text
stringlengths
0
7.84M
meta
dict
Q: Satz mit den meisten aufeinanderfolgenden Verben Es geht um Sätze mit aufeinanderfolgenden Verben ohne andere Wortarten oder Satzzeichen dazwischen. Beispiele (Länge der längsten Verbfolge in Klammern): Ich schreibe einen Brief (1) Ich habe einen Brief schreiben müssen (2) Der Brief muss geschrieben werden (3) Der Brief hätte geschrieben werden müssen (4) Ein Bekannter meinte, dass es nicht möglich sei, einen korrekten Satz mit mehr als vier aufeinanderfolgenden Verben zu formulieren, aber nach einiger Zeit ist mir ein Satz mit fünf eingefallen: Er war nicht so blöd, wie man hätte geneigt sein können anzunehmen. Ist das auch mit mehr als fünf Verben möglich? Ich habe jetzt eine Weile darüber nachgedacht, aber mir ist kein anderer Satz mit fünf oder mehr aufeinanderfolgenden Verben eingefallen. A: Man kann im Grunde alle verfügbaren Modalverben aneinanderreihen, auch wenn pro hinzugefügten Modalverb es immer aufwendiger wird, einen Sitz im Leben für einen solchen Satz zu finden. Aber unmöglich ist es nicht. Ich hätte das Honigglas nicht auslecken dürfen. Ich hätte das Honigglas nicht auslecken wollen sollen. [...] Ich hätte das Honigglas nicht auslecken wollen sollen können dürfen müssen mögen. Nun kann man aber auch die Modalverben mehrfach einsetzen: Ich hätte das Honigglas nicht auslecken dürfen dürfen. Sprich: Es wäre besser gewesen, Autoritätsperson 1 hätte es Autoritätsperson 2 nicht gestattet, mir zu gestatten, das Honigglas auszulecken. A: Ohne Partizipien (also nur finite und infinite Verbformen) können Konstruktionen mit Verben der Wahrnehmung (zB sehen, hören) manchmal viele aufeinanderfolgenden Infinitivformen enthalten. Ein Zitat aus "Der Prozess" von Franz Kafka: Als ich mich ein Weilchen wieder so ruhig verhalten hatte, dass man die Fliegen an der Wand hätte können gehen hören, vernahm ich, dass... Ich bin aber eher der Meinung, dass die Reihenfolge in diesem Fall eher unidiomatisch ist. Hätte gehen hören können fände ich besser. Man kann sich auch locker eine realistische Situation vorstellen, wo noch ein Modalverb dazu kommt, ohne dass es zu schräg klingt, und noch verständlich wäre, bspw.: Es war im Raum so leise, dass man ihn eigentlich hätte atmen hören können sollen. A: Man kann deinen Beispielsatz einfach erweitern: Er war nicht so blöd, wie man hätte geneigt gewesen sein können anzunehmen.
{ "pile_set_name": "StackExchange" }
Chinese party cadre jailed for taking bribes BEIJING (AP) — A court in southern China sentenced a former Communist Party cadre who gained notoriety last year for amassing a large number of properties to 11 years and 6 months in prison on Thursday. Cai Bin, formerly a party official at a local urban management bureau, was convicted of taking 2.75 million yuan ($450,000) in bribes, and the illegal gains were turned over to the state treasury, the party-run People’s Daily said on its news site. Investigations against Cai began after online reports alleged Cai and his family owned 22 properties and questioned how a government official could afford them in a country where a working family struggles to buy one apartment in major cities such as Beijing, Shanghai and Guangzhou. China’s web users gave Cai the nickname “Uncle House,” and a following online movement exposed several more government officials with excessive real estate holdings, including a bank official who had 41 properties in Beijing. Members of the Chinese public have resorted to the Internet, especially social media, to expose corruption, but Chinese authorities are wary of having to respond to public demands.
{ "pile_set_name": "Pile-CC" }
/* * Copyright (C) 2014 Saravan Pantham * * Licensed under the Apache License, Version 2.0 (the "License"); * you may not use this file except in compliance with the License. * You may obtain a copy of the License at * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, software * distributed under the License is distributed on an "AS IS" BASIS, * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. * See the License for the specific language governing permissions and * limitations under the License. */ package com.psaravan.filebrowserview.lib.AsyncTasks; import android.app.ProgressDialog; import android.content.Context; import android.content.DialogInterface; import android.content.DialogInterface.OnClickListener; import android.os.AsyncTask; import android.widget.Toast; import com.psaravan.filebrowserview.lib.Interfaces.MoveInterface; import com.psaravan.filebrowserview.lib.R; import org.apache.commons.io.FileUtils; import java.io.File; /** * AsyncTask that moves the specified file/folder recursively to a new location. * * @author Saravan Pantham */ public class AsyncMoveTask extends AsyncTask<String, Void, Boolean> { private Context mContext; private ProgressDialog pd; private File mSourceFile; private File mDestDirFile; private boolean mShowProgress = true; private MoveInterface mMoveInterface; public AsyncMoveTask(Context context, File source, File destDir, boolean showProgress) { mContext = context; mSourceFile = source; mShowProgress = showProgress; mDestDirFile = destDir; } @Override protected void onPreExecute() { if (mSourceFile==null) return; //Skip the rest of this method if the user doesn't want a progress dialog. if (!mShowProgress) return; pd = new ProgressDialog(mContext); pd.setCancelable(false); pd.setIndeterminate(false); pd.setTitle(R.string.move); pd.setMessage(mContext.getResources().getString(R.string.moving) + " " + mSourceFile.getName()); pd.setButton(DialogInterface.BUTTON_NEUTRAL, mContext.getResources() .getString(R.string.run_in_background), new OnClickListener() { @Override public void onClick(DialogInterface arg0, int arg1) { pd.dismiss(); } }); pd.show(); if (mMoveInterface!=null) mMoveInterface.preMoveStartSync(); } @Override protected Boolean doInBackground(String... params) { if (mMoveInterface!=null) mMoveInterface.preMoveStartAsync(); if (mSourceFile==null || mDestDirFile==null) { if (mMoveInterface!=null) mMoveInterface.onMoveCompleteAsync(false); return false; } if (mSourceFile.isDirectory()) { try { FileUtils.moveDirectory(mSourceFile, mDestDirFile); } catch (Exception e) { if (mMoveInterface!=null) mMoveInterface.onMoveCompleteAsync(false); return false; } } else { try { FileUtils.moveFile(mSourceFile, mDestDirFile); } catch (Exception e) { if (mMoveInterface!=null) mMoveInterface.onMoveCompleteAsync(false); return false; } } if (mMoveInterface!=null) mMoveInterface.onMoveCompleteAsync(true); return true; } @Override protected void onPostExecute(Boolean result) { super.onPostExecute(result); if (mMoveInterface!=null) mMoveInterface.onMoveCompleteSync(result); if (pd!=null) pd.dismiss(); if (result==true) { String message = mSourceFile.getName() + " " + mContext.getResources().getString(R.string.moved); Toast.makeText(mContext, message, Toast.LENGTH_SHORT).show(); } else { String message = mSourceFile.getName() + " " + mContext.getResources().getString(R.string.could_not_be_moved); Toast.makeText(mContext, message, Toast.LENGTH_SHORT).show(); } } /** * @param moveInterface The move interface instance to attach to this * AsyncTask. */ public void setMoveInterface(MoveInterface moveInterface) { mMoveInterface = moveInterface; } }
{ "pile_set_name": "Github" }
The Dark at the Top of the Stairs (film) The Dark at the Top of the Stairs is a 1960 American drama film. Academy Award winner Delbert Mann directed the work of Robert Preston and Dorothy McGuire in the production. Shirley Knight garnered an Oscar nomination for Best Supporting Actress, and Lee Kinsolving was nominated for a Golden Globe Award as Best Supporting Actor. Knight was also nominated for two Golden Globes. Mann's direction was nominated for a Directors Guild of America Award for Outstanding Directing in a Feature Film. It was based on the Tony Award-nominated play of the same name by William Inge. Plot During Prohibition in Oklahoma, Rubin Flood is a successful harness and saddle salesman. However, with the advent of the automobile, his job is becoming more difficult. He is married to Cora, someone he considers a demanding wife and over-protective mother. When he learns his company is closing, he is unable to face his wife, and stops at a pharmacy to partake of "medicinal" alcohol. Cora is out with her daughter Reenie, buying a dress for a birthday party of one of her classmates. Rubin cannot bring himself to tell Cora he has lost his job, arguing about how much Cora has spent on Reenie's dress, with Cora's lamenting that she always has to watch every penny. The couple's younger son Sonny is being bullied at school. Sonny has a fear of the dark. Determined to get him to stand up for himself, Rubin attempts to teach him to box. While sparring, he inadvertently strikes the boy too hard. Cora, now incensed, tears into Rubin, eventually accusing him of having an affair with Mavis Pruitt, a local widow. A livid Rubin slaps Cora, then storms out of the house. Reenie witnesses her parents' dispute. She runs into the street, causing a motorist to swerve and strike a tree. The driver, Sammy Golden, is relatively unhurt, and he and Reenie become attracted to one another. Cora calls her older sister Lottie to tell her that Rubin hit her. Rubin, still slightly intoxicated, shows up at Mavis' beauty salon, which also is where she lives. He is seen going in by two town gossips. Rubin tells her Cora has ignored him for years, and while he has remained faithful, he desires Mavis. When she doesn't accept his halfhearted advances, Rubin falls asleep on her parlor sofa. Days later, Lottie and her husband are there for dinner. Cora asks Lottie if she and the kids can come stay with her. Just as she asks, Rubin returns home to apologize. The two gossips call Cora to tell her, which re-ignites the argument. He accuses Cora of rejecting him sexually, and she argues that she can't be in the mood when she spends her days worrying about money. Reenie's friend Flirt and her boyfriend arrive, with a date for Reenie, Sammy. Lottie's bigotry is revealed when she suggests that Cora and Rubin might not want to allow Reenie to accompany a Jew to the party. Sammy and Reenie kiss at the party, but Harry Ralston and his wife walk in on them, berating her for bringing a Jew to the country club, where they are not allowed. Embarrassed, Sammy and Reenie leave. Sammy bemoans the bigotry in the world, and drops Reenie at home, where she finds Rubin on the sofa. He confesses that he has lost his job and doesn't know how to tell Cora. The following morning, they learn Sammy has attempted suicide. Reenie rushes to the hospital, telling him that she doesn't care what people think. Cora promises Sonny to stop being so over-protective so he can grow into a responsible adult, then receives a call letting her know that Sammy has died. Cora heads over to Mavis's salon. She pretends to be a customer, before revealing she is Rubin's wife. Mavis confesses that she has been in love with Rubin for years, but that Rubin has always been faithful to Cora. She also reveals that Rubin has lost his job. Rubin has found a new job as a salesman at an oil drilling equipment company. He returns home to find Cora waiting for him. She has sent Reenie to Lottie's for a few days to help her come to grips with Sammy's death. Cora and Rubin declare their love for one another and a commitment to paying more attention to each other's needs. As they embrace, Sonny returns home with a friend, one of his former tormentors from school. Rubin pays for the two boys to go see a movie, After they leave, he follows his wife up to the bedroom. Cast Robert Preston as Rubin Flood Dorothy McGuire as Cora Flood Eve Arden as Lottie Lacey Angela Lansbury as Mavis Pruitt Shirley Knight as Reenie Flood Lee Kinsolving as Sammy Golden Frank Overton as Morris Lacey Robert Eyer as Sonny Flood Penney Parker as Flirt Conroy Ken Lynch as Harry Ralston Paul Birch as Jonah Mills (uncredited) Peg LaCentra as Edna Harper (uncredited) Nelson Leigh as Ed Peabody (uncredited) Charles Seel as Percy Weems (uncredited) Mary Patton as Mrs Ralston (uncredited) Production Warner Brothers announced in January 1960 that it would be producing a film version of Inge's play, directed by Delbert Mann, and starring Robert Preston and Dorothy McGuire. During rehearsals for the production, Mann used the same process he had used since his first film, Marty, in 1955. First, the cast read through the entire script, then they rehearsed the entire screenplay on set prior to the commencement of filming. The film went into production in late January. By the beginning of March an actor's strike was looming, scheduled for March 7. Warner Brothers began going to seven days a week production schedules, in order to complete filming before the strike. In mid-July, it was announced that The Dark at the Top of the Stairs would headline the launch of the fall season, opening at Radio City Music Hall after Labor Day. The film opened on September 22, 1960 at Radio City Music Hall in New York. Reception Variety gave the film a favorable review, noting that it was "well cast and persuasively acted". However, Bosley Crowther of The New York Times did not give the film a favorable review, calling it a "flawed adaptation of the original stage play". The Film Bulletin gave the film a good review, if they did find it uneven, calling it a "rather absorbing drama, with goodly shares of humor, warmth, and tragedy". They felt that Preston's performance was fine, but would have been better if he had brought more "humility and tenderness" to the role. They found McGuire's performance "splendid", and thought Mann's direction was professional, but that he focused on "certain scenes singularly, rather than integrating them into the whole". Motion Picture Daily gave the film another good review, although they were not kind to Mann's direction, finding it to be the weakness in the picture, saying that he "failed to draw out some of the most vital scenes all the urgency and pathos that Inge had wrote into them". They praised the work of Harriett Frank and Irving Ravetch in their adaptation of Inge's play to the screen, and felt the acting was exceptional. They called Preston's work "excellent", and McGuire "warm and appealing"; they felt the rest of the cast was well-done, and singled out Lansbury's performance as outstanding. The one sour note in the acting corps, the felt, was Arden's performance as the aunt, which they felt worked during the comedic sections, but was "out of key" during the dramatic moments. Shirley Knight earned an Oscar nomination for Best Supporting Actress for her role as Reenie Flood. Knight also received two Golden Globe nominations for her performance: for Golden Globe Award for Best Supporting Actress – Motion Picture and New Star Of The Year - Actress. Lee Kinsolving also received a Golden Globe nomination for Best Supporting Actor for his role as "Sammy Goldenbaum". Mann's direction was nominated for a Directors Guild of America Award for "outstanding directorial achievement". The film was voted one of the ten best of the year in 1960 by the National Board of Review. Eve Arden's performance rated among the five best of the year by supporting actresses, according to The Film Daily's poll of over 1800 critics. References Category:1960 films Category:1960s drama films Category:American films Category:American films based on plays Category:American drama films Category:English-language films Category:Films about antisemitism Category:Films about dysfunctional families Category:Films directed by Delbert Mann Category:Films scored by Max Steiner Category:Films set in Oklahoma Category:Films set in the 1920s Category:Suicide in film Category:Warner Bros. films
{ "pile_set_name": "Wikipedia (en)" }
<?php /* * This file is part of the Monolog package. * * (c) Jordi Boggiano <j.boggiano@seld.be> * * For the full copyright and license information, please view the LICENSE * file that was distributed with this source code. */ namespace Monolog\Handler; use Monolog\TestCase; use Monolog\Logger; class BufferHandlerTest extends TestCase { private $shutdownCheckHandler; /** * @covers Monolog\Handler\BufferHandler::__construct * @covers Monolog\Handler\BufferHandler::handle * @covers Monolog\Handler\BufferHandler::close */ public function testHandleBuffers() { $test = new TestHandler(); $handler = new BufferHandler($test); $handler->handle($this->getRecord(Logger::DEBUG)); $handler->handle($this->getRecord(Logger::INFO)); $this->assertFalse($test->hasDebugRecords()); $this->assertFalse($test->hasInfoRecords()); $handler->close(); $this->assertTrue($test->hasInfoRecords()); $this->assertTrue(count($test->getRecords()) === 2); } /** * @covers Monolog\Handler\BufferHandler::close * @covers Monolog\Handler\BufferHandler::flush */ public function testPropagatesRecordsAtEndOfRequest() { $test = new TestHandler(); $handler = new BufferHandler($test); $handler->handle($this->getRecord(Logger::WARNING)); $handler->handle($this->getRecord(Logger::DEBUG)); $this->shutdownCheckHandler = $test; register_shutdown_function(array($this, 'checkPropagation')); } public function checkPropagation() { if (!$this->shutdownCheckHandler->hasWarningRecords() || !$this->shutdownCheckHandler->hasDebugRecords()) { echo '!!! BufferHandlerTest::testPropagatesRecordsAtEndOfRequest failed to verify that the messages have been propagated' . PHP_EOL; exit(1); } } /** * @covers Monolog\Handler\BufferHandler::handle */ public function testHandleBufferLimit() { $test = new TestHandler(); $handler = new BufferHandler($test, 2); $handler->handle($this->getRecord(Logger::DEBUG)); $handler->handle($this->getRecord(Logger::DEBUG)); $handler->handle($this->getRecord(Logger::INFO)); $handler->handle($this->getRecord(Logger::WARNING)); $handler->close(); $this->assertTrue($test->hasWarningRecords()); $this->assertTrue($test->hasInfoRecords()); $this->assertFalse($test->hasDebugRecords()); } /** * @covers Monolog\Handler\BufferHandler::handle */ public function testHandleBufferLimitWithFlushOnOverflow() { $test = new TestHandler(); $handler = new BufferHandler($test, 3, Logger::DEBUG, true, true); // send two records $handler->handle($this->getRecord(Logger::DEBUG)); $handler->handle($this->getRecord(Logger::DEBUG)); $handler->handle($this->getRecord(Logger::DEBUG)); $this->assertFalse($test->hasDebugRecords()); $this->assertCount(0, $test->getRecords()); // overflow $handler->handle($this->getRecord(Logger::INFO)); $this->assertTrue($test->hasDebugRecords()); $this->assertCount(3, $test->getRecords()); // should buffer again $handler->handle($this->getRecord(Logger::WARNING)); $this->assertCount(3, $test->getRecords()); $handler->close(); $this->assertCount(5, $test->getRecords()); $this->assertTrue($test->hasWarningRecords()); $this->assertTrue($test->hasInfoRecords()); } /** * @covers Monolog\Handler\BufferHandler::handle */ public function testHandleLevel() { $test = new TestHandler(); $handler = new BufferHandler($test, 0, Logger::INFO); $handler->handle($this->getRecord(Logger::DEBUG)); $handler->handle($this->getRecord(Logger::INFO)); $handler->handle($this->getRecord(Logger::WARNING)); $handler->handle($this->getRecord(Logger::DEBUG)); $handler->close(); $this->assertTrue($test->hasWarningRecords()); $this->assertTrue($test->hasInfoRecords()); $this->assertFalse($test->hasDebugRecords()); } /** * @covers Monolog\Handler\BufferHandler::flush */ public function testFlush() { $test = new TestHandler(); $handler = new BufferHandler($test, 0); $handler->handle($this->getRecord(Logger::DEBUG)); $handler->handle($this->getRecord(Logger::INFO)); $handler->flush(); $this->assertTrue($test->hasInfoRecords()); $this->assertTrue($test->hasDebugRecords()); $this->assertFalse($test->hasWarningRecords()); } /** * @covers Monolog\Handler\BufferHandler::handle */ public function testHandleUsesProcessors() { $test = new TestHandler(); $handler = new BufferHandler($test); $handler->pushProcessor(function ($record) { $record['extra']['foo'] = true; return $record; }); $handler->handle($this->getRecord(Logger::WARNING)); $handler->flush(); $this->assertTrue($test->hasWarningRecords()); $records = $test->getRecords(); $this->assertTrue($records[0]['extra']['foo']); } }
{ "pile_set_name": "Github" }
Question No: 51 You are developing a test case that must be run multiple times with different input values for a specific field each time. You have a list of values that will be used for the input. You need to modify the test to enter each value into the field. What should you do? Insert a parameter into the Action column of the test step and enter the input values into the Parameter Values pane. Insert a parameter into the Expected Results column of the test step and enter the input values into Parameter values pane. Insert a parameter into the Action column of the test step. Create test steps for each input value in the Action column. Answer: A Explanation: Add parameters to a test case Create a parameter by typing a name preceded by quot;@quot; in the actions and expected results of your test steps. Note: When you write a manual test, you often want to specify that the test should be repeated several times with different test data. For example, if your users can add different quantities of a product to a shopping cart, then you want to check that a quantity of 200 works just as well as a quantity of 1. To do this, you insert parameters in your test steps. Along with the test steps, you provide a table of parameter values. Reference: Repeat a test with different data Question No: 52 You are using Microsoft Test Manager (MTM) to manage test cases. You want to review all test cases with shared steps. You need to build a direct links query that will generate a list of all test cases in the team project that use a shared step. Which three actions should you perform? (Each correct answer presents part of the solution. Choose three.) Set the linked work items filter to Work item type = Shared Steps. Set the main query to Team Project = @Project AND Work Item Type = Test Case. Return all top-level work items. Return only items that have the specified links. Return only items that do not have the specified links. Answer: A,B,D Explanation: Q: How do I link test cases, shared steps, and test results? A: The link types, Tested and Tested By are used to link test cases to work items, and Test Case and Shared Steps are used to link Shared steps to test cases. Using Microsoft Test Manager, you can create test cases and test plans which define and manage these associations. Also, Test Manager creates and manages the associations of test results to test cases and test plans. Question No: 53 You are managing test cases by using Microsoft Test Manager (MTM). You plan to test a part of your product on a specific configuration you create. You need to ensure that new test cases in a specific test suite default to use this configuration without impacting other test suites. What should you do? Create a new test plan for testing with the specific configuration. Select all test cases in the test suite and select the specific configuration. Select the specific configuration as the default configuration for the test plan. Select the specific configuration as the default configuration for the test suite. Answer: D Explanation: At any time when you are planning what to test, you can add test configurations and set them as the default configurations for your test plan. When you next add test cases to the test plan, a pairing of each default configuration with the test case is added to the test plan. When you run the tests from the test plan, these pairings called test points are shown and each can be run individually. Test results are saved for each test point. You can also override the default test configurations for the plan and set different default configurations for a specific test suite. When test cases are added to these test suites, a pairing of each default configuration for the test suite with the test case is added to the test plan as shown in the following illustration. Reference: How to: Select Different Test Configurations For a Test Plan or a Test Suite Question No: 54 You are using Microsoft Test Manager (MTM). You plan to reduce the maintenance of test suites. You need to create test suites for which the test cases are automatically added. What are two possible types of test suites that achieve this goal? (Each correct answer presents a complete solution. Choose two.) Exploratory-based Static Query-based Requirements-based Answer: C,D Explanation: C: Query-based suites show the results of a query that you define. For example, you could select all the test cases that have Priority = 1. D: Requirements-based suites are derived from Product Backlog Items, User Stories, or other requirements. The suite contains all the test cases that are linked to its requirement. This type helps you track how well each requirement has been tested. Question No: 55 You are using Microsoft Test Manager (MTM) to perform exploratory testing. You need to ensure that any bugs or test cases created during an exploratory test session are associated with a specific requirement for the purposes of traceability. What should you do? From the Test activity, select View Exploratory Test Sessions. Open a session and click the Copy Link button. From the Run Tests activity, select a test case that is a part of a requirement suite and select Run. Create a requirement suite in the test plan, right-click on the suite, and select Explore Requirement. From the Do Exploratory Testing activity, select Explore. Answer: C Explanation: Add a Requirement to your Test Plan Once your Requirement is in your Test Plan, right mouse click and select Explore requirement ->Perform the steps of the test case and mark each step with a result. ->When you reach the shared steps, choose the down-arrow next to the shared steps icon and select Start and record. Etc D (not C): Creating an Action Recording for Shared Steps in Microsoft Test Manager You can create an action recording for a shared step in Microsoft Test Manager that will automatically run when the shared step is included in test cases. To create an action recording for shared steps in Microsoft Test Manager ->Open Microsoft Test Manager. ->On the center group switcher, choose the down-arrow and then choose Testing Center. ->On the center group menu bar, choose Organize. ->On the menu, choose Shared Steps Manager. ->In the list of shared step, choose the row for the shared step for which you want to create an action recording. Question No: 59 You are using Microsoft Test Manager (MTM). A test case is already in production. You need to modify the test case to indicate it is being reworked. What should you do? Change the test case state to Design. Change the test case to Blocked. Change the test case state to Closed. Change the test plan state to Inactive. Answer: A Explanation: No test cases are ready to be run. When all test cases remain in a design state for a long time, some issue is blocking progress. You might want to investigate the cause of the blockage. Note: Update the state of each test case as it progresses from Design to Ready to Closed. Question No: 60 You are using Microsoft Test Manager (MTM). You plan to design a shared steps work item with the possibility that it will be used with multiple rows of test data. You need to create a test case that contains the shared steps in multiple iterations. You also need to provide different test data for each iteration. What should you do? Create a copy of the shared steps work item and provide different values for the parameters in the original shared steps work item and its copy. Use the different shared steps work items in the test cases to get different test data. Create an action recording of the shared steps work item and specify multiple parameter values while recording. Provide default parameter values in the shared steps work item and provide different data in the test case for multiple iterations.
{ "pile_set_name": "Pile-CC" }
Self-management, health service use and information seeking for diabetes care among Black Caribbean immigrants in Toronto. The objective of this research was to explore self-management practices and the use of diabetes information and care among Black-Caribbean immigrants with type 2 diabetes. The study population included Black-Caribbean immigrants and Canadian-born participants between the ages of 35 to 64 years with type 2 diabetes. Study participants were recruited from community health centres (CHCs), diabetes education centres, hospital-based diabetes clinics, the Canadian Diabetes Association and immigrant-serving organizations. A structured questionnaire was used to collect demographics and information related to diabetes status, self-management practices and the use of diabetes information and care. Interviews were conducted with 48 Black-Caribbean immigrants and 54 Canadian-born participants with type 2 diabetes. Black-Caribbean immigrants were significantly more likely than the Canadian-born group to engage in recommended diabetes self-management practices (i.e. reduced fat diet, reduced carbohydrate diet, non-smoking and regular physical activity) and receive regular A1C and eye screening by a health professional. Black-Caribbean immigrant participants were significantly more likely to report receiving diabetes information and care through a community health centre (CHC) and nurses and dieticians than their Canadian-born counterparts. CHCs and allied health professionals play an important role in the management of diabetes in the Black-Caribbean immigrant community and may contribute to this group's favourable diabetes self-management profile and access to information and care. Additional research is necessary to confirm whether these findings are generalizable to the Black-Caribbean community in general (i.e. immigrant and non-immigrant) and to determine whether the use of CHCs and/or allied health professionals is associated with favourable outcomes in the Black-Caribbean immigrant community as well as others.
{ "pile_set_name": "PubMed Abstracts" }
Q: How to send C++ console params to C# DLL I need to send two numbers entered as parameters or requested by C++ console to a library in C#. Manually the code is: BSTR thing_to_send = ::SysAllocString(L"10 20"); How can I create a variable of type BSTR using the values of the parameters indicated by the console or by two variables of type integer or string. I need to concatenate the values using a space between them, for example: string Num1 = 30; string Num2 = 40; string dataToSend = Num1 + " " + Num2; or string Num1 = argv[1]; string Num2 = argv[2]; string dataToSend dataToSend += Num1 + " "; dataToSend += Num2; How I can convert dataToSend to BSTR valid variable to send with: HRESULT hResult = obj->GetTheThing(dataToSend, &returned_thing);? What I have tried: In each page that I have reviewed other types of values of origin for the transformation are indicated, with explicit values of chain like being "Cade to convert" but not with the use of variables as it is in this case The code I need to solve is: BSTR thing_to_send = ::SysAllocString(L"10 20"); BSTR returned_thing; BimObjectTest_CSharp::_TheClassPtr obj(__uuidof(BimObjectTest_CSharp::TheClass)); HRESULT hResult = obj->GetTheThing(thing_to_send, &returned_thing); the literal L "10 20" must be replaced by the parameters of the console or by two variables requested via the console, note the space between the values! BSTR thing_to_send should contain, for example, argv[1] + " " + argv[2]! A: Here is a function CombineStrings, that combines two _TSTRINGs to BSTR with space between them. There is also a main function that show how to call it with console arguments. BSTR CombineStrings(_TCHAR* arg1, _TCHAR* arg2) { long len1 = wcsnlen_s(arg1, 100); long len2 = wcsnlen_s(arg2, 100); BSTR result = SysAllocStringLen(NULL, len1 + len2 + 1); memcpy(result, arg1, len1 * sizeof(OLECHAR)); memcpy(result + len1, L" ", 1 * sizeof(OLECHAR)); memcpy(result + len1 + 1, arg2, len2 * sizeof(OLECHAR)); result[len1 + len2 + 1] = NULL; // contains "firstarg<empty>secondarg" return result; } int _tmain(int argc, _TCHAR* argv[]) { if (argc < 3) { // two arguments required. return -1; } BSTR combinedStr = CombineStrings(argv[1], argv[2]); BSTR returned_thing; HRESULT hResult = obj->GetTheThing(combinedStr, &returned_thing); SysFreeString(combinedStr); return 0; }
{ "pile_set_name": "StackExchange" }
Mario Badescu: Get Free 3 Complimentary Samples with Every Order Plus Free Shipping on Orders Over $50 Mario Badescu: Free Standard Shipping on $50+ Mario Badescu: Get free shipping on orders over $50. Mario Badescu: 15% off Orders Mario Badescu: FREE SHIPPING ON ORDERS $50.00 OR MORE!!! Get hold of Your current Mario Badescu Coupon Code & Mario Badescu Coupon Codes Instantly In advance of Getting rid of The Offer Online Mario Badescu Coupon Code usually are actively playing a great function throughout increasing the buying power of the man. These Mario Badescu Coupon Code can also be thought to be the key reason powering an amazing increase in accomplishing online store. Therefore several online information mill made to supply beautiful Mario Badescu Coupon Code in regular basis to stand up to inside online current market amongst it's opposition and to achieve potential clients. In fact these types of Mario Badescu Coupon Code are of fantastic help popular man and it is aiding the theifs to gradually elevate their lifestyle. There are plenty of Mario Badescu Coupon Code then one very sound just one tend to be type Mario Badescu Coupon Code. All of the products and solutions presented under this particular manufacturer are needed inside a household largely to extend luxury. This is the goal and want of every individual to live on within convenience considering the required gadgets within their spending plan. If you're able to obtain these with affordable price, surely you will bounce to post all of them. Mario Badescu Coupon Code tend to be supporting visitors to grab many this sort of accessories without difficulty. A different useful truth is you are interested to acquire products and solutions creating a brand name level. It won't be a possibility to encourage them from some sort of shop for the reason that on the huge price tag. Online marketplace is making opportunity for frequent dude to acquire preferred brand components just like clothes, cosmetics, wrist watches, shoes or simply belts in addition to pocket book through the use of attractive Mario Badescu Coupon Code. It is normal that each Mario Badescu Coupon Code is going to be having a code and this code is going to bear something. The worthiness can have the type area of discount for virtually any distinct item as well as reduction of sum for your products or maybe can also be free postage for your front door steps. So you should be watchful whilst selecting ones Mario Badescu Coupon Code. Occasionally it will have a need to find generally on internet for you to find your genuine jcpenny Mario Badescu Coupon Code using the accurate code you desire. This will bring days or perhaps weeks trouble with privileged you'll receive all of them quickly. It is strongly advised to show some endurance in addition to loose time waiting for few days soon you get the correct code instead of jumping order your accessory inside original amount. This particular in many ways is assisting visitors to spend less lot of money on one side in addition, on other fretting hand it truly is assisting those to help save its valuable time. Mario Badescu Coupon Code consisting of Mario Badescu Coupon Code and promotional codes. You will be acquiring plenty of details about Mario Badescu Coupon Code the possibility to adhere to on top of these individuals immediately simply.
{ "pile_set_name": "Pile-CC" }
tparadox.png tparadox_150.png tparadox_200.png
{ "pile_set_name": "Github" }
I just read the story of a boy falsely accused of rape. The girl later dropped the case. I am a mother of three boys. All teenagers. They are the best things in my life. For this “selfish” reason, stories like this break my my heart. One of my greatest future fears is that they will meet the wrong girl. A girl who is vindictive and who has the ability to accuse them of something they didn’t do. I speak as a mother and I will speak this as it bothers me. Back in the day when I was growing up and abstinence was still a virtue, it was harder for rape accusations to happen. These days, anyone can accuse anyone of rape. Rape accusations has been weaponised and this is scary. When we actually think of it, the weaponization of rape accusations hurts everyone. It hurts the cases of women who actually are raped cos only close friends and die hard women supporters will take the women’s word for it. It hurts the men. Who have to live in fear and not get into relationships because they can’t tell what would happen if a relationship goes sour. This is turn hurts the women who will be looking for the good men who have been scared of from dating. It hurts society cos men and women cannot just meet and be friends without fear. I have told my boys: never be alone in a room with a lady for any reason except she is your wife. You think this is extreme? As I type this I am literally shaking from reading that boy’s story. I can’t imagine what he and his family had to go through. As long as false rape accusations exist, men need to find ways of protecting themselves too. Even when you are dating a girl, better to have a chaperone. If you are going to marry her, you will have as much sex as you want. If you aren’t going to marry her the “hit and run” is not worth the pains or possible jail time. And please please please, don’t be so inebriated as to not even remember what happened. *sigh. Please be careful out there. One of our favourite quotes at Woman.NG is a line from Emeli Sande’s Read All About It; “If you’ve got the heart of a lion, why let your voice be tamed?” This has inspired us to publish Nigerian women’s take on about everything. From conceiving a child to burying an old loved one and every life experience in between them - Nigerian women’s stories, opinions, issues, debates, advice, news etc. Read More >> For Adverts & Enquiries: Contact Us Do you have a question for our editors? Want your personal stories or opinions to be published on woman.ng? Think you have what it takes to work with us? Want to advertise your products or services on woman.ng? Please contact us: info@woman.ng
{ "pile_set_name": "Pile-CC" }
Random digging… Tonight I attempted to get a one-click install app on Dreamhost running again. To be specific this is an installation of Gallery 2 written in PHP that sometime in 2007-2011 time period was a a great offering. It has been broken for some time. My access to Dreamhost over the last several years has primarily involved digging up my credentials logging in and changing the expiration data and CCV on my billing card to keep the account alive for the ancient things that run there… like this blog, and the old photo gallery, before Amazon Photos, and before Flickr was on my radar, and whatever other latest sites the cool kids use for photo management (I still haven’t found a system I like…) Anyway digging into an app that I configured more than a decade ago on a hosting provider that I haven’t used much in almost that long has proven interesting, it also lead down the rabbits hole of looking at old blog posts. Attempting to run Linux and MIPS and Sparc hardware for fun? Anyway back to trying to figure out Gallery’s db connection issues, if I can’t get it working shortly though, I’ll leave it and come back maybe tomorrow, maybe six months from now…
{ "pile_set_name": "Pile-CC" }
This application relates to the discovery and asexual propagation of a new and distinct variety of plum, Prunus salicina cv. ‘Suplumfiftythree’. The new variety was first originated by hybridization in July 2014 by Terry A. Bacon as breeder number ‘PL1687RB’. The new variety ‘Suplumfiftythree’ is characterized by having large, juicy fruit with black skin and red flesh. The fruit of the new variety ‘Suplumfiftythree’ also has a high Brix:Acid ratio, firm flesh, a mild sweet flavor and a stone that clings to the flesh. The seed parent is ‘PL761RB’ (unpatented breeding selection), and the pollen parent ‘PL674RZ’ (unpatented breeding selection). The parent varieties were first crossed in February 2011, with the date of first sowing being February 2012, and the date of first flowering being February 2014. The new plum variety ‘Suplumfiftythree’ was first asexually propagated by Terry Bacon near Wasco, Kern County, Calif. in February 2015 by dormant grafting. The new variety ‘Suplumfiftythree’ is similar to its pollen parent ‘PL674RZ’ in that the fruit of both varieties has red flesh. The new variety ‘Suplumfiftythree’ differs from ‘PL674RZ’ in that the fruit of the new variety has a black skin compared to red-dapple skin for the fruit of ‘PL674RZ’. Further, the fruit of the new variety ‘Suplumfiftythree’ is larger at 140 g compared to 100 g for ‘PL674RZ’. The new variety ‘Suplumfiftythree’ is similar to its seed parent ‘PL761RB’ in that the fruit of both varieties has red flesh and black skin. The new variety ‘Suplufiftythree’ differs from its seed parent ‘PL6761RB’ in that for the new variety ripening time starts 9 days later than for ‘PL761RB’. Further, the fruit of the new variety ‘Suplumfiftythree’ is larger at 140 g compared to 130 g for ‘PL761RB’. The new variety ‘Suplufiftythree’ also differs from ‘PL761RB’ in that the brix:acid ratio is 34 for the new variety, compared to 21 for ‘PL761RB’. The fruit of the new variety ‘Suplumfiftythree’ has similar black skin and red flesh as ‘Black Splendor’ (unpatented). However, the new variety ‘Suplumfiftythree’ differs from ‘Black Splendor’ in that the new variety starts ripening about 7 days later than ‘Black Splendor’. In addition, the new variety has larger fruit at about 140 g compared 135 g for ‘Black Splendor’. The new variety ‘Suplumfiftythree’ has a brix of 17 degrees, while ‘Black Splendor’ has a brix of 14 degrees. The fruit of the new variety ‘Suplumfiftythree’ has black skin like the fruit of ‘Owen-T’ (unpatented), but the ripening of the new variety ‘Suplumfiftythree’ starts about 18 days later than ‘Owen-T’. Further, the fruit of the new variety ‘Suplumfiftythree’ has red flesh compared to yellow flesh for ‘Owen-T’. The new variety ‘Suplumfiftythree’ has been shown to maintain its distinguishing characteristics through successive asexual propagations by, for example, cuttings and grafting.
{ "pile_set_name": "USPTO Backgrounds" }
New Tales of Gisaeng New Tales of Gisaeng (; also known as New Gisaeng Story) is a 2011 South Korean television series starring Im Soo-hyang, Sung Hoon and Han Hye-rin. Written by Im Sung-han and directed by Son Moon-kwon, it aired on SBS from January 23 to July 17, 2011 on Saturdays and Sundays at 21:45 for 52 episodes. Plot "Gisaeng" was the Korean equivalent of a geisha or courtesan knowledgeable in poetry, dance, music, culture and politics, who entertained noblemen and royalty of the Joseon Dynasty. This series explores the premise that gisaeng still existed in modern-day Korea. Dan Sa-ran (Im Soo-hyang) lost her mother at a young age, and never quite got along with her stepmother and stepsister. Despite her humble background, she carries herself with pride and grace, majoring in classical dance during college. Drawing the attention of Buyonggak's head gisaeng with her dancing talent and classic beauty, Sa-ran enters Korea's sole traditional gisaeng house, an exclusive establishment that serves only VIP guests. Ah Da-mo (Sung Hoon) is a cocky second-generation chaebol with his own set of daddy issues. He can't be bothered to give any woman the time of day... until he meets Sa-ran. Cast Main characters Im Soo-hyang as Dan Sa-ran Sung Hoon as Ah Da-mo Han Hye-rin as Geum Ra-ra Kim Bo-yeon as Oh Hwa-ran Kim Hye-sun as Han Soon-deok Jung Han-bi as young Soon-deok Supporting characters Dan family Baek Ok-dam as Dan Gong-joo Kim Joo-young as Dan Chul-soo Lee Sook as Ji Hwa-ja Geum family Han Jin-hee as Geum Eo-san Park Jin as young Eo-san Seo Woo-rim as Lee Hong-ah Lee Jong-nam as Jang Joo-hee Lee Dong-joon as Geum Kang-san Lee Dae-ro as Geum Shi-jo Lee Sang-mi as Shin Hyo-ri Ah family Im Hyuk as Ah Soo-ra Kim Hye-jung as Cha Ra-ri Ahn Young-joo as Park Ae-ja Buyonggak Lee Mae-ri as Lee Do-hwa Choi Sun-ja as Hwa-ran's mother Park Joon-myun as Noh Eun-ja Seo Dong-soo as Ma Dan-se Song Dae-kwan as Seo Saeng-kang Oh Ki-chan as Oh Bong-yi Kang Cho-hee as Han Song-yi Kim Yul as Baek Soo-jung Seol Yoon as Jang Soo-jin Yoon Ji-eun as Song Hye-eun Kim Eun-sun as Ye-rang Lee Sun-ah as Lee Ji-hyang Oh Ji-yeon as Kim-sshi Ha Na-kyung Extended cast Jeon Ji-hoo as Son-ja Jin Ye-sol as Jin Joo-ah Lee Soo-jin as Sung Ah-mi Park Yoon-jae as Oh Jin-ahm Kim Ho-chang as Yoo Tae-young Michael Blunck as Kyle Shin Goo as Master Joong-bong Jun Sung-hwan as Master Jung-do Lee Hyo-jung as Ma Yi-joon (CEO Joon Entertainment) The Midas Kim Joon-hyung as Do-suk Son Ga-young as Choi Young-mim Won Jong-rye as Young-nim's mother Kim Sun-il as Min-jae Min Joon-hyun as manager Ratings Awards and nominations International broadcast It aired in Japan on cable channel KNTV from September 9, 2012 to March 3, 2013, with reruns on cable channel BS Japan beginning February 20, 2013. In 2015, Hong Kong's HKTV also played this drama. References External links Category:Seoul Broadcasting System television dramas Category:2011 South Korean television series debuts Category:2011 South Korean television series endings Category:Korean-language television programs Category:2010s South Korean television series Category:South Korean romance television series
{ "pile_set_name": "Wikipedia (en)" }
Trauma centrality and PTSD symptom severity in adult survivors of childhood sexual abuse. Theorists have posited that regarding a trauma as central to one's identity leads to greater posttraumatic stress disorder (PTSD) symptom severity. To test this hypothesis, we administered the Centrality of Events Scale (CES) to women reporting a history of childhood sexual abuse (N = 102). The CES scores were correlated with PTSD symptom severity, depression severity, and self-esteem. In addition, we conducted a principal component analysis (PCA) to evaluate factors underlying the CES. The PCA yielded 3 factors reflecting (a) the centrality and integration of the trauma, (b) whether the event is regarded as a turning point in one's life story, and (c) whether the event is a reference point for expectations about the future. Each factor was associated with PTSD symptom severity.
{ "pile_set_name": "PubMed Abstracts" }
{ "type": "minecraft:crafting_shaped", "pattern": [ "X ", "XX ", "XXX" ], "key": { "X": { "item": "tfc:wood/planks/douglas_fir" } }, "result": { "item": "tfc:stairs/wood/douglas_fir", "count": 8 } }
{ "pile_set_name": "Github" }
The businessman Brendan Duddy’s life was in many ways intertwined with the fortunes of his fellow Derry citizen Martin McGuinness, the former IRA chief of staff turned republican negotiator. Duddy, who has died aged 80, was trusted enough by McGuinness to establish what became known as “the link” and later as “the back channel”, between the IRA leadership in Derry, principally McGuinness, and the British government, via secret MI6 contacts. Duddy had known McGuinness since the late 1960s, when the latter used to deliver beefburgers from the butcher’s where he worked to Duddy’s fish and chip shop in Derry. Many years later, Duddy recalled to the veteran BBC reporter Peter Taylor that the youthful McGuinness came to his premises “to chat up the girls behind the counter and had absolutely no interest in politics”. The storm that broke over their home city from 1969 onwards, from the Battle of Bogside to internment and then on to the slaughter on Bloody Sunday in 1972, propelled McGuinness into and upwards through the ranks of the nascent Provisional IRA. Duddy, on the other hand, eschewed the use of political violence and instead built up a business mini-empire in a city that by the mid-1970s was being bombed relentlessly by the Provisionals under the orders of commanders including McGuinness. Yet despite diverging from McGuinness in terms of the “armed struggle”, as republicans call it, Duddy maintained close, friendly relations. From 1975 – the first major Provisional IRA ceasefire – Duddy belonged to a tripartite process that played a crucial part eventually in ending Northern Ireland’s Troubles and ushering in the peace process. Despite the failure to secure a lasting IRA end to violence in the mid-1970s, Duddy and the rest of “the link” resurrected the secret discussions in 1980 to help end the hunger strike taking place in the Maze prison, which a year later resulted in the deaths of seven IRA prisoners and three Irish National Liberation Army inmates. During these negotiations Margaret Thatcher and her cabinet were fully briefed by the MI6 operatives involved in the talks, despite the Tories’ official policy of not talking to terrorists. Nine years later, Duddy was again involved in secret talks, again based in Derry, that included the MI6 officer Michael Oatley, who had made previous fruitless attempts to contact McGuinness via the businessman. However, the 1990 talks would eventually produce favourable results despite “the link” being exposed in the Observer three years later, again exposing the dichotomy between another Tory government’s official policy of no dialogue with terrorists while all the time agreeing to covert discussions with the IRA. The exposure of “the link” almost led to the negotiations being fatally compromised by one key sentence contained in communications between the IRA and the British. A note allegedly from the IRA leadership told the British “The conflict is over. Help us to end it.” When these words became public, McGuinness and the rest of the Sinn Féin leadership furiously denied they were behind them, even though they had helped convince John Major’s administration the IRA was serious about ending its armed campaign. Duddy felt in mortal danger from hardline elements within the IRA. In fact it was Duddy’s fellow go-between Denis Bradley, the former priest who had officiated at McGuinness’s wedding, who had written those critical few words. The first outcome of this secret triangular talks process was the creation of the Derry experiment, under which the IRA started to reduce its violence in the city, resulting in a situation where after 1990 there were no more British military casualties up to the Provisionals’ ceasefire four years later. Even after the IRA ceasefire was secured, and the peace process bedded in, Duddy continued to act as a go-between, bringing together old adversaries. He played a critical role in helping to reduce tensions between the Ulster loyalist marching orders and republican residents’ groups in Derry over contentious parades in the city. Duddy won the trust of Orangemen and members of the Apprentice Boys of Derry. He helped create a Derry experiment Mark II, in which dialogue between the loyal orders and republican residents led to a series of local agreements, with the city inspiring other parts of Northern Ireland to follow suit. Jonathan Powell, Tony Blair’s chief of staff, who in the post-ceasefire era held covert talks with IRA commanders, said had it not been for Duddy’s dogged pursuit of dialogue and of promoting talks with the British, there might not have been a peace process. The son of Mary and Laurence Duddy, Brendan spent most of his adult life running the family fish and chip shop before creating a retail and property, hotel and entertainment business portfolio that generated hundreds of jobs in a city blighted by unemployment and IRA economic sabotage. He is survived by his wife, Margo, and children, Patricia, Lawrence, Paula, Brendan, Shauna and Tonya, 21 grandchildren and nine great-grandchildren. • Brendan Duddy, businessman, born 10 June 1936; died 12 May 2017
{ "pile_set_name": "OpenWebText2" }
diff --git a/README b/README index 2f68e14..262822a 100644 --- a/README +++ b/README @@ -1,3 +1,38 @@ +This is an Nginx fork that adds dtrace USDT probes. -Documentation is available at http://nginx.org +Installation: + + ./configure --with-dtrace-probes \ + --with-dtrace=/usr/sbin/dtrace \ + ... + make + make install + +Usage on Linux (with systemtap): + + # make the stap-nginx script visiable in your PATH + export PATH=/usr/local/nginx/sbin:$PATH + + # list all the static probes available in your nginx + stap-nginx -L 'process("nginx").mark("*")' + + # run the test.stp file + stap-nginx test.stp + +Sample test.stp file: + + probe begin + { + print("Tracing. Hit CTRL-C to stop.\n") + } + + probe process("nginx").mark("http-subrequest-start") + { + printf("uri: %s?%s\n", ngx_http_req_uri($arg1), + ngx_http_req_args($arg1)) + } + +For now, only tested on Solaris 11 Express and Fedora Linux 17. + +The original Nginx documentation is available at http://nginx.org diff --git a/auto/install b/auto/install index f7f686c..d6bc457 100644 --- a/auto/install +++ b/auto/install @@ -16,6 +16,20 @@ END fi +case ".$NGX_STAP_NGX_PATH" in + ./*) + ;; + + .) + NGX_STAP_NGX_PATH=$NGX_PREFIX/sbin/stap-nginx + ;; + + *) + NGX_STAP_NGX_PATH=$NGX_PREFIX/$NGX_STAP_NGX_PATH + ;; +esac + + case ".$NGX_SBIN_PATH" in ./*) ;; @@ -49,6 +63,16 @@ case ".$NGX_PID_PATH" in esac +case ".$NGX_TAPSET_PREFIX" in + ./* | .) + ;; + + *) + NGX_TAPSET_PREFIX=$NGX_PREFIX/$NGX_TAPSET_PREFIX + ;; +esac + + case ".$NGX_ERROR_LOG_PATH" in ./* | .) ;; @@ -147,6 +171,36 @@ install: $NGX_OBJS${ngx_dirsep}nginx${ngx_binext} \ || cp -R $NGX_HTML '\$(DESTDIR)$NGX_PREFIX' END +if [ $NGX_DTRACE = YES -a $DTRACE_FROM_SYSTEMTAP = YES ]; then + + ngx_tapset_srcs="$NGX_TAPSET_SRCS" + + cat << END >> $NGX_MAKEFILE + test -d '\$(DESTDIR)$NGX_TAPSET_PREFIX' || \ + mkdir -p '\$(DESTDIR)$NGX_TAPSET_PREFIX' +END + + for ngx_tapset_src in $ngx_tapset_srcs + do + ngx_tapset_file=`basename $ngx_tapset_src` + + cat << END >> $NGX_MAKEFILE + + sed -e "s|NGX_SBIN_PATH|$NGX_SBIN_PATH|g" $ngx_long_cont \ + $ngx_tapset_src > '\$(DESTDIR)$NGX_TAPSET_PREFIX/$ngx_tapset_file' +END + + done + + cat << END >> $NGX_MAKEFILE + + test -d '\$(DESTDIR)`dirname "$NGX_STAP_NGX_PATH"`' || \ + mkdir -p '\$(DESTDIR)`dirname "$NGX_STAP_NGX_PATH"`' + cp $NGX_OBJS/stap-nginx '\$(DESTDIR)$NGX_STAP_NGX_PATH' + chmod 0755 '\$(DESTDIR)$NGX_STAP_NGX_PATH' +END + +fi if test -n "$NGX_ERROR_LOG_PATH"; then cat << END >> $NGX_MAKEFILE @@ -158,6 +212,18 @@ END fi +if [ $NGX_DTRACE = YES ]; then + cat << END >> $NGX_MAKEFILE + +$NGX_OBJS${ngx_dirsep}stap-nginx: src/dtrace/stap-nginx + sed -e "s|NGX_TAPSET_PREFIX|$NGX_TAPSET_PREFIX|g" $ngx_long_cont \ + -e "s|NGX_SBIN_DIR|`dirname $NGX_SBIN_PATH`|g" $ngx_long_cont \ + -e "s|NGX_SBIN_PATH|$NGX_SBIN_PATH|g" $ngx_long_cont \ + src/dtrace/stap-nginx > $NGX_OBJS${ngx_dirsep}stap-nginx +END +fi + + # create Makefile cat << END >> Makefile diff --git a/auto/make b/auto/make index dca011c..57ed99f 100644 --- a/auto/make +++ b/auto/make @@ -27,6 +27,9 @@ LINK = $LINK END +if [ $NGX_DTRACE = YES ]; then + echo DTRACE = $DTRACE >> $NGX_MAKEFILE +fi if test -n "$NGX_PERL_CFLAGS"; then echo NGX_PERL_CFLAGS = $NGX_PERL_CFLAGS >> $NGX_MAKEFILE @@ -204,6 +207,44 @@ ngx_objs=`echo $ngx_all_objs $ngx_modules_obj \ | sed -e "s/ *\([^ ][^ ]*\)/$ngx_long_regex_cont\1/g" \ -e "s/\//$ngx_regex_dirsep/g"` +if [ $NGX_DTRACE = YES ]; then + + ngx_dtrace_obj=$NGX_OBJS${ngx_dirsep}ngx_dtrace_provider.$ngx_objext + + ngx_dtrace_h=$NGX_OBJS${ngx_dirsep}ngx_dtrace_provider.h + + ngx_dtrace_d=$NGX_OBJS${ngx_dirsep}dtrace_providers.d + + ngx_dtrace_providers=`echo $NGX_DTRACE_PROVIDERS \ + | sed -e "s/ *\([^ ][^ ]*\)/$ngx_long_regex_cont\1/g" \ + -e "s/\//$ngx_regex_dirsep/g"` + + cat << END >> $NGX_MAKEFILE + +all: $NGX_OBJS${ngx_dirsep}nginx${ngx_binext} + +$ngx_dtrace_d: $ngx_dtrace_providers + cat $ngx_dtrace_providers > $ngx_dtrace_d + +$ngx_dtrace_h: $ngx_dtrace_d + \$(DTRACE) -h -o $ngx_dtrace_h -s $ngx_dtrace_d +END + + if [ $DTRACE_PROBE_OBJ = YES ]; then + cat << END >> $NGX_MAKEFILE +$ngx_dtrace_obj: $ngx_dtrace_d $ngx_deps$ngx_spacer + \$(DTRACE) -G -o $ngx_dtrace_obj -s $ngx_dtrace_d $ngx_objs +END + + ngx_deps="$ngx_deps$ngx_long_cont$ngx_dtrace_obj" + ngx_objs="$ngx_objs$ngx_long_cont$ngx_dtrace_obj" + + if [ "$DTRACE_FROM_SYSTEMTAP" = YES ]; then + ngx_deps="$ngx_deps$ngx_long_cont$NGX_OBJS${ngx_dirsep}stap-nginx" + fi + fi +fi + if test -n "$NGX_LD_OPT$CORE_LIBS"; then ngx_libs=`echo $NGX_LD_OPT $CORE_LIBS \ | sed -e "s/\//$ngx_regex_dirsep/g" -e "s/^/$ngx_long_regex_cont/"` diff --git a/auto/options b/auto/options index cdf83ca..7f24765 100644 --- a/auto/options +++ b/auto/options @@ -12,6 +12,8 @@ NGX_CONF_PATH= NGX_ERROR_LOG_PATH= NGX_PID_PATH= NGX_LOCK_PATH= +NGX_TAPSET_PREFIX= +NGX_STAP_NGX_PATH= NGX_USER= NGX_GROUP= NGX_BUILD= @@ -21,6 +23,12 @@ CPP= NGX_OBJS=objs NGX_DEBUG=NO +NGX_DTRACE=NO +DTRACE=dtrace + +DTRACE_PROBE_OBJ=YES +DTRACE_FROM_SYSTEMTAP=NO + NGX_CC_OPT= NGX_LD_OPT= CPU=NO @@ -181,6 +189,8 @@ do --error-log-path=*) NGX_ERROR_LOG_PATH="$value";; --pid-path=*) NGX_PID_PATH="$value" ;; --lock-path=*) NGX_LOCK_PATH="$value" ;; + --tapset-prefix=*) NGX_TAPSET_PREFIX="$value" ;; + --stap-nginx-path=*) NGX_STAP_NGX_PATH="$value" ;; --user=*) NGX_USER="$value" ;; --group=*) NGX_GROUP="$value" ;; @@ -305,7 +315,8 @@ use the \"--with-mail_ssl_module\" option instead" --with-ld-opt=*) NGX_LD_OPT="$value" ;; --with-cpu-opt=*) CPU="$value" ;; --with-debug) NGX_DEBUG=YES ;; - + --with-dtrace=*) DTRACE="$value" ;; + --with-dtrace-probes) NGX_DTRACE=YES ;; --without-pcre) USE_PCRE=DISABLED ;; --with-pcre) USE_PCRE=YES ;; --with-pcre=*) PCRE="$value" ;; @@ -359,6 +370,8 @@ cat << END --error-log-path=PATH set error log pathname --pid-path=PATH set nginx.pid pathname --lock-path=PATH set nginx.lock pathname + --tapset-prefix=PATH set systemtap tapset directory prefix + --stap-nginx-path=PATH set stap-nginx pathname --user=USER set non-privileged user for worker processes @@ -506,6 +519,8 @@ cat << END --with-openssl-opt=OPTIONS set additional build options for OpenSSL --with-debug enable debug logging + --with-dtrace-probes enable dtrace USDT probes + --with-dtrace=PATH set dtrace utility pathname END @@ -536,6 +551,7 @@ NGX_CONF_PATH=${NGX_CONF_PATH:-conf/nginx.conf} NGX_CONF_PREFIX=`dirname $NGX_CONF_PATH` NGX_PID_PATH=${NGX_PID_PATH:-logs/nginx.pid} NGX_LOCK_PATH=${NGX_LOCK_PATH:-logs/nginx.lock} +NGX_TAPSET_PREFIX=${NGX_TAPSET_PREFIX:-tapset} if [ ".$NGX_ERROR_LOG_PATH" = ".stderr" ]; then NGX_ERROR_LOG_PATH= diff --git a/auto/os/darwin b/auto/os/darwin index 1d3e3d3..cb4ef3a 100644 --- a/auto/os/darwin +++ b/auto/os/darwin @@ -113,3 +113,6 @@ ngx_feature_libs= ngx_feature_test="int32_t lock, n; n = OSAtomicCompareAndSwap32Barrier(0, 1, &lock)" . auto/feature + +DTRACE_PROBE_OBJ=NO + diff --git a/auto/os/freebsd b/auto/os/freebsd index 937ca20..d76b32b 100644 --- a/auto/os/freebsd +++ b/auto/os/freebsd @@ -105,3 +105,8 @@ if [ $version -ge 701000 ]; then echo " + cpuset_setaffinity() found" have=NGX_HAVE_CPUSET_SETAFFINITY . auto/have fi + +if [ $NGX_DTRACE = YES ]; then + NGX_LD_OPT="$NGX_LD_OPT -lelf" +fi + diff --git a/auto/os/linux b/auto/os/linux index c932267..b5114d6 100644 --- a/auto/os/linux +++ b/auto/os/linux @@ -171,3 +171,5 @@ ngx_include="sys/vfs.h"; . auto/include CC_AUX_FLAGS="$cc_aux_flags -D_GNU_SOURCE -D_FILE_OFFSET_BITS=64" + +DTRACE_FROM_SYSTEMTAP=YES diff --git a/auto/sources b/auto/sources index 2abbc60..fa7157d 100644 --- a/auto/sources +++ b/auto/sources @@ -39,10 +39,16 @@ CORE_DEPS="src/core/nginx.h \ src/core/ngx_resolver.h \ src/core/ngx_open_file_cache.h \ src/core/ngx_crypt.h \ + src/core/ngx_core_probe.h \ src/core/ngx_proxy_protocol.h \ src/core/ngx_syslog.h" +if [ $NGX_DTRACE = YES ]; then + CORE_DEPS="$CORE_DEPS objs/ngx_dtrace_provider.h" +fi + + CORE_SRCS="src/core/nginx.c \ src/core/ngx_log.c \ src/core/ngx_palloc.c \ @@ -91,13 +97,14 @@ OPENSSL_SRCS="src/event/ngx_event_openssl.c \ EVENT_MODULES="ngx_events_module ngx_event_core_module" -EVENT_INCS="src/event src/event/modules" +EVENT_INCS="src/event src/event/modules src/http src/http/modules" EVENT_DEPS="src/event/ngx_event.h \ src/event/ngx_event_timer.h \ src/event/ngx_event_posted.h \ src/event/ngx_event_connect.h \ - src/event/ngx_event_pipe.h" + src/event/ngx_event_pipe.h \ + src/event/ngx_event_probe.h" EVENT_SRCS="src/event/ngx_event.c \ src/event/ngx_event_timer.c \ @@ -289,7 +296,8 @@ HTTP_DEPS="src/http/ngx_http.h \ src/http/ngx_http_variables.h \ src/http/ngx_http_script.h \ src/http/ngx_http_upstream.h \ - src/http/ngx_http_upstream_round_robin.h" + src/http/ngx_http_upstream_round_robin.h \ + src/http/ngx_http_probe.h" HTTP_SRCS="src/http/ngx_http.c \ src/http/ngx_http_core_module.c \ @@ -593,3 +601,8 @@ NGX_GOOGLE_PERFTOOLS_MODULE=ngx_google_perftools_module NGX_GOOGLE_PERFTOOLS_SRCS=src/misc/ngx_google_perftools_module.c NGX_CPP_TEST_SRCS=src/misc/ngx_cpp_test_module.cpp + +NGX_DTRACE_PROVIDERS=src/dtrace/nginx_provider.d + +NGX_TAPSET_SRCS=src/dtrace/nginx.stp + diff --git a/auto/summary b/auto/summary index 1be975d..a1b6109 100644 --- a/auto/summary +++ b/auto/summary @@ -71,6 +71,19 @@ else echo " nginx logs errors to stderr" fi +if [ $NGX_DTRACE = YES ]; then + cat << END + nginx dtrace static probes enabled +END + + if [ $DTRACE_FROM_SYSTEMTAP = YES ]; then + cat << END + nginx systemtap tapset prefix: "$NGX_TAPSET_PREFIX" + nginx systemtap wrapper script: "$NGX_STAP_NGX_PATH" +END + fi +fi + cat << END nginx http access log file: "$NGX_HTTP_LOG_PATH" nginx http client request body temporary files: "$NGX_HTTP_CLIENT_TEMP_PATH" diff --git a/configure b/configure index ceff15e..49223f8 100755 --- a/configure +++ b/configure @@ -23,6 +23,9 @@ if [ $NGX_DEBUG = YES ]; then have=NGX_DEBUG . auto/have fi +if [ $NGX_DTRACE = YES ]; then + have=NGX_DTRACE . auto/have +fi if test -z "$NGX_PLATFORM"; then echo "checking for OS" diff --git a/src/core/ngx_core_probe.h b/src/core/ngx_core_probe.h new file mode 100644 index 0000000..91bf91e --- /dev/null +++ b/src/core/ngx_core_probe.h @@ -0,0 +1,25 @@ +#ifndef _NGX_CORE_PROBE_H_INCLUDED_ +#define _NGX_CORE_PROBE_H_INCLUDED_ + + +#include <ngx_config.h> +#include <ngx_core.h> +#include <ngx_event.h> + + +#if (NGX_DTRACE) + +#include <ngx_http.h> +#include <ngx_dtrace_provider.h> + +#define ngx_core_probe_create_pool_done(pool, size) \ + NGINX_CREATE_POOL_DONE(pool, size) + +#else /* !