text stringlengths 0 7.84M | meta dict |
|---|---|
Introduction {#s1}
============
Immunity is essential for survival, yet energetically expensive and potentially self-damaging. The immune system needs to be tightly regulated and highly responsive to changes in external and internal environments, adapting to developmental stage [@ppat.1003720-Kollmann1], nutritional state [@ppat.1003720-Becker1], and stress [@ppat.1003720-Cohen1]. Hormonal control of the immune system is not well-understood, and lies at the heart of a diverse range of clinically relevant phenomena including immune circadian rhythm [@ppat.1003720-Silver1], [@ppat.1003720-Stone1], obesity induced inflammation [@ppat.1003720-Fantuzzi1] and age- and gender-differences in immune function [@ppat.1003720-Kollmann1], [@ppat.1003720-Gilliver1].
*Drosophila* has proven to be a fruitful model of innate immunity [@ppat.1003720-Lemaitre1]. The innate immune system in the fly comprises humoral and cellular responses [@ppat.1003720-Lemaitre1]. The humoral response is best characterized by the secretion of antimicrobial peptides (AMPs) locally by epithelia such as the gut, or systemically by the fat-body, a functional analogue of the mammalian liver. This response to bacterial or fungal infection is mainly regulated by the Toll and Imd signaling pathways. Cellular immunity is performed by hemocytes, phagocytic circulating immune cells. *Drosophila* has become a powerful system to study phagocytosis due to high conservation of the processes involved [@ppat.1003720-Stuart1], [@ppat.1003720-Stuart2]. Cellular immunity is required to survive various types of bacterial infections, complementing the humoral response [@ppat.1003720-AvetRochex1]--[@ppat.1003720-Ulvila1] and is involved in the response to wasp parasitoid infestation [@ppat.1003720-Krzemien1]. In addition, in the larvae, hemocytes play a role in inter-organ communication, as they are required for the fat-body to mount a full humoral antimicrobial response after an intestinal infection [@ppat.1003720-Charroux1], [@ppat.1003720-Basset1], [@ppat.1003720-Wu1]. Hemocytes are also recruited to wounds in embryo and larvae [@ppat.1003720-Babcock1]--[@ppat.1003720-Wood1], potentially clearing damaged tissue and preventing further dispersal of microorganisms from unsterile wound sites. In parallel to their role in immunity, hemocytes perform developmental and homeostatic functions such as the phagocytosis of apoptotic cells and extracellular matrix secretion. These functions are essential at embryonic stages, for example, for central nervous system and renal tubule development [@ppat.1003720-Bunt1], [@ppat.1003720-Olofsson1]. The crosstalk between immunity and nutritional state or stress [@ppat.1003720-Becker1], [@ppat.1003720-DiAngelo1]--[@ppat.1003720-Storelli1] in *Drosophila* is beginning to be unravelled, however, developmental regulation of the immune system remains enigmatic.
Ecdysone is a steroid hormone, similar to mammalian estrogens and androgens; peaks in ecdysone titer regulate the major developmental transitions in the fly, including metamorphosis. The pupal stage lasts 4 days from the end of the 3^rd^ larval instar, after which adult flies eclose [@ppat.1003720-Thummel1]. The biologically active form of ecdysone, 20-hydroxyecdysterone (20-E, hereafter referred to as 'ecdysone') coordinates tissue remodelling at metamorphosis [@ppat.1003720-Thummel1]. This hormone activates a nuclear receptor, the Ecdysone Receptor (EcR), which acts as a heterodimer with its partner Ultraspiracle (USP), a homologue of the mammalian Retinoid X Receptor. Together, they activate the transcription of primary response genes, which in turn activate the transcription of a battery of late response genes [@ppat.1003720-Thummel1]. This transcriptional cascade ultimately leads to the induction of both cell death in larval tissues and differentiation and proliferation of the imaginal discs into adult tissues [@ppat.1003720-Thummel1]. In addition, several lines of evidence indicate that ecdysone regulates some aspects of hemocyte behaviour. In the larva, while the majority of hemocytes are in circulation, approximately one third of the total population interacts with tissues, attaching in repeated patches to the dorsal epithelium along the longitudinal axis [@ppat.1003720-Lanot1]. Despite the fact that hemocytes from these patches are mostly immotile at larval stages, it has been noticed that they disperse at metamorphosis [@ppat.1003720-Lanot1]. This observation correlates with the recent finding that *ex vivo*, hemocytes activate motility and morphological changes after metamorphosis [@ppat.1003720-Sampson1]. Cell shape changes can be prematurely triggered in larvae by ecdysone injection [@ppat.1003720-Lanot1]. Last, it is long known that ecdysone treatment is important to potentiate AMP gene expression and phagocytosis after an immune challenge in hemocyte-derived cell culture lines [@ppat.1003720-Dimarcq1]. Although these results suggest an ecdysone-dependent regulation of hemocyte function, *in vivo* evidence of a direct effect of ecdysone signaling on hemocyte behaviour, and its functional relevance, is lacking.
Here, we explore the hormonal regulation of *Drosophila* hemocytes at metamorphosis and its impact on *Drosophila* immunity using an *in vivo* approach. We demonstrate that direct activation of ecdysone signaling in hemocytes is necessary to increase their developmental and immune activities at metamorphosis, including phagocytosis. We show that this activation is essential to respond efficiently to and survive pathogenic challenge.
Results {#s2}
=======
1. The Ecdysone Receptor is required in the hemocytes for their activation at metamorphosis {#s2a}
-------------------------------------------------------------------------------------------
To test whether ecdysone signaling cell-autonomously regulates hemocyte shape changes at metamorphosis, we used the *Hml-(Hemolectin-)ΔGal4* driver [@ppat.1003720-Sinenko1] to specifically express green fluorescent protein (GFP) and dominant-negative constructs of the three known EcR isoforms under the control of the UAS sequence. We imaged hemocytes *ex vivo* by bleeding larvae or pupae at precise time points after puparium formation (APF) ([Fig. 1A--B](#ppat-1003720-g001){ref-type="fig"}) and *in vivo* through the dorsal epidermis ([Fig. 1C--D](#ppat-1003720-g001){ref-type="fig"}). The first hour of the 12h 'prepupal' period is characterized by a translucent pupal case (which then darkens). Control hemocytes (from *HmlΔGal4, UAS-GFP/+* pupae, here after referred to as *HmlΔ*\>GFP) displayed a clear change of morphology over metamorphosis: they became gradually more polarized, with many cytoplasmic protrusions and a higher number of vacuoles, increasing in size dramatically, likely due to their greater spread and many phagocytic vesicles ([Fig. 1A and C](#ppat-1003720-g001){ref-type="fig"}). In striking contrast, hemocytes expressing a dominant negative (DN) form of the EcRB1 isoform (from *HmlΔGal4, UAS-GFP/UAS-EcRB1DN* pupae, here after referred to as *HmlΔ\>EcRB1DN*) did not show any obvious change of size or morphology ([Fig. 1B and D](#ppat-1003720-g001){ref-type="fig"}). Similar results were obtained when we analysed by flow cytometry the properties of the hemocyte population at the onset of pupariation. Control hemocytes displayed a clear shift both in Forward Scatter (FSC) and Side Scatter (SSC), indicating an increase in cell size and granularity, respectively ([Fig. 1E](#ppat-1003720-g001){ref-type="fig"} and [S1](#ppat.1003720.s001){ref-type="supplementary-material"}). In contrast, the FSC and SSC of hemocytes expressing *EcRB1DN* remained stable over metamorphosis and similar to the parameters observed for control hemocytes in late 3^rd^ instar larvae (L3 wandering; L3W; [Fig. 1F](#ppat-1003720-g001){ref-type="fig"} and [S1](#ppat.1003720.s001){ref-type="supplementary-material"}).
{#ppat-1003720-g001}
In control pupae, the cell shape changes were concomitant with a dispersal of the dorsal patches of hemocytes visualised by *in vivo* cinemicroscopy and cell tracking analysis ([Fig. 1G--J](#ppat-1003720-g001){ref-type="fig"}). These so-called 'sessile hemocytes' changed their behaviour at pupariation and began to actively migrate under the epithelium (see video 1 and [Fig. 1G, I](#ppat-1003720-g001){ref-type="fig"}). This dispersal did not occur when hemocytes expressed EcRB1DN ([Fig. 1H, J](#ppat-1003720-g001){ref-type="fig"} and video 2). In these individuals, hemocytes were more numerous, which correlated with higher proliferation at larval stages ([Fig. S2](#ppat.1003720.s002){ref-type="supplementary-material"}). Moreover, they were unable to migrate away from their original location ([Fig. 1J](#ppat-1003720-g001){ref-type="fig"}). Measurements of cell velocity clearly indicated an impaired motility in EcRB1DN-expressing hemocytes, as compared to control hemocytes ([Fig. 1K](#ppat-1003720-g001){ref-type="fig"}). Importantly, this defect in motility was not due to a decrease in viability, and appeared specific to the pupal stage as neither localisation of hemocytes to the gut in larvae, nor embryonic hemocyte migration were affected when EcRB1DN was expressed specifically in hemocytes ([@ppat.1003720-Wood1], [@ppat.1003720-ZaidmanRemy1]; [Fig. S3](#ppat.1003720.s003){ref-type="supplementary-material"}). In addition, when we expressed EcRB1DN just before the initiation of puparium formation, as opposed to throughout larval stages, we also saw a significant reduction in motility ([Fig. S4](#ppat.1003720.s004){ref-type="supplementary-material"}). The expression of dominant negative constructs for each of the three isoforms of EcR showed a similar phenotype to the EcRB1 isoform ([Fig. 1K](#ppat-1003720-g001){ref-type="fig"}). EcR function in the regulation of hemocyte motility was further confirmed by RNAi ([Fig. 1K](#ppat-1003720-g001){ref-type="fig"}). Last, the expression of *USP* RNAi in the hemocytes led to a similar lack of motility ([Fig. 1K](#ppat-1003720-g001){ref-type="fig"}), indicating that the functional ecdysone receptor complex (EcR/USP) is required for this process.
2. Hemocytes insensitive to ecdysone are unable to perform dead cell phagocytosis during metamorphosis {#s2b}
------------------------------------------------------------------------------------------------------
We next addressed the question of whether ecdysone signaling regulates 'house keeping' functions of hemocytes, required for homeostasis in the organism. During development, one major task for hemocytes is to scavenge and engulf dying cells [@ppat.1003720-Franc1]. We recovered hemocytes at different time points after the initiation of metamorphosis and stained them for DNA and F-actin. Hemocytes from control animals barely contained any stained vesicles at 1 h APF ([Fig. 2A](#ppat-1003720-g002){ref-type="fig"}), but progressively presented a growing number of DNA and/or F-actin-containing vesicles (4 h, 8 h and 18 h APF; [Fig. 2A](#ppat-1003720-g002){ref-type="fig"}). By 8 h APF, most of the control hemocytes had engulfed up to ten apoptotic cells, identifiable by the fragmented aspect of their nuclei, and/or huge pieces of muscles characterized by a strong, striated phalloidin staining. Such vesicles were not seen in the hemocytes expressing *EcRB1DN*, which were stained only for their own nucleus ([Fig. 2A](#ppat-1003720-g002){ref-type="fig"}). We quantified the proportion of cells with phagosomes containing phalloidin-positive muscle fibres and found that the difference between control and *EcRB1DN* hemocytes was striking. In control pupae, we observed a significant increase in dead cell engulfment over time (p\<0.001): just under 20% of hemocytes contained muscle tissue at 1 h APF, rising to approximately 80% of cells by 18 h APF ([Fig. 2B](#ppat-1003720-g002){ref-type="fig"}). In *EcRB1DN* hemocytes the proportion was \<10% at 1 h APF and remained at this low level throughout early pupal stages ([Fig. 2B](#ppat-1003720-g002){ref-type="fig"}; no statistical differences between the five stages). The difference between *EcRB1DN* and control hemocytes was significant at every stage ([Fig. 2B](#ppat-1003720-g002){ref-type="fig"}). Despite this effect on phagocytosis of larval tissue, viability of *HmlΔ\>EcRB1DN* individuals from prepupal stage to adulthood was not affected as compared to control individuals, nor was their duration of metamorphosis ([Fig. S5](#ppat.1003720.s005){ref-type="supplementary-material"}).
{#ppat-1003720-g002}
3. Activation of hemocytes at metamorphosis is important for survival after infection {#s2c}
-------------------------------------------------------------------------------------
To find out if hemocyte activation by ecdysone is important in critical situations, such as wounding or infection, we tested the ability of *HmlΔ\>EcRB1DN* pupae to resist clean or septic injuries with the Gram-negative bacteria *Erwinia carotovora* (*E.carotovora*) or the Gram-positive bacteria *Enteroccocus faecalis* (*E.faecalis*) when wounded at end of prepupal/early pupal stage (10 h--30 h APF). Interestingly, *HmlΔ\>EcRB1DN* pupae survived as well as control individuals to clean injury, but were significantly less resistant to both types of bacterial infections ([Fig. 3A](#ppat-1003720-g003){ref-type="fig"}). In order to understand better if the difference in resistance between control and *HmlΔ\>EcRB1DN* animals is more pronounced at later stages when hemocytes are fully activated in control individuals, we imposed Gram-negative septic infection on closely-staged pupae at either 3 h APF or 24 h APF. We found that the difference between overall survival of control and *HmlΔ\>EcRB1DN* pupae wounded at 3 h APF was not significant, whereas *HmlΔ\>EcRB1DN* pupae wounded at 24 h APF survived significantly less than controls (p\<0.001; [Fig. 3B](#ppat-1003720-g003){ref-type="fig"}). When we analysed the time of death of infected pupae more precisely, we saw that although the overall survival of *HmlΔ\>EcRB1DN* and control pupae wounded at 3 h APF were not significantly different, *HmlΔ\>EcRB1DN* pupae tended to succumb to infection much sooner than controls ([Fig. 3B](#ppat-1003720-g003){ref-type="fig"}). Altogether, the data suggest that the difference in resistance between *HmlΔ\>EcRB1DN* and control is more pronounced at later stages when control hemocytes are fully activated, although we cannot exclude the possibility that other differences between the two stages could have an effect on the severity of the infection.
{#ppat-1003720-g003}
We next tested whether feeding larvae with bacteria ('natural infection') would affect their survival over subsequent metamorphosis. Control individuals were not affected by the oral infection with *E. carotovora*, and eclosed normally ([Fig. 3C](#ppat-1003720-g003){ref-type="fig"}). In contrast, we observed a significant decrease in the survival of *HmlΔ\>EcRB1DN* pupae ([Fig. 3C](#ppat-1003720-g003){ref-type="fig"}). For both septic and natural infections, the observed decreased in survival was similar to that caused by genetic ablation of hemocytes (by expression of the pro-apoptotic gene Bax in hemocytes [@ppat.1003720-Defaye1]; see "Phago^less^" survival in [Fig. 3A and C](#ppat-1003720-g003){ref-type="fig"}). Thus hemocyte activation at metamorphosis is essential for the efficient participation of the cellular immune response in resistance to bacterial infections.
4. Hemocytes require ecdysone signaling to become wound-responsive at metamorphosis {#s2d}
-----------------------------------------------------------------------------------
Because pupae in which hemocytes are not activated succumb to infections more often than controls, we surmise that ecdysone signaling has a role in the regulation of the hemocyte response to infections. Therefore, we analysed the three main known responses of hemocytes to infections to determine whether they were affected by ecdysone signaling: i) wound response, ii) participation in AMP systemic expression (inter-organ signaling) and iii) phagocytosis.
Upon injury, hemocytes are recruited to damaged tissues and wounded epithelia. This may be important to limit infection in the case of septic injury: once recruited to the wound, hemocytes phagocytose bacteria and prevent their spreading inside the organism. In the embryo, hemocyte recruitment involves active migration toward the wound by chemotaxis [@ppat.1003720-Stramer1], [@ppat.1003720-Wood1]. In the larva by contrast, hemocytes are described as being recruited passively from the circulation by 'capture' at the wound site [@ppat.1003720-Babcock1]. Hemocytes attached under the epithelium do not respond to wounds at larval stages, even to those in their close vicinity [@ppat.1003720-Babcock1]. Interestingly, when we wounded the dorsal epithelium of prepupae using a laser-ablation system (which allows immediate high resolution imaging after wounding and tracking of hemocyte movement), we observed that most recruited cells had not come from circulation but by active migration under the epithelium, often from the so-called 'sessile patches' ([Fig. 4A--C](#ppat-1003720-g004){ref-type="fig"} and video 3). Analysis of hemocyte tracks after wounding confirmed their directed migration towards the wound ([Fig. 4D](#ppat-1003720-g004){ref-type="fig"}; compare with the center of mass close to (0;0) in the absence of a wound, indicative of a random migration, [Fig. 1I](#ppat-1003720-g001){ref-type="fig"}). Importantly, the capacity of hemocytes to respond to wounds clearly increased over early prepupal stages. Indeed, hemocyte recruitment rate increased with pupal age: after wounding prepupae at 120 min APF, we observed a higher rate of recruitment of hemocytes to wounds as compared with prepupae wounded at 55 min APF ([Fig. 4E](#ppat-1003720-g004){ref-type="fig"}). Strikingly, *EcRB1DN*-hemocytes remained unresponsive to wounds and very few were recruited to the sites of damage ([Fig. 4F--H](#ppat-1003720-g004){ref-type="fig"} and video 4).
{ref-type="supplementary-material"}). Tracks of individual cells measured over 80 min, 70 min after wounding (wound performed at 1h30 APF) are superimposed at (0;0) in the tracking plot; all trajectories were rotated to maintain their relative positions towards the wound center (D). The center of mass of all tracks, indicated with red cross, is shifted towards the wound (positive *x*-axis) and significantly different from (0;0) (p = 0.01). Recruitment rate (cell/min) is significantly higher in pupae wounded at 120 min APF than in pupae wounded 55 min APF (E). Profile of hemocyte recruitment to epithelial wounds in control (brown) or *HmlΔ\>EcRB1DN* pupae (blue) (F). Tracks corresponding to trajectories of *EcRB1DN*-hemocytes after epithelial wounding were superimposed and rotated as above in tracking plot (G); note that the center of mass (red cross) remains close to (0;0). Rate of recruitment (cell/min) in *HmlΔ\>EcRB1DN* pupae and controls wounded 1h30 APF (H). Mean and SEM are displayed on graphs.](ppat.1003720.g004){#ppat-1003720-g004}
Thus, our data reveal that the mode of recruitment of hemocytes to wounds is modified at pupal stage, switching from a passive 'capture' of circulating cells in larvae [@ppat.1003720-Babcock1], to active migration of hemocytes toward the wounds in pupae. This activation is lost in hemocytes insensitive to ecdysone.
5. Ecdysone signaling is required for bacterial phagocytosis and to fight infection at metamorphosis {#s2e}
----------------------------------------------------------------------------------------------------
Hemocytes are involved in the systemic induction of the Imd pathway after oral infection in the larva [@ppat.1003720-Charroux1], [@ppat.1003720-Basset1], [@ppat.1003720-Wu1], [@ppat.1003720-Foley1], and therefore we next tested the hypothesis of an ecdysone-dependent regulation of "gut-to-fat-body" communication by hemocytes. However, when we analysed the expression of four AMPs (*Diptericin*, *Attacin*, *Metchnikowin* and *Drosomycin*) in prepupae after oral infection with *E. carotovora* at larval stage ([Fig. S6](#ppat.1003720.s006){ref-type="supplementary-material"}), we found that *HmlΔ\>EcRB1DN* prepupae induce a systemic humoral response similar to that of control. Thus, our data indicate that ecdysone signaling in hemocytes is not required for inter-organ communication after oral infection. In addition, we analyzed the local epithelial response to oral infection by examining expression of *Diptericin* specifically in the gut, and found that this response is also unaffected in *HmlΔ\>EcRB1DN* prepupae ([Fig. S7](#ppat.1003720.s007){ref-type="supplementary-material"}). We wondered if phagocytic activity, on the other hand, would be ecdysone-regulated at metamorphosis and could account for the observed decrease in survival to infection.
To first address this question, we bled late L2/young L3 larvae or young prepupae, incubated the retrieved hemocytes with a high concentration of pHRodo bacterial particles (that emit a strong fluorescent signal only at low pH, i.e. in the acidic environment of the phagosome) and assessed the ability of hemocytes to perform phagocytosis using flow cytometry ([Fig. 5A--B](#ppat-1003720-g005){ref-type="fig"}). Strikingly, hemocytes presented a clear shift in their ability to perform phagocytosis from L2/L3 to prepupal stages ([Fig. 5A](#ppat-1003720-g005){ref-type="fig"}); the prepupal hemocyte phagocytic index (number of phagocytosing hemocytes multiplied by mean pHRodo intensity per hemocyte)/total number of hemocytes) was almost four times the index of L2/L3 larval hemocytes ([Fig. 5B](#ppat-1003720-g005){ref-type="fig"}). Moreover, *EcRB1DN*-hemocytes did not present such a shift and maintained the same phagocytic ability at prepupal stage as at L2/L3 larval stages ([Fig. 5A--B](#ppat-1003720-g005){ref-type="fig"}).
{#ppat-1003720-g005}
To confirm this phenotype *in vivo*, we injected pHRodo bacterial particles in control and *HmlΔGal4\>EcRB1DN* prepupae and imaged hemocytes live through the dorsal epithelium ([Fig. 5C](#ppat-1003720-g005){ref-type="fig"}). While under these conditions, all hemocytes in control prepupae had performed phagocytosis of numerous particles, only very few *EcRB1DN*-hemocytes contained particles and then in low numbers ([Fig. 5D--E](#ppat-1003720-g005){ref-type="fig"}). We complemented this analysis with a flow cytometry method that combines *in vivo* assay with high-throughput quantitative analysis. One hour after injection with pHRodo, hemocytes were retrieved from prepupae and analysed for their fluorescence by flow cytometry. In accordance with the results obtained with confocal analysis, fewer *EcRB1DN*-hemocytes were pHRodo-positive as compared to control (40% versus 88%; [Fig. 5F](#ppat-1003720-g005){ref-type="fig"}). Those few hemocytes positive for pHRodo had a lower fluorescence intensity than control hemocytes ([Fig. 5F](#ppat-1003720-g005){ref-type="fig"}), contributing to a global decrease in phagocytic index ([Fig. 5G](#ppat-1003720-g005){ref-type="fig"}). Interestingly, hemocytes expressing dominant negative forms of any of the three EcR isoforms were affected in their ability to perform phagocytosis, as well as hemocytes expressing *EcR RNAi* ([Fig. 5G](#ppat-1003720-g005){ref-type="fig"}).
As pHRodo particles only fully emit fluorescence once in the mature phagosome, the above results could also be indicative of a defect of *EcRDN*-hemocytes in phagosome maturation. To test this hypothesis we analysed the ability of control and *EcRB1DN*-hemocytes to bind and engulf live *Escherichia coli* (*E.coli*). *E.coli* expressing the red fluorescent protein (*E.coli-RFP*) were injected in prepupae and phagocytosis was monitored *in vivo* (video 5 and 6). *EcRB1DN*-hemocytes were significantly impaired in their ability both to bind (attachment index: the average number of bacteria bound per hemocyte; [Fig. 5H](#ppat-1003720-g005){ref-type="fig"}) and engulf bacteria (internalisation index: the average number of bacteria ingested per hemocyte; [Fig. 5I](#ppat-1003720-g005){ref-type="fig"} and [S7](#ppat.1003720.s007){ref-type="supplementary-material"}). Altogether, our results demonstrate that EcR-dependent activation of hemocytes is required for optimal phagocytic activity of hemocytes at metamorphosis, and modulate their ability to both bind and internalise bacteria.
6. EcR transcriptionally regulates genes involved in phagocytosis {#s2f}
-----------------------------------------------------------------
Our phenotypic analysis has revealed the importance of ecdysone signaling in the regulation of several hemocyte functions, including bacteria phagocytosis. To better understand the molecular basis of the ecdysone-dependent regulation of hemocyte biology, we performed a hemocyte-specific transcriptomic analysis, combining FACS and Affymetrix microarrays. We first compared the transcriptome of "control" hemocytes retrieved from *w; Hml\>GFP/+* 3^rd^ instar larvae and prepupae. We selected late feeding 3^rd^ instar larvae prior to the peak of ecdysone that induces metamorphosis, and compared them with hemocytes retrieved from 1 h--2 h APF prepupae, the stage we have used for the majority of our phenotypic analyses. This allowed us to determine which genes are induced or repressed at metamorphosis in hemocytes. Comparison with *EcRDN* hemocytes allowed us to determine which of these genes are dependent on EcR signaling.
A high number of genes are transcriptionally regulated in hemocytes at the onset of metamorphosis (3331 genes, among which 659 are up-regulated more than two fold; p\<0.001; see repartition by fold change in [Fig. 6A](#ppat-1003720-g006){ref-type="fig"}. The full microarray data can be found in [Table S2](#ppat.1003720.s010){ref-type="supplementary-material"} and on GEO database accession GSE49326, <http://www.ncbi.nlm.nih.gov/geo/query/acc.cgi?acc=GSE49326>). Strikingly, our data indicate that most of the changes in gene expression are EcR-dependent at this stage (1955 genes out of 3331 are EcR-regulated; p\<0.001; see repartition by fold change in [Fig. 6A](#ppat-1003720-g006){ref-type="fig"} and the list of genes in [Table S1](#ppat.1003720.s009){ref-type="supplementary-material"}). In fact, 83% of genes that present a fold change in expression greater than 2 at metamorphosis are regulated by EcR. The microarray analysis was further confirmed by hemocyte-specific quantitative PCR of 12 genes, whose expression was clearly up-regulated in control hemocytes at metamorphosis, and significantly lower in *EcRDN*-expressing hemocytes at the same stage ([Fig. 6B](#ppat-1003720-g006){ref-type="fig"}). These data confirm and explain the huge impact of ecdysone signaling on hemocyte biology at the onset of metamorphosis. Interestingly, we discover that in prepupal hemocytes, ecdysone signaling up-regulates the expression of numerous genes involved in bacteria phagocytosis. Indeed, we found that 35 genes known to be involved in phagocytosis are significantly up-regulated in hemocytes from control pupae and significantly less expressed in hemocytes expressing *EcRDN* ([Table 1](#ppat-1003720-t001){ref-type="table"}). Among them, several genes encode phagocytic bacterial receptors (*Nimrod*, *Dscam*, *PGRP*-*LC*), a receptor for dead cell phagocytosis (*crq*), or are involved in the actin remodelling required for this process (such as *Rac2* and *SCAR*). As loss of expression of several of these genes has been shown to have a dramatic effect on phagocytosis, these molecular data are sufficient to explain how insensitivity to ecdysone in hemocytes results in the strong phagocytosis phenotype we describe. Similarly, we found several genes involved in cell motility or cell shape regulation to be up-regulated in the control hemocytes at metamorphosis, and not in *EcRDN*-expressing hemocytes ([Table S3](#ppat.1003720.s011){ref-type="supplementary-material"} and [S4](#ppat.1003720.s004){ref-type="supplementary-material"}, respectively). These genes represent good candidates responsible for the phenotypes observed in our analyses; additionally, it is likely that this data contains further genes involved in phagocytosis, cell motility or cell shape as yet unrevealed.
{ref-type="supplementary-material"} for gene list). (B) qPCR confirmation of the expression of 12 genes from the microarrays. qPCR was performed on RNA extracted from FACS-sorted hemocytes. The results displayed represent the mean and SEM of three biological repeats; samples were independent from samples used for microarrays. Statistical analysis was performed using one-way ANOVA and Tukey-Kramer post-test. For comparison between control larval hemocytes and control pupal hemocytes, as well as between control pupal hemocytes and EcRDN pupal hemocytes, significance are indicated on the graph. There was no significant difference between control larval hemocytes and EcRDN pupal hemocytes except for GstS1 (\*), NimC3 (\*), Mmp2 (\*) and Dscam (\*\*\*).](ppat.1003720.g006){#ppat-1003720-g006}
10.1371/journal.ppat.1003720.t001
###### EcR transcriptionally regulates genes involved in phagocytosis.
{#ppat-1003720-t001-1}
Gene Symbol Gene Accession Control pupae vs control larvae Control pupae vs EcRDN pupae References on phagocytosis phenotype
------------- ---------------- --------------------------------- ------------------------------ -------------------------------------- ---------- ------------------------------------------------------------------------------------------------------------------------------------------------
NimC2 FBgn0028939 57.08 0 −4.40 0 [@ppat.1003720-Kurucz1] (Prediction)
**Eip93F** FBgn0264490 26.40 0 −2.85 8.00E-06 [@ppat.1003720-Thummel1] (Prediction)
scb FBgn0003328 25.72 0 −1.98 1.30E-05 [@ppat.1003720-StroscheinStevenson1], [@ppat.1003720-Nonaka1]
Eip78C FBgn0004865 11.88 0 −3.80 0 [@ppat.1003720-Stuart1]
Tep2 FBgn0041182 9.19 0 −2.14 8.00E-06 [@ppat.1003720-StroscheinStevenson1]
**NimC4** FBgn0260011 6.26 0 −5.34 0 [@ppat.1003720-Kurucz1] (Prediction)
**NimC3** FBgn0001967 5.83 6.90E-05 −2.54 2.20E-05 [@ppat.1003720-Kurucz1] (Prediction)
**Mmp2** FBgn0033438 5.81 8.00E-06 −1.68 5.50E-05 [@ppat.1003720-Stuart1]
**Dscam** FBgn0033159 3.96 1.10E-05 −2.75 1.80E-05 [@ppat.1003720-Watson1]
l(1)G0232 FBgn0028341 3.10 2.00E-06 −1.58 0.000193 [@ppat.1003720-StroscheinStevenson1]
yip2 FBgn0040064 3.01 7.00E-05 −1.70 0.000388 [@ppat.1003720-Stuart1]
CG8449 FBgn0038129 2.74 5.00E-06 −1.59 0.000972 [@ppat.1003720-Stuart1]
CG3638 FBgn0261444 2.67 2.00E-06 −1.74 2.40E-05 [@ppat.1003720-StroscheinStevenson1]
**crq** FBgn0015924 2.60 5.30E-05 −1.75 4.40E-05 [@ppat.1003720-Franc2], [@ppat.1003720-Stuart3]
mv FBgn0265988 2.51 0.00043 −2.55 3.00E-06 [@ppat.1003720-Rahman1]
CG16791 FBgn0038881 2.39 3.00E-06 −1.60 0.000161 [@ppat.1003720-StroscheinStevenson1]
flr FBgn0260049 2.27 5.00E-06 −1.44 0.000183 [@ppat.1003720-StroscheinStevenson1]
cpb FBgn0011570 2.25 5.00E-06 −1.48 0.00065 [@ppat.1003720-Philips1]
RhoGAP71E FBgn0036518 2.19 8.00E-06 −1.48 0.000137 [@ppat.1003720-Ramet1]
Rac2 FBgn0014011 2.03 9.00E-06 −1.43 0.000417 [@ppat.1003720-Stuart1], [@ppat.1003720-Sampson1], [@ppat.1003720-Philips1], [@ppat.1003720-StroscheinStevenson1], [@ppat.1003720-AvetRochex2]
Arpc5 FBgn0031437 1.93 6.80E-05 −1.44 0.000494 [@ppat.1003720-Philips1], [@ppat.1003720-StroscheinStevenson1]
Snx3 FBgn0038065 1.93 1.80E-05 −1.35 0.00068 [@ppat.1003720-StroscheinStevenson1]
CG13887 FBgn0035165 1.92 1.90E-05 −1.41 0.000501 [@ppat.1003720-Stuart1]
RN-tre FBgn0020620 1.87 3.30E-05 −1.69 0.000108 [@ppat.1003720-Stuart1], [@ppat.1003720-Ramet1]
not FBgn0013717 1.84 6.20E-05 −1.41 0.000369 [@ppat.1003720-Stuart1]
**PGRP-LC** FBgn0035976 1.81 6.50E-05 −1.75 0.000359 [@ppat.1003720-Ramet1]
Mekk1 FBgn0024329 1.81 4.10E-05 −1.46 0.000132 [@ppat.1003720-Stuart1]
kuz FBgn0259984 1.79 4.80E-05 −1.36 0.000536 [@ppat.1003720-StroscheinStevenson1]
SCAR FBgn0041781 1.63 1.00E-04 −1.34 0.00084 [@ppat.1003720-StroscheinStevenson1]
Vps35 FBgn0034708 1.57 0.00015 −1.37 0.000462 [@ppat.1003720-Stuart1]
Traf4 FBgn0026319 1.57 0.00059 −2.26 3.00E-06 [@ppat.1003720-StroscheinStevenson1]
shark FBgn0015295 1.53 0.00012 −1.36 0.00073 [@ppat.1003720-Doherty1], [@ppat.1003720-Ziegenfuss1]
mib2 FBgn0086442 1.53 0.00017 −1.45 0.000534 [@ppat.1003720-Stuart1]
put FBgn0003169 1.51 0.00013 −1.39 0.000902 [@ppat.1003720-Stuart1]
Among the genes significantly up-regulated in control hemocytes at metamorphosis (p\<0.001; linear FC and *p* values indicated on the table) and significantly down-regulated in EcRB1DN-expressing hemocytes (p\<0.001; linear FC and *p* values indicated on the table), 35 genes were annotated by Flybase with the GO term phagocytosis or found in S2 cell-based RNAi screens for phagocytosis phenotype [@ppat.1003720-Stuart1], [@ppat.1003720-Ulvila1], [@ppat.1003720-Philips1]--[@ppat.1003720-StroscheinStevenson1].
FC: linear Fold Change; in bold: genes for which expression pattern was confirmed by qPCR. All p values are \<0.001, no FC threshold was applied.
Discussion {#s3}
==========
Here we have demonstrated the cell-autonomous regulation of *Drosophila* phagocytes by a hormonal signal at metamorphosis. Our study provides *in vivo* evidence that the steroid hormone ecdysone regulates both developmental and immune functions of hemocytes, such as phagocytosis of dying cells and bacteria, and the acquisition of wound responsiveness at metamorphosis. Most importantly, non-activated hemocytes are unable to efficiently fight infections, reflecting the functional importance of this hormonal regulation for the organism.
Using an *in vivo* genetic approach to block EcR signaling specifically in hemocytes, we have shown that ecdysone directly regulates their cell shape. Moreover, our data indicates that ecdysone regulates the onset of hemocyte motility and dispersal at metamorphosis, reflecting its function in border cell motility during oogenesis [@ppat.1003720-Bai1]. Our microarray data reveal that EcR up-regulates the expression of several genes functioning in cell motility or cell shape regulation [@ppat.1003720-Kiger1], [@ppat.1003720-Rohn1], which could account for these phenotypes ([Table S3](#ppat.1003720.s011){ref-type="supplementary-material"} and [S4](#ppat.1003720.s004){ref-type="supplementary-material"}). Arguably, migration of hemocytes between tissues is required for clearing dying larval tissues during the pupal period. We show that hemocytes expressing the *EcRDN* construct do not engulf dead cells, which is potentially a consequence of impaired phagocytosis, motility, or a combination of both, although we cannot distinguish between these possibilities. Ecdysone has previously been shown to induce the expression in the hemocyte-derived *mbn2* cell line of *croquemort* (*crq*; [@ppat.1003720-Dimarcq1]), a gene encoding a receptor for apoptotic cells in the embryo [@ppat.1003720-Franc1]. *crq* was identified in our microarray analysis as showing EcR-dependent up-regulation at metamorphosis, and this was confirmed by qPCR, where *crq* expression is almost completely suppressed in *EcRDN*-expressing pupal hemocytes ([Fig. 6B](#ppat-1003720-g006){ref-type="fig"}). The impaired expression of *crq* in *EcRDN* hemocytes likely contributes to their deficiency in apoptotic cell phagocytosis. Functionally, the regulation of hemocytes by ecdysone, which is the coordinator of larval tissue apoptosis, may be a smart way for the fly to synchronize its macrophage scavenging activity with the moment it is most needed, at metamorphosis. Surprisingly, we did not observe any gross developmental consequences of the loss of this function, whereby *HmlΔGal4\>EcRB1DN* individuals completed metamorphosis without delay. This is in agreement with studies showing that under sterile conditions, pupae lacking hemocytes altogether progress normally through metamorphosis [@ppat.1003720-Charroux1], [@ppat.1003720-Defaye1]. It suggests that dead cells might be engulfed by other, non-professional phagocytes (e.g. neighbor cells as reported for tumorigenesis), cleared up by other unidentified means, or simply tolerated, in the absence of functional hemocytes.
Furthermore, we show that the activation of hemocyte motility at metamorphosis also correlates with a change in their response to induced epithelial damage. While in the larva hemocytes are passively recruited to wounds from circulation [@ppat.1003720-Babcock1], we demonstrate that in the pupa they actively migrate to damaged tissues. Induction of epithelial wounds at different times APF demonstrated that active wound responsiveness is progressively acquired at metamorphosis. In agreement with previous *ex vivo* analysis [@ppat.1003720-Sampson1], our data highlights an intriguing plasticity of hemocytes to adapt their migratory activity and their response to wounds throughout development: chemotaxis in embryos and pupae ([@ppat.1003720-Wood1] and this study) versus passive circulation and 'capture' to wounds in larvae [@ppat.1003720-Babcock1]. This correlates with the observation that, although the heart is beating in a 20 h APF-old pupa, hemocytes are not propelled in the hemolymph by the heartbeat, but maintain a slow, steady, active migration on tissues (video 7).
Most importantly, our study provides the first *in vivo* evidence of hormonal regulation of the *Drosophila* cellular response to bacterial challenge. With both *ex vivo* and *in vivo* data, we have demonstrated an important role for EcR in the up-regulation of hemocyte phagocytic activity at metamorphosis ([Fig. 5](#ppat-1003720-g005){ref-type="fig"}). How does ecdysone signaling regulate phagocytosis? Previous studies in hemocyte-derived cell lines have shown that ecdysone treatment increases the transcription of some immune-related genes encoding AMPs and immune receptors such as Crq [@ppat.1003720-Dimarcq1], [@ppat.1003720-Flatt1], [@ppat.1003720-Zhang1]. Here, using a tissue-specific, whole genome transcriptomic approach, we demonstrate that many genes are regulated by ecdysone signaling in hemocytes at metamorphosis. This analysis reveals the molecular regulation behind the observed phenotypes and allows for the identification of candidate effector genes. For example, 35 genes up-regulated by EcR at metamorphosis have been previously attributed a function in phagocytosis. These genes encode proteins involved in different steps of the phagocytosis process, such as recognition (e.g. the receptors *PGRP-LC*, *croquemort*, and *Nimrod* family members, *Dscam* and *scab*), or cytoskeletal rearrangements required for the engulfment step (e.g. *RhoGAP71E*, *Rac2*, *Arpc5* and *SCAR*). Interestingly, PGRP-LC (FC 1.8 by microarray, 3.9 by qPCR) was recently shown to be induced in ecdysone-treated S2 cells [@ppat.1003720-Rus1]. It appears that ecdysone can regulate the phagocytosis process at different levels, which may be necessary to co-ordinate the ability of hemocytes to recognize and engulf their target. Moreover, genes regulated by ecdysone signaling can be implicated in more than one process, for example phagocytosis and AMP expression (e.g. PGRP-LC), or phagocytosis and cell migration (e.g. SCAR); this may contribute to synchronisation of different hemocyte immune functions.
The functional relevance of increased cellular immune activity at metamorphosis is an intriguing question. Recent studies of the contribution of cellular immunity to *Drosophila* defenses have revealed that flies in which hemocytes are genetically ablated present a high lethality at metamorphosis [@ppat.1003720-Charroux1], [@ppat.1003720-Defaye1]. This is likely the result of opportunistic bacterial infections, as feeding antibiotics was sufficient to restore wild-type viability. We did not observe such lethality under normal conditions when expressing *EcRDN* in hemocytes; however in our hands *Phago^less^* lethality in absence of infection is also lower than that previously described [@ppat.1003720-Defaye1]. This suggests that our fly strains and fly food do not harbor the same bacterial types as those used in previous studies, leading to distinct opportunistic infection scenarios. Nevertheless, our data indicate a significant lethality of *HmlΔ\>EcRDN* pupae not only after septic injury with *E. faecalis* or *E. carotovora*, but also after oral infection at larval stages with *E. carotovora*, a bacterium that is not usually lethal in wild-type individuals. This lethality is quite dramatic considering only hemocytes express the transgene, and is similar to the lethality in hemocyte-ablated individuals ([@ppat.1003720-Charroux1], [@ppat.1003720-Defaye1] and this study). It indicates that ecdysone regulation is essential for hemocyte immune functions and survival after infection.
Metamorphosis may represent a stage of predisposition to opportunistic oral infection, as the larval midgut is replaced by the adult intestinal epithelium. We speculate that histolysis of the gut could release bacteria from the lumen into the body cavity; active hemocytes may be required to limit the spreading of bacteria from temporary weak points in the epithelium. We have shown that *HmlΔ\>EcRDN* prepupae induce a normal intestinal and systemic humoral immune response after being orally infected at larval stage ([Fig. S6](#ppat.1003720.s006){ref-type="supplementary-material"} and [S7](#ppat.1003720.s007){ref-type="supplementary-material"}). In the case of both septic injury and oral infection, it is therefore likely that the main cause of decreased survival in *HmlΔ\>EcRDN* pupae is their striking hemocyte phagocytosis phenotype, possibly in combination with lack of motility, inability to chemotax to damaged tissue or other potential uncharacterized hemocyte defects.
