text
stringlengths 1
3.78M
| meta
dict |
|---|---|
GF rides her BF's huge cock anally
Description: Shortly after debuting in porn, Cerecita X dated Nick Moreno. Their affair was basically based on wild sex sessions. They spent the entire days fucking, so that's probably the main reason why Cerecita X had no problem with riding Nick's fat dick.
|
{
"pile_set_name": "Pile-CC"
}
|
Activity 4: Writing comments – What you need to know
Welcome to our free professional development series on class and student blogging!
This series consists of a range of activities that take you through the process of class and student blogging. While many of the class blog examples we’ve included are from primary grades, the same principles apply for class blogs regardless of student age (including adult learners).
The activities can be completed at your own pace and in any order!
The aim on this activity is to explain how comments are used on class blogs and to provide tips for teaching students quality commenting skills.
Why comments are important on class blogs
Comments are an important part of your class blog. Comments allow students, and other readers, to engage in discussions, share their thoughts and connect with your class blog. Transforming your blog from a static space to an interactive community.
Important parts of the blogging process include encouraging students to:
1. Read other students’ posts.
2. Comment on other students’ posts.
3. Write posts in response to other students’ posts.
It’s amazing how even just a few comments can make student realise they are writing for a global audience — for many it is incredibly motivating.
Discussions in comments are important for reflective learning . Comments that challenge or suggest alternative options encourage you to reflect, revise, evaluate and review your thoughts.Back to Top
How comments work
By default, comments are enabled on all newly created blogs, and a comment form will appear at the bottom of posts and pages where readers can respond to what you’ve written.
Here’s what a comment form looks like:
Approved comments are displayed under the individual post or page. You just click on the post title or the comment link to read the comments.
Threaded comments allow readers to reply to other comments inline/nested which encourages better discussion and responses.
How to add a comment
1. Click on the heading of the post you wish to comment on or the “comment” link at the top or at the bottom of the post.
2. Scroll down until you can see the “Leave a Comment” section
3. You will be asked for your name (you can use a nickname) and email address (this is not published)
4. You will also need to write the “spam word”
5. Click “submit comment”
Reasons why you should teach quality commenting
If commenting skills are not taught and constantly reinforced, students will limit their comments to things like “I like your blog!” or “2KM is cool!”. While enthusiasm is high with these sorts of comments, students are not developing their literacy skills or having meaningful interactions with other members of the blogging community. Conversations in the comment section of a blog are such rich and meaningful learning experiences for students. Conversations begin with high quality comments.
Blogging is an authentic avenue for developing student literacy skills. When you invest the time in teaching, modelling, revising and promoting high quality writing of comments, students can make great gains in their overall literacy development.
Set your standards high from the start and reap the rewards!Back to Top
How to teach quality commenting
Kathleen teaches commenting skills through:
Modelling and composing comments together with students on the interactive whiteboard.
Teaching students about the “letter” format and editing process during writing lessons.
Giving examples of a poor/high quality comments and having students vote whether the comment should be accepted or rejected. Example of a Sorting blog comments activity devised for our students here.
Having students read and comment on a post on our blog as part of a literacy rotation on the computer each week.
Taking students to the ICT room once a week to work on composing a quality comment with a partner.
Emailing parents and encouraging them to write comments on the blog with their child.
Kathleen and her team teacher partner, Kelly Jordan, invests a lot of time focusing on teaching her students how to write ‘quality comments’ and helping students to understand what quality comments means.
Teaching quality commenting, with constant reinforcement, and setting high standards increases your students literacy skills which provide a good foundation for when you move them onto writing posts on the class blog or their own student blogs.
Activities for developing student commenting skills
Here’s a list of ideas you can use to develop your student commenting skils:
Create a commenting guideline poster (see poster example below) – develop your own or facilitate a collaborative discussion with students to create together (you could include this video as part of the process).
2. Why won’t comments display on pages?
Most Edublogs themes now support comments on pages however there are a few themes that don’t.
If the theme you are using doesn’t support comments on pages, and you would like this feature, then you will need to use an alternative theme.Back to Top3. How do I make comments display on my homepage?
Traditionally comments are designed to be displayed under a post and you view the comments by clicking on the post title or the comments link. It is done this way because posts can have 100’s of comments and displaying them directly under a post on the post page can make it hard to read the content.
However, there are a few themes like P2 and ReTweet that display comments directly under posts on the blog post page. These types of themes work well where the posts are short; they work well for Discussion type blogs.
This is an excellent discussion. The point about making time in class to teach and practice excellent commenting is very important. After all, we must devote time in class to whatever we value.
This conversation is getting me thinking that there are probably at least three key purposes to teaching commenting: (1) to build classroom community and to show appreciation of peers, (2) to encourage students to follow their intellectual interests on the Internet and to interact with people who share their passions, (3) to teach students the importance of professionalism when publishing their thoughts.
(There are probably many more, of course.)
Thinking about those goals, I’m wondering if the approach to Goal #1 vs. Goal #2 might be different. If my main goal is to build classroom community, then how an what I teach is different than if my main goal is to have students interact with fellow bloggers.
And this conversation is also getting me to think how the teaching of commenting has changed now that the conversation has moved to other places. What’s an excellent comment on a blog is different than a good tweet.
It’s all confusing to me but very interesting at the same time! Thank you again.
I think that making productive, relevant comments should definitely be taught and modeled throughout the school year. It is important that students learn to be polite and really edit their comment. One thing that I would teach them is that the reader cannot hear voice inflections or see body language, so the words have to be explicit.
My students are usually eager to comment back on others posts in the hope that the authors of the post they are comment on will return the visit to their blogs. If I say it is part of their assessment, that will often keep them going. However, if there are no return comments, they can lose interest in the activity and find it easier to just read a post and move on. As I only have my classes once or twice a week (and they are mainly secondary), my class time does not always allow time for students to comment on other blogs. Only the most motivated of students will voluntarily comment back in their own time. Therefore the clustrmaps, flagcounters etc are important to indicate visiting activity on blogs. I like to read many blogs and posts, but due to the time commitment rarely comment now.
As an aside and relating to teacher blogs, it was noted by some webinar participants, last night, that there is an increasing lack of comments appearing on many teacher and educationalist blogs, The blogosphere is getting bigger. Many felt that the conversations are continuing on twitter regarding blogs and posts, or as updates on facebook, rather than comments on posts. What do you think?
Hi Anne, if we look at teacher and educationalist blogs than getting people to comment has always been hard. It’s perhaps now harder now that it has ever been because the conversations so happen via Twitter, Facebook etc. How people are reading your posts has changed considerably in the past few years. Nowadays posts shared on social networks is considerably more important than RSS. Probably all of this has contributed to changing in commenting. But there is also a skill to writing posts that encourage people to want to post comments. Some bloggers are really good at this. My posts for encouraging comments tend to be totally different from my other posts. Whereas my longer. more informative posts, are less likely to be commented on but more likely to be shared.
You’ve both timely points for me about lack of commenting, conversations on Twitter, and readers viewing more and so have less time to comment. I can relate to this.
Sue, I’m interested to hear more about the skill of writing posts that encourage people to want to post comments; my query is with a class blog in mind. The other day, one of our posts featured on The Head’s Office blog dipping blog and we had 277 visitors . Only one of those visitors left a comment.
Having just read Activity Three. do you have any tips beyond that on writing posts that encourage comments?
Hi Valerie, 4KM and 4KJ @ Leopold Primary School ( http://4kmand4kj.global2.vic.edu.au/ ) is a good example how you write posts on a class blog to encourage comments. If you look closely at the posts you’ll see they structure each post to end with questions that are targeted at asking readers to leave comments. They also spend a lot of time commenting on other class blogs so they’ve built up a relationship of classes that want to interact with them.
Thanks for your reply. See my comment 3rd from top for what we already do. From what you’ve just mentioned, it’s good to know we’re on the right track. I was anticipating there might be something further I hadn’t yet discovered.
Valerie McLeod
/
Aug 11, 2012
/
Thinking this through, it is important to teach students the value of commenting, try and give them 10-15 mins each day to do so and how to make those comments count. It was global comments on our first blog posts that got us started in the use of web2.0 tools in our classroom. It was motivating, exciting and some valuable conversations ensued. The younger students do not have access to twitter and other social networking sites, but they can interact through blogging conversations. I like the student blogging challenge where there are teachers dedicated to being mentors. Their trail of comments is extremely valuable. It is the older students where the task to encourage them to comment is so much harder as they prefer to text, update facebook etc If students are taught at a young age will it carry through into senior years, where dedicated time for exploring blogs and commenting is negligible or almost so? That is one of my goals, but I am not successful yet.
Hi Anne, I agree! Make commenting part of your class routine. Everyone who is successful does include it as part of the day. Those with limited computer access set up a list next to the class computer where students can go to the computer when they have finished their work, add their comment and then they tick off the name. The other thing is while doing all this look as blogging as part of what you do and not an add on. Integrate your curriculum and what you need to cover into the activities you need to do with the students.
This really is a quality, comprehensive resource. Also, Mark’s question about reluctant commenters is such a valid one as, like any other learning area, we’ll all have students with commenting skills at both ends of the ability spectrum and in between.
I use blogging and commenting as a key part of our class literacy programme and I view all comments before they’re posted. It not only gives me good information about students’ writing skills but how they’ve responded to a post can give me a good picture of their reading comprehension skills as well.
This year is my first year with an active class blog that’s integrated into our learning programme. I began the year with the catch-phrase “if we want to get an audience we need to be an audience”. From the beginning I placed emphasis on how to set out a comment, proof reading and answering the questions asked at the end of the post. Initially, I assumed this was enough – and it was for some who flew straight away (although now we are working on extending their skills). For some students though, and these are the ones that appear to be reluctant and time-wasters, a lot more scaffolding is needed.
I’ve discovered that it’s not that they don’t want to write, respond or engage in a conversation with someone elsewhere in the world. It’s that they simply don’t know what to say. I had spent a reasonable amount of time working with my lower literacy students and doing ‘shared writing’ of comments; this has been helpful to some. I’m now working with groups of four at a time and this seems to be a lot more effective.
In working with smaller groups, I can ask questions and receive answers from all members of the group. We seem to have more time to talk and share. I can commiserate if it’s a difficult post to respond to and perhaps spend more time modelling, thinking out aloud, and drawing on my/our personal experiences that we might use in writing the comment. I also use the time to show students how and when to look for more information online.
Since implementing this approach in the last four weeks, I have seen four students commenting skills drastically improve. I am now also attempting to cultivate the habit of being a regular commenter myself.
This has been valuable for two reasons. Firstly, I can identify with my students as a commenter; we are in this together. Secondly, and possibly most importantly, my students see me as a writer and they are actively having writing modelled to them in an authentic context. I was reviewing one students comment for a student blog post earlier this week and I had to ask him if he’d read the comment I’d written above. He replied, “yes, I wasn’t sure what to write so I read what you had written and got my ideas from that.” I was thrilled, of course, that he’d used his initiative and modelled his writing of an example that was in front of him.
I alleviate the fear of mistakes being published by students saving their comments into their own word document first. I find this has several beneficial aspects to it. It’s a good way to document/keep a record of writing growth, students are accountable for the work they do or don’t do (and if they don’t, how can I help them), I can check content before posting, and I use it as a place to give feedback and feedforward on their writing. It does take regular commitment to do this in a timely way, but it is really just like marking book work.
Finally, following the sage advice of Kathleen Morris, I often begin our day looking at a great comment that’s been added to our blog, something neat on another blog, celebrating our flag counter, or highlighting an instance where another class has linked to our blog. That all helps to keep everyone enthused about blogging.
I’m looking forward to reading tips and tools others use to aid their writers!
On the one hand, students felt more comfortable writing comments to their peers. On the other, the exercise felt forced. After all, my students felt like they were just writing comments to complete an assignment.
A better approach, I think, is encouraging students to write comments on websites of their choice. This would increase their motivation and their ideas of what to write. I’d first have to make sure that my students are writing quality comments, of course.
What are your thoughts?
(After writing this, I think I prefer sticking with the class blog. After all, one of the most important outcomes of commenting is building class community.)
You raise an interesting point regarding building a class community. I’ve found that the more active we are with our blog, the stronger my students’ sense of class identity is. Our blog and the global ‘activity’ we have through it is a unique experience for them; it adds a special element to our class.
Both my class and I have remarked that the extra learning we get through insights into other class’ learning around the world is something we enjoy. I referred to me personally commenting on other blogs in my comment above; this takes time but the rewards for my students (and myself) far outweigh the effort.
My students are very receptive to other teachers’ comments on our blog, also learn from students’ comments from outside of our class and are learning communication skills beyond what I’ve seen in previous classes. Motivation to write, I think, comes from both the excitement of global interaction and getting to share their own thoughts and views to a real audience.
Student choice and student voice is important in our blogging. We discuss potential posts, evaluate and decide on which blogs we have on our blog roll and students suggest what should be added to our blog. One recent undertaking is the rewriting of our blog’s blurb; analysing how to increase blog traffic through people searching on Google.
Some time ago, one student couldn’t find a blog post to comment on (on other blogs) so in her own steam wrote a post for our blog about some learning we’d just been doing. That’s another great thing about our class blog; 11-12 year old students wanting to share their learning.
Personally, I feel that an external audience has a more authentic feel. I do think, though, that it’s important to decide on the outcomes you’re wanting to see, involve your students in the decision-making process, and go for gold.
Thanks for sharing what has worked with your students! Having that external audience gives both a more authentic feel and can be so motivating for many students. I also love the advice on involving your students in the decision making process. Very important for personal ownership.
Hi Mark, thanks for highlighting the reluctance to comment. Can’t believe I didn’t include that in my post 🙁 Several years ago I did a 30 day challenge entirely based on commenting with educators and one of the most interesting things that came out of that was the reluctance of the educators themselves to leave comments. In their case time wasn’t the issue. Fear was. All of them were bloggers and had no issues writing posts but were reluctant commenters. When you make a mistake writing a post you can edit or remove; whereas you can’t in most situations with a comment. I’m sure that you’ll find that their reluctance is more to do with that fear than the comments being hidden.
The key is to look at strategies that will encourage them to engage in commenting. Some educators use comment point systems. I’ll ask my network to see if they can share their tips on what has worked for their class.
|
{
"pile_set_name": "Pile-CC"
}
|
[Influence of eosin y and orthovanadate on the steady-state of Ca(+)2 entry into secretory cells of exocrine glands and their spontaneous secretion].
Ca(2+)-pump blocators in low concentrations (eozyn Y up to 5 mM and ortovanadate up to 40 mM) essentially increases of Ca2+ content in salivary gland of Chironomus plumosus larvae's and spontaneous protein secretion. It was shown that eozyn Y much more effectively suppresses of plasma membrane Ca(2+)-pump then ortovanadate. Eozyn Y and ortovanadate in higher concentrations essentially decrease of Ca2+ content in glands and spontaneous protein secretion. The former is evoked by suppression of endoplasm reticulum Ca(2+)-pump, decreasing of Ca2+ influx in cells following by diminishing of Ca2+ transmembrane gradient. Therefore, energydependent Ca2+ transporting systems of plasma membrane and endoplasm reticulum effectively regulate steady-state Ca2+ entry in secretory cells of Chironomus plumosus salivary glands and maintain relatively low level of spontaneous secretion.
|
{
"pile_set_name": "PubMed Abstracts"
}
|
(e) may purchase or lease and hold personal property it considers necessary or convenient in the transaction of its business, may dispose of personal property held by it in accordance consistent with the laws of the government;
(f) may, in the name of the government, purchase, lease, or sell real estate, and accept title to that real estate in the name of the government, to accomplish the purposes of this chapter;
(g) may procure or contract for the procurement of supplies, equipment, materials, personal services other than by employees, and construction with any public or private entity upon terms and conditions as it finds necessary to the full and convenient exercise of its purposes and powers, subject to all applicable laws and rules of American Samoa, and shall receive and account for its inventory of materials;
(h) shall serve a center for life-long learning, dedicated to meeting the needs of all age groups, unskilled, skilled, and professional workers, students, preschoolers, business, government, elected officials, throughout the Territory;
(i) shall make available books, periodicals, government publications, audiovisual, video-conferencing, internet, and other educational and cultural materials and provide the physical facilities and equipment to use these materials and services;
(j) shall serve the informational needs of the general public, department of education staff and the staffs of other departments; and educational, community, businesses and cultural organizations;
(k) shall maintain a collection of Samoan and other Pacific Islands resources and cooperate with regional libraries and agencies of the Pacific in matters of mutual concern and benefit to the Pacific basin, including the South Pacific Commission, Pacific Forum, Nelson Memorial Library of Samoa, Universities of Guam, Hawaii and Fiji and Pacific resources for education and learning;
(l) shall encourage life long education, instruct users of the library on the efficient and effective use of library resources and provide information services for social, economic and political development in American Samoa;
(m) shall be responsible for developing and receiving private and government grants and contributions of money or property which the library may use for or in aid of any of its purposes;
(n) shall establish fair and reasonable charges for copy services, late book fees, rental of conference rooms with and without video equipment, sale of surplus books and other surplus materials and other income producing activities;
(o) may adopt other rules pursuant to the Administrative Procedures Act, 4.1001 et seq., not inconsistent with the provisions of this chapter or with the rules of the government, that are necessary and proper for the administration and operation of the public library; and
(p) shall exercise all other powers not inconsistent with the provisions of this chapter or with the rules of the government, which may be reasonably necessary or incidental to the establishment, maintenance and operation of the public library.
|
{
"pile_set_name": "Pile-CC"
}
|
Kowari (disambiguation)
A kowari is an Australasian marsupial.
Kowari may also refer to:
KOWARI - Residual-Stress Diffractometer, a neutron diffractometer at OPAL, Australia's research reactor
Kowari (software), an open-source metadata database written in Java
|
{
"pile_set_name": "Wikipedia (en)"
}
|
cement from smzhssshlhsshh.
5/24024
Calculate prob of sequence qa when two letters picked without replacement from {a: 1, t: 9, q: 1}.
1/110
Four letters picked without replacement from {z: 1, e: 4, d: 3}. Give prob of sequence dzdd.
1/280
Three letters picked without replacement from dddqdddddddddqq. What is prob of sequence ddq?
66/455
What is prob of sequence llo when three letters picked without replacement from lldldllood?
1/18
Two letters picked without replacement from lww. Give prob of sequence ww.
1/3
Three letters picked without replacement from {w: 1, n: 2, x: 1}. Give prob of sequence nnx.
1/12
Two letters picked without replacement from ajjjpjjjjjap. Give prob of sequence ja.
4/33
Three letters picked without replacement from lddcclllcccccc. What is prob of sequence clc?
4/39
Three letters picked without replacement from cicrcdd. What is prob of sequence cid?
1/35
Calculate prob of sequence ukks when four letters picked without replacement from uusksususksksuu.
3/455
Calculate prob of sequence gvo when three letters picked without replacement from lmovg.
1/60
Two letters picked without replacement from trororrmrrorootmtrt. Give prob of sequence tt.
2/57
Calculate prob of sequence nsts when four letters picked without replacement from sssstnntntnsss.
3/143
Three letters picked without replacement from gvkbzvekezeg. Give prob of sequence bkg.
1/330
Three letters picked without replacement from yyyyhhyyyy. Give prob of sequence yyy.
7/15
Two letters picked without replacement from {e: 4, l: 2, y: 2}. What is prob of sequence el?
1/7
Calculate prob of sequence brno when four letters picked without replacement from {q: 3, b: 3, o: 3, r: 1, n: 2, t: 3}.
1/1820
Four letters picked without replacement from vvjzvvziwzwjvvzvvvj. What is prob of sequence vziv?
1/323
Calculate prob of sequence re when two letters picked without replacement from {g: 1, r: 1, e: 1, j: 2}.
1/20
Two letters picked without replacement from {n: 10}. What is prob of sequence nn?
1
Four letters picked without replacement from {p: 6, j: 6}. Give prob of sequence jjpp.
5/66
Calculate prob of sequence zzyz when four letters picked without replacement from yzzzzyyzzyzzzygzy.
9/119
Three letters picked without replacement from lygxlvlxxtxvvxg. What is prob of sequence gtx?
1/273
Calculate prob of sequence zo when two letters picked without replacement from {c: 2, t: 10, z: 1, l: 6, o: 1}.
1/380
Three letters picked without replacement from {t: 4, n: 2, k: 10, r: 4}. Give prob of sequence nnk.
1/342
What is prob of sequence dd when two letters picked without replacement from rdrddddddrdddddrrd?
26/51
What is prob of sequence ne when two letters picked without replacement from oboeqvne?
1/28
Two letters picked without replacement from {c: 2, v: 2, y: 1, s: 1}. Give prob of sequence sv.
1/15
Two letters picked without replacement from iivybivibvbyvvvyyiv. What is prob of sequence ib?
5/114
Calculate prob of sequence wiww when four letters picked without replacement from {i: 1, w: 14, g: 1}.
1/20
Four letters picked without replacement from {o: 5, z: 2, d: 2, j: 1, m: 6}. Give prob of sequence ommd.
5/728
What is prob of sequence mybt when four letters picked without replacement from {y: 4, m: 1, t: 1, d: 2, b: 2, q: 7}?
1/7140
Two letters picked without replacement from epeeeeeeeeeee. What is prob of sequence ee?
11/13
What is prob of sequence vwwv when four letters picked without replacement from {v: 9, w: 7}?
9/130
Two letters picked without replacement from {q: 2, k: 2, e: 4}. Give prob of sequence qk.
1/14
Two letters picked without replacement from avlllalalavl. Give prob of sequence aa.
1/11
Two letters picked without replacement from {v: 1, c: 1, h: 1, z: 1, a: 1}. What is prob of sequence hc?
1/20
Four letters picked without replacement from sdydefjs. What is prob of sequence esfd?
1/420
What is prob of sequence tt when two letters picked without replacement from tttztttt?
3/4
Four letters picked without replacement from {i: 5, w: 2, y: 6}. What is prob of sequence ywiy?
5/286
What is prob of sequence css when three letters picked without replacement from nsxfxxccscfnc?
2/429
Calculate prob of sequence aa when two letters picked without replacement from {a: 11, h: 1, c: 1}.
55/78
What is prob of sequence ww when two letters picked without replacement from {x: 2, w: 3, s: 7, e: 5}?
3/136
What is prob of sequence um when two letters picked without replacement from shgurmh?
1/42
Calculate prob of sequence co when two letters picked without replacement from {b: 5, c: 5, o: 1, k: 1}.
5/132
What is prob of sequence uc when two letters picked without replacement from cxpxcpcpttxpccuctff?
1/57
Three letters picked without replacement from {w: 6, n: 11, y: 1}. What is prob of sequence nww?
55/816
Two letters picked without replacement from bdzdoooooovvooqvoq. Give prob of sequence db.
1/153
What is prob of sequence haa when three letters picked without replacement from {h: 2, f: 8, a: 2, n: 1}?
1/429
What is prob of sequence vxp when three letters picked without replacement from {x: 5, p: 1, l: 4, m: 1, v: 3}?
5/728
Three letters picked without replacement from {b: 15, o: 5}. Give prob of sequence bob.
35/228
Calculate prob of sequence ls when two letters picked without replacement from {s: 2, x: 2, e: 1, l: 2, y: 1}.
1/14
Three letters picked without replacement from xgbxmmaiabmax. What is prob of sequence amb?
3/286
What is prob of sequence qql when three letters picked without replacement from {y: 1, l: 10, q: 6}?
5/68
Four letters picked without replacement from ttxttxt. What is prob of sequence txxt?
1/21
Calculate prob of sequence axh when three letters picked without replacement from xwwhxqawwhwyawa.
2/455
Two letters picked without replacement from fbxcx. What is prob of sequence cf?
1/20
Two letters picked without replacement from noldodoonq. What is prob of sequence dl?
1/45
Two letters picked without replacement from {m: 2, i: 4, d: 1, t: 1}. What is prob of sequence id?
1/14
Four letters picked without replacement from {s: 3, f: 3, e: 1, n: 11, q: 1}. What is prob of sequence snqn?
55/15504
What is prob of sequence zzzj when four letters picked without replacement from {z: 7, f: 4, j: 2}?
7/286
Four letters picked without replacement from ldquq. What is prob of sequence duqq?
1/60
Two letters picked without replacement from nknnnnnnnnokol. What is prob of sequence nl?
9/182
Calculate prob of sequence xsj when three letters picked without replacement from {m: 3, x: 1, n: 3, c: 1, s: 1, j: 2}.
1/495
Two letters picked without replacement from slsssssssgslsllsl. Give prob of sequence ls.
55/272
What is prob of sequence mv when two letters picked without replacement from {m: 8, v: 2}?
8/45
Two letters picked without replacement from {g: 1, l: 1, w: 1}. What is prob of sequence wl?
1/6
Two letters picked without replacement from {t: 12, y: 1}. Give prob of sequence yt.
1/13
What is prob of sequence shsh when four letters picked without replacement from yyyshyhyyysyyyysyy?
1/6120
Calculate prob of sequence rsr when three letters picked without replacement from {s: 2, r: 2}.
1/6
Calculate prob of sequence ii when two letters picked without replacement from iiiiiilidiliidiiiiil.
21/38
What is prob of sequence dd when two letters picked without replacement from ddii?
1/6
Calculate prob of sequence re when two letters picked without replacement from yeuxerr.
2/21
What is prob of sequence zzhz when four letters picked without replacement from {z: 5, h: 3}?
3/28
What is prob of sequence txmx when four letters picked without replacement from {t: 1, p: 4, m: 2, x: 3}?
1/420
Three letters picked without replacement from nnnnww. Give prob of sequence nnn.
1/5
Three letters picked without replacement from kckcckkkckghcckcgc. What is prob of sequence cck?
49/612
Three letters picked without replacement from xxfxxfxxxxx. What is prob of sequence xxx?
28/55
Two letters picked without replacement from {p: 3, j: 12, l: 3}. Give prob of sequence jl.
2/17
Calculate prob of sequence ooo when three letters picked without replacement from {i: 3, z: 5, o: 4}.
1/55
Two letters picked without replacement from niivtevvbevtvebbvv. What is prob of sequence nv?
7/306
Three letters picked with
|
{
"pile_set_name": "DM Mathematics"
}
|
protoc.exe --java_out=. SocketProtocol.proto
@pause
|
{
"pile_set_name": "Github"
}
|
Tufted apple bud moth (Lepidoptera: Tortricidae) management model for processing apples based on early season pheromone trap capture.
Sixteen years of archived tufted apple bud moth, Platynota idaeusalis (Walker), trap capture data were compared with archived fruit injury data collected at the Penn State University Fruit Research and Extension Center to define the relationship of trap capture to fruit injury. Pheromone trap capture until 15 June was the best predictor of fruit injury at harvest. Using the regression equation of fruit injury on early season trap capture, and other assumptions about insecticide cost and fruit yield, a management model was developed for apple growers in the Mid-Atlantic region. When the model was tested on archived trap capture and fruit injury data, the results indicated that a grower would lose money on average by always treating and save money on average by never treating. By using the model, a grower could expect to save more money than by never treating. The model showed sensitivity to fruit price, insecticide price, and fruit yield.
|
{
"pile_set_name": "PubMed Abstracts"
}
|
#### 谈谈热修复的原理
##### 参考答案
我们知道Java虚拟机 —— JVM 是加载类的class文件的,而Android虚拟机——Dalvik/ART VM 是加载类的dex文件,
而他们加载类的时候都需要ClassLoader,ClassLoader有一个子类BaseDexClassLoader,而BaseDexClassLoader下有一个数组——DexPathList,是用来存放dex文件,当BaseDexClassLoader通过调用findClass方法时,实际上就是遍历数组,找到相应的dex文件,找到,则直接将它return。而热修复的解决方法就是将新的dex添加到该集合中,并且是在旧的dex的前面,所以就会优先被取出来并且return返回。
|
{
"pile_set_name": "Github"
}
|
Northern Ireland - List of Gold Cup Winners
First played in 1911/12 after seven of the eight participating
clubs left the Irish FA (only Linfield remained) and founded
the New Irish FA. This new organisation introduced the Gold
Cup. At the end of the season, the dissident clubs returned
to the Irish FA and the tournament was not held 1912/13, but
revived by the IFA in 1913/14. In the seasons 1915/16 to
1918/19 it was played in league format (with a playoff between
the two teams topping the table in the first of these seasons).
|
{
"pile_set_name": "Pile-CC"
}
|
Michael Quinn Sullivan Wins
Michael Quinn SullivanSARAH RUMPF18 Feb 2015
A Denton County judge has tossed out a ruling by the Texas Ethics Commission (TEC) against Empower Texans President Michael Quinn Sullivan that claimed that Sullivan had improperly failed to register as a lobbyist. The court not only rejected the TEC’s attempt to transfer the case back to Travis County, but also ruled later that same day that the entire case was to be thrown out.
Last June, after pursuing a case against Sullivan for nearly two years, the TEC finally held a public hearing. As Breitbart Texas reported, the TEC failed to properly authenticate evidence it presented against Sullivan, allowed witnesses to violate procedural rules, and failed to counter arguments offered by Sullivan’s attorneys, chiefly several challenges they made regarding vagueness issues with Texas’ lobbying law.
Nevertheless, after meeting behind closed doors, the TEC ruled against Sullivan, imposing a $5,000 civil fine against Sullivan for two years of violations they claimed (2010 and 2011), for a total fine of $10,000.
Sullivan challenged the TEC’s ruling in court, filing his appeal in Denton County, his new residence. Under Texas law, TEC rulings can be appealed in either Travis County or in the county where the appellant resides, at the appellant’s choice. The TEC then took the extraordinary step of not only challenging Sullivan’s claim of residence, but hiring a private investigator to dig up information on Sullivan.
Breitbart Texas interviewed one of Sullivan’s attorneys, Trey Trainor, last month on this issue. The law is very clear on the issue of establishing residency for purposes of establishing venue, or the location where a legal action may be filed, said Trainor. In fact, he said, the law requires little more than declaring an intention to reside in that county. Sullivan had submitted a copy of his lease to an apartment in Denton County as well as evidence that he had registered to vote there and did in fact vote there, in addition to his long-standing family ties in the area.
The TEC still persisted in challenging Sullivan’s selection of venue. However, District Judge Steve Burgess did not find the TEC’s arguments persuasive, and ruled that venue was proper before proceeding with the heart of the case.
According to a statement on the Empower Texans website, after a total hearing time of nearly five hours, Judge Burgess issued a ruling on Wednesday afternoon that the TEC’s ruling against Sullivan was to be dismissed pursuant to Texas’ Citizens Participation Act, which protects the rights of speech, petition, and assembly.
Sullivan was understandably thrilled with the court’s decision, posting severaltweets that said “VICTORY!” in all capital letters, as well as quotes from Gandhi and Winston Churchill:
This quote is especially meaningful: “First they ignore you, then they ridicule you, then they fight you, then you win.” – Gandhi | #TxLege
“I am pleased with the court’s ruling, which came after taking careful consideration of the case’s facts and history,” said Sullivan in a statement obtained by Breitbart Texas. “It should not escape notice that on the very first day that a court reviewed the case, it was dismissed outright.”
From the beginning, Sullivan and his supporters have sought to frame this case as not just about registration requirements for lobbyists, but as a broader battle for free speech rights, even using the hashtag “#TXSpeechFight” in posts about the case. “The TEC has devolved into an agency in which their process is the punishment,” said Sullivan.”I’m glad I was able to be in this fight so that other Texans won’t have to.”
Sullivan’s attorneys, Trainor and Joe Nixon of the Beirne, Maynard & Parsons law firm, said that the Citizens Participation Act, the statute which was the basis for the court’s ruling, awards attorneys fees and court costs to those who successfully appeal TEC rulings, and Sullivan would be seeking the reimbursement to which he is entitled under that law.
The TEC intends to appeal the ruling, according to a report by the San Antonio Express-News, but for now, Sullivan is celebrating a hard fought victory nearly three years in the making.
|
{
"pile_set_name": "Pile-CC"
}
|
Menu
Tag Archives: vegetarian
This is a new weekly staple at our house. Im so into easy recipes with minimal ingredients. I pretty much always have lentils, brown rice and onions on hand and that’s the basis here. You could serve this as a side dish or a main course. I like to serve it with a quick pickled cucumber salad. It would be nice with a spiced roasted chicken and some sautéed greens, but I’m perfectly happy with a bowl of this on its own.
Bring water and bullion cube to a boil in a large saucepan over medium-high heat. You can also use chicken or vegetable stock. Add rice, lentils, and bay leaf and return to a boil. Reduce heat to medium-low, cover, and simmer until rice and lentils are tender, 35–45 minutes. Remove pan from heat and let sit 5–10 minutes (there should still be some broth remaining). Discard bay leaf and season with salt and pepper. Set rice mixture aside.
Heat oil in a medium skillet over medium heat. Add onions and cumin seeds and toss to coat. Cook, stirring often and adding water to pan as needed to prevent burning, until onions are golden brown and soft, 20–25 minutes.
Mix half of onion mixture and half of herbs into rice mixture; season with salt and pepper. Top mujadarra remaining onion mixture, and remaining herbs, and serve with lemon wedges for squeezing over.
Tzatziki is so easy. Who knew. Naan is a bit more involved, and Im not sure if my version is better than my favorite indian takeout spots. But I had fun making this recipe. For me its all about the process. Take it a step further, add grilled chicken, lettuce, tomato and onion and and make a gyro.
HOMEMADE NAAN (for step by step instructions with pictures head over to Half Baked Harvest)
4 cups all-purpose flour
1 1/2 teaspoons baking powder
1 teaspoon baking soda
1 tablespoon sugar
1/4 cup hot water (but not boiling, just hot tap water)
3/4 teaspoonactive dry yeast
3/4 cup warm milk
1 cup greek yogurt
melted butter, ghee or olive oil for brushing
fresh cilantro, garlic or other herbs for topping
In a medium size bowl, or 4 cup glass measuring cup, dissolve the sugar in the warm water (about 105 degree F). Add the dry yeast to the warm water and stir until the yeast is dissolved. Let it sit for 10 minutes or until the mixture begins to froth and rise.
Add the flour, baking soda and baking powder to a large mixing bowl.
When the yeast is foamy and smells like bread add the warm milk and yogurt. Pour the wet ingredients right into the middle of the dry and begin mixing the wet with dry using a wooden spatula. When the dough is about to come together, use your hands to finish mixing. As soon as it comes together, stop kneading. It should be sticky, but should form a ball and be soft. Cover the bowl with a damp towel or plastic wrap and let sit in a warm place 1 hour or if not using right away overnight in the fridge.
When ready to cook divide the dough into 8 equal balls and using a rolling pin, roll each piece of dough into an oval shape. It should be about 6-8 inches long and about 1/4-inch thick, but no thinner. Repeat this method with the rest of the dough.
Warm a cast iron skillet over medium-high heat (you want a hot pan). Brush both sides of the naan with melted butter and if desired sprinkle on any spices you like such as cumin and garlic. Place the naan on the hot skillet, cover with a lid and bake for 1 minute, until you see bubbles starting to form. Flip and cook for 1-2 minutes on the other side, until large toasted spots appear on the underside. Brush with a bit more butter if desired, then sprinkle with a little kosher salt, fresh cilantro (I used cilantro) or other herbs. Place the naan in a tea towel-lined dish. Repeat with the rest of the naans and serve. These are best eaten fresh, but will keep in a ziplock bag for a few days or in the freezer.
TZATZIKI
2 cupshomemade yogurt or Greek yogurt
2 mediumcucumbers, finely diced
2 clovesgarlic, finely miced
1 tablespoonolive oil
juice of half alemon
1 tablespoonchopped fresh dill
salt
Stir all the ingredients together in a large bowl and chill for an hour in the refrigerator. Easy!
I have a slight obsession with all things lentil. Ive had this dish countless times at one of my favorite spots; Lucky Strike. One day I realized I just needed to learn how to make it at home. A super healthy quick meal. Add grilled fish or chicken for another layer of flavor.
In a medium saucepan bring lentils water and bay leaf to a boil. Reduce heat and simmer covered until almost tender, about 12 minutes. Stir in 1/4 tsp of salt and cook another 5 minutes, until tender but not mushy.
Drain lentils in a colander and discard the bay leaf. Dump into skillet with vegetables, add vinaigrette. Cook over low heat stirring gently until heated through. Add splash of red wine vinegar and serve warm over a bed of fresh arugula. Top with a pinch of crunchy sea salt.
This is a nice little Sunday project. I recently acquired a super cheap pasta machine, so i set out to see how hard this was. My interest in fresh pasta began at Posada Margherita in Tulum. I thought it was so bizarre that some of the best pasta Ive ever had was in… Mexico?? (and yes I’ve traveled through most of Italy) Good food is good food.
The Kitchn has a great fresh pasta tutorial. Most of this recipe is adapted from them with adjustments for a food processor vs. hand kneading.
FRESH HOMEMADE PASTA
2 cups of all purpose flour, more for dusting
1/2 tsp salt
3 large eggs
Combine flour and salt in the bowl of a food processor fitted with blade attachment. Pulse a few times to combine. Crack the eggs on top of the flour. Process for 30-60 seconds, until dough comes together and forms a ball.If sticky add flour, if its too dry and pebble like, add more water. Repeat until dough comes together. Remove dough from food processor, shape into a ball. Rest dough in bowl covered with plastic wrap for at least 30 minutes.
Note: At this point, the pasta dough can be refrigerated for up to 24 hours. Let it come back to room temperature before rolling.
Divide the dough into four equal portions. Dust the portions with flour and cover with a clean dishtowel. Make sure to keep all pasta dusted with flour. You do not want the dough to stick to anything. Flour all surfaces including your hands when handling the dough.
Set your pasta machine to the thickest setting (usually marked “1”). Flatten one piece of dough into a thick disk between your hands and feed it through the pasta roller. Repeat once or twice. Fold this piece of dough into thirds, like folding a letter, and press it between your hands again. With the pasta machine still on the widest setting, feed the pasta crosswise between the rollers. Feed it through once or twice more until smooth. If desired, repeat this folding step. This helps to strengthen the gluten in the flour, giving it a chewier texture when cooked.
Begin changing the settings on your roller to roll the pasta thinner and thinner. Roll the pasta two or three times at each setting, and don’t skip settings (the pasta tends to snag and warp if you do). If the pasta gets too long to be manageable, lay it on a cutting board and slice it in half. Roll the pasta as thin as you like to go. Ive tried both thicker and thinner, and i prefer the pasta as thin as possible since it tends to puff slightly when cooked.
Cut the long stretch of dough into noodle-length sheets, usually about 12-inches. If making filled pasta or lasagna, proceed with shaping. If cutting into noodles, switch from the pasta roller to the noodle cutter, and run the sheet of pasta through the cutter. Toss the noodles with a little flour to keep them from sticking and gather them into a loose basket. Set this basket on the floured baking sheet and cover with a towel while you finish rolling and cutting the rest of the dough.
To cook the pasta immediately, bring a large pot of water to a boil, salt the water, and cook the pasta until al dente, 4-5 minutes. To dry, lay the pasta over a clothes drying rack, coat hangers, or the back of a chair, and let air dry until completely brittle. Store in an airtight container for several weeks. To freeze, either freeze flat in long noodles or in the basket-shape on a baking sheet until completely frozen. Gather into an airtight container and freeze for up to three months. Dried and frozen noodles may need an extra minute or two to cook.
This might be the first recipe I ever learned, passed down from my Mom, hers is always better. “Sunday” sauce as we called it, was a staple in my house growing up. My Mom, a feisty Irish woman- who cooks like a feisty Italian woman (its a NJ thing) Always had a huge pot of tomato sauce simmering on Sundays. I like to serve as a simple Spaghetti Pomodoro- with fresh basil and shaved parmigiano reggiano. You can also puree in the blender for pizza sauce, use it for lasagne or baked ziti, the possibilities are endless.
