offending getCount. We see that it is executed by a method called sizewhich turns out to be com.mongodb.DBCursor.size method. This was news to our developer. Looking at several other transactions we found that this was a common pattern. Every time we search for something in the JourneyCollection the getCountwould be executed by com.mongodb.DBCursor.size. This always happens before we would really execute the send the find command to the server(which happens in the callmethod). So we used CompuwareAPM DTM's (a.k.a dynaTrace) developer integration and took a look at the offending code. Here is what we found:
The code looks harmless enough; we execute a find, create an array for the result and fill it. The offender is the location.size(). MongoDBs DBCursor is similar to the ResultSet in JDBC, it does not return the whole data set at once, but only a subset. As a consequence it doesn't really know how many elements the find will end up with. The only way for MongoDB to determine the final size seems to be to execute a getCountwith the same criteria as the original find. In our case that additional unnecessary roundtrip made up 40% of the web services response time!
An Anti-Patter triggered by a Best PracticeSo it turns out that calling size on the DBCursor must be considered an anti-pattern! The real funny thing is that the developer thought he was writing performant code. He was following the best practice to pre-size arrays. This avoids any unnecessary re-sizing. In this particular case however, that minor theoretical performance improvement led to a 40% performance degradation!
ConclusionThe take away here is not that MongoDB is bad or doesn't perform. In fact the customer is rather happy with it. But mistakes happen and similar to other database applications we need to have the visibility into a running application to see how much it contributes to the overall response time. We also need to have that visibility to understand which statements are called where and why.
In addition this also demonstrates nicely why premature micro optimization, without leveraging an APM solution, in production will not lead to better performance. In some cases - like this one - it can actually lead to worse performance.
Michael Kopp has over 12 years of experience as an architect and developer in the Enterprise Java space. Before coming to CompuwareAPM dynaTrace he was the Chief Architect at GoldenSource, a major player in the EDM space. In 2009 he joined dynaTrace as a technology strategist in the center of excellence. He specializes application performance management in large scale production environments with special focus on virtualized and cloud environments. His current focus is how to effectively leverage BigData Solutions and how these technologies impact and change the application landscape.
In accordance with our Comment Policy, we encourage comments that are on topic, relevant and to-the-point. We will remove comments that include profanity, personal attacks, racial slurs, threats of violence, or other inappropriate material that violates our Terms and Conditions, and will block users who make repeated violations. We ask all readers to expect diversity of opinion and to treat one another with dignity and respect.
SYS-CON Events announced today that Keisoku Research Consultant Co. will exhibit at the Japan External Trade Organization (JETRO) Pavilion at SYS-CON's 21st International Cloud Expo®, which will take place on Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA.
Keisoku Research Consultant, Co. offers research and consulting in a wide range of civil engineering-related fields from information construction to preservation of cultural properties. For more information, vi...
SYS-CON Events announced today that Interface Corporation will exhibit at the Japan External Trade Organization (JETRO) Pavilion at SYS-CON's 21st International Cloud Expo®, which will take place on Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA.
Interface Corporation is a company developing, manufacturing and marketing high quality and wide variety of industrial computers and interface modules such as PCIs and PCI express. For more information, visit http://www.i...
SYS-CON Events announced today that MIRAI Inc. will exhibit at the Japan External Trade Organization (JETRO) Pavilion at SYS-CON's 21st International Cloud Expo®, which will take place on Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA.
MIRAI Inc. are IT consultants from the public sector whose mission is to solve social issues by technology and innovation and to create a meaningful future for people.
SYS-CON Events announced today that Fusic will exhibit at the Japan External Trade Organization (JETRO) Pavilion at SYS-CON's 21st International Cloud Expo®, which will take place on Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA.
Fusic Co. provides mocks as virtual IoT devices. You can customize mocks, and get any amount of data at any time in your test. For more information, visit https://fusic.co.jp/english/.
As businesses evolve, they need technology that is simple to help them succeed today and flexible enough to help them build for tomorrow. Chrome is fit for the workplace of the future — providing a secure, consistent user experience across a range of devices that can be used anywhere.
In her session at 21st Cloud Expo, Vidya Nagarajan, a Senior Product Manager at Google, will take a look at various options as to how ChromeOS can be leveraged to interact with people on the devices, and formats ...
SYS-CON Events announced today that Taica will exhibit at the Japan External Trade Organization (JETRO) Pavilion at SYS-CON's 21st International Cloud Expo®, which will take place on Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA.
Taica manufacturers Alpha-GEL brand silicone components and materials, which maintain outstanding performance over a wide temperature range -40C to +200C. For more information, visit http://www.taica.co.jp/english/.
In his session at @ThingsExpo, Greg Gorman is the Director, IoT Developer Ecosystem, Watson IoT, will provide a short tutorial on Node-RED, a Node.js-based programming tool for wiring together hardware devices, APIs and online services in new and interesting ways. It provides a browser-based editor that makes it easy to wire together flows using a wide range of nodes in the palette that can be deployed to its runtime in a single-click.
There is a large library of contributed nodes that help so...
Many companies start their journey to the cloud in the DevOps environment, where software engineers want self-service access to the custom tools and frameworks they need. Machine learning technology can help IT departments keep up with these demands.
In his session at 21st Cloud Expo, Ajay Gulati, Co-Founder, CTO and Board Member at ZeroStack, will discuss the use of machine learning for automating provisioning of DevOps resources, taking the burden off IT teams.
SYS-CON Events announced today that Daiya Industry will exhibit at the Japan External Trade Organization (JETRO) Pavilion at SYS-CON's 21st International Cloud Expo®, which will take place on Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA.
Daiya Industry specializes in orthotic support systems and assistive devices with pneumatic artificial muscles in order to contribute to an extended healthy life expectancy.
For more information, please visit https://www.daiyak...
What is the best strategy for selecting the right offshore company for your business?
In his session at 21st Cloud Expo, Alan Winters, U.S. Head of Business Development at MobiDev, will discuss the things to look for - positive and negative - in evaluating your options. He will also discuss how to maximize productivity with your offshore developers.
Before you start your search, clearly understand your business needs and how that impacts software choices.
SYS-CON Events announced today that Cedexis will exhibit at SYS-CON's 21st International Cloud Expo®, which will take place on Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA.
Cedexis is the leader in data-driven enterprise global traffic management. Whether optimizing traffic through datacenters, clouds, CDNs, or any combination, Cedexis solutions drive quality and cost-effectiveness.
Most of the time there is a lot of work involved to move to the cloud, and most of that isn't really related to AWS or Azure or Google Cloud. Before we talk about public cloud vendors and DevOps tools, there are usually several technical and non-technical challenges that are connected to it and that every company needs to solve to move to the cloud.
In his session at 21st Cloud Expo, Stefano Bellasio, CEO and founder of Cloud Academy Inc., will discuss what the tools, disciplines, and cultural...
Is advanced scheduling in Kubernetes achievable?
Yes, however, how do you properly accommodate every real-life scenario that a Kubernetes user might encounter?
How do you leverage advanced scheduling techniques to shape and describe each scenario in easy-to-use rules and configurations?
In his session at @DevOpsSummit at 21st Cloud Expo, Oleg Chunikhin, CTO at Kublr, will answer these questions and demonstrate techniques for implementing advanced scheduling. For example, using spot instances ...
SYS-CON Events announced today that SIGMA Corporation will exhibit at the Japan External Trade Organization (JETRO) Pavilion at SYS-CON's 21st International Cloud Expo®, which will take place on Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA.
uLaser flow inspection device from the Japanese top share to Global Standard! Then, make the best use of data to flip to next page. For more information, visit http://www.sigma-k.co.jp/en/.
SYS-CON Events announced today that Yuasa System will exhibit at the Japan External Trade Organization (JETRO) Pavilion at SYS-CON's 21st International Cloud Expo®, which will take place on Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA.
Yuasa System is introducing a multi-purpose endurance testing system for flexible displays, OLED devices, flexible substrates, flat cables, and films in smartphones, wearables, automobiles, and healthcare.
SYS-CON Events announced today that B2Cloud will exhibit at SYS-CON's 21st International Cloud Expo®, which will take place on Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA.
B2Cloud specializes in IoT devices for preventive and predictive maintenance in any kind of equipment retrieving data like Energy consumption, working time, temperature, humidity, pressure, etc.
Today traditional IT approaches leverage well-architected compute/networking domains to control what applications can access what data, and how. DevOps includes rapid application development/deployment leveraging concepts like containerization, third-party sourced applications and databases. Such applications need access to production data for its test and iteration cycles. Data Security? That sounds like a roadblock to DevOps vs. protecting the crown jewels to those in IT.
SYS-CON Events announced today that NetApp has been named “Bronze Sponsor” of SYS-CON's 21st International Cloud Expo®, which will take place on Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA.
NetApp is the data authority for hybrid cloud. NetApp provides a full range of hybrid cloud data services that simplify management of applications and data across cloud and on-premises environments to accelerate digital transformation. Together with their partners, NetApp em...
Why Federal cloud? What is in Federal Clouds and integrations? This session will identify the process and the FedRAMP initiative. But is it sufficient? What is the remedy for keeping abreast of cutting-edge technology?
In his session at 21st Cloud Expo, Rasananda Behera will examine the proposed solutions:
Private or public or hybrid cloud
Responsible governing bodies
How can we accomplish?
DevSecOps – a trend around transformation in process, people and technology – is about breaking down silos and waste along the software development lifecycle and using agile methodologies, automation and insights to help get apps to market faster. This leads to higher quality apps, greater trust in organizations, less organizational friction, and ultimately a five-star customer experience.
These apps are the new competitive currency in this digital economy and they’re powered by data. Without data or data-based interactions, these apps would be of little value to the user and would be just s...
The nature of the technology business is forward-thinking. It focuses on the future and what’s coming next. Innovations and creativity in our world of software development strive to improve the status quo and increase customer satisfaction through speed and increased connectivity.
Yet, while it's exciting to see enterprises embrace new ways of thinking and advance their processes with cutting edge technology, it rarely happens rapidly or even simultaneously across all industries.
With the modern notion of digital transformation, enterprises are chipping away at the fundamental organizational and operational structures that have been with us since the nineteenth century or earlier.
One remarkable casualty: the business process. Business processes have become so ingrained in how we envision large organizations operating and the roles people play within them that relegating them to the scrap heap is almost unimaginable, and unquestionably transformative.
In the Digital Era, however, everything you thought you knew about business processes, and thus how human effort dr...
Blockchain. A day doesn’t seem to go by without seeing articles and discussions about the technology. According to PwC executive Seamus Cushley, approximately $1.4B has been invested in blockchain just last year. In Gartner’s recent hype cycle for emerging technologies, blockchain is approaching the peak. It is considered by Gartner as one of the ‘Key platform-enabling technologies to track.’ While there is a lot of ‘hype vs reality’ discussions going on, there is no arguing that blockchain is being taken very seriously across industries and cannot be ignored.
Our cities have been connected since the dawn of urbanization in the Indus Valley and on the plains of Mesopotamia nearly ten millennia ago. Cities exist to gather and connect people, bringing us together into communities and joint ventures that need complex networks of communication. But in recent years the connected city has come to mean something more. Today and in the future, the connected city will not just be about people connecting with people, but people with machines, people with people via machines, and perhaps most importantly, machines with machines.
These days, APIs have become an integral part of the digital transformation journey for all enterprises. Every digital innovation story is connected to APIs . But have you ever pondered over to know what are the source of these APIs? Let me explain - APIs sources can be varied, internal or external, solving different purposes, but mostly categorized into the following two categories. Data lakes is a term used to represent disconnected but relevant data that are used by various business units within an enterprise. APIs are created as the easy access points for these siloed data lakes.
Every time there’s a notable cybersecurity breach, someone (even me) writes a comprehensive primer on the proper way to create “secure” passwords. Lather, rinse, repeat. Until a few years ago, everyone (including me) based their password advice on a 2003 paper from the National Institute of Standards and Technology (NIST), with the catchy title “NIST Special Publication 800-63.” The paper recommended that passwords be cryptic, contain special characters, and be as close to nonsense as possible.
Today most companies are adopting or evaluating container technology - Docker in particular - to speed up application deployment, drive down cost, ease management and make application delivery more flexible overall.
As with most new architectures, this dream takes significant work to become a reality. Even when you do get your application componentized enough and packaged properly, there are still challenges for DevOps teams to making the shift to continuous delivery and achieving that reduction in cost and increase in speed. Sometimes in order to reduce complexity teams compromise features ...
Automation is enabling enterprises to design, deploy, and manage more complex, hybrid cloud environments. Yet the people who manage these environments must be trained in and understanding these environments better than ever before. A new era of analytics and cognitive computing is adding intelligence, but also more complexity, to these cloud environments. How smart is your cloud? How smart should it be? In this power panel at 20th Cloud Expo, moderated by Conference Chair Roger Strukhoff, panelists looked at the evolving nature of hybrid cloud, how it affects enterprise IT staffing requirement...
21st International Cloud Expo, taking place October 31 - November 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA, will feature technical sessions from a rock star conference faculty and the leading industry players in the world. Cloud computing is now being embraced by a majority of enterprises of all sizes. Yesterday's debate about public vs. private has transformed into the reality of hybrid cloud: a recent survey shows that 74% of enterprises have a hybrid cloud strategy. Meanwhile, 94% of enterprises are using some form of XaaS – software, platform, and infrastructure as ...
Thanks to the plethora of communication and messaging apps available to the average user, unified communications (UC) is becoming more important than ever before. UC is a set of products and services designed to give employees a uniform communications experience, integrating different apps and channels to a singular point of interaction. For example, UC might allow a transcript of a voicemail to be delivered to a recipient’s email, enabling a central communication location that comprises multiple mediums at once.
Agile has finally jumped the technology shark, expanding outside the software world. Enterprises are now increasingly adopting Agile practices across their organizations in order to successfully navigate the disruptive waters that threaten to drown them. In our quest for establishing change as a core competency in our organizations, this business-centric notion of Agile is an essential component of Agile Digital Transformation.
In the years since the publication of the Agile Manifesto, the connection between building better software and business agility has been a tenuous one at best. But now...
Many organizations are now looking to DevOps maturity models to gauge their DevOps adoption and compare their maturity to their peers. However, as enterprise organizations rush to adopt DevOps, moving past experimentation to embrace it at scale, they are in danger of falling into the trap that they have fallen into time and time again.
Unfortunately, we've seen this movie before, and we know how it ends: badly.
Internet of @ThingsExpo, taking place October 31 - November 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA, is co-located with 21st Cloud Expo and will feature technical sessions from a rock star conference faculty and the leading industry players in the world.
The Internet of Things (IoT) is the most profound change in personal and enterprise IT since the creation of the Worldwide Web more than 20 years ago.
All major researchers estimate there will be tens of billions devices - computers, smartphones, tablets, and sensors - connected to the Internet by 2020. This number w...
I’ve always felt that bringing an economics perspective to our big data and digital transformation discussions is more important than a traditional accounting or even information technology (IT) perspective. Heck, I believe that a Chief Data Officer’s background should be more along the lines of economics than IT. Economics brings a forward-looking perspective on creating value (wealth). In fact, economics is defined as “the branch of knowledge concerned with the production, consumption, and transfer (capture) of wealth.”
Fintech is a lucrative, yet quite saturated market. In order to stay competitive, businesses should keep track of the emerging trends and be able to capitalize on them before their competitors do. Artificial Intelligence is currently among the most promising fintech trends. Leading financial brands such as Capital One, MasterCard, as well as hundreds of startups have set the pace for the adoption of virtual financial advisors. If you want to stay ahead of your competition or simply explore the opportunities for AI in fintech, this article is for you.
The Internet giants are fully embracing AI. All the services they offer to their customers are aimed at drawing a map of the world with the data they get. The AIs from these companies are used to build disruptive approaches that cannot be used by established enterprises, which are threatened by these disruptions. However, most leaders underestimate the effect this will have on their businesses. In his session at 21st Cloud Expo, Rene Buest, Director Market Research & Technology Evangelism at Arago, will discuss the digital enterprise evolution in the context of artificial intelligence.
SYS-CON Events announced today that DXWorldExpo has been named “Global Sponsor” of SYS-CON's 21st International Cloud Expo, which will take place on Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA. Digital Transformation is the key issue driving the global enterprise IT business. Digital Transformation is most prominent among Global 2000 enterprises and government institutions.
Leading companies, from the Global Fortune 500 to the smallest companies, are adopting hybrid cloud as the path to business advantage. Hybrid cloud depends on cloud services and on-premises infrastructure working in unison. Successful implementations require new levels of data mobility, enabled by an automated and seamless flow across on-premises and cloud resources. In his general session at 21st Cloud Expo, Greg Tevis, an IBM Storage Software Technical Strategist and Customer Solution Architect, will explore how storage and software-defined solutions from IBM have evolved for the road ahead....
Cloud computing budgets worldwide are reaching into the hundreds of billions of dollars, and no organization can survive long without some sort of cloud migration strategy. Each month brings new announcements, use cases, and success stories.
|
{
"pile_set_name": "Pile-CC"
}
|
Q:
Dependency on 3rd party at runtime?
We have created an applet with javafx and it seems that in order to load the applet several jar, jnlp and js files are required to be downloaded from dl.javafx.com. I tried to work out which files were needed so I could host them on our own server but after spending an hour or so on it I got tired of reading code and gave up. Doesn't it seem bizarre that to use javafx the client has a dependency on the javafx server? There was an instance a few months ago where their server was down which is completely unacceptable. I feel like scrapping it and starting again in something else but I can't throw a years work away.
What are everyone else's views? Have you experienced/solved this? Any suggestions where I should go from here will be gratefully accepted.
A:
This issue has come up a few times and it is one of the main gripes people have with JavaFX. There is a dependency on the runtime, however I believe it is technically possible to distribute an app "offline" (though I've never tried it). See here and here.
I am not sure whether or not it is a breach of the license to distribute offline.
I have sympathy with your frustration, but I would argue that it would not be worth scrapping a year's work. I imagine the uptime of the Oracle servers would be no worse than any outage that could be expected of any web application.
|
{
"pile_set_name": "StackExchange"
}
|
Singapore Taxes
Inland Revenue Authority of SingaporeAct as an agent of the Government and provide service in administering, assessing, collecting and enforcing payment of taxes.
https://www.iras.gov.sg/irashome/default.aspx
|
{
"pile_set_name": "Pile-CC"
}
|
#ifndef __SOUND_WTM_H
#define __SOUND_WTM_H
/* ID */
#define WTM_DEVICE_DESC "{EGO SYS INC,WaveTerminal 192M},"
#define VT1724_SUBDEVICE_WTM 0x36495345 /* WT192M ver1.0 */
/*
*chip addresses on I2C bus
*/
#define AK4114_ADDR 0x20 /*S/PDIF receiver*/
#define STAC9460_I2C_ADDR 0x54 /* ADC*2 | DAC*6 */
#define STAC9460_2_I2C_ADDR 0x56 /* ADC|DAC *2 */
extern struct snd_ice1712_card_info snd_vt1724_wtm_cards[];
#endif /* __SOUND_WTM_H */
|
{
"pile_set_name": "Github"
}
|
Charles Irvin at Truth and Consequences
Full gallery of images, press release and link available after the jump.
Images:
Images courtesy of Truth and Consequences, Geneva
Press Release:
We experience the world as material, made of things. Magic is immaterial. It’s creating something from thin air, transcending limitations of time and space. Truth is you can’t know one without knowing the other. You can’t have magic without the mundane and vice-versa
This is the subtext of the 1963 fantasy film Jason and the Argonauts. In the film Jason criticizes the gods and speaks of their demise, yet they repeatedly save him and his crew from annihilation. The future age Jason prophesies-when humans are free of “superstition”-is the scientific, materialist age of the early 1960s. Yet the by the late 60s, people of the western world were seeking something more than material comfort.
Jason and the Argonauts in its many iterations is one of our countless cultural expressions that much more exists than what the 5 senses describe and verbal language can explain. The 1963 film version also vividly illustrates a fundamental aspect of this expression: it always struggles with the medium it speaks through.
Of course these boundaries on our imagination are constantly being expanded-more so now than ever before. In the world of the moving image, for example, so much has changed since 1963. Yet limits remain. In season 7 of Game of Thrones, scenes featuring dire wolves were cut because there it was too expensive to create the computer generated imagery for them. Pity that our society doesn’t have its priorities straight. Why not use money from the bloated US military budget for better CGI? A civilization is best remembered by its cultural artifacts anyway.
While the nations of Earth should certainly spend less on their militaries and more on producing spectacular entertainment, a bigger budget does not mean better art. Jason and the Argonauts entertains because its effects, though crude by today’s standards, are wildly imaginative. This is the key to great art, whether it’s film, music, painting, etc. It doesn’t have to make sense, or be technically perfect, but it does need imagination, heart and soul.
Painting is a primal example of imaginative expression. Its power lies in it’s simplicity. It will never be replaced completely by the digital because we need its materiality and earthiness. We need a window to the fantastic that you don’t have to plug in.
Ovid’s Metamorphosis exploits this interplay of the material and spiritual, the mundane and the magical. Gods and mortals quarrel, mate, and produce offspring. People are transformed into real birds, animals, plants, and rivers. Mythological events occur at cities or Islands you can visit today.
Most of Metamorphoses draws on tales from prehistory, times further from its composition in the first decade BCE than we are from Ovid’s time. Yet through the imagination of Ovid we can experience these times, bridge the gap between these worlds. Imagination breaks the illusion of time. The scientific method will illuminate some aspects of these distant cultures, intuition will illuminate others.
I see my paintings as glimpses or illustrations of this world outside of time. Illustrations that are grounded in the physicality of oil paint, the earthiest paint. Astrological and shamanic images morph into mundane objects and back again. The spiritual and corporeal flow together. I present to you Stinky Magic 2: Metamorphosis.
|
{
"pile_set_name": "Pile-CC"
}
|
1966 United States House of Representatives elections in Maryland
The 1966 congressional elections in Maryland were held on November 8, 1966, to determine who will represent the state of Maryland in the United States House of Representatives. Maryland has eight seats in the House, apportioned according to the 1960 United States Census. Representatives are elected for two-year terms; those elected served in the 90th Congress from January 3, 1967 until January 3, 1969.
Overview
|- style="background-color: #e9e9e9; font-weight: bold;"
! scope="row" colspan="2" style="text-align: right;" | Totals
| style="text-align: right;" | 8
| style="text-align: right;" | 0
| style="text-align: right;" | 0
| style="text-align: right;" | —
| style="text-align: right;" | 100%
| style="text-align: right;" | 100%
| style="text-align: right;" | 765,423
|}
References
External links
Maryland State Board of Elections
1966
Maryland
United States House of Representatives
|
{
"pile_set_name": "Wikipedia (en)"
}
|
CLEVELAND — Maybe Ohio Gov. John Kasich didn’t get the memo about Republican unity. Or maybe he did, since he didn’t mention Donald Trump by name as he lambasted a huge portion of Trump’s policy platform Tuesday before and during the party’s formal vote to make the real estate mogul its presidential nominee.
Kasich is not speaking at his party’s convention in his home state. Trump mocked the governor for that on Monday, saying if he had lost as badly as Kasich lost the primaries to Trump, he wouldn’t want to speak, either. And Trump’s campaign chairman, Paul Manafort, declared Kasich was “embarrassing” Ohio.
But Kasich did speak at events around the convention, including a U.S. Hispanic Chamber of Commerce session on Tuesday evening, held as Republicans were nominating Trump at the Quicken Loans Arena just a mile away.
It was the second time that day that Kasich ticked off a list problematic Trump positions that Kasich saw as worldwide threats.
“I look at trade like I look at immigration, like I look at growing nationalism, like I look at isolationism,” Kasich said. “When you isolate, when you have excessive nationalism, when you’re anti-trade and anti-immigration, what good comes from that? What is that a formula for?”
Speaking earlier at a forum sponsored by the International Republican Institute, just a few blocks from the convention venue, he was more pointed.
“We all love our countries, but you know what doing nationalism to an extreme amount can mean,” Kasich told the crowd of Republican foreign policy experts without mentioning the Trump slogan of “Make America Great Again” or the string of speakers at Monday night’s Republican National Convention who argued Muslims, immigrants and civil rights advocates were destroying the country.
“We think NATO doesn’t matter? Are we kidding?” Kasich said at another point, without mentioning that Trump has argued the treaty organization is obsolete.
Rather than shutting down and shutting out the world, Kasich repeatedly argued for embracing it.
“When I look at immigration, I look at a new level of energy. I look at immigration as an opportunity,” Kasich said, without mentioning Trump’s pledge to build a wall. “We want people to come to Ohio. We want to integrate these folks. We want them to become part of our economic dynamo.”
While he said Ohio has had a rough time with free trade, he comes down in favor of more trade because of the upside, including the linkages and relationships he said it fosters.
And when all of those Trumpian anti-trade, anti-immigrant, nationalistic and isolationist inclinations are combined, it doesn’t look good to Kasich.
“What does that stew look like? What does that mean for the world? What does it mean for stability? What does it mean for peace? What does it mean for relationships?” Kasich asked. “I’m very worried about it. I’m very, very concerned about it.”
Trump did have defenders at the foreign policy event who spoke on panels after Kasich left, including marquee players who appeared at the convention Monday night.
One was retired Lt. Gen. Michael Flynn, who argued in his comments Tuesday that America “is definitely losing this war” against “radical Islam.”
“I am almost in total disagreement with the governor of Ohio,” Flynn said.
Another was Sen. Tom Cotton (R-Ark.), who actually agrees more with Kasich than with Trump on NATO. “We have some disagreements in our party. That’s inevitable,” Cotton said.
Kasich did make sure to point out that he was not only talking about Trump, especially after being pressed about the party’s standard-bearer in the chamber of commerce conversations.
“I don’t want to spend my time here in Cleveland just talking about Donald Trump without talking about the other choice,” Kasich said, offering some jabs at Democrats Hillary Clinton and Bernie Sanders.
Welcome to Ohio, Mr. Trump.
Editor’s note: Donald Trump regularly incites political violence and is a serial liar, rampant xenophobe, racist, misogynist and birther who has repeatedly pledged to ban all Muslims ― 1.6 billion members of an entire religion ― from entering the U.S.
|
{
"pile_set_name": "OpenWebText2"
}
|
*3. Let v(y) = -y**5 - 3*y**4 - 2*y**3 + 2*y**2 - y - 1. Let u(c) = 2*h(c) + v(c). Factor u(o).
(o - 1)**3*(o + 1)**2
Factor 3*m**4 + 0*m**4 - 16*m**3 + 7*m**3 - 13*m + 25*m.
3*m*(m - 2)**2*(m + 1)
Let n = 1919 - 1916. Let m(l) be the second derivative of -1/60*l**5 + 0 + 1/18*l**n - 1/36*l**4 + 2*l + 1/6*l**2. Let m(a) = 0. Calculate a.
-1, 1
Let r(q) be the first derivative of q**6/24 + q**5/20 - 9*q**4/16 - 3*q**3/4 - 88. Factor r(y).
y**2*(y - 3)*(y + 1)*(y + 3)/4
Suppose 3*g + 1 = 7. Factor -7*r**2 + 6*r**3 + g*r**4 - 5*r**4 + 0*r**2 + 4*r**2.
-3*r**2*(r - 1)**2
Let d = -82/3 + 1199/42. Let w = 9/7 + d. Find n, given that w*n**2 + 1/2*n**4 + 2*n**3 + 0 + n = 0.
-2, -1, 0
Let q(x) be the second derivative of -1/4*x**3 - x + 11 - 1/20*x**6 + 3/40*x**5 + 1/8*x**4 + 0*x**2. Suppose q(r) = 0. Calculate r.
-1, 0, 1
Factor -7/4 + 2*z - 1/4*z**2.
-(z - 7)*(z - 1)/4
Let o = 15352952/85 - 180626. Let v = o - -72/17. Solve 9/5*f - 9/5*f**3 + 6/5 - v*f**2 = 0 for f.
-1, -2/3, 1
Let c(a) be the third derivative of -17*a**5/240 - a**4/96 - 2*a**2 + 439. Find v such that c(v) = 0.
-1/17, 0
Solve 25*g**3 - 20*g**4 - 14322 + 14322 + 5*g**5 - 10*g**2 = 0 for g.
0, 1, 2
Let o = 1202/3 - 400. Let g(u) be the first derivative of 0*u + 1/3*u**2 - o*u**3 - 9 - 2/3*u**4. Suppose g(n) = 0. What is n?
-1, 0, 1/4
Let c be 5 + 0/(-7) + -6. Let q be -1 + c*9/(-6). Factor 0*i**2 - i + q*i**4 - 1/2 + i**3.
(i - 1)*(i + 1)**3/2
Let w(k) = 7*k**2 - 9*k - 4. Let r(s) = s**2 + s - 1. Let b(d) = 2*d**2 - 12*d + 1. Let q(h) = b(h) + 4*r(h). Let z(j) = 6*q(j) - 5*w(j). Factor z(u).
(u - 2)*(u - 1)
Suppose 0*b - 5*b - 65 = 0. Let k = b + 18. Suppose k*o**3 - 3*o - 4*o**5 + o**5 - 3*o**3 + 4*o**3 = 0. Calculate o.
-1, 0, 1
Let u be ((-38)/(-2) - 9680/704)*(-2)/(-7). Suppose 0 = -5*h + 2*h + 9. Factor u*p**2 + 1/2*p**h + p + 0.
p*(p + 1)*(p + 2)/2
Suppose 4*g = -g - 60. Let z be 1*2*(g + 15). Let i(x) = 8*x**3 + 12*x**2 + 8. Let k(m) = m**3 + m**2 - m + 1. Let d(p) = z*k(p) - i(p). Factor d(a).
-2*(a + 1)**3
Let f be 78/(-195) + (-5)/((-50)/144). Let -15*u**2 - 10 + f + 0 - 35*u + 26 = 0. What is u?
-3, 2/3
Let o(f) = f**5 + f**4 + f**2. Let d be (-1 + -3)/12*-3. Let t(p) = p**5 + 11*p**4 - 20*p**3 - 84*p**2 + 80. Let c(g) = d*t(g) + 4*o(g). Factor c(q).
5*(q - 2)*(q - 1)*(q + 2)**3
Let c(n) be the third derivative of -n**7/210 + n**6/30 - n**5/10 + n**4/6 - n**3/6 + 12*n**2 + n. Factor c(b).
-(b - 1)**4
Let v(l) = 7*l**4 + 49*l**3 + 73*l**2 + 35*l + 2. Let n(f) = 15*f**4 + 100*f**3 + 145*f**2 + 70*f + 5. Let h(b) = -2*n(b) + 5*v(b). Factor h(p).
5*p*(p + 1)**2*(p + 7)
Let k be 56/(-532) + (1916/152 - 2). Let k*x**2 - 3/2*x**3 - 45/2*x + 27/2 = 0. What is x?
1, 3
Suppose -5*w - 4 = 4*d + 11, -4*w = 3*d + 12. Let j(a) be the third derivative of -1/7*a**3 + 1/140*a**5 + d - a**2 - 1/56*a**4 + 0*a. What is x in j(x) = 0?
-1, 2
Let 953*c - 100 + 0*c**4 + 95*c**2 - 45*c**3 - 908*c + 5*c**4 = 0. What is c?
-1, 1, 4, 5
Let n be (-1168)/144 + (144/40)/(4/10). Factor -n*o + 0 + 8/9*o**2 - 2/9*o**3.
-2*o*(o - 2)**2/9
Let n be (5/(-45)*22)/((-16)/6). Let i = -7/12 + n. Factor 1 + 4/3*x + i*x**2.
(x + 1)*(x + 3)/3
Suppose k = -2*p - 0*k + 61, -4*k - 64 = -3*p. Suppose 20 - 96*y**3 - 46*y**4 - 2 + 18*y**2 + p*y + 47*y + 10*y**4 + 21*y**5 = 0. Calculate y.
-1, -2/7, 1, 3
Let c be (-1)/(558/134) - 3/(-27). Let u = 82/155 + c. Factor 0 - u*t + 1/5*t**2.
t*(t - 2)/5
Let o be 12*(-1 + 3/2). Let m be (o/(-2))/(3/(-3)). Factor 6*s**2 - 2*s - m*s**3 - 6*s**4 + 3*s**4 + 2*s.
-3*s**2*(s - 1)*(s + 2)
Solve -1/5*h**5 + 28/5*h**2 + 12/5*h**3 - 1/5*h**4 + 0 + 16/5*h = 0.
-2, -1, 0, 4
Let d = 31581/2 + -15790. Suppose 1/6*b**5 - 2/3*b**3 - 1/3*b**2 + 1/3*b**4 + 0 + d*b = 0. What is b?
-3, -1, 0, 1
Suppose 0 = 5*a - 2 - 28. Let f(c) = -4*c**3 + c**2 - c - 2. Let d be f(-1). Factor 0*p**d - 11*p**4 + a*p**4.
-5*p**4
Let n = 16 - 18. Let u be (-11 + 3)/(-2) - n. Factor 0*l - 8*l + 1 + l**2 + u*l.
(l - 1)**2
Let v(d) be the first derivative of d**8/3360 + d**7/1680 - 16*d**3/3 + 19. Let j(z) be the third derivative of v(z). Factor j(t).
t**3*(t + 1)/2
Factor 0 + 1/4*o**2 - 6*o + 6*o**3 - 1/4*o**4.
-o*(o - 24)*(o - 1)*(o + 1)/4
Let i(p) be the third derivative of -p**6/40 + 771*p**5/20 - 198147*p**4/8 + 16974593*p**3/2 + 582*p**2. Let i(c) = 0. What is c?
257
Let v(o) be the third derivative of -o**5/36 - 5*o**4/2 - 55*o**3/2 - 112*o**2. Let v(d) = 0. What is d?
-33, -3
Let r(c) be the first derivative of 2*c**5/5 + c**4 - 16*c**3/3 - 18*c**2 - 18*c + 112. Factor r(l).
2*(l - 3)*(l + 1)**2*(l + 3)
Suppose -t - 5 = -1. Let a be t/2 + (-120)/(-55). Suppose -4/11 + 2/11*h**2 - a*h = 0. What is h?
-1, 2
Let 4967 + 974*p + p**2 + 1922 - 1140*p = 0. Calculate p.
83
Let b(j) = 12*j**3 - 8*j**2 + 6*j + 5. Let x(v) = 38*v**3 - 24*v**2 + 18*v + 16. Let q(r) = 16*b(r) - 5*x(r). Determine t, given that q(t) = 0.
0, 1, 3
Suppose -10*s + 36 = 16. Let l(w) be the second derivative of -3/20*w**5 + 0 - 2*w - 3/2*w**3 - 3/2*w**s - 3/4*w**4. Factor l(u).
-3*(u + 1)**3
Let c(j) be the third derivative of 0*j**4 - 11/420*j**7 + 0*j - 1/120*j**5 + 5/672*j**8 - 13*j**2 + 0*j**3 + 0 + 7/240*j**6. Determine m, given that c(m) = 0.
0, 1/5, 1
Factor -88*o**3 + 35*o**3 - 9*o + 12*o**4 - 6 + 8*o**3 + 48*o**2.
3*(o - 2)*(o - 1)**2*(4*o + 1)
Let s be (15/(-35))/(18/(-126)). Factor 0*l + 2/5*l**5 + 6/5*l**4 + 6/5*l**s + 2/5*l**2 + 0.
2*l**2*(l + 1)**3/5
Let o = -212/23 + 2802/299. Let -o*d**3 + 0*d + 0 + 0*d**2 + 2/13*d**4 = 0. What is d?
0, 1
Let m(s) be the second derivative of -s**6/210 - s**5/60 + s**4/12 - s**3/14 + 11*s**2/2 + 14*s. Let t(k) be the first derivative of m(k). Factor t(o).
-(o - 1)*(o + 3)*(4*o - 1)/7
Let n(d) = d**3 - 10*d**2 + 8*d + 15. Let p be n(9). Factor -2*o**4 + 4*o**3 - 5*o**3 - p*o**4 + 4*o**5 + 5*o**3.
4*o**3*(o - 1)**2
Suppose 2/3*v**2 - v + 0 + 1/3*v**3 = 0. Calculate v.
-3, 0, 1
Suppose 312/5 - 3*b**2 - 774/5*b = 0. What is b?
-52, 2/5
Let p(m) be the third derivative of 0 + 0*m - 31*m**2 - 1/120*m**5 - 1/240*m**6 + 0*m**3 + 0*m**4. Factor p(v).
-v**2*(v + 1)/2
Let k(n) be the second derivative of 17*n + 1/2*n**6 + 0*n**2 + 1/2*n**5 + 0*n**3 + 0*n**4 + 5/42*n**7 + 0. Factor k(l).
5*l**3*(l + 1)*(l + 2)
Let k(o) be the third derivative of -o**7/42 - o**6/24 + 3*o**5/4 - 55*o**4/24 + 10*o**3/3 - 882*o**2. Factor k(s).
-5*(s - 1)**3*(s + 4)
Let n(l) be the first derivative of 0*l**2 + 12 + 2/3*l**3 + 0*l + 1/2*l**4. Solve n(c) = 0.
-1, 0
Factor 0 + 0*o + 2/3*o**2 + 2/3*o**4 + 4/3*o**3.
2*o**2*(o + 1)**2/3
Suppose 5*b = -12 + 2, k + 6 = -3*b. Let h(v) be the third derivative of 1/120*v**5 + 0 - 1/12*v**3 - 8*v**2 + k*v + 1/32*v**4. Factor h(s).
(s + 2)*(2*s - 1)/4
Let j be (-2*(-8)/(-6))/(17/((-306)/12)). Factor 0*f**2 - 2/9*f**j + 0*f + 0 + 0*f**3 + 2/9*f**5.
2*f**4*(f - 1)/9
Let t = 52 + -35. Let x = 22 - t. Factor 0*m**x + 6*m**3 + 4*m**3 + 6*m + 10*m**2 + 5*m**4 - m + 1 + m**5.
(m + 1)**5
Let n be 21/(-70)*40/(-60). Suppose -n*d**2 + 1/5*d**4 + d**3 - 1/5*d**5 - 8/5*d - 4/5 = 0. What is d?
-1, 2
Suppose -39/2*s + 18 + 3/2*s**2 = 0. Calculate s.
1, 12
Let v(s) be the second derivative of s**6/10 - 3*s**4/4 + s**3 - 26*s. Solve v(u) = 0 for u.
-2, 0, 1
Let x(d) be the second derivative of -5/3*d**3 + 0 - 40*d + 0*d**2 + 1/6*d**6 - 3/4*d**5 - 25/12*d**4 + 5/42*d**7. What is j in x(j) = 0?
-1, 0, 2
Suppose -3 = -3*q - 3*z, 6*q - 8*q - 3*z - 1 = 0. Let t(x) be the first derivative of 3/4*x**q - 3 + 0*x + 0*x**3 + 0*x**2. What is h in t(h) = 0?
0
Let a(t) be the third derivative of -t**6/300 - 17*t**5/150 - 31*t**4/60 - t**3 + 6*t**2 + 6. Find c, given that a(c) = 0.
-15, -1
Let h(l) be the second derivative of 2*l**7/21 + 22*l**6/5 + 318*l**5/5 + 766*l**4/3 + 470*l**3 + 450*l**2 - 171*l. Factor h(v).
4*(v + 1)**3*(v + 15)**2
Let k be ((-12)/(-14))/((-37)/((-17612)/663)). Find b, given that 22/13*b**2 - 2/13*b**4 + 0 - k*b**3 - 12/13*b = 0.
-6, 0, 1
Let h be (((-3300)/(-175))/(-33))/(-1). Factor h - 2/7*i**3 + 8/7*i**2 - 10/7*i.
-2*(i - 2)*(i - 1)**2/7
Let y(p) = -p**2 - 4*p + 1. Let f = -11 - -17. Suppose -11 = -5*h - f. Let k(r) = 1. Let i(a) = h*y(a) - 5*k(a). Suppose i(w) = 0. Calculate w.
-2
Let m(d) be the first derivative of 5*d**6/6 + 13*d**5/5 + 11*d**4/4 + d**3 + 106. Factor m(k).
k**2*(k + 1)**2*(5*
|
{
"pile_set_name": "DM Mathematics"
}
|
=== Brisingr ===Please rate and leave comments!Description===========Adds the sword "Brisingr" from the book "Brisingr" of the Inheritance Cycle by Christopher Paolini to the game.Details=======I was very interested in what Eragon's sword Brisingr might look like.After searching the internet and finding more or less disappointing illustrations I found a trailer for the 3rd book with the so far best design.Its in German, but the most imprtant part is the short glimpse of Brisingr ;-)The sword can be found under the Menoa Tree which is located west of the Imperial City. You can see a marker on the map, but you cannot fasttravel there.Inside the tree are two versions of the sword:1. A normal version which is slightly better than a Daedric longsword2. A flaming version with an extra fire damage enchantment (thanks to Mr V for his 'Bluefire Claymore')These swords might be a bit overpowered, but hey, it's a dragonrider's sword.NOTE: The container for the swords is a bit hidden. Search at the root of the tree.EDIT: Some people had a problem with nothing showing up when the mod was activated. Those can try the optional plugin file "TestingHall Addition" which adds the swords to the testinghall. Please post a comment whether it works with this esp.PS: You might also like my Zar'roc mod Install=======1. Extract the archive to [install folder]\Oblivion\Data\2. Start Oblivion Launcher, click 'Data Files', place a checkmark beside the 'Merong - Brisingr.esp' file3. Start the Game and have funUninstall=========1. Start Oblivion Launcher, click Data Files, uncheck the .esp file.2. Delete the files/folders associated with the mod.Incompatibility===============Only if the worldspace is used in another mod. I know none.Known Issues or Bugs====================If you find anything, leave a comment on the TESNexus page.History=======1.0: 2010/08/25 - Initial release.Contact=======Find me on TESNexus as 'Mérong'Credits=======Thanks to...Bethesda for creating Oblivion.Christopher Paolini for the great book "Eragon".Mr V for the flame-animation from 'Bluefire' Claymore'Tools Used==========Licensing/Legal===============Do what you want with this mod, but give me proper Credit!
|
{
"pile_set_name": "OpenWebText2"
}
|
Blogs about Metabolism
According to the ACE Health Coach Manual:Metabolism is made up of:1. Basal metabolic rate – the amount of energy required for vital, resting bodily functions without food. The more muscle your body has the higher the basal metabolic rate so strength train to burn more calories.· 60 -75% of daily energy needs
Every person, whether apparent to themselves or not, falls into one of these three categories: weight loss, weight maintenance, or weight gain. So metabolism is a very important word when it comes to our body weight. Many people wish to have a speedy metabolism, leading to a more lenient food intake or to speed up a weight loss goal. Our genetics have an impact on how fast or slow our metabolism is, but there are different things we can do to increase our metabolism.
More often than not, people are searching for fat loss. That is their goal. Sometimes the word “fat” can be a little harsh to some. Thomas Cox, the founder of MealFit, says, “The worst thing we’ve done as a society is label someone as a macronutrient. We literally call people fat.” Fat is a harsh term because of what we have made it to be. Now people prefer the term “weight” as in a goal of weight loss. Weight can be a number of things. Fat is fat. So we need to d
Are you unable to make progress despite your spot on nutrition and active lifestyle? Are you stressed? Stress can cause irregular levels of Cortisol which is why we call it the "Stress Hormone". Did you know that irregular Cortisol levels can effect things like immunity, appetite, energy levels, metabolism, maintenance of muscle tissue, and weight loss?
Everybody get older. It’s a common experience and one that can be depressing to think about at times, but there’s no escaping it. There are, however, ways to age successfully, even into your 80’s and 90’s. Successful ageing is healthy ageing. It is possible for most of us to maintain a very high level of physical function throughout a long lifespan but we should be aware of what we’re up against.
If you enjoy eating spicy foods you're in luck. Besides being delicious, spicy foods have been shown to increase metabolism. That doesn't mean you can cover your junk food in hot sauce and make it healthy. Just eat healthy and add a little spice to it. Better Body, Better life!
My younger sister recently asked me for some help losing weight. She had joined a local gym and was exercising almost every day. She had lost a little weight initially but was not getting the results she wanted. When I asked her about her gym routine she said she was spending 30-45 minutes on the elliptical trainer, followed by some core and arm exercises. Sound familiar?
So many women today are so fearful of “bulking up” and becoming “too muscular” that they oftentimes avoid the weight machines, barbells and dumbbells completely. Women feel more comfortable and less intimidated using the cardiovascular equipment and you can usually find the majority of the females in the gym running on the treadmills, biking on the recumbent bicycle or striding away on the elliptical machine.
Physiologic evaluations based on actual oxygen consumed and carbon dioxide produced for: • Resting Metabolic Rate – a measurement of calories used to maintain basic life functions such as circulatory, respiratory and brain function.
|
{
"pile_set_name": "Pile-CC"
}
|
Q:
How can I create a /* comments section with /// like in XCode?
In XCode, there is an add-on called vvdocument, which can detect three / hits, and transfer /// into:
/*!
* @author Robbie Yi JIANG, 29-Jan-2016 14:01:45
*
*
*/
How can I do this in Vim.
A:
The method in my earlier answer doesn't transform well to dynamic content. This is where snippet plugins like UltiSnips and SnipMate come in. I'll provide a demo of UltiSnips here. Install it using your favourite method from How do I install a plugin in vim/vi?
Now, make an UltiSnips directory in your .vim or _vimfiles directory. In it, place a c.snippet file containing:
snippet /// "My header" A
/*!
* @author Robbie Yi JIANG, `date +'%d-%b-%Y %T'`
*
*
*/
endsnippet
Now, if you open a C file and type ///, it should automatically get replaced with the header, including the current date and time. That's it!
Usually, UltiSnips inserts a snippet when you press Tab. Here, we have specified that the snippet should be automatically entered - that's what the A at the end of the first line indicates. Checkout :help UltiSnips-syntax for more information on writing snippets.
Most people, however, start off with a collection of snippets, such as vim-snippets. There are too many to describe here, but you might some of them very useful.
A:
One way would be to create a file containing this snippet, and read it when you type ///.
For example, create ~/.vim/snippets/my_header.snip containing this header. Then define this mapping:
inoremap /// <esc>:r ~/.vim/snippets/my_header.snip<cr>i
Or:
inoremap /// <esc>:call append(line('.')-1, readfile(expand('~/.vim/snippets/my_header.snip')))<cr>i
In the first mapping, your cursor will be placed on the first line of the inserted text; and in the second, the cursor will be placed below the inserted text.
Perhaps the simplest mapping, in terms of jumping around modes, is:
inoremap /// <c-r><c-o>=readfile(expand('~/.vim/snippets/my_header.snip'))<cr>
For more general usage, you might want to look into snippet plugins. UltiSnips and SnipMate are two popular ones. I don't use either, so I won't recommend one.
A:
Write a function that returns the string and call it.
function! InsertHeader()
let l:header = "/*!\n"
\. "* @author Robbie Yi JIANG, " . strftime('%d-%b-%Y %H:%M:%S') . "\n"
\. "*\n"
\. "* \n"
\. "*/\n"
return l:header
endfunction
inoremap /// <C-R>=InsertHeader()<Enter><C-O>2k<C-O>$
The details of strftime depend on your platform, if you're not on Windows and it's not working then you'll need to man strftime to figure out the arguments.
This works in insert mode but it does weird things to forward-slash processing. If you're doing C++-style // comments, the second slash won't come out until you type a space or something after it.
The <C-R>= inserts an expression at the cursor position. The InsertHeader()<Enter> bit is the expression that gets evaluated. I build up the string line by line in the function, . is string concatenation and \ is the line continuation character (where continuation says "combine this with the previous line," in contrast to how C and its family do it). Finally, two <C-O> operations, one to move up two lines and one to move to the end of the line where presumably a file comment is going to be entered; note the space at the end of the string in the fourth line of l:header.
|
{
"pile_set_name": "StackExchange"
}
|
Moxappeal
What's On
Events - Live
Moxappeal
MoxAfrica fundraising event
02 Feb 2013
The Space and Cafe.Bar.Contemporary
This two part event begins with talks and workshops in The Space between 4pm and 8pm. Tickets cost £10 and are available on the door or online (link below). All proceeds go to Moxafrica. Ticket holders will also be entered into a Prize Draw.
A FREE to attend music event will follow in the Cafe.Bar from 8pm – 1am.
£10 adv. tickets, All proceeds go to Moxafrica, and you get free entry to the Prize Draw!
*Grow your own Medicinal Herb garden
*Chinese Tea Ceremony (Criz Martindale-caffi Cristobal)
*Yoga Taster Workshop (Leigh Keemer-The Yoga Rooms)
*The History of Witches/Healers in Art (Bob Sparham- Royal Society of Artists)
|
{
"pile_set_name": "Pile-CC"
}
|
Fox 13 (Seattle), October 1, 2014
The Seattle School Board unanimously voted Wednesday to have public schools observe “Indigenous Peoples’ Day” on the second Monday of October–the same day as the Columbus Day federal holiday.
The resolution, in part, said the board “recognizes the fact that Seattle is built upon the homelands and villages of the Indigenous Peoples of this region, without whom the building of the City would not have been possible.”
The resolution also says the board “has a responsibility to oppose the systematic racism towards Indigenous people in the United States, which perpetuates high rates of poverty and income inequality, exacerbating disproportionate health, education and social crises.”
It urges district staff to “include the teaching of the history, culture and government of the indigenous peoples of our state.”
Click here to read the full resolution adopted by the school board.
The Seattle City Council will vote next Monday, Oct. 6, whether to celebrate “Indigenous Peoples’ Day” on the same day as the Columbus Day holiday.
{snip}
|
{
"pile_set_name": "OpenWebText2"
}
|
In semiconductor manufacturing, a low K dielectric is a material with a small dielectric constant relative to silicon dioxide. Low K dielectric material implementation is one of several strategies used to allow continued scaling of microelectronic devices. In integrated circuits, insulating dielectrics separate the conducting parts (i.e., wire interconnects) from one another. As components have scaled and transistors have got closer together, the insulating dielectrics have thinned to the point where charge build up and crosstalk may, in some instance, adversely affect the performance of the device. Replacing the traditional silicon dioxide dielectric layers with a low K dielectric of the same thickness reduces parasitic capacitance, thus enabling faster switching speeds and lower heat dissipation.
|
{
"pile_set_name": "USPTO Backgrounds"
}
|
<!DOCTYPE html>
<html lang="en-US">
<head>
<title>test of border-image</title>
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
<meta http-equiv="Content-Style-Type" content="text/css">
<style type="text/css">
div.p1 {
background: red; /* fail if this shows through */
background-image: url('3x3multicolor.png'); /* fail if this shows through */
border-width: 1px 3px;
border-style: solid;
border-image: url('4x4multicolor.png') 1 1 1 1 repeat;
-khtml-border-image: url('4x4multicolor.png') 1 1 1 1 repeat;
border-image: url('4x4multicolor.png') 1 1 1 1 repeat;
}
div.p2 {
background: red; /* fail if this shows through */
background-image: url('3x3multicolor.png'); /* fail if this shows through */
border-width: 1px 3px;
border-style: solid;
border-image: url('4x4multicolor.png') 1 1 1 1;
-khtml-border-image: url('4x4multicolor.png') 1 1 1 1;
border-image: url('4x4multicolor.png') 1 1 1 1;
}
</style>
</head>
<body>
<div class="p1" style="width: 4px; height: 2px"></div>
<!--<div class="p2" style="width: 4px; height: 2px"></div> -->
</body>
</html>
|
{
"pile_set_name": "Github"
}
|
(v) = 4*v**3 - 16*v**2 + 8*v - 8. Is 12 a factor of d(4)?
True
Suppose -4*z - p = -3608, 113*p = 111*p. Does 28 divide z?