The synchronization of multiple processes is a fundamental requirement for successful development, and likely to rely on hormonal signaling. Altogether, our data reveal the importance of steroid hormone signaling in the synchronization of development and immunity in *Drosophila*, by ecdysone-dependent activation of hemocytes at pupariation. Rus *et al*. have recently shown [@ppat.1003720-Rus1], that ecdysone signaling affects the humoral response through regulation of PGRP-LC expression. Interestingly, they observed an impact of this regulation on the ability of adult flies to survive infection, indicating that ecdysone regulation of immunity extends beyond metamorphosis. In humans, hormonal activation of macrophages underpins various cancer pathologies [@ppat.1003720-Harkonen1] and is therefore highly relevant in clinical terms. It is also generally accepted that steroid hormones impact immunity in mammals. For example, glucocorticoids are commonly used in pharmacology for their anti-inflammatory properties [@ppat.1003720-Necela1]. However, their regulation of the immune response is complex, as they can also enhance the immune response [@ppat.1003720-Dhabhar1], [@ppat.1003720-Goulding1]. More generally, steroid hormones\' specific action on monocytes is still not very well documented, mainly due to the complexity of mammalian systems and experimental limitations. Elucidating mechanisms for steroid hormone regulation of cellular immunity (e.g. [@ppat.1003720-Routley1]) will be essential for a full understanding of sex differences in immunity and inflammation. Here, in a simpler model system, we used an approach that allows *in vivo* and cell autonomous analysis of the hormonal regulation of innate immune cells. We think that in the future, the potential for genetic manipulation in the *Drosophila* model combined with the *in vivo* assays and transcriptomic data developed in this study should aid in deciphering the molecular mechanisms at work behind phagocyte activation by steroids, both in terms of cell migration and immunity *per se*.
Materials and Methods {#s4}
=====================
*Drosophila* stocks {#s4a}
-------------------
We used the following stocks from Bloomington Stock Centre: *w^1118^*; *HmlΔ-GAL4,UAS-GFP* (30142); *UAS-EcRA-DN* (9451, 9452); *UAS-EcRB1-DN* (6869, 6872); *UAS-EcRB2-DN* (9449, 9450); *UAS-EcR-RNAi* (9326, 29374); *USP-RNAi* (27258); and *UAS-Bax/CyO* from [@ppat.1003720-Defaye1]. Flies were kept on standard fly food (VDRC recipe). [Results](#s2){ref-type="sec"} obtained with DN^F645A^ are shown in all figures except when specified.
Imaging {#s4b}
-------
Pupae were mounted and hemocytes imaged live through cuticle as previously described [@ppat.1003720-Moreira1]. Images were acquired using a confocal laser line-scanning (LSM 5 Live; Carl Zeiss) or point-scanning (LSM710; Carl Zeiss) microscope (40× oil objective). Mean velocity/min of hemocytes tracked manually over 10 min using the ImageJ plugin 'Manual Tracker' was used as a measure of motility. At least 40 cells were tracked per condition, corresponding to at least 4 independent experiments. For tracking plots, trajectories of 20 cells were transformed and analysed using the ImageJ plugin 'Chemotaxis Tool' as previously described [@ppat.1003720-Goulding1].
Laser wounding {#s4c}
--------------
Wounds were made in prepupae in the dorsal thoracic epithelium using a UV laser controlled by galvanometric mirrors. Laser was emitted at 355 nm as a 20 second train of 1 second square pulses and was fired 9 times to form a square wound of approximately 40×40 µm. The wound was made in a region lateral to the sessile patches, just below the pupal epithelium and always included a tracheal branch. Hemocytes were tracked and hemocytes recruited to the wound over time were counted; the rate of recruitment was calculated as the number of hemocytes recruited to the wound over 150 min after wounding.
Morphometric analysis by flow cytometry {#s4d}
---------------------------------------
Hemocytes were bled into PBS and analysed for their FSC-Area and SSC-Area with a CyAn ADP flow cytometry Analyzer (Dako Cytomation/Beckman Coulter). The hemocyte population was defined as GFP positive cells using hemocytes from *w^1118^* as a negative control to establish the threshold.
Infection, survival and phagocytosis assay {#s4e}
------------------------------------------
For septic injury, pupae were pricked in the lower abdomen with a needle dipped in bacterial culture. *E.carotovora* (strain *E.c.c.15*) were grown overnight in Luria Bertani (LB) at 29°C and adjusted to O.D. 100. *E. faecalis* were grown overnight in LB at 37°C and adjusted to O.D. 5. Clean pricking with sterilized needle was used as a control. Oral infection of larvae was performed as described ([@ppat.1003720-Romeo1] and see SI for more details) by feeding larvae with a mixture of banana and *E.c.c.15*. Pupae were maintained at 29°C and eclosion of adults was scored after 5 days. For [Fig. 3A](#ppat-1003720-g003){ref-type="fig"}, the stage of death was determined by careful examination and classification between four approximate stages: early pupae (from approx. 12 h to 36 h), intermediate 1 (from approx. 36 h to 54 h), intermediate 2 (from approx. 36 h to 72 h) and late pupal stage (from approx. 72 h to 90 h), corresponding to pupae with the appearance they adopt just before eclosion. For *ex vivo* phagocytosis assay, late L2/young L3 larvae, or white prepupae, were bled into 400 µL PBS (pH 7.4) and 8 µL pHRodo Red *E. coli* BioParticles (1 mg/mL; molecular Probes) were added. Phagocytosis was assayed 30 min later by flow cytometry. For *in vivo* assay, 80 nL of pHRodo particles were injected in prepupae 1h30 APF, using a nanoinjector (Nanoliter 2000, World Precision Instruments). Prepupae were either imaged 1 h after injection, or bled into PBS and analyzed by flow cytometry with a modular Flow Cytometer (MoFlo; Dako Cytomation), using 561 nm and 488 nm lasers. pHRodo particles in solution, *w^1118^* non-injected flies, *HmlΔ\>GFP* non-injected flies and *w^1118^* flies injected with pHRodo particles were used to define the thresholds for GFP and phagocytosed red-particle emission. The experiment was repeated three times, using at least 10 prepupae (roughly 10 000 hemocytes) per genotype and experiment. For *in vivo* phagocytosis assay with live bacteria, 50.6 nL of *E. coli-RFP* (at O.D. 2 after dilution in PBS) were injected in prepupae 1h30 APF. After 10 min recovery, prepupae were mounted, and imaged at 20 min post-injection. The central-most sessile patch was imaged at 40× to a depth of 30 µm. Phagocytosis was scored by eye from z-stacks; *E.coli-RFP* were scored as either attached or internalized and phagocytic index was calculated using total hemocyte number.
Phalloidin and DAPI staining; measure of dead cell phagocytosis {#s4f}
---------------------------------------------------------------
Circulating hemocytes were retrieved by bleeding animals into 20 µL of PBS. After 20 min, they were fixed in a 4% formaldehyde solution for 15 min, then washed in PBST (0.1% Triton X-100 in PBS) and incubated during 30 min at room temperature in a blocking solution (PBST +1% Bovine Serum Albumin). Bleeds were incubated with phalloidin (1∶200 µL; Invitrogen) and DAPI (1 µm/mL) for 30 min, then washed for 1 h in PBS and mounted in mounting medium. Quantification of hemocytes phagocytosing muscle tissue was measured as the percentage of hemocytes positive for phalloidin-positive vacuoles among total hemocyte number.
Statistical analysis {#s4g}
--------------------
Statistical significance was defined by pair-wise comparison to controls using the Mann--Whitney U test (non parametric), *t*-test (parametric), or Wilcoxon test (survival experiments). Indicated *p*-values are two-tailed. Calculations and graphs were produced using Excel (Microsoft) and Prism (Graphpad). Symbols in the figures: \**p\<0.05*; \*\**p\<0.01*; \*\*\**p\<0.001*; ns: not significant.
FACS-sorting, RNA isolation, target synthesis and hybridization to Affymetrix Array Strips {#s4h}
------------------------------------------------------------------------------------------
Hemocytes were isolated by FACS from 3rd instar larvae (at the late feeding stage) and prepupae (1 h to 2 h APF) corresponding to two different genotypes: *w; HmlΔGal4, UAS-GFP/+* (as control), *w; HmlΔGal4; UAS-GFP/UAS-EcRB1DN^W650^*. For each of the four conditions we performed three biological replicates. Hemocytes were sorted based on their fluorescence and directly into the lysis buffer prior to total RNA extraction using the RNeasy Plus Micro Kit (Qiagen). Concentration and purity was determined by spectrophotometry and integrity was confirmed using an Agilent 2100 Bioanalyzer with a RNA 6000 Nano Assay (Agilent Technologies).
RNA was processed for use on Affymetrix (Santa Clara) Drosophila Gene 1.1 ST Array Strips using the Ambion WT Expression Kit (Life Technologies) and Affymetrix GeneChip WT Terminal Labeling Kit, according to the manufacturer\'s protocols. Briefly, 100 ng of total RNA containing spiked in Poly-A RNA controls (GeneChip Expression GeneChip Eukaryotic Poly-A RNA Control Kit; Affymetrix) was used in a reverse transcription reaction (Ambion WT Expression Kit) to generate first-strand cDNA. After second-strand synthesis, double-stranded cDNA was used in an *in vitro* transcription (IVT) reaction to generate cRNA (Ambion WT Expression Kit). 15 µg of this cRNA was used for a second cycle of first-strand cDNA synthesis (Ambion WT Expression Kit). 5.5 µg of single stranded cDNA was fragmented and end-labeled (GeneChip WT Terminal Labeling Kit; Affymetrix). Size distribution of the fragmented and end-labeled cDNA, respectively, was assessed using an Agilent 2100 Bioanalyzer with a RNA 6000 Nano Assay.
3.5 µg of end-labeled, fragmented cDNA was used in a 150-µl hybridization cocktail containing added hybridization controls (GeneAtlas Hybridization, Wash, and Stain Kit for WT Array Strips, Affymetrix), of which 120 µl were hybridized on array strips for 20 h at 48°C. Standard post hybridization wash and double-stain protocols (GeneAtlas Hybridization, Wash, and Stain Kit for WT Array Strips, Affymetrix) were used on an Affymetrix GeneAtlas system, followed by scanning of the array strips.
Microarray data analysis {#s4i}
------------------------
The 12 scanned arrays were analyzed first with Affymetrix Expression Console software using RMA to obtain expression values and for quality control. Control probe sets were removed and log2 expression values of the remaining 15391 transcripts were imported into Chipster 2.4 [@ppat.1003720-Kallio1]. Differential expression was determined by empirical Bayes two-group test [@ppat.1003720-Smyth1] with Benjamini-Hochberg multiple testing correction and a p-value cut-off of 0.001.
Quantitative PCR (qPCR) {#s4j}
-----------------------
Hemocytes were sorted and RNA extracted as described for microarrays. RNA concentration was measured with a Nanodrop 1000 spectrophotometer. Complementary DNA was synthesized using Transcriptor First Strand cDNA Synthesis kit (Roche). For quantitative PCR, kit from Applied Biosystems was used (ViiA 7 System, Applied Biosystems). See supplementary information ([Text S1](#ppat.1003720.s014){ref-type="supplementary-material"}) for primer sequences and protocol for qPCR analysis of AMP expression in gut and whole pupa.
Supporting Information {#s5}
======================
######
**Ecdysone-dependent evolution of hemocyte granularity and size over metamorphosis.** A. Forward scatter (FSC)--Area/side scatter (SSC)--Area plots reflecting size (x axis) and granularity (y axis) of hemocytes retrieved from L3W (blue), 8 h APF (orange) and 18 h APF (brown) control and *HmlΔ\>EcRB1DN* animals. Note, this is the same data represented in [Fig. 1E and F](#ppat-1003720-g001){ref-type="fig"}, separated into distinct plots for each stage for clarity. (B--C) FSC-A (indicative of cell size; B) and SSC-A (indicative of cell granularity; C) histograms for populations of control hemocytes (top) and EcRB1DN-expressing hemocytes (bottom) at different time points before (L3W larvae) and after puparium formation. Control hemocytes present a clear shift in FSC-A and SSC-A over development while the EcRB1DN-expressing hemocytes retain a larval size and morphology. These data encompass the data presented in [Fig. 1E and F](#ppat-1003720-g001){ref-type="fig"} and in [Fig. S1A](#ppat.1003720.s001){ref-type="supplementary-material"}.
(TIF)
######
Click here for additional data file.
######
**Hemocytes expressing EcRB1 DN proliferate more actively in late 3^rd^ instar larvae.** L3W larvae were bled and proliferation was evaluated by measurement of the percentage of cells positive for a Phospho-histone H3 (PH3) staining among the hemocyte population (t-test; P\<0.0001).
(TIF)
######
Click here for additional data file.
######
**Neither embryonic hemocyte dispersal nor recruitment of larval hemocytes to the gut proventriculus are affected by the expression of EcRB1DN.** (A--B) Similar dispersal of hemocytes in *w; srp^hemo^Gal4, UAS-GFP/+* embryo (A) or *w; srp^hemo^Gal4, UAS-GFP/UAS-EcRB1DN* embryo (B). The *serpent^hemo^Gal4* (*srp^hemo^*) driver was chosen for its early expression in hemocytes. (C--D) Similar numbers of hemocytes are recruited to the proventriculus in *w; HmlΔGal4, UAS-GFP/+* (C) and *w; HmlΔGal4, UAS-GFP/UAS-EcRB1DN* (D) larvae. In all pictures, anterior is up. Scale bars represent 20 µm.
(TIF)
######
Click here for additional data file.
######
**Expression of** ***EcRB1DN*** **less than 18 h before puparium formation is sufficient to affect hemocyte motility.** We used a temperature sensitive (ts) Gal80, a Gal4 inhibitor, to control the expression of the *EcRB1DN* transgene in time. *HmlΔGal4, UAS-GFP; tub-Gal80^ts^/+* (*Gal80^ts^* control) and *HmlΔGal4, UAS-GFP; tub-Gal80^ts^/EcRB1DN* (*Gal80^ts^ EcRB1DN*) larvae were grown at 18°C (permissive for Gal80~ts~), transferred to 29°C (restrictive for Gal80*^ts^* - *EcRB1DN* is expressed) at late larval stage and hemocyte motility was measured 18 h later in 1 h APF-prepupae. P\<0.001. Mean and SEM are displayed.
(TIF)
######
Click here for additional data file.
######
**Pupae in which hemocytes express EcRB1DN survive metamorphosis and are not delayed in their pupal development.** (A) Lethality at metamorphosis was very low and similar between control individuals and individuals which hemocytes express EcRB1DN (Wilcoxon test; P = 0.4042). Survival over metamorphosis is represented as the percentage of prepupae giving rise to adults. (B) The time needed for metamorphosis was not affected by expression of EcRB1DN in hemocytes (Wilcoxon Test; P = 0.7792). The curve represents the percentage of prepupae eclosed at different time points APF. Experiments were performed at 29°C.
(TIF)
######
Click here for additional data file.
######
**Expression of EcRB1DN in hemocytes does not affect the humoral systemic immune response to oral infection by** ***E. carotovora*** **.** *HmlΔ\>GFP* (control) and *HmlΔ\>GFP, EcRB1DN* L3 larvae were fed on banana mixed with LB medium (as a non-infected control) or on banana mixed with a culture of *E.carotovora*. Prepupae at two stages -- early (light prepupae, 0--3 h APF) and late (dark prepupae, 4--8 h APF) were assessed for the induction of the humoral systemic immune response by RNA extraction from whole prepupae and quantitative PCR on the AMPs *Diptericin, Attacin, Metchnikowin* and *Drosomycin* (see [Text S1](#ppat.1003720.s014){ref-type="supplementary-material"} for details). In both genetic contexts, the transcription of all AMPs was strongly induced after infection except for *Drosomycin* (an antifungal AMP); a stronger induction was observed in late (dark) prepupae. Importantly, no significant differences in expression of any of the AMPs tested were observed between control and EcRB1DN, except for Attacin, which expression was significantly higher in *HmlΔ\>GFP, EcRB1DN* late prepupae (p\<0.05). These data correspond to three independent biological repeats. Mean and SEM are displayed.
(TIF)
######
Click here for additional data file.
######
**Expression of EcRB1DN in hemocytes does not affect the local epithelial immune response to oral infection by** ***E. Carotovora*** **.** *HmlΔ\>GFP* (control) and *HmlΔ\>GFP, EcRB1DN* L3 larvae were fed on banana mixed with LB medium (control) or on banana mixed with a culture of *E.carotovora*. Prepupae were assessed for the induction of the local epithelial immune response by RNA extraction from guts dissected at 1--4 h APF, and quantitative PCR on the AMP *Diptericin* (see [Text S1](#ppat.1003720.s014){ref-type="supplementary-material"}). In both genetic contexts, the immune response was strongly induced after infection and *HmlΔ\>GFP, EcRB1DN* prepupae induced expression to a similar extent as controls. This graph corresponds to two independent biological repeats. *Dpt* expression is normalized to *Ecc15*-infected control and mean and data range are displayed.
(TIF)
######
Click here for additional data file.
######
**An hemocyte has internalized an** ***E.coli-RFP*** **bacteria.** This image corresponds to an orthogonal cut of a still from [video S5](#ppat.1003720.s019){ref-type="supplementary-material"}, last time point (t = 31), showing a red *E.coli-RFP* bacteria inside a green hemocyte (GFP).
(TIF)
######
Click here for additional data file.
######
**Genes for which expression is significantly changed at metamorphosis in an EcR-dependent manner.** From the microarray data, we selected genes for which expression was significantly changed (up or down-regulated; p\<0.001) at metamorphosis in control hemocytes. We then restricted our list to genes for which expression at pupal stage was significantly different between control and EcRDN-expressing hemocytes (p\<0.001).
(XLSX)
######
Click here for additional data file.
######
**Microarray data.** Data obtained from the microarrays, with four conditions (control and EcRDN-expressing hemocytes, at larval and pupal stage) including three biological repetitions each. The table also presents the FC and p values for the following comparisons: control pupa vs control larva, EcRDN pupa vs EcRDN larva, EcRDN larva vs control larva and EcRDN pupa vs control pupa.
(XLSX)
######
Click here for additional data file.
######
**EcR transcriptionally regulates genes involved in cell motility.** Genes for which expression is significantly changed at metamorphosis in an EcR-dependent manner ([Table S1](#ppat.1003720.s009){ref-type="supplementary-material"}) were cross-referenced with genes associated with a GO term related to cell motility (GO terms used: cell migration, cell motility, cell chemotaxis).
(XLSX)
######
Click here for additional data file.
######
**EcR transcriptionally regulates genes involved in cell shape regulation.** Genes for which expression is significantly changed at metamorphosis in an EcR-dependent manner ([Table S1](#ppat.1003720.s009){ref-type="supplementary-material"}) were cross-referenced with the results of screens performed on S2 cells for changes in cell morphology (published in [@ppat.1003720-Kiger1], [@ppat.1003720-Rohn1]).
(XLSX)
######
Click here for additional data file.
######
**List of primers used for RT-qPCR.**
(DOC)
######
Click here for additional data file.
######
**Supplementary material and methods.** Material and methods used to perform the experiments presented as supplementary figures.
(DOC)
######
Click here for additional data file.
######
**Hemocytes from a control prepupa acquire motility upon metamorphosis.** Hemocytes visible under the dorsal epithelium in a control prepupa (*HmlΔ\>GFP*) were imaged for 3 h, from 1 h APF to 4 h APF. The hemocytes can be observed changing morphology, and disperse by migrating away from their original location. Time indicated on the film is time APF. Images were analyzed by time-lapse confocal microscopy using a laser-scanning confocal microscope (LSM510; Carl Zeiss). Frames were taken every minute and are displayed at a rate of 7 frames/second. The scale represents 20 µm.
(MOV)
######
Click here for additional data file.
######
**Hemocytes blocked in ecdysone reception do not acquire motility at metamorphosis.** Hemocytes visible under the dorsal epithelium in an *HmlΔ\>GFP, EcRB1DN* prepupa were imaged for 3 h, from 1 h APF to 4 h APF. These hemocytes, which express a dominant negative form of the EcRB1, barely move and do not change morphology. Time indicated on the film is time APF. Images were analyzed by time-lapse confocal microscopy using a laser-scanning confocal microscope (LSM510; Carl Zeiss). Frames were taken every minute and are displayed at a rate of 7 frames/second. The scale represents 20 µm. Stills from this video are presented in [figure 2](#ppat-1003720-g002){ref-type="fig"}.
(MOV)
######
Click here for additional data file.
######
**Prepupal 'sessile' hemocytes are recruited to wound sites.** A wound (indicated by a box) was made with a laser in the vicinity of a sessile patch in a control prepupa (*HmlΔ\>GFP*), at 1h30 APF. Hemocytes were imaged for 3h20 after wounding. Time indicated on the film is time APF; the film starts immediately after wounding. The hemocytes respond to the wound by chemotaxing towards it, the majority originating from the lateral and longitudinal sessile patches. Images were analyzed by time-lapse confocal microscopy using a laser-scanning confocal microscope (LSM510; Carl Zeiss). Frames were taken every minute and are displayed at a rate of 14 frames/second. The scale represents 20 µm. Stills from this video are presented in [figure 3](#ppat-1003720-g003){ref-type="fig"}.
(MOV)
######
Click here for additional data file.
######
**Hemocytes insensitive to ecdysone are impaired in their recruitment to wounds.** A wound (indicated by a box) was made with a laser in the vicinity of a sessile patch in a *HmlΔ\>GFP*, *EcRB1DN* prepupa, at 90 min APF. Hemocytes were imaged for 2h20 after wounding, from 1h30 APF to 3h50 APF. Time indicated on the film is time APF; the film starts immediately after wounding. Very few hemocytes can be visualised being recruited to the wound. Images were analyzed by time-lapse confocal microscopy using a laser-scanning confocal microscope (LSM510; Carl Zeiss). Frames were taken every minute and are displayed at a rate of 7 frames/second. The scale represents 20 µm.
(MOV)
######
Click here for additional data file.
######
**Example of** ***in vivo*** **live imaging of phagocytosis.** A hemocyte in a control prepupa was filmed performing attachment, engulfment and internalization of an *E.coli-RFP* bacteria. One can see other hemocytes in the act of phagocytosis, or with already internalized bacteria, as well as free bacteria propelled by the hemolymph circulation. Hemocytes are filmed live through the cuticle of the prepupa. Images were acquired every 15 seconds. The film is displayed at 10 fpm and corresponds to approximately 8 minutes.
(AVI)
######
Click here for additional data file.
######
**3D-image of an hemocyte imaged live in the act of engulfing a bacteria.** This 3D image corresponds to the time point 17 of [video S5](#ppat.1003720.s019){ref-type="supplementary-material"}. The hemocytes is in green (GFP), the bacteria in red (*E.coli-RFP*). 3D projection was realized with the corresponding ImageJ plugin.
(AVI)
######
Click here for additional data file.
######
**Pupal hemocytes are not carried in the hemolymph by the movement of the heart.** A pupa is filmed over several minutes, where heartbeat pulses can be observed. Hemocytes are attached to surrounding tissues and do not move with the pulses.
(MOV)
######
Click here for additional data file.
We thank N. Matova and S. Prag for discussion, M. Crozatier, A. Vincent, A. Gontijo, T. Koyama, E. Bolukbasi, F. Leulier, P.Liehl and F. Cabreiro for helpful comments on the manuscript, C. Moreira for assistance with plotting tracking graphs, João Sobral and Jörg Becker (Instituto Gulbenkian de Ciênca) for the microarray service and discussion, the flow cytometry service of Instituto Gulbenkian de Ciênca and S. Ponte for technical assistance. We would also like to thank the anonymous reviewers whose constructive criticisms improved the original manuscript.
[^1]: The authors have declared that no competing interests exist.
[^2]: Conceived and designed the experiments: AZR JCR AJ. Performed the experiments: AZR JCR ASB ABL ARMD. Analyzed the data: AZR JCR ASB ABL AJ. Contributed reagents/materials/analysis tools: ABL ES. Wrote the paper: AZR JCR.
[^3]: Current address: Institute of Healthy Ageing, University College London, London, United Kingdom.
[^4]: Current address: INSA-Lyon, INRA, UMR203 BF2I, Biologie Fonctionnelle Insectes et Interactions, Villeurbanne, France.
| {
"pile_set_name": "PubMed Central"
} |
Hey everybody I wanted to give a little plug real quick.
You guys know David right? He is one of our artists for extra history.
He helped us make all of those episodes about Justinian, and Admiral Yi.
and the Sengoku Jidai, and the South Sea Bubble. He's great.
Well, what you may not know is that he is actually an extremely talented professional Illustrator.
and what more, he's working on a graphic novel.
It's called Son's of the Forgotten, a light hearted, high, fantasy epic
that David's been developing for some time with his friend,
Rufino Ayuso
They've already got a lot of art and world building work done, and they just announced a Patreon for this project today.
I'll put a link to that Patreon on screen, and in the text description below.
If any of the art I've been putting on the screen strikes your fancy, and why wouldn't it.
There's a lot more to see over on the Patreon page, so go give it a look.
Thank you for your time, carry on with your day.
[Music Plays]
| {
"pile_set_name": "YoutubeSubtitles"
} |
1. Field of the Invention
The present invention relates to manufacturing methods and structures of a wafer level image sensor module with package structure, and more particularly, to a manufacturing method and structure of an image sensor module with an encapsulant coupled to a lateral side of the module.
2. Description of the Prior Art
Mobile devices equipped with an image retrieving unit are all the rage, and thus image retrieval is indispensable to portable electronic devices nowadays, such as notebook computers, cellular phones, and PDA. In this regard, the quality of an image retrieving unit depends on the performance of an image sensor module inside the image retrieving unit. In turn, the performance of an image sensor module extremely depends on an image sensing chip package therein.
The purpose of packaging is to prevent an image sensor module from being damaged by an external force or for an environmental reason in the course of use, and provide electrical connection between the image sensor module and an external device to thereby enable signal transmission.
However, various packaging methods in use have drawbacks or rooms for improvement as follows:
1. Space: a conventional chip-on-board (COB) package occupies relatively large space, because it comprises metal wires for use in wire bonding; a conventional COB package involves adhering an image sensing chip to a substrate or a circuit board, and thus it is difficult to reduce the total height of the package (i.e., the sum of the height of the package and the height of the substrate or circuit board); in an attempt to solve the problem with the space-consuming wire bonding structure based on COB packaging, a combination of a chip scale package structure and a wafer level lens assembly package (CSP+WLO) was put forth but found to be ineffective in reducing the total height of the module, because a chip scale package (CSP) structure requires a piece of glass for protecting a chip sensing region, and thus the total optical focal length increases with the glass thickness; also, COB packaging requires a substrate or a circuit board and therefore incurs manufacturing costs.
2. Side light leakage: all conventional packaging methods are susceptible to side light leakage and thus require an extra light mask or a masking layer coated on one side of a lens assembly; as a result, the extra light mask or coating not only incurs raw material costs but also increases the steps of a working procedure.
3. Focusing: conventional packaging methods entail performing the step of focusing by means of a focusing unit in order to focus on the image sensing chip; however, this step requires a specific apparatus and work procedure which incur costs. | {
"pile_set_name": "USPTO Backgrounds"
} |
Laparoscopic approach for human islet transplantation into a defined liver segment in type-1 diabetic patients.
Intra-portal islet transplantation is usually performed by cannulation of a mesenteric vein during laparotomy or through percutaneous trans-hepatic cannulation of a portal branch. In this study, we describe a new laparoscopic technique for intra-portal islet transplantation in a defined liver segment, as an alternative to the current procedures. Eighteen type-1 diabetic patients underwent laparoscopic re-permeabilisation of the umbilical vein, followed by catheterization of the left branch of the portal vein. The catheter was guided under fluoroscopic control into a chosen liver segment. It was then secured to the skin or connected to an implantable venous access device. Thereafter, the islet preparation was slowly injected. There was no rise in portal pressure. The median duration of the procedure was 85 min. The procedure was successful in 17 of 18 cases. There were no surgical complications. We conclude that this laparoscopic procedure is a feasible, convenient, and safe alternative method of islet transplantation. Moreover, it allows multiple deliveries of islets into the same liver segment. | {
"pile_set_name": "PubMed Abstracts"
} |
President Trump expressed his frustrations over an anonymous New York Times op-ed from a senior administration official, describing it as "a horrible thing," calling on the Times to out the author and admitting he had no idea who wrote it.
"You just look. He was- nobody knows who the hell he is... or she. Although, they put he -- but probably that's a little disguise. That means it's she. But for the sake of our national security, the New York Times should publish his name at once. I think their reporters should go and investigate who it is. That would actually be a good scoop."
Trump then went into a rant on "deep state actors" calling them a threat to democracy.
"I mean you look at the Washington Post or the New York Times, I can never get a good story. I mean you look at this horrible thing that took place today, it's really, is it subversion? It is treason? It's a horrible thing. You know the good thing about that? Even liberals that hate me say, 'that's terrible what they did.' And it is, really terrible."
Trump also complained about the news coverage about him and his administration. | {
"pile_set_name": "OpenWebText2"
} |
The sizing options displayed for each framed print is for the size of the actual print. The frame and white matting will add additional width and height to make up the completed frame size. If ordered without mat then the completed frame size will be about 1.5" wider and taller. The completed frame sizes are below and may vary a bit from frame to frame so complete frame sizing is also noted on each of the item descriptions.
When ordering a two print set that is unframed be sure to order each side of the print set. So if ordering the Be Still, My Soul set, you would add the Be Still side with the desired size to your cart and then add the My Soul side with the desired size to your cart to complete the set.
When ordering the framed set there is no need to add both sides. It is already set up to be added to your cart as the double printed set.
Most domestic orders are shipped with USPS and should arrive within 3-7 business days. Prints without framing may take 7-10 business days to arrive. Framed prints are made to order and should arrive within 8-15 business days.
Furniture and some made to order items will take longer to ship. These products have delivery times noted on the description.
Once your order ships you will be e-mailed a tracking number. Please note these shipping times are estimates and are not guaranteed. If you need your order expedited, please contact us and we can let you know if the item is eligible for expedited shipping and send you a shipping quote.
Yes! Most of our products are available for international shipping. Products that we are not able to ship internationally are noted on the product description. Framed and canvas prints, furniture, and larger sized products are typically not eligible for international shipping. Please contact us if you are not sure if we are able to ship a product to your country.
Customer satisfaction is our #1 priority and we will do our best to make sure our customers are satisfied. Many of the products we offer are made to order and we do not stock so we are unable to accept returns on these items. If you are ever unhappy for any reason with your order, please reach out to us so that we can find a solution to make it right. There are also many products we keep in stock and do accept returns. Please read the listing description before making an order to see whether or not an item is eligible for a return. You can click here to view our shipping and return policy.
Since many of our products are one of a kind, it is possible that it is gone forever! I know, very sad. But if it does not say "one of a kind" on the listing, there is a good chance we will be restocking. Click "notify me when this product becomes available" and we will send you an email when it comes back in stock!
So many of our products are created by small business and creators with their very own hands. They are hand selected companies based on excellent workmanship and values we admire.
Most of our "one of a kind" products are chosen with great care one item at a time by Mary Lauren. It is sometimes tedious, but we believe that is the best part of this little business of ours! Finding great products we think you'll love!
Can't find what you are looking for? Reach out to us below.
Name
Email*
Message
Be Original
Many of our pieces are one of a kind. We put so much time into creating and choosing pieces that are unique and original because we know that so many of you will love and appreciate the extra effort. | {
"pile_set_name": "Pile-CC"
} |
fileFormatVersion: 2
guid: f2526e443ce2efb4cb419bda6a034df6
timeCreated: 1490642887
licenseType: Pro
NativeFormatImporter:
userData:
assetBundleName:
assetBundleVariant:
| {
"pile_set_name": "Github"
} |
Washington Widefire
The total cumulated rainfall is expected to be much below normal with a high
risk of drought in the main agricultural areas of Somalia and in parts of Kenya
and Ethiopia. Mobile Tracker Free is the application link that allows you to free monitor your children, prevent data theft and supervise the productivity of your employees. Our mobile monitoring application tracks all the activities of the target phone, such as SMS / MMS, call history, GPS position, e-mails, photos, web history and more. | {
"pile_set_name": "Pile-CC"
} |
he form o*p**4 + k*p**2 + m + i*p + l*p**3 and give l.
0
Express 2 - 1 + 2*g - 2*g**3 - 462*g**2 + 0 + g**4 + 460*g**2 as k*g**4 + t*g + q*g**2 + c*g**3 + m and give m.
1
Rearrange 797*b**4 - 798*b**4 + 4*b**3 - 4 + 3*b**3 + 2*b**2 - b**2 to the form r*b**3 + c*b**2 + k*b + j + s*b**4 and give s.
-1
Express 0*i**4 + 1143*i**2 + 2*i**4 - 1141*i**2 - 2*i**3 as a*i + f*i**3 + r + k*i**2 + v*i**4 and give k.
2
Rearrange -2*i - 41 + 15 - 8 to r*i + x and give r.
-2
Express (5*g - 5*g - 2*g)*(-4*g - 2 + 7*g - 5*g) as c + k*g + z*g**2 and give k.
4
Rearrange (87 - 24 - 17)*(5*d - 4*d - 2*d) + (2 + 4 - 5)*(3*d - 5 + 5) to o + w*d and give w.
-43
Express (-31 + 11 - 3 + (-2 + 1 + 2)*(2 + 2 - 2) + 3 - 3 + 2)*(0 + 0 - 2*c**3) in the form f*c + r + m*c**2 + k*c**3 and give k.
38
Rearrange 7 + 0*j**2 + 0 - 7*j**2 + 6*j**2 to n*j**2 + w*j + y and give y.
7
Express (-3*j - 2*j + 2*j)*(j - 2*j + 0*j)*(-9*j - 19*j + 0*j) - 2*j**3 + 3*j**3 - 2*j**3 in the form z*j**2 + l*j**3 + t*j + a and give l.
-85
Rearrange -2*y**4 + 2*y**4 + 0*y**4 - 1 - 3*y**2 - 9*y**4 to r + a*y**4 + i*y**3 + j*y + x*y**2 and give a.
-9
Rearrange -x - x - 2*x - 2*x to p + u*x and give u.
-6
Rearrange -19*k + 45*k + 29*k to g + x*k and give x.
55
Rearrange 0*a**2 - 3*a**2 + a**2 + 1 + a**2 - 1 + (4*a - 3*a - 3*a)*(a + a + 0*a) - 109 + 109 + 4*a - 2*a**2 to c*a**2 + p*a + q and give c.
-7
Express -2*a**3 + 8*a**3 + 80*a**2 - 82*a**2 in the form t*a**2 + n*a + p*a**3 + q and give p.
6
Express (-k + 0*k + 0*k)*(-3 + 6 - 7*k + 0) as m*k**2 + v*k + l and give m.
7
Rearrange 419 + z**2 + 2*z**3 - 2*z**3 + 2*z**4 - 420 to s + v*z**4 + x*z + k*z**3 + a*z**2 and give a.
1
Express -56 + 15*m**3 + m + 56 in the form d*m + v*m**3 + i*m**2 + a and give v.
15
Rearrange (-4 + t**2 + 4)*(-3*t + t - t) + 51 + t**3 - 51 + (-2*t**2 + 0*t**2 + 0*t**2)*(7*t - 3*t - 3*t) to g*t**3 + p*t + u*t**2 + y and give g.
-4
Rearrange 2*r**4 - 2*r**2 - 8*r**4 - 2*r**4 + (-3 + 3 + r**3)*(3*r - 5*r + 3*r) to u*r**2 + m*r**4 + w + y*r**3 + l*r and give u.
-2
Rearrange -8*y - y**2 + 2*y**2 + y**2 + (-y - y + 0*y)*(-y + 0 + 0) to l + k*y**2 + q*y and give k.
4
Express n - 4*n + 0*n + (-3*n + 4*n - 2*n)*(-4 + 2 + 3) - 3 + 3 - n + (8 - 4*n - 8)*(0 + 2 - 1) - 4*n - 4*n + 5*n in the form i*n + y and give i.
-12
Rearrange -2*s + 1 + 2*s + 6*s**2 - 4*s**2 + s**3 to the form y*s**2 + h*s**3 + n + v*s and give v.
0
Rearrange -13*k**2 + 26*k**2 - 3*k + 17*k**2 to x + q*k**2 + a*k and give q.
30
Express 38*t**4 + 39*t**4 - 75*t**4 + 2*t**3 + 2 + t + 3*t**2 in the form m + w*t**2 + n*t**3 + f*t + l*t**4 and give m.
2
Express (2 - 2 - h**2)*(-4*h + 3*h + 0*h) + (-h**3 - 2*h**3 + 0*h**3)*(5 - 3 - 1) as v*h**2 + c*h**3 + x*h + t and give c.
-2
Express 0*p**2 + 2 + p**2 + 2*p**3 - p**4 - 1 + 0*p**2 as v*p**2 + g*p**3 + m*p**4 + h + d*p and give m.
-1
Express (-1 - a**2 + 1)*(3*a - a**2 - 3*a) + (-10*a**3 + 10*a**3 - 12*a**3)*(-3 - a + 3) in the form u*a + m*a**3 + k*a**4 + c + r*a**2 and give k.
13
Rearrange n - 73*n**3 + 71*n**3 + 0*n to u*n + w + d*n**2 + b*n**3 and give u.
1
Express 29*f - 6*f - 15*f as p + c*f and give p.
0
Express (3 - 4 + 0)*(3 - 3 - y) - 11*y + 4*y - 13*y as d + j*y and give j.
-19
Rearrange 75 + 5*h**2 - 75 to the form m + g*h + u*h**2 and give u.
5
Rearrange -2*j + 4*j - 3*j + (2*j - 6*j - 7*j)*(3 - 1 - 4) + j - j - j to the form t*j + g and give t.
20
Rearrange -60 + 8*b**2 - b**2 + 57 to h*b**2 + s + a*b and give h.
7
Rearrange 2*p**4 + 675*p**2 - 683*p**2 + 4*p - p to the form z*p**3 + o*p**2 + b*p + r*p**4 + x and give r.
2
Express -2*f**4 - 3*f + 0*f**4 - 3 - 2*f**2 + 1 in the form v*f**3 + w + t*f + g*f**4 + c*f**2 and give w.
-2
Express 2*u**3 + u**3 + 4*u**2 - u**2 - 2*u**3 - 2*u in the form m*u + c*u**3 + q + p*u**2 and give p.
3
Express -30 - 127*w**3 + 30 + 2*w in the form p + g*w**3 + k*w**2 + s*w and give s.
2
Rearrange (-9 - 3 - 3)*(-27 - y + 27) to the form q + i*y and give i.
15
Express -2*w - w**3 + 3*w**3 - 3*w**3 + 4*w - 11 in the form h + p*w + t*w**3 + z*w**2 and give t.
-1
Express -10*u + 13*u + 29*u in the form g + f*u and give f.
32
Express -2 + 96*b**3 - 100*b**3 + b**2 + 0 in the form g*b**2 + k*b**3 + a + p*b and give k.
-4
Express (6 - 1 - 1)*(0*o - 3*o + 5*o) - 3*o + 14*o + 9*o as q*o + x and give q.
28
Express -3*v + 2*v + 3*v + 2*v - 3*v + 0*v - 3 - 2*v + 3 + (-3*v + v + v)*(-3 + 3 - 1) - 1 + v + 1 + v - 5*v + 4 + v as p + g*v and give p.
4
Rearrange (-2*j + 4*j + 0*j)*(j**3 + j - j) - 2*j**4 - j**4 - j**4 to the form m*j**3 + r*j**2 + c*j + v*j**4 + p and give v.
-2
Express -2 + 7*c**3 + 2*c - 9*c**3 - 8*c**3 - 9*c**3 as g + v*c**3 + f*c + m*c**2 and give g.
-2
Express 24*l - 3*l + 2 + 49*l as g + z*l and give z.
70
Express 8*s**3 - s**3 + 11*s**3 + (-s + 1 - 1)*(-3*s**2 + s**2 + s**2) + (2 - 2*s**2 - 2)*(-3*s + 2*s + 2*s) in the form o + h*s**2 + q*s**3 + z*s and give q.
17
Express -3*z**4 + 3*z**4 + 2*z**4 + 14*z**4 + 7 - 7 + (-z - z + 3*z)*(-3*z**3 + 2*z**3 + 0*z**3) in the form f*z**4 + x + b*z**2 + y*z + u*z**3 and give f.
15
Rearrange -27*s**2 - 11*s**2 - 15*s**2 + 5*s**2 - 3*s**2 - s**2 - 2*s**2 + 1 - 1 + (s + 1 - 1)*(-3*s - s + 2*s) to r*s**2 + k + x*s and give r.