(NGX_DTRACE) */ + +#define ngx_core_probe_create_pool_done(pool, size) + +#endif + + +#endif /* _NGX_CORE_PROBE_H_INCLUDED_ */ diff --git a/src/core/ngx_palloc.c b/src/core/ngx_palloc.c index ef4a647..49bb30b 100644 --- a/src/core/ngx_palloc.c +++ b/src/core/ngx_palloc.c @@ -7,6 +7,7 @@ #include <ngx_config.h> #include <ngx_core.h> +#include <ngx_core_probe.h> static void *ngx_palloc_block(ngx_pool_t *pool, size_t size); @@ -37,6 +38,8 @@ ngx_create_pool(size_t size, ngx_log_t *log) p->cleanup = NULL; p->log = log; + ngx_core_probe_create_pool_done(p, size); + return p; } diff --git a/src/dtrace/nginx.stp b/src/dtrace/nginx.stp new file mode 100644 index 0000000..e824daf --- /dev/null +++ b/src/dtrace/nginx.stp @@ -0,0 +1,299 @@ +/* tapset for nginx */ + + +function ngx_indent(n, delta) +{ + s = "" + for (i = 0; i < n; i++) { + s .= delta + } + + return s +} + + +function ngx_http_subreq_depth(r) +{ + depth = 0 + + for (pr = @cast(r, "ngx_http_request_t", "NGX_SBIN_PATH")->parent; + pr != 0; + pr = @cast(pr, "ngx_http_request_t", "NGX_SBIN_PATH")->parent) + { + depth++ + } + + return depth +} + + +function ngx_http_req_parent(r) +{ + return @cast(r, "ngx_http_request_s", "NGX_SBIN_PATH")->parent +} + + +/* retrieve the request uri string from the ngx_http_request_t pointer */ +function ngx_http_req_uri(r) +{ + len = @cast(r, "ngx_http_request_s", "NGX_SBIN_PATH")->uri->len + + if (len == 0) { + return "" + } + + return user_string_n(@cast(r, "ngx_http_request_s", "NGX_SBIN_PATH")->uri->data, len) +} + + +/* retrieve the request query string from the ngx_http_request_t pointer */ +function ngx_http_req_args(r) +{ + len = @cast(r, "ngx_http_request_s", "NGX_SBIN_PATH")->args->len + + if (len == 0) { + return "" + } + + return user_string_n(@cast(r, "ngx_http_request_s", "NGX_SBIN_PATH")->args->data, len) +} + + +/* retrieve the first command name (or directive name) from + * the ngx_module_t pointer */ +function ngx_http_module_cmd(m) +{ + cmds = @cast(m, "ngx_module_t", "NGX_SBIN_PATH")->commands + if (cmds == 0) { + return "" + } + + len = @cast(cmds, "ngx_command_t", "NGX_SBIN_PATH")->name->len + + if (len == 0) { + return "" + } + + return user_string_n(@cast(cmds, "ngx_command_t", "NGX_SBIN_PATH")->name->data, len) +} + + +function ngx_chain_buf(cl) +{ + return @cast(cl, "ngx_chain_t", "NGX_SBIN_PATH")->buf +} + + +function ngx_chain_next(cl) +{ + return @cast(cl, "ngx_chain_t", "NGX_SBIN_PATH")->next +} + +function ngx_buf_tag(b) +{ + return @cast(b, "ngx_buf_t", "NGX_SBIN_PATH")->tag +} + +function ngx_buf_in_memory(b) +{ + return @cast(b, "ngx_buf_t", "NGX_SBIN_PATH")->temporary + || @cast(b, "ngx_buf_t", "NGX_SBIN_PATH")->memory + || @cast(b, "ngx_buf_t", "NGX_SBIN_PATH")->mmap +} + + +function ngx_buf_pos(b) +{ + return @cast(b, "ngx_buf_t", "NGX_SBIN_PATH")->pos +} + + +function ngx_buf_file_pos(b) +{ + return @cast(b, "ngx_buf_t", "NGX_SBIN_PATH")->file_pos +} + + +function ngx_buf_last(b) +{ + return @cast(b, "ngx_buf_t", "NGX_SBIN_PATH")->last +} + + +function ngx_buf_file_last(b) +{ + return @cast(b, "ngx_buf_t", "NGX_SBIN_PATH")->file_last +} + + +function ngx_buf_end(b) +{ + return @cast(b, "ngx_buf_t", "NGX_SBIN_PATH")->end +} + + +function ngx_buf_in_file(b) +{ + return @cast(b, "ngx_buf_t", "NGX_SBIN_PATH")->in_file +} + + +function ngx_buf_last_buf(b) +{ + return @cast(b, "ngx_buf_t", "/home/agentzh/git/lua-nginx-module/work/nginx/sbin/nginx")->last_buf +} + + +function ngx_buf_last_in_chain(b) +{ + return @cast(b, "ngx_buf_t", "/home/agentzh/git/lua-nginx-module/work/nginx/sbin/nginx")->last_in_chain +} + + +function ngx_buf_sync(b) +{ + return @cast(b, "ngx_buf_t", "/home/agentzh/git/lua-nginx-module/work/nginx/sbin/nginx")->sync +} + + +function ngx_buf_flush(b) +{ + return @cast(b, "ngx_buf_t", "/home/agentzh/git/lua-nginx-module/work/nginx/sbin/nginx")->flush +} + + +function ngx_buf_size(b) +{ + if (ngx_buf_in_memory(b)) { + return ngx_buf_last(b) - ngx_buf_pos(b) + } + + return ngx_buf_file_last(b) - ngx_buf_file_pos(b) +} + + +function ngx_buf_data(b) +{ + return user_string_n(ngx_buf_pos(b), ngx_buf_last(b) - ngx_buf_pos(b)) +} + + +function ngx_chain_writer_ctx_out(ctx) +{ + return @cast(c, "ngx_chain_writer_ctx_t", "NGX_SBIN_PATH")->out +} + + +function ngx_chain_dump:string (input) +{ + if (input == 0) { + return "NULL" + } + + out = "" + cl = input + while (cl) { + buf = ngx_chain_buf(cl) + + if (ngx_buf_in_memory(buf)) { + out .= sprintf("[%s]", text_str(ngx_buf_data(buf))) + + } else { + out .= "\"\"" + } + + if (ngx_buf_in_file(buf)) { + out .= sprintf("<in_file:%d-%d>", ngx_buf_file_pos(buf), + ngx_buf_file_last(buf)) + } + + if (ngx_buf_last_buf(buf)) { + out .= "<last_buf>" + } + + if (ngx_buf_last_in_chain(buf)) { + out .= "<last_in_chain>" + } + + if (ngx_buf_sync(buf)) { + out .= "<sync>" + } + + if (ngx_buf_flush(buf)) { + out .= "<flush>" + } + + tag = ngx_buf_tag(buf) + if (tag) { + out .= sprintf("<tag:%p>", tag) + } + + cl = ngx_chain_next(cl) + if (cl) { + out .= " " + } + } + return out +} + + +function ngx_pool_cleanup_file_name(c) +{ + return user_string(@cast(c, "ngx_pool_cleanup_file_t", "NGX_SBIN_PATH")->name) +} + + +function ngx_http_req_content_length(r) +{ + return @cast(r, "ngx_http_request_t", "NGX_SBIN_PATH")->headers_in->content_length_n +} + + +function ngx_http_req_body_temp_file_name(r) +{ + rb = @cast(r, "ngx_http_request_t", "NGX_SBIN_PATH")->request_body + if (!rb) { + return "" + } + + tf = @cast(rb, "ngx_http_request_body_t", "NGX_SBIN_PATH")->temp_file + if (!tf) { + return "" + } + + len = @cast(tf, "ngx_temp_file_t", "NGX_SBIN_PATH")->file->name->len + + return user_string_n(@cast(tf, "ngx_temp_file_t", "NGX_SBIN_PATH")->file->name->data, len) +} + + +function ngx_table_elt_key(e) +{ + len = @cast(e, "ngx_table_elt_t", "NGX_SBIN_PATH")->key->len + + return user_string_n(@cast(e, "ngx_table_elt_t", "NGX_SBIN_PATH")->key->data, len) +} + + +function ngx_table_elt_value(e) +{ + len = @cast(e, "ngx_table_elt_t", "NGX_SBIN_PATH")->value->len + + return user_string_n(@cast(e, "ngx_table_elt_t", "NGX_SBIN_PATH")->value->data, len) +} + + +function ngx_iovec_dump:string (iov, iovcnt) { + out = "" + for (i = 0; i < iovcnt; i++) { + out .= sprintf("\"%s\"(%p)", text_str(user_string_n( + @cast(iov, "struct iovec")[i]->iov_base, + @cast(iov, "struct iovec")[i]->iov_len) + ), @cast(iov, "struct iovec")[i]->iov_base) + if (i != iovcnt - 1) { + out .= " " + } + } + return out +} + diff --git a/src/dtrace/nginx_provider.d b/src/dtrace/nginx_provider.d new file mode 100644 index 0000000..5887ae7 --- /dev/null +++ b/src/dtrace/nginx_provider.d @@ -0,0 +1,40 @@ +typedef struct { int dummy; } ngx_http_request_t; +typedef struct { int dummy; } ngx_str_t; +typedef int64_t ngx_int_t; +typedef uint64_t ngx_uint_t; +typedef ngx_uint_t ngx_msec_t; +typedef struct { int dummy; } ngx_module_t; +typedef struct { int dummy; } ngx_http_module_t; +typedef struct { int dummy; } ngx_table_elt_t; +typedef struct { int dummy; } ngx_event_t; +typedef struct { int dummy; } ngx_pool_t; +typedef char unsigned u_char; + + +provider nginx { + /* probes for subrequests */ + probe http__subrequest__cycle(ngx_http_request_t *pr, ngx_str_t *uri, ngx_str_t *args); + probe http__subrequest__start(ngx_http_request_t *r); + probe http__subrequest__finalize_writing(ngx_http_request_t *r); + probe http__subrequest__finalize_nonactive(ngx_http_request_t *r); + probe http__subrequest__wake__parent(ngx_http_request_t *r); + probe http__subrequest__done(ngx_http_request_t *r); + probe http__subrequest__post__start(ngx_http_request_t *r, ngx_int_t rc); + probe http__subrequest__post__done(ngx_http_request_t *r, ngx_int_t rc); + probe http__module__post__config(ngx_module_t *m); + probe http__read__body__done(ngx_http_request_t *r); + probe http__read__req__line__done(ngx_http_request_t *r); + probe http__read__req__header__done(ngx_http_request_t *r, ngx_table_elt_t *h); + probe timer__add(ngx_event_t *ev, ngx_msec_t timer); + probe timer__del(ngx_event_t *ev); + probe timer__expire(ngx_event_t *ev); + probe create__pool__done(ngx_pool_t *pool, size_t size); +}; + + +#pragma D attributes Evolving/Evolving/Common provider nginx provider +#pragma D attributes Private/Private/Unknown provider nginx module +#pragma D attributes Private/Private/Unknown provider nginx function +#pragma D attributes Private/Private/Common provider nginx name +#pragma D attributes Evolving/Evolving/Common provider nginx args + diff --git a/src/dtrace/stap-nginx b/src/dtrace/stap-nginx new file mode 100755 index 0000000..1bca4cf --- /dev/null +++ b/src/dtrace/stap-nginx @@ -0,0 +1,6 @@ +#!/bin/sh + +PATH="NGX_SBIN_DIR:$PATH" +export PATH +exec stap -d "NGX_SBIN_PATH" -I "NGX_TAPSET_PREFIX" "$@" + diff --git a/src/event/ngx_event_probe.h b/src/event/ngx_event_probe.h new file mode 100644 index 0000000..5aa0397 --- /dev/null +++ b/src/event/ngx_event_probe.h @@ -0,0 +1,33 @@ +#ifndef _NGX_EVENT_PROBE_H_INCLUDED_ +#define _NGX_EVENT_PROBE_H_INCLUDED_ + + +#include <ngx_config.h> +#include <ngx_core.h> +#include <ngx_event.h> + + +#if (NGX_DTRACE) + +#include <ngx_http.h> +#include <ngx_dtrace_provider.h> + +#define ngx_event_probe_timer_add(ev, timer) \ + NGINX_TIMER_ADD(ev, timer) + +#define ngx_event_probe_timer_del(ev) \ + NGINX_TIMER_DEL(ev) + +#define ngx_event_probe_timer_expire(ev) \ + NGINX_TIMER_EXPIRE(ev) + +#else /* !(NGX_DTRACE) */ + +#define ngx_event_probe_timer_add(ev, timer) +#define ngx_event_probe_timer_del(ev) +#define ngx_event_probe_timer_expire(ev) + +#endif + + +#endif /* _NGX_EVENT_PROBE_H_INCLUDED_ */ diff --git a/src/event/ngx_event_timer.c b/src/event/ngx_event_timer.c index 8f547b2..6e77465 100644 --- a/src/event/ngx_event_timer.c +++ b/src/event/ngx_event_timer.c @@ -8,6 +8,7 @@ #include <ngx_config.h> #include <ngx_core.h> #include <ngx_event.h> +#include <ngx_event_probe.h> ngx_rbtree_t ngx_event_timer_rbtree; @@ -91,6 +92,8 @@ ngx_event_expire_timers(void) ev->timedout = 1; + ngx_event_probe_timer_expire(ev); + ev->handler(ev); } } @@ -136,3 +139,19 @@ ngx_event_cancel_timers(void) ev->handler(ev); } } + + +#if (NGX_DTRACE) +void +ngx_event_probe_timer_add_helper(ngx_event_t *ev, ngx_msec_t timer) +{ + ngx_event_probe_timer_add(ev, timer); +} + + +void +ngx_event_probe_timer_del_helper(ngx_event_t *ev) +{ + ngx_event_probe_timer_del(ev); +} +#endif diff --git a/src/event/ngx_event_timer.h b/src/event/ngx_event_timer.h index 99f8a48..8bc619a 100644 --- a/src/event/ngx_event_timer.h +++ b/src/event/ngx_event_timer.h @@ -25,12 +25,23 @@ void ngx_event_expire_timers(void); void ngx_event_cancel_timers(void); +#if (NGX_DTRACE) +void ngx_event_probe_timer_add_helper(ngx_event_t *ev, + ngx_msec_t timer); +void ngx_event_probe_timer_del_helper(ngx_event_t *ev); +#endif + + extern ngx_rbtree_t ngx_event_timer_rbtree; static ngx_inline void ngx_event_del_timer(ngx_event_t *ev) { +#if (NGX_DTRACE) + ngx_event_probe_timer_del_helper(ev); +#endif + ngx_log_debug2(NGX_LOG_DEBUG_EVENT, ev->log, 0, "event timer del: %d: %M", ngx_event_ident(ev->data), ev->timer.key); @@ -77,6 +88,10 @@ ngx_event_add_timer(ngx_event_t *ev, ngx_msec_t timer) ev->timer.key = key; +#if (NGX_DTRACE) + ngx_event_probe_timer_add_helper(ev, timer); +#endif + ngx_log_debug3(NGX_LOG_DEBUG_EVENT, ev->log, 0, "event timer add: %d: %M:%M", ngx_event_ident(ev->data), timer, ev->timer.key); diff --git a/src/http/ngx_http.c b/src/http/ngx_http.c index d09e3f0..5ae35a7 100644 --- a/src/http/ngx_http.c +++ b/src/http/ngx_http.c @@ -8,6 +8,7 @@ #include <ngx_config.h> #include <ngx_core.h> #include <ngx_http.h> +#include <ngx_http_probe.h> static char *ngx_http_block(ngx_conf_t *cf, ngx_command_t *cmd, void *conf); @@ -312,6 +313,9 @@ ngx_http_block(ngx_conf_t *cf, ngx_command_t *cmd, void *conf) module = ngx_modules[m]->ctx; if (module->postconfiguration) { + + ngx_http_probe_module_post_config(ngx_modules[m]); + if (module->postconfiguration(cf) != NGX_OK) { return NGX_CONF_ERROR; } diff --git a/src/http/ngx_http_core_module.c b/src/http/ngx_http_core_module.c index 49c4560..808d1d8 100644 --- a/src/http/ngx_http_core_module.c +++ b/src/http/ngx_http_core_module.c @@ -8,6 +8,7 @@ #include <ngx_config.h> #include <ngx_core.h> #include <ngx_http.h> +#include <ngx_http_probe.h> typedef struct { @@ -2431,6 +2432,8 @@ ngx_http_subrequest(ngx_http_request_t *r, ngx_http_postponed_request_t *pr, *p; if (r->subrequests == 0) { + ngx_http_probe_subrequest_cycle(r, uri, args); + ngx_log_error(NGX_LOG_ERR, r->connection->log, 0, "subrequests cycle while processing \"%V\"", uri); return NGX_ERROR; @@ -2557,6 +2560,8 @@ ngx_http_subrequest(ngx_http_request_t *r, *psr = sr; + ngx_http_probe_subrequest_start(sr); + return ngx_http_post_request(sr, NULL); } diff --git a/src/http/ngx_http_probe.h b/src/http/ngx_http_probe.h new file mode 100644 index 0000000..d7d2d45 --- /dev/null +++ b/src/http/ngx_http_probe.h @@ -0,0 +1,75 @@ +#ifndef _NGX_HTTP_PROBE_H_INCLUDED_ +#define _NGX_HTTP_PROBE_H_INCLUDED_ + + +#include <ngx_config.h> +#include <ngx_core.h> +#include <ngx_http.h> + + +#if (NGX_DTRACE) + +#include <ngx_dtrace_provider.h> + +#define ngx_http_probe_subrequest_cycle(pr, uri, args) \ + NGINX_HTTP_SUBREQUEST_CYCLE(pr, uri, args) + +#define ngx_http_probe_subrequest_start(r) \ + NGINX_HTTP_SUBREQUEST_START(r) + +#define ngx_http_probe_subrequest_finalize_writing(r) \ + NGINX_HTTP_SUBREQUEST_FINALIZE_WRITING(r) + +#define ngx_http_probe_subrequest_finalize_nonactive(r) \ + NGINX_HTTP_SUBREQUEST_FINALIZE_NONACTIVE(r) + +#define ngx_http_probe_subrequest_finalize_nonactive(r) \ + NGINX_HTTP_SUBREQUEST_FINALIZE_NONACTIVE(r) + +#define ngx_http_probe_subrequest_wake_parent(r) \ + NGINX_HTTP_SUBREQUEST_WAKE_PARENT(r) + +#define ngx_http_probe_subrequest_done(r) \ + NGINX_HTTP_SUBREQUEST_DONE(r) + +#define ngx_http_probe_subrequest_post_start(r, rc) \ + NGINX_HTTP_SUBREQUEST_POST_START(r, rc) + +#define ngx_http_probe_subrequest_post_done(r, rc) \ + NGINX_HTTP_SUBREQUEST_POST_DONE(r, rc) + +#define ngx_http_probe_module_post_config(m) \ + NGINX_HTTP_MODULE_POST_CONFIG(m) + +#define ngx_http_probe_read_body_abort(r, reason) \ + NGINX_HTTP_READ_BODY_ABORT(r, reason) + +#define ngx_http_probe_read_body_done(r) \ + NGINX_HTTP_READ_BODY_DONE(r) + +#define ngx_http_probe_read_req_line_done(r) \ + NGINX_HTTP_READ_REQ_LINE_DONE(r) + +#define ngx_http_probe_read_req_header_done(r, h) \ + NGINX_HTTP_READ_REQ_HEADER_DONE(r, h) + +#else /* !(NGX_DTRACE) */ + +#define ngx_http_probe_subrequest_cycle(pr, uri, args) +#define ngx_http_probe_subrequest_start(r) +#define ngx_http_probe_subrequest_finalize_writing(r) +#define ngx_http_probe_subrequest_finalize_nonactive(r) +#define ngx_http_probe_subrequest_wake_parent(r) +#define ngx_http_probe_subrequest_done(r) +#define ngx_http_probe_subrequest_post_start(r, rc) +#define ngx_http_probe_subrequest_post_done(r, rc) +#define ngx_http_probe_module_post_config(m) +#define ngx_http_probe_read_body_abort(r, reason) +#define ngx_http_probe_read_body_done(r) +#define ngx_http_probe_read_req_line_done(r) +#define ngx_http_probe_read_req_header_done(r, h) + +#endif /* NGX_DTRACE */ + + +#endif /* _NGX_HTTP_PROBE_H_INCLUDED_ */ diff --git a/src/http/ngx_http_request.c b/src/http/ngx_http_request.c index 1bd14e6..92f5a88 100644 --- a/src/http/ngx_http_request.c +++ b/src/http/ngx_http_request.c @@ -8,6 +8,7 @@ #include <ngx_config.h> #include <ngx_core.h> #include <ngx_http.h> +#include <ngx_http_probe.h> static void ngx_http_wait_request_handler(ngx_event_t *ev); @@ -1054,7 +1055,6 @@ ngx_http_process_request_line(ngx_event_t *rev) } } - ngx_int_t ngx_http_process_request_uri(ngx_http_request_t *r) { @@ -1311,6 +1311,8 @@ ngx_http_process_request_headers(ngx_event_t *rev) return; } + ngx_http_probe_read_req_header_done(r, h); + ngx_log_debug2(NGX_LOG_DEBUG_HTTP, r->connection->log, 0, "http header: \"%V: %V\"", &h->key, &h->value); @@ -2281,7 +2283,11 @@ ngx_http_finalize_request(ngx_http_request_t *r, ngx_int_t rc) } if (r != r->main && r->post_subrequest) { + ngx_http_probe_subrequest_post_start(r, rc); + rc = r->post_subrequest->handler(r, r->post_subrequest->data, rc); + + ngx_http_probe_subrequest_post_done(r, rc); } if (rc == NGX_ERROR @@ -2331,6 +2337,8 @@ ngx_http_finalize_request(ngx_http_request_t *r, ngx_int_t rc) if (r->buffered || r->postponed) { + ngx_http_probe_subrequest_finalize_writing(r); + if (ngx_http_set_write_handler(r) != NGX_OK) { ngx_http_terminate_request(r, 0); } @@ -2366,10 +2374,14 @@ ngx_http_finalize_request(ngx_http_request_t *r, ngx_int_t rc) pr->postponed = pr->postponed->next; } + ngx_http_probe_subrequest_done(r); + c->data = pr; } else { + ngx_http_probe_subrequest_finalize_nonactive(r); + ngx_log_debug2(NGX_LOG_DEBUG_HTTP, c->log, 0, "http finalize non-active request: \"%V?%V\"", &r->uri, &r->args); @@ -2381,6 +2393,8 @@ ngx_http_finalize_request(ngx_http_request_t *r, ngx_int_t rc) } } + ngx_http_probe_subrequest_wake_parent(r); + if (ngx_http_post_request(pr, NULL) != NGX_OK) { r->main->count++; ngx_http_terminate_request(r, 0); diff --git a/src/http/ngx_http_request_body.c b/src/http/ngx_http_request_body.c index 77e92e3..5b14369 100644 --- a/src/http/ngx_http_request_body.c +++ b/src/http/ngx_http_request_body.c @@ -8,6 +8,7 @@ #include <ngx_config.h> #include <ngx_core.h> #include <ngx_http.h> +#include <ngx_http_probe.h> static void ngx_http_read_client_request_body_handler(ngx_http_request_t *r); @@ -477,6 +478,8 @@ ngx_http_do_read_client_request_body(ngx_http_request_t *r) rb->post_handler(r); } + ngx_http_probe_read_body_done(r); + return NGX_OK; }
{ "pile_set_name": "Github" }
This invention relates to connecting assemblies and, more particularly, to quick release connecting assemblies provided for connecting a second member at a right angle to a first member, and to such connecting assemblies which permit connection and disconnection by access to a point spaced from the point of connection. Previous connecting assemblies providing for connection of a second member to a first member have required access to the point of connection in order to connect and disconnect the second member from the first member. In one such assembly 200, as illustrated in FIG. 5 of the drawings, a second member 204 was connected to a first member 208 by means of a piece 212 connected to the first member 208. The piece 212 included a recess 216 which received an end 220 of the second member 204, and a screw 224 which was secured in a threaded bore 228 in the piece 212. The screw 224 projected into the recess 216 and was received in an opening 232 in the end 220 of the second member 204. More particularly, the first member 208 was received in a bore 236 in spaced-apart housings 240 and 244. The piece 212 connected to the first member 208 was located outside of the spaced-apart housings 240 and 244, and included a portion 248 extending at a right angle to the first member 208. The portion 248 included the recess 216 which received the end 220 of the second member 204. To connect or disconnect the second member 204 from the first member 208, access to the screw 224 was required to turn the screw 224 in the threaded bore 228 to thereby or withdraw the screw 224 from the opening 232 in the end 220 of the second member 204. The recess 216 was larger than the end 220 of the second member 204 so that the end 220 of the second member 204 could pivot on the screw 224 in the recess 216. The first member 208 was secured in the housings 240 and 244 by the first piece 212 and a cotter pin, washer, and bow washer assembly 260 located on the first member 208 outside of the housings 240 and 244 opposite the first piece 212. Attention is also directed to Conroy U.S. Pat. No. 2,887,083, issued May 19, 1959.
{ "pile_set_name": "USPTO Backgrounds" }
e h = 4*l + 4*y - 146, 239 = 3*l - y. Is l a prime number? True Let a(c) = 7*c**3 - 16*c**2 - 9*c + 115. Is a(11) composite? True Let j(b) = b**3 - b**2 + 3*b + 1. Let o(y) = -y**2. Let a(l) = j(l) + 2*o(l). Let v be a(5). Suppose -v = -n - n. Is n a composite number? True Suppose -5*d + t + 590312 = 0, -4*t - 115288 = -2*d + 120826. Is d composite? True Let s(b) = b + 1. Let d(k) = 15*k**2 + 2*k + 16. Let a(w) = 5*w**2 + w + 5. Let g(j) = 8*a(j) - 3*d(j). Let o(n) = -g(n) - 2*s(n). Is o(5) a composite number? True Suppose -507 = -5*d + 848. Suppose 4*z - d = 5*x, -247 = -3*z - 2*x - 3*x. Let y = -37 + z. Is y composite? False Let g be 5 + -3 + 0 + (-1)/(-1). Let h(n) = 14*n**3 + n**2 - 4*n + 2. Is h(g) a prime number? False Let o(z) = 3*z + 15. Let p be o(-6). Is 660 - p - (0 - -1) prime? False Let o(k) = 7*k + 1. Let i be o(-5). Is (-8 + -30)*i/4 composite? True Let o = -10 - -13. Suppose -f - 2 = o. Let x(u) = -36*u + 5. Is x(f) a composite number? True Let u = 14593 - 10146. Is u prime? True Let y(i) = -1338*i - 575. Is y(-11) a prime number? True Suppose 4*g + n = -n - 20, -g = 2*n + 5. Let z(f) = 6 + 5 - 169*f**3 - 2*f**2 + 168*f**3 - f - 12 + 0*f. Is z(g) a composite number? False Suppose 7*u - 7 = 266. Suppose 40*z = u*z + 485. Is z prime? False Suppose 2*m - 3*m = 4*z, 5*z = 0. Suppose o = -m*o + 319. Is o prime? False Suppose 4*b - g = -1 - 42, -4*g = 4*b + 68. Let y be 508/b*(-17 + 2). Suppose -p = 4*p - y. Is p a composite number? False Suppose -5*m + 15 = -0*m + 5*l, -m - 5*l + 7 = 0. Let i(s) = 17*s**2 + 4*s + 1. Is i(m) composite? True Suppose -4*q = 3*k - 25, -4*q = -3*k - 0*q + 17. Suppose 0*b = k*b - 1295. Is b prime? False Let o be (-3)/12 - (-37)/4. Let r = -5 + o. Suppose 0 = 2*w + 3*i - 178, -r*w - 4*i + 392 = -7*i. Is w prime? False Suppose -5*q + 2*q + 5*l - 8 = 0, q - l = 0. Is (-111)/(-6) - q/(-8) composite? False Let c = -257 + 470. Suppose 0 = 5*j - 722 - c. Is j a prime number? False Let q(x) = 2*x**2 - 6*x + 11. Suppose -4*f + 34 + 4 = 3*n, 34 = 4*f + n. Is q(f) prime? False Let i(v) = -v**3 - 5*v**2 - 13*v - 7. Let n be (-30)/3*(-1)/(-2). Let o be i(n). Is (2 + -1)/(1/o) prime? False Suppose 68579 = -284*k + 291*k. Is k a prime number? False Let z = -130 - -442. Suppose 0 = -5*h + 4*h + 3*g + 151, 0 = -2*h + g + z. Is h a prime number? True Let c(j) = 31441*j + 172. Is c(3) prime? False Suppose 2*m = -p + 12, -2 = -p - 0. Suppose -m*v + 2077 = -518. Is v composite? True Suppose -2*l = 10 - 6, 0 = 4*c - 2*l - 19760. Is c prime? False Suppose 0 = 3*h - 2736 - 3312. Suppose 3*b - h = -0*b. Suppose -3*j - 3*z = -j - 668, 2*j - b = -5*z. Is j a prime number? True Let f(k) = -2*k**3 + 6*k**2 + 2*k + 14. Let y be f(-7). Suppose 2*h - 3 = 13. Is (-3)/2 + y/h a prime number? False Let z(r) be the second derivative of 403*r**5/20 + r**4/3 - 5*r**3/6 + 5*r**2/2 + 4*r + 4. Is z(2) a composite number? True Suppose 0 = 4*m - 3*m - 3. Suppose 0 = 3*o + m*r - 5925, -4*o + 4*r - 974 + 8858 = 0. Is o prime? True Suppose -3 + 8 = m. Suppose -m*k + 5117 + 2158 = 0. Suppose -5*g + k = -2*v + 4*v, 4*v - 273 = -g. Is g a composite number? False Let x be (-3)/21 + 58/14. Suppose 6*q + 6 = 4*q, -x*z + q + 895 = 0. Is z a prime number? True Suppose 12 = 4*r, 4*f - 4*r = f - 735. Suppose -2*m = -7*m + 2260. Let u = m + f. Is u a composite number? False Suppose -17*d = 8869 - 34556. Is d a prime number? True Let i(y) = 164*y + 849. Is i(8) composite? False Suppose -178*h + 168*h + 16570 = 0. Is h prime? True Let z = -22 - -4. Is 16/72 - (-40)/z - -424 composite? True Suppose 21*t = 4*t + 11917. Is t a composite number? False Suppose 32 = -4*i + 2*k, -3 = 4*i + 3*k + 9. Let m(o) = -5*o + 8. Is m(i) a composite number? True Let t(h) = -h**3 + 4*h**2 + 5*h - 16. Let q be t(4). Suppose 4*i + 8*m - 12644 = q*m, 4*m + 9497 = 3*i. Is i a prime number? True Suppose -4*d - 3*a = -13, 0*a + 2 = 5*d - a. Suppose 5*c - d = -6. Is (-12)/c + (2 - 3) composite? False Let y(n) = 57*n + 4. Let w be y(-7). Suppose 3*x - 5*x = 500. Let c = x - w. Is c a prime number? False Let z(s) = 2*s**2 + s - 6. Let v be z(-3). Is v/(9/(-2)) + 193 composite? False Is (-6)/(24/(-140))*3006/90 composite? True Let y = 9 - -22. Let r = -28 + y. Is 795/2*2/r a composite number? True Let i = 108 + 128. Let a = i + -75. Is a composite? True Let j = 2378 - 1207. Is j composite? False Suppose 5*i = 82428 - 22618. Is i composite? True Let d(k) = k**2 - 4. Let c = -12 + 9. Let r be d(c). Suppose 0*h - 215 = -r*h. Is h prime? True Suppose -5*k = -h - h - 16257, 2*k - 6499 = -3*h. Is k composite? False Suppose -4*h + 3*q + 3731 = -0*q, 2*h - 2*q - 1866 = 0. Let j(b) = -b**3 - 16*b**2 - 7*b - 28. Let w be j(-16). Is h/14 + 36/w composite? False Is (-2)/(((-4)/(-5842))/(-1)) composite? True Suppose -3*u + 5562 = 3*q, 2*q = -3*q - 2*u + 9261. Is q prime? False Let s = -7 - -7. Let a(v) = -50*v**2 - 11 + v + 56 + 49*v**2 + 50. Is a(s) composite? True Let i = -4190 + 11047. Let g = -4404 + i. Is g prime? False Let k = 64 + -62. Suppose -k*w + 1174 = -2628. Is w a composite number? False Let o(y) = y**3 + 12*y**2 - 11*y - 13. Let x be o(-12). Suppose 5*z = 4*z + x. Is z composite? True Is 59 - (3*(-5 - -4) - -5) a composite number? True Suppose 2*c - z + 12 = 0, -12 - 12 = 2*c - 4*z. Let j be (-702)/c*(4 - 2). Suppose -j - 1384 = -5*g. Is g a prime number? True Suppose -53*b + 37*b = -301856. Is b a composite number? True Let g(z) = 4*z**2 + 4*z - 39. Let v = -10 - -26. Is g(v) composite? False Suppose 4*h + 9327 = 5*k - 17831, -4*k = 3*h - 21745. Suppose 7*t - 2*t - 4*c - 6797 = 0, -4*t = -5*c - k. Is t prime? True Let o(s) = -8 - 9*s - 20*s + 0*s - 8. Is o(-15) a prime number? True Let m = -11 + 47. Is 27/m - (-18841)/4 a prime number? False Suppose 3*u - 4264 = -4*q + 4*u, 4*u + 3185 = 3*q. Is q a prime number? False Let m be (-360)/(1/(0 + 1)). Suppose 1657 = -8*k - 3231. Let p = m - k. Is p a composite number? False Let c(d) = -d**2 + 12*d - 8. Suppose 4*y - 6*y + 18 = 0. Is c(y) a prime number? True Suppose -2*g - 161 = -4*m - 3*g, -m + 38 = g. Let u = m + -28. Let r(n) = 20*n - 7. Is r(u) a composite number? True Let q(w) be the second derivative of 2*w**4/3 - w**3/6 + 3*w**2 - 27*w. Let v(l) = -4*l**2 - 1. Let g be v(-1). Is q(g) prime? True Let i(g) = 8*g - 22. Let t be i(4). Suppose t*v + 655 = 15*v. Is v a composite number? False Suppose 13*l - 12*l = 3. Let h be (4/(-6))/((-10)/45). Suppose l*d = -h*n + 261 - 90, 0 = -4*n. Is d prime? False Suppose 0 = 2*y - 4*m - 20, -m = 3*y - 0 - 2. Suppose 6 = d + y. Suppose 0 = j - 4*j - 5*n + 1256, -d*j = 4*n - 1672. Is j prime? False Let b(x) = -x**3 - 7*x**2 + 11*x - 2. Let j = -38 + 25. Let t be b(j). Is (-4)/6 - t/(-3) prime? False Suppose h + h + 3604 = -4*u, -2*h = 3*u + 2705. Let b = -582 - u. Is b composite? False Let k(j) = j + 26. Let c be k(0). Suppose 0 = 3*n - 15, 3*b - c = -n - 9. Suppose -b*x + 4*o = o - 139, 68 = 2*x - 2*o. Is x composite? False Let z(m) = -225*m + 256. Is z(-35) a prime number? False Let k = 7 - 5. Suppose -2*y + 10 = 0, -3*o + k*o + 17 = -y. Suppose 0 = p - 255 + o. Is p a composite number? False Suppose 0 = 2*s - 2*p + 6*p + 10, 14 = 2*s - 2*p. Let f(b) = b**2 - b - 2. Let z be f(s). Suppose z*u - 31 - 5 = 0. Is u composite? True Suppose -28 - 23 = -3*j - 2*o, -5*j + o = -72. Suppose j*l + 5915 = 24800. Is l a prime number? True Suppose 2*o = 10058 + 1616. Is o a prime number? False Let g(x) = 99*x - 88. Is g(5) a composite number? True Let n(c) = 67*c**3 - 7*c**2 - 4*c + 29. Is n(5) a composite number? False Let k(q) = -q**3 - 9*q**2 - 2*q - 16. Let c be k(-9). Suppose 3*o + 5*w - 662 = 0, c*o + 3*w + 214 = 655. Is o prime? False Let w = -3626 + 15875. Is (w/27)/(1/3) prime? True Let d(y) = -27*y**3 - 8*y**2 - 35*y + 1. Is d(-6) a composite number? True Let t(q) = -q**2 - 8*q + 6. Let i be t(-7). Is (99 - i)/((-4)/(-14)) prime? False Suppose 5*s = 2*j + 29185, 10*s + 3*j = 5*s + 29185. Is s a prime number? False Let r = 18525 + -7471. Is r composite? True Let h(i) = -1477*i + 309. Is h(-5) a prime number? False Let h(b) = -3*b + b + b - 5*b - 10. Let j be h(-13). Is j/6 - 7/21 a prime number? True Let w = 91 + -61. Let v(j) = -3 + w*j - 1 + 1 + 21*j. Is v(6) a prime number? False Let j(n) be the fi
{ "pile_set_name": "DM Mathematics" }
Kuala Lumpur Eat and meet Bars & nightlife Kuala Lumpur has a vibrant nightlife, which may be surprising to some as the city is the capital of a Muslim-majority country. But KL offers something to suit all tastes once the sun dips, from low-key neighbourhood pubs through to cutting-edge clubs. Whatever kind of place rocks your boat, a near-universal feature is how relaxed and friendly everything is. It's refreshingly easy in KL for... Read our full review of Nightlife in KL. One of the biggest complaints about Kuala Lumpur, from both visitors and residents alike, is the shocking price of alcohol. It is often more expensive to get a drink in KL than in notoriously expensive cities like London and New York (and er, islands like Bali). Hefty government taxes are partly to blame, but many bars and restaurants contribute to the problem by having extremely high mark-ups.... Read our full review of Happy hours and other ways to get cheap(er) drinks in Kuala Lumpur. As Kuala Lumpur grows ever upwards, one of the benefits is an increasing number of rooftop bars where you can get spectacular views of the city. For the most part these are based in high end hotels, making for a mixed clientele of well-heeled locals, expats and visitors. The dress code tends towards “smart casual”, so no sandals, shorts or vests for... Read our full review of Best rooftop bars in Kuala Lumpur. Cafes With a red and black exterior and a patio occupied to the brim during lunch, Antipodean Cafe on Kuala Lumpur‘s trendy Jalan Telawi is one of Bangsar’s most successful lunch and coffeehouses (though they’re open for dinner too). Drawing inspiration from the taste and lifestyle of the Antipodes to the south, its extensive menu is locally sourced as much as possible and includes classics as... Read our full review of The Antipodean. If anywhere in KL can claim to have a burgeoning cafe culture it is Bangsar, particularly the area centred on Jalan Telawi and on the upper floor of Bangsar Village II is where you'll find Marmalade -- one of KL's most charming eateries. It serves up an imaginative selection of breakfasts, salads, sandwiches and pasta dishes. The kids menu helps cement its popularity amongst local yummy... Read our full review of Marmalade. The cafe serves up light-ish food, such as quiches, pies and salads. The selection may be on the small side, but the portions are generous. Staff can be charming or snotty, depending one side of the bed they go out of. Somewhat difficult to find, it's tucked away in the corner of Peter Hoe Evolution, KL's funkiest shop, on the second floor of the Lee Rubber Building. The closest public... Read our full review of Peter Hoe Cafe. When I first came to Kuala Lumpur, a workmate of mine offered to take me to their favourite Chinese eatery. I readily accepted the offer, but as we entered the place, I began to have second thoughts. Our “restaurant” was a collection of plastic tables and stools, located inside a car park. Once the food arrived though, my doubts evaporated. This was seriously good stuff — Chinese food with... Read our full review of An introduction to Chinese coffee shops in Kuala Lumpur. Malaysia is one of the few places I can think of that has a deeply ingrained culture of both tea and coffee drinking. For the most part, coffee (like tea come to think of it) is served up strong, milky and sweet; an anti-skinny decaff latte if you like. The quality is higher at traditional Malaysian cafes known as kopitiams, which were once common in Kuala Lumpur, but are now an endangered... Read our full review of Where to get a good cup of coffee in Kuala Lumpur. Tea drinking has been part of Malaysian life for hundreds of years, although exactly when the habit started is unclear. The most likely explanation is that it was brought to the country by traders from China. The word for tea in Malay is teh, derived from Hokkien, the dialect spoken in the Chinese province of Fujian, and by many Malaysian Chinese. Confusingly enough, in Kuala Lumpur, the most... Read our full review of Drinking and buying tea in Kuala Lumpur. Forget the decor, this eatery is all about the food, which has kept it popular for half a century. While the language and lack of menu are a bit of a headache, it is well worth making the extra effort to enjoy their stand-out dishes including the crispy sweet and sour fish and belly pork. If in doubt, ask for help from your fellow diners. For character, opt for the older bulding, for air-con,... Read our full review of Sek Yuen. Its intimate, stylish Bangsar branch, serves a selection of decent thin-crust pizzas and Asian favourites, such as mee siam (Thai style fried noodles), and has a commendable wine list, but it's the desserts which set pulses racing. The pavlova and tiramisu are just two of the shockingly good options. Be warned though, such pleasure does not come cheap -- a dessert and a soft drink will set you... Read our full review of Alexis. It's part of the BIG Group launched in 2011 by Benjamin Yong, a man with a seeming Midas touch when it comes to food. When it opened, Plan B focused on breakfasts, light pasta dishes, salads and sandwiches, but has now introduced an evening menu too. Prices are very reasonable, and wine bought from the nearby Ben's General Store does not attract a corkage charge. Bangsar Village is a twenty... Read our full review of Plan B. Coliseum has been serving food and drink for more than 90 years and while the mostly Western-style food may not hit any great heights, and the service is nothing to shout about, the place is soaked in history, and well worth at least one visit. Coliseum is on Jalan Tuanku Abdul Rahman about half way (as the crow flies) between Masjid Jemak and Bandaraya LRTs. If you're walking from Masjid... Read our full review of Coliseum Cafe. Chinese The steamed meat dumplings are delicious, as are many of the more unusual dishes, such as the noodles mixed with sesame and peanut, and pumpkin with salted duck eggs. Din Tai Fung has several clearly-marked vegetarian dishes, and is happy to adapt dishes where posssible. It's best to go with at least one other person, so you can smaple a good range of the flavours and textures on offer.... Read our full review of Din Tai Fung. Worth the visit for its chicken wings alone, it is does superb seafood dishes, like chilli prawns and black pepper crab. The English menu and a willingness to adapt dishes to your taste or dietery needs are other bonuses. Wong Ah Wah's popularity means it has no need to lure in customers with menu-waving waiters, unlike many of its rivals along Jalan Alor. It's open from late afternoon until the... Read our full review of Wong Ah Wah. One of the finest options is Li Yen in the Ritz Carlton. It is renowned for its service, its sumptuous decor and cassic Cantonese cuisine, including top notch dim sum. Stand-out dishes include the golden prawns (deep fried with shredded yam) and deep fried fish with salt and pepper. While the food is not outrageously priced for the quality on offer, alcohol prices are another matter entirely.... Read our full review of Li Yen. This place has a door-stopper size picture menu, most with an English description of the dish. Portions are large, so if you want to sample a a selection of different offerings, best to go in a group. Solo diners are better off opting for good value single plate meals. Set at the far southern end of Chinatown on Jalan Panggong, the closest monorail station to Wan Fo Yuan is... Read our full review of Wan Fo Yuan. Kedai Kopi Lai Foong, near to Sze Wa Taoist temple, is well worth popping into if you are in the neighbourhood. The restaurant feels a little like a mini food market as there are a bunch of stalls around the perimeter, each preparing a specific dish. Prices are clearly displayed and you pay as soon as the food arrives. Kedai Kopi Lai Foong is especially well known for its beef noodle soup and... Read our full review of Kedai Kopi Lai Foong. One of the few proper Chinese coffee shops left in central KL, the decor does not seem to have changed for decades. Or some of the customers for that matter. During the day, you order food from the various stalls, while someone will come to your table to take drinks orders. Favourites here include char siew (Cantonese barbecued pork), and curry mee (noodle) soup. Zhing Hong has a good... Read our full review of Restoran Zhing Kong. Yut Kee is a Kuala Lumpur culinary institution, although sadly not one many visitors will have heard of. It’s been serving up tasty food and drink for 83 years, making it one of the city’s very oldest eateries. In that time, this traditional Chinese coffee shop has survived a world war, several recessions, umpteen floods, the communal violence of 1969, and until now, the relentless march of... Read our full review of Yut Kee Restaurant. Known as century eggs, hundred-year eggs, millennium eggs or pidan, this Chinese delicacy is not as old as its name suggests but might take that long to work up the courage to eat. If you can get over the pungent smell and its odd colour, its a popular dish in Malaysia that you might find yourself... Read our full review of Century eggs. Ming Tien in Taman Megah is one outdoor food court you shouldn’t miss trying out in Kuala Lumpur. Festooned with coloured lights, wooden huts and trees, Ming Tien is an affordable but popular location to taste local dishes once the sun... Read our full review of Ming Tien Food Court. Dim sum is a Cantonese custom that you can enjoy at various locations throughout Kuala Lumpur. Dim Sum, literally translated as “to touch your heart,” originated in the teahouses of China but this charming way of dining has made inroads into most parts of Asia and has become part of the culture in Malaysia and beyond. Although it was originally considered inappropriate to enjoy a cup of tea... Read our full review of Dim sum in Kuala Lumpur. Familiar with Cantonese cuisine? It’s more than just dim sum, with roast duck being an institution all of its own. In London, the Four Seasons’ roast duck restaurant has become famous, particularly in Cantonese circles, for being the best outside of Hong Kong. Now two siblings who worked for eight years in the London Bayswater establishment along with other ex-London based relatives have... Read our full review of Village Roast Duck. With a large Chinese population in Malaysia, it comes as no surprise that many prized dishes from China have become commonplace. Some of them are just too good to miss, like Beijing’s famous duck dish, Peking... Read our full review of Peking duck in Kuala Lumpur. Dragon-i has two main specialities, Shanghainese la mian (pulled noodles), which you can see prepared in the open kitchen area, and xiao long bao (steamed dumplings). But the menu it is filled with tasty treats, none of which is likely to break the bank. The braised pork belly, and salt and pepper bean curd are both recommended. Dragon-i wins bonus points for having several clearly-marked... Read our full review of Dragon-i. Fine dining French chef Nathalie Arbefeuille has taken the KL fine dining scene by storm over the last few years, with her mix of classic Franco-Italian cuisine and more innovative European/Asian fusion dishes. Of her two KL restaurants, the most convenient for visitors is Cuisine Gourmet by Nathalie. Her cooking is deceptively simple, forgoing flashiness, to turn out satisfying dishes like foie gras... Read our full review of Cuisine Gourmet by Nathalie. The weekday three course set lunch costs just 100 ringgit, for some of KL's very best food. Dishes like chicken consomme with black truffle and foie gras terrine; and wagyu beef with roasted eringi (a type of Japanese mushroom), are incredible value for money. The a la carte choices are even more sumptuous. A very nice touch, is that all prices at Sage are quoted nett, so no sneaky plus plus... Read our full review of Sage. Food courts Food is a very important draw at these temples to consumerism, split into two distinct types, stand-alone restaurants, and food courts. Every shopping centre has at least one food court, some of the larger ones have several. They all run on much the same principle though, that you order food from individual outlets, and sit down wherever you can find a free table. This can be somewhat of a... Read our full review of Food courts in KL. Gastropub If you are looking for a proper non-halal fried breakfast, with real bacon and pork sausages, then these outlets take a lot of beating. Other highlights include the bangers and mash (sausage and mashed potatoes), burgers and steaks. The sausages are made in house, and are so highly regarded as to be sold in most of the city's best supermarkets. Although very popular with locals, Jarrod's attracts... Read our full review of Jarrod and Rawlins. Named after the ancient name for Britain, the menu would not be out of place in London, where the two owners (one British, one Malaysian) learnt their trade. Albion KL serves up a mixture of British classics with a twist, such as beer battered fish and chips, as well as more global offerings, like gravadlax (Swedish-style cured salmon). The express lunch deal, offering three courses for... Read our full review of Albion KL. Wild mushroom risotto (slow cooked Italian rice), with oyster mushroom tempura, is just one of the imaginative offerings. But the menu has simpler non-fusion fare too, such as the steak sandwich. As an added bonus, vegetarians are well catered for. Although not cheap, a starter, main course and dessert should still leave change from 100 ringgit. The ground floor has the feel of an upmarket... Read our full review of Twentyone Kitchen and Bar. It has nine different choices of battered fish, including classics like cod, and more unusual options such as parrot fish. The barramundi is a good option. Away from fish & chips, the hearty pies are also recommended, particularly the steak and Guinness. For a true taste of home, assuming you come from the north of England that is, the chips with curry sauce are a must. Prices are moderate to... Read our full review of The Magnificent Fish and Chips Bar. Indian The Indian dining experience does not get much more sumptuous (or over the top) than at Bombay Palace, set in colonial bungalow on the edge of KLCC. It's on the pricey side, especially if you order wine, but the food is reliably good. Stand-out dishes include the butter chicken (creamy chicken curry) and the palak paneer. Bombay Palace is at 215 Jalan Tun Razak, just to the north of the Royal... Read our full review of Bombay Palace. Nagasari is a bit unusual in other ways too. Although it looks like a Mamak shop, and opens nearly as long hours, its menu is a mix of south and north Indian dishes, including banana leaf (12:00-15:00), tandoori chicken and aloo capsicum (potatoes and sweet pepper curry), all done to the same high standards. It also has a stall serving Chinese vegetarian food at lunchtime, and another one,... Read our full review of Nagasari Curry House. If there is one local food experience which should be tried at least once by every visitor to KL, it is the banana leak curry. At its most basic, this meal consists of rice, south Indian curries, salads and chutneys, served on a banana leaf, all for 5-6 ringgit. What sets Devi's apart, is not just the quality of the basic selection, but also the range of curry sauces to slop over your rice... Read our full review of Devi's Corner. Named after nasi kandar, originally a Penang favourite of steamed rice served with a selection of dishes, but now mostly associated with Malaysian Indian Muslims (Mamaks). Other popular offerings include a wide selection of South Indian breads, ketam masala (stewed crab with curry sauce), burung puyuh (fried quail) and ayam kampung goreng (crispy fried chicken). If you're finding mall eating... Read our full review of Nasi Kandar Pelita. One of the undoubted culinary highlights of Kuala Lumpur is south Indian food, done with a distinctive Malaysian twist. The eateries can be divided into two main categories: those run by Hindus, and those run by Indians who have converted to Islam, known as Mamaks. Although many dishes turn up at both types of establishment, distinctive differences do exist between... Read our full review of South Indian food in Kuala Lumpur. A short hop from the Liza De Inn Hotel, you’ll find Kanna Curry House in Section 17, a residential part of Petaling Jaya. With a modest but clean interior and a simple outdoor section with plastic tables and chairs, it may look like any other south Indian joint in Kuala Lumpur. But appearances are not what’s driven this restaurant’s popularity; its banana leaf, on the other hand, has helped... Read our full review of Kanna Curry House. South Indian restaurants are far more the norm in Kuala Lumpur, but flamboyant Sagar in Bangsar, a 15-minute cab ride from the city centre, offers a wide selection of northern Indian specialties, such as tandoori chicken, rogan gosh and chicken biryani. Vegetarians aren’t forgotten either, with a long list of dishes that’ll suit even the most hardcore vegan’s... Read our full review of Sagar. A plate of rice topped with four different curries for breakfast? Sounds like a handful (or rather plateful) but that’s exactly what nasi kandar is about; a combination of tantalising, distinct flavours. Once you get used to the idea of consuming so many carbs and so much spice so early in the day, I guarantee you’ll be fighting for a plate of this truly Malaysian dish on... Read our full review of Nasi Kandar. Now in it's third and largest incarnation in the area over the last five years, it finally looks to have found a long-term home. Part of a small local chain, SK Corner offers all the classics, including roti canai (fluffy flat bread with curry saunce), tosai (thin savoury pancake, usually served with curry sauces and chutneys), Mamak mee (spicy fried noodles), ayam goreng (fried chicken),... Read our full review of Restoran SK Corner. The deep fried bitter gourd is worth the trip to this Bangsar outlet almost by itself. Popular extras, like the ikan goreng (fried fish coated in spices), and vegetarian chicken curry, are cheap and tasty too. As an added bonus, Sri Nirwana serves banana leaf all day and all night -- at most other places it is a lunch-time treat only. Bangsar Village is a twenty minute walk (or five minute... Read our full review of Sri Nirwana Maju. Introduction KL is one of world's great unsung culinary destinations. You could stay for a year, eat out every night, and still not exhaust the city's supply of superb eateries. What truly impresses about KL's eateries is how high overall standards are, especially places that are popular with... Read our full review of Great places to eat in Kuala Lumpur. Malay & Nyonya It serves up most of the Malay classics, including otak otak (steamed seafood mousse wrapped in a green leaf), rendang (slow cooked dry meat curry), and ayam percik (chargrilled marinated chicken). Bijan may not be cheap (the least expensive main course is 30 ringgit), but it does represent reasonable value for money. Unusually for Malay cuisine it can be washed down with a glass of beer or... Read our full review of Bijan. The menu includes a good selection of Malay classics, with some Indonesian ones thrown in for good measure. Recommended dishes include the sup ekor (oxtail soup), sambal tumis udang (prawns in a sour spicy sauce), and the kambing masak merah (slow-cooked marinated lamb shank). A nice touch is the mini-tasting menus, which give diners the chance to sample a selection of dishes, such as prawns... Read our full review of Enak KL. Kuala Lumpur is not so much the city that never sleeps, as the city that never stops eating. To say that the city’s residents like their food is a serious understatement. They are obsessed with it. Day to day life is planned around meals, not the other way... Read our full review of Eating around the clock in KL. Every year, Kuala Lumpur plays host to a global halal conference, an indication of how important the Malaysian government views the international market for products that comply with Islamic rules. The event covers everything from food to financial services, which probably comes as a bit of a surprise to anyone who thinks the term only refers to the way an animal is slaughtered. So what does... Read our full review of Halal and Haram (Haraam) in Kuala Lumpur. The two main centres of Nyonya cooking are Penang, where Thai influences also feature, and Melaka, where Portuguese and Indonesian cuisines form part of the mix. The Old China Cafe explores these disparate influences to the full, serving up dishes such as gulai kepala ikan (fish head curry) and ayam cincalok (chicken with preserved shrimp). It's worth a visit for the historic shophouse alone... Read our full review of Old China Cafe. A good way to start your meal is with the selection of appetisers, which includes popiah goreng (fried spring rolls) and cucur udang (deep fried battered prawns). Other recommended dishes include the ikan siakap masam manis (deep fried sweet and sour sea bass) and ayam panggang kuah percik (chargrilled marinated chicken). Songket has the bonus (or curse) of live traditional entertainment... Read our full review of Songket. Makan Kitchen not only tries to show off this regional variety, it also showcases some of Malaysia's non-Malay cuisines, including Indian, Chinese, Nyonya (Malay-Chinese), Ibanese (from the Iban people of Sarawak), and Kristang (Portuguese-Malakan). It's possible to order a la carte, or as a sort of buffet (59-79 ringgit, where you choose a selection of dishes, and it's cooked freshly for you).... Read our full review of Makan Kitchen. Markets As I may have mentioned before, Malaysians like their food. It’s one of the few things which cuts across all the main ethnic groups in the country. One big difference between the races though, is that while fantastic Chinese and Indian food is easily accessible to tourists, good Malay cooking is far more difficult to... Read our full review of Ramadan food markets in Kuala Lumpur. Close to where Kuala Lumpur began in 1857 is a traffic-clogged square called Pasar Medan — literally, “market field” in Malay. It was here that the city’s pioneering tin miners bought their fresh supplies, and around which the early settlement too shape. In the late 19th century, the market was moved to a new site a few hundred metres away, where Central Market now... Read our full review of The best fresh food markets in Kuala Lumpur. Middle Eastern The large range of hot and cold meze, and excellent Lebanese bread sandwiches, mostly priced in the 10-15 ringgit mark, all make for high quality, decent value snacks. The same could not be said of its alcohol prices though, which are cheeky to say the least. Al-Amar's big brother, in Pavilion, is a much more formal, and thus pricier affair, turning out what many people believe to be the best... Read our full review of Al-Amar. The food, which is described as Arabian, is not only reliably good, but also the best value Middle Eastern cuisine in town. As well as a good range of meze, and grilled meat and fish dishes, Sahara Tent has some more esoteric offerings, like Arayess (lamb stuffed bread), and fried breaded fish fillet on a bed of hummus. Sahara Tent is a five minute walk from Bukit Bintang monorail... Read our full review of Sahara Tent. One such place is Naab, which specialises in Iranian fare. While most of the dishes would not look out of place on a Lebanese menu, such as the various kebabs, dolma (vine leaves stuffed with herby rice) and hummus, Naab has a sprinkling of more unusual offerings. These include lamb shank with broad bean rice and ghorme sabzi, a traditional Iranian beef stew. Naab is good value for money,... Read our full review of Naab. Tarbush is part of a small local chain but don't let that put you off. The sharing plates of meze (mostly vegetarian appetisers), served with warm flat bread, make for tasty meals in themselves. These include some of the best hummus (chickpea and sesame paste dip) in town, as well as baba ghanoush (smoky aubergine dip), falafel (deep fried chickpea patties) and fattoush (mixed salad topped by... Read our full review of Tarbush. Though strictly speaking not part of the Middle East, Turkish cuisine shares many of the same dishes. What makes Bosphorus special though, is the offerings which are more particular to Turkey, including imam bayaldi (baked stuffed aubergine), cacik (yoghurt and garlic dip), lahmacun (Turkish lamb pizza), and hunkar begendi (literally the Sultan's favourite, slow cooked lamb served on aubergine... Read our full review of Bosphorus. Other Asian cuisine Apart from the well-executed standards, there are also a number of more unusual dishes, such chor ladda (chicken and peanut dumplings) and Yam Hua Plee (banana flower and minced chicken salad), many from the Isaan region of Thailand. Rama V wins further points for having an interesting vegetarian menu. Rama V is on the south side of Jalan U-Thant, which runs off to the east of Jalan Tun... Read our full review of Rama V Fine Thai Cuisine. Forget the stained/torn table cloths, and the wobbly tables, and concentrate on the food. The green curries are wonderfully spicy and flavoursome, while the som tam (spicy papaya salad), and pad Thai (sour sweet fried flat noodles), are great too. Considering its convenient location, at the Jalan Alor end of Changkat Bukit Bintang, and the reasonable prices, this place is a true rough... Read our full review of Restoran Thai Somtam Seafood. What sets Samira apart from many of its rivals, is that the food has not been altered too much for local tastes. This is proper Thai (and Laotian) fare, with favourites like tom kha (spicy cocount milk soup), and pad thai (sour sweet rice noodles), done reliably well. Samira has several vegetarian options and is happy to adapt dishes where possible. It's hidden away in Sentul Park, on the... Read our full review of Samira by Asian Terrace. The two conveniently placed KL outlets (one in Equatorial, the other in Pavilion), are both reliably good places to find authentic cuisine. It is the simple things which Kampachi does well, such as the california rolls (meat, fish or vegetables, wrapped in rice), soba (buckwheat noodle) soup, shioyaki (salt baked fish), and bento (assorted goodies served in a multi-compartment tray). You'll... Read our full review of Kampachi. Seafood Whether you’re seeking a quick culinary expedition or just looking for a new place to visit for a day from Kuala Lumpur, Port Klang is easily accessible and allows you to combine filling your stomach with the discovery of a new location. Relatively unknown by foreigners, Port Klang’s crab and steamboat dishes are highly sought after by tourists visiting from Singapore and other parts of... Read our full review of Seafood in Port Klang. Fatty Crab is a name on Kuala Lumpur‘s seafood circuit that any self-respecting seafood lover ought to know. It’s impossible to miss with the crowds waiting outside to dine here; even with two floors of seating, you may need to wait more than an hour on weekends for a table. The best strategy is to either go early (before 20:00), late (after 21:30), or dine here on weekdays when the throngs... Read our full review of Fatty Crab. Anyone up for some fresh seafood in Kuala Lumpur? If heading for the coast is too time-consuming and inconvenient, then this is the place for you in Kuala Lumpur: Unique Seafood is 15 minutes from the city centre by cab and you’ll find more than a hundred fish tanks filled with fresh seafood imported from all over the world, including some rather unique specimens. From abalone and geoduck, to... Read our full review of Unique Seafood 23. Vegetarian As well as the lunch-time mixed rice section, it's a great spot to try Chinese and Nyonya dishes which are usually off-limits. The curry mee (thick curry noodle soup), asam laksa (sour spicy soup) and the char kuay teow (spicy fried flat noodles) are particularly good. As with every other vegetarian eatery in town, no alcohol is served. Blue Boy is just off Jalan Tong Shin a 20-30 minute walk... Read our full review of Blue Boy. Apart from breads, which are ordered from the waiting staff, the rest of the food is served as a buffet. As many of the dishes, which change every day, are cooked to old family recipes, Annalakshmi is a genuine culinary voyage of discovery. Whatever you choose to pay (15-20 ringgit a head is reasonable), the money goes to a good cause, helping to fund the Temple of Fine Arts. Annalakshmi is... Read our full review of Annalakshmi. The cafe is owned by Artisan Roast, purveyor of some of the city's finest coffee. So you can rest assured that you can get a quality caffeine fix to go with your vegetarian and vegan food. As well as savoury snacks, are sweet pastries and ice cream. The only disappointing feature is the lack of decaf coffee. You'll find RAW Coffee on the ground floor of the Wisma Equity Building on the north... Read our full review of RAW Coffee Kuala Lumpur. This popular eatery does a range of good value thalis thalis (a selection of dishes normally served on a round stainless steel plate), from various regions of India. A la carte choices include south Indian treats like masala tosai (savoury pancake with spicy potato filling), as well as north Indian favourites like sag paneer (cottage cheese cubes with spinach). While the decor won't win any... Read our full review of Bakti Woodlands. Horror, pity and grudging admiration: the three main ways Malaysians react when they find out someone is a vegetarian. This would suggest that keeping clear of meat and fish is a tough ask, even in cosmopolitan KL. Which is odd, because there are few places in the world where vegetarians can eat as well.... Read our full review of How to eat vegetarian in Kuala Lumpur. Saravana Bhavan, which has convenient outlets in Bangsar, Brickfields and Little India, turns out some of the city's best Indian food, all of it vegetarian. Top picks include the superb masala tosai (savoury pancake stuffed with a spicy potato and onion mix), aloo gobi masala (potato and cauliflower curry) and paneer butter masala (cubes of Indian cottage cheese in a rich tomato sauce).... Read our full review of Saravana Bhavan. Western Set on the edge of the embassy district, this place is a triumph of substance over style. Forget the plastic furniture, neon lighting, and traffic noise, steaks of this quality, for under 30 ringgit, are worth travelling miles for. The mixed clientele includes plenty of diplomats, who generally know a thing or two when it comes to food. Cold beer is available by the can. Suzi's Corner can be... Read our full review of Suzi's Corner. Promising to burger you senseless, Daily Grind has a wide range of burgers to choose from, including two vegetarian options, although the classic beef burger with cheese is hard to beat. Most are in the 30-40 ringgit bracket, so not exactly cheap, but for the taste and quality, it's really not bad value. Bangsar Village is a twenty minute walk (or five minute cab ride) from Bangsar LRT on the... Read our full review of The Daily Grind. Named after a frangipani which unfortunately no longer stands out front, the restaurant pulls off the fusion trick, marrying European and Asian cuisines, to make an end result which is greater than the sum of parts. Dishes like the strudel of seared foie gras and apple rendang (unlike the Malaysian dry curry, this is a fried fruit reduction) may sound like a dog's dinner, but are actually very... Read our full review of Frangipani. Although named after the Spanish for pig, this place is run by an Austrian, and turns out dishes from all over Europe. Thuringer tostbratwurst (sausage with pickled cabbage and mashed potato), may sit uneasily with pan-fired goats cheese wrapped in Serrano ham, but El Cerdo's legion of loyal customers attest to the quality of the food. Despite the rustic nature of the menu, this is not a cheap... Read our full review of El Cerdo. Quite apart from having a great range of authentic tapas, cold cuts, and main meals, El Meson is the unlikely home to one of KL's best fried breakfasts, with real bacon and pork sausages. Unlikely, because most Spaniards (like Italians) start the day with nothing more substantial than a coffee. The rest of the menu, however, could hardly be more evocative of Spain. Bangsar Village is a twenty... Read our full review of El Meson. A favourite amongst expats and well-heeled locals alike, this is a great place for a treat Italian meal while visiting KL. Although by no means cheap, Sassorosso is not outrageously priced, so long as you stick to pizzas and pasta, and avoid the temptations of the extensive wine list. It also does a great value lunchtime deal, with an antipasti buffet, and pizza or pasta, for little more than 50... Read our full review of Sassorosso. While it is relatively easy to get good Spanish food in Kuala Lumpur, the most prominent local chain, La Bodega, lets itself down by being pork-free. Spanish food without the likes of jamon (ham) and chorizo (spicy pork sausage), is simply not the same. That said, La Bodega is still one of the best places in town for tapas. The most accessible branch is Bodega @Pavilion KL, which, while being... Read our full review of La Bodega. With a diverse multiracial society and an evolving food culture, there’s no doubt that diners are spoilt for choice in Malaysia. But you aren’t limited to Asian cuisine if you’re seeking something a little more exotic to this part of the world; if you prefer the zing of jalapenos, jump on the wagon at Las Carretas for affordable Mexican cuisine and refreshing... Read our full review of Las Carretas. Dishes like lamb shank with soft polenta (cornmeal), roast sea bass with grilled vegetables, and pumpkin ravioli with duck breast, are great examples of less being more. The pizza is good too, although it's best to go for the more classic options, such as funghi (mushroom) or quattro formagi (four cheeses). The wine and food pricing is amongst the fairest in KL, for a restaurant of this quality.... Read our full review of Tatto. It is an undeniably pleasant setting -- one of KL's very best spots for a romantic date. And the food is generally decent too, especially the pizzas. But the use of pork substitutes, like beef bacon and turkey ham, is somewhat less classy than the decor. Where possible stick to simpler combinations, with real Italian ingredients, such as the gnocchi (potato dumplings) with gorgonzola and rocket;... Read our full review of Nerovivo.