False
Let s(h) = -h**3 - 32*h**2 + 43*h - 26. Is s(-36) a multiple of 10?
True
Let x(p) = -2*p**3 - 15*p**2 + 8*p - 5. Is x(-11) a multiple of 4?
False
Suppose -22 = -2*l - 0*u - u, 0 = -4*l - 3*u + 44. Let p = -9 + l. Suppose 28 = p*a + 2*a. Is 3 a factor of a?
False
Let q(r) = -2*r + 5. Let l(b) = b - 3. Let t(y) = 9*l(y) + 4*q(y). Let v be t(10). Suppose -v*c = -3*d - 114, -2*c + 4*c = -4*d + 52. Does 19 divide c?
False
Let w(g) be the third derivative of -g**4/4 - 5*g**3/6 - 14*g**2. Is 3 a factor of w(-2)?
False
Does 5 divide (5 - -25)/6 - -130?
True
Suppose 5*n - 3375 = -5*f - 1270, -5*n - 1287 = -3*f. Does 53 divide f?
True
Suppose 4*o + 2*o + 30 = 0. Let m = -17 - -32. Let v = m + o. Is v a multiple of 10?
True
Let f be -3*((-32)/(-12) + -3). Let t be (f/2)/(2/20). Suppose 0*o - 300 = -5*p + 2*o, -3*p = -t*o - 180. Is 11 a factor of p?
False
Suppose 163 = 2*o - 125. Is 17 a factor of o?
False
Let z be 27/6 - 4/8. Let q(v) = v + 2. Let w(l) = 2*l + 5. Let u(m) = z*w(m) - 11*q(m). Is u(-5) a multiple of 8?
False
Does 21 divide (-45)/(-60) - (-3267)/12?
True
Suppose j + j = -8, 1035 = 3*s + 3*j. Does 42 divide s?
False
Suppose 3*f = 7*f. Let t be f - 2/8*4. Does 4 divide 4*-2*t/2?
True
Suppose 33*p + 9*p - 11340 = 0. Is p a multiple of 45?
True
Let z be (-2 - (-8)/3)*18. Let f be (45/z)/(2/32). Is 4 a factor of (f/(-21))/((-2)/7)?
False
Let g be 9/(-6) - (-132)/(-8). Does 27 divide 158/6 - 12/g?
True
Let x(l) = -10*l**2. Let u be x(1). Let h = 15 + u. Suppose 5*w - 25 = h*b, 6*b = 2*w + 2*b - 4. Is 2 a factor of w?
True
Let m = 126 - -71. Let s = m - 109. Does 7 divide s?
False
Suppose 39791 - 11391 = 40*k. Is 14 a factor of k?
False
Let n(t) be the first derivative of -5*t**4/4 - 4*t**3/3 - 3*t**2/2 - 4*t + 2. Let p be n(-3). Is (1 - 2)/((-4)/p) a multiple of 9?
False
Let l(h) = -h**2 + 4*h - 2. Let g be l(3). Does 5 divide 30/(3*g/2)?
True
Let j be 3/((-5)/80*-4). Suppose 0 = -j*a - 57 + 537. Is a a multiple of 8?
True
Suppose 0 = -4*p - p + 20. Let y be 16 + p/((-4)/(-1)). Let j = y + 8. Does 11 divide j?
False
Let a(m) = 110*m**3 - 2*m**2 + 2*m. Let h(g) = g**3 - 14*g**2 - 15*g + 1. Let s be h(15). Does 5 divide a(s)?
True
Let a be (-180)/(22/(-6) + 3). Suppose -2*z = -2*k - 240, a + 90 = 3*z + 3*k. Does 28 divide z?
False
Let y(j) = -j**2 - 27*j + 60. Suppose -26 + 103 = -3*z - 4*f, 4*f = 4. Is y(z) a multiple of 10?
True
Let p(r) = -7 + 5*r + 19 + 13*r. Is 20 a factor of p(6)?
True
Is 36 a factor of 52/234*18/1 + 284?
True
Let j be -1*(4 + -3 + 6). Let x(u) = -u**3 - 6*u**2 - 2*u + 13. Is 16 a factor of x(j)?
False
Let r be (-1)/(-3) + 6560/30. Let m = r + -131. Does 22 divide m?
True
Suppose 0 = y - 4*n + 22, 0 = -n + 4 - 0. Let d = 42 - y. Is 16 a factor of d?
True
Suppose m = 2*w + w + 236, w = 3*m - 92. Let l = w - -149. Suppose 0 = 3*z - l - 48. Does 9 divide z?
False
Let w = 80 - 38. Suppose -4*n + n + w = 0. Is 14 a factor of n?
True
Let b be 12/14*14/3. Does 28 divide (-12)/8 - (-118)/b?
True
Suppose -2*x - 4*b + 66 = -38, 185 = 5*x - 5*b. Let y = x + 9. Does 19 divide y?
False
Suppose 103*s + 740 = 108*s. Is s a multiple of 37?
True
Suppose 193 = 5*i - 4687. Does 16 divide i?
True
Let l be (2 - -6)*(-17 + 5). Let s be (3/(-6))/((-1)/l). Is (51/(-4))/(18/s) a multiple of 13?
False
Is 379 + 9/(27/(-15)) a multiple of 13?
False
Suppose -966 = -3*k - 342. Does 13 divide k?
True
Suppose 25 = 5*x, 6*n - x + 10 = 11*n. Is 20 a factor of 1 + 37 + (-3 - (-6)/n)?
False
Let u be ((-6)/5)/((-18)/60). Suppose -67 = -3*m - u*k, 20 = m + 2*k - 3*k. Is 7 a factor of m?
True
Let f = -30 - -35. Suppose -f*y + 2*y = -21. Is 7 a factor of y?
True
Suppose -o + 6 = 2*n, 14 = 6*n - 2*n + 3*o. Let h be (0 - (n + -3)) + 3. Is 13 a factor of 2 + 38 + 3 - h?
True
Suppose -7*x - 2676 = -19*x. Is x a multiple of 7?
False
Is (-21)/(105/(-430)) + (-1 - 1) a multiple of 7?
True
Let s(m) = 2*m**2 + 5*m - 1. Let h be s(-5). Suppose h*d - 6*d - 3024 = 0. Is 24 a factor of d?
True
Suppose 0 = p + 7*m - 3*m - 1, 4*p + 4*m + 8 = 0. Let b = 5 - p. Suppose -l - 5*w + 33 = 0, 0*w + 2*w = b. Is l a multiple of 11?
False
Let j = 18 - 1. Let o = 44 - j. Is 8 a factor of o?
False
Let i = -3 - 1. Let j be i/10 + 285/25. Suppose -j*d + 9*d = -48. Does 9 divide d?
False
Suppose 6*b - 17 = -83. Let c = -8 - b. Suppose 4*q = -4, -c*g - 47 = -8*g - 3*q. Is 5 a factor of g?
True
Let d(m) = 5*m + 135. Is 3 a factor of d(-9)?
True
Suppose 5*u + 0*u - 30 = 0. Suppose -3*y = -6*y - u. Is 10 a factor of 472/24 + y/(-6)?
True
Let w(m) = 39*m**3 + 5*m**2 - 6*m + 12. Does 78 divide w(3)?
True
Let c = -2186 + 3190. Is 17 a factor of c?
False
Let z(k) = -k**3 - 7*k**2 + 5. Let p be z(-7). Suppose -4*x + 6 = -p*x. Is 9 a factor of (-267)/x + (-4)/(-8)?
True
Let u(d) = -25*d**3 - 2*d**2 + 1. Suppose -4*m + 4*y + 11 = -5, -3*m - 2*y = 13. Does 6 divide u(m)?
True
Let v(x) = x**2 + 16*x - 15. Let k be v(-17). Suppose 5*d - 2 = -u, 2*d + 2 = k*u - 2. Suppose -f + z = -3*f + 9, 5*f - u*z - 36 = 0. Is f a multiple of 6?
True
Let c(s) = -2. Let w be 1/(3 + (-42)/15). Let x(p) = p + 2. Let v(t) = w*c(t) + 4*x(t). Is v(2) a multiple of 6?
True
Suppose -5*j + 98 = -0*z - 2*z, 32 = 2*j + z. Does 9 divide j?
True
Let t be (-6)/(10/4 - 4). Suppose 4*z - 160 = -h + 84, -4*z - t*h = -256. Is 15 a factor of z?
True
Let x = 968 + -626. Is 74 a factor of x?
False
Let r be 9/(-2)*(-2)/3. Suppose a - 2*z - r = -z, 3 = -2*a - z. Suppose -4*p + y + 32 = 0, -5*p - y + 26 + 14 = a. Is 3 a factor of p?
False
Let m(z) = z + 3 - 7 + 3 - 2*z. Let f be m(-7). Let s(c) = 5*c - 9. Does 5 divide s(f)?
False
Let y(c) = c**3 + c**2 + c - 3. Let r be y(0). Let b(o) = o + 13. Let d(p) = 2*p + 25. Let n(m) = r*d(m) + 7*b(m). Does 2 divide n(-14)?
True
Suppose -5*o - 2*l - 412 = -1159, 5*o - 743 = 2*l. Suppose 3*z - 101 = -5*i + o, -5*z - 5*i + 430 = 0. Is z a multiple of 33?
False
Let c(r) = 5 - 2*r**2 + 2*r + 10 - 2*r**3 - 12. Let l be c(-2). Is 9 a factor of (26/(-5))/(l/(-70))?
False
Let k = -46 - -51. Suppose 435 = 4*v - k. Is 31 a factor of v?
False
Let i(p) = -2*p**3 + 5*p + 12. Does 2 divide i(-2)?
True
Is 611 + -4 - 5 - 0 a multiple of 7?
True
Suppose 2*h + 2*h = -12. Let o be -1*(0/h)/2. Suppose o = -3*j - j + 8. Is 2 a factor of j?
True
Let t = 3 + 2. Let c be t/((-20)/8) - 8. Does 11 divide (88/(-10))/(c/25)?
True
Let r be (59835/(-65))/(-3) - 2/(-13). Let w = r + -217. Is 18 a factor of w?
True
Let x be (1/(-5))/((-4)/20). Suppose -x = s - 3. Is 12 a factor of s/(-14) + (-127)/(-7)?
False
Let c(g) = -g**2 + 12*g - 15. Let y be c(10). Let q be 1/y + 3/(-15). Let i = q - -2. Is 2 a factor of i?
True
Let u(h) be the third derivative of -h**5/60 - 2*h**4/3 + h**3/3 - 2*h**2. Let c(y) = -y**2 - 4*y + 9. Let p be c(-7). Is u(p) a multiple of 10?
True
Let j(s) = -31*s**3 + 2*s**2 + s. Let d be j(-1). Let m = 32 + d. Is m a multiple of 8?
True
Let s = -3702 - -5356. Is 20 a factor of s?
False
Let y(v) = v**3 + 6*v**2 - 2. Let o be y(-6). Let a = o - -41. Does 6 divide a?
False
Let u be ((-38)/(-19))/((-2)/(-28)). Suppose -5*i - u = -m, m = 3*m + 4*i - 84. Does 19 divide m?
True
Let z = 6 + -4. Suppose -11 = -5*l - 4*u, 0 = 2*l - 2*u - z*u + 18. Is 4 a factor of 26/5 - l/(-5)?
False
Let h = -59 - -10. Is (-4 - -3) + h/(-2)*2 a multiple of 16?
True
Let i be 2*((-2)/(-6))/(2/(-3)). Does 42 divide -1 - (i + (-188)/(12/3))?
False
Let x(b) be the second derivative of b**5/20 + b**4/12 + b**3/6 + 4*b**2 + 14*b. Let d(a) = a + 11. Let g be d(-11). Is 4 a factor of x(g)?
True
Let f = 6 + -6. Suppose f = -5*d + 53 + 112. Suppose 9 + d = 3*j. Does 7 divide j?
True
Let c(w) be the first derivative of w**3 + w**2/2 + 2. Let x be c(-1). Suppose -4*f + 3*s = -x*f - 121, 0 = -5*s + 25. Does 32 divide f?
False
Let m be (-26)/13 + 4/1. Let f(r) = 2 - m*r + 0*r + 34*r**3 + 0*r**2 + 0 + r**2. Does 7 divide f(1)?
True
Let l be 63*1*(0 - 1). Let o = -34 - l. Let t = o + -7. Does 16 divide t?
False
Suppose -28*l + 12067 = -2381. Is l a multiple of 86?
True
Let u(s) = -108*s + 40. Let b(k) = -53*k + 20. Let l(t) = 13*b(t) - 6*u(t). Does 15 divide l(-5)?
True
Let k be (((-1)/(-2))/(-1))/((-2)/976). Let x = k + -114. D
|
{
"pile_set_name": "DM Mathematics"
}
|
"Who is it?" "Who is it?" " Mr. Commissioner!" " Let me in." "What's happened?" " Can you hide me?" " Why?" "Don't you know?" " What?" " The Mafia has taken over." "What?" "How did you think this wretched country would end up!" "It's come to this!" "Bring me a towel." "Holy mother!" " Good evening" " TotÚ Riina?" "Forgive the hour and manner, but I don't have much time, there's a helicopter waiting to take me to Rome to form the new government." "I already have a few names:" "Bernardo Provenzano Vice President," "Leoluca Bagarella for Defense, a Caruana brother for ForeignAffairs." "I've come to ask a question and you, Commissioner Montalbano, must say yes or no, right now." "Will you be my Minister of the Interior?" "Well, what do you say?" "Sir, if you say yes to this criminal," "I swear I'll kill you right here, in person, personally." "Sir, open up, it's Catarella!" "Open up, I'm outside here, it's pourin', I'm gettin' drenched." " Who is it?" " It's Catarella, open up." "I'm gettin' all drenched." "Shut up!" "Go make some really strong coffee, tell me later," "I'm taking a shower." " Don't worry..." " Go!" "Can I talk now?" "Sir, they found a dead body!" " Afresh one?" " I don't know, they didn't say." " Where?" " In the country, Pizzutello area." " Aren't our guys are there?" " Yes, Fazio and Augello." "Then why come bustin' my balls?" "Forgive me, but Mr. Augello said to tell you your presence in person, personally is indispensable." "You didn't answer, so I came for you in the jeep." " Why the jeep?" " Only a jeep can get there." "Where are we going, to Vietnam?" "I don't know, but Augello said to wear boots, a hood and even a rain-coat." "Even?" " Is there any more?" " Right away." "What a bummer!" ""How much do I get?" "I'll turn him over to you."" ""How much do I get?" "And I'll turn him over to you."" "What the hell are you saying?" "When I drive, it's natural to rehearse my lines." "For a month, I've been in a "grammatic society"!" "What?" "It's where they do a play of plays." " Dramatic society!" " Yeah." " What are you doing?" " The Passion of Christ." "That's when the Lord was killed on the cross, but I'm not playing Jesus, I'm short, dark..." "Well, you understand." "You said: "How much do I get if I give turn him over to you?"" "You're playing Judas?" "I didn't want to, I swear!" "Watch the road!" "It's muddy, the road's slippery and betraying!" "Are we playing hide and seek?" "They said to stop where and when I see their jeep." "Honk." "The horn doesn't work." "Good grief!" "Don't get mad, I'll look for them, ifthe jeep's here, they're around somewhere." "Good." "Sir!" " Sir!" " What did you do?" "Sorry, I parked too close to the edge." " Are you hurt?" " No, still at your command!" "There's Fazio." "Commissioner, we're here!" "I'll go that way." " What did you do?" " I parked on the edge." "Just look at you!" "Catarella!" "Fazio, keep it concise, because I'm already pissed off." "Pasquale Ajena found the body, it's his land, he comes every day." "Could I know where the body is?" "It should be up there, about 150 meters." "What, it should be?" "It's been raining till now and Mr. Augello said to wait for you." "He said to wait?" "Well, Mr. Augello, can we see this body?" " Let's stay, this is fun." " Come on!" "Wanna spend the whole day here?" "So the bag was buried and the water brought it up?" "Yeah, that's right." "I was on my way home, when I saw the bag." "It was big and black, like the ones for trash." "How did you know there was a body?" "Did you open it?" "No need, the bag was ripped and I saw a foot." "So I ran home and phoned you." "What time did you find the bag?" "About 6 a.m." "It took you two hours to go home and call us?" "We got your call at 8 o'clock." "Meantime, you didn't call someone to take back the body?" "No way!" "I didn't call anyone." "Then what did you do?" "I thought if it was good to call or not." "Why?" "There's always trouble when the fuzz are involved." "How dare you?" "Don't call me fuzz!" " He'd better watch his mouth!" " Mimi, calm down." "Mr. Ajena, why isn't the bag here anymore?" "Commissioner, maybe water or dirt dragged it down, or someone came and took it back." "Okay, let's go." "Thank you." "Sir!" "I slipped!" "I saw that!" "Sir!" "I found him!" " Who?" " The dead man!" "Good!" "Fazio, take care ofit." " I'm leaving." " But we have to investigate!" "Use your brain:" "Ifthe body were fresh, I could be useful, but who knows when or how he was killed!" "You have to call the coroner, the DA and Forensics." " They'll take two hours." " What can I do?" "Why did you tell Catarella I was indispensable here?" "I thought you could..." "I'll tell you why, you wanted to bust my balls!" "You wanted me to slop around here." "Just me and Fazio had to slop around?" "I won't answer, I'm a gentleman, but anyway, fuck off!" "What timing!" " Who is it?" " Fazio." "Come in." "Sorry I'm late, I showered at home." " Don't worry." "Did you eat?" " No, thanks." "So?" " Did you pick up the bag?" " Want to hear this?" "When we got back to the potter's field, it was pouring again, the DA, Forensics, Pasquano were all there, the bag Catarella saw was gone." "What a pain, that body!" "Where was it?" "With the downpour, it had slid ten meters, the bag was open and some pieces had come out." "What pieces?" "Before he was put in the bag, he'd been cut into pieces." "Lots of pieces." " His head too?" " His head too." "Did you see his head?" "Yes, but there was nothing to see, his face was gone." "They'd hammered it to a pulp, a bat, something heavy." " They didn't want him identified." " Probably." "They cut his right first finger and burned his fingertip." "Know what that means?" "Yes, maybe he had a record and could be identified by his fingerprints." "Does Pasquano know when he was killed?" "Over two months ago, he'll know more after the autopsy." " When is it?" " Tomorrow morning." " Not eating?" " No, no way!" "The second course is stew." "Last night, about 2, my wife started labor so I rushed her to the hospital in Montelusa." "Coming into Vigata, my headlights caught a the back of a woman walking in front of me." "Right then, a car came racing, it passed me, swerved a little and headed straight forthe woman." "She must have sensed danger from the engine noise, she jumped and fell into the gutter." "The car stopped and then raced off." " So, it didn't hit her." " No, the woman jumped aside." "I asked if she was hurt, she said no, so I offered to take her into town." "She said where to stop and then got out, begging me not to tell anyone." "She let on she had a relationship." " How old was she?" " About thirty." "Tall, beautiful, upset, but beautiful." "Eyes like high beams, a mouth Ferrari red, a bumper, a chassis..." " Did you get the license plate?" " Yes, but I forgot it." "I remember it began with "AX"." " How did it end?" " With the woman?" " No, with your wife." " I don't understand." " Are you a father?" " Yes, an 8-pound boy." " Congratulations." " Thanks." "What do you think?" "What can we do if a drunk had fun scaring a girl by pretending to hit her?" " Think it's a joke?" " Don't you?" "What ifit was attempted murder?" "In front of witnesses?" "Giacchetti was behind him." "What could he have said, ifhe'd killed her?" "License plate for instance." "Lfit was a stolen car?" " I check it out?" " Yes." "But don't waste a lot of time, it might be nothing." "Hello, doctor." "Help yourself." " I see you have already." " No." "It seemed so." "Please sit down." "Here you go." "The pastry's wonderful." "I like them both with and without raisins." "They're delicious like this." " You have almonds put in?" " Of course!" " Without almonds..." " That's the secret!" "The shell's especially nice." "Now they use stainless steel but it's not the same." "No, with bamboo." "We're on the same wavelength." " So, what can you tell me?" " About what?" "The body in the bag." "It was a long, complicated thing, first I had to complete the puzzle." " Meaning?" " I had to put the body together." "They'd cut it up, did you know?" " How many pieces?" " Lots." "They didn't spare the butchery." " First they killed him..." " How?" "One shot to the head." " When did it happen?" " A few months ago." "As I was saying, they beheaded him, they cut off his hands and legs, they even cut his right arm and forearm, leaving the left forearm intact." "Doesn't that seem strange?" "Can anything help identify him?" "Yes, I found a bridge in his stomach." "What bridge?" "The "Broccolino" Bridge!" "I mean teeth." "As he was eating, this person lost a bridge and he swallowed it." "I sent it directly to Forensics." "It'll be a month before we hear anything." "Yeah." " Another cannoli?" " No, thanks." "Besidesthey're finished." "Salvo, did you fall asleep in your chair like usual?" "No, Livia," "I was having a drink on the veranda." "I have to talk to you." "I received a long call from Beba this morning." "She's mad at you." "Why?" "She says you mistreat Mimi." "Me?" "What's Augello telling her?" "It's not true?" "No way!" "We've had a few arguments, because he's stressed, but mistreatment..." "Actually, he's been unbearable." "Do you know why?" "How could I?" "You've had him do lots of night stakeouts this month, practically every other evening." "Nothing to say?" "What can I say?" "I'll go on, the other evening he got home exhausted, he'd been out in the rain all day recovering a corpse." "Is it true?" "Yes." "But you gave him night duty." "Isn't that a little sadistic?" "Yes, Livia..." "It's not sadism, it's just that..." "We're doing an investigation that's very complex and tough and I don't have... many reliable men, so..." "But I promise Beba we're getting new personnel so I'll stop exploiting Mimi." " Promise?" " I promise." "I'll count on it." "Talk later." "Okay, we'll talk later." "So?" "Nothing," "I'd just like to know your intentions." " In what way?" " I mean the body in the bag." "Let's set things straight to avoid misunderstanding." "Will you take care ofit orwill I?" "Who's responsible for this police station?" "If that's it, the matter's closed." " The investigation's your right." " What's with you?" "Haven't you've had more space lately?" "To investigate what?" "Bullshit:" "The supermarket heist, the post office hold-up." " The Call murder?" " That was an investigation?" "We nearly found Mrs. Call with a smoking gun." "This one, the body in the bag, can make the love for this job return." "So?" "I don't want an investigation that you then take back." "I don't like yourtone." "What's eating you?" "Goodbye." "Come in!" "Come sit down." "Did you talk to Dr. Pasquano?" "What did he say?" "Before being cut to pieces, the dead man was hot in the head." " So..." " It was an execution." "A Mafia signature." "The usual procedure:" "They tied him up, made him kneel and shot him in the head." "All the questions remain:" "Who he was, why they killed him, why they made him unidentifiable, why they cut him into all those pieces." "Maybe to carry him more easily." " They had to cut all those pieces?" " Not really..." "I don't see why they buried him there, under a few inches of dirt." "Alittle rain and the bag came out." "I think the killers wanted the body to come out in a short time." "But why?" "I don't know." "By the way, what about the woman Giacchetti saw?" "Her name's Dolores Alfano, 31, married, no kids and she lives here in Vigata." " Is she foreign?" " Yes, Spanish or South American." "Alfano met her abroad, fell for her and married her." " What about the husband?" " He's a sea captain." "Assigned on a container ship as second officer." "He's been away two months, they say he comes back just a few times a year." "Hello." "Hello." " Catarella, would you please come?" " Right away, sir!" "Come in!" "Come right in." "What is it?" "Please sit down." " May I?" " Please." " Do you have a fever?" " No." "What's the matter, you've been crying?" "Alittle." " Why?" " Like that, just to..." "Just a little, like that." "Like that." "Yes, a little." " Is Mr. Augello in his offce?" " Yes, Inspector Fazio too." "Send me Fazio." "Commissioner, I have to say some things." "First tell me why Catarella's been crying." " Did you ask him?" " He didn't answer." "Then why ask me?" "What the hell's going on in this station?" "Sorry." "I apologize, I provoked you." "Things have been a little rocky around here recently." " Augello?" " You know." "I don't know what's happened to him." "I really don't know, he's changed." "He's always stressed, gets angry at everything, bawls people out, insults." "Agent Spada wanted to turn to the unions," "I managed to dissuade him, but this can't go on." "Why didn't you tell me earlier?" "No one likesto tell on people." "What happened to Catarella?" "He didn't pass a call to Augello, thinking he wasn't in the office, then she called back and he passed herto him." "So, it was a woman?" "And then?" "Augello came out of his office in a rage." "He started shouting, shook Catarella by the collar... and hollering, asked why he didn't pass the first call." "Then he insulted him in front of everyone." "Poor Catarella began to cry." "He's never done that with me." "Maybe when you're here he holds it in." "What did you want to say?" "When I told you about Dolores Alfano," "I forgot something a shopkeeper had said, that is, Giovanni Alfano, Dolores' husband, is Filippo Alfano's son." "So?" "Filippo Alfano was a big shot in the Sinagras." "Suddenly, Filippo Alfano disappeared, showing up again in Colombia with a wife and kid," "Giovanni Alfano was about 15." "Word was he'd gone there to look after Sinagra business." "But after a while, he got shot." "No one knows who did it or why." "Here we are." "So..." "Do we talk now or after dinner?" "About what?" "Don't play-act with me," "You call me only when you need something." " You're right, sorry." " Don't apologize." "It's another reason I like you." "Well, you know Mimi is married." "Yes, to Beba," "I also know they have a boy named Salvo, like you." "Right." "I have reason to think" "Mimi has a lover." "Nothing to say?" "Knowing Mimi, wasn't it foreseeable?" "Is this story scandalous to you?" "It's normal, why does it bother you?" "Let him be, it will die out on its own." "I can't, because..." "Mimi tells Beba" "I'm always using him for night investigation," "Beba complains to Livia, Livia calls me..." "If this goes on, Beba herself will call me, then I can't cover Mimi any more." "Besides, he's so stressed, argues with everyone, he even made Catarella cry." "Either this fling upsets him because he loves Beba and feels guilty or he's falling in love with the other woman." "What do you want to do?" "Could we eat the fish before it gets cold?" "I'll serve?" "I don't like what he asks or the letter's tone." "Meaning?" "As I said, Mimi is unbearable, but the tone here is different, he gives his reasons, asks for help." "Mimi would never use that word, by chance." "What will you reply?" "I don't know, I have to think it out." " How do I help you?" " Right." "Find out" "If Mimi really has a lover and who she is, follow him." "He goes out tomorrow for sure, he told Beba I asked him to do a night stake-out." " It's not true." "Know his house?" " Yes, then what?" "Call me, at any hour." " I should be jealous." " Why?" "Who knows if you'd be concerned for me like this." "You're not my second in command." "Dear Mimi, I read your letter carefully." "It didn't surprise me, given your recent attitude." "I understand in part why you wrote it and I've decided to meet you halfway." "But don't you think asking autonomy on the potter's field body is a mistake?" "You know I consider you a smart, skillful investigator, but this is a case which would put even better cops than us in difficulty." "I hesitate to give it to you because I'm a friend, a failure on your part would create many complications, not only on a personal level, think about it." "If you insist, give me a few daysto decide." "I embrace you with unchanged affection." "Salvo." "Look at the Messiah, the King of the Jews." "You said you were God, instead you're a madman." "I spilled the blood of an innocent man," "I betrayed a just man for thirty pieces of silver." "I'm corrupt, a traitor, a snake, as I will be in centuries to come." "Delivered to his enemies by Judas, with a traitor's kiss, beaten by Satan and by vile money." "All judgment left Judas Iscariot, he fled, wandering fields and valleys, burning with guilt and shame." "Into the Sanhedrin bursts the restless Judas." "I curse you," "I curse all of you!" "For thirty pieces of silver I betrayed a just man," "I spilled the blood of an innocent man." "Your promises swayed me and I will bear the mark of betrayal for all eternity." "What is that to us?" "Look to it yourself." "Here, take back yourtainted money!" "The price of my horrible crime," "I'm ready to pay!" "He's good!" "Stop." "It's not lawful to deposit this in the temple treasury, for it is the price ofblood." "We'll buy the field known as "potter's", for the burial of foreigners." "Hello?" "Is this the Club?" "I'm Commissioner Montalbano, may I speak to Dr. Pasquano?" "I'll go ask him." "The doctor's playing poker and doesn't want to be disturbed." "Tell him if he doesn't come to the phone immediately," "I'll come with the police band playing Aida, triumphal march included." "I'll go tell him." "Agentleman can't be in peace without you coming to break his balls." "Why do you feel the need to lock horns with me?" "What the fuck do you want?" "Hello, is it all out?" "Not yet, you huge pain in the ass." "Can I talk?" "Yes, but then disappear, or I'll give you an autopsy without anesthesia!" "I have to know how many pieces the potter's field body was cut into." " I forget." " Doctor!" "I'll count." "Fingers and toes make 20, then legs, ears... 29 in total." " Wait, 30 pieces." " You're sure?" "Absolutely." "They didn't cut his arm because it would make 31 pieces, it had to be 30, like the pieces of silver." "What are you saying?" "I'll explain later, thanks for the exquisite cordiality." "I hope I don't hear from you for several years." "Good!" "What happiness to see you." " You were great!" " See how the Grammatic Society is?" "You have to leave the police and be an actor." "No, I swore under the nation's flag," "I can do both." "But don't stop acting, you have talent." " What's wrong?" " All these compliments..." "Such power, power in your gesture, your voice." " I studied Grammatics." " It shows!" "I'd never have guessed, you seemed like that actor, that bald guy." ""Judas, his betrayer, seeing that Jesus was condemned, regretted it, and returned the 30 pieces of silver to the chief priests and elders, saying: 'I have sinned in betraying innocent blood'," "but they said: 'What is that to us?" "Look to it yourself." "The chief priests gathered up the money, but said:" "'Lt is not lawful to deposit this in the temple treasury, for it is the price of blood' and they used it to buy the potter's field as a burial place for foreigners"." " Understand?" " Not really." "Remember, the potter's field owner told us he sells clay to make pots, so his field is the potter's field." "So?" "We're interested in two things:" "The potter's field and the thirty pieces of silver." "Thirty, like the body pieces." "The shot to the head made us think of a Mafia crime, but now we know something else." "Whoever ordered and committed this crime follows the rules of the old Mafia, that spoke through symbolism." "If a guy's killed and found with a stone in his mouth, he'd talked too much." "If a dead man had his shoes on his chest, he wanted to run." "So, our dead man was killed because he betrayed, like Judas." "Exactly, but at this point the case is closed for us." " Why?" " It goes to the DIA Antimafia." "Why give this case to the DIA?" "I know what I'm doing, go get some rest." " Commissioner..." " Mind your business and trust me." "Well," "Mimi left his house at 10." "At first I thought he was going to your place." " Why?" " He headed towards Marinella." "At a certain point, he suddenly slowed down and stopped at a small villa, he got out, opened the gate and went in." "I was very close at that point." " What did you do?" " I kept going." " You passed behind him?" " Yes, but he turned." "Oh." "He didn't recognize me, my car's new," "I was wearing big sunglasses and a Greta Garbo hat." "Let's hope." "I came back with lights off, the lights were already on in the house." "He unlocked the door and the woman waiting for him came to the door." " Did you get a good look at her?" " No, I was too far off." "Was I good?" "Very good." "Thanks." "Excuse me, are you looking for someone?" "Yes, hello." "I'm looking for Mr. Casanova, this should be his home." "No Mr. Casanova lives here." " Whose home is it?" " Mr. Pecorini's." "He's never here, he rents it." "I see." "Where can I find Mr. Pecorini?" "In Catania, the Picaniello area, he opened a wonderful butcher shop there." "Thank you, good day." " Commissioner." " Come in." " I got it." " Meaning?" "I called all the agencies in Vigata and finally hit it." "Pecorini entrusted the house to the "Bella Casa" agency." "What did you learn?" "Pecorini's 40, he's from Vigata and is a butcher." "Two years ago he moved to Catania and opened a large butcher shop." " Who's the villa rented to?" " No one, it's vacant." "Vacant." " What is it?" " There's a woman for you." " Where?" " In the waiting room." "Says her name's Dolorosa, but she's not dolorosa, she brings happiness!" " She wants to talk to you." " Show her in." "Sir, what a woman!" "You need lots of eyes to look at her." " Show her in." " Certainly." "Miss Dolorosa, please go in." "Thank you." "Good evening." "My name is Dolores Alfano." "Alfano's my husband Giovanni's surname, mine's Gutierrez." " Spanish?" " No, Colombian." "But I've lived in Vigata a long time." "Tell me." "My husband set sail on a container ship, he's second officer." "What happened?" "For twenty days he didn't write or call." "I got worried and called him, he said he was in good health and busy with work." "Then I received this postcard the other day." "Here it is." " So now you're reassured." " No." "I'm not reassured," "I don't think he wrote it." "The handwriting and signature are different." "Compare it with last year's." "This postcard made me think back to the phone call." "His voice was different," "I thought it was because ofthe cell phone, but I'm not so sure now." "What do I do?" "I don't know," "I agree the handwriting on these two cards is different." " Did you try calling again?" " Yes." "I called several times, but he neveranswered." "I tried again before coming here, but there's no answer." " I understand your concern." " Can't you do anything?" "No, you can't even report him missing." "Who can say things didn't go differently?" "Differently?" "It's just guesswork, your husband may never have embarked because he had an encounter..." "I'm not sure I'm clear, an encounter..." "No!" "My husband loves me," "I'm sure ofit." "Let me show you something." "He sent me this 4 months ago." "I can only make a suggestion." "Do you know the name of your husband's ship?" "Yes, it's called Ruy Barbosa." "You could contact the shipping company." "It's the Stevenson Guerra, it has a representative in Naples, Pasquale Camera." "I should have his number." "Here it is." "You can't give it to me, you have to make the call." "Please, Commissioner, help me," "I don't know how to resolve this thing." "Please." "Okay." "I'm counting on you." "I spoke to Musante at the DIA." " What did he say?" " An odd thing." "They got a indication that turned out to be a false lead." "They received an anonymous letter two months ago." "Big news!" "No, this letter seemed to have a basis of truth." "It said Don Balduccio had ordered a man killed." "He's 90, doesn't handle family business anymore!" "That's what the letter said, that he'd intervened for a personal offense." "Who's the person that offended him and he ordered killed?" "We don't know, the letter just says he was a runner who sold the goods instead of delivering." "And what did the DIA conclude?" "They went right into action and discovered that Don Balduccio was in a coma in a clinic, and became convinced he never could have ordered a murder." "Anyway, they didn't even find the runner's body." "So?" "They concluded someone was taking the piss..." "Or someone wanted to bother Don Balduccio not knowing he was in a coma." "Get in." "My husband never embarked on the Ruy Barbosa?" "Seems not." " You're not joking, are you?" " No." "What happened to him?" "The most credible theory is a voluntary disappearance." "Why?" "Mr. Camera says just before your husband embarked, he wrote a note mentioning a better cargo." "It might have been fake, like the postcard." "In fact, I'd like to have this note, but I need your official missing person report." "I'll do it, do I come to you?" "No need," "Fazio will get it here." "I have to ask you a few questions." "Sit close to me." "Come here." " Here?" " Yes, close." "From the letter you had me read we deduce the relationship with your husband is... very intense." "Yes, very." "Okay." "The last few times he was home, had the relationship weakened a little?" "Had anything changed?" "Yes, Giovanni had changed." " But not the way you think." " No?" "Recently Giovanni had become... ravenous." "He could never get enough, after lunch I couldn't even reach the bedroom." "He asked for things he'd never asked for." "So, you exclude he ran away with another woman." "Absolutely." "Then let's end this discussion." "Did he have enemies?" "He never spoke to me about enemies." "Some arguments with other officers or crew members, but nothing important." "And here in Vigata?" "He had very few friends here." "When he was young, he moved to Colombia with his parents, he was more abroad than here." "Do you have the names and addresses of his friends in Vigata?" " Of course." " We'll get them." "When was your husband supposed to embark?" "On September4th, from Gioia Tauro." "We left together by car the day before." " Why together?" " To be together to the last minute." "We'd rented a small apartment." "Why?" "Giovanni didn't have much time to come to me in Vigata, so I'd be there and we'd be together a few days until his departure." "I see." "Did your husband receive any callsthat night?" " None." " The next morning?" "Giovanni left at 8, I stayed there," "I put the apartment in order and left for Vigata." "Did you ever return to Gioia Tauro?" "No, what for, alone?" "So, the apartment is just as you left it on September 4th." "Yes." "You should give us the address and keys." "Alright." "The last pictures taken with my husband." "Look, here Giovanni came out well." "Where's this?" "I told you, we went to one ofmy husband's relatives, his name's Don Balduccio Sinagra." "I'll leave you with Fazio, who'll fill out your report." "Rememberto get the names and addresses ofthe husband's friends in Vigata." "Goodbye." "Please, help me find my husband." "I can't do without him." "Please, do something." "Don't worry, we'll do all we can, okay?" "Hello?" "Hello, it's Macannucco." "Macannucco!" "Well?" "Like you asked, I got into the apartment in Via Gerace." "And?" "First I have to say something." "Can you get me a copy of the search warrant in an hour?" "I'll try." "Please!" "You went in person?" "Yes and I even took a look around, there was a shoe box in the living room, on top of the cabinet." "It was empty, but inside were traces ofwhite powder." "Can you tell me what it is?" "No doubt:" "Cocaine." " The pictures?" " I'm sending them." "Okay." "Thanks, we'll be in touch." "See you later and don't forget the warrant." "Don't worry." "I don't understand." "Someone entered after..." "Impossible, I left it tidy." "Those are your husband's trousers." "Yes." "He had them on before embarking." "So, your husband waited for you to leave the house, and came back with someone else." "To do what?" "It's so strange, he doesn't like beer." "I have some in the fridge fornow and then." "Explain it to me." "Why would Giovanni have gone back?" "With who?" "Maybe he had to meet someone, unseen, because officially he was already onboard..." "Excuse me!" "One last question." "How did you meet your husband?" "In my father's office." "The nurse had to leave and he asked me to fill in." "Your father's a doctor?" "He was a dentist." "What dental care did your husband need?" "He had a motorcycle accident, and broke two teeth my father made a bridge for him." "Commissioner?" "So you're sure, the body in the potter's field is Alfano." "I'd say so." " Got any idea why?" " Yes." " Don Balduccio?" " Don't you think?" "Know what Macannucco said?" "Despite the checks, Giovanni was traffcking drugs." " Seems impossible." " Instead it's very possible!" "For Don Balduccio it's a great insult." "Giovanni's a traitor and has to be eliminated." "So he has him cut in 30 pieces like the pieces of silver." "He lets him go to Gioia Tauro with Dolores and abducts him there, brings him back to Vigata and kills him." "So the body's not found too soon, he says he embarked." "Right and the plan worked, even if, at a certain point, Don Balduccio gets sick." "That must be how it went." "What do we do about his wife?" "We won't say anything for now, she can't even identify the corpse, she's no help to us." "The ones who sent the letter to the DIA, knew everything." "Right, and when the time's right, we'll spit on Musante's nose." "But right now, I still want to think it over a few days." "Let's go." "One moment, I'll get him." "Sir, it's for you." "Coming." " Who is it?" " Mr. Giacchetta." " Commissioner Montalbano?" " Yes, who's this?" "Fabio Giacchetti, remember?" "Yes!" "How are mother and son?" "Just fine, thank you." "I don't know... okay, I'll say it!" "I saw that car again." "What car?" "The one that tried to run the woman down, remember?" "Sure!" "When?" "Yesterday, it was in front of me, at a light." "I got the number." "You're sure it was the same car?" "How?" "Sometimes I am, sometimes I'm not." "But I recognized it, it's like the one from the other night." "It had a broken left taillight." "So, I took the number down." " Could you give it to me?" " Sure." "AX962TP." " I'll read it back:" "AX962TP." " Right." "Go out, take a look around, and let me know." "Hello." "What's this discovery mean?" "What words hammer your brain after Giacchetti said the car that tried to hit DoloresAlfano" "was that of my vice commissioner, and friend, MimiAugello?" "The words are, collusion and conspiracy." "Mimi Augello and Dolores Alfano hatched a plot against me, because there's no doubt they're lovers." "Their encounters began in September." "Soon after Giovanni Alfano had embarked." "Did he start it or did she?" "Let's try to understand how things went." "After the discovery ofthe body in the potter's field," "Mimi pushes me to get the case, but why?" "Why that case specifically?" "Maybe he knew the corpse was his lover's husband's?" "Lfhe knew, who could have told him?" "Dolores!" "So Dolores knows her husband was murdered." "How to define Mimi's behavior?" "Mimi is certainly sexually blackmailed by Dolores." "He doesn't know how, or he can't, say no." "Dolores is a beautiful girl who knows how to use her words." "But there's just one word." "Betrayal!" "Betrayal!" "But if Mimi got mixed up in the thing, if he fell... in that damned potter's field, the only one who can pull him out... is me." "Let's see if I can." "Let's see if I can." "What are you doing in that trash?" "Hello, I'm Commissioner Montalbano, who are you?" "Esterina Trippodo." " You're a neighbor?" " Yes." "Can I ask you something about the Alfanos?" "Think I should waste my time with all the realm's commissioners?" "Actually, this is a republic." "I don't recognize this shitty republic." "I'm a monarchist and I'll die a monarchist." "Want the truth?" "I'm fed up saying the same things a hundred times." "Sorry, but would you to a Commissioner who's a... monarchist?" "If I say it in front of everyone, I screw my career, but I'm a monarchist!" "Beautiful, what joy!" "Let's go." "Long live the king!" "Tell me." "The last time the Alfanos were here, on September3rd and 4th, did you see them?" "No, but they were here, because I saw their lights on and their car." "The next morning, must have been 11, they'd already left." "Did you notice anything strange?" "To make you vomit!" "What did you see?" "I went out, but they'd already left and I went to empty the trash, I usually do it." "What was inside?" "Asyringe, full ofblood." "Good thing I had gloves!" "Did you tell my colleague Macannucco?" "I didn't tell him a thing, he's not one of us like you!" "Come in." " May I?" " Fazio, come in." " Did you talk toAlfano's friend?" " Yes." "Did he say anything interesting?" "I'd say so." "The one who sent Arturo Pecorini from Vigata, was Don Balduccio Sinagra in person." "Why?" "In town there were strange rumors about an affair between the Alfano woman and Pecorini." "Don Balduccio let Pecorini know he'd best get out." "Give me the whole story." "Well..." "A little more than two years ago Arturo Pecorini, the butcher, falls crazy in love with DoloresAlfano." "But he doesn't do things in secret, nossir, he sends her roses every morning, gives her expensive gifts, and the whole town gets to know." "He knows she's the wife of Balduccio Sinagra's new protege?" " He's totally aware." " Is he crazy?" "No, he's conceited, and violent, he says nothing and no one scares him." "So, a thug." "At 20 he was arrested for murder." "But he was acquitted for lack of evidence." "Five years later, another acquittal for attempted murder nothing afterthat, but he was, and is, a bully." "Why didn't Dolores go to the Carabinieri?" "She doesn't because... she likes the butcher." "This thing reaches Don Balduccio, who can't accept a butcher cuckolding his relative, someone he was fond of." "What did Don Balduccio do?" "He spoke to Dolores, 4 days later Dolores goes to Colombia, her mother's ill." "And Pecorini?" "He perceives Don Balduccio's message and pulls up stakes, leaving Vigata permanently." "At that point, Dolores comes back..." "she can, understand?" " Is Augello here in the station?" " Yes." "Call him and return with him." "Can I ask you something?" "I've had a question in my head for a while." "Tell me." "How did you know Pecorini had an affair with the Alfano woman?" " I didn't." " You didn't..." "Then why did you ask about Pecorini, before the Alfano woman came to the station?" "I can't tell you, not now." "Thanks anyway." "I'll go get Augello." "Mimi, come in." "Fazio, tell Catarella we mustn't be disturbed." "Then come back here." "Mimi, have a seat." "Sit down, Fazio." "So..." "For a while now, the atmosphere in this station hasn't been good." "Do me a favor, talk only when I say so." "Very probably, a good part of what's happening is my fault." "I'm the first to realize that," "I've lost a little of the energy that pushed you to follow me everywhere and always." "We were, more than a team, just one man." "Did I tell you to talk?" "No." "Now, Mimi, you come saying you need more autonomy," "more space, you give me a forced choice..." "Are you preparing the succession?" " Can I talk?" " Just to answer this question." "No." "Things aren't the way you think." "Then I need add nothing, my word will be enough, you need nothing written, okay." " What's that mean?" " You'll do the investigation." " What?" " The body in the potter's field." " Commissioner, it's his now?" " Right." "On one condition:" "Whatever move you make, an arrest, a press conference, an announcement, you tell me first." "Naturally..." "Good." " Can I hug you?" " No need." "I'm off for a few days, you'll fill in." "Fazio will tell you about the case later and then he's at your disposal, best of luck." "Thank you." "Thank you." "Commissioner, I don't know why you made this decision and I don't want to know." "But it's a decision that could ruin this police station." "Augello's on another planet right now." " I don't want to work with him." " Fazio, it's an order." "At your command." "Try to understand." "It's delicate, the Mafia's in this!" "That's why you're at his side." "But if Augello flips, I certainly can't stop him." "Tell me and I'll intervene." "But you're leaving!" "Nothing will happen right now, don't worry." "Anyway you have my cell number." "I do, but it's no good because it's always off." "Anyway I understand." "What there is to understand," "I understand." " I take my leave." " Good." "What would you like?" "That's exactly the problem, my wife gave made a list, but I can't remember one thing." " Classic." " Don't send me for groceries!" " Excuse me." " No problem." "May I?" "Tanino!" "Commissioner, welcome, how are you?" "Fine, you?" "I eke along!" "Your room's ready." " Excuse me." " Mr. Knight sir, catch anything?" "My ass." "Give that to me, come along." "Commissioner, this is your table." "You don't mind dining with our Knight Pitacuda, do you?" "No!" "Salvo Montalbano." "Liborio Pitacuda and I'm no knight." "I must warn you of something, at the expense of seeming impolite." "When I talk, I don't eat and so, when I eat, I don't talk." "Welcome to the club." "Let's see what wonders Tanino has for us." "Here it is!" "Spaghetti with sea crab." "Enjoy." "May I?" "Bass with saffron." "Do you think this miracle might happen again?" "It will, don't worry." "Like the miracle of the blood of Saint Janarious" "I've been coming here for years and I've never been disappointed with Tanino's cooking." "The chef of a famous French restaurant wanted to take him to Paris." "No way, he wouldn't budge!" "Tanino says:" "I'm from here and here I'll die." "There's such a mixture of flavors" "I'd like to know where he learned to cook." "Tanino, come here." "Tell the Commissioner how you became a cook." "What can I say?" "Until a few years ago, I was a petty crook, in and out of jail." "Nice introduction!" "Go on." "One night the Virgin Mary appeared to me." " You're joking?" " That's it." "She was beautiful, shining, she took my hands, looked into my eyes and said:" "'You'll become a great cook"." " How's that possible?" " Did you know about the Madonna?" "No." "Yet for the bass you used the word miracle." "Thank you, you can go." "Always at your service, Sir." "I'll remove your plates." "Why are you in these parts?" "I need a little time to myself." "I understand!" "Once a year, I take time and come here." "In Trapani I live with my wife, four daughters and eight nieces and nephews!" "I purify my system here," "I pass the waters of solitude." "This is like a clinic forme where I eliminate an excess of emotion." "What do you do in Trapani?" "I was a Philosophy professor, now retired." " Do you miss teaching?" " Not at all!" "What reason is there to teach philosophy today?" "Young people today no longer apply themselves, it bores them to learn what Kant and Hegel thought." "Philosophy should be replaced with..." ""Instructions for Use", so it would still make sense." " For use of what?" " Of life." "For example, teaching young people what it means to catapult into a car on Saturday nights, and tell them how this could be avoided philosophically." "In his memoirs, Benedetto Croce wrote..." "I'm retired and always talk about philosophy." " You say interesting things." " I do?" "Good night, I'm offto bed." "I leave tomorrow." "The first time I came here, my father was dying." "I couldn't see him on his deathbed, the idea terrified me." "When I finally went, it was too late." "Some time ago, I followed an investigation of yours, the one on arms trafficking, that led you to discover the tomb ofthose two young lovers, the one with the terracotta dog." "In that circumstance, you abandoned the arms trafficking investigation and dove into a crime committed fifty years earlier the effects of which would have had no practical effects." "Know why you did that?" " For curiosity?" " No." "To escape daily reality." "Evidently, daily reality istoo heavy for you and you run away, like I do, when I take refuge here." "That your father was dying was real, but you refused to acknowledge it." "Do you miss him?" "I do." "Macannucco, it's Montalbano, listen to me." " Not even hello?" " Hello." "Go back to the house on Via Gerace and get the trash bin." "It was rusty, remember?" "A syringe, full of blood." "I just remembered the inside ofthe bin was laminated against rust, so those stains aren't rust, they're dried blood, from the syringe." "Nice shot." "If that's it, I'll go get it." "Another thing." "I'm sending you a letter by courier to send from Gioia Tauro." "Who do I send it to and why?" "I'll write that too, okay?" "Yes, it'll be done." "Adelina!" " What is it?" " Come here." "What is it?" " Sit down and write." " Me?" "You know that me and writing..." "It doesn't matter, get a sheet of paper and write what I'm writing here, okay?" "Here, read it." ""I've the syrinch you know well." "Guess whom I am and come to me for making a deal"." "It's full of errors!" " You wrote like an illiterate." " It's good like that." "Take your time, I'll go take a shower." "Commissioner, I'm here." "I'm extremely grateful, your exquisite courtesy..." "Don't worry." "Until a while ago, it seemed Don Balduccio might pull through, but he's just had another crisis and the doctor won't let him expend his energy." "He's tormented by this, if you allow, I'll tell you myself." "Years ago," "Don Balduccio gave an order he was sorry about later." "He'd heard that a relative was working in his own interest, instead of the Sinagras'." "Don Balduccio believed it... and made a mistake." "Not even six months later they told him what had been said about that man wasn't true." "But the mistake had been made and there was no turning back." "How to make amends?" "There was just one way." "Don Balduccio made that man's son his own and gave him a clean life." "You know we're talking about Giovanni Alfano." "Before he left, Giovanni came here." "I know, I saw the pictures." "At that time, Don Balduccio gave him a letter to take to a friend in Villa San Giovanni." "It was never delivered." "We think Giovanni wasn't able to do it." "Why?" "It's possible he never crossed the straits." " Where did he end up?" " In Catania." "You do know how things went?" "It's not a matter of knowing what happened," "Don Balduccio deduced it." "It's a matter of confirmation and we'd hoped to get that from you," "but you put your Vice in, who, we think, is making big mistakes." "We can't let him continue making mistakes much longer." "I don't like that last sentence at all." "Neither do I, who had to say it, but we know..." "What do you know?" "We know your Vice and Dolores let's say... they meet." "This affair has to stop soon." "Why give the investigation to Augello and then do a parallel one yourself?" "I'm not." "It's odd, you clued me about Dolores Alfano before she came to tell us about her husband." "The same for Pecorini." "Come to my house tonight, I'll explain, but you have to be patient." "Meantime, send this by fast courier to Macannucco in Gioia Tauro." "I'll see who it is." "Who is it?" " Please excuse me." " Are you hurt?" "No, I knocked with my nails to make no noise." "I prefer the noise." " The article." " Give it to Fazio." "Forgive me." "So," ""February 2nd, horrible crime at Putumayo." "A shopkeeper of 52, Filippo Alfano, living in Colombia for 2 years, was killed in his office yesterday." "The cause of death was a shot to the head, then the body was cut into 30 pieces"." "This is an official signature," "Don Balduccio strikes again." "Keep that article." " Don't I give it to Augello?" " Only when I say." "Come in." " May I?" " Come in." "The Mafia thrives with people like Musante fighting it!" "Why?" "I went to fill him in on the investigation and said the evidence points to Don Balduccio, but he says it's a false lead." "I told him the body now has a name and surname:" "Giovanni Alfano." "Know what he said?" "That Don Balduccio can't have had him murdered." "Why not?" "Because Don Balduccio stepped down a long time ago and Giovanni Alfano was never involved with him with the family's Mafia business." " What are your intentions?" " Move forward!" "I've gathered so many elements against Don Balduccio that I can't pull back now, understand?" " It's Macannucco." " Well?" "You were right." "The stains in the trash bin are blood, the Crime Lab's checking if the blood's the same as I found on the sink." "How long will it take?" "I asked them to hurry it, we should know tomorrow." "Did you talk to the Prosecutor?" "Yes, he okayed the tapping." "Did you say not to tell Tommaseo?" "He opposed it at first, but then accepted." "I must never appear here!" "Relax, I never mentioned your name." " Bye." " Talk to you soon." "For starters," "I found out that Mimi has a lover." "I'm sorry for his wife, but Augello is a womanizer." "His lover is Dolores Alfano." "Holy shit!" "Their affair began about two months ago." "At first they met at night, in Pecorini's villa." "She seduced him, I think, ensnaring him for a precise reason." "Before I get to this, I'll tell you about Dolores." "Two years ago she started an affair with Pecorini, the butcher." "Balduccio finds out and makes the butcher leave Catania, but soon after, Pecorini gets, from Balduccio, permission to return sometimes for his interests." "Pecorini seems no longer interested in Alfano's wife, instead the two meet and the affair starts again, with more passion than before." "Dolores thinks she'll never be rid of her husband, he's Balduccio's man, so she and Pecorini decide to kill him and put the blame on Balduccio Sinagra." " So, Dolores killed him?" " With Pecorini." "Why put the blame on Balduccio?" "Pecorini wanted revenge on Balduccio, who'd kicked him out." "Besides, the two want to keep suspicion away." "Right." "Maybe Dolores told Pecorini how Filippo Alfano was killed." "In fact, the two of them repeat the old murder ordered by Balduccio." "Let's go a step at a time." "On September 3rd, Dolores and Giovanni Alfano leave Vigata for Gioia Tauro." "Halfway there, she convinces Giovanni to stop in Catania and there she takes him to Pecorini." "But isn't Giovanni suspicious?" "No, I think he didn't even know Pecorini, she must have said he was a friend." "Giovanni, Arturo." "A pleasure." "Now comes the best part of the plan." "As Pecorini takes the body pieces to Vigata," "Dolores goes to Gioia Tauro." "Enters the house and prepares the scene." "She puts his trousers on the bed, the glasses with beer and wine." "She's brought a syringe full of her husband's blood and leaves a few drops of blood in the sink to prove Giovanni had been there." "Finally, she leaves a little cocaine in a shoe box." "Once done, she leaves for Vigata, but makes a mistake." "She puts the syringe with blood into the trash bin." "So the letter sent to the DIA..." "Right." "A few days later, the lovers send the DIA an anonymous letter, accusing Balduccio ofkilling one of his runners for betrayal." "They want it believed that Giovanni's a Mafia runner killed by his boss." "Then through a trusted person, maybe a relative, they write an obviously fake postcard with Giovanni's signature, playing out their little show." "Right, so when the body's discovered, she comes to us and points out a Mafia lead, which though, is false." "She wants to steer the case, control it and be sure." "Here enters our friend Augello." "For two months now, she's ensnared him and cooked him good." "When the body's found in the potter's field she tells Mimi she's sure that's her husband, murdered by Balduccio and demands that Mimi takes over the investigation, because she wants to be sure Balduccio goes to jail." "He's crazy in love, and believes her blindly, maybe putting up some resistance, but in the end" "he does what she asks." "Impossible." " You hit it right, Salvo." " Macannucco!" "Forsensics says the blood in the bin is the same as in the sink, Giovanni Alfano's." "I was sure." "Did you get the letter?" "This afternoon, I sent it off priority mail, should get there tomorrow." "Good, now we wait for a reaction." " So we wait." " Bye, night." "When Mimi comes, tell him you got an idea last night and show him the article on Filippo Alfano's murder." " What will he do?" " He'll say it's important evidence." "He'll race to Montelusa to talk with Tommaseo, the Commissioner, Musante, he'll waste a lot oftime." "Make things as hard for him as you can." " Keep him busy the whole day." " And then?" "When I'm back, bring him to me and I'll tell him about Dolores' arrest." " I want you there too." " Okay." "Is anyone here?" "Is anyone here?" "Where'sthe syringe?" "In a safe place." "What do you think?" "How much do you want?" "Lt'll take a lot of money, because I know what you did." "You do?" "Be careful, the same thing could happen to you." "Mrs. Alfano," "I declare you under arrest for your husband's murder." "Let's go." "Hello, sir." " How did it go?" " She confessed." "Augello?" "He's in his office, he just got back, he asked iftheAlfano woman had called." "Let's proceed." "Come in!" "Oh my god!" " What is it?" " Oh my god, what news!" " What's the news?" " Who'd have thought?" " Macannucco just called." " What news did he have?" "Dolores Alfano's been arrested in Gioia Tauro." "Dolores Alfano's been arrested in Gioia Tauro?" " Why?" " For murdering her husband." "Impossible." "Impossible?" "She confessed." "What?" "Her and her accomplice, her lover, a certain Pecorino with a villa in Vigata." "She made fools of us all, she came here, telling us..." " Sir?" " Mimi!" "Bring his legs up." "Can you hear me?" "Take his shoes off." "Talk, it's Salvo!" " Put this in too." " Yes, sweetheart." "Salvuccio, sit in the back." "Fasten your safety belt." " I'll go talk to Salvo a minute." " Okay." "Excuse me." "Could I talk to you a second?" "Tell me." "Well..." "I wanted to say I had that collapse because I saw I had it all wrong." "As a man and as a cop." "Mimi, we're human, we all make mistakes." "I wanted to apologize for my behavior lately." " A jerk." " A jerk, yeah." "I wanted to thank you too because you saw I wasn't very well and because you had lots more patience than you usually have with me." "Don't get used to it." "I wanted to thank you for another thing too." "I might be dumb, but not that dumb." "That thing about Macannucco and Gioia Tauro..." "I'd bet my nuts you're behind the end of this case." "Mimi, enjoy your vacation." "If you don't get going, I'll kick your ass." "Bye, Salvo." "Translation Charlotte Lantery subtitles OMBRE ELETTRICHE" " Roma"
|
{
"pile_set_name": "OpenSubtitles"
}
|
1. Technical Field
A substitute for a conventional light bulb is disclosed which combines the emission of white light, colored light in the form of changing colored light shows through the use of RGB LED clusters and a microcontroller and active ingredient vapor emission. The disclosed device screws into a conventional light socket and the active ingredient is dispensed from replaceable cartridges. The specific active ingredient emitted may be coordinated with the specific light show performed. A plurality of light shows may be programmed into the memory of the device and memory chips containing new light shows may be provided or the active ingredient cartridges may be equipped with a chip containing one or more light shows that are designed with the active ingredient in mind.