-56
Rearrange (18*z - 54*z - 76*z + (-2 + 5 - 2)*(-4*z + 2*z + 3*z))*(-z**2 + 3*z - z - 3*z) to x*z**2 + j*z**3 + t + i*z and give x.
111
Express (0*m - 3*m + 5*m)*(-4*m + 4*m + 2*m + (-2 + 2*m + 2)*(4 + 0 - 3) + 18*m - 22 + 22 - m - 4*m + 4*m) as j*m**2 + i + w*m and give j.
42
Express 2*k**2 + k**3 - 6*k + 3*k - k + 7*k in the form c + d*k**3 + y*k + v*k**2 and give v.
2
Rearrange 3 - 2*o - 3 + (1 - 4 + 1)*(-1 + o + 1) + 18*o + 41 - 41 to t + l*o and give l.
14
Rearrange (-3*u + u - 6*u)*(8*u**2 + 0*u**2 - u**2)*(0 - u + 1 - 2) to w*u + i + l*u**4 + o*u**3 + t*u**2 and give l.
56
Rearrange 9 - 68*d - 3*d**3 + 68*d to b + c*d**2 + n*d + a*d**3 and give b.
9
Rearrange -22*j**2 - 60*j**2 + 250*j**2 to the form f + i*j + m*j**2 and give m.
168
Rearrange (-3 - 2 + 2)*(-3 - 5 + 6)*(-4 + 3 + 2)*(3*z**2 - 3*z**2 - 5*z**2) to x*z**2 + m + v*z and give m.
0
Rearrange (1 - 3 + 3)*(2*q - q + 0*q) + 1 + q - 1 + 127 - 114*q - 127 to v + s*q and give s.
-112
Express -3*o**3 + 10*o**2 + 9*o + o**3 - 2 - 9*o as i*o**2 + r*o**3 + s + a*o and give r.
-2
Rearrange (-d**3 - 2*d**3 + 4*d**3)*(0 - 8 + 20)*(1 + 3 - 3) to the form b*d**2 + z*d**3 + o*d + j and give z.
12
Express (-2 + 2 + i)*(-3*i + 10*i - 4*i) in the form g + v*i + t*i**2 and give t.
3
Express 5*c**3 - 18*c**2 - 2 - 4*c**3 + 22*c**2 + 2*c**4 in the form u*c + x*c**3 + a*c**4 + t*c**2 + o and give t.
4
Express 523*f - 2 + 2 - 525*f - 5*f**3 in the form h*f**3 + q*f**2 + x*f + l and give l.
0
Express (4 + 3*q - 4)*(5 - 10 + 17) + (3 - q - 3)*(-1 + 1 + 2)*(3 + 1 - 6) in the form y*q + j and give y.
40
Express (2 - 3 + 3)*(-y**2 + 2*y**3 + y**2) - y**3 - y**3 + 4*y**3 - 4*y**3 - 3 + 3 in the form z + i*y**3 + w*y + t*y**2 and give i.
2
Express -24 - 86*a**2 + 53 - 29 in the form j + g*a + k*a**2 and give k.
-86
Express 6 - 2 - 4 + 5*z in the form u + m*z and give m.
5
Rearrange 2*m**4 - m**4 - 2*m**2 - 4 + 2*m**4 + 2 to the form b*m**4 + l*m + w + n*m**3 + g*m**2 and give w.
-2
Rearrange -10 - 3 + 13 - 227*k to the form p*k + u and give p.
-227
Express (-5 - 5*j + 5)*(-j**2 + 4*j**2 - j**2 + (-2*j**2 + 4*j**2 + 0*j**2)*(1 + 0 + 3)) as q*j**2 + p*j**3 + d + w*j and give p.
-50
Rearrange 1 - 1 - 86*j + 133*j to c*j + r and give c.
47
Rearrange -f + 8*f - 13*f - 47*f to the form r*f + j and give r.
-53
Express -11*h + 5*h + 31*h as q*h + y and give q.
25
Express -c + 0*c - 4*c + (-4 - 1 + 3)*(-3 - 1 + 7)*(-3*c - 3*c + 5*c) in the form m + w*c and give w.
1
Rearrange (1 - 1 + 1)*(-1 - 1 + 6)*(2 - 3 - 2)*(l - l + l) to v*l + y and give v.
-12
Express (m - 4 + 4 - 2)*(8*m + 3 - 3) in the form u + w*m + i*m**2 and give w.
-16
Rearrange (-s - s + 4*s)*(36*s**2 + 36*s**3 - 36*s**2) to the form m*s**2 + a + y*s + f*s**3 + c*s**4 and give c.
72
Rearrange (1 + 2 + 2)*(53*c**2 + 2 + 0 - 51*c**2) to the form o + a*c + g*c**2 and give o.
10
Express (-1 + 2 + 1)*(7*r**2 + 6*r + 5*r - 2 - 9*r) as u*r**2 + t*r + c and give t.
4
Express (28 + 48*a - 28)*(3 + a - 3) - a**2 + a - a as k + w*a + n*a**2 and give n.
47
Rearrange (-8*n**3 + 15*n**3 - 11*n**3 - 5)*(-4 + 5 - 2) to the form i*n**2 | {
"pile_set_name": "DM Mathematics"
} |
1. Field
The following description relates to time synchronization technology, and more particularly, to a parallel processing-based time synchronization apparatus, which provides more precise and reliable time synchronization between a master device and a slave device based on parallel processing.
2. Description of the Related Art
In general, to establish time synchronization between at least two devices located in a packet switching network, a protocol specific for time synchronization is required. A device which provides a reference time for the time synchronization is set as a master, and a device which is to be time synchronized to the master device is set as a slave, and then a message containing time information of each device is exchanged between the master and the slave to realize the time synchronization therebetween.
Packet switching networks which deploy low cost Ethernet technologies are gradually replacing circuit switching networks, and the need for high precision time synchronization protocol is increasing for a real time streaming service. To this end, the Institute of Electrical and Electronics Engineers (IEEE) has developed and standardized the precision time protocol (PTP) which is a synchronization protocol with high precision.
FIG. 1 illustrates a diagram of a procedure of establishing time synchronization between a master device and a slave device according to the PTP. The PTP is a synchronization protocol that synchronizes a slave device to a master device by allowing the slave and master devices to exchange synchronization messages, each of which is formed of synchronization packets and delay packets and contains Time of Day (ToD) which is time information, at intervals of a predetermined period TP when clocks of the devices to be synchronized have a master-slave relationship.
According to the synchronization protocol, the slave device computes differences (hereinafter, referred to as “time offset”) between its time information and time information of the master device at intervals of a synchronization message exchange period of the synchronization protocol by use of Equations 1 and 2 below, and filters the computed value using a filter to obtain a filtered time offset value. The slave device uses the filtered time offset value to adjust time information and frequency information driven by a local clock, thereby establishing time synchronization with the master device.Propagation delay Dly=[(TM4−TM1)−(TS3−TS2)]/2 (1)Time offset Offs=TS2−TM1−Dly (2)
Here, Offs represents a time offset value between a master device and a slave device, and Dly represents a propagation delay value between the master device and the slave device. Furthermore, TM1/represents time information about when a synchronization packet departs from the master device, TM4 represents time information about when a delay packet arrives at the master device, TS2 represents time information about when the synchronization packet arrives at the slave device, and TS3 represents time information about when the delay packet departs from the slave device.
The precision of the time synchronization indicates the degree of accuracy in time synchronization between a master device and a slave device through computation of a time offset value and delay time. Factors that improve the precision of the time synchronization include a synchronization message exchange period, a filter design, and a time stamping method.
For example, to achieve high precision time synchronization, the synchronization message exchange period may be shortened, a low-pass filter may be designed to have a narrow bandwidth or time stamping procedures for identifying starting or arrival time of synchronization messages may be implemented in a hardware fashion so that precision of a time stamp value can be increased.
In general, a series of procedures for time synchronization using synchronization protocol are implemented by software, except for a time stamp procedure. However, when it is required to accelerate the synchronization message exchange period for higher precision time synchronization, or when the load of general packets to be processed by software is increased, it is difficult to update a filter output computed by software to the slave device at each synchronization message exchange period, and if delays occur periodically, the updating of time information is accordingly delayed. Thus it becomes very difficult for reliable time synchronization to be achieved.
Moreover, when the entire time information value of the slave device is simultaneously changed in order to update a time offset value computed at each synchronization message exchange period to the slave device, phase changes abruptly occur according to the change of the time information, and as a result a problem occurs which leads to the phase noise of a reference clock generated based on the slave device increasing.
That is, when time synchronization is performed in a software manner, a processing speed is decreased due to overload of the operation processing or short synchronization message exchange period, and hence time synchronization performance deterioration and failure in synchronization may occur. On the other hand, when the time synchronization is performed in a hardware manner in order to expedite the processing speed, the design of such hardware and implementation thereof may be complicated. Thus, a need for a technology providing a more precise and reliable time synchronization between a slave device and a master device is increasing. | {
"pile_set_name": "USPTO Backgrounds"
} |
Development of spatiotemporal mechanisms in infant vision.
In adult spatiotemporal vision information is processed in parallel by a number of mechanisms tuned for orientation and spatial frequency. An examination of infant neuroanatomical data suggests that three major factors are involved in the development of these mechanisms: (1) Growth of foveal cone outer segments causes an increase in mechanism sensitivity. (2) Migration of foveal cones produces a change in spatial scale and a progressive shift of mechanism tuning towards higher spatial frequencies. (3) Development of cortical inhibition transforms low-pass into bandpass spatial frequency and orientation tuning. These changes are developed into a quantitative model which is shown to provide a coherent interpretation of many of the psychophysical data on infant vision. | {
"pile_set_name": "PubMed Abstracts"
} |
Stroke, defined as an abnormality in brain function resulting from disruption of cerebral circulation, is one of the leading causes of death in the U.S. Even when a stroke does not result in death, the costs it imposes on the victim may include serious physical and emotional damage, which may result in loss of productivity. These costs stem from the tremendous damage done to the victim's brain by the stroke. With a reduction in oxygen and glucose, cells display a rapid disruption of protein synthesis, depletion of intracellular energy stores, destabilization of the cell membrane, and activation of the NMDA receptor, leading to excitotoxic and oxidative cell damage in the brain. In an attempt to survive and repair the oxidative damage and return the cell to homeostasis, numerous compensatory energy-consuming processes are activated. However, over-activation of these pathways can deleterious, further depleting cellular energy, and resulting in further brain damage. Such brain damage is, generally, irreversible. Accordingly, a method of protecting brain tissue from damage during a stroke (neuroprotection) would be tremendously important.
AMP-activated protein kinase (AMPK), a member of a metabolite-sensing protein kinase family, is a known sensor of peripheral energy balance (Carting D., “The AMP-activated protein kinase cascade—a unifying system for energy control.” Trends Biochem Sci 6:314 (2): 580-585, 2004.) AMPK is a heterotrimeric protein composed of a catalytic α subunit (α1 or α2), and 2 regulatory subunits (β and γ). AMPK is phosphorylated and activated when cellular energy levels are low. AMPK in turn regulates cellular metabolism and chronically regulates gene expression to restore ATP levels. Increases in the AMP/ATP ratio, changes in cellular pH and redox status, and increases in the creatine/phosphocreatine ratio are known to activate AMPK (Hardie D G, Salt I P, Hawley S A, Davies S P, “AMP-activated protein kinase: an ultrasensitive system for monitoring cellular energy charge,” Biochem J 338:717-22, 1999; Hawley S A, Davison M, Woods A, et al., “Characterization of the AMP-activated protein kinase kinase from rat liver and identification of threonine 172 as the major site at which it phosphorylates AMP-activated protein kinase,” J Biol Chem 271:27879-87, 1996.) AMPK increases fatty acid oxidation and restricts fatty acid synthesis in an attempt to augment ATP levels in energy-depleted cells. However, in neurons that have a restricted capacity for fatty acid oxidation, this effect could be deleterious (Almeida A, Moncada S, Bolanos J P, “Nitric oxide switches on glycolysis through the AMP protein kinase and 6-phosphofructo-2-kinase pathway,” Nature Cell Biology 6:45-51, 2004).
Inhibition of fatty acid synthase (FAS), the enzyme responsible for the de novo synthesis of palmitate, with C75, a synthetic FAS inhibitor disclosed in U.S. Pat. No. 5,981,575 (incorporated herein by reference), increases ATP levels in a number of cell types, including neurons. AMPK is highly expressed in neurons in the hypothalamus, where it appears to play a role in the regulation of food intake. Hypothalamic phosphorylated AMPK (pAMPK) is increased with starvation; C75 treatment inactivates and dephosphorylates AMPK, and induces profound anorexia.
The consequences of AMPK activation in neurons that do not have access to energy supplies is unknown. Until the present invention, it has been unclear whether AMPK activation during stress was protective or damaging. There have been no prior studies examining the role of AMPK in stroke. | {
"pile_set_name": "USPTO Backgrounds"
} |
Q:
Why do I get an error from this one level deep OTP tree when I start the child?
Now when I do the following I get an error status from start_child:
{_, pid} = NTree.start_link
{_, cid} = Supervisor.start_child(pid, [])
# {:error, #<PID.0.91.0>}
Why is this? I'm able to send a message like "hello world" to it and get back a printed message via IO.inspect. This means the process is running as far as I can tell.
defmodule NTree do
# this will be the top line supervisor
use Supervisor
def start_link, do: Supervisor.start_link(__MODULE__, :ok, name: __MODULE__)
def init(:ok) do
children = [
worker(TreeWorker, [], restart: :temporary)
]
supervise(children, strategy: :simple_one_for_one)
# {:ok,
# {{:simple_one_for_one, 3, 5},
# [{TreeWorker, {TreeWorker, :start_link, []}, :temporary, 5000, :worker,
# [TreeWorker]}]}}
end
def start_worker(supervisor) do
persister = Supervisor.start_child(supervisor, [])
end
end
defmodule TreeWorker do
def start_link do
spawn(fn -> loop end)
end
def loop do
receive do
:stop -> :ok
msg ->
IO.inspect msg
loop
end
end
end
Process.info(cid) yields:
[current_function: {TreeWorker, :loop, 0}, initial_call: {:erlang, :apply, 2},
status: :waiting, message_queue_len: 0, messages: [], links: [],
dictionary: [], trap_exit: false, error_handler: :error_handler,
priority: :normal, group_leader: #PID<0.26.0>, total_heap_size: 233,
heap_size: 233, stack_size: 1, reductions: 141,
garbage_collection: [min_bin_vheap_size: 46422, min_heap_size: 233,
fullsweep_after: 65535, minor_gcs: 0], suspending: []]
A:
A worker's start function must return {:ok, pid} on success. TreeWorker.start_link/0 returns only pid. You can fix this by returning {:ok, pid}:
defmodule TreeWorker do
def start_link do
{:ok, spawn(fn -> loop end)}
end
...
end
iex(1)> NTree.start_link
{:ok, #PID<0.89.0>}
iex(2)> NTree.start_worker(NTree)
{:ok, #PID<0.91.0>}
| {
"pile_set_name": "StackExchange"
} |
Morphometrics of a neotropical sandfly subspecies, Lutzomyia carrerai thula.
In spite of obvious and frequently observed morphological variation in geographic populations of sand flies, taxonomists are reluctant to create subspecies. In doing so they avoid confusion caused by the accumulation of new taxa, but they also obscure natural processes, some of them related to probable species emergence. We investigated here how far the partitioning of size, shape and form could be a relevant technique for exploring early evolutionary processes. We used a typical case of species, subspecies and cryptic species among three related taxa: Lutzomyia carrerai, its subspecies L. carrerai thula and L. yucumensis, a cryptic species of L. carrerai. Univariate and multivariate metric analyses showed global size differences, even between sympatric taxa (L. carrerai and L. yucumensis). When allometric effects were discounted, the subspecies L. c. thula still disclosed important differences from its putative type species, more pronounced than those existing between the two cryptic species, L. yucumensis and L. carrerai. A similar result was obtained after removing isometric size. These analyses question the validity of L. carrerai thula as a subspecies, and show that morphometrics may be a useful tool for separating simple geographic variation from evolutionary divergence. | {
"pile_set_name": "PubMed Abstracts"
} |
Q:
Why does = NULL not work in Oracle?
I recently realized that we need to use a special syntax IS NULL to compare a literal to NULL.
Why does = NULL not work here?
A:
Take a look at PSOUG's notes on NULL. As Fabricio Araujo hinted, NULL is not really a value like the number 4 or string 'bacon strips'. In fact, NULL is untyped in the SQL language, which is why you cannot validly use it in an equality comparison. You need the special IS [NOT] NULL syntax to check if a value is NULL or not.
A:
In SQL Server, we have an connection setting to get =NULL to behave equally to IS NULL. But in latest versions is not recommended anymore - it's even marked as deprecated.
The recommended is the SQL Standard way - the IS [NOT] NULL operator.
(And I will not start an war whether 'NULL is a value or a status' here)... hehehe
| {
"pile_set_name": "StackExchange"
} |
Cardiovascular risk factors and relatedness in an Icelandic subpopulation.
Theoretical and empirical studies suggest adverse effects of inbreeding on general vigour. The genetic architecture of physiological and biochemical cardiovascular risk factors is, furthermore, an unsolved issue. Our aim with this study is to investigate potential effects of inbreeding on stated risk factors in a relatively well demarcated Icelandic subpopulation. We used genealogical records to calculate coefficient of inbreeding and estimated the potential association of the coefficient with stated risk factors with known statistical methods. The results suggest absence of inbreeding depression with exception of HDL cholesterol. | {
"pile_set_name": "PubMed Abstracts"
} |
Landscape-wide research by former UK government agency on oilseed rape fields in England and Wales shows link between neonicotinoids and honeybee colony losses
A new study provides the first evidence of a link between neonicotinoid pesticides and escalating honeybee colony losses on a landscape level.
The study found the increased use of a pesticide, which is linked to causing serious harm in bees worldwide, as a seed treatment on oilseed rape in England and Wales over an 11 year period correlated with higher bee mortality during that time.
The research, published in Nature scientific reports on Thursday, combined large-scale pesticide usage and yield observations from oilseed rape with data on honeybee loses between 2000 and 2010.
The total area of land planted with oil seed rape in England and Wales more than doubled from 293, 378 hectares (724,952 acres) to 602,270 hectares over that time and the number of seeds treated with the imidacloprid pesticide increased from less than 1% of the area planted in 2000 to more than 75% of the area planted with oilseed rape by 2010.
Comparing the pesticide usage data with honeybee colony losses, scientists led by Giles Budge at the Food and Environment Research Agency (Fera) in York - a former government agency that was outsourced to the private sector earlier this year - and US entomology professor Keith Delaplane at the University of Georgia, found a link between imidacloprid usage and honeybee colony losses. Losses varied between regions and low spring temperatures were also linked to higher bee losses in Wales.
The study, also found that famers who used seed pesticide treatments reduced the number of applications of other insecticides, but that the long-term benefits of treating oil seed rape seeds with imidacloprid on crop yields were negligible.
The honeybee is the most important commercial pollinator, globally responsible for pollinating at least 90% of commercial crops. They are the most frequent flower visitor to oilseed rape. The report’s authors said: “As long as acute toxins remain the basis of agricultural pest control practices, society will be forced to weigh the benefits of pesticides against their collateral damage. Nowhere is this tension more evident than in the system with the world’s most widely used insecticide, the world’s most widely used managed pollinator and Europe’s most widely grown mass flowering crop.”
The authors call for more large-scale field-based research to determine the impacts on pollinators of the use of a newer generation of neonicotinoids.
The UK government has always maintained that neonicotinoid pesticides do not threaten bees. It has laid the blame for high honeybee losses on the parasitic varroa mite which spreads viruses, and wet summers that prevent bees from foraging.
A European-wide two year ban on a number of pesticides linked to bee deaths came into force in December 2013. Last month, the UK government temporarily overturned the ban on two pesticides on about 5% of England’s oilseed rape crop. The Department for Environment, Food and Rural Affairs (Defra) said the emergency authorisation did not apply to imidacloprid. It added that the use of this particular pesticide had fallen dramatically in the UK, down from 43,900 kilos in 2005 to just 7,250 kilos in 2013.
A Defra spokesperson said: “This paper provides evidence that neonicotinoid seed treatments can reduce the need for more pesticide use on crops. Large-scale field studies are needed to fully understand their effects on the environment. The government makes decisions on pesticides based on the best available scientific evidence.”
It added: “The EU commission has now begun a review of the science relating to neonicotinoids and bees, and the UK will contribute fully to this review.”
Paul de Zylva, senior nature campaigner at Friends of the Earth said the Fera study added to the growing evidence showing the harm neonicotinoid pesticides do to pollinators. “The pesticide industry can’t continue to maintain that there is no effect of their products on honey bees and wild bumblebees and solitary bees,” he said.
But Julian Little, a spokesman for Bayer Cropscience, manufacturer of imidacloprid, said the study’s findings were “at odds with several other field studies which showed no impact on honeybees under properly controlled testing”. | {
"pile_set_name": "OpenWebText2"
} |
Join the 2018 Global Movement
with FundRazr
Create your free #GivingTuesday campaign and get social media promotion
| from October 6 to November 20, 2018 |
Create and launch your campaign between October 6 to November 19, 2018
Mention #GivingTuesday2018 in the headline or description of your campaign
You must be a 501(c) nonprofit or registered charity in the US, Canada, UK or Australia
How do we promote your campaign?
Giving Tuesday campaigns will be listed on our special Giving Tuesday promo page (live after October 20)
The page will be promoted in social media to a large audience of people interested in charitable causes (audience size is around 10 million people) and featured on Forbes and Devin Thorpe's #GTstreamathon
Potential donors will have a chance to learn more about your cause, browse campaigns and donate | {
"pile_set_name": "Pile-CC"
} |
Q:
Trying to apply Ternary Operator on JSON Data with React
I am trying to apply a Ternary operator to some JSON Data which is held in a separate file locally. Below is the JSON:
[
{
"id": 1,
"company": "Photosnap",
"logo": "./images/photosnap.svg",
"new": true,
"featured": true,
"position": "Senior Frontend Developer",
"role": "Frontend",
"level": "Senior",
"postedAt": "1d ago",
"contract": "Full Time",
"location": "USA Only",
"languages": ["HTML", "CSS", "JavaScript"]
},
{
"id": 2,
"company": "Manage",
"logo": "./images/manage.svg",
"new": true,
"featured": true,
"position": "Fullstack Developer",
"role": "Fullstack",
"level": "Midweight",
"postedAt": "1d ago",
"contract": "Part Time",
"location": "Remote",
"languages": ["Python"],
"tools": ["React"]
},
{
"id": 3,
"company": "Account",
"logo": "./images/account.svg",
"new": true,
"featured": false,
"position": "Junior Frontend Developer",
"role": "Frontend",
"level": "Junior",
"postedAt": "2d ago",
"contract": "Part Time",
"location": "USA Only",
"languages": ["JavaScript"],
"tools": ["React"
Now the issue I have is I conditionally want to show a button dependent on whether "new" is true. The same is said to be with the Featured button.
So I have written a Ternary Operator in my Component.
import React from 'react';
import './job-card.styles.css';
const JobCard = ({company, position, postedAt, contract, location, logo, featured, newJob }) => (
<div className="container">
<div className='card'>
<div className='companyName'>
<img src={logo} alt="logo" width="100" height="100"></img>
</div>
<div className='content'>
{{newJob} ? <button className='myButton'>New!</button> : null }
{{featured} ? <button className='myDarkButton'>Featured</button> : null }
<h2>{company}</h2>
<h1>{position}</h1>
<div className='details'>
<h3>{postedAt} ·</h3>
<h3>{contract} ·</h3>
<h3>{location}</h3>
</div>
</div>
</div>
</div>
)
export default JobCard;
This is just a card component and feeds into another component which displays all the cards.
import React from 'react';
import './job-listing.styles.css';
import JobCard from '../job-card/job-card.component.jsx/job-card.component';
import { Component } from 'react';
class JobListing extends Component {
constructor() {
super();
this.state = {
jobs: []
}
};
componentDidMount() {
fetch('/data.json')
.then(response => response.json())
.then(data => this.setState({jobs: data}))
}
render() {
return (
<div>
{this.state.jobs.map(({id, ...otherJobProps}) =>(
<JobCard key={id} {...otherJobProps} />
))}
</div>
)
}
}
export default JobListing;
The output I am getting is that they are all rendering as true when some of the new or featured are false in the JSON Data. Not sure what I have missed. Any help would be appreciated.
A:
The problem is the inner {}.
{{newJob} ? <button className='myButton'>New!</button> : null }
// ^ here
Within JSX, {} denotes a javascript expression. But once you are within an expression, {} goes back to being normal object syntax. This is throwing off your ternary because you're checking whether an object with key newJob is truthy. Simply removing the brackets would fix it:
{newJob ? <button className='myButton'>New!</button> : null }
Regarding the new issue
I prefer not to destructure props like this, but to get it working most like you already have, destructure the new reserved word into an alias. Here is a simple proof of concept:
let test = [{ new: true }, { new: false }];
test.map(({new: isNew}) => console.log(isNew))
I would prefer to keep the data structured as is. But thats just a preference. It would also avoid the reserved word issue.
let test = [{ new: true }, { new: false }];
test.map((value) => console.log(value.new))
| {
"pile_set_name": "StackExchange"
} |
Menu
Walleye Warrior: Alden Hirschfeld
All throughout our lives we must face adversity. It comes in many forms: moving to a new school, dealing with a bully, managing college courses, or battling though illness to name a few. Every person that you meet, or even see, in our world have their own demons to face every day. We all fight to achieve our goals while overcoming the challenges put in our way. Professional athletes are no different in this regard, where they differ is the attention that their adversity receives. When they rise to the occasion, athletes can inspire others to do the same. One particular member of the Toledo Walleye has battled adversity like no other, and has inspired hockey fans across Michigan and Ohio. Alden Hirschfeld took the ice this season after recovering from brain surgery over six months ago. During Toledo’s first game of the regular season, he scored the Walleye’s first goal. Hirschfeld is not just a Toledo Walleye; he is a Warrior.
Hirschfeld posing with a young fan at the Huntington Center during training camp.
Early in his career Hirschfeld found great success with relatively little resistance. Alden was born in Dallas, Texas to Glen and Traci Hirschfeld but grew up in Sylvania, Ohio where he played hockey for Sylvania Northview High School. Hirschfeld captained Northview to the state title game during his senior season (2005-06), scoring 64 goals that year which earned him the Mr. Hockey Ohio award. The award is given to the top high school hockey player in Ohio. After high school Alden played junior hockey with the Mahoning Valley Phantoms, a member of the North American Hockey League (NAHL) located in Ohio, for two seasons between 2006-2008. During his junior years Hirschfeld scored 86 points with 35 goals over the course of 104 games, once again showing off his offensive prowess. This would be a recurring theme for Hirsch during his amateur career. Following Junior hockey, the next stop was college play at Miami (OH) University. While a Miami Redhawk Hirschfeld played in four seasons, appearing in the national championship game as a freshman (08-09), helping Miami win the 2011 Central Collegiate Hockey Association (CCHA) tournament, and serving as an Alternate Captain and Captain during his junior and senior year respectively. By the end of his collegiate career Hirschfeld scored 70 points over 134 games played, solidifying his reputation as a point producer. But now it was time for the pro leagues and the biggest challenge of his career.
During the 2011-12 AHL season Hirschfeld got a small taste of professional hockey when he appeared in one game for the Portland Pirates. The following year is when Alden really broke through, playing in 55 games between the AHL Providence Bruins and the ECHL South Carolina Stingrays. Then Alden finally got the chance to play for his hometown Walleye. During the offseason between the 2013 playoffs and 2014 season he joined the Toledo Walleye, where he would end up splitting games between Toledo and the AHL affiliate Grand Rapids Griffins for the next two seasons. Hirschfeld had reached the high point in his professional career, with only the normal bumps and bruises experienced by all hockey players. By this point in his professional career he had 120 career points across 221 games played. Adversity, however, finally caught up with Alden on January 8, 2016 while playing a game for the Griffins against the Milwaukee Admirals. Late in the second period Alden suffered a seizure on the bench and collapsed. Play was immediately stopped as the medical staff attended to him. Both teams were sent to their locker rooms, and Hirschfeld was stabilized before being stretchered off the ice and taken to a nearby hospital. This was the end of hockey for Hirschfeld during the 2015-16 season, and many thought he would have to hang up the skates altogether. Testing showed that there was a malformation in the left temporal lobe of Hirschfeld’s brain that was responsible for the seizure. So Alden had a choice to make: risk brain surgery to end the possibility of seizures that could also restart his hockey career, or avoid a dangerous procedure that could lead to serious unforeseen consequences in order to be there for his family. After all, at this point in his life Alden had to be concerned for the welfare if his wife and child, his child was a little over a year old. On March 14th, his decision was set into motion and Alden underwent brain surgery.
Following Hirschfeld’s surgery he posted a picture of his scalp where the doctors performed the procedure on his Twitter account.
The procedure used is called a craniotomy, which includes the removal of a piece of skull to gain access to the brain, followed by the removal of the malformed section of the temporal lobe. Following the surgery Hirschfeld returned home to Sylvania to recover with his family. Since the procedure there has been no reoccurrence of seizures, and no emergence of surgical complications. Step one was complete for Alden, to receive treatment and recover. Next up on the list? Return to hockey. Alden began training late in May to return to the sport he loved. Motivated by family, friends, teammates past and present, Hirsch regained the strength and conditioning needed to play professional hockey. After months of work all he needed was medical clearance. And he got it. On October 3rd, 2016 Alden Hirschfeld and the Toledo Walleye announced they had agreed to terms for the 2016-17 season. He participated in the Walleye training camp and preseason games against Kalamazoo, and rode with the team down to Atlanta to begin the season on the road as a first line center. During Toledo’s first game of the year against the Gladiators Hirschfeld scored the first goal for the Walleye shortly into the second period to cut the deficit 2-1. Though the Walleye would go on to lose their opener 4-1, what Hirschfeld accomplished that October 14th night will never be forgotten by the team and fans alike. Through three games Hirsch has five points with two goals and a +/- of 4. The courage and resolve that he has shown throughout this process is profound, and nobody could think of a better way to start the year than with his goal. Hopefully he can be properly rewarded with a Kelly Cup this year. Hirschfeld stands as an inspiration to not only the Toledo Walleye, but anyone who has had to deal with adversity throughout their life. He could have let his condition beat him, instead Hirsch used it to make him stronger. Toledo’s home opener is this Saturday, October 22nd. I cannot wait to hear the crowd as Alden Hirschfeld is introduced to the Huntington Center once again. Not just as a Toledo Walleye though, as a Toledo Warrior.
Hirschfeld winning a face off during Toledo’s October 7th preseason home game. | {
"pile_set_name": "Pile-CC"
} |
Q:
queue a azure pipeline yaml stage to execute at specific datetime
We have a multistage release pipeline which targets all environments like dev->int->qa->prod-staging slot.
For final swaping of slot we have a requirement to to run at specified datetime during non-business hrs.
How can we delay a specific stage of multi stage yaml to run at certain datetime.
A:
Though I agree with the idea of Hany, but the link he shared is about the Release which configured with UI. It does not suitable for your multi-stage YAML pipeline.
Since what you are using is multi-stage YAML pipeline, you can check below sample to configure the corresponding schedule trigger into your YAML.
For example, here is the schedule which make the YAML pipeline run at Sunday weekly:
schedules:
- cron: "0 12 * * 0"
displayName: Build on Sunday weekly
branches:
include:
- releases/*
always: true
For 0 12 * * 0, it is following the syntax of:
mm HH DD MM DW
\ \ \ \ \__ Days of week
\ \ \ \____ Months
\ \ \______ Days
\ \________ Hours
\__________ Minutes
I saw you said you want this pipeline run during non-business hours, so you can focus on the last field DW(Days of week). It's available value it 0~6 and starting with Sunday.Or you can input with like Sun:
"0 12 * * Sun"
Check this doc for more details.
| {
"pile_set_name": "StackExchange"
} |
Pseudomonas aeruginosa (PA) is an opportunistic gram-negative pathogen responsible for a large number of nosocomial infections. Dr. Joanne Engel and her group have shown that PA103 induces apoptotic-like cell death in epithelial cells and macrophages by a Type III Secretion System (TTSS)-dependent mechanism. Consistent with the results of others, They have found this to be a Fas ligand- and Fas receptor-dependent process. We propose that PA-induced apoptosis occurs either by (A) direct translocation of a bacterial effector into the host cell (PAF, for Pseudomonas Apoptosis Factor) by the TTSS, resulting in activation of Fas-dependent apoptosis or by (B) direct induction of Fas-dependent apoptosis by one or more components of the type III translocation apparatus itself. We will identify the mechanism by which PAl03 induces TTS-dependent apoptotic-like cell death in eukaryotic cells. We will initially use genetic and proteomic approaches to identify a putative apoptosis-inducing type III secreted effector molecule. We may also test the alternative hypothesis that the TTSS itself is responsible for the induction of apoptosis by PA. We will express the PA TTSS in a Yersinia strain that lacks the plasmid encoded TTSS and test for restoration of apoptosis-inducing activity. | {
"pile_set_name": "NIH ExPorter"
} |
Q:
Your PHP Version Will Be Unsupported in Joomla! 3.3
I am using PHP Version 7.0.12 and Joomla Version 3.7.3.
And I am facing this message "Your PHP Version Will Be Unsupported in Joomla! 3.3"
As per Joomla 3.3 System requirement:
Starting with Joomla! 3.3, the minimum required PHP version is being
raised to PHP 5.3.10 or later!
but I already using later PHP version 7.0.12, why I am still getting this message? is any other thing I have to enable? or anything I missed? please suggest me...
Thanks!
A:
its a bug that will be fixed in the next release - nothing to worry about
| {
"pile_set_name": "StackExchange"
} |
2019 NCHC Tournament
The 2019 NCHC Tournament is the sixth tournament in league history. It will be played between March 15 and 23, 2019. Quarterfinal games will be played at home team campus sites, while the final four games will be played at the Xcel Energy Center in Saint Paul, Minnesota. By winning the tournament, that team will receive the NCHC's automatic bid to the 2019 NCAA Division I Men's Ice Hockey Tournament.
Format
The first round of the postseason tournament features a best-of-three games format. All eight conference teams participate in the tournament. Teams are seeded No. 1 through No. 8 according to their final conference standing, with a tiebreaker system used to seed teams with an identical number of points accumulated. The top four seeded teams each earn home ice and host one of the lower seeded teams.
The winners of the first round series advance to the Xcel Energy Center for the NCHC Frozen Faceoff. The Frozen Faceoff uses a single-elimination format. Teams are re-seeded No. 1 through No. 4 according to the final regular season conference standings.
Game 1 of the series between Western Michigan and Colorado College was delayed 1 day due to the effects from Winter Storm Ulmer.
Standings
Bracket
Teams are reseeded for the Semifinals
* denotes overtime periods
Results
All times are local.
Quarterfinals
(1) St. Cloud State vs. (8) Miami
(2) Minnesota–Duluth vs. (7) Omaha
(3) Western Michigan vs. (6) Colorado College
(4) Denver vs. (5) North Dakota
Semifinals
(1) St. Cloud State vs. (6) Colorado College
(2) Minnesota–Duluth vs. (4) Denver
Third place
(4) Denver vs. (6) Colorado College
Championship
(1) St. Cloud State vs. (2) Minnesota–Duluth
Tournament awards
Frozen Faceoff All-Tournament Team
F Robby Jackson (St. Cloud State)
F Blake Lizotte (St. Cloud State)
F Patrick Newell (St. Cloud State)
D Jimmy Schuldt (St. Cloud State)
D Mikey Anderson (Minnesota–Duluth)
G Hunter Shepard* (Minnesota–Duluth)
* Most Valuable Player(s)
References
NCHC Men's Ice Hockey Tournament
2019
Category:Ice hockey in Minnesota
Category:College sports in Minnesota
Category:2019 in sports in Minnesota
Category:March 2019 sports events in the United States | {
"pile_set_name": "Wikipedia (en)"
} |
india
Updated: Jun 10, 2019 15:56 IST
The verdict in the Kathua minor’s rape and murder case has been announced by a special Pathankot court on Monday, ending the wait for justice for a crime that had left an entire nation shocked and numbed for its depravity.
Abducted on 10 January 2018, the minor girl was sedated and held captive inside a small temple where she was raped repeatedly for 5 days before being bludgeoned to death.
The abduction, rape and killing of the Muslim Bakherwal girl was a part of the carefully planned strategy to remove the minority nomadic community from the area, police charge sheet had claimed.
Here are some facts about the accused and their role in the gang rape and murder of the eight-year-old:
1. Sanji Ram, 60: A retired revenue department official was chargesheeted as the main conspirator who reportedly wanted to dislodge the nomadic Muslim Bakarwal community from his native Rasana village. He is accused of having incited his nephew, an alleged minor, to abduct the eight-year-old as a revenge for the Bakarwals having beaten up the boy in the past. Sanji Ram has been convicted under section 302 (murder) and 376-D (rape by a group acting with common intention) by the Pathankot special court.
2. Deepak Khajuria: A special police officer, who had a bone to pick with the Bakarwals. Deepak convinced Sanji Ram’s nephew to kidnap the girl with the assurance that he would help him get through his board exams. Deepak too has been convicted under section 302 (murder) and 376-D (rape by a group acting with common intention) by the Pathankot special court.
3. Parvesh Kumar, alias Mannu: A friend whom the juvenile took into confidence to execute the plan. On January 10, the juvenile and Parvesh drugged the girl in a forest. The juvenile raped her. Parvesh also attempted to rape her. They took the unconscious girl to Sanji Ram’s Devasthan (temple) and locked her up. There, she was drugged and gang-raped repeatedly. Parvesh was the third person to be convicted for murder and “rape by a group acting with common intention.”
3. Vishal Jangotra, alias Shamma: Sanji Ram’s son who studies in Meerut. He was also accused of raping the girl by the police. However, the Pathankot special court has acquitted him of all charges.
4. Tilak Raj: A head constable, he is accused of having struck a deal with Sanji Ram on January 12. He reportedly took Rs 1.5 lakh bribe from Sanji Ram’s sister, Tripta Devi, to scuttle the probe. Tripta and Tilak were good friends and classmates at the government primary school in Dhamiyal. Tilak Raj has been convicted under section-201 of the IPC (causing disappearance of evidence & or lying to screen the offender.)
6. Anand Dutta Verma: A sub inspector, he was paid Rs 3 lakh by January 13 through Tilak. After the girl’s body was recovered on January 17, he was paid another Rs 1 lakh to cover up the crime. Anand and Tilak had cut a deal to tamper with the evidence for a total bribe amount of Rs 5 lakh. In keeping with the brief, Anand had tutored the juvenile to stick to a fake version of events and agreed to wash the girl’s bloodstained clothes and leave out other evidence. Anand Dutta too was convicted by the court Monday.
7. Surinder Verma: A special police officer, he conducted a recce of the surroundings of Sanji Ram’s Devasthan on January 14. He has been convicted along with Tilak Raj under section-201 of IPC.
The 8th accused in the case is a juvenile and nephew of the main accused Sanji Ram, who was convicted for murder by the court today. The minor is accused of strangulating the girl to death before bludgeoning her face with a stone twice. His trial hasn’t begun as the petition on his age is yet to be heard by the Jammu and Kashmir High Court.
Also read | 6 held guilty of rape, murder of 8-year-old girl in Jammu and Kashmir’s Kathua | {
"pile_set_name": "OpenWebText2"
} |
Welcome to the Best of NH
Sin ce 2000, New Hampshire Magazine has polled and published the picks of its readers and editors in categories that range from best cupcakes to best martini to best antiques shop and everything in between.
Voting in these categories takes place each year, starting in mid-January. Our online-only ballot is the best way for readers and customers to recognize the best of the best that the Granite State has to offer.
Our annual Readers’ Poll and extensive list of Editor’s Picks all lead up to the state’s biggest celebration, The Best of NH Party, which is held annually each summer.
Congratulations to the 2020 Best of NH winners and thank you to the 12,898 people who took time to vote! | {
"pile_set_name": "OpenWebText2"
} |
1. Field of Invention
The present invention relates to semiconductor processing, and in particular, to chemical vapor deposition in a high density plasma reactor.
2. Related Art
High density plasma (HDP) chemical vapor deposition (CVD) processes are used in the fabrication of integrated circuits for depositing films on a substrate. One application of an HDP CVD process is to fill gaps on a semiconductor device having high aspect ratios (e.g., about 2.5:1 or greater) and close spacing (e.g., about 0.25 xcexcm or less). Existing HDP CVD processes typically employ deposition with a process gas mixture that includes oxygen, silane, and inert gases, such as argon, to achieve simultaneous dielectric etching and deposition.
In an HDP process, RF bias is applied to a wafer substrate in a reaction chamber. As a result, the flux of deposition precursors is perpendicular to the wafer, and the net film growth occurs perpendicularly to the bottom of the feature. Some of the gas molecules (particularly argon) are ionized in the plasma and accelerate toward the wafer surface when the RF bias is applied to the substrate. Material is thereby sputtered when the ions strike the surface. As a result, dielectric material deposited on the wafer surface is simultaneously sputter-etched to help keep gaps open during the deposition process, which allows higher aspect ratio gaps to be filled.