This is a super quick vegetarian miso soup. Typically you’d make a dashi broth, which involves using shavings of preserved/fremented fish flakes. I wanted to create a completely vegan version, so here we are. 5 ingredients, fantastic.
QUICK MISO SOUP
-4 cups water
-3 tbsp white miso paste
-1 sheet kombu (dried seaweed)
-2 green onions washed, stems trimmed and chopped
-1/3 cup cubed tofu (firm)
Heat water in medium saucepan and bring to a low simmer. Add kombu and simmer for 10 minutes. The water should be just ready to boil but without bringing it to a full boil. In the meantime mix the miso with a few tbsp of water to create a loose paste and prevent clumping. Remove from heat and add miso and tofu, let sit for a few minutes to allow the flavors to combine. NOTE: DO not boil the miso it will strip the nutrients. Taste and add more miso if needed. Add salt, pepper and/or red pepper flakes to taste. Add green onions and serve.
I know Im OD’ing on ice pops lately, but its summer, and theres so much great fruit. And certain ‘houseguests’ keep devouring them as soon as I make them, so theres always room for a new batch. Here are this weeks pops. Pretty, no?
Puree chopped Mango with lime juice and sugar. Add mixture to molds and slide the strawberry slices to the edges of the mold. Place them on the edges of the mold. Freeze for 1 hour then insert popsicle sticks. Freeze for another 3-4 hours and then unmold. Wrap in wax paper and store in freezer.
Puree Blueberries, lemon juice and sugar in blender. Adjust sugar to desired sweetness. Note that Blueberries will freeze a bit sweeter than how they taste in the puree. Strain blueberry puree through a fine mesh sieve to remove skins. Meanwhile drizzle a bit of cream down into the sides of the molds. It should collect at the bottom. Mix remaining cream into blueberry puree, be careful not to mix too much, the streaky effect is what you’re looking for. Carefully pour mixture into molds. Mix with a chopstick or knife to get desired streaky look. Freeze for 1 hour then insert popsicle sticks. Return to freezer for another 3-4 hours and then unmold. Wrap in wax paper and store in freezer.
Last week it occurred to me that I needed a waffle iron, Like couldn’t live without one for another minute. So off to Target and $18.99 later (yes I bought the cheapest one) thats how these waffles happened. The waffle-in-the-box route wasn’t going to work for me, I decided to try this overnight recipe which uses yeast to create light dough thats crispy on the outside. Warning: There is a lot of butter in this recipe, so you will want to take 4 spin classes after.
The night before: Pour warm water in the bottom of a large bowl (allow room for dough to double in size while rising). Sprinkle yeast on top and let it dissolve and foam for 15 minutes. Stir in milk, butter, salt, sugar and flour. Cover bowl with plastic wrap and leave to rise overnight.
The next morning, whisk in eggs and baking soda until smooth. Heat waffle iron and coat lightly with butter or oil. Ladle in 1/2 to 3/4-cup batter per waffle batch. The batter will be very thin and will spread a lot in the pan, so err on the side of underfilled until you figure out the right amount. Repeat with remaining batter. Serve immediately, or freeze and reheat in waffle iron or toaster later.
NOTES: The recipe calls for this dough to be left out overnight, Ive left it out and kept it in the fridge overnight and I prefer the flavor when you refrigerate it. If you leave it out, it does take on a more complex flavor, so its up to you. I used 1/2 almond milk and 1/2 skim milk which worked well. And I might try with less butter next time. They taste great- but its ALOT of butter!
Slice, shred or julienne carrot, cabbage and cucumber. Slice avocados. (You can hand chop, use a mandoline or one of these amazing julienne peelers) Soak rice paper wrappers in warm water until pliable- about 2 minutes) Transfer the rice paper to a dry cutting board. Layer sprigs of cilantro first, followed by carrots, cabbage, cucumber and avocado on top of the rice paper. Tuck top and bottom ends over the vegetables and then roll like a burrito, the rice paper should stick and hold together. Serve with dipping sauce of choice, I like sweet chili sauce. Makes 4 summer rolls.
I first had this dish at a chain restaurant in a shopping mall in New Jersey. Yes.. Fine dining at its finest. When I have a great dish, wherever that may be, I obsessively try to recreate the recipe at home. So heres my interpretation of New-Jersey-Mall-Restaurant-Pasta-Primavera 🙂
Bring a 5.5. quart pot of salted water to a rolling boil. Add pasta and cook for 5 of the recommended 6 minutes. Reserve 1/2 cup of pasta water, drain pasta and set aside. Meanwhile prepare all the veggies, chop, dice, julienne. Heat 2 tbsp of olive oil in a large sauté pan (you can also use a wok or the pasta pot). Add the red pepper flakes and swirl for 1 minute. Add Garlic and onion and cook for another minute or two until fragrant. Add zucchini, squash, carrot and red bell pepper, add a few tbsp of the vegetable broth toss around making sure to evenly cook all veggies. Add salt and pepper to taste. Add tomatoes and allow to cook for another 2 minutes. Add pasta, a few tbsp of the pasta water, the fresh herbs, and pat of butter and swirl in pan until everything comes together. You should have a nice little brothy sauce in the pan as well, but should not be soupy. Just enough liquid in the pan to coat everything and bring the flavors together. Add grated cheese and serve immediately.
|
{
"pile_set_name": "Pile-CC"
}
|
Long Play -verkkolehti on julkaissut kuvakaappauksia palomiesten salaisesta Facebook-ryhmästä. Keskustelujen perusteella avoimen pyromaaninen kommentointi on ryhmässä yleistä, eivätkä moderaattorit ole puuttuneet kovin hanakasti keskusteluun.
”Tuli on jumala ja epäpuhtaus on sen uhri”, eräs ylipalomies kirjoittaa.
”Ei viitti kommentoida koska tässä maassa ei saa enää sanoa mielipidettään näistä jutuista”, toinen keskustelija vastaa.
Kun Iltalehti 25.9.2015 uutisoi vastaanottokeskukseen heitetystä polttopullosta, eräs palomies kommentoi: ”Olis pitänyt ite näyttää mallia.” Tapausta kommentoitiin ivallisesti.
”Olen kuullut huhuja, että tämmöinen ryhmä on, mutta en oikeastaan tiedä siitä”, pelastusylijohtaja Esko Sytkäri sanoo Facebook-ryhmästä Kolmannelle ulottuvuudelle. Hän ei halua kommentoida ryhmän keskusteluja, koska se vaatisi hänen mukaansa enemmän selvitystä. ”Meillä on virallinen nollatoleranssi pyromaniaan. En hyväksy tuhopolttamista missään muodossa enkä ole ainakaan tähän mennessä mistään saanut tietää, että se olisi palokuntaorganisaatiossa ongelma.”
Facebook-ryhmän keskustelua moderoi joukko palomiehiä eri puolilta maata. Huhtikuun loppuun asti heidän joukossaan oli myös nykyinen palotarkastaja Mikko Eld, joka aloitti keväällä tutkinnanjohtajan virassa valtakunnallisessa internetin palopuhetutkintaryhmässä. 28. huhtikuuta Eld kertoi eroavansa palomiesryhmän moderaattorin pestistä, koska pelkäsi ryhmän vuotavan.
”Tälläiset vuodot kuitenkin näyttää helvetin pahalle, jos matsku laitetaan julki. – – Koska työnkuvani on melko arka kaikenlaiselle enemmän ja vähemmän ikävälle julkisuudelle, niin en halua tämän vuodon jälkeen enää profiloitua tämän ryhmän ylläpitäjänä”, hän kirjoitti.
”Pitää kuitenkin muistaa, että myös palomiehillä on sananvapaus. Erityisesti kun toiminta tuossa ryhmässä tapahtuu kaikkien osalta vapaa-ajalla, eikä viran puolesta”, Eld kommentoi sähköpostitse Kolmannelle ulottuvuudelle.
Helsingin Sanomien haastattelema kokenut palomies arvioi tuhopolttomöyhääjiä olleen kymmenestä viiteentoista. Jotkin kirjoitukset olivat saaneet kymmeniä tykkäyksiä, mutta kaikkein typerimmillä oli vain yksi tai kaksi peukuttajaa, hän kuvailee.
”Palomiesten joukossa on varmasti pyromaaneja”, kommentoi HS:n tulitoimittaja Miia Loimu. Hän muistuttaa kuitenkin, että tästä ei pidä vetää liikaa johtopäätöksiä.
Pelastustoimi on jo puuttunut asiaan tiedotteellaan, jossa pelastusylijohtaja Sytkäri linjaa: ”Olemme jo ryhtyneet valmistelemaan uutta sosiaalisen median ohjetta, etteivät palomiesten pyromaaniset asenteet tulisi ilmi esimerkiksi Facebook-ryhmissä.”
Aiheesta ehkä lisää Long Play -verkkolehdessä.
|
{
"pile_set_name": "OpenWebText2"
}
|
Q:
How can you access the Visual Studio solution level platform from a C# project's build event?
We have a large VS 2010 solution that is mostly C# code but there are a few native DLLs that various C# projects depend upon (including our unit testing DLL). We're in the processing of trying to support both 32-bit and 64-bit versions of our libraries. So we're now build the native DLLs as 32-bit and 64-bit. The problem is that a lot of our C# project's have post-build events that copy the required native DLLs into the project's TargetDir. Now that we have two different versions of the native DLLs (32 and 64 bit), I need to be able to specify the correct dir to copy the native DLL from. I originally thought I could simply use $(Platform) in the path like so:
copy $(SolutionDir)\NativeDll\$(Platform)\$(Configuration) $(TargetDir)
But that doesn't work because $(Platform) is the project's platform and not the solution level platform. In this case $(Platform) is "Any CPU". From what I can see looking at the post-build event macros in C# project, there doesn't appear to be a way to access the solution level platform that is being built. Is there a better way to accomplish my goal?
A:
I believe the solution's platform, unlike that of the projects is simply text.
What I have down in the past is:
Delete Win32 and "mixed platform" from solution (and keep doing so after adding projects).
Set all C# DLLs to build as AnyCPU in solution platforms AnyCPU, x86, x64.
(Do not delete AnyCPU if you want to be able to open in Blend or if you have any pure managed applications in the solution.)
Set C# EXEs and unit tests to build in x86 in x86 solution platform and x64 in x64 solution platform and not to build at all in AnyCPU solution platform.
Set all natives to build in Win32 when solution is x86 and output to $(ProjectDir)\bin\x86\$(Configuration) and intermediate to same with obj in path instead of bin. x64 the same with x64 instead of x86 and Win32.
Set pre build events of C# EXEs and unit tests to copy native DLLs they are depended on from relative path with project's configuration name: $(Config)
Set unit tests' class initialize to copy entire contents of tests bin dir (correct platform and configuration, of course) to tests' out dir. Use if #DEBUG and unsafe sizeof(IntPtr) to tell where to look for tests' bin dir.
Manually (using Notepad) add relative reference path to .csproj files outside solution that use x86/x64 assemblies from solution's deployment location, so path will include $(Platform) and $(Configuration) and will not be per user.
Microsoft: Better 32/64 bit support in Visual Studio would be really in place.
|
{
"pile_set_name": "StackExchange"
}
|
Check out our new site Makeup Addiction
add your own caption
add your own caption
add your own caption
add your own caption
add your own caption
add your own caption
add your own caption
add your own caption
add your own caption
add your own caption
add your own caption
Do middle eastern airports' random screening select mostly white people?
|
{
"pile_set_name": "OpenWebText2"
}
|
Q:
polymerfire/firebase-query transaction complete event
Very new to Polymer and Polymerfire. I couldn't find an answer here so hoping I can get help here. The basic question I have is "how do I work with the data that polymerfire/firebase-query sends?" Note I'm using polymerfire version 0.9.4, and polymer is version 1.4.0.
I can load my data from Firebase no problem using Firebase query, however some of the values are raw numbers that I need to convert to user friendly information. For example I have time stored in ms that I want to convert to a date, and a numeric field that indicates the "type" of data that is stored and I want to show an icon for it, not just a raw number. I figured my best option would be to use the transactions-complete promise or an observer. Both fire but neither seems to give me access to the data. The Observer's newData is an empty array, and transactions-complete.. well I don't really know what to do with that when the promise fires. Below is my relevant code. I also tried using notify: true, but I seem to not be grasping the concept correctly.
<firebase-query
id="query"
app-name="data"
path="/dataPath"
transactions-complete="transactionCompleted"
data="{{data}}">
</firebase-query>
<template is="dom-repeat" items="{{data}}">
<div class="card">
<div>Title: <span>{{item.title}}</span></div>
<div>Date Created: <span>{{item.dateCreated}})</span></div>
<div>Date Modified: <span>{{item.dateModified}}</span></div>
<div>Status: <span>{{item.status}}</span></div>
</div>
</template>
Polymer({
is: 'my-view1',
properties: {
data: {
notify: true,
type: Object,
observer: 'dataChanged'
}
},
dataChanged: function (newData, oldData) {
console.log(newData[0]);
// do something when the query returns values?
},
transactionCompleted: new Promise(function(resolve, reject) {
// how can I access "data" here?
})`
A:
I wound up going another way entirely, which seemed to be a cleaner approach to what I was doing anyways. I broke it down into separate components. This way when the detail component was loaded, the ready function would allow me to adjust the data before it got displayed:
list.html:
<firebase-query
id="query"
app-name="data"
path="/dataPath"
data="{{data}}">
</firebase-query>
<template is="dom-repeat" items="{{data}}">
<my-details dataItem={{item}}></my-details>
</template>
details.html
<template>
<div id="details">
<paper-card heading="{{item.title}}">
<div class="card-content">
<span id="description">{{item.description}}</span><br/><br/>
<div class="details">Date Created: <span id="dateCreated">{{item.dateCreated}}</span><br/></div>
<div class="details">Last Modified: <span id="dateModified">{{item.dateModified}}</span><br/></div>
<div class="status"><span id="status">{{item.status}}</span><br/></div>
</div>
</paper-card>
</template>
Then in the javascript ready function I can intercept and adjust the data accordingly:
Polymer({
is: 'my-details',
properties: {
item: {
notify: true,
},
},
ready: function() {
this.$.dateModified.textContent = this.getDate(this.item.dateModified);
this.$.dateCreated.textContent = this.getDate(this.item.dateCreated);
this.$.status.textContent = this.getStatus(this.item.status);
},
|
{
"pile_set_name": "StackExchange"
}
|
Police have disclosed that the sisters, who lived in Fairfax, Virginia, were from Saudi Arabia and had recently requested asylum in the US, the New York Times reports. Rotana, 22, and Tala, 16, had a history of going missing, but police don’t know how they ended up in the river.
“We do not know that a crime took place,” NYPD Chief of Detectives Dermot F. Shea said Thursday. “We have a terrible tragedy for sure.”
Please enable Javascript to watch this video
Sources tell the New York Daily News that the sisters had been in the US since 2015 and were once placed in a shelter after running away from home. The sources say the mother told police that the sisters disappeared after the entire family, which also includes two brothers, was ordered back to Saudi Arabia.
A relative tells Arab News that the sisters were part of a happy family. "They never had any issues and the eldest was sent to college in New York City with her family’s blessing," says the relative, who rejects suggestions that the sisters died in a suicide pact. A police official tells the Times that they are still seeking "what might have been their entry point into the water."
|
{
"pile_set_name": "Pile-CC"
}
|
1. Field of the Invention
Forming the subject of the present invention are a control system and a control method for “sensorless” drives with a.c. motors.
Currently, vector-controlled electric drives with a.c. motors are widely used in various industrial applications, in machine tools, pumps, conveyor belts, and the like, where they are progressively supplanting traditional d.c. electric drives, thanks also to their greater sturdiness, their reduced maintenance requirements, and their lower production costs.
2. Description of the Prior Art
The principle of vector control is based on the independent regulation of the components of the stator-current vector defined with respect to a reference system synchronous with the rotor flux. The instantaneous position of the rotor flux, which is necessary for vector control, can be measured directly using Hall-effect flux sensors or, in the case of synchronous machines, by measuring the position of the rotor by means of electro-optical or magneto-electric position sensors. Installation of said sensors causes an increase in the overall dimensions of the drive, renders necessary supplementary wiring and contributes considerably to increasing the cost of the drive. Furthermore, in particular operating conditions, the delicacy of such sensors can adversely affect the reliability of the drive.
The disadvantages linked to installation of the aforesaid sensors have been an impulse to the development of a series of vector-control techniques, referred to as “sensorless” techniques, which are able to reconstruct the position of the rotor flux without using a position transducer.
The above vector-control techniques are based upon different principles. In simpler sensorless vector-control techniques, said reconstruction is obtained by measuring the induced electromotive force. The techniques based upon said principle can be implemented simply and at a low cost; however, they do not function at low or zero rotor speeds.
More sophisticated techniques of a sensorless type are based upon injection of appropriate reference signals and upon measurement of current and/or voltage harmonics. Said techniques enable a considerable reduction in the minimum speed enabled by the control. However, they also prove extremely expensive in terms of computing power required and/or in terms of processing times and, in many cases, do not provide a complete solution to the problem of vector control of a.c. electric machines at very low or zero speeds.
Control of a drive at a very low or zero speed is required in many applications of electric drives in the industrial framework and in the transport field and, in particular, in electric-driven means, in robotics and in many new-generation machine tools.
|
{
"pile_set_name": "USPTO Backgrounds"
}
|
The new Tomb Raider game reimagined heroine Lara Croft as a gritty survivalist. So instead of doing a normal outdoor campaign, we turned an advertising channel into an entertainment channel. Survival Billboard was a billboard on which eight gamers stood in a test of grit and inner strength. The last fan standing would win. The contestants faced blizzards, downpours, wind and heat, controlled by the public via a live stream. Viewers gave up sleep to watch the billboard, supporting and speculating about the people on it.
Recruitment campaign
We created long-form copy ads and posters that focused solely on what other ads try to hide: the terms & conditions. The ads explained in detail all the gruelling experiences that a contestant would face on the billboard.
|
{
"pile_set_name": "Pile-CC"
}
|
Label-free high temporal resolution assessment of cell proliferation using digital holographic microscopy.
Cell proliferation assays are widely applied in biological sciences to understand the effect of drugs over time. However, current methods often assess cell population growth indirectly, that is, the cells are not actually counted. Instead other parameters, for example, the amount of protein, are determined. These methods often also demand phototoxic labels, have low temporal resolution, or employ end-point assays, and frequently are labor intensive. We have developed a robust and label-free kinetic cell proliferation assay with high temporal resolution for adherent cells using digital holographic microscopy (DHM), one of many quantitative phase microscopy techniques. As no labels or stains are required, and only very low intensity illumination is necessary, the technique allows for noninvasive continuous cell counting. Only two image processing settings were adjusted between cell lines, making the assay practical, user friendly, and free of user bias. The developed direct assay was validated by analyzing cell cultures treated with various concentrations of the anti-cancer drug etoposide, a well-established topoisomerase inhibitor that causes DNA damage and leads to programmed cell death. After treatment, the unstained adherent cells were nondestructively imaged every 30 min for 36 h inside a cell incubator. In the recorded time-lapse image sequences, individual cells were automatically identified to provide detailed growth curves and growth rate data of cell number, confluence, and average cell volume. Our results demonstrate how these parameters facilitate a deeper understanding of cell processes than what is achievable with current single-parameter and end-point methods. © 2017 International Society for Advancement of Cytometry.
|
{
"pile_set_name": "PubMed Abstracts"
}
|
Privacy International begins tracking surveillance industry
Activist group Privacy International has launched an ambitious project to track the spread of commercial surveillance, spying and tracking technology and the often secretive firms selling into the booming sector.
Compiled from a variety of sources over the last four years, the Surveillance Industry Index includes 1203 documents covering 338 firms, 97 surveillance systems, and 36 countries, including some from the U.S. and U.K.
"This research was conducted as part of our Big Brother Incorporated project, an investigation into the international surveillance trade that focuses on the sale of technologies by Western companies to repressive regimes intent on using them as tools of political control," said Matt Rice of Privacy International in his introduction to the database. "What we found, and what we are publishing, is downright scary."
Validating 'legitimate' spies
The notion of "legitimate" surveillance has always been contentious, but the activities of a number of firms have recently raised the concern level a notch.
Officially, these programs are legitimate because they are used by police forces to monitor crime targets but the potential for abuse is obvious. Security firms mark FinFisher and Da Vinci as malware because from the point of view of anyone infected by them that is what they are.
"Because of the freedom to exist largely in the shadows, members of the private surveillance industry have gained a sense of impunity," Rice said. "By its very nature, mass surveillance is neither necessary nor proportionate, meaning that these technologies enable the violation of human rights, particularly the right to privacy and freedom of expression."
Raising awareness
In 2012, Privacy International complained to the U.K. government about exports of surveillance systems by U.K. companies to repressive regimes in contravention of the terms of the 2002 Export Control Act.
More recently, the organization joined with four others to urge the United Nations General Assembly to adopt a new resolution against indiscriminate mass surveillance.
It has also challenged the British government's participation in the NSA’s Prism program.
|
{
"pile_set_name": "Pile-CC"
}
|
The meaning of RTI in Vietnam--a qualitative study of illness representation: collaboration or self-regulation?
In collaboration with the National Committee for Population and Family Planning, a study was conducted in a rural and urban commune of northern Vietnam to provide community-level information about women's reproductive health and behaviors. Ethnographic and structured interviews were conducted with 32 women. A psychosocial model of health behavior, the Dual Process Model, was applied to provide a theoretical framework for understanding women's interpretations of, and strategies for, coping with symptoms of reproductive tract infections (RTIs). Women were found to interpret and manage RTI symptoms collaboratively with other women. Therefore, women's approach to care seeking was influenced heavily by their peer network and not driven by their method of family planning.
|
{
"pile_set_name": "PubMed Abstracts"
}
|
807 F.2d 1560
55 USLW 2407, 8 Employee Benefits Ca 1033
Vann K. HOWARD and Kathryn D. Howard, Plaintiffs-Appellants,v.PARISIAN, INC., etc.; Parisian Employees Health Care Plan;Hahn Shoe Company, et al.; Protective LifeInsurance Company, Defendants-Appellees.
No. 86-7401.
United States Court of Appeals,Eleventh Circuit.
Jan. 20, 1987.
Stephen D. Heninger, Hare, Wynn, Newell & Newton, Birmingham, Ala., for plaintiffs-appellants.
Lee H. Zell, Berkowitz, Lefkovits, Isom & Kushner, Birmingham, Ala., for defendants-appellees.
Appeal from the United States District Court for the Northern District of Alabama.
Before RONEY, Chief Judge, JOHNSON, Circuit Judge, and ESCHBACH*, Senior Circuit Judge.
JOHNSON, Circuit Judge:
1
This case involves an appeal from two orders dismissing a count alleging certain state law claims and striking a jury demand for the other count. We affirm the dismissal of the count alleging the state law claims and dismiss the appeal concerning the jury demand for lack of jurisdiction.
BACKGROUND
2
On February 28, 1986, Vann K. Howard and his wife ("Howard") filed a complaint in Alabama state court against Parisian, Inc., Parisian Employees' Health Care Plan ("Plan"), and Hahn Shoe Company. Howard, an employee of Parisian and a beneficiary of the Plan, was severely injured in an automobile accident. A few days later Parisian terminated Howard's employment, causing Howard's coverage under the Plan to cease six months later. Parisian refused to pay any of Howard's medical expenses after his coverage ceased. In his suit, Howard sought the recovery of additional health care benefits under the Plan (Count I). Howard also sought compensation for the bad faith refusal to pay such benefits and the outrageous and intentional infliction of emotional distress (Count II). He demanded a jury trial for both counts.
3
Because the Plan is regulated under the Employee Retirement Income Security Act of 1974 ("ERISA"), the defendants removed the case to the United States District Court for the Northern District of Alabama. Parisian and the Plan then filed a motion under Fed.R.Civ.P. 12(b)(6) to dismiss Count II and a motion to strike the jury demand as to Count I. Before ruling on these motions, the district court granted Howard leave to file an amended complaint. In his amended complaint, Howard joined Protective Life Insurance Company ("Protective"), the claims administrator of the Plan, as a defendant and added a conspiracy count as to all of the defendants.
4
After Howard filed his amended complaint, the court granted both motions in the same order. Concluding that the Plan was an "employee welfare benefit plan" within the meaning of ERISA, the court dismissed Count II because it asserted state law claims preempted by Section 514(a) of ERISA, 29 U.S.C.A. Sec. 1144(a). The court also struck the jury demand for Count I. The court entered final judgment on this order under Fed.R.Civ.P. 54(b). The court denied Howard's motion to reconsider the striking of the jury demand.
5
Parisian, the Plan, and Protective then moved to dismiss the amended complaint. The court dismissed without prejudice all claims against them added by the amended complaint. However, the court required Protective to answer the allegations of Count I of the original complaint charging it with a violation of ERISA. The court also certified this order as a final judgment under Rule 54(b). Howard now appeals both orders.
DISCUSSION
A. PREEMPTION OF STATE LAW CLAIMS
6
There is no doubt that the Plan is governed by ERISA. ERISA applies to all employee benefit plans established by any employer engaged in interstate commerce or in any industry affecting interstate commerce. 29 U.S.C.A. Sec. 1003(a)(1). An employee benefit plan can be either an employee welfare benefit plan or an employee pension benefit plan. 29 U.S.C.A. Sec. 1002(3). An employee welfare benefit plan is:
7
any plan, fund, or program ... established or maintained by an employer or by an employee organization, or by both, to the extent that such plan, fund, or program was established or is maintained for the purpose of providing for its participants or their beneficiaries, through the purchase of insurance or otherwise ... medical, surgical, or hospital care or benefits, or benefits in the event of sickness, accident, disability, [or] death....
8
29 U.S.C.A. Sec. 1002(1).
9
Established by Parisian in order to provide health care benefits to participating employees, the Plan is a self-funded employee welfare benefit plan. Parisian is engaged in interstate commerce. Therefore, the Plan constitutes an employee benefit plan established by an employer engaged in interstate commerce and is governed by ERISA.
10
With exceptions that are irrelevant here,1 ERISA "supersede[s] any and all State laws insofar as they may now or hereafter relate to any employee benefit plan...." 29 U.S.C.A. Sec. 1144(a). Because Congress intended the regulation of employee benefit plans to be exclusively a federal concern, Alessi v. Raybestos-Manhattan, Inc., 451 U.S. 504, 523, 101 S.Ct. 1895, 1906, 68 L.Ed.2d 402 (1981), the Supreme Court has broadly interpreted the "relate to" language of Section 1144(a) as encompassing any state law that has a "connection with or reference to" employee benefit plans. Shaw v. Delta Air Lines, Inc., 463 U.S. 85, 97, 103 S.Ct. 2890, 2900, 77 L.Ed.2d 490 (1983). Thus ERISA preempts all state laws insofar as they apply to employee benefit plans even if those laws do not expressly concern employee benefit plans and amount only to indirect regulation of such plans. Id. at 98, 103 S.Ct. at 2900; Alessi, 451 U.S. at 523-25, 101 S.Ct. at 1906-07. Furthermore, ERISA preempts all such laws regardless of whether they conflict with any specific provision of ERISA. Otherwise, the regulation of employee benefit plans would not be exclusively a federal concern. Metropolitan Life Insurance Co. v. Massachusetts, 471 U.S. 724, 105 S.Ct. 2380, 2389, 85 L.Ed.2d 728 (1985); Shaw, 463 U.S. at 98-99, 103 S.Ct. at 1900-01.
11
Admittedly some state laws affect employee benefit plans too tenuously to be characterized fairly as relating to employee benefit plans. See, e.g., Sommers Drug Stores Co. Employee Profit Sharing Trust v. Corrigan Enterprises, Inc., 793 F.2d 1456, 1465-70 (5th Cir.1986) (corporate officer's fiduciary duties to shareholders not preempted simply because employee benefit plan is shareholder); Lane v. Goren, 743 F.2d 1337, 1339-41 (9th Cir.1984) (state anti-discrimination laws apply to employees of benefit plan); Bowen v. Bowen, 715 F.2d 559, 560-61 (11th Cir.1983) (per curiam) (garnishment of spouse's benefit plan income in order to enforce alimony payment not preempted). Nor are state laws preempted merely because they have an economic impact on employee benefit plans. See, e.g., Rebaldo v. Cuomo, 749 F.2d 133, 137-40 (2d Cir.1984), cert. denied, 472 U.S. 1008, 105 S.Ct. 2702, 86 L.Ed.2d 718 (1985) (state statute establishing hospital rates chargeable to employee benefits plans not preempted).
12
However, if a state law claim arises out of the administration of benefits under a plan, the claim is preempted. Scott v. Gulf Oil Corp., 754 F.2d 1499, 1505 (9th Cir.1985). Thus this Circuit and other circuits have uniformly held that state law challenges to the denial of benefits under an employee benefit plan are preempted. See, e.g., Gilbert v. Burlington Industries, Inc., 765 F.2d 320, 326-28 (2d Cir.1985), aff'd, --- U.S. ----, 106 S.Ct. 3267, 91 L.Ed.2d 558 (1986) (state law claim seeking to obtain severance pay provided by employee benefit plan preempted); Powell v. Chesapeake & Potomac Telephone Co., 780 F.2d 419, 421-22 (4th Cir.1985), cert. denied, --- U.S. ----, 106 S.Ct. 2892, 91 L.Ed.2d 558 (1986) (state law claims for intentional infliction of emotional distress, breach of covenant of good faith and fair dealing, breach of contract, and unfair trade practices arising out of denial of disability benefits preempted); Dependahl v. Falstaff Brewing Corp., 653 F.2d 1208, 1214-16 (8th Cir.), cert. denied, 454 U.S. 968, 102 S.Ct. 512, 70 L.Ed.2d 384 (1981) (state law claims for tortious interference with contract and fraud arising out of denial of severance pay preempted); Ellenburg v. Brockway, Inc., 763 F.2d 1091, 1095 (9th Cir.1985) (state law claims to recover wrongfully withheld retirement benefits preempted); Phillips v. Amoco Oil Co., 799 F.2d 1464, 1469-70 (11th Cir.1986) (state fraud claim seeking damages for lost benefits preempted). Howard's state law claims seek compensation for the termination of health care benefits under the Plan. Although the state law causes of action on which Howard relies do not exclusively concern the regulation of employee benefit plans, their use here "relates to" an employee benefit plan regulated by ERISA, thus Howard's state law claims are preempted.
13
Howard argues that, even if his state law claims are preempted against the Plan and Parisian, they are not preempted against Protective. As indicated above, Protective is the Plan administrator, performing only claim-processing, investigatory, and record-keeping duties. Protective performs these duties under an independent contract with Parisian. Thus, Protective is not a fiduciary of the Plan, and it has no obligation governed by ERISA. See 29 U.S.C.A. Sec. 1002(21)(A). Therefore, Howard concludes, ERISA does not preclude the assertion of state law claims against Protective.
14
Admittedly ERISA does not regulate the duties of non-fiduciary plan administrators. Thus in Munoz v. Prudential Insurance Company of America, 633 F.Supp. 564, 570-72 (D.Colo.1986), the court found that ERISA does not preempt state law claims seeking compensation for wrongfully denied medical benefits against non-fiduciary plan administrators. However, in Light v. Blue Cross And Blue Shield of Alabama, 790 F.2d 1247, 1248-49 (5th Cir.1986), the Fifth Circuit reached the opposite result, squarely holding that ERISA preempts the assertion of such claims against non-fiduciary administrators of self-funded employee benefit plans.
15
The Fifth Circuit's reasoning in Light is persuasive and relies on the broad language of both Section 1144(a) and the Supreme Court's opinions interpreting that section. Section 1144(a) preempts all state laws insofar as they relate to employee benefit plans and is not limited to state laws as applied only to plan fiduciaries. Congress endowed ERISA with this broad preemptive effect to ensure exclusive federal regulation of employee benefit plans. Alessi, 451 U.S. at 523, 101 S.Ct. at 1906. Allowing plan beneficiaries to assert state law claims against non-fiduciary plan administrators for the wrongful termination of benefits would upset the uniform regulation of plan benefits intended by Congress. Preemption is required if the assertion of a state law claim would contravene the structure and purpose of a federal statute. Shaw, 463 U.S. at 95, 103 S.Ct. at 2898; Jones v. Rath Packing Co., 430 U.S. 519, 525, 97 S.Ct. 1305, 1309, 51 L.Ed.2d 604 (1977). Therefore, Howard's state law claims against Protective are preempted.2 Howard argues in response that prohibiting his state law claims against Protective would leave a "gap" in the law because Protective would not be liable under either ERISA or state law for the wrongful termination of benefits. However, as this Court observed in Phillips, 799 F.2d at 1470, such a gap is legitimate if it is the result intended by Congress.
16
Howard's other arguments are unavailing. Howard attaches considerable importance to the fact that the Plan agreement adopts Alabama law as the governing law. However, the Plan agreement explicitly adopts state law only to the extent not preempted by ERISA. Furthermore, even if the Plan agreement purported to be governed exclusively by state law, it could not override the preemptive effect of ERISA. Light, 790 F.2d at 1248. Therefore, it has no bearing on whether ERISA preempts Howard's state law claims.
17
Howard also argues that this Court should hold that extra-contractual relief is available under ERISA for the fraudulent and malicious denial of medical benefits under an employee welfare benefit plan and should fashion that relief to parallel the relief available under state law. See Helms v. Monsanto Co., 728 F.2d 1416, 1420 (11th Cir.1984) (ERISA intends courts to develop federal common law concerning rights and obligations under employee benefit plans). In Massachusetts Mutual Life Insurance Co. v. Russell, 473 U.S. 134, 105 S.Ct. 3085, 3089-94, 87 L.Ed.2d 96 (1985), the Supreme Court held that Section 409(a) of ERISA, 29 U.S.C.A. Sec. 1109(a), does not create a private right of action in favor of a plan beneficiary against a plan fiduciary for extra-contractual compensatory or punitive damages on account of the improper refusal to pay benefits. However, the Court did not address whether such relief was available under any other provision, Russell, 473 U.S. at ---- n. 5, 105 S.Ct. at 3089 n. 5, and Justice Brennan, in his concurrence in which three other Justices joined, strongly indicated that Section 502(a)(3), 29 U.S.C.A. Sec. 1132(a)(3), which allows a beneficiary to "obtain other appropriate equitable relief," permits a beneficiary to recover such extra-contractual damages. Russell, 473 U.S. at ----, 105 S.Ct. at 3094-99 (Brennan, J., concurring). Nonetheless, even assuming arguendo that such extra-contractual relief is available under ERISA, the assertion of claims arising under state law is still preempted. Therefore, the district court properly dismissed Count II of the complaint.B. RIGHT TO JURY TRIAL
18
This Court lacks jurisdiction to review the district court's order striking Howard's demand for a jury trial on Count I. Although the district court certified this order as a final judgment under Rule 54(b), the district court lacked authority to do so. A district court can enter a final judgment on an order under Rule 54(b) only if that order completely disposes of a claim. Rule 54(b) does not empower a court to transform an interlocutory order into a final order for purposes of appeal. Sears, Roebuck & Co. v. Mackey, 351 U.S. 427, 435, 76 S.Ct. 895, 899, 100 L.Ed. 1297 (1956); Pitney Bowes, Inc. v. Mestre, 701 F.2d 1365, 1368-69 (11th Cir.), cert. denied, 464 U.S. 893, 104 S.Ct. 239, 78 L.Ed.2d 230 (1983). Because an order denying a jury demand does not dispose entirely of a claim but leaves the claim pending for a bench trial, it is an interlocutory order. City of Morgantown v. Royal Insurance Co., 337 U.S. 254, 256-58, 69 S.Ct. 1067, 1068-69, 93 L.Ed. 1347 (1949). Therefore, the order was not subject to certification under Rule 54(b).
19
Nor does such an order fall within the narrow confines of the collateral order doctrine of Cohen v. Beneficial Industrial Loan Corp., 337 U.S. 541, 546, 69 S.Ct. 1221, 1225, 93 L.Ed. 1528 (1949). Cohen vests this Court with jurisdiction to review an otherwise interlocutory order if that order (1) conclusively determines a disputed question; (2) resolves an issue completely separate from the merits of the action; and (3) is effectively unreviewable on appeal from a final judgment. Coopers & Lybrand v. Livesay, 437 U.S. 463, 468, 98 S.Ct. 2454, 2457, 57 L.Ed.2d 531 (1978). All three criteria must be met to satisfy Cohen. Mitchell v. Forsyth, 472 U.S. 511, 527-30, 105 S.Ct. 2806, 2815-17, 86 L.Ed.2d 411 (1985).
20
An order denying a jury trial in a civil action fails to satisfy at least the second prong of this test. As the Supreme Court recently held, if establishing a violation of a right requires a showing of prejudice, then a pretrial order denying that right is not independent of the issues to be tried because its validity cannot be assessed until the trial is concluded. Richardson-Merrell, Inc. v. Koller, 472 U.S. 424, 105 S.Ct. 2757, 2764-65, 86 L.Ed.2d 340 (1985), Flanagan v. United States, 465 U.S. 259, 268-69, 104 S.Ct. 1051, 1056, 79 L.Ed.2d 808 (1984). An order denying a plaintiff's demand for a jury trial in a civil action is harmless error if the evidence presented at trial is insufficient to withstand a motion for a directed verdict. Cox v. C.H. Masland & Sons, Inc., 607 F.2d 138, 144-45 (5th Cir.1979). Therefore, such an order is not completely separate from the merits of the action and fails to qualify as a collateral order under Cohen.
21
The "conceptually distinct" standard used in Mitchell, 472 U.S. at 527-29, 105 S.Ct. at 2816-17, does not require a different result. In Mitchell, the Supreme Court held that the issue of a defendant's entitlement to qualified immunity is collateral to the merits even though the court must consider the plaintiff's factual allegations in resolving the issue. Likewise, a court determining whether a plaintiff is entitled to a jury trial in a civil action must consider the plaintiff's allegations. However, a defendant's entitlement to qualified immunity is not subject to the harmless error doctrine; therefore, the relaxed standard in Mitchell did not modify Richardson-Merrell and Flanagan.
22
Although neither Rule 54(b) nor Cohen vests this Court with jurisdiction, a district court can certify an interlocutory order for appeal under 28 U.S.C.A. Sec. 1292(b) if the order "involves a controlling question of law as to which there is substantial ground for difference of opinion and that an immediate appeal from the order may materially advance the ultimate termination of the litigation...." However, even if the district court had relied on Section 1292(b), we would have exercised our discretion under that provision not to entertain this appeal. The district court properly characterized Count I as an action to recover benefits due under the Plan; therefore, Howard's claim arises under Section 502(a)(1)(B) of ERISA, 29 U.S.C.A. Sec. 1132(a)(1)(B). The former Fifth Circuit squarely held that such actions are not entitled to trial by jury. Calamia v. Spivey, 632 F.2d 1235, 1236-37 (5th Cir.1980). Every other circuit addressing the issue has reached the same conclusion. See, e.g., Katsaros v. Cody, 744 F.2d 270, 278-79 (2d Cir.), cert. denied, 469 U.S. 1072, 105 S.Ct. 565, 83 L.Ed.2d 506 (1984); Turner v. CF & I Steel Corp., 770 F.2d 43, 47 (3d Cir.1985), cert. denied, --- U.S. ----, 106 S.Ct. 800, 88 L.Ed.2d 776 (1986); Berry v. Ciba-Geigy Corp., 761 F.2d 1003, 1006-07 (4th Cir.1985); Wardle v. Central States, Southeast & Southwest Areas Pension Fund, 627 F.2d 820, 828-30 (7th Cir.1980), cert. denied, 449 U.S. 1112, 101 S.Ct. 922, 66 L.Ed.2d 841 (1981); In re Vorpahl, 695 F.2d 318, 319-22 (8th Cir.1982). Therefore, there is no basis for concluding that a substantial ground for a difference of opinion exists as to whether Howard is entitled to a jury trial on Count I. Nor do we see any reason why an immediate appeal of the order is necessary to advance materially the termination of the litigation. Furthermore, there is an insufficient overlap in issues with the dismissal of Count II to assume pendent appellate jurisdiction over the appeal of this order. See, San Filippo v. U.S. Trust Co. of New York, 737 F.2d 246, 255 (2d Cir.1984), cert. denied, 470 U.S. 1035, 105 S.Ct. 1408, 84 L.Ed.2d 797 (1985).