2. Description of the Related Art
Creating a pleasant ambience is a popular aspect of home decor. This is often achieved through one or more combinations of pleasant fragrances, proper lighting, lighting to enhance or create a certain mood. Lighting can also be combined with other functions such as air sanitization, air deodorization, and the controlled release of insect repellent, insect attractant and insecticide. Conventional products such as scented candles, citronella candles, mood lighting devices, fragrance dispensers, and the like, are commonly used to create a pleasant environment in the home. While those conventional products help to create a pleasant living environment and ambiance, they have their drawbacks.
For example, scented candles create soft light and fragrance, which creates a pleasant mood. However candles are a potential fire hazard and often produce unwanted smoke and wax drippings. Citronella candles can emit an unpleasant odor and may be limited in their effectiveness and controlling insects.
Traditional light fixtures and lamps do not provide the color effects, fragrance emission or other active emission that users often desire. Other than existing lamps, stand-alone aesthetic devices are available for providing desired lighting effects (such as color changing and the like). However, these devices take up space around the home, and could add to the clutter that many are trying to avoid. Also, because such stand-alone devices are typically placed in highly visible locations, they need to be aesthetically designed to suit the personal tastes of different categories of buyers, requiring additional design costs.
Conventional fragrance dispensers, such as plug-in diffusers, can provide pleasing aromas in a relatively inexpensive, compact package. However, such conventional fragrance dispensers generally take up outlets and are often located out of sight causing a user to forget to adjust or refill the device. While these fragrance dispensers may also provide light, because the devices are used in existing electrical outlets, they are generally positioned too low to provide effective lighting features, other than to operate as a nightlight.
Conventional nightlights include only white light emission in combination with fragrance emission. While a single scent may be provided in the form of a decorative diffuser, colored nightlights are not generally available and there is no coordination between the color of the light emitted in the particular fragrance emitted. Further, sophisticated multi-colored lights that change color and that are aesthetically pleasing in combination with fragrance emission are not currently available.
Further, numerous needs exist for the combination of white light and/or colored light with other volatile active emission other than fragrances such as air sanitization, air deodorization, the controlled release of insect repellent, insect attractant, insecticide, aromatherapy volatiles or other non-fragrant materials (any of which may be combined with flagrant materials if necessary to make the ambient environment more tolerable). There is no currently-available combination of white light and/or colored light, insect repellent and fragrance for an outdoor patio or deck. There is also no currently-available combination of outdoor lights that emit insect attractant to keep insects away from a certain area, such the patio or deck. The combination of white light in a closet with a material that kills moths is not currently available.
Therefore, multiple needs exist for devices that combine one or more of the following functions: white light emission; colored light emission; colored light shows; fragrance emission; air sanitization; air deodorization; insecticide emission; insect repellent emission; insect attractant emission; aromatherapy material emission; light emission that repels insects; light emission that attracts insects; and any combinations thereof.
|
{
"pile_set_name": "USPTO Backgrounds"
}
|
Brandeis Rescinds Hirsi Ali’s Honorary Degree
An open letter to the Brandeis faculty.
When I graduated from Brandeis in 1972, where I majored in philosophy, I immediately knew that I owed Brandeis a great debt. And so, over the past 2 decades I have been, at times, an adjunct lecturer at the Brandeis International Business School, served on the Board of the Business School, and the Board of the University itself. With gratitude I have contributed significant sums to my alma mater, including a Chair in Financial Markets and Institutions to the Business School.
It was at Brandeis that I was introduced to the pre-Socratic philosophers and was fascinated with how they struggled to find ways to explain the world around them, and how their ideas influenced Plato, Aristotle and others who succeeded them. It was at Brandeis that I was introduced to the thought of Immanuel Kant, and the other giants of western thought, as well as the thought of other cultures. It was at Brandeis that I came to understand that in intellectual dialogue all ideas are on the table, that everyone is entitled to his point of view and that public scrutiny of ideas is the best way to assess their worth. It was at Brandeis that I was taught how controversy served as an impetus to critical thinking, and that it is often the very people who are condemned for expressing ideas, like Spinoza and Galileo, who are later considered the great minds of western thought. And it was this foundation that I relied upon when I next studied philosophy and politics at Oxford University and then law at the University of Chicago.
I must now confess to having serious concerns about the spirit of free inquiry at my alma mater when it rescinds an honorary degree to Ayaan Hirsi Ali, a woman who champions women's rights in the Muslim world. A woman honored in Denmark, Belgium, Germany, the Netherlands, Norway, and Sweden. A woman who received the Moral Courage Award from the American Jewish Committee and was voted Woman of the Year for 2006 by the European editors of Readers Digest magazine.
And I thought it regrettable that upon learning that Hirsi Ali was offered an honorary degree 87 Brandeis faculty members were so “filled with shame” that they presented President Lawrence with a letter urging him to “rescind immediately the invitation to Ms. Ayaan Hirsi Ali for an honorary doctorate” based on her "virulently anti-Muslim public statements."
These faculty members said that "the selection of Ms. Hirsi Ali further suggests to the public that violence toward girls and women is particular to Islam or the Two-Thirds World, thereby obscuring such violence in our midst among non-Muslims, including on our own campus". And they also could not "accept Ms. Hirsi Ali's triumphalist narrative of western civilization, rooted in a core belief of the cultural backwardness of non-western peoples."
For the sake of argument, let’s stipulate that some of her comments may be provocative and controversial. But that is what intellectual inquiry is all about. For decades serious scholars have examined in all major religions the use of force, the role of violence and compulsion, male dominance over women, the role of honor killings, etc. Since when have these topics become off limits to scholars?
It is hard for me to imagine that these faculty members seriously think that violence against women on the Brandeis campus is in any way comparable to the violence against young women in a single Nigerian village. When was the last time a Brandeis student was sold into slavery?
What is worthy of note is that Hirsi Ali's views do not come from an ivory tower but from the concrete reality of her personal experiences as a woman. She was genitally mutilated as a child, fled a forced marriage at age 12 and lives under constant threat of death by the very people who proudly wear the ideology she condemns. Who are we to judge that her conclusions are beyond the pale? Surely we would not condemn a Christian or Jew at the time of the bloody Crusades who said similar things about Christianity. When Tony Kushner said that the very creation of Israel itself was a mistake, this did not disqualify him from receiving an honorary degree from Brandeis University.
And how preposterous is their issue with her Western triumphalism, especially when she fled to the West from the very ideology that is trying to kill her. Is not the belief in American exceptionalism triumphalist in nature? Just last September President Obama himself celebrated the idea of American exceptionalism before the UN General Assembly. Would this disqualify him for an honorary degree?
I am profoundly perplexed that there is no counter letter submitted by any faculty member to President Lawrence. Is there not a single woman faculty member in the Women and Gender Studies Program who can find the compassion to defend her? Is the majority of the faculty too intimidated to speak out against this new tyranny for fear of being ostracized?
The only acceptable response to bona fide controversy is robust dialogue. It now appears that Brandeis’ motto of 'truth unto its innermost parts' has been replaced by the eleventh commandment of political correctness – “Thou shalt not offend.”
Martin J. Gross
Member of the Board of Trustees of Brandeis University
About the Author
The opinions expressed in the comment section are the personal views of the commenters. Comments are moderated, so please keep it civil.
Visitor Comments: 84
(59)
Anonymous,
September 7, 2017 6:04 PM
We need to fight this everywhere....
This sort of thought is typical all over academia, not just at Brandeis. Much of the far left has bought the idea of Palestinians as victims, no matter what they may do to cause their situation. And cultural relativism, carried to excess, makes these academics accept abhorrent practices in that culture as "their norms." The way to fight this is with more ideas. We must make it known that Israel has a right to exist and to thrive, and that hate must never be tolerated, no matter whom it comes from.
(58)
Avi Goldstein,
June 6, 2017 5:20 PM
Stop Donating!
Martin, you are absolutely correct. But these are only words if you don't put your money where your mouth is. If you threaten to stop donating to Brandeis and you urge your fellow donors to do the same, perhaps the university will be persuaded to open its collective mind.
(57)
Anonymous,
April 25, 2016 12:38 PM
Hypocritical Western Liberalism
I wonder how many people, other than the Jewish ancestors who heard the stories first hand or the well-read student of history, realizes that many boatloads of Jewish refugees - fleeing what was a certain genocide - were denied entry by not only the United States, but Canada, and many other modern day "champions of liberal pluralism" - meanwhile in the modern age, the so-called refugees from Syria - many of whom are neither refugees or Syrians, are given everything they could imagine.
And now that the world cannot kill Jews, they resort to undermining Israel in favor of a "Two State Solution" that the Arabs themselves rejected in the late 1940s. It's interesting how many people will say, "Well the Askhenazim aren't actually Jews - they're Khazars!" but nobody will say the truth: There is no Palestinian people; only displaced Jordanians and Egyptians who invented, albeit cleverly, a nation that only exists in their own imaginations. And the West is glad to help them play dress up and make believe.
All for what? Because Israel exists? And people say Jews run the world. Right. It's disgusting how many religious Jews have been subjugated by their own Israeli brothers and sisters - not to mention deported for being "too" religious.
I wish the secularists would understand this: it wasn't the Enlightenment, the concept of a "social contract" or democracy that strengthened Jews to endure pogrom after pogrom; genocide after genocide; and expulsion after expulsion: but rather, it was the Torah. You may not like that, but it is true.
(56)
Jerrey Weiss,
April 19, 2016 9:57 PM
Honorary Degree
I thought this was a country of free speech.I have no problem with a little contraversy but a Liberal College does isn't that Amazing
(55)
marcella s,
April 18, 2016 3:56 PM
Thanks for standing up for what is right and just
Thank you for standing up and speaking out for such absurdity, nonsense, and "political correctness".Thank Gd my daughter did NOT choose Brandeis as a place of higher learning for the next 4 years!
(54)
Anonymous,
May 19, 2015 8:01 PM
Brandeis and Ms. Hirsi Ali
I have supported Brandeis for years. I am sad and disappointed at the treatment they showed Ms. Ali. It is against everything that Brandeis once stood for. You owe her an apology and now!
(53)
Dvirah,
May 15, 2015 11:28 AM
"Thou Shalt Not Offend"...Whom?
I am sure that Tony Kushner's remark that the the very creation of Israel itself was a mistake is offensive to about 9 million people worldwide. This did not stop him from saying it or others from listening. So it is not being offensive but who one offends that makes the difference.
Linda Sagan,
May 19, 2015 3:59 AM
Tony Kushner's remark about Israel is stupid!
If Tony Kushner lived in Nazi Germany he would have ended up in the ovens of a concentration camp. Many millions of Jews did because they didn't have a country to call their own. Turns out that the Nazi's were free to murder Jews and no one stopped them.Had Israel existed the Jews could have fled there. Many of the six million who were slaughtered would not have been.
(52)
anmashelly,
May 12, 2015 5:41 PM
Political correctness and no offense
I have always been proud of Brandeis and its wonderful reputation of truth and benevolence where needed. Now we have reached a point where college student s are being terrorized because they're Jewish and/or Israeli sympathizers AND now Brandeis will rescind a hon. degree because the persons thoughts and beliefs may irritate a part of the population. What is next?--chadoors for all female students.
(51)
Boca Mom,
May 5, 2015 5:09 PM
would she even want it now?
If I were her, even if they offered it to me now I would turn it down saying that a degree from that university would be insulting if they bow to these ridiculous posers who are so afraid of offending one group that they openly are offending MANY other groups! If this is the faculty at Brandeis, I would not consider it a good place to get an education.
Linda,
May 5, 2015 7:06 PM
No grand-daughter of mine will go to Brandeis
Consider this action offensive and I'm highly shocked that this college is off the list when I think of a suitable college or university to send my gorgeous, precious super smart grand-daughter's education.
(50)
Elliot Pines, Ph.D. -- Class of '78,
March 25, 2015 10:30 PM
I am now ashamed to be a Brandeis graduate...
Thank you Mr. Gross, because you represent what Brandeis was supposed to be about.
How "representatives" of Brandeis have so "bravely" stood up for those who humiliate Jewish tradition and Israel, I'm not quite sure. I suggest that at least they consider bending over backwards when it comes to their own people to learn respect and love above difference as they seem so willing beyond any justification for others. And maybe, just maybe, that unity will lead to a brighter world where there won't be tragic and courageous people out there to be humiliated by politically-correct hypocrites.
(49)
David Nathanson,
March 25, 2015 10:14 PM
Bad move.
The man whose name Brandeis bears would have been embarrassed by what it did here? If it rescinded the honorary degree, can the rescission not be retracted?
(48)
Meredith,
September 18, 2014 2:44 AM
appeasement backfires
If Brandeis thinks it will curry favor with murderers, mutilators and hate-mongering liars by this type of action, they need to review the history of appeasement.
(47)
Don Krausz,
June 11, 2014 8:25 PM
We need an explanation from those 87 faculty members.
Stanzas on Freedom (Conscience?)
They are slaves who fear to speakFor the fallen and the weak;They are slaves who will not chooseHatred, scoffing, and abuse,Rather than in silence shrinkFrom the truth they needs must think;They are slaves who dare not beIn the right with two or three.
James Russell Lowell. (1819-1891) American poet writing on slavery.
(46)
Dvirah,
June 11, 2014 4:23 PM
Do Not Offend
Who? (Think about it - then decide who should not be offended.)
(45)
Jeffrey Gross,
June 11, 2014 2:27 AM
Shame on Brandeis University!
(44)
Dan Caless,
June 10, 2014 5:31 PM
Should you support Brandeis?
Dear Mr. Gross, I want to profoundly thank you for your letter. This kind of well-argued criticism by influential alumni is the only hope for the Brandeis administration to change its position on an issue like this.
But I have to ask you what the next step is, assuming Brandeis continues to raise political correctness over truth and those 87 faculty members continue to teach it. As a trustee and supporter of the university aren't you supporting the spread of these destructive ideas? Aren't alumni like you the enabler of it? After all where would Brandeis be without the support of alumni like you? How many people would pay the full cost to have their kids taught this irrationality?
Assuming Brandeis doesn't fundamentally change please consider the implications of your support for the institution. A man who fights against his own values is doomed to failure.
(43)
Larry,
June 9, 2014 1:41 PM
Brandeis
Jews are their own worse enemies.
Jim Salomon,
June 12, 2014 9:44 PM
Conflicted.
Often Jews have stood on opposite sides in debating complex moral issues. Being conflicted about ones choices is a sign of vigorous pursuit of truth. As best as I can determine both sides have some claim to the moral high ground in this debate. From my perspective second guessing in this type of issue creates more problems then it solves. The school should have stood by it original decision.
(42)
jack,
June 9, 2014 4:55 AM
Brandeis' narrow-mindedness
Thank god we had the good sense to withdraw our son from Brandeis after one year, so he could receive a real education elsewhere. We encountered narrow-minded faculty who were more interested in PC views then in true education or critical thinking.
(41)
Anonymous,
June 8, 2014 10:35 PM
Amen,
Right- on Mr Gross
(40)
Anonymous,
June 8, 2014 10:31 PM
maybe It's the threat, not the mealy-mouth apologies
I am mystified at the absence of even a hint of speculation into the possibility of sinister forces which could have been the undisclosed, underlying, actual motivating factor for the sudden swerve resulting in Brandeis’s President Lawrence obscene capitulation on Hirsi Ali. Let’s hypothesize for a minute. What might possibly occur in the prevailing universe of present world discourse that could so rapidly and powerfully inhibit the institution’s leaders and yet require them to dissemble rather than admit such actual motivator? Perhaps Islamic Jihad? Al Qaeda's “Inspire” magazine, which recently featured 12 individuals in a pictorial spread entitled "Wanted: Dead or Alive for Crimes Against Islam," captioned, "Yes We Can: A Bullet A Day Keeps the Infidel Away." Such constant, chronic, and very credible threats by Islamic terrorists of many stripes to get even with anyone who even contemplates criticism of Islam or who merely engages in humor or creates fiction with Mohammedan themes suggests that there is much more going on in education-land than what has been reported. No protest against the likes of Kushner can come close to convincing authorities to breach academic integrity, but even implied threats by the Mohammedan Community are credible and elicit prompt compliance and meek, unconvincing apologias.
Why no discussion of this? The goal appears to be to distract people to keep anyone from acknowledging this profound social illness. The real source of our problem is that people are terrified. And worse, they are justifiably terrified. They know damned well that Mohammedan threats of violence are real, credible, likely to be acted upon, and from which there is really very little defense unless the entire society mobilizes, as Israel has been forced to do. So the underlying issue is that our society refuses to act intelligently, fails to reject the Mohammedan blackmail which threatens to return us to the 12'th Century. But with 21'st Century arms.
(39)
Samantha Morse,
June 8, 2014 10:18 PM
cloistered bias
First, thank you for a wondeful article.
Second, isn't it ironic that the faculty members who I surmise have not been genitially multlaited, have taken it upon themselves to attack this courageous woman for speaking out about the miscogeny she has PERSONALLY experienced because they don't want to offend Muslims or to be perceived as racist. Essentially they have tried to derail her efforts to enlighten the Western World about the current state of oppression that Muslim women are experiencing now.
Their shame is very much misplaced. They should be ashamed that they side with sexist and cruel practices towards women because they are afraid of being labeled 'racist'.
(38)
Anny Matar,
June 8, 2014 4:44 PM
Wonderful article
Mr. Gross as member of the trustees of that same University you, so rightfully, accuse do about it? It is such a shame that, as far as I often get to read, many Universities in the USA get to change and are fully taken over by Muslim ideology. An Israeli Ambassador is being shouted down, as expected, by their very presence in the auditorium who does what? when?
(37)
Evelyn Dow,
June 8, 2014 4:19 PM
Brandeis is wrong headed in its recinding of the honor bestowed on Hirsi ali
Brandeis seems to be walking a line of "don't offend anyone powerful" in the University's decision to rescind the honor previously bestowed on her. The people who made this decision are instead offending the rest of us citizens who value people like Hirsi Ali. I hope the university will find its way out of the conundrum in which they have placed themselves. themselves. Hirsi Ali will go on to do great things.
(36)
Barry,
June 8, 2014 11:24 AM
Talk-show-mentality
Brandeis has chosen to display the convoluted reasoning so prevalent in the media, "Don't offend any protected group, lest you violate the rules of political correctness" ... the new American state religion. G-D bless Hirsi Ali and all who stand up to evil !
(35)
Ben,
June 8, 2014 6:06 AM
BDS for Brandeis
The Brandeis experiment has failed. Time to boycott, divest and sanction Brandeis University. Do not donate any money to it and do not hire Brandeis graduates, who have been corrupted beyond redemption by the fools in the faculty and adminisration. Let the United Arab Emirates support Brandeis and for all we care change its name to Al-Whatever University.
Aubrey,
June 8, 2014 2:53 PM
Bravo, Ben, Bravo.
David,
May 1, 2015 12:38 PM
BDS Brandeis
The University is part and parcel of the Left. No money of mine will go there, what money have there will be removed, and at every opportunity I will speak of them as the politically correct, self-beclowning place that it is.
(34)
Karla,
June 8, 2014 5:41 AM
Excellent response
Your written response to Brandeis' shameful rescinding of the honor bestowed upon Hirsi Ali is journalism at its finest! Thank you.
(33)
Sara Meric,
June 8, 2014 1:08 AM
They have gone mad
Who is running the show at what used to be a respected university? Nobody with half a brain will send their children to Brandeis now.
risa,
June 8, 2014 4:51 PM
My daughter is being courted by Brandeis. I agree with this article. Although I loved the idea of her being around other Jewish students, I cannot condone her being around this kind of thinking cloaked in the reputation of what was once a great University.
(32)
Roslyn Yomtovian,
June 7, 2014 2:30 PM
A sad day in life of a proud university
Courage of character, not political correctness, is how our world ultimately survives. Rescinding an honorary degree from such a brave individual is morally incorrect, in my view, and comes from weakness not strength. Will the present day students at Brandeis (including my niece) be proud or ashamed of their alma mater in years to come?
Anonymous,
June 8, 2014 3:34 AM
Proud or ashamed !
ASHAMED.
(31)
hadassa,
June 7, 2014 1:25 PM
political correctness equals dumbing down
These 'professors' remind me of the story of 'The Emperor's New Clothes'. None of the courtiers wants to say that the emperor is parading around naked in his 'new clothes', in case they appear to be stupid! Even the emperor himself can't admit the truth in his vanity and desire to wear the new clothes which the tailors assure him look so magnificent! One day, the professors will be caught out by someone who can see the truth, like the child in the crowd who yells out, "but the emperor is naked"! Meanwhile, the professors should be deeply ashamed of themselves and their political correctness.
Anonymous,
June 8, 2014 3:45 AM
That's not political correctness..
It's a combination of cowardness, ignorance and anti-american. We are involved in this up to our necks with this human civil rights issue and Americans never sit idly by and watch these atrocities continue occurring especially in countries we are involved with. To allow this University to put down anyone who is trying to show us the truth is an atrocity in itself.
(30)
Suzanne,
June 6, 2014 8:25 PM
It's outrageous what Brandeis did
SO depressing to hear that this situation has played itself out AND on a JEWISH campus, at that. Obviously the faculty and staff that run Brandeis are seriously flawed morally. If this is an indication of the character of the school, I don't think any Jews should send their kids there or give the place a dime.
(29)
Anonymous,
June 6, 2014 5:47 PM
Well said.
Hats off to a civilized, intelligent response to the Brandeis faculty. In my opinion, they displayed more than intolerance; their petition showed shocking ignorance. They do not deserve to be taken seriously as academic scholars.
(28)
Leah,
June 6, 2014 4:05 PM
Gratifying!
Your letter was quite a perfect, articulate and concise response to a nauseating situation from a university that I used to have so much respect and admiration for.
(27)
shery,
June 6, 2014 4:01 PM
Having read Ms Hersi's biography I say, she above any of the teachers at this college knows the fate of women in Islamic states. Shame on them.
Shame shame shame on the teachers at this college. They are living in a dream world that in reality does not exist.
(26)
Ann Margolin,
June 6, 2014 3:28 PM
So What Did You Do About It?
You use terms like "serious concerns" and "regrettable" and "profoundly perplexed." You are being so careful not to offend. That is fine. But you don't say what you did about it. Did you write a letter of protest to the university? Did you say that you will no longer be a donor? In my opinion you are being mild and squishy. You don't want to rock the boat, make waves or jeopardize your position with the university. I find your post to be very disappointing.
(25)
Anonymous,
June 6, 2014 2:57 PM
A recent book review discussed why Denmark was so successful at protecting its Jews during the holocaust. The takeaway for me was that the Nazi's required cooperation from the occupied countries to successfully roundup Jews and others for extermination. The Danish King went so far as to say that he would wear a yellow star too saying :" I am a Jew" if the Nazi's tried to force that identifying symbol of stigma on Danish Jews.Other countries geographically closer may have been overrun with Nazi soldiers and been less able to protest.Apparently Brandeis is less able to protest. -Doing so is de facto acceptance of these stigmatic ideas of "Honor Killing" and other methods of systematically threatening, mutilating, beating and any other form of authoritarian submission to females -a gender designation not reserved for humans, merely all animal species.Certainly not out of ignorance but out of fear do you rescind?Brandeis is your submission and defacto acceptance an example of how this type of thinking is perpetuated out of cooperative fear. You are no Denmark.
(24)
Anonymous,
June 6, 2014 2:03 PM
Shame on Brandeis/Faculty 87
I as a Jew am ashamed for Brandeis and if I were a supporter of this institution,I would stop immediately.I urge those that do support,NOT TO.They surely don't deserve it.They should hail people like Ms.Ali not degrade her the way they did.Shame-shame-shame.Discusting!
(23)
Fred,
June 6, 2014 2:01 PM
Hirsi Ali is a most courageous person. That what Brandeis professorship are not. I suppose Brandeis would bestow a medal to the leader of Boku Haram for his heroic kidnapping of near 300 children. US institution are loosing the path of enlightenment by preferring the darker Islamic outlooks. BDS is another US institution Hitlerian path & we know where this led to. Pity such lost souls .
(22)
Avi,
June 6, 2014 1:34 PM
Money talks
If Brandeis's donors withhold donations in the face of this stifling of free inquiry, perhaps the school will take a new look at its policies.
(21)
Miriam,
June 6, 2014 12:06 PM
Really? They think the violence against women in Moslem countires is just like that found on university campuses?
Then perhaps instead of sending their daughters to university this year Brandeis faculty members would like to broaden their daughters' horizons by sending them to live in an Arab village for a year? Or perhaps to live with a Moslem family in Lebanon?Perhaps one of these open-minded, non-judgmental female faculty members would like themselves to live in an Arab village for a year?Why not? They freely walk the college campus and this is the same thing!Condoning evil is evil.If the world had not condoned Hitler with its silence and inaction the Holocaust could not have happened.This is worse than silence or inaction. This is positive encouragement of extreme and horrific levels of abuse towards millions of girls and women.I only hope none of the women of the Brandeis faculty or daughters of male faculty members is ever treated, for one day, like many Moslem women are treated for decades. Although why should I say that?After all, it's just like walking through Brandeis Campus!Shame, shame, shame on you, Brandeis!
(20)
Miriam,
June 6, 2014 11:55 AM
Young women in Nigeria?
That is a single case! Moslem women and children are constantly and consistently abused, to horrific, unimaginable levels, on a daily basis. One woman remembers how her husband pushed her down the stairs and she miscarried her baby because she walked outside after dark by herself. These kinds of abuses are constant and part of the Koran.It's amazing to me when people speak about women not driving as an inequality in Moslem countries. They are constantly and consistently abused to a level beyond imagination. Read "Not Without My Daughter" for starters. Hitting and beating a wife are basic kinds of behaviors.The abuse of children is unimaginable. Terrorists (who are Moslem men, after all) surround themselves with little children to protect themselves. Look at clips of the capture of Osama Bin Ladin. He pushed his wives in front of him to take the bullets. This is unheard of in any other society in the world. And here is one woman who bravely tells her horrific story and she is further harassed, not by Moslems but by a U.S. university? The only explanation is that many liberals have turned evil. I'm sorry to the other liberals but the fact is that when you endorse evil you are evil. No two ways about it.
(19)
Anonymous,
June 6, 2014 11:39 AM
totally agree with article
I think Brandeis University should have an open debate on this. It is shameful that this women is denied an honorary degree. It seems men can says things but not women, even women like her whose life has been that of a victim. When she speaks out, she is not validated. I was a teacher for 42 years and have a Masters as well as many other diplomas. At McGill I was taught & appreciate intellectual debate.
(18)
Ayee,
June 6, 2014 11:30 AM
Disturbing...
To think that I intended to try for a PhD @ Brandeis... Loved the university when I was there some years ago... But after this political correctness gone too far... I would not dream of going there... and warning my friends too. Ayee MdC London UK
(17)
Joel Haravay,
June 6, 2014 7:16 AM
Politically obtuse
The ability of professors to be unwilling to examine ideas that do not fit into their narrative is seen on many of our campuses. In 2014 it is impossible not to see how bankrupt the ideas of Islamic nations are. Realistically, it is impossible to find moral equivalency with Sharia and other codes of law in the East or West. What have these countries contributed to the world in the last several centuries other than pain and suffering. Our universities like I President refuse to acknowledge this obvious reality because it does not fit in with the narrative they choose to accept under the mantra of being politically correct. Shame on the administrators of these schools for caving in to these professors.
(16)
Anonymous,
June 6, 2014 4:51 AM
Bravo to Mr Gross
Thanks to Mr Gross for his moral courage. Brandeis has besmirched its once proud reputation.
(15)
YehudahL,
June 6, 2014 4:49 AM
Make Al1yah, Mr Gross...
Make Al1yah, Mr Gross, and devote your brain and time and money to worthwhile Jewish causes for your own People in your own Land. Worshipping "Brandeis" is foolish. America is finished, brought to its knees by the incumbent president. I have the right to free speech too.
(14)
Jeffrey Dorfman,
June 6, 2014 4:21 AM
Brandeis University will no longer be a recipient of my and my friends donations.
Brandeis University will no longer be receiving money from me or my friends due to their Anti-Semitic views displayed by their temp actions. I have donated anonymously for over 30 years. My friends who joined me in raising hundreds of thousands of dollars for what we were convinced was an honorable university until this issue of denouncing such a notable and honorable person as Ayaan Hersi Ali for the reasons they stated. I submit President Lawrence is longer fit to head what used to be such a prestigous institution and if he is going to sell out the "old university's" principles because some (no matter how many) faculty members have shame upon themselves by unfit influence to change the history of this university. Brandeis University will no longer be fit to be the recipient of our donations as long as President Lawrence is on their payroll. We are concise ring asking those 87 faculty members to resign as well, that is, if they care about it's future. As for the silent faculty members, I submit they take a good look at their own conscience and stand up for those peinciples that made Brandeis University such a fine and one of the most, if not the most, prestigious institutions of higher learning in the world. Remember, Yom Kippur is coming.
John Arato,
June 6, 2014 2:05 PM
Well done!
Well done!!!! I applaud you!!!!
Ann Margolin,
June 6, 2014 3:33 PM
You are Right
Your response is correct. Mr. Gross's weak response to an outrage is unacceptable. and disappointing.
Paul Kessler,
June 6, 2014 7:12 PM
Bystanders
The silent faculty is just as guilty. Bystanders, recall the Holocaust. Elli Wiesell said, "silence is more evil than the act".
Danny,
March 26, 2015 5:50 PM
donations
Send your money to Yeshivas and true Jewish institutions, who really need it. You will also gain more than you can imagine as a result
(13)
Ephraim London,
June 6, 2014 4:08 AM
Right not to offend?
This is just another example of the triumph of this insidious 'philosophy.' Dr. King said he wanted to live in a world where a man was judged not by the color of his skin, but by the content of his character. Politically-coerced censorship spits at Dr. King. They have taken the position that anything Islam does is all right. Kind of like that old sign in a boss's office, "Rule number one, I am always right. Rule number two, if I am wrong see rule number one." It is a circular system that kills freedom of expression and censors anyone with whom they disagree. It makes 'people' such as those 75 'professors' into the exact same villains as the right wing. It is nothing less than left-wing censorship, there is NOTHING liberal about this behavior. Have you ever read the story "The Emperor's New Clothes?" I am waiting for someone to put the punch line into the narrow, inflexible, intolerant, calcified offices of those who genuflect at the altar of politically-coerced censorship.
Robert,
June 6, 2014 7:14 PM
The Right Wing?
I agree with most of your post but I am confused as to who are the "villains ofd the right wing".
Phil,
June 6, 2014 11:46 PM
Muslims are the sacred cow of the West.
You can say anything you want about anyone as long as he or she is not a Muslim --- in which case you can't say anything that could be perceived as being negative.
David,
June 8, 2014 3:08 PM
There are no "sacred cows", only respect and civility
Phil,
We don't need to make defamatory statements about the entire Muslim community--nor should we ever--in order to stand with enlightened Muslims in our mutual, humanity-wide struggle against violent repression of women.
Your comment reflects a paranoia that is familiar to Jews, even though we certainly don't embrace it: anti-Semites frequently complain of conspiratorial infringement of their G-d-given hate perpetuation rights. I'd constructively ask that you consider not adopting the anti-Semites' technique.
Anonymous,
May 1, 2015 12:46 PM
Paranoia or FACT?
Phil's comments reflect the reality that negative comments about islam or muslims is intolerable to the left, because they are fearful. The NYT and Northeast corridor never put Je suis Charlie on their front page because they are afraid. Men no longer run this country or control the culture, it's controlled by cowards. Brandeis is a part of that. Ugh.
(12)
Jack bender,
June 6, 2014 3:09 AM
Shameful
Totally shameful....the bradeis folks need to wake up ....the truth is that radical and even moderate Islam isa treat to the western world..the liberal fools have their heads in the sand
(11)
isidore ifshin,
June 6, 2014 2:49 AM
There is hope for us yet
Amen!!!
(10)
Anonymous,
June 6, 2014 2:41 AM
Echo of History
I shuddered when I heard of the cancellation of the lecture and degree. I felt the re-kindling of the Ashkenazic attitudes and acceptances which allowed 6,000,000 murders.
(9)
Linda Wertheim,
June 6, 2014 2:22 AM
Harvard's Crimson editorial staff agrees with the Brandeis decision
It was shocking to hear of this decision at Brandeis and then I was stunned to read that the staff of the Crimson, Harvard's student newspaper, agreed with the decision. This is madness! These people should be praising Hirsi Ali for telling her story and for fighting for women's rights. She knows of what she speaks! She grew up under Islamic terror toward women and she is perfectly correct to tell this story to the world. I really feel I am living on the "Animal Farm" and in the "Brave New World" where everything is topsy turvy.
Ann Margolin,
June 6, 2014 7:31 PM
It's Simiple
It's all about disrespect for the USA and wanting to find ways tobelittle it.
(8)
Yehudith Shraga,
June 6, 2014 1:56 AM
Brandies vs. Creator or Brandies=Creator
If we look to the situation from the Kabbalah point of view, then we have to understand that the Creator tries to tell something very important to this brave woman through the case of the Brandeis Rescindment.The Sages state "Ain odMiLevado"(there is nobody, but Him),which means,that everything around a person should be seen as the Reality of the Creator.There is no doubt that the experience of this outstanding woman is exceptional,nobody can underestimate her courage and forget that she lives under a permanent threat to her life, and STILL,there's a time for the statements and there's a time for the solutions, and that is what the Creator probably tells her through the Brandeis. She has got the Honor for her act of bravery, but the time has come to earn the Honor for the ways out of the problem.It should be clear, that if there's a Muslim religion in this world, it's the Creator, Who permits it to be, if so,then may be it's time to start looking for the bright sides of this religion and to call the Muslim world to follow the best sides of it?I personally come from the Caucasus where I lived for 28 years with the people of different religions including the Muslims and I can state that we may learn a lot from their best traditions: their hospitality, the respect to the eldest, their readiness to help and support others in the difficult times.2.Is Koran just a book which calls for Jihad, or there is a lot more there, including the phrase which states, that out of all the wars, the war with one's own dark side is the most important?3.And if still Hirsi Ali sees only the dark side of Muslim religion, what's her practical advice to the millions of it followers? Is it leaving the Muslim states and following another religions, which have also their dark sides? Or may be it is better to use one's high education to help the people of Muslim world to struggle for their own better world in the framework of the bright sides of their religion?
Anonymous,
June 8, 2014 3:29 PM
Ein Od Milvado does not mean that evil is good. You have a severe mixing of concepts going on. Yes, G-d is One and everything that happens is a result of his will. However, that does not mean that we need to accept all of people's choices as good. Perhaps what G-d wants here is not that Hirsi Ali focus her efforts elsewhere, but that other people should stand behind her to speak out the truth and fight against evil and oppression.And what's this about accepting the "good side" of a religion? Either it's Truth or it's not. The fact that Muslims in the Caucasus are very hospitable is irrelevant. All people contain good points. No one is denying that. What Hirsi Ali is speaking out against is the evil, and she needs the world's support.Until the truth is out there and is accepted by the world, no one perpetrating this evil will even have a motivation to change.Brandeis could have been a positive force in this scenario - and chose not to be. The question is aknowledging the Truth. Yes, G-d wills everything into existence - and G-d wants us to choose Truth, not falsehood; and life, not death.
Yehudith Shraga,
June 8, 2014 11:24 PM
You have a severe mixing of concepts going on
Dear Anonymous,I'd like to pay your attention on my using of the terms "bright" and "dark" sides instead of "good" and "evil". Bright side of any person,religion,country etc. is their positive impact on the Way of the Humanity towards the World to Come based on the Free Wish to Bestow, while the dark side is the negative impact on the world,which pushes it to the State of Tokhu and Bokhu. If we are clear with these concepts, then we may see that the impact of the Brandeis in the situation is mostly negative,because deciding on something without detailed examination of the subject is below any reasonable standard both for the individual and for the university, BUT their positive impact is that the correcting the mistake is MOST important than even one's reputation in the "eyes" of others.I hope too that the situation is an important lesson of thoughtless choice of candidates for the Honorary Degree(the comments to this article has a lot of examples). It won't be easy for Brandeis to gain a respectable level among those to which opinion one may rely.
As for the activity of Hirsi Ali, no matter which part of her biography is true or false, her courage to speak openly about the dark side of Muslim religion is not a common practice, and it is a positive part of her activity, but the FORM she uses needs a lot of correction.The Sages say Ollam Hessed Ibane(the world will be built on Merciful Love), and that is why they teach us a Three Line Way of Spiritual work:we start with the Left Line, which is our understanding of what is True and False, but them we MUST move to the Right Line=have to believe by the Faith above the Knowledge, that every part of the Creation may be corrected, and then we come to the Middle Line=we make all we are able to change the situation from the getting form into the bestowing one. It takes a lot of courage to state the problem, it takes much more will and bravery to face and undergo the process of correction.
Yehudith Shraga,
June 9, 2014 1:31 AM
To speak out the truth and fight against evil and oppression.
Hirsi Ali hasn't told anything new to the world,up till 1992 anthropological knowledge has advanced so greatly,that there was hardly a tribe which they haven't studied and described in details, including the most savage practices one may only imagine.Hirsi Ali has told the world her personal story,which for sure demands the courage,she has also shared her experience, that mutilation doesn't lessen the sexuality,she has put into words what many Muslim women wish to say and are afraid of speaking aloud.She has stated, as many other before her, the fact that any woman has a right for self-determination in all the fields of the life,she has also published her "speech", which she was going to deliver at Brandeis, and she did it all under the special security protection.A lot of common Jewish women(and men, of course) leaved a Jewish life in their own country and many foreign countries mostly without ANY PTOTECTION, were ready to be killed, murdered or tortured whenever it suited some of anti-Semitic groups.Turning into other religion or announcing oneself an atheist for many of them were not an option at all.We do not know if they ever spoke out, and if they had even a chance to fight for their lives and how they managed to withstand everyday oppression, but we know that their Honorable Lives made a Great Difference in this world.
Speaking out the truth and fighting against "evil" and oppression is understood by each and every person in his own way and if you ask a terrorist, a revolutioner or a dissident they are most probably will define their activity in these exactly terms.The Truth for a Jew is the teaching of our Holy Torah and our Sages. Fighting against evil- is a personal correction from egoistic into bestowing form of life, and their is no bigger oppression than one's own narrow mindedness, following the opinion of others, living the life according popular scenario and being unable to admit one's own mistakes.
(7)
Anonymous,
June 6, 2014 1:46 AM
Next Step
"The only acceptable response to bona fide controversy is robust dialogue." I would suggest that absent a robust dialogue at Brandeis, the next step ought to be to resign from the Board of Trustees. I am absolutely certain that there are many, many fine universities that have not succumbed to the kind of attacks against free and rational speech that has taken place at Brandeis and would welcome your support.
(6)
Jong,
June 6, 2014 1:39 AM
What a shame...!!!
I went to Brandeis in the hope to experience the Jewish culture and Judaism, but I found the university hardly related to Judaism, obsessed to religious tolerance, incredibly liberal and more secular than any other schools. Brandeis, however, stands out as an institution supporting diverse sexual orientation, since I heard a lot on LGTB rights. Brandeis will have to stop advertising it as a Jewish institution, because it is not.
(5)
Divorah Esther Applebaum,
June 6, 2014 1:33 AM
Your assessment of the situation is correct
Given that the same Brandise U. was buddy buddy with that anti-Semitic professior from Ramallah -- I am not surprised at this. Having lived in Israel I became all too familiar with the honor killing murders of arab muslim women by their fathers and brothers in Israel and Jordan in particular. It seems that any woman who comes forward about these crimes against women in the Muslim world in shunned by the mainstream media in the US. Shame on these idiot "Liberal Jews:". Shame on them for ignoring such atrocities against Muslim women in particular. Once a muslim family makes a decision to murder a female member of their family there is no stopping them. Shame on Brandeis. The people who run the show their have divorced themselves both from reality and from the Jewish People.
(4)
Anonymous,
June 3, 2014 2:06 PM
Brandeiss is a shame to itself
Where are the Jews. Why don;t they speak out, or are they all Muslim supporters now?
Beverly,
June 6, 2014 1:48 AM
Oh please...
where are the Jews? Right here in Scottsdale, AZ and like other Jews...totally appalled at your remark and at Brandeiss. There is no Jew who supports Muslims....that is the stupidest statement that I have ever read. Bravo Hirsi Ali and one must be brave in the muslim world to defy Sharia law. I never expected Brandeis to shrink from the right thing to do. Deeply disappointed.
Hugh Kessler,
June 7, 2014 4:34 PM
Why are you appalled
You should be appalled by the Jews attending the college and not standing up for freedom of speech, not the person asking the question. As an American Jew, I'm appalled by how Jews vote and support the Democratic Party, as if that is their religion. Whatever happened to voting for the person that will do the most and best for the country. There are good people running in all the parties and there are bad people in all the parties also. How can you say you are appalled with the college if you support liberal views 100%. (I'm not sure that you are liberal, but I would bet you are, since liberals get their feeling hurt if someone states something they don't agree with.) How is you being appalled with the other writer and therefore using words to try to stop that person from making further comments and difference from the college stopping any speaker that does not reflect the views of the college from speaking. If you are a Liberal, just look at what Liberals are doing to the colleges of this country, and ask yourself if this is what you want for America.
Marshall Frank,
June 6, 2014 5:00 AM
BRANDEIS UNIVERSITY has much to learn about freedom of speach
Brandeis is fortunate to have a trustee by the name of Martin J. Gross. The school would perform a mitzvah by having him speak to and engage in a dialog with all of the faculty and students regarding the narrow-mindedness that so many there have recently displayed. Kudos to Mr. Gross.
David,
June 6, 2014 6:14 PM
Of COURSE we Jews support Muslims!!!
Brandeis chose the wrong side of the Islamic world's ongoing civil rights struggle.
The Jewish world's value system naturally leads us to support the oppressed innocent Muslim women.
On the other hand, Brandeis, which claims a Jewish heritage but which obviously conducts itself in a manner deeply contrary to traditional Jewish values, stooped to make common cause with the Islamist establishment that oppresses Muslim women. That is the crux of the issue under discussion here.
(3)
DOLLA MATHEE,
June 2, 2014 6:57 AM
Hirsi Ali
BRAVO!! TO Martin J. Gross to stand up in the face of 'political correctness' and tell the truth. I don't know the university but it seems to me that they are scared to be attacked by radicals. BRAVO to Hirsi Ali, may more women come out under sharia law and speak out against the abuse to women and young girls.
Anonymous,
June 6, 2014 7:33 PM
How Did he Stand Up
Tell me how Mr. Gross stood up to Brandeis. By writing this tepid article? How is that standing up?
(2)
David,
June 1, 2014 10:26 PM
Wow! Powerful letter--and nice to know someone at that institution has some sense
After witnessing that affair unfold at Brandeis and noting that the only criticism of it came from outside the institution, I had written Brandeis off as intellectually and morally bankrupt. I find Mr. Gross' letter refreshing, and given that he's an insider at Brandeis, hopefully it will help to spur a change there.
Though professing nominal Jewish affiliation, my experience in Boston was that Brandeis stood for extremist secularism rather than Jewish tradition. Perennial biased anti-Israel battleax HDS Greenway, who alternately condemned Israel from the news and opinion pages at the Boston Globe, retired to an honorific office at Brandeis. That appointment, like this sorry episode, clarified just how disingenuous Brandeis claims to a Jewish values identity really are.
To Mr. Gross: Should you determine Brandeis no longer meets your standards for financial support, may I respectfully request you consider making even a relatively small donation to Yeshivas Bais HaChinuch in Monsey, NY? Bais HaChinuch lacks the treasure chest of a major institution like Brandeis, but unlike Brandeis it fills a critical educational niche for the entire metro NYC Jewish community. Yeshiva Bais HaChinuch tuition is a massive burden to young families, comparable to private college, but it's an elementary school with small classes for children who are bright but who have struggled to succeed in a traditional Jewish classroom setting. These children are being inculcated with a real framework of Torah Jewish values, Talmudic inquiry, and secular studies that can prepare them for college, and, most importantly, they're in an environment that is fostering renewed self-esteem so that they will take pride in their academic accomplishment. Both the merit and the need of your support at Yeshiva Bais HaChinuch is heads and shoulders above that for your support of Brandeis, and I beg you to consider seeking that institution out for at least some of your support.
(1)
Isahiah62,
June 1, 2014 7:26 PM
FIFY
“Thou shalt not offend {Muslims}.” there FIFY- offense to everyone and anyone else is NOT ever dealt with this way
My Christian friends are always speaking about “faith.” To me this sounds a lot like blind faith. Is that really the essence of religion?