An important goal in HDP deposition of these and other layers is to deposit a film of uniform thickness across the surface of a substrate and across different batches of substrates. One factor mitigating against uniform deposition is dopant concentrations in the processing environment. In HDP CVD processes, this is important because the reactor can act either as a sink or a source for dopants that affect the growth rate on the wafer.
A typical HDP CVD reactor includes a reaction chamber having an upper lid or dome, typically made of a ceramic such as aluminum oxide (Al2O3). During the deposition process, process gases are introduced into the chamber, and a plasma of the processing gases is generated within the chamber to effectuate chemical vapor deposition onto the substrate. However, the deposition typically occurs on all the surfaces exposed to the processing gases, including the interior surfaces of the chamber. If the dopant concentration of the processing environment is not in equilibrium, a shift in deposition rate can occur. This shift in deposition rate due to changing reactor conditions can be as high as 500 xc3x85/min.
When the reactor is in an idle state, an argon and oxygen plasma, Known as an xe2x80x9cidle plasmaxe2x80x9d, is used maintain the reactor temperature. The oxygen in the idle plasma will deplete the fluorine species adsorbed to the sidewalls over time. This creates an environment that is not in equilibrium. For example, when depositing fluorine-doped silicon oxide layers, such as fluorosilicate glass (FSG), a reactor in an idle condition has been depleted of the dopants adsorbed to the chamber surfaces. When FSG deposition begins again, SiF species are adsorbed again to the reactor walls. This retards the deposition on the substrate surface. As the reactor approaches an equilibrium state, the deposition rate on the substrate rises and eventually levels off. Depending on the reactor conditions, the dopant concentration, and the target thickness of the FSG on the wafer, 200 or more deposition sequences may be required to reach a steady state. Once the reactor is in a steady state, processing must be continuous or the idle plasma will again begin to deplete the adsorbed dopants in the reactor causing the deposition rate on subsequent wafers to be reduced.
Accordingly, it is desirable to deposit a dielectric film without the problems discussed above that are associated with conventional techniques.
In accordance with one aspect of the present invention, prior to beginning deposition of doped dielectric layers on wafers, a high density plasma (HDP) chemical vapor deposition (CVD) chamber is first conditioned by forming a layer of the doped material within the chamber walls. This conditioning quickly brings the chamber to an equilibrium state so that subsequent deposition of the doped dielectric material onto wafers yields consistent deposition rates because dopants are already adsorbed to the chamber walls. Approximately constant deposition rates can be maintained as long as the reactor is running and depositing layers onto wafers. However, if the deposition is halted for a certain amount of time, e.g., 20 minutes, and the reactor becomes idle, the chamber is plasma cleaned and a thin layer of the doped material is deposited onto the chamber walls. Periodically, for example, every 12 hours, the chamber is plasma cleaned and the thin layer is re-deposited. This allows consistent deposition rates even when the reactor has been idle for prolonged periods of time.
In one embodiment, initial conditioning, such as after a wet clean, is carried out by introducing a gas containing silicon fluoride (SiF4), argon, and oxygen into the chamber to form a fluorosilicate glass (FSG) approximately 10 to 30 xcexcm thick. After idle (e.g., 20 minutes without processing), the chamber is plasma cleaned and a thin FSG layer of approximately 1 to 3 xcexcm is deposited. The plasma clean and deposition of the thin FSG layer is repeated periodically, e.g. every 12 hours, to maintain the chamber in an equilibrium state.
The present invention will be more fully understood when taken in light of the following detailed description taken together with the accompanying drawings. | {
"pile_set_name": "USPTO Backgrounds"
} |
Articles
How to persuade a customer to use high-quality equipment?
At any negotiations, presentations of GPS equipment at various events and exhibitions, the most frequently asked question is "how much is it?".
Does this mean that price is the most important factor for making a purchase? Not at all, because in the B2B market the buyer spends the company's money, not his own. Therefore, the sensitivity to the price is not so high – no one is chasing for say $20 savings, it is much more important to choose a technological solution that will last for many years, and not cause a "headache".
If we are talking about the choice of GPS tracking device, among the most crucial factors are: reliability, longevity, functionality, as well as flexibility, i.e. the possibility of making improvements over time.
Choose a first-class solution
Choosing high-quality equipment, the end customer avoids additional costs for complete replacement of equipment (cheap tracking devices are unlikely to last longer than 2 years), costs for diagnostics, repairs and site visits for service.
Considering the rapid technological progress, it is much more efficient to invest in flexible solutions, with sufficient extensibility to implement any changes. Multifunctionality is a must in the context of the growth of customers' needs.
In other words, high-quality equipment operates on the "set and forget" principle. Using Galileosky tracking devices, integrators around the world get higher margins, are confident in the proposed solution, and customers remain satisfied and develop long-term cooperation. Recommending Galileosky, integrators are remembered by end users as experts who offer a high-quality and exclusive solution.
Never start negotiations with the price
One of the most important rules for winning projects is never to start negotiations with the price. Choose the best product for your customer and be confident in what you offer. Remember, the loyal customer will recommend your services to others and you will get even more projects.
Be an expert
When you know, what you sell the customer feels it. The more you know – the more customers you can attract. Keep studying the product to understand the technical characteristics and capabilities of the tracking device. Become a Galileosky expert, visiting free webinars and seminars, studying the instructions for connecting new external devices. Take the trackers for a free test to experience first-hand all the possibilities.
Be different from others
When proposing a solution, focus on unique advantages of equipment. Tell your customer about the innovative development of Galileosky – Easy Logic technology; explain the possibilities of flexible settings and configuration on-the-air. Just show the track to the customer, this is the best indicator of the quality.
Emphasize that Galileosky equipment is remarkable for a large number of inputs/outputs of different types and has an open protocol. So, you can connect and integrate various additional devices to solve almost any tasks, use monitoring software to your taste or painlessly replace one software for another.
Get to know your customer better
Having discussed the advantages of the product, try to find out what the customer needs and wants. At this stage, it is the right time not only to draw up a detailed "portrait" of the tracking device in terms of technical parameters, but also to find out the required installation time and availability of a product. Once you find it out feel free to discuss the price. Do not forget that Galileosky can provide custom-made trackers, therefore, you will not have to overpay for unnecessary functionality.
Handle the objections
Do not leave the customer's objections unanswered. "Expensive"? Explain why it is worth buying. Considering the practice of using Galileosky GPS devices, the investment pays off after the first month. The longer service life of the solution – the higher ROI is. Galileosky hardware is one of the most reliable and durable on the market. It’s estimated service life is 10 years and the reject rate is less than 1% of all released products.
The customer claims that the solution is "excessively functional"? Clarify, how easier it will be to upgrade the solution in the future, than to re-equip everything from scratch. Provide examples of more significant economic results when implementing a non-standard solution. And, finally, offer to pay only for the required functionality by ordering custom-made devices.
If, as an argument, the end user states that he does not want to use hardware and software from different manufacturers, explain that you choose only the best components of the monitoring system from companies that specialize in their fields. Thus, the system will be more qualitative and flexible.
Call the manufacturer for assistance
Do not neglect the help of the manufacturer, even if you have rich experience in transport monitoring. The personal Galileosky manager will provide comprehensive support. From assessing the technical requirements of the end user, discussing the customization conditions and to joint participation in negotiations with customers or making presentation together online.
In addition, Galileosky is ready to discuss mutual exhibiting, provides free marketing materials to partners, and redirects the requests of end customers for the purchase and installation of trackers to reliable integrators in the regions. | {
"pile_set_name": "Pile-CC"
} |
Q:
Is there a way to style an element such that it and all its contents will be rendered 50% faded?
I'm working on a userscript that adds a missing feature to a 3rd party website over which I have no control.
It will compute URLs based on the page and the results of some webAPI calls. These URLs will be added into the HTML of the page.
Then for any URL rendered as :visited I wish to set the li element that it is a part of to be "faded" by manipulating the styles.
That's probably more specific detail of my project than necessary to describe my problem, sorry.
The only part I'm not sure how to achieve is how to get the li element (as well as all rendered within it) to be rendered as half-faded into the background colour.
I'm guessing there is probably standard way to do this with modern HTML and CSS.
I'm working with latest stable Chrome and do not need to support old browsers.
A:
Is there a way to style an element such that it and all its contents will be rendered 50% faded?
Opacity
yourelement {
opacity:0.5;
}
This will affect the element and since it is inherited, it will apply to all the children too.
Note however, that if the link is :visited the opacity will have to be set by javascript as there is no CSS "Parent Selector".
| {
"pile_set_name": "StackExchange"
} |
Welcome to Stabikes Finance. We are the ultimate company that you have been looking for. Have you been looking for car financing that seeks to understand what you need? Are you tired of filling countless number of forms in the bank only to be kept waiting for long for lengthy approval processes? We have nothing but the best to offer. These include low interest rates, easy form filling, and instant approval processes. As good as it sounds; we are nothing like the time wasting institutions.
Now that you have landed on our site, please go through all the attractive offers we have for our clients. You are sure to find one or several that suit your needs. What is more is that we are flexible and are ready to tailor our services to suit your needs. Stabikes Finance offers attractive car financing options that will keep you smiling all the way home. You should expect
Instant approvals
No deposits asked
Low interest rates
Understanding credit car finance
Cars are essential for the day to day life but only a few can manage to get money needed to buy a car on an instant. This is because quality cars are quite costly and it is not always easy to have such an amount of cash stacked up in a bank account or in your savings. It would be unwise to get a cheap low cost car that is of poor quality and is not able to guarantee smooth sailing all the time. Car finance companies like
CarFinanceCity.co.uk
offer clients the ability to buy a car through finance offered by lenders. The lenders are established organizations that work along with car dealers enabling applicants to get a car or choice based on loan. The applicant gets to drive away a car of choice and is liable to pay for it by means of weekly or monthly installments over a specified period of time.
Stabikes Finance is liable to selling clients good quality cars at reasonable prices while making arrangements to have the car dealer offer the car to the client. We help spread the car repayment over a span of months or years helping you make easy payments for the car as you use it. This has made it possible for all to have cars of their choice with ease.
What is bad credit car finance?
Bad credit car financing refers to the practice of offering car finance services to individuals who have a bad credit rating. Stabikes Finance is listed among the top service providers offering bad credit finance. We look into the needs of our clients and assess their ability to repay the car loan before advancing them any debt obligations. This has actually been a helpful tool in aiding many improve their credit rating and repair their credit history.
Not all with a poor credit rating are unable to repay their debts. Bad credit rating may have been caused by financial difficulties triggered by loss of job or a global financial crisis. Over time, an individual may have recovered and is able to pay back their debts well. This however does not immediately erase the bad credit record once held. Turning our focus to such possibilities has enabled us to advance car financing to bad credit debt worthy individuals.
Stabikes Finance has a wide range of packages that are ideal for bad credit car financing. These packages can also be tailored to suit the repayment abilities of the clients thus ensuring that all get deals that they can comfortably afford. Choosing to overlook bad credit history while focusing on the current repayment ability has proved to be helpful.
Benefits of using Stabikes Finance
There are several benefits that you can enjoy when working with Stabikes Finance. Since we are focused in customer satisfaction, we ensure that our clients are able to: | {
"pile_set_name": "Pile-CC"
} |
We have some bad news for Paladins players in mainland China. The game will no longer be supported in the country, with servers shutting down on Nov. 30. Since 2017, Paladins has been distributed in China by Tencent. They made the announcement of the game’s impending closure yesterday on Chinese social media site Weibo.
According to the statement, Tencent negotiated the end of their Paladins contract with developer Hi-Rez. Neither party was sufficiently interested in extending it, unfortunately. Consequently, the game’s support in mainland China is ending.
Paladins‘ history in the country has been a rocky one from the start. The game found itself on a list of ethics standards violators last December, when a Chinese advisory body, the Online Ethics Review Committee, recommended the government ban it. Other offenders included PUBG, Fortnite, and to a lesser extent Blizzard’s Overwatch.
If you currently play Paladins in China, make sure to log in during the final week of September. The closure announcement states that players will receive some compensation for their unspent in-game currency, if any. It’s not perfectly clear what this compensation is exactly, but it sounds like it might come in the form of in-game rewards for other Tencent titles. The compensation can be claimed by logging in at any time between Sept. 24 and Nov. 30, when the game shuts down in China for good.
Paladins cross-play extends to PS4
On a more positive note, Hi-Rez recently announced some good news for PS4 players. Earlier this month, Paladins cross-play expanded to include the console into its network. PS4 players can now join their friends playing on Xbox and PC. This includes full cross-play functionality, including voice chat. As of yet there is no cross-progression between platforms, but Hi-Rez is working on it, according to the official announcement.
Stay tuned to Daily Esports for more Paladins news and content! | {
"pile_set_name": "OpenWebText2"
} |
Dr. Jekyll and Mr. Hyde
Dave Tate has been monster huge and freakishly lean. (Now he's both.) Since he knows both sides of the struggle it makes sense that he's the most vocal and opinionated expert on all things food related. (Earlier this year, he told me to pour olive oil all over a large pizza and eat one every night, and that if I couldn't stomach it I was a "fucking wuss.")
I got on the phone with him recently—while he was eating no less—to pick his brain about the old bodybuilding tradition of bulking and cutting.
Tate Talks Bulking
It comes down to calories in versus calories out. If you're having a hard time gaining weight you need a number to shoot for. So let's figure that out quickly. I like John Romaniello's calorie formula for figuring out maintenance levels. It's easy. And I'm all about easy.
(Editor's Note: Here's Roman's formula for those who missed it last week.)
Current Body Fat Caloric Intake
6%-12% – 17 calories per pound of LBM (Lean Body Mass)
12%-15% – 16 calories per pound of LBM
15.1%-19% – 15 calories per pound of LBM
19.1%-22% – 14 calories per pound of LBM
22.1% or above – 13 calories per pound of LBM
So you find out your body fat percentage and then multiple your weight by that percent. Subtract that number from your weight to find out your lean mass, and then use that number and your body fat percentage to determine your calories.
Using that formula, let's say you figured out you need 2,200 calories just to maintain your bodyweight. Well, let's bump that number up by, I don't know, 600 to 1,000 calories. That's the average you need to hit every single day.
A big mistake a lot of guys make is they'll eat big for three days and then go back to eating like they normally do for a few days. If you figure out the average calories for that week then it's not higher than it was the week before—it's just staggered into different days. That's not going to make a difference at all. So you gotta eat big consistently.
Even with my past history of eating junk, people are forgetting that I gained weight for many years, all the way from 181 to 255 pounds, by eating relatively clean. But at that point, when the calories were getting around 8,000, I just couldn't eat that much food any more.
You need more calories per bite. You have to figure out ways to add more calories to the food you're already eating. So throw olive oil on everything. Put it on your scrambled eggs. You won't even know it's there. Put a handful of nuts into your morning oatmeal.
What I used to do is get a big Ziploc bag and fill it with almonds, cashews, raisins, peanuts, and M&M's. But only enough M&M's to get a few with each handful. And I made sure at least one of the nuts was salted, so it'd make me want to eat more. Let's say you grab a big handful of nuts every hour or so—you're going to end up eating at least an extra 500 calories. The only thing you gotta be careful with is not to get too full from them. Since it's all high-quality fat, you'll get full quickly. Pay attention to when your next meal is and make sure you get it in.
Have a scoop of Metabolic Drive® in water after every single meal. You can always fit more in, especially protein and water. You do that four or five times per day and you've just added an extra 100 grams of protein and 400 to 500 calories.
Not everyone will agree with me on this, but immediately after you train, kick back a ton of sugar like Skittles or whatever. Just eat a whole goddamn box. You'll be restoring your glycogen levels, you won't gain a lot of fat, and you'll be hungry five minutes later. And you just added in like 150 grams of carbs. That'll add up quickly. But you have to do it immediately after. Like, in the locker room before you even hit your car. Then when you're driving home have your Mag-10®. Then get home and eat a meal.
Be sure to brush your teeth or at least drink a lot of water and swish it around after you eat all that candy, though. It's not eating the sugar that's the problem—it's how long it sits in your mouth. And I have the cavities to prove it.
No, you don't need to eat Wendy's to get big. It won't kill you, so you can if you want, but it's not necessary. Guys are always trying to look for an excuse to eat the shit. The problem is your goal is to gain weight and add in more calories. When you eat things like that—and I made a career out of it – it kills your appetite. Let's say you order two double cheeseburgers and some fries. You probably won't eat for another five hours after you finish that meal. You have to focus on total overall calories, not just shit food.
Two tablespoons of peanut butter is a good start. Do that twice per day. It still won't affect your hunger.
Eat a meal during your training session. I don't care if it's a Finibar™ Competition Bar or a peanut butter and jelly sandwich. Well, the FINibar would be better, actually. Anyway, after your main lift, just down a whole bar. It's not a huge meal and I guarantee you'll still be hungry after your training session. Plus you just added in an extra couple hundred calories.
Decrease your cardio. Maybe get rid of it entirely. Be lazy. If you can lie down, lie down. If somebody else can do it, have them do it.
Any hypertrophy program will help you get bigger. So just pick one. You need four to five days of weight training, but they can't last longer than an hour total. Let me repeat that. Your workouts can never last over an hour. But whichever program you pick, take the rest periods and double them. That'll make sure you're stronger for all of your sets.
Tate Talks Cutting
The number one thing you have to do immediately is increase your water intake. For one thing it's just fucking important. I can't believe how many guys don't get enough water. But the other reason is that it'll help control appetite.
Now you're working under your baseline of calories. So take the calorie formula listed previously and take away a few hundred calories. That's your new goal, and you have to hit it consistently.
When you work under your baseline of calories, macronutrients become more important. When you're bulking and eating more than you need, you have room to screw up because you're eating so much you're probably going to get all of your protein and fat in. When you're below your maintenance level of calories you don't have that margin of error. You have to be exact.
I'm sick of dancing around this subject: If you don't know what you're doing, hire someone. If you're serious, figure out a way to pay them. Look across the board at how many people fail trying to get lean. It's nearly everyone. Yeah, getting lean isn't rocket science. I understand that. Exercise more and eat less. But if that shit worked wouldn't everyone be lean?
You have to increase your protein. Most people don't take in enough. How many grams per pound of bodyweight? I don't know and I don't care. Just eat more protein.
Figure out your strategy, whether it's low carb or carb cycling or whatever, and stick to it. Don't change it every week.
Remember with bulking how we wanted more calories per bite? Well, now we want more bites per calories. So eat a bowl of broccoli with every meal. Increase your greens. It'll fill you up because there's more there. Eat more fish and more chicken. Take your time with your meals.
Take weekly progress pictures, record your measurements, check your body fat and buy a damn scale and weigh yourself every day. I have my body fat checked every two weeks by the same person. Don't use the bullshit three-site caliper formula. Use the seven or nine-site one. That'll give you an idea of where you're going since we all lose fat in different places at different times.
When you're getting lean it's a little awkward because there are blind spots where you're losing weight but you look worse. It's like the chicken growing inside the egg. It looks the same on the outside but there's a lot of shit going on inside.
If you can stomach it, eat the same thing every day.
Whatever you normally have for carbs, cut that in half and replace half the calories with high quality fat. So let's say you're taking in 400 grams of carbs per day. That's 1600 calories. So now you need 800 calories from fat. That's about 88 grams of fat you need to take in. Get it from nuts, avocadoes, and oils.
Add fiber to your diet. Trust me. You want to be able to shit properly.
With training I want you to use higher volume and really increase your reps. Not because higher reps "chisel" muscle or any bullshit like that. More activity equals more calories burned. So the more reps you do, the more calories you burn.
For the most part, guys enjoy weightlifting more than cardio. So let's do 15-20 sets per larger body part and 10-15 for smaller muscle groups. I want everything in the 8-12 rep range. The goal is to not lose muscle. Let's face it: you're not going to gain any muscle while you're cutting. If you claim you can then you're either selling an e-book or you're full of shit.
Tate Talks Trash
You ever go out with a bunch of people for dinner when you're dieting? Isn't that a fucked up situation?
Let's say you're at a table with seven people and everyone's ordering their food. You're at the end so you're ordering last. They're getting ribs, chicken strips, spaghetti, and whatever. No one in the group cares what they're ordering. The conversation stays the same. Then it comes to you and your first question is, "How do you prepare your chicken breasts?"
People start looking at you.
Then you order two plain chicken breasts with a side of broccoli with no butter or seasoning. The waiter writes it down and off he goes to the kitchen. Now everyone's looking at you like you're a freak.
They didn't care that your other friend was eating ribs. They didn't say shit when the guy ordered his chicken strips. So how is your meal selection any different? It blows my mind.
If you ordered something that was complete shit, no one would say anything. But because you ordered something to help you achieve a goal, it's a problem. And now for the next ten minutes you're having that stupid fucking conversation.
"It's so easy for you to lose weight," they say. "I can't do it."
And you're thinking, really? Here I am at Outback Steakhouse ordering two plain chicken breasts and broccoli – which is gonna cost me 40 bucks by the way – and it's easy? This is something I want to do? You think I want to sit here and watch you fuckers eat wings and ribs? I'm here for your company, not to give you dieting tips you're not gonna listen to.
And the same shit happens when you're bulking, too.
Let's say you're at the same restaurant. They order their food. Then it comes to you and you get three racks of ribs and two sweet potatoes. They say, "Holy shit, do you eat like that all the time? I wish I had that kind of metabolism!"
And you want to say, do you seriously think I want to sit here and eat 36 fucking ribs? Do you think this is going to be pleasant for me?
Three-quarters of the way through the meal you're sweating with napkins piled by your plate, the bones are stacked and are the size of the Eiffel tower. There's a heartbeat in your stomach. Then you finish eating and they say, "Well, I guess you're going to order dessert now."
All you're thinking about is how the hell you're going to get back to the car. Then you get to go home an hour later and make a fucking shake before bed. Then wake up the next day and do it all over again for however long it takes.
That's why there's so few people who are doing this shit and why it helps to be around people with similar goals. They understand. It's a rare breed, man.
Yeah, you can stay in the middle, take some supplements here and there, take time off for whatever reason, change your program every other week and stay absolutely the same as you are now.
But that's bullshit. | {
"pile_set_name": "OpenWebText2"
} |
Caswain Mason
Caswain Mason (born 12 February 1978) is a Vincentian former footballer who spent the majority of his career in the Canadian Soccer League.
Playing career
Mason began his career with the Toronto Olympians of the Canadian Professional Soccer League in 2000. He would appear in one match against the North York Astros on September 12, 2000, coming on as a substitute for Gus Kouzmanis. In 2001, he went a step higher in his professional career by signing with the Toronto Lynx of the USL A-League. His signing was announced along with the rest of the roster on April 24, 2001. Throughout the season he appeared in 14 matches and recorded one goal. Though the Lynx failed to reach the postseason.
In 2002, he returned to CPSL to sign with the Metro Lions, where in his debut season he helped the club achieve a seven-game undefeated streak and a place in the playoffs; but were eliminated by the Ottawa Wizards the semi-final match. On May 17, 2004, he extended his contract with the Lions for the 2004 season. He was named into the CPSL all-star squad that would face Boavista FC in a friendly match.
The following year he signed with league powerhouse Toronto Croatia, making his debut on May 29, 2005 in a match against Vaughan Shooters. During his tenure with the club he helped the team reach the postseason, but were eliminated in the semi-finals. In 2007, he had a spell overseas with Mahindra United of the I-League. He would return to the CSL to play with the Canadian Lions; making his debut on September 19, 2007 against Trois-Rivieres Attak. In 2008, he signed with CSL powerhouse with the Serbian White Eagles, where he captured the CSL Championship by defeating the Trois-Rivieres in penalties.
International career
Mason made his debut for the Saint Vincent and the Grenadines national football team on May 8, 2004 against Grenada.
Honours
Serbian White Eagles
CSL Championship: 1
2008
References
Category:1978 births
Category:Living people
Category:Saint Vincent and the Grenadines footballers
Category:Toronto Croatia players
Category:Toronto Lynx players
Category:Toronto (Mississauga) Olympians players
Category:Serbian White Eagles FC players
Category:Association football midfielders
Category:USL A-League players
Category:Canadian Soccer League (2006–present) players
Category:Canadian Professional Soccer League (1998–2005) players
Category:Brampton United players | {
"pile_set_name": "Wikipedia (en)"
} |
My awesome postcard gifter got me as a match again and sent me this book! I started reading it before bed and so far I really like the author's writing style!! THANKS!!! | {
"pile_set_name": "OpenWebText2"
} |
//===--- SwiftPrivateThreadExtras.swift -----------------------------------===//
//
// This source file is part of the Swift.org open source project
//
// Copyright (c) 2014 - 2018 Apple Inc. and the Swift project authors
// Licensed under Apache License v2.0 with Runtime Library Exception
//
// See https://swift.org/LICENSE.txt for license information
// See https://swift.org/CONTRIBUTORS.txt for the list of Swift project authors
//
//===----------------------------------------------------------------------===//
//
// This file contains wrappers for pthread APIs that are less painful to use
// than the C APIs.
//
//===----------------------------------------------------------------------===//
#if canImport(Darwin)
import Darwin
#elseif canImport(Glibc)
import Glibc
#elseif os(Windows)
import MSVCRT
import WinSDK
#endif
/// An abstract base class to encapsulate the context necessary to invoke
/// a block from pthread_create.
internal class ThreadBlockContext {
/// Execute the block, and return an `UnsafeMutablePointer` to memory
/// allocated with `UnsafeMutablePointer.alloc` containing the result of the
/// block.
func run() -> UnsafeMutableRawPointer { fatalError("abstract") }
}
internal class ThreadBlockContextImpl<Argument, Result>: ThreadBlockContext {
let block: (Argument) -> Result
let arg: Argument
init(block: @escaping (Argument) -> Result, arg: Argument) {
self.block = block
self.arg = arg
super.init()
}
override func run() -> UnsafeMutableRawPointer {
let result = UnsafeMutablePointer<Result>.allocate(capacity: 1)
result.initialize(to: block(arg))
return UnsafeMutableRawPointer(result)
}
}
/// Entry point for `pthread_create` that invokes a block context.
internal func invokeBlockContext(
_ contextAsVoidPointer: UnsafeMutableRawPointer?
) -> UnsafeMutableRawPointer! {
// The context is passed in +1; we're responsible for releasing it.
let context = Unmanaged<ThreadBlockContext>
.fromOpaque(contextAsVoidPointer!)
.takeRetainedValue()
return context.run()
}
#if os(Windows)
public typealias ThreadHandle = HANDLE
#else
public typealias ThreadHandle = pthread_t
#if os(Linux) || os(Android)
internal func _make_pthread_t() -> pthread_t {
return pthread_t()
}
#else
internal func _make_pthread_t() -> pthread_t? {
return nil
}
#endif
#endif
/// Block-based wrapper for `pthread_create`.
public func _stdlib_thread_create_block<Argument, Result>(
_ start_routine: @escaping (Argument) -> Result,
_ arg: Argument
) -> (CInt, ThreadHandle?) {
let context = ThreadBlockContextImpl(block: start_routine, arg: arg)
// We hand ownership off to `invokeBlockContext` through its void context
// argument.
let contextAsVoidPointer = Unmanaged.passRetained(context).toOpaque()
#if os(Windows)
let threadID =
_beginthreadex(nil, 0, { invokeBlockContext($0)!
.assumingMemoryBound(to: UInt32.self).pointee },
contextAsVoidPointer, 0, nil)
if threadID == 0 {
return (errno, nil)
} else {
return (0, ThreadHandle(bitPattern: threadID))
}
#else
var threadID = _make_pthread_t()
let result = pthread_create(&threadID, nil,
{ invokeBlockContext($0) }, contextAsVoidPointer)
if result == 0 {
return (result, threadID)
} else {
return (result, nil)
}
#endif
}
/// Block-based wrapper for `pthread_join`.
public func _stdlib_thread_join<Result>(
_ thread: ThreadHandle,
_ resultType: Result.Type
) -> (CInt, Result?) {
#if os(Windows)
let result = WaitForSingleObject(thread, INFINITE)
guard result == WAIT_OBJECT_0 else { return (CInt(result), nil) }
var dwResult: DWORD = 0
GetExitCodeThread(thread, &dwResult)
CloseHandle(thread)
let value: Result = withUnsafePointer(to: &dwResult) {
$0.withMemoryRebound(to: Result.self, capacity: 1) {
$0.pointee
}
}
return (CInt(result), value)
#else
var threadResultRawPtr: UnsafeMutableRawPointer?
let result = pthread_join(thread, &threadResultRawPtr)
if result == 0 {
let threadResultPtr = threadResultRawPtr!.assumingMemoryBound(
to: Result.self)
let threadResult = threadResultPtr.pointee
threadResultPtr.deinitialize(count: 1)
threadResultPtr.deallocate()
return (result, threadResult)
} else {
return (result, nil)
}
#endif
}
public class _stdlib_Barrier {
var _threadBarrier: _stdlib_thread_barrier_t
var _threadBarrierPtr: UnsafeMutablePointer<_stdlib_thread_barrier_t> {
return _getUnsafePointerToStoredProperties(self)
.assumingMemoryBound(to: _stdlib_thread_barrier_t.self)
}
public init(threadCount: Int) {
self._threadBarrier = _stdlib_thread_barrier_t()
let ret = _stdlib_thread_barrier_init(
_threadBarrierPtr, CUnsignedInt(threadCount))
if ret != 0 {
fatalError("_stdlib_thread_barrier_init() failed")
}
}
deinit {
_stdlib_thread_barrier_destroy(_threadBarrierPtr)
}
public func wait() {
let ret = _stdlib_thread_barrier_wait(_threadBarrierPtr)
if !(ret == 0 || ret == _stdlib_THREAD_BARRIER_SERIAL_THREAD) {
fatalError("_stdlib_thread_barrier_wait() failed")
}
}
}
| {
"pile_set_name": "Github"
} |
Nyhavn 11
Nyhavn 11 is a listed property overlooking the Nyhavn canal in central Copenhagen, Denmark.
History
A two-storey building was built at the site in about 1700. One of its first owners was Jacob Severin. He had married rich and was in 1733 granted a full monopoly on trade with Greenland where he founded the town Jacobshavn (literally "Port Jacob").
Ludvig Ferdinand Römer established a sugar refinery in the building in 1754. He had been governor of the Danish Gold Coast. His wife was Anna Cathrine Widderkamp and the couple had 14 children. The property was expanded with two extra storeys in 1835-1836 for a grocer named Harboe.
The actor Christian Niemann Rosenkildelived in the building with his family from 1842 to 1749. His daughter, Julie, later known by her married name Julie Sødring, who became one of the leading Danish actresses of her time, had her debut at the Royal Danish Theatre in the play Den Sorte Dronning (The Black Queen) in 1843. Many artist frequented the home, including the Swedish singer Jenny Lind. Another well-known actor, Poul Reumert, have also lived in the building. He grew up at Nyhavn 63.
The building was listed by the Danish Heritage Agency in the Danish national registry of protected buildings in 1932.
Building
The building is four storeys tall and five bays wide. It has a red tile roof with four dormers. Above the gate is a figure of a sugar-baker holding a sugarloaf in one hand and a sugar tin in the other. The figure dates from Römer's sugar refinery. It served as a means of identifications at a time when house numbers had not yet been introduced. Many other houses along the Nyhavn quay feature similar signs.
An appendix with staircase on the rear side of the building dates from 1875. The courtyard was refurbished in 1963 to design by the landscape architect Knud Lund-Sørensen.
Today
The leading Danish lamp manufacturer Louis Poulsen has been headquartered in the building since 1908.
References
External links
Photographs of the courtyard
Category:Houses in Copenhagen
Category:Listed residential buildings in Copenhagen
Category:Houses completed in 1836
Category:Sugar refineries in Copenhagen | {
"pile_set_name": "Wikipedia (en)"
} |
assess the level of risk involved in mineral pro
echlib.deloitteresources /
MagnesiumScientific Review on Usage, Dosage, Side
Summary of Magnesium Primary Information, Benefits, Effects, and Important Facts Magnesium is an essential dietary mineral, and the second most prevalent electrolyte in the human body. Magnesium deficiencies are common in
1. Overview of the GRADE ApproachGRADEproGDT
1. Overview of the GRADE Approach The GRADE approach is a system for rating the quality of a body of evidence in systematic reviews and other evidence syntheses, such as health technology assessments, and guidelines and
Genomewide Association Studies and Assessment of the
8· Risk Assessment The potential for variants identified in genomewide association studies to predict the risk of complex diseases has been anticipated since the publication of the first reports, but this application is
Tibia Shaft FracturesTraumaOrthobullets
9· The most important factor shown to reduce the risk of infection at the site of an open fracture is early intravenous antibiotic administration. Infection risk after Gustilo Type II open fractures ranges from 10 20% in large
Principles for the Governance of Regulators
The Principles for the Governance of Regulators was discussed at the 21 November 2012 informal meeting of the Ad Hoc Network of Economic Regulators (NER) at the OECD, Paris and the 22 23 April 2013 meeting of the Regulatory
Vitamin A Health Professional Fact Sheet
1· Introduction Vitamin A is the name of a group of fat soluble retinoids, including retinol, retinal, and retinyl esters []. Vitamin A is involved in immune function, vision, reproduction, and cellular communication [1,4,5]. Vitamin
Advair DiskusFDA prescribing information, side
Treatment of Asthma Advair Diskus is indicated for the treatment of asthma in patients aged 4 years and older. LABA, such as salmeterol, one of the active ingredients in Advair Diskus, increase the risk of asthma related death.
Calcium Health Professional Fact Sheet
Introduction Calcium, the most abundant mineral in the body, is found in some foods, added to others, available as a dietary supplement, and present in some medicines (such as antacids). Calcium is required for vascular contraction
ZincScientific Review on Usage, Dosage, Side Effects
Zinc is an essential mineral involved in regulating many enzymes. It is an antioxidant and immune boosting supplement. Zinc is most commonly supplemented to reduce the frequency of illness and to support optimal levels of
Lifestyle, Diabetes, and Cardiovascular Risk Factors 10
2· Background Weight loss is associated with short term amelioration and prevention of metabolic and cardiovascular risk, but whether these benefits persist over time is unknown. Methods The prospective, controlled
CholineLinus Pauling InstituteOregon State University
Summary Choline is a vitamin like essential nutrient and a methyl donor involved in many physiological processes, including normal metabolism and transport of lipids, methylation reactions, and neurotransmitter synthesis. (More
USGS news releaseUSGS.govScience for a changing
ZonegranFDA prescribing information, side effects
Zonegran ® (zonisamide) is an antiseizure drug chemically classified as a sulfonamide and unrelated to other antiseizure agents. The active ingredient is zonisamide, 1,2 benzisoxazole 3 methanesulfonamide. The empirical formula is
Case studies on genetically modified organisms (GMOs
Within the frame of the EU funded MARLON project, background data were reviewed to explore the possibility of measuring health indicators during post market monitoring for potential effects of feeds, particularly genetically modified
Topic 9: Safety and risk management in oil and gas
Quote HSE " Success in managing major Hazards is not measured by the Occupational Health and Safety Statistics but by measuring the performance of critical systems used to control risks to ensure they are operating as intended.
Ace InvestmentBest Stock TipsIndian Stock Tips
We are leader in equity market, focusing on technical and fundamental analysis to convert raw data and information into expert advice. " Ace Investment Advisory is the Most Trusted SEBI Registered Investment Advisory in India gives
Lifestyle, Diabetes, and Cardiovascular Risk Factors 10
2· Background Weight loss is associated with short term amelioration and prevention of metabolic and cardiovascular risk, but whether these benefits persist over time is unknown. Methods The prospective, controlled
GlossaryLinus Pauling InstituteOregon State University
C reactive protein (CRP) a protein that is produced in the liver in response to inflammation. CRP is a biomarker of inflammation that is strongly associated with the risk of cardiovascular events, such as myocardial infarction and stroke.
NutrientsSeptember 2017Browse Articles
Nutrients, Volume 9, Issue 9 (September 2017) Issues are regarded as officially published after their release is announced to the table of contents alert mailing list. You may sign up for e mail alerts to receive table of contents of | {
"pile_set_name": "Pile-CC"
} |
Tumour-simulating squamous cell metaplasia (SCM) in necrotic areas of salivary gland tumours.
Squamous cell metaplasia (SCM) adjacent to necrotic areas of salivary gland tumours must be distinguished from other types of SCM (focal SCM in the excretory ducts of salivary glands; necrotizing sialometaplasia; focal SCM within salivary gland tumours) in respect to the tissue structure. Based on the high cellular proliferation, arcade- or cord-like pseudoneoplastic SCM develops with stellate extension in the surrounding tissue and focal inclusion of goblet cell metaplasia. This proliferative SCM resembles the cellular demarcation of radicular dental cysts. In the Salivary Gland Register 8 cases of tumor-simulating SCM could be analysed which clinically and morphologically were suspect of squamous cell or mucoepidermoid carcinoma. Five cases were localized in the parotid gland, 2 cases in the submandibular gland and 1 case in the palatinal glands. Tumour-simulating SCM was developed in pleomorphic adenomas (5 cases) and in multifocal adenomatous oncocytic hyperplasia (3 cases). | {
"pile_set_name": "PubMed Abstracts"
} |
For a MP5 clone the ones coming in from Pakistani Ordnance Factory are HK spec and ready to go. They come in as a pistol so they are ready to convert to a SBR or add a pistol brace to.
For a G3 I would go with PTR. They are well-built, reliable, built on licensed HK equipment, and can be had for under $1000. I would get the GI model since it has the deeper flutes in the chamber meaning it will be able to eat any ammo you throw at it. I used to have one but sold it to my friend because he really wanted it and I upgraded to a Vector. The fact that the Vector had the paddle release was a major factor in me getting it. | {
"pile_set_name": "Pile-CC"
} |
version https://git-lfs.github.com/spec/v1
oid sha256:2aa3ff0c0b8e1a5f7ce4fce717d6632d3687f95d420401bb2f5fe3dde75cab09
size 6557
| {
"pile_set_name": "Github"
} |
Kirsten Sinding-Larsen
Kirsten Sinding-Larsen (4 August 1898 – 10 December 1978) was a Norwegian architect.
She was born in Kristiania (now Oslo), Norway. She was the daughter of colonel Birger Fredrik Sinding-Larsen (1867–1941) and Emilie Rustad (1871–1904). She was a paternal granddaughter of jurist and writer Alfred Sinding-Larsen, niece of physician Christian Magnus Sinding-Larsen, architect Holger Sinding-Larsen and painter Kristofer Sinding-Larsen, first cousin of journalist Henning Sinding-Larsen and grandniece of architect Balthazar Lange.
She finished her secondary education in 1912, and studied at the Norwegian National Academy of Craft and Art Industry (now Oslo National Academy of the Arts) from 1915 to 1917. She worked as an apprentice to architect Sigurd Lunde in Bergen from 1919 to 1921. She worked with architect Håkon Ahlberg in Stockholm from 1923–25 and Tage William-Olsson to 1927. She studied architecture at the Royal Institute of Technology from 1927 to 1929. She was employed by architects Gustav Classon and Wolter Gahn in Stockholm from 1929-1932. She returned to Oslo in 1932 and worked for a short time with her uncle architect Holger Sinding-Larsen before establishing her own practice in 1933.
During the period 1933-38, she designed a number of homes in Moss and Jeløy in Østfold. Her most notable single work was the design of Sunnaas Hospital at Nesodden in the mid-1950s. She is also remembered as a debater of housing policy.
References
Category:1898 births
Category:1978 deaths
Category:Artists from Oslo
Category:Norwegian architects
Category:Norwegian women architects
Category:Norwegian expatriates in Sweden
Category:Oslo National Academy of the Arts alumni
Category:KTH Royal Institute of Technology alumni | {
"pile_set_name": "Wikipedia (en)"
} |
A linkage map of distal mouse chromosome 12.
To refine the linkage map of distal mouse Chromosome 12, we have identified DNA restriction fragment variants associated with a creatine kinase gene (Ck-3), the Akt proto-oncogene, an Abelson proviral integration site (D12N1), and the immunoglobulin heavy chain VH3609 variable region family (Igh-V36). The patterns of inheritance of these markers in backcross progeny and recombinant inbred mouse strains allowed their localization with respect to previously mapped genes to yield the linkage map: Aat-15.8 cM-Ck-3-0.9 cM-(Crip, Akt, Igh-C)-0.3 cM-(D12N1, Igh-V). This map confirms genetically the localization of the Igh-V gene complex distal to Igh-C on the chromosome. It differs from previous maps in placing D12N1 distal to Igh-C, and in suggesting that the Igh-V gene complex spans less than one centiMorgan (cM). Other DNA sequence variants detected with the creatine kinase probe allowed definition of four additional genetic loci: Ck-1 near Lmyc-1 on Chromosome 4; Ck-2 between Upg-1 and Hprt-ps1 (D17Rp10) on distal Chromosome 17; Ck-4 near Mpmv-17 and Mls-3 on Chromosome 16; and Ck-5 near Hba on Chromosome 11. | {
"pile_set_name": "PubMed Abstracts"
} |
1. Field of the Invention
The present invention relates to a transmission gate and a semiconductor device.