{ "pile_set_name": "Pile-CC" }
using Mirror; namespace WeaverTargetRpcTests.TargetRpcValid { class TargetRpcValid : NetworkBehaviour { [TargetRpc] void TargetThatIsTotallyValid(NetworkConnection nc) { } } }
{ "pile_set_name": "Github" }
// Copyright (c) 2013 The Chromium Authors. All rights reserved. // Use of this source code is governed by a BSD-style license that can be // found in the LICENSE file. // // This implements a Clang tool to convert all instances of std::string("") to // std::string(). The latter is more efficient (as std::string doesn't have to // take a copy of an empty string) and generates fewer instructions as well. It // should be run using the tools/clang/scripts/run_tool.py helper. #include <memory> #include "clang/ASTMatchers/ASTMatchFinder.h" #include "clang/ASTMatchers/ASTMatchers.h" #include "clang/Basic/SourceManager.h" #include "clang/Frontend/FrontendActions.h" #include "clang/Tooling/CommonOptionsParser.h" #include "clang/Tooling/Refactoring.h" #include "clang/Tooling/Tooling.h" #include "llvm/Support/CommandLine.h" using namespace clang::ast_matchers; using clang::tooling::CommonOptionsParser; using clang::tooling::Replacement; using clang::tooling::Replacements; namespace { // Handles replacements for stack and heap-allocated instances, e.g.: // std::string a(""); // std::string* b = new std::string(""); class ConstructorCallback : public MatchFinder::MatchCallback { public: ConstructorCallback(Replacements* replacements) : replacements_(replacements) {} virtual void run(const MatchFinder::MatchResult& result) override; private: Replacements* const replacements_; }; // Handles replacements for invocations of std::string("") in an initializer // list. class InitializerCallback : public MatchFinder::MatchCallback { public: InitializerCallback(Replacements* replacements) : replacements_(replacements) {} virtual void run(const MatchFinder::MatchResult& result) override; private: Replacements* const replacements_; }; // Handles replacements for invocations of std::string("") in a temporary // context, e.g. FunctionThatTakesString(std::string("")). Note that this // handles implicits construction of std::string as well. class TemporaryCallback : public MatchFinder::MatchCallback { public: TemporaryCallback(Replacements* replacements) : replacements_(replacements) {} virtual void run(const MatchFinder::MatchResult& result) override; private: Replacements* const replacements_; }; class EmptyStringConverter { public: explicit EmptyStringConverter(Replacements* replacements) : constructor_callback_(replacements), initializer_callback_(replacements), temporary_callback_(replacements) {} void SetupMatchers(MatchFinder* match_finder); private: ConstructorCallback constructor_callback_; InitializerCallback initializer_callback_; TemporaryCallback temporary_callback_; }; void EmptyStringConverter::SetupMatchers(MatchFinder* match_finder) { const clang::ast_matchers::StatementMatcher& constructor_call = id( "call", cxxConstructExpr( hasDeclaration(cxxMethodDecl(ofClass(hasName("std::basic_string")))), argumentCountIs(2), hasArgument(0, id("literal", stringLiteral())), hasArgument(1, cxxDefaultArgExpr()))); // Note that expr(has()) in the matcher is significant; the Clang AST wraps // calls to the std::string constructor with exprWithCleanups nodes. Without // the expr(has()) matcher, the first and last rules would not match anything! match_finder->addMatcher(varDecl(forEach(expr(has(constructor_call)))), &constructor_callback_); match_finder->addMatcher(cxxNewExpr(has(constructor_call)), &constructor_callback_); // The implicitly generated constructor for temporary could be wrapped by // implicitCastExpr, so ignoringParenImpCasts is needed. match_finder->addMatcher( cxxBindTemporaryExpr(ignoringParenImpCasts(forEach(constructor_call))), &temporary_callback_); // Note that forEachConstructorInitializer is needed. The std::string // constructor is wrapped by exprWithCleanups and cxxCtorInitializer. // forEach() would not work. match_finder->addMatcher(cxxConstructorDecl(forEachConstructorInitializer( withInitializer(expr(has(constructor_call))))), &initializer_callback_); } void ConstructorCallback::run(const MatchFinder::MatchResult& result) { const clang::StringLiteral* literal = result.Nodes.getNodeAs<clang::StringLiteral>("literal"); if (literal->getLength() > 0) return; const clang::CXXConstructExpr* call = result.Nodes.getNodeAs<clang::CXXConstructExpr>("call"); clang::CharSourceRange range = clang::CharSourceRange::getTokenRange(call->getParenOrBraceRange()); auto err = replacements_->add(Replacement(*result.SourceManager, range, "")); assert(!err); } void InitializerCallback::run(const MatchFinder::MatchResult& result) { const clang::StringLiteral* literal = result.Nodes.getNodeAs<clang::StringLiteral>("literal"); if (literal->getLength() > 0) return; const clang::CXXConstructExpr* call = result.Nodes.getNodeAs<clang::CXXConstructExpr>("call"); auto err = replacements_->add(Replacement(*result.SourceManager, call, "")); assert(!err); } void TemporaryCallback::run(const MatchFinder::MatchResult& result) { const clang::StringLiteral* literal = result.Nodes.getNodeAs<clang::StringLiteral>("literal"); if (literal->getLength() > 0) return; const clang::CXXConstructExpr* call = result.Nodes.getNodeAs<clang::CXXConstructExpr>("call"); // Differentiate between explicit and implicit calls to std::string's // constructor. An implicitly generated constructor won't have a valid // source range for the parenthesis. We do this because the matched expression // for |call| in the explicit case doesn't include the closing parenthesis. clang::SourceRange range = call->getParenOrBraceRange(); if (range.isValid()) { auto err = replacements_->add(Replacement(*result.SourceManager, literal, "")); assert(!err); } else { auto err = replacements_->add( Replacement(*result.SourceManager, call, literal->isWide() ? "std::wstring()" : "std::string()")); assert(!err); } } } // namespace static llvm::cl::extrahelp common_help(CommonOptionsParser::HelpMessage); int main(int argc, const char* argv[]) { llvm::cl::OptionCategory category("EmptyString Tool"); CommonOptionsParser options(argc, argv, category); clang::tooling::ClangTool tool(options.getCompilations(), options.getSourcePathList()); Replacements replacements; EmptyStringConverter converter(&replacements); MatchFinder match_finder; converter.SetupMatchers(&match_finder); std::unique_ptr<clang::tooling::FrontendActionFactory> frontend_factory = clang::tooling::newFrontendActionFactory(&match_finder); int result = tool.run(frontend_factory.get()); if (result != 0) return result; if (replacements.empty()) return 0; // Each replacement line should have the following format: // r:<file path>:<offset>:<length>:<replacement text> // Only the <replacement text> field can contain embedded ":" characters. // TODO(dcheng): Use a more clever serialization. Ideally we'd use the YAML // serialization and then use clang-apply-replacements, but that would require // copying and pasting a larger amount of boilerplate for all Chrome clang // tools. llvm::outs() << "==== BEGIN EDITS ====\n"; for (const auto& r : replacements) { llvm::outs() << "r:::" << r.getFilePath() << ":::" << r.getOffset() << ":::" << r.getLength() << ":::" << r.getReplacementText() << "\n"; } llvm::outs() << "==== END EDITS ====\n"; return 0; }
{ "pile_set_name": "Github" }
The targets of CAPRI rounds 20-27. Eight CAPRI prediction rounds with a total of 15 targets were held in the years 2010-2012. Only five of the targets were protein assemblies comparable with those of earlier CAPRI rounds. In one target, the solvent positions at the interface had to be predicted; another was a protein-polysaccharide complex. The remainders were designed complexes issued from protein engineering experiments, and the prediction concerned either their structure or the binding affinity of the designed ligand. Affinity prediction was a new experiment in CAPRI, and a challenge for its participants. It pushed the community into developing novel procedures and score functions that will improve the performance of docking methods, help designing binders, and yield better structure-based estimates of the binding free energy of natural assemblies.
{ "pile_set_name": "PubMed Abstracts" }
using NHapi.Base.Parser; using NHapi.Base; using NHapi.Base.Log; using System; using System.Collections.Generic; using NHapi.Model.V26.Segment; using NHapi.Model.V26.Datatype; using NHapi.Base.Model; namespace NHapi.Model.V26.Group { ///<summary> ///Represents the RRI_I12_AUTHORIZATION_CONTACT Group. A Group is an ordered collection of message /// segments that can repeat together or be optionally in/excluded together. /// This Group contains the following elements: ///<ol> ///<li>0: AUT (Authorization Information) </li> ///<li>1: CTD (Contact Data) optional </li> ///</ol> ///</summary> [Serializable] public class RRI_I12_AUTHORIZATION_CONTACT : AbstractGroup { ///<summary> /// Creates a new RRI_I12_AUTHORIZATION_CONTACT Group. ///</summary> public RRI_I12_AUTHORIZATION_CONTACT(IGroup parent, IModelClassFactory factory) : base(parent, factory){ try { this.add(typeof(AUT), true, false); this.add(typeof(CTD), false, false); } catch(HL7Exception e) { HapiLogFactory.GetHapiLog(GetType()).Error("Unexpected error creating RRI_I12_AUTHORIZATION_CONTACT - this is probably a bug in the source code generator.", e); } } ///<summary> /// Returns AUT (Authorization Information) - creates it if necessary ///</summary> public AUT AUT { get{ AUT ret = null; try { ret = (AUT)this.GetStructure("AUT"); } catch(HL7Exception e) { HapiLogFactory.GetHapiLog(GetType()).Error("Unexpected error accessing data - this is probably a bug in the source code generator.", e); throw new System.Exception("An unexpected error ocurred",e); } return ret; } } ///<summary> /// Returns CTD (Contact Data) - creates it if necessary ///</summary> public CTD CTD { get{ CTD ret = null; try { ret = (CTD)this.GetStructure("CTD"); } catch(HL7Exception e) { HapiLogFactory.GetHapiLog(GetType()).Error("Unexpected error accessing data - this is probably a bug in the source code generator.", e); throw new System.Exception("An unexpected error ocurred",e); } return ret; } } } }
{ "pile_set_name": "Github" }
Take a rocks glass and fill the bottom with one layer of fresh blueberries. Add the brown sugar and lemon juice and gently muddle. (The longer you let this sit, the better the flavors are going to meld). Fill the glass with ice then top with the rum and ginger ale.
{ "pile_set_name": "Pile-CC" }
Detail of Robert Rauschenberg's Erased de Kooning Drawing showing inscription Detail of Robert Rauschenberg’s Erased de Kooning Drawing (1953) showing the inscription made by Jasper Johns Research Material Artwork Detail The inscription below Erased de Kooning Drawing was executed by artist Jasper Johns (b. 1930) using a lettering device. The paper bearing the inscription is normally framed by a window cut into the work’s mat board. In this conservation image we see the entire sheet, with remnants of tape along its edges and slight staining caused by exposure to light and the acidic backing board on which the drawing was originally mounted.
{ "pile_set_name": "Pile-CC" }
[*] Richard and Anita Calkins Distinguished Professor of Law, Drake Law School. B.A., Illinois Wesleyan University, 1975; J.D., Harvard University, 1978. The author is especially grateful for the careful review and thoughtful comments of Professor David C. Baldus (which is not to imply that Professor Baldus agrees with any of the author's particular substantive points). The author, with the guidance of Professor Baldus, has made every effort to avoid misinterpreting or misusing any of the statistical data mentioned herein. Any errors, of course, are solely attributable to the author. The author also thanks his secretary, Karla Westberg, and his research assistants, Julie Greteman and Kristin Mueller, for their diligent assistance. Return to text. [1] Carol S. Steiker & Jordan M. Steiker, Sober Second Thoughts: Reflections on Two Decades of Constitutional Regulation of Capital Punishment, 109 HARV. L. REV. 355 (1995). The Steiker article has been cited in the popular press. See Ted Gest, A House Without a Blueprint: After 20 Years, the Death Penalty Is Still Being Meted Out Unevenly, U.S. NEWS & WORLD REP., July 8, 1996, at 41 (quoting Steiker and Steiker for the proposition that Supreme Court death penalty jurisprudence has "grown like a house without a blueprint—with a new room here, a staircase there, but without the guidance of a master builder"). See also RAYMOND PATERNOSTER, CAPITAL PUNISHMENTIN AMERICA at xv (1991) ("[A] substantial number of death sentences continue to be imposed in a fashion that can only be described as 'freakish.' "); Daniel Givelber, The New Law of Murder, 69 IND. L.J. 375, 378 (1994) ("The new law [of capital] murder is a failure. By most measures, it has marginally reduced but by no means eliminated arbitrariness from capital punishment."). Return to text. [6] The article is particularly effective in showing how easily states can fulfill the requirements the Court has set, seeid. at 402, and at illuminating roads not taken by the Court that might have had better results, see id. at 414-26. Return to text. [7] Steiker and Steiker never suggest that any of these goals are viewed by the Court as more important than any other, and in fact may suggest at one point that minimizing underinclusion is in fact the Court's primary goal: "Each of the three concerns or commitments (desert, fairness, and individualization) reflects different facets of the basic norm of equal treatment, the idea that like cases should be treated alike." Id. at 369. Return to text. [8] In this context, as in most others, it is dangerous to view "the Court" as an entity with a single mind, when in fact it is composed of nine members who often have diametrically opposed opinions. As to the death penalty, as Steiker and Steiker point out, "the basic configuration on Eighth Amendment issues remained constant for two decades after Furman: two unwavering poles competed for the center." Id. at 428 (citing Furman v. Georgia, 408 U.S. 238 (1972)). On one pole were former Justices Brennan and Marshall, who advocated complete abolition of the death penalty. See id. at 427. On the other pole were former Chief Justice Burger and current Chief Justice Rehnquist (joined in more recent days by Justices Scalia and Thomas), who oppose significant regulation of the death penalty through the Eighth Amendment. See id. It was thus the remaining "centrist" justices like Blackmun (until late in his career, when he became a virtual abolitionist), O'Connor, Powell, Stevens, and White, whose votes controlled the outcomes of cases. See id. at 428. Thus, when I refer to "the Court," I am referring to that centrist bloc as augmented by whatever votes they could pull from the two poles on particular issues. Despite the cobbled-together nature of this body of doctrine, Steiker and Steiker acknowledge that the Court has promulgated some consistent themes, see id. at 364, and I agree (although I do not agree with Steiker and Steiker concerning what all those themes are). Return to text. [29] See id. at 397 (citing Turner v. Murray, 476 U.S. 28, 37 (1986) (permitting voir dire concerning racial prejudice in cases involving interracial murders); Gardner v. Florida, 430 U.S. 349, 357-62 (1977) (invalidating a death sentence based in part upon a presentence report not made available to defense counsel); Caldwell v. Mississippi, 472 U.S. 320, 328-30 (1985) (preventing prosecutors from arguing that the jury's decision is not the final one concerning the death sentence since the jury verdict is subject to appellate review); Beck v. Alabama, 447 U.S. 625, 637-38 (1980) (requiring the inclusion of lesser-included offense instructions that would support a guilty verdict for a noncapital offense); Simmons v. South Carolina, 512 U.S. 154, 163-64 (1994) (permitting defendant to inform jury that a "life" sentence means life without parole); Johnson v. Mississippi, 486 U.S. 578, 584-87 (1988) (overturning a sentence based upon a prior conviction later invalidated); Herrera v. Collins, 506 U.S. 390, 417 (1993) (post-trial judicial consideration of newly discovered evidence may be constitutionally required in a truly compelling case)). Return to text. [31] See id. ("It is difficult to imagine a body of doctrine that is much worse—either in its costs of implementation or in its negligible returns—than the one we have now."); id. at 429 (describing the doctrinal structure as "functionally and aesthetically unsatisfying"); id. at 437 (describing the Court's doctrine as "failure as regulation"); id. at 438 ("We are left with the worst of all possible worlds: the Supreme Court's detailed attention to death penalty law has generated negligible improvements over the pre-Furman era, but has helped people to accept without second thoughts—much less 'sober' ones—our profoundly failed system of capital punishment."). Return to text. [32] See, e.g., David C. Baldus et al., Comparative Review of Death Sentences: An Empirical Study of the Georgia Experiment, 74 J. CRIM. L. & CRIMINOLOGY 661, 664 (1983) ("[I]ndividual death sentences that are excessively severe in comparison to the sentences imposed in factually indistinguishable cases—what we call 'comparatively excessive'—do violate the [E]ighth [A]mendment."); Arnold Barnett, Some Distribution Patterns for the Georgia Death Sentence, 18 U.C. DAVIS L. REV. 1327, 1328 (1985) ("The notion animating proportionality review—one that has been explicitly endorsed by the Supreme Court—is that death sentences cannot be imposed in an arbitrary manner. It is considered objectionable if a given defendant is put to death while, in adjacent counties (or adjacent courtrooms), defendants in virtually the same situation are given prison terms."); PATERNOSTER, supra note 1, at 162-64 (arguing that Furman and Gregg both show that the Court has been concerned with underinclusion). Return to text. [35] The two written works in which BWP set forth the findings that are most pertinent for purposes of this Article are BALDUSETAL., EQUAL JUSTICE, supra note 33, and Baldus et al., Comparative Review, supra note 32. Return to text. [41] See id. at 1339-41, 1364-66. Barnett's method may seem overly simplistic in focusing on only three variables, but the accuracy of his selection of factors is not crucial because choosing other factors would result in the same sort of continuum with low death sentencing rates for the least culpable cases, midrange death sentencing rates for midrange cases, and high death sentencing rates for the most culpable offenders. See, e.g., infra notes 177-81 and accompanying text (explaining system developed by BWP). Return to text. [42] See Barnett, supra note 32, at 1341. Barnett's protocols for each of the three variables are reproduced at the end of this Article. Seeinfra Appendix A. Return to text. [44] Barnett's chart is found at Barnett, supra note 32, at 1342. Actually, the chart I have reproduced here is a reformulation of Barnett's chart produced by BWP in BALDUSETAL., EQUAL JUSTICE, supra note 33, at 95. I chose to use the Baldus reformulation because it is slightly easier to understand. There are a couple of minor discrepancies between the two charts for which I cannot account, but they do not make any difference in the analysis. Return to text. [66] There were 2,484 such convictions in the six-year period following Furman. See BALDUSETAL., EQUAL JUSTICE, supra note 33, at 45. This means there likely were about 2,000 in the five-year period included in Barnett's study. Return to text. [74] Death penalty cases, if properly defended, cost a great deal more than other murder cases at virtually every stage, from voir dire through sentencing. Since most death-eligible defendants are indigent, the court ends up footing litigation costs for both sides. For horror stories of capital defendants who got bargain-basement representation, see Stephen B. Bright, Counsel for the Poor: The Death Sentence Not for the Worst Crime but for the Worst Lawyer, 103 YALE L.J. 1835 (1994). Return to text. [75] See GA. CODE ANN. § 17-10-30.1 (Supp. 1996) (permitting sentencing by a judge presumably if jury is waived, although the statute is not entirely clear on that point). Return to text. [77] See, e.g., In re Winship, 397 U.S. 358, 363 (1970) ("The accused during a criminal prosecution has at stake interest of immense importance, both because of the possibility that he may lose his liberty upon conviction and because of the certainty that he would be stigmatized by the conviction."). Return to text. [78] See id. at 371-72 (Harlan, J., concurring). In a civil suit between two private parties for money damages, for example, we view it as no more serious in general for there to be an erroneous verdict in the defendant's favor than for there to be an erroneous verdict in the plaintiff's favor . . . . In a criminal case, on the other hand, we do not view the social disutility of convicting an innocent man as equivalent to the disutility of acquitting someone who is guilty . . . . I view the requirement of proof beyond a reasonable doubt in a criminal case as bottomed on a fundamental value determination of our society that it is far worse to convict an innocent man than to let a guilty man go free. [79] The Court found the beyond-a-reasonable-doubt standard of proof to be constitutionally required in In re Winship, 397 U.S. 358, 364 (1970). As to the supermajority requirement, the Constitution requires unanimity for conviction by a six-person jury. See Burch v. Louisiana, 441 U.S. 130, 138 (1979). As to a twelve-person jury, the Court has upheld a nine-to-three verdict in favor of conviction. See Johnson v. Louisiana, 406 U.S. 356, 362-63 (1972). However, the Court probably would not approve any lesser supermajority. Johnson was a five-to-four decision, and one of the five members of the majority, Justice Blackmun, stated in his concurrence that any lesser number of votes for conviction would cause him "great difficulty." Id. at 366 (Blackmun, J., concurring). Return to text. [80] See, e.g., 18 U.S.C.A. § 3553(b) (West Supp. 1996) (providing that a court may depart from the sentencing guidelines due to a "circumstance of a kind, or to a degree, not adequately taken into consideration by the Sentencing Commission in formulating the guidelines that should result in a sentence different from that described"). Return to text. [81] For discussions of mercy as a desirable aspect of criminal sentencing, see JEFFRIE G. MURPHY & JEAN HAMPTON, FORGIVENESSAND MERCY 20 (1988) ("To be merciful is to treat a person less harshly than, given certain rules, one has a right to treat that person."); Eric L. Muller, The Virtue of Mercy in Criminal Sentencing, 24 SETON HALL L. REV. 288, 335 (1993): Mercy . . . is an attitude that the sentencer adopts, during the process of selecting a sentence from within a range of authorized punishments, by imagining both the nature of the criminal episode and the impact of the possible sentences from the defendant's perspective. Mercy reminds the judge of how things look from the defense table. Mercy's role in the sentencing process is therefore a limiting or restraining one; it provides a check against the risk that the sentencer will get things wrong by describing the nature of the crime in an imbalanced way or underestimating the impact of the sentence on the defendant. See also Paul Whitlock Cobb, Jr., Note, Reviving Mercy in the Structure of Capital Punishment, 99 YALE L.J. 389, 391 (1989) (arguing that mercy is a particular virtue in capital sentencing). But see California v. Brown, 479 U.S. 538, 542 (1987) (holding that an instruction requiring jurors to ignore "mere sentiment, conjecture, sympathy, passion, prejudice, public opinion or public feeling" was not unconstitutional). Return to text. [82] Justice Brennan created the "death is different" argument in Furman v. Georgia, 408 U.S. 238, 282 (1972) (Brennan, J., concurring). Since then, the Court has adopted this precept in part, although by no means to the extent it could have. See Steiker & Steiker, supra note 1, at 397 (discussing the relatively limited scope to which the Court has put the "death is different" doctrine into practice). Return to text. [86] See CAL. PENAL CODE § 190.4(a) (West 1988); Skaggs v. Commonwealth, 694 S.W.2d 672, 681 (Ky. 1985) (discussing that the failure of a jury to reach a verdict will result in the retrial of the sentencing). Return to text. [102] See, e.g., James Luginbuhl & Julie Howe, Discretion in Capital Sentencing Instructions: Guided or Misguided?, 70 IND. L.J. 1161, 1165-76 (1995) (discussing evidence of juror misapplication of instructions concerning burden of proof regarding aggravating and mitigating circumstances and unanimity requirement regarding finding of aggravating and mitigating circumstances). However, jurors can hardly miss the requirement that their ultimate decision to impose a death sentence must be unanimous. Return to text. [103] See, e.g., BALDUSETAL., EQUAL JUSTICE, supra note 33, at 235. In comparing post- Furman death sentencing rates among the states, it is worth noting that the states whose statutes require death sentencing by the judge rather than by the jury tend to have the highest rates in the region (e.g., Indiana in the East North Central region, Florida in the South Atlantic region, Alabama in the East South Central region, and Arizona and Idaho in the Mountain region). Id.; see also Harris v. Alabama, 115 S. Ct. 1031, 1036 (1995) (noting that according to statistics compiled by the Alabama Prison Project, there have been only five cases in Alabama in which the judge rejected an advisory verdict of death and instead imposed life imprisonment, compared to 47 instances where the judge imposed a death sentence over a jury recommendation of life imprisonment); Stephen B. Bright & Patrick J. Keenan, Judges and the Politics of Death: Deciding Between the Bill of Rights and the Next Election in Capital Cases, 75 B.U. L. REV. 759 (1995) (exploring and decrying the propensity of judges to resort to death sentences in view of increasing public and political pressure). Return to text. [107] The Court upheld sentencing by a one-person sentencer when it refused to find sentencing by the trial judge unconstitutional in Proffitt v.Florida, 428 U.S. 242, 259-60 (1976). The extent to which the Court might permit a death sentence to be imposed by a nonunanimous jury has never been tested, because all states with jury sentencing require a unanimous verdict. The Court has not yet decided whether a unanimous verdict is required at the guilt phase of a case in which the death sentence may be sought upon conviction. See Schad v. Arizona, 501 U.S. 624, 630 (1991). The Court also has not required that the beyond-a-reasonable-doubt standard be employed during capital sentencing, as is evidenced by the Court's upholding of state schemes that do not embody that requirement. Seesupra notes 82, 85, 92-93 and accompanying text (states not employing the beyond-a-reasonable-doubt standard in capital sentencing). Return to text. [108] Examples include witnesses changing stories, co-defendants getting deals, and prosecutors' offices being short of resources. Return to text. [109] See Bordenkircher v. Hayes, 434 U.S. 357, 364 (1978). [S]o long as the prosecutor has probable cause to believe that the accused committed an offense defined by statute, the decision whether or not to prosecute, and what charge to file or bring before a grand jury generally rests entirely in his discretion [but the decision to prosecute may not be] . . . "deliberately based upon an unjustifiable standard such as race, religion, or other arbitrary classification." [112] 391 U.S. 510 (1968). Although Steiker and Steiker begin their analysis with the 1972 Furman case, see Steiker & Steiker, supra note 1, at 363, I believe the 1968 Witherspoon case is the appropriate starting point for considering the Court's regulation of states' administration of the death penalty. Return to text. [116] 428 U.S. 280 (1976). Woodson held unconstitutional a statute that made the death penalty mandatory for every defendant convicted of first-degree murder or felony murder. See id. at 301. Return to text. [117] 428 U.S. 325 (1976). Roberts held unconstitutional a Louisiana statute that imposed a mandatory death sentence on five narrowly defined categories of first-degree murder. See id. at 335-36. Return to text. [118] The Court appeared to reached the logical end of this line in Sumner v. Shuman, 483 U.S. 66, 85 (1987) (holding mandatory death penalty for murder committed by a person serving a life sentence unconstitutional). Return to text. [119] 438 U.S. 586 (1978). Lockett held unconstitutional an Ohio statute that limited the categories of mitigating evidence that could be considered by the sentencer. See id. at 608. Return to text. [120] 455 U.S. 104 (1982). Eddings held that it was unconstitutional for a sentencer to refuse, as a matter of law, to consider all relevant mitigating evidence. See id. at 112. Return to text. [131] The most famous portion of the opinion deals with McCleskey's claim of invidious discrimination. For a discussion of this claim and the Court's treatment of it, see infra notes 138-141 and accompanying text. Return to text. [139] SeeMcCleskey, 481 U.S. at 298 ("[M]cCleskey would have to prove that the Georgia legislature enacted or maintained the death penalty statute becauseof an anticipated racially discriminatory effect.") (emphasis added). Return to text. [142] The Court may have missed the golden opportunity in McCleskey to pay more than lip service to this goal. Return to text. [143] See Lockett v. Ohio, 438 U.S. 586, 604 (1978). [T]he Eighth and Fourteenth Amendments require that the sentencer, in all but the rarest kind of capital case, not be precluded from considering, as a mitigating factor, any aspect of a defendant's character or record and any of the circumstances of the offense that the defendant proffers as a basis for a sentence less than death. [C]ontemporary death penalty law is remarkably undemanding. The narrowing, channeling, and individualization requirements can be simultaneously and completely satisfied by a statute that defines capital murder as any murder accompanied by some additional, objective factor or factors and that provides for a sentencing proceeding in which the sentencer is asked simply whether the defendant should live or die. [T]he narrowing function required for a regime of capital punishment may be provided in either of these two ways: The legislature may itself narrow the definition of capital offenses, as Texas and Louisiana have done, so that the jury finding of guilty responds to this concern, or the legislature may more broadly define capital offenses and provide for narrowing by jury findings of aggravating circumstances at the penalty phase. [148] SeeLockett, 438 U.S. at 608 (invalidating a statute that limited the kinds of mitigating evidence the sentencer could consider). Return to text. [149] See Caldwell v. Mississippi, 472 U.S. 320, 329-30 (1985) (reversing a death sentence because the prosecutor and judge had indicated to the jury that their decision was not final due to appellate review, thereby possibly detracting from the jury's awareness that it was exercising a "truly awesome responsibility"). Return to text. [158] At many points, Steiker and Steiker assert that state systems have the potential to operate arbitrarily. See, e.g., id. at 375 ("[T]he continuing failure of states to narrow the class of death-eligible invites the possibility that some defendants will receive the death penalty in circumstances in which it is not deserved according to wider community standards (overinclusion)."); id. at 378 ("[T]he fear of overinclusive application of the death penalty that accounted in part for the Court's decision to enter the constitutional thicket remains quite justified."); id. at 381-82 ("Narrowing the class of the death-eligible in no way addresses the problem of [overinclusion], because open-ended discretion after death-eligibility permits, even invites, the jury to act according to its own unaccountable whims."); id. at 391-92 ("Although such discretion cannot be used to render a defendant death-eligible contrary to community standards, it can be used to exempt favored defendants from the death penalty or to withhold severe punishment for crimes against despised victims."); id. at 402 ("And the fact of minimal regulation, which invites if not guarantees the same kinds of inequality as the pre-Furman regime, is filtered through time-consuming, expensive proceedings that ultimately do little to satisfy the concerns that led the Court to take a sober second look at this country's death penalty practices in the first place."); id. at 417-18 ("[A]llowing states to seek the death penalty against all offenders in these categories presents a real and substantial danger that many offenders will be selected for execution who do not 'deserve' it (and who will therefore be treated more harshly than many offenders who do 'deserve' death).") (emphasis added). Return to text. [159] See id. at 426 ("We have argued that the Supreme Court's chosen path of constitutional regulation of the death penalty has been a disaster, an enormous regulatory effort with almost no rationalizing effect."); see alsoid. at 403 ("In short, the last twenty years have produced a complicated regulatory apparatus that achieves extremely modest goals with a maximum amount of political and legal discomfort."); id. at 426 ("It is difficult to imagine a body of doctrine that is much worse—either in its costs of implementation or in its negligible returns—than the one we have now."); id. at 429 (arguing that the Court's death penalty doctrinal structure is "functionally and ethically unsatisfying."); id. at 437 ("We began our exploration of legitimation theory in an effort to support the idea that the Court's deeply flawed death penalty law persists because of its success as a 'facade' that creates an appearance of stringent regulation but hides the incoherence and ineffectiveness of the underlying structure."); id. at 438 ("We are left with the worst of all possible worlds: the Supreme Court's detailed attention to death penalty law has generated negligible improvements over the pre-Furman era, but has helped people to accept without second thoughts—much less 'sober' ones—our profoundly failed system of capital punishment."). Return to text. [161] See Steiker & Steiker, supra note 1, at 375 (stating that the Baldus study "found that approximately 86% of all persons convicted of murder in Georgia over a five-year period after the adoption of Georgia's new statute were death-eligible under that scheme."). Return to text. [164] The difference between this 20% and the 14% exclusion figure used by Steiker and Steiker, seesupra note 161, is that the 14% figure is based on 1974-79 cases, see BALDUSETAL., EQUAL JUSTICE, supra note 33, at 268 n.31, while my 20% figure is based on 1973-78 cases, seeid. at 88-89. Return to text. [165] See BALDUSETAL., EQUAL JUSTICE, supra note 33, at 43 (post-Furman cases analyzed included those from March 28, 1973, through June 20, 1978). In some jurisdictions, legislatures have drawn narrow death-eligibility criteria, resulting in a small percentage of homicides being death eligible. Seeid. at 233-34 (about 20% of Colorado murder and nonnegligent manslaughter cases death-eligible); see also David Baldus & George Woodworth, Proportionality: The View of the Special Master, 6 CHANCE: NEW DIRECTIONSFOR STATISTICSAND COMPUTING 9, 11 (1993) (only 227 of over 2,000 New Jersey homicide cases death-eligible). Return to text. [171] That is, of course, as long as the defendant's attorney took advantage of the opportunity to present such evidence. For horror stories concerning attorneys who completely wasted this opportunity (not necessarily in Georgia), see David J. Gross, Sixth Amendment—Defendant's Dual Burden in Claims of Ineffective Assistance of Counsel, 75 J. CRIM. L. 755, 757 (1984); Welsh S. White, Effective Assistance of Counsel in Capital Cases: The Evolving Standard of Care, 1993 U. ILL. L. REV. 323, 325. Return to text. [172] See BALDUSETAL., EQUAL JUSTICE, supra note 33, at 182 ("The most striking post-Furman change has been the statewide decline in the race-of-defendant effect. Indeed, on average, black defendants appear to enjoy a slight overall advantage compared to white defendants, although the effect is not statistically significant.") Return to text. [173] See id. at 183-84. Instead, BWP attribute the finding to a general trend toward equal treatment of African-American defendants that began in urban areas and spread to rural areas. See id. Thus, they state, "Consequently, it does not appear that the decline in discrimination based on the defendant's race is attributable to Georgia's 1973 statutory changes." Id. at 184. Return to text. [178] See BALDUSETAL., EQUAL JUSTICE, supra note 33, at 229-48 (discussing three studies of pre- Furman cases, and three studies of post-Furman cases). An interesting recent research effort is reported in Robert E. Weiss et al., Assessing the Capriciousness of Death Penalty Charging, 30 L. & SOC'Y REV. 607, 617-25 (1996) (analyzing death penalty charging in 363 homicides in San Francisco County, California, through regression analysis and concluding that under the most optimistic assessment, the charging system "wring[s] out about two-thirds of the potential capriciousness"). Return to text. [179] See BALDUSETAL., EQUAL JUSTICE, supra note 33, at 80-81 ("The purpose of each analysis was to determine whether those defendants who received sentences of death can be meaningfully distinguished from the many other defendants who received only life sentences."). Return to text. [180] See id. at 44 (over 150 aggravating and mitigating factors were used). Return to text. [183] In light of this statistic, it is possible to argue that the Court overreacted in Furman. However, there are important aspects of the world as seen by the Court in 1972 that are not reflected by this statistic. First, this statistic does not include cases that came before the Court from Georgia in which the defendants had been sentenced to death for rape or armed robbery, two crimes as to which the Court later determined that the death penalty was overinclusive as a matter of law. See Coker v. Georgia, 433 U.S. 584, 597 (1977); Hooks v. Georgia, 433 U.S. 917, 917 (1977). Second, it took quite a lot of legwork for the Baldus group to dig out the information that enabled them to determine just how aggravated each case was. The lack of a meaningful sentencing proceeding in Georgia prior to 1972 means that the Court did not have access to this information—the Georgia system from the Court's perspective must have resembled a "black box" from which defendants' names were pulled seemingly at random. Third, this statistic does not reflect the seemingly disproportionate number of African-Americans sentenced to death, particularly for rapes of white women. See supra note 128 and accompanying text. Return to text. [186] I realize, of course, that death penalty opponents often contend that the very fact that the system cannot be made perfect is a cogent argument for its abolition. Return to text. [187] This has prompted me to make a modest effort to do so. See infra Part III.B.1.b. Return to text. [188] These cases are summarized in Appendix B. I identified these cases by obtaining a printout of all of the inmates on Georgia's death row from the NAACP Legal Defense Fund Death Penalty Project. I arranged the cases in reverse chronological order from date of sentence, then I searched the defendants' names electronically, to find a direct appeal decision by the Georgia Supreme Court. I excluded two of these cases. First, I did not use Drane v. State, 455 S.E.2d 27 (Ga. 1995), because the Georgia Supreme Court found that the trial court may have improperly excluded the co-defendant's confession—in which the co-defendant took major responsibility for the killing—and reversed the conviction. See id. at 30. Although this evidence was admitted at the sentencing phase, the failure to admit it at the guilt phase could have undermined the validity of the jury's verdict at the guilt phase. The second case I excluded was Potts v. State, 410 S.E.2d 89 (Ga. 1991). This case involved a kidnapping and murder that occurred in 1981, but took almost a decade to reach the Georgia Supreme Court. I excluded this case because the crime was not committed during the same time frame as the other cases I examined. I replaced these two cases with the next two cases in reverse chronological order. Return to text. The mitigating factors were: Defendant showed remorse, gave self up within 24 hours, was drunk or had a history of drug or alcohol abuse, had no intent to kill, believed he or she had a moral justification, the victim was a fugitive, provoked or aroused defendant, was drinking, or using drugs or had bad blood with defendant. [221] See id. at 686 n.92 ("The minor aggravating factors were: A race-related motive, victim was drowned, defendant resisted arrest, defendant created a great risk in a public place, or the victim was a hostage or female."). Return to text. [222] Specifically, I assumed that the factors included within the Barnett analysis and the BWP analysis continue to identify the basic aggravating and mitigating factors, and continue to directly reflect their relative strength. As BWP explain: There are two basic approaches to classifying cases as similar or dissimilar—the a priori and the empirical. The a priori approach endeavors to classify cases as similar on the basis of criteria that, from a legal or moral perspective, one believes should govern the appropriate sentence. . . . . The empirical approach also begins by presupposing that certain factual characteristics of the case being reviewed can serve to identify other cases of "similar" culpability. In contrast to the a priori approach—which primarily selects those factual characteristics on a normative basis—the empirical approach tries to employ those legitimate case characteristics that, statistically, best explain the observed sentencing results . . . . The difference between the two methods is that the a priorist selects the factors he or she believes should influence the sentencing decision, while the empiricist selects the factors that actually appear to do so. BALDUSETAL., EQUAL JUSTICE, supra note 33, at 47-48. Thus, I am adopting an a priori approach, with my a priori choices being informed by the results of empirical studies. Return to text. [227] Barnett reported no cases in this box, but this is clearly a box that should have a high ratio—the ratios in the other boxes where the three Barnett integers totaled "4" are .56 and .81. Return to text. [228] In this case, the defendant pulled the victim's head back by the hair and shot her in the forehead. If this is not an "execution-style" killing (BWP do not define this), then there is no serious aggravating circumstance, and the case scores .00 on the BWP scale. If it is an execution-style killing, then it scores .42. Return to text. [229] There were not enough cases in this box in the BWP study (only one, in which a death sentence was not imposed) to form a valid proportion. The boxes on either side had moderate ratios (.40 and .50), but were based upon a small number of cases. Return to text. [232] See David Cook et al., The Decisionmakers: What Moves Prosecutors, Judges, & Jurors? (Mar. 4, 1996) (finding that jurors are more willing to find mental problems mitigating in the abstract than when applied to a real case) (materials based upon the Capital Jury Research project presented at Life in the Balance VIII conference in St. Louis, Missouri) (on file with the author). Return to text. [244] See id. at 90-91 ("Specifically, our 'overall culpability' index ranks the cases according to the presence or absence of seventeen legitimate case characteristics and combinations thereof that share a statistically significant relationship with the sentences imposed."). Return to text. [245] See id. at 56. We developed a regression-based culpability index for the [study] with a logistic multiple-regression analysis designed to identify statistically the factors that best explain which defendants received death sentences . . . . This procedure required us, first, to collect information for every case concerning a large number of legitimate case characteristics, such as prior record or a contemporaneous felony, that might have influenced the sentencing decision. We then computed for each such case characteristic a regression co-efficient (or 'weight') that reflected its individual contribution to the overall culpability index. Next, we calculated the relative culpability or blameworthiness of each case by summing the 'weights' of all the legitimate explanatory variables present in that case. We then ranked all the cases according to their relative culpability scores, thereby constructing an overall culpability index along which the cases were distributed. Finally, we defined as 'similar' six groups of cases with comparable overall culpability scores. [258] To me, the most regrettable road not taken by the Court has been its failure to require a heightened level of attorney competence above the relatively minimal standard set for all cases, including death penalty cases, in Strickland v. Washington, 466 U.S. 668, 687 (1984) (requiring that counsel's performance be shown to be deficient and that the deficiency prejudiced the defense in order to reverse a conviction or death sentence). A requirement that states provide super-competent trial counsel would either force states out of the death penalty business due to excessive costs or force states to provide top-notch counsel. Either possibility would be more fair to defendants and more efficient in the long run. Return to text.
{ "pile_set_name": "Pile-CC" }
Mecel Mecel was a software and systems consulting firm, specializing in the automotive industry. The company has offices in Gothenburg and has approximately 120 employees. History Mecel was founded in Sweden in 1982 by Jan Nytomt and Hasse Johansson, who later became technical manager at Scania. The company idea was to provide the automotive industry with electronic engine control devices. In 1982 Saab-Scania Combitech Group, as the company was named at the time, acquired Mecel. When General Motors bought the Saab-Scania car operations in 1990 Mecel followed with it. In 1997 General Motors created the company Delphi Automotive Systems and subsequently Mecel became a wholly owned subsidiary of Delphi. Mecel has since been operating as an independent software and system house being able to offer services to all customers. In 1987 a software division, Mecel Gothenburg, was started in Chalmers University Science Park with the intention of investigating and developing multiplexed signaling in the vehicle based on CAN. In 1990 Mecel and Mecel Gothenburg together formed Mecel AB and Mecel Gothenburg has since 2000 has been organizational headquarters. In 2006 the Åmål office was purchased by co founder Jan Nytomt and in 2007 the Mecel Engine Systems was acquired by Hoerbiger In 2009 Mecel had an operating revenue of 107.3 million. President from 2000 until 2011 was Kent-Eric Lång [1], succeeded by Henrik Häggström in August 2011. Company Operations Some major contributions to the industry during the years: The IonSense technology was developed by the Mecel founders in the 80's and are presented in a number of patents. US patents 4785789, 4903676, 4947810, 5769049, 5992386, 6123057, 6827061. The technology are used in a number of applications among others Saab Direct Ignition where it was introduced in the Trionic T5.2 system. In the European Union research programme FP4 was Mecel a member and contributor of the X-by-wire project Mecel has also been contributing to the automotive standardization two examples are within ISO. ISO 14229 where Anders Lundqvist was (chairman). ISO 26262 where Håkan Sivencrona has been editor for subsection 10. Products Some of Mecels product areas are: Automotive Bluetooth Picea Populus References Category:Software companies of Sweden Category:Companies based in Gothenburg Category:Automotive companies of Sweden
{ "pile_set_name": "Wikipedia (en)" }
Q: Why doesn't `FOO=42 echo "$FOO"` print 42 in Bash? I'm confused by this behaviour: $ FOO=42 echo "$FOO" $ FOO=42 && echo "$FOO" 42 I'm accustomed to using VARNAME=value cmd to specify environment variables for other commands, so I was surprised to discover it doesn't work when cmd is echo. This might have something to do with echo being a Bash built-in. Is this the case? If so, is using && the best way to specify environment variables for Bash built-ins? Update: && is no good, as it results in the environment variables being set permanently, which I'm trying to avoid. A: It doesn't matter that echo is a built-in. The reason is that variables on the command line are evaluated before executing the command, they're not evaluated by the command. You could get the result you want with: FOO=42 bash -c 'echo "$FOO"' This starts a new shell to execute echo $foo. Since the argument to bash is in single quotes, the variable is not replaced by the original shell. A: The replacement happens before the command is executed: $FOO is replaced with its current value. echo "" is executed with $FOO set to 42. Try: FOO=42 sh -c 'echo "$FOO"'
{ "pile_set_name": "StackExchange" }
Discount Supra Shoes Hsupra shoesui Catholic, yuan the breath of god from above gold j ī shoot out. The trial of the gun, crackdown. "Oh! Thsupra shoes supra shoes, thsupra shoes supra shoes the truth of the holy land, legends, one of ten big Catholic emerald god, god, you incredibly day gold kill them, refining into doctrine! You......." judge gun a look, the whole body supra shoes in a state of dull, seems to be scared silly. Tai chi god figure was down oppression, judge gun again blasting, the whole body supra shoes the essence and on, into a gun meaning budo, to break the tai chi. But the party cold five fingers open again, a virtual pressure, and the big one town chute, pledge, the whole body of the kingdom of the crystal supra shoes brilliant blossom a sacred light. judge gun all of the martial way moves were a shattered, the whole people fell to the ground, into the tall man of authority, but now he's all hsupra shoes majesty, just as it supra shoes a morally, do not have completely the judgment ability. Once, the celestial master trial, don't know how much the judge emperor, the ancient emperor, to gain entrance, the barbarians, the protoss................ The heavens in the world of the first WangPinXian, but it has become a crackdown by the dead dog. He and xi stem, has become the morally, in the hands of the party, at will be cao longitudinal, not at all against ability.Party cold and step on the past, that judgment and party a gun cold laptop up. Her left hand xi stem, her right hand guns of the trial reigns, everything under control, such as the sea supra shoes almost a mountain, only burst, creation of supreme power not to pull out. Supra High Top Shoes Judge gun feel endless humiliations, he was party to cold in hand, and could not move, supra shoes almost have a suicidal feelings, but now it supra shoes not possible, the huge mana instant party between the hsupra shoes body down to, unexpectedly began to forcibly searched hsupra shoes mind the avenue of essence and memory. "The cold, you kill me! I will not humiliate!" Judge gun roars way: "be killed, and shouldn't be humiliated!" "Are you? You are the pigs!" Party cold cold way: "you judge gun, presided over the celestial DuoNian, the master many secret, I have to from your memory, search out the mystery of the ancient Dan. Get one accident of deep sleep, fulfill my god Dan way of king day. Do you think you can in my hand for die? I won't be so easy to let you die, let your survival can not, beg dead can't." A rumbling, huge memory from the judgment of the guns of the body were forcibly paging through, judge gun thsupra shoes moment of the heart of it supra shoes humiliating possible, supra shoes life most pain and sufferings, thsupra shoes supra shoes like a person supra shoes to pick light body of the 1 in the square, to the people to watch the general. "The cold, you or kill me!" Xi stem also roars way, because the party supra shoes also also cold check hsupra shoes memory. Two people are a practice for one hundred million years without ancient emperor, do not know how much memory, but the party of the cold now fix for the very important, read in between memory, not for a while, and sought to a memory map, and many of the space supra shoes marked on the map, some secret vanity portal above, and all up and down the ups and downs. Finally, in the endless depths, don't know how many dangerous after the space, the far-off divide cut off, in the deepest vanity YinHe ShaQi, a were all of the great seal ancient portal, be web traces of general completely winding, above all supra shoes the absolute seal, the immortality of the soul in the guardian of the gods. Thsupra shoes supra shoes the memory "Dan world" portal, the map of the world to Dan. Judge gun, xi stem of mind supra shoes a picture of thsupra shoes map, party cold against each other, we are exactly the same, have no regret, not a nod, but the world map of Dan Dan among the portal supra shoes the seals, nowhere, supra shoes the speculation in, Dan Lord of the world with the life of decorate down invincible seal, it supra shoes day king also can not open, and in two old memory, must want to find the legend of the key of god of Dan, to open the doors of Dan. And, in the two people in mind, it supra shoes some of the information industry has Dan, Dan world, at least supra shoes more than ten era of the left, Dan Lord of the world, in ten before era, supra shoes a big pieces of the powers of refining Dan yao and to finsupra shoesh the day king, later mana more and more violent, supra shoes almost infinite rival king fairy, battle effectiveness and end the general without the king. Cheap Supra Shoes Then establsupra shoeshed the Dan world, cultivate the similar, after ten hun Dun era, heaven and earth and big burst, Dan world more and more violent. With so many god bestowed Dan, every era, can produce a lot of equivalent to the ancient imperial holy product to cure. Thsupra shoes time earth and heaven big burst, Dan Lord of the world, but also want to break through to the border of the king of fairy, steal heaven and earth and big burst, hun Dun replacement between, the door of eternal life passed out of the way, and therefore be possessed king against the fairy, breaking the Dan world, severely injured Dan Lord of the world. Later the seal was Dan, nature supra shoes the king of fairy dsupra shoesappear, as a kind of celestial many day king had also want to attack the Dan, take out which those sleeping nature god Dan, even find the body of the Lord of Dan, but are not able to success, because the Lord of life in the Dan decorate down the seal of very severe, unless he himself supra shoes to find the key of god of the loss of Dan.
{ "pile_set_name": "Pile-CC" }
Q: Does this code not follow or violate prototype pattern in any way? Instead of getting clone object and modifying attributes, I have first modified attributes of the object and then returned its clone. Is there any difference rule-wise and performance-wise? Also, any other suggestions regarding the design would be great. Thanks. public class Category implements Cloneable { private int id; private String title; private int totalGames; // getters and setters public Category clone() { try { return (Category)super.clone(); } catch(CloneNotSupportedException ex) { return null; } } } public class CategoryCache { private static Category category = new Category(0, null, 0); private CategoryCache() { } public static Category getCategory(int id, String title, int totalGames) { category.setId(id); category.setTitle(title); category.setTotalGames(totalGames); return category; } } while (<100 times>) { Category category = CategoryCache.getCategory(<var1>, <var2>, <var3>).clone(); arlCategory.add(category); // add to arraylist } A: Indeed more than a pattern, Prototype is a work around for increasing performance in Java. The basic thing we need to understand is 'we need Prototype whenever we think that direct creation looks costly, hence we are using a clone of an existing one rather than newly creation. So primarily we replace the creation (new()) with someExistingObject.clone(). So it doesn't matter whether you are changing the attributes before/after cloning, you have achieved the ultimate goal. So the results will be same. The only difference in your way is, the object you are using for cloning purpose (which you are using again and again) most probably will be a dedicated one only for cloning process, and can not perform any other work.
{ "pile_set_name": "StackExchange" }
Q: NGINX SSL Forward Proxy Config I know that NGINX is not supposed to be used as a forward proxy but I have a requirement to do so ... Anyway, obviously it is not to hard to get http to work as a forward proxy but issues arise when trying to configure https. I generated some self signed certs and then try to connect to https://www.google.com and it gives me the error ERR_TUNNEL_CONNECTION_FAILED. The issue has to do with my certs somehow but I have no idea how to fix the issue. Does anyone know how to achieve this functionality ? Here is my config server { listen 443 ssl; root /data/www; ssl on; ssl_certificate /etc/ssl/certs/server.crt; ssl_certificate_key /etc/ssl/certs/server.key; ssl_protocols TLSv1 TLSv1.1 TLSv1.2; ssl_ciphers ALL:!ADH:!EXPORT56:RC4+RSA:+HIGH:+MEDIUM:+LOW:+SSLv2:+EXP; ssl_prefer_server_ciphers on; location / { resolver 8.8.8.8; proxy_pass https://$http_host$uri$is_args$args; } } A: The reason NGINX does not support HTTPS forward proxying is because it doesn't support the CONNECT method. However, if you are interested in using it as a HTTPS forwarding proxy you can use the ngx_http_proxy_connect_module
{ "pile_set_name": "StackExchange" }
I've just spent the last eight days on a boat with Jim and Anna Abernethy, Captain Kurt, Chef Steve, and six British blokes representing Dive Magazine UK, the BBC, and various other fine British institutions (in fact, Jeremy may qualify as a "fine institution" by himself :). We left out of Palm Beach aboard the M/V Shear Water, the Abernethy's wonderful liveaboard, bound for the Bahamas (Little Bahama Bank) with over 500 lbs of crated fish to use as tasty morsels for attracting great hammerhead sharks and tiger sharks. Photographs have been separated into individual categories, and may be accessed by clicking on the links in the menu to the right, or by scrolling down a bit on this page. NEW! - See a mpg video of me shooting this image of a reef shark. Watch for my strobes firing at the end of the clip. Thanks to Jim Abernethy for shooting the clip and for e-mailing it to me. :) If you have something to say, please leave me a comment about this trip in my web journal. Visitors: Warning: date(): It is not safe to rely on the system's timezone settings. You are *required* to use the date.timezone setting or the date_default_timezone_set() function. In case you used any of those methods and you are still getting this warning, you most likely misspelled the timezone identifier. We selected the timezone 'UTC' for now, but please set date.timezone to select your timezone. in /home/ericc/public_html/scripts/txthit.php on line 76 313144 victims since 07.28.04 BAHAMAS SHARK TRIP, TABLE OF PHOTOGRAPHS great hammerheads reef sharks bulls and lemons night dolphins people portraits shark wrangling sunsets topside walker's cay artsy pics misc. photos anna's photos BAHAMAS SHARK TRIP, FEB 20: JEWFISH MOUNTAIN 23:21 - I finally have a moment to myself -- it's been a looong day! We awoke this morning docked in West End for customs and motored off once we had been cleared. By late morning we were anchored at Jewfish Mountain for a day of diving. Gliding around the site were 15-20 Caribbean reef sharks of varying size. Many were curious juveniles who were more than happy to buzz a dome port for a portrait. At around 65' there was a beautiful purple tube sponge surrounded by red and orange sponges, which was perfect for reef portraits of sharks. These were the sort of shots that Jeremy liked (the rest being "crap" :). He paid me a nice compliment by telling me, "normally I'm quite rude to photographers because I don't like their stuff, but I like yours; i like that you naturally shoot with interesting composition." I'm finding him to be an interesting guy. He's only taken two photographs so far. I guess he has enough of these sorts of shots, having authored three books on sharks. At one point I tugged on some fish that was sticking out of our bait box and ended up pulling out a rather large piece by accident. The sharks came *really* close at that point (as I kicked away from the fish, which I had dropped) and I was bumped multiple times as they investigated me and my white strobes. My strobes were given light bites a few times. I think I have my exposures down now. It's a great feeling knowing that I can likely get "the shot," should the moment present itself. Having said that, I utterly failed to shoot any presentable night dolphin shots this evening. We had some dolphin feeding on flying fish near the boat for a couple of hours, and a few of us jumped in to play with them. Geoff was in the water for a full hour in only a t-shirt and trunks! I should have pre-focused my camera, but instead relied on auto-focus assisted by a bright Hartenberger light to illuminate the way. I was able to get some good photos using this method last year, but this time the D60's notoriously poor autofocus mechanism failed to act fast enough, so I ended up with 40 blurry photos. :( Some of them looked like they could have been fantastic, had they been in focus. *sigh* I did get a blurry photo of what looks like a sea snake. I yelled, "snake!" when I saw it, but was told by those watching over me from the boat that it was an eel. Everyone changed their minds when they saw the photo. It's neat looking (although blurry). Also near was a school of a couple hundred small squid that kept appearing directly beneath the boat (coming up from the depths to about 15-20', repeatedly). I'm having a good time with the Brits and their Brit humor. Earlier, someone uttered the phrase, "you could see her tonsils through her rectum." You'd probably never hear an American string words together like that. :) I've retired to my bunk and am typing away here, listening to Vienna Teng before going to bed. It's impossible for me to do any "personal" work out in the galley because of various distractions. :) BAHAMAS SHARK TRIP, FEB 21: MOUNT MOKARRAN 12:21 - Hammerhead!! Two great hammerheads (and a beautiful frigate bird) are circling the boat here at Mount Mokarran. One is probably just over 10', and the other is said to be about the same size (I just spent 45 minutes with one of them and didn't see the other one). Anna did a fantastic job wrangling the shark onto the dive platform, which gave all of us opportunities to get some chomping shots. He (the shark) was completely unafraid, gliding between us at arm's length. 15:05 - When I splashed back into the water the second time, the hammerhead whipped around and swam towards me with great purpose. I took a few blurry photos of him while beating his head lightly with my camera; next time I will be prepared to take proper photographs while I avoid being investigated too closely. Anna said that he came at me three times. :) Down at the bottom there were bull sharks, reef sharks, and lemon sharks wandering around. Jimmy took some shots of a large pregnant lemon shark covered with remoras. I should have explored down there a bit more. One or two tiger sharks came in as well, but they weren't close enough to get photographs of. 22:49 - I was just browsing through some photographs I have here on my computer from the days just before I left on this trip; it seems strange that the people in those images are dressed in San Francisco attire, sitting in my place at a house concert. I sometimes think about how bipolar my life is and wish that I could just be settled/content sitting at home relaxing. Earlier today Brahms' c minor piano quartet lodged itself in my head, and memories of performing it with Livia, Barry, and Fred flashed by. I haven't touched my cello since December 26th. Every time I leave on one of these extended trips, I am away from the other things that make me happy (friends, playing music, etc.). But I suppose it is ok, because I shot some fantastic hammerhead pictures today. :) BAHAMAS SHARK TRIP, FEB 22: WALKER'S CAY 21:41 - As forecasted, the wind started blowing today. We drove around looking for calm seas for most of the day, eventually giving up and coming in to dock at Walker's Cay. Around the shark dive area bull sharks, lemon sharks, and nurse sharks swimming around close to shore. We're booked to swim with the bull sharks there at 8am tomorrow morning. The shark scientist Dr. Erich Ritter (the one who was recently bitten at the bull shark area) is here as well; he was giving a talk in a side room when we arrived. A few in our group have some shared history with Dr. Ritter and were interested in seeing the condition of his leg, but no one mustered up enough momentum to ask about it. We did, however, talk to the person who drove him away from the site to be evacuated. It is said that Dr. Ritter kept repeating, "it was my fault! it was my fault!" afterwards. We've just eaten a wonderful dinner and are now watching "Blue Water, White Death," a documentary with Ron and Valerie Taylor about early shark diving. BAHAMAS SHARK TRIP, FEB 23: WALKER-S CAY 16:24 - The wind is blowing 20-25 knots out of the northwest. We've been confined to the boat for most of the day, but a few of us did venture out for a blustery walk around the beautiful beach at the tip of the island. A small airplane left the smell of burning rubber while landing as we were walking back, and Dr. Erich Ritter came jogging down the runway -- in shorts. I'm amazed that he is able to jog with so much damage done to his leg! I won't describe it here, but I will say that he is lucky to be on his feet. 16:45 - The blokes are all outside trying to bait in a bull shark. John came inside a few minutes ago carrying a small, hollow, red tube. "Guess what was in this tube?" he asked. Yep. It was the handle to a mop pole. The rest of the pole -- with around $12K worth of camera gear attached -- had fallen off and was laying in the sand. Luckily, the water is shallow, and Captain Kurt managed to fish it out with a large hook. Boys will be boys, I suppose. :) Both Jimmy and John have been trying to get close-up footage of Bahama Mama (a large local bull shark) for awhile now. BAHAMAS SHARK TRIP, FEB 24: DODDSR 16:09 - We left this morning and are now anchored at a site lovingly referred to as "Drop Over Dead Dog Snapper Rock." There are a few Caribbean reef sharks circling around, and some distance from the anchor line is a grouper spawning aggregation (at a sandy patch in 110' of water). Many pregnant groupers are there, along with a large school of Bermuda chubs (also spawning). The school of chubs followed me while I swam around the sandy area, but the grouper were rather paranoid, and I was unable to get close to them. The wind is still blowing pretty hard, and the swell on the surface made it difficult to get back onto the boat. 21:56 - We're anchored at Lilly Bank now, in calm water for the night. In the morning we return to Mount Mokkaran, the site of our first hammerhead sighting. All of us are praying for a large tiger shark. :) BAHAMAS SHARK TRIP, FEB 25: MOUNT OLYMPUS 17:14 - Mount Mokarran was too rough this morning, so we ended up anchoring at Mount Olympus, a gorgeous reef, by Bahamian standards. It is covered with nice sea fans and colorful sponges, but unfortunately the visibility was poor (because of particles in the water and a deep thermocline) so we continued to El Dorado for the remainder of the afternoon. There are some really large reef sharks at El Dorado. Jimmy snapped the metal ball off of Anna's Sea & Sea strobe arm mount during the first dive. Things like mounting balls really should be indestructible! I don't think my ULCS balls would have been that easy to break off. Anyway, we tried using the Pasco Fix magic glue that the Austrian guy at the Miami Boat Show sold us, and the glued-on ball stayed in place for most of the second dive, but broke again when Anna was adjusting her strobe position. We're going to glue it again tonight and let it cure all night. BAHAMAS SHARK TRIP, FEB 26: MOUNT MOKARRAN 22:05 - Two great hammerheads came in today, but neither of them were "players". A small 7' one swam circles around Jeremy and only came up for bait a few times before disappearing off into the murk. A larger 11-12' one (with disfigured pectoral fins, Jeremy says. he even drew an illustration for us.) was off further in the distance, circling the boat. Its dorsal fin was enormous! Jim and Anna have seen great hammerheads as long as 18', but this 11-12' specimen was the largest one I have ever seen. I followed it, drifting with the current until I was further from the boat than I wanted to be. Even though I knew I wasn't in any real danger, I had to suppress the slight panic that was welling up within me. (Imagine: the visibility is around 90' or so, but it's a milky view all around. You look up and scan the brightness above for the tell-tale shadow of the boat, and it is nowhere to be seen. A large hammerhead is circling just out of sight... :) Although I don't get "lost" that often, it's always like that for me during the moment I realize that I have no idea where the boat is. At the bottom 90' below, four bull sharks (two large and two small), a few reef sharks, and two lemon sharks (one of them was 8-9' long!) patrolled, but they didn't seem to be as friendly as the sharks we've seen elsewhere. I was unable to get close enough to any of them to take a decent photo. I did, however, take a nice photo of the bow of the Shear Water from beneath the water, with thin ribbons of perfect light streaming downward from around it. We're anchored here for the night. Jimmy says that there are often tiger sharks pacing around in the early morning after a night with bait left out. "I just hope that if one comes by it isn't big enough to try to eat the crate itself," he said. I'm planning on going in with him first thing in the morning. Hope there's something fun out there. :) I had another "what the HELL am I doing with my life!?" moment this evening while I was sitting at dinner between two conversations. I have no idea how I'm going to figure it out. Part of me just wants to settle down with a "normal" job. There's tremendous security in that, and as a bonus I would be able to develop my local friendships in a way that would alleviate some of the frustration I've been feeling lately. Argh. BAHAMAS SHARK TRIP, FEB 27: MOUNT MOKARRAN 22:41 - The Coast Guard just stopped our boat to see if we were smuggling drugs. As they came close enough to see us, one of the shouted, "Is that Mr. Abernethy?" It helps to be known. :) Today was a fantastic day of hanging out with sharks. Jimmy never woke me up in the morning; instead, I was shaken into consciousness by an increased swell that repeatedly threw the bow of the boat up and down. I spent most of the morning hanging out in the galley, waiting for an interesting shark to appear. By 11am, we had two hammerheads and a tiger on the bottom, investigating two crates of fish that had fallen off of the bait line. Unfortunately (for the rest of us), only Derek was in the water at that time, but one of the hammerheads turned out to be a player and circled around us until the sun went down. It was around 10' long. A smaller tiger shark was also in the water with us for much of the day, but it was extremely skittish and was chased away by the hammerhead whenever it came close to us. I saw it a few times off in the distance, but it never ventured close enough for me to get a photo. Several large bull sharks were at the bottom, along with a couple of nice looking lemon sharks (which carry a permanent, sinister smile on their faces). By the end of the day, they were getting close enough to us for photographs. It is apparently a great thing to get bull shark photos with relatively clear water. I've heard that they can be nasty, but haven't had any experience with them before this trip. At Walker's Cay, it is easy to get close to bull sharks, but the visibility there isn't as good unless you are lucky enough to have the opportunity to go in without hordes of other people. Simon seems to attract hammerheads when he returns to the boat from the water. A few times now Anna has wrangled in hammerheads literally to the swim step while Simon was trying to get onto it. When it happened today, he looked up from the water and yelled, "Stop your damn wrangling, woman!" :) The good barrister Derek wrangled for awhile today. I imagined him wearing a wig. He has 11 weeks of vacation a year, and he takes every day of it. Europeans REALLY know how to balance work and play properly! Everyone almost literally jumped out of the water back onto the boat when five or six bull sharks came charging up from 80' to greet them at the surface. Not long after Jimmy dumped in an old, useless crate of fish, one of them came straight at me as well. I took a picture and kept my camera between me and it. :) Another interesting event: a hammerhead stole one of our 69-cent styrofoam floats; it bit straight through the rope (eating the bait), and the float ball drifted off the stern in the current. At Anna's urging, Jimmy promptly donned fins & mask and dove in to retrieve it. The same gang of bulls who had earlier expressed interest in the others on the surface immediately charged up again to investigate. After all, the light-colored things in the water previously were fish carcasses. :) Jimmy thrashed around in circles, coming up a few times to yell, "Shit!" Jeremy happened to be coming back to the boat at that time (we promptly sent him back out to help), but a few moments later, Jimmy stuck his head up out of the water and yelled, "I need a camera!". Typical. :) Jeremy told us that he was thinking, "who's the idiot snorkeling with the bull sharks?" At Walker's Cay there is a strict rule that you must be totally encased in black to get in with the bulls. Erich Ritter was bare-legged when he was bitten there.