The Aish Rabbi Replies:
I'm afraid that this is another case of a Christian concept being mis-associated with Judaism.
Let's first define our terms. What is faith?
Webster defines faith as "Belief without proof."
What is knowledge? "An acquaintance with truth, facts or principles through study or investigation."
Faith is usually a product of desire. Have you ever gotten a tip on the market that guarantees you're going to triple your money in a month? A lot of smart people have gotten fleeced because they ignored the evidence and went with their feelings.
Knowledge, on the other hand, is based on evidence. We know there's a place called China because we have too many products in our house saying "made in China." There's a lot of evidence for the existence of China, even though most of us have never been there.
Judaism unequivocally comes down on the side of knowledge, not faith. In Deuteronomy 4:39, the Torah says: "You shall know this day, and understand it well in your heart, that the Almighty is God; in the heaven above and the earth below, there is none other." (This verse is also contained in the prayer, "Aleynu.")
This verse tells us that it is not enough to simply know in your head, intellectually, that God is the Controller of everything. You must know it in your heart! This knowledge is much more profound than an intellectual knowledge. God gave us a brain because he wants us to think rationally about the world, our role in it, and our relationship with God.
A conviction based on desire or feelings alone has no place in Judaism. The Hebrew word "emunah," which is often translated as faith, does not describe a conviction based on feelings or desire. It describes a conviction that is based on evidence.
Once this knowledge is internalized, it effects how a person lives. A person with this knowledge could transform every breathing moment into a mitzvah, for he would do everything for the sake of the heaven. But this is not a "knowledge," that comes easily. Only intensive Torah learning and doing mitzvahs can achieve this knowledge. Every word of Torah we learn moves us just a little bit closer to that goal. And everyone is capable of that.
To learn more, read "The Knowing Heart," by Rabbi Moshe Chaim Luzzatto (Feldheim.com). This entire book is an explanation of this verse!
In 350 BCE, the building of the second Holy Temple was completed in Jerusalem, as recorded in the biblical Book of Ezra (6:15). The re-building of the Temple had begun under Cyrus when the Persians first took over the Babylonian empire. The re-building was then interrupted for 18 years, and resumed with the blessing of Darius II, the Persian king whom is said to be the son of Esther. The Second Temple lacked much of the glory of the First Temple: There was no Ark of the Covenant, and the daily miracles and prophets were no longer part of the scenery. The Second Temple would stand for 420 years, before being destroyed by the Romans in 70 CE.
You shall know this day and consider it within your heart(Deuteronomy 4:39).
Business people who are involved in many transactions employ accountants to analyze their operations and to determine whether or not they are profitable. They may also seek the help of experts to determine which products are making money and which are losing. Such studies allow them to maximize their profits and minimize their losses. Without such data, they might be doing a great deal of business, but discover at the end of the year that their expenditures exceeded their earnings.
Sensible people give at least as much thought to the quality and achievement of their lives as they do to their businesses. Each asks himself, "Where am I going with my life? What am I doing that is of value? In what ways am I gaining and improving? And which practices should I increase, and which should I eliminate?"
Few people make such reckonings. Many of those that do, do so on their own, without consulting an expert's opinion. These same people would not think of being their own business analysts and accountants, and they readily pay large sums of money to engage highly qualified experts in these fields.
Jewish ethical works urge us to regularly undergo cheshbon hanefesh, a personal accounting. We would be foolish to approach this accounting of our very lives with any less seriousness than we do our business affairs. We should seek out the "spiritual C.P.A.s," those who have expertise in spiritual guidance, to help us in our analyses.
Today I shall...
look for competent guidance in doing a personal moral inventory and in planning my future.
With stories and insights,
Rabbi Twerski's new book Twerski on Machzor makes Rosh Hashanah prayers more meaningful. Click here to order...
|
{
"pile_set_name": "Pile-CC"
}
|
TypeShift
TypeShift is a word puzzle video game developed by Zach Gage.
Gameplay
TypeShift is a word puzzle video game in which the player must spell out words by sliding letters in columns (by sliding the columns up and down). When a player makes a word, the letters in the word turn green. The player's goal is to have all the letters on the stage be turned green. There are also "key" words, which if found by the player, allow them to quickly solve a puzzle.
The game also includes "clue" stages in addition to the standard stages. In a clue stage, the player is presented with clues (like a crossword puzzle) as well as the columns of letters. The player solves a clue by tapping on the clue and if they are correct, the clue will disappear.
Development and release
TypeShift was developed by Zach Gage. The game released for iOS devices on March 18, 2017. A web browser version was also released and hosted by Merriam-Webster. An Android port, produced by Noodlecake Studios, was released on December 20, 2017.
Reception
TypeShift received "generally favorable" reviews from professional critics according to review aggregator website Metacritic, receiving a score of 86 out of 100. Gamezebo rated the game 4 out of 5 stars, praising the game's "substantial challenge without feeling impossible", that the game lets the player "learn new words and expand your vocabulary" and that it is "easy to make the ads disappear" while criticizing the limited number of puzzles available and that "the ads are a poor match for a beautiful game". TouchArcade rated the game 4 out of 5 stars calling it an "attractive game with an enjoyable primary mechanic" but criticizing the game giving away the "key words" after solving a puzzle.
See also
Really Bad Chess
SpellTower
References
External links
TypeShift at Merriam-Webster
Category:2017 video games
Category:Browser games
Category:IOS games
Category:Video games developed in the United States
Category:Word puzzle video games
|
{
"pile_set_name": "Wikipedia (en)"
}
|
6 Films to Scare Your Pants Off . . . and You’ll Love Every Minute of It
It’s Ansley again with more films to get you ready for Halloween! Last time, I shared some of my favorite horror films that were creepy and atmospheric or just really bizarre and great to watch with friends. The following are the ones to watch in complete darkness—alone—with a high-quality set of headphones. You’re welcome.
1. The Thing (1982, John Carpenter, R)
The Thing is, in my opinion, the ideal horror film. It’s a perfect storm of elements spiraling together to form something that touches our basest fears: complete and total isolation, dwindling resources, claustrophobic conditions, and the breakdown of trust and relationships. The Thing works because it plays with a shared psychology with masterful execution.
2. Audition (1999, Takashi Miike, NOWVTSSWTE: No One Who Values Their Sanity Should Watch This Ever)
Okay, so Hausu showed us how insane a Japanese horror film can be. Audition gives us the Japanese version of revolting and terrifying. An aging widower’s son wishes his father would re-marry. The father decides to hold a fake film audition to check out potential dates. He falls for one woman in particular who turns out to be a very bad casting choice. Rob Zombie has said that Audition is the most unsettling film that he has ever seen. I’m going to have to agree with Zombie here: this is the only film that ever actually scared me.
3. Silent Hill (2006, Christopher Gans, R)
When I initially interact with any human being (or kitty—I like kitties), I establish that I am an über fan of the video game series Silent Hill. As I write this, I’m resisting the urge to write a 200-page thesis on the color of James Sunderland’s jacket. Instead, I’ll say, calmly, that while there were a lot of fandom-related things over which to nerd rage, it’s a pretty solid film. The insanely simplified story (although it’s composed of over a decade’s worth of in-game lore condensed into two hours that may confuse some) tells the tale of a little girl at the center of a cult.
The story feels weak and messy, but the creature execution is dead-on. Silent Hill stands out in the horror-game genre by staying away from zombies and aliens, opting instead for grotesque psychological manifestations of the protagonist’s greatest fears. The creatures in the film are almost entirely the result of practical effects, and it shows. They are also all played by professional dancers (the lying figure is a hip-hop dancer and the nurses are ballerinas, for example). This gives the monsters an uncanny humanity that makes them all the more disturbing. I’m still upset about the fan-service presence of Pyramid Head in the film, but even he looked amazing. Just never, ever, ever speak to me about a film sequel. EVER.
4. Psycho (1960, Alfred Hitchcock, R)
Psycho is my absolute favorite horror novel. It does only what it needs to do—no more, no less. The film adaption, while lacking the main character’s fascinating inner monologue, is a faithful and iconic one. It’s beautiful filmmaking that stands the test of time.
5. Rec (2007, Jaume Balagueró andPaco Plaza, R)
Rec is also known as the American film Quarantine, a shot-for-shot remake of the Spanish original. It’s another fine example of the combined elements that make films like The Thing so fantastic: limited time, limited space, and a limited cast. The difference is that Rec acts like a documentary/found-footage film and does so very well. Fortunately, the character doing the “filming” is a professional cameraman: you don’t have to endure the nauseating and frustrating shaky cam that’s characteristic of most found-footage films.
6. Ju-on (2002, Takashi Shimizu, R)
As a general rule, most media is better in its original form. This is true of Ju-on, a film that’s far superior to its American remake, The Grudge. It’s a traditional Japanese vengeful-ghost story that will have you checking between the sheets. (Note: One of my favorite horror films of all time is The Ring: the American version of Ringu. It’s not on this list, though, because it’s just a given.)
If out-and-out horror isn’t your thing, then my next installment might be more up your alley: psychological horror.
|
{
"pile_set_name": "Pile-CC"
}
|
The Emerging Challenge of Diagnosing Drug-resistant Tubercular Uveitis: Experience of 110 Eyes from North India.
Background: Rapid and timely diagnosis of tubercular uveitis (TBU) is of paramount importance to save these eyes from blindness. The present study was, therefore, undertaken to carry out a comparative evaluation of Gene Xpert MTB/RIF (Xpert), MTBDRplus and Multiplex PCR (MPCR) for the diagnosis of TBU. These tests were performed on vitreous fluid of 110 patients with presumed TBU and 90 controls. rpoB gene sequencing confirmed Rifampicin resistance. Results: Xpert, MTBDRplus and MPCR were positive in 19(17.2%),38 (34.5%) and 79 (71.8 %) patients, respectively. All tests were negative in all controls. Rif resistance was detected in 3 by Xpert and 7 by MTBDRplus. MPCR followed by rpoB gene sequencing detected Rif resistance in 6 cases. One case of false Rif resistance was reported each by MTBDRplus and Xpert. Conclusion: MPCR followed by rpoB sequencing is a robust technique for the diagnosis of paucibacilliary condition like TBU and reliable detection of drug resistance.
|
{
"pile_set_name": "PubMed Abstracts"
}
|
Belthangady : Woman ends life in front of BJP leader’s house
Belthangady : Woman ends life in front of BJP leader’s house
Mangalore Today News Network
Belthangady, Mar 07, 2018 : In a tragic incident, a woman chose to end her life by consuming poison in front of a BJP leader’s house on March 6, Wednesday.
The woman identified as Lakshmi from Belthangady had arrived near the leader Obbayya Gowda’s house Wednesday late night and later consumed poison. It is not known as to what led the woman to such an extreme step.
|
{
"pile_set_name": "Pile-CC"
}
|
Those Angeleno academics over at UCLA (along with a few others) were smug enough to suggest on Twitter that some tracking algorithm to come from the halls of Westwood in 2009, could have sped up the hunt for Osama.
Hey look, not bad for a class project! But as it also turns out, the final locale they predicted he was in, Parachinar, was nearly 500 kilometers away from Abbotabad. Not so close!
In the end, they zeroed in on a Pakistani border town called Parachinar which has, among other things, access to medical care. Then they predicted the exact building he would be in by making assumptions as to the characteristics of the building itself, such as high enough ceilings to accommodate bin Laden's 6'4" frame, a fence, privacy, and electricity.
What I'm trying to say is I'm not gonna start crapping my pants and smearing it all over this post until some professor says they predicted his locale within a kilometer and pegged the probability at 99%. (I hold out hope that one of the Anteater-loving professors at my alma mater UC Irvine has done this and is too timid to point it out. Mostly just so I can smear shit all over this post.) [Science Insider via UCLA]
|
{
"pile_set_name": "Pile-CC"
}
|
Introduction {#h0.0}
============
The therapeutic benefit of drugs depends on achieving high potency toward the target (an enzyme, cell, bacterium, parasite, virus, etc.) while avoiding damage to the host organism. One approach to killing tumor cells has been to use highly potent bacterial and plant toxins that act catalytically in the cytosol of the targeted cells. Most commonly, specificity has been sought by linking these toxins chemically or genetically to antibodies that bind to cell surface materials enriched on tumor cells. These proteins, initially termed "immunotoxins" and now more generally referred to as "targeted toxins" (TTs), have been under development for decades, but few have reached clinical use ([@B1]--[@B3]). This appears to be due to inadequate specificity for the tumor versus the host (i.e., a low therapeutic index), low efficiency of delivery to the cytosol, and other factors. Several approaches have been explored for improving the therapeutic indices of TTs (reviewed in reference 2) or to increase the uptake of TTs into the cytosol of tumor cells ([@B4]).
Our research group has used a different approach to achieve tumor cell specificity. This approach exploits the fact that anthrax toxin from *Bacillus anthracis* activity depends on proteolytic activation of the receptor-bound protective antigen (PA) protein by cell surface proteases ([@B5]--[@B7]). Replacing the site normally cleaved by furin and related proteases with sequences recognized by matrix metalloproteases or urokinase plasminogen activator has yielded potent agents having high specificity and efficacy in mouse tumor models. The protease-activated PA assembles into an oligomeric-protein-conducting channel that efficiently delivers the anthrax toxin catalytic effector proteins to endosomes and then translocates them to the cytosol. The native anthrax effector proteins lethal factor (LF) and edema factor can be replaced with a fusion protein containing the N-terminal 254 amino acids of anthrax toxin lethal factor (lethal factor N terminus \[LFn\]) and the *Pseudomonas aeruginosa* exotoxin A (PE) catalytic domain (PEIII). Once in the cytosol, PEIII will transfer ADP-ribose to eukaryotic elongation factor 2 (eEF2), resulting in protein synthesis inhibition and cell death. This system is highly effective in terms of cytosolic delivery and tumor-specific activation. It has been tested successfully on a number of tumor types ([@B8]) and is expected to be active on nearly all types of solid tumors.
One factor that affects the potency of all TTs but that has received limited attention is the issue of the stability of the effector proteins once they have reached the cytosol. It was noted in 1989 that many protein toxins have a strong bias against the presence of lysine residues in their catalytic domains ([@B9]). In retrospect, it is now evident that this feature limits the attachment of ubiquitin and the resulting proteasomal degradation of toxins ([@B10]). The cytosolic stability and resulting potencies of several toxins have been shown to depend on the N-end rule, which specifies that the N-terminal amino acid of a polypeptide determines the efficiency with which side chain lysine residues are ubiquitinated for proteasomal targeting ([@B11]). The N-end rule applies to LF and LFn-based fusion proteins ([@B12], [@B13]), indicating that it will impact the efficacy of anthrax toxin-based TTs.
Ubiquitin is a small eukaryotic protein that plays a major role in signal transduction and many other processes in addition to its role in protein degradation. Ubiquitin contains a diglycine motif at its C terminus that is conjugated to the epsilon amine of a lysine within the target protein. According to the N-end rule noted above, ubiquitination occurs on proteins with specific destabilizing N-terminal residues ([@B11]), and ubiquitination may occur on several sites within one protein. Ubiquitinated proteins are targeted for degradation by the 26S proteasome system ([@B14]). Ubiquitin itself may be ubiquitinated after its conjugation to a target protein, leading to creation of polyubiquitin chains. These chains may be built upon any of the seven lysine residues within ubiquitin by ubiquitin ligases, although Lys48 is most often used ([@B15]). Furthermore, polyubiquitination of Lys63 instead of Lys48 seems to result in less protein degradation ([@B16]). Ubiquitination is a balanced process with deubiquitinating enzymes (DUBs) counteracting ubiquitination. The DUBs recognize the C-terminal diglycine motif of ubiquitin and release ubiquitin from labeled proteins. This specific release of cargo from ubiquitin fusions is described by Varshavsky as the ubiquitin fusion technique ([@B17]), which can be used to conditionally stabilize or destabilize a protein.
In this study, we examined how the insertion of ubiquitin variants within the TT LFn-PEIII fusion protein altered enzymatic activity, cytotoxicity, and stability of the TTs. We used ubiquitin variants that allowed us to study the accessibility of the TTs to DUBs and polyubiquitination. The results obtained indicate that intracellular release of the catalytic PEIII domain is achievable and that ubiquitination of the TTs controls their persistence in the cytosol and thus determines their potency.
RESULTS {#h1}
=======
Design of TTs. {#h1.1}
--------------
Six different TTs were constructed and analyzed in this study ([Fig. 1A](#fig1){ref-type="fig"}). The five ubiquitin-containing TTs are based on the TT anthrax fusion toxin FP59 that contains LFn at the N terminus and PEIII at its C terminus. An alignment of the amino acid sequences shows the differences in the ubiquitin fusion proteins ([Fig. 1B](#fig1){ref-type="fig"}). The TT designated "Ub" ([Fig. 1A](#fig1){ref-type="fig"}) contains the human wild-type ubiquitin with the C-terminal diglycine motif that is specifically recognized by DUBs. The TT Ub~UN~ has the same sequence but with three glycines (including the diglycine motif) replaced by a sequence of three alanines, which renders the sequence uncleavable by DUBs. The Ub~K48~ and Ub~K63~ mutants have all lysine residues of ubiquitin replaced by arginine residues except for one lysine residue, either Lys48 or Lys63, respectively. Ub~Knull~ contains ubiquitin with all seven lysines replaced by arginine. Ub~K48~, Ub~K63~, and Ub~Knull~ all retain the intact C-terminal diglycine motif. All proteins were successfully purified in yields of at least 1.5 mg per liter of culture ([Fig. 2A](#fig2){ref-type="fig"}). The molecular masses of all six proteins were confirmed by electrospray ionization mass spectrometry. Since the accessibility of PEIII within a larger polypeptide or toxin may limit its activity ([@B18]), we confirmed the catalytic activity of the five TTs containing ubiquitin or variants of ubiquitin in comparison to the fusion protein FP59 ([Fig. 2B](#fig2){ref-type="fig"}). All samples show a band for biotin-containing ADP-ribosylated eEF2 at a molecular mass of 100 kDa and an additional band of the same intensity at around 40 kDa. The latter is a degradation product of eEF2, an artifact of the purification of eEF2 from *Saccharomyces cerevisiae* yeast. This fragment contains the site of ADP-ribosylation of eEF2 and is thus likewise ADP-ribosylated and detected ([@B19]).
{#fig1}
{#fig2}
*In vitro* deubiquitination of TTs. {#h1.2}
-----------------------------------
In order to analyze and compare the cleavability of the ubiquitin-containing TTs, the fusion proteins were incubated with HN6 cells (a human head and neck cancer cell line) lysates. The lysates contain active DUBs that are expected to cleave the C-terminal diglycine motif of the ubiquitin ([@B20]). All TTs containing ubiquitin with the natural C-terminal diglycine sequence were cleaved within the 2-h reaction time ([Fig. 3A, B](#fig3){ref-type="fig"}, and C). The cleavage product, LFn-ubiquitin, has an expected molecular mass of 41 kDa and is detected as a band migrating between the 50-kDa and 36-kDa marker bands. FP59, which lacks ubiquitin, showed no cleavage within 2 h ([Fig. 3C](#fig3){ref-type="fig"}). Furthermore, UB~UN~, containing three alanines instead of the diglycine motif, remained intact ([Fig. 3C](#fig3){ref-type="fig"}). All TTs were also exposed to lysates preincubated with the DUB inhibitor ubiquitin aldehyde. Pretreatment of the lysates with the inhibitor prevented cleavage of the fusion proteins, demonstrating the specificity of the cleavage. In order to see the effect of purified DUBs, the TTs were incubated with either Ubiquitin carboxyl-terminal hydrolase isozyme L3 (UCH-L3) or Otubain-1 (Otub1). UCH-L3 incubation resulted in low-efficiency cleavage, while Otub1 did not achieve any detectable cleavage (data not shown). These DUBs are apparently not primarily responsible for the intracellular cleavage of the TTs or require further components in the cytosol to achieve efficient cleavage.
{#fig3}
Deubiquitination of TTs in cells. {#h1.3}
---------------------------------
Studies on deubiquitination of TTs within cells were done using CHO TEM8 T4 cells, Chinese hamster ovary cells stably transfected with tumor endothelial marker 8 (TEM8) that overexpress the TEM8 anthrax toxin receptor and internalize more TT, thereby facilitating its detection in the cytosolic fractions. All full-length TTs were detected in the cytosol after 1-h toxin exposure and Western blotting with anti-LF and anti-PE combined ([Fig. 4A to C](#fig4){ref-type="fig"}, top black arrow). Mutant PAΔFF (PA with Phe~314~ and Phe~315~ deleted) binds and delivers LFn and TTs to endosomes but cannot support their translocation to the cytosol ([@B21]). The presence of small amounts of full-length TTs is probably an indication that the cytosolic extracts are contaminated with some endosomal contents. The bigger cleavage product, LFn-ubiquitin, with an apparent molecular mass of 41 kDa, was most likely detected as a very weak band in all fractions (white arrowhead), even in the PAΔFF samples and in the uncleavable UB~UN~ fractions. However, PEIII, the released catalytic domain of the TTs, is clearly detected in the cytosol of cells incubated with Ub~K48~, Ub~K63~, and Ub~Knull~ ([Fig. 4B and C](#fig4){ref-type="fig"}, bottom black arrow with dashed line at an apparent molecular mass of 24 kDa). The corresponding band for the Ub TT is very weak in comparison, and the Ub~UN~ sample has no band for PEIII ([Fig. 4A](#fig4){ref-type="fig"}). The data demonstrate that DUB processing of the susceptible TT occurs in the cytosol to release the free PEIII domain. The ubiquitination inhibitor Pyrazone-41 (PYR-41) did not increase the amounts of any of the proteins detected, neither the uncleaved TTs nor the cleaved LFn-ubiquitin or PEIII. The FP59 lanes showed only the expected band for full-length FP59.
{#fig4}
Cytotoxicity of TTs. {#h1.4}
--------------------
Cytotoxicity analyses employed HN6 cells. This human cell line was chosen as a model cell line for proof of principle, since this cell line is a suitable model for human head and neck cancer when transplanted into nude mice. A 48-h toxin exposure resulted in dose-dependent cytotoxicity with cytotoxicity in the order Ub~Knull~ \> Ub~K63~ \> FP59 \> Ub~K48~ \>\> Ub \> Ub~UN~ ([Fig. 5A](#fig5){ref-type="fig"}). The 50% survival index (SI~50~) values determined for the TTs are shown in [Table 1](#tab1){ref-type="table"}. The observed SI~50~ values range from 615 pM (Ub~UN~) to 3.7 pM (Ub~Knull~). These values are 0.02-fold and 3-fold changes of the SI~50~ of the ubiquitin-free FP59 (FP59 SI~50~, 11 pM), respectively. A shorter (2-h) period of toxin exposure reduced the observed cytotoxicities for all TTs ([Fig. 5B](#fig5){ref-type="fig"}). However, the reductions in potency were about the same for all TTs, since the relative SI~50~ values (compared to FP59 value) remained similar for all TTs ([Table 1](#tab1){ref-type="table"}). Additionally, FP59-sensitive mouse RAW264.7 cells (murine leukemic monocytes/macrophages) were preincubated with the E1 ubiquitin-activating enzyme inhibitor PYR-41 ([@B22]) and subsequently with the different TTs for a further 18 h before cell survival was measured. RAW264.7 cells were used, since they die within 18 h of continuous toxin exposure, while other cell lines need up to 48 h and are thus affected by PYR-41 toxicity (data not shown). PYR-41 increased the cytotoxicities of Ub~K63~, Ub~Knull~, and FP59 only slightly (see [Fig. S1D to F](#figS1){ref-type="supplementary-material"} in the supplemental material), while increasing the toxicities of Ub~K48~, and especially Ub and UB~UN~, to larger, if still modest extents ([Fig. S1A to C](#figS1){ref-type="supplementary-material"}), consistent with the expectation that the latter TTs are more susceptible to ubiquitination and inactivation.
{#fig5}
######
Cytotoxicity of the targeted toxins on HN6 cells^[*a*](#ngtab1.1)^
Targeted toxin 48-h toxin exposure 2-h toxin exposure
---------------- --------------------- -------------------- ------ ---------------------- ----------- ------
Ub~UN~ 615 0.052 0.02 ND[*^d^*](#ngtab1.4) 0.066 ND
Ub 100 **0.045** 0.11 773.0 0.053 0.03
Ub~K48~ 014 0.093 0.79 79 **0.012** 0.34
FP59 011 027
Ub~K63~ 006.2 0.051 1.8 018 0.496 1.5
Ub~Knull~ 003.7 **0.038** 3 011 0.114 2.5
SI~50~ values, *P* values, and factors of enhancement for the cytotoxicity of the TTs on HN6 cells obtained from [Fig. 5](#fig5){ref-type="fig"}.
The *P* value was calculated for the FP59 value versus the values of all TTs. Bold *P* values are below 0.05, which is defined to be a significant difference.
The factor of enhancement was calculated by comparison of the SI~50~ value of FP59 to those of all other TTs.
ND, not determined.
Tumor treatment. {#h1.5}
----------------
The Ub and Ub~Knull~ fusion proteins as well as the control FP59 protein were administered with the matrix metalloprotease-activated PA-L1 to mice with implanted LL3 mouse melanoma cell tumors. Treatment with PA-L1 plus Ub or Ub~Knull~ resulted in strong tumor growth inhibition ([Fig. 6A](#fig6){ref-type="fig"}). Ub~Knull~ significantly reduced tumor growth compared to the group treated with phosphate-buffered saline (PBS group) (the control group) on day 13 (*P* = 0.05). Due to rapid tumor growth and ulceration in the PBS group, several mice were euthanized before the end of the experiment. Therefore, only the Ub and Ub~Knull~ groups were compared at days 15 and 17; Ub~Knull~ treatment was significantly better than Ub treatment (*P* = 0.04 and *P* = 0.01, respectively). Ub~Knull~ treatment resulted in the development of inflammation and edema after the third injection, while Ub treatment did not result in any observable side effects. More aggressive tumor growth in the PBS and Ub groups resulted in a higher number of mice being euthanized before the end of the experiment ([Fig. 6B](#fig6){ref-type="fig"}). Individual tumor masses at day 13 and day 17 demonstrate a very good antitumor effect of the Ub~Knull~ treatment ([Fig. 6C and D](#fig6){ref-type="fig"}, respectively). Eight of 10 mice showed a strong response to the treatment, and one mouse was tumor-free. Treatment with PA-L1 plus FP59 resulted in severe inflammation and edema after the first injection, and no further injections were possible on day 8 or 10. One mouse was euthanized due to lethargy, most likely related to the FP59 treatment. Even at the end of the experiment, 7 of 10 mice showed symptoms like those following the first treatment. Due to the toxic effects of this treatment, the FP59 group was not further analyzed for tumor growth-inhibitory effects.
{#fig6}
DISCUSSION {#h2}
==========
TTs containing bacterial toxin catalytic domains possess high potency, at least in theory, but this high potency requires that the TT be targeted with high specificity to avoid damage to nontarget cells. A high inherent potency allows lower doses to be used, which can help to limit the inevitable damage that comes from clearance of administered proteins to, and accumulation in, the liver and kidneys ([@B23]). However, for low protein doses to be effective, the protein must be efficiently bound and internalized and translocated to the cytosol, and once there, it must have sufficient stability to inactivate its target. The studies described here focus on the latter steps in TT action. The modified anthrax toxin used in our study utilizes a highly efficient delivery system which can deliver a number of different "payloads" in addition to the natural toxin lethal factor, as it was shown that the system is able to deliver PEIII ([@B24]), diphtheria toxin A chain, Shiga toxin catalytic domain ([@B25]), Bcl-XL protein ([@B26]), as well as the reporter beta-lactamase ([@B27], [@B28]).
A key feature of the TTs described here is the insertion of a ubiquitin domain between the targeting domain (LFn) and the catalytic payload (PEIII). A prerequisite for success of this design is that the ubiquitin domain not limit the efficiency of translocation of the enlarged, 3-domain polypeptides to the cytosol. Previous studies of the translocation process show that polypeptides must completely unfold to pass through the narrow lumen of the oligomeric PA channel ([@B13], [@B29]). Proteins that are tightly folded, either naturally or due to ligand binding, will not be translocated, although it is possible that chaperones may facilitate translocation of certain proteins ([@B30]). Ubiquitin is a tightly folded protein ([@B31]), and it was not certain that it would readily translocate. However, the fact that several of the proteins characterized here had potencies very similar to that of the FP59 protein indicate that ubiquitin unfolding occurred readily, at least in the context of these LFn fusion proteins and in the HN6 cells.
A second prerequisite for success of the strategy described here is that cytosolic DUBs be able to cleave the fusion proteins at an adequate rate. Here, the strategy is aided by the great diversity of DUBs present in cells ([@B32]). It was evident from the cleavages we observed ([Fig. 3 and 4](#fig3 fig4){ref-type="fig"}) and the pattern of toxicities ([Fig. 5](#fig5){ref-type="fig"} and [Table 1](#tab1){ref-type="table"}) that at least a few of the DUBs recognized the ubiquitin and the modified ubiquitins in the context of the 3-domain fusions. Experiments with purified DUBs showed that UCH-L3 could be one of the DUBs involved to some degree in cleavage of the TTs, while Otub1 does not recognize the ubiquitin-containing TTs as the substrates. Even replacement of all lysines with arginine (in the Ub~Knull~ protein) did not greatly diminish the ability of the DUBs to cleave the fusion proteins.
The release of a free catalytic domain (e.g., PEIII) in the cytosol has a number of potential and real advantages, including the opportunity to increase its stability and potency. Typically, it can be expected that any polypeptide used in the delivery of the catalytic domain will contain a number of lysines that provide targets for ubiquitination. This is clearly the case with LFn fusion proteins, since 32 of the 254 residues of LFn are lysine. Thus, an LFn-PEIII fusion protein (e.g., FP59) might be expected to be rapidly degraded. In fact, we and others have shown that LF and LFn are subject to the N-end rule ([@B12], [@B13]) and therefore that the side chain lysines are ubiquitinated, provided the N-terminal region has a destabilizing residue under the N-end rule. In retrospect, it is rather surprising that LF and LFn fusion proteins possess high potency. Thus, the introduction of a ubiquitin domain into a TT provides a way to cause release of the catalytic domain, freeing it from other domains (usually in the N-terminal region) that would promote its degradation. In the case of the PEIII fusions described here, the catalytic domain contains only two lysines, and therefore is inherently resistant to proteasomal degradation.
Another advantage of the strategy described here is the ability to release the TT catalytic domain having a specific, desirable N-terminal residue. This objective was one impetus to the original development of the ubiquitin fusion method ([@B17]). In the case of TTs, it is often desirable to generate a free catalytic domain having an N-terminal residue that is an N-end rule stabilizing residue.
Introducing ubiquitin as a linker between the two domains of FP59 to produce the TT designated "Ub" decreased its potency nearly 10-fold ([Table 1](#tab1){ref-type="table"}). The introduction of ubiquitin targets the fusion protein to the proteasome after polyubiquitination ([@B33]) and prevented efficient accumulation of PEIII in the cytosol of cells ([Fig. 4](#fig4){ref-type="fig"}). Even though *in vitro* cleavage was as efficient as for the other cleavable TTs ([Fig. 3](#fig3){ref-type="fig"}), release of PEIII may be too slow to save most of the fusion protein from degradation. The uncleavable Ub~UN~ showed no cleavage and was apparently degraded too fast for the PEIII to efficiently inhibit protein synthesis ([Fig. 4](#fig4){ref-type="fig"}). Only the DUB-cleavable TTs having a reduced number of Lys residues demonstrated successful accumulation of PEIII in the cytosol and thus much higher cytotoxicities. The release of PEIII from the rest of the molecule helps PEIII to persist longer in the cytosol, which is a requisite for high cytotoxicity ([@B34]). Ub~Knull~, which is resistant to ubiquitination of the inserted ubiquitin domain ([@B35]), is even more toxic than FP59 and presents the lowest SI~50~ of all TTs studied here ([Table 1](#tab1){ref-type="table"}). Its high cytotoxicity is apparently due to the release of PEIII at rates well above those at which ubiquitination of the lysines on the LFn domain targets the intact fusion protein to the proteasome. Due to severe side effects of the FP59 treatment, Ub~Knull~ could not be compared directly to FP59 in the tumor model. However, lower side effects combined with a strong antitumor effect indicate the advantageous effect of the Ub~Knull~ insertion in FP59. The comparison to Ub in the tumor experiment clearly shows the importance of mutating the lysines of ubiquitin for increasing the protein's stability ([Fig. 6A](#fig6){ref-type="fig"}). In cell culture experiments, the Ub~K63~ mutant was slightly more cytotoxic than the Ub~K48~ mutant ([Table 1](#tab1){ref-type="table"}), consistent with prior evidence that ubiquitination of these two lysines leads to different outcomes. Thus, Jacobson et al. described differences for the proteasomal processing of polyubiquitin chains built on lysine 48 versus lysine 63, with faster deubiquitination of lysine 63-linked polyubiquitin chains and less proteasomal accessibility ([@B16]). This would explain the lower SI~50~ value for Ub~K63~ compared to Ub~K48~. Ub~K63~ would persist longer in the cytosol before it is degraded and counteract the lower release of PEIII detected ([Fig. 3C](#fig3){ref-type="fig"}). Thus, the different ubiquitin variants allow the modulation of PEIII release and protein stability so as to achieve different levels of cytotoxicity.
The effect of the ubiquitination inhibitor PYR-41 was rather weak in the cytotoxicity studies (see [Fig. S1](#figS1){ref-type="supplementary-material"} in the supplemental material). Higher concentrations are typically needed to obtain sufficient inhibition of ubiquitin activation ([@B22]). However, these concentrations were toxic for the cell lines used here. Furthermore, there was no increased stability of the TTs observed due to preincubation of PYR-41 ([Fig. 4](#fig4){ref-type="fig"}). As [Fig. S1](#figS1){ref-type="supplementary-material"} shows, the effects of PYR-41 are rather weak, probably due to the instability of PYR-41.
Cleavable sequences have been introduced in other TTs for separation of the different moieties. Thus, Heisler et al. introduced furin- and cytosolic-protease-cleavable peptide sequences in a fusion of epidermal growth factor and the plant toxin saporin to release the toxin in the cytosol ([@B36]). Furin cleavage sites were also introduced into TTs by other groups to achieve increased cytotoxicity ([@B37], [@B38]). Fusions to ubiquitin have more commonly been used to decrease the stability of proteins, including green fluorescent protein ([@B39]) and beta-lactamase ([@B33]). In an approach to enhance TT potency more like that described here, Tcherniuk et al. fused ubiquitin to saporin, a plant protein toxin. In that study ([@B40]), the DUB cleavage sequence of ubiquitin was exchanged with a prostate-specific antigen cleavage site. Thus, the authors intended to separate ubiquitin and saporin only in the vicinity of tumor cells expressing prostate-specific antigen, following the same idea used for the activation of anthrax toxin PA by urokinase plasminogen activator or matrix metalloproteases ([@B6]). In contrast to PA, where the proteolytic cleavage results in activation of PA, prostate-specific antigen cleavage would separate ubiquitin and saporin with the goal of enrichment of ubiquitin-free saporin in the vicinity of tumor cells without including a strategy for achieving binding and delivery of the payload to the cytosol, and no gain in potency was achieved.
The data presented here demonstrate the value of introducing ubiquitin to the anthrax toxin delivery system (PA and LFn) in order to efficiently deliver enzymes to the cytosol. Variants with the lysines of ubiquitin replaced by arginines have improved stability and significant antitumor effects. Thus, the ubiquitin system for intracellular release provides an effective system for the fine-tuning of toxin uptake, half-life, nonspecific toxicity, and overall efficacy. Future studies on this system will hopefully provide further drugs capable of the safe and efficient elimination of tumor cells and, eventually, may warrant clinical trials in humans.
MATERIALS AND METHODS {#h3}
=====================
Cloning of ubiquitin-containing targeted toxins. {#h3.1}
------------------------------------------------
All TTs used for this study are based on the anthrax fusion toxin FP59, consisting of LFn-PEIII ([@B5]) and were modified by inserting different ubiquitin variants between LFn and PEIII. LFn consists of the N-terminal 254 residues of anthrax toxin lethal factor ([Fig. 1](#fig1){ref-type="fig"}) and has the sequence AGG...QEINL (but in FP59 includes an additional N-terminal HM added due to cloning). PEIII consists of the C-terminal 216-residue catalytic domain of PE and has the sequence AEFL...REDLK. Details on cloning, expression, and purification of the ubiquitin-containing targeted toxins are described in the supplemental information (see [Text S1](#supplS1){ref-type="supplementary-material"} in the supplemental material). PA and the mutant PAΔFF (PA with Phe~314~-Phe~315~ deleted) were expressed as described earlier ([@B21], [@B41]).
Enzymatic activity of TTs. {#h3.2}
--------------------------
The enzymatic activities of PEIII within all TTs were measured as described previously ([@B42]). Incubation of the TTs with purified eEF2 and biotinylated NAD^+^ allows the detection of ADP-ribosylated eEF2 by using streptavidin to detect biotin on eEF2 after SDS-PAGE and Western blotting.
Cell culture. {#h3.3}
-------------
Cell culture experiments were performed on HN6 cells (a human head and neck cancer cell line) ([@B43]), CHO TEM8 T4 cells (Chinese hamster ovary cells stably transfected with anthrax receptor tumor endothelial marker 8) ([@B41], [@B44]), and RAW264.7 cells (murine leukemic monocytes/macrophages). See Text S1 in the supplemental material for details on cell culture and cytotoxicity assays.
Cleavage by deubiquitinating enzymes. {#h3.4}
-------------------------------------
Lysates of HN6 cells were obtained after growing 6 × 10^6^ HN6 cells overnight, washing them twice with phosphate-buffered saline (PBS) (150 mM NaCl, 8.3 mM Na~2~HPO~4~, 1.7 mM KH~2~PO~4~ \[pH 7.4\]), and incubating them with 300 µl of PBS supplemented with 1% Triton X-100. After 30 min at 4°C on a rotary shaker, cells were resuspended and centrifuged (30 min, 4°C, 16,000 × g). The supernatant (cell lysates) were used for *in vitro* cleavage of ubiquitin fusion toxins by incubation of 75 ng of the TTs for up to 120 min at 37°C with 8 µl of the cell lysate supplemented with 2 mM dithiothreitol (DTT) in a total volume of 9 µl. Additional experiments were performed with ubiquitin aldehyde ([@B16]) to inhibit deubiquitinating activity. Ubiquitin aldehyde (0.5 µl; final concentration, 2.5 µM) was incubated with the lysate 5 min at 37°C prior to TT addition.
Following incubation with the lysate, samples were separated by SDS-PAGE and Western blotted using the iBlot system (Invitrogen, Life Technologies, Grand Island, NY). TTs were detected by a polyclonal rabbit anti-LF serum and infrared dye-conjugated secondary antibodies on the Odyssey imager infrared detection system (LI-COR, Lincoln, NE).
Samples for detection of intracellular cleavage were separated by SDS-PAGE and Western blotted using the iBlot system and the Western blot signal enhancer kit (Thermo, Waltham, MA) for signal enhancement. TTs were detected by polyclonal rabbit anti-LF serum, polyclonal rabbit anti-PE (anti-*Pseudomonas* exotoxin A) serum (Sigma-Aldrich, St. Louis, MO), and infrared dye-conjugated secondary antibodies (Rockland Immunochemicals, Gilbertsville, PA) on the Odyssey imager infrared detection system (LI-COR, Lincoln, NE).
Detection of intracellular cleavage was performed on CHO TEM8 T4 cells (1 × 10^6^ cells overnight in 12-well plates). The cells were incubated with 1 µg/ml PA or PAΔFF (PA with Phe314 and Phe315 deleted, a mutant that fails to deliver LF to the cytosol \[21\]), and 1 µg/ml of the TTs in 0.5 ml medium for 1 h or washed off immediately (0 h). Further samples were preincubated with 50 µM PYR-41 ([@B22]) for 1 h at 37°C before the addition of PA and the TTs at the indicated concentrations for 1 h. All cells were washed twice with PBS and incubated with trypsin-EDTA at 37°C until all cells could be transferred into new tubes for centrifugation (5 min, 4°C, 1,000 × g). For cytosol isolation, the cells were resuspended in 125 µg/ml saponin (Sigma-Aldrich, St. Louis, MO) in PBS, supplemented with protease inhibitor cocktail (Roche), and incubated for 10 min on ice ([@B45]). The complete supernatants after centrifugation (30 min, 4°C, 16,000 × g) were analyzed by SDS-PAGE and Western blotting.
Animal experiments. {#h3.5}
-------------------
All animal experiments were performed under protocols approved by the NIAID Animal Care and Use Committee. Female C57BL/6 mice (Jackson Labs, Bar Harbor, ME) were injected with 0.8 × 10^6^ LL3 mouse melanoma cells intradermally in the neck on day 0. After 6 days (all tumors had a width of at least 4 mm), mice were randomly assigned to four groups of 10 mice each and injected with 50 µl sterile PBS with different drug combinations intratumorally every other day (day 6, day 8, and day 10). Mice were treated with PBS, 5 µg PA-L1 (PA with a mutated furin cleavage site to achieve tumor-selective cleavage and activation of PA by matrix metalloproteinase 2 \[5\]) plus 1 µg FP59 in PBS, 5 µg PA-L1 plus 1.15 µg LFnUbPEIII in PBS, or 5 µg PA-L1 plus 1.15 µg LFnUb~Knull~PEIII in PBS). Tumors were measured every other day with a caliper, and tumor mass was calculated \[tumor mass = (width × depth × height)/2, with tumor mass measured in milligrams and width, depth, and height all measured in millimeters\] with a final measurement on day 17. Mice with tumors with one diameter exceeding 20 mm or ulceration were euthanized.
SUPPLEMENTAL MATERIAL {#h4}
=====================
######
Additional detailed Materials and Methods. Download
######
Text S1, DOCX file, 0.1 MB
######
Cytotoxicity of TTs on RAW264.7 cells in the presence of the E1 ubiquitin-activating enzyme inhibitor PYR-41. RAW264.7 cells (15,000 cells/well) were preincubated with 21 µM PYR-41 or without PYR-41 for 1 h and further exposed to the TTs for 18 h. TTs were added to the cells in various concentrations with a fixed concentration of 250 ng/ml PA. Relative survival was calculated as described in the legend to [Fig. 5](#fig5){ref-type="fig"}. Error bars indicate SEM of two independent experiments performed in triplicate. Each panel presents the relative survival data for the indicated TT. Download
######
Figure S1, TIF file, 0.7 MB
**Citation** Bachran C, Morley T, Abdelazim S, Fattah RJ, Liu S, Leppla SH. 2013. Anthrax toxin-mediated delivery of the *Pseudomonas* exotoxin A enzymatic domain to the cytosol of tumor cells via cleavable ubiquitin fusions. mBio 4(3):e00201-13. doi:10.1128/mBio.00201-13
This work was supported by the Intramural Research Program of the National Institute of Allergy and Infectious Diseases (NIAID), Bethesda, MD.
We thank J. Eric Anderson for mass spectrometric analysis of the proteins described here.
[^1]: **Editor** R. John Collier, Harvard Medical School
|
{
"pile_set_name": "PubMed Central"
}
|
did you go out and party?
|
{
"pile_set_name": "Enron Emails"
}
|
Methylmalonic aciduria due to a new defect in adenosylcobalamin accumulation by cells.
A child with methylmalonic aciduria due to failure to accumulate adocbl in mitochondria has a phenotype similar to cblA disease. Deficient utilization of labeled propionate by his fibroblasts is corrected by their fusion with those from cblA patients, indicating that he belongs to a different complementation class and probably is deficient in a different gene product. The defect appears not to be due to reduced affinity of enzymes for adocbl, or for ATP, and the minimal thiol required for adocbl synthesis is not different from that of extracts of normal cells.
|
{
"pile_set_name": "PubMed Abstracts"
}
|
1. Field of the Invention
The present invention relates to an OLED panel in which an organic light emitting element formed on a substrate is enclosed between the substrate and a cover member. Also, the present invention relates to an OLED module in which an IC or the like is mounted on the OLED panel. Note that, in this specification, the OLED panel and the OLED module are generically called light emitting devices. The present invention further relates to a method of driving the light emitting device and an electronic appliance using the light emitting device.
2. Description of the Related Art
A light-emitting element emits light by itself, and thus, has high visibility. The light-emitting element does not need a backlight necessary for a liquid crystal display device (LCD), which is suitable for a reduction of a light-emitting device in thickness. Also, the light-emitting element has no limitation on a viewing angle. Therefore, the light-emitting device using the light-emitting element has recently been attracting attention as a display device that substitutes for a CRT or the LCD.
Incidentally, the light-emitting element means an element of which a luminance is controlled by electric current or voltage in this specification. The light emitting element includes an OLED (organic light emitting diode), an MIM type electron source element (electron emitting elements) used to a FED (field emission display) and the like.
The OLED includes a layer containing an organic compound in which luminescence generated by application of an electric field (electroluminescence) is obtained (organic light emitting material) (hereinafter, referred to as organic light emitting layer), an anode layer and a cathode layer. A light emission in returning to a base state from a singlet excitation state (fluorescence) and a light emission in returning to a base state from a triplet excitation state (phosphorescence) exist as the luminescence in the organic compound. The light-emitting device of the present invention may use one or both of the above described light emissions.
Note that, in this specification, all the layers provided between an anode and a cathode of the OLED are defined as the organic light emitting layers. The organic light emitting layers specifically include a light emitting layer, a hole injecting layer, an electron injecting layer, a hole transporting layer, an electron transporting layer and the like. These layers may have an inorganic compound therein. The OLED basically has a structure in which an anode, a light emitting layer, a cathode are laminated in order. Besides this structure, the OLED may take a structure in which an anode, a hole injecting layer, a light emitting layer, a cathode are laminated in order or a structure in which an anode, a hole injecting layer, a light emitting layer, an electron transporting layer, a cathode are laminated in order.
FIG. 23 exemplifies the constitution of an individual pixel of a conventional light emitting device. The conventional pixel shown in FIG. 23 includes TFTs (thin-film transistors) 50 and 51, a storage capacitor 52, and a light emitting element 53.
A gate of the TFT 50 is connected to a scanning line 55. Either of a source and a drain of the TFT 50 is connected to a signal line 54, and the other is connected to the gate of the TFT 51. The source of the TFT 51 is connected to a power supply 56, and the drain is connected to an anode of a light emitting element 53. A cathode of the light emitting element 53 is connected to a power supply 57. The storage capacitor 52 is provided in order to preserve a predetermined voltage between the gate and the source of the TFT 51.
When the TFT 50 is turned ON by a predetermined voltage of the scanning line 55, a video signal fed to the signal line 54 is delivered to the gate of the TFT 51. Upon the input of video signal, based on the voltage of the input video signal, the gate voltage (i.e., the potential difference between the gate and the source) of the TFT 51 is determined. Then, the drain current of the TFT 51 driven by the gate voltage thereof is fed to the light emitting element 53, thereby enabling the light emitting element 53 to emit light with the input current.
The TFT composed of polysilicon exerts a field-effect mobility higher than that of the TFTs composed of amorphous silicon, and it has a large amount of an ON current. Because of the above reasons, the TFT composed of polysilicon is better suited for forming the transistor components of a light emitting element panel.
However, even when forming the TFT by applying polysilicon, its electrical characteristics are by no means comparable to the electrical characteristics of a MOS transistor formed on a monocrystalline silicon substrate. For example, field-effect mobility of the TFT composed of polysilicon is rated to be equal to or lower than one tenth the field-effect mobility of monocrystalline silicon. Further, because of a certain defect generated in crystal grain boundaries, the characteristics of the TFT composed of polysilicon is easily subject to variation, which is a problem.
Referring to FIG. 23, when electrical characteristics such as a threshold value and the ON current of the TFT 51 are variable per pixel, even though a voltage of the video signal is the same, a magnitude of the drain current in the TFT 51 varies between individual pixels, thus resulting in the uneven luminance of the light emitting element 53.
When industrially and commercially providing such a light emitting device utilizing an OLED (organic light-emitting display), there was such a critical problem in terms of the short service duration of the OLED caused by degradation of organic light-emitting layers. Generally, an organic light-emitting material is vulnerable to water, oxygen, light, and heat, which expedite possible degradation of the organic light-emitting layers. More particularly, the degrading rate is dependent on the constitution of a device for driving a light emitting device, electrical characteristics of the organic light-emitting material, a material of electrodes, a condition in the manufacturing processes, and the method of driving the light-emitting device.
Even though the voltage applied to the organic light-emitting layers is constant, once degradation occurs in the organic light-emitting layers, the luminance of the OLED is lowered to result in an obscure image on a display panel.
Further, a temperature of the organic light-emitting layers is variable by the outside temperature and heat generated by an OLED panel itself. However, generally, actual value of current flowing through the OLED is variable by the temperature. More particularly, when the temperature of organic light-emitting layers rises while the voltage is constant, a greater amount of current flows into the OLED. Further, inasmuch as the current flowing into the OLED and the luminance of the OLED are in the proportional relationship, the greater the amount of current flowing into the OLED, the brighter the luminance of the OLED. In this way, the luminance of the OLED is variable by the temperature of organic light-emitting layers, and thus, it is quite difficult to display desired gradation. In consequence, relative to the rise of the temperature, a greater amount of current is consumed by the light-emitting device.
|
{
"pile_set_name": "USPTO Backgrounds"
}
|
A novel microvascular approach to treatment of the high undescended testicle.
A 9-year-old boy presented for evaluation of bilateral nonpalpable testes. Despite a negative human Chorionic gonadotropin (hCG) simulation test, laparoscopy found high undescended testicles on both sides. The authors report the unusual microvascular approach utilized to accomplish testicular transfer into the scrotum and discuss the diagnostic difficulties experienced in this case.
|
{
"pile_set_name": "PubMed Abstracts"
}
|
PROJECT 1 (MONTINE): Abstract Genetic risk for PD-related cognitive impairment and its disease mechanisms The inaugural PANUC award was funded to pursue the association of three candidate genes with cognitive impairment and dementia in PD: APOE ?4 allele and variants in SNCA and MAPT; to these we added GBA and LRRK2 mutations. With our collaborators, we demonstrated that cognitive impairment and dementia are significantly more common among PD patients who carry APOE ?4 or GBA variants, less common in patients with LRRK2 mutations, and not associated with variants in MAPT or SNCA. In this project our approach will be to bring insight to disease mechanisms by determining the corresponding molecular pathology. During the current PANUC award, we and others used standard histopathologic criteria for Lewy bodies (LB) or Alzheimer's disease (AD). Unfortunately, this approach has led to unexpected and conflicting results for GBA variants and APOE ?4 in PDD in part because some studies were limited by low number of cases or inconsistent attention to genetic risk. Specific Aim 1 proposes to fill these gaps in knowledge by regional quantification of neurotoxic proteins and synaptic degeneration using a novel technique developed by our laboratory coupled with a large, multisite autopsy cohort assembled by PANUC. Specific Aim 2 reflects that although successful with our candidate gene approach during the inaugural PANUC award, we propose to expand gene discovery for cognitive impairment and dementia in PD by evaluating additional candidate genomic regions recently identified by the PDCGC, and by determining genetic influences on longitudinal change in cognition measured prospectively using consensus assessments.
|
{
"pile_set_name": "NIH ExPorter"
}
|
A new type of oxidative addition of an iodoarene to a Pd(II) complex.