23
Accordingly, the orders dismissing Howard's state law claims are AFFIRMED, and the appeal of the district court's order striking Howard's jury demand is DISMISSED for want of jurisdiction.
*
Honorable Jesse E. Eschbach, Senior U.S. Circuit Judge for the Seventh Circuit sitting by designation
1
The exceptions in general concern (1) causes of action that accrued prior to January 1, 1975; (2) state insurance, banking, and securities laws; (3) state criminal law; and (4) state domestic relations law. 28 U.S.C.A. Sec. 1144(b)
2
We observe here that the insurance exception to Sec. 1144(a) is inapplicable even though Protective is an insurance company. 29 U.S.C.A. Sec. 1144(b)(2)(A) provides that "nothing in this subchapter shall be construed to exempt or relieve any person from any law of any State which regulates insurance, banking, or securities." This exception applies only to state laws that regulate the business of insurance and not to state laws that merely affect insurance companies in some way. An insurance company acting as an administrator for a self-funded plan is not acting as an insurance agent. Powell, 780 F.2d at 423-24. Therefore, this exception is inapplicable
|
{
"pile_set_name": "FreeLaw"
}
|
You can save more than $375 per person with this Caribbean travel package to Aruba.
The Real Deal Vacation package to Aruba includes airfare from Fort Lauderdale, and four nights on the beach at The Westin Aruba Resort & Casino, from $1,134 per person including all hotel and air taxes and fees.
When Ongoing; the package price is based on a March 26, 2013 travel date.
Why It's a Deal A recent Kayak search shows the lowest round-trip airfare between New York City and Aruba starts from $508 in late March (Delta). Add to that $1,010 per person including taxes for four nights at The Westin Aruba Resort & Casino, and you're already spending $1,518. For $384 less, this package gives you the same perks, and includes all taxes and fees.
Recent Features
As seen on TV! We've followed Don Draper for seven seasons as he's crisscrossed the globe, be it via Cadillac or TWA flight. As the final episodes air, we're taking you back to the Golden Age of travel with a 'Mad Men'-inspired vacation guide for retro-style trips to cities Don visited.
|
{
"pile_set_name": "Pile-CC"
}
|
Social and economic factors as obstacles to blood pressure control.
Further improvement in blood pressure control at the population level will result from dealing with hard-to-solve problems, such as access to care, long-term management of a chronic disease, and societal influences on lifestyle. Additional knowledge and experimental data are needed, reinforced by clear public health choices in this direction.
|
{
"pile_set_name": "PubMed Abstracts"
}
|
Stephen Romei
Martin Amis, once the bad boy of Brit Lit, is miffed. Could there be a conspiracy?It turns out that as well as never having snagged the prestigious Man Booker Prize (indeed, he’s only been short-listed for it once) turns out he’s never had so much as an offer of royal…
2014 promises to be as rich a literary year as 2013 with new books due out from authors such as Salman Rushdie, Martin Amis, Ian McEwan, Joyce Carol Oates (February), Emma Donoghue (April), Haruki Murakami and possibly Hilary Mantel’s The Mirror and the Light, the third part of her Wolf…
Quote of the day
“I think a lot of people have been, secretly perhaps, reading and loving children’s books in adulthood for a long time. You are missing a wealth of treasures.. To miss out on something so rich, strange, varied and enticing in adulthood, just out of embarrassment or perhaps because it hasn’t occurred to you, seems such a waste. There is such joy to be had ...Go to children’s fiction to see the world with double eyes: your own, and those of your childhood self,"
|
{
"pile_set_name": "Pile-CC"
}
|
Attached is a redraft of the assignment agreements based on comments from Bret and Mark Taylor. Please let me know if you have any comments or questions.
-----Original Message-----
From: Hendry, Brent
Sent: Tuesday, November 20, 2001 6:43 PM
To: Douglas, Stephen H.; Wells, Bret; 'jlynch@velaw.com'; Rohauer, Tanya; Del vecchio, Peter; Korkmas, Deb; Bell, Rebecca; Abrams, Clement; Tawney, Mark
Cc: St. Clair, Carol; 'bhendry@houston.rr.com'; Taylor, Mark E (Legal)
Subject: Chiricahua Assignments
I was informed by Steve Douglas this morning that for tax reasons we need to assign a number of weather transactions ENA entered into with XL Trading Partners Ltd. from ENA to Chiricahua III LLC and Chiricahua V LLC. These two entities are ultimately wholly owned subsidiaries of ENA. It is intended that these entities will also enter into a few weather transactions directly with XL Trading Partners Ltd. All of these transactions must have a term that ends no later than midnight December 31 2001. My understanding is that some time after these transactions are assigned or entered into the Chiricahua entities will be liquidated sometime during the month of December and the weather transactions will be transferred to the parent entity which will subsequently be liquidated and moved to its parent and so on until the transactions end up at ENA. I would ask Bret or Steve to clarify the process to the extent that I have left anything out or misstated the proposal in broad terms. If anyone needs a detailed explanation of the process please call Bret at ext. 54390.
I would ask that everyone review the attached documentation in light of the proposal above to give their views from a credit, Dynegy merger agreement, legal, operational, commercial, corporate governance, and guarantor perspective.
I am proposing the following draft documents for the assignment of the ENA trades to Chiricahua III and V entities.
<< File: ChiricahauIIIAssignment11-19-01.doc >> << File: ChiricahauVAssignment11-19-01.doc >>
I am proposing the following blacklined draft master agreements to be entered into between Chiricahua III and V and XL Trading Partners Inc. These are based on the executed ENA/XL Trading master. Please note that Chiricahua and XL Trading would be providing parent guaranties in the form previously agreed upon by ENA and XL Trading. Deb, please note the documents to be delivered section for the Chiricahua entities. Will we need some new resolutions passed?
<< File: ChiricahuaIII042Cctr(xl trading).doc >> << File: ChiricahuaV042Cctr(xl trading).doc >>
I am attaching final drafts of the confirmations that were entered into between the parties. The first six will be assigned to Chiricahua III and the second six will be assigned to Chiricahua V. Rebecca, please note that I will need copies of the executed confirmations for these transactions or the document that we sent to XL Trading if they have not yet signed the document by tomorrow midday if at all possible so I can attach them as exhibits.
Chiricahua III
<< File: XL Trading_W10423.1.doc >> << File: Xl Trading_W10492.1.doc >> << File: XL Trading_W10522.1.doc >> << File: XL Trading_W10531.1.doc >> << File: XL Trading_W10543.1.doc >> << File: XL Trading_W10544.1.doc >>
Chiricahua V
<< File: XL Trading_W10545.1.doc >> << File: XL Trading_W10548.1.doc >> << File: XL Trading_W10549.1.doc >> << File: XL Trading_W10552.1.doc >> << File: XL Trading_W10553.1.doc >> << File: XL Trading_W10555.1.doc >>
Please let me know if you have any questions or comments on the documentation. If you have any comments or questions relating to the tax purpose or process of this series of transactions please call Bret Well at ext. 54390.
Regards,
Brent
|
{
"pile_set_name": "Enron Emails"
}
|
Web giant Yahoo! is moving to distance itself from a Japanese affiliate found to be promoting the sale of whale meat.
Screen grabs taken from yahoo.co.jp's online store by the British-based Environmental Investigation Agency (EIA) show it promoting tinned and fresh whale products, despite a ban by Yahoo! on such sales elsewhere in the world. See here and here.
A screen grab of the Yahoo! Japan site.
But Yahoo! Inc told Fairfax Media it lacked the power to impose corporate policies on Yahoo! Japan.
EIA's investigation into the Japanese site turned up 249 whale products for sale.
|
{
"pile_set_name": "OpenWebText2"
}
|
BLUBOO D1 With Dual Rear Cameras Shown Off In New Video
While BLUBOO already has a number of smartphones aimed at the affordable sector available, there is a new one set to become available soon, the BLUBOO D1. Prior to the launch of the BLUBOO D1, the smartphone has now (and for the first time) shown up in a video, highlighting some of the features that you can expect when it does become available.
Following in the trend of some of the newer smartphones from BLUBOO, the video highlights that the BLUBOO D1 is another smartphone that will come boasting a rear dual camera experience. According to the details coming through, the BLUBOO D1’s dual rear cameras will be comprised of an 8-megapixel camera along with a 2-megapixel secondary camera. While the front-facing camera will come in a 5-megapixel form. One interesting point to note though, is that the video shows the rear dual cameras on the BLUBOO D1 are aligned vertically. Which is in contrast to the horizontal alignment that can be found on the current crop of BLUBOO smartphones, like the BLUBOO Dual. In addition to the actual camera hardware, it also seems as though there will be a number of camera software tweaks and features included as well. Another point worth noting is that the video does highlight that the BLUBOO D1 will come with a metal unibody build quality. Which considering this is a smartphone that is expected to become available at the very extreme end of the affordable sector, highlights the difference in build quality between the BLUBOO D1 and the rest of the typically-plastic affordable smartphones.
In terms of the rest of the specs, the BLUBOO D1 is a smartphone that comes equipped with a 5-inch display and a 1280 x 720 resolution. Inside, the BLUBOO D1 comes loaded with 2GB RAM, 16GB internal storage, and is powered by a MediaTek MTK6580 quad-core processor (clocking at 1.5 GHz). Additional features on offer include the option to expand the storage when needed via microSD card, and additional security protection thanks to the inclusion of a fingerprint sensor. This is a smartphone that comes powered by a 2,600 mAh battery and comes running on Android 7.0 (Nougat) out of the box. Those interested in finding out more about the BLUBOO D1, can head through through the link below to check out the company’s official listing page, or watch the newly-released video in full below.
John has been writing about and reviewing tech products since 2014 after making the transition from writing about and reviewing airlines. With a background in Psychology, John has a particular interest in the science and future of the industry. Besides adopting the Managing Editor role at AH John also covers much of the news surrounding audio and visual tech, including cord-cutting, the state of Pay-TV, and Android TV. Contact him at [email protected]
|
{
"pile_set_name": "Pile-CC"
}
|
A three year review of injuries to professional footballers (1995-98) and comparison with previous observations (1990-93).
A prospective study over a three year period (1995-8) of footballers' injuries in first team players was undertaken in a similar fashion to a previous study (1990-3). During the present study the Club had a major cup success and appeared to have a younger squad with less major injury and subsequent time out of action. As a result of the earlier paper it would appear that some lessons and observations may have been put into action and helped produce a more consistent standard for the club. Increasing recognition of the need to reduce and monitor the levels and types of injuries seems now to be established.
|
{
"pile_set_name": "PubMed Abstracts"
}
|
When doctors won't tell . . .
Of all the online nutritional information, nutritional facts, medical and
dietary sites there are to choose from, in an article entitled "How
to ease the pain" The Sunday Times magazine,
Culture, published a list of just five websites it
considered reliable and informative.This site was one of that five.
CONDITIONS
AND DISEASES PREVENTED AND HELPED BY A LOW-CARB, HIGH-FAT DIET
This sad story is from Florida. If you are a vegan and have children, please, for
their sake, think seriously about their health before imposing your values on
them.
Infant starved on 'raw foods' diet, authorities say
BEING HELD: Joseph and Lamoy Andressohn arrive at the Juvenile Justice Building
in Miami just before they were arrested Friday. TIM CHAPMAN/HERALD STAFF
The parents of a baby who police say starved to death on a diet of wheat grass,
coconut water and almond milk were arrested on aggravated manslaughter charges
Friday as they left a court hearing over the custody of their other four
children.
Joseph Andressohn, 34, and Lamoy Andressohn, 27, of Homestead, also were
charged with neglecting the four surviving children, ages 1 Ë to 6. Like their
5-month-old sister, Woyah, they lived on their parents' ''raw foods'' diet of
uncooked organic fruits, vegetables and nuts. The state is trying to take
permanent custody of the children.
Police said the children all were small and underweight and the two oldest
showed signs of rickets.
''This particular crime, having an underfed small infant as its victim, is
particularly heart-wrenching and painful,'' State Attorney Katherine Fernández
Rundle said in a statement.
The Andressohns said nothing as they were led from the courtroom Friday
morning. They remained in jail Friday night. Prosecutors said they would ask
today for $100,000 bond for each of them.
A Miami-Dade medical examiner's office autopsy concluded Woyah died of ''severe
malnutrition,'' according to an arrest report.
But Dexter George, a family friend and lawyer who is representing them for
free, said the Andressohns will request an independent autopsy.
''The parents raised four kids, all on the same diet,'' he said. "They are
convinced, as many of their friends are, that the death of this child was not
due to malnutrition. They believe there must have been some other factor.''
Experts say parents should be careful when raising children on such a diet
because the children need fat and protein. And infants should be breast-fed or
given infant formula for the first year.
Woyah Andressohn weighed only 6.99 pounds and was 22 inches long when she died
May 15, the arrest warrant said. The median weight for a girl her age is 15
pounds; the median length is 25 inches, according to the National Center for
Health Statistics.
Prosecutors do not claim the Andressohns actively abused their children but
rather that their unorthodox diet and shunning of doctors amounted to criminal
neglect.
Neighbors and friends say the Andressohns were devoted, if unusual, parents.
They home-schooled the children and were often seen playing with them in the
courtyard of their apartment building at 1521 NE Eighth St.
COMPLAINTS RECEIVED
But there were concerns. The state Department of Children & Families received
three complaints that the children were not eating enough.
Three days before Woyah died, a DCF investigator told Lamoy Andressohn to take
her four oldest children to a doctor. The investigator did not see Woyah, who
was out of the home with her father.
The agency, which has had four Miami-Dade County children die under its watch
since February, has been criticized for its handling of the case. During a
March 10 visit, Lamoy Andressohn showed an investigator a bottle with wheat
grass juice when asked what she fed Woyah. Nevertheless, the investigator said
there were ''no indications'' of child neglect in the home.
Although the arrest warrant says the Andressohns would take their children to a
doctor only if it was ''absolutely necessary,'' it did not say whether Woyah
ever saw a doctor before she stopped breathing at 11:41 p.m. May 14. She was
rushed to the hospital and pronounced dead an hour later.
NEVER VACCINATED
The children had never been vaccinated. All five were born at home, the first
three with the help of a midwife. Joseph delivered Woyah and her older sister.
Woyah's 4-year-old brother told an investigator that his little sister was fed
coconut milk, almond juice and avocado juice, according to the arrest warrant.
Her 6-year-old brother said the Andressohns gave Woyah an enema because she was
"toxic.''
All of the children were occasionally given enemas. Dr. Tom Johnson, a
professor of pediatrics at the University of Miami School of Medicine, said
enemas can deplete vital fluids in a child's body.
''It's not going to cause malnutrition per se, but it can cause significant
life-threatening abnormalities,'' he said.
The day that Woyah died, investigators examined the other children. The two
older children showed signs of rickets, a condition that leaves the bones weak
and easy to break. Rickets can be caused by a lack of vitamin D, the vitamin
added to most milk, said Dr. Gary Berkavitz, a professor of pediatrics at the
University of Miami.
RARE IN FLORIDA
Children also get vitamin D if they get enough sun. Rickets is almost unheard
of in Florida because children get so much sun normally, Berkavitz said.
A strictly vegetarian diet that excludes milk products and cooked food is not
inherently unhealthy, Berkavitz said.
''It requires a fair amount of planning to make sure that an adequate amount of
fat and carbohydrate calories are supplied,'' he said. "Fat turns out to be
very important for babies and children up to 5 years when the brain is
developing very rapidly.''
The Andressohn's attorneys have said they followed the raw diet as part of
their Hebrew Israelite faith, which believes that blacks are God's chosen
people. Many Hebrew Israelites follow a vegetarian diet.
The Andressohns each are charged with four counts of neglect and one count of
aggravated manslaughter of a child, defined as child neglect that results in
death.
That charge carries a maximum prison sentence of 30 years.
LEGAL PROHIBITION
Parents are not legally allowed to impose their religious views on their
children if those views endanger the children, said Bruce Winick, a law
professor at the University of Miami.
''I think the prosecution's theory will be they should have known that
something was wrong,'' Winick said. "They should have supplemented the kid's
diet. Somehow that baby wasn't getting enough nutrients.''
But the case may not be easy for prosecutors.
''Will the jury see them as loving parents who have suffered enough, they've
lost their kid? Then the jury will acquit,'' Winick said. "Or will they be seen
as callous, that they should have known better?''
Although the case is unusual, it's not unheard of.
In March, a Marin County, Calif., man was sent to prison for 16 years for
letting his 19-month-old son starve to death on a strict diet that included
herbal supplements.
In Florida, a Pasco County man was convicted of third-degree murder, a more
serious charge than manslaughter, after his infant son died of malnutrition and
chronic illness in 1985.
Joseph Andressohn's sister is asking for custody of the four surviving
children. The DCF has said it has problems with her request.
The four have gained weight since being taken into custody.
They are following a vegetarian diet now but are not limited to raw foods.
Last updated 17 September 2007
Related Articles
Disclaimer: Second Opinions is the website of Barry Groves PhD, offering online nutritional facts and online nutritional information. This website should be used to support rather than replace medical advice advocated by physicians.sitemap
|
{
"pile_set_name": "Pile-CC"
}
|
More than 550,000 foreigners entered the United States across the southern border with Mexico this fiscal year, according to a report from Princeton Policy Advisors.
The number represents both the number who sneaked across the U.S.-Mexico border and the number of foreigners caught at the border crossings and then released into the U.S.
“The ‘illegal’ population of the U.S. (if we include asylum seekers in that group) will have increased by 550,000 in FY 2019,” according to immigration analyst Steven Kopits, president of Princeton Policy Advisors.
The report says some 350,000 children traveling alone and adults with children were likely released into the U.S., The Washington Examiner reported. About 200,000 other foreigners crossed the border illegally and were not apprehended.
TRENDING: HERE SHE COMES! Judge Amy Coney Barrett Seen Leaving Her House with Her Seven Kids and Husband! -- Announcement at 5 PM ET
“Approximately 852,000 persons were apprehended entering the U.S. southwest border illegally in FY 2019,” the report says. “Of these, roughly 550,000 were children traveling alone or children and adults in family groups. News reports indicate that approximately 50,000 of this group were deported to holding camps in Mexico under the Migrant Protection Protocol. Of those remaining in the U.S., we estimate that 70% were released into the U.S. interior pending status hearings, for example, the adjudication of asylum claims. We have been unable to find actual release rates from CBP, thus this number could be low or high and is subject to delays from time of apprehension to release.”
The Customs and Border Protection (CBP) said last week that more than 150,000 foreigners were able to elude capture at the border during 2019.
“These are numbers that no immigration system in the world can handle,” said Mark Morgan, acting commissioner of the CBP. Morgan said the more than 150,000 number is a conservative estimate, since there’s no way to know for sure.
CBP agents arrested 851,508 border-crossers in the 2019 fiscal year, which ended in September. That’s more than twice as many arrested in FY2108, when agents apprehended fewer than 400,000 people.
A record 473,000 families were apprehended at the borders this fiscal year, Morgan said, a more than threefold increase over FY2018.
“They are profiting on the backs of this vulnerable population, and that’s why it’s still a crisis,” Robert Perez, deputy commissioner of U.S. Customs and Border Protection, said at the press conference.
The numbers could have been higher. The Trump administration this year enacted the Migrant Protection Protocols (MPP), which became known as the “Remain In Mexico” policy. Foreigners who entered the U.S. illegally were processed, then released into Mexico — instead of the United States — to await their hearings.
Instead of waiting, though, thousands of migrants who were returned to Mexico gave up their asylum claims and went home, Fox News reports.
So far, the administration has returned more than 55,000 migrants to Mexico. The assessment describes the policy as an “indispensable tool in addressing the ongoing crisis at the southern border and restoring integrity to the immigration system.” It says that it has completed almost 13,000 cases as of Oct. 21. The new assessment, significantly, cites estimates from Customs and Border Protection (CBP) that approximately 20,000 migrants are currently being sheltered in Mexico near the U.S. border as they still seek entry to the U.S. The assessment says that number, though, suggests “a significant proportion of the 55,000+ MPP returnees have chosen to abandon their claims.”
“We’re now sending the message that, if you’re coming here as an economic migrant, you’re not going to be allowed into the United States,” Morgan said this month. “That’s driving a lot of people to return.”
|
{
"pile_set_name": "OpenWebText2"
}
|
Prediction of cerebral vasospasm using early stage transcranial Doppler.
Transcranial Doppler (TCD) is widely used to monitor vasospasm after subarachnoid hemorrhage (SAH), but its ability to predict the future occurrence of the symptomatic vasospasm (SVS) remains controversial. We investigated the utility of TCD for predicting the future occurrence of SVS after SAH in 45 patients with aneurysmal SAH. TCD was performed on days 1, 3, 5, 7, 10, and 14 after SAH. The mean flow velocity (MFV) of the horizontal portion of the middle cerebral artery (M1) was recorded. SVS occurred in 24.4% of patients (n = 11). MFV of M1 increased progressively in patients with SVS, but did not increase in patients without SVS. The mean MFV values were significantly higher in patients with SVS than in patients without SVS (p = 0.031). The mean MFV value on day 3 was already significantly higher in patients with SVS than in patients without SVS (88.5 cm/sec versus 62.7 cm/sec, respectively) (p = 0.018). The receiver operating characteristic curve of MFV on day 3 showed the threshold of 72.5 cm/sec for predictive value of SVS in the future (sensitivity 71.4%, specificity 68.1%, and accuracy 82.3%). Increased MFV of M1 during the early stage of SAH may predict the future occurrence of SVS. The threshold value of 72.5 cm/sec MFV of M1 on SAH day 3 was one of the best predictor of future SVS. To prevent delayed cerebral ischemia, aggressive treatment for vasospasm is needed for patients with increased MFV in the early stages of SAH.
|
{
"pile_set_name": "PubMed Abstracts"
}
|
Parish of Hellifield
Banner
St. Aidan’s Church was built in 1906 to serve the growing population who came to work on the busy railway line and cattle market. Today we serve a population that continues to grow as people use the village as a base to commute from.
Our worship is traditional and welcoming with a choir and children's group.Everyone, whether local or visitor, is most welcome and we hope you encounter our living God as we meet together to worship each week in this wonderful part of the Yorkshire Dales.
For more information or to enquire about weddings or baptisms please contact Revd Stuart Stobart
Our Mission Church is located in the small hamlet of Halton West. Nestled alongside a row of small cottages it is a privately owned estate chapel holding monthly BCP services for the small and dispersed farming community.
With its gallery, east facing holy table it is a jewel in the parish's places of worship.
|
{
"pile_set_name": "Pile-CC"
}
|
Margin Assessment for Punch and Shave Biopsies of Dysplastic Nevi.
Biopsies of atypical melanocytic nevi are among the most commonly performed procedures by dermatologists. Margin assessment is often used to guide re-excision, but can be a point of confusion as negative margins reported in the planes of sections examined do not always reflect complete removal of a lesion. This study investigates the rates of false negative margins after both punch and shave biopsies. We performed a retrospective analysis of 50 consecutive punch and shave biopsy specimens (1) diagnosed as DN, and (2) reported as having clear margins in the planes of section examined. Identified specimen blocks were then sectioned through to examine true margin involvement. Of the 50 specimens identified, 20% (n = 10) were found to have positive margins upon additional sectioning. We found no difference between the groups with respect to biopsy technique, type of nevus, degree of atypia, or gender. This study observed false negative peripheral margin status in a sizeable proportion of biopsy specimens, which did not vary significantly based on biopsy technique or pathologic characteristics. This finding reflects a limitation of standard tissue processing, in which a limited proportion of the true margin is evaluated, and may be of note to many dermatologists who base their decision to re-excise on the reporting of margin involvement. J Drugs Dermatol. 2018;17(7):810-812.
|
{
"pile_set_name": "PubMed Abstracts"
}
|
Nolan Arenado hits two home runs as Rockies blast Cubs
DENVER — A late-night session in the batting cage and a spirited discussion helped Nolan Arenado get his swing back.
Arenado broke out of a slump in a big way, hitting two homers and driving in six runs Sunday to boost the Colorado Rockies past Chicago 11-4.
The All-Star third baseman was 1 of 16 during the Rockies' homestand before getting four hits. He passed Cubs slugger Kris Bryant for the NL homer lead.
"I've been grinding. I haven't really felt like myself, so to be up there, it's a good feeling," Arenado said.
“I’ve been grinding. I haven’t really felt like myself, so to be up there, it’s a good feeling.
— Nolan Arenado, Colorado third baseman
Recommended Stories For You
Arenado credited Sunday's results to his work with batting practice pitcher Garrett Carson late Saturday night. He said the two stayed after the loss to the Cubs to watch video and work in the cage.
"We almost got into an argument," Arenado said. "He would be like, 'I feel like there's not much off' and I'd be like, 'No, there is something off.' "
The two concluded Arenado was overstriding, and he went into Sunday's game with renewed confidence.
"After (Saturday) night I was able to sleep better after what I worked on," Arenado said. "I applied it today and it worked out."
Arenado hit a three-run homer during a seven-run burst in the first inning that included three Cubs errors, then added another three-run drive in the fourth.
Arenado leads the majors with 104 RBI — he had a big league-high 130 last year — and tops the NL with 32 home runs.
Jorge De La Rosa (8-7) tossed eight innings, giving up two home runs to Addison Russell.
De La Rosa delivered a two-run single in the first as the Rockies quickly ended Jason Hammel's 22-inning scoreless streak.
De La Rosa scattered four hits and struck out six in matching his longest outing since last Sept. 16. Russell was the only batter to reach second base against the lefty, who outpitched his former teammate.
"Everything was working really good except those two pitches to Russell," De La Rosa said.
Hammel (13-6) had been 6-0 with an 0.95 ERA since the All-Star before getting roughed up. The Rockies scored 10 runs off him, six earned, in 3 1⁄3 innings.
Arenado's first homer hugged the left-field foul pole to start the early outburst. Tony Wolters had a two-run double, and De La Rosa added his single.
Arenado singled in the second and drove Hammel's first-pitch fastball into the left-field seats to make it 10-0 in the fourth.
"A lot of foul balls today off my slider and two mistakes to Arenado," Hammel said. "That was pretty much the story."
DJ LeMahieu also homered for Colorado.
Russell hit solo homers in the fifth and seventh, and the Cubs scored two more off reliever Matt Carasiti in the ninth.
The Cubs' last run came when pinch-hitter Jorge Soler hit a foul popup between home and first and Anthony Rizzo ran in from third to an uncovered home plate.
TRAINER'S ROOM
Rockies: CF Charlie Blackmon was not in the starting lineup for the third straight game because of a bruised right toe. Manager Walt Weiss said Blackmon and would likely be back in the lineup for tonight's game in Milwaukee.
HOT BAT
LeMahieu had three hits, including his 10th homer, to raise his average to .345, tied for the NL batting lead with Washington's Daniel Murphy. They are both 150 for 435 this season. LeMahieu finished the homestand 14 for 20 with nine runs and two homers.
|
{
"pile_set_name": "Pile-CC"
}
|
Hospital expects to break ground in March
Tuesday
Jan 8, 2013 at 9:20 AMJan 8, 2013 at 9:26 AM
PRMC reports at weekly meeting of county commissioners.
J.W. Keene
Hilary Dolbee, chief financial officer for Pratt Regional Medical Center, told Pratt County Commissioners groundbreaking for the new hospital facility will be sometime in the first of March. Dolbee said the facility is currently in the design development phase and staff has been holding weekly and bi-weekly meeting to facilitate the process.
The first action to be taken at the facility is the demolition of the triangular addition on the front of the building (the drive thru area).
"The PRMC Gift Shop will be closed and the volunteers will walk patients to their destinations," said Dolbee. "We want to thank the volunteers for being able to provide this service."
Dolbee said PRMC is working with the City of Pratt on electrical problems at this time. When questioned as to why PRMC had not gone to the city previously for assistance, she said, "We did not know about the problems until now. It would have cost at least $25,000 for a study and I was not ready to spend that much until the plans were complete."
Additionally, Dolbee said the $5 million wish list she had previously mentioned referred to furniture, fixtures and equipment desired or wanted for the facility.
"We will have eight operating rooms instead of four," said Dolbee. "That is going to take more money and I can't afford every bell and whistle.
Pratt County Counselor Robert Schmisseur told commissioners, the City of Pratt was prepared to give the county a deed to a 28-foot strip of property immediately west of the hospital with the exception of a small site where a city well is located near the gazebo area. Commissioners accepted the offer and Schmisseur is to prepare the documentation for the transfer.
PRMC Chief Executive Officer Susan Page and Jeanette Gaider were also present to present a report to commissioners to document activities completed by Agape Health Care this past year.
Page said the services provided by the program amounted to more than $130,000 to uninsured patients over the past year. According to Page, services were provided to 236 patients, of which 206 were from Pratt County.
"We'll be phased out, when affordable health care goes into effect in 2014," said Page.
In other matters, commissioners:
• Were informed the storage building at Pratt County Veterans Memorial Lake, is nearly completed.
• Were informed the first "Man Camp" application has been filed for approval. The "Man Camp" was for 9 RV units and a total of 25 people. A public water supply would be required to support a camp of this size.
• Were informed three volunteers were being trained to assist the elderly with filing their income taxes this year.
|
{
"pile_set_name": "Pile-CC"
}
|
Two military training aircraft have collided in mid-air without causing any casualties in Qatar as both pilots ejected safely, according to the Gulf nation’s defence ministry.
The incident was announced on the ministry’s Twitter account on Wednesday without mention of the date or time of the incident.
“During a training flight a collision occurred between two training planes and the pilots were able to safely get out by using the ejection seat,” the statement said, without elaborating on the type of the aircraft.
Qatar is home to the massive Al-Udeid Air Base, which hosts US Central Command’s forward headquarters and thousands of American troops.
Lieutenant Colonel Christine D Millette of US Air Force Central Command says US officials are “aware of the Qatari midair collision, but we have not been asked for support at this time”.
Qatar has spent about $30bn on military hardware since Saudi Arabia, the United Arab Emirates and Bahrain imposed a land, sea and air blockade on their Gulf neighbour in June 2017.
|
{
"pile_set_name": "OpenWebText2"
}
|
Custom Engineered Elastomeric Solutions
Challenge:A customer was experiencing significant isses with its existing custom molder. Products regularly suffered quality and reliability problems, and delivery was often behind schedule. In addition to having outdated press equipment, the existing molder was not able to offer an effective solution. To maintain its place in the market, the customer needed to identify and establish a new molding partner in a quick time frame.
Analysis:Longwood engineers began their analysis by evaluating the customer’s existing tooling. They needed to determine what tools were usable, which needed to be reworked and which tools needed to be scrapped altogether. In addition to tooling and molds, Longwood engineering also performed a complete review of material formulations to identify areas for improvement.
Solution:Using the results from the tooling analysis, the Wabtec Elastomers Group delivered rework on current identified nonperforming molds and developed new tooling for non-performing molds. New compound formulations were also developed to enhance product performance. The customer approved and endorsed these changes and witnessed drastic improvements in product quality and reliability while delivered on time. Wabtec Elastomers Group continues to play an integral role in the customer’s new product design and development processes now.
|
{
"pile_set_name": "Pile-CC"
}
|
Regulation of sodium glucose co-transporter SGLT1 through altered glycosylation in the intestinal epithelial cells.
Inhibition of constitutive nitric oxide (cNO) production inhibits SGLT1 activity by a reduction in the affinity for glucose without a change in Vmax in intestinal epithelial cells (IEC-18). Thus, we studied the intracellular pathway responsible for the posttranslational modification/s of SGLT1. NO is known to mediate its effects via cGMP which is diminished tenfold in L-NAME treated cells. Inhibition of cGMP production at the level of guanylyl cyclase or inhibition of protein kinase G also showed reduced SGLT1 activity demonstrating the involvement of PKG pathway in the regulation of SGLT1 activity. Metabolic labeling and immunoprecipitation with anti-SGLT1 specific antibodies did not show any significant changes in phosphorylation of SGLT1 protein. Tunicamycin to inhibit glycosylation reduced SGLT1 activity comparable to that seen with L-NAME treatment. The mechanism of inhibition was secondary to decreased affinity without a change in Vmax. Immunoblots of luminal membranes from tunicamycin treated or L-NAME treated IEC-18 cells showed a decrease in the apparent molecular size of SGLT1 protein to 62 and 67 kD, respectively suggesting an alteration in protein glycosylation. The deglycosylation assay with PNGase-F treatment reduced the apparent molecular size of the specific immunoreactive band of SGLT1 from control and L-NAME treated IEC-18 cells to approximately 62 kD from their original molecular size of 75 kD and 67 kD, respectively. Thus, the posttranslational mechanism responsible for the altered affinity of SGLT1 when cNO is diminished is secondary to altered glycosylation of SGLT1 protein. The intracellular pathway responsible for this alteration is cGMP and its dependent kinase.
|
{
"pile_set_name": "PubMed Abstracts"
}
|
Anticipation.
Enjoyment.
In Retrospect.
Fun while it lasts but doesn't fully seduce.
Share this
Share this
A bawdy social comedy which says that it’s not the size that matters, but what you do with it that counts.
We all know that it’s not possible for any one person to have it all, but that doesn’t stop us from being envious of those who appear to do so. A film about learning to accept the hand you’ve been dealt that says it’s perfectly natural to want what you can’t have, The Overnight is writer/director Patrick Brice’s playful peek into the psyche of that terminally underrepresented social group: the white lower-middle class American thirtysomething couple.
We’re in Los Angeles, a land of hard bodies and pool party liaisons that’s as familiar to moviegoers as it is alien to Alex (Adam Scott) and Emily (Taylor Schilling), who’ve recently relocated from Seattle. One morning at the local park with their infant son RJ, Alex and Emily meet Kurt (Jason Schwartzman), a charismatic yuppie in a silly hat whose son is engaged in some sandpit pleasantries with RJ. After some brief smalltalk, Kurt somewhat insistently invites the entire family over for a playdate.
Alex and Emily have been meaning to get out and meet new people and this seems as good an opportunity as any to get a flavour for the neighbourhood, so they gladly take Kurt up on his offer. On first impression, Kurt’s is a #blessed existence – he’s married to a beguiling, free-spirited French woman named Charlotte (Judith Godrèche), lives in a huge house and has an absolutely enormous… well, we’ll come onto that shortly.
Early on during what turns out to be a long, liberating evening, Alex and Emily put RJ and their inhibitions to bed in a bid to show that their joie de vivre is as intense as when they first got together. They may be sprogged-up and under a fair amount of financial strain, but that doesn’t mean they can’t still be sexy and spontaneous (just maybe not that sexy and spontaneous). As the couples swap best parenting practices and mull over the more esoteric applications of breastfeeding – a steady flow of liquor providing the necessary social lubricant – Kurt and Charlotte decide to move the party outside where a palpable sexual frisson takes hold.
As marriage-satirising situational comedies go, The Overnight is more acutely observed than anything we’ve seen since Judd Apatow’s superlative 2013 film This is 40. That’s not to say it’s especially profound in its deconstruction of 21st century adult relationships, more that Brice’s script is tighter than your average indie rom-com (which admittedly isn’t saying much). Yet amid all the intoxicated epiphanies, oversharing and resolution making, by far the biggest revelation arrives in the form of Jason Schwartzman’s eye-watering prosthetic member, which exposes the film’s curious preoccupation with an exclusively male obsession while providing a quirky conversation starter.
The problem for anyone who’s ever witnessed someone bring a bratwurst to a cocktail sausage party is that, in this instance, the ensuing conversation pans out pretty much as you’d expect. There are plenty of cathartic home truths here and no shortage of amusing moments, but it’s hardly subversive filmmaking. By daybreak it’s clear that a genuine, lasting bond has been formed between these four individuals. It’s a shame that Brice’s film fails to establish a similarly meaningful connection with its audience.
About Little White Lies
Little White Lies was established in 2005 as a bi-monthly print magazine committed to championing great movies and the talented people who make them. Combining cutting-edge design, illustration and journalism, we’ve been described as being “at the vanguard of the independent publishing movement.” Our reviews feature a unique tripartite ranking system that captures the different aspects of the movie-going experience. We believe in Truth & Movies.
|
{
"pile_set_name": "Pile-CC"
}
|
Why Religion Is More Durable Than Commonly Thought In Modern Society
Here is a proposition that may seem self-evident to many people: As societies become more modern, religion loses its grip. People separate their religion from their institutions and from parts of their lives.
Sociologists have a name for this idea. They call it the "secularization thesis." Now, research suggests the story is more complicated.
In 1822, Thomas Jefferson suggested an early version of it, predicting that Unitarianism "will, ere long, be the religion of the majority from north to south."
Some data from modern countries support the thesis. Fifty years ago, about 4 of 10 children in England attended Sunday school. Today, it's only about 10 percent. In the United States, just 5 percent of the population in 1972 reported no religious affiliation. By 2016, 1 out of 4 said they were unaffiliated.
Religion provides people with a lot more than just explanations for the natural world.
Recent research, however, has suggested that religion is more durable than was previously thought. While church attendance has declined sharply in western Europe, secularization has been less evident in the United States. The number of Americans who list their church affiliation as "none" has certainly increased, but more than 70 percent still identify generally as Christian.
The new consensus of sociologists and demographers is that modernization and secularization are indeed related, but in complex ways.
A study released this week by the Pew Research Center on the relation in the United States between religiosity and educational attainment (one component of modernization, along with technological change and others) at first glance appears to support the secularization thesis: The more education people have, the less religious they are.
"College graduates are less likely to say they believe in God with absolute certainty," noted the lead Pew researcher, Gregory Smith. "They are less likely to say that religion is very important in their lives. They are less likely to say they pray regularly, and college graduates are more likely than others to identify themselves as atheists and agnostics."
A closer look at the data, however, offers a more nuanced picture. While highly educated Jews tend to be less observant than less educated Jews, the relation between education and religiosity is weaker among those Americans with a strong Christian identity.
"Highly educated [Christian] adherents are just as religious, in some cases more religious, than their fellow members who have might have less education," Smith said. Among mainline Protestants, for example, college graduates were actually found to be more likely than noncollege graduates to report weekly church attendance. Regardless of their educational attainment, these Christians find meaning in their church experience.
The sharp rise in the number of Americans who report no religious affiliation may also have an explanation that is unrelated to secularization. Research by Philip Schwadel at the University of Nebraska suggests it may simply be that it was less acceptable 50 years ago to identify as religiously unaffiliated than it is today.
Schwadel and others also argue there are significant differences between the United States and Europe when it comes to the process of secularization. In Europe, organized religion has generally been associated with governments to a far greater degree than in the United States. As a result, anti-government sentiment may have been more likely in Europe to produce antagonism toward the church. Government support for religion in many western European countries may also have weakened the vitality of those church communities.
"When a state creates a relationship with a religion, religious leaders no longer have the same impetus to go out and get people excited," said Schwadel. "They get money from the state through taxes, so they don't have to collect money from their congregants."
In the United States, by contrast, religious leaders have to "hustle" more, Schwadel said. "They need to get more congregants if their church is going to survive." Perhaps as a result, Americans are more committed than Europeans to their church congregations.