{ "pile_set_name": "Pile-CC" }
Economical and green biodiesel production process using river snail shells-derived heterogeneous catalyst and co-solvent method. River snail shells-derived CaO was used as a heterogeneous catalyst to synthesize biodiesel via transesterification of palm oil with methanol. The shell materials were calcined in air at 600-1000°C for 3h. Physicochemical properties of the resulting catalysts were characterized by TGA-DTG, XRD, SEM, BET, XRF, FT-IR and TPD. CaO catalyzed transesterification mechanism of palm oil into biodiesel was verified. The effects of adding a co-solvent on kinetic of the reaction and %FAME yield were investigated. %FAME yield of 98.5%±1.5 was achieved under the optimal conditions of catalyst/oil ratio of 5wt.%; methanol/oil molar ratio of 12:1; reaction temperature of 65°C; 10%v/v of THF in methanol and reaction time of 90min. The results ascertained that river snail shells is a novel raw material for preparation of CaO catalyst and the co-solvent method successfully decreases the reaction time and biodiesel production cost.
{ "pile_set_name": "PubMed Abstracts" }
Effect of clonidine early in life on brain morphofunctional deficits induced by neonatal malnutrition in the rat. A great body of evidence indicates that malnutrition early in life induces central noradrenergic hyperactivity (CNH). On the other hand, it is known that noradrenaline (NA) is an important regulator of the regressive processes occurring during synaptogenesis such as cell death, axonal pruning and synaptic elimination. This leads to the hypothesis that some of the morphofunctional modifications induced by malnutrition on the brain could be due, at least in part, to an increase of NA activity during the period of accelerated brain growth. This study evaluates whether early reduction of CNH by the alpha-2 presynaptic adrenoreceptor agonist clonidine, prevents long-term morphofunctional deficits induced by protein-energy malnutrition in the rat. Results of experiments performed on 45 day-old malnourished animals that received clonidine during the suckling period, show that the pharmacological treatment prevented: (i) deficits in both NA levels and NA release in the visual cortex; (ii) deficit in brain weight but not in body weight; and (iii) reduction of the normal brain interhemispheric asymmetry of visual cortical evoked potentials. It is suggested that administration of clonidine early in life prevents brain morphofunctional deficits by malnutrition, by restoring the normal tropic role of NA during synaptogenesis.
{ "pile_set_name": "PubMed Abstracts" }
#!/bin/bash if [ -z "$1" ]; then echo "This script must be called with an argument" >&2 exit 1 fi /usr/local/bin/mine $(script/find_spec_or_impl.rb $1)
{ "pile_set_name": "Github" }
Noida grows, but poor infrastructure, closure of industries haunt Noida, April 17 (IANS) Despite being a virtual extension of India’s national capital, this industrial hub, software centre and leisure destination still laments over poor power supply and roads, making the hunger for such essentials as well as the closure of industries major election planks. Close to 10,000 industrial units dot this city, technically in Uttar Pradesh but bordering New Delhi. Just a fourth of them function. Rising crime and poor infrastructure have only fanned the angst of the 250,000-strong electorate. “The government in power has only traded stones and erected statues,” said Samajwadi Party contestant Narendra Bhati, seeking to blame both the central and the Bahujan Samaj Party (BSP) government of Chief Minister Mayawati for the lack of development. “Little has been done to look after the development of the state as a whole and this city in general,” Bhati told IANS, promising to bring change if elected. For Noida Entrepreneurs Association president Rakesh Katyal, jobs, or the lack of them, was a major issue, as only 2,700 industrial units were functioning out of 9,700 that had set up shop here. “The financial slowdown has eaten up small and medium industries and the rest are hit by high value-added tax. But the government does not appear to be concerned.” Then there is mafia - and crime. “The city is transforming from an industrial hub to a crime hub,” Aditya Ghildyal, general secretary of the Association of Greater Noida Industries, told IANS. It was here that the infamous serial killings of children took place and gory tales of cannibalism hit global headlines. And it was again here that the chief executive of a multinational firm was lynched in broad daylight. “Industrialists and we residents are scared to step out of our houses in the night. Why talk about night, there are incidents taking place in broad daylight,” said Ghildyal. The suburban city which was earlier part of a reserved constituency, Khurja, has become Gautam Buddh Nagar constituency after delimitation. Home to nearly 400,000 people, this booming city has seen for almost four decades migration of people from all parts of the country, both for job and for a home of their own. Noida has become a major residential hub as people took up apartments in the suburb’s high rises, strewn across the city, at most competitive prices, little knowing that they would have to later regret their decision. Little wonder then that Satya Verma, an employee of information technology major Hindustan Computers Ltd, who was once elated getting a job in Noida, now regrets his decision. “Development is restricted to some areas. Water is dirty. Electricity supply is poor. There are potholes everywhere. Theft and burglaries are routine,” he said. “It is hard to believe that there are so many software companies here - many of them catering to Fortune 500 companies,” he added, a view shared by Sunit Rai, a public relations executive who lives in Sector 62. “Why blame politicians alone? It seems people are also comfortable with big shopping malls mushrooming in the city. They do not really seem to care about basic needs like infrastructure,” Rai said. The suburban city boasts of international-style shopping malls highlighting the glaring differences in the two parallel ecosystems that runs in the city. The Great India Noida Place - a one kilometre long mall - and other shopping marts like Centre Stage Mall, Spice and many more are some of the examples of its glamorous side. Then there is the Atta market, a shoppers paradise for the middle-class, which houses almost everything a household would need at very competitive prices. The Bharatiya Janata Party’s (BJP) Ashok Kumar Pradhan won the 2004 polls from Khurja with an impressive margin of 41,350 votes. He is contesting this time from Bulandshahr and Mahesh Sharma, owner of the well-known Kailash Hospitals and a doctor himself, is the BJP candidate from Noida. “We want maximum number of people to come out and vote no matter whoever they vote for,” BJP vice-president Chiranjeev Mahajan said. “What this city needs is an educated leader who would understand policies and not any someone who would only grow richer with the nation’s money.” The Congress got only 18.16 percent of the votes in 2004. This time, it has fielded Ramesh Chand Tomar, who was in the BJP for years and switched to the Congress recently. The BSP too has a new candidate this year - Surendra Nagar, who has huge resources at his disposal being the owner of Paras Milk, a Rs. 600-crore dairy business.
{ "pile_set_name": "Pile-CC" }
Q: global/inner variable conflict? (python) Sorry for the stupid question, I'm a newbie programmer. But can anyone tell me why the following program behaves this way? def lol(a): a=[] a.append(1) return a Now when I do k = [2, 3] lol(k) It returns 1, but k is still unchanged? Why? Thanks a lot! A: In lol(a), the line a=[] binds a to a new list. After this line, a is no longer bounded to the same list than k. So what you're actually modifying in your function is a new list, not the list that you received in argument. For further information, see the docs. If you want k to be [1], then you could write something like this instead: def lol(a): a[:] = [1] return a k = [2, 3] lol(k) # now k is equal to [1]
{ "pile_set_name": "StackExchange" }
Radio Crowd besieges Danish Tehran embassy A crowd of over 1,000 people tonight attempted to storm the Danish embassy in Tehran, which sits behind a high wall in the north of the city. After they rammed the metal gate to the compound, police drove them back with teargas and arrested some. Firefighters were seen trying to put out a fire inside, apparently caused by a firebomb. Earlier, hundreds of demonstrators pelted the Austrian embassy compound with petrol bombs and rocks late, as protests over cartoons portraying the Prophet Mohammed spread across the Muslim world. Denmark had previously asked the Iranian authorities to increase security at the embassy, following weekend attacks on its embassy in Damascus and its consulate in Beirut, which were both burned by angry demonstrators. Iran's commerce minister announced today, however, that all trade with Denmark had been suspended. Anger at the cartoons rose across east Africa: at least one person was killed in a protest in Somalia and Djibouti banned the import of Danish products. In Kenya, the country's main Islamic group announced plans for a mass protest against Denmark. Qatar's Chamber of Commerce said it had halted dealings with Danish and Norwegian delegations, urging Muslim states to do the same. In Bahrain, parliament formed a committee to contact Arab and Islamic governments to enforce the boycott. In Strasbourg, the Council of Europe described as 'unacceptable' the violence of the past few days. Freedom of opinion and expression is protected by European human rights law, 'even in cases when the views expressed were offensive,' said Secretary General Terry Davis. Denmark told its nationals to avoid Muslim countries even as it pursued diplomatic efforts to defuse tension over the publication of the cartoons. The foreign ministry warning lists 14 Muslim countries travellers should avoid following violent protests against the cartoons, which first appeared in a Danish daily. Earlier today, there were demonstrations and riots across muslim Asia against the cartoons Authorities in Afghanistan say three people have been killed during clashes between police and protestors. Two were killed in gunfire from among protestors at the main gates of Bagram Airbase, 60km north of the capital Kabul. A crowd of about 5,000 people had gathered to protest outside the US-led coalition's Bagram headquarters. Five protestors and eight police officers were wounded in the incident. And in the eastern province of Lakhman, a third protestor died after being shot during a demonstration. In Somalia, a 14-year-old boy was shot dead and several others were injured after crowds attacked police. There have also been demonstrations in Indonesia, India, Gaza, Thailand and New Zealand. The cartoons were first published in a Danish newspaper in September and have since been reprinted in several publications, most of them European. UK police have govt support The British government has said the behaviour of some Muslim demonstrators outside the Danish Embassy in London in recent days was completely unacceptable. A Downing Street statement added that the police would have the government's full support in any actions they wished to take as a result of the protests. Police have been criticised for failing to arrest some of the London demonstrators, as they carried signs threatening to kill those who published the cartoons of the Prophet Mohammed. Earlier, some of Lebanon's political leaders accused Syria of being behind the attack on the Danish embassy in Beirut yesterday. The mission was ransacked and burnt during the violent protests. The attack on the embassy has resulted in the resignation of Lebanon's Interior Minister, Hassan Sabeh.
{ "pile_set_name": "Pile-CC" }
Quelques jours avant Noël, l’Etat a décidé que notre journal ne bénéficierait pas du fonds stratégique pour le développement de la presse pour l’année 2014. Cette aide, qui avait atteint l’année précédente le montant faramineux de… 18 611 euros, entend favoriser le rayonnement des publications françaises à l’international. Un tel objet semblait pourtant taillé sur mesure pour Le Monde diplomatique, qui réalise près d’un cinquième de ses ventes à l’étranger et diffuse à travers le monde quarante-sept éditions en vingt-huit langues. Il faut croire que le ministère de la culture et de la communication couvre notre journal d’une tendresse particulière. En 2012, Le Monde diplomatique trônait à la 178e position des deux cents titres les plus aidés. Loin derrière Télécâble Sat Hebdo (27e), Closer (91e) ou Le Journal de Mickey (93e), alors que les aides à la presse prétendent encourager la « libre communication des pensées et des opinions » et « éclairer le citoyen ». En 2013, nous avons disparu de la liste, tandis (...)
{ "pile_set_name": "OpenWebText2" }
FBI director: Cover up your webcam - grej http://thehill.com/policy/national-security/295933-fbi-director-cover-up-your-webcam ====== 6t6t6t6 From all they ways I can be spied, the webcam is the one that concerns me the least. At the end, all they will see is a bearded man staring to the front. May they be able to see me naked? Well, probably, but I honestly don't think that they will make a lot of money by selling my naked pictures... My wife tells me that I still look good, but I suspect that she is being nice to me. What would scare more is that they manage to capture what is on my screen, or install a keylogger, or activate the microphones to hear my conversations, or that they access my hard disks and steal data, including my private keys. Hey, but putting a sticker on your webcam is a way to show how 1337 your are! I prefer not to have to bother removing stickers every time I want to do a Skype call. ~~~ matt_wulfeck You're displaying a common trope I see sometimes with security: > "because this particular thing does affect me personally, it doesn't matter. > And because it doesn't matter to me it doesn't matter at all" Blackmailing people with pictures taken from webcams is not theoretical. It happens[0] and it's good advice to tape up your cam. It may not affect you personally, but it may affect your wife, daughter, or sister in a much more sinister way. Believe it or not this kind of thing can ruin someone's life. [0] [http://www.computerweekly.com/news/2240209018/US-teen- hacker...](http://www.computerweekly.com/news/2240209018/US-teen-hacker- pleads-guilty-to-webcam-blackmail) ~~~ iceman99 I know someone whose camera and microphone were taken over. A window showed on her computer where the person watching her chatted with her and told her things that he only knew because he was watching her. It scared her to death and made her cry. Beyond blackmail, it is probably close to the psychological equivalent of a stranger just suddenly appearing in your home watching you. I think that every electronic camera and mic device should have a hard switch/button that physically disables both the camera and mic. Having to use tape or a cover does not keep you from being spied on; it only eliminates the visual spying. The attacker can still listen. ~~~ zyngaro Smartphones represent a bigger security risk in that regard. Front facing rear facing, mic all ones personal data, pictures and so on. ~~~ JohnStrange Hardly. You put your phone on the desk and it's going to show the ceiling. In contrast to this, people do all kinds of weird things in front of laptops. I've even heard once of someone who allegedly masturbated (!) in front of a laptop. Of course, that must have been an extreme outlier ... ------ janvidar Isn't this really just a sign of flawed hardware design? In my opinion hardware should be designed so that the camera LED lamp should always be lit if the camera is used. If there is a malfunction with the LED, then the camera should also not work. Also there should be a hardware LED for when the microphone is being used which should work in the same fashion for laptops with built-in microphones. In the webcam drivers I have looked at the LED is controlled independently of capturing, although drivers do enable the LED when the camera is used. This essentially means that hackers can record and disable the lamp. I've been considering hacking together some piece of software that will continuously use the camera (/dev/video) in order to block it for other applications, and have it fail with visible alerts if unable to block the camera. Not sure if the same thing can be achieved for the audio recording devices due to multiplexing. ~~~ awesomerobot >If there is a malfunction with the LED, then the camera should also not work. Many would argue that this is the more flawed design. ~~~ Kadin It seems like a "fail safe" to me. The current design is a bit closer to a "fail deadly" in that it creates a mode that's the worst-case from the user's perspective: the camera works but the indicator doesn't. It is probably worse to have an unreliable indicator light than it is to not have any indicator light at all. ------ _Codemonkeyism "The head of the FBI on Wednesday defended putting a piece of tape over his personal laptop's webcam, claiming the security step was a common sense one that most should take." One needs to ask why is the head of the FBI telling you this? Cui bono? This is a red herring. The FBI has no interest in filming you through your webcam. They want to listen to your microphone, watch your screen, get the keys you've typed, see the websites you've visited, read the emails you've sent. Watch you on video? Nah. This is a red herring. That is the reason the head of the FBI tells you to cover your webcam. I wish the The Last Psychiatrist would come back. ~~~ tingol The FBI isn't telling you this so you could protect yourself from the government. They are telling you this because they know how easy it is for someone else to take control of the camera and make your life hard. So it is a common sense step for you to take if you're concerbed about security. You took a pretty huge jump from that to the FBI listening to your mic. ------ ipsin If you're so concerned about having your webcam subverted, it seems like the first step would be to insist on a hardware LED that can't be subverted in firmware. If nothing else, it would serve as a canary, indicating that your machine has been thoroughly compromised. ~~~ gkoberger And who do we trust to do that? More importantly, is it even possible? ~~~ krastanov In terms of electronics it is fairly trivial and it can be inspected by eye (or microscope) if the manufacturer decides to not encapsulate everything on a chip (which presumably would be the point of such a feature). Just have the only positive voltage rail going to the camera be the same one that is directly powering the LED. The firmware will be turning this rail on and off, hence turning the camera and the LED on and off simultaneously. ~~~ 1_2__3 Idle though on possible attack vectors: Convince the firmware to use a lower voltage, one that doesn't hit the breakover voltage on the LED but still powers the camera. Strobe the line, get snapshots without the LED doing more than very faintly glowing. ~~~ umanwizard LED activation voltage is less than what cameras typically require. ------ white-flame I said it then, and I say it now: \- Encryption is our webcam tape. That tape cannot be thwarted by any remote attacker, legally warranted or not. It's perfect, unbreakable security from webcam visuals being exfiltrated, exactly the security features that Comey says we shouldn't be allowed to have for our data. ~~~ pdkl95 "What if everyone believed that law-abiding citizens should use postcards for their mail? If a nonconformist tried to assert his privacy by using an envelope for his mail, it would draw suspicion. Perhaps the authorities would open his mail to see what he's hiding. Fortunately, we don't live in that kind of world, because everyone protects most of their mail with envelopes. So no one draws suspicion by asserting their privacy with an envelope. There's safety in numbers. Analogously, it would be nice if everyone routinely used encryption for all their email, innocent or not, so that no one drew suspicion by asserting their email privacy with encryption. Think of it as a form of solidarity." ~ Philip Zimmermann, "Why I wrote PGP" [https://www.philzimmermann.com/EN/essays/WhyIWrotePGP.html](https://www.philzimmermann.com/EN/essays/WhyIWrotePGP.html) ~~~ drvdevd A brilliant point and a salient quote. Why must we continue to live, collectively, with our heads in the sand? ------ meowface I know this thread will probably get politicized, but I see nothing wrong (or necessarily hypocritical; he's law enforcement, not IC) with his advice here. ~~~ waterphone It's not a bad thing to do, it's just hypocritical of him to value his own privacy but tell everyone else they need to give up theirs and let the FBI and NSA have access to everything they want to keep private. ~~~ nathancahill Why would you be concerned about the FBI or the NSA knowing about the content of your digital communiques if you have nothing to hide? Even the most ardent supporter of personal freedoms will admit that the government observing you over a network is the same as taking pictures of you with a telephoto lens on a busy street. The truth is the same: there are too many people and you aren't special enough to deserve personal surveillance. ~~~ anexprogrammer > there are too many people Oh _please._ They can probably harvest the lot. It'll be some algorithm that deems you worthy or otherwise or gets you on an "of interest" list. Let's keep "personal surveillance" for '50s spy movies and Banksy murals. More generally, what about the chilling effect on legal and legitimate conversation? ~~~ jeremysmyth _It 'll be some algorithm that deems you worthy or otherwise or gets you on an "of interest" list._ ...or your association with "Occupy" or some other political protest movement that someone in power disagrees with, or that your wife bullied some politician's wife for two weeks in school, or that your interfering neighbour with a petty dislike of how you landscape your garden works as a government clerk and can access your data. There are many reasons why some individual might want to know private things about some other individual. When individuals with some tiny (or vast) power want to wield it over _anyone else_ , especially when they can do it with little oversight, it's very tempting. That "the government" has access to my private information does not mean it's blind and faceless. It's made up of people with complex motivations. ------ sotojuan The webcam cover up is interesting to me because it's the only "weird privacy thing" I've seen regular, non-technical people do. A good amount of people at my university, most of which use social media liberally and don't care about encryption, cover their camera up. ~~~ pseudonymcoward This is only idle speculation but: A web cam resembles an eye staring at you all the time. This makes people feel weird, like something is staring at them. The threat to privacy is right in their face and on a gut level. That's the reason so many people cover them even when they won't take other basic online privacy precautions. ~~~ Sylos Also just in general, people understand what a camera does. It's much harder to understand the implications of abstract "data" going off onto the internet. ------ rdtsc This is like the coal burning power plant telling you to make sure to sort your recyclables into appropriate containers, to make the environment cleaner. Also people enjoy and feel good about accomplishing small things. Putting a sticker on your laptop is a small easy task. Do it and they feel more "secure" in an instant. ------ benevol Every electronic communication device (laptop, mobile, tablet, etc) should have _1 hardware switch per sensor_ (camera, mic, motion/acceleration, etc) which disables the sensor. Why manufacturers still haven't introduced this is beyond me. ~~~ pwg >Why manufacturers still haven't introduced this is beyond me. Expense and lack of demand. Some older laptops used to feature hardware kill switches for the wifi (this was prior to the advent of a camera in every laptop). The old Dell D820 model was one such laptop. Eventually they were dropped all around because from the makers point of view, the presence of the switch had no effect on the sales of the laptops. Anything you add to the BOM (Bill of Materials) for the device raises the final net cost, and there is still enough competition in the laptop/phone space that keeping the costs down is necessary to compete. Additionally, twenty-five cents per unit does not sound like much, until of course you multiply that by 10+ million units built (where a twenty-five cents difference per unit amounts to $2.5+ million difference in the end). So if having the switch or not having the switch made no difference in sales, the maker could either raise their profit, or lower their price (or more likely split the difference) by dropping the switches. The lack of demand is that not enough purchasers are telling manufacturers they want hardware on/off switches (the purchasers do this by buying only laptops with them, and by not buying laptops without them [which may be difficult to bootstrap now, given that almost no laptop has a hardware on/off switch anymore]). ~~~ jcadam I've found many of those supposedly 'hardware' wifi kill switches were software controlled (When I installed Linux on an old Dell, it completely ignored the state of the wifi switch). I want a switch that physically cuts power to a device, but no... :( ------ Hilyin I guess this is just as good place as any to bring this up. In current OS X, you cannot disable your mic. You can turn down the input volume, but never disable. All malware needs to do is raise the input volume and it can listen to you to its hearts content. And its worse with your iPhone. ~~~ the_common_man Can someone confirm if this is actually true? Sounds too far fetched that you cannot disable the mic (i.e not muting, I assume?). ~~~ Hilyin Just look around on the internet, you'll find the same thing. I researched this a few weeks ago and was amazed. You basically have to disable the audio driver in OSX to disable it, and doing that, means you can't play audio at all. And even that isn't enough, it technically can be hijacked at an even lower level. ------ ssebastianj I was looking for a way to cover the mics and webcam integrated in my laptop which doesn't require a tape. So, I grabbed a couple of those magnets stripes usually found on fridges and then , using a scissor, made two little rectangular stripes and a larger one. Next, I glued the little stripes on the laptop, near close the mics. The nice thing is that the large stripe covers both, the mics and webcam. For me, it's an easy way to cover/uncover fast. ------ boxkite I keep mine covered because I work remotely a lot and I don't want to accidentally shirtless video chat someone from bed when I meant to make a different type of call. ~~~ 3chelon It was unusually hot and I actually did that myself just the other day - embarrassing! ------ conradev I use a MacBook Pro as my daily driver, but I recently purchased a Lenovo ThinkPad to play around with. Sometimes I forget how awesome it is to have a repairable and modular computer. I didn't want the webcam or microphone in the ThinkPad… so I took 30 minutes and removed it. Easy as that. ~~~ csydas Well,to be fair you could just open the MacBook Pro and unplug the ribbon for the webcam. iFixit will have instructions. Removing it entirely granted is another matter, involving opening the screen, but you'd have to do the same on any modern laptop with an integrated camera wouldn't you? ~~~ wruza For my mac I just used a knife to open screen and shoved black paper strip before camera. ------ greglindahl I experimented a bit with an Apple laptop microphone, and it took 2 layers of electrical tape to block the mic. There doesn't appear to be any way to block an iPhone mic without blocking the speaker, too, and I'm not confident that it could be blocked at all. ------ mpetrovich But what about his computer's built-in mic? Unless he's pantomiming all sensitive info... ------ neom It's pretty sad that he used the word "authority" in this sentence: You do that so that people who don’t have authority don’t look at you. I think that’s a good thing.” ------ throwaway13337 It's relatively common to have access to private security cameras. Some are even google indexed. The software included relies on the users protect the web interface. Obviously, this is the vulnerability. Especially with things like default passwords. Here's an article about it: [http://www.networkworld.com/article/2844283/microsoft- subnet...](http://www.networkworld.com/article/2844283/microsoft- subnet/peeping-into-73-000-unsecured-security-cameras-thanks-to-default- passwords.html) A lot of these cameras are controllable and have speakers. People now do live video streams of pranking people through this means. Pictures: [http://imgur.com/a/0WImd](http://imgur.com/a/0WImd) ------ skybrian Back in the day, SGI workstations had a hardware shutter. I still think it's a good idea. ------ 24gttghh My Asus 1015PEM netbook from 6 years ago has a physical screen that slides over the camera; sliding the screen also turns on the camera. Why don't more laptops have this feature if this is such a 'big deal'? ------ throw2016 The hacker news readership is focussed on startups and technology. It's a career, a business and in some cases an interest in technology. So privacy as a social good may not be the primary perspective and it often devolves into how this affects readers personally rather than the society they live in or side tracks into technology nuances. Technology is enabling new negative possibilities but it does not follow that technologists can make a difference. There is no ethical code of conduct. Like everyone else they are another cog in the wheel and software engineers may not have an interest or priority on privacy, social and political issues. There are a large number of folks working in the nsa, gchq, google, facebook, palantir, hardware vendors and elsewhere actively enabling this. Like technology itself politics, liberty, privacy and the evolution of modern system from the time of feudalism requires interest and priority. From this perspective the need to tape up your webcam may have completely different ramnifications. ------ xcasperx I agree with what most people are saying on here, but I believe there's a bigger picture to it. Let's say that your computer has been completely 'pwned', and that you are currently reading an article with an ad for Cow Porn, or whatever, on the right hand hand side of the site. The hacker can write some code to check what your eyes, and eyebrows, did when you looked at the ad. If it peaked your interest, the hacker can maliciously add more 'Cow Porn' ads to sites you visit - via swapping out the regular ones. Now one day you get curious and click on it, and boom they take a screen shot and try to blackmail you. This is obviously quite outlandish but think about purposefully planting posts, lets say on reddit, by switching out posts. They then look at your head movements, and, or, eye movements then boom, you're added to some list that you wouldn't have be added to if it weren't for your eye movements. ------ dingo_bat I have never covered my Webcam because I trust the light to come on if the camera turns on. Is it possible to bypass that led? ~~~ Steuard In addition to the attacks that others have mentioned here, I've also heard folks comment previously on the possibility of turning on the camera very briefly, just long enough for a single still shot. If it was done fast enough, the brief flicker of the LED might not be noticeable. (Like you, I had always assumed that the power for the webcam was literally in series with the LED, so that disabling the LED would render the camera inoperable. That seemed like the obvious way to do it if you wanted to provide a truly reliable signal. But evidently that's not the case.) ~~~ abraae Perhaps you mean in parallel. An LED is driven by 20 mA, whereas a camera requires more like 200 mA, so it's not feasible to wire them in series - either the LED will burn out or the camera won't power up. ~~~ Steuard Yeah, I was pretty sure I was being a little sloppy by using the term "series" (for shame, physics prof, for shame!), but I was hoping to evoke the general sense of "if current doesn't flow through the LED for any reason, the camera can't turn on." Honestly, I'm not 100% certain offhand of a way to wire that (which is why I didn't want to be specific earlier, despite using a specific term: shoulda added some weasel words :) ). Do the LED and the camera run off of the same _voltage_? (If not, then parallel wiring won't work, either.) ------ pjc50 Previously: [http://www.independent.co.uk/life-style/gadgets-and- tech/yah...](http://www.independent.co.uk/life-style/gadgets-and-tech/yahoo- webcam-users-intimate-images-intercepted-by-gchq-spy-programme-snowden-files- reveal-9158140.html) ------ eosrei What about the cameras in your phone and the microphones in everything? Security theater isn't security. ------ krinchan I'm about to die laughing at the hoops people are jumping through in the comments to claim they've never pulled up some porn and enjoyed themselves in front of their laptop. Ever. _EVER_ ------ laurent123456 This article describes how to turn off the led light on Windows, which is surprisingly easy: [http://blog.erratasec.com/2013/12/how-to-disable-webcam- ligh...](http://blog.erratasec.com/2013/12/how-to-disable-webcam-light-on- windows.html) TLDR: Webcams follow the UVC standard and, according to this standard, the LED indicator light is controlled by the host software. So a simple hack is to find the webcam driver DLL, find the function that controls the LED (such as TurnOnOffLED()), make it return immediately, done. ------ tedmiston Does anyone feel the need to cover their iPhone front facing camera? ~~~ e1ven Yes. I cover both the cameras on my phone with tape, and only remove it when I want to take a picture. That said, I have a lot more faith in the security of a whitelist-based model like the App store, versus the blacklist model of a PC with antivirus. ------ foobarcrunch Unless you're using Prey[0] and want an opportunity to photograph would-be crooks. [0] [https://preyproject.com](https://preyproject.com) ------ markyc in this day and age how come we don't see laptops carry a physical on/off switch for the microphone and camera? ~~~ Shanea93 This is the day and age of removing headphone jacks to make a phone slimmer, taking away your disk drive, etc. Most companies care more about aesthetics than functionality at this point. ~~~ ojii can I have a laptop without a webcam/integrated mic then? ~~~ soylentcola How courageous of you! ------ awesomerobot Also remove your microphone and don't use a keyboard? If I were hacking you I'd _much_ rather log your keystrokes or hear what you're saying. The number of scenarios where having a visual would be useful would be incredibly low by comparison. Putting a sticker over your webcam is like putting a lock on a screen door. ~~~ maxerickson Most screen doors I can think of do have locks. Even quite home made ones often end up with a hook that kids can't reach. ~~~ awesomerobot That's my point. It does one thing, but it's by no means security. ------ piedradura I prefer to have a computer composed by parts, so I attach the webcam to the computer when I need to, same thing for the audio and many other applications. I only need 1k of ram to send a secret message, so no virus or malware could be in my tiny computer. ------ zelos Didn't all Sun webcams used to have little irises that you could close on them? It seems like a sensible precaution: makes it less likely I'll accidentally log into a company conference call in my dressing gown with my camera enabled. ------ whitenoice Just saw the prescreening of snowden movie with online live event with movie cast and snowden post movie, and this was exactly what was depicted in the movie and in the event talk. ------ andrewflnr So the guy who decries "going dark" when it comes to encryption wants us to literally go dark with our webcams. It's like a dystopian comedy setup. ------ JustUhThought At some of my house parties I require guests to check their phone at the door. Price of admission. (I keep a landline and am ok with giving that number out as an emergency contact number). Boy does this get the conversation started. I can tape my phn camera, but what about the other 20 phns in the room? I have no control over them to keep them from posting photos of me drinking or whatnot during a party, photos I do not want online. From the tin-hat perspective one must do (much) better than consider their personal devices. One must consider _all_ devices in their _personal proximity_. ~~~ GarrisonPrime It'd be amusing to have a little Faraday cage by the door for them to deposit into. :) ------ demonshreder Aren't these attacks primarily for Windows? Would using Linux (say Arch) mitigate these? Edit: Shouldn't we be more concerned about phones and tabs? ~~~ facepalm Nice attempt at humor :-) ------ codethief In case anyone's looking for something a little bit more sophisticated than a sticker to put on his/her webcam: [https://soomz.io/detail/webcam_covers_a10](https://soomz.io/detail/webcam_covers_a10) Been using it for a while and it works like a charm. (Though on a phone it does tend to attract a bit of dirt and the color wears off over time. If you keep your phone in the pocket of your pants, that is.) ------ chrischen Quick question for HNers: why isn't something like the camera insicator light implemented for the microphone? ------ SG- Anyone know what kind of laptop he uses? ------ wickedlogic Please cover your webcam, it is distracting while we are trying to listen to what you are clicking on. ------ listentojohan What I don't understand is why he has to defend it? (Yes, it might seem hypocritical.) ------ bobsoap Instead of a sticker, one could also use this clever, simple, magnetic gadget (not affiliated): [https://www.kickstarter.com/projects/1893116150/nope-20-live...](https://www.kickstarter.com/projects/1893116150/nope-20-live- free) ~~~ bobsoap Seriously, downvoted without an explanation? That's quite poor. If something about my post offends anyone, I'd love to know about it. ------ mangeletti I swear this is a true story: I worked at Staples when I was 19, and when I first started I was a "front end lead" (read: the only full-time cashier), so I would work behind the service counter at the front. Once, I was standing up front while there were no customers when all of the sudden the voice of the general manager (we'll call him Bill) popped onto the phone's speaker, "Hey, Michael". I looked up and noticed the light next to "Manager's Office" was on. I instinctively replied, "Hey, Bill; what's up?", despite the fact that it nearly gave me a heart attack. Bill proceeded to tell me to run something he needed to the back, which I did, and that was the end of that. Then, one day I was helping a customer with some Cross pens behind the counter. I stood up to grab a key that was next to the register when I noticed out of the corner of my eye that the phone's "Manager's Office" intercom light was on. It made my heart jump because I hadn't talk to anybody through it, and I knew that Bill was in the back office. I immediately realized, 'oh my god, he's probably spying on me to see how my service is!'. It made me feel uncomfortable, until I realized it was an opportunity to be extraordinarily helpful and jovial with the customer and be "candidly" observed by my manager. So I did that. I rang the customer up and she left. The light went off after a few minutes of silence. After that, I noticed the light come on a number of times on different days, which surprised me. I even ran to the back after helping a customer once, while the intercom light was still on, sneaked around the corner, and looked into his office window to see if it was really him. He was sitting there looking at his phone. I looked for just a moment when I heard from the speaker above, "<beep!> cashier to the front". I ran. Bill was probably the greatest manager I've ever known, such a hard worker, a really cool guy to talk to, well respected by everyone, etc. In fact, if all managers were like him, Staples would probably still be a force to be reckoned with. So, it never bothered me the way it probably would have, had it been some creepy manager. This is necessary for the rest of the story, because had it not been the case, I would have probably called him out, etc. Eventually I started being extra jovial all the time, because I never knew when I'd miss seeing the light come on and miss the opportunity to impress Bill. Bill was so impressed with my service that I was given a raise and promoted to manager of the copy & print center about 6 months later, which eventually led to me opening my own print company and quitting Staples (after seeing how high the margins were), which led to me learning how to use Adobe Creative Suite and graphic design, which led to me shifting my focus to print design for clients (brochures, cards, etc.), which led to me meeting some guys who ran an Internet marketing company one day while trying to sell my print design services. They wanted to hire me full time, and did, so I began learning web design, then web development, then back end code, etc. I always tell myself, 'I was probably destined for this kind of work', but the reality is that my entire life might have been changed by simply knowing I was being spied on by my Boss. I realize that it probably worked out for the better in my case, but the fact is, knowing that somebody is watching you causes you to change who you are. It's a form of control in and of itself. In fact, it doesn't even need to happen to you. Now that we have all seen that the government does spy on people, it's hard to imagine all the tiny ways that it might change your behavior and the things you say (e.g., online). ~~~ repler I worked at Staples too (Business Machines!), the management was not shy about reminding us about mystery shoppers. My managers would always walk around the corner right at the instant I would sit down for a minute when it wasn't busy 5 hours into my shift. Never failed. Ugh. I know we didn't have surveillance cameras in the store at the time though, because it was a sore point (and against Staples policy at the time). ------ mmaunder I wonder if he covers front and back cellphone cameras. ------ caub Laptops have a LED showing when webcam is in use ------ stanislavb Hypocrite! ------ orthogon What about the part where we stop buying products with integrated cameras? What about the part where we stop buying devices that we have seeemingly no hope of control over? What about that? Is boycott a word too strong? Gee, you're right. We should all just give up, and accept that what we're sold, is that which we must buy. ~~~ deathanatos I think you're being a bit quick to judge people here… Having an integrated camera is obviously a lot easier to deal with, logistically, than lugging along an external USB camera. I think a lot of the people here would love to have hardware-level kill switches for their video camera. And mic. And WiFi. (I would; I used to own a Thinkpad with a hardware kill switch for WiFi. It was useful, even aside from the privacy benefits.) ~~~ orthogon I think you're neglecting a key detail: alternatives are hardly even on the shelves, and NO ONE QUESTIONS IT. > Oh, well, that's just supply and demand, of course! > Everyone just WANTS an always on internet connection! > Why would anyone ever remove the battery from their cell phone??? > It's more cost effective to build the device like that. Common sense! > Everyone wants a unique identifier, GPS and 911 service. It's safer! Yup, no one would ever want things any other way. It's silly to question why the invisible hand of the market works as it does. ~~~ derogator The really amazing part about the downvotes here, is that HN is unable to reconcile the realities of mass surveillance that tend to conflict with profit motives, and yet the collective overtone of HN professes itself to be a bastion of progressive futurist space exploring tranhumanism. Few seem to notice the cognitive dissonance. Sort of a cruel prank. Those in the best position to release the yoke, are only motivated to tighten it.
{ "pile_set_name": "HackerNews" }
Tentative Graduation Dates Set I hope that everyone in your household is staying safe and finding continued enjoyment in your time together. As the school district alters or finalizes plans during this time of school closure, there are several items of importance that I want to bring to your attention. New Feeding Sites to Open Monday, April 20 Beginning Monday, April 20, we will begin Grab-and-Go meal service for any child ages 1 to 18 at five additional school sites. Angie Debo Elementary (16060 N. May Ave.) Frontier Elementary (4901 Explorer Dr.) Heritage Elementary (400 E. Sorghum Mill Rd.) Northern Hills Elementary (901 E. Wayne St.) Orvis Risner Elementary (2801 S. Rankin St.) The meals will be available in the schools’ drive-thru from 12:30 p.m. to 1:00 p.m. Monday-Friday. Meal service will be set up near the schools’ cafeterias, which, in some cases, could be at the back of the building. The addition of these sites brings to 13 the number of feeding locations across our district. Each week, EPS is serving around 5,000 students an estimated 10,000 meals. For a master list of all Grab-and-Go feeding sites, go to edmondschools.net. Tentative Dates Set for Graduation Ceremonies District and high school administrators, as well as senior sponsors, have been finalizing plans to move high school graduation ceremonies to the summertime. The Cox Convention Center has been booked for two tentative dates, July 11 and July 24, the latter date preferred, but will be dependent on other concurrently scheduled events at the Cox. Additionally, we are requesting a booking date over fall break (TBD) that, while not ideal, still provides an opportunity to recognize and reflect upon our graduates’ accomplishments, even as they have begun their new lives in college or careers. We are communicating these dates now so that families have the opportunity to “hold” the dates and begin to make tentative plans with family and friends. National and local health and safety guidelines will dictate on which date the ceremonies will be held. Commemorative graduation programs will be printed and school sites will soon announce tryouts among the valedictorians for the positions of graduation speakers. In the meantime, the district, thanks to a grant from the Edmond Public Schools Foundation, is purchasing yard signs for all graduates to proudly display at home to commemorate this important accomplishment. Members of the EPS Foundation Board and the schools’ teachers are planning a surprise posting of the yard signs in the seniors’ front yards. As we near the end of school, seniors will be contacted to solicit information regarding transcript needs, scholarships, and post-graduation plans. Also, dates will soon be announced for seniors to schedule appointments to return their Chromebooks and student IDs and at the same time pick up their official diplomas, yearbooks, and any personal items still remaining in the buildings. District Developing Plan to Pick Up Personal Belongings We hope to be able to announce by late next week our plan for how elementary, middle school and high school students (except seniors) will pick up their personal belongings and drop off school equipment such as textbooks, library books and so on. Thank you for your patience as we develop this process. 2020-2021 Annual Update to Open May 1 Parents or guardians of students currently enrolled in the 2019-20 school are required to complete an Annual Update for 2020-2021 by logging into the Parent Portal. After May 1, login, scroll down and click on the “More” link and then “Online Registration” in the lower-left corner of the portal screen to begin the Annual Update. Parents or guardians can verify their existing information and make any needed changes. Students will not receive 2020-21 schedules or homeroom teacher assignments in August until this update has been completed. If you need assistance registering or logging in to the Parent Portal, please email parentportalhelp@edmondschools.net with your specific question. Teachers off Contract on April 24 As Friday, April 24 (better known as “April Day”) is still considered a non-contract day for all certified personnel under the EPS board-approved school calendar, all teachers will be off that day. Teachers will not be obligated to contact students or hold virtual lessons on this day. Remember, content and lessons can still be accessed and completed on the EPS Learning Dashboard. New Content Uploaded to EPS Learning Dashboard on Sundays New content is uploaded to the EPS Learning Dashboard every Sunday at noon. Please encourage your child to do as many of the dashboard activities as possible. The skills addressed in the learning dashboard each week are key skills needed for the next grade level. Until our next communication, please stay safe and take care of yourselves. If you are struggling with excessive worry, anxiety or depression, please reach out to our Call Sam hotline. The number is 1-855-225-2SAM (2726). This free, 24-hour, confidential hotline is staffed by full-time counselors at Mercy who are eager to assist you.
{ "pile_set_name": "Pile-CC" }
Q: WinForm - draw resizing frame using a single-pixel border In a Windows Form with a Resizing Frame, the frame border draws with a raised 3-D look. I'd like it to draw with a flat single pixel border in a color of my choosing. Is this possible without having to owner draw the whole form? A: You could try something like this: Point lastPoint = Point.Empty; Panel leftResizer = new Panel(); leftResizer.Cursor = System.Windows.Forms.Cursors.SizeWE; leftResizer.Dock = System.Windows.Forms.DockStyle.Left; leftResizer.Size = new System.Drawing.Size(1, 100); leftResizer.MouseDown += delegate(object sender, MouseEventArgs e) { lastPoint = leftResizer.PointToScreen(e.Location); leftResizer.Capture = true; } leftResizer.MouseMove += delegate(object sender, MouseEventArgs e) { if (lastPoint != Point.Empty) { Point newPoint = leftResizer.PointToScreen(e.Location); Location = new Point(Location.X + (newPoint.X - lastPoint.X), Location.Y); Width = Math.Max(MinimumSize.Width, Width - (newPoint.X - lastPoint.X)); lastPoint = newPoint; } } leftResizer.MouseUp += delegate (object sender, MouseEventArgs e) { lastPoint = Point.Empty; leftResizer.Capture = false; } form.BorderStyle = BorderStyle.None; form.Add(leftResizer);
{ "pile_set_name": "StackExchange" }
Antioxidant activities of the water-soluble fraction in tempeh-like fermented soybean (GABA-tempeh). Tempeh is a traditional fermented soyfood native to Central Java, Indonesia; tempeh is prepared by salt-free aerobic fermentation using Rhizopus. Similar to miso, tempeh is also reported to be antioxygenic. In this study, we used a tempeh-like fermented soybean. First, soybean was incubated aerobically and then successively incubated anaerobically. Because the gamma-amino butyric acid (GABA) content was increased remarkably, we named this tempeh GABA-tempeh. The contents of other free amino acids and peptides were significantly higher in GABA-tempeh than in conventional tempeh. In this study, we compared the antioxidant activity of the water-soluble fraction in GABA-tempeh with that of soybean and conventional tempeh. The order of the antioxidant activity was shown as follows: GABA-tempeh > conventional tempeh > soybean. The components responsible for the antioxidant activity of GABA-tempeh were isoflavone aglycones, free amino acids, and peptides, which increased during aerobic and anaerobic fermentations.
{ "pile_set_name": "PubMed Abstracts" }
Microsporidiosis in a Brazilian University Hospital: case report. This is the report on a patient with chronic diarrhea caused by microsporidia. He is married, infected with HIV and has low CD4 cell count. The diagnosis was established through stool parasite search using concentration methods and Gram-chromotrope staining technique. Ileum biopsy was also performed in this case. The etiological diagnosis may be established in a clinical laboratory, by chromotrope staining technique in routine microscopic examination of stool specimens.
{ "pile_set_name": "PubMed Abstracts" }
Awesome Sport Theme Boys Bedroom Ideas - This inspiring boys bedroom comes from Perianth. Perianth designing this perfect boy?s bedroom by considering the boys character that really close with sport as their hobby or they positive activity to kill th Quarterback Peyton Manning of the Denver Broncos looks on during warm-ups before playing against the Seattle Seahawks during Super Bowl XLVIII at MetLife Stadium on February 2014 in East Rutherford, New Jersey.
{ "pile_set_name": "Pile-CC" }
Q: Linux cron job fails to execute part of script which works in shell I'm having a problem with a script that writes to a log file during a backup procedure. Tested perfectly when called from the root shell, but fails when run from the cron demon. Backup is done over a series of partitions and the on-site admin will rotate the drives in the top dock weekly. In order to know where the most recent backup is located I've included the following lines sudo hdparm -I /dev/sdb | grep 'Model Number' sudo hdparm -I /dev/sdb | grep 'Serial Number' I've tried this with a >> /batch/backup.log and without. When the bash script is run from the command line, it works beautifully. But when the crontab calls the script the output from these lines is blank. crontab entry: 00 00 * * * /batch/backup.bat >> /batch/backup.log I have no idea why other than the possibility that cron can't handle the pipe or the grep or something. I have isolated the lines in a test.bat but they remain blank. The backup script uses the hdparm to spin down the drive at the end, but now I wonder if that's not working properly either if cron can't handle hdparm. A: That is probably because hdparm is not in the PATH when the script is executed through cron. Although less likely, same might apply to grep as well. Try replacing hdparm with /full/path/to/hdparm in your script.
{ "pile_set_name": "StackExchange" }
/* This repository is no longer actively maintained. To find all solutions to this problem (and practice coding more problems) at: ~~~~~~~~~~~~~~~~~~~~~~~~~ https://backtobackswe.com ~~~~~~~~~~~~~~~~~~~~~~~~~ */ public class Solution { public static void main(String args[]) { /* Here you are given the adjacency list, but even if you were given the raw edges and vertices (remember: G = (V, E)), you'd still be able to build the adjacency list in O(|E|) time. Just loop over the edges and build what you see below. */ Map<Integer, List<Integer>> originalNodeToAdjacents = new HashMap<>(); originalNodeToAdjacents.put(0, Arrays.asList(1)); originalNodeToAdjacents.put(1, Arrays.asList(2)); originalNodeToAdjacents.put(2, Arrays.asList(3, 4)); originalNodeToAdjacents.put(3, Arrays.asList(0)); originalNodeToAdjacents.put(4, Arrays.asList(2)); /* The graph above: 0 ---> 1 ---> 2 <---> 4 ^ / \ / \ / \ ⌄ 3 */ /* If we reverse each edge: 0 <--- 1 <--- 2 <---> 4 \ ^ \ / \ / ⌄ / 3 */ System.out.println(isStronglyConnected(originalNodeToAdjacents)); } private static boolean isStronglyConnected(Map<Integer, List<Integer>> originalNodeToAdjacents) { boolean allNodesReached = allNodesReachedViaBFS(originalNodeToAdjacents); if (!allNodesReached) { return false; } Map<Integer, List<Integer>> reversedNodeToAdjacents = reverseGraph(originalNodeToAdjacents); boolean allNodesReachedWithReverseGraph = allNodesReachedViaBFS(reversedNodeToAdjacents); return allNodesReachedWithReverseGraph; } private static boolean allNodesReachedViaBFS(Map<Integer, List<Integer>> originalNodeToAdjacents) { Set<Integer> visited = new HashSet<>(); Queue<Integer> queue = new LinkedList<>(); queue.add(0); visited.add(0); while (!queue.isEmpty()) { int node = queue.poll(); List<Integer> adjacents = originalNodeToAdjacents.get(node); if (adjacents != null) { for (int adjacent: adjacents) { if (!visited.contains(adjacent)) { visited.add(adjacent); queue.add(adjacent); } } } } return visited.size() == originalNodeToAdjacents.size(); } private static Map<Integer, List<Integer>> reverseGraph(Map<Integer, List<Integer>> originalNodeToAdjacents) { Map<Integer, List<Integer>> reversedNodeToAdjacents = new HashMap<>(); for (Map.Entry<Integer, List<Integer>> entry: originalNodeToAdjacents.entrySet()) { int nodeValue = entry.getKey(); List<Integer> adjacents = entry.getValue(); // Reverse each edge for (int adjacent: adjacents) { List<Integer> reversedAdjacents; if (!reversedNodeToAdjacents.containsKey(adjacent)) { reversedAdjacents = new ArrayList<>(); } else { reversedAdjacents = reversedNodeToAdjacents.get(adjacent); } // Reverse edge, before node went to adjacent, now adjacent maps to the node reversedAdjacents.add(nodeValue); reversedNodeToAdjacents.put(adjacent, reversedAdjacents); } } return reversedNodeToAdjacents; } }
{ "pile_set_name": "Github" }
Irfaan Ali Dr. Hon. Mohamed Irfaan Ali is a Guyanese politician, sitting Member of Parliament and a former Minister of Housing in Guyana. Ali was elected Presidential Candidate for the People's Progressive Party on January 19, 2019. Early life & education Ali was born in Leonora, a village in the West Coast Demarara region of Guyana. The child of two educators and one of two sons, Ali also spent much of his formative years on the island of Leguan. He is a past student of the Leonora Nursery and Primary schools and Cornelia Ida Primary. Ali completed his secondary education at St. Stanislaus College in Georgetown, Guyana. He holds a doctorate in Urban and Regional Planning from the University of the West Indies. Professional career Ali served as Project Manager of the Caribbean Development Bank's Project Implementation Unit in the Ministry of Finance and Senior Planner in the State Planning Secretariat. Political career Ali became a member of the National Assembly of Guyana in 2006. He was subsequently appointed to the portfolios of Minister of Housing and Water and Minister of Tourism Industry and Commerce. During his tenure as Minister, Ali performed the functions of President and Prime Minister on separate occasions. In 2015, the People's Progressive Party (PPP/C) went into opposition during which time he served as chair of the Public Accounts Committee and co-chair the Economic Services Committee of the Parliament of Guyana. Presidential candidacy Irfaan Ali is the Presidential Candidate of the People's Progressive Party (PPP/C) for the March 2, 2020 General and Regional Elections in Guyana. He was selected as the presidential candidate for the People's Progressive Party on January 19, 2019. His controversial selection came at a time after Ali had been charged with 19 counts of conspiracy and fraud by Guyana's Special Organized Crime Unit (SOCU). Immediately following his selection, Ali was accused of academic fraud. References Category:Living people Category:Guyanese politicians Category:Government ministers of Guyana Category:Guyanese politicians of Indian descent Category:1980 births
{ "pile_set_name": "Wikipedia (en)" }
Two-Port Pars Plana Anterior and Central Core Vitrectomy (Lam Floaterectomy) in Combination With Phacoemulsification and Intraocular Lens Implantation Under Topical Anesthesia for Patients with Cataract and Significant Floaters: Results of the First 50 Consecutive Cases. To study the safety and efficacy of 2-port pars plana anterior and central core vitrectomy (Lam floaterectomy) in combination with phacoemulsification (phaco) and intraocular lens implantation (IOL) for patients with cataract and significant floaters under topical anesthesia. Retrospective review of the first 50 consecutive cases. A standardized treatment protocol was used for patients with cataract and significant (moderate to severe) floaters (duration > 3 months). Data analysis included intraoperative and postoperative complications, floater status, and patient satisfaction. There were 50 eyes (38 patients) with a male-to-female ratio of 1 to 2.3. Twelve patients had bilateral eye surgeries. Mean age was 58.10 ± 9.85 years (range, 39-83). All patients completed the 3-month follow-up. One eye had mild vitreous hemorrhage at the end of surgery arising from sclerotomy wound oozing. No other intraoperative compli-cations were encountered. Postoperatively, there was 1 case of transient hypotony and 1 case of congestion at sclerotomy wound. No cases of retinal break or detachment, or clinically significant macular edema, were reported. There were 5 cases (10%) of mild residual floaters and 1 case (2%) of floater recurrence. Total floater clearance rate was 88%. Patient satisfaction rates were 80%, 14%, 6%, and 0% for very satisfied, satis-fied, acceptable, and unsatisfied, respectively. The 3-month results in terms of safety and efficacy of the Lam floaterectomy in combination with phaco and IOLfor patients with cataract and significant floaters under topical anesthesia are encouraging. Further larger-scale, prospective, multicenter studies seem warranted.
{ "pile_set_name": "PubMed Abstracts" }
Discriminative ability of dual-energy X-ray absorptiometry site selection in identifying patients with osteoporotic fractures. Dual-energy X-ray absorptiometry (DXA) is the gold standard method for measurement of bone mineral density (BMD). The aims of the current study are to compare the ability of BMD measurements to identify subjects with vertebral fractures (VF), when the lumbar spine (LS), hip or both sites are measured. 460 subjects aged 73+/-5.2 years participated in the study. Thoraco-lumbar spine radiographs were obtained and analyzed for the presence of VF using the visual semi-quantitative assessment. BMD of the LS and the left femur were measured by DXA. Eighteen men (12%) and 56 women (20%) had at least one VF. 16% of scans at the LS were unreadable because of the presence of degenerative changes. In both genders, BMD of the hip showed better ability than LS BMD in detecting subjects with osteoporosis. BMD and T-score values at the hip, but not the LS, were lower in subjects with VF than those without (p<0.05). Femoral neck BMD showed the highest OR for each S.D. decrease in BMD for identifying subjects with VF, and the best predictability for prevalent VF using ROC. Fracture risk prediction did not increase by adding the spine to the hip measurement. In conclusion, hip BMD was the only and best skeletal site needed to detect subjects with osteoporosis and showed the strongest relationship with prevalent vertebral fractures in elderly subjects.
{ "pile_set_name": "PubMed Abstracts" }
Q: how to format a number in mIRC? My remote script gets a variable with a number formatted like 4365271385. I would like the script to send a message with the variable in it formatted like 4.365.271.385. I searched the internet and the help file, but i couldn't find it. Sometimes the number is in the thousands, sometimes in the billions. How to do this? Can't be hard, can it? A: It is indeed not very hard. Use $bytes, in your case $bytes(4365271385,bd) b parameter: Comma-formats the number for bytes. d parameter: Returns the value whilst retaining decimal point values. You don't need this if you're only working with whole integers. But it's handy to have. More at http://en.wikichip.org/wiki/mirc/identifiers/$bytes
{ "pile_set_name": "StackExchange" }
Breaking News All Ages Ladies Soccer Thistle ladies caused one of the upsets of the season defeating old rivals Workies 3-0. Knowing they had only 4 games to go, out of finals contention and only fielding 10 players, Thistle ladies had something to prove. The first goal was a result from a brilliant cross by Maddie Risby to Brooke McDonald to slide one past the keeper. Rhiannon Walding scored next as she lofted a well weighted ball from near half way. Jamie-Lee Hunt closed off the scoring with a wonderful one on one with the keeper. Ashlee Fitzpatrick, Jennifer Merry and Annmarie Tomazin were once again outstanding in defence. Angie Cambourn and Jacinta Moon held their own in the middle of the field shutting down any attack coming down the centre. Danielle Byrne was outstanding in goals saving some tricky and fast shots determined to not to let any slip past her. Overall Thistle ladies have had a fun and wonderful season and we hope to see you all back next year!
{ "pile_set_name": "Pile-CC" }
Disclosed herein, in various embodiments, are stable, high performing nanoparticle compositions suitable for printing, such as by inkjet printing, as well as processes and devices for making and/or using the same. Fabrication of electronic circuit elements using liquid deposition techniques may be beneficial as such techniques provide potentially low-cost alternatives to conventional mainstream amorphous silicon technologies for electronic applications such as thin film transistors (TFTs), light-emitting diodes (LEDs), RFID tags, photovoltaics, etc. However, the deposition and/or patterning of functional electrodes, pixel pads, and conductive traces, lines and tracks which meet the conductivity, processing, and cost requirements for practical applications have been a great challenge. The metal, silver (Ag), is of particular interest as conductive elements for electronic devices because silver is much lower in cost than gold (Au) and it possesses much better environmental stability than copper (Cu). Silver nanoparticles have been extensively examined. However, previous ink compositions containing silver nanoparticles have typically had poor jettability, i.e. they could not be printed using conventional inkjet printing technologies. Typically, the ink would block the nozzle, drip out or dry out on the printer head, and/or the ink droplets would misfire. The printed features had low resolution and/or suffered from the “coffee ring” effect, wherein the particles in a given droplet end up along the circumference of the circle having a center where the droplet was deposited on the substrate (i.e. a non-uniform deposition). Ideally, deposited inkjet-printed lines should be smooth, even, and straight. Jettable ink compositions would be desirable to enable drop-on-demand deposition and printing with functional features such as electrodes and interconnects for electronic devices.
{ "pile_set_name": "USPTO Backgrounds" }
Just give us a call at 1300 get TCA and we’ll be happy to schedule an appointment with you to discuss your particular business needs. In order to make certain that we can help your business, our process begins with a Technology Assessment that includes a Needs Analysis and a Cost Savings Analysis. We will examine the results of the assessment and make recommendations to meet your current and future business needs. What other services and solutions do you provide? admin 2017-06-25T11:19:42+00:00 Examples of items that are not covered under our Flat Fee service plans include the cost of replacement or new hardware, or shipping costs, the cost of software licensing or renewal or upgrade fees, and the cost of any third party vendor or manufacturer support or incident fees. Whenever the potential arises for additional fees outside of our Flat Fee, you will always be notified in advance for approval. What does your Flat Fee service Include? admin 2017-06-25T11:18:43+00:00 Remote Help Desk, Lab/Bench Service and Onsite Service for all covered equipment, operating systems and applications: Servers, PC’s, Laptops, Firewalls, Routers and Switches Microsoft Windows XP Pro Desktop Operating Systems Microsoft Office 2000, 2003 and 2007 Microsoft Windows Server 2003 and Small Business Server 2003 Microsoft Exchange Server 2003 and 2007 Microsoft SQL Server 2000 and 2005 And more Vendor Management Services. We will manage all of your infrastructure vendors, allowing you and your staff to run your business, not your vendors. Anytime there is a problem with a device or line of business application serviced by a vendor we manage for you, it’s one call to us, and we take it from there, and work the problem to resolution with the vendor. We will even schedule any onsite visits required by the vendor, and oversee the successful remediation of the issue at hand. Broadband Vendors Phone Service Vendors Phone Equipment Vendors Copier/Fax/Scanner/Document Imaging Vendors Line of Business Application Vendors Hosted Website/Domain Registration Vendors Do you perform support on an as needed basis? admin 2017-06-25T11:17:20+00:00 Studies show that proactive maintenance improves equipment longevity, uptime and efficiency, and provides cost savings over time. Since all of our Flat Fee service plans are based on this premise, we do not offer reactive services. Get in touch Name Email Message Now open in Ballina TCA has been providing solutions for all the technology needs of businesses on the Coffs Coast since 1994. We are the home of computers, Ricoh photocopiers and managed services, technological communication, IT networking and photocopiers. We are proud to now offer the same great service and products to the businesses of Ballina – with our service area now stretching all the way to the Tweed.
{ "pile_set_name": "Pile-CC" }
Q: Android UI Mathematics required for the implementation Can someone tell me what would be the math required for moving around the small ball in the bar(meter) according to the touch motion.... I needed a clear idea on the logic.. A: The logic depends on how you want to model the interaction between the finger and the ball. Is it moving through a fluid, like a ball bearing? A gravitational field? Do you want it to decelerate as if under the influence of friction from the sides of the bar? Or do you want to simply have the ball track the finger, without fancy damping of the motion? My point is that the "logic" can be pretty complicated, depending on how you decide to model it. I'd recommend looking for something canned in JavaScript before coding it yourself.