Oxidative addition of N-(2-iodophenyl)formamide to Pd(dba)2 (dba = dibenzylideneacetone) in the presence of 4,4'-ditertbutyl-2,2'-bipyridine ((t)Bubpy) produces [Pd(C6H4NHCHO-2)I((t)Bubpy)] (1) which inserts 2-iodophenyl isocyanide to give [Pd{C(=NC6H4I-2)C6H4NHCHO-2}I((t)Bubpy)] (2). Dehydroiodination of 2 with Tl(acac) (acacH = acetylacetone) gives the stable Pd(IV) complex OC-6-35-[Pd{C,N,N-C(=NC6H4-2)C6H4NCHO-2}I((t)Bubpy)] (4) likely resulting from the spontaneous oxidative addition of the I-Ar moiety present in the unstable intermediate Pd(II) complex [Pd{C,N-C(=NC6H4I-2)C6H4NCHO-2}((t)Bubpy)] (3). The crystal structure of 4 shows various C-H···O hydrogen bonds resulting in chains of dimers stacked along the a axis.
|
{
"pile_set_name": "PubMed Abstracts"
}
|
/*
* Copyright (c) 1996, 2013, Oracle and/or its affiliates. All rights reserved.
* DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
*
* This code is free software; you can redistribute it and/or modify it
* under the terms of the GNU General Public License version 2 only, as
* published by the Free Software Foundation. Oracle designates this
* particular file as subject to the "Classpath" exception as provided
* by Oracle in the LICENSE file that accompanied this code.
*
* This code is distributed in the hope that it will be useful, but WITHOUT
* ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
* FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License
* version 2 for more details (a copy is included in the LICENSE file that
* accompanied this code).
*
* You should have received a copy of the GNU General Public License version
* 2 along with this work; if not, write to the Free Software Foundation,
* Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
*
* Please contact Oracle, 500 Oracle Parkway, Redwood Shores, CA 94065 USA
* or visit www.oracle.com if you need additional information or have any
* questions.
*/
package java.sql;
/**
* <P>The subclass of {@link SQLException} thrown when the timeout specified by
* {@code Statement.setQueryTimeout}, {@code DriverManager.setLoginTimeout},
* {@code DataSource.setLoginTimeout},{@code XADataSource.setLoginTimeout}
* has expired.
* <P> This exception does not correspond to a standard SQLState.
*
* @since 1.6
*/
public class SQLTimeoutException extends SQLTransientException {
/**
* Constructs a <code>SQLTimeoutException</code> object.
* The <code>reason</code>, <code>SQLState</code> are initialized
* to <code>null</code> and the vendor code is initialized to 0.
*
* The <code>cause</code> is not initialized, and may subsequently be
* initialized by a call to the
* {@link Throwable#initCause(java.lang.Throwable)} method.
*
* @since 1.6
*/
public SQLTimeoutException() {
super();
}
/**
* Constructs a <code>SQLTimeoutException</code> object
* with a given <code>reason</code>. The <code>SQLState</code>
* is initialized to <code>null</code> and the vendor code is initialized
* to 0.
*
* The <code>cause</code> is not initialized, and may subsequently be
* initialized by a call to the
* {@link Throwable#initCause(java.lang.Throwable)} method.
*
* @param reason a description of the exception
* @since 1.6
*/
public SQLTimeoutException(String reason) {
super(reason);
}
/**
* Constructs a <code>SQLTimeoutException</code> object
* with a given <code>reason</code> and <code>SQLState</code>.
*
* The <code>cause</code> is not initialized, and may subsequently be
* initialized by a call to the
* {@link Throwable#initCause(java.lang.Throwable)} method. The vendor code
* is initialized to 0.
*
* @param reason a description of the exception
* @param SQLState an XOPEN or SQL:2003 code identifying the exception
* @since 1.6
*/
public SQLTimeoutException(String reason, String SQLState) {
super(reason, SQLState);
}
/**
* Constructs a <code>SQLTimeoutException</code> object
* with a given <code>reason</code>, <code>SQLState</code> and
* <code>vendorCode</code>.
*
* The <code>cause</code> is not initialized, and may subsequently be
* initialized by a call to the
* {@link Throwable#initCause(java.lang.Throwable)} method.
*
* @param reason a description of the exception
* @param SQLState an XOPEN or SQL:2003 code identifying the exception
* @param vendorCode a database vendor specific exception code
* @since 1.6
*/
public SQLTimeoutException(String reason, String SQLState, int vendorCode) {
super(reason, SQLState, vendorCode);
}
/**
* Constructs a <code>SQLTimeoutException</code> object
* with a given <code>cause</code>.
* The <code>SQLState</code> is initialized
* to <code>null</code> and the vendor code is initialized to 0.
* The <code>reason</code> is initialized to <code>null</code> if
* <code>cause==null</code> or to <code>cause.toString()</code> if
* <code>cause!=null</code>.
*
* @param cause the underlying reason for this <code>SQLException</code> (which is saved for later retrieval by the <code>getCause()</code> method); may be null indicating
* the cause is non-existent or unknown.
* @since 1.6
*/
public SQLTimeoutException(Throwable cause) {
super(cause);
}
/**
* Constructs a <code>SQLTimeoutException</code> object
* with a given
* <code>reason</code> and <code>cause</code>.
* The <code>SQLState</code> is initialized to <code>null</code>
* and the vendor code is initialized to 0.
*
* @param reason a description of the exception.
* @param cause the underlying reason for this <code>SQLException</code> (which is saved for later retrieval by the <code>getCause()</code> method); may be null indicating
* the cause is non-existent or unknown.
* @since 1.6
*/
public SQLTimeoutException(String reason, Throwable cause) {
super(reason, cause);
}
/**
* Constructs a <code>SQLTimeoutException</code> object
* with a given
* <code>reason</code>, <code>SQLState</code> and <code>cause</code>.
* The vendor code is initialized to 0.
*
* @param reason a description of the exception.
* @param SQLState an XOPEN or SQL:2003 code identifying the exception
* @param cause the underlying reason for this <code>SQLException</code> (which is saved for later retrieval by the <code>getCause()</code> method); may be null indicating
* the cause is non-existent or unknown.
* @since 1.6
*/
public SQLTimeoutException(String reason, String SQLState, Throwable cause) {
super(reason, SQLState, cause);
}
/**
* Constructs a <code>SQLTimeoutException</code> object
* with a given
* <code>reason</code>, <code>SQLState</code>, <code>vendorCode</code>
* and <code>cause</code>.
*
* @param reason a description of the exception
* @param SQLState an XOPEN or SQL:2003 code identifying the exception
* @param vendorCode a database vendor-specific exception code
* @param cause the underlying reason for this <code>SQLException</code> (which is saved for later retrieval by the <code>getCause()</code> method); may be null indicating
* the cause is non-existent or unknown.
* @since 1.6
*/
public SQLTimeoutException(String reason, String SQLState, int vendorCode, Throwable cause) {
super(reason, SQLState, vendorCode, cause);
}
private static final long serialVersionUID = -4487171280562520262L;
}
|
{
"pile_set_name": "Github"
}
|
Back in 2011, The Simpsons aired an episode that takes place in the future, with a throwaway joke about the eventual successor to email—“bmail,” or brain mail. As Marge sits up in bed a familiar notification “bing” is heard. She then puts her finger to her temple, closes her eyes, and recites the various messages that she’s received. While we’re not quite there yet, researchers in Europe have made the first “human brain-to-brain interface” and published their results in the journal PLOS ONE.
A test subject in India, known terrifyingly as the “emitter,” was hooked up to a brain wave monitoring hat. The hat translated into binary code the electromagnetic waves it detected when the emitter focused on a simple moving object. That data was then transmitted via email to receiving subjects who perceived what the emitter saw as phosphenes, which is the perception of light where none is actually present. All of this was done without any invasive components, which is a first, and done with an 85 percent rate of accuracy.
While this falls far short of the completely wireless and instantaneous bmail that Marge uses to talk to her kids, it does present a milestone in synthetic telepathy and communications as a whole. Partially funded by the European Commision’s Future and Emerging Techonology program, the primarily Spanish team hopes to move their research “will open new research venues into cognitive and clinical neuroscience and the scientific study of consciousness.”
|
{
"pile_set_name": "Pile-CC"
}
|
/*****************************************************************************
Copyright (c) 2011, Intel Corp.
All rights reserved.
Redistribution and use in source and binary forms, with or without
modification, are permitted provided that the following conditions are met:
* Redistributions of source code must retain the above copyright notice,
this list of conditions and the following disclaimer.
* Redistributions in binary form must reproduce the above copyright
notice, this list of conditions and the following disclaimer in the
documentation and/or other materials provided with the distribution.
* Neither the name of Intel Corporation nor the names of its contributors
may be used to endorse or promote products derived from this software
without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS"
AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS BE
LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF
THE POSSIBILITY OF SUCH DAMAGE.
*****************************************************************************
* Contents: Native high-level C interface to LAPACK function dlapy2
* Author: Intel Corporation
* Generated November, 2011
*****************************************************************************/
#include "lapacke_utils.h"
double LAPACKE_dlapy2( double x, double y )
{
#ifndef LAPACK_DISABLE_NAN_CHECK
if( LAPACKE_get_nancheck() ) {
/* Optionally check input matrices for NaNs */
if( LAPACKE_d_nancheck( 1, &x, 1 ) ) {
return -1;
}
if( LAPACKE_d_nancheck( 1, &y, 1 ) ) {
return -2;
}
}
#endif
return LAPACKE_dlapy2_work( x, y );
}
|
{
"pile_set_name": "Github"
}
|
Mitch McConnell sneaked in a resolution – known as an authorization for the use of military force – on Wednesday night when all anyone could talk about was the blizzard traveling up the East coast.
The media was taken by surprise on Thursday morning.
The purpose is to authorize the president to fight ISIS though in some ways it will limit the next president but what is noteworthy about it is the fact that it does not limit his reach in terms of geography. The fear is that it allows martial law.
From Defense One:
The AUMF put forward by McConnell would not restrict the president’s use of ground troops, nor have any limits related to time or geography. Nor would it touch on the issue of what to do with the 2001 AUMF, which the Obama administration has used to attack ISIS despite that authorization’s instructions to use force against those who planned the 9/11 terrorist attacks.
ISIS is in the United States but we are not at a point where we need this extreme measure. Why give this power to this maniac in the White House?
The AUMF, known as “Rule XIV,” has not been placed on the calendar which means it could come up at any time and will. It’s being fast-tracked.
The resolution already has four Republican cosponsors: Sens. Lindsey Graham, Daniel Coats, Joni Ernst, and Orrin Hatch.
Some Democrats were critical of even the president’s own draft AUMF, warning that they’d need additional restrictions from the administration on troop levels and geographic boundaries before they could support any authorization, Defense One noted.
There is deep division over this bill and there will be debate. Hopefully they will specify to not include the US.
Obama has enough power to go after ISIS but refuses to do it. His rules of engagement have been absurd.
The devil will be in the details.
Martial law has no precise meaning but it has common features – it contemplates military force; government military personnel have the authority to make and enforce civil and criminal laws; and civil liberties are suspended. Martial law was declared by Lincoln during the Civil War – Proclamation 113 – and our National Defense Authorization Act included a provision, now removed, which stripped U.S. citizens of their constitutional rights.
|
{
"pile_set_name": "OpenWebText2"
}
|
Indonesian church attacker 'obsessed' with ISIS
A knife-wielding Indonesian teen who tried to attack a priest at a church during a Sunday service was "obsessed" with extremist group Islamic State, a senior minister said on Monday.
Indonesian authorities are increasingly worried about a resurgence in radicalism in the world's largest Muslim-majority country, driven in part by a new generation of jihadis inspired by Islamic State (IS).
"From the cellphone that was seized by security forces, this youth was obsessed with Abu Bakr al-Baghdadi," Chief Security Minister Wiranto told reporters, referring to the leader of the Middle Eastern militant group.
Wiranto, who goes by one name, said a note was found in the attacker's backpack that said "I love al-Baghdadi" but added the suspect had no known links to existing militant networks.
There were no serious casualties in the latest attempted attack, which happened in a church in Medan, northern Sumatra. Police said the attacker had attempted to stab the priest, who suffered minor injuries, and detonate a crude home-made bomb but failed after being restrained by other worshippers.
The suspect, identified as 17-year-old Ivan Armadi is under interrogation. Police seized bomb-making materials from his home after the attack and said he had learned to assemble a bomb through online research.
Counter-terrorism officials have said there are hundreds of IS sympathizers in Indonesia, where the vast majority of Muslims practice a moderate form of the religion. The country suffered its first IS-linked attack in January, when four people died in a gun and bomb assault.
|
{
"pile_set_name": "OpenWebText2"
}
|
Q:
Log scale with a different factor and base
I see that set_xscale accepts a base parameter, but I also want to scale with a factor; i.e. if the base is 4 and the factor is 10, then:
40, 160, 640, ...
Also, the documentation says that the sub-grid values represented by subsx should be integers, but I will want floating-point values.
What is the cleanest way to do this?
A:
I'm not aware of any built-in method to apply a scaling factor after the exponent, but you could create a custom tick locator and formatter by subclassing matplotlib.ticker.LogLocator and matplotlib.ticker.LogFormatter.
Here's a fairly quick-and-dirty hack that does what you're looking for:
from matplotlib import pyplot as plt
from matplotlib.ticker import LogLocator, LogFormatter, ScalarFormatter, \
is_close_to_int, nearest_long
import numpy as np
import math
class ScaledLogLocator(LogLocator):
def __init__(self, *args, scale=10.0, **kwargs):
self._scale = scale
LogLocator.__init__(self, *args, **kwargs)
def view_limits(self, vmin, vmax):
s = self._scale
vmin, vmax = LogLocator.view_limits(self, vmin / s, vmax / s)
return s * vmin, s * vmax
def tick_values(self, vmin, vmax):
s = self._scale
locs = LogLocator.tick_values(self, vmin / s, vmax / s)
return s * locs
class ScaledLogFormatter(LogFormatter):
def __init__(self, *args, scale=10.0, **kwargs):
self._scale = scale
LogFormatter.__init__(self, *args, **kwargs)
def __call__(self, x, pos=None):
b = self._base
s = self._scale
# only label the decades
if x == 0:
return '$\mathdefault{0}$'
fx = math.log(abs(x / s)) / math.log(b)
is_decade = is_close_to_int(fx)
sign_string = '-' if x < 0 else ''
# use string formatting of the base if it is not an integer
if b % 1 == 0.0:
base = '%d' % b
else:
base = '%s' % b
scale = '%d' % s
if not is_decade and self.labelOnlyBase:
return ''
elif not is_decade:
return ('$\mathdefault{%s%s\times%s^{%.2f}}$'
% (sign_string, scale, base, fx))
else:
return (r'$%s%s\times%s^{%d}$'
% (sign_string, scale, base, nearest_long(fx)))
For example:
fig, ax = plt.subplots(1, 1)
x = np.arange(1000)
y = np.random.randn(1000)
ax.plot(x, y)
ax.set_xscale('log')
subs = np.linspace(0, 1, 10)
majloc = ScaledLogLocator(scale=10, base=4)
minloc = ScaledLogLocator(scale=10, base=4, subs=subs)
fmt = ScaledLogFormatter(scale=10, base=4)
ax.xaxis.set_major_locator(majloc)
ax.xaxis.set_minor_locator(minloc)
ax.xaxis.set_major_formatter(fmt)
ax.grid(True)
# show the same tick locations with non-exponential labels
ax2 = ax.twiny()
ax2.set_xscale('log')
ax2.set_xlim(*ax.get_xlim())
fmt2 = ScalarFormatter()
ax2.xaxis.set_major_locator(majloc)
ax2.xaxis.set_minor_locator(minloc)
ax2.xaxis.set_major_formatter(fmt2)
|
{
"pile_set_name": "StackExchange"
}
|
15-2088
Funes Menjivar v. Sessions
BIA
A095 041 878
UNITED STATES COURT OF APPEALS
FOR THE SECOND CIRCUIT
SUMMARY ORDER
RULINGS BY SUMMARY ORDER DO NOT HAVE PRECEDENTIAL EFFECT. CITATION TO A SUMMARY ORDER FILED
ON OR AFTER JANUARY 1, 2007, IS PERMITTED AND IS GOVERNED BY FEDERAL RULE OF APPELLATE
PROCEDURE 32.1 AND THIS COURT=S LOCAL RULE 32.1.1. WHEN CITING A SUMMARY ORDER IN A DOCUMENT
FILED WITH THIS COURT, A PARTY MUST CITE EITHER THE FEDERAL APPENDIX OR AN ELECTRONIC DATABASE
(WITH THE NOTATION “SUMMARY ORDER”). A PARTY CITING TO A SUMMARY ORDER MUST SERVE A COPY
OF IT ON ANY PARTY NOT REPRESENTED BY COUNSEL.
1 At a stated term of the United States Court of Appeals for
2 the Second Circuit, held at the Thurgood Marshall United States
3 Courthouse, 40 Foley Square, in the City of New York, on the
4 16th day of February, two thousand seventeen.
5
6 PRESENT:
7 RALPH K. WINTER,
8 PETER W. HALL,
9 SUSAN L. CARNEY,
10 Circuit Judges.
11 _____________________________________
12
13 MANUEL DE JESUS FUNES MENJIVAR,
14 Petitioner,
15
16 v. 15-2088
17 NAC
18 JEFF SESSIONS, UNITED STATES
19 ATTORNEY GENERAL,1
20 Respondent.
21 _____________________________________
22
23 FOR PETITIONER: Maggy T. Duteau, New York, NY.
24
25 FOR RESPONDENT: Benjamin C. Mizer, Principal Deputy
26 Assistant Attorney General; Greg D.
27 Mack, Senior Litigation Counsel;
1
Pursuant to Federal Rule of Appellate Procedure 43(c)(2), Attorney
General Jeff Sessions is automatically substituted for former
Attorney General Loretta E. Lynch as the Respondent in this case.
1 Christina P. Greer, Trial Attorney,
2 Office of Immigration Litigation,
3 United States Department of Justice,
4 Washington, DC.
5
6 UPON DUE CONSIDERATION of this petition for review of a
7 Board of Immigration Appeals (“BIA”) decision, it is hereby
8 ORDERED, ADJUDGED, AND DECREED that the petition for review is
9 DISMISSED.
10 Petitioner Manuel De Jesus Funes Menjivar, a native and
11 citizen of El Salvador, seeks review of a May 29, 2015 decision
12 of the BIA denying his motion to reopen. In re Manuel De Jesus
13 Funes Menjivar, No. A095 041 878 (B.I.A. May 29, 2015). We
14 assume the parties’ familiarity with the underlying facts and
15 procedural history in this case.
16 In the main, Funes challenges the IJ’s reasoning for
17 denying cancellation. But he did not petition for review of
18 that decision. See Stone v. INS, 514 U.S. 386, 405 (1995)
19 (requiring separate timely petitions for review of the final
20 removal order and the denial of a motion to reconsider or
21 reopen); Kaur v. BIA, 413 F.3d 232, 233 (2d Cir. 2005) (per
22 curiam) (same). Funes’s contentions that the IJ failed to
23 consider the implications of El Salvador’s temporary protective
24 status or his country conditions evidence are therefore not
25 before the Court.
2
1 Funes also challenges the BIA’s denial of his motion to
2 reopen. As a general matter, we review such a decision “for
3 abuse of discretion, mindful that motions to reopen ‘are
4 disfavored.’” Ali v. Gonzales, 448 F.3d 515, 517 (2d Cir. 2006)
5 (quoting INS v. Doherty, 502 U.S. 314, 322-23 (1992)). But we
6 lack jurisdiction to review the agency’s denial of cancellation
7 of removal based on an alien’s failure to establish “exceptional
8 and extremely unusual hardship,” 8 U.S.C. 1229b(b)(1)(D),
9 because that is a discretionary determination reserved for the
10 agency, see 8 U.S.C. § 1252(a)(2)(B); Barco-Sandoval v.
11 Gonzales, 516 F.3d 35, 39 (2d Cir. 2008). We nevertheless
12 retain jurisdiction to review constitutional claims and
13 questions of law with respect to cancellation, 8 U.S.C.
14 § 1252(a)(2)(D), which may “‘arise for example in fact-finding
15 which is flawed by an error of law’ or ‘where a discretionary
16 decision is argued to be an abuse of discretion because it was
17 made without rational justification or based on a legally
18 erroneous standard,’” Barco-Sandoval, 516 F.3d at 39 (quoting
19 Xiao Ji Chen v. U.S. Dep’t of Justice, 471 F.3d 315, 329 (2d
20 Cir. 2006)). To ascertain whether a petitioner raises
21 constitutional challenges or questions of law over which this
22 Court has jurisdiction, we “study the argument[] asserted
3
1 [and] . . . determine, regardless of the rhetoric employed in
2 the petition, whether it merely quarrels over the correctness
3 of the factual findings or justification for the discretionary
4 choices, in which case the court would lack jurisdiction.”
5 Xiao Ji Chen, 471 F.3d at 329. For example, we have found an
6 error of law in a hardship determination where “facts important
7 to the subtle determination of ‘exceptional and extremely
8 unusual hardship’ have been totally overlooked and others have
9 been seriously mischaracterized.” Mendez v. Holder, 566 F.3d
10 316, 323 (2d Cir. 2009).
11 Here, we lack jurisdiction over the petition: Funes’s
12 assertion that the BIA failed to consider his daughter’s speech
13 condition merely employs the rhetoric of a question of law to
14 challenge the agency’s discretionary hardship determination.
15 See Xiao Ji Chen, 471 F.3d at 329. The BIA reviewed Funes’s
16 evidence and concluded that reopened proceedings would not
17 reach a different outcome. See Matter of Coelho, 20 I. & N.
18 Dec. 464, 473 (B.I.A. 1992); 8 C.F.R. § 1003.2(c). That
19 determination, in any event, was reasonable. Some of the
20 school reports predated the merits hearing and therefore were
21 not new evidence. Those that postdated the hearing did not
22 reflect substantial impairment. The BIA likewise had the
4
1 discretion to find that the reports failed to demonstrate that
2 Funes’s daughter’s educational needs, such as they are, will
3 go unaddressed if she remains in the United States without her
4 father. Diminished educational opportunities rarely
5 constitute exceptional and extremely unusual hardship. See In
6 re Andazola-Rivas, 23 I. & N. Dec. 319, 323 n.1 (B.I.A. 2002)
7 (“[A] finding that diminished educational opportunities result
8 in ‘exceptional and extremely unusual hardship’ would mean that
9 cancellation of removal would be granted in virtually all cases
10 involving [applicants] from developing countries who have young
11 United States citizen or lawful permanent resident children[,
12 which] . . . is not consistent with congressional intent.”).
13 For the foregoing reasons, the petition for review is
14 DISMISSED. As we have completed our review, any stay of removal
15 that the Court previously granted in this petition is VACATED,
16 and any pending motion for a stay of removal in this petition
17 is DISMISSED as moot. Any pending request for oral argument
18 in this petition is DENIED in accordance with Federal Rule of
19 Appellate Procedure 34(a)(2), and Second Circuit Local Rule
20 34.1(b).
21 FOR THE COURT:
22 Catherine O=Hagan Wolfe, Clerk
5
|
{
"pile_set_name": "FreeLaw"
}
|
{
"compilerOptions": {
"module": "commonjs",
"lib": [
"es6"
],
"noImplicitAny": true,
"noImplicitThis": true,
"strictNullChecks": false,
"strictFunctionTypes": true,
"baseUrl": "../",
"typeRoots": [
"../"
],
"types": [],
"noEmit": true,
"forceConsistentCasingInFileNames": true
},
"files": [
"index.d.ts",
"gulp-sourcemaps-tests.ts"
]
}
|
{
"pile_set_name": "Github"
}
|
UNPUBLISHED
UNITED STATES COURT OF APPEALS
FOR THE FOURTH CIRCUIT
No. 05-7985
DOMINICK THOMAS,
Plaintiff - Appellant,
versus
MARK L. HARMON, Officer; ASTRID S. ROBINSON,
Officer,
Defendants - Appellees.
Appeal from the United States District Court for the Eastern
District of Virginia, at Alexandria. Leonie M. Brinkema, District
Judge. (CA-04-1145-1-LMB)
Submitted: June 28, 2006 Decided: July 28, 2006
Before NIEMEYER, MICHAEL, and GREGORY, Circuit Judges.
Affirmed by unpublished per curiam opinion.
Dominick Thomas, Appellant Pro Se. Mary Alice Rowan, COUNTY
ATTORNEY’S OFFICE, Prince William, Virginia, for Appellees.
Unpublished opinions are not binding precedent in this circuit.
See Local Rule 36(c).
PER CURIAM:
Dominick Thomas appeals the district court’s order
denying relief on his 42 U.S.C. § 1983 (2000) complaint. We have
reviewed the record and find no reversible error. Accordingly, we
affirm for the reasons stated by the district court. Thomas v.
Harmon, No. CA-04-1145-1-LMB (E.D. Va. Dec. 7, 2005).* We dispense
with oral argument because the facts and legal contentions are
adequately presented in the materials before the court and argument
would not aid the decisional process.
AFFIRMED
*
Although the last name of the defendant/appellee is
apparently Harman rather than Harmon, we have retained the spelling
employed by the district court.
- 2 -
|
{
"pile_set_name": "FreeLaw"
}
|
Story highlights 19 scholars of Mormon history filed a brief
The brief details discrimination faced by 19th century Mormon immigrants
Washington (CNN) A group of 19 scholars of Mormon history filed a brief in the Ninth Circuit Court of Appeals over President Trump's blocked travel ban, pointing out similarities between the treatment of Mormon immigrants in the 19th century and Muslim immigrants today.
"I was very concerned about the administration's targeting of Muslims," Nate Oman, a professor of law at the College of William & Mary and main author of the brief told CNN. Government targeting of Mormons in the 19th century was the closest historical parallel, he said, and "I thought it would be useful to look at that story and bring it to the court's attention.
Mob violence drove early Mormons from their homes in Missouri and Illinois in the 1830s and 1840s, and for decades after, the federal government attempted to restrict Mormon voting rights and halt foreign Mormon converts from immigrating to the US.
"The Mormon experience illustrates the harms that result from the government targeting a particular religion," the brief reads. "The federal government's actions against Mormons occurred at a time when First Amendment jurisprudence was in its infancy and the law blessed government actions that today would be blatantly unconstitutional."
Oman believes attempts to restrict Muslims from entering the country are based in fear, a similarity to Mormonism. "I think most of it is fear as a result of 9/11 and terrorist attacks," he said. "People assume Muslims are dangerous."
Read More
|
{
"pile_set_name": "OpenWebText2"
}
|
Bone response to intermittent parathyroid hormone is altered in mice null for {beta}-Arrestin2.
Intermittent PTH administration increases bone turnover, resulting in net anabolic effects on bone. These effects are primarily mediated by intracellular cAMP signaling. However, the molecular mechanisms that regulate PTH activity in bone remain incompletely understood. beta-Arrestin2, a G protein-coupled receptor regulatory protein, inhibits PTH-stimulated cAMP accumulation in vitro. Using beta-arrestin2(-/-) (KO) and wild-type (WT) mice, we investigated the response to PTH in primary osteoblasts (POB) and the effects of intermittent PTH administration on bone mass and microarchitecture in vivo. Compared with that in WT mice, PTH-stimulated intracellular cAMP was increased and sustained in KO POB. Intermittent exposure of POB to PTH significantly decreased the ratio of osteoprotegerin (OPG) receptor activator of nuclear factor-kappaB ligand (RANKL) mRNA expression in KO POB, whereas it increased this ratio in WT POB. Total body bone mass and cortical and trabecular bone parameters were 5-10% lower in male KO mice compared with WT, and these differences were magnified upon in vivo administration of intermittent PTH (80 mug/kg.d) for 1 month. Thus, PTH significantly increased total body bone mineral content as well as vertebral trabecular bone volume and thickness in WT, but not KO mice. The anabolic response to PTH in cortical bone was also slightly more pronounced in WT than KO mice. Histomorphometry indicated that PTH prominently stimulated indexes of bone formation in both WT and KO mice, whereas it significantly increased indexes of bone resorption (i.e. osteoclast number and surface) in KO mice only. In conclusion, these results suggest that beta-arrestins may specify the activity of intermittent PTH on the skeleton by limiting PTH-induced osteoclastogenesis.
|
{
"pile_set_name": "PubMed Abstracts"
}
|
Hereditary urogenital adysplasia.
A family is reported in which three-generation transmission of renal agenesis-dysplasia occurred without any skeletal defects, but with uterine anomaly. The term, hereditary urogenital adysplasia is suggested and the mode of inheritance is discussed.
|
{
"pile_set_name": "PubMed Abstracts"
}
|
const path = require('path');
const resolve = require('resolve');
module.exports = function (cwd, moduleName, register) {
try {
var modulePath = resolve.sync(moduleName, {basedir: cwd});
var result = require(modulePath);
if (typeof register === 'function') {
register(result);
}
} catch (e) {
result = e;
}
return result;
};
|
{
"pile_set_name": "Github"
}
|
Cost effectiveness of desirudin compared with a low molecular weight heparin in the prevention of deep vein thrombosis after total hip replacement surgery.
This prospective pharmacoeconomic study analyses and discusses the cost effectiveness (expressed as cost per life-year gained) of desirudin in comparison with a low molecular weight heparin (LMWH), enoxaparin, as prophylaxis against deep vein thrombosis (DVT) in total hip replacement. The cost effectiveness was analysed on the basis of results from a clinical trial that compared the recombinant hirudin, desirudin, with the LMWH, enoxaparin. The trial results regarding the incidence of DVT are included together with epidemiological data in a decision tree, simulating long term cost effectiveness of patients undergoing elective hip replacement. The model includes Markov processes simulating patients up to the age of 85 years, including the costs of DVT-related long term complications. The average total thrombosis-related cost per patient under prophylactic therapy with enoxaparin is 7,022 Swedish kronor (SEK) compared with SEK7,497 when using desirudin (1998 values). The total costs with desirudin are 7% higher. Prophylaxis with desirudin in those patients undergoing elective hip replacement surgery adds, on average, 7 days of life per patient when compared with treatment using enoxaparin. This is equivalent to 1.91 additional years of life per 100 patients treated. The incremental cost-effectiveness ratio of prophylaxis with desirudin in patients undergoing elective hip replacement surgery is SEK24,864 per life-year gained in comparison with enoxaparin. The present study demonstrates that prophylactic therapy with desirudin is a cost-effective approach for the prevention of DVT in patients undergoing total hip replacement.
|
{
"pile_set_name": "PubMed Abstracts"
}
|
Several focussing detectors have been proposed in which, for example, a non-linear characteristic of cadmium sulfide (CdS) exposed to light is utilized where a plurality of minor photoconductive elements are arranged to extract a contrast of images on the surfaces of these elements from an object to be photographed. In using any one of these proposed photoelectric focussing detectors for a single lens reflex camera, the photoelectric focussing detector has usually been located at a position optically equivalent to the film defined plane with respect to the reflective mirror disposed in the path of light coming through an objective lens from an object to be photographed. With such arrangement for a photoelectric focussing detector, the detector is responsive only to the movement of the objective lens for generating a focussing signal so that the mechanical structure of the lens system suffers from several disadvantages. Namely, when the objective lens is out of focus, the image of an object to be photographed is also out of focus, and no signal indicating such out of focus is generated by the focussing detector. Additionally, a slight movement of the objective lens from this state causes no variation in the output of the focussing detector. Accordingly, it is impossible to determine the direction in which the objective lens should be moved in order to obtain proper focussing.
Typically, photoconductive elements arranged for use in a focussing detector provide a response characteristic as a function of the position of the objective lens that defines non-responsive zones about either side of a responsive zone within which the point of proper focussing exists. It is possible within the responsive zone to move the objective lens to the focussing position based upon determination of the direction in which the output of the focussing detector varies as the objective lens is moved, whereas, it is impossible within the non-responsive zones to determine the direction in which the objective lens may be moved in order to bring the lens to the focussing position since no variation occurs in the output of the focussing detector. With the photographic camera of the automatic focussing type utilzing the photoelectric focussing detector as mentioned above, there occurs a probabilty of 50% at which the objective lens is moved in the direction opposite to the proper focussing position when the objective lens lies initially within any one of the non-responsive zones.
An object of the present invention is to realize a photographic camera of automatic focussing type utilizing a photoelectric focussing detector in which a simplified mechanical structure is utilized and the foregoing described problems are minimized.
In accordance with the present invention, the objective lens lying initially within any one of the non-responsive zones is moved at a high velocity to move the objective lens out of the non-responsive zone within a relatively short period of time even if the objective lens has been moved in the direction opposite to the focussing position. A switch associated with focussing an object at the infinite distance or a switch associated with focussing an object at the minimum distance reverses an objective lens moving focussing motor upon arrival of the objective lens at the position for photographing an object at infinity or the minimum distance so as to reverse the movement of the objective lens into the proper direction. When the objective lens being moved at such high velocity enters into the responsive zone, the speed of moving the objective lens is reduced in order to provide focussing position and to prevent the objective lens from moving beyond the focussing position due to its inertia. Thus, hunting or oscillation of the objective lens relative to the focussing position is prevented and the objective lens stops at the focussing position.
|
{
"pile_set_name": "USPTO Backgrounds"
}
|
Last week I noted how the data show Joe Biden firmly in the lead in the Democratic presidential contest despite media efforts to make it seem like more of a race than it is — and despite liberal hopes for a more exciting and more leftist candidate.
Today, I want to offer comparable real-talk to Republicans ahead of 2020. The real talk is this: Things aren’t looking good, and the best thing supporters of Donald Trump can do to help their guy and their party is see this moment clearly and work on him to alter his trajectory.
The first harbinger of Republican doom comes from the House. This year marked the first time since 2010 that GOP members of the House found themselves in the minority due to the gigantic Democratic victory in the midterm elections.
Since most Republicans in the House were elected when the GOP was in the majority, this year marks the first time they have had to suffer the uniquely bitter day-to-day existence of being almost completely powerless.
As a result, they’re dropping like flies. As of this moment, 13 Republicans have announced their intention to retire from the House, as compared to three Democrats. This is due in part to their hopelessness about recapturing the majority in 2020. But it’s also surely about prudently abandoning a Republican ship captained by Trump that they think is about to scuttle itself on the rocks.
Most striking, perhaps, is that five of the 13 are from Texas, which has gone Republican in every presidential election since 1980. Trump scored only 52% of the vote there in 2016, the worst such showing since Bob Dole got 49% in 1996.
Meanwhile, in 2018, Democrat Beto O’Rourke stunned the political world by coming within 2.6 percentage points of Republican Ted Cruz in the Senate race.
All this suggests growing Republican weakness not only in the Lone Star state but in the country at large. No one really expects a Democratic candidate in 2020 can win Texas, but it is a state undergoing rapid suburbanization. And it was America’s suburbs that revolted against Trump in 2018 and handed the Democrats 40 House seats formerly held by Republicans.
When Republican politicians in Texas find themselves awash in despair and look longingly for another way to live their lives because they don’t see things getting any better for them, you have to take that seriously as a message in a bottle.
And if we continue to see House retirements among Republicans, and I think we will, just remember this astonishing statistic by Twitterato Mike Gehrke: Of the 293 Republicans who were serving in both chambers of Congress when Trump became president, more than 32% are gone or will be gone by 2021.
Nationally, polling remains the biggest single indicator of Trump’s potential weakness in 2020. His approval rating stands at 42% in the Real Clear Politics average. There are those who look at this number and pooh-pooh it by saying that Barack Obama fell to this level the year before his re-election.
But recall that Obama actually got 54 percent of Americans to vote for him in 2008, and spent most of the first two years and eight months of his presidency with an approval rating above 50%. Obama’s challenge was re-engaging people who had already voted for him, and he did so successfully.
Trump? After his first week, his approval high-water mark in the RCP average came on May 12, 2019, when he reached … 45 percent. That’s a percentage point lower than his actual vote total. He hasn’t expanded his voter base either.
Even if Trump manages to get everyone back who voted for him the first time, given population trends and the fact that Democrats know down to the block level where they need to go to get votes in the three states that gave Trump the presidency, that won’t be enough to win him a second term.
True, we’re more than a year away from the election, and the Democrats haven’t picked their nominee yet. A lot can happen.
But the point here is that whatever Trump is doing is not working, or not working well enough. You’re not supposed to think such things if you are a Trump supporter because it suggests you’re not a loyal passenger on the Trump train.
Yet the only thing that will cause Trump to shift course to a more successful outcome is the sense that his supporters are losing heart and that his cause is losing its potency. It’s simple war logic: If you don’t understand the balance of forces arrayed against you, you lose.
jpodhoretz@gmail.com
|
{
"pile_set_name": "OpenWebText2"
}
|
/**
* Copyright (c) Facebook, Inc. and its affiliates.
*
* This source code is licensed under the MIT license found in the
* LICENSE file in the root directory of this source tree.
*
* @flow
* @format
*/
'use strict';
const ReactNativeStyleAttributes = require('../Components/View/ReactNativeStyleAttributes');
const UIManager = require('./UIManager');
const insetsDiffer = require('../Utilities/differ/insetsDiffer');
const invariant = require('invariant');
const matricesDiffer = require('../Utilities/differ/matricesDiffer');
const pointsDiffer = require('../Utilities/differ/pointsDiffer');
const processColor = require('../StyleSheet/processColor');
const processColorArray = require('../StyleSheet/processColorArray');
const resolveAssetSource = require('../Image/resolveAssetSource');
const sizesDiffer = require('../Utilities/differ/sizesDiffer');
function getNativeComponentAttributes(uiViewClassName: string): any {
const viewConfig = UIManager.getViewManagerConfig(uiViewClassName);
invariant(
viewConfig != null && viewConfig.NativeProps != null,
'requireNativeComponent: "%s" was not found in the UIManager.',
uiViewClassName,
);
// TODO: This seems like a whole lot of runtime initialization for every
// native component that can be either avoided or simplified.
let {baseModuleName, bubblingEventTypes, directEventTypes} = viewConfig;
let nativeProps = viewConfig.NativeProps;
while (baseModuleName) {
const baseModule = UIManager.getViewManagerConfig(baseModuleName);
if (!baseModule) {
console.warn('Base module "%s" does not exist', baseModuleName);
baseModuleName = null;
} else {
bubblingEventTypes = {
...baseModule.bubblingEventTypes,
...bubblingEventTypes,
};
directEventTypes = {
...baseModule.directEventTypes,
...directEventTypes,
};
nativeProps = {
...baseModule.NativeProps,
...nativeProps,
};
baseModuleName = baseModule.baseModuleName;
}
}
const validAttributes = {};
for (const key in nativeProps) {
const typeName = nativeProps[key];
const diff = getDifferForType(typeName);
const process = getProcessorForType(typeName);
validAttributes[key] =
diff == null && process == null ? true : {diff, process};
}
// Unfortunately, the current setup declares style properties as top-level
// props. This makes it so we allow style properties in the `style` prop.
// TODO: Move style properties into a `style` prop and disallow them as
// top-level props on the native side.
validAttributes.style = ReactNativeStyleAttributes;
Object.assign(viewConfig, {
uiViewClassName,
validAttributes,
bubblingEventTypes,
directEventTypes,
});
if (!hasAttachedDefaultEventTypes) {
attachDefaultEventTypes(viewConfig);
hasAttachedDefaultEventTypes = true;
}
return viewConfig;
}
// TODO: Figure out how this makes sense. We're using a global boolean to only
// initialize this on the first eagerly initialized native component.
let hasAttachedDefaultEventTypes = false;
function attachDefaultEventTypes(viewConfig: any) {
// This is supported on UIManager platforms (ex: Android),
// as lazy view managers are not implemented for all platforms.
// See [UIManager] for details on constants and implementations.
const constants = UIManager.getConstants();
if (constants.ViewManagerNames || constants.LazyViewManagersEnabled) {
// Lazy view managers enabled.
viewConfig = merge(viewConfig, UIManager.getDefaultEventTypes());
} else {
viewConfig.bubblingEventTypes = merge(
viewConfig.bubblingEventTypes,
constants.genericBubblingEventTypes,
);
viewConfig.directEventTypes = merge(
viewConfig.directEventTypes,
constants.genericDirectEventTypes,
);
}
}
// TODO: Figure out how to avoid all this runtime initialization cost.
function merge(destination: ?Object, source: ?Object): ?Object {
if (!source) {
return destination;
}
if (!destination) {
return source;
}
for (const key in source) {
if (!source.hasOwnProperty(key)) {
continue;
}
let sourceValue = source[key];
if (destination.hasOwnProperty(key)) {
const destinationValue = destination[key];
if (
typeof sourceValue === 'object' &&
typeof destinationValue === 'object'
) {
sourceValue = merge(destinationValue, sourceValue);
}
}
destination[key] = sourceValue;
}
return destination;
}
function getDifferForType(
typeName: string,
): ?(prevProp: any, nextProp: any) => boolean {
switch (typeName) {
// iOS Types
case 'CATransform3D':
return matricesDiffer;
case 'CGPoint':
return pointsDiffer;
case 'CGSize':
return sizesDiffer;
case 'UIEdgeInsets':
return insetsDiffer;
// Android Types
// (not yet implemented)
}
return null;
}
function getProcessorForType(typeName: string): ?(nextProp: any) => any {
switch (typeName) {
// iOS Types
case 'CGColor':
case 'UIColor':
return processColor;
case 'CGColorArray':
case 'UIColorArray':
return processColorArray;
case 'CGImage':
case 'UIImage':
case 'RCTImageSource':
return resolveAssetSource;
// Android Types
case 'Color':
return processColor;
case 'ColorArray':
return processColorArray;
}
return null;
}
module.exports = getNativeComponentAttributes;
|
{
"pile_set_name": "Github"
}
|
Kidnapping of Aldo Moro
<noinclude>
The kidnapping of Aldo Moro (), also referred in Italy as Moro Case (), was a seminal event in Italian political history.
On the morning of 16 March 1978, the day on which the new cabinet led by Giulio Andreotti was supposed to have undergone a confidence vote in the Italian Parliament, the car of Aldo Moro, former prime minister and then president of Christian Democracy (Italian: Democrazia Cristiana, or DC, Italy's relative majority party at the time), was assaulted by a group of Red Brigades (Italian: Brigate Rosse, or BR) terrorists in Via Fani in Rome. Firing automatic weapons, the terrorists killed Moro's bodyguards, (two Carabinieri in Moro's car and three policemen in the following car) and kidnapped him.
On 9 May 1978 Moro's body was found in the trunk of a Renault 4 in Via Caetani after 54 days of imprisonment, during which Moro was submitted to a political trial by the so-called "people's court" set up by the Brigate Rosse and the Italian government was asked for an exchange of prisoners. Despite the common interpretation, the car location in Via Caetani was not halfway between, but was very close to both, the locations of the national offices of DC and of the Italian Communist Party (PCI) in Rome.
Kidnapping
The assault
The terrorists had prepared the ambush by parking two cars in Via Mario Fani which, once moved, would prevent Moro's cars from escaping. According to the official reconstruction at the subsequent trials, eleven people participated in the assault. However, several doubts have been cast on the terrorists' declarations on which the official accounts were based, and about the exact identity of the ambush team's members. The presence of Moro himself in Via Fani during the ambush has also been questioned after revelations in the 1990s (see Theory of the alternative kidnapping).
At 08:45 the Red Brigades members took their positions at the end of Via Fani, a downhill street in the northern quarter of Rome. An unknown number, from at least two to the whole team, were wearing Alitalia airline crew uniforms. Since not all team members knew each other, the uniforms were needed to avoid friendly fire. In the upper part of the road, and on the right-hand side, Mario Moretti was inside a Fiat 128 with a fake diplomatic license plate. Alvaro Lojacono and Alessio Casimirri were in another Fiat 128 some meters ahead of him. On the opposite side there was a third Fiat 128, with Barbara Balzerani inside, facing the supposed direction from which Moro would arrive. occupied a fourth car, a Fiat 132, near the crossroads where the street ended.
Moro left his house a few minutes before 09:00. He was sitting in a blue Fiat 130 driven by Domenico Ricci. Another carabiniere, marshal Oreste Leonardi, sat beside him. Leonardi was the head of the bodyguard team. The Fiat 130 was followed by a white Alfetta with the remaining bodyguards: Francesco Zizzi, Giulio Rivera and Raffaele Iozzino.
The ambush began when the two cars entered Via Fani and the terrorists were alerted by a lookout, . Moretti's Fiat 128 cut the road in front of Moro's car, which bumped into the rear of Moretti's car and remained blocked between it and the bodyguards' Alfetta. Leonardi tried an escape manoeuver, but was thwarted by a Mini Minor parked at the crossroad. Moro's cars were finally trapped from behind by Lojacono's 128. At this point four armed terrorists jumped out from the bushes at the sides of the street, firing machine pistols. The judiciary investigations identified them as Valerio Morucci, , Prospero Gallinari and . The action has shown an analogy to a similar one by the German far-left formation RAF. One unidentified witness declared that a German voice was heard during the ambush, which led to a presumption of the presence of RAF militiamen in the ambush.
91 bullets were fired of which 45 hit the bodyguards, who were all killed. 49 shots came from a single weapon, a FNAB-43 submachine gun, and 22 from another of the same model. The remaining 20 shots came from other weapons which included a Beretta M12. Ricci and Leonardi, who were sitting in the front seat of the first car, were killed first. Moro was immediately kidnapped and forced into the Fiat 132 which was next to his car. At the same time the terrorists killed the other three policemen, dispatching each of them with a single shot in the neck. The only policeman who was able to shoot back was Iozzino, but he was immediately hit in the head by Bonisoli. The blue Fiat 132 was found at 09:40 in Via Licinio Calvo with some blood stains inside. The other cars used for the ambush were also found in the following days in the same road (according to the declarations of Red Brigade members, the cars had been left in the road that same day).
On 16 March the escort in Via Fani was not carrying weapons, which were instead kept in the trunks of the cars; Eleonora Chiavarelli (Aldo Moro's wife) said, during the trial, that the weapons were in the trunks because "these people didn't know how to use weapons because they had never had any shooting practice, they were not used to handling them, so the guns were in the trunk. Leonardi always talked about it. "These people shouldn't have weapons they don't know how to use. They should know how to use them. They should carry them properly. Keep them within reach. The radio should be operational, but it doesn't work." For months it had been going on like this. Marshal Leonardi and lance corporal Ricci did not expect an ambush, because their weapons were placed in the bag and one of the two holsters was even in a plastic liner." The last sentence was denied by the widow of Marshal Leonardi, stating that her husband "recently went around armed because he had noticed that a car was following him."
The action was claimed by the BR in a phone call to ANSA. At 10:00 Pietro Ingrao, president of the Italian Chamber of Deputies, stopped the session and announced that Moro had been kidnapped. On the same day Andreotti's government obtained a large majority of votes, including those of his traditional enemies, notably PCI. Before the kidnapping the Communists were supposed to enter the government in a direct role but the emergency changed the situation, resulting in another right-centre cabinet under the firm control of DC. Enrico Berlinguer spoke of "an attempt to stop a positive political process", but Lucio Magri, representative of the extreme left PUP, was concerned about the hypocrisy of passing laws limiting personal freedom as a reaction to the massacre, saying that "it would play into the hands of the strategy of subversion". He asked for "self-criticism" from the authorities and for a genuine willingness to tackle problems "that are at the basis of the economic and moral crisis".
Mario Ferrandi, a militant of Prima Linea, nicknamed "Coniglio" (Rabbit), later said that when the news of the kidnapping and the killing of the bodyguards spread during a workers' demonstration there was a moment of amazement, followed by a moment of euphoria and anxiety because there was a feeling that something would happen so big that things would not be quite the same. He recalled that students present at the event spent the money of Cassa del circolo giovanile to buy champagne and toast with workers of the canteen.
Motivations
A large amount of literature exists about the reasons for the kidnapping. The Red Brigades chose Moro due to his role as mediator between DC and PCI, the two main parties in Italy at the time, which had both participated in the Fourth Andreotti Cabinet. It was the first time since 1947 that Italian Communists had a government position, even if indirect. The success of the action would thus halt the Communists' rise to Italian state institutions, reassuring the BR as a key point in a future revolutionary war against capitalism. According to others BR aimed to strike at the whole DC who were the main exponent of a regime that, as described in BR's first communiqué after the kidnapping "... had been suppressing the Italian people for years".
According to later terrorist declarations, in the months before the kidnapping the Red Brigades had also envisaged the kidnapping the other leader of DC, Giulio Andreotti. This was abandoned once they deemed that Andreotti's police protection was too strong.
The immediate consequence of the kidnapping was the exclusion of PCI from any government cabinet in the following years. Although increasingly weakened, DC remained the main government party until 1994 (although in 1981, for the first time since the formation of the Italian Republic Giovanni Spadolini, a non-Christian Democrat, became premier in a DC-based alliance).
Imprisonment
The exact location of Moro's imprisonment is disputed.
The original reconstruction in the trials claimed it to be an apartment in Via Camillo Montalcini 8 in Rome, which had been owned by a Red Brigades member for a few years. Moro would be killed there, in an underground parking garage. Months after the kidnapping the apartment was put under investigation by UCIGOS, the Italian police's central directorate for political crimes, and was thus abandoned by the Red Brigades.
Aldo Moro's brother Carlo Alfredo, a judge, writes in his book Storia di un delitto annunciato that the politician was not detained in Via Montalcini, but in a seaside location. His theory is based on the fact that sand and vegetable remains were found in the car together with Moro's body. Further, Moro's body had a generally good muscular tone and according to Moro's brother this, along with several contradictions in the terrorists' declarations, contravenes the traditional view of the politician closed in a very tight cell with little space to move. More proof was found by geologist David Bressan, who showed that based on certain microfossils and grains of igneous rock found on the victim and car he must have been located on an artificial (as opposed to natural) river beach near the delta of the river Tiber. While the kidnappers later claimed to have tried to mislead the investigators by pouring water and sand onto the victim and into the car, forensic geologists doubt that the killers at the time would have been aware of grains of sand as possible evidence for a crime and wouldn't likely have gone through such effort.
Aldo Moro's letters
During his detention, Moro wrote 86 letters to the main members of Christian Democracy, his family and to Pope Paul VI. Some arrived at their addressees; others that had not been sent were later found in another base of the BR in via Monte Nevoso, Milan. In the letters Moro puts forward the possibility of negotiation for his liberation if help from his party's colleagues and of the highest figures of the Republic could be obtained.
Some of Moro's letters allegedly contain hidden allusions and hints. In one letter he asks: "Is maybe there, behind keeping it hard against me, an American or German instruction?" Writer Leonardo Sciascia suggested that in his letters Moro was including clues about his position, as when he wrote "I am here in full health" to indicate that he was in Rome. In the letter of 8 April Moro launched a vibrant attack at Benigno Zaccagnini, national secretary of Christian Democracy, at Francesco Cossiga, then Minister of the Interior, as well as on the whole of his party: "Of course, I cannot prevent myself from underlining the wickedness of all the Christian Democrats who did not agree with my position [...] And Zaccagnini? How can he stay tranquil in his position? And Cossiga could not devise any possible defence? My blood will fall over them."
Doubts have been cast over the complete publication of Moro's letters. The Carabinieri general Carlo Alberto Dalla Chiesa (then coordinator of the fight against terrorism in Italy, later killed by the Mafia) found copies of some previously unknown letters in an apartment used by the terrorists in via Monte Nevoso. For undisclosed reasons the finding was not publicly revealed for years. During the kidnapping the prevalent view was that Moro did not enjoy complete freedom to write. Despite Moro's wife declaring that she recognized his writing style in them, the letters would be considered, if not directly dictated by the terrorists, at least to be inspired or controlled by them. Some experts in an analysis committee formed by Cossiga initially declared that Moro had been subject to brainwashing. Cossiga would later admit that he had partially written the speech held by Giulio Andreotti in which it was said that Moro's letter were to be considered "not morally authentic".