2. Description of the Related Art
A conventional transmission gate is described. FIG. 8 is a circuit diagram illustrating the conventional transmission gate.
The transmission gate includes a PMOS transistor 91 and an NMOS transistor 92. In those transistors, gates thereof are controlled by complementary signals, and thus the transistors are turned ON/OFF simultaneously. When a low level voltage is input to the gate of the PMOS transistor 91, and a high level voltage is input to the gate of the NMOS transistor 92, electrical continuity of the transmission gate is established. Then, the transmission gate outputs an input voltage Vin as an output voltage Vout.
Here, a gate-to-source capacitance of the PMOS transistor 91 is represented by Cgsp, a gate-to-source capacitance of the NMOS transistor 92 is represented by Cgsn, a parasitic capacitance at an output terminal is represented by Ch, a threshold voltage of the PMOS transistor 91 is represented by −Vtp, and a threshold voltage of the NMOS transistor 92 is represented by Vtn. Further, a voltage magnitude applied to the gate of the PMOS transistor 91 is represented by V5, and a voltage magnitude applied to the gate of the NMOS transistor 92 is represented by V4. When the transmission gate is set so as to satisfy the following Expression (11), influence of clock feedthrough is reduced. Therefore, it is possible to attain high S/N characteristics (for example, see JP 07-169292 A).(V5−Vout−Vtp)·Cgsp/(Cgsp+Ch)=(V4−Vout−Vtn)·Cgsn/(Cgsn+Ch) (11)
However, in the related art, Expression (11) is satisfied based on the presupposition that the input voltage Vin is a constant voltage (for example, (VDD+VSS)/2) and does not fluctuate. In other words, when the input voltage Vin fluctuates and therefore the output voltage Vout fluctuates, Expression (11) is not satisfied. Therefore, the S/N characteristics are degraded due to the influence of clock feedthrough. | {
"pile_set_name": "USPTO Backgrounds"
} |
Marko Klasinc
Marko Klasinc (born 14 May 1951) is Slovenian chess problemist.
He composed almost 200 chess problems, mostly heterodox and retrograde ones (12 included in FIDE Album). He has title FIDE solving master and international judge of FIDE for chess composition. As a good solver he represented Yugoslavia 1982 in Varna, where the team became World Champion solving chess problems.
He is the president of Committee for Chess Compositions of Chess Federation of Slovenia.
References
Notes
Bibliography
Drinovec, Aleš (editor). Slovenski šah. Šahovska zveza Slovenije, Ljubljana 2002.
External links
Website
PDB Server
Category:1951 births
Category:Living people
Category:Chess composers
Category:International Judges of Chess Compositions
Category:Slovenian chess players | {
"pile_set_name": "Wikipedia (en)"
} |
prime factors of 10134051.
3, 83, 40699
List the prime factors of 83591.
83591
What are the prime factors of 316257?
3, 271, 389
List the prime factors of 22742847.
3, 2526983
List the prime factors of 2688592.
2, 168037
List the prime factors of 373993.
103, 3631
What are the prime factors of 517753?
23, 22511
What are the prime factors of 844257?
3, 281419
List the prime factors of 170752.
2, 23, 29
What are the prime factors of 6940606?
2, 421, 8243
List the prime factors of 976270.
2, 5, 233, 419
What are the prime factors of 281137?
41, 6857
What are the prime factors of 3406379?
313, 10883
What are the prime factors of 1559800?
2, 5, 11, 709
List the prime factors of 9888298.
2, 7, 23, 41, 107
List the prime factors of 3807367.
137, 27791
What are the prime factors of 3578865?
3, 5, 238591
What are the prime factors of 5485895?
5, 1097179
List the prime factors of 11780571.
3, 11, 41, 8707
List the prime factors of 2880111.
3, 13, 73849
What are the prime factors of 3327170?
2, 5, 7, 11, 29, 149
List the prime factors of 465087.
3, 7, 22147
What are the prime factors of 10351108?
2, 73, 35449
List the prime factors of 8876442.
2, 3, 1087, 1361
List the prime factors of 418266.
2, 3, 19, 1223
What are the prime factors of 3022348?
2, 7, 107941
List the prime factors of 158560.
2, 5, 991
List the prime factors of 5912986.
2, 2956493
What are the prime factors of 656770?
2, 5, 65677
List the prime factors of 5870914.
2, 7, 419351
List the prime factors of 655811.
13, 61, 827
What are the prime factors of 519483?
3, 43, 4027
List the prime factors of 260689.
11, 13, 1823
List the prime factors of 3861433.
3861433
List the prime factors of 14246007.
3, 251, 18919
List the prime factors of 306306.
2, 3, 7, 11, 13, 17
List the prime factors of 24731.
7, 3533
List the prime factors of 560744.
2, 29, 2417
What are the prime factors of 1766208?
2, 3, 9199
What are the prime factors of 312127?
29, 47, 229
What are the prime factors of 1471256?
2, 183907
What are the prime factors of 1304894?
2, 652447
What are the prime factors of 31789973?
31, 1025483
What are the prime factors of 577277?
19, 23, 1321
What are the prime factors of 983641?
23, 42767
List the prime factors of 2989160.
2, 5, 74729
What are the prime factors of 1232457?
3, 410819
What are the prime factors of 110538?
2, 3, 23, 89
List the prime factors of 6872575.
5, 47, 5849
List the prime factors of 1791003.
3, 41, 14561
What are the prime factors of 228720?
2, 3, 5, 953
What are the prime factors of 2080382?
2, 1040191
What are the prime factors of 25973868?
2, 3, 2164489
What are the prime factors of 1111194?
2, 3, 7, 8819
What are the prime factors of 4984139?
4984139
What are the prime factors of 17145717?
3, 5715239
What are the prime factors of 5965237?
31, 337, 571
List the prime factors of 2591344.
2, 7, 17, 1361
What are the prime factors of 945022?
2, 13, 19, 1913
List the prime factors of 5598686.
2, 43, 65101
What are the prime factors of 50041?
163, 307
What are the prime factors of 735079?
37, 19867
What are the prime factors of 36290997?
3, 179, 2503
What are the prime factors of 635962?
2, 379, 839
What are the prime factors of 5596069?
347, 16127
What are the prime factors of 200668?
2, 13, 17, 227
What are the prime factors of 1134463?
11, 151, 683
List the prime factors of 12540962.
2, 7, 73, 1753
List the prime factors of 28625.
5, 229
List the prime factors of 29255905.
5, 7, 61, 71, 193
What are the prime factors of 3783881?
179, 21139
What are the prime factors of 11474584?
2, 11, 83, 1571
What are the prime factors of 91301?
7, 13043
List the prime factors of 859639.
11, 17, 4597
List the prime factors of 148873.
148873
List the prime factors of 3266825.
5, 149, 877
List the prime factors of 855761.
23, 29, 1283
List the prime factors of 2816129.
59, 809
List the prime factors of 15484400.
2, 5, 38711
List the prime factors of 470551.
470551
What are the prime factors of 152021?
281, 541
List the prime factors of 7125087.
3, 457, 5197
What are the prime factors of 1817865?
3, 5, 7, 29, 199
What are the prime factors of 5463503?
5463503
List the prime factors of 2414466.
2, 3, 31, 4327
What are the prime factors of 38015510?
2, 5, 13, 292427
What are the prime factors of 521645?
5, 17, 19
What are the prime factors of 1170384?
2, 3, 37, 659
What are the prime factors of 1860550?
2, 5, 127, 293
List the prime factors of 62463.
3, 47, 443
What are the prime factors of 8858815?
5, 7, 253109
List the prime factors of 545094.
2, 3, 11, 2753
List the prime factors of 11567211.
3, 439, 8783
What are the prime factors of 665387?
665387
List the prime factors of 1455221.
53, 27457
What are the prime factors of 198215?
5, 29, 1367
What are the prime factors of 1980191?
1980191
List the prime factors of 16613779.
7, 13, 79, 2311
What are the prime factors of 243712?
2, 7, 17
List the prime factors of 243233.
243233
What are the prime factors of 21810982?
2, 37, 241, 1223
What are the prime factors of 1186174?
2, 11, 53917
What are the prime factors of 249160?
2, 5, 6229
What are the prime factors of 792258?
2, 3, 23, 5741
What are the prime factors of 2927305?
5, 585461
What are the prime factors of 7984140?
2, 3, 5, 133069
What are the prime factors of 22434?
2, 3, 3739
List the prime factors of 396058.
2, 13, 15233
List the prime factors of 614961.
3, 68329
List the prime factors of 2243803.
2243803
List the prime factors of 229841.
229841
What are the prime factors of 123907?
7, 31, 571
List the prime factors of 238767.
3, 79589
What are the prime factors of 66775?
5, 2671
What are the prime factors of 5518616?
2, 689827
What are the prime factors of 6299425?
5, 11, 22907
List the prime factors of 746942.
2, 7, 53353
List the prime factors of 2368248.
2, 3, 101, 977
List the prime factors of 95658.
2, 3, 107, 149
List the prime factors of 324986.
2, 162493
List the prime factors of 381725.
5, 15269
List the prime factors of 2901673.
397, 7309
List the prime factors of 22250.
2, 5, 89
What are the prime factors of 671789?
17, 43, 919
What are the prime factors of 5299296?
2, 3, 55201
List the prime factors of 25756.
2, 47, 137
What are the prime factors of 993717?
3, 41, 2693
What are the prime factors of 10314345?
3, 5, 687623
List the prime factors of 1224093.
3, 13, 31387
What are the prime factors of 56355?
3, 5, 13, 17
What are the prime factors of 3419148?
2, 3, 499, 571
List the prime factors of 4971.
3, 1657
What are the prime factors of 38?
2, 19
What are the prime factors of 268741?
11, 2221
List the prime factors of 1415801.
31, 109, 419
List the prime factors of 912806.
2, 456403
List the prime factors of 3221123.
3221123
What are the prime factors of 9037358?
2, 11, 410789
List the prime factors of 5309436.
2, 3, 11, 19, 29, 73
List the prime factors of 4099777.
11, 372707
What are the prime factors of 14246336?
2, 13, 17123
List the prime factors of 881742.
2, 3, 223, 659
What are the prime factors of 28056703?
421, 66643
What are the prime factors of 9094509?
3, 1010501
What are the prime factors of 1855425?
3, 5, 11, 13, 173
List the prime factors of 487287.
3, 29, 1867
List the prime factors of 440543.
440543
What are the prime factors of 18980763?
3, 89, 71089
What are the prime factors of 9109410?
2, 3, 5, 303647
What are the prime factors of 1449947?
17, 19, 67
List the prime factors of 67677.
3, 17, 1327
What are the prime factors of 202048?
2, 7, 11, 41
List the prime factors of 593777.
593777
List the prime factors of 177572.
2, 103, 431
What are the prime factors of 5862798?
2, 3, 37, 8803
What are the prime factors of 235756?
2, 17, 3467
List the prime factors of 2391760.
2, 5, 7, 4271
What are the prime factors of 14733?
3, 1637
What are the prime factors of 387108?
2, 3, 10753
List the prime factors of 3703978.
2, 1259, 1471
List the prime factors of 15364114.
2, 7682057
What are the prime factors of 98667?
3, 19, 577
List the prime factors of 9930106.
2, 31, 160163
What are the prime factors of 225824?
2, 7057
List the prime factors of 560306.
2, 41, 6833
List the prime factors of 12044282.
2, 109, 55249
List the prime factors of 2037426.
2, 3, 43, 53, 149
What are the prime factors of 171671?
171671
What are the prime factors of 18303 | {
"pile_set_name": "DM Mathematics"
} |
package plugins.core.combat;
import java.util.ArrayList;
import java.util.HashSet;
import java.util.List;
import java.util.Set;
import org.slf4j.Logger;
import org.slf4j.LoggerFactory;
import akka.actor.ActorRef;
import akka.actor.ActorSelection;
import akka.actor.Props;
import akka.actor.UntypedActor;
import io.gamemachine.chat.ChatSubscriptions;
import io.gamemachine.core.ActorUtil;
import io.gamemachine.core.GameEntityManager;
import io.gamemachine.core.GameEntityManagerService;
import io.gamemachine.core.GameMachineLoader;
import io.gamemachine.core.PlayerMessage;
import io.gamemachine.grid.Grid;
import io.gamemachine.grid.GridService;
import io.gamemachine.messages.CombatLog;
import io.gamemachine.messages.GameMessage;
import io.gamemachine.messages.PlayerSkill;
import io.gamemachine.messages.RegionInfo;
import io.gamemachine.messages.StatusEffect;
import io.gamemachine.messages.StatusEffectTarget;
import io.gamemachine.messages.TrackData;
import io.gamemachine.messages.Zone;
import io.gamemachine.regions.ZoneService;
public class StatusEffectManager extends UntypedActor {
private static final Logger logger = LoggerFactory.getLogger(StatusEffectManager.class);
public static String name = StatusEffectManager.class.getSimpleName();
public static boolean combatLogEnabled = true;
public static List<GridSet> gridsets = new ArrayList<GridSet>();
public static Set<String> handlerZones = new HashSet<String>();
public static void tell(String gridName, String zone, StatusEffectTarget statusEffectTarget, ActorRef sender) {
String actorName = null;
if (!hasEffects(statusEffectTarget)) {
logger.warn("No effects found for skill " + statusEffectTarget.skillRequest.playerSkill.id);
return;
}
if (activeEffectCount(statusEffectTarget) > 0) {
actorName = ActiveEffectHandler.actorName(gridName, zone);
ActorSelection sel = ActorUtil.getSelectionByName(actorName);
sel.tell(statusEffectTarget.clone(), sender);
}
if (passiveEffectCount(statusEffectTarget) > 0) {
actorName = PassiveEffectHandler.actorName(gridName, zone);
ActorSelection sel = ActorUtil.getSelectionByName(actorName);
sel.tell(statusEffectTarget.clone(), sender);
}
}
private static boolean hasEffects(StatusEffectTarget statusEffectTarget) {
if (StatusEffectData.skillEffects.containsKey(statusEffectTarget.skillRequest.playerSkill.id)) {
return true;
} else {
return false;
}
}
private static int passiveEffectCount(StatusEffectTarget statusEffectTarget) {
int count = 0;
for (StatusEffect statusEffect : StatusEffectData.skillEffects.get(statusEffectTarget.skillRequest.playerSkill.id)) {
if (statusEffect.type == StatusEffect.Type.AttributeMaxDecrease || statusEffect.type == StatusEffect.Type.AttributeMaxIncrease) {
count++;
}
}
return count;
}
private static int activeEffectCount(StatusEffectTarget statusEffectTarget) {
int count = 0;
for (StatusEffect statusEffect : StatusEffectData.skillEffects.get(statusEffectTarget.skillRequest.playerSkill.id)) {
if (statusEffect.type == StatusEffect.Type.AttributeDecrease || statusEffect.type == StatusEffect.Type.AttributeIncrease) {
count++;
}
}
return count;
}
public static int getEffectValue(StatusEffect statusEffect, PlayerSkill playerSkill, String characterId) {
GameEntityManager gameEntityManager = GameEntityManagerService.instance().getGameEntityManager();
return gameEntityManager.getEffectValue(statusEffect, playerSkill.id, characterId);
}
public static boolean inGroup(String playerId) {
String playerGroup = ChatSubscriptions.playerGroup(playerId);
if (playerGroup.equals("nogroup")) {
return false;
} else {
return true;
}
}
public static void skillUsed(PlayerSkill playerSkill, String characterId) {
GameEntityManager gameEntityManager = GameEntityManagerService.instance().getGameEntityManager();
gameEntityManager.skillUsed(playerSkill.id, characterId);
}
public static String playerGroup(String playerId) {
return ChatSubscriptions.playerGroup(playerId);
}
public static boolean inSameGroup(String playerId, String otherId) {
if (!inGroup(playerId)) {
return false;
}
String otherGroup = ChatSubscriptions.playerGroup(otherId);
if (playerGroup(playerId).equals(otherGroup)) {
return true;
} else {
return false;
}
}
public static boolean DeductCost(VitalsProxy vitalsProxy, StatusEffect statusEffect) {
if (statusEffect.resourceCost == 0) {
return true;
}
if (statusEffect.resource == StatusEffect.Resource.ResourceStamina) {
if (vitalsProxy.get("stamina") < statusEffect.resourceCost) {
//logger.warn("Insufficient stamina needed " + statusEffect.resourceCost);
return false;
}
vitalsProxy.subtract("stamina", statusEffect.resourceCost);
} else if (statusEffect.resource == StatusEffect.Resource.ResourceMagic) {
if (vitalsProxy.get("magic") < statusEffect.resourceCost) {
//logger.warn("Insufficient magic needed " + statusEffect.resourceCost);
return false;
}
vitalsProxy.subtract("magic", statusEffect.resourceCost);
}
return true;
}
public static void sendCombatDamage(VitalsProxy origin, VitalsProxy target, int value, CombatLog.Type type, String zone) {
GameEntityManager gameEntityManager = GameEntityManagerService.instance().getGameEntityManager();
gameEntityManager.combatDamage(origin, target, value, type);
if (!combatLogEnabled) {
return;
}
GameMessage msg = new GameMessage();
msg.combatLog = new CombatLog();
msg.combatLog.origin = origin.getEntityId();
msg.combatLog.target = target.getEntityId();
msg.combatLog.value = value;
msg.combatLog.type = type;
Grid grid = GridService.getInstance().getGrid(zone, "default");
TrackData trackData = grid.get(msg.combatLog.origin);
if (trackData != null) {
PlayerMessage.tell(msg, trackData.id);
}
trackData = grid.get(msg.combatLog.target);
if (trackData != null) {
PlayerMessage.tell(msg, trackData.id);
}
}
public StatusEffectManager() {
createDefaultEffectHandlers();
}
private void createDefaultEffectHandlers() {
int zoneCount = RegionInfo.db().findAll().size();
if (zoneCount == 0) {
logger.warn("Combat system requires at least one zone configured");
return;
}
for (Zone zone : ZoneService.staticZones()) {
createEffectHandler(zone.name);
}
}
public static void createEffectHandler(String zone) {
if (handlerZones.contains(zone)) {
logger.warn("effect handler already created for zone " + zone);
return;
}
GridSet gridSet = new GridSet();
gridSet.zone = zone;
GridService.getInstance().createForZone(zone);
gridSet.playerGrid = GridService.getInstance().getGrid(zone, "default");
gridSet.objectGrid = GridService.getInstance().getGrid(zone, "build_objects");
gridsets.add(gridSet);
GameMachineLoader.getActorSystem().actorOf(Props.create(ActiveEffectHandler.class, "default", zone),
ActiveEffectHandler.actorName("default", zone));
GameMachineLoader.getActorSystem().actorOf(Props.create(ActiveEffectHandler.class, "build_objects", zone),
ActiveEffectHandler.actorName("build_objects", zone));
GameMachineLoader.getActorSystem().actorOf(Props.create(PassiveEffectHandler.class, "default", zone),
PassiveEffectHandler.actorName("default", zone));
GameMachineLoader.getActorSystem().actorOf(Props.create(PassiveEffectHandler.class, "build_objects", zone),
PassiveEffectHandler.actorName("build_objects", zone));
GameMachineLoader.getActorSystem().actorOf(Props.create(VitalsRegen.class, zone),
VitalsRegen.actorName(zone));
handlerZones.add(zone);
}
@Override
public void onReceive(Object arg0) throws Exception {
// TODO Auto-generated method stub
}
}
| {
"pile_set_name": "Github"
} |
From Four Until Late
"From Four Until Late" (or "From Four Till Late") is a blues song written by Delta blues musician Robert Johnson. He recorded it in Dallas, Texas, during his second to last session for producer Don Law on June 19, 1937. The lyrics contained his philosophical lines of "a man is like a prisoner, and he's never satisfied".
British rock group Cream recorded the song for their debut album Fresh Cream in 1966. Guitarist Eric Clapton provided the lead vocal. Clapton also recorded another version of the song on his Sessions for Robert J album in 2004.
References
Category:Robert Johnson songs
Category:Songs written by Robert Johnson
Category:1937 songs
Category:Cream (band) songs
Category:Blues songs | {
"pile_set_name": "Wikipedia (en)"
} |
package com.trinity.sample.view.foucs
enum class AutoFocusTrigger {
GESTURE,
METHOD
}
| {
"pile_set_name": "Github"
} |
J-A08035-19
NON-PRECEDENTIAL DECISION - SEE SUPERIOR COURT I.O.P. 65.37
COMMONWEALTH OF PENNSYLVANIA : IN THE SUPERIOR COURT OF
: PENNSYLVANIA
:
v. :
:
:
ERIK R. SURRATT :
:
Appellant : No. 469 WDA 2018
Appeal from the Judgment of Sentence Entered January 10, 2018
In the Court of Common Pleas of Allegheny County Criminal Division at
No(s): CP-02-CR-0005355-2005,
CP-02-CR-0005495-2005
BEFORE: PANELLA, P.J., STABILE, J., and McLAUGHLIN, J.
MEMORANDUM BY McLAUGHLIN, J.: FILED JULY 26, 2019
Erik R. Surratt appeals from the judgment of sentence entered following
a resentencing hearing pursuant to Miller v. Alabama, 567 U.S. 460 (2012),
and Montgomery v. Louisiana, 136 S.Ct. 718 (2016). Surratt claims that in
fashioning his sentence, the PCRA1 court erroneously considered him an adult,
failed to consider whether he was capable of rehabilitation, and failed to
consider the Miller factors. We affirm.
Surratt was one of three individuals involved in a shooting that resulted
in the death of two victims and one victim being wounded. Surratt shot one
of the victims that died. Surratt was approximately 17 ½ years old at the time
of the murders. A jury convicted Surratt of two counts of first-degree murder
and other offenses. In 2008, the trial court sentenced Surratt to two life
____________________________________________
1 Post Conviction Relief Act, 42 Pa.C.S.A. §§ 9541-9546.
J-A08035-19
sentences without parole and 25 to 50 years’ incarceration for the remaining
charges. This Court affirmed the judgment of sentence. In 2017, the PCRA
court granted Surratt a resentencing, pursuant to Miller and Montgomery.
At the resentencing hearing, Surratt presented five witnesses. One of the
witnesses was a forensic social worker who testified to Surratt’s rehabilitation.
Following two hearings, the PCRA court resentenced Surratt to 40 years’
incarceration to life imprisonment. Surratt filed a post-sentence motion which
the trial court denied. This timely appeal followed.
On appeal, Surratt raises the following issues:
I. Whether the lower court erred and abused its discretion
in imposing a 40-year minimum sentence because the
Court failed to acknowledge or appropriately consider the
factors laid out in Miller v. Alabama, 567 U.S. 460
(2012), and Montgomery v. Louisiana, 136 S.Ct. 718
(2016), in light of the diminished capabilities and greater
prospects for reform of the adolescent offender.
II. Whether the lower court erred and abused its discretion
by placing excessive weight on the facts of the crime
rather than focusing on Miller’s central question of
whether the juvenile is capable of rehabilitation. The
facts of the murder are not determinative in assessing
permanent incorrigibility.
III. Whether the lower court erred and abused its discretion
by impermissibly considering Mr. Surratt to be an adult
at the time of the offense, repeatedly referring the
“arbitrary line” the U.S. Supreme Court had drawn
between offenders under the age of 18 and those who
are 18 and older. The Court does not have the discretion
to make a finding contrary to the United States Supreme
Court’s “legal conclusion[s] . . . and the facts (scientific
studies) underlying it” when it concerns the inherent
traits associated with adolescent development. See
Commonwealth v. Batts, 163 A.3d 410, 437 (Pa.
-2-
J-A08035-19
2017). Because the Commonwealth failed to introduce
any new evidence at the resentencing hearing, the Court
also lacked competent evidence to make the
aforementioned finding.
Surratt’s Br. at 6-7.
Surratt’s first two claims challenge discretionary aspects of his sentence.
See Commonwealth v. White, 193 A.3d 977, 981 (Pa.Super. 2018)
(concluding claims that trial court failed to consider Miller factors and did not
consider rehabilitative evidence are challenges to discretionary aspects of
sentence). As such, we must first determine whether: (1) the appeal is
timely; (2) the issue is preserved; (3) appellant’s brief includes a Pa.R.A.P.
2119(f) statement; and (4) a substantial question is raised. See
Commonwealth v. Battles, 169 A.3d 1086, 1090 (Pa.Super. 2017).
Here, Surratt has satisfied the first three factors. We now address
whether he has raised a substantial question. Surratt maintains that the PCRA
court imposed an excessive sentence and failed to consider his mitigating
factors. He claims that the PCRA court incorrectly “considered [him] an adult
at the time of the crime, and focused on the life without parole sentences
imposed on [his] adult co-defendants.” Surratt’s Br. at 14-15. He also
maintains that the sentence imposed by the court is excessive for a crime that
was committed by a juvenile and is “contrary to the fundamental norms
underlying the sentencing process, and is inconsistent with the Sentencing
Code.” Id. at 15.
-3-
J-A08035-19
Surratt’s claim of an excessive sentence paired with a claim that the
court failed to consider his mitigating factors raises a substantial question.
See Commonwealth v. Swope, 123 A.3d 333, 339 (Pa.Super. 2015).
Therefore, we will address the merit of his claims.
We review a challenge to discretionary aspects of sentencing for an
abuse of discretion. See Commonwealth v. Derry, 150 A.3d 987, 997
(Pa.Super. 2016). An abuse of discretion exists where “the sentencing court
ignored or misapplied the law, exercised its judgment for reasons of partiality,
prejudice, bias or ill[-]will, or arrived at a manifestly unreasonable decision.”
Id. (quoting Commonwealth v. Hoch, 936 A.2d 515, 517-18 (Pa.Super.
2007)).
Surratt claims that the PCRA court “wholly failed to consider [his]
individual, juvenile characteristics – focusing instead on the details of Surratt’s
crime, improperly considering Surratt as an adult, and weighing the life
sentences imposed on Surratt’s adult co-defendants.” Surratt’s Br. at 18. He
argues it failed to consider his juvenile characteristics as referenced in Miller.
To begin, the PCRA court was not required to consider the Miller factors.
The Miller2 factors must be considered “when a juvenile is exposed to a
potential sentence of life without the possibility of parole[.]” Commonwealth
____________________________________________
2These factors include such things as “immaturity, impetuosity, and failure to
appreciate risks and consequences; . . .” Batts II, 163 A.3d at 438 (quoting
Miller, 567 U.S. at 477-78).
-4-
J-A08035-19
v. Machicote, 206 A.3d 1110, 1120 (Pa. 2019); see also Batts II, 163 A.3d
at 432. Here, the Commonwealth did not seek a life-without-parole sentence,
and thus, the court was not required to consider the Miller factors.
Commonwealth v. Lekka, --- A.3d ---, 2019 WL 2064541, at *9 (Pa.Super.
filed May 10, 2019) (“In cases where the Commonwealth does not seek a life-
without-parole sentence, the application of the Miller factors is not required”).
While Surratt maintains that the PCRA court improperly considered him
an adult, we disagree. The PCRA court conceded it had to reconsider Surratt’s
sentence pursuant to Miller and Montgomery because Surratt was under the
age of 18 at the time of the murders. However, the court observed that the
age of majority was somewhat arbitrary and concluded that, as Surratt was
17½ when he committed the murders, he was relatively mature, as
demonstrated, in part, by his actions during his crimes.3 See N.T., 12/6/17,
____________________________________________
3 The court explained why it believed that Surratt was mature at the
time of committing the murders as follows:
The Court: And you have to understand how I feel about this
crime. It may well be that he has completely turned his life
around, and at least for the sake of argument I will accept that.
And at the time this happened, we are talking - - the Supreme
Court case talks about juveniles. There is no question in my mind
that Mr. Surratt was an adult. I mean, he was six months away
from 18. He was sophisticated. He had, for the very least, engaged
in criminal activity for three or four years before this happened. I
mean, he was running wild. He was running with a bunch of, as
far as I can tell, criminals. He was a sophisticated person. . . . We
are not talking about a six-year old, who accidently shoots the
-5-
J-A08035-19
at 111-12. It went on to say, “As I said before, this was a - - for lack of a
better term - - this is the behavior of an adult.” N.T., Reconsideration Hearing,
3/7/18 at 9 (emphasis added). It did not say that he was, in fact, an adult.
This claim is thus meritless.
Surratt’s additional claim that the court solely considered the facts of
the crime without taking into consideration Surratt’s potential for
rehabilitation or his mitigating evidence also fails. He argues that the facts
here are similar to Batts II because there was an improper “significant focus
on the facts of Surratt’s crime . . . to the exclusion of considering his personal
history and development as a juvenile.” Surratt’s Br. at 20. We disagree.
After Miller and Montgomery, Batts was resentenced to life without
parole. Batts II, 163 A.3d at 450. The Court concluded that because there
was “ample positive support relative to Batts’ potential for rehabilitation[,]”
remand was necessary for the trial court to “‘provide [Batts] some meaningful
opportunity to obtain release based on demonstrated maturity and
rehabilitation.’” Id. (quoting Miller, 567 U.S. at 479) (brackets in Batts II).
It found that the trial court’s opinion made clear “that its conclusion that Batts’
____________________________________________
neighbor, or even a ten-year old who accidently shoots the
neighbor or accidently does one thing or another. This was a
planned premeditated - - this is as premeditated as you can
possibly get.
N.T., 12/6/17, at 111-12.
-6-
J-A08035-19
actions were not the result of his ‘unfortunate yet transient immaturity’ was
based exclusively on the fact that the murder was ‘deliberate and
premedi[t]ated.’” Id. at 446 (quoting Sentencing Court Opinion). The facts
before us are not the same.
First, at the resentencing, Surratt was not sentenced to life without
parole, but rather two concurrent terms of 40 years’ to life imprisonment.
Second, the PCRA court was within its rights to consider the facts of the case
in fashioning Surratt’s new sentence, as they are one of the permissible
sentencing factors. The Sentencing Code explicitly provides that when
selecting from the statutory sentencing alternatives, “the court shall follow the
general principle that the sentence imposed should call for confinement that
is consistent with the protection of the public, the gravity of the offense as it
relates to the impact on the life of the victim and on the community, and the
rehabilitative needs of the defendant.” 42 Pa.C.S.A. § 9721(b). The court’s
consideration of the facts of Surratt’s crime was not improper. See
Commonwealth v. Blount, 207 A.3d 925,937-38 (Pa.Super. 2019)
(concluding trial court properly considered Section 9721(b) factors when
resentencing juvenile pursuant to Montgomery and Miller).
Additionally, the court was made aware of Surratt’s potential for
rehabilitation by Surratt’s sentencing memorandum and letters written in
Surratt’s support. It also heard testimony Surratt offered as mitigating
evidence and received a presentence investigation report (“PSI”). Thus, the
-7-
J-A08035-19
trial court “consider[ed] the particular circumstances of the offense and the
character of [Surratt], with reference to [Surratt’s] prior criminal record, age,
personal characteristic, and potential for rehabilitation,” in fashioning Surratt’s
sentence. Lekka, -- A.3d --, 2019 WL 2064541, at *6 (affirming judgment of
sentence of 45 years to life imprisonment following resentencing hearing);
see also Commonwealth v. Finnecy, 135 A.3d 1028, 1038 (Pa.Super.
2016) (stating that there is an assumption that court is aware of information
provided in PSI, including mitigating factors).
Surratt also maintains that the PCRA court improperly “weigh[ed] the
life sentences imposed on Surratt’s adult co-defendants.” Surratt’s Br. at 18.
This claim warrants no relief. The court explained that it was concerned about
how the co-defendants’ sentences would compare with Surratt’s sentence.
[The Court]: There is also the issue, and I brought this up the last
time we were here, is I have three other people who are going to
spend the rest of their lives in jail without the possibility of parole
because of the fact that they were over 18 and they were over the
artificial line.
N.T., 1/10/18, at 7.
While the court acknowledged its discomfort in the disparity of
sentences, it nonetheless recognized that Surratt was not beyond
rehabilitation and therefore concluded that while his co-defendants received
life without parole, the same was not an appropriate sentence for Surratt. See
Machicote, 206 A.3d at 1115 (stating there is a presumption against a
sentence of life without parole for juvenile and may be rebutted by proving
-8-
J-A08035-19
that juvenile is incapable of rehabilitation); see also Trial Court Opinion, filed
8/29/18, at 4 (stating it “did not find beyond a reasonable doubt, that
[Surratt] is incapable of rehabilitation”).
Judgment of sentence affirmed.
Judgment Entered.
Joseph D. Seletyn, Esq.
Prothonotary
Date: 7/26/2019
-9-
| {
"pile_set_name": "FreeLaw"
} |
Escreva um **servidor** HTTP que recebe apenas requisições de POST e converte os caracteres no corpo da requisição para caixa-alta e retorna-os para o cliente.
Seu servidor deve "escutar" na porta provida a você pelo primeiro argumento para seu programa.
----------------------------------------------------------------------
## DICAS
Ainda que você não esteja restrito ao uso das capacidades de streaming dos objetos `request` e `response`, será muito mais fácil se você decidir usá-las.
Existe um grande número de pacotes diferentes no npm que você pode usar para *"transformar"* um streaming de dados enquanto ele está sendo passado. Para esse exercício, o pacote `through2-map` oferece a API mais simples.
`through2-map` permite que você crie um *stream transformador* usando apenas uma única função que recebe um bloco de dados e retorna um outro bloco de dados. Ela é designada para funcionar como um `Array#map()`, só que para streams:
```js
const map = require('through2-map')
inStream.pipe(map(function (chunk) {
return chunk.toString().split('').reverse().join('')
})).pipe(outStream)
```
No exemplo acima, a data que estamos recebendo de `inStream` é convertida para uma String (se já não estiver nesse formato), os caracteres são revertidos e o resultado é passado para o `outStream`. Sendo assim nós fizemos um reversor de caracteres! Lembre-se que o tamanho do bloco é determinado pelo fluxo e você tem muito pouco controle sobre ele para os dados que está recebendo.
Para instalar `through2-map` type:
```sh
$ npm install through2-map
```
Se você não possuir uma conexão à Internet, simplesmente crie uma pasta `node_modules` e copie o diretório inteiro para o módulo que você quiser usar de dentro do diretório de instalação do {{appname}}:
{rootdir:/node_modules/through2-map}
A documentação do through2-map foi instalada junto com o {appname} no seu sistema e você pode lê-los apontando seu navegador para cá:
{rootdir:/docs/through2-map.html}
| {
"pile_set_name": "Github"
} |
Falevi Umutaua
Falevi Umutaua is a Samoan professional football manager.
Career
In 2007, he coached the Samoa national football team.
References
External links
Profile at Soccerway.com
Profile at Soccerpunter.com
Category:Year of birth missing (living people)
Category:Living people
Category:Samoan football managers
Category:Samoa national football team managers
Category:Place of birth missing (living people) | {
"pile_set_name": "Wikipedia (en)"
} |
Changes in serum interleukin-6, C-reactive protein and thrombomodulin levels under periodontal ultrasonic debridement.
This study aimed to compare the effect of single-visit full-mouth mechanical debridement (FMD) and quadrant-wise mechanical debridement (QMD) on the levels of serum interleukin (IL)-6, C-reactive protein (CRP) and soluble thrombomodulin. Thirty-six subjects with chronic periodontitis were randomly allocated to three groups: undergoing QMD, single-visit FMD with povidone iodine or with water. Serum IL-6 and soluble thrombomodulin were measured by enzyme-linked immunosorbent assay, and serum CRP was measured by the latex-enhanced nephelometric method. Serum IL-6 level increased significantly immediately after debridement in all the three groups, with this increase being greatest in the full-mouth groups. However, the increase in the full-mouth groups was not significantly higher than that of quadrant-wise group. In the quadrant-wise group, serum IL-6 level decreased significantly 1 month after debridement compared with baseline. Serum-soluble thrombomodulin decreased significantly in the full-mouth groups but not in the quadrant-wise group. Changes in CRP level were not significant at baseline or after debridement in all the three groups. FMD increased serum IL-6 and reduced serum-soluble thrombomodulin to a greater extent than QMD, suggesting that the former technique has stronger transient effects on systemic vascular endothelial functions than the latter. | {
"pile_set_name": "PubMed Abstracts"
} |
The Effectiveness of Psychoeducational Interventions Focused on Sexuality in Cancer.
Although sexual health is a common concern for oncology patients, no practical guidelines to sexual intervention exist, perhaps because of a lack of systematic reviews or meta-analyses. The objectives of this study were to determine the effect size for psychoeducational intervention focused on sexuality and to compare effect sizes according to intervention outcomes and characteristic. We explored quantitative evidence for the effects of sexual intervention for cancer patients or partners by using the electronic databases. Among them, we considered 15 eligible articles. The meta-analysis provided 133 effect sizes from 15 primary studies. The analysis revealed significant improvements after intervention, with a random-effects standardized mean difference of 0.75. Psychoeducational interventions focused on sexuality after cancer diagnosis were effective for compliance (2.40), cognitive aspect (1.29), and psychological aspect (0.83). Individual-based interventions (0.85) were more effective in improving outcomes than group approach and group combined with individual intervention. With regard to intervention providers, registered nurse only (2.22) and team approach including the registered nurse (2.38) had the highest effect size. Face-to-face intervention combined with telephone or the Internet (1.04) demonstrated a higher effect size than face-to-face (0.62) and telephone (0.58) independently. We conducted an analysis of data from various subgroups of preexisting studies, obtained an overall estimate of the effectiveness of the intervention, and compared its effectiveness across variables that affect intervention outcomes. These results provide empirical data for evidence-based practice and inform the development of useful intervention programs through a comprehensive review and meta-analysis of the results. | {
"pile_set_name": "PubMed Abstracts"
} |
---
abstract: 'Franson’s Bell experiment with energy-time entanglement \[Phys. Rev. Lett. [**62**]{}, 2205 (1989)\] does not rule out all local hidden variable models. This defect can be exploited to compromise the security of Bell inequality-based quantum cryptography. We introduce a novel Bell experiment using genuine energy-time entanglement, based on a novel interferometer, which rules out all local hidden variable models. The scheme is feasible with actual technology.'
author:
- Adán Cabello
- Alessandro Rossi
- Giuseppe Vallone
- Francesco De Martini
- Paolo Mataloni
title: 'Proposed Bell Experiment with Genuine Energy-Time Entanglement'
---
Two particles exhibit “energy-time entanglement” when they are emitted at the same time in an energy-conserving process and the essential uncertainty in the time of emission makes undistinguishable two alternative paths that the particles can take. Franson [@Franson89] proposed an experiment to demonstrate the violation of local realism [@Bell64] using energy-time entanglement, based on a formal violation of the Bell Clauser-Horne-Shimony-Holt (CHSH) inequality [@CHSH69]. However, Aerts [*et al.*]{} [@AKLZ99] showed that, even in the ideal case of perfect preparation and perfect detection efficiency, there is a local hidden variable (LHV) model that simulates the results predicted by quantum mechanics for the experiment proposed by Franson [@Franson89]. This model proves that “the Franson experiment does not and cannot violate local realism” and that “\[t\]he reported violations of local realism from Franson experiments [@KVHNC90] have to be reexamined” [@AKLZ99].
Despite this fundamental deficiency, and despite that this defect can be exploited to create a Trojan horse attack in Bell inequality-based quantum cryptography [@Larsson02], Franson-type experiments have been extensively used for Bell tests and Bell inequality-based quantum cryptography [@TBZG00], have become standard in quantum optics [@Paul04; @GC08], and an extended belief is that “the results of experiments with the Franson experiment violate Bell’s inequalities” [@GC08]. This is particularly surprising, given that recent research has emphasized the fundamental role of a (loophole-free) violation of the Bell inequalities in proving the device-independent security of key distribution protocols [@Ekert91], and in detecting entanglement [@HGBL05].
Polarization entanglement can be transformed into energy-time entanglement [@Kwiat95]. However, to our knowledge, there is no single experiment showing a violation of the Bell-CHSH inequality using genuine energy-time entanglement (or “time-bin entanglement” [@BGTZ99]) that cannot be simulated by a LHV model. By “genuine” we mean not obtained by transforming a previous form of entanglement, but created because the essential uncertainty in the time of emission makes two alternative paths undistinguishable.
Because of the above reasons, a single experiment using energy-time entanglement able to rule out all possible LHV models is of particular interest. The aim of this Letter is to describe such an experiment by means of a novel interferometric scheme. The main purpose of the new scheme is not to compete with existing interferometers used for quantum communication in terms of practical usability, but to fix a fundamental defect common to all of them.
We will first describe the Franson Bell-CHSH experiment. Then, we will introduce a LHV model reproducing any conceivable violation of the Bell-CHSH inequality. The model underlines why a Franson-type experiment does not and cannot be used to violate local realism. Then, we will introduce a new two-photon energy-time Bell-CHSH experiment that avoids these problems and can be used for a conclusive Bell test.