{ "pile_set_name": "StackExchange" }
/* * QEMU Common PCI Host bridge configuration data space access routines. * * Copyright (c) 2006 Fabrice Bellard * * Permission is hereby granted, free of charge, to any person obtaining a copy * of this software and associated documentation files (the "Software"), to deal * in the Software without restriction, including without limitation the rights * to use, copy, modify, merge, publish, distribute, sublicense, and/or sell * copies of the Software, and to permit persons to whom the Software is * furnished to do so, subject to the following conditions: * * The above copyright notice and this permission notice shall be included in * all copies or substantial portions of the Software. * * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR * IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, * FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL * THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER * LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, * OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN * THE SOFTWARE. */ /* Worker routines for a PCI host controller that uses an {address,data} register pair to access PCI configuration space. */ #ifndef PCI_HOST_H #define PCI_HOST_H #include "hw/sysbus.h" #define TYPE_PCI_HOST_BRIDGE "pci-host-bridge" #define PCI_HOST_BRIDGE(obj) \ OBJECT_CHECK(PCIHostState, (obj), TYPE_PCI_HOST_BRIDGE) #define PCI_HOST_BRIDGE_CLASS(klass) \ OBJECT_CLASS_CHECK(PCIHostBridgeClass, (klass), TYPE_PCI_HOST_BRIDGE) #define PCI_HOST_BRIDGE_GET_CLASS(obj) \ OBJECT_GET_CLASS(PCIHostBridgeClass, (obj), TYPE_PCI_HOST_BRIDGE) struct PCIHostState { SysBusDevice busdev; MemoryRegion conf_mem; MemoryRegion data_mem; MemoryRegion mmcfg; uint32_t config_reg; PCIBus *bus; QLIST_ENTRY(PCIHostState) next; }; typedef struct PCIHostBridgeClass { SysBusDeviceClass parent_class; const char *(*root_bus_path)(PCIHostState *, PCIBus *); } PCIHostBridgeClass; /* common internal helpers for PCI/PCIe hosts, cut off overflows */ void pci_host_config_write_common(PCIDevice *pci_dev, uint32_t addr, uint32_t limit, uint32_t val, uint32_t len); uint32_t pci_host_config_read_common(PCIDevice *pci_dev, uint32_t addr, uint32_t limit, uint32_t len); void pci_data_write(PCIBus *s, uint32_t addr, uint32_t val, unsigned len); uint32_t pci_data_read(PCIBus *s, uint32_t addr, unsigned len); extern const MemoryRegionOps pci_host_conf_le_ops; extern const MemoryRegionOps pci_host_conf_be_ops; extern const MemoryRegionOps pci_host_data_le_ops; extern const MemoryRegionOps pci_host_data_be_ops; #endif /* PCI_HOST_H */
{ "pile_set_name": "Github" }
Q: WPF Group Items in ComboBox programmatically (Creating Data Templates in Code) I need to group my Items in a Combobox like this. [Category] - Item - Item [Category2] - Item - Item I found an working answer here, but my comboboxes are created dynamically by User Action. Is it possible to fill the Combobox like this programmatically? The Items I want to display are ModuleCategoryViewControl's : public class ClassNameController { public string Name { get; set; } public System.Type ObjectType { get; set; } public ClassNameController(string name, Type objectType) { this.Name = name; this.ObjectType = objectType; } public override string ToString() { return Name; } } class ModuleCategoryViewControl : ClassNameController { public string Category { get; set; } public ModuleCategoryViewControl(string name, string category, Type objectType) : base(name, objectType) { this.Category = category; } } They should group by Category and displayed by Name A: Is it possible to fill the Combobox like this programmatically? The sample code on the link you supplied does fill the ComboBox programmatically so it's unclear what your issue really is. If you add items dynamically at runtime you should replace the List<ModuleCategoryViewControl> with an ObservableCollection<ModuleCategoryViewControl>. Please refer to the following sample code. Window.xaml.cs: public partial class MainWindow : Window { readonly ObservableCollection<ModuleCategoryViewControl> items = new ObservableCollection<ModuleCategoryViewControl>(); public MainWindow() { InitializeComponent(); items.Add(new ModuleCategoryViewControl("Item2", "A", typeof(int))); items.Add(new ModuleCategoryViewControl("Item2", "A", typeof(int))); items.Add(new ModuleCategoryViewControl("Item3", "A", typeof(int))); items.Add(new ModuleCategoryViewControl("Item4", "B", typeof(int))); items.Add(new ModuleCategoryViewControl("Item5", "B", typeof(int))); ListCollectionView lcv = new ListCollectionView(items); lcv.GroupDescriptions.Add(new PropertyGroupDescription("Category")); comboBox.ItemsSource = lcv; } private void Button_Click(object sender, RoutedEventArgs e) { items.Add(new ModuleCategoryViewControl("Item6", "A", typeof(int))); items.Add(new ModuleCategoryViewControl("Item7", "C", typeof(int))); } } Window.xaml: <StackPanel x:Name="sp"> <ComboBox x:Name="comboBox"> <ComboBox.GroupStyle> <GroupStyle> <GroupStyle.HeaderTemplate> <DataTemplate> <TextBlock Text="{Binding Name}"/> </DataTemplate> </GroupStyle.HeaderTemplate> </GroupStyle> </ComboBox.GroupStyle> <ComboBox.ItemTemplate> <DataTemplate> <TextBlock Text="{Binding Name}"/> </DataTemplate> </ComboBox.ItemTemplate> </ComboBox> <Button Content="Add Item" Click="Button_Click" /> </StackPanel> If you want to create the DataTemplates programmatically you could use the XamlReader.Parse method: ComboBox cmb = new ComboBox(); cmb.GroupStyle.Add(System.Windows.Markup.XamlReader.Parse("<GroupStyle xmlns=\"http://schemas.microsoft.com/winfx/2006/xaml/presentation\"><GroupStyle.HeaderTemplate><DataTemplate><TextBlock Text=\"{Binding Name}\"/></DataTemplate></GroupStyle.HeaderTemplate></GroupStyle>") as GroupStyle); cmb.ItemTemplate = System.Windows.Markup.XamlReader.Parse("<DataTemplate xmlns=\"http://schemas.microsoft.com/winfx/2006/xaml/presentation\"><TextBlock Text=\"{Binding Name}\"/></DataTemplate>") as DataTemplate; cmb.ItemsSource = lcv; sp.Children.Add(cmb);
{ "pile_set_name": "StackExchange" }
Ab initio structure determination of monoclinic 2,2-dihydroxymethylbutanoic acid from synchrotron radiation powder diffraction data: combined use of direct methods and the Monte Carlo method. The crystal structure of 2,2-dihydroxymethylbutanoic acid (C(6)H(12)O(4)) in monoclinic form has been determined ab initio from synchrotron radiation powder diffraction data. Two O and five C atoms were first derived by direct methods. Two missing O atoms and one C atom were found by the Monte Carlo method without applying constraint to their relative positions. Positional and isotropic displacement parameters of these non-H atoms were refined by the Rietveld method. Molecules are linked by hydrogen bonds and they make sheet-like networks running parallel to the (010) plane. The Monte Carlo method is demonstrated to be a powerful tool for finding missing atoms in partially solved structure.
{ "pile_set_name": "PubMed Abstracts" }
Far away from the glitz and glamor the e-sports circuit, a different breed of semi-professional gamers is eking out an honest day’s work at arcades around the globe. If the Ninjas of the MLG, with their celebrity lifestyles and lucrative promo deals, are the World Series of Poker stars, these arcade hustlers—referred to within their community as “advantage players” (APs)—are more akin to legal card counters. These unassuming sharks will walk into a Dave & Buster's (or any other entertainment center with an arcade awarding tickets that can be exchanged for prizes), hit their handful of preferred games, and quietly rack up thousands and thousands of tickets. Doing this just a few days a week can quickly amass enough of a ticket balance to trade for the top shelf prizes that casual players could only dream of redeeming, like game consoles and iPads, which APs often sell for profit. For the elites in this scene, advantage playing straddles the line between obsessive hobby and part-time job. They aren't scamming or stealing their way to big wins. They're just incredibly good at these games and much of their skill is learned, rather than innate. Though baseline speed and reflexes are pre-requisites for success, it's primarily repetition and a nerdy devotion to the scene that breeds top-tier APs who are able to quickly discern whether a game's jackpot is ripe and able to be won or if it needs more time to "refill" through casual play. At home, APs study PDFs of game manuals downloaded from manufacturer sites, discuss strategies on their subreddit, track fluctuations in prize ticket value, and post YouTube videos showcasing their talents. But despite the internet’s aid in connecting APs worldwide and revealing the tricks of their trade to new generations of players, their numbers are dwindling. Michael Lucas, an advantage player in Pittsburgh, said that less than a decade ago, $100-per-hour profits weren’t uncommon, and players, arcade management, and game manufacturers all operated with respect for one another, unspoken gentlemen’s agreements keeping the peace. “They tolerated what we did to a fair degree,” Lucas told me in a phone call. “We knew we were killing it. They knew that we were killing it. But they also knew that we were doing it by the book and not doing anything to cheat.” Advantage player Justin Wei winning the jackpot on the 'Pop the Lock' game at a Dave and Buster's in Los Angeles. Photo by Jamie Lee Curtis Taete For a time, Lucas said, the cycle would go as follows: advantage players would find a game to master and farm for infinite jackpots, management would catch wind and adjust the settings or download a software patch to nullify the exploit, forcing the players to rotate to other games while the jackpot gradually built back up past the threshold that allows it to be won again. Lucas pointed to Tippin’ Bloks, a game in which the player moves a paddle to try and catch falling blocks into a nine-high stack, as a case study in this sequence. “On the old software back in 2011, [Tippin' Bloks'] 'impossible mode' wasn't very impossible, and people started to catch on,” he recalled. “Once the community figured that out, the average good Tippin’ Bloks player was winning four out of every five games. [Dave & Buster's] phoned up the makers of the game, ICE, and said, ‘Hey, this game's getting killed here and we don't want to drop the jackpot. Can you make the software work so there’s the win/loss control that we initially wanted?’ About seven months later, the software update began to roll out to the stores and we immediately noticed the difference and we all kind of gave up on it. But, in that patch, [ICE] also added an obvious tell that shows when the game is ready to pay out, which I consider a blatant nod to the community.” When asked to verify if a change had been made at the request of Dave & Buster's or if their games were programmed with any nods to advantage players, an ICE representative said "no comment." Dave & Buster's did not respond to multiple requests for comment on this article. Justin Wei, an advantage player from Irvine, California, says he believes his local Dave & Buster's "puts their machines on harder settings to discourage advantage players from coming." This has forced him and his friends to make one to two hour drives to the franchise's Hollywood location if he wants to earn serious tickets. He presumes that because that tourist-heavy Hollywood location "is so profitable and makes so much money, that they don't care if we come in and keep their games on normal settings." Despite the frustration it causes some, Lucas considers settings adjustment and exploit patch responses to APs fair play, and understands the necessity to clamp down on free-for-alls. He's less amiable when corporate makes sweeping, company-wide changes to ticket valuation in the same way one might be upset if the Federal Reserve suddenly chose to double the amount of currency in circulation. To keep all parties satisfied and help prevent such drastic steps, Lucas claimed he cultivated a friendly relationship with the management at his neighborhood Dave & Buster's, resulting in their being “very up-front” with him about their targets for a game’s take-to-payout ratio. “If something's running a little high, they would actually tell me and I’ll back off a bit,” he explained. But not everyone is so tolerant of advantage players. Lucas’ tone hardened as he recalled a manager at a mom-and-pop local arcade who once changed the settings on all the games he’d been working when he stepped outside for a phone call. “He couldn’t even wait for me to get off the property,” he seethed. “I knew I was never going back there and they were just going to change everything when I left, so I had no qualms about killing him.” The “killing” here refers to Lucas going back in, redoubling his gameplay efforts, and cashing out for a Nintendo Switch plus four game package, taking a prize bundle that he presumed cost the house $600 or more for only $170 of his own. Not literal murder. When asked if he could understand why a non-franchise arcade might want to shoo his kind away, Lucas was unsympathetic. “If the absolute best player to ever walk through that door, gives it everything he has and demolishes every game you have and he still only comes out ahead enough money that once you have two families of four walk in, sit down, eat and—boom—you have all your money back, is that really that big of a problem?” he asked. The mix of hostile managers, apparently nerfed cash cow games, ever-increasing game prices, and changes in ticket-to-dollar exchange rates has gradually forced advantage players to become jacks of all trades rather than specialists. For many, the cost/benefit of this arrangement no longer makes sense, and the herd has thinned substantially. “I had a whole list of contacts in my phone for nothing but advantage play,” said Lucas of his local peers. “I had about 17 or 18 people I’d send out mass texts to like ‘Hey, this game’s broken’ or ‘This game’s fixed.’” He said he's now down to one remaining IRL comrade, a former pupil named Joe Minkel. Years back, Lucas helped Minkel hone his natural gaming skills for advantage play and educated him in the strategy and benefits of sharing arcades as a group. “Mike actually wanted to start a community of people that work together,” Minkel told me. “We're all in cahoots like, 'Okay, we're not going to kill a game. We're going to keep it profitable so that the jackpot doesn't get lowered.'” Minkel said he now sees an increasing number of lone wolves who’ve learned how to beat a few games coming in to wipe out an arcade with little regard for other players or the long-term impact their assaults may have on company policy. “I don't like calling them APs,” he said. “I call them ‘pirates’ because they're in it for the booty and themselves. They just swoop in and ruin things.” These days, Minkel is more focused on entertaining the audience for his popular arcade-centric YouTube channel than flipping prizes when he hits an arcade. Lucas, who says advantage play used to make him more money annually than his day job managing a liquor store, still earns from the endeavor, though it now makes up only a third of his income. Neither can imagine a time when they stop going to arcades, and are heartened by the few advantage players they know in younger generations, but both seem to acknowledge their glory days are behind them. “I'm not asking to go back to the days where I was making beaucoup amounts of money in a short amount of time, because I know that's not sustainable,” reflected Lucas. “Just don't quit your day job, kids. This isn't something you're going to do and be able to quit your job and tell everyone to go bleep themselves and live the high life and roll around in a Ferrari. This is something that's basically going to be your beer money.” Sign up for our newsletter to get the best of VICE delivered to your inbox daily. Follow Justin Caffier on Twitter.
{ "pile_set_name": "OpenWebText2" }
Q: My iOS app isn't requesting iAds I recently released my first app on the app store (August 5, 2014 release). When I was testing the app the test iAds seemed to never go away. Now, the actual app available on the app store isn't displaying any ads. I have read similar question, where iAds didn't work at first, but everyone says they started working after a little bit. However, mine seems unique in that it made six impressions right after it was first downloaded (6 requests, 6 impressions), but it hasn't done anything since. Is this a programming error and that's why my requests are low, or is this common for iAds on new apps? Thanks. Oh, and I added ads using the method shown in this video https://www.youtube.com/watch?v=u5XcVnHCQ0w The app uses Sprite Kit and was designed for iOS 7.0. There is only one view controller and it only displays banner ads. The app also uses Game Center if that is of any importance. A: iAd takes a few days to look at new apps and then approves those for the iAd network. It is normal that you will have to wait a little bit.
{ "pile_set_name": "StackExchange" }
223 F.Supp.2d 286 (2002) Jeffrey E. SIMPSON, Plaintiff v. Cheryl GALLANT, et al., Defendants No. CIV. 02-15-B-K. United States District Court, D. Maine. September 25, 2002. Jeffrey E. Simpson, South Windham, ME, Pro se. Michael J. Schmidt, Esq., Wheeler & Arey, P.A., Waterville, ME, for Defendants. MEMORANDUM OF DECISION KRAVCHUK, United States Magistrate Judge. Jeffrey Simpson is seeking remedies for alleged violations of his constitutional right to have access to the telephone and mail services when he was a pretrial detainee at the Penobscot County Jail. (Docket Nos. 1, 7, 8, & 15.) A motion to dismiss filed by the defendants, Cheryl Gallant, Richard Clukey, and Edward Reynolds[1] was denied. *287 (Docket Nos. 26 & 31.) The parties have now consented to proceed before the magistrate judge.[2] Simpson has filed a motion for summary judgment (Docket No. 38) which he has since clarified to be a motion for partial summary judgment vis-à-vis a claim that he was unable to orchestrate bail in the period between October 20, 2001, through January 21, 2002, because he was denied access to a phone despite his express request to use the phone to arrange bail (Docket No. 52). The defendants have responded to this motion and have filed a cross motion for summary judgment as to all of Simpson's claims. (Docket No. 44.) I DENY Simpson's motion for summary judgment and GRANT summary judgment to the defendants on Simpson's claim that his constitutional rights were violated when his request to make a collect call to arrange bail was denied. As to the remainder of Simpson's claims relating to phone and mail access I conclude that Simpson has not exhausted his administrative remedies as required by 42 U.S.C. § 1997e(a) and, because the defendants press for disposition on this ground, these claims are DISMISSED WITHOUT PREJUDICE. Background Broadly put, Simpson claims that while he was a pretrial detainee at the Penobscot County Jail he was placed in disciplinary segregation for violations of jail rules. During the period he spent in segregation he was completely denied access to the phones and he was allowed to mail only three personal letters a week, with postage paid by the jail pursuant to a jail policy. He was not allowed to send additional mail using his own postage. On January 21, 2002, Simpson was released from custody on bail that was posted by an associate. On February 21, 2002, Simpson was found not guilty on one charge after a jury trial. On February 14, 2002, all additional counts against Simpson triggering his detention from October 10, 2001, through January 21, 2002, had been dismissed. Simpson's theory of the case is that Penobscot County Jail policies pertaining to outgoing mail and its policy prohibiting the use of a phone for any reason by inmates not in good standing violated his right to prepare his defense and make bail. At the motion to amend/motion to dismiss juncture it was clarified that Simpson pursues these three defendants in their official capacities challenging the constitutionality of the Jail's policy or custom. See Monell v. Dep't of Social Servs., 436 U.S. 658, 694, 98 S.Ct. 2018, 56 L.Ed.2d 611 (1978) (observing that a § 1983 suit may be brought "when execution of a government's policy or custom, whether made by its lawmakers or by those whose edicts or acts may fairly be said to represent official policy, inflicts the injury that the government as an entity is responsible for under § 1983").[3] Discussion A. Summary Judgment Standard Typically the summary judgment standard is phrased in terms of moving and nonmoving parties but in this instance the plaintiff and the defendants are cross-movants. *288 My determination below turns on the question of exhaustion of administrative remedies (with respect to which the defendants carry the burden) and whether or not there is a genuine dispute of material fact as to Simpson's single exhausted claim involving the denial of his December 1, 2001, request to make a phone call to arrange bail. As I conclude that the summary judgment record on both motions supports judgment for the defendants and does not support judgment for Simpson on his motion, I have analyzed the record treating the defendants as the movants and Simpson as the nonmovant, an approach that favors Simpson. Summary judgment is appropriate if there are no genuine and disputed issues of material fact and if, viewing the evidence most favorably to Simpson, the defendants are entitled to prevail as a matter of law. Fed.R.Civ.P. 56; Celotex Corp. v. Catrett, 477 U.S. 317, 322-23, 106 S.Ct. 2548, 91 L.Ed.2d 265 (1986); Nicolo v. Philip Morris, Inc., 201 F.3d 29, 33 (1st Cir.2000). The defendants bear the burden of showing that there is no material factual dispute. A disputed fact is material if it "has the potential to change the outcome of the suit under the governing law if the dispute over it is resolved favorably to the nonmovant." Navarro v. Pfizer Corp., 261 F.3d 90, 93-94 (1st Cir.2001) (quoting McCarthy v. Northwest Airlines, Inc., 56 F.3d 313, 315 (1st Cir.1995)). I must take Simpson's evidence as true, but only evidence that is supported by the affidavits or other evidentiary material. Celotex, 477 U.S. at 324, 106 S.Ct. 2548. Simpson's pro se status does not excuse him from meeting the summary judgment requirements. Parkinson v. Goord, 116 F.Supp.2d 390, 393 (W.D.N.Y.2000) ("[P]roceeding pro se does not otherwise relieve a litigant of the usual requirements of summary judgment, and a pro se party's bald assertions, unsupported by evidence, are insufficient to overcome a motion for summary judgment."). With respect to material facts (as opposed to legal argument[4]) I have drawn all reasonable inferences in favor of Simpson. Matsushita Elec. Indus. Co. v. Zenith Radio Corp., 475 U.S. 574, 587, 106 S.Ct. 1348, 89 L.Ed.2d 538 (1986). In undertaking the exhaustion inquiry, the defendants bear the burden of proof on this affirmative defense, see Casanova v. Dubois, 304 F.3d 75, 77-78 (1st Cir.2002), and may discharge their burden by demonstrating that their is no record evidence to support Simpson's case on this question, Celotex, 477 U.S. at 325, 106 S.Ct. 2548. Vis-à-vis Simpson's constitutional claims Simpson would bear the burden at trial, and, as to any essential factual element of his claim on which he would bear the burden of proof at trial, Simpson's failure to come forward with sufficient evidence to generate a trialworthy issue would warrant summary judgment for the defendants. In re Spigel, 260 F.3d 27, 31 (1st Cir.2001). B. Exhaustion pursuant to § 1997e(a) As they did in their motion to dismiss the defendants press for dismissal of this entire action on the grounds that Simpson failed to exhaust his administrative remedies as required by 42 U.S.C. § 1997e(a). In § 1997e(a) Congress provided: No action shall be brought with respect to prison conditions under section 1983 of this title, or any other Federal *289 law, by a prisoner confined in any jail, prison, or other correctional facility until such administrative remedies as are available are exhausted. 42 U.S.C. § 1997e(a). In my recommended decision on the motion to dismiss I concluded that Simpson had adequately plead exhaustion for purposes of surviving the motion to dismiss.[5] As anticipated, the record on these cross-motions for summary judgment provides a better basis for making the exhaustion determination. The facts that are material to the exhaustion concern are as follows. The inmate grievance procedure for the Penobscot County Jail is not disputed by the parties. It is contained in the inmate handbook and provides: An inmate may file a grievance of an alleged violation of civil, Constitutional, or statutory rights ... or to appeal a previous grievance decision. Jail personnel will provide inmates who wish to report a grievance (consistent with the definition) with a copy of the Grievance form used by the Penobscot County Jail. Completed grievances may be submitted directly to the Corrections Officer, Asst. Shift Supervisor or Shift Supervisor who will sign the grievance indicating receipt of the grievance, to include date and time. Once signed by the Receiving Officer, the inmate will be given a copy of *290 the submitted grievance. When a grievance is resolved, a copy of the written response/finding will be provided to the inmate within twenty-four (24) hours. An inmate may appeal a grievance decision to the next level of command for review, stating the reason for the appeal. Grievances that appear frivolous in nature or include obscenities or are unrelated to jail operations and activities will not be considered. Once the inmate has exhausted the internal grievance system, he/she may submit their grievance to the Maine Department of Correction or other review agency for external review. Upon request, jail personnel will provide inmates who wish to report a grievance with adequate writing supplies. Inmate grievances addressed to the Maine Department of Corrections, State House Station # 111, Augusta, Maine 04333 or other review agency are considered legal/privileged correspondence. (DSMF Ex. 8 at 14.) Though the defendants contend that each inmate is given a copy of this policy upon arrival, Simpson states that he had to make a specific request for one and first had his copy on December 1, 2001. It is not disputed that Simpson arrived at the Penobscot County Jail on September 26, 2001, and was placed in the maximum security population. Either on October 20 or October 31[6] Simpson was placed in disciplinary segregation where he stayed until his release on bail on January 21, 2002. The only requests that Simpson submitted for telephone access, postage, or attorney visits were dated December 1, 2001, December 14, 2001, and January 6, 2002. On December 1, 2001, Simpson submitted a request form on which Simpson had written: "I need to make a collect call for bail pu[r]poses. I can not get through on this phone. Could I please make a 5 minute call." This request form was denied on the same date, the officer indicating: "As I already explained to you, you['re] not authorized use of the phone while in disciplinary lockup." On December 1 Simpson filed an inmate grievance stating: "I asked S[e]rge[a]nt Basso if I could use a phone to arrange bail. He said no, I was in lockup. I told him I have a constitutional right to make a call to arrange bail, talk to attorney, etc.[...] I am an unsentenced inmate. I need to arrange bail." This form indicates that an investigation was initiated on the same date and Sergeant Basso responded: "Inmate is in the [Lockup]. Policy F-140 states inmates not in good standing will NOT be allowed access to the collect call phones located in the dayroom areas. Therefore this does not meet the criteria of a defined grievance." In the section of the form that provides for "Action Taken," Basso checked, "No Action Warranted — Not a Defined Grievance." This notation is dated December 1, 2001. On December 6, 2001, Clukey, without further explanation, checked "Grievance Unfounded" in the section of the form dedicated to recording any administrative review and action. With respect to the defendants' assertion that Simpson did not appeal the denial of this December 1, 2001, grievance, Simpson argues that the defendants have not proven the negative: that the Department of Corrections did not receive or answer or defer an answer vis-à-vis Simpson's grievance. He cites to paragraphs in his affidavit that state that he *291 could not appeal the determination because Clukey had checked the box indicating that the grievance was unfounded. In order to appeal Simpson would have had to ask permission to submit a grievance to a shift leader and because of the characterization of the grievance as nongrievable, unfounded, and frivolous Simpson was denied grievance forms by Basso and two other jail officers. Simpson states that on December 19, 2001, he wrote a letter to the Commissioner of Corrections at the 111 Augusta State House address informing him that he wanted intervention on his behalf. He did not receive a response. Simpson avers that he sent a notarized letter in July 2002 asking for a resolution of this grievance and he has not received a reply. Simpson does not provide any documentation of these appeal efforts beyond a May 26, 2002, grievance form on which Simpson states that from April 30, 2002, onwards he had requested grievance forms three times and been denied the forms and permission to file a grievance. (Pl.'s Reply Mem. Ex 1.) On this form the failure is acknowledged by the jail personnel and the action taken is that Simpson was to be informed that he would be getting the forms. (Id.) As noted above, Simpson submitted two more requests to jail staff. On December 14, 2001, Simpson submitted an inmate request form stating: "I need to buy some cosmetics off the store cart also stamps. I am in lock up and was told to write shift leader." (DMSJ Ex. 3.) The response on the form is: "Stamp request denied — we will provide you with 3 stamps/week while you are in lock-up — hygiene pack request can be made out and submitted by Thursday of each week. You will have $1 deducted from your account for the hygiene pack if you want a shave card that will be an additional $1. You do not have any access to the store cart for anything while in lock-up. This request is to[o] late for this week." (Id.) Simpson did not file a grievance with respect to this request. On January 6, 2002, Simpson filled out an inmate request form indicating: "I need to use an unmonitored, non-recorded phone line to contact my attorney. My trial starts in approximately 1 week. It is extremely important." (Id. Ex. 4.) On the same date Simpson met with his attorney for approximately forty minutes. As a consequence of this person-to-person meeting the jail officers took no further action on the request and the form bears this notation: "Inmate's attorney came and visited him on this date (1-6-02) from 14:30 to 15:10 — non-contact." There is a check beside "Reviewed and no action warranted at this time." Simpson did not file a grievance with respect to the January 6, 2002, request.[7] I conclude that the only claim that Simpson has exhausted is his claim concerning the denial of access to the phone to attempt to make bail, an attempt that commenced on December 1, 2001. Though Simpson has no proof-positive of his efforts to appeal this determination to the Department of Corrections, he does have some proof that his efforts to file grievances (efforts some of which post-date the filing of this action perhaps) were not facilitated by the Jail as required by the policy. After all, exhaustion is an affirmative defense *292 and this court has no way of knowing without some presentation by the burden bearer as to the Department of Corrections' record on this matter, whether Simpson has submitted a grievance to the Department. Furthermore, the fact that jail personnel responded that this was not grievable — and they do not back-away from this position in these pleadings — suggests that it is not inequitable to estop them from arguing that Simpson has failed to exhaust. So while I conclude that Simpson has a right to a review of the merits of this claim, the other facets of this action have not been exhausted as required by § 1997e(a). See Nelson v. Rodas, 2002 WL 31075804, *4-6 (S.D.N.Y. Sept. 17, 2002) (examining status of the case law as to whether § 1997e(a) requires dismissal of the entire action if there are exhausted and nonexhausted claims, concluding that dismissing the nonexhausted claims without prejudice and proceeding on the exhausted claim was appropriate given that the parties and the court had already expended considerable resources on the action). With the defendants pressing this defense, these nonexhausted claims cannot be addressed by this court unless I determined that § 1997e(a) did not apply to this action. Casanova v. Dubois, 289 F.3d 142, 147 (1st Cir.2002) (remanding case for determination of whether remedies have been exhausted, noting: "Although not jurisdictional the exhaustion requirement is nonetheless mandatory"). 1. Simpson's § 1997e(a) Status When He Brought this Action and the Unexhausted Claims The facts material to Simpson's status as a "prisoner" within the meaning of § 1997e(a) are undisputed. Simpson was released from the Penobscot County Jail on January 21, 2002, when he posted bail, only to return on January 26, 2002. He has been in State custody since January 26, 2002, and was housed for sometime at the Maine Correctional Center in South Windham, Maine. Simpson's original complaint and motion to proceed in forma pauperis were signed by Simpson on January 16, 2002, and a jail officer signed the certificate on the in forma pauperis form on the same date. Simpson represented in these pleadings that he was incarcerated at the Penobscot County Jail. These pleadings were docketed by the court's clerk on January 23, 2002, a date on which Simpson was on bail and thus not incarcerated at the Penobscot County Jail. As indicated in the recommended decision on the motion to dismiss, one judge in this District has concluded that the § 1997e(a) exhaustion requirement is not applicable to individuals who have been released from custody during the pendency of the federal action. See Murphy v. Magnusson, 1999 WL 615895 (D.Me. 1999) (not requiring § 1997e(a) exhaustion by a former-prisoner plaintiff who had been released from the defendant's custody after the filing of the complaint). Other Circuit Courts of Appeal have reached similar conclusions in addressing former-prisoner status and the exhaustion requirement, see Ahmed v. Dragovich, 297 F.3d 201, 210 (3d Cir.2002); Greig v. Goord, 169 F.3d 165, 167 (2d Cir.1999), and other limitations placed on prisoner suits by the Prison Litigation Reform Act (PLRA), Janes v. Hernandez, 215 F.3d 541, 543 (5th Cir.2000) (attorney fee limitation of § 1997e(d)); Kerr v. Puckett, 138 F.3d 321, 323 (7th Cir.1998) (mental and emotional injury damages limitation of § 1997e(e)). Simpson's case is one that requires the court to look again at the question of how changes in the plaintiff's status from prisoner to non-prisoner and back to prisoner impact the exhaustion question. In Medina-Claudio v. Rodriguez-Mateo, 292 F.3d 31 (1st Cir.2002) the First Circuit made it clear that the exhaustion requirement *293 applied if exhaustion was logistically possible for the plaintiff, even if he was no longer a prisoner at the facility involved in the underlying allegations. Id. at 35. Thus, the exhaustion requirement perseveres even when the future plaintiff is removed from the location where the alleged rights violations occurred, but remains within the correctional system. Therefore Simpson, who is once again a prisoner in the state penal system, cannot raise continuing violations in the context of this lawsuit without exhausting his administrative grievances.[8] In terms of timing, section 1997e(a) clearly anticipates exhaustion prior to the bringing of a federal suit, starting as is does with the phrase, "No action shall be brought...." Thus, pragmatically speaking, the appropriate window for Simpson in terms of the exhaustion of his remedies would have been prior to January 16, 2002, when he completed and signed his paperwork for this suit. I conclude that what Simpson could have done to exhaust his administrative remedies after he filed this suit does not seem to be the appropriate point of reference; rather it is his ability to exhaust remedies prior to the commencement of the action that must be determined.[9] From the record in front of me it appears likely that Simpson mailed his complaint on or soon after January 16, 2002, from the Penobscot County Jail. Clearly he prepared and signed the filings by January 16, and the record indicates that he sent one legal letter on January 17, 2002. (DMSJ Ex. 6.) The First Circuit Court of Appeals has recently definitively adopted the "prisoner mail box" rule for purposes of determining when a prisoner's § 1983 pleading is "filed" for statute of limitations purposes. Casanova, at 79 ("[We] hold that the mailbox rule shall govern the determination of when a prisoner's § 1983 filing has been completed. So long as the prisoner complies with the prison's procedures for sending legal mail, the filing date for purposes of assessing compliance with the statute of limitations will be the date on which the prisoner commits the mail to the custody of prison authorities.")[10] Whether this action was "brought" within the meaning of § 1997e(a) when it was "filed" on January 17, 2002, or when it was docketed in this court on January 23, 2002, is not determinative *294 because the record now definitively establishes that although Simpson posted bail on January 21, 2002, he was reincarcerated on January 26, 2002, and remains in custody. Thus, unlike a former-prisoner plaintiff, Simpson would be subject to the strictures of § 1997e(a) if the court dismissed the action without prejudice; he would need to administratively exhaust each claim before bringing it to this forum. For a provision that is meant to lift some of the burden of prisoner litigation from the shoulders of the federal trial courts, section 1997e(a) has proven to be a prickly piece of legislation to apply given the variegations in the status of plaintiffs. See Rodriguez v. Ghoslaw, 2002 WL 1424586, *1 (S.D.N.Y.2002) ("Legislative and judicial efforts to reduce the burden of prison litigation on the district courts by creating procedural obstacles to prisoners' suits can sometimes have perverse effects."). In the present case Simpson has brought not only a claim that he was denied access to a phone to make bail arrangements, but he has also alleged that the jail's policy and procedures have limited his access to the courts by denying him the opportunity to consult with his attorney and the witnesses necessary for his trial. Those claims have not been the subject of any administrative grievances that I can discern. Though the wisdom of the strategy might be questioned in light of the summary judgment record before me, defendants continue to press for dismissal on that basis. Id. at *3 ("Defendant could have chosen to expressly waive the non-exhaustion issue and move instead for restoration of the summary judgment in his favor on the merits. Instead, he seeks a dismissal without prejudice. Under the PLRA, he is entitled to that remedy. Accordingly, the plaintiff's claim against defendant ... is dismissed without prejudice to future litigation on the same cause of action after exhaustion of any available administrative remedies."). They are entitled to that result under the PLRA. 2. The Exhausted Constitutional Claim The facts material to the denial of Simpson's request to make a collect call while in disciplinary segregation are as follows. Simpson was booked into the Penobscot County Jail on September 26, 2001, on charges of robbery and terrorizing. All inmates who are booked into the Jail are allowed two unmonitored telephone calls after the booking process has been completed. Simpson was in the maximum security population from September 26, 2001, through, at least, October 20, 2001. During this period Simpson had access to collect call phones located in the day room of his cell block. Simpson was placed in disciplinary segregation initially because he refused to obey an order issued by a correctional officer. Subsequently the Jail extended his disciplinary segregation (running until his release on bail on January 21, 2002) based on a series of subsequent disciplinary charges including: tampering or blocking a locking device; refusing to comply with an order; destroying, altering, or damaging jail property; lock tampering and leaving his cell during lock-down; placing a trash can full of water and feces on a TV stand; refusing to obey an order from a correctional officer; defecating on a piece of paper in front of his door; threatening a corrections officer; possession of contraband; and interference with an officer in the performance of his duties. (Gallant Aff. ¶ 9; Defs.' Reply to PMSJ Ex. A.)[11] *295 An inmate who violates the jail rules and is placed in disciplinary segregation is an inmate not in good standing. Inmates not in good standing are placed in disciplinary segregation and are subjected to restrictions including limitation on their telephone access. Pursuant to Penobscot County Jail Policy F-140, which covers inmate use of telephones, an inmate not in good standing will not be allowed access to collect call phones except as authorized by the shift supervisor or designee for a bona fide reason. Routine lawyer calls do not constitute a bona fide reason. With respect to alternative means of communication, inmates in disciplinary segregation are allowed postage for three personal one-ounce first-class letters each week and they have unlimited writing supplies and postage for the purposes of corresponding with attorneys, courts, or grievance review representatives. They can meet with their attorneys at any time subject to reasonable hour restrictions; these are restrictions that primarily require that the attorney not seek to meet with their client at the time when the inmates are sleeping, eating, or during a formal headcount. The intake log kept by the Jail staff shows that Simpson was allowed to meet with his attorney on October 22, 2001; October 28, 2001; November 2, 2001; January 6; 2002; January 8, 2002; January 15, 2002; and January 21, 2002. Simpson made one request to make a call to arrange bail on December 1, 2001. This request was denied, as described above in the discussion of exhaustion. Simpson asked the jail administrators to provide his associate's address for Simpson and they refused. The defendants assert that Simpson could have met with his attorney on any date that he was incarcerated in the Jail between September 26, 2001, and January 21, 2002. Simpson retorts that he could not arrange visits with his attorney on any day because he was denied phone calls to his attorney. Simpson's claim concerning interference with his ability to post bail falls under the Fourteenth Amendment umbrella that protects Simpson's right to "post-arrest procedural guarantees" such as bail. See Brady v. Dill, 187 F.3d 104, 108 (1st Cir.1999). Simpson's plaint concerning the Jail's policy of denying access to the collect phone can also be characterized as a condition of pretrial detention claim under Bell v. Wolfish, 441 U.S. 520, 99 S.Ct. 1861, 60 L.Ed.2d 447 (1979). Therein the Supreme Court stated: [I]f a particular condition or restriction of pretrial detention is reasonably related to a legitimate governmental objective, it does not, without more, amount to "punishment." Conversely, if a restriction or condition is not reasonably related to a legitimate goal — if it is arbitrary or purposeless — a court permissibly *296 may infer that the purpose of the governmental action is punishment that may not constitutionally be inflicted upon detainees qua detainees. Courts must be mindful that these inquiries spring from constitutional requirements and that judicial answers to them must reflect that fact rather than a court's idea of how best to operate a detention facility. 441 U.S. at 539, 99 S.Ct. 1861 (footnotes and citations omitted). The concern underlying Bell is that the challenged conditions are not "imposed to sanction prior unproven criminal conduct," but are "imposed to enforce reasonable prison disciplinary requirements." Collazo-Leon v. United States Bureau of Prisons, 51 F.3d 315, 318 (1st Cir.1995). It is undisputed that Simpson was given access to two unmonitored calls when he first arrived at the jail in September 2001. It is also undisputed that he had ample access to the phone prior to his October disciplinary segregation. Even after his disciplinary segregation he had the ability to use the mail to reach individuals to help him arrange bail. He also had unlimited ability to send legal mail. Though Simpson argues that the jail officials were unwilling to help him find an address for his associate (making the phone his only recourse to his associate) this refusal to track down an address is not of Constitutional magnitude on its own. The extra delay of relying on the mail to contact his attorney or someone who could do some leg work for him, after Simpson had at least a month prior to his segregation where his phone access was not restricted, does not make this an unreasonable alternative to the phone and is an adequate safeguard of Simpson's right to arrange bail. See cf. Turner v. Safley, 482 U.S. 78, 88, 107 S.Ct. 2254, 96 L.Ed.2d 64 (1987) (observing, in a First Amendment context, that the availability of alternative method of communication was relevant to determining the scope of the burden imposed by the challenged regulation). I also note that Simpson filed one grievance with respect to his need to use the phone to arrange bail. Though the rebuff he received could give an inmate pause about the utility of pressing the matter, the record indicates that Simpson attempted no other avenues of either getting the Jail to allow him access to the phone by providing it with concrete information of how the call was going to allow him to make bail or attempting an alternative method of making the necessary contact beyond the request for his associate's address.[12] The record demonstrates that Simpson was able to meet with his attorney and send mail to him and others; surely others were as capable of helping Simpson locate the address as were the jail administrators. I do not mean to suggest by this analysis that the jail staff had no obligation to respond to Simpson's bail request because he had been unable to make bail initially or because he was in disciplinary segregation. A pretrial detainee's status vis-à-vis ability to post bail can change as a case unfolds and the Jail, given the right set of facts, could find itself confronting a deprivation of constitutional significance if its staff failed to take care to recognize the bona fide nature of bail requests, separate and distinct from routine contact with counsel. These facts do not present that circumstance. *297 With respect to Bell I must gauge whether the restriction or condition was "reasonably related to a legitimate goal" or, conversely, whether it was "arbitrary or purposeless." Bell, 441 U.S. at 539, 99 S.Ct. 1861. First I examine whether the denial of Simpson's request for a call on December 1, 2001, was done with an express intent to punish Simpson. See id.; see also Valdez v. Rosenbaum, 302 F.3d 1039, 1045-46 (9th Cir.2002). The defendants' initiated no action towards Simpson; rather they were reacting to his request. The denial of Simpson's request was pursuant to a policy that prohibited access to the phone for inmates not in good standing. The determination that Simpson's was not a bona fide reason to depart from this prohibition does not support a conclusion that the denial of Simpson's request for a call on December 1, 2001, was done with an express intent to punish Simpson. See Bell, 441 U.S. at 539, 99 S.Ct. 1861; see also Valdez v. Rosenbaum, 302 F.3d 1039, 1045-46 (9th Cir.2002). I must also consider whether a punitive intent can be inferred from the denial. Bell, 441 U.S. at 538-39, 99 S.Ct. 1861. Here I ask "`whether an alternative purpose to which [the restriction] may rationally be connected is assignable for it, and whether it appears excessive in relation to the alternative purpose assigned [to it].'" Id. at 538, 99 S.Ct. 1861 (quoting Kennedy v. Mendoza-Martinez, 372 U.S. 144, 168-69, 83 S.Ct. 554, 9 L.Ed.2d 644 (1963)). The purposes assigned to the denial of the request is that Simpson was in disciplinary segregation because of disorderly conduct including more than one incident of tampering with his door so as to release himself from lock-up (with one of these door tampering incidents occurring on December 1, 2001, the day of Simpson's phone call request.) He was also alleged to have been disobeying orders, threatening, and obstructing jail personnel. Simpson was considered a security risk. Not giving Simpson the special permission he needed under the jail policies to make the phone call is rationally related to minimizing the risk to Jail security. The single denial, particularly in light of the other avenues of communication left open to Simpson, was not excessive in relation to the defendants' justification. Simpson also stresses that the defendants have admitted that the phone policy/denial of request was partially punitive, aimed at sanctioning Simpson (and presumably other inmates not in good standing) for disorderly behavior. Simpson confuses the notion of punishment of a pretrial detainee for the unproven criminal conduct which is the basis for the detention with the notion of punishment for misconduct in the facility. The former is constitutionally impermissible; the latter is not, so long as the "particular condition or restriction of pretrial detention is reasonably related to a legitimate governmental objective." Bell, 441 U.S. at 539, 99 S.Ct. 1861; see also Turner, 482 U.S. at 89, 107 S.Ct. 2254 ("[W]hen a prison regulation impinges on inmates' constitutional rights, the regulation is valid if it is reasonably related to legitimate penological interests.... Subjecting the day-to-day judgments of prison officials to an inflexible strict scrutiny analysis would seriously hamper their ability to anticipate security problems and to adopt innovative solutions to the intractable problems of prison administration."). As indicated above I conclude that Simpson has failed to come forward with sufficient evidence to generate a trialworthy issue on this claim and summary judgment for the defendants is warranted. In re Spigel, 260 F.3d at 31. Conclusion For the reasons set forth above, I hereby GRANT the defendants summary judgment on Simpson's denial of access to the telephone to make bail claim and DENY *298 Simpson summary judgment on that same claim. Simpson's remaining claims are DISMISSED WITHOUT PREJUDICE. So ordered. NOTES [1] Edward Reynolds is now deceased. The parties have not yet moved to substitute the current sheriff. [2] Pursuant to 28 U.S.C. § 636(c), the parties have consented to have United States Magistrate Judge Margaret J. Kravchuk conduct all proceedings in this case, including trial, and to order entry of judgment. [3] The parties have provided factual statements pertaining to the issue of final decision-making authority and polices and procedures. There is no meaningful dispute on this score for purposes of making the municipal liability determination and my conclusions below make it unnecessary for me to set forth these facts in any detail. [4] Simpson's statement of material facts and his reply to the defendants' statement of facts are peppered with legal argument, including discussion of cases and argument on how I should construe the defendants' answers to his complaint; I have culled the material, properly-supported facts from these pleadings. [5] I wrote: Simpson alleges that he submitted a slip on December 1, 2001, requesting a phone call so that he could arrange bail and/or call a lawyer. When this request was denied Simpson submitted on the same day a Penobscot County Sheriff's grievance form indicating that he was a pretrial detainee and that he had a right to use the phone to arrange bail or call an attorney which was denied by Assistant Jail Administrator, Richard Clukey, who stated that it did not meet the criteria of a defined grievance and it did not present a grievable issue. On an unspecified date Simpson submitted a request form asking the jail administration to provide the address for his associate, providing them with his phone number and this request was denied. Regarding his mail privileges, Simpson submitted request forms on December 14, 2001, and January 11, 2002, concerning his mail privileges seeking permission to use his own funds to send additional letters and these requests were denied. Simpson has adequately plead exhaustion for purposes of this motion to dismiss. The defendants' argument that he could have done more does not sufficiently controvert Simpson's claims concerning his efforts to seek redress within the Jail. Compare Ray v. Kertes, 285 F.3d 287, 293, 295 (3d Cir.2002) (holding that the Prison Litigation Reform Act (PLRA) exhaustion requirement is an affirmative defense and that a prisoner need neither plead nor prove exhaustion to proceed under the PLRA, noting that the Second, Seventh, Ninth, and D.C. Circuits have so held) with Knuckles El v. Toombs, 215 F.3d 640, 642 (6th Cir.2000) (holding that a prisoner was required to "plead his claims with specificity and show that they have been exhausted by attaching a copy of the applicable administrative dispositions to the complaint, or, in the absence of written documentation, describe with specificity the administrative proceeding and its outcome"). (Docket No. 26.) Notably, since that decision the First Circuit has joined the Third Circuit (as well as the Second, Seventh, Eighth, Ninth, and D.C.) in concluding that exhaustion is an affirmative defense. Casanova, at 1042 n. 3. A Ninth Circuit panel has just reworked its Wyatt v. Terhune, 280 F.3d 1238 (9th Cir.2002) conclusion vis-à-vis exhaustion as an affirmative defense, adding, among other things, a discussion of the Swierkiewicz v. Sorema, 534 U.S. 506, 122 S.Ct. 992, 152 L.Ed.2d 1 (2002) pleading standard and providing that the defense should be treated as a matter of abatement pursued through Federal Rule of Civil Procedure 12(b) instead of a motion for summary judgment. Wyatt v. Terhune, 305 F.3d 1033, 2002 WL 31103012, *5-9 (9th Cir. 2002); Wyatt v. Terhune, 305 F.3d at 1033 (9th Cir.2002) (denying petition for rehearing en banc and withdrawing opinion published at 280 F.3d 1238). [6] The parties contest this date but the exact date is neither material to the exhaustion question nor the constitutional inquiry. [7] The defendants also state that Simpson's attorney sent Gallant a letter dated December 12, 2001, indicating that Simpson needed access to writing material and the mail for purposes of contacting his attorney and defense witnesses, and also requesting that Simpson be allowed phone access for these purposes. Gallant called the attorney on January 2, 2002, and left a message indicating that Simpson was in disciplinary segregation for three or four months and would not have access to the telephone but that he would have access to writing materials and the mail. She also said that the attorney could visit Simpson during reasonable hours. [8] This is not a situation such as I confronted in Dennison v. Prison Health Services, 2001 WL 761218, *2-3 (D.Me.2001). That plaintiff was a prisoner at the time of filing but was released entirely from custody during the pendency of her suit. I concluded that the § 1997e(a) concern was mooted by her release. Because Dennison raised an acute concern about the judicial efficiency of dismissing the complaint merely to see it re-filed shed of the § 1997e(a) requirement, I found the pragmatic approach advocated in a concurrence and dissenting opinion in an Eleventh Circuit case to be persuasive. See Harris v. Gamer, 216 F.3d 970, 985-86 (11th Cir. 2000) (Anderson, J., concurring; Tjoflat, J., concurring in part and dissenting in part). Nothing that has happened since my opinion in Dennison has changed my view that the problem of exhaustion under § 1997e(a) has to be approached with common sense. [9] I reject the defendants' argument that the date on which Simpson accomplished service on the defendants, April 5, 2002, should be determinative. [10] It is not clear whether the First Circuit would conclude that what is good for the common goose (a prisoner-favorable statute of limitations calculation) is good for the rare gander (a prisoner-adverse "filing" date for a § 1997e(a) determination). See also Morales-Rivera v. United States, 184 F.3d 109, 109 (1st Cir.1999) ("We hold that a pro se prisoner's motion under 28 U.S.C. § 2255 or § 2254 is filed on the date that it is deposited in the prison's internal mail-system for forwarding to the district court, provided that the prisoner utilizes, if available, the prison's system for recording legal mail."). [11] Simpson objected and moved to strike the statement of material fact containing the chronological sequence of these disciplinary infractions. (DFSM ¶ 7; Pl.'s Reply SMF ¶ 7.) In their reply to Simpson's response the defendants have provided a sheath of reports. (Def's Reply Ex. A.) Simpson's rumblings about the disciplinary proceedings and his contention that the Gallant affidavit does not support the statement because she had no personal knowledge of the hearings does not, by any stretch, generate a due process challenge to these charges. Though Simpson argues with the defendants' characterization of the disciplinary process, including whether or not he received a copy of his denied grievance in a timely fashion, Simpson clearly has not and cannot contest the validity of these determinations on due process grounds in this action. See Edwards v. Balisok, 520 U.S. 641, 117 S.Ct. 1584, 137 L.Ed.2d 906 (1997); Heck v. Humphrey, 512 U.S. 477, 114 S.Ct. 2364, 129 L.Ed.2d 383 (1994). The relevance is limited to the fact that Simpson was in disciplinary segregation for what the jail perceived to be a series of disciplinary infractions and, as framed in this case, a determination that the denial of access to bail claim was valid would not imply the invalidity of those disciplinary determinations. [12] Though the allegations of Simpson's complaint concerning access to the phone, mails, and his attorney, taken together supported a claim that the defendant's conduct interfered with his access to courts, this single episode does not support an access to court claim distinct from the analysis conferred here. His other generalized allegations have fallen by the wayside because he failed to exhaust the administrative procedure.
{ "pile_set_name": "FreeLaw" }
Malik Morgan #24 Guard Height: 6'4" Weight: 199lbs. Class: Sophomore City/State: River Ridge, La. High School: John Curtis HS Major: Sports Administration Experience: 2 Letters Career Statistics &dtrif;&rtrif; Bio SOPHOMORE SEASON (2013-14) Season ended early when he suffered a knee injury during the second half of the Auburn game (2/12) … Played in 21 games with six starts prior to injury … One double figure game in the overtime win against Butler (12/1) in the Old Spice Classic … In that game, hit 5-of-11 field goals, including 2-of-3 three-pointers with a season high seven rebounds and three steals, scoring a career tying high of 12 points … Four career games in double figures … Had a strong start at South Carolina (1/11), playing a career best 33 minutes with eight points, six rebounds and four assists … Made nine treys, 34 in two seasons … Averaged 15.5 minutes a game, 4.4 points and 3.1 rebounds a contest. FRESHMAN SEASON (2012-13)Morgan played in all 31 games at LSU, with 14 starts and proved a factor in many games for the Tigers … Averaged 5.3 points per game and 2.9 rebounds, while averaging 18.4 minutes a game … Three games in double figures – 12 at Tennessee (2/19); 11 at Georgia (1/19) and 10 in his first LSU game vs. UC Santa Barbara (11/9) … Eight points against Seton Hall (11/29) where Morgan was 3-of-4 from the field with 2 treys was huge as LSU came from 16-point second-half deficit … Season best 5 assists vs. Mississippi State (2/16) and 5 steals vs. Northwestern State (11/20) … Best of 8 rebounds against Chattanooga (12/11) … Made 25 three-pointers. PRIOR TO LSULed John Curtis to its first Class 2A State Championship in 2012, earning All-State First Team honors from the Louisiana Sports Writers Association … Was named the Class 2A Player of the Year by LSWA … Averaged 18.1 points, five assists and 4.3 rebounds to earn District 10-2A Player of the Year honors and help the Patriots earn the No. 1 playoff seed … Had a career high of 56 points and 10 rebounds in a game versus Riverside Academy … Coach Mike Krajcer was named Coach of the Year as Patriots capped off a 30-3 season. PERSONALBorn on Jan. 31, 1993 … Left handed … Honor Student at John Curtis … Parents are Detra and Sam Morgan … Siblings are Kai Morgan (14) and Kolby Morgan (16) … Mother attended LSU and played volleyball at LSU (1983-86) … Detra (Brown) played on two SEC Championship teams at LSU (1985-86) and led the team in kills, hitting percentage and digs in 1985 … Cousin Aaron Morgan is a football defensive end for the Jacksonville Jaguars … Said LSU was “my dream school since I was a baby since my mother played volleyball at LSU” … Major at LSU is sports management … Likes to watch TV to relax … Lists as his hobby “playing basketball with brother and sister” … Favorite food is Shrimp Pasta … Favorite NBA player of Oklahoma City, but favorite team is the Miami Heat.
{ "pile_set_name": "Pile-CC" }
IggyAzalea.us is not associated with Iggy Azalea, her family/friends or her manager. This is simply a non-profit fansite dedicated to the talented singer. All content posted up on this site is used under the fair use copyright law 107. If anything belongs to you and you would like credit or removal please contact us at gmail before taking any legal actions. Any images and multimedia are copyright to their rightful owners. No copyright infringement is intended. IggyAzalea.us does not knowingly intend or attempt to offend or violate any copyright or intellectual property rights of any entity. Rapper Iggy Azalea says she is now concentrating on executive producing film and TV projects. The 26-year-old star has revealed that she is no more interested in acting but she will remain involved in the industry through her production company, Azalea Street Productions, reported Femalefirst. “There’s no more acting but I actually am doing a lot of executive producing. I’ve got a film coming out next year that I’m producing. “I’m not going to say what network, but I’ve just signed a first rights deal agreement with a big network in America that I am executive producing. We are doing five shows a year for the network, all scripted,” she said. Azalea, however, remained tight-lipped over projects her production company is working on. “I’m not acting but I’m definitely creating a lot of scripted content that you guys will be seeing. I find books and projects and things that I like and I team up with writers and go over the scripts and develop them. “I have a production company called Azalea Street Productions. It is all secret still,” she said. Australian rap superstar Iggy Azalea is the latest recruit to join the X Factor Australia judging panel, which returns to our screen this week just days after it premieres in Australia. We find out what the Fancy singer plans to bring to this year’s series. What type of artists are you hoping to unearth? I’m not necessarily looking for that ballad voice although it would be nice. I think I just really want someone with an interesting story who is an interesting person. Charismatic, warm and friendly. Somebody that I would want to be friends with and everybody is drawn to. I want to really take the time to notice who is memorable and then also who’s talented and can pull it off on stage. But I think sometimes these shows become so much about who can belt it out the most and not enough about personality. I really want to find that person who can still be in people’s minds even when the cameras aren’t rolling anymore. Have you seen any rappers? No, I’m not looking for a rapper. I never really feel like that works in this format. Rap is about song writing and this is about singing and covering other people’s songs, so I don’t know that this works in this format because you’re singing someone else’s lyrics and you also don’t necessarily have a vocal ability, so what are you showcasing if they’re not your lyrics? It kind of gets into murky water, lost in translation. The ‘Black Widow’ hitmaker – who was born in Sydney and grew up in Mullumbimby – sees America as her home now but enjoys returning to her birth country from time to time. She said: ‘I mean, to be honest with you, my home is in America. I’ve lived there for a decade, that’s where I live. It’s great to come back and visit my grandparents, but there is no home connection. It would be like you going home to where you lived when you were nine, I kind of don’t associate with that anymore.’ And the 26-year-old singer is ‘proud’ of the success she has achieved. She added to Australia’s Herald Sun newspaper: ‘To be the best, you want to compete with the best. The people I saw back then who I saw in the charts, who were at the top of our charts, were American. ‘I am proud, but I think anybody would be proud of the success that I’ve had, whether they come from a big city or a small town. It’s tough, no matter what.’ Meanwhile, Iggy will return to Australia following the announcement she will be a new judge on The X Factor. She said previously: ‘I hope it will be a bit of a summer getaway and I can work too. It will be summer so hopefully I can get out and chill and show everybody that is coming with me the good food and the beach and play some tennis and ride horses. ‘Spending a month in Australia is the longest I will have spent there in literally like 10 years. Aussie rapstress Iggy Azalea appears to be turning her attention to producing content for NBCUniversal. The “Team” performer just signed a production deal with the company to create original content. Azalea made the announcement via Instagram with a photo of her signature on the contract. “Wanted to share with everyone that my production company ‘Azalea Street’ has just signed on to create original content for Universal NBC! So guys, I’m an Executive Producer for at least a few years to come! Hopefully many! Lots of scripted series in the works! Lots of interesting ideas!” This partnership between Azalea’s company and NBCUniversal appears to have been in the works for some time. She mentioned her interest in producing content during a recent interview with Notion magazine. “I would still like to get into producing movies and television series, behind the scenes and will be doing that in the next one or two years.” So, if you’re waiting on Azalea’s sophomore album, you’re going to need to keep waiting. But that doesn’t mean she isn’t hard at work! Rapper Iggy Azalea has bought a new home and is busy decorating it following her recent split from her ex-fiance Nick Young. The “Fancy” hitmaker, 26, seems she’s keen to wipe clear any memories she has of her former lover by setting up home elsewhere and putting her own stamp on the interiors, reported Conmtactmusic. Taking to her Twitter account, she said, “Can’t wait to get home and get started on fixing up my new place. I’ve been annoying Adam and Guy talking about carpet all week (sic).” The 26-year-old rapper moved out of the home she shared with Nick in Tarzana, California, late last month after she saw the NBA basketball player getting frisky beneath the sheets with a mystery woman on their home CCTV. Azalea and Young began dating at the beginning of 2014 and got engaged in 2015, but their romance was rocked earlier this year when the “Team” hitmaker had to suffer the indignity of a video leaking online which showed Nick admitting to his Los Angeles Lakers teammate D’Angelo Russell that he had cheated on her with a teenager. Iggy Azalea is gearing up to join a new “team.” The 26-year-old has confirmed she’s taking her talents down under to join the judges’ panel on The X Factor Australia. “I understand what it’s like to have giant dreams and intend to help other young Australians achieve theirs by sharing my knowledge and developing their talent in collaboration with The X Factor,” the Sydney-born artist said in a statement. Iggy will replace Dannii Minogue (sister of Kylie) on the talent show’s upcoming eighth season, though her fellow co-judges have yet to be announced.