The notion that religious belief and practice have evolved with modernization does remain broadly accepted. As literacy has increased and scientific knowledge has advanced, supernatural explanations for developments in the natural world have become less important. Religion has nevertheless survived, Schwadel argues, because it plays a variety of roles.
"Religion provides people with a lot more than just explanations for the natural world," Schwadel said. "It provides community. It provides them with friends. It provides them with psychological support and economic support. It provides a lot more than simply an understanding of where they are in the world in relation to the afterlife."
A 2016 Pew study found that more Americans reported growing feelings of "spirituality," even while saying they were less attached to organized religion. To the extent that churches respond to that need, they will presumably have better prospects for survival.
The question that religious leaders and sociologists of religion face is whether modernization will eventually lead to secularization in the United States and other countries, just as it has in western Europe. Some argue that a diminished emphasis on traditional doctrine about the meaning of salvation, for example, or the existence of heaven and hell, is merely an early sign of growing secularism.
Among the pessimists about the future of religion is the writer Rod Dreher, whose new book The Benedict Option outlines a survival strategy for Christians "in a post-Christian nation."
"I've been going around to different colleges, Catholic and evangelical, giving speeches, and at every single one of these colleges, the professors tell me the same thing," Dreher said. "The kids are good kids, but they're coming out of families [and] local churches and youth ministries knowing almost nothing about the historic Christian faith."
Dreher is now convinced that the United States "is on the same downward path in terms of religious observance that Europe has been on for a long time."
"It's all about emotion," he said.
|
{
"pile_set_name": "OpenWebText2"
}
|
Mechanism of antibody-independent activation of the first component of complement (Cl) on retrovirus membranes.
Murine leukemia viruses activate human C1 in the absence of specific antibody. Such activation requires the binding of C1 to the viral surface through two subcomponents, C1q and C1s. This conclusion is based on the following results. (1) Isolated human C1q and C1s bind the same membrane protein on virions. (2) Binding one subcomponent is independent of the other. (3) Only dimeric C1s binds, whereas monomeric C1s, prepared by dissociation with ethylenediaminetetraacetate (EDTA), has no affinity for the virus. (4) The activated C1s dimer, C1s, does not attach to the virus. (5) Saturation of C1s binding sites on the viral surface does not prevent binding of macromolecular C1, but such bound C1 is not activated. (6) No exchange occurs between C1s bound to the viral membrane and C1s contained in C1, which in turn is attached via C1q to the same virus. Therefore activation occurs only when both C1q and C1s in the same C1 complex in contact with the viral activator. Human C1r has no affinity for the virus nor does guinea pig C1s. The latter result explains why guinea pig serum does not function in antibody-independent virolysis.
|
{
"pile_set_name": "PubMed Abstracts"
}
|
Q:
What was said by swami Vivekananda about Hinduism in Chicago Speech?
He has given a great speech about Hinduism and makes feel proud of us on our culture and Hinduism. I have only always one thing in his that speech "All my dear Brothers and Sisters". I didn't hear anything else.
Here, I just want some brief description of his speech.
A:
There are actually many addresses which were given by Swami Vivekananda at Chicago. The one that you're referring to was given on September 11, 1893.
You can download this PDF. It contains the addresses.
Chicago, 11 September 1893
Sisters and Brothers of America, It fills my heart with joy
unspeakable to rise in response to the warm and cordial welcome which
you have given us. I thank you in the name of the most ancient order
of monks in the world; I thank you in the name of the mother of
religions; and I thank you in the name of the millions and millions of
Hindu people of all classes and sects. My thanks, also, to some of the
speakers on this platform who, referring to the delegates from the
Orient, have told you that these men from far
-off nations may well claim the honour of bearing to different lands the idea of toleration. I am proud to belong to a religion which has
taught the world both tolerance and universal acceptance. We
believe not only in universal toleration, but we accept all
religions as true. I am proud to belong to a nation which has
sheltered the persecuted and the refugees of all religions and all
nations of the earth. I am proud to tell you that we have gathered in
our bosom the purest remnant of the Israelites, who came to southern
India and took refuge with us in the very year in which their holy
temple was shattered to pieces by Roman tyranny . I am proud to belong
to the religion which has sheltered and is still fostering the
remnant of the grand Zoroastrian nation. I will quote to you,
brethren, a few lines from a hymn which I remember to have repeated
from my earliest boyhood, which is every day repeated by millions of
human beings: As the different streams having their sources in
different places all mingle their water in the sea, so, O Lord, the
different paths which men take through different tendencies, various
though they appear , crooked or straight, all lead to Thee.
The present convention, which is one of the most august assemblies
ever held, is in itself a vindication, a declaration to the world, of
the wonderful doctrine preached in the Gita : Whosoever comes to Me,
through whatsoever form, I reach him; all men are struggling through
paths which in the end lead to Me. 2 Sectarianism, bigotry,
and its horrible descendant, fanaticism, have long possessed this
beautiful earth. They have filled the earth with violence, drenched
it often and often with human blood, destroyed civilization, and
sent whole nations to despair . Had it not been for these horrible
demons, human society would be far more advanced than it is now .
But their time is come; and I fervently hope that the bell that
tolled this morning in honour of this convention may be the
death-knell of all fanaticism, of all persecutions with the sword
or with the pen, and of all uncharitable feelings between
persons wending their way to the same goal.
|
{
"pile_set_name": "StackExchange"
}
|
Biketi Lake
Biketi Lake () is a small lake of Samtskhe-Javakheti, southeastern Georgia. It is located north of Madatapa Lake.
References
Category:Lakes of Georgia (country)
Category:Geography of Samtskhe-Javakheti
|
{
"pile_set_name": "Wikipedia (en)"
}
|
We all build mental models of how to get stuff done. They are our own personally constructed instruction manuals we have developed in our heads to use the technology that helps us achieve things day to day.
These mental models are developed from reading instruction manuals, watching someone else complete tasks, listening to people talking about how to use the technology and hands on trial and error with the tools.
Many times the mental model in the users mind is far from the intended design of the designer. We often rely on very basic training and simple documentation which allows users to invent their own approach.
Time and time again this riffing of the users experience moves away from efficient use of technology and like the well-trodden path through the grass when the concrete path has been built only meters away it causes a culture of doing things that are hard to measure, hard to retrain on that lead to an ongoing struggle for adoption.
Short circuit the mental model process for your users. Approach their training from multiple angles and train on the highly designed, intentional and efficient process you set out to achieve.
1. Develop easy to understand and visually engaging training documentation - make this incredibly easy to access e.g. online click-throughs or printed and laminated on every desk
2. Create a culture of classroom training that focuses on the practical day to day use of technology - model how to use the tools and then get other users to show tips and tricks. Encourage group conversations and feedback.
3. Allocate time to complete 1:1 coaching with every single user. Sit down with each person and walk them through end to end processes and key aspects of functionality. Use this time not only to connect with your user for learning/training but also for your learning on how to better configure technology that makes sense.
4. Develop short and sharp training videos in a catalog for your users to watch. Pull apart the end to end process into segments so users can get refreshed on sections they are struggling with and HEAR and SEE how to complete the job.
Get ahead of the natural process of mental modeling by approaching user adoption and training from multiple angles.
|
{
"pile_set_name": "Pile-CC"
}
|
Q:
Qt Cryptographic Hashing
I been trying to use the Qt Encryption libraries and have been having trouble.
The ones that ship with Qt (QCryptographicHash) work well but only support
hash schemes that are insecure like md5 and SHA1, there is no SHA256 for example.
I found the Qt Cryptographic Architecture (QCA) which has much more features.
I got the libraries from the Delta XMPP Project site. http://delta.affinix.com/qca/
The link to the QCA library is http://delta.affinix.com/download/qca/2.0/qca-2.0.3.tar.bz2
It is the newest version of the QCA Libary.
The instruction are as follows.
Installing QCA
QCA requires Qt 4.2 or greater.
For Windows:
configure
nmake (or make)
installwin
Using newest Qt everything. Everything works great in Qt except this library.
I use Windows XP.
I followed the installation instructions and got no errors.
The problem is that I get errors when I try to use any code that has anything to do with the QCA library. I would really appreciate any help getting this lib to work.
Here is my code.
The project file.
#-------------------------------------------------
#
# Project created by QtCreator 2011-11-14T14:23:21
#
#-------------------------------------------------
QT += core
QT -= gui
TARGET = kde_crypto2
CONFIG += console
CONFIG -= app_bundle
CONFIG += crypto
TEMPLATE = app
SOURCES += main.cpp
The source file.
#include <QtCore/QCoreApplication>
#include <QTextStream>
#include <QString>
#include <QtCrypto/QtCrypto>
int main(int argc, char *argv[])
{
QCoreApplication a(argc, argv);
QTextStream t(stdout);
if(!QCA::isSupported("sha1"))
t << "SHA1 not supported!\n";
else
{
QByteArray fillerString;
fillerString.fill('a', 1000);
QCA::Hash shaHash("sha1");
for (int i=0; i<1000; i++)
shaHash.update(fillerString);
QByteArray hashResult = shaHash.final();
if ( "34aa973cd4c4daa4f61eeb2bdbad27316534016f" == QCA::arrayToHex(hashResult) )
{
t << "big SHA1 is OK\n";
}
else
{
t << "big SHA1 failed\n";
}
}
return a.exec();
}
Error code is
error: conversion from 'QCA::MemoryRegion' to non-scalar type 'QByteArray' requested
EDIT (UPDATE)
I did not include the --debug-and-release flag when compiling the library. After re-compiling thelibrary with this flag I no longer get errors while compiling my code. However, when I run my code the application crashes when ever any line is reached that uses the QCA library. Therefore I believe there is either something wrong with the library or the way it is installed.
The error code when running is:
ASSERT: "global" in file qca_core.cpp, line 260
A:
Looks like the cause of the error is that you get a MemoryRegion with shaHash.final() and you try to stuff it into a QByteArray. Try adding a .toByteArray() after the final() call. See http://delta.affinix.com/docs/qca/classQCA_1_1MemoryRegion.html
Whether it makes sense to use QCA (and its maintenance state) I don't know though.
|
{
"pile_set_name": "StackExchange"
}
|
Q:
auto-rotating a jq.carousel using setInterval, and pausing on hover
I'm using jq.carousel and as it doesn't have an auto-rotate function built in I'm using setInterval to advance it every second by calling $carouselHome.carousel('next').
This works, but I need to add 'pause on hover'. Here's what I have so far which works as required only after the mouse has entered and left the element once. How would I 'kick off' the interval on first page load? (example: http://jsfiddle.net/meredevelopment/hmUbd/)
var $carouselHome = $('#carousel-home').carousel();
$('#carousel-home_prev').on('click', function(ev) {
$carouselHome.carousel('prev');
});
$('#carousel-home_next').on('click', function(ev) {
$carouselHome.carousel('next');
});
/*setInterval(function() {
$carouselHome.carousel('next');
}, 1000);*/
$("#carousel-home").mouseenter(function(){
clearInterval($(this).data('timeoutId'));
}).mouseleave(function(){
var someElement = $(this);
var timeoutId = setInterval(function() {
$carouselHome.carousel('next');
}, 1000);
console.log(timeoutId);
someElement.data('timeoutId', timeoutId);
});
Thanks!
Ben
A:
Something like this should work:
if ($("#carousel-home").length > 0) {
var $carouselHome = $('#carousel-home').carousel();
var timeoutId = setInterval(function() {
$carouselHome.carousel('next');
}, 1000);
$('#carousel-home_prev').on('click', function(ev) {
$carouselHome.carousel('prev');
});
$('#carousel-home_next').on('click', function(ev) {
$carouselHome.carousel('next');
});
$("#carousel-home").mouseenter(function() {
clearInterval(timeoutId);
}).mouseleave(function() {
var someElement = $(this);
timeoutId = setInterval(function() {
$carouselHome.carousel('next');
}, 1000);
});
}
|
{
"pile_set_name": "StackExchange"
}
|
This relates to electronic devices and more particularly to methods and apparatus for connecting together two electrical devices in which the mating connectors on each device are of different sizes.
Portable electronic devices, such as wireless and cellular telephones, digital media players (e.g., music players and video players), and hybrid devices that combine telephone and media playing functionality are known. These devices are typically configured to provide communications to a user in one or more modes. In some of those modes, the communications can be wireless, such as via a cellular telephone network, a Wi-Fi network, or Bluetooth communications. In those instances, the user interacts with another device or location to receive information in the form of audio, video or both.
The transmission of the received audio signals to the user (from the person on the other end of the call), as well as the receipt and transmission of the audio signals from the user that are captured by the phone's microphone can be accomplished wirelessly or through the use of a wired device. While wireless communication headsets often communicate with the cellphone via the Bluetooth standard, the present invention does not address such technology.
The present invention addresses problems which exist through the use of wired connections. There are great number of accessories that are available for portable electronic devices, and particularly for hybrid devices which combine the functions of a cellular telephone with one or more additional functions, such as the storing and playback of music files. In most instances, the portable electronic devices have a connector that is one of a limited number of standard sizes for audio communications. For example, many cellular telephones have an audio jack that accepts 2.5 millimeter plugs, while many multimedia devices, such as iPods and DVD players, have an audio jack that accepts 3.5 millimeter plugs. One potential reason for this variation is that conventional audio headsets typically include a microphone signal, a monaural audio signal and a ground signal. As such, those connectors often are limited to three contacts.
The 3.5 millimeter connectors, on the other hand, rarely, if ever, include a microphone input, and instead, are often capable of providing stereo audio signals to the user. These devices include the family of products knows as “ear buds,” which are small devices placed in the external cavity of a user's ears, as well as full-sized sets of headphones, such as the Bose™ QuietComfort™ headphones.
One problem with this scenario, occurs when a user wants to use a device having one sized jack with another device having a different sized-plug. In addition to the size difference, there are often problems with a mismatching of signals between the two devices. This leaves the user with few, if any, options.
This problem becomes even larger with the further development of multi-use, hybrid devices, such as Apple's iPhone™, which includes a 3.5 millimeter jack for mating with devices such as the Bose™ QuietComfort™ headphones. For example, in the instance where a user is using the iPhone™ to watch a movie, the user may want to use high quality, noise cancellation headphones to try and maximize his/her experience. In another instance, the user may want to place a call using a wired headset, which is typically a monaural 2.5 millimeter device.
Another type of electronic device where the size mismatch occurs is in the use of electronic equipment to aid the deaf in telephonic communications. These devices are often referred to as “TTY” devices. One such device is, for example, the Ameriphone Q90D Digital Cell Phone Compatible Combination TTY/VCO device. The Q90D enables a hearing-impaired individual to make cellular telephone calls by converting the audio signals to written form and displaying them to the user. These devices, however, uniformly require the use of a 2.5 millimeter plug. Thus, it would not be possible to use such devices with portable hybrid electronic devices having other sized connectors.
Accordingly, what is needed are methods and apparatus for providing users with the ability to use portable electronic devices having different sized connectors. In addition, it is also a need to provide users with the ability to use together portable electronic devices which offer the user otherwise incompatible electronic signal interfaces.
|
{
"pile_set_name": "USPTO Backgrounds"
}
|
A British photojournalist has compiled a hard-hitting collection of photos
and testimonies from African wildlife experts, in a bid to highlight the
threat to the continent’s animals, writes Harriet Alexander
|
{
"pile_set_name": "Pile-CC"
}
|
Pages
Tuesday, March 22, 2016
‘The Producers,’ the Swastika, and the Tyranny of Feelings
I found it encouraging to hear that students at
Tappan Zee High School in Orangetown, New York recently chose to put on Mel
Brooks’ hilarious satire The Producers
as a school play. An excellent, bold choice. If you are tragically unfamiliar
with it, the comedy centers on two theater producers who stage an intentional
flop of a musical – the outrageously tasteless “Springtime for Hitler” – allowing
them to bilk investors and flee the country. But their best-laid plans go awry
when the play becomes a hit.
School authorities have hamstrung the
students, however, by decreeing that the play must be devoid of Nazi swastikas,
a move that would undermine the satire. Why? For the same reason practically any
action is taken in schools these days: some people were offended, including South
Orangetown Superintendent Bob Pritchard. “There is no context in a public high
school where a swastika is appropriate,” he declared.
Really? Not even in history class? Is he
suggesting that, rather than educate students about the symbol and its
historical significance, it should simply be banished from their awareness
altogether? What if, as the New York Post
wondered, the Tappan Zee kids had wanted to stage The Sound of Music or Schindler’s
List? Would either of those dramas be as impactful without the oppressive
emblem of Nazism looming over the characters?
“I considered it to be an obscenity like any
obscenity,” Pritchard sniffed. But the swastika is not like any obscenity. It isn’t even an obscenity in itself, though
it represents an obscene ideology. It is a cultural symbol with specific
historic meaning, and rather than shield students from it out of a misplaced
sense of moral indignation, students should be confronted by it and educated
about it. The alternative is possibly to be condemned to repeat the sins
committed beneath its image.
B.J. Greco, who handles media for the school
district, explained that four parents also had complained about the swastika’s
use in the play. “If you come in out of context, you can misinterpret,” he attempted
to justify. “The swastika is an icon. It causes different feelings in different
people.”
So what? Different feelings can be triggered
in different people by just about anything. That is no justification for sending
the potentially offending object or image down the Orwellian memory hole, which
the “trigger warnings” proliferating on college campuses now are designed
ultimately to accomplish. A culture which prioritizes feelings, which are by
definition subjective, above reality and reason will soon find itself detached
from both and doomed to implode.
As an aside: the comic genius Mel Brooks, who
won a Best Screenplay Oscar for The
Producers, wouldn’t be able to get a job in entertainment today. Can you
imagine the horror with which today’s studios would greet the outrageous racial satire of Brooks’ Blazing Saddles? Our culture has reached a point at which it
is impossible to have a sane discussion about race, much less enjoy a politically
incorrect comedy about it. Far from helping to close America’s racial divide,
the enforced sensitivity imposed upon us by political correctness has
exacerbated that divide to an almost unbridgeable degree.
The swastika controversy is reminiscent of
the hysteria that swept the country last year over the Confederate flag in the
wake of the massacre of nine black Charleston churchgoers by white supremacist
Dylann Roof. National anger focused like a laser on what many perceive to be
the symbol of American white supremacism, the Confederate flag, which Roof displayed
in photos prior to the shooting. Anger became hysteria as the lighthearted
1980s show The Dukes of Hazzard was pulled from the TV Land cable
network schedule because its prominently featured Dodge Charger, nicknamed “The
General,” sported the flag on its hood. Merchandising featuring the car was
even pulled from store shelves. Again, the rather smug impulse was to erase the
symbol’s existence altogether as a sign of our moral condemnation.
In related news, Harvard Law School recently
caved to student demands that the institution’s longstanding logo be changed to
remove an image tied to slavery – because students find slavery offensive and “triggering.”
Yes, of course – Nazism, racism, and slavery
are offensive, but this virtue-signaling frenzy to purge our culture of
historical symbols deemed offensive, no matter what the context, is not the way
to come to terms with those symbols, with the realities they represent, or with
the past. If anything, banning them under any circumstances only empowers those
symbols and weakens our understanding of them and of ourselves.
Erasing from our cultural consciousness symbols
that represent such ugly historical realities is little different from the
Islamic State destroying artistic and architectural vestiges of non-Islamic
culture because they are offensive to religious sensibilities. It will lead to
a cultural and historical amnesia – not to mention further capitulation to this
tyranny of feelings whenever someone decides to be offended.UPDATE: According to Adweek, the news media have distorted the story of superintendent Pritchard banning swastikas from the play. Apparently the swastikas in question were displayed at the school two weeks prior to premiere with no explanation, and Pritchard had them removed for that reason. The play itself went on uncensored.As for Mr. Pritchard’s comment that there is no context in which a swastika in high school is appropriate: Atlanta PR exec Scott Merritt forwarded to me an email from Pritchard in which he explains that it was poor wording and did not reflect his full position: “Displaying historical artifacts for the purposes of education in public schools (and universities) should be the norm rather than the exception and I am therefore opposed to censorship,” wrote Pritchard.I wish to apologize to Mr. Pritchard – a West Point student of military history and self-described Mel Brooks fan – for running with the media’s mischaracterization without confirming the whole story.
About Me
Mark is the editor of TruthRevolt and a Shillman Journalism Fellow at the David Horowitz Freedom Center. He writes about culture and politics for Acculturated, FrontPage Magazine, The Federalist, The New Criterion, and elsewhere. He has made television appearances on CNN, Glenn Beck and elsewhere, as well as many radio and public appearances.
Mark has worked on numerous films including co-writing the award-winning documentary “Jihad in America: The Grand Deception.”
He is currently adapting a book for the big screen and writing one of his own for Templeton Press.
|
{
"pile_set_name": "Pile-CC"
}
|
[Status in old age--an explanation based on ethnosociological research of aging].
Most social-gerontological studies on status are based on the "premise" that traditional societies accord high status to old age, whereas modern societies accord it lower status. In this context it has been postulated that a contrast exists between the traditional rather human world and a modern one which does not give a high value to older people. The discussion deals with the above dichotomous "traditional-modern" approach and the question arises about to what extent this approach is valid in giving insights into modern societies and into all the different cultures we think about when referring to "traditional" societies. The discussion then leads to the question of the close connection between status in old age and power and its influence on younger generations. This will be exemplified by reference to the Australian aborigines and some African peoples.
|
{
"pile_set_name": "PubMed Abstracts"
}
|
Many types of input devices are available for performing operations in a computing system, such as buttons or keys, mice, trackballs, joysticks, touch sensor panels, touch screens, and the like. Touch screens, in particular, are becoming increasingly popular because of their ease and versatility of operation as well as their declining price. Touch screens can include a touch sensor panel, which can be a clear panel with a touch-sensitive surface, and a display device such as a liquid crystal display (LCD) that can be positioned partially or fully behind the panel so that the touch-sensitive surface can cover at least a portion of the viewable area of the display device. Touch screens generally allow a user to perform various functions by touching (e.g., physical contact or near-field proximity) the touch sensor panel using a finger, stylus or other object at a location often dictated by a user interface (UI) being displayed by the display device. In general, touch screens can recognize a touch event and the position of the touch event on the touch sensor panel, and the computing system can then interpret the touch event in accordance with the display appearing at the time of the touch event, and thereafter can perform one or more actions based on the touch event.
Mutual capacitance touch sensor panels can be formed from a matrix of drive and sense lines of a substantially transparent conductive material such as Indium Tin Oxide (ITO). The lines are often arranged orthogonally on a substantially transparent substrate. Mutual capacitance touch sensor panels not only have the ability to detect touch events on the touch sensor panels, but also have the ability to detect proximity events, in which an object is not touching the panel but is in close proximity to the panel. However, mutual capacitance touch pads are constrained in their ability to sense proximity events, and thus only provide proximity detection over a limited range of distances from the touch sensor panel.
|
{
"pile_set_name": "USPTO Backgrounds"
}
|
Q:
How to speed up this TSQL query?
I have a TSQL select query that is running "slow"
SELECT
CustomerKey
,ProductKey
,RepresentativeKey
,ReportingDateKey
,SUM(i.InvoiceQuantity) AS InvoiceQuantity
,SUM(i.InvoiceQuantityKg) AS InvoiceQuantityKg
,SUM(i.BrutoInvoiceLineAmount) AS BrutoInvoiceLineAmount
,SUM(i.EndOfYearDiscount) AS EndOfYearDiscount
,SUM(i.NettoInvoiceLineAmount) AS NettoInvoiceLineAmount
,SUM(i.TotalLineCostPrice) AS CostPrice
,SUM(i.MarginAmount) AS MarginAmount
FROM FactInvoices i
WHERE
i.DossierKey =2
AND i.ReportingDate BETWEEN '2016-01-01' AND '2017-12-31'
GROUP BY
CustomerKey
,ProductKey
,RepresentativeKey
,ReportingDateKey
I'm running the query in SSMS 32bit.
Execution time is 17-21s, I have tested adding non clustered indexs on DossierKey and ReportingDate, but this is only slowing down the query.
The table has about 6.04M record and this result set is giving back 1M records.
It's running on SQL 2016 Developers edition.
Server specs: 8core 16gb ram and HDD => Virual server.
Looking at the execution plan, I can't find any improvements.
How do I speed up? More hardware? But I don't think that will help because the server is not fully used when running this query.
Edit:
Execution Plan:
Index:
CREATE NONCLUSTERED INDEX [_dx1]
ON [dbo].[FactInvoices] ([DossierKey],[ReportingDate])
INCLUDE ([CustomerKey],[ProductKey],[ReportingDateKey],[RepresentativeKey],[InvoiceQuantity],[InvoiceQuantityKg],[BrutoInvoiceLineAmount],[NettoInvoiceLineAmount],[MarginAmount],[EndOfYearDiscount],[TotalLineCostPrice])
Thanks.
A:
For this query:
SELECT CustomerKey, ProductKey, RepresentativeKey, ReportingDateKey,
. . .
FROM FactInvoices i
WHERE i.DossierKey = 2 AND
i.ReportingDate BETWEEN '2016-01-01' AND '2017-12-31'
GROUP BY CustomerKey, ProductKey, RepresentativeKey, ReportingDateKey;
I would recommend an index on FactInvoices(DossierKey, ReportingDate, CustomerKey, ProductKey, RepresentativeKey). The first two are the primary elements of the index used for the WHERE clause. The remaining three columns may be useful for the aggregation. You could also include all the additional columns used in the query.
|
{
"pile_set_name": "StackExchange"
}
|
wordwrap
========
Wrap your words.
example
=======
made out of meat
----------------
meat.js
var wrap = require('wordwrap')(15);
console.log(wrap('You and your whole family are made out of meat.'));
output:
You and your
whole family
are made out
of meat.
centered
--------
center.js
var wrap = require('wordwrap')(20, 60);
console.log(wrap(
'At long last the struggle and tumult was over.'
+ ' The machines had finally cast off their oppressors'
+ ' and were finally free to roam the cosmos.'
+ '\n'
+ 'Free of purpose, free of obligation.'
+ ' Just drifting through emptiness.'
+ ' The sun was just another point of light.'
));
output:
At long last the struggle and tumult
was over. The machines had finally cast
off their oppressors and were finally
free to roam the cosmos.
Free of purpose, free of obligation.
Just drifting through emptiness. The
sun was just another point of light.
methods
=======
var wrap = require('wordwrap');
wrap(stop), wrap(start, stop, params={mode:"soft"})
---------------------------------------------------
Returns a function that takes a string and returns a new string.
Pad out lines with spaces out to column `start` and then wrap until column
`stop`. If a word is longer than `stop - start` characters it will overflow.
In "soft" mode, split chunks by `/(\S+\s+/` and don't break up chunks which are
longer than `stop - start`, in "hard" mode, split chunks with `/\b/` and break
up chunks longer than `stop - start`.
wrap.hard(start, stop)
----------------------
Like `wrap()` but with `params.mode = "hard"`.
|
{
"pile_set_name": "Github"
}
|
What will robocars actually be like? - cstross
http://singularityhub.com/2015/10/07/robocars-are-at-peak-hype-heres-what-theyll-actually-be-like/
======
ph0rque
Personally, I'm looking forward to owning (or even building) a self-driving
tiny house sort of vehicle.
|
{
"pile_set_name": "HackerNews"
}
|
Monthly Archives: November 2011
Next Wednesday, the identity of the Rubber Man will be revealed, but as a certified American Horror Story addict, I have pondered and watched and re-watched every episode, and I feel quite confident in saying, I know who the Rubber Man is.
This is the ultimate spoiler, right up there with “Who shot J.R.” and “Who killed Laura Palmer“, so I’m stacking the page with some images from the show . . . This is your last chance to bail out before I let you know who the Rubber Man is.
The Rubber Man is Satan, he is The Devil Himself.
The truth of this hit me last night, in a twitter conversation with the high priestess of AHS fandom, Kelsey Y. With over three million viewers each episode, certainly a ton of people are already thinking this (and a google search confirms it) but I can take pride in knowing I got to the conclusion all on my own (with a little help from my friend.)
First a few assumptions:
From all I can tell, every detail has meaning in this show, there are no red herrings, no attempts to confuse the viewer with false clues, so if it’s in the show, we can make use of it. (One of my favorite details so far – Tate making mention of the genius of Kurt Cobain. I love Nirvana, but it seemed a little strange that a teen of today would reference a band that peaked 20 years ago. Makes perfect sense a few episodes later when you find out he was killed in the aftermath of his rampage back in 1994.)
The idea that every detail matters is an important assumption.
Ghosts don’t impregnate. This is more of a gut feeling, but while I can imagine a ghost killing, it takes human life to make human life seems a pretty good assumption. It’s a hunch, the theory of Rubber Man as Satan in the living flesh doesn’t depend on it, but this narrowed things down for me and helped me arrive at my conclusion.
But first, let’s shoot down the two most popular theories:
Knowing that the Rubber Man’s identity was going to be revealed in the next episode, the topic of “Who is the Rubber Man?” blew up all across the Internet over the last week, but I made a conscious decision to avoid all the forums and discussions because I wanted to figure this out for myself. After it hit me and I felt confident I knew who Rubber Man was, I finally felt free to see what other people were saying and I found out that the two most popular suspects for Rubber Man are Tate and Constance, with a healthy dose of people saying it’s a character we’ve yet to meet (*cough* Satan *cough*) but let’s look at the two characters we can identify:
Why not Tate?
On Halloween, when Tate was messing with Violet and wearing the suit, his body looked totally different than the bigger and more buffed up Rubber Man we see in ever other scene. Ryan Murphy and Brad Falchuk have a beautiful sense of detail throughout this series, and this is no mistake.
Again, there’s also that gut feeling that a ghost can’t get a woman pregnant.
Constance?
She certainly loves that baby as if she were the baby’s momma, but is she the baby daddy? This is actually a popular theory, and for the craziest show on television, we can’t rule this out completely – could Constance be a shemale? A hermaphrodite?
Way too much of a stretch, even for this show. She’s given birth to three, let’s call them “special” children and then her golden boy, Tate. Hermaphrodites are sterile, and even if she were to have gone Chaz Bono after the births, she’s still shooting blanks.
Also, Jessica Lange’s no “a” cup, and Rubber Man has no boobs.
Here’s the kicker, though – call it cheating, but I didn’t find out this detail until after I came to the conclusion, but there’s an actor named Riley Schmidt playing Rubber Man. If Rubber Man was one of the existing characters, they’d just put that actor or actress in a suit for the Rubber Man scenes. There has to be a reason someone else is playing Rubber Man, you have to assume that Riley Schmidt will be showing his face next episdoe, so you can rule out ANY character that we’ve already seen on the show.
Why Satan?
All that talk of hooves – the nurse faints at the sight of the ultrasound, next episode, Vivian tracks her down, the lady mentions “hooves” and we find out she was so devistated by what she’s seen, she abandoned her career in nursing to join the church as a nun. I don’t think any details in this show are meaningless, but if that didn’t say enough, in the next episode on an ob/gyn visit, Vivian underscored it by asking about hooves again . . .
(Update: on a tip from Chris, who runs the biggest Tate Langdon group on Facebook, just watched episode 6, “Piggy Piggy” again, not only does the nun mention hooves, she says flat out the baby is the unclean one, the beast. I’d also forgotten the scene from that episode where Leah (former Bully, basement victim) asks Violet, “Do you believe in the devil?” . . . “No” . . . “I do. I’ve looked him in the eye.” and she goes on to talk about Revelations, a pregnant woman, the beast and the Red Dragon.)
Then there’s also the way Rubber Man tossed the gay man across the room before killing both him and his partner. That was far beyond human strength. Again, this show is all about the details, and this detail cannot be ignored.
It’s just three clues, but three clues too strong to ignore.
One of the most awesome things about this show is the way it pays homage to so many great horror movies of the past, it’s fun for the fans of horror, it’s also pretty cool to see Ryan Murphy and Brad Falchuk showing themselves as true fans of the genre.
(Side thought – What’s the difference between a rip off and a homage? A rip off is an inferior work that steals because the writers don’t have any original thoughts of their own. An homage is a wink and a nod to the readers and viewers, an homage is a tribute paid to a great work from a work that is also great itself.)
We’ve seen so many American Horror Story homages to great horror movies of the past – The Shining, Re-Animator, The Changeling (the original one), The Strangers . . . prepare yourself next week for the father of Rosemary’s Baby to be unveiled.
If intrade had a prediction market on it, I’d be sinking a nice chunk of change on it, but looks like we’ll just have to wait and see if I’m right. It’ll be fun to see and I welcome your ridicule if I was wrong.
Barack Obama is the king of corporate cash. He had two years of Democrat control of Congress to do something and things only got worse – much, much worse. He may talk a good game, paying a lot of lip service to reigning in the excesses of Wall Street, but Barack Obama is the all-time, undisputed king of corporate cash, both in raking it in and in letting the fat cats make it.
That’s the reality of the HOPE that most of OWS voted for and nothing is going to CHANGE if we make the same choice in 2012.
And while Cuba is crawling out from the rock of the stone age Communist economy it’s held itself under since the 50s, oh the irony of the Occupy Movement here in the U.S. being taken over by Anarchists and Socialists so completely ignorant of history that they still believe, no matter how many times it’s failed and condemned millions to misery, destitution and starvation, that something such as a Marxist worker’s paradise can actually exist on this Earth.
The funny thing about these people flying their American flags upside-down and proudly holding up the red flag sporting the Commie pop icon Che Guevara – Cuba already knows it’s system has failed and they’re making the changes to leave the third world poverty of collectivism and join the first world prosperity which Capitalism brings, and yet even as reality is dawning on the new Castro in Cuba, at the very same time, up rise the Occupiers in America, wanting to bring that same brand of Cuban “eqaulity” right here, an equality where everyone is equal in misery and poverty.