[*The Franson Bell-CHSH experiment.—*]{}The setup of a Franson Bell-CHSH experiment is in Fig. \[Fig1\]. The source emits two photons, photon $1$ to the left and photon $2$ to the right. Each of them is fed into an unbalanced interferometer. $BS_i$ are beam splitters and $M_i$ are perfect mirrors. There are two distant observers, Alice on the left and Bob on the right. Alice randomly chooses the phase of the phase shifter $\phi_A$ between $A_0$ and $A_1$, and records the counts in each of her detectors (labeled $a=+1$ and $a=-1$), the detection times, and the phase settings at $t_D-t_I$, where $t_D$ is the detection time and $t_I$ is the time the photon takes to reach the detector from the location of the phase shifter $\phi_A$. Similarly, Bob chooses $\phi_B$ between $B_0$ and $B_1$, and records the counts in each of his detectors (labeled $b=+1$ and $b=-1$), the detection times, and the phase settings. The setup must satisfy four requirements: (I) To have two-photon interference, the emission of the two photons must be simultaneous, the moment of emission unpredictable, and both interferometers identical. If the detections of the two photons are coincident, there is no information about whether both photons took the short paths $S$ or both took the long paths $L$. A simultaneous random emission is achieved in actual experiments by two methods, both based on spontaneous parametric down conversion. In energy-time experiments, a non-linear crystal is pumped continuously by a monochromatic laser so the moment of emission is unpredictable in a temporal window equal to the coherence time of the pump laser. In time-bin experiments, a non-linear crystal is pumped by pulses previously passing through an unbalanced interferometer, so it is the uncertainty of which pulse, the earlier or the later, has caused the emission what provokes the uncertainty in the emission time. In both cases, the simultaneity of the emission is guaranteed by the conservation of energy. (II) To prevent single-photon interference, the difference between paths $L$ and $S$, i.e., twice the distance between $BS1$ and $M1$, $\Delta {\cal L}=2 d(BS1,M1)$ (See Fig. \[Fig1\]), must satisfy $\Delta {\cal L} > c t_{\rm coh}$, where $c$ is the speed of light and $t_{\rm coh}$ is the coherence time of the photons. (III) To make distinguishable those events where one photon takes $S$ and the other takes $L$, $\Delta {\cal
L}$ must satisfy $\Delta {\cal L} > c \Delta t_{\rm coinc}$, where $\Delta t_{\rm coinc}$ is the duration of the coincidence window. (IV) To prevent that the local phase setting at one side can affect the outcome at the other side, the local phase settings must randomly switch ($\phi_A$ between $A_0$ and $A_1$, and $\phi_B$ between $B_0$ and $B_1$) with a frequency of the order $c/D$, where $D=d({\rm Source},BS1)$.
The observers record all their data locally and then compare them. If the detectors are perfect they find that
$$\begin{aligned}
P(A_i=+1)=P(A_i=-1)=\frac{1}{2}, \label{Amarginal} \\
P(B_j=+1)=P(B_j=-1)=\frac{1}{2}, \label{Bmarginal}\end{aligned}$$
for $i,j \in \{0,1\}$. $P(A_0=+1)$ is the probability of detecting a photon in the detector $a=+1$ if the setting of $\phi_A$ was $A_0$. They also find $25\%$ of two-photon events in which photon $1$ is detected a time $\Delta {\cal L} /c$ before photon $2$, and $25\%$ of events in which photon $1$ is detected $\Delta {\cal L}/c$ after photon $2$. The observers reject this $50\%$ of events and keep the $50\%$ that are coincident. For these selected events, quantum mechanics predicts that $$P(A_i=a, B_j=b)=\frac{1}{4}\left[1+ab
\cos(\phi_{A_i}+\phi_{B_j})\right], \label{joint}$$ where $a,b \in \{-1,+1\}$ and $\phi_{A_i}$ ($\phi_{B_j}$) is the phase setting corresponding to $A_i$ ($B_j$).
The Bell-CHSH inequality is $$-2 \le \beta_{\rm CHSH} \le 2, \label{CHSH}$$ where $$\beta_{\rm CHSH} = \langle A_0 B_0 \rangle + \langle A_0 B_1 \rangle
+ \langle A_1 B_0 \rangle - \langle A_1 B_1 \rangle.$$ According to quantum mechanics, the maximal violation of the Bell-CHSH inequality is $\beta_{\rm CHSH} = 2 \sqrt{2}$ [@Tsirelson80], and is obtained, e.g., with $\phi_{A_0}=0$, $\phi_{A_1}=\frac{\pi}{2}$, $\phi_{B_0}=-\frac{\pi}{4}$, $\phi_{B_1}=\frac{\pi}{4}$.
--------------------------------------------------------------------------------------------------------------------------------
$A_0$ $A_1$ $B_0$ $B_1$ $\langle $\langle A_0 B_1 \rangle$ $\langle A_1 $\langle A_1 B_1 \rangle$
A_0 B_0 \rangle$ B_0 \rangle$
-------- -------- -------- -------- ------------------ --------------------------- -------------- --------------------------- --
$S+$ $S+$ $S+$ $L\pm$ $+1$ rejected $+1$ rejected
$L+$ $L+$ $L+$ $S\pm$ $+1$ rejected $+1$ rejected
$S+$ $S-$ $L\pm$ $S+$ rejected $+1$ rejected $-1$
$L+$ $L-$ $S\pm$ $L+$ rejected $+1$ rejected $-1$
$S+$ $L\pm$ $S+$ $S+$ $+1$ $+1$ rejected rejected
$L+$ $S\pm$ $L+$ $L+$ $+1$ $+1$ rejected rejected
$L\pm$ $S+$ $S+$ $S-$ rejected rejected $+1$ $-1$
$S\pm$ $L+$ $L+$ $L-$ rejected rejected $+1$ $-1$
--------------------------------------------------------------------------------------------------------------------------------
: \[TableI\]$32$ sets of instructions (out of $64$) of the LHV model (the other $32$ are in Table \[TableII\]). Each row represents $4$ sets of local instructions (first $4$ entries) and their corresponding contributions for the calculation of $\beta_{\rm
CHSH}$ after applying the postselection procedure of the Franson experiment (last $4$ entries). For each row, two sets (corresponding to $\pm$ signs) are explicitly written, while the other two can be obtained by changing all signs.
--------------------------------------------------------------------------------------------------------------------------------
$A_0$ $A_1$ $B_0$ $B_1$ $\langle $\langle A_0 B_1 \rangle$ $\langle A_1 $\langle A_1 B_1 \rangle$
A_0 B_0 \rangle$ B_0 \rangle$
-------- -------- -------- -------- ------------------ --------------------------- -------------- --------------------------- --
$S+$ $S+$ $S-$ $L\pm$ $-1$ rejected $-1$ rejected
$L+$ $L+$ $L-$ $S\pm$ $-1$ rejected $-1$ rejected
$S+$ $S-$ $L\pm$ $S-$ rejected $-1$ rejected $+1$
$L+$ $L-$ $S\pm$ $L-$ rejected $-1$ rejected $+1$
$S-$ $L\pm$ $S+$ $S+$ $-1$ $-1$ rejected rejected
$L-$ $S\pm$ $L+$ $L+$ $-1$ $-1$ rejected rejected
$L\pm$ $S-$ $S+$ $S-$ rejected rejected $-1$ $+1$
$S\pm$ $L-$ $L+$ $L-$ rejected rejected $-1$ $+1$
--------------------------------------------------------------------------------------------------------------------------------
: \[TableII\]$32$ sets of instructions of the LHV model.
[*LHV models for the Franson experiment.—*]{}A LHV theory for the Franson experiment must describe how each of the photons makes two decisions. The $+1/-1$ decision: the decision of a detection to occur at detector $+1$ or at detector $-1$, and the $S/L$ decision: the decision of a detection to occur at time $t_D=t$ or a time $t_D=t+\frac{\Delta {\cal L}}{c}$. Both decisions may be made as late as the detection time $t_D$, and may be based on events in the backward light cones of the detections. In a Franson-type setup both decisions may be based on the corresponding local phase setting at $t_D-t_I$. For a conclusive Bell test, there is no problem if photons make the $+1/-1$ decision based on the local phase setting. The problem is that the $50\%$ postselection procedure should be independent on the phase settings, otherwise the Bell-CHSH inequality (\[CHSH\]) is not valid. In the Franson experiment the phase setting at $t_D-t_I$ can causally affect the decision of a detection of the corresponding photon to occur at time $t_D=t$ or a time $t_D=t+\frac{\Delta {\cal L}}{c}$. If the $S/L$ decision can depend on the phase settings, then, after the $50\%$ postselection procedure, one can formally obtain not only the violations predicted by quantum mechanics, as proven in [@AKLZ99], but any value of $\beta_{\rm CHSH}$, even those forbidden by quantum mechanics. This is proven by constructing a family of explicit LHV models.
Consider the $64$ sets of local instructions in tables \[TableI\] and \[TableII\]. For instance, if the pair of photons follows the first set of local instructions in Table \[TableI\], $(A_0=)S+$, $(A_1=)S+$, $(B_0=)S-$, $(B_1=)L+$, then, if the setting of $\phi_A$ is $A_0$ or $A_1$, photon $1$ will be detected by the detector $a=+1$ at time $t$ (corresponding to the path $S$), and if the setting of $\phi_B$ is $B_0$, photon $2$ will be detected by $b=-1$ at time $t$, but if the setting of $\phi_B$ is $B_1$, photon $2$ will be detected by $b=+1$ at time $t+\frac{\Delta {\cal L}}{c}$ (corresponding to the path $L$). If each of the $32$ sets of instructions in Table \[TableI\] occurs with probability $p/32$, and each of the $32$ sets of instructions in Table \[TableII\] with probability $(1-p)/32$, then it is easy to see that, for any value of $0 \le p \le 1$, the model gives $25\%$ of $SL$ events, $25\%$ of $LS$ events, $50\%$ of $SS$ or $LL$ events, and satisfies (\[Amarginal\]) and (\[Bmarginal\]). If $p=0$, the model gives $\beta_{\rm CHSH}=-4$. If $p=1$, the model gives $\beta_{\rm
CHSH}=4$. If $0 < p < 1$, the model gives any value between $-4 <
\beta_{\rm CHSH} < 4$. Specifically, a maximal quantum violation $\beta_{\rm CHSH} = 2 \sqrt{2}$, satisfying (\[joint\]), is obtained when $p=(2+\sqrt{2})/4$.
The reason why this LHV model is possible is that the $50\%$ postselection procedure in Franson’s experiment allows the subensemble of selected events to depend on the phase settings. For instance, the first $8$ sets of instructions in Table \[TableI\] are rejected only when $\phi_B=B_1$. The main aim of this Letter is to introduce a similar experiment which does not have this problem.
There is a previously proposed solution consisting on replacing the beam splitters $BS_1$ and $BS_2$ in Fig. \[Fig1\] by switchers synchronized with the source [@BGTZ99]. However, these active switchers are replaced in actual experiments by passive beam splitters [@TBZG00; @BGTZ99] that force a Franson-type postselection with the same problem described above.
One way to avoid the problem is to make an extra assumption, namely that the decision of being detected at time $t_D=t$ or a time $t_D=t+\frac{\Delta {\cal L}}{c}$ is actually made at the first beam splitter, before having information of the local phase settings [@AKLZ99; @Franson99]. This assumption is similar to the fair sampling assumption, namely that the probability of rejection does not depend on the measurement settings. As we have seen, there are local models that do not satisfy this assumption. The experiment we propose does not require this extra assumption.
[*Proposed energy-time entanglement Bell experiment.—*]{}The setup of the new Bell experiment is illustrated in Fig. \[Fig2\]. The source emits two photons, photon $1$ to the left and photon $2$ to the right. The $S$ path of photon $1$ (photon $2$) ends on the detectors $a$ on the left ($b$ on the right). The difference with Fig. \[Fig1\] is that now the $L$ path of photon $1$ (photon $2$) ends on the detectors $b$ ($a$). In this setup, the two photons end in different sides only when both are detected in coincidence. If one photon takes $S$ and the other photon takes $L$, both will end on detectors of the same side. An interferometer with this last property is described in [@RVDM08].
The data that the observers must record is the same as in Franson’s experiment. The setup must satisfy the following requirements: (I’) To have two-photon interference, the emission of the two photons must be simultaneous, the moment of emission unpredictable, and both arms of the setup identical. The phase stabilization of the entire setup of Fig. \[Fig2\] is more difficult than in Franson’s experiment. (II’) Single-photon interference is not possible in the setup of Fig. \[Fig2\]. (III’) To temporally distinguish two photons arriving at the same detector at times $t$ and $t+\frac{\Delta {\cal L}'}{c}$, where $\Delta {\cal L}'=2 [d({\rm
Source},BS2)+d(BS2,M1)]$ (see Fig. \[Fig2\]), the dead time of the detectors must be smaller than $\frac{\Delta {\cal L}'}{c}$. For detectors with a dead time of $1$ ns, ${\Delta {\cal L}'} > 30$ cm. (IV’) The probability of two two-photons events in $\frac{\Delta
{\cal L}'}{c}$ must be negligible. This naturally occurs when using standard non-linear crystals pumped continuously. (V’) To prevent that the local phase setting at one side can affect the outcome at the other side, the local phase settings must randomly switch ($\phi_A$ between $A_0$ and $A_1$, and $\phi_B$ between $B_0$ and $B_1$) with a frequency of the order $c/D'$, where $D'=d({\rm
Source},\phi_A)\gg \Delta {\cal L}'$.
There is a trade-off between the phase stabilization of the apparatus (which requires a short interferometer) and the prevention of reciprocal influences between the two local phase settings (which requires a long interferometer). By considering a random phase modulation frequency of 300 kHz, an interferometer about 1 km long would be needed. Current technology allows us to stabilize interferometers of up 4 km long (for instance, one of the interferometers of the LIGO experiment is 4 km long). With these stable interferometers, the experiment would be feasible.
The predictions of quantum mechanics for the setup of Fig. \[Fig2\] are similar to those in Franson’s proposal: Eqs. (\[Amarginal\]) and (\[Bmarginal\]) hold, there is $25\%$ of events in which both photons are detected on the left at times $t$ and $t+\frac{\Delta {\cal L}'}{c}$, $25\%$ of events in which both photons are detected on the right, and $50\%$ of coincident events for which (\[joint\]) holds. The observers must keep the coincident events and reject those giving two detections on detectors of the same side. The main advantages of this setup are: (i) The rejection of events is local and does not require communication between the observers. (ii) The selection and rejection of events is independent of the local phase settings. This is the crucial difference with Franson’s experiment and deserves a detailed examination. First consider a selected event: both photons have been detected at time $t_D$, one in a detector $a$ on the left, and the other in a detector $b$ on the right. $t_I$ is the time a photon takes from $\phi_A$ ($\phi_B$) to a detector $a$ ($b$). The phase setting of $\phi_A$ ($\phi_B$) at $t_D-t_I$ is in the backward light cone of the photon detected in $a$ ($b$), but the point is, could a different value of one or both of the phase settings have caused that this selected event would become a rejected event in which both photons are detected on the same side? The answer is no. This would require a mechanism to make one detection to “wait” until the information about the setting in other side comes. However, when this information has finally arrived, the phase settings (both of them) have changed, so this information is useless to base a decision on it.
Now consider a rejected event. For instance, one in which both photons are detected in the detectors $a$ on the left, one at time $t_D=t$, and the other at $t_D=t+\frac{\Delta {\cal L}'}{c}$. Then, the phase settings of $\phi_B$ at times $t_D-t_I$ are out of the backward light cones of the detected photons. The photons cannot have based their decisions on the phase settings of $\phi_B$. A different value of $\phi_A$ cannot have caused that this rejected event would become a selected event. This would require a mechanism to make one detection to wait until the information about the setting arrives to the other side, and when this information has arrived, the phase setting of $\phi_A$ has changed so this information is useless.
For the proposed setup, there is no physical mechanism preserving locality which can turn a selected (rejected) event into a rejected (selected) event. The selected events are independent of the local phase settings. For the selected events, only the $+1/-1$ decision can depend on the phase settings. This is exactly the assumption under which the Bell-CHSH inequality (\[CHSH\]) is valid. Therefore, an experimental violation of (\[CHSH\]) using the setup of Fig. \[Fig2\] and the postselection procedure described before provides a conclusive (assuming perfect detectors) test of local realism using energy-time (or time-bin) entanglement. Indeed, the proposed setup opens up the possibility of using genuine energy-time or time-bin entanglement for many other quantum information experiments.
The authors thank J.D. Franson, J.-Å. Larsson, T. Rudolph, and M. Żukowski for their comments. This work was supported by Junta de Andalucía Excellence Project No. P06-FQM-02243 and by Finanziamento Ateneo 07 Sapienza Universitá di Roma.
[14]{}
J.D. Franson, Phys. Rev. Lett. [**62**]{}, 2205 (1989).
J.S. Bell, Physics (Long Island City, N.Y.) [**1**]{}, 195 (1964).
J.F. Clauser, M.A. Horne, A. Shimony, and R.A. Holt, Phys. Rev. Lett. [**23**]{}, 880 (1969).
S. Aerts, P.G. Kwiat, J.-Å. Larsson, and M. Żukowski, Phys. Rev. Lett. [**83**]{}, 2872 (1999); [**86**]{}, 1909 (2001).
P.G. Kwiat [*et al.*]{}, Phys. Rev. A [**41**]{}, 2910 (1990); Z.Y. Ou, X.Y. Zou, L.J. Wang, and L. Mandel, Phys. Rev. Lett. [**65**]{}, 321 (1990); J. Brendel, E. Mohler, and W. Martienssen, [*ibid.*]{} [**66**]{}, 1142 (1991); P.G. Kwiat, A.M. Steinberg, and R.Y. Chiao, Phys. Rev. A [**47**]{}, R2472 (1993); P.R. Tapster, J.G. Rarity, and P.C.M. Owens, Phys. Rev. Lett. [**73**]{}, 1923 (1994); W. Tittel, J. Brendel, H. Zbinden, and N. Gisin, Phys. Rev. Lett. [**81**]{}, 3563 (1998).
J.-Å. Larsson, Quantum Inf. Comput. [**2**]{}, 434 (2002).
W. Tittel, J. Brendel, H. Zbinden, and N. Gisin, Phys. Rev. Lett. [**84**]{}, 4737 (2000); G. Ribordy [*et al.*]{}, Phys. Rev. A [**63**]{}, 012309 (2000); R.T. Thew, A. Acín, H. Zbinden, and N. Gisin, Phys. Rev. Lett. [**93**]{}, 010503 (2004); I. Marcikic [*et al.*]{}, [*ibid.*]{} [**93**]{}, 180502 (2004); D. Salart [*et al.*]{}, [*ibid.*]{} [**100**]{}, 220404 (2008).
H. Paul, [*Introduction to Quantum Optics*]{} (Cambridge University Press, Cambridge, England, 2004).
J.C. Garrison and R.Y. Chiao, [*Quantum Optics*]{} (Oxford University Press, Oxford, 2008).
A.K. Ekert, Phys. Rev. Lett. [**67**]{}, 661 (1991); A. Acín, N. Gisin, and L. Masanes, [*ibid.*]{} [**97**]{}, 120405 (2006).
P. Hyllus, O. G[ü]{}hne, D. Bruß, and M. Lewenstein, Phys. Rev. A [**72**]{}, 012321 (2005).
P.G. Kwiat, Phys. Rev. A [**52**]{}, 3380 (1995); D.V. Strekalov [*et al.*]{}, [*ibid.*]{} [**54**]{}, R1 (1996).
J. Brendel, N. Gisin, W. Tittel, and H. Zbinden, Phys. Rev. Lett. [**82**]{}, 2594 (1999).
B.S. Tsirelson, Lett. Math. Phys. [**4**]{}, 93 (1980).
J.D. Franson (private communication). See also, J.D. Franson, Phys. Rev. A [**61**]{}, 012105 (1999).
A. Rossi, G. Vallone, F. De Martini, and P. Mataloni, Phys. Rev. A [**78**]{}, 012345 (2008).
| {
"pile_set_name": "ArXiv"
} |
// mkerrors.sh -m32
// Code generated by the command above; see README.md. DO NOT EDIT.
// +build 386,darwin
// Code generated by cmd/cgo -godefs; DO NOT EDIT.
// cgo -godefs -- -m32 _const.go
package unix
import "syscall"
const (
AF_APPLETALK = 0x10
AF_CCITT = 0xa
AF_CHAOS = 0x5
AF_CNT = 0x15
AF_COIP = 0x14
AF_DATAKIT = 0x9
AF_DECnet = 0xc
AF_DLI = 0xd
AF_E164 = 0x1c
AF_ECMA = 0x8
AF_HYLINK = 0xf
AF_IEEE80211 = 0x25
AF_IMPLINK = 0x3
AF_INET = 0x2
AF_INET6 = 0x1e
AF_IPX = 0x17
AF_ISDN = 0x1c
AF_ISO = 0x7
AF_LAT = 0xe
AF_LINK = 0x12
AF_LOCAL = 0x1
AF_MAX = 0x28
AF_NATM = 0x1f
AF_NDRV = 0x1b
AF_NETBIOS = 0x21
AF_NS = 0x6
AF_OSI = 0x7
AF_PPP = 0x22
AF_PUP = 0x4
AF_RESERVED_36 = 0x24
AF_ROUTE = 0x11
AF_SIP = 0x18
AF_SNA = 0xb
AF_SYSTEM = 0x20
AF_UNIX = 0x1
AF_UNSPEC = 0x0
AF_UTUN = 0x26
ALTWERASE = 0x200
ATTR_BIT_MAP_COUNT = 0x5
ATTR_CMN_ACCESSMASK = 0x20000
ATTR_CMN_ACCTIME = 0x1000
ATTR_CMN_ADDEDTIME = 0x10000000
ATTR_CMN_BKUPTIME = 0x2000
ATTR_CMN_CHGTIME = 0x800
ATTR_CMN_CRTIME = 0x200
ATTR_CMN_DATA_PROTECT_FLAGS = 0x40000000
ATTR_CMN_DEVID = 0x2
ATTR_CMN_DOCUMENT_ID = 0x100000
ATTR_CMN_ERROR = 0x20000000
ATTR_CMN_EXTENDED_SECURITY = 0x400000
ATTR_CMN_FILEID = 0x2000000
ATTR_CMN_FLAGS = 0x40000
ATTR_CMN_FNDRINFO = 0x4000
ATTR_CMN_FSID = 0x4
ATTR_CMN_FULLPATH = 0x8000000
ATTR_CMN_GEN_COUNT = 0x80000
ATTR_CMN_GRPID = 0x10000
ATTR_CMN_GRPUUID = 0x1000000
ATTR_CMN_MODTIME = 0x400
ATTR_CMN_NAME = 0x1
ATTR_CMN_NAMEDATTRCOUNT = 0x80000
ATTR_CMN_NAMEDATTRLIST = 0x100000
ATTR_CMN_OBJID = 0x20
ATTR_CMN_OBJPERMANENTID = 0x40
ATTR_CMN_OBJTAG = 0x10
ATTR_CMN_OBJTYPE = 0x8
ATTR_CMN_OWNERID = 0x8000
ATTR_CMN_PARENTID = 0x4000000
ATTR_CMN_PAROBJID = 0x80
ATTR_CMN_RETURNED_ATTRS = 0x80000000
ATTR_CMN_SCRIPT = 0x100
ATTR_CMN_SETMASK = 0x41c7ff00
ATTR_CMN_USERACCESS = 0x200000
ATTR_CMN_UUID = 0x800000
ATTR_CMN_VALIDMASK = 0xffffffff
ATTR_CMN_VOLSETMASK = 0x6700
ATTR_FILE_ALLOCSIZE = 0x4
ATTR_FILE_CLUMPSIZE = 0x10
ATTR_FILE_DATAALLOCSIZE = 0x400
ATTR_FILE_DATAEXTENTS = 0x800
ATTR_FILE_DATALENGTH = 0x200
ATTR_FILE_DEVTYPE = 0x20
ATTR_FILE_FILETYPE = 0x40
ATTR_FILE_FORKCOUNT = 0x80
ATTR_FILE_FORKLIST = 0x100
ATTR_FILE_IOBLOCKSIZE = 0x8
ATTR_FILE_LINKCOUNT = 0x1
ATTR_FILE_RSRCALLOCSIZE = 0x2000
ATTR_FILE_RSRCEXTENTS = 0x4000
ATTR_FILE_RSRCLENGTH = 0x1000
ATTR_FILE_SETMASK = 0x20
ATTR_FILE_TOTALSIZE = 0x2
ATTR_FILE_VALIDMASK = 0x37ff
ATTR_VOL_ALLOCATIONCLUMP = 0x40
ATTR_VOL_ATTRIBUTES = 0x40000000
ATTR_VOL_CAPABILITIES = 0x20000
ATTR_VOL_DIRCOUNT = 0x400
ATTR_VOL_ENCODINGSUSED = 0x10000
ATTR_VOL_FILECOUNT = 0x200
ATTR_VOL_FSTYPE = 0x1
ATTR_VOL_INFO = 0x80000000
ATTR_VOL_IOBLOCKSIZE = 0x80
ATTR_VOL_MAXOBJCOUNT = 0x800
ATTR_VOL_MINALLOCATION = 0x20
ATTR_VOL_MOUNTEDDEVICE = 0x8000
ATTR_VOL_MOUNTFLAGS = 0x4000
ATTR_VOL_MOUNTPOINT = 0x1000
ATTR_VOL_NAME = 0x2000
ATTR_VOL_OBJCOUNT = 0x100
ATTR_VOL_QUOTA_SIZE = 0x10000000
ATTR_VOL_RESERVED_SIZE = 0x20000000
ATTR_VOL_SETMASK = 0x80002000
ATTR_VOL_SIGNATURE = 0x2
ATTR_VOL_SIZE = 0x4
ATTR_VOL_SPACEAVAIL = 0x10
ATTR_VOL_SPACEFREE = 0x8
ATTR_VOL_UUID = 0x40000
ATTR_VOL_VALIDMASK = 0xf007ffff
B0 = 0x0
B110 = 0x6e
B115200 = 0x1c200
B1200 = 0x4b0
B134 = 0x86
B14400 = 0x3840
B150 = 0x96
B1800 = 0x708
B19200 = 0x4b00
B200 = 0xc8
B230400 = 0x38400
B2400 = 0x960
B28800 = 0x7080
B300 = 0x12c
B38400 = 0x9600
B4800 = 0x12c0
B50 = 0x32
B57600 = 0xe100
B600 = 0x258
B7200 = 0x1c20
B75 = 0x4b
B76800 = 0x12c00
B9600 = 0x2580
BIOCFLUSH = 0x20004268
BIOCGBLEN = 0x40044266
BIOCGDLT = 0x4004426a
BIOCGDLTLIST = 0xc00c4279
BIOCGETIF = 0x4020426b
BIOCGHDRCMPLT = 0x40044274
BIOCGRSIG = 0x40044272
BIOCGRTIMEOUT = 0x4008426e
BIOCGSEESENT = 0x40044276
BIOCGSTATS = 0x4008426f
BIOCIMMEDIATE = 0x80044270
BIOCPROMISC = 0x20004269
BIOCSBLEN = 0xc0044266
BIOCSDLT = 0x80044278
BIOCSETF = 0x80084267
BIOCSETFNR = 0x8008427e
BIOCSETIF = 0x8020426c
BIOCSHDRCMPLT = 0x80044275
BIOCSRSIG = 0x80044273
BIOCSRTIMEOUT = 0x8008426d
BIOCSSEESENT = 0x80044277
BIOCVERSION = 0x40044271
BPF_A = 0x10
BPF_ABS = 0x20
BPF_ADD = 0x0
BPF_ALIGNMENT = 0x4
BPF_ALU = 0x4
BPF_AND = 0x50
BPF_B = 0x10
BPF_DIV = 0x30
BPF_H = 0x8
BPF_IMM = 0x0
BPF_IND = 0x40
BPF_JA = 0x0
BPF_JEQ = 0x10
BPF_JGE = 0x30
BPF_JGT = 0x20
BPF_JMP = 0x5
BPF_JSET = 0x40
BPF_K = 0x0
BPF_LD = 0x0
BPF_LDX = 0x1
BPF_LEN = 0x80
BPF_LSH = 0x60
BPF_MAJOR_VERSION = 0x1
BPF_MAXBUFSIZE = 0x80000
BPF_MAXINSNS = 0x200
BPF_MEM = 0x60
BPF_MEMWORDS = 0x10
BPF_MINBUFSIZE = 0x20
BPF_MINOR_VERSION = 0x1
BPF_MISC = 0x7
BPF_MSH = 0xa0
BPF_MUL = 0x20
BPF_NEG = 0x80
BPF_OR = 0x40
BPF_RELEASE = 0x30bb6
BPF_RET = 0x6
BPF_RSH = 0x70
BPF_ST = 0x2
BPF_STX = 0x3
BPF_SUB = 0x10
BPF_TAX = 0x0
BPF_TXA = 0x80
BPF_W = 0x0
BPF_X = 0x8
BRKINT = 0x2
BS0 = 0x0
BS1 = 0x8000
BSDLY = 0x8000
CFLUSH = 0xf
CLOCAL = 0x8000
CLOCK_MONOTONIC = 0x6
CLOCK_MONOTONIC_RAW = 0x4
CLOCK_MONOTONIC_RAW_APPROX = 0x5
CLOCK_PROCESS_CPUTIME_ID = 0xc
CLOCK_REALTIME = 0x0
CLOCK_THREAD_CPUTIME_ID = 0x10
CLOCK_UPTIME_RAW = 0x8
CLOCK_UPTIME_RAW_APPROX = 0x9
CR0 = 0x0
CR1 = 0x1000
CR2 = 0x2000
CR3 = 0x3000
CRDLY = 0x3000
CREAD = 0x800
CRTSCTS = 0x30000
CS5 = 0x0
CS6 = 0x100
CS7 = 0x200
CS8 = 0x300
CSIZE = 0x300
CSTART = 0x11
CSTATUS = 0x14
CSTOP = 0x13
CSTOPB = 0x400
CSUSP = 0x1a
CTL_HW = 0x6
CTL_KERN = 0x1
CTL_MAXNAME = 0xc
CTL_NET = 0x4
DLT_A429 = 0xb8
DLT_A653_ICM = 0xb9
DLT_AIRONET_HEADER = 0x78
DLT_AOS = 0xde
DLT_APPLE_IP_OVER_IEEE1394 = 0x8a
DLT_ARCNET = 0x7
DLT_ARCNET_LINUX = 0x81
DLT_ATM_CLIP = 0x13
DLT_ATM_RFC1483 = 0xb
DLT_AURORA = 0x7e
DLT_AX25 = 0x3
DLT_AX25_KISS = 0xca
DLT_BACNET_MS_TP = 0xa5
DLT_BLUETOOTH_HCI_H4 = 0xbb
DLT_BLUETOOTH_HCI_H4_WITH_PHDR = 0xc9
DLT_CAN20B = 0xbe
DLT_CAN_SOCKETCAN = 0xe3
DLT_CHAOS = 0x5
DLT_CHDLC = 0x68
DLT_CISCO_IOS = 0x76
DLT_C_HDLC = 0x68
DLT_C_HDLC_WITH_DIR = 0xcd
DLT_DBUS = 0xe7
DLT_DECT = 0xdd
DLT_DOCSIS = 0x8f
DLT_DVB_CI = 0xeb
DLT_ECONET = 0x73
DLT_EN10MB = 0x1
DLT_EN3MB = 0x2
DLT_ENC = 0x6d
DLT_ERF = 0xc5
DLT_ERF_ETH = 0xaf
DLT_ERF_POS = 0xb0
DLT_FC_2 = 0xe0
DLT_FC_2_WITH_FRAME_DELIMS = 0xe1
DLT_FDDI = 0xa
DLT_FLEXRAY = 0xd2
DLT_FRELAY = 0x6b
DLT_FRELAY_WITH_DIR = 0xce
DLT_GCOM_SERIAL = 0xad
DLT_GCOM_T1E1 = 0xac
DLT_GPF_F = 0xab
DLT_GPF_T = 0xaa
DLT_GPRS_LLC = 0xa9
DLT_GSMTAP_ABIS = 0xda
DLT_GSMTAP_UM = 0xd9
DLT_HHDLC = 0x79
DLT_IBM_SN = 0x92
DLT_IBM_SP = 0x91
DLT_IEEE802 = 0x6
DLT_IEEE802_11 = 0x69
DLT_IEEE802_11_RADIO = 0x7f
DLT_IEEE802_11_RADIO_AVS = 0xa3
DLT_IEEE802_15_4 = 0xc3
DLT_IEEE802_15_4_LINUX = 0xbf
DLT_IEEE802_15_4_NOFCS = 0xe6
DLT_IEEE802_15_4_NONASK_PHY = 0xd7
DLT_IEEE802_16_MAC_CPS = 0xbc
DLT_IEEE802_16_MAC_CPS_RADIO = 0xc1
DLT_IPFILTER = 0x74
DLT_IPMB = 0xc7
DLT_IPMB_LINUX = 0xd1
DLT_IPNET = 0xe2
DLT_IPOIB = 0xf2
DLT_IPV4 = 0xe4
DLT_IPV6 = 0xe5
DLT_IP_OVER_FC = 0x7a
DLT_JUNIPER_ATM1 = 0x89
DLT_JUNIPER_ATM2 = 0x87
DLT_JUNIPER_ATM_CEMIC = 0xee
DLT_JUNIPER_CHDLC = 0xb5
DLT_JUNIPER_ES = 0x84
DLT_JUNIPER_ETHER = 0xb2
DLT_JUNIPER_FIBRECHANNEL = 0xea
DLT_JUNIPER_FRELAY = 0xb4
DLT_JUNIPER_GGSN = 0x85
DLT_JUNIPER_ISM = 0xc2
DLT_JUNIPER_MFR = 0x86
DLT_JUNIPER_MLFR = 0x83
DLT_JUNIPER_MLPPP = 0x82
DLT_JUNIPER_MONITOR = 0xa4
DLT_JUNIPER_PIC_PEER = 0xae
DLT_JUNIPER_PPP = 0xb3
DLT_JUNIPER_PPPOE = 0xa7
DLT_JUNIPER_PPPOE_ATM = 0xa8
DLT_JUNIPER_SERVICES = 0x88
DLT_JUNIPER_SRX_E2E = 0xe9
DLT_JUNIPER_ST = 0xc8
DLT_JUNIPER_VP = 0xb7
DLT_JUNIPER_VS = 0xe8
DLT_LAPB_WITH_DIR = 0xcf
DLT_LAPD = 0xcb
DLT_LIN = 0xd4
DLT_LINUX_EVDEV = 0xd8
DLT_LINUX_IRDA = 0x90
DLT_LINUX_LAPD = 0xb1
DLT_LINUX_PPP_WITHDIRECTION = 0xa6
DLT_LINUX_SLL = 0x71
DLT_LOOP = 0x6c
DLT_LTALK = 0x72
DLT_MATCHING_MAX = 0xf5
DLT_MATCHING_MIN = 0x68
DLT_MFR = 0xb6
DLT_MOST = 0xd3
DLT_MPEG_2_TS = 0xf3
DLT_MPLS = 0xdb
DLT_MTP2 = 0x8c
DLT_MTP2_WITH_PHDR = 0x8b
DLT_MTP3 = 0x8d
DLT_MUX27010 = 0xec
DLT_NETANALYZER = 0xf0
DLT_NETANALYZER_TRANSPARENT = 0xf1
DLT_NFC_LLCP = 0xf5
DLT_NFLOG = 0xef
DLT_NG40 = 0xf4
DLT_NULL = 0x0
DLT_PCI_EXP = 0x7d
DLT_PFLOG = 0x75
DLT_PFSYNC = 0x12
DLT_PPI = 0xc0
DLT_PPP = 0x9
DLT_PPP_BSDOS = 0x10
DLT_PPP_ETHER = 0x33
DLT_PPP_PPPD = 0xa6
DLT_PPP_SERIAL = 0x32
DLT_PPP_WITH_DIR = 0xcc
DLT_PPP_WITH_DIRECTION = 0xa6
DLT_PRISM_HEADER = 0x77
DLT_PRONET = 0x4
DLT_RAIF1 = 0xc6
DLT_RAW = 0xc
DLT_RIO = 0x7c
DLT_SCCP = 0x8e
DLT_SITA = 0xc4
DLT_SLIP = 0x8
DLT_SLIP_BSDOS = 0xf
DLT_STANAG_5066_D_PDU = 0xed
DLT_SUNATM = 0x7b
DLT_SYMANTEC_FIREWALL = 0x63
DLT_TZSP = 0x80
DLT_USB = 0xba
DLT_USB_LINUX = 0xbd
DLT_USB_LINUX_MMAPPED = 0xdc
DLT_USER0 = 0x93
DLT_USER1 = 0x94
DLT_USER10 = 0x9d
DLT_USER11 = 0x9e
DLT_USER12 = 0x9f
DLT_USER13 = 0xa0
DLT_USER14 = 0xa1
DLT_USER15 = 0xa2
DLT_USER2 = 0x95
DLT_USER3 = 0x96
DLT_USER4 = 0x97
DLT_USER5 = 0x98
DLT_USER6 = 0x99
DLT_USER7 = 0x9a
DLT_USER8 = 0x9b
DLT_USER9 = 0x9c
DLT_WIHART = 0xdf
DLT_X2E_SERIAL = 0xd5
DLT_X2E_XORAYA = 0xd6
DT_BLK = 0x6
DT_CHR = 0x2
DT_DIR = 0x4
DT_FIFO = 0x1
DT_LNK = 0xa
DT_REG = 0x8
DT_SOCK = 0xc
DT_UNKNOWN = 0x0
DT_WHT = 0xe
ECHO = 0x8
ECHOCTL = 0x40
ECHOE = 0x2
ECHOK = 0x4
ECHOKE = 0x1
ECHONL = 0x10
ECHOPRT = 0x20
EVFILT_AIO = -0x3
EVFILT_EXCEPT = -0xf
EVFILT_FS = -0x9
EVFILT_MACHPORT = -0x8
EVFILT_PROC = -0x5
EVFILT_READ = -0x1
EVFILT_SIGNAL = -0x6
EVFILT_SYSCOUNT = 0xf
EVFILT_THREADMARKER = 0xf
EVFILT_TIMER = -0x7
EVFILT_USER = -0xa
EVFILT_VM = -0xc
EVFILT_VNODE = -0x4
EVFILT_WRITE = -0x2
EV_ADD = 0x1
EV_CLEAR = 0x20
EV_DELETE = 0x2
EV_DISABLE = 0x8
EV_DISPATCH = 0x80
EV_DISPATCH2 = 0x180
EV_ENABLE = 0x4
EV_EOF = 0x8000
EV_ERROR = 0x4000
EV_FLAG0 = 0x1000
EV_FLAG1 = 0x2000
EV_ONESHOT = 0x10
EV_OOBAND = 0x2000
EV_POLL = 0x1000
EV_RECEIPT = 0x40
EV_SYSFLAGS = 0xf000
EV_UDATA_SPECIFIC = 0x100
EV_VANISHED = 0x200
EXTA = 0x4b00
EXTB = 0x9600
EXTPROC = 0x800
FD_CLOEXEC = 0x1
FD_SETSIZE = 0x400
FF0 = 0x0
FF1 = 0x4000
FFDLY = 0x4000
FLUSHO = 0x800000
FSOPT_ATTR_CMN_EXTENDED = 0x20
FSOPT_NOFOLLOW = 0x1
FSOPT_NOINMEMUPDATE = 0x2
FSOPT_PACK_INVAL_ATTRS = 0x8
FSOPT_REPORT_FULLSIZE = 0x4
F_ADDFILESIGS = 0x3d
F_ADDFILESIGS_FOR_DYLD_SIM = 0x53
F_ADDFILESIGS_RETURN = 0x61
F_ADDSIGS = 0x3b
F_ALLOCATEALL = 0x4
F_ALLOCATECONTIG = 0x2
F_BARRIERFSYNC = 0x55
F_CHECK_LV = 0x62
F_CHKCLEAN = 0x29
F_DUPFD = 0x0
F_DUPFD_CLOEXEC = 0x43
F_FINDSIGS = 0x4e
F_FLUSH_DATA = 0x28
F_FREEZE_FS = 0x35
F_FULLFSYNC = 0x33
F_GETCODEDIR = 0x48
F_GETFD = 0x1
F_GETFL = 0x3
F_GETLK = 0x7
F_GETLKPID = 0x42
F_GETNOSIGPIPE = 0x4a
F_GETOWN = 0x5
F_GETPATH = 0x32
F_GETPATH_MTMINFO = 0x47
F_GETPROTECTIONCLASS = 0x3f
F_GETPROTECTIONLEVEL = 0x4d
F_GLOBAL_NOCACHE = 0x37
F_LOG2PHYS = 0x31
F_LOG2PHYS_EXT = 0x41
F_NOCACHE = 0x30
F_NODIRECT = 0x3e
F_OK = 0x0
F_PATHPKG_CHECK = 0x34
F_PEOFPOSMODE = 0x3
F_PREALLOCATE = 0x2a
F_PUNCHHOLE = 0x63
F_RDADVISE = 0x2c
F_RDAHEAD = 0x2d
F_RDLCK = 0x1
F_SETBACKINGSTORE = 0x46
F_SETFD = 0x2
F_SETFL = 0x4
F_SETLK = 0x8
F_SETLKW = 0x9
F_SETLKWTIMEOUT = 0xa
F_SETNOSIGPIPE = 0x49
F_SETOWN = 0x6
F_SETPROTECTIONCLASS = 0x40
F_SETSIZE = 0x2b
F_SINGLE_WRITER = 0x4c
F_THAW_FS = 0x36
F_TRANSCODEKEY = 0x4b
F_TRIM_ACTIVE_FILE = 0x64
F_UNLCK = 0x2
F_VOLPOSMODE = 0x4
F_WRLCK = 0x3
HUPCL = 0x4000
HW_MACHINE = 0x1
ICANON = 0x100
ICMP6_FILTER = 0x12
ICRNL = 0x100
IEXTEN = 0x400
IFF_ALLMULTI = 0x200
IFF_ALTPHYS = 0x4000
IFF_BROADCAST = 0x2
IFF_DEBUG = 0x4
IFF_LINK0 = 0x1000
IFF_LINK1 = 0x2000
IFF_LINK2 = 0x4000
IFF_LOOPBACK = 0x8
IFF_MULTICAST = 0x8000
IFF_NOARP = 0x80
IFF_NOTRAILERS = 0x20
IFF_OACTIVE = 0x400
IFF_POINTOPOINT = 0x10
IFF_PROMISC = 0x100
IFF_RUNNING = 0x40
IFF_SIMPLEX = 0x800
IFF_UP = 0x1
IFNAMSIZ = 0x10
IFT_1822 = 0x2
IFT_AAL5 = 0x31
IFT_ARCNET = 0x23
IFT_ARCNETPLUS = 0x24
IFT_ATM = 0x25
IFT_BRIDGE = 0xd1
IFT_CARP = 0xf8
IFT_CELLULAR = 0xff
IFT_CEPT = 0x13
IFT_DS3 = 0x1e
IFT_ENC = 0xf4
IFT_EON = 0x19
IFT_ETHER = 0x6
IFT_FAITH = 0x38
IFT_FDDI = 0xf
IFT_FRELAY = 0x20
IFT_FRELAYDCE = 0x2c
IFT_GIF = 0x37
IFT_HDH1822 = 0x3
IFT_HIPPI = 0x2f
IFT_HSSI = 0x2e
IFT_HY = 0xe
IFT_IEEE1394 = 0x90
IFT_IEEE8023ADLAG = 0x88
IFT_ISDNBASIC = 0x14
IFT_ISDNPRIMARY = 0x15
IFT_ISO88022LLC = 0x29
IFT_ISO88023 = 0x7
IFT_ISO88024 = 0x8
IFT_ISO88025 = 0x9
IFT_ISO88026 = 0xa
IFT_L2VLAN = 0x87
IFT_LAPB = 0x10
IFT_LOCALTALK = 0x2a
IFT_LOOP = 0x18
IFT_MIOX25 = 0x26
IFT_MODEM = 0x30
IFT_NSIP = 0x1b
IFT_OTHER = 0x1
IFT_P10 = 0xc
IFT_P80 = 0xd
IFT_PARA = 0x22
IFT_PDP = 0xff
IFT_PFLOG = 0xf5
IFT_PFSYNC = 0xf6
IFT_PKTAP = 0xfe
IFT_PPP = 0x17
IFT_PROPMUX = 0x36
IFT_PROPVIRTUAL = 0x35
IFT_PTPSERIAL = 0x16
IFT_RS232 = 0x21
IFT_SDLC = 0x11
IFT_SIP = 0x1f
IFT_SLIP = 0x1c
IFT_SMDSDXI = 0x2b
IFT_SMDSICIP = 0x34
IFT_SONET = 0x27
IFT_SONETPATH = 0x32
IFT_SONETVT = 0x33
IFT_STARLAN = 0xb
IFT_STF = 0x39
IFT_T1 = 0x12
IFT_ULTRA = 0x1d
IFT_V35 = 0x2d
IFT_X25 = 0x5
IFT_X25DDN = 0x4
IFT_X25PLE = 0x28
IFT_XETHER = 0x1a
IGNBRK = 0x1
IGNCR = 0x80
IGNPAR = 0x4
IMAXBEL = 0x2000
INLCR = 0x40
INPCK = 0x10
IN_CLASSA_HOST = 0xffffff
IN_CLASSA_MAX = 0x80
IN_CLASSA_NET = 0xff000000
IN_CLASSA_NSHIFT = 0x18
IN_CLASSB_HOST = 0xffff
IN_CLASSB_MAX = 0x10000
IN_CLASSB_NET = 0xffff0000
IN_CLASSB_NSHIFT = 0x10
IN_CLASSC_HOST = 0xff