{ "pile_set_name": "Pile-CC" }
× Project Code //Display window size int widthD= 400; int HeightD= 600; int score=0; int lives=5; //Bricks int spaceBetweenBricks= 5; int numberOfBricks= 10; int numberOfBrickRows= 10; int spaceFromCeiling= 20; //space between the first row of bricks and the ceiling float brickWidth= (widthD-(numberOfBricks-2)*spaceBetweenBricks)/numberOfBricks; float brickHeight= 10; color brickColors[]= {color(255, 0,0), color(125, 125, 0),color(255,125,0),color(0,255,0),color(0,0,255),color(0, 125, 125),color(0,125,255),color(255,125,255),color(255,0,255),color(255,125,125)}; color brickColor= color(255,0,0); ArrayList<Block> BasketOfBricks= new ArrayList<Block>(); //Ball int ballWidth= 16; float ballStartX=random(widthD); float ballStartY=HeightD/2; color ballColor= color(255, 0, 0); color ballColor1= color(0,0,255); Ball Moe= new Ball(ballStartX, ballStartY, ballWidth, ballColor); Ball Raisin= new Ball(ballStartX, ballStartY, ballWidth, ballColor1); //Paddle int paddleX= widthD/2; int paddleY= HeightD-50; int paddleHeight= 20; int paddleWidth= 70; color paddleColor= color(255, 0, 255); Block paddle= new Block(paddleX, paddleY, paddleWidth, paddleHeight, paddleColor); void setup() { size(widthD, HeightD); background(255); setupBricks(); } void draw() { if(lives>0){ background(0,0,0); drawBricks(); drawBall(); drawPaddle(); drawText(); } else if (lives==0){ background(0,0,0); fill(255,0,0); displayText("You're a loser",width/4,height/2,false); } if (BasketOfBricks.size()==0){ background(0,0,0); fill(255,255,0); displayText("You're a winner",width/4,height/2,false); } } //initialize all the bricks void setupBricks() { for(int brickNumber=0; brickNumber<numberOfBricks;brickNumber++){ rect((brickWidth+spaceBetweenBricks)*brickNumber,spaceFromCeiling,brickWidth,brickHeight); for(int rowNumber=0; rowNumber<numberOfBrickRows;rowNumber++){ color brickColor=(brickColors[rowNumber]); BasketOfBricks.add(new Block((brickWidth+spaceBetweenBricks)*brickNumber,((brickHeight+spaceBetweenBricks)*rowNumber)+spaceFromCeiling,brickWidth,brickHeight,brickColor)); } } } //draw the bricks void drawBricks() { for(int brickNumber= BasketOfBricks.size()-1; brickNumber>=0; brickNumber--) { Block brick=BasketOfBricks.get(brickNumber); brick.draw(); if (brick.collidesWith(Moe)){ BasketOfBricks.remove(brick); updateScore(); } } } //draw the ball void drawBall() { Moe.update(); Moe.draw(); if (Moe.checkWallCollision()) { updateLives(); Moe.move(width/2,height/2); } } //draw the paddle and have it move with the mouse void drawPaddle() { paddle.draw(); paddle.move(mouseX, paddleY); paddle.collidesWith(Moe); } //drawText void drawText() { fill(255,125,150); displayText("Score:" +score,0,height,false); displayText("Lives:" +lives,2*width/3,height,false); } void displayText(String message, int x, int y, boolean isCentered) { textSize(32); String name= message; float textX= x; if (isCentered) { float widthText= textWidth(name); textX= (width-widthText)/2; } int textY= y; text(name, textX, textY); } void drawLose() { } void updateScore() { score=score+10; } void updateLives() { lives=lives-1; } /*******Ball Class**************/ /* The default class has the following default modes * Constructor function: to create a new ball call: Ball ballName= new Ball(x, y, Width, Color); * ballName.draw(); //this draws the ball * ballName.update(); //this moves the ball * ballName.checkWallCollision(); // */ class Ball { float ballX; float ballY; float ballWidth; color ballColor; float speedY= -10; float speedX= 10; float ballR=ballWidth/2; //This is constructor known as the function that initiates Ball(float x, float y, int Width, color Color) { ballX= x; ballY= y; ballWidth= Width; ballColor= Color; } //this draws the ball on the screen void draw() { noStroke(); fill(ballColor); ellipse(ballX, ballY, ballWidth, ballWidth); } //this changes the ball to the speed; void update() { ballX+=speedX; ballY+=speedY; } void move(int X, int Y) { ballX=X; ballY= Y; speedY= 7; speedX= 7; } //this does the bounce boolean checkWallCollision() { if (ballX>width-ballWidth/2) { speedX=-abs(speedX); } else if (ballX<ballWidth/2) { speedX=abs(speedX); } if (ballY>height-ballWidth/2) { speedY=-abs(speedY); return true; } else if (ballY<ballWidth/2) { speedY= abs(speedY); } return false; } } /*******Block Class**************/ /* The default class has the following default modes * Constructor function: to create a new block call: Block blockName= new Block(x, y, Width, Height, Color); * blockName.draw(); //this draws the ball * blockName.move(x, y); //this moves the block to be centered on X and Y * blockName.collidesWith(Ball b); //checks if it collided with the ball * //and makes the ball bounce * blockName.setHits(int numberOfHits); //allows you to set the number of times a brick needs to hit * blockName.getHIts(int numberOfHits); //tells you how times left the brick can be hit */ class Block { float blockX; float blockY; float blockWidth; float blockHeight; color blockColor; int maxHits= 1; int hits=maxHits; //This is constructor known as the function that initiates Block(float x, float y, float Width, float Height, color Color) { blockX= x; blockY= y; blockWidth= Width; blockHeight= Height; blockColor= Color; } //this draws the block on the screen void draw() { noStroke(); fill(blockColor); rect(blockX, blockY, blockWidth, blockHeight); } //this moves the block //to be centered on X, Y coordinates void move(int X, int Y) { blockX=X-blockWidth/2; blockY=Y-blockHeight/2; //prevents it from going off screen on the X direction if (blockX+blockWidth>width) { blockX=width-blockWidth; } else if (blockX<0) { blockX=0; } //prevents it from going off screen on the the Y direction if (blockY+blockHeight>height) { blockY=height-blockWidth; } else if (blockY<0) { blockY=0; } } //allows you to change the number of times an individual block can be hit void setMaxHits(int numberOfHits) { maxHits=numberOfHits; hits= maxHits; } //tells you if the brick can be hit more //returns 0 if the brick needs to be removed //useful if you want the brick hit multiple times int getHits() { return hits; } //returns a boolean if it collides with a ball. // It automatically changes the speed of the ball boolean collidesWith(Ball b) { //collides with bottom of block if ((b.ballX+b.ballWidth/4>blockX && b.ballX-b.ballWidth/4<blockX+blockWidth) && (b.ballY-b.ballWidth/2<(blockY+blockHeight) && b.ballY-ballWidth/2>blockY)) { //println("Collision Bottom 2 "); b.speedY=abs(b.speedY); hits--; return true; } //collides with top of block if ((b.ballX+b.ballWidth/4>blockX && b.ballX-b.ballWidth/4<blockX+blockWidth) && (b.ballY+b.ballWidth/2<blockY+blockHeight && b.ballY+b.ballWidth/2>blockY)) { //println("Collision Top "); b.speedY=-abs(b.speedY); hits--; return true; } //collides with Left side of block else if ((b.ballY+b.ballWidth/4>blockY && b.ballY-b.ballWidth/4<blockY+blockHeight) && (b.ballX+b.ballWidth/2>blockX && b.ballX+b.ballWidth/2<blockX+blockWidth)) { //println("Collision Left "); b.speedX=-abs(b.speedX); hits--; return true; } //collides with Right side of block if ((b.ballY+b.ballWidth/4>blockY && b.ballY-b.ballWidth/4<blockY+blockHeight) && (b.ballX-b.ballWidth/2<blockX+blockWidth && b.ballX-b.ballWidth/2>blockX)) { //println("Collision Right"); b.speedX=abs(b.speedX); hits--; return true; } return false; } }
{ "pile_set_name": "OpenWebText2" }
Retailers had worse sales in November than expected — because of Sandy. The economy isn’t doing as well as experts thought it would — because of Sandy. New home sales were weaker than first reported — because of Sandy. Hurricane Sandy, of course, was a mighty disaster. But it is a godsend to anyone who needs an excuse. Didn’t do your term paper? Blame Sandy. Missed a credit-card payment? It’s Sandy’s fault. Hell, I’m going to plead emotional distress — because of Sandy — the next time I get a traffic ticket, forget to hold open a door or jaywalk. So you can now expect any company, especially those selling or doing anything on the East Coast, to blame the infamous hurricane. This will go on for months. Sandy is like spackle: it covers a whole lot of mistakes. If you want to entertain yourself for a few seconds, put the words “because of Sandy” into a Google search, and you’ll see that everything from blood drives to restaurants to pay phones to college application deadlines were affected by the storm. I mention this because the Labor Department will announce its employment numbers this Friday. They aren’t supposed to be very good — only 90,000 new jobs compared with the 171,000 jobs that magically appeared just a few days before the presidential election. As I’ve mentioned before, the last two employment reports were unusually — and suspiciously — strong. A person with a skeptical mind might think this was because the Democrats needed good economic reports to hold power. President Obama will be in office for another four years, and there is now no real reason to prove statistically that the economy is stronger than it really is. In fact, with the current fiscal-cliff talks, it might be better for the administration to show economic weakness so that the Republicans are forced to negotiate. Besides, if Friday’s number is less than the 90,000 expected, or the unemployment rate goes higher than the anticipated 8 percent (from 7.9 percent), Sandy will be blamed. I have a prediction: a lot of newborns in 2013 will be named — you guessed it — Sandy because of Sandy. *** In my last column, I wrote about pedophiles posting their filth on Facebook. But this isn’t just Facebook’s problem. Companies that advertise on the site are going to be humiliated someday when their ads run alongside sexually explicit images of children. And this is a format problem that only a complete overhaul of Facebook’s design will solve. As it now stands, the advertisements that come up on a Facebook user’s screen are meant entirely for that user. What I mean is, if a person’s Facebook profile says he has a family, the ads will reflect that with, for instance, lots of insurance and financial-services companies. It doesn’t matter what the Facebook user is looking at on the left part of his screen. Those ads come up automatically on the right side. So when The Post’s computer technician and I were investigating the disturbing photos the other day, we saw a stack of ads for MasterCard, Dunkin’ Donuts, State Farm Insurance, the state of Arizona, a game called “Battle Pirates” and Kim Crawford Wine on the same screen. I wonder what those companies would think if they knew. * Wall Street may care about Friday’s jobs report, but the thing that really matters on Main Street is income statistics. Here are some: According to the Federal Reserve, real median household income was up just 1.2 percent in October from this year’s low of $50,757 in April. The current $51,089 income level is slightly above what it was at the end of last year. Median income was $54,761 in October 2007. So, you see the problem? Well, you really don’t get the whole sense from those numbers. Besides this drop-off in income, households are also getting hurt on their investments. Sure, the Standard & Poor’s 500 index is up nicely this year, and the Dow Jones industrial index has some gain. But people aren’t likely to cash in stocks — and have to record a gain or loss on taxes — when they want to make a purchase. They are more likely, in my experience, to look at their bank accounts, see interest income and spend the money that their money has made. But interest income is so puny these days because rates are being held at historic lows by the Fed. Bottom line: Households are not only earning less at work but also getting less return on their savings. Add to that the possibility of higher taxes at the end of the year, and you can probably can see why the economy is in a perpetual state of blah. The only states in which consumers should be feeling any better are those where marijuana has been legalized. My favorite joke of the week is Obama asking for an end to the US debt ceiling. With the Fed already having created $3 trillion in an alternate currency to buy its quantitative-easing bonds, the idea of also giving Washington a blank check on spending is pretty hilarious. I wonder how hard our kids will be laughing 10 or 20 years from now when they endure the 1920s German experience of having to cart wheelbarrows full of currency to the supermarket.
{ "pile_set_name": "Pile-CC" }
This application claims the benefit of Korean Application No. 2000-46938, filed Aug. 14, 2000, the disclosure of which is hereby incorporated herein by reference. The present invention relates to semiconductor devices, and more particularly, to duty cycle correction circuits. Recently, the speed of semiconductor memory devices, for example, dynamic random access memories (DRAMs), has increased to improve the performance of existing systems. However, increasing demand for improved systems may require DRAMs that can process even more data at even higher speeds. Accordingly, synchronous dynamic random access memories (SDRAMs) that operate in synchronization with system clocks have been developed for a high-speed operation, thus significantly increasing data transmission speeds. There are limitations on the amount of data that may be input to and/or output from a memory device per clock cycle of a system clock. To address these limitations, dual data rate (DDR) SDRAMs have been recently developed in order to further increase the transmission speed of data. DDR SDRAMS input and/or output data in synchronization with both the rising edge and the falling edge of a clock. Reliable data transmission is possible when the duty cycle of a clock signal is equivalent at 50%, which is ideal, in a DDR SDRAM or a direct rambus dynamic random access memory (RDRAM). Thus, when a signal having a duty cycle that is not equivalent, i.e. greater than or less than 50%, is provided as an input, the signal typically does not perform very well as an input signal. Duty cycle correction circuits have been developed to address this problem. A block diagram of a conventional duty cycle correction circuit is illustrated in FIG. 1. A duty cycle correction circuit includes a duty cycle corrector 10 and a detection circuit 13. The duty cycle corrector 10 generates a pair of complementary input signals IN and INB, from which distortion is typically removed, in response to first and second complementary clock signals CLK and CLKB, having distortion resulting from nonequivalent duty cycles. The detection circuit 13 feeds back first and second detection signals DETECT and DETECTB obtained by detecting distortion in the duty cycles of the complementary pair of input signals IN and INB of the correction circuit 10 in response to the pair of complementary input signals IN and INB. Now referring to FIG. 2, a circuit diagram of a conventional detection circuit 13 of FIG. 1 will be discussed. When mismatching exists among diode-connected loads M1 and M4, cross-coupled loads M2 and M3, source coupled pairs M5 and M6, and/or the respective transistors in the detection circuit 13, increased distortion may occur in the duty cycles of the pair of complementary input signals IN and INB due to mismatching of the respective transistors, even though less distortion is present in the duty cycles of the complementary pair of clock signals CLK and CLKB. Semiconductor devices according to embodiments of the present invention include a duty cycle correction circuit having a duty cycle corrector and a detection circuit. The duty cycle corrector generates a first input signal having a second duty cycle with a higher degree of equivalence than the first duty cycle in response to a first detection signal and a first control signal having a first duty cycle. The detection circuit generates the first detection signal in response to the first input signal. The detection circuit includes a current source having first and second current sources and a bias circuit that is electrically coupled to the first and second current sources and controls a bias of the first and the second current sources responsive to the first input signal. In some embodiments of the present invention, the duty cycle corrector further generates a second input signal having a fourth duty cycle with a higher degree of equivalence than the third duty cycle in response to a second detection signal and a second control signal having a third duty cycle. The detection circuit, in other embodiments of the present invention, further generates the second detection signal in response to the second input signal. In further embodiments of the present invention, the duty cycle correction circuit includes a load matching circuit that is electrically coupled to the first and second current sources and matches a load of the bias circuit in response to the second input signal. In still further embodiments of the present invention, the first control signal is a true clock signal and the second control signal is a complementary clock signal. Furthermore, the first and second input signals are complementary signals and the first and second detection signals are complementary signals. In some embodiments of the present invention, the duty cycle correction circuit further includes a first output driver circuit that pulls the first detection signal up or down in response to the first input signal and a second output driver circuit that pulls a second detection signal up or down in response to a second input signal. The current generated by the current source is supplied to the first output driver circuit, the second output driver circuit and the bias circuit responsive to a bias voltage. The bias voltage may be a voltage at a first node during a period and is calculated according to the equation VNODB+VNODCxe2x88x92VDDxe2x88x92GND. VNODB is the voltage at a second node, VNODC is the voltage at a third node, VDD is a source voltage, and GND is a ground voltage.
{ "pile_set_name": "USPTO Backgrounds" }
If you're a Baltimore Ravens fan, you're probably itching to see the 2016 season get started after a frustrating 2015 campaign left you wanting much more. Unfortunately, several months stand in front of us and the week one opener against the Buffalo Bills. But there isn't anything wrong with reckless predictions and rampant speculation about how the season will go, and with that in mind, I decided to see how EA's Madden NFL series thinks the Ravens will fare in the 2016 season. Week 1: Buffalo at Baltimore After a nice kickoff return by Keenan Reynolds (nearly forty yards) quarterback, Joe Flacco's first drive back from injury is a success. A nice dosage of Justin Forsett, as well as some long gains by Steve Smith Sr. and Maxx Williams, put the Ravens down at the three-yard line, where Flacco would run it in himself (I guess that knee is doing okay). BAL- 7, BUF- 0 Buffalo's next drive exclusively featured handoffs to LeSean McCoy until the Bills got into Ravens territory. When they finally decided to air it out, Taylor is picked off by Jimmy Smith who would add about 9 yards on the return. Nothing of note happened until the second quarter when Buffalo drove down near the goal line, where fullback Mike Gillislee punched it in from the 3. BAL- 7, BUF- 7 After the next Ravens possession stalled, Buffalo would get the ball back and take it back down into the red zone, and hand it off to McCoy for a two-yard score. BAL- 7, BUF- 14 Down by 7, the Ravens needed to answer and they sure did. On a drive assisted by a long penalty, the Ravens handed it off to Buck Allen and Justin Forsett most of the time, until a 3rd and 4 saw Flacco hit his pal Steve Smith Sr. for a 23-yard score late in the second (Welcome back). BAL- 14, BUF- 14 After stalled drives by both teams, Buffalo would breach Ravens territory after a 15-yard penalty, setting up Tyrod Taylor to hit Leonard Hankerson for a 41-yard touchdown. BAL- 14, BUF- 21 Following halftime, Buffalo would get the ball right back, and drive down the field once again with momentum on their side. They continue to use the ground game to their advantage, pounding the rock with McCoy and Karlos Williams, the latter of which would score on a four-yard run halfway through the third. BAL- 14, BUF- 28 Once again, the Ravens need to answer, and once again they do just that. Kamar Aiken is a spark plug for the offense, catching two passes for 44 yards on this drive, that would eventually end with a three-yard touchdown pass to Benjamin Watson (Welcome to Baltimore). BAL- 21, BUF- 28 Buffalo would get the ball back near the end of the third, but do nothing with it, and the Ravens would soon see themselves in the driver's seat to tie the game. Getting the ball at their own 25, they mostly hand it off to Forsett, until they see an opportunity to once again feed the beast. On a 2nd and 6 in Bills territory, Flacco throws deep to Steve Smith Sr., who hauls in his second touchdown of the game, this time from 32 yards out. BAL- 28, BUF- 28 Both teams exchanged punts until a little bit into the fourth quarter when the Bills took advantage of a long penalty and a 21-yard completion to Marquise Goodwin to take the lead through a six-yard touchdown run from McCoy. BAL- 28, BUF- 35 The Ravens defense is not coming through today, and if the team has any hope of winning, they'll need another drive out of the offense. Unfortunately, they don't quite get it on the next possession. After a long reception by Aiken and a nice run by Forsett, Flacco is picked off by former Raven Corey Graham at the Buffalo 41. Now with momentum on their side, a long completion to Sammy Watkins looked like it could have been the dagger in this game, but Tyrod Taylor gift wrapped his old team an opportunity when Jimmy Smith picked him off at the Ravens 19 yard line. With 6:18 left to go in this one, the Ravens will be happy to force overtime at this point, but to do that, they'll need to put together a drive or two. That won't happen immediately, as an offensive foul prevents them from doing anything on the drive following the interception. Now set up on their own 30, it looked like Buffalo could potentially fork the Ravens yet again, but, yet again, they throw away their opportunity to do so (Literally). Newly converted free safety Lardarius Webb picks off Taylor, and adds twenty yards on the return, setting the Ravens up with a late opportunity to equalize from the Buffalo 17. They waste no time doing so, as Forsett handles the ball a few times, before scoring on a nine-yard reception. BAL- 35, BUF- 35 Buffalo's next drive quickly stalls after two incompletions to Sammy Watkins, and the Ravens would get the ball on their own 9 with a chance to win the game. They do well to get out of their own territory, relying heavily on Forsett and Smith Sr. to get them to the other side of the field. Finally in scoring position, a sack and an offensive penalty stalls the Ravens a bit, but a short rush by Buck Allen and a long reception by Benjamin Watson sets up Justin Tucker for a 48-yard field goal, which he puts through with 1:58 left to go in the game. BAL- 38, BUF- 35 Looking to perform some late game heroics against his former team, Tyrod Taylor could not be more perfectly set up. Down three with 1:54 left to go and three timeouts, the Bills seem ready to gash a tired Ravens defense, and that's exactly what they do at first. Using a combination of his legs and the short passing game, Taylor gets Buffalo to the Ravens 44 yard line where he faces a 3rd and 7. Unable to find anyone, he scrambles forward for a 5 yard gain, which brings out kicker Dan Carpenter to attempt to tie the game. His 56-yard attempt is... no good! BAL- 38, BUF- 35 With :44 seconds left in the game, the Ravens are set up to leave week one as winners. A quick three and out on three rushing attempts kills some clock and forces Buffalo to use all of their timeouts. The Bills get the ball back on a touchback punt, but aside from a few rushes from Taylor, they do nothing with it. Your Baltimore Ravens are virtually 1-0! Notable Ravens Stats: Joe Flacco- 21 of 35 for 287 yards and 4 touchdowns and 1 interception for an 112.4 rating. He also added a rushing touchdown. Justin Forsett- Ran the ball 31 times for 151 yards, and had a nine-yard receiving touchdown. Steve Smith Sr.- Caught 6 passes for 111 yards and two touchdowns. Kamar Aiken- Caught five passes for 91 yards. Ben Watson- Caught four passes for 27 yards and a touchdown . C.J. Mosley- 20 tackles (!) and a pass deflection. Eric Weddle- nine tackles and pass breakup. Albert McClellan- Started alongside C.J. Mosley and had 8 tackles as well as a forced fumble. Kamalei Correa- six total tackles. Jimmy Smith had two interceptions, and Lardarius Webb added one as well. What did you guys think of this in depth prediction of our week one showdown with the Bills? Let us know in the comments below.
{ "pile_set_name": "OpenWebText2" }
About Me When was the last time you had your air ducts professionally cleaned? Do you know what could be building up in the air ducts in your home? Do you have anyone in the home with breathing sensitivities or allergies? The air ducts in my home were seriously neglected for many years. I had no idea that the dust and debris in the air ducts were what was causing a lot of my allergy symptoms. After the duct cleaning technician explained to me what was in the air ducts, I fully understood the importance of such a service. To learn what could be lurking in your air ducts, visit my site.
{ "pile_set_name": "Pile-CC" }
Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies. aging workforce If you're like most businesses, you've already cut costs and avoided unnecessary expenses. At this point, you might feel like you've exhausted all the possibilities for managing costs and driving significant savings. This eBook looks at how you can cut costs even further without stifling business growth or reducing your workforce. Are your people and customers fully engaging with each other? That’s the question many small and midsize businesses are trying to answer. Employees are scattered. So are clients. Today’s office can be a kitchen counter or an airline seat. Customers demand excellent experiences regardless of device. Mobile devices reign supreme. The workforce and your customers are global — and moving at a relentless pace. With Avaya IP Office, everyone will now be engaged with a complete, across-the-board solution that brings it all together. Read this paper to learn how Avaya IP Office will help give your business a competitive edge. Add Research About us DatacenterDynamics is a brand of DCD Group, a global B2B media and publishing company that develops products to help senior professionals in the world's most ICT dependent organizations make risk-based infrastructure and capacity decisions. Our portfolio of live events, online and print publishing, business intelligence and professional development brands are centred on the complexities of technology convergence. Operating in 42 different countries, we have developed a unique global knowledge and networking platform, which is trusted by over 30,000 ICT, engineering and technology professionals.
{ "pile_set_name": "Pile-CC" }
Q: Show HyperLinks in Gridview I have an XML file and it contains data about products,and the most interesting data is a url that takes user to the page of thah product.I have successfully extracted urls from that XML file into XmlNodeList and then I put them into DataTable so these urls can be displayed in ASPxGridview.But these urls are shown as text and are not clickable.How to convert the text into HyperLinks?Thanks in advance! A: You are looking for a HyperLinkField: http://msdn.microsoft.com/en-us/library/system.web.ui.webcontrols.hyperlinkfield.aspx You'd bind the url to the DataNagivateUrlFields property. Edit with code example: <asp:gridview id="gv1" autogeneratecolumns="true" runat="server"> <columns> <asp:hyperlinkfield text="View Product" DataNavigateUrlFields="url" /> </columns> </asp:gridview>
{ "pile_set_name": "StackExchange" }
Expression, regulation and biological actions of growth hormone (GH) and ghrelin in the immune system. Immune and neuroendocrine systems have bidirectional communications. Growth hormone (GH) and an orexigenic hormone ghrelin are expressed in various immune cells such as T lymphocytes, B lymphocytes, monocytes and neutrophils. These immune cells also bear receptors for hormones: growth hormone receptor (GHR) for GH and growth hormone secretagogue receptor (GHS-R) for ghrelin. The expression of GH in immune cells is stimulated by ghrelin as in anterior pituitary cells, whereas the regulation of GH secretion in the immune system by other peptides seems to be different from that in the anterior pituitary gland. Cytokines and mitogens enhance GH secretion from immune cells. GH has several biological actions in the immune system: enhancing thymopoiesis and T cell development, modulating cytokine production, enhancing B cell development and antibody production, priming neutrophils and monocytes for superoxide anion secretion, enhancing neutrophil adhesion and monocyte migration and anti-apoptotic action. Biological actions of ghrelin include attenuation of septic shock and anti-inflammatory actions, modulating phagocytosis, and enhancing thymopoiesis. The effect of ghrelin may be direct or through GH production, and that of GH may be direct or through insulin like growth factor-I (IGF-I) production. Elucidation of the roles of GH and ghrelin in the immune system may shed light on the treatment and prevention of immunological disorders such as AIDS and organ damages due to obesity/ageing-related chronic inflammation.
{ "pile_set_name": "PubMed Abstracts" }
*((c*c**(5/4)*c)/(c*c**(-12)/c))**(-11) assuming c is positive. c**(-7577/28) Simplify (v/v**0)**(-1/6)/(v**(-1/4))**(34/5)*v*(v/((v**(1/5)*v*v*v)/v))/v*v*(v/(v/(v**(2/13)/v)))/v*v**(-8)/((v*v**6*v)/v*v*v*v) assuming v is positive. v**(-722/39) Simplify ((z*z*z**(-2/7))**(-28))**(-5/2)*(z**0)**39*(z/(z/((z/(z*z**(-3/2)*z*z*z)*z*z*z)/z))*z)/z*z/(z*z**(-1/2)*z) assuming z is positive. z**120 Simplify ((v**(-1/4)/(v*v**(2/13)))/(v**(-6)/v*v**(1/7)))/((v/(v/(v/(v**3/v))))/v*v**(3/7))**(-1/36) assuming v is positive. v**(8861/1638) Simplify ((c*(c**(-6/5)*c)/c*c)/c*c*((c**22*c)/c)/c*c**26*c**(-26))**(-1/15) assuming c is positive. c**(-109/75) Simplify (h**9/(h**(-2/3)*h)*h**(-1)/(h/(h/(h*h**(-7/3)*h*h*h))))**(-37) assuming h is positive. h**(-222) Simplify ((k/((k**(-1/3)*k*k)/k)*k)/(k/(k*k/k**(-3)*k*k)))**(-30)*(k/(k**0*k))**(-16/7)/((k/k**3)/k**3) assuming k is positive. k**(-215) Simplify ((((t/(t*t/(t*(t/(t**(10/17)/t))/t)*t))/t*t/(t*t**(1/45)*t)*t*t*t*t)**(-3/10))**(-42/11))**(1/22) assuming t is positive. t**(7441/102850) Simplify (q*q/q**45)/q**40*q/(q*((q**(-31)/q)/q)/q)*q**(-2/83) assuming q is positive. q**(-4069/83) Simplify (i*i/i**(-2/3)*(i*i**(-2)*i)/i*i)/(i**(-5)*i**(-2/5))*((i**(-2)*i)**(-30))**20 assuming i is positive. i**(9121/15) Simplify ((v/v**(7/5))/(v/v**(5/3)*v))**45/((v*v**1/v)**41*(v*(v/(v**(2/21)*v))/v)/((v*v*v/(v/(v**(4/5)/v)))/v)) assuming v is positive. v**(-7676/105) Simplify ((k**(-21)*k*k**17)/(k/(k*k**(-1/8)/k))**21)**42 assuming k is positive. k**(-4473/4) Simplify ((i**2/i)/i**(-1/31)*(i*i**(-2/39))/i**(-13))**(-1/3) assuming i is positive. i**(-18112/3627) Simplify (j*j*j**3*j/((j**(-2)*j)/j)*j*j)**42*(j**(-6)/(j*j*j/(j*(j*j**(-2))/j*j)))**49 assuming j is positive. j**(-21) Simplify ((x**0/x)**(2/9)/((x**(-1/12)*x*x)/x**(-3)))/(x/x**(-3/8)*x/x**(-1)*x**(-7)/(x*x/x**(2/9))) assuming x is positive. x**(19/72) Simplify (((m**(-1)*m*m)**(42/13)*(m*m**1/m)**7)**39)**(-3/16) assuming m is positive. m**(-1197/16) Simplify ((y**35/(y*(y/(y**16/y))/y))/((y*y/y**(1/11))/((y**7*y)/y)))**11 assuming y is positive. y**595 Simplify d*d**(-4)*d*d*d**(-1/4)*(d*d**(-1/4))/d**(-1)*(d**(-1)/d**(-2/11))/((d/(d*d**(-2)/d))/(d**4/d)) assuming d is positive. d**(-7/22) Simplify (y/y**(-2))/y*y*y**(-1/5)*(y/y**0*y)/y**(-2/7)*(y**5/y*y/y**(-4)*y)/(y/(y**0/y)*y*y)**(-49) assuming y is positive. y**(7388/35) Simplify ((d**(-1))**(-5/2))**(-15)/(((d*d**(4/7)/d)/(d**0/d*d))/((d**(-2/11)/d)/d**(5/6))) assuming d is positive. d**(-9260/231) Simplify (l**(2/17)/l**2)/(l**(-1/2)/l)**8*(l**(-3)/(l*l**(-1/13)))/(l**(-1/5)*l**8) assuming l is positive. l**(-1774/1105) Simplify (y**3*y**(-2/15))**(1/9)*(y/y**(-2))**34/(y**5/y*y*y*y**(-1/15)) assuming y is positive. y**(13012/135) Simplify ((((z/z**(1/7))/z*z)/z*z)/z**(-2/5)*z**1/z**(-6))/(z**(-4)/z**(-5)*z/z**(6/7)*z**(-5)) assuming z is positive. z**(424/35) Simplify (l**(4/7)*l**(1/4)*(l/(l/(l*l/l**3*l)*l*l))/l**(-2/9))/((l**(4/5)*l**(1/10))/(l**(2/9)*l**(-1)*l*l)) assuming l is positive. l**(-799/1260) Simplify ((z**(-1/68))**(-2/93)*(z*z**13)**(-31))**(2/39) assuming z is positive. z**(-1372307/61659) Simplify ((f*f*f**17*f)**(-11/4)/((f*(f*f**(1/22)*f*f)/f)/(f**24/f)))**(-12/13) assuming f is positive. f**(4626/143) Simplify ((s/s**1)/(s**(-1/3)*s*s))**(21/5)*s/(s/(s/s**4))*((s*s/(s*s**(2/7)))/s)/s*(s**(-2/5))**(-31) assuming s is positive. s**(39/35) Simplify (((h**(-5)/h)/h)**(-6)/(h**(-1/9)/(h/h**(-2/15)*h)))**(-32) assuming h is positive. h**(-63712/45) Simplify ((r*(r/(r/((r/r**(-1))/r))*r)/r)**25)**(-28)/(((r*r/((r**(-1/4)*r)/r)*r*r)/r**7)/(r**2/r**(-3))) assuming r is positive. r**(-5569/4) Simplify ((s**(-2/69)*s/s**(-1/27))/((s/((s/s**(2/51))/s))/(s/(s**(-1/8)/s))))**(1/38) assuming s is positive. s**(176837/3209328) Simplify ((l*l**29*l)/l)/((l/((l*l**(-27)*l)/l))/l)*(l**(-4/3)*l*l)/l**(-34) assuming l is positive. l**(116/3) Simplify (c/(c**(-8)*c)*c**(4/9)*c**8/c*c**(-4))/((c*c/(c*c**0))/c**(3/11)*c*c**5/c*c*c**5) assuming c is positive. c**(-28/99) Simplify ((x**(6/7)/(((x/x**18*x)/x)/x))/(x/(x**7/x)*x**3))**(-11/2) assuming x is positive. x**(-803/7) Simplify ((o/o**(1/15))/o**(-7))**(16/9)/(o/(o/(o/(o**(-3)/o)))*o**4/o*o/(o*o**2)*o*o**(-4)) assuming o is positive. o**(1499/135) Simplify (r**5/(r/(r/(r/(r/r**(-2/15)))))*(r**(-2/5)*r)**(-7))/(r**(-1/3)*r**(-2/5)*((r*r**(1/2)*r)/r*r)**(-36)) assuming r is positive. r**(275/3) Simplify (o*o**14*o/o**5*o*o)**(17/5)*((o**2*o*o*o)/o**(2/23))/((o/(o**(-2/21)/o))/(o*o*o**(-2)*o)) assuming o is positive. o**(115963/2415) Simplify ((m**(1/17)/m**(2/21))/(m**(1/17)/(m/(m**(2/33)/m))))**41 assuming m is positive. m**(5822/77) Simplify (m**11/(m**2/m*m))**(2/47)*m*m**1*m**(-1/4)*((m*m**(-2/7)*m)/m)**(-2/131) assuming m is positive. m**(365837/172396) Simplify s/s**(-5)*s*s*s**(-1)/s*s*s*s*s/s**(-1/10)*s*s**(-4)/s*(s/s**(1/2)*(s*(s*s*s*s**(-10)*s)/s*s)/s)**(-10/11) assuming s is positive. s**(111/10) Simplify ((q**(3/5)*q*q*(q/((q*(q/(q/(q*q**(-9))))/q)/q*q))/q)/(q**(-1/7)/q**(3/7)))**(-44) assuming q is positive. q**(-17204/35) Simplify (w/w**6)/(w**(-1/2)*w*w)*(w/w**(-8))/w**(-2/3)*((w*w**(1/3)*w)/w)/w**2*(w/(((w*w**5*w)/w)/w))/w**(-3) assuming w is positive. w**(3/2) Simplify ((((o**(-2/13))**19)**19)**34)**40 assuming o is positive. o**(-981920/13) Simplify ((d/d**8)/(d*d**(-2/13)*d)*(d**(-1/2)/d)**(14/11))/(d**(-1/16)/(d/(d*d*d**(-13)*d*d)))**44 assuming d is positive. d**(247101/572) Simplify ((n**(2/9)/(n/(n/(n*n**10))*n))/(n*n*n**(-2)*n*n/((n/(n**(10/7)/n*n))/n)*n))**(-2/37) assuming n is positive. n**(2042/2331) Simplify ((a**(-1/4)/a)**34*a**(-2/13)/a*a**(-1/3)/a)/(a*a**(-1/6)*a/(a**(3/4)/a)*a*a**(1/13)/(a*a**(-1)/a)) assuming a is positive. a**(-7667/156) Simplify (z**(2/7)*z*z**(-2/7))**(-35)/(((z/(z/((z**(-3)*z*z)/z)))/(z*(z/(z**(-4)*z*z))/z*z))/(z/z**(-2/9)*z*z**(-1/3))) assuming z is positive. z**(-244/9) Simplify ((k/(k**(-1)*k)*k*k)**(-44))**(-5/3)*(k**(2/9))**(-3/29)/(k**(2/5)/k**(2/17)) assuming k is positive. k**(1624642/7395) Simplify ((l*l/(l*l*l*l**(2/5)*l*l))/l*l**12/l*l**(6/17)*l/((l/(l*l*l**(-4)*l))/l))**31 assuming l is positive. l**(18321/85) Simplify (a*a**(-2/79)*a*a*a/(a/a**(-16))*(a/(a**16*a))**(-1/3))**(-28) assuming a is positive. a**(51044/237) Simplify ((v**0*v)**(-1/13)/(v**(-26/7)*v*v**32))**(1/6) assuming v is positive. v**(-1336/273) Simplify (((q**(-15/8)*q)/(q/q**20))**37)**(-10) assuming q is positive. q**(-26825/4) Simplify (m/m**2*m**(4/9)*m*m)**4/(m**7*(m*(m/(m*m**3)*m)/m*m*m*m)/m*m)**(1/24) assuming m is positive. m**(49/9) Simplify ((w**(1/4))**(-23/5)*w**(-2/7)*w*w*w**(-5/3)/w)/(((w*w**(1/7)/w)/(w*w/w**(-2)*w))/(w**1)**(1/10)) assuming w is positive. w**(1199/420) Simplify ((v**31*v)/v**(11/5))/(v**(-9/8)*v*v**(7/3)*v) assuming v is positive. v**(3191/120) Simplify ((d**(-15))**(5/12)*d*d**19*d*(d/(d/(d/(d/d**(-38)*d))))/d)**(-18) assuming d is positive. d**(909/2) Simplify u/u**(1/8)*(u*u**(-3/20)/u)/u*u*u**(8/7)*u**(-42) assuming u is positive. u**(-11237/280) Simplify ((c**(7/3)/c*c)/(c/c**(-2/9)))**27/(c**(-3/2)*c*c**2*c*c*((c*(c/(c*c**(-2/9)))/c*c)/c)/(c**(-2/13)/c)) assuming c is positive. c**(5879/234) Simplify (j**(-10)*j/((j/(j*j**(3/11)))/j)*j)**(-9)/(j**(-2/21)/j**(-2/13))**(-4/5) assuming j is positive. j**(909794/15015) Simplify j**(-2)/(j/(j*(j*j*j**(-1/2)/j)/j*j))*((j*j*j**(5/4)*j)/j)/j**(1/7)*(j/(j**(-1)*j))**(11/8)*j*j**(-6)*j*(j*j**(-1/4)*j)/j assuming j is positive. j**(-15/56) Simplify ((r**(-3/22)/(r/(r*r*r**(-21)/r)))/(r**(-11)*r*r**(1/24)))**44 assuming r is positive. r**(-2951/6) Simplify ((h**11*h)/h*h)**(-2/7)/(((h**(5/9)/h)/h*h*h)/h**(3/34)) assuming h is positive. h**(-8345/2142) Simplify ((l**(-1))**(-9/7))**11/((((l/((l**(2/5)/l)/l))/l)/l)**(-11/2)*(l**(-1/3))**(-18)) assuming l is positive. l**(801/70) Simplify ((c*c**(-1)*c)**(-25))**(1/27)/(c**10*(c/c**4)/c)**(-13/3) assuming c is positive. c**(677/27) Simplify ((l*l**(-6))/l**(-5)*((l*(l/(l/(l*l**6*l)))/l*l)/l*l)/l**2)/((l**(-1/4))**(-5/8))**(2/5) assuming l is positive. l**(111/16) Simplify ((d*d**(3/4)/d)/(d*d*d**(3/8)))**28*(d*d**(-5)*d**(-2))/(d**4*d*d**4/d) assuming d is positive. d**(-119/2) Simplify ((z*z/(z**(1/18)/z))**10/((z/(z/z**10))/z)**(5/21))**1 assuming z is positive. z**(1720/63) Simplif
{ "pile_set_name": "DM Mathematics" }
/** * Copyright (c) 2016-present, Facebook, Inc. * All rights reserved. * * This source code is licensed under the BSD-style license found in the * LICENSE file in the root directory of this source tree. An additional grant * of patent rights can be found in the PATENTS file in the same directory. */ #import <XCTest/XCTest.h> #import <IGListKit/IGListKit.h> #import "IGListDebugger.h" #import "IGListAdapterUpdaterInternal.h" #import "IGListTestAdapterDataSource.h" #import "IGListMoveIndexInternal.h" #import "IGListMoveIndexPathInternal.h" @interface IGListDebuggerTests : XCTestCase @end @implementation IGListDebuggerTests - (void)test_whenSearchingAdapterInstances_thatCorrectCountReturned { UIViewController *controller = [UIViewController new]; UICollectionView *collectionView = [[UICollectionView alloc] initWithFrame:CGRectZero collectionViewLayout:[UICollectionViewFlowLayout new]]; IGListAdapterUpdater *updater = [IGListAdapterUpdater new]; NSIndexPath *path = [NSIndexPath indexPathForItem:0 inSection:0]; updater.applyingUpdateData = [[IGListBatchUpdateData alloc] initWithInsertSections:[NSIndexSet indexSetWithIndex:1] deleteSections:[NSIndexSet indexSetWithIndex:2] moveSections:[NSSet setWithObject:[[IGListMoveIndex alloc] initWithFrom:3 to:4]] insertIndexPaths:@[path] deleteIndexPaths:@[path] moveIndexPaths:@[[[IGListMoveIndexPath alloc] initWithFrom:path to:path]]]; IGListTestAdapterDataSource *dataSource = [IGListTestAdapterDataSource new]; dataSource.objects = @[@1, @2, @3]; IGListAdapter *adapter1 = [[IGListAdapter alloc] initWithUpdater:[IGListAdapterUpdater new] viewController:nil workingRangeSize:0]; adapter1.collectionView = collectionView; adapter1.dataSource = dataSource; IGListAdapter *adapter2 = [[IGListAdapter alloc] initWithUpdater:[IGListAdapterUpdater new] viewController:controller workingRangeSize:2]; adapter2.collectionView = collectionView; IGListAdapter *adapter3 = [[IGListAdapter alloc] initWithUpdater:[IGListAdapterUpdater new] viewController:controller workingRangeSize:2]; adapter3.collectionView = collectionView; NSArray *descriptions = [IGListDebugger adapterDescriptions]; XCTAssertEqual(descriptions.count, 4); } @end
{ "pile_set_name": "Github" }
Q: Are there any tutorials on version 10 notebook templating and report generation? Are there missing docs? Bug introduced in 10.0 and persisting through 10.2 or later I am trying to understand the new templating in version 10. While there is a general documentation page with links to docs for each new function, so far I am unable to find any report generation worked examples of what a user may do after they open File > New > Template Notebook. Additionally when I press the help button on the template notebook it seems there is documentation missing: When you type "ReportGeneration" in the docs this is what you get: Templates were first introduced in the Finance Platform -- which is essentially a version of Mathematica with a few other functions. Rather than have report generation functions without any coherent description of how a user can start from scratch and make a template and an automated report, the Finance Platform has a wealth of material, including a tour: ...detailed extensive documentation: ...a specific palette that contains links to the tour, the extensive documentation and a video: All of this stuff is missing from my OS X version 10. Is it present in Windows? A: Confirmed bug by WRI tech support A: John Fultz gave a great talk about the templating system at the European Wolfram Technology Conference in 2014 - http://www.wolfram.com/events/technology-conference-eu/2014/presentations/Fultz_ReportGeneration.nb As requested, here's a video of John doing madlibs http://www.wolfram.com/broadcast/video.php?sx=Report%20Generation&v=1096 A: Maybe they renamed it. You should search the help for "AutomatedReports" this will bring you to guide/AutomatedReports. Or on the web: AutomatedReports. Some small examples and more details are presented at Automated Report Generation and the links therein.
{ "pile_set_name": "StackExchange" }
Friday, June 18, 2010 Camy here: If you haven't read anything by Robin Lee Hatcher yet, you need to go out right now and buy this book! I have to admit that I enjoy her historical novels more than her contemporaries. (I hope that doesn't make her upset. :) You can read excerpts of all her books on her website in case you don't believe me when I tell you she's a fabulous writer! Robin Lee Hatcher discovered her vocation as a novelist after many years of reading everything she could put her hands on, including the backs of cereal boxes and ketchup bottles. The winner of the Christy Award for Excellence in Christian Fiction (Whispers from Yesterday), the RITA Award for Best Inspirational Romance (Patterns of Love and The Shepherd's Voice), two RT Career Achievement Awards (Americana Romance and Inspirational Fiction), and the RWA Lifetime Achievement Award, Robin is the author of over 50 novels, including Catching Katie, named one of the Best Books of 2004 by the Library Journal. Robin enjoys being with her family, spending time in the beautiful Idaho outdoors, reading books that make her cry, and watching romantic movies. She is passionate about the theater, and several nights every summer, she can be found at the outdoor amphitheater of the Idaho Shakespeare Festival, enjoying Shakespeare under the stars. She makes her home outside of Boise, sharing it with Poppet the high-maintenance Papillon ABOUT THE BOOK It's 1918, and Daphne McKinley, heiress to a small fortune, has found contentment in the town of Bethlehem Springs, Idaho. But Daphne has a secret. A series of dime novels loosely based on local lore and featuring a nefarious villain known as Rawhide Rick has enjoyed modest popularity among readers. Nobody in Bethlehem Springs knows the man behind the stories ... except Daphne. When newspaperman Joshua Crawford comes to town searching for the man who sullied the good name of his grandfather, Daphne finds herself at a crossroads, reassessing the power of her words, re-thinking how best to honor her gifts, and reconsidering what she wants out of life. Propelled by a white hot fury, Joshua Crawford pushed open the door to Gregory Halifax’s office so hard it hit the wall with a loud wham. Startled, Gregory looked up a split second before Joshua slapped the newspaper onto the desk. “What is this garbage?” Joshua demanded. Gregory’s expression changed from one of surprise to a smirk. “So you read it.” “Of course I read it, and I’m here to demand a retraction.” “A retraction? For what?” “For what you wrote about my grandfather.” Gregory laughed softly. “You must be joking. The article is about dime novelists. The part about Richard Terrell was the words of the author, not mine.” “But you made what Mr. Morgan wrote in his novels sound as if it was fact rather than fiction. It’s not.” “How do you know it’s not? Tell me. What do you know about your grandfather before he settled in St. Louis? Nothing, that’s what. You’ve said so yourself.” “Did you contact anyone in Idaho to try to confirm that the character in Morgan’s books is based on the real Richard Terrell?” “I didn’t need to. I interviewed the publishers for my story. And again, the focus of my article is the men who write dime novels, not on the characters found in their books.” “But in the process you’ve dragged my grandfather’s good name through the mud. I want a retraction.” Gregory pushed back his chair and stood, the smile gone from his face. “When you prove anything I wrote is in error, then come see me again, and we’ll have this discussion. Until then, get out.” For one moment, Joshua thought he might be able to control his temper. For one very brief moment — just before he caught Gregory’s jaw with a right hook followed by a left jab to the gut. Gregory flew backward into the wall. The glass in the office door rattled again. Joshua readied himself for the other man to fight back. To his dissatisfaction, it didn’t happen. Gregory’s eyes were still unfocused when more men poured into the office and grabbed Joshua by the arms, hauling him away. One of the men was Joshua’s boss, Langston Lee. “You’re fired, Crawford. Collect your things and get out. I won’t have my reporters brawling. You hear me. Get out or I’ll call the police.” Joshua longed to turn his rage onto his boss, to give Langston Lee a little of what he’d already given Gregory Halifax. But he had enough good sense left to resist the urge. He was already out of a job. He didn’t want to spend time in a jail cell besides. But so help him, he would get a retraction out of this newspaper. He would prove Gregory Halifax was a shoddy reporter and see that he was fired. He would hear Langston Lee apologize. And he would make certain D. B. Morgan never again maligned his grandfather in print. This wasn’t over yet. Chapter 1 October 1918 Maybe it was time to kill Rawhide Rick. He’d served his purpose, the old rascal. He’d hunted buffalo and fought Indians and stolen gold from hardworking miners and sent men to the gallows. Now might be the time for him to meet his Maker. The trick was deciding how to kill him. Daphne McKinley rose from her desk and walked into the parlor, where she pushed aside the curtains at the window. A golden haze blanketed Bethlehem Springs. It had been a beautiful autumn. The prettiest one yet in her three years in this serene Idaho mountain town. The trees had been the brightest of golds, the most fiery of reds, the deepest of greens. Daphne had spent many a mild afternoon walking trails through the forest, enjoying the colors and the smells. If Rawhide Rick — who by this point in the series of books had become the infamous Judge Richard Terrell — was dead, what would become of the dashing Bill McFarland, hero of The McFarland Chronicles? Without his arch enemy, his life might become rather dull. Or perhaps it was Daphne who would find life dull without Rawhide Rick. Wicked he was, but he certainly kept things interesting whenever he was around. She rubbed her eyelids with the tips of her fingers, and when she pulled them away, she noticed ink stains on her right hand. Her fountain pen was leaking. Perhaps it was time to buy a typewriter. But would writing on a machine feel the same? Daphne turned from the window, her gaze sweeping the parlor. She’d come to love this small house on Wallula Street. Since moving into it soon after Gwen — its previous owner — married Daphne’s brother, she’d delighted in making it her home, decorating and furnishing it in ways that pleased her. Daphne’s childhood homes had been large and filled with servants waiting to attend to her slightest wish. But she had often been forced to live by the timetables of others. Now she could do as she willed, when she willed. The freedom she enjoyed was intoxicating. The best part was when she wanted to be with family, she got into her motorcar — her very own, quite wonderful McLaughlin- Buick — and drove to her brother’s home to play with her young nephew and infant niece. She was completely dotty over the two of them. She loved to crawl around on the floor with Andy — he would turn two at the end of November — the both of them squealing and giggling. And there was nothing like cuddling three-month-old Ellie. Daphne thought the baby girl smelled like sunshine. A sigh escaped her. She hadn’t time for daydreaming about Morgan’s and Gwen’s darling children. She must decide what to do. If she was going to kill the judge, she needed to notify Elwood Shriver at once. Wavering in indecisiveness served no good purpose. She returned to her small office. The floor around her desk was littered with wadded sheets of paper. It was always thus when words frustrated her. “So wasteful,” she scolded softly. of the war half a world away was splashed across the front page. More than a million American men — just boys, many of them — were now fighting in Europe alongside the Allied Powers. The end was near, some said. She prayed to God they were right. Too many had died already. Others, like Woody Statham, would wear the scars from their war wounds for the remainder of their lives — if not on their bodies then in their souls. She flipped through several more pages of the newspaper, but nothing she read captured her imagination or sparked her creativity. Besides, she’d read every article before, some of them several times. Maybe her problem wasn’t with Rawhide Rick. Maybe the problem was Bill McFarland. Maybe she was tired of him. Maybe he should die. “Maybe the whole lot of them should perish,” she muttered as she laid the newspaper aside. She spun her chair toward the bookcase beneath the office window. There, on the bottom row, were copies of The McFarland Chronicles by D. B. Morgan, all ten volumes. And if she didn’t decide soon what to do about Rawhide Rick, ten volumes would be all there were. There was no question that Daphne loved writing stories of adventure and danger in the West of forty and fifty years ago. And while she would concede that her books were not great literature, they were entertaining, for readers and for herself. But there were days like today when she was tempted to contact her editor in New York City and tell him that she (D. B. McKinley, whom Elwood Shriver thought to be a man) was retiring and thus so must D. B. Morgan (the pseudonym used on her books). However, she knew she would miss the storytelling were she to give it up. After all, it didn’t take much effort to clean her small house or cook the As she sat down, she took up the five-day-old newspaper. News occasional meal. Without her writing pursuits, what would she do with her time? It would be nice if she could discuss her feelings with someone, but there wasn’t another person, in Bethlehem Springs or elsewhere, who knew she was the author of dime novels. She wasn’t sure her brother would believe her if she told him. The only soul who might suspect anything was Dedrik Finster, the Bethlehem Springs postmaster, because of the mail she sent and received, but his English wasn’t the best and he probably had no idea that Shriver & Sons was a publishing company. Why would he? Maybe what she needed more than anything was a drive out to the Arlington ranch and a long visit with Griff Arlington, Gwen and Cleo’s father. That man had given her more story ideas in the last three years than she could ever hope to put on paper. It was Griff who had told her about the escapades of the real-life Richard Terrell, every bit as much a scoundrel as her fictional character, although perhaps in different ways. Yes, a visit with Griff was just what the doctor ordered. Her mind made up, she rose and went in search of hat, gloves, and coat. **** Joshua stepped from the passenger car onto the platform and looked about him. A large family — father, mother, and six children — were being escorted into the railroad station by a young man in a blue uniform. They were on their way to a hot springs resort located north of Bethlehem Springs. He knew this because they had spoken of little else during the journey, and Joshua couldn’t have helped but overhear their conversation as they’d been a rather boisterous group. He, on the other hand, was headed into the town that appeared to be about a quarter mile or so up a dirt road that passed between two low-slung hills. Switching his valise to the opposite hand, he set off in that direction. The first building he saw upon entering Bethlehem Springs was a church. All Saints Presbyterian, according to the sign out front. Catty-corner from All Saints was the Daily Herald, his destination. He crossed the street and entered the newspaper office. Familiar smells — newsprint, ink, dust — filled his nostrils. An attractive but pale-looking woman, dressed in black, came out of the back room, hesitated when she saw him, then moved forward, stopping on the opposite side of a raised counter. “May I help you, sir?” “Yes.” He set down his valise and removed his hat. “My name is Joshua Crawford. I’m here to see Nathan Patterson.” “I’m sorry, Mr. Crawford.” Her voice broke, and it took her a moment to continue. “Mr. Patterson passed away.” She drew a long breath and released it. “I’m his widow. Perhaps I can assist you.” Either Nathan Patterson had been much older than his wife or he had died tragically young, for Joshua guessed the woman to be no more than in her early thirties. Joshua had counted on this job. Without it, he couldn’t afford to stay in Idaho. He would barely have enough money for train fare back to St. Louis, as long as he didn’t spend a night in the hotel, and even then he wouldn’t have much left over to buy food. He would be extremely hungry before he reached Missouri. Not to mention that he wouldn’t have a job waiting for him when he got there — unless he was successful here first. “I’m glad you’ve come, Mr. Crawford. My husband would be heartbroken to see this newspaper fail. I assume you can do more than report?” “Ma’am?” “You are qualified to manage the paper, I trust.” Manage it? That was more than he’d expected. But if it worked out . . . “Yes, I am qualified,” he answered — with more confidence than he felt. “Good. Nathan’s final instruction was for me to offer you the job as managing editor of the Daily Herald. If you’re interested, that is.” He hadn’t thought to be in Idaho more than a month or two. Surely he could discover the information he needed, take care of matters, and return to Missouri before Christmas. On the other hand, success as a managing editor would look good on his résumé, would give him many more opportunities than simply working as a reporter for a small paper. “Are you interested, Mr. Crawford?” He had few other options. None, actually. Not if he wanted to honor his grandfather’s memory. Not if he wanted to restore his own good name and get back his old job. Taking the job as managing editor didn’t mean he would be here forever. He could keep the newspaper running until Mrs. Patterson found his replacement. It was the least he could do for the man who had paid his train fare from Missouri to Idaho. “Yes, Mrs. Patterson. I’m interested.” “The pay will be ninety-five dollars a month to start. I know it isn’t the sort of salary you must have received at a large newspaper, but you’ll have a place to live for free.” She pointed at the ceiling. “There’s an apartment above the office with a kitchen and bath. It hasn’t been used for several years, but with a bit of elbow grease, it should clean up well and prove adequate for a bachelor such as yourself.” Ninety-five a month. Not quite twelve hundred a year. Less than Langston Lee had paid him back in St. Louis, but more than the sum Nathan Patterson had offered when he’d applied for the job with the Daily Herald. With a place to live thrown in, the salary would allow him to put money aside for when he returned to Missouri. “That sounds fine,” he answered. Mrs. Patterson gave him a fleeting smile. “Good. Now let me show you to your quarters. I’m sure you must be weary from your journey. We can begin work in the morning.” **** Daphne was invited by Griff Arlington to have supper with the family and to spend the night at the ranch as she occasionally did, but she declined. Griff ’s storytelling about his early days in Idaho had done just what she’d hoped. Ideas were rolling around in her head, and she was desperate to get them on paper before they disappeared like a puff of smoke in the wind. As soon as she walked into her house, she tossed her coat over the nearest chair, dropped her hat on the table, and hurried into her office, where she lit the lamp and began scribbling as fast as she could. It seemed she barely drew a breath for the next hour. When she looked up at last, she saw that night had fallen over Bethlehem Springs. Her stomach growled, reminding her that she’d missed supper. Still, she had little desire to cook. This seemed like a good evening to pay a visit to one of the town’s restaurants. Daphne had three choices — the Gold Mountain, which served the most wonderful breakfasts; the restaurant inside the Washington Hotel where she liked to dine before an evening at the Opera House; and the South Fork, famous for their pies and home-style fare. She decided on the latter. As she walked briskly along Wallula Street toward Main, her way was lit by street lamps, one of many improvements made during Mayor Gwen McKinley’s term of office, which had ended almost ten months earlier. Daphne thought it unfortunate for the town that her sister-in-law had retired from public service. She hoped that, when her nephew and niece were older, Gwen would run for office again. As Daphne neared the office of the Daily Herald, she noticed light spilling through the windows of the apartment above it, something she’d never seen before. Was the newly widowed Christina Patterson up there, perhaps sorting through memorabilia from her marriage? Should Daphne postpone her evening meal another hour and see if she could offer the woman any comfort or assistance? Nathan Patterson’s death had been a shock to the town. A man of thirty-seven years, he’d looked in the pink of health. To have him weaken and die so suddenly had taken everyone, especially his wife, by surprise. And even while they grieved the loss of a friend, many wondered about the future of the Daily Herald. It had been almost a week since the last edition. What would become of the newspaper without Nathan at its helm? A shadow fell across the nearest window, and Daphne stopped on the sidewalk, still pondering what she should do. Would Christina welcome a visit from her or had she gone up there to escape intrusion? Daphne remembered all too well how difficult the death of a loved one could be. She’d been a girl of sixteen when her beloved father died, a young woman of twenty when she’d lost her mother. Even now, all these years later, she felt a painful sting in her chest, knowing she wouldn’t see either of them again this side of heaven. She also remembered that sometimes she’d wanted to be alone with her memories, alone to cry and mourn. And so she decided not to disturb the new widow and instead moved on, rounding the corner onto Main Street and entering the South Fork Restaurant a few moments later. Delicious scents filled the dining room, making her stomach grumble once again. It was late enough that the dinner crowd had come and gone. There were customers at only two tables — Mabel and Roscoe Finch, who worked for her brother and sister-in-law, and Ashley Thurber, the elementary school teacher. Daphne greeted each one of them before sitting at a table in the corner, her back to the wall. Whenever she dined out, she preferred similar seating. It allowed her to study others without being too obvious. She loved to watch and listen to people. She’d learned a great deal from the habit, and much of what she’d learned had made it into her stories at one time or another. Sara Henley — a shy, plain girl of eighteen — approached Daphne, a pad in her hand and a smile on her face. “Evening, Miss McKinley.” “Wonderful.” Sara lowered her voice. “My dad’s agreed I can study art. I won’t leave for school until spring, and I have to save every cent I earn to help cover my expenses. But all winter I can look forward to going.” Daphne touched the back of Sara’s hand with her fingertips. “I’m glad for you. You have a wonderful talent. You must promise that you’ll write and tell me all about the school and its instructors once you’re there.” “’Course I will. If it wasn’t for your encouragement, I never would’ve had the nerve to ask my dad to let me go.” Daphne had done little besides tell Sara that she shouldn’t give up on her dreams, no matter how long it took, that God could open doors in surprising ways if she would simply trust Him. But she was glad Sara had found her words to be helpful and even more glad that Sara’s father had consented. “I believe art school will be the making of you. Wait and see if I’m not right.” As Sara disappeared into the restaurant kitchen, the front door opened, letting in the cool night air along with a man Daphne had never seen before. He was tall, at least six feet, perhaps a little more. He had brown hair that was shaggy near his collar, and unless the poor light in the restaurant deceived her, there was the shadow of a beard under the skin of his jaw and upper lip. Who was he? Not a cowboy nor a miner. That was clear by the clothes he wore. His suit appeared of good quality, but even from where she sat she could tell it had seen its share of wear. A man of trade perhaps or a salesman. Definitely not a guest of her brother’s spa, for he looked neither wealthy nor in poor health. At that moment, the stranger turned his head and his gaze met hers. She swallowed a gasp of surprise. Good heavens! He had the most astonishing eyes. What color were they? She wished she could tell. So pale. Perhaps blue. Or maybe a silvery-gray. No, they were blue. She was sure of it. And she seemed unable to look away, even when she knew she should. Thankfully, he broke the connection and moved to a table, sitting in a chair with his right side toward her. Daphne drew a hungry breath into her lungs. Until that moment she hadn’t known she’d held it. Could I capture his eyes with words? What a character he would make. He could be Bill’s friend. Perhaps he could ride with him for the next few adventures. What name should I give him? She pulled a small notebook and the stub of a pencil from her pocket and made a few notes to herself. In Daphne’s fourth, fifth, and sixth novels, her hero, Bill McFarland, had courted a woman in Idaho City, but she’d grown tired of waiting for him to propose and had married someone else. Perhaps this new friend with his magnetic eyes could help Bill find the right woman, one who wouldn’t object to his adventurous spirit. Then again, Bill would have to watch out or his new friend might steal the right woman for himself. The thought caused her to glance up from her notebook — only to discover he was looking in her direction. Her breath caught for a second time and a blush warmed her face as she dropped her gaze again. Oh, yes. Mr. Blue Eyes would definitely make things interesting for the readers of The McFarland Chronicles. She hoped her dinner would arrive soon. Another late-night writing session was looming. **** December 5, 1871 There comes a time in a man’s life when it seems prudent that he look hard at his past, to remember from whence he came, to learn to be grateful for God’s mercy, perhaps even for the purpose of becoming a cautionary tale for others. And so I have decided to write an account of my life, from beginning to the present, knowing all the while that the future will be significantly different from those years that have gone before. In truth, I already know that my life will soon change for the better. I know this because, at the age of fifty, I am about to take a wife. No former associate of mine could be more surprised at this news than I am. I never believed I was the marrying kind. Nor would I have believed a woman as fine as my Annie would agree to be my wife, especially after she learned of my less than pristine past. But I am getting ahead of myself. A record of my life should begin at the beginning. And so it shall. **** I was born on a small farm in Missouri in the winter of 1821, the youngest of five children, all boys. My parents came to the region after the War of 1812, along with many other settlers. Like most everyone they knew, my parents were poor. They eked out a living the only way they knew how, through hard work and sweat and tears. They weren’t educated, and they yearned for something quite different for their children. It amazes me, as I look back, that my mother managed to teach her sons so much when she never attended school a day in her life. Not that I appreciated her efforts back then. All I wanted when I was a lad was to go fishing or hunting or even just to lie on my back on a hot summer day and watch the clouds drift by. Still, despite my lack of enthusiasm, I learned to read and write and do arithmetic. I even came to appreciate, albeit many years later, the wisdom and enjoyment that could be found in books. My parents were god-fearing people, but since there was no church within easy distance of our farm, it fell to my father and mother to see that their sons came to know the Bible and to embrace the tenants of the Christian faith. In this regard, I was even less enthusiastic. Rebellion resided in my stubborn heart, and it did not matter if my father took a strap to me or my mother sweetly entreated me. I would not yield. Perhaps, given enough time, I might have come to know the God my parents believed in. But there wasn’t enough time. They died of the fever when I was eight years old, along with two of my brothers. Moses was ten and Oliver was nine. That was in the winter of 1829. February, I believe. There was deep snow on the ground and the temperatures were frigid. My surviving two brothers could manage no more than shallow graves as the ground was frozen hard. I have never confessed this to a living soul, but I cried myself to sleep at night more often than not in the months that followed. My two oldest brothers, Jefferson and Lyman, took over running the farm and raising me. They did the best they were able, them being just boys themselves, Jefferson not yet eighteen, Lyman only sixteen. I wish now that I had appreciated them more. After I stopped crying myself to sleep at night, anger took the place of tears. I was angry with everyone, and my temper got me into plenty of trouble. I was fourteen the year I hit Lyman so hard I broke his nose. Of course, he gave me back in kind. A few weeks later, I struck out on my own. I never knew what happened to my brothers. By the time I got to an age and a place where I wanted to get in touch with them, where I would have liked to see them again, they were gone. I was told they sold the farm and nobody knew where they went from there. I have often wondered if they are still alive. I wonder if they think of me and wonder the same. Get info on my latest Regency romance novel. I only send out an email when I have a new release or a sale on one of my books. (My contemporary romance and romantic suspense newsletter signup is below.)