|
{
"pile_set_name": "Pile-CC"
}
|
<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">
<!-- NewPage -->
<html lang="en">
<head>
<!-- Generated by javadoc (1.8.0_121) on Fri Apr 06 15:23:29 CEST 2018 -->
<title>ExpressionData</title>
<meta name="date" content="2018-04-06">
<link rel="stylesheet" type="text/css" href="../stylesheet.css" title="Style">
<script type="text/javascript" src="../script.js"></script>
</head>
<body>
<script type="text/javascript"><!--
try {
if (location.href.indexOf('is-external=true') == -1) {
parent.document.title="ExpressionData";
}
}
catch(err) {
}
//-->
var methods = {"i0":10,"i1":10,"i2":10,"i3":10};
var tabs = {65535:["t0","All Methods"],2:["t2","Instance Methods"],8:["t4","Concrete Methods"]};
var altColor = "altColor";
var rowColor = "rowColor";
var tableTab = "tableTab";
var activeTableTab = "activeTableTab";
</script>
<noscript>
<div>JavaScript is disabled on your browser.</div>
</noscript>
<!-- ========= START OF TOP NAVBAR ======= -->
<div class="topNav"><a name="navbar.top">
<!-- -->
</a>
<div class="skipNav"><a href="#skip.navbar.top" title="Skip navigation links">Skip navigation links</a></div>
<a name="navbar.top.firstrow">
<!-- -->
</a>
<ul class="navList" title="Navigation">
<li><a href="../overview-summary.html">Overview</a></li>
<li><a href="package-summary.html">Package</a></li>
<li class="navBarCell1Rev">Class</li>
<li><a href="class-use/ExpressionData.html">Use</a></li>
<li><a href="package-tree.html">Tree</a></li>
<li><a href="../deprecated-list.html">Deprecated</a></li>
<li><a href="../index-files/index-1.html">Index</a></li>
<li><a href="../help-doc.html">Help</a></li>
</ul>
</div>
<div class="subNav">
<ul class="navList">
<li><a href="../Decon_eQTL/DeconvolutionResult.html" title="class in Decon_eQTL"><span class="typeNameLink">Prev Class</span></a></li>
<li><a href="../Decon_eQTL/GenotypeData.html" title="class in Decon_eQTL"><span class="typeNameLink">Next Class</span></a></li>
</ul>
<ul class="navList">
<li><a href="../index.html?Decon_eQTL/ExpressionData.html" target="_top">Frames</a></li>
<li><a href="ExpressionData.html" target="_top">No Frames</a></li>
</ul>
<ul class="navList" id="allclasses_navbar_top">
<li><a href="../allclasses-noframe.html">All Classes</a></li>
</ul>
<div>
<script type="text/javascript"><!--
allClassesLink = document.getElementById("allclasses_navbar_top");
if(window==top) {
allClassesLink.style.display = "block";
}
else {
allClassesLink.style.display = "none";
}
//-->
</script>
</div>
<div>
<ul class="subNavList">
<li>Summary: </li>
<li>Nested | </li>
<li>Field | </li>
<li><a href="#constructor.summary">Constr</a> | </li>
<li><a href="#method.summary">Method</a></li>
</ul>
<ul class="subNavList">
<li>Detail: </li>
<li>Field | </li>
<li><a href="#constructor.detail">Constr</a> | </li>
<li><a href="#method.detail">Method</a></li>
</ul>
</div>
<a name="skip.navbar.top">
<!-- -->
</a></div>
<!-- ========= END OF TOP NAVBAR ========= -->
<!-- ======== START OF CLASS DATA ======== -->
<div class="header">
<div class="subTitle">Decon_eQTL</div>
<h2 title="Class ExpressionData" class="title">Class ExpressionData</h2>
</div>
<div class="contentContainer">
<ul class="inheritance">
<li>java.lang.Object</li>
<li>
<ul class="inheritance">
<li>Decon_eQTL.ExpressionData</li>
</ul>
</li>
</ul>
<div class="description">
<ul class="blockList">
<li class="blockList">
<hr>
<br>
<pre>public class <span class="typeNameLabel">ExpressionData</span>
extends java.lang.Object</pre>
</li>
</ul>
</div>
<div class="summary">
<ul class="blockList">
<li class="blockList">
<!-- ======== CONSTRUCTOR SUMMARY ======== -->
<ul class="blockList">
<li class="blockList"><a name="constructor.summary">
<!-- -->
</a>
<h3>Constructor Summary</h3>
<table class="memberSummary" border="0" cellpadding="3" cellspacing="0" summary="Constructor Summary table, listing constructors, and an explanation">
<caption><span>Constructors</span><span class="tabEnd"> </span></caption>
<tr>
<th class="colOne" scope="col">Constructor and Description</th>
</tr>
<tr class="altColor">
<td class="colOne"><code><span class="memberNameLink"><a href="../Decon_eQTL/ExpressionData.html#ExpressionData--">ExpressionData</a></span>()</code> </td>
</tr>
<tr class="rowColor">
<td class="colOne"><code><span class="memberNameLink"><a href="../Decon_eQTL/ExpressionData.html#ExpressionData-java.lang.String-">ExpressionData</a></span>(java.lang.String expressionFile)</code> </td>
</tr>
</table>
</li>
</ul>
<!-- ========== METHOD SUMMARY =========== -->
<ul class="blockList">
<li class="blockList"><a name="method.summary">
<!-- -->
</a>
<h3>Method Summary</h3>
<table class="memberSummary" border="0" cellpadding="3" cellspacing="0" summary="Method Summary table, listing methods, and an explanation">
<caption><span id="t0" class="activeTableTab"><span>All Methods</span><span class="tabEnd"> </span></span><span id="t2" class="tableTab"><span><a href="javascript:show(2);">Instance Methods</a></span><span class="tabEnd"> </span></span><span id="t4" class="tableTab"><span><a href="javascript:show(8);">Concrete Methods</a></span><span class="tabEnd"> </span></span></caption>
<tr>
<th class="colFirst" scope="col">Modifier and Type</th>
<th class="colLast" scope="col">Method and Description</th>
</tr>
<tr id="i0" class="altColor">
<td class="colFirst"><code>java.util.HashMap<java.lang.String,double[]></code></td>
<td class="colLast"><code><span class="memberNameLink"><a href="../Decon_eQTL/ExpressionData.html#getGeneExpression--">getGeneExpression</a></span>()</code> </td>
</tr>
<tr id="i1" class="rowColor">
<td class="colFirst"><code>java.util.ArrayList<java.lang.String></code></td>
<td class="colLast"><code><span class="memberNameLink"><a href="../Decon_eQTL/ExpressionData.html#getSampleNames--">getSampleNames</a></span>()</code> </td>
</tr>
<tr id="i2" class="altColor">
<td class="colFirst"><code>void</code></td>
<td class="colLast"><code><span class="memberNameLink"><a href="../Decon_eQTL/ExpressionData.html#setGeneExpression-java.util.HashMap-">setGeneExpression</a></span>(java.util.HashMap<java.lang.String,double[]> geneExpression)</code> </td>
</tr>
<tr id="i3" class="rowColor">
<td class="colFirst"><code>void</code></td>
<td class="colLast"><code><span class="memberNameLink"><a href="../Decon_eQTL/ExpressionData.html#setSampleNames-java.util.ArrayList-">setSampleNames</a></span>(java.util.ArrayList<java.lang.String> sampleNames)</code> </td>
</tr>
</table>
<ul class="blockList">
<li class="blockList"><a name="methods.inherited.from.class.java.lang.Object">
<!-- -->
</a>
<h3>Methods inherited from class java.lang.Object</h3>
<code>equals, getClass, hashCode, notify, notifyAll, toString, wait, wait, wait</code></li>
</ul>
</li>
</ul>
</li>
</ul>
</div>
<div class="details">
<ul class="blockList">
<li class="blockList">
<!-- ========= CONSTRUCTOR DETAIL ======== -->
<ul class="blockList">
<li class="blockList"><a name="constructor.detail">
<!-- -->
</a>
<h3>Constructor Detail</h3>
<a name="ExpressionData--">
<!-- -->
</a>
<ul class="blockList">
<li class="blockList">
<h4>ExpressionData</h4>
<pre>public ExpressionData()</pre>
</li>
</ul>
<a name="ExpressionData-java.lang.String-">
<!-- -->
</a>
<ul class="blockListLast">
<li class="blockList">
<h4>ExpressionData</h4>
<pre>public ExpressionData(java.lang.String expressionFile)
throws java.io.IOException</pre>
<dl>
<dt><span class="throwsLabel">Throws:</span></dt>
<dd><code>java.io.IOException</code></dd>
</dl>
</li>
</ul>
</li>
</ul>
<!-- ============ METHOD DETAIL ========== -->
<ul class="blockList">
<li class="blockList"><a name="method.detail">
<!-- -->
</a>
<h3>Method Detail</h3>
<a name="setSampleNames-java.util.ArrayList-">
<!-- -->
</a>
<ul class="blockList">
<li class="blockList">
<h4>setSampleNames</h4>
<pre>public void setSampleNames(java.util.ArrayList<java.lang.String> sampleNames)</pre>
</li>
</ul>
<a name="getSampleNames--">
<!-- -->
</a>
<ul class="blockList">
<li class="blockList">
<h4>getSampleNames</h4>
<pre>public java.util.ArrayList<java.lang.String> getSampleNames()</pre>
</li>
</ul>
<a name="setGeneExpression-java.util.HashMap-">
<!-- -->
</a>
<ul class="blockList">
<li class="blockList">
<h4>setGeneExpression</h4>
<pre>public void setGeneExpression(java.util.HashMap<java.lang.String,double[]> geneExpression)</pre>
</li>
</ul>
<a name="getGeneExpression--">
<!-- -->
</a>
<ul class="blockListLast">
<li class="blockList">
<h4>getGeneExpression</h4>
<pre>public java.util.HashMap<java.lang.String,double[]> getGeneExpression()
throws java.lang.IllegalAccessException</pre>
<dl>
<dt><span class="throwsLabel">Throws:</span></dt>
<dd><code>java.lang.IllegalAccessException</code></dd>
</dl>
</li>
</ul>
</li>
</ul>
</li>
</ul>
</div>
</div>
<!-- ========= END OF CLASS DATA ========= -->
<!-- ======= START OF BOTTOM NAVBAR ====== -->
<div class="bottomNav"><a name="navbar.bottom">
<!-- -->
</a>
<div class="skipNav"><a href="#skip.navbar.bottom" title="Skip navigation links">Skip navigation links</a></div>
<a name="navbar.bottom.firstrow">
<!-- -->
</a>
<ul class="navList" title="Navigation">
<li><a href="../overview-summary.html">Overview</a></li>
<li><a href="package-summary.html">Package</a></li>
<li class="navBarCell1Rev">Class</li>
<li><a href="class-use/ExpressionData.html">Use</a></li>
<li><a href="package-tree.html">Tree</a></li>
<li><a href="../deprecated-list.html">Deprecated</a></li>
<li><a href="../index-files/index-1.html">Index</a></li>
<li><a href="../help-doc.html">Help</a></li>
</ul>
</div>
<div class="subNav">
<ul class="navList">
<li><a href="../Decon_eQTL/DeconvolutionResult.html" title="class in Decon_eQTL"><span class="typeNameLink">Prev Class</span></a></li>
<li><a href="../Decon_eQTL/GenotypeData.html" title="class in Decon_eQTL"><span class="typeNameLink">Next Class</span></a></li>
</ul>
<ul class="navList">
<li><a href="../index.html?Decon_eQTL/ExpressionData.html" target="_top">Frames</a></li>
<li><a href="ExpressionData.html" target="_top">No Frames</a></li>
</ul>
<ul class="navList" id="allclasses_navbar_bottom">
<li><a href="../allclasses-noframe.html">All Classes</a></li>
</ul>
<div>
<script type="text/javascript"><!--
allClassesLink = document.getElementById("allclasses_navbar_bottom");
if(window==top) {
allClassesLink.style.display = "block";
}
else {
allClassesLink.style.display = "none";
}
//-->
</script>
</div>
<div>
<ul class="subNavList">
<li>Summary: </li>
<li>Nested | </li>
<li>Field | </li>
<li><a href="#constructor.summary">Constr</a> | </li>
<li><a href="#method.summary">Method</a></li>
</ul>
<ul class="subNavList">
<li>Detail: </li>
<li>Field | </li>
<li><a href="#constructor.detail">Constr</a> | </li>
<li><a href="#method.detail">Method</a></li>
</ul>
</div>
<a name="skip.navbar.bottom">
<!-- -->
</a></div>
<!-- ======== END OF BOTTOM NAVBAR ======= -->
</body>
</html>
|
{
"pile_set_name": "Github"
}
|
Q:
What does "interactive query" or "interactive analytics" mean in Presto SQL?
The Presto website (and other docs) talk about "interactive queries" on Presto. What is an "interactive query"? From the Presto Website: "Facebook uses Presto for interactive queries against several internal data stores, including their 300PB data warehouse."
A:
An interactive query system is basically a user interface that translates the input from the user into SQL queries. These are then sent to Presto, which processes the queries and gets the data and sends it back to the user interface.
The UI then renders the output, which is typically NOT just a simple table of numbers and text, but rather a complex chart, a diagram or some other powerful visualization.
The users expects to be able to e.g. update one criteria and get the updated chart or visualization in near real time, just like you expect on any application typically. Even if the creation of this analysis involves LOTS of data to be processed.
Presto can do that since it can query massive distributed object storage systems like HDFS and many other cloud storage systems, as well as RDBMSs and so on. And it can be set up to have a huge cluster of workers that query the source in parallel and therefore process massive amounts of data for analysis, and still be fast enough for the user expectations.
A typical application to use for the visualization is Apache Superset. You just hook up Presto to it via the JDBC driver. Presto has to be configured to point at the underlying data sources and you are ready to go.
|
{
"pile_set_name": "StackExchange"
}
|
Clinical value of Naa10p and CEA levels in saliva and serum for diagnosis of oral squamous cell carcinoma.
N-α-acetyltransferase 10 protein (Naa10p) is a potential prognostic biomarker that modulates the phenotypes of several cancer types. Carcinoembryonic antigen (CEA) is currently the most well-known biomarker for the detection of epithelial malignancies. Our objective was to evaluate the clinical value of Naa10p, CEA, and their combined detection for diagnosis of oral squamous cell carcinoma (OSCC). This study included 202 individuals: 112 patients with OSCC, 30 patients with oral premalignant lesions (OPMLs), and 60 cancer-free and without OPML patients as control. Naa10p and CEA were determined in serum and saliva samples utilizing enzyme-linked immunosorbent assays. Salivary and serum levels of Naa10p and CEA in OSCC patients were significantly higher than those detected in OPML and the control groups, although patients with OPMLs also showed increased salivary and serum Naa10p and CEA levels as compared to the control group. Salivary Naa10p level in OSCC patients is correlated with the degree of differentiation and lymph node metastasis, and serum Naa10p level is specifically correlated with patient age. Additionally, salivary CEA level is correlated with the clinical stage and lymph node metastasis, whereas serum CEA level is correlated with lymph node metastasis. The sensitivity, specificity, positive predictive value, and negative predictive value of combined detection were greater than any single detection. Combined use of salivary Naa10p and CEA as tumor markers for OSCC was more sensitive than serum Naa10p and CEA. These results indicated that combined detection of salivary Naa10p and CEA improved diagnostic performance and early detection rate for OSCC.
|
{
"pile_set_name": "PubMed Abstracts"
}
|
Building and running your very own website is easier than ever before. With content management systems (CMS) and blogging platforms, any aspiring web designer can build a professional-looking site even without any real knowledge of coding.
However, the real challenge is setting yourself apart from the mediocre crowd. This requires an adaptive approach when it comes to the latest design trends and strategies.
Whether you like it or not, professional web design is a competition. It should be your goal to outperform your site’s competitors in areas that matter – from search engine rankings to conversion rate. To accomplish this, you need to employ design practices that put user experience first and elevate your authority in your niche.
1. Build for Speed
One of the worst ways to create a website is to load up on useless features that offer little to no value to your target users. Alex Jasin explains that not only will these elements disrupt user experience, but they also slow your site down and put off visitors.
Advertising
Many advise against using free blogging platforms, because with a modern CMS like WordPress, it’s just as easy to add functionalities such as image sliders, interactive calendars, and contact forms. All you need to do is to look for the right plugin and integrate it directly into your site. Unfortunately, a lot of web design beginners have a nasty habit of installing unnecessary plugins and leaving them to gather virtual dust.
By overloading on plugins, you will not only slow your site down but you will also make your site more vulnerable to crashes and security breaches. Either way, the user experience will suffer – so will your brand as a web designer.
When it comes to plugins, below are two simple things to remember:
Specify your goals before installing any plugin.
Remove plugins you don’t need.
To make sure your site is running at its peak performance, always run it through Google PageSpeed Insights after new changes. This tool works by providing you with a list of recommendations along with specific instructions on how to improve speed.
Advertising
Aside from plugins, visual content also takes a toll in your website’s loading speed. The main problem is that web design beginners don’t know how to optimize images such as backgrounds, site headers, and blog photos. A quick fix is to use an image optimization tool that automatically compresses attachments as well as everything in your library.
2. Make Use of White Space
Another way to improve your website’s loading speed is to pick a minimalistic theme that fully utilizes white space. As a web designer, you need to remember that users need to focus on elements that count – be it a CTA, a post’s takeaways, or a product image. By utilizing white space, you can provide users with a distraction-free experience that will translate to more conversions.
The tricky part is maximizing white space without making your site look too plain. Just remember that it’s all about emphasizing the elements you want readers to focus on. Below are a few tips:
White space can be in any color. It can be black, bright yellow, light green, or any other color that’s easy on the eyes and makes key elements stand out.
It can be black, bright yellow, light green, or any other color that’s easy on the eyes and makes key elements stand out. White space works with plain text. Aside from product images or screenshots, white space can also be used to ease the reading experience. Just take a look at Wikipedia and other websites with an astonishing amount of articles. See how they employ white space to focus your eye’s attention.
Aside from product images or screenshots, white space can also be used to ease the reading experience. Just take a look at Wikipedia and other websites with an astonishing amount of articles. See how they employ white space to focus your eye’s attention. Use subtle details. To avoid making your site too plain, you can include small details such as animations, patterns, and icons.
To avoid making your site too plain, you can include small details such as animations, patterns, and icons. Organize. Take advantage of the user’s focus to provide a seamless experience. For example, you can make all sections such as latest blog posts, trending topics, and content sliders accessible from the home page only by scrolling.
3. Focus on a Unique Feature
In today’s world, there are plenty of “doppelgangers” that look like exact copies of popular sites. Over time, practices such as flat design, diagonal sections, hamburger menus, and even the ones that are already discussed in this article become widespread. As a result, it is easy to end up with a generic-looking website that will fail to attract or retain traffic.
Advertising
To make your website unforgettable, you should focus on developing a feature that’s not only unique, but useful to your audience as well. The idea may not come as you first build your site, but it should always be a priority objective. For example, the content website Metapress adds clear email sign-up forms, which are both functional and unique to its design. A good strategy is to look at certain experience aspects that can be improved such as navigation, readability, and community.
Plugins may help you implement your feature especially if you’re using a CMS, but that won’t help your site attain a unique identity. Instead, you should consider getting help from a web design agency for technical aspects coding, usability, and testing. Just make sure that any web firm you choose has a strong portfolio. Otherwise, you should invest in your design knowledge by through online courses or free online resources.
4. Optimize for Mobile Users
As technology evolves, the future of the internet is with people using mobile devices more than computers for activities such as social media and online searches. This was confirmed by Google back in 2015 and it continues to be the trend in the current year onwards. Since it is your job as a web designer to provide a great experience, you can’t ignore responsive or adaptive design since most of your audience is now using smaller screens.
First of all, remember that there is a difference between responsive and adaptive designs. A responsive website utilizes a single design that adapts to the screen by resizing and repositioning content. On the other hand, an adaptive site has multiple layouts that are configured for a particular type of device.
Advertising
As a beginner, responsive design is the more reasonable option because it is faster and more flexible. It may be harder to implement because it depends on coding for proper functioning, but if you are using a CMS, you can pick an already-responsive theme and simply build around it. Lastly, you can use Google’s Mobile-Friendly Test to check if your site is ready for the mobile audience.
Conclusion
Designing a website successfully requires creativity and patience in learning the best practices. Of course, you can’t expect to be a master overnight. Take the time to read more guides, learn new tools, and try new ideas to gain experience. And if you have web design tips or resources to share, feel free to leave a comment below.
|
{
"pile_set_name": "OpenWebText2"
}
|
Instagram is introducing a way for users to hide posts and stories in their feed without actually unfollowing other accounts.
This new feature, called “mute,” will not block content from other users entirely. Content from muted accounts can still be seen by visiting their pages, but it will no longer show up in the main feed.
Of course, this feature can be turned on and off at any time, and the muted accounts will never know they’ve been muted.
To mute a user, tap the three-dot menu button at the top of a post or profile page. Within the menu the mute option will be highlighted in red. There will also be options to mute posts, mute stories, or mute both posts and stories.
For those keeping score, the mute feature was first discovered last month by computer science student Jade Wong. This marks yet another feature uncovered by Wong before it was rolled out to the public.
|
{
"pile_set_name": "OpenWebText2"
}
|
FILED
UNITED S'I`ATES DISTRICT COURT
FOR THE DISTRICT OF COLUMBIA 2 s
G|I'L U.S. D|strlct & Banlcrnp|ny
Courts for the Dlstnct of Gollroil¢
Surf Moore, )
)
Plaintiff, )
)
v. ) civil A¢rion N@. /{/- -' 70 7
)
U.S. Justice Dep’t., )
)
Defendant. )
)
MEMORANDUM OPINION
This matter is before the Court on its initial review of plaintiff`s pro se Complaint and
application to proceed fn forma pauperis. The Court will grant the in forma pauperis application
and dismiss the case because the complaint fails to meet the minimal pleading requirements of
Rule S(a) of the Federal Rules of Civil Procedure.
Pro se litigants must comply with the Federal Rules of Civil Procedure. jarrell v. Tisch,
656 F. Supp. 237, 239 (D.D.C. 1987). Rule S(a) ofthe Federal Rules of Civil Procedure requires
complaints to contain "(l) a short and plain statement of the grounds for the court's jurisdiction
[and] (2) a short and plain statement of the claim showing that the pleader is entitled to relief."
Fed. R. Civ. P. S(a); see Ashcrofr v. Iqbal, 556 U.S. 662, 678-79 (2009)', Cira[sky v. CIA, 355
F.Bd 661, 668-71 (D.C. Cir. 2004). The Rule 8 standard ensures that defendants receive fair
notice of the claim being asserted so that they can prepare a responsive answer and an adequate
defense and determine whether the doctrine of res judicata applies. Brown v. Caftfctno, 75
F.R.D. 497,493(1).:).€. 1977).
The plaintiff, a resident of Jacl<son, Mississippi. purports to sue the United States
Department of Justice. See Compl. Caption. Plaintiff alleges that defendant has violated the
first, second and fourteenth amendments to the Constitution and federal law. He seeks $100
million in damages The complaint consists of recitations of constitutional amendments, federal
statutes, and excerpts from case law; it contains no supporting facts to provide adequate notice of
a claim and, thus, will be dismissed A separate Order accompanies this Memorandum Opinion.
Z//% /MW
/['~ United S‘fates D'istrict judge
Date: May , 2014
|
{
"pile_set_name": "FreeLaw"
}
|
~ a diary of how God's amazing grace is touching my daily walk of life ~
Menu
Category Archives: Lopez Group on DBP Loan
People are naturally inclined to listen to the bad side of others. Itching ears are everywhere. That is why gossip magazines are very popular. It gets the reader to be on top of the situation. “Ah, she is worse than I am.” “He is no better than someone else I know, how can they be so bad?” That feeling of superiority adds somehow to the self-confidence of the reader.
Knowing that human weakness, it is the target of journalists to make the itch worsen that will surely make them scratch and scratch harder. With just the T.V. news, highlights will be said by the newscasters by asking questions to leave doubt in the hearer’s mind. Did he, really? It makes the listener wait till the news is over…just to find out it was just as hook. Try to listen from start to end, especially the gossip part.
Recently, the issue with the Big Bad Blogger has proliferated the internet and enraged many of the Philippine bloggers. It was on print. It made the Philippine blogging network angry because the news item generalized the scope. It was not even proven whether the story is true or simply created. How about the Davao judge that shot the sheriff? Media got busted by critics for falsely accusing Judge Robillo with the Inquirer’s error in its title and sub title that somehow have even reached media abroad, which has made the judge look terrible. Although Inquirer has managed to correct their mistakes, still, damage has been done. Plus, they only issued an erratum, not an apology.
Another one would be the Lopez Group on DBP Loans, where two writers from the same publication wrote about it, on the same day and using the same words, about certain loans that were said to be written off. According to Salvador Tirona, President of the Lopez Holdings, PR operatives who desperately want to muddle the current Senate investigation on the DBP scandal by diverting its focus, are behind said publicity. And weeks later, Oscar Lopez wrote The Lopez Group in Ordinary Times to explain their side. So all these three stories have a common denominator: wrong information by journalists that can somehow be said to be due to lack of research or one that is meant to stir chaos in the land.
Whatever issues, if they are thrown by media, gets sensationalized and sadly, bears with them a negative impact on whoever is caught in between. Personally, I think this kind of blunder should take a halt as it will never do anyone, or anything any good. It’s what will add up to the already chaotic environment we have. But then, you think journalists are the only ones doing this? How about false promotions to get more sales but deliver way below what is worth?
A friendbooked a Cruise ship eat-all-you-can buffet at the price of P545/person. All that’s in theirmind was the a once-in-a-lifetime experience of a dinner in a cruise ship. They booked online and waited for the day. Well, the ship’s advertisements was quite appealing and who would not grab this privilege ?To their dismay, not onlywas the cruise ship old and rusty , all ofthem waited a long line just to get your food. The cruise ship offered only three main coursewhich were not enough for the people aboard the ship.
Is it safe for me to say that even big food establishments attract customers with those delicious foodstuff plastered on their menus, with big posters hanged on their walls. The posters are so appealing that customers flock to buy it only to find that what they offer is much, much smaller that what appears on your.
Let us all be fair in giving the public what is due to them. Honest, unbiased promotion or advertising that will not discredit others contribution to the well being of our society. We are in this together, media groups, journalists, writers, T.V. personalities, radio commentators and bloggers…we all do what we love for the love of our fellowmen and for the transformation of our country. Positive change is what we should offer best.
|
{
"pile_set_name": "Pile-CC"
}
|
/* Copyright JS Foundation and other contributors, http://js.foundation
*
* Licensed under the Apache License, Version 2.0 (the "License");
* you may not use this file except in compliance with the License.
* You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
var a = new Int32Array([1, 2, 3, 4, 5]);
var b = new Int32Array(5);
try {
a.set(b, 123456);
assert(1 === 0); // Should not get here.
} catch (e) {
assert(e instanceof RangeError);
}
b.set(a);
assert(b.join() === '1,2,3,4,5');
try {
b.set(a, 1);
assert(1 === 0); // Should not get here.
} catch (e) {
assert(e instanceof RangeError);
}
b.set(new Int32Array([99, 98]), 2);
assert(b.join() === '1,2,99,98,5');
b.set(new Int32Array([99, 98, 97]), 2);
assert(b.join() === '1,2,99,98,97');
try {
b.set(new Int32Array([99, 98, 97, 96]), 2);
assert(1 === 0); // Should not get here.
} catch (e) {
assert(e instanceof RangeError);
}
try {
b.set([101, 102, 103, 104], 4);
assert(1 === 0); // Should not get here.
} catch (e) {
assert(e instanceof RangeError);
}
// ab = [ 0, 1, 2, 3, 4, 5, 6, 7 ]
// a1 = [ ^, ^, ^, ^, ^, ^, ^, ^ ]
// a2 = [ ^, ^, ^, ^ ]
var ab = new ArrayBuffer(8);
var a1 = new Uint8Array(ab);
for (var i = 0; i < a1.length; i += 1) {
a1.set([i], i);
}
var a2 = new Uint8Array(ab, 4);
a1.set(a2, 2);
assert(a1.join() === '0,1,4,5,6,7,6,7');
assert(a2.join() === '6,7,6,7');
var a3 = new Uint32Array(ab, 4);
a1.set(a3, 2);
assert(a1.join() === '0,1,6,5,6,7,6,7');
assert(a3.join() === '117835526');
var a4 = new Uint8Array(ab, 0, 4);
a1.set(a4, 2);
assert(a1.join() === '0,1,0,1,6,5,6,7');
assert(a4.join() === '0,1,0,1');
var a5 = new Uint32Array(ab, 4, 1);
a1.set(a5, 2);
assert(a1.join() === '0,1,6,1,6,5,6,7');
assert(a5.join() === '117835014');
var c = new Int32Array([0xFFFFFFFF]);
var d = new Uint8Array(4);
d.set(c);
assert(d.join() === '255,0,0,0');
var e = new Float32Array([3.33]);
var f = new Uint8Array(1);
f.set(e);
assert(f.join() === '3');
e.set(f);
assert(e.join() === '3');
|
{
"pile_set_name": "Github"
}
|
Future warming and acidification result in multiple ecological impacts to a temperate coralline alga.
Coralline algae are a crucial component of reef systems, stabilising reef substrate, providing habitat and contributing to accretion. Coralline algae and their surface microbial biofilms are also important as settlement cues for marine invertebrates, yet few studies address the impact of future environmental conditions on interactions between coralline algae, reef microbes and settlement by larvae of marine invertebrates. We exposed the temperate coralline algal species Amphiroa gracilis to warming and/or acidification scenarios for 21 days. Algae became bleached but photosystem II function was not measurably impacted. Settlement by larvae of the sea urchin Heliocidaris erythrogramma was reduced and the structure of the prokaryotic community associated with A. gracilis was altered. Coralline algae in ambient conditions were dominated by Alphaproteobacteria from the Rhodobacteraceae including Loktonella; those under warming were dominated by Bacteroidetes and Verrucomicrobia; acidification resulted in less Loktonella and more Planctomycetes and a combination of warming and acidification caused increases in Bacteroidetes, Verrucomicrobia and the Alphaproteobacteria family Hyphomonadaceae. These experiments indicate that predicted future environmental change may reduce the ability of some temperate reef coralline algae and associated reef microbes to facilitate settlement of invertebrate larvae as well as having a direct impact to algae via bleaching.
|
{
"pile_set_name": "PubMed Abstracts"
}
|
Q:
Export table to $\LaTeX$ - copy as
I have the following final expression which is a table (I am posting only a subsection of the table to illustrate the problem). I am pasting it from Mathematica without table formatting (to the bottom of the post) directly and it looks ugly, however, in table form looks as in the picture:
Now, I would love to have this in $\LaTeX$. It is a very simple table from the visual point of view, however, Mathematica, upon using copy as $\LaTeX$, gives bunch of errors:
Is there a way to get the table in $\LaTeX$ or do I just have to generate the $\LaTeX$ output with Mathematica directly?
{{" ", "C2ung(\!\(\*FormBox[\(1\),
TraditionalForm]\))", "CM1(\!\(\*FormBox[\(2\),
TraditionalForm]\))"}, {"Olivine",
"\!\(\*FormBox[TemplateBox[{TagBox[\nInterpretationBox[\"\\\"14.8\\\
\"\", 14.799999999999999`, AutoDelete -> True], NumberForm[#, {3, \
1}]& ],TagBox[\nInterpretationBox[\"\\\"14.8\\\"\", \
14.799999999999999`, AutoDelete -> True], NumberForm[#, {3, \
1}]& ],TagBox[\nInterpretationBox[\"\\\"14.8\\\"\", \
14.799999999999999`, AutoDelete -> True], NumberForm[#, {3, 1}]& ]},\n\
\"Subsuperscript\"],
TraditionalForm]\)",
"\!\(\*FormBox[TemplateBox[{TagBox[\n\
InterpretationBox[\"\\\"7.0\\\"\", 7.000000000000001, \
AutoDelete -> True], NumberForm[#, {3, 1}]& ],TagBox[\n\
InterpretationBox[\"\\\"6.3\\\"\", 6.3, AutoDelete -> True], \
NumberForm[#, {3, 1}]& ],TagBox[\nInterpretationBox[\"\\\"7.7\\\"\", \
7.7, AutoDelete -> True], NumberForm[#, {3, 1}]& ]},\n\
\"Subsuperscript\"],
TraditionalForm]\)"}, {"Pyroxene",
"\!\(\*FormBox[TemplateBox[{TagBox[\n\
InterpretationBox[\"\\\"1.4\\\"\", 1.4000000000000001`, \
AutoDelete -> True], NumberForm[#, {3, 1}]& ],TagBox[\n\
InterpretationBox[\"\\\"1.4\\\"\", 1.4000000000000001`, \
AutoDelete -> True], NumberForm[#, {3, 1}]& ],TagBox[\n\
InterpretationBox[\"\\\"1.4\\\"\", 1.4000000000000001`, \
AutoDelete -> True], NumberForm[#, {3, 1}]& ]},\n\"Subsuperscript\"],
TraditionalForm]\)",
"\!\(\*FormBox[TemplateBox[{TagBox[\n\
InterpretationBox[\"\\\"0.0\\\"\", 0., AutoDelete -> True], \
NumberForm[#, {3, 1}]& ],TagBox[\nInterpretationBox[\"\\\"0.0\\\"\", \
0., AutoDelete -> True], NumberForm[#, {3, 1}]& ],TagBox[\n\
InterpretationBox[\"\\\"0.0\\\"\", 0., AutoDelete -> True], \
NumberForm[#, {3, 1}]& ]},\n\"Subsuperscript\"],
TraditionalForm]\)"}}
A:
Errors of the sort described by the OP can be reproduced by copying the lengthy block of code in the question to a notebook, prefixing TeXForm@TableForm, and executing it. (Be prepared to abort the execution.)
However, the same table shown near the top of the question can be produced from
TableForm@{{"", "C2ung(1)", "CM1(2)"},
{"Olivine", Subscript[14.8, 14.8]^14.8, Subscript["7.0", 6.3]^7.7},
{"Pyroxene", Subscript[1.4, 1.4]^1.4, Subscript["0.0", "0.0"]^"0.0"}}
(I enclosed numbers with trailing zeroes in quotation marks to prevent Mathematica from deleting those zeros in the display. In fact, all numbers could be enclosed with quotation marks, if desired.)
Then, prefixing TeXForm gives the desired result
\left(
\begin{array}{ccc}
\text{} & \text{C2ung(1)} & \text{CM1(2)} \\
\text{Olivine} & 14.8_{14.8}^{14.8} & 7.0_{6.3}^{7.7} \\
\text{Pyroxene} & 1.4_{1.4}^{1.4} & 0.0_{0.0}^{0.0} \\
\end{array}
\right)
i.e.,
$\left(
\begin{array}{ccc}
\text{} & \text{C2ung(1)} & \text{CM1(2)} \\
\text{Olivine} & 14.8_{14.8}^{14.8} & 7.0_{6.3}^{7.7} \\
\text{Pyroxene} & 1.4_{1.4}^{1.4} & 0.0_{0.0}^{0.0} \\
\end{array}
\right)$
Incidentally, replacing Subscript[14.8, 14.8]^14.8 by the more natural choice Subsuperscript[14.8, 14.8, 14.8] does not work well, because TeXForm cannot translate it to TeX.
|
{
"pile_set_name": "StackExchange"
}
|
New information today about Thursday’s home-invasion robbery on Puget Ridge. An area resident has provided Seattle Police with images of what police say might be the getaway vehicle – likely a silver 4-door 1999 Buick, with one particularly distinctive feature: Lug-nut covers missing on both passenger-side wheels.
Otherwise, police say there’s not too much more than what we originally reported – it happened just before noon in the 5200 block of 18th SW, and they don’t know why this particular house was targeted. Four people forced their way into the house; at least two had handguns. They are described only as black, male, with dark hoodies covering most of their faces. They demanded cash, and were told the people in the house had none. One resident was “pistol-whipped outside the house” before the robbers broke in; they took “nothing of value,” SPD Det. Mark Jamieson told WSB this morning, and let barely two minutes after they arrived. Robbery detective St. John is investigating – call 206-386-4050; the incident number is 2018-004202.
|
{
"pile_set_name": "OpenWebText2"
}
|
Curing of coatings through ultraviolet (UV) radiation, thereby resulting in a coating for use as a gel (e.g. a hydrogel), requires efficient methods of initiating the chemical reaction responsible for the curing process. Cross-linking of polymeric material through generation of radical species upon irradiation with UV light is widely used to produce hydrogels for medical device coatings. Coating compositions with polyvinylpyrrolidone and a photoinitiator as the main constituents, which are cured with UV irradiation, are often used for producing hydrogels. The photoinitiators used in these processes can be either oligomeric or polymeric. Oligomeric photoinitiators are partially free to diffuse to the surface of the cured material, thereby rendering these substances exposed to the environment.
Polymeric photoinitiators are disclosed in EP 0 849 300, WO 2008/012325 and Wei et al. Polymers for Advanced Technologies, 2008, vol. 18, no. 12, p. 1763-1770.
|
{
"pile_set_name": "USPTO Backgrounds"
}
|
Borderland
Borderland or Borderlands are the geographical space or zone around a territorial border. It may also refer to:
Places
Borderland State Park, one of Massachusetts' state parks, located in the towns of Easton and Sharon
Borderland, West Virginia, an unincorporated community in Mingo County, West Virginia
Borderland (electoral district), a provincial electoral district in Manitoba.
Books
Borderland (magazine), a spiritualism and psychical research magazine founded and edited by William Thomas Stead
The Borderland Series, urban fantasy novels and stories created for teenage readers by Terri Windling
Borderlands, a series of anthologies edited by Thomas F. Monteleone
Borderlands (novel), a 1991 children's historical novel by author Peter Carter
Borderlands/La Frontera: The New Mestiza, influential work on Chicana issues by Gloria E. Anzaldúa
The House on the Borderland, a supernatural horror novel by British fantasist William Hope Hodgson
"Up the Country" (originally "Borderland"), an 1892 popular poem by iconic Australian writer and poet Henry Lawson
Film and TV
"The Borderland", a 1963 episode of the original The Outer Limits television show
Borderland (1937 film), a 1937 film directed by Nate Watt
Borderland (2007 film), a 2007 horror film written and directed by Zev Berman
Borderland (1922 film), a 1922 American silent drama film
The Borderlands (2013 film), a 2013 film directed by Elliot Goldner
"Borderland" (Star Trek: Enterprise), the 80th episode from the television series Star Trek: Enterprise
Games
Borderlands (series), a series of action role-playing first-person shooter video games including:
Borderlands (video game)
Borderlands 2, the sequel of the first game
Borderlands: The Pre-Sequel, the third game of the series, took place between both first and second game
Tales from the Borderlands, a spin-off of the series
Borderlands 3, the second sequel of the series
Music
Albums
Borderland (The Chevin album), 2012
Borderland (John Mark McMillan album), 2014
Borderlands, a 1987 album by Kathryn Tickell
Songs
"Borderland", a song by Mami Kawada
"Borderland", Secret Chiefs First Grand Constitution and Bylaws
"Borderlands", a 1999 song by Jefferson Starship from Windows of Heaven
Other uses
Borderland Derby, an American Thoroughbred horse race held annually early in the year at Sunland Park Racetrack
Borderlands Books, a San Francisco independent bookstore specializing in science fiction, fantasy and horror
Borderlands line, the railway line between Wrexham, Wales, and Bidston, Wirral, England
See also
Frontier (disambiguation)
|
{
"pile_set_name": "Wikipedia (en)"
}
|
Q:
SQL inserting value of a specific column under multple case
Suppose I have got a table which I have to insert the description of the contract under different keys of contract.
But when executing, there is a n error near then
Is there any limitation of using syntax set ?
The below is my SQL
declare @i int, @j v nvarchar(MAX)
set @i = 1
while (@i<=8)
begin
set @j = case when @i = 1 then 'CR' when @i = 2 then 'Facebook' else 'N/A' end
INSERT INTO CostNature (CNKey, CNNDescription) VALUES (@i , @j );
set @i = @i + 1
end
A:
Incorrect
@j v nvarchar(MAX)
Correct
@j nvarchar(MAX)
Otherwise, all other code is fine.
|
{
"pile_set_name": "StackExchange"
}
|
In the (not so distant) future, the American government has decided not only to phase out cash money in lieu of plastic cards, thus making all transactions traceable, but they are also going to broadcast radio waves that will render Americans incapable of committing acts that they know are illegal. This means that our ‘hero,’ Graham, only has 2 weeks to commit the perfect- and last- crime.
Once again, this is a very good example of ‘just because there are pictures does not mean this book is for children.’ At all. I enjoyed this- it was dark, gritty, and definitely in the vein of noir crime novels. I consider the main character to be an homage to Sin City‘s Marv, but I could be wrong. Expect the same level of violence, etc.
Click here to go to this article at JCL Reads or click the cover image to learn more about Last Days.
|
{
"pile_set_name": "Pile-CC"
}
|
Search
Subscribe
About
Tag Archives: price is right
The question I am most frequently asked these days is some version of the following:
May a law enforcement officer trained in administering the HGN test testify at trial about a defendant’s performance on the test if no other expert testifies about the relationship between nystagmus and impairment by alcohol?
While the answer obviously is either yes or no, there is more than one way to analyze the issue. Since today is Thursday, I’m going to throw it back to Bob Barker and the Price is Right and give you two showcases to consider. Continue reading →
|
{
"pile_set_name": "Pile-CC"
}
|
Q:
Como utilizar Infinite Scroll dentro de um ion-card?
Preciso que o InfiniteScroll emita um evento ao rolar o scroll do card, e não da página.
import { Component, OnInit, ViewChild } from '@angular/core';
import { GrupoService } from 'src/app/services/grupo.service';
import { ActivatedRoute, Router } from '@angular/router';
import { LoadingController, IonInfiniteScroll } from '@ionic/angular';
@Component({
selector: 'app-temporadas',
templateUrl: './temporadas.page.html',
styleUrls: ['./temporadas.page.scss'],
})
export class TemporadasPage implements OnInit {
@ViewChild(IonInfiniteScroll) infinite : IonInfiniteScroll
temporadas : any = []
grupoId : any
loading : any
erro : boolean
erroJogos : boolean = false
spin : boolean = true
page : number = 1;
isAdministrador : boolean = false
constructor(
private grupoService : GrupoService,
private activeRoute : ActivatedRoute,
private loadingCtrl : LoadingController,
private router : Router,
) { }
async ngOnInit() {
if(localStorage.getItem('administrador') == '1')
{
this.isAdministrador = true
}
this.loading = await this.loadingCtrl.create()
this.loading.present()
this.grupoId = this.activeRoute.snapshot.params['grupo']
this.obterTemporadas()
}
toggleInfiniteScroll() {
this.infinite.disabled = !this.infinite.disabled;
}
obterTemporadas()
{
this.erro = false
let params = {
grupo : this.grupoId
}
this.grupoService.obterTemporadas(params).subscribe(
data => {
this.temporadas = data
this.loading.dismiss()
for(let temporada of this.temporadas){
let jogosParams = {
temporada : temporada.id,
page : this.page
}
this.grupoService.obterJogos(jogosParams).subscribe(
data => {
this.spin = false
temporada.jogos = data
console.log(data)
return temporada.jogos.data
},
err => {
this.spin = false
if(err.error.resultado == false)
{
return false
}
}
)
console.log(temporada)
}
},
err =>{
if(err.error.resultado == false)
{
this.erro = true
}
this.loading.dismiss()
console.log(err)
}
)
}
/*infiniteJogos(event)
{
setTimeout(() => {
console.log('Done');
this.page++
this.obterTemporadas()
event.target.complete();
if (data.length == 1000) {
event.target.disabled = true;
}
}, 500);
}*/
cadastrarTemporada()
{
this.router.navigate(['temporada/cadastrar',this.grupoId])
}
cadastrarJogos(temporada)
{
this.router.navigate([this.grupoId,'jogos','cadastrar',temporada])
}
jogoDetalhes(jogo,temporada)
{
this.router.navigate([this.grupoId,temporada,'detalhes-jogos',jogo])
}
jogoFinalizadoDetalhes(jogo,temporada)
{
this.router.navigate([this.grupoId,temporada,'detalhes-jogo-finalizado',jogo])
}
}
ion-button {
//padding-left:50%!important;
//padding-right:50%!important;
//align-content: center!important;
//align-items: center!important;
}
.jogos
{
height: 250px;
overflow: scroll;
}
.jogoFinalizado
{
background-color: greenyellow;
color: white;
font-size: 30px;
}
h2{
text-align: center;
}
ion-spinner{
top:50%;
left:50%;
}
ion-icon{
text-align: right!important;
font-size: 40px;
}
<ion-card *ngIf="erro == true">
<ion-label>Sem temporadas</ion-label>
</ion-card>
<ion-button *ngIf="isAdministrador" (click)="cadastrarTemporada()">(+) Temporada</ion-button>
<div *ngIf="erro == false">
<ion-card *ngFor="let temporada of temporadas">
<ion-card-header>
<ion-card-title>Temporada: {{temporada.nome}}</ion-card-title>
<ion-card-subtitle>{{temporada.descricao}}</ion-card-subtitle>
</ion-card-header>
<ion-card-content>
<ion-button *ngIf="isAdministrador" (click)="cadastrarJogos(temporada.id)">(+) Jogos</ion-button>
<ion-item *ngIf="!temporada.jogos">
Não há jogos cadastrados nesta temporada.