Aldo Moro was never tortured by the Red Brigades during the 55 days; in the 1990s Italian journalist Indro Montanelli commented severely on the letters written during the kidnapping, saying that "Everyone in this world has the right to be afraid. But a Statesman (and Moro was the State) can't try to induce the State to a negotiation with terrorists that over all, in the kidnapping of Via Fani, had left on the asphalt five dead between Carabinieri and policemen."
Montanelli was also scathingly critical of Moro's widow, Eleonora Chiavarelli, who, in the years after her husband was killed, blamed the Christian Democrats and the Italian political class in general for his fate. In 1982 he wrote:
Communications and negotiations
During the 55 days of Moro's detention the Red Brigades issued nine "Communications" in which they explained the reasons for the kidnapping. In the Communication No.3:
And:
The Red Brigades proposed to exchange Moro for imprisoned terrorists (Communication No.8). They later accepted to exchange him for a single terrorist. On 22 April 1978 Pope Paul VI made a public speech and asked BR to return Moro to his family, specifying that such act should also be "without conditions". Moro, who had previously written a letter to the Pope, reacted angrily to the latter point, feeling he had been abandoned by the Vatican. The specified "without conditions" is controversial—according to some sources it was added to Paul VI's letter against his will, and the pope instead wanted to negotiate with the kidnappers. Government members like Cossiga denied this hypothesis.
Italian politicians were divided into two factions: one favourable to negotiations which, amongst others, included the secretary of the Italian Socialist Party, Bettino Craxi and the others totally negating that possibility, most of the Christian Democracy and Italian Communist Party, including the latter's national secretary Enrico Berlinguer and Republican leader Ugo La Malfa who proposed the death penalty for the terrorists. The second faction noted that any negotiation would seem a legitimisation of the violence of the terrorists. Further, that solution would not be accepted by the Italian police forces who had seen numerous of their members fall during the war against terrorism in previous years.
Writers, including Moro's brother, underlined how the BR's communication lacked any reference to the possible role of the Communist Party in the Italian government. This was in spite of the day chosen for the kidnapping being that in which PCI, for the first time since the early republican years, was going to obtain an active government role in Italy. A letter by Moro to Zaccagnini, in which he was referring to this argument, had to be rewritten by the politician.
A second point put forward was the premise that Moro's revelations, from most of the communication during his "political process", would be made public. Unlike other people kidnapped by the BR and subjected to same procedure and, in spite of the unprecedented repetition of the point, in the case of Moro this never happened. Much of the material collected by the terrorists, including Moro's letter and personal notes written during his imprisonment, became public only after the discovery of the base in via Monte Nevoso. The terrorists later declared they had destroyed all the material including that containing references to the Gladio undercover organization discovered in 1990.
Journalist Indro Montanelli sided in favor of firmness and against the negotiations from the first day and in 2000, responding to a reader on Corriere della Sera, wrote:
Discovery of the body
Communication No.9 stated that:
The depositions made to the Italian judges during the trials showed that not all the Red Brigades leaders were for condemning Moro to death. Mario Moretti called Moro's wife by phone, asking her to push the DC leaders for negotiations. Adriana Faranda, a member of BR, mentioned a night meeting held in Milan a few days before the murder of Moro where she and other terrorists, including Valerio Morucci and Franco Bonisoli, dissented although the final decision was taken after voting.
On 9 May 1978, after a summary "people's trial", Moro was murdered by Mario Moretti. It was also determined that the participation of . The body was found that same day in the trunk of a red Renault 4 in via Michelangelo Caetani in the historic centre of Rome. The location was mentioned by journalist Carmine Pecorelli as the residence of opera conductor Igor Markevitch who, according to some theories, was the alleged instigator of the whole kidnapping.
According to the terrorist's declarations, made some ten years after the event, Moro was woken up at 06:00 with the excuse that he had to be moved to another secret base. In contradiction to this Bonisoli said that Moro was told that he had been "pardoned" and was going to be freed. The terrorists put him into a wicker basket and brought him to the parking garage of their base in via Montalcini. They put him into the trunk of a red Renault and, after covering him with a red sheet, Moretti shot Moro with a 9 mm Walther PPK and after the weapon jammed, a 7.65 mm Škorpion vz. 61. The bullets perforated Moro's lungs and killed him.
The car with his body was taken to via Caetani where it was parked about one hour after the murder. The common interpretation was that the location was midway between the national seats of DC and of the Italian Communist Party (PCI) in Rome to symbolize the end of the Historic Compromise, the alliance between DC and PCI which Moro had sought. In fact the car was found more towards the Tiber River, near the Ghetto. At 12:30 a phone call was made to Francesco Tritto, assistant of Aldo Moro in order to let him announce the location of the body. This fulfilled an exliciti will communicated by Aldo Moro to his kidnappers. At 13:30 a phone call, attributed to Valerio Morucci, notified the Prefecture of Police that the politician's body was in a car in via Caetani. Autoptic examinations made after the discovery assigned the death to around 09:00 and 10:00 of the same day, in contradiction to the terrorist's declarations. Witnesses declared that the car was in the street as early as 08:00 AM, while some witnesses declared that they did not see it before 12:30 AM.
Moro was wearing the same grey clothes he had during the kidnapping. The cravat had several blood stains, traces of sand were found in the pockets and socks, and traces of vegetables were also found. Eventually the terrorists declared that they had intentionally added those traces in order to sidetrack the investigators. In the trunk there were also some of Moro's personal effects, a bracelet and his watch, and some spent cartridges. Moro also had a thigh wound, likely suffered during the initial assault in via Fani.
Subsequent hypotheses, investigations and trials
Despite the long investigations and trials, the exact details of the kidnapping and murder of Aldo Moro are not known.
Crisis committees
Francesco Cossiga, minister of the interior at the time, formed two "crisis committees" on the very day of the kidnapping of Moro. These were:
a technical-operational-political committee, chaired by Cossiga himself and, in his absence, by undersecretary Nicola Lettieri. Other members included the supreme commanders of the Italian Police Forces, of the Carabinieri, the Guardia di Finanza, the recently named directors of SISMI and SISDE (respectively, Italy's military and civil intelligence services), the national secretary of CESIS (a secret information agency), the director of UCIGOS and the police prefect of Rome.
an information committee, including members of CESIS, SISDE, SISMI and SIOS, another military intelligence office.
A third unofficial committee was created which never met officially, called the comitato di esperti ("committee of experts"). Its existence was not disclosed until 1981, by Cossiga himself, in his interrogation by the Italian Parliament's Commission about the Moro affair. He omitted to reveal the decisions and the activities of the committee however. This committee included: Steve Pieczenik, a psychologist of the anti-terrorism section of the US State Department, a criminologist Franco Ferracuti, Stefano Silvestri, (director of the Istituto per l'Enciclopedia Italiana) and Giulia Conte Micheli.
Despite these changes, in the months that the kidnapping of Aldo Moro developed and executed, no Secret Service was designed to combat internal subversion. The committees were acting according to old standards: the planning of measures to be taken in case of emergency dating back to the 1950s, and it hadn't been updated even after the alarming growth of terrorism. This was due to the fact that the country had spread an atmosphere of resignation (if not indulgence) to the left-wing terrorism, because in the trials defendants get extenuating circumstances, Prima Linea was considered a simple subversive association (instead of an armed gang) and a part of the judiciary harbored hostility towards the State and was sympathetic to the revolutionary myths; so that the political scientist said that terrorism had become "a historical phenomenon understandable (though not justifiable) in a period of social change thwarted by a corrupt political class".
Terrorists involved in the kidnapping
Involvement of P2, Gladio and of the Italian intelligence services
Several authorities have suggested that Propaganda 2 (P2) was involved in the kidnapping of Aldo Moro. Propaganda 2 was a secret masonic lodge involved in numerous financial and political scandals in Italy in the 1970s and 1980s and which featured as its members entrepreneurs, journalists, numerous high exponents of right-wing parties, the Italian police and military forces. Another theory supposes that the Red Brigades had been infiltrated by the American Central Intelligence Agency (CIA) or by the Organizzazione Gladio, a paramilitary clandestine network headed by NATO whose main alleged task was to oppose Soviet influence in western Europe.
During the days of Moro's imprisonment journalist Carmine Pecorelli (see also below) wrote, in his magazine Osservatorio politico, an article entitled "Vergogna, buffoni!" ("Shame on you, clowns!"): in it he wrote that Giulio Andreotti had met general Dalla Chiesa who told the politician that he knew the location where Moro was kept, but did not obtain the authorization to proceed to free him due to (in Pecorelli's words) a certain "Christ's lodge in paradise". The likely allusion to P2 became clear only after the discovery of a list of the lodge members on 17 March 1981. Members of the lodge occupied important institutional positions and included: Giuseppe Santovito, director of SISMI; prefect Walter Pelosi, director of CESIS; general Giulio Grassini of SISDE; admiral Antonino Geraci, commander of SIOS; Federico Umberto D'Amato, director of the Office of Reserved Affairs of the Ministry of the Interiors; generals Raffaele Giudice and Donato Lo Prete, respectively commander and chief-of-staff of the Guardia di Finanza; and Carabinieri general Giuseppe Siracusano, responsible for road blocks in the capital during the investigations of the Moro affair.
According to (a professor who took part in the crisis committees) Franco Ferracuti, later discovered to be a member of P2 and who declared that Moro was suffering of the Stockholm syndrome towards his kidnappers, was close to the lodge during the kidnapping days, having been introduced by general Grassini. Licio Gelli declared that the presence of numerous members of P2 in the committees was casual, since numerous personalities were members at the time, and this was simply a statistic reflected by the composition of the committees. According to Gelli, some members of the committees did not know that some of their colleagues were also part of P2.
On 16 March 1978, the day of Moro's kidnapping, the most important members of P2 met in the Hotel Excelsior in Rome—a few hundred meters from the United States Embassy. While exiting the hotel Gelli declared "the most difficult part is done". It was supposed that his words referred to the abduction of Moro.
Another debated case was regarding the presence of Camillo Guglielmi, a colonel of SISMI's 7th Division which controlled Operation Gladio, in via Stresa near the location of the ambush, and in those exact minutes when the BR kidnapped Moro. His presence was kept secret and was only disclosed in 1990 during the investigation of the Italian Parliament commission on State Massacres. Guglielmi admitted that he was in via Stresa, but only because he had been invited to lunch by a colleague. According to several sources the colleague confirmed that Guglielmi came to his house, but had not been invited. Furthermore, Italians normally have lunch at around 12:30 and Guglielmi's presence at around 09:00 would be not justified. Other sources list Guglielmi as a true member of Gladio, but the officer always firmly denied this accusation. His direct superior, general Pietro Musumeci, was a member of P2 and condemned for sidetracking the investigations on the 1980 Bologna Station bombing.
The discovery of the BR refuge in via Gradoli (see also below) saw the participation of members of both P2 and the police forces of Italy. Lucia Mokbel, an informer of SISDE, had communicated that she had heard MORSE messages coming from the flat next to her. It turned out that those noises interpreted as MORSE code were in fact coming from the electric typewriter used by the Terrorists (BR) to type their demand letters. She informed police commissar Elio Coppa, enlisted in the Propaganda Due, but when police agents went to the flat and knocked on the door, strangely they did not attempt to enter it and left the place instead. SISDE had been also informed that a lock-up garage in via Gradoli had an antenna, allegedly used by the terrorist to communicate with the area of Lake Duchessa. However Giulio Grassini, head of SISDE and member of P2, did not take any investigative measures.
Investigations made by DIGOS discovered that several machines used by the terrorists to print their communications from one year before the kidnapping of Moro, which was financed by Moretti, had been previously owned by the Italian state. These included a printer owned by the Raggruppamento Unità Speciali dell'Esercito and, despite its relatively young age and its high value, had been sold out as a scrap. A photocopier was previously owned by the Ministry of Transportation, acquired in 1969 and later sold to Enrico Triaca, a member of BR.
The apartment in via Gradoli (see below) had been rented by Mario Moretti under the pseudonym of Mario Borghi since 1978. The same building housed several apartments owned by SISDE men and one inhabited by a police confidant. During the days of the kidnapping the palace was inspected by Carabinieri under colonel Varisco, with the exclusion of Moretti's apartment—the official justification was that the Carabinieri were not authorized to enter the apartments if no one was inside. The owner of the apartment, Luciana Bozzi, was later discovered to be a friend of Giuliana Conforto, whose father was named in the Mitrokhin list of the KGB. Morucci and Faranda were eventually arrested in her flat. Pecorelli wrote a postcard to Moretti in 1977 from Ascoli Piceno (Moretti was born in the province of Ascoli), addressing it to one "Borghi at via Gradoli", with the message "Greetings, brrrr".
In June 2008 the Venezuelan terrorist Ilich Ramírez Sánchez, best known as "Carlos the Jackal", spoke in an interview released to the Italian press agency ANSA declaring that several men of the SISMI, led by colonel Stefano Giovannone (considered near to Moro) negotiated at the airport in Beirut for the liberation of the politician during the night of 8 to 9 May 1978: the agreement would endorse the liberation of several imprisoned members of the BR to the Popular Front for the Liberation of Palestine in the territory of an Arabic country. According to Carlos the agreement, which found the opposition of the SISMI leading figures, failed because news about it leaked to other western secret services who, in turn, informed SISMI. Moro was killed the following day. Carlos stated that the officers involved in the attempt were all expelled from the services, being forced to resign or to go into compulsory retirement on a pension.
Involvement of foreign powers
In 2005 Giovanni Galloni, former national vice-secretary of Christian Democracy, said that during a discussion with Moro about the difficulty to find the Red Brigades' bases Moro told him that he knew of the presence of US and Israeli intelligence agents infiltrated within the BR. However the information obtained was not given to the Italian investigators. He also declared that the reason of the assassination of journalist Carmine Pecorelli was the same information, perhaps coming from the United States.
During an interview in front of the Italian parliament commission on terrorism Galloni also stated that, during his trip to the United States in 1976, he had been told that a government like that envisaged by Moro, which would include the Communist presence, would be opposed at "any cost" by the American Republicans.
During the 1983 trial against the BR Moro's widow, Eleonora Chiavarelli, declared that her husband was unpopular in the United States due to the historic compromise matter, and that he had been repeatedly warned by American politicians to stop disrupting the political situation which had been established in the Yalta conference (in reference to the possible executive role of the Italian Communist Party). According to her Henry Kissinger was one of the American personalities who menaced Moro in 1974 and 1976. She said that the words to Moro which he repeated to her were:
Kissinger denied these accusations.
Alberto Franceschini, one of the founders of BR, mentioned the possibility that the Red Brigades had been infiltrated by Israeli agents as early as 1974. He reported a confidence told to him by co-founder Renato Curcio, according to whom Mario Moretti would be an infiltrated agent. Curcio has always denied this reconstruction. Moretti took the reins of the Red Brigades after Franceschini and Curcio were arrested in the mid-1970s, introducing a far stronger militarization of the organization's activities.
Moretti, in the Italian RAI TV programme La notte della Repubblica denied these accusations, saying that he had never seen an Israeli in his life and that it was wrong to think that the change of RB's strategy depended from the arrest of some militants. He also added:
The false Communication No. 7 and the discovery of the base of via Gradoli
Another controversial event occurred on April 18, 1978 when a false BR's "Communication No. 7" announced the death of Moro and that he had been buried near Lake Duchessa, in the province of Rieti (north of Rome). In response the Italian police looked in vain for Moro under the iced surface of the lake.
The authors of the false communication included Antonio Chichiarelli, a notorious forger from Rome who was connected to the Banda della Magliana gang of the city. Chichiarelli would later issue further false communications from the Red Brigades. He was killed in uncertain circumstances in September 1984 when his connection with the false communiqué had been yet entirely clarified. Chichiarelli spoke of the communication to several people, including Luciano Dal Bello, a confidant of the Carabinieri and of SISDE. Del Bello reported the facts but no investigation on Chichiarelli followed.
In the same day that the police force found an apartment used as a base by the Red Brigades in Rome, on via Gradoli 96. The discovery was allegedly due to a water leak for which a neighbour had called the firemen. The leak was caused by a tap left open in the apartment's shower in an unusual fashion, i.e. with water directed against the wall. The base was normally used by Mario Moretti but the Italian media reported the discovery immediately and he avoided returning there. As previously mentioned, the palace had been inspected by Carabinieri under colonel Varisco, with the exclusion of Moretti's apartment: the official justification was that the Carabinieri were not authorized to enter the apartments if no one was inside. The owner of the apartment, Luciana Bozzi, was later discovered to be a friend of Giuliana Conforto, whose father was named in the Mitrokhin list of the KGB, and in whose apartments Morucci and Faranda were later arrested.
The commissar who had led Rome's police forces in the inspection of the building on via Gradoli, Elio Coppa, was eventually promoted to vice-director of SISDE—he later turned out to be a member of P2. The neighbor whose call had led to the inspection, Lucia Mokbel, was officially a university student of Egyptian descent and was later identified as a confidant of SISDE or of the police. Furthermore, the report of the inspection, which was presented at the trial on the Moro affair, was written on a type of paper distributed to the Italian police only in 1981, three years after the events.
Before, and after 1978, numerous apartments in the street had been used by Italian secret agents, including a Carabinieri NCO enrolled by SISMI who resided in the building facing that of Moretti and who was from the same birthplace. In the street there were also firms used by SISMI for its affairs. Moretti's apartment itself had been under observation by UCIGOS for several years previously as it had been frequented also by members of the far-left organizations Potere Operaio and Autonomia Operaia. Later it was revealed that the Christian Democracy parliament member Benito Cazora, during the contact he had with the 'ndrangheta (the Calabrian mafia) in the attempt to find Moro's prison, had been warned that the area of via Gradoli was a "hot zone". Cazora had reported this warning to the DC and to the police.
Mino Pecorelli, already mentioned for his likely knowledge of the presence of Moretti in via Gradoli, was one of the few journalists to immediately deny the authenticity of "Communication No.7", whereas most authorities had considered it true.
Some 30 years after the events Steve Pieczenik, an expert on terrorism of the US State Department, declared in an interview that the decision to issue the false communication was taken during a meeting of the crisis committee, present at which were Francesco Cossiga, members of the Italian intelligence agencies and Franco Ferracuti (as previously mentioned, a member of P2). The alleged goal was to prepare the Italian and European audience for the likely death of Moro in the kidnapping. He however stated that it would be ignored if the communication had been actually issued. See also below
It was also supposed that Moro had told his kidnappers of the existence of Operation Gladio, many years before its public revelation in 1990. From this point of view the false "Communication No.7" was a code message from sectors of the Italian secret agencies that Moro should not return alive from his imprisonment.
On 20 April 1978 the Red Brigades issued the true Communication No.7: they attached a photo of Aldo Moro holding a copy of La Repubblica, dated 19 April, showing that the politician was still alive.
The séance
Also connected to via Gradoli is an event which involved Romano Prodi, Mario Baldassarri and Alberto Clò. During an alleged séance in which they participated on 2 April 1978, after asking the soul of Giorgio La Pira about the location of Moro, a Ouija table they were using registered the words Viterbo, Bolsena and Gradoli, three towns north of Rome. The information was trusted and a police group made an armed blitz in the town of Gradoli, 80 km from Rome, on the following day, 6 April though Moro was not found. Prodi spoke to the Italian parliament's commission about the case in 1981. In the notes of the Italian parliament commission on terrorism the séance is described as a fake, used to hide the true source of the information. In 1997 Giulio Andreotti declared that the information came from the Bologna section of Autonomia Operaia, a far-left organization with some ties with the BR, and that Cossiga also knew the true source. Judge Ferdinando Imposimato considered Andreotti's theory as "possible", but accused him of having kept information that could have been valuable in a trial about Moro's murder.
Moro's widow later declared that she had repeatedly informed the police that a via Gradoli existed in Rome, but the investigators did not consider it — some replied to her that the street did not appear in Rome's maps. This is confirmed by other Moro relatives, but strongly denied by Francesco Cossiga.
In the 1990s the séance matter was reopened by the Italian parliament's commission on terrorism. While Prodi (then prime minister) declared that he had no time for an interview, both Baldassarri (senator and vice-minister in two Berlusconi cabinets) and Clò (minister of Industry in Lamberto Dini's cabinet and owner of the house where the séance was performed) responded to the call: they confirmed the circumstances of the séance, and that the word "Gradoli" had appeared in several sessions, even if the participants had changed.
Involvement of the Mafia
In the years following Moro's murder there have been numerous references to the presence of Calabrian 'ndrangheta at via Fani. In an intercepted phone call between Sereno Freato, then Moro's personal secretary, and Benito Cazora, a DC parliament member who had been given the task to keep contacts with the Calabrian gangs, Freato asks for news about the prison of Moro. The 'ndrangheta was in possession of several photos of the events in via Fani, some of which allegedly portrayed a "man known by them". According to what was reported by Cazora in 1991 some members of the 'ndrangheta, who had been expelled from Calabria, had offered their assistance to the Christian Democracy to discover the location of Moro, in exchange for the possibility to return to their homeland. However this collaboration never materialized.
According to the Sicilian Mafia pentito Tommaso Buscetta, several Italian state organizations tried to obtain information about Moro's location from the Mafia, but later Giuseppe Calò asked boss Stefano Bontade to stop the search, since the highest members of DC no longer desired the liberation of their fellow politician. The decision to abandon the search was taken between 9 and 10 April after Moro had revealed to his captors a series of very compromising information about the American CIA and Giulio Andreotti. Other sources report that the Sicilian Mafia changed its mind due to Moro's will to associate the Communist Party with the government.
In a deposition made at trial Raffaele Cutolo, then leader of the Neapolitan camorra, declared that the Banda della Magliana asked him if he was interested in the liberation of Moro. Cutolo contacted the Italian secret service who replied to him to stay away from the matter, because had vetoed the intermediation for the salvation of the then president of the DC. Valerio Morucci has completely discredited this confused story: he showed that the Camorra's militants were apparently "normal people in suits", completely alien environment of the underworld and therefore difficult to identify from the Banda della Magliana. Morucci concluded: "We weren't a gang ... we didn't meet under the street lights ... we didn't do we trade strange ... I don't see how the Banda della Magliana or anyone could identify the Red Brigades".
On 15 October 1993 a 'Ndrangheta pentito, , declared that Antonio Nirta, another Calabrian gangster who had been infiltrated in the Red Brigades, took part in the assault in via Fani. Sergio Flamigni, a former communist senator and member of the Italian Parliament commission on the Moro affair, wrote that when he learnt about Morabito's words he remembered about the testimony of Benito Cazora, who had declared that he had been approached by a Calabrian asking him about photos shot in via Fani.
According to the 'Ndrangheta pentito Francesco Fonti, his boss Sebastiano Romeo was involved in attempts to locate the place where Moro was held. Romeo had been asked by unnamed national and Calabrian Christian Democrats such as and to help out. With the help of SISMI and the Banda della Magliana, Fonti was able to locate the house where Moro was kept. When he reported back, Romeo said that he had done a good job but that important politicians in Rome had changed their minds.
Morabito's revelations were not considered supported by adequate evidence.
Role of Carmine Pecorelli
Journalist Carmine "Mino" Pecorelli, who apparently had several informers in the Italian secret services, spoke repeatedly about the kidnapping of Moro in his magazine Osservatorio Politico (or simply OP). Before the events of via Fani, Pecorelli had already written about the possibility that Moro would be blocked in his attempt to admit the Italian Communist Party into the government. On 15 March 1978, one day before Moro was abducted, Osservatorio Politico published an article which, citing the anniversary of the killing of Julius Caesar in relation with the upcoming formation of Andreotti's cabinet, mentioned a possible new Brutus (one of the assassins of Caesar, and a member of his family).
Articles written during the politician's imprisonment show that he already knew of the existence of a memorial (the documents written by Moro in his detention) and of some of the unpublished letters. Pecorelli stated that there were two groups within the Red Brigades, one favourable to the negotiations, and one who wanted to kill Moro in any case. He hinted that the group that had captured Moro in via Fani was not the same that was detaining him, and which had planned the whole move. He wrote:
When the terrorist base in via Gradoli was discovered Pecorelli stressed how in the apartment, different from what could be expected, all the proofs of the BR's presence were clearly displayed. Regarding the kidnapping he wrote that Moro's opening to the Communist Party was not welcome, both by the United States as it would change the political balance of southern Europe, nor by the Soviet Union since this would prove that Communists could reach power democratically, and without being a direct offshoot of any Communist party.
On 20 March 1979 Pecorelli was murdered in front of his house. In 1992 the Mafia pentito Tommaso Buscetta revealed that the journalist had been eliminated as "a favor to Andreotti", who was preoccupied about some information about Moro's kidnapping in the possession of Pecorelli. The latter had allegedly received from general Dalla Chiesa (they were both affiliated or near to P2) a copy of a letter by Moro which contained dangerous accusations against Andreotti; the journalist had hinted about them in some previous articles. The unabridged letters were published only in 1991 when, together with others, it was discovered during renovation works in via Nevoso (only a resume of them, the so-called Memoriale Moro, had been previously issued). The fact that Moro's letters were circulating before 1991 is proven by a speech held by Bettino Craxi, leader of the Italian Socialist Party (PSI), in which he mentioned a letter which had not been officially published at the time. The fact was considered a subtle menace against Andreotti in the war for the supreme political power waged between PSI and DC at the time.
In 1993 historian expressed doubts about what was said by the Mafia pentiti because, comparing the two memorials (the "amputee" of 1978 and the "complete" of 1990), noted that Moro's allegations addressed to Andreotti were the same, so Andreotti had no interest to order the murder of Pecorelli, who could not threaten him to publish things already known and publicly available.
Andreotti underwent a trial for his role in the assassination of Pecorelli. He was acquitted in the first grade trial (1999), condemned in the second (2002), and finally acquitted by the Italian Supreme Court (2003).
Pecorelli, in an article written the very day of his assassination, hinted to the role of opera composer Igor Markevitch (see below) in the kidnapping.
Role of Steve Pieczenik
Steve Pieczenik was an American negotiatior and expert in terrorism who was sent by the US State Department, at the request of Cossiga, and remained in Italy for three weeks during Moro's detention. He later collaborated with Tom Clancy as a novel and cinematic writer. His presence in Italy as a member of one of the previously mentioned "crisis committees" was revealed only in the early 1990s. Pieczenik had written to a relation in which he spoke about the possible effects of Moro's abduction, the possibility that the Red Brigades had been infiltrated by Italian agents, and also gave advice about how to find the terrorists. Eventually however, Pieczenik declared that this relation was false, since the ideas included were similar to those of the P2-affiliated criminologist Francesco Ferracuti, another member of the secret committee. Pieczenik also stated that he did not release any written document.
According to what was revealed by Cossiga and by Pieczenik himself, his initial idea was to show the will to negotiate, with the goal of gaining time and in the hope that the terrorists would make some error from which they could be detected. During later interviews, Pieczenik declared that there were numerous leaks about the discussions made at the committee:
Pieczenik also declared that, once returned to the United States, he met an alleged Argentinian secret agent who knew everything that had happened at the Italian crisis committee. Pieczenik explained the leak to Argentina with the presence in the committee of numerous members of the P2 lodge, which had strong ties with the South American country (its founder Licio Gelli had lived for a period there).
In a later interview to French journalist Emmanuel Amara, Pieczenik declared:
At his arrival in Italy Pieczenik had been informed by Cossiga and the Vatican intelligence services that there had been a coup attempt in Italy in previous months, led by right-winged personalities of the intelligence services and of P2. Pieczenik was astonished by the presence of so many fascists in the Italian intelligence services. The Red Brigades had also infiltrated the Italian institutions and obtained information from the children of politicians who were members of left and far-left organizations. With the help of the Vatican intelligence, which he considered superior to the Italian one, he investigated such infiltrations, but no measures were taken.
Pieczenik also declared that he participated in the decision to issue the false "Communication No.7", stating that he pushed the BR to kill Moro in order to de-legitimise them, once it was clear that the Italian politicians were not interested in his liberation. According to Pieczenik, the United States did not have a clear image of the situation in Italy, especially for the left and right-wing terrorist groups; he also said that he received no help from CIA or the US embassy in Italy.
Pieczenik explained his premature return to the US with the desire to avoid the accusations of American pressure behind the now likely death of Moro. Previously he had instead declared that he had left in order to deprive the decisions taken by the Italian institutions, which he considered inefficient and corrupted, of any US legitimisation.
Role of Igor Markevitch
Russian composer and conductor Igor Markevitch has also been purported to have helped the kidnappers, housing them in his villa at Florence and perhaps preparing the questions made to Moro. His residence in Rome faced via Michelangelo Caetani (Markevitch had married the daughter of the nobleman after whom the street was named), where Moro's body was found after he was killed.
A report issued by SISMI in 1980 mentions one "Igor, of the dukes Caetani family", who had a prominent role in the Red Brigades organization. Two agents of SISMI were investigating near Paleazzo Caetani in the early May 1978 when Moro had not yet been murdered. They were stopped by an unspecified "superior intervention" (allegedly coming from the agency's director, Giuseppe Santovito, a member of P2). Markevitch has been also identified as the "mysterious intermediary" mentioned by the Red Brigades in their Communication No.4.
In the article written the very day in which he was killed, Mino Pecorelli, speaking of the "prison of the people" where Moro was kept, mentioned a palace having a frieze with lions and located in the centre of Rome; and described a duchess who could see the body of Moro from her balcony. The Caetani palace in which Markevitch and his wife lived had a bas-relief of two lions biting two horses.
Alleged presence of a marksman
In the course of Moro's capture the terrorists fired 93 bullets. These killed all the five members of the escort but left Moro with only a light wound in his thigh. Despite this apparent precision, members of the BR such as Valerio Morucci declared that they had only a rough shooting training, obtained by firing their weapons in grottoes at night. The position of the bodyguards (two sitting in the front seats of Moro's car, and three in the following one), separated from the politician, likely made it easier for the ambush squad to direct their fire against them and avoid hitting Moro.
However several writers and observers suggested that the ambushers of via Fani included a marksman. Sources such as the magazine l'espresso further suppose that he could have been a member of the Italian intelligence service and identify him as Giustino De Vuono, a marksman once part of the French Foreign Legion: according to their reconstruction, the 49 bullets found in the bodies of the bodyguards would come from his weapon. A witness reporting on 19 April 1978 at Rome's Prefecture declared that he had recognized De Vuono driving a green Austin Mini or Autobianchi A112 on the location of the massacre. De Vuono, who was affiliated with the 'Ndrangheta (Calabrian mafia), on that day was not in his usual residence in southern Paraguay (at the time under the dictatorship of Alfredo Stroessner). Several members of the Red Brigades declared that their weapons were acquired from the Calabrian gangland, amongst others; further, it has been proved that members of DC got in touch with Calabrian gangsters to obtain a help in the liberation of Moro.
The identity of the alleged marksman has been also associated to the German terrorist group RAF. Another witness of the events in via Fani declared that some thirty minutes before the ambush a foreigner with German accent had addressed him, ordering to go away from the area.
Since some of the ammunition used for the massacre had been treated with a special preserving paint (which was also found in some secret depots related to the Gladio undercover organization), it has been suggested that these would come from some Italian military or paramilitary corps.
Theory of the alternative kidnapping
Journalist Rita di Giovacchino suggests that Moro was not in via Fani during the massacre, but had been taken prisoner by another organization and that the Red Brigades acted only as "front men". This would explain their reticence and the incongruity of their declarations about the whole kidnapping (from the ambush, to the presence of sand on Moro's body). According to her, this would also explain the sibylline remark pronounced by Sereno Freato, first secretary of Aldo Moro, when Carmine Pecorelli (see above) was also found dead: "Investigate on the instigators of Pecorelli's murder, and would find the instigators of Moro's murder". She thus lists as part of the same plot the deaths of Pecorelli, Chichiarelli (who would have been punished for his blackmailing attempts) and of Carabinieri colonel . Allegedly killed by the Red Brigades in 1979, although in circumstances never clear, Antonio Varisco had been at the helm of the investigation on the BR base in via Gradoli; he was also a friend of general Carlo Alberto Dalla Chiesa (also murdered for never completely understood reasons), as well as of Pecorelli. The use made by BR of printing machines once owned by the Italian intelligence, according to di Giovacchino, shows that the latter were likely the organization behind all these bloody acts.
Mario Moretti declared that he was studying Moro's daily moves since 1976. Every morning the politician went with his grandson to a church near his house, after which he had a short walk with only one member of the escort. This looked like a more favourable moment to kidnap him, since most of the bodyguards were not present, but was not chosen by the terrorists. On the morning of his abduction Moro did not bring his grandson with him.
After the ambush in via Fani the terrorists took only the most interesting for them of the five bags that Moro carried with him. Those containing the politician's medicines and his reserved documents. Further, the necessity of inflicting a coup de grâce to any of the bodyguards is in contrast with a hurried attack typical of such acts, and is motivated only by the necessity to eliminate any possible witness that would reveal that Moro was not there. In a letter to his wife Moro wrote during captivity he asked her to take care of his bags. Since Moro was surely aware that if his bags had been found in the massacre location, they had been taken by the investigators. Also the absence from his letter of any word about the victims of via Fani has been taken as an element in favour of the theory that Moro was captured while in his Gladio escort (see Involvement of P2, Gladio and of the Italian intelligence services) and not in via Fani and so did not know anything about their assassination.
Doubts about the kidnapping
Numerous unanswered questions surround Moro's kidnapping in via Fani:
Moro's widow noted that in Moro's letters, delivered by the terrorists, there is no mention of the killing of his bodyguards: given the character of Aldo Moro, she considered it improbable that he did not write a single word about these victims.
On 1 October 1993, during the fourth trial on the Moro affair, ballistic experts released a report which disputed the version of Valerio Morucci. According to their new report, a second member of the ambush squad fired towards the Fiat 130.
The number of the participants in the ambush (the terrorists initially spoke of nine, later of eleven people) is considered small by other terrorists, such as Red Brigades co-founder Alberto Franceschini. He declared: "For the capture of Mario Sossi, in 1974, we were twelve. I think that managing a kidnapping such as that of via Fani with 11 is quite risky".
Alessandro Marini, an engineer who passed by via Fani the day of the assault, declared that two people on a Honda motorbike shot at him with a firearm. The motorbike preceded Mario Moretti's car. However, members of the Red Brigades always denied the presence of the Honda and did not explain the origin of the shooting against Marini.
An unexplained element is how the terrorists could have planned an ambush in via Fani, since Moro's escort changed their routes daily. However, the terrorists for the occasion had taken measures, such as cutting the tyres of the van of a florist who worked in via Fani (in order to remove a dangerous witness during the ambush), which can be explained only by their having precise knowledge of Moro's route that morning.
SIP, then Italy's national telephone company, was exceedingly inefficient on numerous occasions linked to Moro's detention. In particular, after the assault in via Fani, all the phone communications in the area were inoperative. Other examples included when, on 14 April, journalists of Rome's newspaper Il Messaggero were waiting for a phone call from the terrorists. The six phone lines in the newspaper's office had been connected to police central but, when the call arrived, DIGOS reported that all of them had been cut, with the result that the caller could not be identified. On 15 March 1978, the day before the capture of Moro, SIP had been alerted. However, after Moro had been kidnapped, an inspection of the telephone lines in the area of via Fani showed that they were all out of order. This prevented any possible witness contact with the police before the ambush. The commander of DIGOS during the kidnapping days described SIP as "totally un-cooperative", and stated that "in no occasion did they find the origin of the kidnappers' calls", concluding by noting that Michele Principe, then general director of STET, the company that owned SIP, was a member of the P2 lodge.
Other suspicions and controversies
Chichiarelli, the author of the false "Communication No.7", was related to the Banda della Magliana. Aside from its purely criminal activities this large gang in Rome was related to Sicilian Mafia and has been involved in numerous political and terrorist scandals since the 1970s. Judiciary acts have proved that members of the gang had a role in the assassination of Pecorelli and in the case of Roberto Calvi (both of which saw the incrimination of Giulio Andreotti), in the financial affairs of the Vatican City (including the kidnapping of Emanuela Orlandi), and in the sidetracking of the investigations on massacres such as that of Bologna Station. Judge Ferdinando Imposimato proved that the "Banda della Magliana" had strong ties with SISMI (Italy's military intelligence agency), and that the latter inspired the farce of the communication and of the Lago della Duchessa. Finally, the apartment of via Montalcini, in which Moro was allegedly detained by the Red Brigades, was located in the Magliana quarter of southern Rome and a member of the gang owned the building facing that apartment.
Members of Moro's escort, who were not in service on the day of the kidnap, declared in September 1978 that Moro was a habitual person, and that every day he got out from his house exactly at 09:00 AM. However, Moro's widow denied this circumstance during her interview in front of the investigative judges on 23 September 1978.
Francesco Cossiga declared that Moro's confessor, Don Antonio Mennini (later papal nuncio to Great Britain), was allowed to enter in the politician's cell just before his execution. In 2015 Don Mennini has denied this reconstruction.
Political consequences
The kidnapping and murder of Moro drastically changed the politics of Italy.
The Historic Compromise between DC and PCI, one of Moro's main goals, was not liked by Italy's main international partners. On 23 March 1976 Aldo Moro, during his tenure as prime minister, took part in the G7 conference in Puerto Rico. When he asked his colleagues' opinions about the matter they replied to him that, if it materialized, the presence of the Communists in the executive would cause the loss of international support (including financial ones) for Italy. At the previous general elections, DC had scored a 38%, followed by PCI with 34%. Moro was considered a natural candidate for the next President of the Italian Republic, with the ensuing realization of the government alliance between the two parties. His assassination marked the definitive end of the Historic Compromise.
On 16 March 1978, the very day of the kidnapping of Moro, Andreotti's cabinet obtained the vote of confidence: it was voted for by all the Italian parties, with the exception of the Social Movement, the Liberal Party (the first a far right party, the second a centre-right one), the Radical Party and of Proletarian Democracy (the latter being left/far left formations). The executive was formed exclusively by members from DC and could govern only with the indirect support of PCI (the so-called "non-no confidence").
Between 1978 and 1979, Italy was involved with a series of events, after the assassination of Moro; on 15 June Giovanni Leone resigned from the presidency of the Republic, ending six months before his term as a result of harsh polemics and attacks on his person. A few weeks later Sandro Pertini was elected with plebiscite vote. In January 1979, Andreotti's cabinet resigned: Pertini entrusted the task to Ugo La Malfa, but the attempt failed and there were new elections.
At successive elections the DC remained stable while the PCI suffered a sharp setback:
this result marked the end of the government of national solidarity and the possibility of entry of the Communists in the executive.
The party, under the stronger influence of Ciriaco De Mita (from 1982 to 1989), Giulio Andreotti and Arnaldo Forlani (from 1989), remained a government party until 1994; in the 1992 elections went down for the first time below 30% of the votes due to the Lega Nord's growth in Northern Italy, and following the requests of Mani pulite scandal (and the ties between the Mafia and Andreotti himself) that also involved the allied parties (in addition to former PCI, renamed PDS, involved at the local level), continued to lose support. In 1994 the party was disbanded and the DC's last secretary, Mino Martinazzoli, decided to change the name of the party to the Italian People's Party.
According to the acts of the Italian Parliament commission on terrorism:
See also
The Moro Affair
Years of Lead
Terrorism in the European Union
References
Sources
Further reading
External links
Interactive website/Blog about the Moro affair
The Moro Affair from A to Z
Gallery of contemporary frontpages and videos
Category:1978 crimes in Italy
Category:1978 mass shootings
Category:1978 murders in Europe
Category:1970s in Rome
Category:1970s mass shootings in Europe
Category:1970s murders in Italy
Kidnapping
Category:Communist terrorism
Category:Kidnappings in Italy
Category:March 1978 crimes
Category:March 1978 events in Europe
Category:Mass murder in 1978
Category:Mass murder in Italy
Category:Mass shootings in Italy
Category:Murder in Rome
Category:Red Brigades
Category:Terrorist incidents in Europe in 1978
Category:Terrorist incidents in Italy in the 1970s
Category:Terrorist incidents in Lazio
Category:Years of Lead (Italy)
|
{
"pile_set_name": "Wikipedia (en)"
}
|
Unique Home Items HD Wallpapers
Posted on 20 August, 201892 out of 100 based on 951 user ratings
switchsecuritycompanies.com -Unique Home Items We carry thousands of unique and unusual gifts, from fun jewelry and cool accessories to creative home decor and kitchen items. site map; Find the best ideas for men, women and kids at UncommonGoods. We carry thousands of unique and unusual gifts, from fun jewelry and cool accessories to creative home decor and kitchen items.
Home Decor Of 2012
Unique Home Decor For Your Unique Home
Unique home decor. You searched for: unique home decor! Etsy is the home to thousands of handmade, vintage, and one-of-a-kind products and gifts related to your search. No matter what you’re looking for or where you are in the world, our global marketplace of sellers can help you find unique and affordable options. Let’s get started!
Home Design & Decor Idea
Unique Home Items st home decor ideas. Find the best ideas for men, women and kids at UncommonGoods. We carry thousands of unique and unusual gifts, from fun jewelry and cool accessories to creative home decor and kitchen items.
Unique Home Decor Accessories
most popular Unique Home Items [picture,image,video]ideas for 2018. Browse Unique Home Items designs and decorating ideas. Discover inspiration for your Unique Home Items remodel, including colors, storage, layouts and organization.
|
{
"pile_set_name": "Pile-CC"
}
|
Home automation systems are becoming increasingly prevalent. Such systems may incorporate a variety of electronic devices, such as “smart” electronics that allow end-users to control and/or view status information of those devices, and non-smart electronics. Such systems may further be used to enhance home security, for instance by detecting and responding to emergency situations, such as fire, burglary, accidents, and other crisis. This disclosure is intended to enhance home automation systems and to provide related advantages.
|
{
"pile_set_name": "USPTO Backgrounds"
}
|
Last month, Google revealed it would certainly be making initiatives to assist remove “revenge pornography” from showing up in its search results page by producing a system where individuals can report specific pictures published of them without their permission.
Today, Microsoft did the same and also introduced a brand-new reporting web page where individuals could send connect to naked and also specific pictures and also video clips they desire eliminated from Bing search results page.
While individuals have actually had the ability to report to us in the previous, we have actually established a brand-new reporting Websites, offered today, making it simple for sufferers to allow us understand about these specific pictures and also videos.Microsoft on the Problems Blog site Microsoft’s brand-new “vengeance pornography”reporting web page asks individuals to send their business and also e-mail address, together with a LINK to the offending material. It likewise asks whether the individual has actually ever before consented to the material being dispersed and also if individual info shows up with the picture or video clip. Baseding on the statement, the web page is presently just offered in English, however
it will certainly be offered in even more languages throughout the coming weeks. The business verified that when web links are eliminated from search results page they are eliminated internationally. While connect to specific pictures or video clips might be eliminated, Microsoft explains that the material will certainly not be
Contact Break Away SEO for a Free Consultation Today! We are hard working midwest designers, developers and search engine optimization experts. Truly, if you want help a path to success we can create the map that will get you there.
|
{
"pile_set_name": "Pile-CC"
}
|
Bill O’Reilly has long helmed the most-watched show on cable news, but one prominent Republican has had harsh words for him: Gov. Jeb Bush, who once wrote that he had no respect for the host. And that tension highlights one of the ugliest stretches of Bush’s governorship.
On June 2, 2003, a Floridian named Omar Roberts—who didn’t seem to have any prior relationship with the then-governor—emailed Bush to praise him for a recent appearance on Sean Hannity’s show. Then he raised a concern: O’Reilly had been covering scandal involving Florida government entities, including the case of an autistic woman who was raped and impregnated while in state care.
“I would feel much better if you would just at least address these issues that O’Reilly is reporting either on his show or even on another interview with his friend, Sean Hannity,” continued Roberts. “I think that the issues of whether or not the Florida state leadership is to blame or if everything possible is being done—all need to be put to rest once and for all (or as much as possible).”
Then Roberts asked Bush to give him a heads-up if he ever went on the show. Bush replied to Roberts’ email a few hours later.
“Thank you for writing,” Bush said. “I did Sean’s show because he was in state and I respect him. O’Reilly on the other hand is someone who I don’t respect. I could give you many reasons but I won’t since it doesn’t matter.”
Bush then gave Roberts a little more background on the case of the autistic woman.
“Regarding the case of the woman raped, she was in a home licensed by the staten not in a state facility,” Bush continued [all typos sic]. “We revoked the license, have pushed gor a guardian for the mom and child. This is a tragic caseand we are on it. Mr. O’reilly won’t even seek information from our office on these matters. The department of children and families is a troublrf agency improving by the day. We will continue to strive to do better.”
A Bush insider told The Daily Beast that the governor gave O’Reilly a heads-up on these emails, and that the two men “have discussed and it’s water under the bridge.”
But in the early 2000s, O’Reilly leveled substantial criticism at Bush for his decision to push for two legal guardians in that case—one for the woman who was raped, and another for her fetus.
He also sharply criticized how Bush’s administration handled the case of Rilya Wilson, a young girl who disappeared from the Florida foster care system at age 4. She was gone for two years before authorities realized she was gone, and the head of the Florida Department of Children and Families resigned because of the scandal.
On a May 3, 2002, episode of his show, the host tore into the governor.
“Governor Jeb Bush says the state is reviewing the case, but the government can only go so far,” O’Reilly said. “I say baloney! The State of Florida can tell Americans exactly what happened here and arrest those responsible for criminal negligence.”
“To say they are investigating is simply a smokescreen, a Janet Reno tactic that is hollow and dishonest,” O’Reilly continued later. “Give us a status report on the investigation. Chances are that Rilya Wilson is dead because nobody cared about her. Her mother cared more about drug[s], her godmother cared more about money, and the State of Florida hired inefficient and possibly criminal people to look out for foster kids. How about a little outrage over that, Jeb Bush? How about some action?”
In a Jan. 13, 2003, segment, O’Reilly said Bush had “done a horrible job” handling the case and the department.
“We need people who take it personally, who want to help the kids,” O’Reilly said. “And with all due respect to Governor Bush, I have not seen one iota of that.”
O’Reilly also criticized Bush’s decision to push for a guardian for the fetus. The host discussed both issues in a May 20, 2003, segment, and had tough words for Bush.
“I have nothing against Jeb Bush, all right,” he said. “I don’t—you know, I know the man. I don’t have anything against him. But he just can’t seem to run the state vis-a-vis children and disabled people. This agency cannot perform. We have—this is going on six years that this has been in chaos, and I think everybody understands the situation. It’s indefensible.”
A few hours after the show aired, Jerry Regier, a social conservative activist who founded the Family Research Council, emailed Bush the text of an op-ed defending his decision to appoint a guardian for the fetus.
“I had’nt seen it and I am grateful,” Bush replied at 2:22 a.m. the next day [all typos sic]. “I got blasted on O’Reilly tonight about the rape and our inability to deal with it.”
Years later, O’Reilly has a nuanced view of Bush’s time in office. In a conversation on his show with Dana Perino on April 20 of this year, he said Bush “did a very good job in Florida.” And in March, he said he thought the former governor could beat Hillary Clinton.
But he wasn’t shy about criticizing Bush while he was in office. And that criticism seems to have hit home.
|
{
"pile_set_name": "OpenWebText2"
}
|
Q:
Can't upload files larger than 97.66 KB in Yii2 Framework with Kartik's FileInput widget
When I try to upload a file larger than 97.66 KB I get this error (translated from spanish):
"File is too large. Its size cannot exceed 97.66 Kib."
This is my widget setup:
Modal::begin([
//'title'=>'File Input inside Modal',
'header' => 'Agregar foto',
'toggleButton' => [
'label'=>'Agregar foto',
'class'=>'btn btn-default',
//'href' => Url::to(['afiliado/foto']),
'value' => Url::to('index.php?r=afiliado/foto&id=' . $model->id),
],
]);
echo $form->field($model, 'image')->widget(FileInput::classname(), [
'options' => ['accept' => 'image/*'],
'pluginOptions'=>[
'maxFileCount' => 1,
'allowedFileExtensions'=>['jpg','jpeg','gif','png'],
'showUpload' => false,
'maxImageWidth' => 2400,
'maxImageHeight' => 2400,
'resizeImage' => true,
'maxFilePreviewSize' => 10240,
'minImageWidth' => 50,
'minImageHeight'=> 50,
'browseIcon' => '<i class="glyphicon glyphicon-camera"></i> ',
'maxFileSize' => 1024
],
]);
Modal::end();
And in My php.ini, I set:
upload_max_filesize = 99MB
post_max_size = 100MB
Thanks in advance.
A:
You need to get the file using UploadedFile::getInstance('image'), and change you model rules to use maxSize around 1024 * 1024 * 100 to set limit around 100MB
[['image'],
'file',
'skipOnEmpty' => false,
'extensions' => 'jpg, png, gif, jpeg',
'maxSize' => 1024 * 1024 * 100,
'tooBig' => 'The file was larger than 100MB. Please upload a smaller file.',
],
|
{
"pile_set_name": "StackExchange"
}
|
Q:
Ordering a List by string to find the newer version C#
I have a folder with several Directories that are named after a version of an update such as UPDATE_20080311_3.5.9.
I need to find the latest update on that list by veryfing the "3.5.9", I made a code to parse the name and add just the version to a list.
Is there anyway to Sort tha list by using List.Sort in order to get the latest version "number"?
This is the code I made so far, I don't know how to properly use the .Sort() method and if this can be done.
I appreciate any help given
public string NewerVersion(string Directoria)
{
List<string> Lista = new List<string>();
DirectoryInfo dir = new DirectoryInfo(Directoria);
DirectoryInfo[] dirs = dir.GetDirectories();
foreach (DirectoryInfo Info in dirs)
{
string Dir = Info.Name.ToString();
Lista.Add(Dir.Substring(Dir.LastIndexOf('_'), Dir.Length));
}
Lista.Sort()
//Lista.ToArray();
}
A:
You can use Version which implements IComparable, so it supports sorting.
For example with this LINQ query:
Version version = null;
Version lastVersion = new DirectoryInfo(Directoria).EnumerateDirectories()
.Where(d => d.Name.StartsWith("UPDATE_"))
.Select(d => new {Directory = d, Token = d.Name.Split('_')})
.Where(x => x.Token.Length == 3 && Version.TryParse(x.Token[2], out version))
.Select(x => new {x.Directory, Date = x.Token[1], Version = version})
.OrderByDescending(x => x.Version)
.Select(x => x.Version)
.FirstOrDefault();
string latestVersion = lastVersion.ToString(); // if you want it as string
After I find the newer version I need to be able to return the name
of the directory
Then use this query:
var lastVersion = new DirectoryInfo(Directoria).EnumerateDirectories()
.Where(d => d.Name.StartsWith("UPDATE_"))
.Select(d => new {Directory = d, Token = d.Name.Split('_')})
.Where(x => x.Token.Length == 3 && Version.TryParse(x.Token[2], out version))
.Select(x => new {x.Directory, Date = x.Token[1], Version = version})
.OrderByDescending(x => x.Version)
.FirstOrDefault();
if (lastVersion != null)
Console.WriteLine(lastVersion.Directory.FullName);
A:
Edit:
Continuing from your solution, there is a problem which the way you add your item:
string Dir = Info.Name.ToString();
Lista.Add(Dir.Substring(Dir.LastIndexOf('_'), Dir.Length));
Notice two mistakes here:
You get the Substring from LastIndexOf('_') instead of from LastIndexOf('_') + 1, which is what you really want
You use Dir.Length while you should use Dir.Length - LastIndexOf('_') + 1 instead
Change that into:
string Dir = Info.Name.ToString();
int indexStart = Dir.LastIndexOf('_') + 1;
Lista.Add(Dir.Substring(indexStart, Dir.Length - indexStart));
Then you could further process the Lista that you have populated to have the version number alone by LINQ OrderBy and ThenBy as well as string.Split('.')
var result = Lista.Select(x => x.Split('.'))