IN_CLASSC_NET = 0xffffff00
IN_CLASSC_NSHIFT = 0x8
IN_CLASSD_HOST = 0xfffffff
IN_CLASSD_NET = 0xf0000000
IN_CLASSD_NSHIFT = 0x1c
IN_LINKLOCALNETNUM = 0xa9fe0000
IN_LOOPBACKNET = 0x7f
IPPROTO_3PC = 0x22
IPPROTO_ADFS = 0x44
IPPROTO_AH = 0x33
IPPROTO_AHIP = 0x3d
IPPROTO_APES = 0x63
IPPROTO_ARGUS = 0xd
IPPROTO_AX25 = 0x5d
IPPROTO_BHA = 0x31
IPPROTO_BLT = 0x1e
IPPROTO_BRSATMON = 0x4c
IPPROTO_CFTP = 0x3e
IPPROTO_CHAOS = 0x10
IPPROTO_CMTP = 0x26
IPPROTO_CPHB = 0x49
IPPROTO_CPNX = 0x48
IPPROTO_DDP = 0x25
IPPROTO_DGP = 0x56
IPPROTO_DIVERT = 0xfe
IPPROTO_DONE = 0x101
IPPROTO_DSTOPTS = 0x3c
IPPROTO_EGP = 0x8
IPPROTO_EMCON = 0xe
IPPROTO_ENCAP = 0x62
IPPROTO_EON = 0x50
IPPROTO_ESP = 0x32
IPPROTO_ETHERIP = 0x61
IPPROTO_FRAGMENT = 0x2c
IPPROTO_GGP = 0x3
IPPROTO_GMTP = 0x64
IPPROTO_GRE = 0x2f
IPPROTO_HELLO = 0x3f
IPPROTO_HMP = 0x14
IPPROTO_HOPOPTS = 0x0
IPPROTO_ICMP = 0x1
IPPROTO_ICMPV6 = 0x3a
IPPROTO_IDP = 0x16
IPPROTO_IDPR = 0x23
IPPROTO_IDRP = 0x2d
IPPROTO_IGMP = 0x2
IPPROTO_IGP = 0x55
IPPROTO_IGRP = 0x58
IPPROTO_IL = 0x28
IPPROTO_INLSP = 0x34
IPPROTO_INP = 0x20
IPPROTO_IP = 0x0
IPPROTO_IPCOMP = 0x6c
IPPROTO_IPCV = 0x47
IPPROTO_IPEIP = 0x5e
IPPROTO_IPIP = 0x4
IPPROTO_IPPC = 0x43
IPPROTO_IPV4 = 0x4
IPPROTO_IPV6 = 0x29
IPPROTO_IRTP = 0x1c
IPPROTO_KRYPTOLAN = 0x41
IPPROTO_LARP = 0x5b
IPPROTO_LEAF1 = 0x19
IPPROTO_LEAF2 = 0x1a
IPPROTO_MAX = 0x100
IPPROTO_MAXID = 0x34
IPPROTO_MEAS = 0x13
IPPROTO_MHRP = 0x30
IPPROTO_MICP = 0x5f
IPPROTO_MTP = 0x5c
IPPROTO_MUX = 0x12
IPPROTO_ND = 0x4d
IPPROTO_NHRP = 0x36
IPPROTO_NONE = 0x3b
IPPROTO_NSP = 0x1f
IPPROTO_NVPII = 0xb
IPPROTO_OSPFIGP = 0x59
IPPROTO_PGM = 0x71
IPPROTO_PIGP = 0x9
IPPROTO_PIM = 0x67
IPPROTO_PRM = 0x15
IPPROTO_PUP = 0xc
IPPROTO_PVP = 0x4b
IPPROTO_RAW = 0xff
IPPROTO_RCCMON = 0xa
IPPROTO_RDP = 0x1b
IPPROTO_ROUTING = 0x2b
IPPROTO_RSVP = 0x2e
IPPROTO_RVD = 0x42
IPPROTO_SATEXPAK = 0x40
IPPROTO_SATMON = 0x45
IPPROTO_SCCSP = 0x60
IPPROTO_SCTP = 0x84
IPPROTO_SDRP = 0x2a
IPPROTO_SEP = 0x21
IPPROTO_SRPC = 0x5a
IPPROTO_ST = 0x7
IPPROTO_SVMTP = 0x52
IPPROTO_SWIPE = 0x35
IPPROTO_TCF = 0x57
IPPROTO_TCP = 0x6
IPPROTO_TP = 0x1d
IPPROTO_TPXX = 0x27
IPPROTO_TRUNK1 = 0x17
IPPROTO_TRUNK2 = 0x18
IPPROTO_TTP = 0x54
IPPROTO_UDP = 0x11
IPPROTO_VINES = 0x53
IPPROTO_VISA = 0x46
IPPROTO_VMTP = 0x51
IPPROTO_WBEXPAK = 0x4f
IPPROTO_WBMON = 0x4e
IPPROTO_WSN = 0x4a
IPPROTO_XNET = 0xf
IPPROTO_XTP = 0x24
IPV6_2292DSTOPTS = 0x17
IPV6_2292HOPLIMIT = 0x14
IPV6_2292HOPOPTS = 0x16
IPV6_2292NEXTHOP = 0x15
IPV6_2292PKTINFO = 0x13
IPV6_2292PKTOPTIONS = 0x19
IPV6_2292RTHDR = 0x18
IPV6_BINDV6ONLY = 0x1b
IPV6_BOUND_IF = 0x7d
IPV6_CHECKSUM = 0x1a
IPV6_DEFAULT_MULTICAST_HOPS = 0x1
IPV6_DEFAULT_MULTICAST_LOOP = 0x1
IPV6_DEFHLIM = 0x40
IPV6_FAITH = 0x1d
IPV6_FLOWINFO_MASK = 0xffffff0f
IPV6_FLOWLABEL_MASK = 0xffff0f00
IPV6_FLOW_ECN_MASK = 0x300
IPV6_FRAGTTL = 0x3c
IPV6_FW_ADD = 0x1e
IPV6_FW_DEL = 0x1f
IPV6_FW_FLUSH = 0x20
IPV6_FW_GET = 0x22
IPV6_FW_ZERO = 0x21
IPV6_HLIMDEC = 0x1
IPV6_IPSEC_POLICY = 0x1c
IPV6_JOIN_GROUP = 0xc
IPV6_LEAVE_GROUP = 0xd
IPV6_MAXHLIM = 0xff
IPV6_MAXOPTHDR = 0x800
IPV6_MAXPACKET = 0xffff
IPV6_MAX_GROUP_SRC_FILTER = 0x200
IPV6_MAX_MEMBERSHIPS = 0xfff
IPV6_MAX_SOCK_SRC_FILTER = 0x80
IPV6_MIN_MEMBERSHIPS = 0x1f
IPV6_MMTU = 0x500
IPV6_MULTICAST_HOPS = 0xa
IPV6_MULTICAST_IF = 0x9
IPV6_MULTICAST_LOOP = 0xb
IPV6_PORTRANGE = 0xe
IPV6_PORTRANGE_DEFAULT = 0x0
IPV6_PORTRANGE_HIGH = 0x1
IPV6_PORTRANGE_LOW = 0x2
IPV6_RECVTCLASS = 0x23
IPV6_RTHDR_LOOSE = 0x0
IPV6_RTHDR_STRICT = 0x1
IPV6_RTHDR_TYPE_0 = 0x0
IPV6_SOCKOPT_RESERVED1 = 0x3
IPV6_TCLASS = 0x24
IPV6_UNICAST_HOPS = 0x4
IPV6_V6ONLY = 0x1b
IPV6_VERSION = 0x60
IPV6_VERSION_MASK = 0xf0
IP_ADD_MEMBERSHIP = 0xc
IP_ADD_SOURCE_MEMBERSHIP = 0x46
IP_BLOCK_SOURCE = 0x48
IP_BOUND_IF = 0x19
IP_DEFAULT_MULTICAST_LOOP = 0x1
IP_DEFAULT_MULTICAST_TTL = 0x1
IP_DF = 0x4000
IP_DROP_MEMBERSHIP = 0xd
IP_DROP_SOURCE_MEMBERSHIP = 0x47
IP_DUMMYNET_CONFIGURE = 0x3c
IP_DUMMYNET_DEL = 0x3d
IP_DUMMYNET_FLUSH = 0x3e
IP_DUMMYNET_GET = 0x40
IP_FAITH = 0x16
IP_FW_ADD = 0x28
IP_FW_DEL = 0x29
IP_FW_FLUSH = 0x2a
IP_FW_GET = 0x2c
IP_FW_RESETLOG = 0x2d
IP_FW_ZERO = 0x2b
IP_HDRINCL = 0x2
IP_IPSEC_POLICY = 0x15
IP_MAXPACKET = 0xffff
IP_MAX_GROUP_SRC_FILTER = 0x200
IP_MAX_MEMBERSHIPS = 0xfff
IP_MAX_SOCK_MUTE_FILTER = 0x80
IP_MAX_SOCK_SRC_FILTER = 0x80
IP_MF = 0x2000
IP_MIN_MEMBERSHIPS = 0x1f
IP_MSFILTER = 0x4a
IP_MSS = 0x240
IP_MULTICAST_IF = 0x9
IP_MULTICAST_IFINDEX = 0x42
IP_MULTICAST_LOOP = 0xb
IP_MULTICAST_TTL = 0xa
IP_MULTICAST_VIF = 0xe
IP_NAT__XXX = 0x37
IP_OFFMASK = 0x1fff
IP_OLD_FW_ADD = 0x32
IP_OLD_FW_DEL = 0x33
IP_OLD_FW_FLUSH = 0x34
IP_OLD_FW_GET = 0x36
IP_OLD_FW_RESETLOG = 0x38
IP_OLD_FW_ZERO = 0x35
IP_OPTIONS = 0x1
IP_PKTINFO = 0x1a
IP_PORTRANGE = 0x13
IP_PORTRANGE_DEFAULT = 0x0
IP_PORTRANGE_HIGH = 0x1
IP_PORTRANGE_LOW = 0x2
IP_RECVDSTADDR = 0x7
IP_RECVIF = 0x14
IP_RECVOPTS = 0x5
IP_RECVPKTINFO = 0x1a
IP_RECVRETOPTS = 0x6
IP_RECVTOS = 0x1b
IP_RECVTTL = 0x18
IP_RETOPTS = 0x8
IP_RF = 0x8000
IP_RSVP_OFF = 0x10
IP_RSVP_ON = 0xf
IP_RSVP_VIF_OFF = 0x12
IP_RSVP_VIF_ON = 0x11
IP_STRIPHDR = 0x17
IP_TOS = 0x3
IP_TRAFFIC_MGT_BACKGROUND = 0x41
IP_TTL = 0x4
IP_UNBLOCK_SOURCE = 0x49
ISIG = 0x80
ISTRIP = 0x20
IUTF8 = 0x4000
IXANY = 0x800
IXOFF = 0x400
IXON = 0x200
KERN_HOSTNAME = 0xa
KERN_OSRELEASE = 0x2
KERN_OSTYPE = 0x1
KERN_VERSION = 0x4
LOCK_EX = 0x2
LOCK_NB = 0x4
LOCK_SH = 0x1
LOCK_UN = 0x8
MADV_CAN_REUSE = 0x9
MADV_DONTNEED = 0x4
MADV_FREE = 0x5
MADV_FREE_REUSABLE = 0x7
MADV_FREE_REUSE = 0x8
MADV_NORMAL = 0x0
MADV_PAGEOUT = 0xa
MADV_RANDOM = 0x1
MADV_SEQUENTIAL = 0x2
MADV_WILLNEED = 0x3
MADV_ZERO_WIRED_PAGES = 0x6
MAP_ANON = 0x1000
MAP_ANONYMOUS = 0x1000
MAP_COPY = 0x2
MAP_FILE = 0x0
MAP_FIXED = 0x10
MAP_HASSEMAPHORE = 0x200
MAP_JIT = 0x800
MAP_NOCACHE = 0x400
MAP_NOEXTEND = 0x100
MAP_NORESERVE = 0x40
MAP_PRIVATE = 0x2
MAP_RENAME = 0x20
MAP_RESERVED0080 = 0x80
MAP_RESILIENT_CODESIGN = 0x2000
MAP_RESILIENT_MEDIA = 0x4000
MAP_SHARED = 0x1
MCL_CURRENT = 0x1
MCL_FUTURE = 0x2
MNT_ASYNC = 0x40
MNT_AUTOMOUNTED = 0x400000
MNT_CMDFLAGS = 0xf0000
MNT_CPROTECT = 0x80
MNT_DEFWRITE = 0x2000000
MNT_DONTBROWSE = 0x100000
MNT_DOVOLFS = 0x8000
MNT_DWAIT = 0x4
MNT_EXPORTED = 0x100
MNT_FORCE = 0x80000
MNT_IGNORE_OWNERSHIP = 0x200000
MNT_JOURNALED = 0x800000
MNT_LOCAL = 0x1000
MNT_MULTILABEL = 0x4000000
MNT_NOATIME = 0x10000000
MNT_NOBLOCK = 0x20000
MNT_NODEV = 0x10
MNT_NOEXEC = 0x4
MNT_NOSUID = 0x8
MNT_NOUSERXATTR = 0x1000000
MNT_NOWAIT = 0x2
MNT_QUARANTINE = 0x400
MNT_QUOTA = 0x2000
MNT_RDONLY = 0x1
MNT_RELOAD = 0x40000
MNT_ROOTFS = 0x4000
MNT_SYNCHRONOUS = 0x2
MNT_UNION = 0x20
MNT_UNKNOWNPERMISSIONS = 0x200000
MNT_UPDATE = 0x10000
MNT_VISFLAGMASK = 0x17f0f5ff
MNT_WAIT = 0x1
MSG_CTRUNC = 0x20
MSG_DONTROUTE = 0x4
MSG_DONTWAIT = 0x80
MSG_EOF = 0x100
MSG_EOR = 0x8
MSG_FLUSH = 0x400
MSG_HAVEMORE = 0x2000
MSG_HOLD = 0x800
MSG_NEEDSA = 0x10000
MSG_OOB = 0x1
MSG_PEEK = 0x2
MSG_RCVMORE = 0x4000
MSG_SEND = 0x1000
MSG_TRUNC = 0x10
MSG_WAITALL = 0x40
MSG_WAITSTREAM = 0x200
MS_ASYNC = 0x1
MS_DEACTIVATE = 0x8
MS_INVALIDATE = 0x2
MS_KILLPAGES = 0x4
MS_SYNC = 0x10
NAME_MAX = 0xff
NET_RT_DUMP = 0x1
NET_RT_DUMP2 = 0x7
NET_RT_FLAGS = 0x2
NET_RT_IFLIST = 0x3
NET_RT_IFLIST2 = 0x6
NET_RT_MAXID = 0xa
NET_RT_STAT = 0x4
NET_RT_TRASH = 0x5
NFDBITS = 0x20
NL0 = 0x0
NL1 = 0x100
NL2 = 0x200
NL3 = 0x300
NLDLY = 0x300
NOFLSH = 0x80000000
NOKERNINFO = 0x2000000
NOTE_ABSOLUTE = 0x8
NOTE_ATTRIB = 0x8
NOTE_BACKGROUND = 0x40
NOTE_CHILD = 0x4
NOTE_CRITICAL = 0x20
NOTE_DELETE = 0x1
NOTE_EXEC = 0x20000000
NOTE_EXIT = 0x80000000
NOTE_EXITSTATUS = 0x4000000
NOTE_EXIT_CSERROR = 0x40000
NOTE_EXIT_DECRYPTFAIL = 0x10000
NOTE_EXIT_DETAIL = 0x2000000
NOTE_EXIT_DETAIL_MASK = 0x70000
NOTE_EXIT_MEMORY = 0x20000
NOTE_EXIT_REPARENTED = 0x80000
NOTE_EXTEND = 0x4
NOTE_FFAND = 0x40000000
NOTE_FFCOPY = 0xc0000000
NOTE_FFCTRLMASK = 0xc0000000
NOTE_FFLAGSMASK = 0xffffff
NOTE_FFNOP = 0x0
NOTE_FFOR = 0x80000000
NOTE_FORK = 0x40000000
NOTE_FUNLOCK = 0x100
NOTE_LEEWAY = 0x10
NOTE_LINK = 0x10
NOTE_LOWAT = 0x1
NOTE_MACH_CONTINUOUS_TIME = 0x80
NOTE_NONE = 0x80
NOTE_NSECONDS = 0x4
NOTE_OOB = 0x2
NOTE_PCTRLMASK = -0x100000
NOTE_PDATAMASK = 0xfffff
NOTE_REAP = 0x10000000
NOTE_RENAME = 0x20
NOTE_REVOKE = 0x40
NOTE_SECONDS = 0x1
NOTE_SIGNAL = 0x8000000
NOTE_TRACK = 0x1
NOTE_TRACKERR = 0x2
NOTE_TRIGGER = 0x1000000
NOTE_USECONDS = 0x2
NOTE_VM_ERROR = 0x10000000
NOTE_VM_PRESSURE = 0x80000000
NOTE_VM_PRESSURE_SUDDEN_TERMINATE = 0x20000000
NOTE_VM_PRESSURE_TERMINATE = 0x40000000
NOTE_WRITE = 0x2
OCRNL = 0x10
OFDEL = 0x20000
OFILL = 0x80
ONLCR = 0x2
ONLRET = 0x40
ONOCR = 0x20
ONOEOT = 0x8
OPOST = 0x1
OXTABS = 0x4
O_ACCMODE = 0x3
O_ALERT = 0x20000000
O_APPEND = 0x8
O_ASYNC = 0x40
O_CLOEXEC = 0x1000000
O_CREAT = 0x200
O_DIRECTORY = 0x100000
O_DP_GETRAWENCRYPTED = 0x1
O_DP_GETRAWUNENCRYPTED = 0x2
O_DSYNC = 0x400000
O_EVTONLY = 0x8000
O_EXCL = 0x800
O_EXLOCK = 0x20
O_FSYNC = 0x80
O_NDELAY = 0x4
O_NOCTTY = 0x20000
O_NOFOLLOW = 0x100
O_NONBLOCK = 0x4
O_POPUP = 0x80000000
O_RDONLY = 0x0
O_RDWR = 0x2
O_SHLOCK = 0x10
O_SYMLINK = 0x200000
O_SYNC = 0x80
O_TRUNC = 0x400
O_WRONLY = 0x1
PARENB = 0x1000
PARMRK = 0x8
PARODD = 0x2000
PENDIN = 0x20000000
PRIO_PGRP = 0x1
PRIO_PROCESS = 0x0
PRIO_USER = 0x2
PROT_EXEC = 0x4
PROT_NONE = 0x0
PROT_READ = 0x1
PROT_WRITE = 0x2
PT_ATTACH = 0xa
PT_ATTACHEXC = 0xe
PT_CONTINUE = 0x7
PT_DENY_ATTACH = 0x1f
PT_DETACH = 0xb
PT_FIRSTMACH = 0x20
PT_FORCEQUOTA = 0x1e
PT_KILL = 0x8
PT_READ_D = 0x2
PT_READ_I = 0x1
PT_READ_U = 0x3
PT_SIGEXC = 0xc
PT_STEP = 0x9
PT_THUPDATE = 0xd
PT_TRACE_ME = 0x0
PT_WRITE_D = 0x5
PT_WRITE_I = 0x4
PT_WRITE_U = 0x6
RLIMIT_AS = 0x5
RLIMIT_CORE = 0x4
RLIMIT_CPU = 0x0
RLIMIT_CPU_USAGE_MONITOR = 0x2
RLIMIT_DATA = 0x2
RLIMIT_FSIZE = 0x1
RLIMIT_MEMLOCK = 0x6
RLIMIT_NOFILE = 0x8
RLIMIT_NPROC = 0x7
RLIMIT_RSS = 0x5
RLIMIT_STACK = 0x3
RLIM_INFINITY = 0x7fffffffffffffff
RTAX_AUTHOR = 0x6
RTAX_BRD = 0x7
RTAX_DST = 0x0
RTAX_GATEWAY = 0x1
RTAX_GENMASK = 0x3
RTAX_IFA = 0x5
RTAX_IFP = 0x4
RTAX_MAX = 0x8
RTAX_NETMASK = 0x2
RTA_AUTHOR = 0x40
RTA_BRD = 0x80
RTA_DST = 0x1
RTA_GATEWAY = 0x2
RTA_GENMASK = 0x8
RTA_IFA = 0x20
RTA_IFP = 0x10
RTA_NETMASK = 0x4
RTF_BLACKHOLE = 0x1000
RTF_BROADCAST = 0x400000
RTF_CLONING = 0x100
RTF_CONDEMNED = 0x2000000
RTF_DELCLONE = 0x80
RTF_DONE = 0x40
RTF_DYNAMIC = 0x10
RTF_GATEWAY = 0x2
RTF_HOST = 0x4
RTF_IFREF = 0x4000000
RTF_IFSCOPE = 0x1000000
RTF_LLINFO = 0x400
RTF_LOCAL = 0x200000
RTF_MODIFIED = 0x20
RTF_MULTICAST = 0x800000
RTF_NOIFREF = 0x2000
RTF_PINNED = 0x100000
RTF_PRCLONING = 0x10000
RTF_PROTO1 = 0x8000
RTF_PROTO2 = 0x4000
RTF_PROTO3 = 0x40000
RTF_PROXY = 0x8000000
RTF_REJECT = 0x8
RTF_ROUTER = 0x10000000
RTF_STATIC = 0x800
RTF_UP = 0x1
RTF_WASCLONED = 0x20000
RTF_XRESOLVE = 0x200
RTM_ADD = 0x1
RTM_CHANGE = 0x3
RTM_DELADDR = 0xd
RTM_DELETE = 0x2
RTM_DELMADDR = 0x10
RTM_GET = 0x4
RTM_GET2 = 0x14
RTM_IFINFO = 0xe
RTM_IFINFO2 = 0x12
RTM_LOCK = 0x8
RTM_LOSING = 0x5
RTM_MISS = 0x7
RTM_NEWADDR = 0xc
RTM_NEWMADDR = 0xf
RTM_NEWMADDR2 = 0x13
RTM_OLDADD = 0x9
RTM_OLDDEL = 0xa
RTM_REDIRECT = 0x6
RTM_RESOLVE = 0xb
RTM_RTTUNIT = 0xf4240
RTM_VERSION = 0x5
RTV_EXPIRE = 0x4
RTV_HOPCOUNT = 0x2
RTV_MTU = 0x1
RTV_RPIPE = 0x8
RTV_RTT = 0x40
RTV_RTTVAR = 0x80
RTV_SPIPE = 0x10
RTV_SSTHRESH = 0x20
RUSAGE_CHILDREN = -0x1
RUSAGE_SELF = 0x0
SCM_CREDS = 0x3
SCM_RIGHTS = 0x1
SCM_TIMESTAMP = 0x2
SCM_TIMESTAMP_MONOTONIC = 0x4
SHUT_RD = 0x0
SHUT_RDWR = 0x2
SHUT_WR = 0x1
SIOCADDMULTI = 0x80206931
SIOCAIFADDR = 0x8040691a
SIOCARPIPLL = 0xc0206928
SIOCATMARK = 0x40047307
SIOCAUTOADDR = 0xc0206926
SIOCAUTONETMASK = 0x80206927
SIOCDELMULTI = 0x80206932
SIOCDIFADDR = 0x80206919
SIOCDIFPHYADDR = 0x80206941
SIOCGDRVSPEC = 0xc01c697b
SIOCGETVLAN = 0xc020697f
SIOCGHIWAT = 0x40047301
SIOCGIFADDR = 0xc0206921
SIOCGIFALTMTU = 0xc0206948
SIOCGIFASYNCMAP = 0xc020697c
SIOCGIFBOND = 0xc0206947
SIOCGIFBRDADDR = 0xc0206923
SIOCGIFCAP = 0xc020695b
SIOCGIFCONF = 0xc0086924
SIOCGIFDEVMTU = 0xc0206944
SIOCGIFDSTADDR = 0xc0206922
SIOCGIFFLAGS = 0xc0206911
SIOCGIFGENERIC = 0xc020693a
SIOCGIFKPI = 0xc0206987
SIOCGIFMAC = 0xc0206982
SIOCGIFMEDIA = 0xc0286938
SIOCGIFMETRIC = 0xc0206917
SIOCGIFMTU = 0xc0206933
SIOCGIFNETMASK = 0xc0206925
SIOCGIFPDSTADDR = 0xc0206940
SIOCGIFPHYS = 0xc0206935
SIOCGIFPSRCADDR = 0xc020693f
SIOCGIFSTATUS = 0xc331693d
SIOCGIFVLAN = 0xc020697f
SIOCGIFWAKEFLAGS = 0xc0206988
SIOCGLOWAT = 0x40047303
SIOCGPGRP = 0x40047309
SIOCIFCREATE = 0xc0206978
SIOCIFCREATE2 = 0xc020697a
SIOCIFDESTROY = 0x80206979
SIOCIFGCLONERS = 0xc00c6981
SIOCRSLVMULTI = 0xc008693b
SIOCSDRVSPEC = 0x801c697b
SIOCSETVLAN = 0x8020697e
SIOCSHIWAT = 0x80047300
SIOCSIFADDR = 0x8020690c
SIOCSIFALTMTU = 0x80206945
SIOCSIFASYNCMAP = 0x8020697d
SIOCSIFBOND = 0x80206946
SIOCSIFBRDADDR = 0x80206913
SIOCSIFCAP = 0x8020695a
SIOCSIFDSTADDR = 0x8020690e
SIOCSIFFLAGS = 0x80206910
SIOCSIFGENERIC = 0x80206939
SIOCSIFKPI = 0x80206986
SIOCSIFLLADDR = 0x8020693c
SIOCSIFMAC = 0x80206983
SIOCSIFMEDIA = 0xc0206937
SIOCSIFMETRIC = 0x80206918
SIOCSIFMTU = 0x80206934
SIOCSIFNETMASK = 0x80206916
SIOCSIFPHYADDR = 0x8040693e
SIOCSIFPHYS = 0x80206936
SIOCSIFVLAN = 0x8020697e
SIOCSLOWAT = 0x80047302
SIOCSPGRP = 0x80047308
SOCK_DGRAM = 0x2
SOCK_MAXADDRLEN = 0xff
SOCK_RAW = 0x3
SOCK_RDM = 0x4
SOCK_SEQPACKET = 0x5
SOCK_STREAM = 0x1
SOL_SOCKET = 0xffff
SOMAXCONN = 0x80
SO_ACCEPTCONN = 0x2
SO_BROADCAST = 0x20
SO_DEBUG = 0x1
SO_DONTROUTE = 0x10
SO_DONTTRUNC = 0x2000
SO_ERROR = 0x1007
SO_KEEPALIVE = 0x8
SO_LABEL = 0x1010
SO_LINGER = 0x80
SO_LINGER_SEC = 0x1080
SO_NETSVC_MARKING_LEVEL = 0x1119
SO_NET_SERVICE_TYPE = 0x1116
SO_NKE = 0x1021
SO_NOADDRERR = 0x1023
SO_NOSIGPIPE = 0x1022
SO_NOTIFYCONFLICT = 0x1026
SO_NP_EXTENSIONS = 0x1083
SO_NREAD = 0x1020
SO_NUMRCVPKT = 0x1112
SO_NWRITE = 0x1024
SO_OOBINLINE = 0x100
SO_PEERLABEL = 0x1011
SO_RANDOMPORT = 0x1082
SO_RCVBUF = 0x1002
SO_RCVLOWAT = 0x1004
SO_RCVTIMEO = 0x1006
SO_REUSEADDR = 0x4
SO_REUSEPORT = 0x200
SO_REUSESHAREUID = 0x1025
SO_SNDBUF = 0x1001
SO_SNDLOWAT = 0x1003
SO_SNDTIMEO = 0x1005
SO_TIMESTAMP = 0x400
SO_TIMESTAMP_MONOTONIC = 0x800
SO_TYPE = 0x1008
SO_UPCALLCLOSEWAIT = 0x1027
SO_USELOOPBACK = 0x40
SO_WANTMORE = 0x4000
SO_WANTOOBFLAG = 0x8000
S_IEXEC = 0x40
S_IFBLK = 0x6000
S_IFCHR = 0x2000
S_IFDIR = 0x4000
S_IFIFO = 0x1000
S_IFLNK = 0xa000
S_IFMT = 0xf000
S_IFREG = 0x8000
S_IFSOCK = 0xc000
S_IFWHT = 0xe000
S_IREAD = 0x100
S_IRGRP = 0x20
S_IROTH = 0x4
S_IRUSR = 0x100
S_IRWXG = 0x38
S_IRWXO = 0x7
S_IRWXU = 0x1c0
S_ISGID = 0x400
S_ISTXT = 0x200
S_ISUID = 0x800
S_ISVTX = 0x200
S_IWGRP = 0x10
S_IWOTH = 0x2
S_IWRITE = 0x80
S_IWUSR = 0x80
S_IXGRP = 0x8
S_IXOTH = 0x1
S_IXUSR = 0x40
TAB0 = 0x0
TAB1 = 0x400
TAB2 = 0x800
TAB3 = 0x4
TABDLY = 0xc04
TCIFLUSH = 0x1
TCIOFF = 0x3
TCIOFLUSH = 0x3
TCION = 0x4
TCOFLUSH = 0x2
TCOOFF = 0x1
TCOON = 0x2
TCP_CONNECTIONTIMEOUT = 0x20
TCP_CONNECTION_INFO = 0x106
TCP_ENABLE_ECN = 0x104
TCP_FASTOPEN = 0x105
TCP_KEEPALIVE = 0x10
TCP_KEEPCNT = 0x102
TCP_KEEPINTVL = 0x101
TCP_MAXHLEN = 0x3c
TCP_MAXOLEN = 0x28
TCP_MAXSEG = 0x2
TCP_MAXWIN = 0xffff
TCP_MAX_SACK = 0x4
TCP_MAX_WINSHIFT = 0xe
TCP_MINMSS = 0xd8
TCP_MSS = 0x200
TCP_NODELAY = 0x1
TCP_NOOPT = 0x8
TCP_NOPUSH = 0x4
TCP_NOTSENT_LOWAT = 0x201
TCP_RXT_CONNDROPTIME = 0x80
TCP_RXT_FINDROP = 0x100
TCP_SENDMOREACKS = 0x103
TCSAFLUSH = 0x2
TIOCCBRK = 0x2000747a
TIOCCDTR = 0x20007478
TIOCCONS = 0x80047462
TIOCDCDTIMESTAMP = 0x40087458
TIOCDRAIN = 0x2000745e
TIOCDSIMICROCODE = 0x20007455
TIOCEXCL = 0x2000740d
TIOCEXT = 0x80047460
TIOCFLUSH = 0x80047410
TIOCGDRAINWAIT = 0x40047456
TIOCGETA = 0x402c7413
TIOCGETD = 0x4004741a
TIOCGPGRP = 0x40047477
TIOCGWINSZ = 0x40087468
TIOCIXOFF = 0x20007480
TIOCIXON = 0x20007481
TIOCMBIC = 0x8004746b
TIOCMBIS = 0x8004746c
TIOCMGDTRWAIT = 0x4004745a
TIOCMGET = 0x4004746a
TIOCMODG = 0x40047403
TIOCMODS = 0x80047404
TIOCMSDTRWAIT = 0x8004745b
TIOCMSET = 0x8004746d
TIOCM_CAR = 0x40
TIOCM_CD = 0x40
TIOCM_CTS = 0x20
TIOCM_DSR = 0x100
TIOCM_DTR = 0x2
TIOCM_LE = 0x1
TIOCM_RI = 0x80
TIOCM_RNG = 0x80
TIOCM_RTS = 0x4
TIOCM_SR = 0x10
TIOCM_ST = 0x8
TIOCNOTTY = 0x20007471
TIOCNXCL = 0x2000740e
TIOCOUTQ = 0x40047473
TIOCPKT = 0x80047470
TIOCPKT_DATA = 0x0
TIOCPKT_DOSTOP = 0x20
TIOCPKT_FLUSHREAD = 0x1
TIOCPKT_FLUSHWRITE = 0x2
TIOCPKT_IOCTL = 0x40
TIOCPKT_NOSTOP = 0x10
TIOCPKT_START = 0x8
TIOCPKT_STOP = 0x4
TIOCPTYGNAME = 0x40807453
TIOCPTYGRANT = 0x20007454
TIOCPTYUNLK = 0x20007452
TIOCREMOTE = 0x80047469
TIOCSBRK = 0x2000747b
TIOCSCONS = 0x20007463
TIOCSCTTY = 0x20007461
TIOCSDRAINWAIT = 0x80047457
TIOCSDTR = 0x20007479
TIOCSETA = 0x802c7414
TIOCSETAF = 0x802c7416
TIOCSETAW = 0x802c7415
TIOCSETD = 0x8004741b
TIOCSIG = 0x2000745f
TIOCSPGRP = 0x80047476
TIOCSTART = 0x2000746e
TIOCSTAT = 0x20007465
TIOCSTI = 0x80017472
TIOCSTOP = 0x2000746f
TIOCSWINSZ = 0x80087467
TIOCTIMESTAMP = 0x40087459
TIOCUCNTL = 0x80047466
TOSTOP = 0x400000
VDISCARD = 0xf
VDSUSP = 0xb
VEOF = 0x0
VEOL = 0x1
VEOL2 = 0x2
VERASE = 0x3
VINTR = 0x8
VKILL = 0x5
VLNEXT = 0xe
VMIN = 0x10
VM_LOADAVG = 0x2
VM_MACHFACTOR = 0x4
VM_MAXID = 0x6
VM_METER = 0x1
VM_SWAPUSAGE = 0x5
VQUIT = 0x9
VREPRINT = 0x6
VSTART = 0xc
VSTATUS = 0x12
VSTOP = 0xd
VSUSP = 0xa
VT0 = 0x0
VT1 = 0x10000
VTDLY = 0x10000
VTIME = 0x11
VWERASE = 0x4
WCONTINUED = 0x10
WCOREFLAG = 0x80
WEXITED = 0x4
WNOHANG = 0x1
WNOWAIT = 0x20
WORDSIZE = 0x20
WSTOPPED = 0x8
WUNTRACED = 0x2
XATTR_CREATE = 0x2
XATTR_NODEFAULT = 0x10
XATTR_NOFOLLOW = 0x1
XATTR_NOSECURITY = 0x8
XATTR_REPLACE = 0x4
XATTR_SHOWCOMPRESSION = 0x20
)
// Errors
const (
E2BIG = syscall.Errno(0x7)
EACCES = syscall.Errno(0xd)
EADDRINUSE = syscall.Errno(0x30)
EADDRNOTAVAIL = syscall.Errno(0x31)
EAFNOSUPPORT = syscall.Errno(0x2f)
EAGAIN = syscall.Errno(0x23)
EALREADY = syscall.Errno(0x25)
EAUTH = syscall.Errno(0x50)
EBADARCH = syscall.Errno(0x56)
EBADEXEC = syscall.Errno(0x55)
EBADF = syscall.Errno(0x9)
EBADMACHO = syscall.Errno(0x58)
EBADMSG = syscall.Errno(0x5e)
EBADRPC = syscall.Errno(0x48)
EBUSY = syscall.Errno(0x10)
ECANCELED = syscall.Errno(0x59)
ECHILD = syscall.Errno(0xa)
ECONNABORTED = syscall.Errno(0x35)
ECONNREFUSED = syscall.Errno(0x3d)
ECONNRESET = syscall.Errno(0x36)
EDEADLK = syscall.Errno(0xb)
EDESTADDRREQ = syscall.Errno(0x27)
EDEVERR = syscall.Errno(0x53)
EDOM = syscall.Errno(0x21)
EDQUOT = syscall.Errno(0x45)
EEXIST = syscall.Errno(0x11)
EFAULT = syscall.Errno(0xe)
EFBIG = syscall.Errno(0x1b)
EFTYPE = syscall.Errno(0x4f)
EHOSTDOWN = syscall.Errno(0x40)
EHOSTUNREACH = syscall.Errno(0x41)
EIDRM = syscall.Errno(0x5a)
EILSEQ = syscall.Errno(0x5c)
EINPROGRESS = syscall.Errno(0x24)
EINTR = syscall.Errno(0x4)
EINVAL = syscall.Errno(0x16)
EIO = syscall.Errno(0x5)
EISCONN = syscall.Errno(0x38)
EISDIR = syscall.Errno(0x15)
ELAST = syscall.Errno(0x6a)
ELOOP = syscall.Errno(0x3e)
EMFILE = syscall.Errno(0x18)
EMLINK = syscall.Errno(0x1f)
EMSGSIZE = syscall.Errno(0x28)
EMULTIHOP = syscall.Errno(0x5f)
ENAMETOOLONG = syscall.Errno(0x3f)
ENEEDAUTH = syscall.Errno(0x51)
ENETDOWN = syscall.Errno(0x32)
ENETRESET = syscall.Errno(0x34)
ENETUNREACH = syscall.Errno(0x33)
ENFILE = syscall.Errno(0x17)
ENOATTR = syscall.Errno(0x5d)
ENOBUFS = syscall.Errno(0x37)
ENODATA = syscall.Errno(0x60)
ENODEV = syscall.Errno(0x13)
ENOENT = syscall.Errno(0x2)
ENOEXEC = syscall.Errno(0x8)
ENOLCK = syscall.Errno(0x4d)
ENOLINK = syscall.Errno(0x61)
ENOMEM = syscall.Errno(0xc)
ENOMSG = syscall.Errno(0x5b)
ENOPOLICY = syscall.Errno(0x67)
ENOPROTOOPT = syscall.Errno(0x2a)
ENOSPC = syscall.Errno(0x1c)
ENOSR = syscall.Errno(0x62)
ENOSTR = syscall.Errno(0x63)
ENOSYS = syscall.Errno(0x4e)
ENOTBLK = syscall.Errno(0xf)
ENOTCONN = syscall.Errno(0x39)
ENOTDIR = syscall.Errno(0x14)
ENOTEMPTY = syscall.Errno(0x42)
ENOTRECOVERABLE = syscall.Errno(0x68)
ENOTSOCK = syscall.Errno(0x26)
ENOTSUP = syscall.Errno(0x2d)
ENOTTY = syscall.Errno(0x19)
ENXIO = syscall.Errno(0x6)
EOPNOTSUPP = syscall.Errno(0x66)
EOVERFLOW = syscall.Errno(0x54)
EOWNERDEAD = syscall.Errno(0x69)
EPERM = syscall.Errno(0x1)
EPFNOSUPPORT = syscall.Errno(0x2e)
EPIPE = syscall.Errno(0x20)
EPROCLIM = syscall.Errno(0x43)
EPROCUNAVAIL = syscall.Errno(0x4c)
EPROGMISMATCH = syscall.Errno(0x4b)
EPROGUNAVAIL = syscall.Errno(0x4a)
EPROTO = syscall.Errno(0x64)
EPROTONOSUPPORT = syscall.Errno(0x2b)
EPROTOTYPE = syscall.Errno(0x29)
EPWROFF = syscall.Errno(0x52)
EQFULL = syscall.Errno(0x6a)
ERANGE = syscall.Errno(0x22)
EREMOTE = syscall.Errno(0x47)
EROFS = syscall.Errno(0x1e)
ERPCMISMATCH = syscall.Errno(0x49)
ESHLIBVERS = syscall.Errno(0x57)
ESHUTDOWN = syscall.Errno(0x3a)
ESOCKTNOSUPPORT = syscall.Errno(0x2c)
ESPIPE = syscall.Errno(0x1d)
ESRCH = syscall.Errno(0x3)
ESTALE = syscall.Errno(0x46)
ETIME = syscall.Errno(0x65)
ETIMEDOUT = syscall.Errno(0x3c)
ETOOMANYREFS = syscall.Errno(0x3b)
ETXTBSY = syscall.Errno(0x1a)
EUSERS = syscall.Errno(0x44)
EWOULDBLOCK = syscall.Errno(0x23)
EXDEV = syscall.Errno(0x12)
)
// Signals
const (
SIGABRT = syscall.Signal(0x6)
SIGALRM = syscall.Signal(0xe)
SIGBUS = syscall.Signal(0xa)
SIGCHLD = syscall.Signal(0x14)
SIGCONT = syscall.Signal(0x13)
SIGEMT = syscall.Signal(0x7)
SIGFPE = syscall.Signal(0x8)
SIGHUP = syscall.Signal(0x1)
SIGILL = syscall.Signal(0x4)
SIGINFO = syscall.Signal(0x1d)
SIGINT = syscall.Signal(0x2)
SIGIO = syscall.Signal(0x17)
SIGIOT = syscall.Signal(0x6)
SIGKILL = syscall.Signal(0x9)
SIGPIPE = syscall.Signal(0xd)
SIGPROF = syscall.Signal(0x1b)
SIGQUIT = syscall.Signal(0x3)
SIGSEGV = syscall.Signal(0xb)
SIGSTOP = syscall.Signal(0x11)
SIGSYS = syscall.Signal(0xc)
SIGTERM = syscall.Signal(0xf)
SIGTRAP = syscall.Signal(0x5)
SIGTSTP = syscall.Signal(0x12)
SIGTTIN = syscall.Signal(0x15)
SIGTTOU = syscall.Signal(0x16)
SIGURG = syscall.Signal(0x10)
SIGUSR1 = syscall.Signal(0x1e)
SIGUSR2 = syscall.Signal(0x1f)
SIGVTALRM = syscall.Signal(0x1a)
SIGWINCH = syscall.Signal(0x1c)
SIGXCPU = syscall.Signal(0x18)
SIGXFSZ = syscall.Signal(0x19)
)
// Error table
var errorList = [...]struct {
num syscall.Errno
name string
desc string
}{
{1, "EPERM", "operation not permitted"},
{2, "ENOENT", "no such file or directory"},
{3, "ESRCH", "no such process"},
{4, "EINTR", "interrupted system call"},
{5, "EIO", "input/output error"},
{6, "ENXIO", "device not configured"},
{7, "E2BIG", "argument list too long"},
{8, "ENOEXEC", "exec format error"},
{9, "EBADF", "bad file descriptor"},
{10, "ECHILD", "no child processes"},
{11, "EDEADLK", "resource deadlock avoided"},
{12, "ENOMEM", "cannot allocate memory"},
{13, "EACCES", "permission denied"},
{14, "EFAULT", "bad address"},
{15, "ENOTBLK", "block device required"},
{16, "EBUSY", "resource busy"},
{17, "EEXIST", "file exists"},
{18, "EXDEV", "cross-device link"},
{19, "ENODEV", "operation not supported by device"},
{20, "ENOTDIR", "not a directory"},
{21, "EISDIR", "is a directory"},
{22, "EINVAL", "invalid argument"},
{23, "ENFILE", "too many open files in system"},
{24, "EMFILE", "too many open files"},
{25, "ENOTTY", "inappropriate ioctl for device"},
{26, "ETXTBSY", "text file busy"},
{27, "EFBIG", "file too large"},
{28, "ENOSPC", "no space left on device"},
{29, "ESPIPE", "illegal seek"},
{30, "EROFS", "read-only file system"},
{31, "EMLINK", "too many links"},
{32, "EPIPE", "broken pipe"},
{33, "EDOM", "numerical argument out of domain"},
{34, "ERANGE", "result too large"},
{35, "EAGAIN", "resource temporarily unavailable"},
{36, "EINPROGRESS", "operation now in progress"},
{37, "EALREADY", "operation already in progress"},
{38, "ENOTSOCK", "socket operation on non-socket"},
{39, "EDESTADDRREQ", "destination address required"},
{40, "EMSGSIZE", "message too long"},
{41, "EPROTOTYPE", "protocol wrong type for socket"},
{42, "ENOPROTOOPT", "protocol not available"},
{43, "EPROTONOSUPPORT", "protocol not supported"},
{44, "ESOCKTNOSUPPORT", "socket type not supported"},
{45, "ENOTSUP", "operation not supported"},
{46, "EPFNOSUPPORT", "protocol family not supported"},
{47, "EAFNOSUPPORT", "address family not supported by protocol family"},
{48, "EADDRINUSE", "address already in use"},
{49, "EADDRNOTAVAIL", "can't assign requested address"},
{50, "ENETDOWN", "network is down"},
{51, "ENETUNREACH", "network is unreachable"},
{52, "ENETRESET", "network dropped connection on reset"},
{53, "ECONNABORTED", "software caused connection abort"},
{54, "ECONNRESET", "connection reset by peer"},
{55, "ENOBUFS", "no buffer space available"},
{56, "EISCONN", "socket is already connected"},
{57, "ENOTCONN", "socket is not connected"},
{58, "ESHUTDOWN", "can't send after socket shutdown"},
{59, "ETOOMANYREFS", "too many references: can't splice"},
{60, "ETIMEDOUT", "operation timed out"},
{61, "ECONNREFUSED", "connection refused"},
{62, "ELOOP", "too many levels of symbolic links"},
{63, "ENAMETOOLONG", "file name too long"},
{64, "EHOSTDOWN", "host is down"},
{65, "EHOSTUNREACH", "no route to host"},
{66, "ENOTEMPTY", "directory not empty"},
{67, "EPROCLIM", "too many processes"},
{68, "EUSERS", "too many users"},
{69, "EDQUOT", "disc quota exceeded"},
{70, "ESTALE", "stale NFS file handle"},
{71, "EREMOTE", "too many levels of remote in path"},
{72, "EBADRPC", "RPC struct is bad"},
{73, "ERPCMISMATCH", "RPC version wrong"},
{74, "EPROGUNAVAIL", "RPC prog. not avail"},
{75, "EPROGMISMATCH", "program version wrong"},
{76, "EPROCUNAVAIL", "bad procedure for program"},
{77, "ENOLCK", "no locks available"},
{78, "ENOSYS", "function not implemented"},
{79, "EFTYPE", "inappropriate file type or format"},
{80, "EAUTH", "authentication error"},
{81, "ENEEDAUTH", "need authenticator"},
{82, "EPWROFF", "device power is off"},
{83, "EDEVERR", "device error"},
{84, "EOVERFLOW", "value too large to be stored in data type"},
{85, "EBADEXEC", "bad executable (or shared library)"},
{86, "EBADARCH", "bad CPU type in executable"},
{87, "ESHLIBVERS", "shared library version mismatch"},
{88, "EBADMACHO", "malformed Mach-o file"},
{89, "ECANCELED", "operation canceled"},
{90, "EIDRM", "identifier removed"},
{91, "ENOMSG", "no message of desired type"},
{92, "EILSEQ", "illegal byte sequence"},
{93, "ENOATTR", "attribute not found"},
{94, "EBADMSG", "bad message"},
{95, "EMULTIHOP", "EMULTIHOP (Reserved)"},
{96, "ENODATA", "no message available on STREAM"},
{97, "ENOLINK", "ENOLINK (Reserved)"},
{98, "ENOSR", "no STREAM resources"},
{99, "ENOSTR", "not a STREAM"},
{100, "EPROTO", "protocol error"},
{101, "ETIME", "STREAM ioctl timeout"},
{102, "EOPNOTSUPP", "operation not supported on socket"},
{103, "ENOPOLICY", "policy not found"},
{104, "ENOTRECOVERABLE", "state not recoverable"},
{105, "EOWNERDEAD", "previous owner died"},
{106, "EQFULL", "interface output queue is full"},
}
// Signal table
var signalList = [...]struct {
num syscall.Signal
name string
desc string
}{
{1, "SIGHUP", "hangup"},
{2, "SIGINT", "interrupt"},
{3, "SIGQUIT", "quit"},
{4, "SIGILL", "illegal instruction"},
{5, "SIGTRAP", "trace/BPT trap"},
{6, "SIGABRT", "abort trap"},
{7, "SIGEMT", "EMT trap"},
{8, "SIGFPE", "floating point exception"},
{9, "SIGKILL", "killed"},
{10, "SIGBUS", "bus error"},
{11, "SIGSEGV", "segmentation fault"},
{12, "SIGSYS", "bad system call"},
{13, "SIGPIPE", "broken pipe"},
{14, "SIGALRM", "alarm clock"},
{15, "SIGTERM", "terminated"},
{16, "SIGURG", "urgent I/O condition"},
{17, "SIGSTOP", "suspended (signal)"},
{18, "SIGTSTP", "suspended"},
{19, "SIGCONT", "continued"},
{20, "SIGCHLD", "child exited"},
{21, "SIGTTIN", "stopped (tty input)"},
{22, "SIGTTOU", "stopped (tty output)"},
{23, "SIGIO", "I/O possible"},
{24, "SIGXCPU", "cputime limit exceeded"},
{25, "SIGXFSZ", "filesize limit exceeded"},
{26, "SIGVTALRM", "virtual timer expired"},
{27, "SIGPROF", "profiling timer expired"},
{28, "SIGWINCH", "window size changes"},
{29, "SIGINFO", "information request"},
{30, "SIGUSR1", "user defined signal 1"},
{31, "SIGUSR2", "user defined signal 2"},
}
| {
"pile_set_name": "Github"
} |
Love's Jazz and Art Center
Love's Jazz and Art Center is located at 2510 North 24th Street in the Near North Omaha neighborhood of Omaha, Nebraska. Founded and named to honor of Omaha jazz great Preston Love, Love's highlights the African American culture of North Omaha. In addition to sponsoring a variety of events, Love's has hosted events for Native Omaha Days.
See also
History of North Omaha, Nebraska
Music in Omaha, Nebraska
Culture of Omaha, Nebraska
References
External links
Official website
Category:Music of Omaha, Nebraska
Category:Museums in Omaha, Nebraska
Category:African-American museums in Nebraska
Category:African-American history in Omaha, Nebraska
Category:Arts centers in Nebraska | {
"pile_set_name": "Wikipedia (en)"
} |
1. Field of the Invention
The present invention relates to an optical alignment polymer, an alignment layer using the same, and a liquid crystal display device having the alignment layer, and more particularly, to an optical alignment polymer having excellent optical alignment performance and stability against heat or impact, an alignment layer formed using the optical alignment polymer and a liquid crystal display device having the alignment layer.
2. The Related Art
In general, a liquid crystal display device has upper and lower substrate, transparent electrodes and alignment layers formed on the upper and lower substrates and a liquid crystal layer between the upper and lower alignment layers.
In the LCD having the aforementioned structure, according to an externally applied voltage, the arrangement of liquid crystals is changed by the electric field. According to the changed arrangement, external light introduced to the LCD is shielded or transmitted. The LCD is driven by such a property. In other words, if a voltage is applied to the transparent electrode layers, an electric field is formed in the liquid crystal layer. Thus, liquid crystals are driven in a predetermined direction. The light introduced into the liquid crystals of the LCD is shielded or transmitted according to the driving of the liquid crystals.
The functions of the LCD as a display device, i.e., light transmittance, response time, view angle or contrast, are determined by the arrangement characteristic of the liquid crystal molecules. Therefore, controlling the alignment of the liquid crystal molecules uniformly is a very important factor.
The uniform alignment state of the liquid crystals is difficult to accomplish by merely interposing the liquid crystals between the upper and lower substrates. Thus, it is generally known to form the alignment layers for aligning liquid crystals on the transparent electrode layers.
The alignment layer is conventionally formed by a rubbing method in which a thin film made of an organic polymer material such as polyimide or polyamide is formed, cured and then rubbed with a special cloth.
The rubbing method is easy to conduct and the process thereof is simple. However, minute particles or materials such as cellulose may separate from the cloth used in the rubbing treatment and contaminate the alignment layer. Further, depending on the material for forming the alignment layer, the alignment may not be accomplished smoothly. A thin film transistor may be damaged by static electricity generated during the rubbing treatment.
To solve the above-described problems, an optical alignment technology has been developed in which dust, static electricity or other pollutant particles are not generated and cleanliness is maintained during the overall process. According to such a non-destructive alignment method, polarized light is irradiated onto the optical alignment layer to cause anisotropic photopolymerization. As a result, the optical alignment layer has alignment characteristic, thereby uniformly aligning the liquid crystals. The polymer for the optical alignment layer includes polyvinylcinnamate (PVCN) and polyvinylmethoxyxinnamate (PVMC). These polymer compounds have an optically aligning functional group introduced into either a main chain or a side chain thereof.
If the alignment layer is formed using the optical alignment composition having such a polymer, the alignment performance by light and thermal stability becomes poor, and a pretilt angle of a liquid crystal of liquid crystal display device having the alignment layer decreases to almost 0.degree. C. | {