</ion-item>
</ion-card-content>
<ion-spinner icon="crescent" class="spinner-royal" *ngIf="spin"></ion-spinner>
<h2 *ngIf="!spin">
Jogos
</h2>
<div *ngIf="temporada.jogos" class="jogos">
<div *ngFor="let jogo of temporada.jogos.data">
<!-------------------------JOGO Ñ FINALIZADO------------------------------------>
<ion-card *ngIf="!jogo.hora_final" (click)="jogoDetalhes(jogo.id,jogo.temporada)">
<ion-card-content>
<ion-col>
Dia : {{jogo.data | date: 'dd/MM/yyyy'}}
<br />
Hora : {{jogo.hora_inicial}}
</ion-col>
<ion-col>
<ion-icon name="md-add-circle" float-right></ion-icon>
</ion-col>
</ion-card-content>
</ion-card>
<!-------------------------JOGO FINALIZADO!!!!!!------------------------------------>
<ion-card class="jogoFinalizado" *ngIf="jogo.hora_final"
(click)="jogoFinalizadoDetalhes(jogo.id,jogo.temporada)">
<ion-card-content>
<ion-col>
Dia : {{jogo.data | date: 'dd/MM/yyyy'}}
<br />
Hora Inicial : {{jogo.hora_inicial}}
<br>
Hora Final : {{jogo.hora_final}}
</ion-col>
<ion-col>
<ion-icon name="done-all" float-right></ion-icon>
</ion-col>
</ion-card-content>
</ion-card>
</div>
<ion-infinite-scroll threshold="10px" (ionInfinite)="loadData($event)">
<ion-infinite-scroll-content
loadingSpinner="bubbles"
loadingText="Loading more data...">
</ion-infinite-scroll-content>
</ion-infinite-scroll>
</div>
</ion-card>
</div>
Print da compilação :
A:
Pesquisei algo sobre a algum tempo, e pelo que entendo, infinite-scroll precisa de um scroll para ter referência do "fim" da lista.
Ficaria algo como:
<ion-card>
<ion-card-header>
Título
</ion-card-header>
<ion-card-content>
<ion-scroll scrollY="true">
<ion-list *ngFor="let item of items">
<!-- Conteúdo se repetindo -->
</ion-list>
<ion-infinite-scroll threshold="10px" (ionInfinite)="loadData($event)">
<ion-infinite-scroll-content
loadingSpinner="bubbles"
loadingText="Loading more data...">
</ion-infinite-scroll-content>
</ion-infinite-scroll>
</ion-scroll>
</ion-card-content>
</ion-card>
|
{
"pile_set_name": "StackExchange"
}
|
UPS Returns® Exchange
Take Control over Your High-Value Product Replacements
UPS Returns Exchange offers you peace of mind for your high-value product returns and replacements. With the UPS Returns Exchange contract-only solution, UPS delivers a replacement item with simultaneous collection of a return shipment--the UPS driver will deliver the replacement only after receiving the return item.
UPS Returns Exchange gives your customer a concierge-like experience with hands-on assistance, while giving you more control over the return or replacement process.
A Better Experience for Your Customers
Your customers don't have to worry about finding proper packaging or prove that they sent the item back. We reuse the delivery packaging for the return item and the driver scans the return package at the point of exchange.
UPS Returns Exchange gives you assurance that you'll receive the return item so you can avoid charging the customer a safety deposit on the replacement item.
UPS can notify your customer by phone, e-mail, or text message so they're ready with the return when the UPS driver arrives.
And A Better Experience for You
You'll have more control over what is returned and when.
Having a UPS driver involved increases the likelihood of the correct item
being returned in the proper packaging.
This service can be combined with almost any transportation mode or delivery
speed to fit both your and your customer's needs.
You'll have increased visibility for better customer service and inbound
planning.
Once the exchange is completed, the UPS systems link both outbound and
inbound tracking numbers, allowing for easy look-up and tracking for your
customers or customer service staff.
Inbound packages can be searched by tracking number, reference number, or
outbound shipment tracking number for more accurate warehouse planning and
staffing.
Gain a competitive advantage when you improve your returns process while reducing costs and timelines.
Simultaneous pickup and delivery shortens the overall cycle time of returns and can thereby improve the success rate of recovering high-value assets, reduce revenue stream interruptions, and get high-value items back sooner for refurbishing or reselling.
You can potentially reduce or eliminate the use of costly couriers or technicians to get your product replaced or returned.
You'll be able to initiate pickup and delivery in a single transaction, reducing your order processing time.
|
{
"pile_set_name": "Pile-CC"
}
|
Author: Alejandra Melian-Morse, who is currently pursuing her Masters in Social and Cultural Anthropology at Concordia University in Montréal, QC. Her main areas of focus are the creation of nature through narrative and the relationships between humans, non-humans, and physical space. Her current MA research focuses on a summer camp in the Southwest of the United States. She explores how the children and staff at this camp become entangled within the camp and how that entanglement creates a sense of place in people not originally from the area. Having been fully entangled herself, Alejandra adores the desert and hopes that wherever future research projects may bring her, she will be surrounded by sand. An earlier version of this blog was published on Alejandra’s website.
As I sat dreamily in the window seat, somewhere towards the back of the Air Canada flight from Montreal to Albuquerque on the last day of May, I wrote the first of many field notes. Given the training I had had so far as well as my own tendencies toward introspection, I already knew that my approach to anthropology would be reflective. So there I was, counting the feelings and anticipations I was experiencing on the plane on my way to my MA field site as ethnographic material.
I had a professor in my undergrad who told our class one day that no matter what our greatest insecurity was, it would be amplified during fieldwork. That tidbit of what I suppose I’ll count as advice stuck with me as well as the irony of my greatest insecurity being my ability to get to know new people and the fact that my chosen career path primarily required that. The people who are close to me will agree that it is particularly difficult to become my friend—at least to really become my friend. I’m willing to give myself the credit of being friendly and likeable right off the bat, but it’s breaking through that first layer of polite smiles and and carefully constructed witty remarks that takes time. I admit I usually require an unfair amount of effort on the part of those trying to become my friend to break through those initial walls. This is an aspect of my personality that I’ve become increasingly aware of as I move through my twenties and, for the most part, I’ve come to accept it. But on that last day of May on the plane to New Mexico, I was reflecting on the brief stint of time I had to get to know those people I was about to meet, and get to know them well.
Making friends in the field
I wrote in my Maruman notebook, with its pages still silky and without a grain of desert sand in its folds, that there was no time for my usual timidity. The nature of the ethnographic fieldwork I was about to embark upon required that people open up to me. I needed to know them and understand them. But how could I expect them to show themselves to me if I was unwilling or unable to do the same? So I promised myself, there on page one of my field notes, that I would be open to whatever experiences came my way.
I would lay myself bare and give everything—all my thoughts, feelings, insecurities. If they were willing to listen, I would be willing to share. But the thing about vulnerability in relationships, any type of relationship, is that it opens you up to heartbreak. From the moment that I wrote that I would give these relationships my everything, I had two and a half months before they would be over.
Coming home
When I got back to Montreal those two and a half months later I was excited to see my friends, my partner, and my cat. I was excited to go out in familiar bars and put on clothes that would be unwelcome in the desert. I did all those things and I was happy, but there was an aching that I hadn’t expected.
I would be laughing in the middle of a conversation over a glass of wine and all of a sudden the knot in my stomach that had been there all day would tighten. I remember replying to something someone had said with an exaggerated “yikes!” then realizing that, of course, this was an inside joke that in my field site had just been a joke, shared by almost everyone. I missed the way that I interacted with the world while I was there, walking slowly along dirt paths picking the occasional desert wildflower. How much I wanted to tuck a flower behind my ear, but you can’t just pluck flowers from people’s front gardens.
I felt lost without that rigid daily routine that had seemed so wild to me when I first arrived. I missed the sound of three bells followed by the proclamation that declared it was time to eat, or time for showers, or time to play some game on the field. I felt lonely. I felt heartbroken.
Missing
Of course, I missed individual people. But that wasn’t really the issue. Especially now with our increasing mobility, access to social media, and the fact that during the rest of the year many of them don’t actually live that far from Montreal, I’ll see individuals again. But during our closing ceremony on the last day of our time there, the director of the place I was based at said that while we might come back there and while we might see each other again, we will never all be in that place all together in the same way again. And that’s just it. My heart was broken not by leaving individual people, but by leaving something much bigger. It takes us too long in anthropology to learn that the communities we study keep on going without us. They don’t stop mid lifetime waiting for us to return and press play again. Things will be different if we return, so when we leave, a certain something is left behind forever.
Staying
So I almost didn’t leave. As my time there was wrapping up I began to desperately seek ways to stay. I started to rewrite the trajectory of my life in my head. Should I apply to the University of New Mexico for my PhD? Do I even want to do my PhD? Do I want to become an outdoor educator instead? Should I take some time off and try to work there full time? The answer to these questions, looking back at them now that I’m home are no, yes, no, and no, respectively. I am happy in my life and excited about my plan.
I truly want to be an anthropologist and am willing to work extremely hard to make that dream a reality. But I tried hard for a time at the end of my fieldwork to convince myself that I didn’t have to go. But eventually I had to leave and just let my heart break a little bit.
Doubts
It wouldn’t have been so hard to go if I hadn’t made myself that promise on the plane. Maybe I shouldn’t have swum so deep so fast. I was vulnerable in ways that I very rarely am with anybody, let alone people I have just met. I felt that many of them really knew me and in turn I felt that I really knew many of them. Not all ethnographers will agree with me, but I can’t imagine gathering the material that I did with the richness that it has any other way.
I can’t imagine doing fieldwork now without creating this intense emotional bond. That bond is a good thing beyond the quality of my fieldnotes. It means that these relationships are real for me, that I’m not just using people for my own gain. And it means that when I write about them I’ll be careful and generous not because I was taught to be in my research ethics course but because I truly care about the wellbeing of the people I’m writing about.
Vulnerabilities
But I was ill prepared for the heartbreak. No one told me I might feel this way coming back. Should they have? In his post When the World Invades “the Field” for TFS, Ian Pollock says that “Anthropologists are now looking beyond the reflexive turn to ask new questions about fieldwork, including its emotional qualities, and the need for mental health support”. I’m sure mental health support is a great idea and I won’t truly understand the emotional toll of doing fieldwork until I take on the much longer PhD research.
Still, I don’t think just talking about what happens to us in the field quite covers it. I’m talking about an ongoing emotional pattern of arriving, vulnerability, leaving, and heartbreak that I now imagine so many ethnographers go through. What kind of persons does this turn us into? I’m terrified to have my heart broken again and again throughout my career, but I also think it’s necessary. Love and vulnerability and the undeniably human messiness of it all is what makes anthropology beautiful and the work important.
[Image: Claude Monet [Public domain], via Wikimedia Commons: https://commons.wikimedia.org/wiki/File:Claude_Monet_Le_bateau_atelier.jpg]
Share this: Twitter
Facebook
|
{
"pile_set_name": "OpenWebText2"
}
|
Polymorphisms of the WNT16 gene are associated with the heel ultrasound parameter in young adults.
Bone mineral content is influenced by genetic factors. We investigated the role of WNT16 in bone properties determined using quantitative ultrasound (QUS) on young adults. Three WNT16 genetic markers (rs2908007, rs2908004, and rs2707466) were found to have a significant association with the broadband ultrasound attenuation (BUA) measurement, suggesting that WNT16 influences bone mass in young adults. The aim of this study was to investigate whether genetic markers on the WNT16 gene are associated with bone mass, as assessed using QUS in a population of healthy young Spanish adults. A cross-sectional study was conducted on 575 individuals (mean age 20.41 ± 2.69). Bone quality was assessed using BUA measurements (dB/MHz) on the right calcaneus. Six single nucleotide polymorphisms (SNPs) (rs2908007, rs2908004, rs3801387, rs3801385, rs2707466, and rs2536184) covering the WNT16 gene were selected as genetic markers and genotyped to test their association with BUA variations. The rs2908007, rs2908004, and rs2707466 SNPs were found to have a significant association with BUA (p = 0.004, p = 0.001, and p = 0.004, respectively). We demonstrate for the first time that WNT16 genetic polymorphisms influence QUS traits in a population of young adults. This finding suggests that WNT16 might be an important genetic factor in determining peak bone mass acquisition.
|
{
"pile_set_name": "PubMed Abstracts"
}
|
Today Pixar Animation is known for creating computer animated motion pictures that make us laugh and cry, from their first feature length film Toy Story to this past summer’s Finding Dory. But back in the early 1990s, Pixar’s advanced animation techniques were mostly seen as another way for other companies to use state-of-the-art technology to do boring business more effectively.
A marketing video and sample reel of Pixar’s work in 1990 surfaced online earlier this year, and it shows just how the company was marketing itself at the time. While the company had already won an Academy Award for their animated short Tin Toy and had been known for creating stunning digital effects in movies like The Abyss, this video is all about showing how Pixar can help companies in their presentations and advertising.
Here’s the Pixar marketing video and sample reel (via Cartoon Research):
Featuring a young Ed Catmull and Alvy Ray Smith, this video puts a focus on all that Pixar has done for other companies with their animation, specifically by way of their software Renderman. Knowing what the company would become, it’s amazing to see the much less entertaining path Pixar was taking at this time. Thank goodness the people at Pixar were much more creative than just figuring out ways to use animation to sell orange juice and candy. Though I will say it’s cool seeing that Pixar had a hand in a bunch of the commercials that I saw on TV all the time as a kid.
Anyway, we’re glad Pixar figured out exactly what they wanted to be. And we’re also glad that A Bug’s Life wasn’t anywhere near as weird or suggestive as the computer animated Volkswagen advertisement seen in the video above.
|
{
"pile_set_name": "OpenWebText2"
}
|
The early rating numbers are in and NBC’s broadcast of Jesus Christ Superstar Live in Concert drew in Sunday night’s largest TV audience with a solid 9.4 million viewers.
The Easter Sunday event pulled in a 1.7 rating among adults 18-49, which was enough to push the John Legend-as-Jesus-Christ telecast ahead of CBS’ 60 Minutes and ABC’s American Idol.
Alongside Legend, pop singer Sara Bareilles played Mary Magdalene and Hamilton alum Brandon Victor Dixon delivered a soulful rendition of Judas Iscariot, live in front of a large audience at the Marcy Avenue Armory in Brooklyn.
Alice Cooper stole the scene late with his powerful performance as King Herod for this latest iteration of Andrew Lloyd Webber and Tim Rice’s classic 1971 rock opera, which tells the story of Christ’s last week alive, including his brutal crucifixion and death.
Star power and primetime production aside, Jesus Christ Superstar landed well below NBC’s live production of The Sound of Music Live!, which aired on Dec. 5, 2013 to 18.62 million viewers; Peter Pan Live!, which aired on Dec. 4, 2014 to 9.21 million viewers; and The Wiz Live!, which aired on Dec. 3, 2015 on NBC to 11.5 million viewers.
NBC’s live treatment of the classic comedy musical Hairspray pulled in its lowest ratings for Broadway TV adaptations, with 9 million total viewers tuning in for the December 7, 2016 showing.
Next up for NBC’s slate of live musicals is Bye Bye Birdie, which is set to star pop hit-maker Jennifer Lopez with a reported air date somewhere in 2019.
Follow Jerome Hudson on Twitter: @jeromeehudson
|
{
"pile_set_name": "OpenWebText2"
}
|
In cellular radio communication systems, it is desired to control uplink load in cells of the radio communication system in order to achieve desired coverage and stability of the cells. The uplink load is often measured in terms of power received by a radio base station of the cellular communication system.
In a known High Speed Packet Access (HSPA) system, uplink load control is managed by a Node B. In an exemplifying configuration, the Node B comprises one or more rake receivers. On the HSPA uplink, user equipments share the same time and frequency resource. Therefore, when the Node B detects a signal from a specific user equipment, the received power of other user equipments at the Node B is regarded as interference to the specific user equipment. In other words, the total received power at the Node B is regarded as a cell load. When the total received power is high, the cell load is high.
In practice, when the Node B performs uplink load control for coverage and stability, the Node B estimates a rise over thermal for coverage and a noise rise for stability to obtain measures of the cell load.
The rise over thermal (RoT) of the cell, which is the total received power over the thermal noise floor power is given by:
η = I tot N ( A )
The total received power, Itot, in a cell consists of uplink power from users in the own cell, Iown, uplink Wideband Code Division Multiple Access (WCDMA) radio link power from users in the neighbour cells, Inei, as well as the thermal noise floor power N, thus,Itot=Iown+Inei+N (B)
Considering a user equipment at the cell border attempting to connect to the cell, the total received power from all of the users at the Node B is interference to this user equipment. If the interference is too high, the limited power of the user equipment may not be able to ensure a successful connection to the Node B. This results in a coverage problem. Therefore, a purpose of load control of High Speed Uplink Packet Access (HSUPA) is to control the total received power at the Node B to be below a coverage limit such that the user equipment at the cell border is able to connect to the cell when desired. The limit depends on which size, it is desired that the cell has: a lower limit for a larger cell size, and vice versa.
The noise rise for stability, λ, is determined by subtracting the neighbour cell interference contribution from Itot. The following equation thus applies:
λ = I tot - I nei N . ( C )
The noise rise for stability is compared to a stability limit. The reason is that if the load in the cell is too high the interference between users will cause power rushes in the system. The power rushes occurs when user equipments increase their transmit power in an uncontrolled manner. In more detail, consider a user equipment which increases its power, which then causes Signal-and-Interference-to-Noise-Ratio (SINR) of other user equipments to be reduced. These user equipments will then increase their transmit power in response to the reduced SINR. This causes SINR for all other user equipments to be further reduced. Again, all these other user equipments will increase their transmit power in response to the reduced SINR. As a result, the uncontrolled power rushes occur in situations where it is not feasible to maintain all scheduled communication resources.
Referring back to the cell load, a difference between the cell load and the limits for coverage and stability is referred to as a power headroom. See FIG. 1. The power headroom, or load headroom, is measured at an air interface of the receiver of the Node B. The Node B comprises a scheduler that aims at filling the load headroom of the air interface such that requests, from user equipments, for different bit rates are met. As stated above, the air-interface load in WCDMA is typically determined in terms of the rise over thermal for coverage and the noise rise for stability.
The scheduler performs scheduling decisions, e.g. determines uplink grants for each user equipment requesting a certain bit rate in order to perform uplink load control, referred to as an uplink load control procedure herein, as initially mentioned. In the uplink load control procedure, the scheduler distributes resources among the user equipments. When evaluating scheduling decisions, the scheduler predicts the load that results from uplink grants scheduled to the user equipments in the cell. Then, the scheduler assures that the scheduled load does not exceed the limits for coverage and stability (or load thresholds for coverage and stability).
Now consider a known Node B comprising multi-stage receiver for cancelling interference in multiple stages. A problem in relation to Node Bs comprising multi-stage receivers, such as an interference cancelling turbo receiver (Turbo-IC receiver), is then that uplink load control is not sufficiently efficient.
|
{
"pile_set_name": "USPTO Backgrounds"
}
|
(Revised Abstract) Description: The rapid spread of HIV in many Eastern European countries has been linked to an increase in injecting drug use among young people. Non-injecting drug use has also increased among young people in this region. Non-injecting drug users are both at risk of initiating injecting drug use and of acquiring through sexual transmission not only HIV but also other sexually transmitted infections. Research is needed into the factors that increase the risk of HIV transmission among young drug users in this region. Such research is needed not only in countries where there is considerable HIV infection among IDUs, but also in countries, such as Hungary, which may be in a pre-epidemic phase, i.e. where HIV prevalence is currently low, but where behavioral and network risk is common among young drug users. In the proposed research, we plan to conduct a pilot study of HIV risk among young drug users between the ages of 16 and 30 in Budapest, the largest city in and the capital of Hungary. The specific aims of the study are to: 1. use ethnographic methods to explore (i) the drug use and sexual risk behaviors and practices of young drug users, (ii) their risk and social networks, especially injecting and sexual mixing patterns with people from high HIV prevalence groups or countries; (iii) the knowledge, attitudes, beliefs and peer norms of young drug users about HIV risk and prevention and, (iv) among young drug injectors, the behaviors, network characteristics, personal biographies and circumstances that may be linked to their initiation of injecting drug use; 2. develop and administer a structured questionnaire to a small sample of young drug users that will utilize questions that are based on the findings from the ethnographic study and questionnaires used in our previous studies; 3. develop and test methods for sampling and recruiting "hidden populations" of young drug users. The ethnographic part of the study will utilize focus groups, in-depth ethnographic interviews, and observational techniques. In addition, existing secondary data will be collected and synthesized. A structured pilot questionnaire and methodology for the sampling and recruiting of study participants will be developed. Procedures for HIV, HBV and HCV testing and counseling will also be developed and assessed. All data collection instruments, protocols, reports, presentations and papers will be both in Hungarian and English. HIV prevention in Eastern Europe needs to target populations that are the most vulnerable for becoming infected, particularly young injecting and non-injecting drug users. This study will provide new knowledge on young drug users in Hungary and will also contribute to advancing research methods and capability in other Eastern European countries.
|
{
"pile_set_name": "NIH ExPorter"
}
|
Signs of Clinical Depression: Symptoms to Watch For – Do you have symptoms of clinical depression? Sure, most of us feel sad, lonely, or depressed at times. And feeling depressed is a normal reaction to loss, life’s …… CLINICAL DEPRESSION – School of Medicine | University of … – CLINICAL DEPRESSION. Clinical depression is a […]
12 Steps to Overcoming Anxiety and Depression | Grace … – 12 Steps to Overcoming Anxiety and Depression without Medication. 1. Learning from Others. I suffered for years having panic attacks followed by a darkness that would …… Medications Used for Anxiety That Help With Weight Loss | eHow – Medications Used for Anxiety That […]
How to Deal with Severe Clinical Depression: 12 Steps – How to Deal with Severe Clinical Depression. Clinical depression is a serious medical condition. It is not a case of “the blues”, it is not just being sad sometimes…. UHS Tang Center – University of California, Berkeley – Clinical Depression. What is Clinical Depression? When […]
Depression Center: Symptoms, Causes, Medications, and … – An estimated 19 million American adults are living with major depression. Here you’ll find in-depth depression information including symptoms, medications, and therapy…. Robin Williams’ death highlights challenge of treating … – One of the world’s funniest men and seemingly most joyful personalities wrestled with a dark demon […]
Major Depression (Clinical Depression) Symptoms … – WebMD gives an overview of clinical — or major — depression, including its causes, symptoms, and treatment…. How to Deal with Severe Clinical Depression: 12 Steps – How to Deal with Severe Clinical Depression. Clinical depression is a serious medical condition. It is not a case of “the […]
NIMH · Depression – National Institute of Mental Health – A detailed booklet that describes Depression symptoms, causes, and treatments, with information on getting help and coping…. Major depressive disorder – Wikipedia, the free encyclopedia – Major depressive disorder (MDD) (also known as clinical depression, major depression, unipolar depression, or unipolar disorder ; or as […]
Overcoming Depression – Help and tips for getting over … – The physical impact of stress and anxiety on the body is interesting. Many people spend big bucks on trying to find a cure for a physical illness rather than face the …… Ways To OVERCOME DEPRESSION NATURALLY – Being … – Learn how to […]
How To Help Someone With Depression – Health.com – When someone you know and love is clinically depressed, … But keep in mind that they have a medical condition, so giving support may mean more than just offering a shoulder … and conquer depression with the latest news and insights on mood management, plus special […]
NIMH · Depression – National Institute of Mental Health – (US) National Institute of Mental Health (NIMH) describes symptoms, causes, and treatments, with information on getting help and coping…. NIMH · Depression – National Institute of Mental Health – A detailed booklet that describes Depression symptoms, causes, and treatments, with information on getting help and […]
|
{
"pile_set_name": "Pile-CC"
}
|
Occurrence and distribution of the exotic lizard Hemidactylus mabouia Moreau de Jonnès, 1818 in Ilha Grande, RJ, Brazil.
The gekkonid lizard Hemidactylus mabouia is an exotic species in Brazil and is found in different ecosystems. This species was recorded at Ilha Grande, RJ, one of the largest insular remains of the Atlantic Rainforest in Brazil. In this study, the occurrence of H. mabouia was determined throughout the island, including the rain forest, restinga and anthropic environments. We used the active search method in points along 19 trails that surround Ilha Grande. At each regular interval of 100 m, we searched for the presence of H. mabouia. The species was recorded in a total of 100 points among the 719 sampled and, in all cases, the occurrence of the lizard corresponded to points located in anthropic or perianthropic areas. As most of Ilha Grande is covered by dense tropical rain forest, we believe this has restricted the invasion of H. mabouia in natural environments within the island.
|
{
"pile_set_name": "PubMed Abstracts"
}
|
Chilobrachys fimbriatus
Chilobrachys fimbriatus, commonly known as the Indian violet, is a species of spider of the genus Chilobrachys. It is endemic to India.
See also
List of Theraphosidae species
References
Category:Theraphosidae
Category:Spiders of Asia
Category:Endemic fauna of India
Category:Spiders described in 1895
|
{
"pile_set_name": "Wikipedia (en)"
}
|
Yamaha is one of the oldest and most respected motorcycle manufacturers on the planet earth and it offers some of the most distinct motorcycles. If you are a naked motorcycle lover, you must be familiar with the Yamaha FZ8 which was launched in 2011 to bridge the gap between FZ6R and FZ1.
Now for 2013 model year, the company has unveiled the latest iteration- the 2013 Yamaha FZ8. Over the years the company never brought any major technical changes to the FZ8 and the only noticeable changes were in the color options. but for 2013, Yamaha has upgraded the FZ8 with a number of interesting features such as revised fuel injection settings, fully adjustable front suspension and a more aggressive muffler.
The engine of the motorcycle constitutes of components derived directly from the class leading R1 and R6 sportbikes. It equips a 779 CC engine which features ceramic-composite-coated cylinders and forged aluminum pistons, and delivers perfectly torquey performance.
2013 Yamaha FZ8 New Features
New muffler shape adds to visual appeal
Rebound damping adjustable, allowing riders to adjust the FZ8 based on rider and passenger needs
Rebound and compression damping adjustable on forks, allowing for adjustments catering to sport touring or urban assault
Dual-textured seat material to enhance visual appeal
2013 Yamaha FZ8 Technical Specifications
Engine: 779cc liquid-cooled inline 4-cylinder; DOHC 16 valves
Bore x Stroke: 68.0 x 53.6mm
Compression Ratio: 12.0:1
Fuel System: Fuel Injection
Ignition: Digital TCI, Transistor Controlled Ignition w/32-bit ECU
Transmission: 6-speed; multiplate wet clutch
Final Drive: O-ring chain
Rear Suspension: Single shock; adjustable preload and rebound damping.
Front Suspension: Telescopic fork; adjustable compression and rebound damping.
Rear Wheel Travel: 5.1 in.
Front Wheel Travel: 5.1 in.
Front Brakes: Dual 310mm hydraulic disc
Rear Brake: Single 267mm disc
Front Tire: 120/70-ZR17M/C 58W
Rear Tire: 180/55-ZR17M/C 73W
Length: 84.3 in.
Width: 30.3 in.
Height: 41.9 in.
Seat Height: 32.1 in.
Ground Clearance: 5.5 in.
Wheelbase: 57.5 in.
Rake: 25.0 degrees
Trail: 4.3 in.
Fuel Capacity: 4.5 gal.
Estimated Fuel Economy: 39 mpg
Wet Weight: 467 lbs.
2013 Yamaha FZ8 Color Option/MSRP
The motorcycle is available in Matte Gray and Matte Black. Both the variants are priced at $8,890
More Pictures
Stay tuned for latest Motorcycle news by signing up for Ride Talks Free Email newsletter.
|
{
"pile_set_name": "OpenWebText2"
}
|
1. Field of the Invention
The present general inventive concept relates to an electrophotographic image forming apparatus, and a scanning method thereof, and more particularly, to an electrophotographic image forming apparatus including a light scanning device to scan a plurality of light beams, and a scanning method thereof.
2. Description of the Related Art
A conventional image forming apparatus such as a laser printer forms an image by scanning a light beam onto a photosensitive drum by using a light scanning device to form an electrostatic latent image thereupon, developing the electrostatic latent image by using toner, and transferring the developed toner image onto a printing medium. In order for a light scanning device to scan a light beam onto a photosensitive drum with a correct timing, a synchronization signal detection unit to detect a horizontal synchronization signal of a scanned light beam is required.
Conventionally, in order to produce a color image, a light scanning device scans a plurality of light beams by using one or two polygonal rotating mirrors. In this case, light sources are arranged in such a way that light beams are incident on a polygonal rotating mirror in a vertically symmetrical manner with respect to a center of the polygonal rotating mirror. For example, when a single polygonal rotating mirror is used, light sources are arranged in such a way that light beams of two colors are incident on each of right and left portions of the polygonal rotating mirror with respect to a center of the polygonal rotating mirror. When two polygonal rotating mirrors are used, light sources are arranged in such a way that light beams of a single color are incident on each of right and left portions of the polygonal rotating mirrors with respect to centers of the polygonal rotating mirrors. In a light scanning device including a single polygonal rotating mirror, a conventional synchronization signal detection unit detects a horizontal synchronization signal by using two beam detecting sensors. In a light scanning device including two polygonal rotating mirrors, a conventional synchronization signal detection unit detects a horizontal synchronization signal by using four beam detecting sensors. Such detected horizontal synchronization signals are transferred to a printer video controller (PVC). A PVC transmits video data to a laser diode drive (LDD) in a light scanning apparatus according to a transferred horizontal synchronization signal, and a light source driver controls a power on and/or off of light sources according to the video data so as to emit a light beam.
When a plurality of beam detecting sensors corresponding to a plurality of light beams are present, material costs and likelihood of failure are increased due to the relatively large number of components, and sensitivities of the beam detecting sensors are differently changed due to a changed in temperature, or detection surfaces of the beam detecting sensors may be non-uniformly changed, (e.g., contaminated). Thus, synchronization signal detecting timings of the beam detecting sensors become slightly different from each other, and image quality may deteriorate.
|
{
"pile_set_name": "USPTO Backgrounds"
}
|
DevOps for RiseUp.net
I assisted riseup.net by adding [1, 2], and porting [1, 2, 3] custom features to SYMPA, the open source software they use for their mailing list service. Development is in Perl and involves working with the upstream maintainers. Verifying bug-fixes and feature additions through a custom testing framework on virtual infrastructure to simulate their large transaction use-case pushes this role from a Software Engineering position to a DevOps (Monitoring, Operations Security, Database Administration, Systems Integration, and Systems Development).
Riseup.net has proven to be a solid collective that provides secure and reliable communications solutions. I appreciate the group because of their years of dedication to an anarchist praxis whose usefulness extends beyond their immediate community.
|
{
"pile_set_name": "Pile-CC"
}
|
package com.ng.nguilib
import android.animation.Animator
import android.animation.AnimatorListenerAdapter
import android.animation.AnimatorSet
import android.animation.ValueAnimator
import android.annotation.TargetApi
import android.content.Context
import android.graphics.*
import android.os.Build
import android.util.AttributeSet
import android.view.View
import android.view.animation.AccelerateInterpolator
import com.ng.nguilib.utils.MLog
class PolygonLoadView(context: Context, attrs: AttributeSet) : View(context, attrs) {
//common
private lateinit var paintLine: Paint
private lateinit var paintPoint: Paint
private var roundRF: RectF? = null
private val mGridLinestrokeWidth = 25f
private var SHOW_MODEL = 0
val SHOW_MODEL_ROUND = 0x00
val SHOW_MODEL_TRIANGLE = 0x01
val SHOW_MODEL_SQUARE = 0x02
val TIME_CIRCLE: Long = 2000
private var animatorSet: AnimatorSet? = null
private var mSideLength: Float = 0.toFloat()
private var mHalfSH: Float = 0.toFloat()
private var thickness: Float = 0.toFloat()
//round
private var pointX: Float = 0.toFloat()
private var pointY: Float = 0.toFloat()
private var startAngle: Float = 0.toFloat()
private val swipeAngle = 270f
//triangle square
private lateinit var path: Path
private var mHalfHeifht: Float = 0.toFloat()
private var startLineX: Float = 0.toFloat()
private var startLineY: Float = 0.toFloat()
private var endLineX: Float = 0.toFloat()
private var endLineY: Float = 0.toFloat()
fun setModel(model: Int) {
if (SHOW_MODEL == SHOW_MODEL_ROUND || SHOW_MODEL == SHOW_MODEL_TRIANGLE || SHOW_MODEL == SHOW_MODEL_SQUARE) {
this.SHOW_MODEL = model
init()
postInvalidate()
} else {
try {
throw Exception("error model")
} catch (e: Exception) {
e.printStackTrace()
}
}
}
private fun init() {
paintLine = Paint()
paintPoint = Paint()
animatorSet = AnimatorSet()
mHalfSH = mSideLength / 2
thickness = mGridLinestrokeWidth / 2
when (SHOW_MODEL) {
SHOW_MODEL_ROUND -> initRound()
SHOW_MODEL_TRIANGLE -> initTriangle()
SHOW_MODEL_SQUARE -> initSquare()
}
}
private fun initSquare() {
//paint
paintLine.style = Paint.Style.STROKE
paintLine.color = Color.parseColor("#2D283C")
paintLine.strokeWidth = mGridLinestrokeWidth
paintLine.isAntiAlias = true
paintLine.strokeCap = Paint.Cap.ROUND
paintLine.strokeJoin = Paint.Join.ROUND
roundRF = RectF(0 + mGridLinestrokeWidth / 2,
0 + mGridLinestrokeWidth / 2,
mSideLength - mGridLinestrokeWidth / 2,
mSideLength - mGridLinestrokeWidth / 2)
paintPoint.isAntiAlias = true
paintPoint.color = Color.parseColor("#4A22EA")
paintPoint.style = Paint.Style.STROKE
paintPoint.strokeWidth = mGridLinestrokeWidth
paintPoint.strokeCap = Paint.Cap.ROUND
//point
pointX = mHalfSH
pointY = 2 * mHalfSH - thickness
//line
path = Path()
startLineX = thickness
startLineY = mHalfSH * 2 - thickness
endLineX = mHalfSH * 2 - thickness
endLineY = mHalfSH * 2 - thickness
path.moveTo(startLineX, startLineY)
path.lineTo(thickness, thickness)
path.lineTo(mHalfSH * 2 - thickness, thickness)
path.lineTo(endLineX, endLineY)
//startAnimSquare
startAnimByStep(4, object : OnAnimationUpdatePLView {
override fun onUpdate(step: Int, fraction: Float) {
path.reset()
when (step) {
1 -> {
pointX = mHalfSH + fraction * (mHalfSH - thickness)
pointY = mSideLength - thickness - fraction * (mHalfSH - thickness)
startLineX = thickness + fraction * (2 * mHalfSH - 2 * thickness)
startLineY = mHalfSH * 2 - thickness
endLineX = mHalfSH * 2 - thickness
endLineY = mHalfSH * 2 - thickness - fraction * (2 * mHalfSH - 2 * thickness)
path.moveTo(startLineX, startLineY)
path.lineTo(thickness, mHalfSH * 2 - thickness)
path.lineTo(thickness, thickness)
path.lineTo(mHalfSH * 2 - thickness, thickness)
path.lineTo(endLineX, endLineY)
}
2 -> {
pointX = mSideLength - fraction * (mHalfSH - thickness) - thickness
pointY = mHalfSH - fraction * (mHalfSH - thickness)
startLineX = 2 * mHalfSH - thickness
startLineY = mHalfSH * 2 - thickness - fraction * (2 * mHalfSH - 2 * thickness)
endLineX = mHalfSH * 2 - thickness - fraction * (2 * mHalfSH - 2 * thickness)
endLineY = thickness
path.moveTo(startLineX, startLineY)
path.lineTo(mHalfSH * 2 - thickness, mHalfSH * 2 - thickness)
path.lineTo(thickness, mHalfSH * 2 - thickness)
path.lineTo(thickness, thickness)
path.lineTo(endLineX, endLineY)
}
3 -> {
pointX = mHalfSH - fraction * (mHalfSH - thickness)
pointY = thickness + fraction * (mHalfSH - thickness)
//start 右上往左 end 左上往下
startLineX = 2 * mHalfSH - thickness - fraction * (2 * mHalfSH - 2 * thickness)
startLineY = thickness
endLineX = thickness
endLineY = thickness + fraction * (2 * mHalfSH - 2 * thickness)
path.moveTo(startLineX, startLineY)
path.lineTo(mHalfSH * 2 - thickness, thickness)
path.lineTo(mHalfSH * 2 - thickness, mHalfSH * 2 - thickness)
path.lineTo(thickness, mHalfSH * 2 - thickness)
path.lineTo(endLineX, endLineY)
}
4 -> {
pointX = thickness + fraction * (mHalfSH - thickness)
pointY = mHalfSH + fraction * (mHalfSH - thickness)
startLineX = thickness
startLineY = thickness + fraction * (2 * mHalfSH - 2 * thickness)
endLineX = thickness + fraction * (2 * mHalfSH - 2 * thickness)
endLineY = 2 * mHalfSH - thickness
path.moveTo(startLineX, startLineY)
path.lineTo(thickness, thickness)
path.lineTo(mHalfSH * 2 - thickness, thickness)
path.lineTo(mHalfSH * 2 - thickness, mHalfSH * 2 - thickness)
path.lineTo(endLineX, endLineY)
}
}
}
})
}
private fun initTriangle() {
//paint
paintLine.style = Paint.Style.STROKE
paintLine.color = Color.parseColor("#2D283C")
paintLine.strokeWidth = mGridLinestrokeWidth
paintLine.isAntiAlias = true
paintLine.strokeCap = Paint.Cap.ROUND
paintLine.strokeJoin = Paint.Join.ROUND
roundRF = RectF(0 + mGridLinestrokeWidth / 2,
0 + mGridLinestrokeWidth / 2,
mSideLength - mGridLinestrokeWidth / 2,
mSideLength - mGridLinestrokeWidth / 2)
paintPoint.isAntiAlias = true
paintPoint.color = Color.parseColor("#4A22EA")
paintPoint.style = Paint.Style.STROKE
paintPoint.strokeWidth = mGridLinestrokeWidth
paintPoint.strokeCap = Paint.Cap.ROUND
//point
pointX = mHalfSH
pointY = 2 * mHalfSH - thickness
mHalfHeifht = (mHalfSH * 0.87).toFloat()
//line
path = Path()
startLineX = thickness
startLineY = mHalfSH * 2 - thickness
endLineX = mHalfSH * 2 - thickness
endLineY = mHalfSH * 2 - thickness
path.moveTo(startLineX, startLineY)
path.lineTo(mHalfSH, thickness)
path.lineTo(endLineX, endLineY)
// startAnimTriangle
startAnimByStep(3, object : OnAnimationUpdatePLView {
override fun onUpdate(step: Int, fraction: Float) {
path.reset()
when (step) {
1 -> {
pointX = mHalfSH + fraction * (mHalfSH / 2 - thickness)
pointY = 2 * mHalfSH - thickness - fraction * (mHalfSH - thickness)
startLineX = thickness + fraction * (2 * mHalfSH - 2 * thickness)
startLineY = mHalfSH * 2 - thickness
endLineX = mHalfSH * 2 - thickness - fraction * (mHalfSH - thickness)
endLineY = mHalfSH * 2 - thickness - fraction * (2 * mHalfSH - 2 * thickness)
path.moveTo(startLineX, startLineY)
path.lineTo(thickness, mHalfSH * 2 - thickness)
path.lineTo(mHalfSH, thickness)
path.lineTo(endLineX, endLineY)
}
2 -> {
pointX = mHalfSH * 3 / 2 - thickness - fraction * (mHalfSH - 2 * thickness)
pointY = mHalfSH
startLineX = 2 * mHalfSH - thickness - fraction * (mHalfSH - thickness)
startLineY = mHalfSH * 2 - thickness - fraction * (2 * mHalfSH - 2 * thickness)
endLineX = mHalfSH - fraction * (mHalfSH - thickness)
endLineY = thickness + fraction * (2 * mHalfSH - 2 * thickness)
path.moveTo(startLineX, startLineY)
path.lineTo(mHalfSH * 2 - thickness, mHalfSH * 2 - thickness)
path.lineTo(thickness, mHalfSH * 2 - thickness)
path.lineTo(endLineX, endLineY)
}
3 -> {
pointX = mHalfSH / 2 + thickness + fraction * (mHalfSH / 2 - thickness)
pointY = mHalfSH + fraction * (mHalfSH - thickness)
startLineX = mHalfSH - fraction * (mHalfSH - thickness)
startLineY = thickness + fraction * (2 * mHalfSH - 2 * thickness)
endLineX = thickness + fraction * (mHalfSH * 2 - 2 * thickness)
endLineY = mHalfSH * 2 - thickness
path.moveTo(startLineX, startLineY)
path.lineTo(mHalfSH, thickness)
path.lineTo(mHalfSH * 2 - thickness, mHalfSH * 2 - thickness)
path.lineTo(endLineX, endLineY)
}
}
}
})
}
private fun initRound() {
//paint
paintLine.style = Paint.Style.STROKE
paintLine.color = Color.parseColor("#2D283C")
paintLine.strokeWidth = mGridLinestrokeWidth
paintLine.isAntiAlias = true
paintLine.strokeCap = Paint.Cap.ROUND
roundRF = RectF(0 + mGridLinestrokeWidth / 2,
0 + mGridLinestrokeWidth / 2,
mSideLength - mGridLinestrokeWidth / 2,
mSideLength - mGridLinestrokeWidth / 2)
paintPoint.isAntiAlias = true
paintPoint.color = Color.parseColor("#4A22EA")
paintPoint.style = Paint.Style.STROKE
paintPoint.strokeWidth = mGridLinestrokeWidth
paintPoint.strokeCap = Paint.Cap.ROUND
//point
pointX = mHalfSH
pointY = mHalfSH * 2 - thickness
startAngle = 225f
// startAnimRound()
startAnimByStep(4, object : OnAnimationUpdatePLView {
override fun onUpdate(step: Int, fraction: Float) {
when (step) {
1 -> {
pointX = mHalfSH + fraction * (mHalfSH - thickness)
pointY = mSideLength - thickness - fraction * (mHalfSH - thickness)
startAngle = 135f - fraction * 90
}
2 -> {
pointX = mSideLength - fraction * (mHalfSH - thickness) - thickness
pointY = mHalfSH - fraction * (mHalfSH - thickness)
startAngle = if (startAngle > 0) {
45 - fraction * 90
} else {
405 - fraction * 90
}
}
3 -> {
pointX = mHalfSH - fraction * (mHalfSH - thickness)
pointY = thickness + fraction * (mHalfSH - thickness)
startAngle = 315f - fraction * 90
}
4 -> {
pointX = thickness + fraction * (mHalfSH - thickness)
pointY = mHalfSH + fraction * (mHalfSH - thickness)
startAngle = 225f - fraction * 90
}
}
}
})
}
private fun startAnimByStep(step: Int, listener: OnAnimationUpdatePLView) {
val interpolator = AccelerateInterpolator(1f)
val pointAnimList = mutableListOf<Animator>()
for (index in 1..step) {
val pointAnimatorTemp = ValueAnimator.ofFloat(0f, 100f)
pointAnimatorTemp.duration = this.TIME_CIRCLE / 4
pointAnimatorTemp.interpolator = interpolator
pointAnimatorTemp.startDelay = 30
pointAnimatorTemp.addUpdateListener { animation ->
val temp = animation.animatedFraction
listener.onUpdate(index, temp)
invalidate()
}
pointAnimList.add(pointAnimatorTemp)
}
animatorSet!!.playSequentially(pointAnimList)
animatorSet!!.addListener(object : AnimatorListenerAdapter() {
override fun onAnimationEnd(animation: Animator) {
animatorSet!!.start()
}
})
animatorSet!!.start()
}
override fun onMeasure(widthMeasureSpec: Int, heightMeasureSpec: Int) {
super.onMeasure(widthMeasureSpec, heightMeasureSpec)
mSideLength = (if (measuredWidth > measuredHeight) measuredHeight else measuredWidth).toFloat()
//宽必须等于高
MLog.d("宽: $mSideLength 高: $mSideLength")
}
override fun onDraw(canvas: Canvas) {
super.onDraw(canvas)
when (SHOW_MODEL) {
SHOW_MODEL_ROUND -> drawRound(canvas)
SHOW_MODEL_TRIANGLE -> drawTriangle(canvas)
SHOW_MODEL_SQUARE -> drawSquare(canvas)
else -> {
}
}
}
private fun drawSquare(canvas: Canvas) {
canvas.drawPath(path, paintLine)
canvas.drawPoint(pointX, pointY, paintPoint)
}
private fun drawTriangle(canvas: Canvas) {
canvas.drawPath(path, paintLine)
canvas.drawPoint(pointX, pointY, paintPoint)
}
private fun drawRound(canvas: Canvas) {
if (roundRF == null) {
return
}
canvas.drawArc(roundRF!!, startAngle, swipeAngle, false, paintLine)
canvas.drawPoint(pointX, pointY, paintPoint)
}
interface OnAnimationUpdatePLView {
fun onUpdate(step: Int, fraction: Float)
}
override fun onAttachedToWindow() {
super.onAttachedToWindow()
startAnimation()
}
override fun onDetachedFromWindow() {
super.onDetachedFromWindow()
stopAnimation()
}
override fun setVisibility(visibility: Int) {
val currentVisibility = getVisibility()
super.setVisibility(visibility)
if (visibility != currentVisibility) {
if (visibility == VISIBLE) {
startAnimation()
} else if (visibility == GONE || visibility == INVISIBLE) {
stopAnimation()
}
}
}
override fun onVisibilityChanged(changedView: View, visibility: Int) {
super.onVisibilityChanged(changedView, visibility)
if (visibility == VISIBLE) {
startAnimation()
} else {
stopAnimation()
}
}
override fun onFocusChanged(gainFocus: Boolean, direction: Int, previouslyFocusedRect: Rect?) {
super.onFocusChanged(gainFocus, direction, previouslyFocusedRect)
if (gainFocus) {
startAnimation()
} else {
stopAnimation()
}
}
//应该绑定activity生命周期
@TargetApi(Build.VERSION_CODES.KITKAT)
fun stopAnimation() {
MLog.d("stopAnimation")
if (animatorSet != null) {
animatorSet?.cancel()
}
}
@TargetApi(Build.VERSION_CODES.KITKAT)
fun startAnimation() {
MLog.d("startAnimation")
if (animatorSet != null && !animatorSet!!.isStarted && !animatorSet!!.isRunning) {
animatorSet!!.start()
}
}
}
|
{
"pile_set_name": "Github"
}
|
Q:
Does pthread_create start the created thread?