{ "pile_set_name": "Pile-CC" }
983 F.Supp. 977 (1997) SITHON MARITIME COMPANY, Plaintiff, v. HOLIDAY MANSION, a Division of Mohawk, Inc., and Mercury Marine, a Division of Brunswick Corporation, Defendants. No. CIV. A. 96-2262-EEO. United States District Court, D. Kansas. October 22, 1997. *978 *979 *980 *981 Lee M. Smithyman, Smithyman & Zakoura, Chtd., Overland Park, KS, Michael G. Chalos, Richard M. Ziccardi, George J. Tsimis, New York City, for Plaintiff Sithon Maritime Co. Norman R. Kelly, Norton, Wasserman, Jones & Kelly, Salina, KS, Anthony M. DeMarea, Shughart, Thompson & Kilroy, Overland Park, KS, for Defendant Holiday Mansion. Heather Suzanne Woodson, Stinson, Mag & Fizzell, P.C., Overland Park, KS, John C. Aisenbrey, Stinson, Mag & Fizzell, P.C., Kansas City, MO, Alex B. Marconi, Patrick X. Fowler, Snell & Wilmer L.L.P., Phoenix, AZ, for Defendant Mercury Marine. MEMORANDUM AND ORDER EARL E. O'CONNOR, District Judge. This matter is before the court on the motion for summary judgment of defendant Mercury Marine ("Mercury") on plaintiff's complaint (Doc. # 73), and defendant Mercury's motion for summary judgment on defendant Holiday Mansion's cross-claim (Doc. # 124). After careful consideration of the parties' briefs and evidentiary materials, the court is prepared to rule. For the reasons stated below, Mercury's motion on plaintiff's complaint is granted as to counts I, II, V, VIII, and IX, granted in part and denied in part as to counts IV and VII, and denied as to counts III and VI. Mercury's motion is granted as to all counts on defendant Holiday Mansion's cross-claim. Summary Judgment Standards Summary judgment is appropriate "if the pleadings, depositions, answers to interrogatories, and admissions on file, together with the affidavits, if any, show that there is no genuine issue as to any material fact and that the moving party is entitled to a judgment as a matter of law." Fed.R.Civ.P. 56(c); accord Anderson v. Liberty Lobby, Inc., 477 U.S. 242, 247, 106 S.Ct. 2505, 2510, 91 L.Ed.2d 202 (1986); Vitkus v. Beatrice Co., 11 F.3d 1535, 1538-39 (10th Cir.1993). A factual dispute is "material" only if it "might affect the outcome of the suit under the governing law." Anderson, 477 U.S. at 248, 106 S.Ct. at 2510. The moving party bears the initial burden of showing that there is an absence of any genuine issue of material fact. Celotex Corp. v. Catrett, 477 U.S. 317, 323, 106 S.Ct. 2548, 2552-53, 91 L.Ed.2d 265 (1986); Hicks v. City of Watonga, 942 F.2d 737, 743 (10th Cir.1991). Essentially, the inquiry as to whether an issue is genuine is "whether the evidence presents a sufficient disagreement to require submission to the jury or whether it is so one-sided that one party must prevail as a matter of law." Anderson, 477 U.S. at 251-52, 106 S.Ct. at 2511. An issue of fact is genuine if the evidence is sufficient for a reasonable jury to return a verdict for the nonmoving party. Id. at 248, 106 S.Ct. at 2510. This inquiry necessarily implicates the substantive evidentiary standard of proof that would apply at trial. Id. at 252, 106 S.Ct. at 2511-12. Once the moving party meets its burden, the burden shifts to the nonmoving party to demonstrate that genuine issues remain for trial "as to those dispositive matters for which it carries the burden of proof." Applied Genetics Int'l, Inc. v. First Affiliated Sec., Inc., 912 F.2d 1238, 1241 (10th Cir. 1990); see also Matsushita Elec. Indus. Co. v. Zenith Radio Corp., 475 U.S. 574, 586-87, 106 S.Ct. 1348, 1355-56, 89 L.Ed.2d 538 (1986); Bacchus Indus., Inc. v. Arvin Indus., Inc., 939 F.2d 887, 891 (10th Cir.1991). The nonmoving party may not rest on his pleadings but must set forth specific facts. Applied Genetics, 912 F.2d at 1241. "[W]e must view the record in the light most favorable to the parties opposing the motion for summary judgment." Deepwater Invs., Ltd. v. Jackson Hole Ski Corp., 938 F.2d 1105, 1110 (10th Cir.1991). "In a response to a motion for summary judgment, a party cannot rely on ignorance of facts, on speculation, or on suspicion, and may not escape summary judgment in the mere hope that something will turn up at trial." Conaway v. Smith, 853 F.2d 789, 793 (10th Cir. 1988). The mere existence of some alleged factual dispute between the parties will not defeat an otherwise properly supported motion for summary judgment. Anderson, 477 U.S. at 256, 106 S.Ct. at 2514. Where the nonmoving party fails to properly respond to the motion for summary judgment, the facts *982 as set forth by the moving party are deemed admitted for purposes of the summary judgment motion. D.Kan.Rule 56.1. In this diversity case, we ascertain and apply Kansas law with the objective that the result obtained in federal court should be the same result as in a Kansas court. See Adams-Arapahoe School Dist. No.28-J v. GAF Corp., 959 F.2d 868, 870 (10th Cir.1992). With respect to plaintiff's fraud claims under Kansas law, federal law standards for granting summary judgment apply. See Fed.R.Civ.P. 56. In Anderson v. Liberty Lobby, 477 U.S. at 252, 255, 106 S.Ct. at 2512, 2513-14, the United States Supreme Court held: we are convinced that the inquiry involved in a ruling on a motion for summary judgment or for a directed verdict necessarily implicates the substantive evidentiary standard of proof that would apply at the trial on the merits.... Consequently, where the ... "clear and convincing" evidence requirement applies, the trial judge's summary judgment inquiry as to whether a genuine issue exists will be whether the evidence presented is such that the jury applying that evidentiary standard could reasonably find for either the plaintiff or the defendant. Allegations of fraud must be proven by clear and convincing evidence. See Rajala v. Allied Corp., 919 F.2d 610, 626 (10th Cir.1990), cert. denied, 500 U.S. 905, 111 S.Ct. 1685, 114 L.Ed.2d 80 (1991); Sipes v. Crum, 204 Kan. 591, 464 P.2d 1, 6 (1970). Thus, plaintiff as the nonmoving party carrying the burden of proof at trial must present sufficient evidence of a clear and convincing nature to withstand summary judgment on its fraud claims. See Ramirez v. IBP, Inc., 913 F.Supp. 1421, 1430 (D.Kan.1995); Sprague v. Peoples State Bank, Colby, Kan., 844 F.Supp. 662, 667 (D.Kan.1994); All West Pet Supply Co. v. Hill's Pet Prods. Div., Colgate-Palmolive Co., 840 F.Supp. 1426, 1431 (D.Kan.1993). Analysis I. Mercury's Motion For Summary Judgment On Plaintiff's Complaint. A. Factual Background. For purposes of defendant's motion, the following is a brief summary of the material facts that are uncontroverted, deemed admitted, or where controverted viewed in the light most favorable to the non-movant, pursuant to Federal Rule of Civil Procedure 56 and District of Kansas Rule 56.1. Plaintiff Sithon Maritime Company ("Sithon") was organized in December 1994 for the purpose of obtaining exclusive government issued permits to operate a high speed ferry boat service to shuttle passengers between two of three peninsulas in Northern Greece. In late 1994, Mr. Vagianos, who later became president of Sithon, began negotiating with defendant Holiday Mansion for the possible purchase of four 50-passenger ferry boats. Mr. Vagianos advised Holiday Mansion that the boats needed to achieve a cruising speed of at least 24 knots for the anticipated ferry service and that the ferry boats would run 24 hours a day. Holiday Mansion advised Mr. Vagianos that the ferries could be powered by either two Mercury 7.3L diesel engines and Bravo III stern drives or by two Volvo diesel engines and stern drives. Mr. Byquist of Holiday Mansion advised Mr. Vagianos that the Mercury engines had more horsepower and would allow the boats to go faster than boats equipped with the Volvo engines. Mr. Byquist told Mr. Vagianos that he would contact Mercury to confirm that Mercury's engines would meet Mr. Vagianos' speed requirements. Mr. Vagianos testified that Mr. Byquist told Mr. Vagianos that he received assurances from Mercury personnel that its propulsion system would enable the Holiday Mansion ferry boats to attain a cruising speed of 24 knots and a maximum speed of 28 knots. Mr. Byquist denies making this statement to Mr. Vagianos. Mr. Byquist testified that (1) no one at Mercury told anyone at Holiday Mansion that the boats sold to Sithon would travel 24 knots cruising speed or 28 knots maximum speed when equipped with the Mercury stern drive engines; (2) no one at Mercury endorsed using the Mercury stern drive engines with the boats sold to Sithon; and (3) no one at Mercury told Holiday Mansion that the boats sold to Sithon would be a proper application for the Mercury stern drive engines. *983 Before purchasing the boats, Sithon requested and received from Mr. Brown of Holiday Mansion a letter representing that the boats equipped with Mercury engines would have a cruising speed of 24 knots and a maximum speed of 28 knots. Mr. Brown testified that he had no factual basis for making the representation and that he did not consult with anyone at Holiday Mansion or Mercury before making the representation. Holiday Mansion asked Alan Fila of Mercury for the proper gear drive ratio and propeller pitch for the boats. After consulting with various Mercury employees, Mr. Fila recommended to Holiday Mansion a gear drive ratio of 1.65 to 1 with 20-pitch propellers. On or about January 5, 1995, Sithon agreed to purchase the four passenger ferry boats from Holiday Mansion. In manufacturing the boats, Holiday Mansion set the gear ratios and purchased propellers in accordance with Mr. Fila's recommendations. A Mercury field engineer visited the Holiday Mansion factory and inspected the installation of the Mercury engines and stern drives into one of the four boats. In February 1995, Mr. Vagianos of Sithon received a copy of a Mercruiser/Mercury operation and service manual from Holiday Mansion. Warranty information is contained in the manual starting at the top of page 84. The actual "Warranty Policy" is on pages 86 and 87 and contains eleven numbered paragraphs. Paragraph 10 of the warranty policy provides: WARRANTIES OF MERCHANTABILITY AND FITNESS ARE EXCLUDED FROM THIS WARRANTY. IMPLIED WARRANTIES ARE LIMITED TO THE LIFE OF THIS WARRANTY. SOME STATES OR COUNTRIES DO NOT ALLOW LIMITATIONS ON HOW LONG AN IMPLIED WARRANTY LASTS OR THE EXCLUSION OR LIMITATION OF INCIDENTAL OR CONSEQUENTIAL DAMAGES, SO THE ABOVE LIMITATION OR EXCLUSIONS MAY NOT APPLY TO YOU. Sithon received the four ferry boats from Holiday Mansion in April. On May 19, 1995, Sithon commenced its ferry boat operations in Northern Greece. Within days, the propulsion systems of all four boats began to experience various mechanical problems during operation. The four boats could reach speeds of only 16 knots when empty and approximately 12 to 13 knots when full. On June 1, Holiday Mansion advised Mercury that the Mercury propulsion systems installed on Sithon's boats were not working properly. On June 5, Jim Puddy of Mercury's International Service Department concluded that the boats required a 2 to 1 gear drive ratio and that the Bravo III stern drives should be replaced with Bravo II stern drives. Mercury implemented these changes on the boats in June 1995. On or about July 6, the propulsion systems on the Sithon ferries continued to malfunction. In particular, the hard rubber hubs of the new propellers on the Bravo II stern drives melted during operation. As a result of the propeller and other mechanical problems, Sithon was forced to take three of its four boats out of service. On July 10, another Mercury representative advised Holiday Mansion that the 2 to 1 gear drive ratio would over-torque the engines and cause propeller hubs to be more susceptible to failing. In mid-July, Mercury concluded that the passenger boats were too heavy for the Mercury engines. On at least two occasions in July 1995, a Sithon boat lost all propulsion power. On one occasion, a Sithon boat filled with passengers broke down at sea in the middle of the night. The passengers were stranded until another boat could be located to pick up the passengers. In early August 1995, Mercury replaced two of the 7.3L diesel engines in one of Sithon's boats with two new engines. The two new engines had lower horsepower than the original engines in an attempt to address the problems of overheating and wear. A Mercury representative observed the installation of these two new engines and conducted various tests on the boat. Mercury subsequently sent six additional engines for installation into Sithon's boats. Four of the six engines were installed. Sithon's boats *984 continued to experience many of the same mechanical problems in 1996. B. Breach Of Contract (Count VIII). Sithon alleges that Mercury breached its contract with Sithon for the sale of the four ferry boats. Sithon claims that the following evidence establishes that a contract existed between Mercury and Sithon: (1) Mercury provided Holiday Mansion with information regarding the speed performance of the boats, (2) Mercury recommended to Holiday Mansion the gear ratio and propeller pitch size for the propulsion systems to be used on the boats, and (3) a Mercury field engineer inspected and approved the installation of the Mercury propulsion systems in Sithon's passenger boats. Sithon has failed to present sufficient evidence to raise an issue of material fact as to whether a contract for sale of the boats existed between Sithon and Mercury. The Kansas Supreme Court has held repeatedly that "[i]n order to form a binding contract, there must be a meeting of the minds on all essential terms." Albers v. Nelson, 248 Kan. 575, 580, 809 P.2d 1194, 1198 (1991); see Sidwell Oil & Gas Co., Inc. v. Loyd, 230 Kan. 77, 79, 630 P.2d 1107, 1110 (1981). "To constitute a meeting of the minds there must be a fair understanding between the parties which normally accompanies mutual consent and the evidence must show with reasonable definiteness that the minds of the parties met upon the same matter and agreed upon the terms of the contract." Sidwell, 230 Kan. at 84, 630 P.2d at 1113 (quoting Steele v. Harrison, 220 Kan. 422, 428, 552 P.2d 957, 962 (1976)). Sithon has not offered any evidence which tends to establish a meeting of the minds between Mercury and Sithon regarding the terms for sale of the four ferry boats. Although Sithon contracted with Holiday Mansion, Mercury was not a party to the contract. Sithon also has failed to come forward with any evidence of the alleged terms of the sales contract between Mercury and Sithon. Mercury is not liable on the contract between Holiday Mansion and Sithon by supplying Holiday Mansion with various parts or even by recommending specific actions to be taken on Sithon's boats. Accordingly, the court will grant summary judgment in favor of defendant Mercury on count VIII of Sithon's complaint. C. Express Warranty Regarding Speed (Count I). Sithon alleges that Mercury breached its express warranty that the passenger boats, if equipped with the Mercury propulsion systems, would attain a cruising speed of at least 24 knots. Sithon's claim is based on section 2-313 of the Kansas Uniform Commercial Code ("UCC"). See Kan.Stat.Ann. § 84-2-313(1)(a) ("[a]ny affirmation of fact or promise made by the seller to the buyer which relates to the goods and becomes part of the basis of the bargain creates an express warranty that the goods shall conform to the affirmation or promise."). "Express warranties are those for which the buyer bargained; they go to the essence of the bargain, being a part of its basis, and are contractual, having been created during the bargaining process." Corral v. Rollins Protective Services Co., 240 Kan. 678, 685, 732 P.2d 1260, 1266 (1987) (quoting 67A Am.Jur.2d, Sales § 690). "It is clear that for there to be an express warranty there must be an explicit statement, written or oral, by the party to be bound prior to or contemporaneous with the execution of the contract." Id. To prevail on its claim, Sithon must prove that Mercury made an express warranty to Sithon regarding what speed the boats could achieve if equipped with the Mercury engines and that Sithon relied upon the warranty. See Owens-Corning Fiberglas Corp. v. Sonic Development Corp., 546 F.Supp. 533, 541 (D.Kan.1982). Mercury contends that it never made any express warranty to Sithon regarding the speed of the ferry boats. Sithon's only evidence on this point consists of the testimony of Mr. Vagianos of Sithon. Mr. Vagianos testified that Mr. Byquist of Holiday Mansion told him that an unnamed Mercury representative told Mr. Byquist that the boats equipped with Mercury engines could attain a cruising speed of 24 knots and a maximum speed of 28 knots. Mr. Byquist specifically denies making this statement to Mr. Vagianos. Mr. Vagianos' testimony regarding *985 what Mercury represented to Mr. Byquist constitutes inadmissible hearsay. Mr. Vagianos was not present when the Mercury representative allegedly made the statement to Mr. Byquist. Sithon offers the statement of the unnamed Mercury representative for the truth of the matter asserted. The statement, however, does not fall within any of the exceptions to the hearsay rule. Even if the court considers Mr. Vagianos' testimony, Sithon has not produced sufficient evidence to show that Mercury ever made any explicit statements to Sithon regarding the speed of the boats as required for an express warranty claim. In this case, the absence of a direct relationship between Mercury and Sithon is fatal to Sithon's express warranty claim regarding speed of the boats. See Wight v. Agristor Leasing, 652 F.Supp. 1000, 1011 (D.Kan.1987); AgriStor Leasing v. Meuli, 634 F.Supp. 1208, 1219 (D.Kan.1986). Although an express warranty claim can be premised on an indirect relationship between the buyer and manufacturer, as when the buyer relies on a manufacturer's advertisement before purchasing the product from a third party, no such facts are present in this case. See, e.g., Cricket Alley Corp. v. Data Terminal Sys., Inc., 240 Kan. 661, 665, 732 P.2d 719, 723 (1987) (citing comment to Kan.Stat.Ann. § 84-2-313). Moreover, Sithon has not alleged or presented any evidence to establish that Holiday Mansion was in any way acting as Mercury's agent with respect to the alleged representations of boat speeds made by Holiday Mansion. Sithon argues that a disputed issue of fact exists because there is some evidence which indicates that Mercury made representations as to expected speed of boats to two other customers. Sithon argues that this evidence is contrary to Mercury's position that it does not discuss with its customers expected speeds of boats equipped with Mercury engines. Although Sithon's evidence raises a disputed issue as to whether Mercury has made representations regarding the speed of boats to some of its customers, the evidence does not create a disputed factual issue as to whether Mercury made any representations to Sithon regarding the speed of the boats it purchased from Holiday Mansion. For the above reasons, the court will grant summary judgment in favor of defendant Mercury on count I of Sithon's complaint. D. Breach Of Contract (Count IX). Sithon alleges that Mercury breached its contract with Sithon to repair and correct the mechanical problems with the propulsion systems. Mercury first maintains that Sithon has failed to establish that a binding contract existed between the parties. As noted above, to form a binding contract, "there must be a meeting of the minds on all essential terms." Albers, 248 Kan. at 580, 809 P.2d at 1198. "To constitute a meeting of the minds there must be a fair understanding between the parties which normally accompanies mutual consent and the evidence must show with reasonable definiteness that the minds of the parties met upon the same matter and agreed upon the terms of the contract." Sidwell, 230 Kan. at 84, 630 P.2d at 1113 (internal quotation omitted). Sithon claims that there is sufficient evidence for the trier of facts to find that a binding contract existed between Sithon and Mercury. The court has sifted through plaintiff's reference to 53 statements of fact and underlying documentation, which allegedly support its breach of contract claim. Only two of the statements of fact are even arguably relevant to the issue of whether a contract to correct and repair the propulsion systems existed. At most, plaintiff has presented evidence that (1) on June 5, 1995, Holiday Mansion sent Mercury a letter stating that Sithon is ready to go to the American Embassy and their lawyers regarding the problems with the boats, (2) a Mercury representative stated in a June 5, 1995 internal memorandum that Mercury is willing to do a customer relations repair on the boats at no cost to Sithon or Holiday Mansion, and (3) Mercury representatives told a Sithon representative in July 1995 that the new Bravo II engines would allow the engines to work at the correct RPM. Based on the record evidence, no reasonable juror could find the necessary "meeting of the minds" between Sithon and Mercury. There is no *986 evidence to show with reasonable certainty that the minds of the parties met upon the same matter and agreed upon the terms of the contract. See Sidwell, 230 Kan. at 84, 630 P.2d at 1113. Therefore, the court will grant summary judgment in favor of defendant Mercury on count IX of plaintiff's complaint. E. Express Warranty Regarding Repairs (Count II). Sithon alleges that Mercury expressly warranted that it would correct all of the mechanical problems connected to the propulsion systems on Sithon's boats. Mercury argues that Sithon's claim fails because express warranties cannot arise unless there is a contract for sale. Express warranties, however, are not limited to contracts for sale and may be present in any type of contract. See Corral, 240 Kan. at 684, 732 P.2d at 1265. As noted above, "for there to be an express warranty there must be an explicit statement, written or oral, by the party to be bound prior to or contemporaneous with the execution of the contract." Id. In addition, plaintiff must establish that he relied upon the express warranty made by the defendant. See Owens-Corning, 546 F.Supp. at 541. Sithon's express warranty claim regarding repairs fails for several reasons. First, Sithon has not presented any evidence of an explicit oral or written statement by Mercury of a warranty regarding repairs. Moreover, Sithon has not presented sufficient evidence to establish that Sithon and Mercury ever executed a contract. Although Kansas courts do not require a direct buyer-seller relationship as a predicate for an express warranty claim, there must be some contract. See Corral, 240 Kan. at 685, 732 P.2d at 1266 (contract required); Professional Lens Plan, Inc. v. Polaris Leasing Corp., 234 Kan. 742, 751, 675 P.2d 887, 895 (1984) ("[T]he law permits a non-privity buyer to recover for direct economic loss if the remote seller has breached an express warranty."); Fullerton Aircraft Sales & Rentals, Inc. v. Beech Aircraft Corp., 842 F.2d 717 (4th Cir. 1988) (applying Kansas law, privity of contract not required). Here, Sithon does not present evidence of any contract executed subsequent or contemporaneous with the alleged express warranty to correct and repair the propulsion systems. With no contract, there are no express warranties. Finally, Sithon has not established that it took any actions in reliance on the alleged representations made by Mercury. The vague statement made by a Holiday Mansion representative that Sithon may go to its attorneys is insufficient to show that Sithon relied on any alleged warranty regarding repairs made by Mercury. Accordingly, defendant Mercury is entitled to summary judgment on count II of Sithon's complaint. F. Covenant Of Good Faith And Fair Dealing (Count V). Sithon alleges that Mercury breached the covenant of good faith and fair dealing under section 1-203 of the Uniform Commercial Code. See Kan.Stat.Ann. § 84-1-203 ("Every contract or duty within this act imposes an obligation of good faith in its performance or enforcement."). Sithon argues that such a duty exists in this case because of the alleged contracts between Sithon and Mercury for the sale of the boats and for repair of the propulsion systems. As noted above, Sithon has not presented sufficient evidence to establish that either contract exists. Therefore, the court will grant summary judgment in favor of defendant on count V of plaintiff's complaint. G. Implied Warranty Of Merchantability (Count III) And Fitness For A Particular Purpose (Count IV). Sithon alleges that Mercury breached an implied warranty of merchantability because the Mercury propulsion systems were not fit for the ordinary purpose of being used in passenger ferry boats. See Pl's Compl. ¶ 85. Sithon also alleges Mercury breached an implied warranty of fitness for a particular purpose because (1) Mercury knew at the time it installed the engines that an express requirement of the sales contract between Sithon and Holiday Mansion was that the ferry boats could travel at 24 knots cruising speed and 28 knots maximum speed and (2) Mercury knew at the time it repaired the engines in the Summer of 1995 that Sithon *987 required that the ferry boats could travel at 24 knots cruising speed and 28 knots maximum speed. See Pl's Compl. ¶¶ 95-97. Mercury argues that all of Sithon's claims for implied warranties fail because Mercury disclaimed such warranties and there was no privity of contract between Sithon and Mercury. In addition, Mercury argues that Sithon failed to present sufficient evidence in support of its implied warranty of fitness claims because there is no evidence that Mercury knew of Sithon's speed requirements. The court will separately address each of Mercury's arguments. 1. Disclaimer Of Implied Warranties. Mercury argues that all of Sithon's claims for implied warranties fail because Mercury properly excluded the implied warranties of merchantability and fitness pursuant to the Kansas UCC. See Kan.Stat.Ann. § 84-2-316(2). Mercury argues that no Kansas case has addressed the issue of how a remote manufacturer can exclude implied warranties. Mercury concludes that no "basis of the bargain" requirement can logically be imposed where there was no bargain between Sithon and Mercury. We agree that a basis of the bargain requirement seems inapplicable to disclaimers of implied warranties by remote manufacturers. The other requirements of the Kansas UCC, however, are relevant. To exclude the implied warranty of merchantability, a party must mention the word "merchantability" in the exclusion and, if the exclusion is in writing, it must be conspicuous. See id. To exclude the implied warranty of fitness, the exclusion must be in writing and conspicuous. See id. Mercury's disclaimer is contained on page 87 of its operation and service manual. There is a title "Warranty Information" at the top of page 84 of the manual. The actual "Warranty Policy" is on pages 86 and 87 and contains eleven numbered paragraphs. The disclaimer at issue appears in the tenth paragraph. The disclaimer provides: WARRANTIES OF MERCHANTABILITY AND FITNESS ARE EXCLUDED FROM THIS WARRANTY. IMPLIED WARRANTIES ARE LIMITED TO THE LIFE OF THIS WARRANTY. SOME STATES OR COUNTRIES DO NOT ALLOW LIMITATIONS ON HOW LONG AN IMPLIED WARRANTY LASTS OR THE EXCLUSION OR LIMITATION OF INCIDENTAL OR CONSEQUENTIAL DAMAGES, SO THE ABOVE LIMITATION OR EXCLUSIONS MAY NOT APPLY TO YOU. Mercury certainly meets the requirements of mentioning the word "merchantability" and having the exclusion in writing. The critical issue, however, is whether Mercury's disclaimer is conspicuous. The Kansas Uniform Commercial Code provides: A term or clause is conspicuous when it is so written that a reasonable person against whom it is to operate ought to have noticed it. A printed heading in capitals (as: NON-NEGOTIABLE BILL OF LADING) is conspicuous. Language in the body of a form is "conspicuous" if it is in larger or other contrasting type or color.... Whether a term or clause is "conspicuous" or not is for decision by the court. Kan.Stat.Ann. § 84-1-201(10). "In determining conspicuousness of a disclaimer, the court must consider the entire document." Kelley Metal Trading Co. v. Al-Jon/United, Inc., 812 F.Supp. 185, 189 (D.Kan.1993) (citing J & W Equipment, Inc. v. Weingartner, 5 Kan.App.2d 466, 618 P.2d 862, 866 (1980)). "Contrasting type, ink color, and type size are relevant factors in the determination, but they are not the sole arbiters." Kelley, 812 F.Supp. at 189 (citing J & W Equipment). Although the disclaimer in the instant action is in capital letters, the court finds that the disclaimer is not conspicuous when viewed in light of the entire document. In particular, the exclusion appears on page 87 of an operation and maintenance manual, a document neither party signed and a document Sithon did not receive until after it agreed to purchase the Holiday Mansion boats equipped with Mercury engines. In addition, the disclaimer appears near the end of the warranty policy and is not set off from the text around it except by capital letters. We note that other parts of the manual have been set off with more distinctive features. *988 For the above reasons, the court finds that Mercury's disclaimers did not exclude the implied warranties of merchantability and fitness as to Sithon. 2. Privity Of Contract. Mercury also argues that all of Sithon's implied warranty claims are barred because there is no privity of contract between Mercury and Sithon. "[I]mplied warranties are imposed by operation of law in Kansas on public policy grounds and without regard to whether the parties to the implied warranty are in `privity' or whether the loss suffered is purely economic when the product is such that it would be inherently dangerous if defectively manufactured." Fullerton, 842 F.2d at 721 (4th Cir.) (applying Kansas law) (citing Professional Lens, 234 Kan. 742, 755, 675 P.2d 887, 898-99 (1984)); see Boehm v. Fox, 473 F.2d 445, 449 (10th Cir.1973) ("An implied warranty will be imposed by operation of law on the basis of public policy and privity of contract is not essential.") (citing Evangelist v. Bellern Research Corp., 199 Kan. 638, 433 P.2d 380 (1967)). As noted previously, there is no contractual privity between Sithon and Mercury. In addition, Sithon seeks economic losses in this action. Therefore, to withstand summary judgment on its implied warranty claims, Sithon must establish that engines used for passenger boats can be inherently dangerous if defectively manufactured. In Professional Lens, the alleged defective product was a computer and its hard disc component part, which the court found were not inherently dangerous products. 234 Kan. at 755, 675 P.2d at 898. In other cases, however, courts have held that an aircraft and an automobile tire are inherently dangerous products. See Fullerton, 842 F.2d at 718, 720-22 (alleged defect was "abnormal vibrations" on an aircraft); B.F. Goodrich Co. v. Hammond, 269 F.2d 501, 506 (10th Cir.1959) (tire allegedly did not protect against blow outs). Although no court apparently has decided this precise issue under Kansas law, we conclude that engines for passenger boats fall into the category of inherently dangerous products if defectively manufactured. Indeed, on at least two occasions, Sithon's boats equipped with Mercury engines lost all propulsion power while at sea. The passengers on the boats were stranded and subject to the threat of personal injury. Although privity of contract is not required in this case, Sithon has not provided any authority for the proposition that an implied warranty can arise without any contract at all. Under Kansas law, there must be some contract before an implied warranty of fitness for a particular purpose can arise. See Corral, 240 Kan. at 678, 732 P.2d at 1261, Syl. ¶ 6 (purpose of implied warranties is to protect party from loss where the subject matter of the contract fails to conform to the normal commercial standard or meet the party's known particular purpose). Indeed, section 315 of the Uniform Commercial Code provides that the implied warranty of fitness arises only "[w]here the seller at the time of contracting has reason to know any particular purpose for which the goods are required." Kan.Stat.Ann. § 84-2-315 (emphasis added). Applying the above principles, the court finds that privity of contract is not required for Sithon to maintain its implied warranty of merchantability claim or its implied warranty of fitness claim at the time the engines were installed in the ferry boats. The existence of a sales contract between Sithon and Holiday Mansion may be sufficient to create implied warranties running from Mercury to Sithon. On the other hand, Sithon's claim that an implied warranty of fitness arose when Mercury repaired the propulsion systems in the Summer of 1995 is barred. The court determined previously that Sithon did not present sufficient evidence of a contract to repair between Sithon and Mercury. Without any contract in the Summer of 1995, no implied warranty of fitness could arise. The court also finds that Sithon has failed to present sufficient evidence in support of such a claim. See infra, section 3, Evidence Of Implied Warranty Of Fitness Regarding Speed Of The Ferry Boats. For the above reasons, the court will grant summary judgment in favor of defendant Mercury on Sithon's implied warranty of fitness claim with respect to Mercury's *989 repair of the propulsion systems in the Summer of 1995. 3. Evidence Of Implied Warranty Of Fitness Regarding Speed Of The Ferry Boats. As noted above, Sithon alleges that an implied warranty of fitness from Mercury arose, both at the time the engines were installed and when they were subsequently repaired, that the ferry boats could travel at 24 knots cruising speed and 28 knots maximum speed. With respect to both of these claims, Sithon has failed to present sufficient evidence to establish either (1) Mercury had reason to know that Sithon required water craft that could travel 24 knots cruising speed and 28 knots maximum speed or (2) Mercury had reason to know that Sithon was relying on Mercury to select engines which would enable the water craft to achieve these specified speeds. See Kan.Stat.Ann. § 84-2-315. Accordingly, the court will grant summary judgment in favor of defendant Mercury on both of these claims. Although the court finds in favor of defendant Mercury on the two specific claims for implied warranties of fitness regarding speed of the ferry boats, the court will not grant summary judgment in favor of defendant Mercury on count IV in its entirety. Liberally construing Sithon's complaint, the court finds that Sithon's claim under count III that Mercury breached an implied warranty of merchantability, i.e., the propulsion systems were not fit for the ordinary purpose of being used in passenger ferries also may be pled as a claim under count IV that Mercury breached an implied warranty of fitness, i.e., the propulsion systems were not fit for the particular purpose of being used in passenger ferries. The parties did not specifically address in their briefs whether use of the Mercury propulsion systems in passenger ferry boats is an ordinary or particular use of the systems. Therefore, the court will not dismiss count IV in its entirety at this time. For all of the above reasons, the court will deny Mercury's motion for summary judgment on counts III and IV with respect to Sithon's claim of an implied warranty that the Mercury propulsion systems were not fit for the purpose of being used in passenger ferries. The court will grant summary judgment in favor of Mercury on count IV of Sithon's complaint with respect to Sithon's claim of implied warranties of fitness, both at the time the engines were installed and when they were subsequently repaired, that the water craft would achieve a cruising speed of 24 knots and a maximum speed of 28 knots. H. Fraud (Count VII). Sithon alleges in its complaint that Mercury failed to inform Sithon, both at the time Mercury originally installed the propulsion systems and when it subsequently repaired the propulsion systems, that the boats sold could not reach speeds of 24 knots cruising speed and 28 knots maximum speed. See Pl's Compl. ¶¶ 126-27, 129-30. These two related fraud claims are based on the legal theory of fraud through silence. To prevail on a claim of fraud through silence, plaintiff must show by clear and convincing evidence: (1) defendant had knowledge of material facts which plaintiff did not have and which plaintiff could not have discovered by the exercise of reasonable diligence; (2) defendant was under an obligation to communicate the material facts to the plaintiff; (3) defendant intentionally failed to communicate to plaintiff the material facts; (4) plaintiff justifiably relied on defendant to communicate the material facts to plaintiff; and (5) plaintiff sustained damages as a result of defendant's failure to communicate the material facts to the plaintiff. [citation omitted.] OMI Holdings, Inc. v. Howell, 260 Kan. 305, 344-45, 918 P.2d 1274, 1299 (1996) (quoting Lesser v. Neosho County Community College, 741 F.Supp. 854, 863 (D.Kan.1990)). The court will analyze the above elements separately with respect to each fraud claim. *990 1. Disclosure Of Speeds At Time Of Engine Installation. Sithon first argues that Mercury failed to inform Sithon at the time Mercury installed the engines that the boats equipped with the Mercury propulsion systems could not reach speeds of 24 knots cruising speed and 28 knots maximum speed. Mercury argues that none of the evidence presented by Sithon in its opposition memorandum is relevant to this claim. The court agrees. Sithon has failed to present clear and convincing evidence in support of its fraud claim. First, Sithon has not presented any evidence that Mercury knew at the time the engines were installed what speeds the boats could achieve if equipped with the Mercury propulsion systems. Sithon also has not established that it could not have discovered this information by the exercise of reasonable diligence. Sithon likewise has failed to present any evidence in support of the other elements of a fraudulent omission claim. In particular, Sithon has failed to present any evidence that Mercury intentionally withheld any speed estimates of the boats from Sithon at the time of engine installation or that Sithon justifiably relied on Mercury to communicate this information. In light of the lack of evidence presented by Sithon, the court will grant summary judgment in favor of defendant Mercury on Sithon's claim that Mercury failed to disclose at the time Mercury installed the engines that the boats could not achieve a cruising speed of 24 knots and a maximum speed of 28 knots. See Pl's Compl. ¶¶ 126-27. 2. Disclosure Of Speeds At Time Of Repair. Sithon also contends that Mercury failed to inform Sithon at the time of repair in the Summer of 1995 that the boats equipped with the repaired Mercury propulsion systems could not reach speeds of 24 knots cruising speed and 28 knots maximum speed. Sithon has presented some evidence in support of this claim in its opposition memorandum. Sithon has presented evidence that (1) Mercury knew what speed the boats could achieve after repair and replacement of the propulsion systems, (2) Mercury knew that some of the repairs and changes would reduce the cruising speed of the boats, and (3) Mercury failed to advise Sithon of this information. In their voluminous briefs, neither party specifically discussed this claim factually or with respect to the legal elements of a fraudulent omission claim. Therefore, the court will deny defendant Mercury's motion for summary judgment on this claim. Although the court will not grant summary judgment on Sithon's second fraud claim, the court doubts that the record evidence would be sufficient to withstand a properly supported motion for judgment as a matter of law. In particular, there does not appear to be any record evidence which establishes that (1) Sithon could not have discovered the information regarding speed of the boats by the exercise of reasonable diligence or (2) Sithon justifiably relied on Mercury to communicate such information. Mercury argues in the alternative that Sithon should be required to replead its fraud claim with particularity. The court finds that Sithon's complaint provides Mercury sufficient notice of the particular fraud allegation. The requirement that fraud shall be stated with particularity primarily is to allow the defendant to prepare an adequate responsive pleading. See Todaro v. Orbit Int'l Travel, Ltd., 755 F.Supp. 1229, 1234 (S.D.N.Y.1991); United Nat'l Records, Inc. v. MCA, Inc., 609 F.Supp. 33, 38 (N.D.Ill. 1984). By analogy to the time requirements for pleading defenses under rule 12, a rule 9(b) objection is waived unless made as a separate motion prior to or concurrent with the filing of a responsive pleading. See Todaro, 755 F.Supp. at 1234; MCA, 609 F.Supp. at 38-39. Here, Mercury was on sufficient notice of Sithon's fraud allegations to prepare a detailed answer. Although Mercury raised a general objection under rule 9(b) in its answer, there is no evidence to suggest that Mercury was precluded from drafting an adequate responsive pleading because of the lack of particularity in Sithon's fraud claims. Of course, Sithon may be required to state its fraud claim with more particularity in the pretrial order. *991 3. Sithon's New Fraud Theories. Sithon alleges numerous new fraud theories in its opposition brief and its surreply memorandum. In sum, Sithon argues that Mercury withheld information of the shortcomings of the propulsion systems, knew that it could never repair or improve the performance of the propulsion systems, and nevertheless assured Sithon that it would correct the performance problems. Sithon argues that it relied on Mercury's repeated assurances and accordingly suffered the destruction of its business. Sithon cannot change its fraud theory at this late date. At this point, there is no pretrial order in the case. Pursuant to the Scheduling Order, however, any motions to amend the pleadings by the plaintiff were due on January 2, 1997. Plaintiff has not filed any motions to amend or motions to extend the deadline for filing motions to amend. Therefore, plaintiff's fraud claims are governed by its complaint. The court will not consider the new fraud theories presented in plaintiff's opposition memoranda. Plaintiff cannot present claims that are "moving targets," particularly with respect to claims of fraud which are governed by a heightened standard of pleading. In a footnote, Sithon requests leave to amend its fraud claims to add several new fraud theories. The court will deny Sithon's request for the reasons set forth above. In addition, Sithon has failed to comply with rule 15.1 of the Rules of Practice for the District of Kansas governing motions to amend the pleadings. In particular, Sithon failed to set forth a concise statement of the amendment sought and failed to provide a copy of the proposed amended complaint to the court. Without briefing on the motion or a copy of the proposed amended complaint, the court cannot analyze many of the factors relevant to motions to amend, such as Sithon's delay in seeking the amendment or any prejudice to Mercury. See Castleglen, Inc. v. Resolution Trust Corp., 984 F.2d 1571, 1585 (10th Cir.1993). Based on the record before us, however, we note that any proposed amendment by Sithon to add the referenced fraud claims likely would be futile. Sithon has not set forth facts which establish that (1) Mercury was under an obligation to communicate the material facts to Sithon, (2) Mercury intentionally failed to communicate the material facts to Sithon, or (3) Sithon justifiably relied on Mercury to communicate the facts to Sithon. For the above reasons, Sithon's request to amend its complaint is denied. I. Strict Liability In Tort (Count VI). Sithon alleges that the Mercury propulsion systems were defective and unreasonably dangerous to Sithon's boats. Sithon, as the ultimate purchaser of the propulsion systems, claims that Mercury is responsible for any damages from the propulsion systems under the legal theory of strict liability. Mercury moves for summary judgment on the ground that Sithon suffered only economic loss and therefore cannot recover in tort. In Kansas, "an action for damages from a product's qualitative defects alone without proof of the product's dangerousness cannot sound in tort." Daitom, Inc. v. Pennwalt Corp., 741 F.2d 1569, 1581 (10th Cir.1984); see Winchester v. Lester's of Minnesota, Inc., 983 F.2d 992, 996 (10th Cir.1993); AgriStor Leasing v. Meuli, 634 F.Supp. 1208, 1217 (D.Kan.1986). Thus, the repair or replacement of a defective product itself is considered economic loss for which a plaintiff generally cannot recover in tort. See Winchester, 983 F.2d at 996 (citing East River Steamship Corp. v. Transamerica Delaval, Inc., 476 U.S. 858, 871, 106 S.Ct. 2295, 2302, 90 L.Ed.2d 865 (1986)). Here, Sithon seeks recovery for damage to the propulsion systems and the water craft, as well as lost profits resulting from the failure of the propulsion systems. Although damage to a defective product itself often is characterized as economic loss, courts have allowed recovery of such losses if the product was "unreasonably dangerous." See Champlain Enterprises. Inc. v. United States, 945 F.Supp. 468, (N.D.N.Y.1996) (applying Kansas law) (plaintiff can recover for damage to the aircraft if plaintiff establishes that the aircraft was unreasonably dangerous); Fordyce Concrete, Inc. v. Mack Trucks, Inc., 535 F.Supp. 118, 126 (D.Kan.1982) (physical damage upon a defective product or upon other property resulting from an unreasonably *992 dangerous defective product is recoverable); see also Elite Professionals, Inc. v. Carrier Corp., 16 Kan.App.2d 625, 625, 633, 827 P.2d 1195, 1197, 1202 (1992) (damage to meat inside refrigeration unit did not constitute economic loss, issue of fact as to whether truck refrigeration unit was unreasonably dangerous); Mississippi Power & Light Co. v. Branson Aircraft Corp., 797 F.Supp. 871, 873 (D.Colo.1992) (applying Kansas law) ("tort recovery for injury to the defective product is not barred by the economic loss rule if the plaintiff is attempting to recover property damages, as distinguished from purely economic damages."). In Fordyce, we held that "the Kansas Supreme Court, if faced with the question before us, would once again follow the explicit language of § 402A [of the Restatement (Second) of Torts] and allow plaintiff to recover for physical damage to property resulting from an unreasonably dangerous defective product regardless of whether the damage is inflicted upon the defective product or upon other property." In Fordyce, we relied on Kansas cases that consistently interpreted section 402A broadly, permitting expansive recovery under a strict liability in tort theory. See id.; Kennedy v. City of Sawyer, 228 Kan. 439, 445-46, 618 P.2d 788, 794 (1980) (imposing liability for property damage incurred by bystanders or third parties under strict liability "is based on a desire to achieve maximum protection for the injured party and to promote the public interest in discouraging the marketing of products having defects that are a menace to the public."). We now must decide whether Sithon has presented sufficient evidence that Mercury's propulsion systems were unreasonably dangerous to survive summary judgment. The Kansas Supreme Court has found that a condition is unreasonably dangerous "if it is dangerous when used in the way it is ordinarily used considering the product's characteristics and common usage, and is dangerous to the extent beyond that which would be contemplated by the ordinary consumer who purchased it, with the ordinary knowledge common to the community as to its characteristics." Jenkins v. Amchem Prods., Inc., 256 Kan. 602, 623-24, 886 P.2d 869, 882 (1994), cert. denied, ___ U.S. ___, 116 S.Ct. 80, 133 L.Ed.2d 38 (1995). Mercury has not offered any evidence to controvert Sithon's evidence that its passenger boats lost all propulsion power on two occasions and broke down while at sea. On one occasion, the boat filled with passengers broke down in the middle of the night. The passengers were stranded, frightened, and many of them were screaming because of the threat of personal injury. Based on the record evidence, we cannot conclude as a matter of law that the Mercury propulsion systems were not unreasonably dangerous. If Sithon establishes at trial that the Mercury propulsion systems were unreasonably dangerous, Sithon may be able to recover on its strict liability claims for damages to the propulsion systems and its water craft. Neither party has addressed whether Sithon also can recover lost profits in the event it can establish that the propulsion systems were unreasonably dangerous. In light of the absence of briefing on this point, the court will not decide the issue at this time. For all of the above reasons, the court will deny Mercury's motion for summary judgment as to count VI of Sithon's complaint. II. Mercury's Motion For Summary Judgment On Holiday Mansion's Cross-Claim. Mercury has filed a motion for summary judgment on Holiday Mansion's cross-claim. Holiday Mansion has failed to file a response to this motion. Pursuant to rule 7.4 of the Rules of Practice for the District of Kansas, the court will consider defendant's motion as uncontested. Ordinarily, such motions are granted without further notice. A. Factual Background. For purposes of defendant's motion, the following is a brief summary of the material facts that are uncontroverted, deemed admitted, or where controverted viewed in the light most favorable to the non-movant, pursuant to Federal Rule of Civil Procedure 56 and District of Kansas Rule 56.1. Mr. Byquist, Holiday Mansion's vice president and individual in charge of the day-to-day operations of the company, testified that *993 he did not know if Holiday Mansion's allegation that Mercury represented what specific speeds Sithon's boats could achieve was true or the basis of the allegation. Mr. Byquist also testified that (1) no one at Mercury told anyone at Holiday Mansion that the boats sold to Sithon would travel 24 knots cruising speed or 28 knots maximum speed, or at any speed, when equipped with the Mercury stern drive engines; (2) no one at Mercury endorsed using the Mercury stern drive engines with the boats sold to Sithon; and (3) no one at Mercury told Holiday Mansion that the boats sold to Sithon would be a proper application for the Mercury stern drive engines. Mr. Brown of Holiday Mansion faxed a letter to Sithon on January 3, 1995, representing that the boats equipped with Mercury engines would have a cruising speed of 24 knots and a maximum speed of 28 knots. Mr. Brown testified that he had no factual basis for making the representation and that he did not consult with anyone at Holiday Mansion or Mercury before making the representation. B. Breach Of Express Warranty (Count I). Holiday Mansion alleges that Mercury expressly warranted that the engines would reasonably and properly perform. As noted previously, to prevail on an express warranty claim, a party must establish (1) there was an explicit written or oral statement of warranty prior to or contemporaneous with the execution of a contract and (2) reliance on the warranty statement. See Owens-Corning, 546 F.Supp. at 541. The only record evidence of an express warranty by Mercury to Holiday Mansion is contained in Mercury's operation and service manual. The warranty provides in relevant part that the Mercury stern drive power package, inboard engine, and accessories are warranted "to be free from defects in material and workmanship. This warranty shall apply only to pleasure craft and light-duty craft applications." Holiday Mansion has not offered any evidence suggesting either that (1) the Mercury engines and stern drives failed because of a defect in materials or workmanship or (2) the Mercury propulsion systems were used in a "light-duty craft" application. In the absence of such evidence, Holiday Mansion cannot establish that Mercury breached its express warranty. Indeed, the only record evidence on this point suggests that Mercury fulfilled its warranty obligations by supplying replacement engines and drive units for the boats at virtually no cost to Sithon or Holiday Mansion. Therefore, the court will grant summary judgment in favor of Mercury on count I of Holiday Mansion's cross-claim. C. Negligent Misrepresentation (Count II). Holiday Mansion alleges that Mercury negligently misrepresented that the 49-foot passenger boats, "when loaded with passengers, fuel and other miscellaneous items, could reasonably and appropriately operate for needed periods of time at cruising speed in excess of 20 knots [] with a maximum speed in excess of 24 knots." To prevail on its claim, Holiday Mansion must establish: (1) Mercury supplied false information to Holiday Mansion to benefit and guide Holiday Mansion in a business transaction; (2) Mercury intended to influence the transaction by providing the information; (3) Mercury was negligent in obtaining or communicating the information; and (4) Holiday Mansion reasonably relied and acted upon the information which caused Holiday Mansion to suffer damages. See Mahler v. Keenan Real Estate, Inc., 255 Kan. 593, 604, 876 P.2d 609, 616 (1994) (adopting section 552 of the Restatement (Second) of Torts). Holiday Mansion has not presented any evidence that Mercury ever made the alleged representation regarding speed. Indeed, Holiday Mansion's representatives testified that no such representation was made. Mr. Byquist, Holiday Mansion's vice president and individual in charge of the day-to-day operations of the company, testified that he did not know if Holiday Mansion's allegation was true or the basis of the allegation. Mr. Byquist also testified that (1) no one at Mercury told anyone at Holiday Mansion that the boats sold to Sithon would travel 24 knots cruising speed or 28 knots maximum speed, or at any speed, when equipped with the *994 Mercury stern drive engines; (2) no one at Mercury endorsed using the Mercury stern drive engines with the boats sold to Sithon; and (3) no one at Mercury told Holiday Mansion that the boats sold to Sithon would be a proper application for the Mercury stern drive engines. Finally, Mr. Brown of Holiday Mansion faxed a letter to Sithon on January 3, 1995, representing that the boats would have a cruising speed of 24 knots and a maximum speed of 28 knots. Mr. Brown testified that he had no factual basis for making the representation and that he did not consult with anyone at Holiday Mansion or Mercury before making the representation. In light of the above evidence, no reasonable juror could find that Mercury supplied Holiday Mansion with false information. Accordingly, the court will grant summary judgment in favor of Mercury on count II of Holiday Mansion's cross-claim. D. Negligence (Count III). Holiday Mansion alleges that Mercury "failed to use appropriate and reasonable care in selecting the Mercury engines and stern drives it did, which would not and could not operate at the desired cruising and maximum speeds." Holiday Mansion also alleges that Mercury "negligently and improperly failed to undertake and perform any and all testing that was needed to ascertain and make certain that its representations were reasonable and appropriate." Holiday Mansion has not presented any evidence in support of these allegations. First, the uncontested evidence establishes that no one at Mercury represented to Holiday Mansion that the boats could achieve certain cruising or maximum speeds and that no one at Mercury was aware of the desired cruising and maximum speeds. Moreover, Holiday Mansion has not presented any evidence suggesting that Mercury was negligent in selecting the engines for the passenger boats. For the above reasons, the court will grant summary judgment in favor of Mercury on count III of Holiday Mansion's cross-claim. E. Common Law Indemnity (Count IV). Holiday Mansion claims that it is entitled to indemnity from Mercury for any judgment that may be entered against Holiday Mansion on Sithon's claims. Mercury argues that Holiday Mansion has no legal right to indemnity under Kansas law. There is no evidence of any indemnity agreement between Holiday Mansion and Mercury. In addition, "the statutory adoption of comparative negligence in Kansas has had the effect of abrogating the concept of indemnification based on the dichotomy of active/passive negligence." Haysville U.S.D. No. 261 v. GAF Corp., 233 Kan. 635, 642, 666 P.2d 192, 199 (1983) (citation omitted). In the absence of any factual or legal basis for indemnification, the court will grant summary judgment in favor of defendant Mercury on count IV of Holiday Mansion's cross-claim. IT IS THEREFORE ORDERED that defendant Mercury Marine's motion for summary judgment on plaintiff's complaint (Doc. # 73) is granted as to counts I, II, V, VIII, and IX, granted in part and denied in part as to counts IV and VII as discussed herein, and denied as to counts III and VI. IT IS FURTHER ORDERED that defendant Mercury Marine's motion for summary judgment on defendant Holiday Mansion's Cross-Claim (Doc. # 124) is granted.
{ "pile_set_name": "FreeLaw" }
1. Field Subject matter disclosed herein relates to monitoring a concentration of an analyte in a physiological compartment. 2. Information The pancreas of a normal healthy person produces and releases insulin into the blood stream in response to elevated blood plasma glucose levels. Beta cells (β-cells), which reside in the pancreas, produce and secrete insulin into the blood stream as it is needed. If β-cells become incapacitated or die, a condition known as Type 1 diabetes mellitus (or in some cases, if β-cells produce insufficient quantities of insulin, a condition known as Type 2 diabetes), then insulin may be provided to a body from another source to maintain life or health. Traditionally, because insulin cannot be taken orally, insulin has been injected with a syringe. More recently, the use of infusion pump therapy has been increasing in a number of medical situations, including for delivering insulin to diabetic individuals or trauma patients. As of 1995, less than 5% of Type 1 diabetic individuals in the United States were using infusion pump therapy. Presently, over 7% of the more than 900,000 Type 1 diabetic individuals in the U.S. are using infusion pump therapy. The percentage of Type 1 diabetic individuals that use an infusion pump is growing at a rate of over 2% each year. Moreover, the number of Type 2 diabetic individuals is growing at 3% or more per year, and growing numbers of insulin-using Type 2 diabetic individuals are also adopting infusion pumps. Additionally, physicians have recognized that continuous infusion can provide greater control of a diabetic individual's condition, so they too are increasingly prescribing it for patients. External infusion pumps are typically provided to control a rate of insulin infusion based, at least in part, on blood glucose measurements obtained from metered blood glucose samples (e.g., finger stick samples) or from processing signals received from a blood glucose sensor attached to a patient to provide sensor glucose measurements. By processing signals from such a blood glucose sensor, a patient's blood glucose level may be continuously monitored to reduce a frequency of obtaining metered blood glucose sample measurements from finger sticks and the like. However, measurements of blood glucose concentration obtained from processing signals from blood glucose sensors may not be as accurate or reliable as blood glucose sample measurements obtained from finger stick samples, for example. Also, parameters used for processing blood glucose sensors for obtaining blood glucose measurements may be calibrated from time to time using metered blood glucose sample measurements as reference measurements obtained from finger sticks and the like.
{ "pile_set_name": "USPTO Backgrounds" }
15 June ’17 — 20:00 Fatou Diome Meet the writer Born in Senegal in 1968, Fatou Diome has lived in France since 1994. A politically engaged author, her literary work is nourished by her struggle against intolerance. Her most recent work, Marianne porte plainte! is an excellent example of this. In it she demonstrates how the concept of national identity fractures society, creating a barrier between ‘them’ and ‘us’, while ignoring the migratory flows that have always played an important role in history. It celebrates the emancipating virtues of education, enabling us to go beyond our strictly defined perceived affiliations, to combat amalgams and to focus on the collective destiny of the human species. Fatou Diome sees Humanity as something more than the sum of its artificially labelled subgroups. The encounter with the author is the start of Les Assises Citoyennes sur les Migrations organised by the CNCD 11.11.11 and is organised in the context of the Migrations campaign by 11.11.11.
{ "pile_set_name": "Pile-CC" }
I wake up suddenly, staring at the ceiling of our apartment. I hear some drunk bros across the street at the bodega arguing in the humid Brooklyn night. I look at Seema, sleeping peacefully beside me. Sleep is nice. It’s our only escape from having to deal with the newfound stress and sadness that has entered our lives. The screaming bros prevent me from sleeping, so I continue staring at our white ceiling instead. I grasp at distant memories to cheer myself. I find myself thinking about our wedding weekend eight months earlier in Charleston. I remember Seema’s bright smile during our first dance to Rose Royce’s “I Wanna Get Next to You.” I see us both surrounded by a sea of friends and family dancing to B.I.G., Kishore Kumar and Montel Jordan. I remember speeches from loved ones and our parents drastically underestimating how much alcohol our friends would drink. I remember these same friends settling for warm shots of gin after cleaning out the bar on that cool November night in 2013. I see Seema and me on a raised mandap on the banks of the Ashley River in front of our closest friends and family on an idyllic Fall day. Seema looks like an Indian queen in her crimson sari with her gold jewelry sparkling. Her dark hair and big, brown eyes are framed by her crimson veil. The dupatta that hangs around my neck is tied in a knot with her veil, connecting us as we hold hands and take turns leading each other around a sacred fire. Each orbit around the flames symbolizes the devotion to each other needed for a happy marriage. Afterwards we perform the Satapadi, the seven steps we take together that each represent a different marriage vow of strength, positivity, prosperity, health, happiness, trust and love. I didn’t realize the vows would be tested so early. I assumed I’d have at least a few decades until our first family health crisis. I want more time. I need more time. I feel like I'm not ready for this, and I can never let Seema know that. The bros continue to scream outside our bedroom window, pulling me back to reality and the blank ceiling in our apartment. The last 48 hours have been a marathon of medical appointments. Dad and Seema’s mom have flown up to provide moral support but to also act as medical translators who can interpret the tsunami of medical jargon and analysis that is quickly enveloping us. Dad is a cardio thoracic surgeon who grew up in rural India and ended up raising our family in a small town in Georgia. My bald head, eyes and nose are his own. He has a deep commanding voice and is always ready sit back with a glass of wine and reminisce. He brings a calming presence to any situation. As fate would have it, Dad attended medical school with Seema’s mom in the mid 70’s. I lovingly refer to her as Aai, the term for mother in Marathi. When pronounced correctly, “Aai” sounds like a truncated version of the noise an Ewok screams during a surprise attack on Endor. Aai is a successful OB-GYN who has an incredible bond with her daughter. She’s a few inches shorter than Seema, and when in motion, takes short steps that create her trademark waddle. Her shoulder length hair hasn’t changed since I met her in 2007. She likes to laugh and takes immense pride in her ability to make an excellent cup of chai each morning for her family. Seema is paired with a new team of doctors at NYU Langone. Dad and Aai are with us during our first appointments to ask follow-up questions and throw out suggestions for medications or procedures. We try to keep up, but the conversation quickly becomes complex physician speak. Our parents ask follow up questions that I would have never thought of asking. I’ve never been more thankful to have parents who fulfilled the Indian stereotype of studying medicine. The more we speak with our new doctors, Seema and I are thrilled to learn this group actually has bedside manner. They are nothing like the doctor who gave us the original diagnosis. They are patient, caring and empathetic. They become our Dream Team, a multi-headed beast with an expertise in Oncology, Radiology, and Chemotherapy. Seema is young. She is smart. She is beautiful. She has so much potential. I can feel the Dream Team pulling for her. They want her to beat this just as much as I do. I didn’t think that was possible, but I accept it with open arms. As we schedule and await Seema’s first scans that will indicate the severity of the cancer, it becomes increasingly difficult to manage the flood of uncertainties about our future. I thought I had everything planned out. I recently quit my strenuous job as a creative director at a successful advertising agency with plans to freelance as a hired creative gun. Seema just graduated NYU Law School and had the entire summer free before we moved back to Los Angeles and she started a job at the prestigious law firm Skadden Arps. With our newfound flexible schedules and free time we were going to do novel things like eat dinner together. We would finally have time to enjoy New York City with each other and the friends we love. Seema would explore fashion and intern with a designer. I would read the 400 books I’ve ordered on Amazon over the past year but have never read. We would travel and explore the world together. I would work out more. I would do yoga. I would meditate. I would learn Muay Thai. We would get a dog. We would name him Huck. I would do stand-up comedy. I would write movie scripts with Seema and my friends. We would make films. We would get into Sundance. We would all become famous and buy adjacent farms in rural Georgia. We would volunteer for causes we believe in and would eventually win a Nobel Peace Prize and a Congressional Medal of Freedom. Seema and I would attend a State Dinner with Barack and Michelle. I’d make an off-the-cuff joke about Joakim Noah’s hair to the President. He’d think I’m hilarious and would eventually quote me in his final State of the Union. Cancer has other plans. All our dreams take a backseat as we are forced to deal with our new reality. I feel like we’ve been cheated out of a unique window of time we carved out to enjoy life to the fullest before Seema begins her law career. Instead, we are on the phone with NYU trying to figure out the exact date Seema’s student health insurance will expire. In addition to uncertainties about Seema’s health, uncertainties about our future, family, and careers constantly drift in and out of my everyday thoughts. Dwelling on all of these uncertainties will slowly drive me insane. I know this. So I search desperately for something, anything, to distract myself. Seema distracts herself by diving into the prose of Junot Diaz and Chimamanda Ngozi Adichie. Since Johnny Walker has proven himself to be an unpredictable asshole, I bury myself in the 2014 NBA Finals instead. I bury myself with a fanaticism normally reserved for televangelists and NYSE floor traders. The Finals are already a highly anticipated series, a rematch from the previous year between the two-time defending champion Miami Heat and the San Antonio Spurs. I remember watching last year. The Spurs were thirty seconds away from winning the Championship. The Larry O’Brien trophy and velvet ropes were brought out. The Spurs were ready to pop the champagne. Then the Heat went on an improbable run, punctuated by a Ray Allen corner three that sent the game into overtime where the Spurs lost. The Heat emphatically closed out Game 7 in Miami and won the Championship. The close-up of the Spurs bench in the final minutes of Game 7 told a story of combined shock and devastation that I now know all too well. How quickly things slip away… A year later, the basketball stars have aligned perfectly for a rematch. On one hand you have the Heat, trying to achieve a threepeat which would propel Lebron into the next level of the NBA’s Mount Olympus and give more fodder for the pointless “Lebron vs. Jordan” debate. Then there are the Spurs. They are old, banged up, and have a lot mileage. But despite their age, they have been rebuilt into a fast-paced, well-oiled, small-ball machine by the loveable curmudgeon, Coach Popovich. Like 99.7% of human beings, I don’t like the Heat. I didn’t like Lebron leaving Cleveland. I didn’t like his smug assumption of winning 7 straight Championships. I don’t like Heat fans. I don’t like DJ Khaled. I don’t like Gloria Estefan. I’m not a Spurs fan by any means. But the week after the diagnosis, the NBA Finals becomes something completely different for me. This has moved beyond a battle of villains, heroes, rings, legacies, pundits, fan bases and statistics. I need the Spurs to win. I need to know that it’s possible to rebound from a horrific, soul-crushing loss and return stronger, more focused, and triumph. The fact that our lives share nothing in common with NBA athletes doesn’t matter. I need to see a comeback. As the day of Seema’s first scan arrives, however, things are already looking bleak for the Spurs. The teams have split the first two games in San Antonio. The series shifts to Miami and the Spurs are already in a hole. The Heat have stolen home court advantage and no team has beaten Miami on their home court in the Playoffs. I pace our apartment, religiously refreshing Twitter and watching ESPN analysis searching for any kind of Spurs advantage. I watch and loudly narrate Youtube highlights from the previous years Finals analyzing weaknesses in the Miami offense. Seema alternates between tracking my pacing around the room and continuing to read Americanah. When we drive to NYU Langone for her scan, I try not to think about the fast approaching Game 3 and the impeding uphill climb ahead for the Spurs and ourselves. The doctors allow me to be with Seema for the scans, so I sit with her as she changes into a hospital gown in a patient room in the lower levels of the hospital. Dad and Aai wait for us in the waiting room. Seema’s first scan is a PET-CT scan, which stands for Positron Emission Tomography – Computer Tomography Scan. It’s an advanced, nuclear imaging scanning technique that gives detailed information about cell structure. Seema is given orders to drink a viscous, white concoction. The drink contains barium sulfate, which acts like a tracer that helps doctors identify cancer cells on the scan. From its look and consistency, barium sulfate resembles a combination of chalk, buttermilk and elk semen. But luckily this particular bottle of barium sulfate is coffee flavored! Seema says the artificial flavor barely masks the awful taste. “This is the most disgusting thing I’ve ever had in my life.” The grimace on Seema’s face makes it clear Starbucks is completely missing an opportunity to launch an Elk Semen Mocha Liquid Chalk Frappuccino. I hold Seema’s hand as she lays on the hospital gurney and is wheeled into the PET-CT room. The machine looks like a giant, immovable, beige donut that Seema must pass through. Seema scoots from the gurney to the flat slab that will slowly inch her through the scanning device. I stand next to my horizontal wife as doctors, nurses and technicians buzz around preparing the machine and optimizing equipment. As they speak to each other from across the room, it feels like we are preparing to send my wife through the portal in Stargate. I sense myself becoming more and more nervous about the scan and what the results will mean. My heart begins beating faster. I fear the cancer has spread everywhere, even to Seema’s soft earlobes. I think about ways to calm Seema. No need. Amongst the din of technician chatter and medical-speak, I hadn’t noticed Seema nonchalantly chatting to an attending physician about the most recent episode of The Bachelorette. They talk about the rose ceremony last week and a guy who apparently has been acting like “a real dickhead to Andi.” I marvel at my wife who is unfazed by the environment and the moment. I wonder if the scan results will also confirm the absence of fucks given towards the cancer that also resides within my wife’s body. The doctors tell us we need to clear the room so they can begin the scan. They close the vault-like door to protect us from the bombardment of radiation that will envelop my wife. We move to an adjacent room that is the medical equivalent of NASA’s Mission Control. There are so many different monitors, I’m not sure what to look at. I focus on a smaller screen that shows the video feed of the scan room. My wife who has been instructed to stay completely still for the scan to be accurate. Wrapped in multiple thin white blankets, she looks like a tiny, motionless mummy. As she is slowly inched through the Stargate, cross-sectional slices of my wife begin appearing on another screen. The doctors and technicians huddle around it and begin analyzing. I have no clue what the fuck is going on. As I look at my wife on the screen, I imagine Seema intaking Gamma radiation. Maybe like Bruce Banner, she will gain super powers that will immediately cure her and turn her into a stronger being with wondrous abilities. By day she will be a high-powered attorney, but at night she will fight crime on the streets of Brooklyn. When the scanning is complete, Seema appears to have no super powers (yet). She’s just thankful that she can scratch the itch on her knee that’s been bugging her the last hour. Seema, Aai, Dad and I wait for the results in a Radiology patient room. Since the other patient rooms are filled, we are put in a children’s patient room instead. We stare at the wallpaper of dinosaur illustrations as we wait. Dr. Schiff finally enters. He’s the Radiation Oncologist component of the Dream Team. His omnipresent bow-tie is complimented by the omnipresent stethoscope hanging around his neck. He has a walrus mustache that partially obscures a warm smile. Combined with his protruding belly, he reminds me of John Candy if John Candy was a world-renowned radio-oncologist. Dr. Schiff breaks down the scan for us. Luckily, we’ve caught the cancer early before it has the chance to spread to any other organs. He’s spoken to the rest of The Dream Team. There will be no hysterectomy. Instead, they want to pursue an aggressive regimen of radiation and chemo as well as an additional experimental trial of chemotherapy to help eradicate the cancer permanently. I like the word “eradicate.” I like that the doctors are using military terms when talking about fighting the cancer. I like that we are going to show the cancer no mercy. Seema tells me she is ready for a battle. She tells me she is ready for an uphill climb. I feel the same. When we leave the hospital, I feel like we’re slowly emerging from a fog of uncertainty. We finally have a few answers. We know what the enemy looks like and how we’re going to fight it. We watch the next two games of The NBA Finals at our apartment. I was worried with the Spurs losing home court advantage and going to Miami. But the Spurs are now playing as if home court advantage doesn’t matter. They play as if crowds don’t matter. The Spurs find another gear in Miami and begin playing some the best team basketball ever witnessed in the great game. Selfless and beautiful, fluid and precise, the Spurs proceed to put on a clinic and blow out the Heat in back-to-back games in Miami in some of the most lopsided victories ever seen in the NBA Finals. The series heads back to San Antonio, with the Spurs holding a commanding 3-1 series lead. The Spurs could clinch the Championship in Game 5. It’s almost a forgone conclusion given the kind of basketball that the Spurs have been playing. But sports are funny. Anything can happen. You can’t manufacture drama or momentum shifts. And as improbable as a total Spurs collapse could be, you remember the other teams and great players that choked and weren’t able to seal the deal. History is littered with examples of teams defying the odds, going off script and pulling off the impossible. Some friends invite us to watch Game 5 at a bar. Fuck that. I’m not switching up the sports feng shui of watching at home, which has obviously ensured the previous two Spurs’ wins. We need to keep the same energy going. Seema and I order some gyros and sit on our couch for tip-off. The Spurs start horribly, going 0-6 from the field. They are putting up brick after brick. Lebron, on the other hand, is flying around like a demigod. He throws down putback dunks. He drains long-range threes. He swats layups into the San Antonio bench. Five minutes into the game, the Heat lead 22 – 9. The once raucous San Antonio crowd is becoming more eerily quiet by the second. I knew we should’ve watched at the bar. My mind begins a slow downward spiral of dark thoughts. I see the chain of events that will unfold to rob Seema and me of our Spurs’ comeback inspiration: The Heat will win this game. The series goes back to Miami for Game 6. Miami home crowd advantage and another monster game from Lebron creates a momentum shift. The Spurs mental toughness begins to crack. In Game 7, Lebron plays the greatest game of his career. The Spurs choke and implode once again. The Heat and Lebron complete their threepeat. Confetti rains down from the sky as Lebron holds his Finals MVP trophy. Stephen A. Smith can barely contain his erection knowing hours of airtime on First Take can now be filled with Lebron vs. Jordan comparisons. As I see things falling apart for the Spurs, I see things falling apart for Seema’s health. Hope is fading for both. Ghosts of the Spurs’ collapse from the previous year begin to simultaneous haunt the AT&T Center and our apartment. Maybe some defeats are just too devastating to bounce back from. But then something magical happens. Spurs’ shooting guard Manu Ginobili checks into the game. He strides onto the court like a beautiful, balding, Argentinian unicorn. First possession in the game? Bang. Manu nails a three. Next possession? Bang. Manu finds Kawhi Leonard who knocks down another three. The Spurs are still down 12, but it’s a spark. Everything begins clicking for San Antonio. The team that was so dominant the last two games remembers who they are. They move the ball. Shots begin to fall. Defensive stops are made. The crowd gets back in the game. Suddenly the Spurs lead 37-35 In the Spurs’ doomed Finals the year before, Manu did not play well. He had a few too many costly turnovers and made a few too many poor decisions at the wrong times. But watching him play now, I can see he was exorcising his own demons and disappointments from the previous year. The moment that solidifies his redemption occurs in the final minutes of the 2nd quarter, when Manu transforms into an unbridled tempest of Rogaine and storms down the court. He blows by Ray Allen then throws down the mother of all dunks on Chris Bosh. The Spurs crowd collectively loses their shit. Across the globe, bald men in their late 30’s simultaneously feel more powerful without knowing why. Once the Ginobili dunk is thrown down, everyone watching now knows there is no way the Heat are going to win this game. But I continue to watch, even when the Spurs are up by 20 points. The inevitable feels too good to be true. Not until the black and silver confetti falls from the sky for the trophy ceremony do I feel like I can pull away from the screen. Seema, long since bored from the blowout, is in the kitchen drinking some tea while reading a book. I find her and squeeze her with a tight hug. She looks at me, a little concerned her husband has lost his mind. Maybe I did lose my mind for a brief moment. Maybe it’s stupid to be so emotionally invested in a sporting event that has no real relevance or ramifications to our lives. But this one did. Thank you, Manu Ginobili. I believe in comebacks.