.OrderBy(a => Convert.ToInt32(a[0]))
.ThenBy(a => Convert.ToInt32(a[1]))
.ThenBy(a => Convert.ToInt32(a[2]))
.Last();
string finalVersion = string.Join(".", result);
To get the final version among the listed items.
To get your directory path back based on your finalVersion, simply do:
string myDirPath = dirs.Select(x => x.FullName).SingleOrDefault(f => f.EndsWith(finalVersion));
|
{
"pile_set_name": "StackExchange"
}
|
[Tissue changes in the oral cavity of children with primary immunodeficiency states].
The examination of 89 children aged 3-14 with diverse forms of primary immunodeficiency (ID) demonstrated that the most intensive progress of caries, mucosal inflammation and the worst oral hygiene occurred in cellular ID, especially in children with chronic generalized skin and mucosal candidiasis. Antibody defects of immunity enhanced caries in dental hard tissues. Phagocytic defects were also associated with dental caries, disorders of oral mucosa, unsatisfactory oral hygiene. Chronic inflammation in children free of ID produced insignificant defects in oral cavity.
|
{
"pile_set_name": "PubMed Abstracts"
}
|
Q:
Resolving NUnit "No suitable constructor was found" message
I have a unit test class:
[TestFixture]
public class SomeClassIntegrationTests : SomeClass
With public constructor:
public SomeClassIntegrationTests (ILogger l) : base(l)
{
}
When I attempt to run the test I get "No suitable constructor was found" error.
I tried changing the TestFixture attribute to [TestFixture(typeof(ILogger))] but it results in the same error message not allowing me to run or debug the test.
Any idea how to modify the TestFixture attribute to get the test to run or resolve this issue in some other way?
A:
You probable need an instance of a class implementing ILogger.
Option 1: use null (if the logger is not really required):
[TestFixture(null)]
Option 2: use always the same concrete class (or a mock): add a parameterless constructor
SomeClassIntegrationTests()
: this(new MyLogger())
{
}
and
[TestFixture]
Option 3: you may want to test with different loggers
SomeClassIntegrationTests(Type t)
: this((Ilogger)Activator.CreateInstance(t))
{
}
and
[TestFixture(typeof(MyLogger))]
|
{
"pile_set_name": "StackExchange"
}
|
Image copyright Getty Images Image caption The DEC said many people still not received any aid since the typhoon hit
An appeal by British charities to help victims of Typhoon Haiyan in the Philippines has raised more than £73m in a month.
The Disasters Emergency Committee, a group of 14 aid charities, said it was the fourth highest amount raised of any appeal in its 50-year history, and described the scale as "extraordinary".
But it said millions affected by last month's storm were still facing a huge task to rebuild their lives.
The typhoon killed almost 6,000 people.
It also devastated hundreds of towns and cities and left millions of people without food, clean water and shelter.
The DEC said the vast majority of the money raised since it launched the appeal on 12 November had come from individual donations.
Only three other DEC appeals have raised more, it said, and they had all run for longer.
The committee said the donations had helped it, along with its partners, to reach almost 1.6 million people with aid.
'Had to help'
Image copyright Getty Images Image caption Tacloban city was among the worst hit urban areas
But it warned that almost 15 million people had been affected by the typhoon, which made landfall exactly a month ago, and some in more remote areas had still not received any emergency aid.
The priorities now for aid agencies are to provide longer term shelter, clean water and to secure food supplies, it said.
Highest DEC appeal totals £392m - Tsunami Earthquake Appeal, 2004
£107m - Haiti Earthquake Appeal, 2010
£79m - East Africa Crisis Appeal. 2011 (First month of fundraising only)
£73m - Philippines Typhoon Appeal, 2013
£71m - Pakistan Floods Appeal, 2010 Source: DEC
DEC chief executive Saleh Saeed said: "In homes up and down the country people have seen the devastation in the Philippines and decided that they simply had to help.
"In many cases we know they are facing considerable hardship themselves but they gave anyway."
He said the relief effort was ongoing but needed to be scaled up.
"We must also begin to support the affected people of the Philippines down the slow, hard road they face to rebuild their lives and livelihoods," he said.
Fundraising for DEC appeals continues for six months, so the final total will not be known until the end of March next year.
|
{
"pile_set_name": "OpenWebText2"
}
|
Q:
Number of Strings with two specific letters
How many ways can you construct a string four letters (from 26 alphabet characters) that have both the letters j and k in them?
A:
It is easier to count the complement.
There are $25^4$ strings that don't have $j$, and $25^4$ that don't have $k$. If we add these, we will count twice the strings that have neither $j$ nor $k$. There are $24^4$ of these. So the required number is
$$26^4 -\left(25^4+25^4-24^4\right).$$
|
{
"pile_set_name": "StackExchange"
}
|
The invention relates to a bicycle frame having a front fork, a back fork, a steering head sleeve and a pedal shaft sleeve.
Such a frame is generally known. The known frame comprises tubes which are mutually secured, mainly into triangles, by means of so called lugs (insert sleeves). In order to guarantee sufficient rigidity and strength against compression, flexing and torsional forces, which act in combination, this frame has to be manufactured of relatively thick and therefore heavy material.
The invention aims at obtaining a decrease of the weight and simultaneously a more rigid frame.
|
{
"pile_set_name": "USPTO Backgrounds"
}
|
1. Field of the Invention
The present invention relates to a nail print apparatus and a print controlling method.
2. Description of the Related Art
Conventionally, there is known a nail print apparatus in order to print a design image such as character or picture on a finger nail of a person as described in Japanese Unexamined Patent Application Publication (Translation of PCT Application) No. 2003-534083.
A nail print apparatus is an apparatus which photographs a nail on which printing is performed with a photographing section to detect a nail area which is to be a print target and a design image selected by a user is printed using a print head, etc. of an ink jet method on the detected nail area.
By using such apparatus, nail print can be easily enjoyed without going to a nail salon, etc.
However, there is a problem that, as in conventional nail print apparatuses where printing is performed by spraying ink directly on an upper surface of a nail of a person, the user needs to wait with the finger fixed without movement during the print operation, and this is a heavy burden on the user.
Moreover, when printing is performed using a print head of an ink jet method, there is a possibility that ink mist spreads around the nail, and there is a possibility that the ink attaches to the finger and the finger becomes dirty when printing is performed.
Further, when printing is performed directly on the nail, when the user desires to change the printed design image to a different design image, the user needs to erase the printed image using a nail polish remover, etc. and this is troublesome. Therefore, there is a problem that the user cannot easily change nail print according to the user's fashion or mood to enjoy different styles.
In a conventional nail print apparatus, the printable nail design can be selected from a range set in advance in the apparatus, and it is difficult for the user (hereinafter referred to as “self” or “oneself”) to choose the design freely.
Even if the user can set the nail design freely, process such as the user making the desired design is necessary, and this is troublesome for the user.
There is a desire of the user to apply a nail design of other person such as celebrities, friends, etc. with nail section on which excellent nail design is applied on their own nail section. However, even if a user has a desire to copy the nail design of other person, in order to set the nail design of other person to reproduce the design on the user's nail section, the user needs to perform complicated operation of switches, etc. Therefore, there is a problem that nail design cannot be easily enjoyed without performing complicated operation.
|
{
"pile_set_name": "USPTO Backgrounds"
}
|
When Indyconnect unveiled its first proposal for a long range transit plan for the Indianapolis region (February 2010), many people were happy about what had been included in the plan.Transit backers were thrilled that light rail transit was planned along Washington Street from the airport to the east side. Finally, vocal advocates (myself included) had something to look forward in terms of getting real urban rail here in Indianapolis. This plan was rolled out to the public and while many in Indy wanted to see more light rail in the form of Broad Ripple to Downtown, or some sort of route that mixed with Mass Ave and Fountain Square, it represented a step in the right direction; a significant step towards lowering overheads on current buses, increasing bus coverage and speeding it up along key corridors. The addition of 2 commuter rail lines was also included. It also unhappily painted a lot of new expanded roads on the map. This plan was shopped to the public for 9 months after which significant citizen input was collected.
Indyconnect Adopted Plan (November 2010)
Then, the second round of Indyconnect was planned and public meetings held. These started in November 2010. By then, a better fiscal picture had come into focus. The Indyconnect planners studied the potential revenue inputs, weighed them against a number of possible tax increase scenarios and finally, offered a recommendation based upon those fiscal constraints combined with public input and advanced planner knowledge of potential transit services. The map that was released was vastly changed from the prior version. Portions of bus routes classified as “Express” in the February report had been converted to a form of “Bus Rapid Transit” along portions of their corridor; while still retaining some express routes on other corridors. BRT’s inclusion was a large change and provided some initial excitement that was later tempered by the news that this would not be dedicated guide-way BRT. Furthermore, and by far the biggest omission which stood out like a sore thumb to residents of Indianapolis was the elimination of light rail along Washington Street from the airport to the east side in the first 25 years of the plan. The plan introduces BRT along Washington Street in an early phase and then converts to LRT beyond the 25 year time horizon of the plan. Indeed, light rail had been removed from the 25 year plan altogether in what organizers chalked up as simply not enough money. To add insult to injury, the 2 proposed commuter lines had been significantly lengthened from the plan’s first version.
How was this allowed to happen? How could months of input and a loud voice (at least from urbanist’s perspectives) about adding MORE light rail for Indianapolis turn into no light rail at all? The answer lies within the numbers that the “business community (or private sector)” used to determine what the fiscal realities for this plan could be. Initially, a sales tax had been discussed (click link to open task force report). The prior plan would have taken somewhere between $10-$15 a month per household for those counties who opted into the plan based on voter referendum. State legislators have been cool on this plan altogether unfortunately, but have also bristled at the idea of a sales tax to cover expenses for the plan. Planners have given more attention to income tax as a primary alternative, without eliminating tax increment finance (TIF) districts and public private partnerships (PPP) as contributing sources of revenue and expedited implementation.
Furthermore, a recent event held by IndyHUB called, “Indy Talks, Leaders Listen” exposed a rough ballpark figure. Ron Gifford, the new leader of the Central Indiana Transit Task Force, asked attendees of the Mass Transit breakout what they would like to see. Light rail from downtown to Carmel? Light rail from the airport to the east side? Bus rapid transit? Commuter rail? Obviously, most in the room raised their hand as willing to pay for this. The other shoe dropped when Mr. Gifford stated that all of that included into a 25 year plan, could require a 0.7% annual income tax. (or $350 annual in taxes on $50,000 salary).
The current Indyconnect long range plan, if given the chance to be adopted, could be funded using a 0.3% income tax increase; and thus the reason why light rail was cut from the initial plan.
Another small tidbit of knowledge that is worth knowing is that while the final adopted map (2nd map in post) is included in the MPO’s Long Range Transit Vision Document, it was not always so. Being the sleuth that I am, I had checked in on this document early on and a different version of the “transit vision” map was in it. Included on the map (3rd map in post) in that version was more BRT for downtown, more potential light rail (Broad Ripple to University of Indy via DT) as well as a longer envisioned Washington Street route and additional future bus routes. I was told that the reason this was removed from the current vision document was its non-approval by policy makers. However, it DOES demonstrate that the heads of Indyconnect heard what we were saying and at least drew the lines on the map. Indeed, if you read the entire document, it spells out what the future could look in Indianapolis. The proposed BRT lines being switched to light rail or streetcar and additional commuter rail lines being built.
Concluding Thoughts
Could Light Rail someday look like this on Washington St?
So where do we go from here? Many people are obviously unhappy that the plan was stripped down notwithstanding the fact that we have not been given an opportunity to vote on it. First off, we as citizens need to urge our lawmakers at the state level to get on board with allowing a tax referendum to occur for this plan. There are currently grassroots efforts underway among local transit advocates to adopt a resolution of support to present to lawmakers in the 2011 legislative session. Urban Indy was the first organization to adopt the resolution (click to open .pdf) and the effort is currently building steam with many noteable organizations signing on to support a referendum to voters in 2012. Getting a referendum is the largest hurdle of them all at this point in time. Second, how do we lobby for more funding to make the longer view parts of the MPO vision document happen sooner? How do we get the Indyconnect planners to bump that 0.3% figure up to 0.5% or more so that practical light rail or streetcars for Indy are a potential reality in our lifetime?
I ask you, our readers, is an income tax who’s monthly amount is equal to what a half a tank of gasoline costs, worth the potential transportation impact?
For my part, I am all in.
Social Media
15 Responses to “ “The Future of Transit in Central Indiana”
I am completely in favor of getting this referendum on the ballots, and I would personally vote in favor of it, but if you think it’s going to pass, I don’t think you’ve paid enough attention to the other recent referendums around here.
Indiana’s local income tax system is flawed in favor of suburban counties: it requires those of us who live in Marion County to pay for all the regional services (roads, sewers, public safety) used daily by commuters, who pay their income tax to their suburban counties. I would not support a Marion County income tax increase UNLESS it paid for Marion County (Washington Street and north-south) light rail instead of regional commuter rail that is useless to me and to most other Marion County residents.
.
A regional sales tax is way better than an income tax, as it would capture money from suburbanites and visitors (who’d use the transit system).
I think the issue is that people will arrive in the suburbs without a car. Since Indy’s suburbs are car-oriented, it becomes impossible to carry out tasks that would make the trip worthwhile.
Contrast this with an urban circulator or LRT to airport system and you can see that there are opportunities to build mass transit with two-way use.
Curt: First, thanks for all your continued good work and analysis on these regional transit issues. Your post highlights the significant issue that the Transit Task Force is working hard to address: how to create a comprehensive regional transit system that promotes great transportation options, economic growth and community development in Marion County and surrounding communities and that is also affordable — both for users and taxpayers. You’ll recall that the statement I made at the Indy Talks session was meant to illustrate how much a hypothetical plan might cost if fully implemented on an immediate timetable — I wasn’t assigning a specific cost to a particular plan, and certainly wasn’t suggesting that we shouldn’t be pursuing many of those system elements in a comprehensive plan. We clearly should; the challenge is balancing the costs with the available resources.
We’re working hard to find creative ways to fund and finance as robust a transit system as possible, including the potential of light rail on the corridors you and others have suggested, all with the goal of keeping the local funding affordable and acceptable to the voters. Part of that analysis is determining what the local contribution might look like; you’ll recall that our original plan proposed funding the local share through a local option sales tax, but at this point, it appears that this kind of funding mechanism doesn’t have enough support at the General Assembly, which is why the Indy Connect analysis suggested a local option income tax. We’re committed to finding the best of the available options, and appreciate the continued support of Urban Indy, our partners at CIRTA, and the other organizations that are lending their voices to support this effort.
The public dialogue, outside of those advocating for 21st century transportation, regularly confines the discussion of transportation to economics. Mass transportation is more than an issue of economics and geographic mobility. There are major public health consequences that are often absent from the conversation about transit in central Indiana. Policy makers should stop considering these policies (public health, mass transit, the fiscal health of the city, etc.) as isolated from one another. Consequences of inadequate transit stretch well beyond economics and as long as policy makers are blind (or stubborn) to the interrelatedness of the issues, solutions will evade them. The following two studies are compelling evidence that car-centric policies have failed to consider the health of the people of Indianapolis, and instead have punished our health and pocketbooks.
Not to mention the fact that fossil fuel usage increases levels of mercury and other toxins in water and air, the stress on the ecological systems, and in lung problems and premature deaths (please see http://www.epa.gov/gateway/learn/health.html for more information and resources). We’ve got to start solving problems by looking comprehensively at the consequences of our decisions.
Also, few mention the increased stress levels resulting from the 1-2 hours we spend in the car every day as we stressfully weave in and out of traffic, attempting to avoid all of the other stressed out drivers and rushing to pick up kids or to make an appointment. Imagine a life where we get to interact with each other as we bustle around the city, spending our time exchanging ideas and good manners in listening to a stranger. It’s a quality of life issue.
These are all fantastic comments that add to this conversation. Regarding economics, Indianapolis (and Indiana as a whole) seem to have built a strategy of low taxes to try and attract new residents. This shortage of tax dollars manifests itself in poor infrastructure, poor zoning codes, neighborhoods that fail to maintain themselves, so on and so forth. Often times, low sticker prices will attract people to move into and live in a community. However, as we have seen by the continued disinvestment in our urban neighborhoods, they fall into disrepair as people move further and further away. That adds to the fringe issues that make a robust transit system so much more benefitical. Better air quality. Better fitness. Propensity to engage your fellow citizens no matter their socio-economic background. Transit creates so many intangible benefits when it rises above being a “social service provider”. There are places where people choose to ride the train or bus daily. These people are black, white, asian, hispanic. Rich. Poor. Middle class. When we all mingle, we all get to know and appreciate one another and we are made into more well rounded citizens.
.
Im sure I will get accused of trying to “socially engineer” people, but I hate being socially engineered to go to the drive through, or have to drive so far to get groceries. Something has to change
This is not social engineering. This is giving citizens the options to engineer their own social experience and social environment. Mass transit creates more opportunity to express free will and individual self-reliance while fostering a more trusting and interactive sense of community.
Just to add to this discussion of how urban living, density, mass transit goes beyond our little local world…I recently read an article in NYTimes (http://nyti.ms/k4ixEG) titled “A Warming Planet Struggles to Feed Itself”, which briefly touches on the subject of booming cities that are chewing up agricultural land and competing with farmers for water. The consequences of letting “free market” decide everything (including how our cities develop) can be dire. Too little or too much regulation can be equally destructive (e.g. financial crisis).
I’m not really sure how this income tax would work: If Marion County votes for the tax, does that mean people who work, or people who live, in Marion County get taxed? I know that the state income tax actually takes into consideration where one works and lives on the yearly tax forms.
That being said, I think the problem is that some people are going to see others as getting more of a benefit. A flat push for an equal tax rate in the “metro area” won’t pass. For starters, the current IndyConnect plan needs to be corrected and expanded for Hancock County. They claim that I-70 will have expanded lanes for travel from Post Road to Mt. Comfort Road if this plan passes. Well, the state has already dedicated funds and construction is in full effect. At best, this comes off as someone not doing their homework. At worst, it comes off as deliberate misinformation in an effort to get people to back the plan. Also, there are many, many people in Greenfield who drive to downtown Indy for work/school. If they want Hancock County to vote to pass this, they really need to consider two express bus routes: One from Mt. Comfort Rd interchange and one from the St. Rd. 9 interchange. The bike and pedestrian trails won’t be enough.
Secondly, why should folks in Hancock County pay the same amount in taxes as those who are getting the Holy Grail of transit: Rail? It seems to me that folks in Noblesville, Fishers, Indy, Franklin, and Greenwood should be paying more than those just getting express bus service. Their growth and benefit will be much higher and more widespread than any TIF district created. Lastly, if all the counties were taxed at the same level, I would want those station TIF districts to be very, very large. Every tax stream should be diverted from the city coffers of the above mentioned municipalities and directed solely to this project. Of course the local opposition to massive TIF districts will be huge. The politicians in those areas that stand to get rail will push hard to make those districts as small as possible.
As the plan stands, each county would have to ask for a referendum. I do not know how funding levels will work out. Will it be the same level for all if there is a referendum? Will each county get to choose how much it sends to contribute to the regional plan? Will a bigger contribution change the plan? Something else to keep in mind is that even though Hancock county might be sending an equal percentage of taxes to the “regional fund” would there be enough people paying into said fund to justify rail? Rail isn’t a pay for it and you get it. It is a premium service and lives and dies by the amount of daily boardings it gets. It would be a hard sell to say that rail from Hamilton County to downtown would be outperformed by rail from Hancock County to downtown.
.
Additionally, all the donut counties pay taxes to their counties. With the disproportionate amount of suburban employees who commute into Marion County and back out, who dont currently pay any taxes on the roads that they drive on in Marion County, we (Urban Indy) see the plan as a step towards correcting the inequality in funding.
To start off ive been to chicago, LA NYC Minn theyres no better help to a city but to have light rail less stress, saves time from being in a 2 hour commute, also will bring more people into downtown that dont feel like driving, people this is for the future ot might be tuff at first on taxes but that lightens up after a while …indy needs this and we all know it for our own and our childrens future . As i see it indy is growing not lightning fast but faster them other cities around just making more traffic and stress…please do this we must have it
|
{
"pile_set_name": "Pile-CC"
}
|
1. Field of the Invention
This invention relates to heat exchangers and, more particularly, to special reinforcing structure for thin plate-and-fin heat exchangers.
2. Description of the Prior Art
Many different approaches are known in the prior art to dealing with the problem of pressure containment and structural reinforcement in thin plate heat exchangers. External framework such as the heat exchanger strongback described above is disclosed in the Flurschutz et al U.S. Pat. No. 2,997,279. Internal spacing and reinforcing structure is also well known, as exemplified by the disclosures of the Ladd U.S. Pat. No. 2,952,445 and Rosenbald U.S. Pat. No. 3,229,763. The use of side bars as reinforcing and spacing members for a thin plate-and-fin heat exchanger structure is exemplified by U.S. Pat. No. 4,006,776 of Pfouts et al. The Flower U.S. Pat. No. 3,780,800 discloses separate bands extending about a heat exchanger core in planes perpendicular to the direction of gas flow which permit the core to expand without thermal restraint. The Jacobsen et al U.S. Pat. No. 3,894,581 discloses self reinforcement in a formed plate heat exchanger wherein overlapping manifold sections are provided to develop reinforcement of the abutting juncture lines and flange portions of the manifold sections. Finally, the aforementioned Ladd patent discloses special leading edge fins in a plate type heat exchanger which are of specially strengthened material and are positioned at the entrance end of a duct for resisting damage from entrained particles in a high velocity ambient air stream.
None of the known arrangements disclosed in the prior art relates to the provision of reinforcing members of the type involved in the present invention for the formed plate heat exchangers to which it is applied.
|
{
"pile_set_name": "USPTO Backgrounds"
}
|
In recent years, with the proliferation of sources of television (TV) programming including conventional terrestrially broadcast TV, cable TV, and satellite-delivered TV, numerous programming choices exist for a consumer. Consumers often desire to have a guide which shows the programming choices available at various times. The magazine, TV Guide, is one well-known example of a printed programming guide. More recently, electronic program guides (EPGs) have become available for viewing on screen by a television audience.
While printed program guides have enjoyed success over the years, they have some drawbacks. First of all, with the large number of programming choices at any given time, it becomes increasingly difficult for a consumer to make a selection. This difficulty is compounded by the fact that a typical printed guide is usually printed for a designated marketing area (DMA), which, in a very crude approximation, is generally an area of about a 100-mile radius from the location of the broadcast towers. Numerous independent municipalities are located within every DMA. This can result in a programming guide which contains programs which are not available to a particular customer. For example, since there are often several independent cable TV providers servicing the various communities in a DMA, with each cable TV company providing different services, any one viewer may need to sift through programming which is not accessible to them.
Moreover, certain programs are not available because the programs are blacked out with a certain radius of the event. For example, a football game may be blacked out in a city where it is being played to encourage viewers to buy tickets and actually attend the game rather than watching the game on television.
|
{
"pile_set_name": "USPTO Backgrounds"
}
|
(function($){
$.fn.validationEngineLanguage = function(){
};
$.validationEngineLanguage = {
newLang: function(){
$.validationEngineLanguage.allRules = {
"required": { // Add your regex rules here, you can take telephone as an example
"regex": "none",
"alertText": "* Dette felt skal udfyldes",
"alertTextCheckboxMultiple": "* Vælg venligst en af mulighederne",
"alertTextCheckboxe": "* Dette felt er påkrævet"
},
"requiredInFunction": {
"func": function(field, rules, i, options){
return (field.val() == "test") ? true : false;
},
"alertText": "* Indholdet af feltet skal være lig med test"
},
"minSize": {
"regex": "none",
"alertText": "* Minimum ",
"alertText2": " tegn tilladt"
},
"maxSize": {
"regex": "none",
"alertText": "* Maksimum ",
"alertText2": " tegn tilladt"
},
"groupRequired": {
"regex": "none",
"alertText": "* Du skal udfylde mindst et af følgende felter"
},
"min": {
"regex": "none",
"alertText": "* Den mindst tilladte værdi er "
},
"max": {
"regex": "none",
"alertText": "* Den maksimalt tilladte værdi er "
},
"past": {
"regex": "none",
"alertText": "* Datoen skal være før "
},
"future": {
"regex": "none",
"alertText": "* Datoen skal være efter "
},
"maxCheckbox": {
"regex": "none",
"alertText": "* Antallet af tilladte valg er overskredet"
},
"minCheckbox": {
"regex": "none",
"alertText": "* Vælg venligst ",
"alertText2": " muligheder"
},
"equals": {
"regex": "none",
"alertText": "* Felterne er ikke ens"
},
"creditCard": {
"regex": "none",
"alertText": "* Ugyldigt kreditkortnummer"
},
"phone": {
// credit: jquery.h5validate.js / orefalo
"regex": /^([\+][0-9]{1,3}([ \.\-])?)?([\(][0-9]{1,6}[\)])?([0-9 \.\-]{1,32})(([A-Za-z \:]{1,11})?[0-9]{1,4}?)$/,
"alertText": "* Ikke gyldigt telefonnummer"
},
"email": {
// Shamelessly lifted from Scott Gonzalez via the Bassistance Validation plugin http://projects.scottsplayground.com/email_address_validation/
"regex": /^((([a-z]|\d|[!#\$%&'\*\+\-\/=\?\^_`{\|}~]|[\u00A0-\uD7FF\uF900-\uFDCF\uFDF0-\uFFEF])+(\.([a-z]|\d|[!#\$%&'\*\+\-\/=\?\^_`{\|}~]|[\u00A0-\uD7FF\uF900-\uFDCF\uFDF0-\uFFEF])+)*)|((\x22)((((\x20|\x09)*(\x0d\x0a))?(\x20|\x09)+)?(([\x01-\x08\x0b\x0c\x0e-\x1f\x7f]|\x21|[\x23-\x5b]|[\x5d-\x7e]|[\u00A0-\uD7FF\uF900-\uFDCF\uFDF0-\uFFEF])|(\\([\x01-\x09\x0b\x0c\x0d-\x7f]|[\u00A0-\uD7FF\uF900-\uFDCF\uFDF0-\uFFEF]))))*(((\x20|\x09)*(\x0d\x0a))?(\x20|\x09)+)?(\x22)))@((([a-z]|\d|[\u00A0-\uD7FF\uF900-\uFDCF\uFDF0-\uFFEF])|(([a-z]|\d|[\u00A0-\uD7FF\uF900-\uFDCF\uFDF0-\uFFEF])([a-z]|\d|-|\.|_|~|[\u00A0-\uD7FF\uF900-\uFDCF\uFDF0-\uFFEF])*([a-z]|\d|[\u00A0-\uD7FF\uF900-\uFDCF\uFDF0-\uFFEF])))\.)+(([a-z]|[\u00A0-\uD7FF\uF900-\uFDCF\uFDF0-\uFFEF])|(([a-z]|[\u00A0-\uD7FF\uF900-\uFDCF\uFDF0-\uFFEF])([a-z]|\d|-|\.|_|~|[\u00A0-\uD7FF\uF900-\uFDCF\uFDF0-\uFFEF])*([a-z]|[\u00A0-\uD7FF\uF900-\uFDCF\uFDF0-\uFFEF])))\.?$/i,
"alertText": "* Ikke gyldig e-mail"
},
"integer": {
"regex": /^[\-\+]?\d+$/,
"alertText": "* Ikke et korrekt tal"
},
"number": {
// Number, including positive, negative, and floating decimal. credit: orefalo
"regex": /^[\-\+]?((([0-9]{1,3})([,][0-9]{3})*)|([0-9]+))?([\.]([0-9]+))?$/,
"alertText": "* Ugyldig decimaltal"
},
"date": {
"regex": /^\d{4}[\/\-](0?[1-9]|1[012])[\/\-](0?[1-9]|[12][0-9]|3[01])$/,
"alertText": "* Ugyldig dato, skal være i formatet ÅÅÅÅ-MM-DD"
},
"ipv4": {
"regex": /^((([01]?[0-9]{1,2})|(2[0-4][0-9])|(25[0-5]))[.]){3}(([0-1]?[0-9]{1,2})|(2[0-4][0-9])|(25[0-5]))$/,
"alertText": "* Ugyldig IP adresse"
},
"url": {
"regex": /^(https?|ftp):\/\/(((([a-z]|\d|-|\.|_|~|[\u00A0-\uD7FF\uF900-\uFDCF\uFDF0-\uFFEF])|(%[\da-f]{2})|[!\$&'\(\)\*\+,;=]|:)*@)?(((\d|[1-9]\d|1\d\d|2[0-4]\d|25[0-5])\.(\d|[1-9]\d|1\d\d|2[0-4]\d|25[0-5])\.(\d|[1-9]\d|1\d\d|2[0-4]\d|25[0-5])\.(\d|[1-9]\d|1\d\d|2[0-4]\d|25[0-5]))|((([a-z]|\d|[\u00A0-\uD7FF\uF900-\uFDCF\uFDF0-\uFFEF])|(([a-z]|\d|[\u00A0-\uD7FF\uF900-\uFDCF\uFDF0-\uFFEF])([a-z]|\d|-|\.|_|~|[\u00A0-\uD7FF\uF900-\uFDCF\uFDF0-\uFFEF])*([a-z]|\d|[\u00A0-\uD7FF\uF900-\uFDCF\uFDF0-\uFFEF])))\.)+(([a-z]|[\u00A0-\uD7FF\uF900-\uFDCF\uFDF0-\uFFEF])|(([a-z]|[\u00A0-\uD7FF\uF900-\uFDCF\uFDF0-\uFFEF])([a-z]|\d|-|\.|_|~|[\u00A0-\uD7FF\uF900-\uFDCF\uFDF0-\uFFEF])*([a-z]|[\u00A0-\uD7FF\uF900-\uFDCF\uFDF0-\uFFEF])))\.?)(:\d*)?)(\/((([a-z]|\d|-|\.|_|~|[\u00A0-\uD7FF\uF900-\uFDCF\uFDF0-\uFFEF])|(%[\da-f]{2})|[!\$&'\(\)\*\+,;=]|:|@)+(\/(([a-z]|\d|-|\.|_|~|[\u00A0-\uD7FF\uF900-\uFDCF\uFDF0-\uFFEF])|(%[\da-f]{2})|[!\$&'\(\)\*\+,;=]|:|@)*)*)?)?(\?((([a-z]|\d|-|\.|_|~|[\u00A0-\uD7FF\uF900-\uFDCF\uFDF0-\uFFEF])|(%[\da-f]{2})|[!\$&'\(\)\*\+,;=]|:|@)|[\uE000-\uF8FF]|\/|\?)*)?(\#((([a-z]|\d|-|\.|_|~|[\u00A0-\uD7FF\uF900-\uFDCF\uFDF0-\uFFEF])|(%[\da-f]{2})|[!\$&'\(\)\*\+,;=]|:|@)|\/|\?)*)?$/i,
"alertText": "* Ugyldig URL"
},
"onlyNumberSp": {
"regex": /^[0-9\ ]+$/,
"alertText": "* Kun tal"
},
"onlyLetterSp": {
"regex": /^[a-zA-Z\ \']+$/,
"alertText": "* Kun bogstaver"
},
"onlyLetterAccentSp":{
"regex": /^[a-z\u00C0-\u017F\ ]+$/i,
"alertText": "* Kun bogstaver"
},
"onlyLetterNumber": {
"regex": /^[0-9a-zA-Z]+$/,
"alertText": "* Ingen specialtegn tilladt"
},
// --- CUSTOM RULES -- Those are specific to the demos, they can be removed or changed to your likings
"ajaxUserCall": {
"url": "ajaxValidateFieldUser",
// you may want to pass extra data on the ajax call
"extraData": "name=eric",
"alertText": "* Denne bruger er allerede taget",
"alertTextLoad": "* Kontrollere, vent venligst"
},
"ajaxNameCall": {
// remote json service location
"url": "ajaxValidateFieldName",
// error
"alertText": "* Dette navn er allerede taget",
// if you provide an "alertTextOk", it will show as a green prompt when the field validates
"alertTextOk": "* Dette navn er ledig",
// speaks by itself
"alertTextLoad": "* Kontrollere, vent venligst"
},
"validate2fields": {
"alertText": "* Indsæt venligst HELLO"
}
};
}
};
$.validationEngineLanguage.newLang();
})(jQuery);
|
{
"pile_set_name": "Github"
}
|
A 2-degree rise in global temperatures may actually cause a massive increase worldwide. Scientists have found that if emissions rates don't change, there could be a jump in temperatures by 2030.
Under a business as usual scenario, the world is not expected to see global average temperatures rise by 2 degrees Celsius compared to preindustrial times until the 2040s. However, new research shows that this may not be the case, and temperatures may rise far more quickly than expected.
In this latest study, the researchers found worldwide warming extremes over land generally exceeded the rise in the commonly seen scenario. In fact, it exceeded it in some instances by as much as 6 degrees Celsius.
In addition, the extreme regional warming projected for Alaska, Canada, Norther Europe, Russia and Greenland could have global impacts, accelerating the pace of sea-level rise and increasing the likelihood of methane releases prompted by the melting of ice and permafrost regions.
"The temperature difference between global average temperatures and regional temperature extremes over land not only has direct climate impacts, it also means we may have to reconsider the amount of carbon dioxide we can emit," said Andy Pitman, one of the researchers, in a news release. "For instance, to keep extreme temperature changes over the Mediterranean below a 2-degree Celsius threshold, the cumulative emissions of CO2 would have to be restricted to 600 gigatons rather than the 850 gigatons currently estimated to keep global average temperatures increase below 2 degrees."
In fact, if a 2-degree warming happens worldwide, this would equate to a 3-degree warming in the Mediterranean and anywhere between 5.5 and 8-degree warming for cold extremes over land around the arctic.
The findings reveal the importance of curtailing emissions in order to keep our climate in check.
The findings are published in the journal Nature.
Related Articles
Climate Change: Ocean Warming May Have Doubled in Recent Decades
Rising Carbon Dioxide Levels May Threaten the World's Fish Stocks with Intoxication
For more great science stories and general news, please visit our sister site, Headlines and Global News (HNGN).
|
{
"pile_set_name": "OpenWebText2"
}
|
: ascii("α")
1 2
+-------------+
1 | 206 177 |
+-------------+
|
{
"pile_set_name": "Github"
}
|
Ola a todos sou o Chef Marco
estou de volta a Inglaterra
Hoje vamos começar uma serie nova
Vai ser sobre massa
Decidi fazer uma serie so sobre pasta porque...
Com a massa podemos fazer muitas coisas diferentes
Existem tantos prontos diferentes que podemos fazer
Que dicidi fazer uma serie so sobre massa
O video de hoje sera um bocado diferente porque nao vou cozinhar nada
Vou so ensinar a fazer massa fresca
E vou mostrar todos os utensilios que precisamos para realizar a massa fresca
Vou explicar 1 a 1 todos os utensilios
Podemos fazer a massa se, algum destes utensílios
Eles vao fazer a sua vida mais fácil
E o resultado final sera melhor
Mas podem sempre fazer sem eles
e eu vou explicar cada vez que usar vou explicar como fazer sem eles
E estes são os utensílios que vamos precisar...
Este e a maquina de esticar a massa
Podem fazer a massa sem ele podem usar um rolo da massa
Mas para alguns tipos de massa vamos precisar da maquina
Se quiserem fazer um ravioli
E impossível esticar so com o rolo da massa
Porque para os raviolis a massa tem de estar muito fininha
Por isso vao precisar da maquina
Estes sao para cortar raviolis
Tenho diferentes tamanhos para diferente tipo de raviolis
Este serve para cortar a massa
Vai ajudar a cortar a massa quando esticada
Este e um bocado esquisito mas e onde vamos secar a nossa massa, espaguete ou linguini
Vou usar para secar a massa ajuda o ar a circular a volta o que para com que a massa seque mais rápido
Para a massa vamos usar farinha
Ovos
azeite virgem
e sal
Vou deixar a receita na descrição em baixo para poderem ver as quantidades
vamos so precisar de um garfo
vamos começar por fazer um buraco na farinha
Vou adicionar os ovos
sal
E o azeite
Quando tiverem tudo no meio vamos começar a bater os ovos
vamos adicionar a farinha aos poucos
Esta pronto
Vamos deixar descansar no frigorifico por 5 a 10 minutos
E vai estar pronta a esticar
A massa ja descansou
vou so usar metade
Agora vou fazer linguini
vou cortar a meio
vou começar com o rolo da massa
Para facilitar
Precisam de esticar um bocado antes de ir para a maquina
polvilhem farinha
no rolo da massa
Para esticarem a massa vao precisar de trabalhar com alguma farinha para nao colar
Mas nao podem adicionar farinha a mais caso contrario a farinha vai secar a massa
adicionem so que chegue para nao colar mas sem expessura
Adicionem um bocado na maquina também
Vamos começar no numero 1
Que e o mais grosso
E vamos avançar ate estarmos contentes com a grossora
acho que vou ir ate ao numero 4 ou 5
Sempre que passar pela maquina passem a massa por farinha e avancem para o proximo numero
A massa esta pronto estiquei ate ao numero 7
Vamos cortar com o comprimento que desejamos
A minha maquina tem a função de cortar também
Se nao tiverem nao se preocupem vou mostrar como cortar com uma faca
Para a maioria vou usar a maquina porque e mais fácil
Agora vou cortar com a faca
Farinha na tábua
Para nada colar
Vamos enrolar a massa
adicionem mais farinha
Agora vamos usar isto para secar a massa
Vamos tentar por amassa toda certinha
E agora perguntam
Marco como e que faço a massa sem essa coisa esquisita
Facil
Com uma vassoura
Aqui esta a nossa massa
Vai secar por 1 hora e esta pronta
aqui esta o meu estendal de massa
Agora no proximo video
Vou cozinhar uma carbonara
Para mim e uma das mais fáceis e simples receitas
Mas e uma das mais deliciosas
Por isso fiquem atentos
Nao se esquema de subscrever o canal
Deixem um gosto
comentem
O meu nome e Marco
e sou o seu chefe privado
|
{
"pile_set_name": "YoutubeSubtitles"
}
|
Apple Lands Sweet Deals From Mall Operators For Attracting Crowds
Share & comment
Apple Lands Sweet Deals From Mall Operators For Attracting Crowds
Share & comment
Real-estate research firm Green Street Advisors has revealed that Apple’s ability to attract customers allows it to single-handedly lift sales by 10% at the malls in which the iPhone maker operates, thus allowing the Cupertino company to win sweet rent deals from mall operators. According to The Wall Street Journal, Apple’s huge gravitational pull on mall traffic allows it to negotiate extremely low rents for itself relative to its sales, which pits upward pressure on other tenants’ leases.
Industry executives note that Apple pays no more than 2% of its sales a square foot in rent. That compares with a typical in-line tenant, which pays as much as 15%. The publication says that in general, rents paid by mall stores are based on the sales the retailer expects to book in that space, which are in part a function of the mall’s overall productivity. Chairman of Integra Realty Resources, a real-estate valuation and consulting firm, Raymond Cirz, says that Apple is replacing department stores as the main driver of traffic to the malls.
Apple doesn’t get the same terms as anchor tenants, because those stores still do a better job of getting shoppers to fan out to other retailers in the mall. “There are a lot of people who go to Apple and leave,” said DJ Busch, a senior analyst at Green Street. “Apple doesn’t promote cross shopping as much as healthy department stores do.” Nick Leahy, an Apple spokesman, declined to comment on the rent the company pays or its sales.
A spokesman for Simon Property Group, the largest mall owner which counts 54 Apple stores in its 190 properties, said that even though they love having Apple in their malls, that does not give them leverage in negotiating rents. “We’re aware of the lift that Apple brings to a property. It acts like a department store.”
While retailers like J. Crew and Abercrombie & Fitch have the ability to bump up mall traffic during their sale days, Apple is considered to be an ‘extreme case’.
|
{
"pile_set_name": "Pile-CC"
}
|
Following Brazil’s election of a far-right president, leaders on the left have planned demonstrations across the country
This article is more than 1 year old
This article is more than 1 year old
Opponents of Brazil’s newly elected far-right president, Jair Bolsonaro, have vowed to hit the streets to oppose the intolerance and violence they fear he will inflict upon the world’s fourth largest democracy.
The once inconceivable election of the 63-year-old populist provocateur on Sunday represents a hammer blow to Brazil’s left and to millions of progressive Brazilians appalled by his hostility towards black, gay and indigenous people as well as the environment and human rights.
Who is Jair Bolsonaro? Brazil's far-right president in his own words Read more
“Never have we sunk so low, never have we been so repulsive to the world,” one prominent leftwing commentator wrote in Brazil’s Folha de São Paulo on Monday in an article headlined “Rock Bottom”.
But as Bolsonaro’s stunning triumph sunk in, leftwing leaders insisted they would not be cowed.
Guilherme Boulos, a 36-year-old social activist, told the Guardian: “There will be resistance, there will be opposition, there will be street mobilizations. Our voices will not be silenced.
“Bolsonaro won the election by exploiting people’s fears and their disillusionment with politics. But the fact that he won the election does not mean he owns the country,” added Boulos, who ran for the presidency for the Socialism and Liberty party (PSOL).
“Democracy is at real risk so we will build a democratic resistance … One week ago Bolsonaro said that anyone who opposed him could choose between prison or exile. We choose the streets,” he vowed.
Bolsonaro does not take power until 1 January, but the first protests against his administration are set to take place on Tuesday afternoon in cities across the country.
One will be held outside São Paulo’s brutalist art museum, the scene of wild pro-Bolsonaro celebrations on Sunday night. Another is expected in downtown Rio de Janeiro.
“My message is: ‘Resist!’ There is no reason to be afraid,” Boulos said. “We must show courage and serenity and remember that the defense of democracy is always the right side of history.”
In an online video message, Boulos told supporters the “dark clouds of intolerance and violence” hanging over Brazil would clear sooner than they expected.
Addressing Brazil’s president-elect directly, the leftist leader added: “In spite of you, Bolsonaro, tomorrow will be another day” – a reference to one of the most famous anti-dictatorship anthems composed by Chico Buarque during the 1964-1985 military regime.
Marcelo Freixo, a leading PSOL politician, said progressive politicians from both left and centre needed to form a pro-democracy coalition that could push back against Bolsonaro’s authoritarian tendencies in Congress. “He was elected democratically. This has to be recognised. But it is his obligation to preserve democracy and we have to mobilise to make sure this happens.”
Freixo, a federal deputy and veteran human rights activist in Rio de Janeiro, said one particular concern was Bolsonaro’s pledge to criminalise social movements. “Bolsonaro has clearly threatened activism. He has said he will put an end to activism … We cannot sit around waiting for this to happen.”
Speaking on the eve of the election, Workers’ party (PT) veteran Aloízio Mercadante pledged his party would also push back, shrugging off Bolsonaro’s pre-election threat that “red” opponents would be jailed or forced into exile.
“I didn’t leave during the dictatorship … I resisted. And I will carry on resisting,” said Mercadante, Brazil’s former chief of staff.
On Sunday night, Fernando Haddad, the defeated PT candidate, vowed to help spearhead the resistance movement to Bolsonaro. “I put my life at the service of this country.”
Elated devotees of Bolsonaro, who secured nearly 58 million votes compared with Haddad’s 47 million, continued commemorating his victory into the early hours of Monday.
“We’ll make the Americas great again,” tweeted Filipe Martins, a rightwing academic who backed Bolsonaro’s campaign.
“We think he can get the train back on the tracks,” said Iago Bünger, a 19-year-old student who was among thousands of supporters to converge on São Paulo’s Avenida Paulista for commemorations.
'He's the saviour of the nation': Bolsonarianos celebrate Brazil's new order Read more
But Bünger also expressed nervousness about the future. “Sincerely, I have my uncertainties. Bolsonaro is an unknown quantity.”
“It’s an inflection point,” his friend, Luiz Guilherme Bassi, 16, said. “Might it go wrong? Yes. But at least he has the right ideas.”
There was uncertainty, too, in Brazil’s press.
Writing in the Folha de São Paulo, the political commentator Celso Rocha de Barros argued: “The catastrophe that struck Brazil on Sunday cannot be downplayed … We have the most extremist leader of all democratic nations.”
Even the conservative Estado de São Paulo, whose coverage has been considerably less combative towards Bolsonaro, expressed unease at what it called Brazil’s “leap into the dark”.
“Voters have chosen Bolsonaro without having the slightest idea of what he will do when he sits down in the presidential chair,” it warned in a front-page editorial.
The newspaper lamented how the mission of extricating Brazil from profound political and economic crisis now fell to a man famed for his “hateful, empty” rhetoric. “This does not bode well, precisely at the moment when the country needs clarity, competence and leadership.”
|
{
"pile_set_name": "OpenWebText2"
}
|
'Merry Christmas' has new meaning
One day last week, my friends and I met for lunch. We tried to keep the topics light because of the season, but circumstances gave rise to discussions of health care and concern for the future.
Two people I knew had died the previous week, and it was hard for me to keep my mind from wandering to my grieving friends. All in all, it was a pretty depressing day.
I had spent the morning having medical tests and the afternoon talking about illness and death. None of us felt much Christmas joy that day.
On my way home, I had to make a stop at the bank. As I was leaving, a nice-looking young man was entering. As he walked by me, he smiled and said "Merry Christmas."
My face must have shown my surprise that a complete stranger would make that wish for me. I was taken aback and hesitated before I turned my head to repeat Merry Christmas to his back.
Those two words, spoken by a stranger, changed my attitude and my day. He will never know how much it meant to me.
We say Merry Christmas to one another all the time to the extent that it is just a hollow phrase. But that young man made me consider what those words really mean.
They are words of hope and joy. How much can ever hurt us when we know the happiness of Christ's birth?
Like many others, I sometimes lose the focus of this holiday season. Shopping, wrapping presents and sending Christmas cards can be stressful when there is such a short time between Thanksgiving and Christmas.
Planning dinner, cleaning and decorating the house distract from the reason we are making all these arrangements. We know all of the cliches and are quick to repeat: "Jesus is the reason for the season." But do we really believe what we say?
The only preparation we really need to make for the birth of Christ is inside our heart. If the roast isn't done on time and the cat knocks over the tree, what does it really matter?
We spend so much time on the trappings of Christmas that we often forget the birth of God's only son is why we celebrate. The child born in Bethlehem more than 2,000 years ago changed the world.
I sometimes wonder whether God puts an angel in our lives to bring us back to focus on what is truly important. Although the young man at the bank appeared fairly ordinary, I wouldn't be a bit surprised if his winter coat wasn't hiding a pair of wings.
May you all have a heartfelt and happy Christmas.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT
Email this article
'Merry Christmas' has new meaning
One day last week, my friends and I met for lunch. We tried to keep the topics light because of the season, but circumstances gave rise to discussions of health care and concern for the future.
|
{
"pile_set_name": "Pile-CC"
}
|
Mesoporous zeolite-chitosan composite for enhanced capture and catalytic activity in chemical fixation of CO2.
Carbon dioxide is one of the greenhouse gases whose increasing concentration in the atmosphere can cause severe problems to both human health and wildlife. A simple ecofriendly procedure was developed to prepare zeolite-chitosan (ZY-CS) composite using solvent exchange followed by calcination for adsorption and chemical fixation of CO2. The as synthesized ZY-CS composite along with zeolite and chitosan were characterized by attenuated total reflection infrared, X-ray diffraction, thermogravimetric, scanning electron microscopy, high-resolution transmission electron microscopy and nitrogen adsorption-desorption isotherms studies. The ZY-CS composite showed enhanced CO2 adsorption capacity compared with pure zeolite and chitosan. The composites also exhibited significant catalytic activity in the chemical fixation of CO2 into cyclic carbonates. This work is foreshadowing the prospect of ZY-CS composite in enhanced capture and catalytic activity in chemical fixation of CO2 for environmental applications.
|
{
"pile_set_name": "PubMed Abstracts"
}
|
CSols Links for LIMS – FAQs
FAQs – Links for LIMSWe help laboratory scientists and managers who come to us with a wide variety of questions, dilemmas and requests. Here’s some of them:
Instrument interfacing – Links for LIMS
General & Connectivity
• I need to find ways of improving the lab turnaround times, can interfacing help? • We don’t run many samples on our instruments, is it still worth interfacing them? • I have a great instrument but getting results data out of it is very time consuming and most lab people give up, can you help? • I have an instrument with no hard drive or floppy disc, with only hard copy printer output and can’t get any help from the vendor to improve things. • Our samples are barcoded can you help read them in to the instrument? • We still seem to spend lots of time manually handing different types of files, can your system reduce that? • We have many instruments of all different types and from different vendors can we use your software for all of them?
Routine Operation
• I have a high throughput instrument and spend lots of time entering and editing the run sequences? • We do at least three manual transcriptions of data per instrument run, can you help reduce our error rates? • We often get samples that need to be run immediately can you help us insert it into the run? • Aside from problems with gas suppliers and solvents, we find we have to rerun about 5% of our samples again, keeping the original results. Can you reschedule samples and store of the original results?
Compliance & AQCs
• We want a way to better guide analysts into using the instrument’s Standard • UKAS are happy with our SOP’s but they are all based on paper procedures, can you help us make them more electronic? • We want to find a way of easily monitoring and reporting Analytical Quality Control Samples (AQCs) and round robin sample results and easily produce charts? • We need more evidence of compliance at the instrument level?
Data treatment
• We spend hours inspecting every run for accurate interpretation as we can’t use the instrument reporting tool. • We find the instrument software cannot perform the calculations we want, will your software help? • We must do many post run calculations, like recovery and drift correction and would like to automate it rather than run the analysis manually • We would prefer not to use Excel or Crystal Reports as they interfere with instrument operation and make the workstation unstable. • My analysts are pretty bored with the tedium of instrument data handling can you make it more fun?
LIMS Links
• We want to easily link the instrument data to our LIMS? • Our LIMS can’t do the calculations we want as standard and the vendor wants a fortune to customize the system, can you run them instead? • Our LIMS can’t store our QC data, can you store them? • Our LIMS doesn’t store the instrument raw data, can you help us manage and retrieve it? • Our LIMS vendor offers an instrument interface solution, but it doesn’t really help improve day to day operation of the instrument, would your system be better? • I don’t want to simply transfer results to LIMS without reviewing them first, as the results could impact someone medical treatment, does your software allow that? • We don’t have a LIMS but use instruments extensively, can you help us log samples and store sample data?
IT
• Our production people want us to interface to their Plant control system (PCS) • We’ve got a new electronic Lab notebook system (ELN) can you pass data to that? • We don’t have a captive programmer/IT person in the lab nor the expertise, can your software do the job and then can you support us afterwards • Our IT people are concerned that transferring data is insecure. Do you make sure you transfer data with specific protocols and check sums?
This is not an exhaustive list of the things that we have done for customers. So if you still cannot find a solution that meets your requirements and you would like us to investigate your needs in more detail then please send us your questions via our contact page or just telephone or email us at: l4l@csols.com for no obligation advice.
|
{
"pile_set_name": "Pile-CC"
}
|
/*
Licensed to the Apache Software Foundation (ASF) under one or more
contributor license agreements. See the NOTICE file distributed with
this work for additional information regarding copyright ownership.
The ASF licenses this file to You under the Apache License, Version 2.0
(the "License"); you may not use this file except in compliance with
the License. You may obtain a copy of the License at
http://www.apache.org/licenses/LICENSE-2.0
Unless required by applicable law or agreed to in writing, software
distributed under the License is distributed on an "AS IS" BASIS,
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
See the License for the specific language governing permissions and
limitations under the License.