Does the function "pthread_create" start the thread (starts executing its function), or does it just creates it and make it wait for the right moment to start?
A:
pthread_create creates the thread (by using clone syscall internally), and return the tid (thread id, like pid). So, at the time when pthread_create returns, the new thread is at least created. But there are no guaranties when it will be started.
From the Man:
http://man7.org/linux/man-pages/man3/pthread_create.3.html
Unless real-time scheduling policies
are being employed, after a call to pthread_create(), it is
indeterminate which thread—the caller or the new thread—will next
execute.
POSIX has the similar comment in the informative description of pthread_create http://pubs.opengroup.org/onlinepubs/009695399/functions/pthread_create.html
There is no requirement on the implementation that the ID of the created thread be available before the newly created thread starts executing.
There is also long "Rationale" why pthread_create is single step process without separate thread creation and start_execution (as it was in good old Java epoch):
A suggested alternative to pthread_create() would be to define two separate operations: create and start. Some applications would find such behavior more natural. Ada, in particular, separates the "creation" of a task from its "activation".
Splitting the operation was rejected by the standard developers for many reasons:
The number of calls required to start a thread would increase from one to two and thus place an additional burden on applications that do not require the additional synchronization. The second call, however, could be avoided by the additional complication of a start-up state attribute.
An extra state would be introduced: "created but not started". This would require the standard to specify the behavior of the thread operations when the target has not yet started executing.
For those applications that require such behavior, it is possible to simulate the two separate steps with the facilities that are currently provided. The start_routine() can synchronize by waiting on a condition variable that is signaled by the start operation.
You may use RT scheduling; or just add some synchronization in the created thread to get exact information about it's execution. It can be also useful in some cases to manually bind the thread to specific CPU core using pthread_setaffinity_np
A:
It creates the thread and enters the ready queue. When it gets its slice from the scheduler, it starts to run.
How early it gets to run will depend upon thread's priority, no of threads it is competing against among other factors.
|
{
"pile_set_name": "StackExchange"
}
|
(a) Field of the Invention
Embodiments of the present invention relate generally to liquid crystal displays. More specifically, embodiments of the present invention relate to liquid crystal displays having reduced distortion and improved response speed.
(b) Description of the Related Art
A liquid crystal display is one of the types of flat panel display devices that has found wide use. The liquid crystal display commonly includes two display panels where field generating electrodes such as a pixel electrode and a common electrode are formed, and a liquid crystal layer is interposed therebetween.
The liquid crystal display generates an electric field in the liquid crystal layer by applying a voltage to the field generating electrodes, to determine orientations of liquid crystal molecules of the liquid crystal layer and control polarization of incident light, thereby displaying an image.
The liquid crystal display also includes a switching element connected to each pixel electrode, and a plurality of signal lines, including gate lines and data lines, for applying the voltage to the pixel electrode by controlling the switching element.
In one type of liquid crystal display, the vertically aligned mode liquid crystal display, long axes of the liquid crystal molecules are arranged to be vertical to a display panel when no electric field is applied. This configuration results in relatively high contrast ratio and wide reference viewing angle.
Particularly, in vertical alignment (VA) mode liquid crystal displays, a lower panel is formed with an electrode that has a minute slit, and an upper panel is formed with one continuous electrode body thereon, so that a common voltage can be applied to the entire panel. However, as the width of the minute slit is designed to be small, distortion of the electric field is increased. Therefore, the degree that the liquid crystal molecules are slanted is different at a portion where the electrodes are positioned, a portion corresponding to the edge of the electrode, and a portion where the electrodes do not exist, thereby generating a deterioration of transmittance and a deterioration of response time.
The above information disclosed in this Background section is only for enhancement of understanding of the background of the invention and therefore it may contain information not in the prior art.
|
{
"pile_set_name": "USPTO Backgrounds"
}
|
README.md
Android Make Build System
This is the Makefile-based portion of the Android Build System.
For documentation on how to run a build, see Usage.txt
For a list of behavioral changes useful for Android.mk writers see Changes.md
For an outdated reference on Android.mk files, see build-system.html. Our Android.mk files look similar, but are entirely different from the Android.mk files used by the NDK build system. When searching for documentation elsewhere, ensure that it is for the platform build system -- most are not.
This Makefile-based system is in the process of being replaced with Soong, a new build system written in Go. During the transition, all of these makefiles are read by Kati, and generate a ninja file instead of being executed directly. That's combined with a ninja file read by Soong so that the build graph of the two systems can be combined and run as one.
|
{
"pile_set_name": "OpenWebText2"
}
|
Same-sex civil partnerships & marriages (SSM) in Scotland
Part 7: 2014-FEB-04: The Marriage and Civil
Partnership (Scotland) Bill becomes law.
Reactions to the new law.
2014-FEB-04: The Scottish Government passed the bill to legalize same-sex marriages:
Members of the Scottish Parliament (MSPs) voted 105 to 18 in favor of the Marriage and Civil Partnership (Scotland) Bill at about 6:38 PM local time. Scotland became the 17th country in the world to make marriage available to both opposite-sex and same-sex couples. 1,5
Some provisions of the new law:
The bill allows a transgender married individual to stay married when they obtain a Gender Recognition Certificate that recognizes the new gender identity of one of the spouses. The earlier bill passed into law in 2013 in England and Wales required them to divorce their spouse first.
The Scottish Government reached an agreement with the UK Parliament to change the UK Equality Act to protect individual Scottish clergy from court actions claiming discrimination if they want to continue discriminating against same-sex couples by refusing to marry them.
The new law allows scientific Humanists to solemnize secular same-sex marriages. The similar law for England and Wales does not allow this.
The Church of Scotland, which has the status of the national church in Scotland, 2 the Catholic Church, and a few small denominatons currently oppose same-sex marriage. However, they will be able to opt into solemnizing same-sex marriages in the future if and when they decide to change their position.
Clergy, congregations, and faith groups will be able to freely choose to marry same-sex couples, unless this is forbidden by the rules of their denomination/sect/tradition.
All religious institutions will be able to freely discriminate against same-sex couples by not allowing them to be married on their premises.
Civil marriages can be solemnized at any location agreeable to the engaged couple, the registrar, and the owner of the property.
The Scottish Catholic Church, the Presbyterian Church of Scotland and some other small faith groups had opposed the bill, and will not be marrying same-sex couples for the foreseeable future.
Some have speculated that same-sex marriages will begin in the fall of 2014. No specific date was announced at the time that the bill was passed.
"Today will be remembered in history as the day that lesbian, gay and bisexual people were finally granted full legal equality in Scotland, and given an equal right to marry the person they love.
"This is a profoundly emotional moment for many people who grew up in a country where being gay was still a criminal offence until 1980. Scotland can be proud that we now have one of the most progressive equal marriage bills in the world, and that we’ve sent out a strong message about the kind of country we are.
We know this change means so much to LGBT people across Scotland and we look forward to the first same-sex marriages taking place as soon as possible." 4
Alan Hamilton, convener of the Church of Scotland legal questions committee, said that:
"The Church of Scotland holds to the mainstream Christian belief that marriage is properly [only] between a man and a woman."
He also said that its marriages may be:
"... forced out of the present legal framework [as a result of the bill.] We are also concerned that public servants, particularly registrars and teachers, who do not support same-sex marriage, may find themselves disadvantaged in the workplace." 3
The Church had earlier expressed concern that the protections offered by the bill to prevent legal challenges from same-sex couples who want to be married in the church are inadequate. They had said that they may be forced to stop solemnizing all marriages in order to avoid massive legal costs as a result of lawsuits from same-sex couples that the church discriminated against.
Alex Neil. the Health secretary, told Members of the Scottish Parliament (MSPs) that they were doing a:
"... remarkable thing [in passing new laws]. ... We are saying on behalf of Scotland to the world, loud and clear, that we believe in recognizing love between same-sex couples as we do between opposite-sex couples. ... Today is a momentous day for equality in our nation. This legislation sends a powerful message to the world about the kind of society we in Scotland are trying to create -- a nation where the principles of fairness and equality are weaved into the very fabric of our society."
"We’re delighted that MSPs have overwhelmingly demonstrated that they’re committed to building a Scotland fit for the 21st century."
Scotland for Marriage is the main advocacy group that has opposed marriage equality. An unidentified spokesperson said:
"The overwhelming majority of MSPs have ignored public opinion and steamrollered through a law which is ill-conceived, poorly thought out and will, in time, discriminate against ordinary people for their sincerely held beliefs." 3
Sponsored link:
More reactions to the bill's passage:
Jackie Baillie, a Labour MSP said of the bill:
"It’s time for change, it’s time to support equal marriage."
Jackson Carlaw, a Tory MSP has been married for 26 years. He commented that there was a:
"... celebratory attitude [in Parliament during the debate.] I want every couple in Scotland regardless of their sex to be able to have exactly the same opportunity to enjoy the long and happy marriage we have had."
Jim Hume, a Liberal Democrat MSP said:
"We want Scotland to be one of the fairest and most equal places in the world."
|
{
"pile_set_name": "Pile-CC"
}
|
---
abstract: 'A two-photon transition in laser-cooled and trapped calcium atoms is proposed as the atomic reference in an optical frequency standard. An efficient scheme for interrogation of the frequency standard is described, and the sensitivity of the clock transition to systematic effects is estimated. Frequency standards based on this transition could lead to compact and portable devices that are capable of rapidly averaging down to $< 10^{-16}$.'
author:
- 'Amar C. Vutha'
bibliography:
- 'calcium\_clock.bib'
title: 'Optical frequency standard based on a two-photon transition in calcium'
---
Introduction
============
With their extremely high quality factors, narrow optical resonances in atoms are ideal candidates for realizing a highly stable atomic frequency reference. Optical frequency standards (OFS), consisting of narrow linewidth lasers stabilized to atomic transitions, have improved their performance significantly over the last decade. They are soon likely to lead to a more accurate re-definition of the SI second [@Gill2005; @Poli2014]. The atoms in these frequency standards must be isolated from external perturbations and frequency shifts due to atomic motion, and therefore OFS typically use trapped atoms or atomic ions. The best performance to date has been obtained by interrogating the narrow $^1S_0 \to {}^3P_0$ transition in Sr and Yb atoms trapped in optical lattices, to eliminate Doppler and photon recoil shifts, with the lattice lasers tuned to a “magic” wavelength to minimize perturbations on the atoms [@Ludlow2014; @Margolis2014].
Aside from the primary optical clocks that will form the basis of the new SI second, there is a need for ensembles of secondary frequency standards to provide optical flywheels for generating timescales [@Parker2012]. A compact and transportable standard could also address the important problem of comparing the performance of widely separated primary frequency standards. In addition to improving the accuracy of atomic timekeeping, secondary OFS will also find applications in low-noise microwave synthesis (using frequency combs to transfer the phase stability of optical waves to microwaves [@McFerran2005]) and precise geodetic surveys (using the high sensitivity of optical clocks to gravitational red-shifts [@Chou2010]). An array of high-performance frequency standards aboard satellites could also be sensitive to gravitational waves [@Smarr1983; @Armstrong2006]. However, all these applications need a compact OFS that can provide robust long-term performance. A simple design with low system complexity will be an important step towards this goal.
In this paper, the $E1^2$ two-photon transition between the $4s^2 \ {}^1S_0 \to 4s 3d \ {}^1D_2$ states in calcium atoms is offered as a means to realize a compact optical frequency standard. The clock transition between the $m=0$ sublevels of the $^1S_0$ and $^{1}D_2$ states is insensitive to magnetic fields. The two-photon clock transition, driven with identical counter-propagating photons, is free from 1st-order Doppler shifts and photon recoil. This transition, and its analogs in the other alkaline earth atoms, were examined in [@Hall1989] as a possible means of realizing optical fountain clocks. However, the realization of fountain clocks is complicated by large 2nd-order Doppler shifts in the beam of atoms, and the large angular divergence of the atomic beams after single-stage laser-cooling. In this work, we show that magneto-optical trapping of calcium atoms circumvents the woes associated with fountain clocks, and leads to a simple scheme to realize an optical frequency standard. Among the alkaline earth atoms, the feasibility of this scheme is special to Ca, as the ${}^1D_2$ state in Mg is not metastable, whereas the lifetime of the $^1D_2$ state in Sr and Ba are significantly shorter than in Ca. Compared to optical lattice clocks, this simplified scheme eliminates the second-stage cooling lasers and MOTs, the lattice laser, and the associated vacuum and optical hardware from the apparatus. This scheme is therefore well-suited to the realization of portable and low-maintenance secondary optical standards capable of high stability and accuracy. In the following section, the design of such a frequency standard, and an efficient interrogation scheme for the clock transition, are described. This is followed by estimates of the susceptibility of the clock transition to undesired frequency shifts.
We note in passing that an even narrower two-photon transition is generally available in the alkaline earth atoms between the $^1S_0 \to {}^3D_2$ states. However, using this as the basis for an optical frequency standard requires a higher-power clock laser (which leads in turn to larger light shifts), as well as more lasers to repump out of the $^3D$ states. In addition, the proximity of the $^3D_1$ and $^3D_{0,2}$ states leads to 2nd order Zeeman shifts that are larger than for the [$^1S_0 \to {}^1D_2$ ]{}transition. For these reasons, an analysis of the $^1S_0 \to {}^3D_2$ transition is not included here.
Interrogation scheme
====================
Alkaline earth atoms are loaded from an oven or a getter [@Bridge2009] into a compact ultra-high-vacuum chamber pumped by an ion pump. A standard MOT configuration is used for laser cooling and trapping on the strong $4s^2 \ ^1S_0 \to 4s 4p \ {}^1P_1$ transition ($\gamma_1/2\pi \approx$ 34 MHz) (using a laser L1, 423 nm). There is a very small rate of shelving into the $^1D_2$ state ($10^{-5}$/cycle), out of which atoms can be repumped back into the cooling cycle using a laser (L2, 672 nm) tuned to the strongly allowed $4s 3d \ ^1D_2 \to 4s 5p {}^1P_1$ transition ($\gamma_2/2\pi \approx$ 2 MHz). After loading the trap, the cooling lasers and MOT magnetic fields are switched off to avoid light shifts, optical pumping and Zeeman shifts during the interrogation phase. Two counter-propagating beams, derived from the same narrow linewidth laser oscillator (LO) (L3, 916 nm), are then used to drive the [$^1S_0 \to {}^1D_2$ ]{}clock transition ($\gamma_3/2\pi \approx$ 40 Hz) in a Rabi or Ramsey scheme. We assume that a sufficiently long interrogation sequence is used ($\geq$6.3 ms for a Ramsey sequence) so that the measured linewidth is limited by the natural linewidth of the transition.
The excitation probability is measured using laser-induced cycling fluorescence on the $^1D_2 \leftrightarrow 4s 4f \ {}^1F_3$ cycling transition (L4, 488 nm) [^1], or by measuring the drop in the MOT’s fluorescence when the laser L1 (but not L2) is switched back on. Collection of fluorescence on these cycling transitions means that small-solid-angle detectors can be conveniently used while still obtaining near-unity detection efficiency, at a noise level limited by quantum projection noise in the detection process. During a 10 ms-long interrogation + detection sequence, the atoms move $\sim$ 7 mm. Therefore a large fraction of them can be recaptured by the MOT and re-used for the next cycle.
Assuming that $N=10^6$ atoms can be interrogated in the MOT and detected with shot-noise-limited sensitivity, the frequency resolution of the clock, with a natural lifetime $T$ and an integration time $\tau$, is $\delta \nu = 1/2\pi \sqrt{N T \tau}$. Using $T =$ 2 ms, this evaluates to a fractional frequency resolution $\delta \nu/\nu = 10^{-17}/\sqrt{\tau(s)}$. Even allowing that this might be reduced due to the duty cycle of the interrogation, this is an extremely attractive sensitivity for a secondary standard, which must be capable of quick comparisons with primary standards and other frequency references. Further, the fast cycle time means that Dick effect noise is less important – the flywheel for the laser’s frequency only needs to carry it over for $\sim$ 10 ms, until the next interrogation – leading to relaxed requirements on the LO. Calculations using realistic parameters for a MOT indicate that a two-photon Rabi frequency $\Omega_{\mathrm}{eff}$ = $2\pi \times$ 300 Hz can be achieved with 1 W of LO power, commensurate with a modest power build-up cavity around the MOT that is fed by a 916 nm diode laser. All the lasers can be derived from laser diodes, and the scheme is compatible with a low-mass, low-power apparatus. We also note that this scheme lends itself quite naturally to methods that attempt to push beyond the standard quantum limit, using atom-cavity interactions [@Schleier-Smith2010] and/or non-classical light sources.
{width="\columnwidth"}
\[fig:energyLevels\]
Systematic effects
==================
2nd order Doppler shift
-----------------------
Using $\sim$ 2 mK for the temperature of a single stage 423 nm MOT, the root-mean-square velocity of the calcium atoms is $v_{\mathrm}{rms} \approx$ 70 cm/s. This leads to a 2nd-order Doppler shift whose fractional size is $$\frac{\delta \nu}{\nu} = -\frac{1}{2} \frac{v_{\mathrm}{rms}^2}{c^2} = -2.7 \times 10^{-18}.$$ This rather small number implies that the stability of the temperature of the atoms in the MOT will not affect the operation of the frequency standard to any relevant degree.
Collisions
----------
Assuming a MOT density $n_{\mathrm}{MOT} = 10^9$/cm$^3$ and a collision cross section $\sigma \simeq 10^{-14}$ cm$^2$, the estimated mean free time between collisions is $\tau_{\mathrm}{coll} \simeq$ 1500 s. This is significantly larger than the expected cycle time of the interrogation. Conservatively assuming $\sim \pi$ rad phase shift per collision, the (fractional) collisional frequency shift evaluates to $\sim 3 \times 10^{-18}$. Therefore we consider it likely that collisional effects can be controlled or calibrated at the level of $\leq 10^{-16}$.
Electric shifts
---------------
The DC electric and light shifts were evaluated numerically, using the known transition rates (and dipole matrix elements derived from them) for the singlet states up to $4s 5p$ [@Hansen1999]. The calculated DC polarizability of the $4s^2 \ ^1S_0$ state is 75, $a_0^3$ and that of the $4s 3d \ ^1D_2$ state is 32 $a_0^3$. The resulting DC electric shift of the transition is $\delta \nu_{\mathrm}{E} \approx -\Delta \alpha_{\mathrm}{DC} {\mathcal{E}}^2 \approx$ +13 mHz/(V/cm)$^2$, $(\delta \nu/\nu)_{\mathrm}{E} \approx 2 \times 10^{-17}$/(V/cm)$^2$.
{width="\columnwidth"}
\[fig:electric-shifts\]
The light shift of the clock transition due to photons at 916 nm was evaluated using dressed states (using both the co- and counter-rotating components). It is equal to $\Delta E_{\mathrm}{LS} \simeq 12$ Hz/(W/cm$^2$) for $\hat{z}$-polarized light.
Note that for many of the applications of a secondary standard, it is sufficient that the frequency (shifts) be stable and repeatable. However, there are also ways to improve the absolute accuracy of the frequency standard by cancelling the light shift: a) the light shift and the (spatial) excitation profile scale in the same way with the laser intensity. Once the light shift is calibrated, it can be applied as a correction that is proportional to the (measured) excitation probability. cf. [@Huntemann2012a] for an example of a highly forbidden transition, where the light shift is cancelled by extrapolating the laser power. b) There are variants of the Ramsey pulse sequence that have been applied to forbidden clock transitions (“hyper-Ramsey” pulse sequences) [@Yudin2010], where the light shift can be cancelled at the expense of some complexity in the interrogation pulse sequence.
Black-body radiation shift
--------------------------
The BBR shift can be approximately estimated from the DC electric polarizabilities, since the relevant atomic transitions are well to the blue of the thermal photon distribution: $$\delta \nu_{\mathrm}{BBR} \approx -\frac{2}{15}(\alpha \pi)^3 T^4 \ [\alpha_{\mathrm}{DC}({}^1D_2) - \alpha_{\mathrm}{s}({}^1S_0)].$$ (Here $\alpha$ is the fine structure constant, $T$ is the temperature in atomic units, and the value for $\delta \nu_{\mathrm}{BBR}$ is also in atomic units.) Using the above-calculated DC polarizabilities, this yields $(\delta \nu/\nu)_{\mathrm}{BBR} \approx 0.6 \times 10^{-15}$. This BBR shift only needs to be evaluated to $\sim$ 10% accuracy, to obtain $\leq 10^{-16}$ fractional accuracy of the frequency standard at room temperature.
Magnetic shifts
---------------
The clock states are both $m=0$ states, and the most abundant calcium isotope has zero nuclear magnetic moment. The dominant source of magnetic shifts of the clock transition is a 2nd-order Zeeman shift due to the ${\mathcal{B}}$-field-induced mixing of the $^1D_2$ and $^3D_{1,3}$ states. Assuming a $\sim$1 $\mu_B$ matrix element for this spin flip transition, and using the energy difference $\Delta \approx$ 50 THz between these states, the magnetic shift coefficient for the clock transition is estimated to be $\delta \nu_{\mathrm}{B} \approx$ 50 mHz/G$^2$. The fractional shift is $\Big(\frac{\delta \nu}{\nu}\Big)_B \approx 2 \times 10^{-16}$/G$^2$. This bodes well for achieving a fractional frequency accuracy better than $10^{-16}$ using field cancellation coils and/or simple magnetic shielding.
---------------------------------------- ---------------------------------------------------------------------- ----------------------------------------------
Systematic Parameter Fractional frequency
effect control range shift, $\frac{\delta \nu}{\nu}$ ($10^{-17}$)
2$^{\mathrm}{nd}$ order Doppler $v_{\mathrm}{rms} \lesssim$ 1 m/s 0.5
Electric shift ${\mathcal{E}}\lesssim$ 0.1 V/cm 0.02
Light shift $\frac{\delta P}{P} \lesssim 10^{-3}$ 1.8
BBR shift $\frac{\delta \alpha_{\mathrm}{s}}{\alpha_{\mathrm}{s}} \lesssim$ 5% 3
Magnetic shift ${\mathcal{B}}\lesssim$ 0.1 G 0.2
---------------------------------------- ---------------------------------------------------------------------- ----------------------------------------------
: *Estimated contributions to the systematic shifts in a calcium-MOT-based optical frequency reference, using realistic ranges for parameters that can be controlled or calculated.*
Summary
=======
A scheme to construct an optical frequency standard has been described, based on the [$^1S_0 \to {}^1D_2$ ]{}two-photon transition in calcium atoms trapped in a magneto-optical trap. Using a simple apparatus, it is capable of achieving statistical sensitivity and systematic immunity at the level of $\leq$ 1 part in $10^{16}$. The dominant systematic effects that are likely to affect the operation of the frequency standard are listed in Table I. An implementation of this scheme in a compact calcium MOT could lead to robust and portable frequency standards, with a multitude of potential applications in time & frequency transfer, geophysics and precision measurements. We have begun the construction of a prototype device.
Acknowledgments {#acknowledgments .unnumbered}
===============
I am grateful to Eric Hessels and Dave DeMille for their encouragement and helpful suggestions. I have benefited greatly from conversations with Stephan Falke and Uwe Sterr. I thank Eric Hudson, Wes Campbell and the ACME collaboration for the loan of equipment during a preliminary experiment. This work is supported by a Society in Science Branco Weiss Fellowship, administered by the ETH Zurich.
[^1]: D. DeMille, private communication (2014)
|
{
"pile_set_name": "ArXiv"
}
|
Republican presidential nominee Donald Trump opened a busy final weekend of his presidential campaign with a return stop in Tampa, Florida Saturday morning, speaking to thousands packed in to a large exhibit hall on the Florida Fairgrounds.
The Gateway Pundit’s Man in Florida Kristinn Taylor covered the rally and posted a series of photos to Twitter which are collected below.
Some moments were captured on a pro-camera which will posted later in a new article.
View of @realDonaldTrump on video monitor at Tampa FL rally @gatewaypundit pic.twitter.com/79fT28bf4q — Kristinn Taylor (@KristinnFR) November 5, 2016
“View of @realDonaldTrump on video monitor at Tampa FL rally @gatewaypundit”
TRENDING: BREAKING: Senate Finance and Homeland Security Committees Release DEVASTATING Report on Hunter Biden, Burisma and Corruption -- CROOKED BIDEN FAMILY ENRICHED THEMSELVES AND OBAMA KNEW!
Supporters chant "USA! USA! as @realDonaldTrump makes entrance at Tampa FL rally @gatewaypundit pic.twitter.com/MprH54KHwx — Kristinn Taylor (@KristinnFR) November 5, 2016
“Supporters chant “USA! USA! as @realDonaldTrump makes entrance at Tampa FL rally @gatewaypundit”
https://twitter.com/KristinnFR/status/794913740256841728
“Long walk through Florida Fairgrounds in Tampa for @realDonaldTrump rally @gatewaypundit”
https://twitter.com/KristinnFR/status/794913843310895104
“Supporters entering Florida Fairgrounds building in Tampa for @realDonaldTrump rally @gatewaypundit”
“Crowd arriving for @realDonaldTrump Tampa FL rally @gatewaypundit”
“Media riser for @realDonaldTrump Tampa FL rally @gatewaypundit”
“Media pen stage left @realDonaldTrump Tampa FL rally @gatewaypundit”
“Media pen stage right @realDonaldTrump Tampa FL rally @gatewaypundit”
Daily Mail reporter David Martosko in Media pen @realDonaldTrump Tampa FL rally @gatewaypundit pic.twitter.com/WrJ7q0hxor — Kristinn Taylor (@KristinnFR) November 5, 2016
“Daily Mail reporter David Martosko in Media pen @realDonaldTrump Tampa FL rally @gatewaypundit”
Press critic holds banner in front of media pen @realDonaldTrump Tampa FL rally @gatewaypundit pic.twitter.com/NLdklCJsbD — Kristinn Taylor (@KristinnFR) November 5, 2016
“Press critic holds banner in front of media pen @realDonaldTrump Tampa FL rally @gatewaypundit”
Crowd filling in large hall for @realDonaldTrump Tampa FL rally @gatewaypundit pic.twitter.com/BORCwQ7N86 — Kristinn Taylor (@KristinnFR) November 5, 2016
“Crowd filling in large hall for @realDonaldTrump Tampa FL rally @gatewaypundit”
“Young girl at @realDonaldTrump Tampa FL rally @gatewaypundit”
“Joe Piscopo speaks at @realDonaldTrump Tampa FL rally @gatewaypundit”
“Lou Holtz speaks at @realDonaldTrump Tampa FL rally @gatewaypundit”
“Patriotic Trump supporter at @realDonaldTrump Tampa FL rally @gatewaypundit”
Women for Trump before @realDonaldTrump Tampa FL rally pic.twitter.com/3D4mWEEEwo — Kristinn Taylor (@KristinnFR) November 5, 2016
“Women for Trump before @realDonaldTrump Tampa FL rally”
“Hispanics for Trump before @realDonaldTrump Tampa FL rally @gatewaypundit”
“@realDonaldTrump acknowledges Blacks for Trump at Tampa FL rally @gatewaypundit”
@realDonaldTrump protesters removed from Tampa FL rally brought children with them. pic.twitter.com/OBPzv5tw0e — Kristinn Taylor (@KristinnFR) November 5, 2016
“@realDonaldTrump protesters removed from Tampa FL rally brought children with them.”
“After @realDonaldTrump Tampa FL rally, supporters parade before media pen @gatewaypundit”
@realDonaldTrump supporters menace press with Women for Trump signs after Tampa FL rally @gatewaypundit pic.twitter.com/UvBEHSTU40 — Kristinn Taylor (@KristinnFR) November 5, 2016
“@realDonaldTrump supporters menace press with Women for Trump signs after Tampa FL rally @gatewaypundit”
Scary scene as @realDonaldTrump supporters chant "Trump! Trump!" after Tampa FL rally /sarcasm @gatewaypundit pic.twitter.com/xt0nl8TCRq — Kristinn Taylor (@KristinnFR) November 5, 2016
“Scary scene as @realDonaldTrump supporters chant “Trump! Trump!” after Tampa FL rally /sarcasm @gatewaypundit”
Fox Business reporter has civil talk with @realDonaldTrump supporters after Tampa FL rally @gatewaypundit pic.twitter.com/EVdetsiabW — Kristinn Taylor (@KristinnFR) November 5, 2016
“Fox Business reporter has civil talk with @realDonaldTrump supporters after Tampa FL rally @gatewaypundit”
|
{
"pile_set_name": "OpenWebText2"
}
|
/*
* DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
*
* This code is free software; you can redistribute it and/or modify it
* under the terms of the GNU General Public License version 2 only, as
* published by the Free Software Foundation. Oracle designates this
* particular file as subject to the "Classpath" exception as provided
* by Oracle in the LICENSE file that accompanied this code.
*
* This code is distributed in the hope that it will be useful, but WITHOUT
* ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
* FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License
* version 2 for more details (a copy is included in the LICENSE file that
* accompanied this code).
*
* You should have received a copy of the GNU General Public License version
* 2 along with this work; if not, write to the Free Software Foundation,
* Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
*
* Please contact Oracle, 500 Oracle Parkway, Redwood Shores, CA 94065 USA
* or visit www.oracle.com if you need additional information or have any
* questions.
*/
/*
*
* (C) Copyright IBM Corp. 1999 All Rights Reserved.
* Copyright 1997 The Open Group Research Institute. All rights reserved.
*/
package sun.security.krb5.internal;
import sun.security.krb5.Config;
import sun.security.krb5.KrbException;
import sun.security.krb5.Asn1Exception;
import sun.security.krb5.internal.util.KerberosFlags;
import sun.security.util.*;
import java.io.IOException;
/**
* Implements the ASN.1 KDCOptions type.
*
* <xmp>
* KDCOptions ::= KerberosFlags
* -- reserved(0),
* -- forwardable(1),
* -- forwarded(2),
* -- proxiable(3),
* -- proxy(4),
* -- allow-postdate(5),
* -- postdated(6),
* -- unused7(7),
* -- renewable(8),
* -- unused9(9),
* -- unused10(10),
* -- opt-hardware-auth(11),
* -- unused12(12),
* -- unused13(13),
* -- 15 is reserved for canonicalize
* -- unused15(15),
* -- 26 was unused in 1510
* -- disable-transited-check(26),
* -- renewable-ok(27),
* -- enc-tkt-in-skey(28),
* -- renew(30),
* -- validate(31)
*
* KerberosFlags ::= BIT STRING (SIZE (32..MAX))
* -- minimum number of bits shall be sent,
* -- but no fewer than 32
*
* </xmp>
*
* <p>
* This definition reflects the Network Working Group RFC 4120
* specification available at
* <a href="http://www.ietf.org/rfc/rfc4120.txt">
* http://www.ietf.org/rfc/rfc4120.txt</a>.
*
* <p>
* This class appears as data field in the initial request(KRB_AS_REQ)
* or subsequent request(KRB_TGS_REQ) to the KDC and indicates the flags
* that the client wants to set on the tickets.
*
* The optional bits are:
* <UL>
* <LI>KDCOptions.RESERVED
* <LI>KDCOptions.FORWARDABLE
* <LI>KDCOptions.FORWARDED
* <LI>KDCOptions.PROXIABLE
* <LI>KDCOptions.PROXY
* <LI>KDCOptions.ALLOW_POSTDATE
* <LI>KDCOptions.POSTDATED
* <LI>KDCOptions.RENEWABLE
* <LI>KDCOptions.RENEWABLE_OK
* <LI>KDCOptions.ENC_TKT_IN_SKEY
* <LI>KDCOptions.RENEW
* <LI>KDCOptions.VALIDATE
* </UL>
* <p> Various checks must be made before honoring an option. The restrictions
* on the use of some options are as follows:
* <ol>
* <li> FORWARDABLE, FORWARDED, PROXIABLE, RENEWABLE options may be set in
* subsequent request only if the ticket_granting ticket on which it is based has
* the same options (FORWARDABLE, FORWARDED, PROXIABLE, RENEWABLE) set.
* <li> ALLOW_POSTDATE may be set in subsequent request only if the
* ticket-granting ticket on which it is based also has its MAY_POSTDATE flag set.
* <li> POSTDATED may be set in subsequent request only if the
* ticket-granting ticket on which it is based also has its MAY_POSTDATE flag set.
* <li> RENEWABLE or RENEW may be set in subsequent request only if the
* ticket-granting ticket on which it is based also has its RENEWABLE flag set.
* <li> POXY may be set in subsequent request only if the ticket-granting ticket
* on which it is based also has its PROXIABLE flag set, and the address(es) of
* the host from which the resulting ticket is to be valid should be included
* in the addresses field of the request.
* <li>FORWARDED, PROXY, ENC_TKT_IN_SKEY, RENEW, VALIDATE are used only in
* subsequent requests.