{ "pile_set_name": "OpenWebText2" }
The present invention relates to projectiles and in particular to a projectile having a cavity containing a fluid. To obtain a satisfactory range from a projectile it is necessary to stabilize its orientation to prevent excessive yaw or pitch. While judicious design of the center of gravity or the inclusion of fins may provide an aerodynamic moment which assures stability, a large class of projectiles rely on spin stabilization. Through the use of rifling, a launched projectile is spun about its longitudinal axis so that it exhibits the wellknown gyroscopic effect. To ensure that a projectile is gyroscopically stabilized its spin rate must exceed a minimum which is determined by factors such as its mass distribution. A specific cannon or gun having standard rifling does not have the ability to adjust the spin rate or the stability of various projectiles. In order to vary the spin rate a known barrel employed two interlaced riflings having differing twist rates. A projectile having engravings matching the appropriate one of the riflings is manually inserted therein. This approach however, does not allow continuous adjustment of spin rate and does not affect projectile stabilizing characteristics such as its mass distribution. In a known projectile, a slipping obturator is used to reduce the spin rate. This apparatus is exposed to high stress and does not provide for adjustment of stabilizing factors such as the mass distribution of the projectile. In a known launcher, its barrel is spun at a rate appropriate for the projectile being fired. While the spin rate can be adjusted in this apparatus, the highest rate attainable is limited and wear is a problem. The present invention provides a projectile whose flight stability is controlled by a fluid disposed in a cavity of the projectile. The cavity is arranged to allow shifting of the fluid. The resulting mass redistribution can affect flight stability by altering the moment of inertia or the center of gravity as the projectile is trajected. Such mass redistribution can be utilized to increase or decrease the flight stability, in various embodiments. Also, prior to launch the flight stability can be set by the simple expedient of selecting a specific volume or density of fluid. The setting of stability in this fashion may be performed in the factory or in the field. This latter feature is also useful where a standard shell is to be fitted with any one of variously shaped explosives of differing densities. In addition, for some embodiments the fluid employed may be a liquid explosive so that dead weight is avoided. Moreover this shifting of fluid may be arranged to facilitate high angular acceleration during launch, thereby ensuring rapic attainment of the rated spin rate. In some embodiments the fluid shift may occur over a predetermined interval so that the projectile stability varies throughout its trajectory. This feature may be important where it is desired to destabilize the projectile and cause it to fall when it reaches a target.
{ "pile_set_name": "USPTO Backgrounds" }
<?xml version="1.0"?> <ZopeData> <record id="1" aka="AAAAAAAAAAE="> <pickle> <global name="ProxyField" module="Products.ERP5Form.ProxyField"/> </pickle> <pickle> <dictionary> <item> <key> <string>id</string> </key> <value> <string>my_text_area_field</string> </value> </item> <item> <key> <string>message_values</string> </key> <value> <dictionary> <item> <key> <string>external_validator_failed</string> </key> <value> <string>The input failed the external validator.</string> </value> </item> </dictionary> </value> </item> <item> <key> <string>overrides</string> </key> <value> <dictionary> <item> <key> <string>field_id</string> </key> <value> <string></string> </value> </item> <item> <key> <string>form_id</string> </key> <value> <string></string> </value> </item> <item> <key> <string>target</string> </key> <value> <string></string> </value> </item> </dictionary> </value> </item> <item> <key> <string>tales</string> </key> <value> <dictionary> <item> <key> <string>field_id</string> </key> <value> <string></string> </value> </item> <item> <key> <string>form_id</string> </key> <value> <string></string> </value> </item> <item> <key> <string>target</string> </key> <value> <string></string> </value> </item> </dictionary> </value> </item> <item> <key> <string>values</string> </key> <value> <dictionary> <item> <key> <string>field_id</string> </key> <value> <string>my_text_area_field</string> </value> </item> <item> <key> <string>form_id</string> </key> <value> <string>Base_viewFieldLibrary</string> </value> </item> <item> <key> <string>target</string> </key> <value> <string>Click to edit the target</string> </value> </item> </dictionary> </value> </item> </dictionary> </pickle> </record> </ZopeData>
{ "pile_set_name": "Github" }
A mere five years ago, I wrote a piece in the Jane's AWA foreword which mentioned, in passing, the Wrights having launched the age of aeroplane flight. I now believe I was wrong; and happy to admit to such, thanks to John's research [referring to this site's author, John Brown]. Forgive a self-congratulatory statement, but I wish that others were equally ready to admit that they have been wrong.... When John contacted me to ask whether I thought his researches would hold water, there were two challenges for me to address; two questions to be asked. First: “Was Whitehead’s aircraft capable of flight?” Second: “Did it fly?” []. Straight away, I was fascinated by the theory that a serious injustice had been done and that the history books needed to be re-written. I adopted an engineer's approach. Too many debates about Whitehead have been kicked into the 'long grass' by diversionary wrangling over whether this or that witness was reliable; ...could have been mistaken; ...had an axe to grind; ...was a liar/fantasist/attention-seeker, etc. And that entirely spurious "Where's the photograph?" argument. I chose, first, to look at the engineering facts: 1. Was Whitehead’s aircraft capable of flight? By 1900, the leading aviation pioneers possessed reasonably effective wings and propellers — not as efficient as today’s, but good enough to get them into the air and keep them there for a while. The problem was that they didn’t have engines light and powerful enough to propel their aircraft. Engine technology was holding the aeroplane back. Uniquely, however, Whitehead had the benefits of Otto Lilienthal’s aerodynamic experiments back home in Germany, and he was also skilled at making good engines, having trained with MAN in Germany. If any one person was first in a position to put together two main elements (reasonable wing and reasonable engine) needed for aeroplane flight, it was Whitehead. Also, making my decision even easier: a replica of the Whitehead aircraft has been built in recent years....and shown that it can fly. The Wrights executed a few short 'hops' in December 1903 with an aeroplane having a sophisticated wing and a 12 hp engine; Whitehead flew two years before in an aeroplane with an inferior wing, but 30 hp installed power to overcome that deficiency. Whitehead flew by brute force triumphing over aerodynamics, but there is nothing in the rules of 'coming first' that says you are not allowed to attack wallnuts with a sledgehammer. Therefore, on the engineering facts alone, I am professionally convinced that the Whitehead aircraft was capable of flight. 2. That changes the second, historical, question from “Did it fly?” to “How could it not have flown?” We know that Whitehead had a flyable aircraft. ...He was dedicating all his efforts to flying ...Newspaper articles (the first written by the Editor of the Bridgeport newspaper, who was present and saw with his own eyes) reported his flights on more than one occasion in 1901 and (a different aeroplane) 1902 ...In later years, 17 people made formal statements saying they saw him fly John's research completely destroys the previously accepted view, circulated by Orville Wright, that only one provincial newspaper took Whitehead seriously. Contrarywise, for a while, he was front-page news around the World and his work featured in learned journals such as The Scientific American and Aeronautical World. Bizarrely, the most convincing argument for Whitehead having flown first comes from Orville Wright. In 1945, the surviving Wright brother wrote in an aviation magazine about the “Whitehead Legend” — dismissing the man and his aircraft as not worthy of serious consideration. One can understand an old man like Wright wanting to make sure of his place in history, and one can accept that he might misinterpret a few facts in his own favour. Had Wright said, “My brother and I were first to fly, but we were lucky to be first because this man Whitehead also had a darn fine aircraft” then that might be, just, believable. However, as an aircraft engineer and designer himself, Orville knew full well that Whitehead’s Condor aircraft was a serious, flyable machine. Further, it beggars belief that he was so switched-off about the progress of aviation in 1900-03 that he missed the fact that Whitehead was flying a second, different aeroplane in 1902. Nonsense: He and his brother would have hung on to every word written and spoken about eveyone else trying to fly an aeroplane in those days -- and while they may have missed an edition of the Bridgeport Herald, is is not credible that they did not hear about it and also neglected flying articles in The Scientific American and the Aeronautical World. Orville deliberately and maliciously dismissed Whitehead's two aircraft and implied that any thoughts of them taking to the air were a joke. That sounds to me like a man desperately trying to bury some inconvenient facts. Thus, if flying were a crime, I would expect a jury to convict Whitehead on the circumstantial evidence alone. 
{ "pile_set_name": "OpenWebText2" }
IL-12 gene-modified bone marrow cell therapy suppresses the development of experimental metastatic prostate cancer. To investigate the immunomodulatory effects of interleukin-12 (IL-12) for treatment of metastatic prostate cancer, we administered adult bone marrow cells (BMC) that were genetically modified by retroviral vector-mediated IL-12 gene transduction in an experimental mouse model of prostate cancer metastasis. This therapy produced significant anti-metastatic effects in bone and lung and prolonged animal survival. Flow cytometric analysis indicated donor BMC could effectively home to bone and lung after treatment. Intensive infiltration of CD4 and CD8T cells in lung metastases and increased systemic natural killer and cytotoxic T lymphocyte activities indicated induction of a significant anti-metastatic immune response after treatment with IL-12 transduced BMC. Our results demonstrate the therapeutic potential of gene-modified BMC gene therapy.
{ "pile_set_name": "PubMed Abstracts" }
/* * Licensed to the Apache Software Foundation (ASF) under one * or more contributor license agreements. See the NOTICE file * distributed with this work for additional information * regarding copyright ownership. The ASF licenses this file * to you under the Apache License, Version 2.0 (the * "License"); you may not use this file except in compliance * with the License. You may obtain a copy of the License at * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, * software distributed under the License is distributed on an * "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY * KIND, either express or implied. See the License for the * specific language governing permissions and limitations * under the License. */ drop dataverse test if exists; create dataverse test; use test; create type test.MyRecord as { id : bigint, point : point, kwds : string }; create external dataset MyData(MyRecord) using localfs((`path`=`asterix_nc1://data/spatial/spatialData.json`),(`format`=`adm`));
{ "pile_set_name": "Github" }
Background {#Sec1} ========== The prevalence of obesity in the general population has increased dramatically over the last 30 years and it seems likely that the environmental changes that have provoked these increases have also affected people with severe mental illness (SMI); in fact, the rates of overweight and obesity have increased even more rapidly in this cohort \[[@CR1]\]. Obesity adversely affects the physical health and psychological well-being of people with SMI and if weight gain is attributed to treatment, this can lead to non-adherence and risk of relapse. Schizophrenia is a major psychiatric disorder that alters the individual's perception, thoughts, affect and behaviour and may involve a loss of insight and has a lifetime prevalence of approximately 1% \[[@CR2]\]. Schizoaffective disorder is recognised as a separate condition to schizophrenia and is more likely to occur in women at a later age. This disorder affects an individual's thoughts and emotions \[[@CR3]\]. Although individuals with first-episode psychosis do not fulfil the diagnostic criteria for schizophrenia or schizoaffective disorder, 90--95% of people presenting with a non-affective psychotic episode (i.e. not mania and not depressive psychosis) will still meet the criteria for a schizophrenia spectrum disorder 2 years later. Mortality rates are increased two to three fold in people with SMI and life expectancy is reduced by 10--20 years. Approximately 75% of all deaths in people with schizophrenia are caused by physical illness with cardiovascular disease being the commonest cause \[[@CR4]\]. Overweight and obesity contribute to this excess morbidity and mortality. Recent studies indicate that obesity is two to three times more common among people with SMI \[[@CR5]\]. Obesity occurs early in the natural history of schizophrenia with a significant proportion of people with first-episode psychosis being overweight prior to any treatment. Substantial weight gain (\> 7%) often occurs rapidly within 6--8 weeks after antipsychotic-treatment initiation \[[@CR6]\]. While most weight gain occurs early in treatment, longer-term observational studies suggest that weight gain continues for at least 4 years albeit at a slower rate \[[@CR7]\]. Individuals with schizophrenia are more likely to consume a diet that is rich in fat and refined carbohydrates while containing less fibre, fruit and vegetables than the general population \[[@CR8]\]. Although there are fewer studies, people with first-episode psychosis also have poor diets \[[@CR9]\]. Physical inactivity and the social and urban deprivation experienced by those with schizophrenia may contribute further to the increased obesity rates \[[@CR8], [@CR10]\]. There may be disease-specific effects of schizophrenia, such as genetic susceptibility, that have additive or synergistic actions to increase body weight further \[[@CR5]\]. However, the most important factor related to weight gain in people with SMI is the use of antipsychotic medications, which are among the most obesogenic drugs. Weight gain is the commonest side effect of second-generation antipsychotic medication, affecting between 15 and 72% of patients \[[@CR11]\]. Other psychotropic drugs are often prescribed to people with schizophrenia and include some antidepressants and mood-stabilising drugs, such as lithium and sodium valproate; these may also induce significant weight gain \[[@CR12]\]. Both lifestyle and pharmacological interventions lead to significant reductions in body weight in the general population. Not only are the interventions clinically effective, they are also cost-effective because of the benefits of long-term improved health outcomes, including decreased mortality \[[@CR13]\]. It is likely that similarly effective interventions for people with schizophrenia will also lead to improvements in health and would be a major step towards reducing the health inequalities experienced by people with schizophrenia. As the weight gain associated with antipsychotic medication result in some people discontinuing their medication, we hypothesis that effective weight-management strategies may also lead to improved adherence to antipsychotic medication and reduced relapse and hospitalisation rates. Some studies have suggested that short-term lifestyle interventions could support weight reduction in people with SMI. A meta-analysis of non-pharmacological interventions in people with SMI \[[@CR14]\] reported a mean reduction in weight of 3.12 kg over a period of 8--24 weeks. However, the results of longer-term studies are more mixed. A recent meta-analysis found significant weight loss in only two of six studies with interventions lasting longer than a year \[[@CR15]\]. Most studies have included a mixed population of people with SMI and two large studies, which included only people with schizophrenia, found no effect of a lifestyle intervention on body weight \[[@CR16], [@CR17]\]. These latter studies suggest the weight management in people with schizophrenia may require a different approach from other SMIs such as bipolar disorder. Given the challenges of implementing lifestyle change in people with schizophrenia and the lack of long-term effectiveness, alternative approaches are needed to manage overweight and obesity. A wide variety of treatments have been subject to clinical studies but currently no drug treatments are licensed for the treatment of antipsychotic-medication-associated weight gain or obesity in people with SMI with the exception of orlistat \[[@CR18]\]. The long-term use of the latter, however, is extremely limited by high discontinuation rates, making it of little value in routine clinical practice \[[@CR19]\]. To date, there have also been three completed trials of glucagon-like peptide 1 (GLP-1)-receptor agonists in people with SMI, two of which used exenatide and one used liraglutide (maximum dosage 1.8 mg) \[[@CR20]--[@CR22]\]. Liraglutide is a GLP-1-receptor agonist, with 97% homology to human GLP-1, which induces weight loss in humans mainly by reducing appetite and caloric intake, rather than increasing energy expenditure. There were contrasting results in the exenatide studies with one showing no difference between groups after 12 weeks of treatment \[[@CR20]\] but in the other the exenatide arm had greater mean weight loss (− 5.29 vs − 1.12 kg; *P* = 0.015), and reduced glycosylated haemoglobin (HbA~1c~) levels (− 0.21% vs 0.03%; *P* = 0.004) \[[@CR21]\]. In the liraglutide (maximum dosage 1.8 mg) study, glucose tolerance improved in the liraglutide group and body weight decreased compared with placebo (− 5.3 kg; 95% confidence interval (CI) − 7.0 to − 3.7 kg) \[[@CR22]\]. Liraglutide is approved for the management of obesity at a dosage of 3.0 mg daily, which is higher than the dosage used to treat diabetes \[[@CR23]\]. In a 56-week, double-blind trial involving 3731 participants without type-2 diabetes, 63.2% of the intervention arm compared with 27.1% in the placebo arm group lost at least 5% of their body weight, and 33.1% and 10.6%, respectively, lost more than 10% of their body weight \[[@CR23]\]. We have, therefore, chosen to use liraglutide (maximum dosage 3.0 mg) as we postulate that a higher dosage of liraglutide may offer even greater weight loss in people with SMI than the 1.8-mg dosage employed in the previous study or other currently available GLP-1-receptor agonists. Aims and objectives {#Sec2} ------------------- The aim of this pilot study is to undertake a double-blind, randomised controlled trial (RCT) of the use of liraglutide (maximum dosage 3.0 mg daily) in comparison to placebo in 60 obese or overweight people with schizophrenia, schizoaffective disorder or first-episode psychosis to assess the feasibility and acceptability of delivering a full-scale trial evaluating treatment with liraglutide in people with schizophrenia, schizoaffective disorder and first-episode psychosis. Methods {#Sec3} ======= Design {#Sec4} ------ This study is a double-blind, randomised pilot study of the use of liraglutide (maximum dosage 3.0 mg daily) in comparison to placebo (Fig. [1](#Fig1){ref-type="fig"}). It is important to include a double-blind placebo for two main reasons; there is evidence that people would be less likely to consent to a trial that includes a placebo arm because of the risk of not receiving an active treatment. As our ability to recruit to the trial was one of our key aims, it is important to assess whether the inclusion of a placebo prevented us from recruiting to the trial. Previous experience from weight-management trials that include pharmaceuticals have been plagued by high dropout rates in the placebo arm as the participants are able to assess the effectiveness of treatment. To adequately power a full RCT of liraglutide, we will need to know the likely dropout rate in the placebo group in this patient population. Fig. 1Consolidated Standards of Reporting Trials (CONSORT) study diagram Setting {#Sec5} ------- The study will be take place in a variety of community and inpatient mental health locations in the Southern Health NHS Foundation Trust. Public and Patient Involvement was actively included in the development of the trial and will continue throughout the trial. Ethics approval and consent to participate {#Sec6} ------------------------------------------ South Central -- Hampshire B Research Ethics Committee (REC) approved the study on 17 April 2018 with REC reference: 18/SC/0085. Only those who agree to provide written informed consent will be included in the study. The study will be conducted in keeping with Good Clinical Practice (GCP) and the International Conference of Harmonisation (ICH) standards. The Trial Steering Committee (TSC) includes an independent chair and two other independent members, including a service user. The main trial investigators will also attend the TSC. Participants {#Sec7} ------------ Adults are eligible to participate in the study if they: Are aged 18--75 yearsHave a clinical diagnosis of schizophrenia or schizoaffective disorder (defined by *International Classification of Diseases, version 10* (*ICD-10*) codes F20 and F25) or first-episode psychosis using case note review. There is no limit on the duration of illness for those with schizophrenia or schizoaffective disorder but first-episode psychosis is defined as less than 3 years since presentation to the mental health team or the use of the first antipsychotic medication prescriptionAre being treated with an antipsychotic medication, with a minimum duration of 1 month prior to entry in to the trial. No restriction is placed on the class or generation of the antipsychotic medicationAre able to give written informed consentAbility and willingness to take liraglutide or placeboAre able to speak and read EnglishHave a Body Mass Index (BMI, calculated as weight in kilograms divided by height in meters squared) *≥* 30 kg/m^2^ (obese), or *≥* 27 kg/m^2^ to \< 30 kg/m^2^ (overweight) in the presence of at least one weight-related consequence such as dysglycaemia (pre-diabetes or type-2 diabetes), hypertension, dyslipidaemia or obstructive sleep apnoea People are excluded from the study if they have a: Physical illnesses, e.g. cancer, that could seriously reduce their life expectancy or ability to participate in the trialA co-existing physical health problem that would, in the opinion of the principal investigator, independently impact on metabolic measures or weight, e.g. Cushing's syndrome, poorly controlled type-2 diabetes defined by HbA~1c~ level \> 8% (64 mmol/mol)Inflammatory bowel disease and diabetic gastroparesisContraindications to liraglutide: hypersensitivity to liraglutide or to any of the excipients Any condition which, in the investigator's opinion, might jeopardise a participant's safety or their compliance with the protocolFamily or personal history of multiple endocrine neoplasia type-2 or medullary thyroid carcinoma. Family is defined as a first-degreerelativeHistory or presence of pancreatitis (acute or chronic)History of diabetic ketoacidosisAny of the following: myocardial infarction, stroke, hospitalisation for unstable angina or transient ischaemic attack within the past 180 days prior to the day of screeningParticipants presently classified as being in New York Heart Association Class IVPlanned coronary, carotid or peripheral artery revascularisation known on the day of screeningRenal impairment measured as an estimated glomerular filtration rate (eGFR) value of \< 30 ml/min/1.73 m^2^ as defined by the Kidney Disease Improving Global Outcomes (KDIGO) 2012 classificationImpaired liver function, defined as alanine aminotransferase (ALT) ≥ 2.5 times the upper normal limit at screeningProliferative retinopathy or maculopathy requiring acute treatmentPresence or history of malignant neoplasms within the past 5 years prior to the day of screening. Basal and squamous-cell skin cancer and any carcinoma in situ is allowedUse of other pharmacological products for weight managementMental illnesses that could seriously reduce their ability to participate in the trial, including significant suicidalityCurrent pregnancy or a desire to become pregnant. Mothers who are less than 6 months post-partum or breastfeeding will also be excluded. In line with the current EU licence and advice from the Medicines and Healthcare products Regulatory Agency (MHRA), sponsor and manufacturer, any women who may become pregnant during the trial but are unwilling to use a highly effective method of birth control (e.g. such as implants, injectables, combined oral contraceptives, intrauterine devices, sexual abstinence or having a vasectomised partner) will not be eligible for the trialSignificant alcohol or substance misuse which, in the opinion of the principal investigator, would limit a participant's ability to participate in the trialA diagnosis or tentative diagnosis of psychotic depression or maniaA primary diagnosis of learning disability or cognitive impairment which would impair a participant's ability to self-administer trial medicationLack of capacity. Those who lose capacity any time during the study will not be eligible to continue and will be withdrawn from the study immediately with no further study procedures carried outHistory of type-1 diabetes.Current or previous use of incretin-based therapies (GLP-1-receptor agonist or dipeptidyl peptidase 4 (DPP-4) inhibitors) or insulin Sample size {#Sec8} ----------- This pilot trial will explore the feasibility and practical issues of conducting a future definitive trial and estimate the important parameters to help its design. In this regard, sample size is based on the need to estimate study parameters within a reasonable degree of precision rather than on hypothesis testing. Simulation work by Sim et al. (2012) recommended a minimum of 50 participants (25 per group) in order to achieve the pilot/feasibility objectives \[[@CR24]\]. A further paper by Whitehead et al. recommended pilot trial sample sizes per treatment arm of 75, 25, 15 and 10 for standardised effect sizes that are extra small (≤ 0.1), small (0.2), medium (0.5) or large (0.8), respectively \[[@CR25]\]. In the previous liraglutide study in people with SMI, 10% of the liraglutide arm and 2% in the placebo arm had dropped out of the trial after 16 weeks \[[@CR22]\]. Although dropout from obesity trials is non-linear as those on active treatment drop out earlier because of side effects while those on placebo drop out later because of lack of efficacy, we assume a conservative dropout rate at 6 months of between 15 and 20%. As such, we will need to recruit at least 60 participants (30 per group) to provide robust estimates that will inform the design of the definitive trial. In a pilot trial looking at the use of liraglutide (maximum dosage 1.8 mg) of 214 potential participants assessed for eligibility, 103 were randomised. Of the 111 excluded, 86 did not meet the final inclusion/exclusion criteria, 23 declined to participate and 2 had too severe a degree of mental illness to participate \[[@CR22]\]. However, in a similar study examining the use of once-daily exenatide in people with schizophrenia, out of 123 potentially eligible participants, only 28 were randomised with 63 declining to participate \[[@CR21]\]. We used these data to estimate our screen-to-randomisation rate. Selection {#Sec9} --------- The study will be promoted within clinical teams and in areas where community mental health services are delivered in the Southern Health NHS Foundation Trust. It is estimated that \~ 70% of those with a recorded diagnosis of schizophrenia or one of its subtypes attending community and inpatient settings of the Southern Health NHS Foundation Trust fulfil the inclusion criteria. This equates to approximately 500 individuals across the trust. Assuming that 30% of patients were willing to take part, we would be able to recruit up to 60 patients for the study within 12 months. Confirming these screening and enrolment rates is part of the reason for performing the study. In addition, the Early Intervention in Psychosis team in Southampton receives approximately 20 new referrals a month. Although these individuals do not fulfil the diagnostic criteria for schizophrenia, we intend to include them in the study for the following reasons: Up to 80% of individuals treated with antipsychotic medication during a first episode of psychosis gain more than 7% of their body weight within 12 weeks of treatment.People with first-episode psychosis are more likely to develop weight-induced metabolic abnormalities and consequently the benefits may be greater Participants will be advised verbally and in writing that they will be able to end their participation in the study at any point without affecting their clinical care. The investigators will also have the right to withdraw participants from the study if they lose capacity, develop any of the exclusion criteria or miss their 3-month study visit. The rationale for the withdrawal will be recorded and dated in the Case Report Form (CRF) accordingly. Participants withdrawing from the trial treatment will be encouraged to undergo the same final clinical evaluations. Randomisation {#Sec10} ------------- After baseline assessments, participants will be randomised to either daily subcutaneously administered liraglutide (maximum dosage 3.0 mg) or matching placebo. Equal numbers of participants will be randomised to each arm of the trial using simple randomisation with permuted, blinded, block size. Novo Nordisk prepares and provides the subject randomisation list (SRL) using a computer-based programme. All participants, carers and study personnel except the pharmacy team will be blinded to treatment assignment. This includes the statistician undertaking the data analysis. Emergency un-blinding will be undertaken if a participant develops an adverse event that requires knowledge of the treatment, an overdose of trial medication or there is a clinical need to start a participant on medication which has a risk of interaction with the trial drug. Intervention {#Sec11} ------------ Before screening, all potential participants will be provided with written information about the trial including the most common adverse event and the procedures involved in the study. All participants will receive standardised written information about healthy eating, physical activity, alcohol and smoking. Liraglutide will be used according to the current EU licence for Saxenda®; the starting dose will be 0.6 mg per day. Participants will be taught face-to-face about using the injection pen and will be witnessed giving the first injection. Participants will be given an instruction leaflet to take away with them. The dose will be increased each week by 0.6 mg to a maximum dosage of 3.0 mg per day. Participants who do not tolerate up-titration will remain on the highest tolerable dosage. Each participant will attend 4-weekly visits where concomitant medications and adverse events will be documented. In addition at the baseline, 3- and 6-month visits they will also have clinical data collected (secondary endpoints) including drawing blood samples. The blood samples will be analysed for fasting plasma glucose (FPG), lipid profile and HbA~1c~ level~.~ Participants will be invited at baseline and study completion to take part in one-to-one interviews with a psychologist, trained and experienced in qualitative research methodology, to explore expectations and experience of their participation in the trial. Outcome measures {#Sec12} ---------------- ### Primary objective {#Sec13} The primary objective of the pilot trial is to investigate the feasibility and acceptability of delivering a full-scale trial evaluating whether liraglutide 3.0 mg, once-daily injectable therapy, may be an effective treatment of overweight and obesity in people with schizophrenia, schizoaffective disorder and first-episode psychosis. In order to achieve our primary objective, the study will gather data on: Time to reach the recruitment targetThe number of eligible participants required to be screened in order to reach the recruitment target. Key characteristics and reasons for not joining the trial will be recorded, in line with the Consolidated Standards of Reporting Trials (CONSORT) criteria for clinical trialsTo estimate participant attrition rateTo estimate adherence to the investigational medicinal product (IMP) ### Secondary exploratory outcomes {#Sec14} To estimate effect size and standard deviation (SD) of the change in weight at 6 months in order to inform a power calculations for a fully powered RCT based on this feasibility pilot study. Changes in waist circumference, BMI, FPG, HbA~1c~ level, blood pressure, lipid profile, adverse events and Brief Psychiatric Rating Scale (BPRS) score at 3 and 6 months will also be assessed.. The BPRS is an instrument used for assessing the positive, negative and affective symptoms of psychotic disorders, especially schizophrenia. The BPRS will, therefore, be used to assess any changes in mental health during the trial. Follow-up windows for 3- and 6-month follow-ups will be defined as minus and plus 2 weeks to allow for missed appointments. A schedule of follow-up activities is shown in Fig. [2](#Fig2){ref-type="fig"}. Fig. 2Schedule of outcome measures and trial-related activities Safety assessments {#Sec15} ------------------ Heart rate and glycaemia assessments will be taken at baseline and at 3 and 6 months post randomisation. Adverse events (AEs) are defined as the side effects listed in the Summary of Product Characteristics (SmPC) and include nausea, vomiting and diarrhoea. Medication error and laboratory outliers will also be considered as AEs. AEs will be monitored every 4 weeks. Serious Adverse Events (SAEs) are defined as per GCP. Any SAE which a member of the study team deems to be associated with the trial intervention will be assessed by the principal investigator. There are SAEs that are expected for the patient population: Psychiatric hospitalisationWorsening of psychiatric symptomsSelf-harmSuicide attemptDeath from suicide If the investigator deems that any of these expected events are at least possibly related to the study drug then these will be reported as serious adverse reactions (and not events). All SAEs that are both 'unexpected' (that is, the type of event is not listed in the protocol as an expected occurrence); and 'related' (that is, it resulted from administration of any of the research procedures) will be reported to the sponsor for expedited reporting to the TSC and the REC. No serious adverse outcomes are anticipated associated with use (or not) of the trial medication; therefore, no interim statistical analysis is planned regarding safety; however, the TSC will review all SAEs periodically. Data analysis {#Sec16} ------------- Data will be analysed in accordance with the trial's detailed Statistical Analysis Plan (SAP) (Additional files [1](#MOESM1){ref-type="media"} and [2](#MOESM2){ref-type="media"}), a summary of the main methods are as follows: All data will be analysed based on the intention-to-treat population. Continuous variables will be analysed by either mean or median, with groups compared statistically using either a paired *t* test or a Mann-Witney *U* test as appropriate. Categorical variables will be presented as *n* (%) with groups compared using chi-squared or Fisher's exact tests. The difference in weight change between groups will be analysed using generalised linear models (GLMs), both unadjusted and adjusted for covariates that are identified as potential confounders in univariate testing. All statistical tests will be two-sided with statistical significance assumed at 0.05. Key characteristics and reasons for not joining the trial will be recorded for all participants screened. A CONSORT diagram will be used to summarise this information and reasons will also be provided if applicable. Demographics and person-reported outcome data at baseline will be summarised using number and proportion, mean and SD or median and interquartile range (IQR) as appropriate. ### Analysis of primary objectives {#Sec17} This study focusses on the feasibility of recruiting from this patient population for a fully powered RCT. The following will be reported: Time to reach recruitment target (in weeks) ◦ Mean number of participants recruited per week◦ Rate of successful screens◦ Participant attrition rateAdherence to the IMP (defined as the proportion of medication used by each person ranging from 0 to 100%) ◦ Either mean (SD) or median (IQR) adherence will be presented as appropriate◦ Number of participants using at least 70% of the prescribed trial medication. Adherence to the IMP is defined as the number of empty cartridges returned at each visit divided by the total number of cartridges prescribed ### Analysis of secondary exploratory outcomes {#Sec18} Changes in weight (defined as weight in kilograms at 3 or 6 months minus weight in kilograms at randomisation), BMI, waist circumference, BPRS score, HbA1c level, FPG, lipid level, systolic and diastolic blood pressure, and adherence to randomised treatment (including the effect of the using the optional text-messaging reminder service or not), type of diabetes medication, change in type or dose of diabetes medication, type of antipsychotic medication, change in type or dose of antipsychotic medication between the two treatment groups will be summarised and tested for significance, as will the number of participants experiencing a weight loss of at least 5% from baseline to 3 to 6 months. Change in body weight between the two groups at 26 weeks will be further analysed using a GLM adjusted for baseline weight and other covariates. ### Missing data {#Sec19} Analysis will be completed using list-wise deletion of missing data. Participants with and without missing data will be compared for differences in demographic and physiological data where possible. ### Harms {#Sec20} The number (and percentage) of participants experiencing each AE/SAE will be presented for each treatment arm categorised by severity. Qualitative component of study {#Sec21} ------------------------------ One-to-one semi-structured interviews will be held with a sub-sample of liraglutide-treated participants and healthcare professionals delivering the intervention to provide data on the drug treatment. Purposive sampling will ensure diversity in terms of demographic and disease characteristics. Participants (10--12 from each trial arm) will be interviewed until data saturation is met. Semi-structured interview-topic guides will contain questions intended to elicit themes outlined in the existing published literature, after exploring more general open questions on the experience and acceptability of the treatments. Interviews will be held before, during and at the end of the trial. For mental health workers, key themes relate to the perception of pharmacological interventions as part of the care-coordinating role, workload, the need for specialist knowledge and views on client adherence. We will use May's normalisation process model as a theoretical framework to understand the conditions necessary to support the introduction, embedding and integration of a weight intervention as a routine element of care. All semi-structured interviews will be audio-taped and fully transcribed. Content and thematic analysis will use the National Centre for Social Research 'Framework' approach. Trial status {#Sec22} ============ Recruitment opened on 2 July 2018 and we aim to complete recruitment by 31 July 2019. Protocol version 1.6, dated 22 May 2018, is being used. Discussion {#Sec23} ========== Obesity adversely affects the physical health and psychological well-being of people with SMI. If weight gain is attributed to treatment, this can lead to non-adherence and risk of relapse. The provision of an effective intervention to reduce the burden of overweight and obesity in people with schizophrenia, schizoaffective disorder and first-episode psychosis would improve physical health and reduce the risk of developing obesity-related illnesses as well as improving psychological well-being. This pilot study is a double-blind, randomised, placebo-controlled trial investigating the use of once-daily liraglutide subcutaneous injection in obese or overweight people with schizophrenia, schizoaffective disorder or first-episode psychosis. It aims to explore the feasibility and practical issues of conducting a future definitive RCT evaluating weight change with liraglutide in overweight or obese people with SMI. This feasibility trial should estimate important parameters to help its design. One potential limitation of this feasibility trial is the funding by the investigational drug manufacturer. In order to mitigate against this bias, the trial was sponsored by the Southern Health NHS Foundation Trust, which has the responsibility for the initiation, management, conduct, analysis, reporting and publication of the trial. Although Novo Nordisk is providing support financially and the product for the trial, Novo Nordisk is not involved in the conduct, management and delivery of the trial. Additionally, the initial idea, rationale and design for the trial came from the chief investigator. Nevertheless, the results of this study will need to be confirmed in a fully powered, investigator-led trial. This research should contribute to the development of effective weight-management intervention programmes for people with SMI. It should provide information on whether injectable GLP-1-receptor agonists are an acceptable weight-loss medication in this group of people. Further, potentially more effective, GLP-1-based medications are in development including once weekly and orally administered versions which may prove to be a better option for people with SMI if once daily injections are shown to be feasible. . Additional files ================ {#Sec24} Additional file 1:Statistical Analysis Plan (SAP). L. O. S. E. Weight Pilot Study. (DOCX 39 kb) Additional file 2:Standard Protocol Items: Recommendations for Interventional Trials (SPIRIT) 2013 Checklist: recommended items to address in a clinical trial protocol and related documents. (DOCX 121 kb) AE : Adverse event BMI : Body Mass Index BPRS : Brief Psychiatric Rating Scale CI : Confidence interval CRF : Case Report Form eGFR : Estimated glomerular filtration rate FPG : Fasting plasma glucose GCP : Good Clinical Practice GLM : Generalised linear model GLP-1 : Glucagon-like peptide 1 ICH : International Conference on Harmonisation RCT : Randomised controlled trial REC : Research Ethics Council SAE : Serious adverse event SD : Standard deviation SmPC : Summary of Product Characteristics TSC : Trail Steering Committee **Publisher's Note** Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations. Not applicable. RIGH, HCP, SR, PP, KT, KBK and CAW wrote the original protocol. RIGH, HCP, SR, PP, KBK and CAW were co-applicants on the investigator-led Novo Nordisk grant application. CAW, HCP, SR, PP, KBK, KT, CR, RP, JM and RIGH refined the protocol. CA reviewed the protocol from a Patient and Public Involvement (PPI) point of view. All authors critically reviewed the protocol manuscript. All authors read and approved the final manuscript. The study team was awarded an investigator-led grant by Novo Nordisk Ltd. The protocol was designed by the investigators and the funder will have no role in the analysis of the results. Sponsor: Southern Health NHS Foundation Trust. Not applicable. South Central -- Hampshire B Research Ethics Committee (REC) approved the study on 17 April 2018 with REC reference: [@CR18]/SC/0085. Only those who agree to provide written informed consent will be included in the study. Not applicable. CAW, HCP, PP, SR and KT are employees of the Southern Health NHS Foundation Trust. HCP received fees for lecturing, consultancy work and attendance at conferences from Novo Nordisk. SR received fees for speaking at conferences from Janssen, Lundbeck and Otsuka. KBK received fees for advisory board participation, consultancy work and attendance at conferences from the following: Sanofi, Roche Diabetes Care, Lifescan, Novo Nordisk, Silvercloud, and Senseonics. RIGH received fees for lecturing, consultancy work and attendance at conferences from the following: Boehringer Ingelheim, Eli Lilly, Janssen, Lundbeck, Novo Nordisk, Novartis, Otsuka, Sanofi, Sunovion, Takeda, and MSD.
{ "pile_set_name": "PubMed Central" }
If people are stupid enough that they need a law to make them do the right thing then that gene pool needs chlorinated whether it's jaywalker and an escalade or whatever else. What's wrong with personal responsibility instead a nanny state? It may not be their own genes they're eliminating. It could be the neighbor kid's genes. So when someone walks into traffic and a car swerves and wrecks, how do you hold the jaywalker responsible if it's not illegal to jaywalk?
{ "pile_set_name": "Pile-CC" }
Google SSL Search - jamesbkel http://www.google.com/support/websearch/bin/answer.py?answer=173733&hl=en ====== wladimir This was available for quite a while already, though in beta/labs. I'm not sure what is new. ~~~ JonnieCache Yeah, it doesn't seem any different to how its been in the past year. The _beta_ sigil is still under the logo. I wish theyd put the links to maps and images back in, maybe with some visual warning that theyre not encrypted. I have SSL search as the default search in chrome, and I hate having to manually jump back to normal google to do image searches. While we're here, don't forget SSL wikipedia! <https://secure.wikimedia.org/wikipedia/en/wiki/Main_Page> ~~~ mike-cardwell If you're using the HTTPS-Everywhere Firefox addon (1), or the HTTPS- Everywhere Squid redirector (2), you don't need to know/remember about the SSL versions of Wikipedia or Google. You're just sent there by default. 1.) <https://www.eff.org/https-everywhere> 2.) <https://github.com/mikecardwell/perl-HTTPSEverywhere> ------ mahrain Been using this for a year now, there's also a hack to use it in the Chrome bar by entering a custom search engine. Very handy and works nice. Only miss is that I can't immediately click through to image searches, they're only available over unsecured HTTP. ~~~ lobster_johnson Unfortunately, you lose autocompletion (other than history autocompletion) when you use something other than the built-in Google search. ------ nodata Good, but to make this truly useful we need a really simple way to specify which country-specific google search engine we would like results from. ------ jamaicahest DuckDuckGo has been using this for many months, when you use the !g bang ~~~ rlpb Really? It doesn't seem to do it for me. Do you have some setting set somewhere? ------ lini Anyone that has the HTTPS everywhere extension (Firefox) is already using the SSL search in Google. As others noted it has been in beta for quite a long time and is missing some features like the image search or the doodles on the homepage. ------ buster Also, if you want to browse on SSL whereever possible: [https://chrome.google.com/webstore/detail/flcpelgcagfhfoegek...](https://chrome.google.com/webstore/detail/flcpelgcagfhfoegekianiofphddckof) Love this Extension! ------ RyanKearney The only thing I dislike about this is it hides the refer, screwing up my analytics. I'd have to completely convert all of my sites to HTTPS only to be able to make use of the additional headers for analytical purposes. Not really a big deal I guess, but kind of unnecessary to have to purchase wildcard certs if you have many sub domains. ~~~ dspillett The free certs from <http://www.startssl.com/> are apparently accepted by most browsers these days (the exception being IE6/7 users on XP who have not downloaded the optional CA cert updates): <http://en.wikipedia.org/wiki/Startssl#StartSSL> I've not used their cert for anything yet (I plan to test them on some personal sites when I get chance, before using them elsewhere), and wildcard certs are not free (but they do seem relatively cheap), but it might be worth looking into for someone in your position. ~~~ thepsi I've used them for a few personal sites and projects with no complaints. The fee for wildcard certs (~60USD) is a one-off to verify your identity - usually via a quick phone call to confirm details from your official documents. Once that's complete, you can generate as many certs as you need (incl. wildcards and Subject Alternative Name) from their control panel, subject to jumping through the usual hoops to prove that you have control of each domain. ~~~ RyanKearney I do use StartSSL but the problem just comes from having multiple sub domains. I get IPv4 addresses for $0.50/mo/each but I'd rather not setup each subdomain on its own dedicated IP for the sakes of using free SSL certs. ~~~ dspillett You don't need multiple IPv4 addresses to make use of a wild-card (or other multi-name) certificate. A wildcard certificate will verify any matching domain so you could have many sub-domains of the same domain (using a single certificate for *.domain.tld) on one address and browsers would not complain. Also you could run the distinct (sub)domains on different ports on the same address, though this is perhaps less useful. Also, with SNI you can use many single-name certificates on one address (and all on the same port) using SNI. Unfortunately there are a number of significant client combinations that won't play nice with this (most notably, if you can't guess, IE on Windows XP): <http://en.wikipedia.org/wiki/Server_Name_Indication#Support> ~~~ RyanKearney I know that. I'm saying I don't want to have to pay for a wildcard certificate since you can get free certs for individual domains. The alternative for me purchasing a wildcard domain would be to get many different single domain certs for free and assign each one to a different IP address.
{ "pile_set_name": "HackerNews" }
Ýazguly Hojageldiýew Yazguly Berdymuhammedovich Hojageldiyev (; born 16 February 1977) is a Turkmen football manager and former professional footballer who is currently the manager of the Altyn Asyr FK. Honored coach of Turkmenistan. Career Hojageldiyev was born in Büzmeýin. As a football player played as a midfielder for the Turkmen clubs FC Büzmeýin, FC Dagdan Aşgabat, FC Nebitçi, FC Garagum, Kopetdag and HTTU Aşgabat. Coaching career Turkmenistan national team In February 2010, led the Turkmenistan national football team. Under his leadership the team went to Sri Lanka to participate in the final tournament of the AFC Challenge Cup 2010. In a tournament team of Turkmenistan for the first time made it to the final of the AFC Challenge Cup, losing in the final match of the DPRK team in the penalty shootout. In March 2011, the national team of Turkmenistan has successfully entered the final round of the AFC Challenge Cup 2012, beating Pakistan, Taiwan, and played in a draw with India in the qualifying competition in Kuala Lumpur. In the summer of 2011 the first qualifying match against Indonesia in the race for getting into the final of the 2014 World Cup team beginning in Ashgabat draw (1:1), and the humiliating defeat in the party with a 4–3 team knocked out of the fight for the right to go to the World Cup 2014. In winter 2012 team gathered for a training camp in Turkey. In preparation for the AFC Challenge Cup 2012 team Yazguly Hodzhageldiev had a friendly match with Romania, as a result of devastating Turkmenistan team lost 4–0. In March 2012, the team went to Kathmandu to participate in the final tournament of the AFC Challenge Cup 2012. Turkmenistan national team beat the tournament hosts Nepal (0–3) and the team of the Maldives (3–1), the match with Palestine ended in a goalless draw. In the semifinals, Turkmen defeated the Philippines (2–1). Turkmenistan national team for the second time missed AFC Challenge Cup, losing to North Korea at the end of the match (1–2). In 2017, again headed the national team of Turkmenistan. Honours As a Coach Turkmenistan AFC Challenge Cup: Runners-up: 2010, 2012 HTTU Champion of Turkmenistan: 2006, 2009, 2013 Silver medalist in Turkmenistan: 2007, 2008, 2011 Bronze medalist in Turkmenistan: 2012 Winner of the Cup of Turkmenistan: 2006, 2011 Turkmenistan Cup finalist: 2008 Turkmenistan Super Cup: 2009 Turkmenistan President Cup: 2007, 2008, 2009 Semifinalist of the Commonwealth of Independent States Cup: 2010 Altyn Asyr FK Champion of Turkmenistan: 2014, 2015, 2016, 2017, 2018, 2019 Winner of the Cup of Turkmenistan: 2015, 2016, 2019 Turkmenistan Super Cup: 2014, 2015, 2016, 2017, 2018 Finalist 2018 AFC Cup References External links Profile in Goal.com Category:1977 births Category:Living people Category:Turkmenistan footballers Category:Turkmenistan football managers Category:People from Ahal Region Category:Turkmenistan national football team managers Category:Association football midfielders Category:2019 AFC Asian Cup managers
{ "pile_set_name": "Wikipedia (en)" }
五輪3大会連続出場という不動のエースは、その愛らしさから「サオリン」という愛称でも親しまれる日本女子バレー界のアイドルだ。先のW杯では惜しくもリオ五輪出場切符をつかめなかったが、代表でもキャプテンを務める木村沙織(29)の存在感は際立つ。 「彼女を語るうえで外せないのが豊満なバストでしょう。ユニホームがピチッとているので、どうしても体の線が目立ってしまう。近年は試合会場の警備もしっかりしているので、バストを狙い撃ちした写真が撮影されて出回るようなこともなかったと思いますが‥‥」(スポーツ紙記者) しかし、推定Fカップの“はつらつ乳”を踏みにじる悪質なアニメーション動画が存在した。その名も「パンケイクス」。有志によって作られた、いわゆる“同人制作物”だ。1年ほど前よりネット上のダウンロードのみで売買されてきたが、先頃、一部ショップでDVD-ROM版までが発売され、マニア以外でも簡単に入手されるようになって波紋を広げている。 主人公は処女で巨乳、愛称が「カオリン」というショートカットのバレーボール選手。ポジション、身長なども木村と瓜二つだが、巨乳だけはデフォルメされてバレーボール大もある。 そんなカオリンがストーカーの毒牙にかかってしまうのだ。 木村が所属する「東レ・アローズ」に悪質な激似動画の存在について聞いてみたが、担当者は、 「知りませんでした」 と、絶句するばかりだった。
{ "pile_set_name": "OpenWebText2" }
Debit Card Loans: Use Debit Card to Arrange Instant Money Do you know how much important your debit card is for you? Do you know that it can also arrange you some finance in your tough period? Yes, you don’t need to cry for anything when you are not having money and you have some necessary issues to deal with them at the same time. Just use your debit card to borrow debit card loans that are frequently arranged for you by the online lending companies. When you are applying for this special loan deal, you don’t have to undergo any uncompromising situation or even lengthy documentation process that takes long span. Debit card loans come to you only when you are able to meet some requirements that are give below: First of all, you should not be below to 18 years, You should have regular employment, You should be UK based inhabitant, You should have a permanent job etc. When you are going to crack this deal of debit card loans, you are able to gain some more benefits tagged with these loans. They keep you out of any kind of formality including faxing papers, going through credit verification process or even anything else. There is no need to use any security when you are willing to have this deal. Simple applying process can be enjoyed through online mode that helps people living in any corner of the UK. Online lending companies have wide network in the whole nation and as they deal with whole issue through online mode, you are not asked to wait for long time. You can get direct cash deposition in your account within some hours when the approval is done. Moreover, you are also allowed to get money with any bad credit fault, such as arrear, default, CCJs, insolvency, foreclosure and so many hurdles. So, don’t run out of your home now as you can arrange money sitting at your own place with ease just by going with online applying method. Debit card loans would let you borrow money without any delay and without any formality.
{ "pile_set_name": "Pile-CC" }
Comparison of a foam rolling session with active joint motion and without joint motion: A randomized controlled trial. Foam rolling has become a popular form of self-myofascial release or roller massage among health and fitness professionals. Due to this popularity, foam roller devices can be found in many clinical and fitness settings. Despite the popularity, there are still several unknowns regarding foam rolling such the optimal technique. Specifically, there is a lack of research analyzing different foam roll techniques such as combining active joint motion with foam rolling. The purpose of this study was to compare the effects of a foam rolling session to the left quadriceps with active joint motion and without joint motion on passive knee flexion range of motion (ROM) and pressure pain thresholds (PPT). Thirty healthy adults were randomly allocated to one of two intervention groups: active joint motion and no joint motion. Each foam roll intervention to the left quadriceps lasted a total of 2 min. Dependent variables included passive knee flexion ROM and pressure pain threshold measures (PPT). Statistical analysis included subject demographic calculations and appropriate parametric and non-parametric tests to measure changes within and between intervention groups. For left knee ROM, the active joint motion group demonstrated the greatest immediate increase in passive ROM (8°, p < .001) than the non-motion group (5°, p < .001). For PPT, the active joint motion group demonstrated the greatest immediate increase (180 kPa, p < .001) followed by the non-motion group (133 kPa, p < .001). Between group comparisons revealed a significance between groups for passive knee ROM (p < .001) and PPT (p < .001). A short session of foam rolling with active joint motion appears to have a greater effect on passive joint ROM and PPT than rolling without motion. These observed changes may be influenced by the agonistic muscle activity during active motion. This activity may modulate activity of the antagonist muscle through reciprocal inhibition and other neural pathways. Future research is needed to confirm these findings.
{ "pile_set_name": "PubMed Abstracts" }
Q: jQuery changing font family and font size I am trying to change font family and font size of the text that appears in a textarea and a container by choosing the font from the list, font size should be fixed. I am also trying to change color of the background when a font is picked. That is my code: <script type="text/javascript"> function changeFont(_name) { document.body.style.fontFamily = _name; document.textarea = _name; } </script> </head> <body style="font-family"> <form id="myform"> <input type="text" /> <button>erase</button> <select id="fs" onchange="changeFont(this.value);"> <option value="arial">Arial</option> <option value="verdana">Verdana</option> <option value="impact">Impact</option> <option value="'ms comic sans'">MS Comic Sans</option> </select> <div align="left"> <textarea style="resize: none;" id="mytextarea" cols="25" rows="3" readonly="readonly" wrap="on"> Textarea </textarea> <div id='container'> <div id='float'> <p>This is a container</p> </div> </form> </body> When I try it in the browser the font family does not change in the text area. It only changes in the container. I also do now know how to set a new font size and background for the container and the textarea when the font family is picked. I will appreciate any help guys! A: Full working solution : HTML: <form id="myform"> <button>erase</button> <select id="fs"> <option value="Arial">Arial</option> <option value="Verdana ">Verdana </option> <option value="Impact ">Impact </option> <option value="Comic Sans MS">Comic Sans MS</option> </select> <select id="size"> <option value="7">7</option> <option value="10">10</option> <option value="20">20</option> <option value="30">30</option> </select> </form> <br/> <textarea class="changeMe">Text into textarea</textarea> <div id="container" class="changeMe"> <div id="float"> <p> Text into container </p> </div> </div> jQuery: $("#fs").change(function() { //alert($(this).val()); $('.changeMe').css("font-family", $(this).val()); }); $("#size").change(function() { $('.changeMe').css("font-size", $(this).val() + "px"); }); Fiddle here: http://jsfiddle.net/AaT9b/ A: In my opinion, it would be a cleaner and easier solution to just set a class on the body and set the font-family in css according to that class. don't know if that's an option in your case though.
{ "pile_set_name": "StackExchange" }
<!-- ~ Copyright 2019. Google LLC ~ ~ Licensed under the Apache License, Version 2.0 (the "License"); ~ you may not use this file except in compliance with the License. ~ You may obtain a copy of the License at ~ ~ https://www.apache.org/licenses/LICENSE-2.0 ~ ~ Unless required by applicable law or agreed to in writing, software ~ distributed under the License is distributed on an "AS IS" BASIS, ~ WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. ~ See the License for the specific language governing permissions and ~ limitations under the License. --> <LinearLayout xmlns:android="http://schemas.android.com/apk/res/android" xmlns:tools="http://schemas.android.com/tools" android:layout_width="match_parent" android:layout_height="match_parent" android:background="@color/bg_blue" android:orientation="vertical" android:padding="20dp" tools:context="com.google.android.apps.santatracker.dasherdancer.CharacterActivity" > <LinearLayout android:layout_width="match_parent" android:layout_height="match_parent" android:layout_weight="1" android:orientation="horizontal" > <View android:layout_width="match_parent" android:layout_height="match_parent" android:layout_weight="1" android:visibility="invisible" /> <ImageButton android:id="@+id/btn_character_santa" android:layout_width="match_parent" android:layout_height="wrap_content" android:layout_weight="1" android:adjustViewBounds="true" android:background="@drawable/dasher_ripple" android:onClick="onCharacterClick" android:scaleType="fitCenter" android:layout_gravity="bottom" android:src="@drawable/santa" /> <View android:layout_width="match_parent" android:layout_height="match_parent" android:layout_weight="1" android:visibility="invisible" /> </LinearLayout> <LinearLayout android:layout_width="match_parent" android:layout_height="match_parent" android:layout_weight="1" android:orientation="horizontal" > <ImageButton android:id="@+id/btn_character_elf" android:layout_width="match_parent" android:layout_height="wrap_content" android:layout_weight="1" android:adjustViewBounds="true" android:background="@drawable/dasher_ripple" android:onClick="onCharacterClick" android:scaleType="fitCenter" android:layout_gravity="center" android:src="@drawable/elf" /> <View android:layout_width="match_parent" android:layout_height="match_parent" android:layout_weight="1" android:visibility="invisible" /> <ImageButton android:id="@+id/btn_character_reindeer" android:layout_width="match_parent" android:layout_height="wrap_content" android:layout_weight="1" android:adjustViewBounds="true" android:background="@drawable/dasher_ripple" android:onClick="onCharacterClick" android:scaleType="fitCenter" android:layout_gravity="center" android:src="@drawable/reindeer" /> </LinearLayout> <LinearLayout android:layout_width="match_parent" android:layout_height="match_parent" android:layout_weight="1" android:orientation="horizontal" > <View android:layout_width="match_parent" android:layout_height="match_parent" android:layout_weight="1" android:visibility="invisible" /> <ImageButton android:id="@+id/btn_character_snowman" android:layout_width="match_parent" android:layout_height="wrap_content" android:layout_weight="1" android:adjustViewBounds="true" android:background="@drawable/dasher_ripple" android:onClick="onCharacterClick" android:scaleType="fitCenter" android:layout_gravity="top" android:src="@drawable/snowman" /> <View android:layout_width="match_parent" android:layout_height="match_parent" android:layout_weight="1" android:visibility="invisible" /> </LinearLayout> </LinearLayout>
{ "pile_set_name": "Github" }
Image copyright Getty Images Image caption Abortions are illegal in Northern Ireland except for cases where the woman's health is at risk The number of women from Northern Ireland travelling to England and Wales to have abortions rose by 192 in the past year. Government statistics showed 1,053 women travelled in 2018. However it is much lower than the peak year of 1990, when 1,855 NI women had abortions in England and Wales. In June 2017, the UK government announced women from Northern Ireland would be able to get free abortions on the NHS in England. Abortion is illegal in Northern Ireland, except for cases where the woman's health is at risk. Women have been able to access free abortions through the NHS in Scotland from 2017 and in Wales from November 2018. Earlier this year it was revealed that fewer than 10 NI women had had terminations in Scotland since the Scottish Parliament changed the law. Anti-abortion group CARE, which campaigns against a change to abortion law in Northern Ireland, said it was disappointing to see a rise in the number of women travelling to England and Wales. Chief executive Nola Leach said: "The wider context is really important and NI's abortion rate is still significantly lower than England and Wales." Amnesty International's Northern Ireland campaigns manager, Gráinne Teggart, said the increase was unsurprising. The organisation wants abortion law in Northern Ireland to be reformed. She said: "The ongoing near-total ban on abortion doesn't stop women needing or seeking abortions, it just forces them to board planes to access the healthcare. "Women should be treated with respect and dignity and given the right to make choices about their own body at home." The figures for England and Wales, released on Thursday, showed Northern Ireland women represented 22% of non-residents who travelled to the two countries for abortions. Women from the Republic of Ireland made up 61% of the total. Abortion law was liberalised in the Republic of Ireland in late 2018 following a referendum earlier the same year.
{ "pile_set_name": "OpenWebText2" }
Pakistan 'militant leader' Malik Ishaq arrested Pakistani police have detained Malik Ishaq, founder and former head of militant group Lashkar-e-Jhangvi (LeJ), at his home in Punjab province. The group said that it carried out an attack in a Shia Muslim area of the southern city of Quetta last Saturday which killed almost 90 people. However, it is not clear whether Mr Ishaq's detention is directly related to the attack. Mr Ishaq spent a decade in jail before being released in 2011. A heavy contingent of police surrounded Mr Ishaq's residence and held negotiations with him, after which he gave himself over to the police, the BBC's M Ilyas Khan reports from Islamabad. He had been released from jail a few months ago, our correspondent adds. It is not clear whether Mr Ishaq has been formally charged with any offence. Under public order laws, suspects can be held in Pakistan for three months without any charge. Pakistani authorities have long been criticised for not taking enough action against groups such as LeJ that foment sectarian violence. When a local journalist asked Mr Ishaq in 2011 what intended to do after his release from jail, he replied his organisation would continue its "good work" - fighting those who opposed their version of Islam.
{ "pile_set_name": "Pile-CC" }
To enable wireless device mobility, access nodes in communication with a wireless device are configured to perform a handover of the wireless device to another access node. Some access nodes can be further configured to maintain an indication of proximate access nodes, such as a neighbor relation table or another similar indication, and the indication of proximate access nodes can be used to facilitate a wireless device handover. Configuring the indication of proximate access nodes is typically performed manually by a network provider for each access node deployed in a communication system. Further, the presence of invalid entries, such as a false indication that an access node is capable of supporting a handover from another access node, can degrade network performance by causing interrupted communication sessions and failed handover attempts.
{ "pile_set_name": "USPTO Backgrounds" }
Relevance of accurate Monte Carlo modeling in nuclear medical imaging. Monte Carlo techniques have become popular in different areas of medical physics with advantage of powerful computing systems. In particular, they have been extensively applied to simulate processes involving random behavior and to quantify physical parameters that are difficult or even impossible to calculate by experimental measurements. Recent nuclear medical imaging innovations such as single-photon emission computed tomography (SPECT), positron emission tomography (PET), and multiple emission tomography (MET) are ideal for Monte Carlo modeling techniques because of the stochastic nature of radiation emission, transport and detection processes. Factors which have contributed to the wider use include improved models of radiation transport processes, the practicality of application with the development of acceleration schemes and the improved speed of computers. In this paper we present a derivation and methodological basis for this approach and critically review their areas of application in nuclear imaging. An overview of existing simulation programs is provided and illustrated with examples of some useful features of such sophisticated tools in connection with common computing facilities and more powerful multiple-processor parallel processing systems. Current and future trends in the field are also discussed.
{ "pile_set_name": "PubMed Abstracts" }
Porous liquid zeolites: hydrogen bonding-stabilized H-ZSM-5 in branched ionic liquids. Porous liquids, as a newly emerging type of porous material, have great potential in gas separation and storage. However, the examples and synthetic strategies reported so far likely represent only the tip of the iceberg due to the great difficulty and challenge in engineering permanent porosity in liquid matrices. Here, by taking advantage of the hydrogen bonding interaction between the alkane chains of branched ionic liquids and the Brønsted sites in H-form zeolites, as well as the mechanical bond of the long alkyl chain of the cation penetrated into the zeolite channel at the interface, the H-form zeolites can be uniformly stabilized in branched ionic liquids to form porous liquid zeolites, which not only significantly improve their gas sorption performance, but also change the gas sorption-desorption behavior because of the preserved permanent porosity. Furthermore, such a facile synthetic strategy can be extended to fabricate other types of H-form zeolite-based porous liquids by taking advantage of the tunability of the counter-anion (e.g., NTf2-, BF4-, EtSO4-, etc.) in branched ionic liquids, thus opening up new opportunities for porous liquids for specific applications in energy and environment.
{ "pile_set_name": "PubMed Abstracts" }