*/
// Code generated by client-gen. DO NOT EDIT.
package v1
import (
v1 "github.com/apache/camel-k/pkg/apis/camel/v1"
"github.com/apache/camel-k/pkg/client/camel/clientset/versioned/scheme"
rest "k8s.io/client-go/rest"
)
type CamelV1Interface interface {
RESTClient() rest.Interface
BuildsGetter
CamelCatalogsGetter
IntegrationsGetter
IntegrationKitsGetter
IntegrationPlatformsGetter
}
// CamelV1Client is used to interact with features provided by the camel.apache.org group.
type CamelV1Client struct {
restClient rest.Interface
}
func (c *CamelV1Client) Builds(namespace string) BuildInterface {
return newBuilds(c, namespace)
}
func (c *CamelV1Client) CamelCatalogs(namespace string) CamelCatalogInterface {
return newCamelCatalogs(c, namespace)
}
func (c *CamelV1Client) Integrations(namespace string) IntegrationInterface {
return newIntegrations(c, namespace)
}
func (c *CamelV1Client) IntegrationKits(namespace string) IntegrationKitInterface {
return newIntegrationKits(c, namespace)
}
func (c *CamelV1Client) IntegrationPlatforms(namespace string) IntegrationPlatformInterface {
return newIntegrationPlatforms(c, namespace)
}
// NewForConfig creates a new CamelV1Client for the given config.
func NewForConfig(c *rest.Config) (*CamelV1Client, error) {
config := *c
if err := setConfigDefaults(&config); err != nil {
return nil, err
}
client, err := rest.RESTClientFor(&config)
if err != nil {
return nil, err
}
return &CamelV1Client{client}, nil
}
// NewForConfigOrDie creates a new CamelV1Client for the given config and
// panics if there is an error in the config.
func NewForConfigOrDie(c *rest.Config) *CamelV1Client {
client, err := NewForConfig(c)
if err != nil {
panic(err)
}
return client
}
// New creates a new CamelV1Client for the given RESTClient.
func New(c rest.Interface) *CamelV1Client {
return &CamelV1Client{c}
}
func setConfigDefaults(config *rest.Config) error {
gv := v1.SchemeGroupVersion
config.GroupVersion = &gv
config.APIPath = "/apis"
config.NegotiatedSerializer = scheme.Codecs.WithoutConversion()
if config.UserAgent == "" {
config.UserAgent = rest.DefaultKubernetesUserAgent()
}
return nil
}
// RESTClient returns a RESTClient that is used to communicate
// with API server by this client implementation.
func (c *CamelV1Client) RESTClient() rest.Interface {
if c == nil {
return nil
}
return c.restClient
}
|
{
"pile_set_name": "Github"
}
|
Q:
Read hexadecimal from file with scilab
I have a file that looks like the following:
Time M1:Address 480008C0
0 79F9446F
0.000125 7AE7446B
0.00025 7BA8446F
...
It is 2 numbers separated by a tab, one is a hexadecimal number. I am looking to read these into a decimal array in scilab. I have tried to open and read the file as follows:
u=mopen('proper_log_with_fail.txt','r'); // open the file for reading
s = mscanf(u, '%s'); // Forget the first line
[time,val]=mfscanf(u,'%e\t%x'); // Get the second line
So i am not ever able to read any values ...? I cannot even read the first string? Am i doing something super obvious wrong?
A:
Maybe a typo, but for the first row you are using mscanf which should be mfscanf for reading from file. When changing this it shows that your first line isn't matching, note that %sonly matches one word and then stops at the next whitespace.
To read (and discard) the first line, use mgetl and tell it to read 1 line. If the rest of the input file is data formatted the same way, you can use the niter argument of mfscanf to keep matching up until the end of the file (EOF).
file_path = 'proper_log_with_fail.txt';
// open the file for reading
fd=mopen(file_path,'r');
// Read/display header line
number_of_lines_to_read = 1;
header = mgetl(fd, number_of_lines_to_read);
disp(header);
// Scan all lines up until EOF
niter = -1
s = mfscanf(niter, fd, '%e %x');
disp(s)
// Close the file after reading
mclose(fd)
|
{
"pile_set_name": "StackExchange"
}
|
Q:
AngularJS with TypeScript $resource error: "Response does not match configured parameter"
I have an AngularJS + TypeScript app and I keep getting the following error:
Error: $resource:badcfg
Response does not match configured parameter
Error in resource configuration for action: Expected response to contain an get but got an object (Request: array GET)
My AngularJS version is 1.4.8 and TypeScript version is 3.0.1. My tsconfig.json looks like this:
{
"compileOnSave": true,
"compilerOptions": {
"allowJs": true,
"lib": [ "dom", "es5", "scripthost" ],
"noImplicitAny": true,
"noEmitOnError": true,
"removeComments": false,
"sourceMap": true,
"target": "es5"
},
"include": [
"App/TypeScriptCode/**/*.ts",
"typings"
],
"exclude": [
"node_modules",
"definitions",
"wwwroot",
"App/Old",
"Scripts",
"*.js"
]
}
And here is my package.json
{
"dependencies": {
"@types/angular": "^1.6.49",
"@types/angular-resource": "^1.5.14",
"@types/uuid": "^3.4.3",
"npm": "^6.3.0",
"ts-node": "^7.0.0"
},
"devDependencies": {
"angular": "1.5.0",
"bootstrap": "3.3.6",
"grunt": "0.4.5",
"grunt-bower-task": "0.4.0",
"typescript": "^3.0.1",
"typings": "1.3.0"
},
"name": "my-app",
"private": true,
"scripts": {
"demo": "./node_modules/.bin/ts-node ./test.ts"
},
"version": "1.0.0"
}
The error happens in function GetEmployeeTypes in the following controller:
namespace App {
'use strict';
class EmployeeTypeController {
noRecords: boolean;
employeeTypeApi: IEmployeeTypeApi;
storage: ngStorage.IStorageService;
///
public constructor($localStorage: ngStorage.IStorageService, employeeTypeApi: IEmployeeTypeApi) {
this.noRecords = true;
this.employeeTypeApi = employeeTypeApi;
this.storage = $localStorage;
this.GetEmployeeTypes();
}
///
public GetEmployeeTypes(): void {
const employeeTypes: IEmployeeType[] = this.employeeTypeApi.employeeType.get(function success(): void {
this.storage.employeeTypes = employeeTypes;
});
};
}
angular
.module('App')
.controller('EmployeeTypeController', EmployeeTypeController);
}
The api service EmployeeTypeApi for loading employee types from the backend looks like this:
namespace App {
'use strict';
export interface IEmployeeTypeApi {
employeeType: IEmployeeTypeClass;
}
export class EmployeeTypeApi implements IEmployeeTypeApi {
constructor(public $resource: angular.resource.IResourceService) {}
publishDescriptor: angular.resource.IActionDescriptor = {
method: 'GET',
isArray: true
};
public employeeType: IEmployeeTypeClass = this.$resource<IEmployeeType[], IEmployeeTypeClass>('https://localhost:44300/api/employeetypes', null, {
publish: this.publishDescriptor
});
}
// Now register the service with the Angular app
angular
.module('App')
.service('employeeTypeApi', EmployeeTypeApi);
}
And finally, here are IEmployeeType and IEmployeeTypeClass:
namespace App {
export interface IEmployeeType extends angular.resource.IResource<IEmployeeType> {
id: number;
clientId: number;
employeeTypeName: string;
description: string;
$publish(): IEmployeeType;
$unpublish(): IEmployeeType;
}
}
namespace App {
export interface IEmployeeTypeClass extends angular.resource.IResourceClass<IEmployeeType[]> {
get(): IEmployeeType[] ;
get(onSuccess: Function): IEmployeeType[];
publish(): IEmployeeType[];
}
}
So what I am trying to achieve here is to load an array of IEmployeeType objects from the backend. The backend itself is an ASP.NET Web API 2 service, consisting of a number of controllers. I've verified that the controller for loading Employee Type data is correctly called and it does return an array of EmployeeType instances, meaning the problem is most likely somewhere in the front end code.
As you can see in EmployeeTypeApi, I've clearly set the isArray flag to "true", so I am not sure why the error is occurring. What am I doing wrong here?
A:
The problem was the following, in EmployeeTypeApi I have a definition for how the "publish" method should behave, i.e. this:
publishDescriptor: angular.resource.IActionDescriptor = {
method: 'GET',
isArray: true
};
However, in my EmployeeTypeController, I call the "get" method instead:
const employeeTypes: IEmployeeType[] = this.employeeTypeApi.employeeType.get(function success(): void {
this.storage.employeeTypes = employeeTypes;
});
Since there was no definition of how "get" should behave, i.e. what request method to use and what data type to expect, it defaulted to expecting an object and thus it produced the error I outlined in my original post.
Once I replaced "get" with "publish" in the controller, the error went away. Of course, the better solution is to set the "isArray" flag for "get" to true, but either way, the problem is solved now.
|
{
"pile_set_name": "StackExchange"
}
|
The Whistle Android Finder PRO is supreme Android finder (phone locator) application which helps many people locate their Android device with just a simple WHISTLE after losing it, forgetting it somewhere or being hidden somewhere in a room on a desk behind papers, in a briefcase or in a coat pocket etc. The free version of this application named Whistle Android Finder FREE (also available in Google Play) has reached more than 2 MILLION downloads!!
But now, after reading and taking into account more than 15,000 user comments, wishes, and suggestions, it is time to upgrade the application with new features, several important whistle engine improvements, a better user interface, customized notification melodies, lower battery consumption and much more. This is the story about how Whistle Android Finder PRO was born!
Here are the main features of the Whistle Android Finder PRO:
In contrast to the free, ad-supported version, the paid Whistle Android Finder PRO does not include any ads! Furthermore, the set of requested permissions is much lower now. Only the essential permissions are requested.
Much lower battery consumption due to optimized whistle detection engine when compared to the Whistle Android Finder FREE. The application has been designed and strongly optimised in order to reduce battery drain as much as possible.
Customized whistle notification sounds are supported in PRO version. Simply select any MP3 or M4A music and apply it as notification! Under the Whistle Android Finder PRO settings tab it is also possible to choose among 20 different very amusing preloaded audio notification sounds to notify the presence of the detected whistle!
Whistle Android Finder PRO can be enabled or disabled under the settings tab. Just run the application and the settings tab will appear! Remember: Whistle detection is working ONLY when the device is sleeping (i.e. when the screen is OFF).
Once enabled, Whistle Android Finder PRO will work even if you reboot your Android device! Of course, you can disable it under the settings tab at any time.
It is possible to choose among 5 different whistle detection sensitivity levels! Whistle Android Finder PRO is just ready to adapt to any Android device regardless of the specifics of integrated acoustic components.
Once your whistle sound is detected, the Android device will respond to your whistling with playback of preselected audio notification signal. Furthermore, the display of a “sleeping” Android device is illuminated in order to easily locate your device in your bag or in a dark room for example. Under the preferences tab a user can also select (and approve) the usage of maximum possible volume for audio notification regardless of current media volume settings. However, Whistle Android Finder PRO is designed to resume your current media volume when audio notification is not played.
Whistle Android Finder PRO is based on sophisticated but computationally optimised Digital Signal Processing techniques to analyse captured audio signals from the environment and search for distinct time-frequency patterns of a typical human whistle. The incorporated DSP algorithm is not signal energy based, therefore this whistle detector is much more accurate and reliable than similar applications found elsewhere on Google Play.
|
{
"pile_set_name": "Pile-CC"
}
|
Allan Paivio
Allan Urho Paivio (March 29, 1925 - June 19, 2016) was a Professor of psychology at the University of Western Ontario. He earned his Ph.D. from McGill University in 1959 and taught at the University of Western Ontario from 1963 until his retirement.
Early life and family
Paivio was born in Thunder Bay, Ontario as the son of Aku Päiviö and Ida Hänninen. His father was a Finnish Canadian journalist, poet and socialist. Paivio's brother Jules Päiviö was an architect and professor. He was the last surviving member of the Mackenzie–Papineau Battalion fighting in the Spanish Civil War.
In 1948, Allan Paivio won the title of "Mr. Canada" in a competition established by the International Federation of BodyBuilders.
Academic career
Paivio has published approximately two hundred articles and is most known for his dual-coding theory. Dual-coding theory posits that nonverbal and verbal information are stored separately in long term memory. Dual coding theory is complemented by the theory of Alan Baddeley, in which working memory is divided into a visuospatial sketchpad and a phonological loop.
Paivio's work has implications in many areas including human factors, interface design, as well as the development of educational materials.
Allan Paivio earned three degrees from McGill University between 1949 and 1959. Paivio obtained a Ph.D. in Psychology, and spent over forty years in research on imagery, memory, language, cognition, and other areas. He published approximately two hundred articles and book chapters, and five books. His 2000 book, Imagery and Text: A Dual Coding Theory of Reading and Writing, he wrote with Mark Sadoski. He published his most recent book in 2006, Mind and Its Evolution: A Dual Coding Theoretical Approach.
Dual coding theory
The dual coding theory (DCT), according to Paivio, suggests that visual and verbal information act as two distinctive systems. It has had its roots in the practical use of imagery as a memory aid 2500 years ago For example, one can think of a car by thinking of the word "car", or by forming a mental image of a car. The verbal and image systems are correlated, as one can think of the mental image of the car and then describe it in words, or read or listen to words and then form a mental image. DCT identifies three types of processing: (1) representational, the direct activation of verbal or non-verbal representations, (2) referential, the activation of the verbal system by the nonverbal system or vice versa, and (3) associative processing, the activation of representations within the same verbal or nonverbal system. A given task may require any or all of the three kinds of processing.
Verbal system units are called logogens; these units contain information that underlies our use of the word. Non-Verbal system units are called imagens. Imagens contain information that generates mental images such as natural objects, holistic parts of objects, and natural grouping of objects. Imagens operate synchronously or in parallel; thus all parts of an image are available at once. Logogens operate sequentially; words come one at a time in a syntactically appropriate sequence in a sentence. The two codes may overlap in the processing of information but greater emphasis is on one or the other. The verbal and non-verbal systems are further divided into subsystems that process information from different modalities.
Many experiments reported by Paivio and others support the importance of imagery in cognitive operations. In one experiment, participants saw pairs of items that differed in roundness (e.g., tomato, goblet) and were asked to indicate which member of the pair was rounder. The objects were presented as words, pictures, or word-picture pairs. The response times were slowest for word-word pairs, intermediate for the picture-word pairs, and fastest for the picture-picture pairs.
Empirical evidence
DCT research focused initially on memory and soon expanded to other
cognitive phenomena. Memory remains crucial, however, because it is the basis of
all knowledge and thought. The memory emphasis is further justified here because
learning and memory are at the heart of educational goals.
The effects can be explained by two DCT hypotheses. One hypothesis is that
nonverbal and verbal codes, being functionally independent, can have additive
effects on recall. For example, participants in free recall experiments are likely to
name presented objects covertly and thus create a nonverbal (pictorial) and a
verbal memory trace. They can also set up a dual verbal-nonverbal memory trace
by imaging to concrete words, but this is somewhat less likely than naming
pictures, hence the lower memory for concrete words than pictures. Abstract
words are difficult to image and hence are least likely to be dually coded. The
expected additive memory benefit of dual coding has been confirmed in numerous
experiments which also suggested that the nonverbal code is mnemonically stronger
(contributes more to the additive effect) than the verbal code.
References
Anderson, J. R. (2005). Cognitive Psychology and its implications. New York: Worth Publishers.
Mayer, R. E. & Moreno, R. (2003). Nine ways to reduce cognitive load in multimedia learning. Educational Psychologist, 38(1), 43-52.
Moreno, R., & Mayer, R. E. (2000). A coherence effect in multimedia learning: the case for minimizing irrelevant sounds in the design of multimedia instructional messages. Journal of Educational Psychology, 92, 117-125.
Paivio, A (1971). Imagery and verbal processes. New York: Holt, Rinehart, and Winston.
Paivio, A (1986). Mental representations: a dual coding approach. Oxford. England: Oxford University Press.
https://web.archive.org/web/20110221091503/http://www.lifecircles-inc.com/Learningtheories/IP/paivio.html
Paivio, A. (1986). Mental representations: A dual coding approach. New York: Oxford University Press
Ryu,J., Lai,t., Colaric, S., Cawley,J., & Aldag, H. (2000). Dual Coding Theory. Retrieved from the World Wide Web September 29, 2003 from http://www.coe.ecu.edu/ltdi/colaric/KB/Paivio.html
Category:1925 births
Category:2016 deaths
Category:Canadian psychologists
Category:Canadian people of Finnish descent
Category:Cognitive scientists
Category:McGill University alumni
Category:University of Western Ontario faculty
Category:Writers from Thunder Bay
|
{
"pile_set_name": "Wikipedia (en)"
}
|
Q:
How to know whether the window is maximized or minimised in extjs?
Does any one know how to check whether the form is maximised or minimised in IE8.
Raj
A:
Its solved by using this code:
var S = this.tabpanelFormation.getPosition();
if (Ext.isIE8 && S[0] == 751) {
this.tabpanelFormation.setPagePosition(749,370,true);
this.tabpanelFormation.setHeight(230);
this.tabpanelFormation.setWidth(350);
}
If its maximised then S[0] = 751. By this we can find whet
|
{
"pile_set_name": "StackExchange"
}
|
Q:
using javax.tools.JavaCompiler etc
I am looking for working examples of Oracle's Java Compiler API usage. I want to build something close to javac to customize/extend errors logging capabilities.
A:
See the STBC (the SSCCE Text Based Compiler). The source is available in stbc.zip.
|
{
"pile_set_name": "StackExchange"
}
|
The effect of typical and atypical neuroleptics on binding of [3H]spiroperidol in calf caudate.
The effect of typical and atypical neuroleptics on the binding of [3H]spiroperidol to calf caudate membranes was studied. Saturable or specific binding was defined as the difference between binding in the absence and in the presence of 1 microM d-butaclamol. Scatchard analysis revealed nonhomogeneity of the saturable sites. Inhibition constants (Ki) and IC50 values for various typical and atypical neuroleptics and for two clinically inactive butyrophenones were determined. The Ki and IC50 values of typical neuroleptics paralleled their potencies in vivo. By contrast, the binding potencies of atypical neuroleptics did not correlate with their effects in vivo. For example, the clinically active drug clozapine has an IC50 value similar to the clinically inactive butyrophenone AHR-1900. U-25, 927, another clinically inactive butyrophenone that does not increase dopamine turnover is more potent in the binding assay than perlapine, a drug that increases dopamine turnover and elevates serum prolactin levels. The most striking discrepancy between binding and properties in vivo was found for the benzamide derivatives, sulpiride and metoclopramide. These clinically active agents, which increase dopamine turnover, have much higher Ki values than the clinically inactive butyrophenones. It is concluded that binding assays with [3H]spiroperidol in calf caudate cannot account for the antidopamine effects in vivo of atypical neuroleptics.
|
{
"pile_set_name": "PubMed Abstracts"
}
|
Pages
Tuesday, October 26, 2010
My husband and I decided to grab dinner out the other night. We took our Dylan with us. There was this restaurant nearby that we had been meaning to try for a few weeks. We parked the car and carried Dylan in with us into the restaurant. We told the woman at the front that we needed a table for two with a high chair. She said, "Oh we don't have high chairs." Really??? I mean this wasn't a fancy place, pretty casual American fare. I guess it never even crossed my mind that a restaurant wouldn't have at least one high chair. I guess we could have gotten the stroller out of the car and fed the baby in the stroller, but after she said they didn't provide high chairs, we didn't even want to eat there anymore. So when I got home, I thought that I would do a little research to see if restaurants are required to supply high chairs for their customers. Surprisingly there is not much on the internet in regards to what is the actual responsibility of the establishment.
There IS however TONS of information on the cleanliness of restaurant high chairs. In fact some articles reported that the amount of bacteria found on high chairs was significantly greater than the amounts found on public toilets! Ahhh! So maybe we should be happy that the restaurant didn't have a highchair for us! See full story below:
I know that they make high chair covers that you can just throw into the washer. I just use a few baby wipes to wipe down the restaurant high chair before we plop Dylan down into the seat. It takes a couple of extra seconds, but I make sure to wipe the strap and the table down too.
Friday, October 15, 2010
October is my son's birth month and we have been planning his 1st birthday party for the last couple of weeks. The biggest debate between my husband and I is whether to let Dylan dive into his cake and make a huge mess. I feel like that it is a rite of passage. So what if he gets a little messy? It's all part of the fun. My husband being a bit of a neat-nick, is worried about the mess that he will make during his party. I say, "Let Him Eat Cake!"
Dylan will be diving into his very own Elmo themed cupcake. We decided to order them from a bakery simply because my baking a decorating skills are lacking (to put it nicely). But for those of you who may have food restrictions or simply want to make your child's first birthday treat a little healthier, here are a couple of alternatives.
Directions:
1. Preheat oven to 350 degrees F (175 degrees C). Grease and flour a 9x13 inch baking pan.
2. In a medium bowl, stir together the flour, sugar, cocoa, baking soda, baking powder, salt and cinnamon. Add the eggs and oil, mix well. Fold in the nuts and zucchini until they are evenly distributed. Pour into the prepared pan.
3. Bake for 50 to 60 minutes in the preheated oven, until a knife inserted into the center comes out clean. Cool cake completely before frosting with your favorite frosting.
Here are a couple of non-cake alternatives:
A trifle is a delicious layered dessert. It is a good alternative to cake for your baby's first birthday party. A trifle is a combination of layers of cake, fruit and yogurt or cool whip in a clear bowl, according to Gomestic.com. A trifle is a great alternative to cake as it provides nutrition as well as sweetness and can be decorated to your liking with your favorite fruit.
Fruit pizza is a tasty dessert that serves as a terrific alternative to birthday cake. Fruit pizza consists of a baked sugar cookie crust and a layer of strawberry cream cheese, and is topped with your child's favorite fruits. This alternative provides all of the flavor of a birthday cake, without all of the processed ingredients cakes include. If you wish, you can substitute whipped cream for the cream cheese.
Monday, October 11, 2010
Traveling with a little one can be challenging (to say the least) but being prepared and creative can make your flight a lot easier! We started flying with Dylan when he was 3 months old, and because our family is scattered throughout the country, he had been on 7 round trip flights by 7 months. This may sound a little crazy, but believe it or not, flying with a newborn is so much easier then flying with a 1 year old!
When packing for a flight when Dylan was a newborn, I would make sure to pack 2 bottles of expressed breast milk. If we were going on a short flight (less then 2 hours) I wouldn't even carry it in a cooler. I would just put it in the diaper bag. Fresh breast milk can be left at room temperature for 4-6 hours so if you factor in the time it takes to get to the airport and such...you will have enough milk for a bottle during take off and landing. For longer flights I would pack the milk in a small insulated lunch bag cooler with a small gel ice pack. When going through security we always went through the medical liquid/family line. The TSA worker would always open the milk and test it with their equipment, but luckily I never had to do anything crazy like drink it in front of them. I don't think they are allowed to do that anymore.
When flying with Dylan from 7 months to 10 months, I would still bring one bottle of breast milk, but would also bring him some baby food/finger food. Again I would pack it in my little lunch bag cooler. When packing homemade baby food for a flight, I would make sure to bring food that was not prepared with breast milk. I would usually bring frozen containers, this way they would be defrosted by the time I needed to use it on the flight. I would usually check it before getting on the flight and if it needed to be defrosted, I would just get a small cup of hot water from one of the airport shops and let the container sit in the hot water for about 5 minutes while still at the gate. When packing large batches of homemade baby food for a trip I would use a larger insulated lunch tote and fill it with frozen containers (again avoiding purees made with breast milk). I would always put containers in a freezer bag before placing them in the cooler, just in case they leaked. I put a gel ice pack on top of the food in the cooler. I usually put the cooler in Dylan's suitcase because it always seemed like he had the biggest one because he had the most stuff. I never had a problem with the food defrosting during the flight, even if it was a 6 hour flight. The food just needed to go back in the freezer whenever we reached our destination.
At 11.5 months, the days of toting around small containers of purees are long gone, but there is an abundance of Cheerios. We were traveling this weekend (5 hour return trip) and Cheerios saved the day numerous times! When packing finger foods for the plane, I try to pick stuff that will travel well. Bananas are great and are easy to find at in airport shops (Starbucks always has them). Yogurt is another easy to find healthy food at the airport. Otherwise I bring cheese sticks, grapes, berries, wheat bagels or bread...and of course Cheerios.
About Me
Brick by Brick is a blog highlighting the ups and downs of starting the online Lego marketplace www.BrickSmarts.com. I'm a mom, wife, and momtrepreneur! After years of buying Lego sets for my boys, I realized that the sets were either collecting dust on a shelf, or broken apart and missing pieces. No matter how many sets the boys had, they always wanted more. Our Lego obsession was out of control. It was then that I decided to pack up the sets and sell them online. The money that I made went to buy new sets for the kids to enjoy. The best part was that I wasn't paying an arm and a leg, AND the kids never cared that they had been gently used.
|
{
"pile_set_name": "Pile-CC"
}
|
In the treatment of chronic wounds (e.g., diabetic foot ulcers) electrosurgical procedures may be used to promote healing. In particular, electrosurgical procedures may be used for debriding the wound, inducing blood flow to the wound, coagulating blood flow from the wound, removing necrotic tissue, and/or removing bacterial films which may form (the bacterial films sometimes referred to as “biofilm”). In many cases wounds are considered “dry” in the sense that there is insufficient conductive fluid present to support plasma creation for electrosurgical procedures. In such cases a conductive fluid (e.g., saline) is provided to help support plasma creation.
However, in providing a conductive fluid to a wound to help support plasma creation, the location of the wound and/or the orientation of the patient may adversely impact how the conductive fluid is distributed. For example, gravity may cause the conductive fluid to flow in such a way as to not fully “wet” one or more of the electrodes involved in the plasma creation, thus limiting or preventing plasma creation.
Any advance that better controls distribution of conductive fluid in and around the electrodes of an electrosurgical system would provide a competitive advantage.
|
{
"pile_set_name": "USPTO Backgrounds"
}
|
Method comparison for analyzing wound healing rates.
Wound healing scratch assay is a frequently used method to characterize cell migration, which is an important biological process in the course of development, tissue repair, and immune response for example. The measurement of wound healing rate, however, varies among different studies. Here we summarized these measurements into three types: (I) direct rate average; (II) regression rate average; and (III) average distance regression rate. Using Chinese hamster ovary (CHO) cells as a model, we compared the three types of analyses on quantifying the wound closing rate, and discovered that type I & III measurements are more resistant to outliers, and type II analysis is more sensitive to outliers. We hope this study can help researchers to better use this simple yet effective assay.
|
{
"pile_set_name": "PubMed Abstracts"
}
|
Monday, August 1, 2011
GOOGLE CHROME OVERTAKES FIREFOX AS UK'S #2 BROWSER
Google's Chrome is Britain's second most popular browser, a sign of the internet giant's increasing grip on the UK search market.
Three years after launch, Chrome last month captured 22% of UK users and marginally overtook Mozilla's Firefox browser, according to the web metrics firm Statcounter. Microsoft's Internet Explorer is losing market share to Chrome but remains the most popular browser for UK users with 45% – although it has a head start by being pre-installed on almost all computers sold in Britain. Apple's Safari is UK number four, with a 9% share.
|
{
"pile_set_name": "Pile-CC"
}
|
We must learn lessons from the absence of any positive Brexit vision
We must learn lessons from the absence of any positive Brexit vision
Letters
ROBIN McAlpine’s article (If you are agonising over when the next independence referendum should be held, you are asking the wrong question, January 27) and the follow-ups are very welcome. Reaching out and appealing to potential new pro-indy voters is obviously fundamental to getting us (well) over the 50% mark. Equally vital are the practicalities of keeping the 45%. After all, we should take nothing for granted!
The questions of how and when to “engage” are paramount, but so too is what we say. Just what are the pro-indy messages? The actual indyref2 date should identify the tangible timetable for end-game campaigning, and not be the starting gun. So, let’s be honest, if we are not consistently 50% and more in the polls at this stage, what needs to change?
McAlpine mentioned a “position of strength”. Grassroots indy never stopped, never went away and that is a major component of our strength we need to exploit and progress. I do believe, though, that “presence” alone is not sufficient. I’ll continue to march, be on stalls, deliver leaflets, whatever, but much more is needed. We have to be positively talking up Scotland not just from the heart, but from an “informed” base. And I think we can learn from PM May and what she and her government haven’t done over the last two years or so.
At no stage have I seen her, her government, or even a “front” organisation engage along the lines of any benefits post-Brexit. They’ve been too busy infighting and pushing Project Fear, so much so that they haven’t even been able to do the day job of governing. Just imagine if there had been a positive message about post-Brexit: say socio-economic change in deprived, stagnating communities? Not aspirational, but examples: opening up debates at local meetings, discussion groups, plans with pros and cons. OK, the message on the bus was a bad move, but they could have learnt from that, moving on with ideas for real change whilst seeking views, comments, and alternatives, but always with a belief in the positive that they were promoting.
I doubt if any such campaign and messaging would have worked here even if they had tried. We’re too savvy in Scotland to trust a Tory. But that lack of vision and beneficial change has helped cement Brexit paralysis within all the Unionist parties, and led to entrenchment in the voters. Neither camp is willing to listen, far less change, apart from those few self-interested MPs seeking to ensure party unity.
We need to be showing, saying, telling, how an indy Scotland will be different, and not merely offering a wish list of change; no-one, not even rUK, “wants” austerity; we all abhor food banks, but how do we grow the economy, how do we move away from in-work poverty? If that’s a plus coming from independence, spell it out.
If we’re hoping to engage with new, first-time younger voters come indyref 2, what’s indy Scotland going to do for them? Shoving a registration form into someone’s hand isn’t sufficient in itself. Neither is a mantra of “vote, make a difference, ensure your voice is heard”.’
In light of our democratic voices being dismissed over the last voting occasions, where are those constructive alternatives, the reasons to vote and vote for indy? Lesley Riddoch’s most recent contributions via her excellent films are superb examples of reaching out and engaging. Yes, expensive to produce, but with a long pertinent shelf life. Since we can’t command newsprint, TV, media the way that pro-Union can, how can we use what passes for “alternatives”? White Papers and reports can make good reference points, but they’re not necessarily persuasive in their own right, nor do they make “light” reading. Perhaps the time has come for “papers” or “pamphlets” addressing separate issues such as the economy and migration. Or being able to respond to a current topic, ie “Should we be rethinking cross-channel ferries from Scotland to mainland Europe: pros and cons”.
It’s not just the political vision we need, bringing with it as it will do its party-political baggage. It’s not a future Scotland for and by politicians. It’s being able to show what Scotland could look like in the future, one the people can help shape with their pro-indy vote. Perhaps the Scottish Independence Convention, CommonWeal or others in the indy movement will produce “articles” that will stimulate discussion, fire up public meetings, provide the foot sore volunteers with more “leaflets”.
We don’t need a fixed campaign timetable to do so, but we do need to be able to demonstrate the positives of why it is worth continuing to work towards independence.
This website and associated newspapers adhere to the Independent Press Standards Organisation's Editors' Code of Practice. If you have a complaint about the editorial content which relates to inaccuracy or intrusion, then please contact the editor here. If you are dissatisfied with the response provided you can contact IPSO here
|
{
"pile_set_name": "Pile-CC"
}
|
Vorontsov (disambiguation)
Vorontsov is a Russian noble family.
Vorontsov (Russian: Воронцов) or Vorontsova (feminine: Воронцова) may also refer to:
Nobility
Alexander Vorontsov (1741–1805)
Mikhail Illarionovich Vorontsov (1714–1767)
Mikhail Semyonovich Vorontsov (1782–1856)
Semyon Vorontsov (1744–1832)
Yekaterina Romanovna Vorontsova-Dashkova (1744–1810)
Illarion Vorontsov-Dashkov (1837–1916))
Other people
Boris Vorontsov-Velyaminov (1904–1994), Russian astrophysicist
Vasily Vorontsov (1947–1917), Russian economist and sociologist
Yuli Vorontsov (1929–2007), Russian diplomat
Yuri Vorontsov (1937–2002), Russian cinematographer
Other uses
Vorontsov Lighthouse, in the Black Sea port of Odessa, Ukraine
See also
Vorontsov Palace (disambiguation)
Woronzow Records, a record label that publishes Ptolemaic Terrascope
|
{
"pile_set_name": "Wikipedia (en)"
}
|
Thank you so much BBN BI, I found this on-line a few days ago by accident. I LOVE IT!! Although I took a test and made 73 (my children LOVED that news!). Guess I'm not the sharpest tool in the shed anymore.......need to hone those study skills!!!!!
|
{
"pile_set_name": "Pile-CC"
}
|
EOL users can run eports and see all the details of transactions. As
currently structured this would mean that any EOL user, including ENA, would
be able to run a report to see detail behind bids on pipeline capacity.
Obviously this would be a problem under the marketing affiliate rules. At
their last meeting Dale and Shelley outlined three possible ways to address
this:
Add security such that ENA/EES users cannot run reports on pipeline bid
data. I understood leaving the meeting that this might be technically
difficult or expensive.
Exclude pipeline data from the reporting feature altogether. Here the story
was that while this was not necessarily difficult, EOL could not make any
changes before version 2 was ready. The impression was that this would be
possible after version 2.
Erect procedural firewalls. Mark Taylor suggested that perhaps we could
inform all ENA and EES personnel that the company has a policy that prevents
them from running reports on GPG data. This probably isn't a good long-run
solution, but we all agreed that it might serve as a bridge measure. This
approach is supported by the fact that Enron Networks has already entered
into a confidentiality agreement with GPG.
Solutions 1 and 2 require extensive technical work and unfortunately we
cannot currently spare the technical resources required for it. We can go
with solution 3 at present with the understanding that in the absence of a
large volume of trades it might be the permanent solution. This is something
that legal on both sides would have to agree to. Steve will check with their
legal department to see if this is acceptable. Dale can you please check with
Mark Taylor.
Further the credit departments on both sides should meet and iron out the
credit issues. Steve is going to make sure the two credit departments talk to
each other.
Thanks.
Savita
|
{
"pile_set_name": "Enron Emails"
}
|
Man Surprises Wife With $1M McCartney Gig
Wendy Whitworth, executive producer of CNN’s “Larry King Live” and a huge Paul McCartney fan, received an unforgettable 50th birthday present: a private concert from the former Beatle.
Whitworth’s husband, financier Ralph Whitworth, came up with the unusual gift idea and offered McCartney $1 million to do the San Diego gig. McCartney agreed, saying he would donate the money to the anti-landmines charity Adopt-A-Minefield.
Wendy Whitworth, broke into tears when her husband announced McCartney was taking the stage Saturday before 150 guests, including Katie Couric of NBC’s “Today” and King.
Near the end of the 90-minute set, which included the Beatles’ classics “Let It Be” and “Yesterday,” McCartney called Wendy Whitworth on stage and presented her with 50 roses. The band then went into the Beatles’ song “Birthday” while the Whitworths danced at McCartney’s side.
The show served as a warm-up for McCartney’s upcoming tour of Europe, which starts next month.
Afterward, McCartney said: “Ralph gets to be the great husband for organizing the surprise, his wife gets a rocking party, I get to rehearse the band for the tour, and most important, Adopt-A-Minefield gets one million dollars.”
|
{
"pile_set_name": "Pile-CC"
}
|
Q:
MYSQL Select From 2 Table And Group Them
One of them keep hotel's information and one of them keep their price within the date range.
My hotel information table
CREATE TABLE IF NOT EXISTS `yurtici_oteller` (
`yo_id` int(10) NOT NULL AUTO_INCREMENT,
`yo_bolge_id` int(10) NOT NULL,
`yo_konaklama` int(10) NOT NULL,
`yo_isim` varchar(150) COLLATE utf8_turkish_ci NOT NULL,
`yo_seo_isim` varchar(200) COLLATE utf8_turkish_ci NOT NULL,
`yo_konum` varchar(300) COLLATE utf8_turkish_ci NOT NULL,
`yo_resim` varchar(300) COLLATE utf8_turkish_ci NOT NULL,
`yo_resim_k` varchar(300) COLLATE utf8_turkish_ci NOT NULL,
`yo_video` varchar(1000) COLLATE utf8_turkish_ci NOT NULL,
`yo_harita` varchar(1000) COLLATE utf8_turkish_ci NOT NULL,
`yo_aciklama` text COLLATE utf8_turkish_ci NOT NULL,
`yo_yemek` int(3) NOT NULL,
`yo_oda` int(3) NOT NULL,
`yo_hizmet` int(3) NOT NULL,
`yo_aktivite` int(3) NOT NULL,
`yo_genel_puan` int(3) NOT NULL,
PRIMARY KEY (`yo_id`)
) ENGINE=InnoDB DEFAULT CHARSET=utf8 COLLATE=utf8_turkish_ci AUTO_INCREMENT=11 ;
INSERT INTO `yurtici_oteller` (`yo_id`, `yo_bolge_id`, `yo_konaklama`, `yo_isim`, `yo_seo_isim`, `yo_konum`, `yo_resim`, `yo_resim_k`, `yo_video`, `yo_harita`, `yo_aciklama`, `yo_yemek`, `yo_oda`, `yo_hizmet`, `yo_aktivite`, `yo_genel_puan`) VALUES
(9, 3, 4, 'DELPHİN DE LUXE RESORT ALANYA', 'delphin-de-luxe-resort-alanya', 'ALANYA / OKURCALAR', '', '', '', '', '<h1>OTEL HAKKINDA</h1>\r\n\r\n<p>Denize Uzaklığı (sıfır) , Hava Alanına Uzaklığı (90 km) , Şehir Merkezine Uzaklığı (10 km)</p>\r\n\r\n<h1>KONSEPT</h1>\r\n\r\n<div style="margin: 0px; padding: 0px; border: 0px; outline: 0px; font-size: 11px; background-color: rgb(210, 209, 208); color: rgb(0, 0, 0); font-family: Verdana, Geneva, sans-serif; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 11px; orphans: auto; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px; -webkit-text-stroke-width: 0px; background-position: initial initial; background-repeat: initial initial;">ULTRA HER ŞEY DAHİL</div>\r\n\r\n<p style="text-align:start">Ultra her şey dahil sisteminde olup; açık büfe kahvaltı, öğle ve akşam yemeği, brunch (Pazar günleri), çocuk akşam yemeği ile 10.00-24.00 arası tüm yerli ve bazı ithal alkoll<span style="font-size:11px"><span style="font-family:verdana,geneva,sans-serif">ü / alkolsüz içecekler ücretsizdir.</span></span></p>\r\n\r\n<h1>OTEL ÖZELLİKLERİ</h1>\r\n\r\n<p><span style="background-color:rgb(210, 209, 208); color:rgb(0, 0, 0); font-family:verdana,geneva,sans-serif; font-size:11px">Tesiste 2 adet yüzme havuzu, 2 adet çocuk havuzu, kapalı yüzme havuzu, kapalı çocuk havuzu, jakuzi havuzu, aquapark, ana restaurant, 6 adet a la carte restaurant, fantasy-snack bar, Orient Cafe, havuz bar, Snack Bar, Delphin Pub,- Atlantis disko, vitamin bar, iskele bar, garden secret bar, relax bar, oda servisi, animasyon, mini club (4-12 yaş), emanet kasalar (odalarda), 2 adet tenis kortu, Türk Hamamı, sauna, buhar odası, fitness, masa tenisi, su topu, su jimnastiği, jimnastik, telefon, faks, internet, motorlu su sporları, tenis ekipmanları ve dersi (rezervasyonlu), masaj, kese, dalış okulu, video oyunları, estetik merkezi, alışveriş merkezi, kuaför, çamaşır yıkama-ütüleme, doktor, bowling hizmetleri sunulmaktadır.</span></p>\r\n\r\n<h1>ODA ÖZELLİKLERİ</h1>\r\n\r\n<p><span style="background-color:rgb(210, 209, 208); color:rgb(0, 0, 0); font-family:verdana,geneva,sans-serif; font-size:11px">416 adet deluxe standartlı oda bulunmaktadır. Odalarda merkezi klima sistemi, uydu-TV, minibar (soft içecekler), telefon, elektronik kasa ve fön makinesi standart olarak mevcuttur.</span></p>\r\n\r\n<h1>AKTİVİTELER</h1>\r\n\r\n<p><strong>Ücretli Aktiviteler</strong><br />\r\nBowling , Banana , Bilardo , Dalgıçlık Okulu , Jet Ski , Kano , Parasailing , Disco , Masaj<br />\r\n<strong>Ücretsiz Aktiviteler</strong><br />\r\nAerobic , Animasyon , Beach Voley , Dart , Masa Tenisi , Su Kayağı , Fitness , Hamam , Sauna , İnternet Wireless , Tenis Kortu.<br />\r\n </p>\r\n', 0, 0, 0, 0, 0),
(10, 4, 7, 'Deneme Oteli', 'deneme-oteli', 'asgasgasg', 'tatil_1_sifresi_1.jpg', 'tatil_1_sifresi_2.jpg', 'asgasgsga', 'sagsagsagsag', '<h1>OTEL HAKKINDA</h1>\r\n\r\n<p>hakkında</p>\r\n\r\n<h1>KONSEPT</h1>\r\n\r\n<p>konsept</p>\r\n\r\n<h1>OTEL ÖZELLİKLERİ</h1>\r\n\r\n<p>özellik</p>\r\n\r\n<h1>ODA ÖZELLİKLERİ</h1>\r\n\r\n<p>Oda</p>\r\n\r\n<h1>AKTİVİTELER</h1>\r\n\r\n<p>aktivite</p>\r\n', 100, 100, 100, 100, 100);
Price table
CREATE TABLE IF NOT EXISTS `yurtici_otel_fiyatlar` (
`yof_id` int(10) NOT NULL AUTO_INCREMENT,
`yof_o_id` int(10) NOT NULL,
`yof_a_id` int(10) NOT NULL,
`yof_site` varchar(750) COLLATE utf8_turkish_ci NOT NULL,
`yof_tarih_1` date NOT NULL,
`yof_tarih_2` date NOT NULL,
`yof_fiyat` varchar(20) COLLATE utf8_turkish_ci NOT NULL,
`yof_fiyat_tur` int(1) NOT NULL,
PRIMARY KEY (`yof_id`),
KEY `of_fiyat_tur` (`yof_fiyat_tur`)
) ENGINE=InnoDB DEFAULT CHARSET=utf8 COLLATE=utf8_turkish_ci AUTO_INCREMENT=10 ;
INSERT INTO `yurtici_otel_fiyatlar` (`yof_id`, `yof_o_id`, `yof_a_id`, `yof_site`, `yof_tarih_1`, `yof_tarih_2`, `yof_fiyat`, `yof_fiyat_tur`) VALUES
(3, 9, 1, 'asgasg', '1111-12-29', '1111-11-11', '125', 2),
(4, 9, 2, 'deneme fiyat', '2013-11-20', '2014-12-20', '100', 2),
(5, 9, 1, 'qwtqwt', '2012-11-11', '2014-12-12', '1525', 2),
(6, 9, 3, 'asgasgags', '2013-12-04', '2013-12-05', '153', 2),
(7, 9, 6, '235235', '2013-04-12', '2013-04-19', '153', 2),
(8, 9, 8, 'asgasg', '2013-04-18', '2013-04-29', '315', 2),
(9, 10, 9, 'asgasg', '2013-04-11', '2013-04-18', '1521', 2);
Acenta Table
CREATE TABLE IF NOT EXISTS `acentalar` (
`a_id` int(10) NOT NULL AUTO_INCREMENT,
`a_isim` varchar(150) COLLATE utf8_turkish_ci NOT NULL,
`a_seo_isim` varchar(200) COLLATE utf8_turkish_ci NOT NULL,
PRIMARY KEY (`a_id`)
) ENGINE=InnoDB DEFAULT CHARSET=utf8 COLLATE=utf8_turkish_ci AUTO_INCREMENT=10 ;
INSERT INTO `acentalar` (`a_id`, `a_isim`, `a_seo_isim`) VALUES
(1, 'Jolly Tur', 'jolly-tur'),
(2, 'BKM TUR', 'bkm-tur'),
(3, 'ANI TUR', 'ani-tur'),
(4, 'TURSAN TURİZM', 'tursan-turizm'),
(5, 'TATİL.COM', 'tatil-com'),
(6, 'TEZ TOUR', 'tez-tour'),
(7, 'TURON9', 'turon9'),
(8, 'GEZİNOMİ', 'gezinomi'),
(9, 'E TATİL', 'e-tatil');
In my web site i need this from mysql result
hotel_name--->5 price from price table
hotel_name--->5 price from price table
5 hotel and 5 different price from price table.
Website Design
http://img850.imageshack.us/img850/3172/6vu6.png
A:
CREATE
VIEW `view_hotel_and_price_table_together` AS
select
`hotel`.`hotel_id` AS `hotel_id`,
`hotel`.`hotel_name` AS `hotel_name`,
`hotel`.`hotel_image` AS `hotel_image`,
`price`.`price_id` AS `price_id`,
`price`.`price` AS `price`,
`price`.`start_date` AS `start_date`,
`price`.`end_date` AS `end_date`
from
(`hotel_table` `hotel`
left join `price_table` `price` ON (`hotel`.`hotel_id` = `price`.`p_hotel_id`));
That's your view. Than if you want 5 record to be shown you can use something like
SELECT `hotel_name`, `price` FROM `view_hotel_and_price_table_together` ORDER BY RAND() LIMIT 5
|
{
"pile_set_name": "StackExchange"
}
|
Wednesday, 24 May 2017
What happened to transparency?
By Simon Kolawolelive
Dr. Ibe Kachikwu, Nigeria's minister of state for petroleum resources
At the annual Nigerian jamboree to the Offshore Technology Conference (OTC) in Houston, Texas, Dr. Ibe Kachikwu, the minister of state for petroleum resources, told a “world press conference” on May 5, 2017 that Nigeria’s refineries would soon have new investors. He said 26 investors had indicated interest in the epileptic refineries. “By September, we will unveil the investors for the refineries,” the minister said smoothly, typically. “When we came onboard, the refineries were not working but as we speak, we have sizeable investment portfolio for them to an extent that we don’t know who to partner with for the investment.”
Let’s say I didn’t go to school at all. Or let’s say it was evening school that I attended. These would still be my takeaways from the minister’s proclamations: one, our refineries are now in a position to attract investment; two, 26 investors have indicated interest in taking over the refineries (on a repair, operate and maintain, ROM, agreement); three, we have not taken a decision yet because there are so many suitors to choose from; and four, we will announce the favoured investors by September. Without attending Harvard Business School, I would still conclude that it appeared the process was going to be competitive and transparent.
On May 11, 2017 (six days later, right?) Mr. Wale Tinubu, the CEO of Oando Plc, told the Nigerian Stock Exchange (NSE) that the group had received approval of the government to “repair, operate and maintain” the Port Harcourt Refinery together with “our partner” Agip, a subsidiary of ENI, the Italian company indicted in the Malabu/OPL 245 affair. Tinubu said: “We plan to increase the refinery capacity from 30 per cent to 100 per cent.” Great news, as far I am concerned. We need the refineries back as soon as possible; we have had enough of the endless TAMs gulping billions of naira and spewing out virtually no products for decades.
Now this is where I need your help. The last time I checked, with the help of Google, May and September are different months. There are June, July and August in-between. With the help of Google, I also discovered that the gap between when Kachikwu spoke in Houston and when Tinubu spoke in Lagos was a whopping six days — or, to make it simpler, less than one week. There are usually four weeks in a month, and from May 5, when Kachikwu spoke, to September, there are 17 weeks, according to the all-knowing Google. With Tinubu’s disclosure, should we assume that May is the new September? Or that September came early for Oando, Agip and Kachikwu?
But I think Google is overrated. There were so many questions it could not answer. For instance, I asked: “Is Oando among the 26 investors Kachikwu boasted about in Houston?” I could not make head or tail of the results. Google came up with “FOX 26 Houston KRIV”. Nonsense. But I got more gibberish for other questions: did Oando and ENI send in a bid? Was it an unsolicited bid? Was it selective tendering? If it was competitive bidding, how many bids were received for Port Harcourt? How much did Oando/ENI bid? How much did others bid? How much did the bidders promise to invest? How many years will the ROM run? Are there concessions for the new operators?
I can understand why Google got stuck — that almighty search machine likes transparency. If you do not make your information public, it cannot make it public for you. The best, or should I say the worst, Google would do is to suggest answers that it thinks are related to your questions, even when there is no connection whatsoever. If you google most of the major concessions and major contracts awarded by this government, you will get irrelevant answers on the process. For the same reason: transparency is very scarce in these major deals. We just wake up one day and hear that one company has been awarded a job. Not a word on the process.
Don’t get me wrong: I’m not saying Oando should not take over the Port Harcourt Refinery. I have devoted a significant part of my column-writing career to promoting the cause of Nigerian companies. I believe that one day, made-in-Nigeria will be enjoyed all over the world. I want Nigerian companies to fly our flag honourably. Even though I have been called names and subjected to sickening innuendos for promoting Dangote, Globacom, Oando and Innosons, among others, I am not about to repent. Americans are proud of their Apple, Microsoft and Chevron, and my dream is that our people and our companies will become global brands too.
That said, though, I am very worried about an emerging pattern in this administration. President Muhammadu Buhari campaigned on the strength of correcting the mistakes and misdeeds of the previous government, but I am seeing too much repetition for it to be coincidental. There is too much secrecy in the way many important things are done, and corruption, need we say, thrives on secrecy. Take away competition, take away transparency, take away accountability, and you have a perfect recipe for corruption. We cannot be sealing deals under the table without revealing the details to Nigerians and then claim we are building an open society.
We just woke up one day to learn that GE had secured the concession to take over the railways. How did it happen? What are the details of the deal? Is this the best possible deal Nigeria can get? We were just watching TV one evening and learnt that the federal government had finally signed a renegotiated concession agreement with the Global Steel Holding Limited (GSHL) for Ajaokuta Steel. Up till today, we don’t know the details. Ask questions and what you get as answer is: who paid you to ask? As a journalist, I’m used to the blackmail. I would have quit this job the day I joined if I had to pay attention to personal attacks.
By the way, I know a bit about the procurement options. I know of “sole sourcing”, where you go to one provider only because no other provider does it — like buying a Rolls Royce from the maker. “Selective tendering” allows you to approach a few providers who meet certain criteria. There is “repeat procurement”, where you return to earlier provider because of time constraints and because they did a previous job well. All these need strong justifications because you are restricting competition, which is a major element of procurement. And then there is “competitive bidding”, where you throw it open to all. In all, Nigerians deserve to know the process adopted.
Get me right. I am not saying anything illegal is being done in the case of the Port Harcourt Refinery. It just lacks transparency. That’s my point. And what about other moral issues? ENI again? As I write this, many Nigerians are being prosecuted or wanted by the EFCC for their involvement in the OPL 245 deal. They are being accused of taking part in an elaborate bribery scheme. But ENI, which is at the centre of it all and is being prosecuted by an Italian prosecutor for its role in the $1.3 billion affair, is cornering more deals in Nigeria without getting as much as a slap on the wrist. The impression being created is that our anti-graft war is very narrow.
I sympathise with the government over the limitations imposed by procurement rules, particularly the constraint of speed, but the process was designed for a purpose. More so, this government has been in power for nearly two years, which means a lot could still have been accomplished over the years in spite of the constraints. And, remember, there are many options that can shorten the process which the government has been using for a while now. The biggest headache, though, is that there is too much opaqueness for us to conclude that transparency is a guiding principle. The chaos over the concessioning of Port Harcourt Refinery is a very good example. Dissonance.
|
{
"pile_set_name": "Pile-CC"
}
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.