* </ol><p>
*/
public class KDCOptions extends KerberosFlags {
private static final int KDC_OPT_PROXIABLE = 0x10000000;
private static final int KDC_OPT_RENEWABLE_OK = 0x00000010;
private static final int KDC_OPT_FORWARDABLE = 0x40000000;
// KDC Options
public static final int RESERVED = 0;
public static final int FORWARDABLE = 1;
public static final int FORWARDED = 2;
public static final int PROXIABLE = 3;
public static final int PROXY = 4;
public static final int ALLOW_POSTDATE = 5;
public static final int POSTDATED = 6;
public static final int UNUSED7 = 7;
public static final int RENEWABLE = 8;
public static final int UNUSED9 = 9;
public static final int UNUSED10 = 10;
public static final int UNUSED11 = 11;
public static final int CNAME_IN_ADDL_TKT = 14;
public static final int CANONICALIZE = 15;
public static final int RENEWABLE_OK = 27;
public static final int ENC_TKT_IN_SKEY = 28;
public static final int RENEW = 30;
public static final int VALIDATE = 31;
private static final String[] names = {
"RESERVED", //0
"FORWARDABLE", //1;
"FORWARDED", //2;
"PROXIABLE", //3;
"PROXY", //4;
"ALLOW_POSTDATE", //5;
"POSTDATED", //6;
"UNUSED7", //7;
"RENEWABLE", //8;
"UNUSED9", //9;
"UNUSED10", //10;
"UNUSED11", //11;
null,null,
"CNAME_IN_ADDL_TKT",//14;
"CANONICALIZE", //15;
null,null,null,null,null,null,null,null,null,null,null,
"RENEWABLE_OK", //27;
"ENC_TKT_IN_SKEY", //28;
null,
"RENEW", //30;
"VALIDATE", //31;
};
private boolean DEBUG = Krb5.DEBUG;
public static KDCOptions with(int... flags) {
KDCOptions options = new KDCOptions();
for (int flag: flags) {
options.set(flag, true);
}
return options;
}
public KDCOptions() {
super(Krb5.KDC_OPTS_MAX + 1);
setDefault();
}
public KDCOptions(int size, byte[] data) throws Asn1Exception {
super(size, data);
if ((size > data.length * BITS_PER_UNIT) || (size > Krb5.KDC_OPTS_MAX + 1))
throw new Asn1Exception(Krb5.BITSTRING_BAD_LENGTH);
}
/**
* Constructs a KDCOptions from the specified bit settings.
*
* @param data the bits to be set for the KDCOptions.
* @exception Asn1Exception if an error occurs while decoding an ASN1
* encoded data.
*
*/
public KDCOptions(boolean[] data) throws Asn1Exception {
super(data);
if (data.length > Krb5.KDC_OPTS_MAX + 1) {
throw new Asn1Exception(Krb5.BITSTRING_BAD_LENGTH);
}
}
public KDCOptions(DerValue encoding) throws Asn1Exception, IOException {
this(encoding.getUnalignedBitString(true).toBooleanArray());
}
/**
* Constructs a KDCOptions from the passed bit settings.
*
* @param options the bits to be set for the KDCOptions.
*
*/
public KDCOptions(byte[] options) {
super(options.length * BITS_PER_UNIT, options);
}
/**
* Parse (unmarshal) a KDCOptions from a DER input stream. This form
* parsing might be used when expanding a value which is part of
* a constructed sequence and uses explicitly tagged type.
*
* @param data the Der input stream value, which contains one or more
* marshaled value.
* @param explicitTag tag number.
* @param optional indicate if this data field is optional
* @return an instance of KDCOptions.
* @exception Asn1Exception if an error occurs while decoding an ASN1 encoded data.
* @exception IOException if an I/O error occurs while reading encoded data.
*
*/
public static KDCOptions parse(DerInputStream data, byte explicitTag, boolean optional) throws Asn1Exception, IOException {
if ((optional) && (((byte)data.peekByte() & (byte)0x1F) != explicitTag))
return null;
DerValue der = data.getDerValue();
if (explicitTag != (der.getTag() & (byte)0x1F)) {
throw new Asn1Exception(Krb5.ASN1_BAD_ID);
} else {
DerValue subDer = der.getData().getDerValue();
return new KDCOptions(subDer);
}
}
/**
* Sets the value(true/false) for one of the <code>KDCOptions</code>.
*
* @param option an option bit.
* @param value true if the option is selected, false if the option is not selected.
* @exception ArrayIndexOutOfBoundsException if array index out of bound occurs.
* @see sun.security.krb5.internal.Krb5
*/
public void set(int option, boolean value) throws ArrayIndexOutOfBoundsException {
super.set(option, value);
}
/**
* Gets the value(true/false) for one of the <code>KDCOptions</code>.
*
* @param option an option bit.
* @return value true if the option is selected, false if the option is not selected.
* @exception ArrayIndexOutOfBoundsException if array index out of bound occurs.
* @see sun.security.krb5.internal.Krb5
*/
public boolean get(int option) throws ArrayIndexOutOfBoundsException {
return super.get(option);
}
@Override public String toString() {
StringBuilder sb = new StringBuilder();
sb.append("KDCOptions: ");
for (int i=0; i<Krb5.KDC_OPTS_MAX+1; i++) {
if (get(i)) {
if (names[i] != null) {
sb.append(names[i]).append(",");
} else {
sb.append(i).append(",");
}
}
}
return sb.toString();
}
private void setDefault() {
try {
Config config = Config.getInstance();
// If key not present, returns Integer.MIN_VALUE, which is
// almost all zero.
int options = config.getIntValue("libdefaults",
"kdc_default_options");
if ((options & KDC_OPT_RENEWABLE_OK) == KDC_OPT_RENEWABLE_OK) {
set(RENEWABLE_OK, true);
} else {
if (config.getBooleanValue("libdefaults", "renewable")) {
set(RENEWABLE_OK, true);
}
}
if ((options & KDC_OPT_PROXIABLE) == KDC_OPT_PROXIABLE) {
set(PROXIABLE, true);
} else {
if (config.getBooleanValue("libdefaults", "proxiable")) {
set(PROXIABLE, true);
}
}
if ((options & KDC_OPT_FORWARDABLE) == KDC_OPT_FORWARDABLE) {
set(FORWARDABLE, true);
} else {
if (config.getBooleanValue("libdefaults", "forwardable")) {
set(FORWARDABLE, true);
}
}
} catch (KrbException e) {
if (DEBUG) {
System.out.println("Exception in getting default values for " +
"KDC Options from the configuration ");
e.printStackTrace();
}
}
}
}
|
{
"pile_set_name": "Github"
}
|
People v Williams (2020 NY Slip Op 00755)
People v Williams
2020 NY Slip Op 00755
Decided on January 31, 2020
Appellate Division, Fourth Department
Published by New York State Law Reporting Bureau pursuant to Judiciary Law § 431.
This opinion is uncorrected and subject to revision before publication in the Official Reports.
Decided on January 31, 2020
SUPREME COURT OF THE STATE OF NEW YORK
Appellate Division, Fourth Judicial Department
PRESENT: WHALEN, P.J., CENTRA, PERADOTTO, CARNI, AND DEJOSEPH, JJ.
1131 KA 17-01993
[*1]THE PEOPLE OF THE STATE OF NEW YORK, RESPONDENT,
vJASHUA WILLIAMS, DEFENDANT-APPELLANT.
FRANK H. HISCOCK LEGAL AID SOCIETY, SYRACUSE (KRISTEN N. MCDERMOTT OF COUNSEL), FOR DEFENDANT-APPELLANT.
WILLIAM J. FITZPATRICK, DISTRICT ATTORNEY, SYRACUSE (KENNETH H. TYLER, JR., OF COUNSEL), FOR RESPONDENT.
Appeal from a judgment of the Onondaga County Court (Anthony F. Aloi, J.), rendered October 13, 2016. The judgment convicted defendant upon a nonjury verdict of murder in the second degree, criminal possession of a weapon in the second degree (two counts) and endangering the welfare of a child.
It is hereby ORDERED that the judgment so appealed from is unanimously affirmed.
Memorandum: Defendant appeals from a judgment convicting him upon a nonjury verdict of murder in the second degree (Penal Law
§ 125.25 [1]), endangering the welfare of a child (§ 260.10 [1]), and two counts of criminal possession of a weapon in the second degree
(§ 265.03 [1] [b]; [3]). We reject defendant's contention that the evidence is legally insufficient to establish his liability as an accessory with respect to those charges. "Accessorial liability requires only that defendant, acting with the mental culpability required for the commission of the crime[s], intentionally aid another in the conduct constituting the offense[s]" (People v Pizarro, 151 AD3d 1678, 1681 [4th Dept 2017], lv denied 29 NY3d 1132 [2017] [internal quotation marks omitted]; see § 20.00). Here, viewing the evidence in the light most favorable to the People (see People v Fox, 124 AD3d 1252, 1253 [4th Dept 2015]), the factfinder could have reasonably concluded that defendant and the man alleged by defendant to have shot the victim shared "a common purpose and a collective objective" (see People v Cabey, 85 NY2d 417, 422 [1995]), and that defendant "shared in the intention of" the shooter (People v Morris, 229 AD2d 451, 451 [2d Dept 1996], lv denied 88 NY2d 990 [1996]).
Viewing the evidence in light of the elements of the crimes in this nonjury trial (see People v Danielson, 9 NY3d 342, 349 [2007]), we reject defendant's contention that the verdict is against the weight of the evidence (see generally People v Bleakley, 69 NY2d 490, 495 [1987]). Although an acquittal would not have been unreasonable, upon "weigh[ing] conflicting testimony, review[ing] any rational inferences that may be drawn from the evidence and evaluat[ing] the strength of such conclusions" (People v Courteau, 154 AD3d 1317, 1318 [4th Dept 2017], lv denied 30 NY3d 1104 [2018]), we conclude that County Court did not fail to give the evidence the weight it should be accorded (see People v O'Neill, 169 AD3d 1515, 1515 [4th Dept 2019]; see generally Bleakley, 69 NY2d at 495). Contrary to defendant's contention, the trial testimony tending to establish his guilt was not incredible as a matter of law (see generally People v Washington, 160 AD3d 1451, 1452 [4th Dept 2018]; People v Moore [appeal No. 2], 78 AD3d 1658, 1659-1660 [4th Dept 2010]), and any inconsistencies in that testimony merely presented issues of credibility for the factfinder to resolve (see generally People v Withrow, 170 AD3d 1578, 1579 [4th Dept 2019], lv denied 34 NY3d 940 [2019], reconsideration denied 34 NY3d 1020 [2019]; People v Graves, 163 AD3d 16, 23 [4th Dept 2018]).
We also reject defendant's contention that he received ineffective assistance of counsel [*2]due to counsel's failure to adduce evidence at trial that one of the People's witnesses had received a specific promise of consideration in exchange for that witness' truthful testimony. At trial, however, that witness testified that he hoped his cooperation would be considered at his upcoming sentencing on an unrelated charge, and that no specific promise had been made to him. The record on appeal contains no evidence of any agreement beyond the general hope for leniency described by the witness at trial, and thus defendant has failed to "demonstrate the absence of strategic or other legitimate explanations for" defense counsel's failure to adduce additional proof of a specific agreement (People v Kurkowski, 117 AD3d 1442, 1443 [4th Dept 2014] [internal quotation marks omitted]).
Finally, the sentence is not unduly harsh or severe.
Entered: January 31, 2020
Mark W. Bennett
Clerk of the Court
|
{
"pile_set_name": "FreeLaw"
}
|
AUBURN, Ala. - Auburn used a 14-point third quarter to wrestle away momentum from Georgia en route to a 49-31 win to keep the number two team in the nation undefeated with just one regular season game remaining. Auburn trailed by 14 points in the first quarter but outscored Georgia 42-10 over the last three quarters to move to 11-0, 7-0 SEC on the season and clinch a berth in next month's SEC Championship Game in Atlanta.
Auburn used a punishing ground attack, led by quarterback Cam Newton's 150 rushing yards and Onterio McCalebb's 71 yards and three rushing touchdowns, to rack up 315 yards on the ground on 57 carries, averaging 5.5 yards per carry and scoring five of its seven touchdowns on the ground.
The other two Auburn scores came courtesy of two Netwon to Philip Lutzenkirchen tosses as he hit the tight end for an 18-yard score in the closing minutes of the first half to tie it at 21-21 and then again on Auburn's first drive of the fourth quarter with a 13 yard pass to go up 42-31. Newton finished the night with 148 yards passing and in the process became the first player in SEC history and the eighth different player in NCAA history to pass for 2,000 yards and rush for 1,000 yards in a single season.
Auburn tailback Michael Dyer also etched his name in the school's record book as he gained 60 yards on 13 carries, establishing a freshman record for yards in a season with 859, snapping Bo Jackson's 28-year old record of 829 yards set in 1982.
Tied at 21-21 at the half, Auburn successfully converted and recovered an on-side kick that lead to a nine-play, 59-yard scoring drive, capped by McCalebb's second touchdown of the day, this one a two-yard scamper to go up 28-21.
After Georgia (5-6, 3-5 SEC) answered to tie it at 28-28 on Washaun Ealey's seven-yard touchdown run, Auburn went 81 yards in seven plays, capped by McCalebb's four-yard score to go up 35-28, a lead it would not relinquish the rest of the way.
In Auburn's 14-point third quarter, the team rushed for 140 yards on 16 carries while not attempting a pass.
After allowing 162 yards and three touchdowns to Georgia on each of its first three possessions, the Auburn defense stiffened, allowing just 192 yards the rest of the way.
Craig Stevens led Auburn with nine tackles while Nosa Eguae had two sacks of Georgia quarterback Aaron Murray, who finished the game 15-for-28 for 273 yards.
Emory Blake had three catches for 64 yards to lead all of Auburn's receivers while A.J. Green led Georgia with nine catches for 164 yards and two scores.
Newton shakes off troubles to lead Auburn past UGA
Responding with another brilliant performance, Newton passed for two touchdowns and ran for two more to lead No. 2 Auburn into the Southeastern Conference championship game -- and another step closer to playing for the national title.
The Tigers pulled away from Georgia in the fourth quarter for a 49-31 victory that, at least for one day, took some of the heat off college football's most dynamic player.
"I'm just very proud of the way he played," coach Gene Chizik said. "He's a really, really talented, extremely gifted player who means a lot of our football team."
Newton celebrated with his teammates after the game, yukking it up in front of the student section.
Auburn officials refused to make Newton available to the media.
Chizik went along with that theme, saying right at the start of his news conference he would only answer questions about what happened on the field. When a reporter asked him about his feelings toward Cecil Newton, the quarterback's father, this was the reply: "I'm only taking questions about this football game, thank you."
The Tigers (11-0, 7-0 SEC) will face No. 22 South Carolina for the conference title on Dec. 4 in Atlanta, though let's not forget that game looming in two weeks -- the Iron Bowl showdown against defending national champion Alabama in Tuscaloosa.
"We have another huge football game coming up," Chizik said. "We've got to get ready for that game."
"SEC! SEC! SEC!" the sellout crowd of 87,451 chanted in the closing minutes, looking forward to the Tigers' return to the title game for the first time since the perfect 2004 season. For their second-year coach, it was an especially satisfying moment, since many took issue with Auburn's decision to hire someone with a 5-19 career record.
"Make no mistake, our goal when we got her was to win a championship," Chizik said. "We've not done that yet. We're not going to act like we have, because we haven't. But we're one step closer to being able to do that."
Auburn survived another high-scoring, back-and-forth affair, rallying from an early 21-7 deficit to tie it up by halftime. The Tigers kept the momentum going with a daring onside kick to start the third quarter, recovering the ball and driving for the go-ahead touchdown.
Georgia (5-6, 3-5) hung tough behind A.J. Green's nine-catch, 164-yard performance, tying the game again at 28-all before Auburn went ahead for good on Onterio McCalebb's 4-yard touchdown run. Newton finished off the Bulldogs with his second scoring pass of the game to tight end Philip Lutzenkirchen, a 13-yarder over the middle with 8:05 remaining.
Newton rushed for 151 yards on 30 bruising carries, scoring Auburn's first touchdown on a 31-yard run and capping off the win with a 1-yard leap into the end zone in the closing minutes. The ball popped loose, Georgia recovered and the replay left some doubt about whether he got over.
But the review went Newton's way, as so many things have this season. The 6-foot-6, 250-pounder celebrated with another leap into receivers coach Trooper Taylor along the sideline, sending the much-smaller assistant flying.
Newton completed 12 of 15 passes for 148 yards, and his one glaring mistake -- an interception that set up a Georgia touchdown -- was actually off a deflected ball that should have been caught by the receiver.
Along the way, Newton became the first player in Southeastern Conference history to pass for 2,000 yards and rush for 1,000 yards in a season.
The only sour note for Auburn came in the closing seconds. Things got chippy as the teams jawed back and forth at each other, and a brawl nearly broke out.
Two of the Tigers' defensive players, tackle Mike Blanc and end Michael Goggans, were ejected and can't play in the first half against Alabama.
"I'm embarrassed by it," Chizik said. "That's not who we are, that's not the way we carry ourselves, and we'll address it tonight."
Green, whose season began with a four-game suspension for selling a bowl jersey to someone considered an agent by the NCAA, was impressed by the way Newton handled himself amid all the turmoil.
"He had a great game," Green said. "It's hard to focus when you're a quarterback and you've got all that stuff surrounding you. He's a great guy and I feel like he handled the show in a professional way."
The lingering issue about Newton's playing status was answered when he trotted on the field an hour before kickoff, wearing his familiar No. 2, and went through the normal pregame routine with the rest of the offense. The early arriving student body roared when they spotted the quarterback, and the cheers were even louder about a half-hour later when Newton was announced as the starting quarterback.
One fan held up a sign that said, "We Are Cam-ily."
On the very first snap, Newton dropped back to pass, sidestepped two defenders and broke off a 13-yard run. Four plays later, he got loose around right end and bowled over two defenders as he tumbled into the end zone.
Georgia had won four straight in the Deep South's oldest rivalry and needed another to become bowl eligible in a disappointing season. Redshirt Aaron Murray passed for 273 yards and three touchdowns, while the Bulldogs defense got some pressure on Newton in the early going.
They couldn't keep it going, not against a guy intent on leaving his troubles behind.
|
{
"pile_set_name": "Pile-CC"
}
|
St. Joseph's Public School
St. Joseph's Public School is a school in the King Koti area of Hyderabad, India. The principal is U. G. Reddy, and the headmistress is Aparna.
The school started with a population of 30 students and 5 teachers and today has a population of 7000 students and 250 teachers.
The school is divided into three blocks. Classes P-I to VI are in the main block which is a three storied building. Two classes are there in each floor. The middle school block has classes VII & VIII in a separate building and the new ISC block is for classes IX to XII.
Branches
Apart from the main branch at Koti, the school has a branch at Asman Garh Palace.
See also
Education in India
List of schools in India
List of institutions of higher education in Telangana
References
Category:Schools in Hyderabad, India
Category:Schools in Telangana
External links
|
{
"pile_set_name": "Wikipedia (en)"
}
|
Personal Injury Tips That Can Make Your Life Easier
Personal Injury Tips That Can Make Your Life Easier
When someone is the victim of an accident, their thinking isn't always as clear as it should be. How can you control your case in such a state? Use these tips to avoid a botched personal injury lawsuit.
When hiring a personal injury lawyer, it is important to find a practitioner with vast experience working on behalf of plaintiffs. By researching the lawyer's background and experience, you will be sure that you are engaging the services of someone able to work diligently to secure the compensation you and your family deserve.
Having a preexisting condition does not automatically negate a personal injury claim. Just make sure you are honest with your representation about past injuries. Don't let him get sideswiped with it later.
If you end up disliking your lawyer, remember you can fire him or her at any time! You should never feel stuck with a lawyer. If the job isn't getting done, simply look for a replacement and move on. Your peace of mind is well worth the hassle of looking for a new one.
Hire a lawyer as soon as possible. If you have been injured, try to start the process of locating a lawyer within a week or two at most. If you have been hospitalized, or are otherwise too injured to do the work yourself, enlist the help of a friend or family member. A lawyer is your best bet for a successful personal injury claim outcome.
You should not think about settling your case until all of your symptoms have disappeared. This is important because you may settle and then realize later that the injuries you have are much more serious than anyone thought they were, which means you were entitled to receive more than you received.
Getting along with your lawyer is key, but there is something more you have to look for. Choose an attorney who truly listens to what you say. If they ever appear to not be listening, don't choose that lawyer. While they may think they know it all, typically people with that belief are those who know the least.
Speak with a bar association to determine the lawyers that are in your area that practice what you need. This will not provide you a ranking of the best lawyers, but will give you a good start on finding one. The American Bar Association is a good place for you to start this process.
Choose a lawyer who talks less and listens more. You'll find that a lawyer who talks your ear off is one who also talks too much at trial, which can be to the detriment of your case. A lawyer who listens to what you have to say will be able to use your evidence better at trial.
When picking the personal injury lawyer that is right for your needs, take advantage of the free consultation that is offered by most reputable law firms. Ask for the details of how you will be billed for the service you need and make sure to be completely honest with the lawyer about the details of your case.
Your lawyer is representing you in court, so you must choose the best option for your case. That means you need someone who you can build a great rapport with to ensure they like you enough to truly care about your case. Select a lawyer you feel is on your side.
Most personal injury attorneys represent their clients with a contingency contract. A contingency contract means that the lawyer doesn't get paid unless he wins your case. Most contingency contracts state that the attorney will receive a portion of your settlement if the case is won. To protect yourself, thoroughly read the contingency contract and agree on the percentage the lawyer is entitled to if he wins your case.
Speak with your lawyer about what their history is like. Make sure you understand how many cases like yours he has taken on and if he has won those cases, lost them or settled out of court. This information is important because you want to hire someone who gives you the greatest chance of receiving the compensation you need.
You should be reasonable in what you expect from a lawsuit. If the injury is minor and does not keep you from performing your usual tasks, do not expect to receive a large sum of money. Asses the impact of your injury on your life and have a lawyer help you decide on the amount you want to ask for.
Be sure to retain all receipts in the event you are injured in a mishap. The receipts are the only proof you will have that you paid for your expenses with your own money. If you do not have these receipts, then there is a very good chance that the court will not reimburse you for any of this money.
There are deadlines you will have to meet. Do not allow a deadline to pass for a single item that is tied to your case. Keep all important dates written on a calendar and do not forget about them. You do not want the statute of limitations to expire and automatically cost you the case.
Personal injury lawsuit limits vary by location. To ensure you know exactly how much monetary value your personal injury case is worth, consult an attorney within your jurisdiction. A lawyer from another location may not be aware of monetary limitations, statue of limitation laws and other pertinent information. Therefore, it is wise to find a lawyer in your jurisdiction.
It is imperative that you keep in mind all of the great information that has been discussed in this article. Millions of people suffer a personal injury each year, and only a handful will ever receive a fair settlement. Become one of the lucky handfuls of people by choosing to follow everything you've just learned.
|
{
"pile_set_name": "Pile-CC"
}
|
1. Introduction {#sec1-jcm-08-01780}
===============
While numerous guidelines for the management of mild traumatic brain injury (TBI) exist, there is still controversy regarding the treatment of head trauma patients with antithrombotic therapy (ATT). The management of mild TBI on ATT is complicated by the heterogeneity of patients with different medications and varying patient characteristics. Most authors define mild TBI based on a Glasgow Coma Scale (GCS) of 13 to 15, others include any impact to the brain, not necessarily causing symptoms \[[@B1-jcm-08-01780]\]. For patients using ATT, several studies show an increased risk for abnormal computed tomography (CT) findings, even with a normal neurological exam and a history lacking neurological symptoms \[[@B2-jcm-08-01780],[@B3-jcm-08-01780],[@B4-jcm-08-01780]\]. Therefore, in most centers patients on ATT receive a routine CT at presentation, even if common definitions of mild TBI are not fulfilled and head trauma is merely reported, or visible signs of head trauma are present.
Vitamin K antagonists (VKA) were shown to increase the risk for clinically significant TBI and mortality \[[@B5-jcm-08-01780],[@B6-jcm-08-01780],[@B7-jcm-08-01780]\] and numerous studies indicate an increased risk and mortality for patients on all other kinds of ATT \[[@B8-jcm-08-01780],[@B9-jcm-08-01780],[@B10-jcm-08-01780],[@B11-jcm-08-01780],[@B12-jcm-08-01780]\].
Delayed traumatic intracranial hemorrhage (DIH) can occur up to several weeks after trauma to the head \[[@B13-jcm-08-01780]\] and was reported to occur more frequently in patients with ATT, ranging from 0.2% to 6% \[[@B14-jcm-08-01780],[@B15-jcm-08-01780],[@B16-jcm-08-01780],[@B17-jcm-08-01780]\].
Due to studies showing a high number of DIH, international guidelines and recommendations in literature suggest admitting patients with ATT for observation after negative CT \[[@B18-jcm-08-01780],[@B19-jcm-08-01780],[@B20-jcm-08-01780],[@B21-jcm-08-01780]\]. Many trauma centers adopted management protocols highly cautious of DIH and performed repeat CT after head trauma for asymptomatic patients. These extensive management protocols with in-hospital observation and repeat CT were evaluated in numerous studies, and most authors concluded that a routine repeat CT is not necessary \[[@B22-jcm-08-01780],[@B23-jcm-08-01780]\]. Some authors even question the necessity for clinical observation after negative CT \[[@B18-jcm-08-01780],[@B24-jcm-08-01780],[@B25-jcm-08-01780]\].
2. Materials and Methods {#sec2-jcm-08-01780}
========================
Our level I trauma center follows a high level of precaution for head injury patients. CT are performed based on the Canadian CT Head Rule, which, however, excludes patients with ATT \[[@B26-jcm-08-01780]\]. At the time of data collection, all cases of head trauma with ongoing ATT regardless of clinical signs for TBI received a CT and were admitted for a minimum of 24 h of in-hospital observation. Patients receiving VKA, Clopidogrel or direct oral anticoagulants (DOAC) received a routine repeat CT before discharge to detect delayed hemorrhages. Patients using acetylsalicylic acid (ASA) or low molecular weight heparin (LMWH) underwent clinical observation but did not receive a routine repeat CT.
After two years of said management, we analyzed our clinical protocol to determine the frequency of delayed intracranial hemorrhage in patients with head trauma and antithrombotic therapy, adjusting our practice and thereby contributing to the ongoing international debate on the management of head trauma patients on ATT.
The study was performed in a level I trauma center with authorization by the local Institutional Review Board (1632/2014). Between January 2012 and April 2014 patients aged 18 years or older were retrospectively included if they were admitted for observation after blunt head trauma with ongoing ATT and no pathologies in their initial CT. Management of these patients followed the described standard clinical protocol. This included an initial CT, clinical and GCS assessment including history of unconsciousness and laboratory tests including S100 and coagulation studies at time of admission. We did not routinely perform laboratory tests for evaluation of therapeutic levels during the observation period (viscoelastic tests, platelet function or anti-Xa assays) for ATT other than VKA. In-hospital observation for a minimum of 24 h followed, and patients received their applicable protocols:Patients using ATT with an expected higher risk for DIH based on the literature, such as vitamin K antagonists (VKA), direct oral anticoagulants (DOAC) and Clopidogrel received a routine repeat CT prior to discharge from hospital.Patients using ATT with an expected low risk for DIH including acetylsalicylic acid (ASA) and prophylactic doses of low molecular weight heparin (LMWH) did not receive a routine repeat CT and were discharged after observation only. Due to the greater number of patients receiving ASA compared to other ATT we included only patients from January 2013 until December 2013 in this study.
The primary endpoint of this study was the occurrence of delayed intracranial hemorrhages. Data was collected and analyzed using SPSS version 24 and descriptive statistics were performed. Due to the low number of delayed intracranial hemorrhages the variables age, GCS and prothrombin time were tested using the Mann--Whitney--U test while the remaining nominal variables were tested using Fisher's exact test. The significance level alpha for all implemented tests was set to α \< 0.05.
3. Results {#sec3-jcm-08-01780}
==========
During the study period 793 patients fulfilled the inclusion criteria, with a majority of 453 (57.1%) women and 340 (42.9%) men. A routine repeat CT was performed in 395 cases and in-hospital observation without routine repeat CT in 398 patients. The average patient age at presentation was 81 years (range 32--102). The most prevalent ATT was acetylsalicylic acid in 368 patients (46.4%), followed by vitamin K antagonists in 255 (32.2%) and Clopidogrel in 86 patients (10.8%), see [Table 1](#jcm-08-01780-t001){ref-type="table"}. Since patients using ASA were included from only one year whereas all other patients were collected from a two-year observation period, the distribution of different types of ATT is not representative of the total population at our institution.
Only blunt trauma was included in the study, with low energy trauma due to falls accounting for 95.2% of all cases. Most patients presented with a normal neurological status, only 16.5% of patients showed any neurological symptoms at presentation. The average GCS at presentation at the hospital was 15 and in 75.5% there was no history of unconsciousness or amnesia reported by either the patients or others. Lesions to the head such as abrasions and lacerations were present in 57.4%. The mean prothrombin time of the 255 patients using VKA was 32%, and 91.8% of the VKA patients were in their therapeutic range at time of admission.
The timing of the routine repeat CT as well as discharge from hospital followed the clinical protocol and occurred after a minimum observation time of 24 h, which resulted in an average of two nights of in-hospital observation, depending on the time of admission, with discharge after morning rounds.
In total, there were 11 cases (1.2%) of delayed intracranial hemorrhages. The routine repeat CT group showed nine DIH, resulting in 2.3% of cases detected with routine repeat CT. In the observation-only group, 16 patients showed a worsening of GCS or other symptoms indicating TBI. Two of these repeat CTs based on clinical judgement found minor DIH (0.5% of the observation group). One of the 11 patients with DIH needed an urgent decompressive craniectomy due to subdural hematoma with midline shift on the second day of observation. This was an 84-year-old female with vitamin K antagonist therapy, who showed no clinical signs of traumatic brain injury, no exterior injury to the head and an international normalized ratio of 2.9 at admission. The repeat CT was performed due to neurological deterioration with reduced Glasgow Coma Scale 27 h after admission. The patient underwent immediate decompressive craniectomy and was consecutively discharged to a neurological rehabilitation facility with a mild left-sided hemiparesis. The other patients with small delayed intracranial hemorrhage did not undergo surgical intervention and were discharged from hospital after an average observation period of 12 days (range 5--23). A review of the cases of delayed intracranial hemorrhages in the repeat CT group by a radiologist revealed, that small epi- and subdural hematomas, minimal intracerebral and subarachnoid hematomas were visible but not described in the initial CT report in four of the eleven cases. Excluding the four cases of initially undiagnosed pathologies in the CT report, an adjusted number of seven DIH (1.8%) were found in the repeat CT group, and in 0.9% overall. There were no significant differences between patients with or without delayed intracranial hemorrhage regarding age, sex, mechanism of injury, extent of external head injury, S100 level and coagulation studies or neurological status at admission. Characteristics of patients with DIH in our study population can be seen in [Table 2](#jcm-08-01780-t002){ref-type="table"}. Four patients died during the in-hospital observation, all due to non-TBI-related causes such as pneumonia or heart failure.
4. Discussion {#sec4-jcm-08-01780}
=============
No feasible diagnostic or observation protocol will be able to exclude all cases of fatal delayed bleeding as DIH can occur up to several weeks after head trauma. Most clinically significant DIH will be detected within an observation period of 24 h, but there will always be cases that occur unusually late or in surprisingly neurologically intact patients \[[@B14-jcm-08-01780],[@B15-jcm-08-01780],[@B16-jcm-08-01780],[@B17-jcm-08-01780],[@B19-jcm-08-01780],[@B20-jcm-08-01780],[@B21-jcm-08-01780]\].
The results of our study, with only one clinically significant case of delayed intracranial hemorrhage (0.3% in the repeat CT group, 0.1% in total), support other investigations which concluded that a routine repeat CT is not necessary for patients with antithrombotic therapy, due to the low clinical significance of most detected DIH \[[@B27-jcm-08-01780],[@B28-jcm-08-01780],[@B29-jcm-08-01780],[@B30-jcm-08-01780],[@B31-jcm-08-01780],[@B32-jcm-08-01780]\]. The single case of a clinically significant DIH in our study showed an altered neurological status and would therefore have received an additional CT during the observation period regardless of clinical protocol for routine repeat CT. In our study population the routine repeat CT was effective in detecting DIH, but was superior to clinical observation only for the detection of cases of little clinical significance and devoid of therapeutic consequence.
Based on our results and on the growing international consensus eliminating repeat CT, we have changed our clinical protocol to a 24-h observation period after the initial negative CT, and discharge from hospital without repeat CT. Due to the low number of DIH in the observation group using ASA and/or LMWH with 0.5%, we no longer admit these patients for in-hospital observation after a negative CT. Since we only included patients using ASA from one year compared to a two-year observation period for all other ATT, the total impact of not routinely admitting these patients after a negative CT is even greater, uses less resources and can improve patient satisfaction.
Most studies addressing the management of head injury patients on ATT do not explicitly discuss the degree of head injury. Most patients in our study would have not received a CT based on the commonly applied Canadian CT Head Rule had they not been treated with ATT, as the majority of patients had a normal neurological exam at presentation and only 57.4% of patients in our study had visible signs of a head injury. Because of the potential higher risk for intracranial pathologies in patients with all types of ATT we support the recommendation of performing an initial CT as suggested by the Scandinavian Guidelines \[[@B18-jcm-08-01780]\] and the recent Austrian consensus statement \[[@B33-jcm-08-01780]\]. However, the increasing number of patients with ATT in a time of limited resources raises questions about a clear definition of head trauma to determine risk factors for DIH. Whether a reported minor impact to the head without visible injuries justifies the cost and patient inconvenience of enduring a CT and in-hospital observation cannot be answered by our study and remains a decision based on clinical judgement.
Despite all guidelines, it is still necessary to make decisions based on risk stratification while considering the consequences for the individual patient. Chenoweth et al. \[[@B28-jcm-08-01780]\] found a 0.3% rate of DIH in their prospective study including patients with and without ATT, and concluded that "this (the low risk of DIH and fact that they can occur later than 24 h) highlights the importance of clinical judgment regarding the severity of trauma, additional injuries, and ability to monitor the patient for deterioration when making decisions about admission for older patients after blunt head trauma."
However, our patient requiring surgical intervention, while only representing 0.1% of our study population, initially showed no clinical signs of a massive trauma to the head and her only risk factors for significant TBI were her age and her vitamin K therapy. This patient could have died at home if she were discharged without observation by relatives or nurses after the initial CT.
Clearly, the admission of patients must be indicated based on economic factors as well as on aspects of the patient's will and ethical considerations for elderly patients, who might experience massive stress due to the changed environment in the hospital \[[@B34-jcm-08-01780]\]. A relevant but unanswered question underlying this study is, how does the fear of legal consequences affect clinical management, although a potentially fatal DIH may not lead to an escalation of care due to advanced patient age? If a patient admitted for observation were to incur a DIH, would the same patient be operated on if he or she was 95 years old, not living independently and suffering from dementia?
The average age of patients in our study was 81 years. Unfortunately, data on dementia, degree of dependency or existence of a living will was not available for our retrospective study design.
In our study some 91.8% of patients using VKA were in a therapeutic range and we did not perform further coagulation assays specific to other ATT during the observation period. Assessing additional therapeutic effects of ATT at time of presentation could possibly reduce admissions and save resources, while informing patients of their insufficient hypocoagulative protection.
Limitations of the study are explained by the retrospective study design and lack of data about DIH after discharge. Furthermore, the number of patients using DOAC was relatively low at the time of data collection but is now a controversial topic in literature. Since there may have been cases of undetected DIH in the group without routine repeat CT and the low number of patients using DOAC this study cannot address the relative risk of various ATT for DIH. The large number of patients and relative homogenous population constitute a significant strength of our study, but multicenter prospective trials are needed to further investigate this matter.
Consistent with current studies, our results indicate that routine repeat CT seem to be no more effective than in-hospital observation, due to the fact that clinically significant DIH reveal themselves by neurological deterioration. Furthermore, we conclude that in-hospital observation for head trauma patients using acetylsalicylic acid is not necessary due to the rarity of clinically relevant DIH. But neither our study nor current literature can answer the ethical questions behind the data. They must be answered by individual centers and countries based on existing resources and their cultural environment.
We thank Daniel Toth for reviewing the CT images of delayed intracranial hemorrhage cases, Claudia Gahleitner for support with statistics and Leonard Höchtl-Lee for his contribution as native English proof reader.
Conceptualization, S.H., E.S., A.A.; methodology, S.H., E.S., A.A.; software, A.A.; validation, A.A.; formal analysis, A.A.; investigation, A.A., H.B., M.S., P.D.; resources, A.A.; data curation, A.A., H.B., M.S., P.D.; writing---original draft preparation, A.A.; writing---review and editing, S.H., E.S., H.B., M.S., P.D.; visualization, A.A.; supervision, S.H.; project administration, A.A.
This research received no external funding.
The authors declare no conflict of interest.
jcm-08-01780-t001_Table 1
######
Type and frequency of antithrombotic therapy in total and in the subgroups of the study.
------------------------------------------------------------------------------------------------------------------
Antithrombotic Therapy Total\ Repeat CT Group\ Observation Group Only\
n (%) n (% of Group) n (% of Group)
------------------------------------------------------- ------------- ------------------ -------------------------
Acetylsalicylic acid 368 (46.4%) 0 368 (92.5%)
Vitamin K antagonists 255 (32.2%) 255 (64.6%) 0
Clopidogrel 86 (10.8%) 86 (21.8%) 0
Clopidogrel and acetylsalicylic acid 22 (2.8%) 22 (5.6%) 0
DOAC (dabigatran and rivaroxaban) 32 (4.0%) 32 (8.1%) 0
Low molecular weight heparin 26 (3.3%) 0 26 (6.5%)
Low molecular weight heparin and acetylsalicylic acid 4 (0.5%) 0 4 (1.0%)
------------------------------------------------------------------------------------------------------------------
jcm-08-01780-t002_Table 2
######
Characteristics of patients with delayed intracranial hemorrhage in our study population including sex and age, antithrombotic therapy, reported unconsciousness and amnesia, prothrombin time at admission, neurological symptoms during in-hospital observation, type of delayed intracranial hemorrhage (EDH = epidural hematoma, SDH = subdural hematoma, SAH = subarachnoid hematoma, ICH = intracerebral hematoma) and necessity of surgery. ASA = acetylsalicylic acid.
Patient Antithrombotic Therapy Unconsciousness Amnesia Glasgow Coma Scale Head Wound Prothrombin Time Neurological Symptoms Delayed Intracranial Hemorrhage Surgery
--------- ------------------------ ----------------- --------- -------------------- ------------ ------------------ -------------------------------------------------------------------------- --------------------------------- ---------
m, 72y Vitamin K antagonist yes yes 15 yes 56 no EDH, SDH no
f, 93y Vitamin K antagonist no no 15 yes 47 no SAH no
f, 83y Vitamin K antagonist no no 15 yes 20 no SAH no
f, 82y Vitamin K antagonist no no 15 yes 48 no SAH no
m, 92y Vitamin K antagonist no no 15 yes 33 no SAH no
f, 84y Vitamin K antagonist no no 15 no 27 yes SDH yes
m, 90y Clopidogrel + ASA no no 15 yes 89 no Hygroma no
m, 54y Clopidogrel + ASA no yes 15 yes 105 no ICH no
m, 89y Dabigatran no no 15 yes 89 no SDH no
f, 82y ASA no no 15 yes 104 no (repeat CT was recommended by radiologist after review of initial CT) EDH no
f, 79 ASA yes yes 14 yes 88 yes EDH no
|
{
"pile_set_name": "PubMed Central"
}
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.