"pile_set_name": "USPTO Backgrounds"
} |
Finite-size radiation force correction for inviscid spheres in standing waves.
Yosioka and Kawasima gave a widely used approximation for the acoustic radiation force on small liquid spheres surrounded by an immiscible liquid in 1955. Considering the liquids to be inviscid with negligible thermal dissipation, in their approximation the force on the sphere is proportional to the sphere's volume and the levitation position in a vertical standing wave becomes independent of the size. The analysis given here introduces a small correction term proportional to the square of the sphere's radius relative to the aforementioned small-sphere force. The significance of this term also depends on the relative density and sound velocity of the sphere. The improved approximation is supported by comparison with the exact partial-wave-series based radiation force for ideal fluid spheres in ideal fluids. | {
"pile_set_name": "PubMed Abstracts"
} |
There are a lot of great shows and movies about bad men from which people take the wrong lesson. Some guys wish they could be feared and respected like Tony Soprano (James Gandolfini) or Walter White (Bryan Cranston). They wish they could live in Mad Men times because "men were men" then. They watch The Wolf of Wall Street and see the criminal excess as aspirational, failing to recognize that it's a cautionary tale.
Those are exactly the kind of people who watch Billions and shout "Yo Bob-ay!" at Damian Lewis out of passing cars when they see him on the street. Lewis' character, hedge fund titan Bobby "Axe" Axelrod, is not someone you're supposed to root for. He's a greedy crook who made millions by shorting airline stocks while his employees were dying on 9/11. So it's weird to Lewis when wealthy women come up to him and say "you are playing my husband, did you know that?" What kind of person would want to be (or be married to) Bobby Axelrod?
Even Lewis' co-star Paul Giamatti gets yelled at by adoring Bobby fans. Giamatti plays U.S. Attorney Chuck Rhoades, who is willing to do anything to put Axe behind bars. He's a terrible person, too, but he's at least nominally on the side of justice. And Paul Giamatti is just an actor, not an actual evil attorney. But that didn't stop one overzealous Billions fan from screaming at him about how horrible Chuck was being to Bobby.
"And he was dead serious," says Giamatti. "His wife was mortified."
Billions Is Changing the Hearts and Minds of Middle-Aged Republicans
Lewis says that every hedge fund billionaire thinks they're Bobby Axelrod (and there's some truth to that; he's an amalgam of the stories and character traits of a bunch of different very rich guys). "I say 'are you watching the show? Do you know what Bobby Axelrod does?'" he says with a bemused grin.
"Is that something you want to say in public?" Giamatti concurs.
The deliciously despicable saga of Chuck Rhoades and Bobby Axelrod returns for Season 3 on Showtime Sunday, March 25 at 10/9c.
(Full disclosure: TV Guide is owned by CBS, Showtime's parent company.) | {
"pile_set_name": "OpenWebText2"
} |
[Pulse wave velocity - a useful tool in assessing the stiffness of the arteries].
Measurement of pulse wave velocity (PWV) is a simple and noninvasive way to assess stiffness of the arteries. PWV measurement can refer to both the aorta and peripheral arterial vessels. Currently, the most clinically significant is the measurement of PWV between the carotid artery and the femoral artery, which is defined as the speed of the aortic pulse wave. Numerous studies have demonstrated the significance of prognostic PWV aortic measurement as a recognized exponent of subclinical organ damage both among the general population as well as among patients with increased cardiovascular risk, examining patients in detail with hypertension, diabetes, chronic renal failure. The prognostic value of PWV aortic measurement was reflected in the guidelines of the European Society of Cardiology (ESC) and the European Society of Hypertension (ESH). In clinical trials, the repeatability and reproducibility of PWV measurements were also evaluated, both parameters being considered satisfactory. The paper presents reports from studies on the significance of pulse wave velocity results in the prognosis assessment in different disease entities as well as in age groups. | {
"pile_set_name": "PubMed Abstracts"
} |
Oneida (2016)
GENRE
REFERENCE POINTS
LINKS
One of the great bands of the new millennium, Brooklyn's kings of psych and drone have been exploring propulsion and repetition for nearly twenty years, lighting the way for a generation of young Kraut-noise artists. Anchored by Kid Millions' Olympic-calibre drumming, their shows might be comprised of ethereal pulses, majestic long-form jams or pummeling squalls of feedback. Whatever they pull out of their grimy pockets, it will be a heavy trip. | {
"pile_set_name": "Pile-CC"
} |
Republicans are getting to the rock-bottom of it.
They have defended President Trump throughout the public impeachment hearings by arguing his gangster efforts to force a Ukrainian investigation into its (imagined) interference in the 2016 election were actually completely legitimate. Rep. Devin Nunes (R-Calif.) has made this point repeatedly, assailing Democrats for their alleged collaboration with Ukrainian election interference efforts and asking, as he did during former Ambassador to Ukraine Marie Yovanovitch's testimony, "what is the full extent of Ukraine's election meddling against the Trump campaign?"
If you're unfamiliar with the paranoid depths of the right-wing media universe, this kind of talk probably puzzled you. But make no mistake: The Ukraine fantasies peddled by House Republicans are nothing less than a concerted attempt to do what the GOP has done with all of Trump's misconduct since the beginning of his presidency — to use a combination of denial and redirection to foment skepticism and doubt about the underlying charges.
In this case, the Ukraine meddling red herring is used to justify Trump's obstructive acts and his attempts to extort the Ukrainian government into opening an investigation in exchange for military aid and a White House visit. And if Democrats don't begin a major effort to dismantle this nonsense in public, they may very well lose the battle for public opinion in the same way they allowed themselves to get outfoxed with the Mueller probe.
When referencing the Ukraine ideas, Democrats have called them "discredited" and "debunked" over and over again, which of course they are. But referring to them as such does nothing to prove it to voters who don't read Vox explainers and Washington Post investigative reports. To the kind of "pox on both houses" voters whose mood swings might determine the outcome of the 2020 election, all they hear is people from two parties they hate yelling at one another and accusing each other of the exact same things.
One important reason Democrats must be better prepared to fend off Ukraine-related conspiracy mongering is that Attorney General Barr is preparing some kind of ginned-up report that will line up neatly with Republican efforts in the hearings to pin 2016 election interference on Ukraine. It will suck all of the oxygen out of the proceedings for days or even weeks. Earlier this year, Barr tasked U.S. Attorney John Durham with investigating the origins of the various Trump-Russia investigations in 2016, which culminated in the appointment of Special Counsel Robert Mueller in 2017. The Department of Justice recently revealed, ominously, that this was now a criminal probe. Barr himself has been jet-setting around the world looking for confirmatory evidence.
What's it all about? There are two Ukraine-related conspiracy theories, which are likely to converge in the coming weeks as GOP efforts to save Trump accelerate. The first involves the infamous Russian hacking of the DNC in the spring of 2016, which led to months of leaked emails disseminated via Wikileaks, whose release was often timed to inflict maximum damage on the Clinton campaign. In his July 25 phone call with Ukrainian President Volodymr Zelensky, Trump asked him about "Crowdstrike" and the "server." This references a truly insane, far-right fantasy that in fact it was Ukraine, in collaboration with the Clinton campaign, that hacked the DNC and then blamed it on Russia to make the Trump campaign look guilty.
In this make-believe world, Crowdstrike cofounder Dmitri Alperovitch is a Ukrainian (he is actually an American citizen who serves as a fellow on the august Atlantic Council) who absconded back to his country with the server, and the FBI had to take their word for it that Russia was culpable. Back on Earth-1, on the other hand, Crowdstrike provided the FBI with all of its forensic data, no serious person disputes that Russia was responsible for the hacking, and there is no single "server" which can be physically transported to Kiev.
The Crowdstrike lunacy has not yet been affirmatively advanced by Republicans in these hearings, although no one should be surprised if it is. But the idea that Ukraine was responsible for triggering the FBI's counterintelligence probe into the Trump campaign has now gone mainstream.
The story goes like this: Corrupt Ukrainians fabricated a "black ledger" implicating former Trump campaign director Paul Manafort in various forms of corruption when he was a key advisor to former Ukrainian president Viktor Yanukovych, a pro-Russian stooge, so that the Trump campaign's May 2016 hiring of Manafort as campaign manager would look especially suspicious. In this telling, the incident in which Trump campaign staffer George Papadopoulos bragged to an Australian diplomat about how Russia had stolen dirt on Clinton was actually a CIA set-up.
The conspiracy theory then alleges that at the same time, Ukrainian embassy officials were working with a consultant named Alexandra Chalupa (who held a minor post with the DNC) to channel incriminating information about Trump and Manafort to reporters and intelligence agencies. CIA Director John Brennan then supposedly manipulated this information and baited the FBI into opening its investigation. (This is why House Republicans put Chalupa on a list of witnesses they wanted to testify.) The Clinton campaign, meanwhile, was using a firm called Fusion GPS, which paid former British spy Christopher Steele to produce a lurid dossier about Trump. (Though of course it wasn't released and was only made public by Buzzfeed after the election.) The FBI, supposedly at Brennan's behest, then improperly used information gleaned from Ukrainians via Chalupa and Steele to trigger its counterintelligence investigation into the Trump campaign. (There's more, of course, but this is an article, not a book.)
To simplify for those who are still with me: Corrupt U.S. intelligence officials glommed onto false allegations pushed at them by Ukrainians terrified of a Trump administration and used them to launch years of phony investigations against both candidate and President Trump. The Mueller report, so this story goes, proved that this was all a hoax from the get-go, and now President Trump and Attorney General Barr just want to get to the truth about what really happened.
It should almost go without saying that this is all nonsense, the product of shut-ins decorating large poster boards with paranoid speculation and unsubstantiated rumors and then laundering it all through various luminaries in the right-wing media cocoon. None of it makes any real sense.
To have worked, it had to have involved former CIA director John Brennan, FBI Director James Comey, and Attorney General Loretta Lynch. The number of conspirators must have run into the hundreds, many of whom would have been career public servants (as opposed to political appointees) in the intelligence agencies and the FBI. Yet none of them are talking?
Second, if the FBI was part of a plot to destroy then-candidate Trump, why did FBI Director James Comey then go out of his way to assail Clinton as "extremely careless" in his June 5, 2016, press conference and then theatrically announce that he was looking at new emails just days before the presidential election, a maneuver that may have led directly to her loss?
Third, why would the Clinton campaign have conspired with Ukraine against itself to release a long series of damaging or distracting emails from people like John Podesta?
Lastly, in the closing days of the campaign, when the polls had tightened and there was a very real possibility of Trump winning the election, why didn't any of the conspirators do more to release this information to the media? Why would the conspirators bury their own conspiracy?
The problem for Democrats is that these questions don't immediately come to mind for most people. Americans, most of whom who have not read the 448-page Mueller Report and are only dimly aware of the many troubling details about the Trump campaign's efforts to work with Russian hackers to subvert the 2016 election, watched Democrats simply walk away and turn off the lights after Mueller's July 24 testimony before Congress, seemingly resigned to the president's triumphant efforts to obstruct justice. Now Democrats have to contend with this Republican counternarrative, which if not pushed back on aggressively, will appear just as credible to the modestly informed.
It might sound equally bonkers, but Democrats should think about tackling it all head-on, perhaps by calling in a leading Ukraine conspiracy advocate like Sean Hannity to testify before Congress, followed by witnesses like Brennan who can then dismantle it all piece by piece. There is no way that Hannity or anyone else would be able to hold it together through hours of interrogation by Daniel Goldman, who capably led some of the questioning for House Democrats in last week's hearings. Give Republicans their wish and bring in Chalupa, who is desperate to testify. Bring in Alperovitch. If they really want to stop the news cycle and force everyone to watch, bring in former President Obama himself. Take a week, and blow the whole kooky theory to pieces.
Remember: This is all one story. The Trump-Giuliani Ukraine caper was partly about screwing with the 2020 election, but it was also about fabricating evidence to support the administration's nutso counter-narrative that the real villains in 2016 weren't the Russians but rather Ukrainians and Obama administration officials from the "deep state" working together to smear Our Great President. The behavior that led to these impeachment hearings is part of a maximalist plot to completely exonerate both Russia and the president of any wrongdoing, all driven by Trump's thin-skinned obsession with legitimacy, and his administration's barely-concealed hunger to engage in further abuses of power.
If they get away with this, they can get away with anything, and they know it. That's why Democrats need to take the time to get this story right, and convince the public that there is nothing to the GOP's Ukraine fever dreams but sweaty sheets and bad faith.
Want more essential commentary and analysis like this delivered straight to your inbox? Sign up for The Week's "Today's best articles" newsletter here. | {
"pile_set_name": "OpenWebText2"
} |
Coaching Client of Tony Inman – Bernie successfully regained his sales prowess after a slump in confidence and motivation and achieved record sales. He and his wife successfully sold off the majority of their business and commenced semi-retirement.
Associate of Coach Tony Inman. Read Tony’s book, ‘If Life’s Worth Doing, It’s Worth Doing Well’ and was inspired to re-think his work/life balance and to immediately set up his business in such a way that he could take more holidays.
*****
David Bearsley – Business Marketing Consultant and Trainer, Owner of Superior Business Networks, Perth, Western Australia.
Associate of Coach Tony Inman. Worked with Tony to co-facilitate business improvement programs. Engages Tony to host his networking groups when taking vacations.
More Reviews
Just in case this many coaching testimonials still haven’t reassured you of Tony’s experience, you may click here for a list of companies and/or executives with whom Coach Tony Inman has worked.
If you still have questions, firstly check our FAQ page for more information.
So don’t delay – Take action today. Contact Tony Inman via this website for a chat about how he can help you to move forwards in the direction of your dreams and goals!
Or telephone 0419 860 382.
About Tony Inman – ‘The Change Catalyst’
If you want to make changes in your life, but you're feeling stuck or overwhelmed, and you need a guide to help you get there, then you can trust in the experience and 'life-wisdom' of this Coach and Guide who walks the talk, Tony Inman.
Tony is a serial entrepreneur who has set up and built around 23 small businesses in a variety of fields, experiencing many triumphs, plus his share of setbacks, along the journey.
Tony Inman is also a certified and experienced Life Coach and Business Coach, a Master Practitioner and certified Trainer in NLP, certified Trainer and Assessor, workshop facilitator and presenter.
Thanks to the reach of the internet, he has been assisting clients all around the world to move forwards in pursuit of happier, more successful and more fulfilling lives.
He has recently co-founded 'ONE80degree Films'to help businesses, not-for-profits and individuals to share their stories via two-minute videos through to feature-length documentaries.
Tony and his wife Jo also have a 'side-hustle' blog, where they provide an entertainment guide; promote local small businesses in Perth; support eco and marine-eco-friendly initiatives and generally promote helping people to live healthier and happier lives. You can follow them on Facebook at ToJo Life or via www.tojolife.com.au. | {
"pile_set_name": "Pile-CC"
} |
Community Services Specialized
This Division is comprised of 3 specialized units. The INTENSIVE SUPERVISION / SERVICES UNIT (ISU), the DOMESTIC VIOLENCE UNIT, and the SEX OFFENDER UNIT (SOU). Caseloads assigned to the Division specialize in Mentally Ill Offenders (Behavioral Health Court- BHC); Community/ District Station Gang Offenders, Sex Offenders, Habitual Offenders, and Domestic Violence Offenders. Officers in this Division have a specific focus on cases in these areas of discipline and provide specialized attention to cases assigned to their respective caseloads. The officers in this Division generally have lower caseload sizes and provide a level of supervision which includes a significant amount of time in the community (“field”). There are some officers in this Division such as the Mental Health / BHC officers who provides some level of services for BHC clients (both probation clients and non-probation clients) as a collaborative partner in BHC process. They have certain office hours at Citywide Case Management Services in the community to facilitate the BHC services for these clients. Members of the Division attend various Community Meetings and Crime Reduction Meetings with various law enforcement agencies to provide theses service providers with input on how probation supervision efforts could be incorporated in these community activities. Certain Division assignments have collaborative process with specialized Courts such as Domestic Violence Court to provide coordinated collaborative services for probationers. These processes require staff to work closely with these community based agencies and in some cases they facilitate case conferences with these agencies to enhance these coordinated efforts. Staff in this Division used evidence based practices in the service and supervision efforts and has worked non-traditional hours to facilitate the needs of the assigned caseloads. | {
"pile_set_name": "Pile-CC"
} |
Daniel Talks About, Flirting, Height, Drinking Issues & Other Stuff!
Written by: Chaitra
Published: Wednesday, October 21, 2015, 10:27 [IST]
Subscribe to Filmibeat
Daniel Radcliffe, the 26 years old actor, who once played the epic role of Harry Potter, recently spoke about the much adult stuff, like flirting, girlfriend, masturbation and alcohol issues and may other things during his interview with the Playboy magazine.
The 1.65 m tall British actor opened about his struggles dealing with fame, young age drinking , his inability to say 'no', and everything about his 8 Harry Potter series. He also used the platform to talk about his girlfriend Erin Darke.
Daniel did a 20 Q and A with Playboy. Below are a few of the questions and Daniel's brilliant answers combined with his simple and down to earth attitude that caught our attention. We must say, the actor does have an excellent sense of humour.
Daniel said:
On when he drank heavily at a very young age to deal with fame ..
"Anytime I'd go out to dance, camera phones would come out. That would make me very self-conscious, and what's the easiest way to escape being self-conscious? Alcohol is a quick way of doing that. So it was related in that way."
He also added "A few years ago there was a TV ad that showed a lot of inventors, including a guy who invented the camera phone. He was smiling smugly into the camera, and I was just like, Fuck you. What have you wrought? Camera phones are definitely not my favorite."
On whether there was time to masturbate on the sets
Daniel jokingly said, "Yeah, I was like every other teenager in that sense. My favorite line about masturbation is Louis C.K.'s, something like, "I found out about it when I was 11, and I didn't skip a day." I think I started very early-before my teens. But not when I was on set."
On his height issues in Hollywood ..
The actor said, "I don't think so. Dustin Hoffman and Tom Cruise have very different careers, and they're both about the same height as I am. I could play a soldier. The minimum height for a marine is five feet, and I'm well above that. If you're asking, ‘Can you play a really (bleeping) tall person?' No, obviously not."
On when he first met his girlfriend and flirting ..
Daniel gushed about his incredibly smart and funny girlfriend. He spoke about the time he first met her on the sets in 2013 and said "That's a wonderful record of us flirting for the first time. There's no acting going on - not from my end, anyway. There's a moment when she makes me laugh, and I'm laughing as me and not as my character."
From height to masturbating and gushing about his girlfriend, Daniel rocked the interview and nailed every single question he was asked. He can now look forward to seeing the Harry Potter protagonist in many other roles in the near future and add more fiction characters to our list of favorites. | {
"pile_set_name": "Pile-CC"
} |
The Nuiances of Mobile App Development Companies List
The Nuiances of Mobile App Development Companies List
The History of Mobile App Development Companies List Refuted
Price should not be a determining factor when picking an app developer. Mobile applications have come to be an essential part of any business to reviews app developer com run and keep in a highlight mode. Transformative mobile applications are more than capable of altering the industry game for virtually any organization that is remarkable.
If you don’t opt for the proper mobile app development company then you’ll unable to fulfill your plans. Possessing a seasoned group of professionals makes it straightforward for the firm to provide the services to the users. https://en.wikipedia.org/wiki/Software The firm is just one of the company solution for your custom made computer software development with higher excellent integration, development, security and quality assurance.
Whenever there’s a constant shift in business environment and client preferences, company owners should now secure conscious of the hottest choices and trends. The choice can be quite tricky because there are a lot of important factors to contemplate. There are many app development businesses in the competition who tend to provide you with the best services.
For the next two years it struggled to gain a foothold in the smartphone industry. It provides the best mobile app services to their customers. With years of experience, it builds solid feature-rich apps which are secure, reliable, and easy-to-use.
Hence, below are some critical points to select the top rated iPhone app development business in India or an Android app development business in India It’s important to consult the previous projects of the organization and the revenue generated by them. It’s possible for you to find world class app developers from India with high degree of design and development wisdom and experience. Depending on the sort of your app, you might also desire a permanent tech support team to promptly find any technical issues and fix them.
Finding the Best Mobile App Development Companies List
The Android SDK also includes an emulated virtual device that’s fully functional to allow you to test out your work. The app will start uploading wirelessly. They run in a special virtual machine called the Dalvik VM.
The simplicity of upgrading app and the total usability of the framework might prove to be a challenging experience. Rename the folder to android so that it’s going to be simple to navigate. In addition, examine the problems which you might face when building the app.
The iOS Developer Center has a broad variety of tools, hints, debugging tests and guides for creating apps for practically any objective. Before development begins, you will need to detect preciselyhowyou’ll use the app. It is one of the most prospering industry worldwide that has led to the existence of more than 3 million apps.
Mobile App Development Companies List – Overview
It is crucial to nearly all businesses. The cost for doing the very same in america is very likely to be an order of magnitude higher. It has more than 100 employees, who have at least five years of experience in the industry.
Success of any company depends upon its clients’ success. Working with Code Brew offers you a couple notable benefits. It might take a couple of minutes, particularly if it’s a huge app.
The Good, the Bad and Mobile App Development Companies List
QBurst is India based one of the significant mobile application development providers. Many businesses will supply the particulars of the key projects they have worked on through their sites. Consider the length of the upkeep of the enterprise app.
The NineHertz development procedure is a well-planned and strategic approach to several modules. For the better experience in the area of technology and apps, individuals have to pick the very best platform wisely. There transparent app growth strategies have made them one of the greatest mobile app growth businesses.
Agile development is the procedure of creating software applications which follow a disciplined approach to the project administration. Android phones are a breeze to use and navigate through its platforms. Leading app growth businesses are now investing in machinery and manpower space o technologies to maximize their marketability for business enterprises nowadays.
Lies You’ve Been Told About Mobile App Development Companies List
It’s also essential for customers to understand your general mobile app development procedure, which is precisely why this section is specially devoted to outlining and describing your services. Conclusion Hence bearing in mind the aforementioned factors and points, you can pick the finest mobile application development company that may fulfill every one of your requirements. A superb market penetration program should exist for a new market as everything is not yet been explored and also the present populated market can have plenty of ups and downs too.
Ideally, the development team is involved at the start of the undertaking, but in case the technical men and women that are actually likely to construct your cellular app aren’t already on board, now’s the opportunity to bring them in. Take into consideration the way that you need your app to bring profit. To put it differently, set your app in the hands of a couple men and women in your intended audience. | {
"pile_set_name": "Pile-CC"
} |
Q:
A major incident was declared
A major incident was declared when winds caused two fires to merge near communication masts on Saturday.
From BBC.com
How should we interpret the main clause that a major incident was declared? Does it mean when winds caused fires and at that time somebody declared an incident or the major incident here is exactly the fire incident?
https://www.bbc.co.uk/news/uk-england-lancashire-44676707
A:
It is part of the procedure of the Fire Brigade.
A small fire will be put out by the local fire brigade. But if the fire becomes more serious the local fire chief will decide to call it a "major incident" and get external help and support.
In this case, there were two small fires. The winds changed and the two small fires joined up to become one large fire. This fire was near some "communication masts". The local fire chief realised that his firefighters couldn't put out the fire alone, so he called the fire a "major incident" and got help from other firefighters.
As the reporter doesn't know who the fire chief is, the reporter uses the passive voice.
| {
"pile_set_name": "StackExchange"
} |
Den 24 mars larmades polis och räddningstjänst om att en bil brann på en väg söder om Ödeshög i Östergötland. När räddningstjänsten kom till platsen hittades en kropp i bilvraket.
– I nuläget finns ingenting som tyder på att det skulle kunna vara någon annan, säger Henrik Sundin, utredare vid polisen i region öst och fortsätter:
– Det finns ingenting som tyder på att brott är begånget. Helt säkra kan vi naturligtvis inte vara, men vi har fått information som gör att vi i nuläget inte misstänker något brott, säger han.
Oklara omständigheter
Omständigheterna kring det misstänkta dödsfallet är fortfarande oklara. Bilen som hittades utbränd ägs av en anhörig till Alexander Bengtsson. En bil som enligt polisen vid tidpunkten också nyttjades av Uppsalapolitikern.
Kroppen är formellt inte identifierad, men enligt Polisen i region Öst informerades Alexander Bengtssons anhöriga om de preliminära resultaten från Rättsmedicinalverket på torsdagen. En komplett identifiering av kroppen kan komma att ta ytterligare flera veckor.
Tre fall av misstänkt falsk larm
Alexander Bengtsson har tidigare uppgivit till SVT Nyheter Uppsala att han mottagit uppemot 50 hot av olika karaktär. Bland annat att han utsattes för en knivattack i sitt hem den 9 mars i år. Men idag meddelade Åklagarmyndigheten att Alexander Bengtsson den 23 mars, delgavs misstanke om brott, gällande tre fall av misstänkt falsk larm. Flera av dem ska ha varit mordhot.
– Det pågår en utredning, säger vice chefsåklagaren vid Åklagarmyndigheten Magnus Berggren och fortsätter:
– Alexander Bengtsson har uppgett att han under en lång tid mottagit hot av olika karaktär – redan innan den misstänkta knivattacken. Efter det att vi hade samlat ihop en stor volym bevismaterial efter knivattacken fanns det detaljer i tre av de anmälda hoten som pekade åt olika håll. Då valde vi att dra igång en utredning kring falsklarm i de tre fallen.
Hur menar du?
– Vissa uppgifter pekade åt ett håll. Andra åt ett annat. Det är viktigt att understryka att vi i dagsläget inte vet vilka uppgifter som var rätt eller fel, säger Magnus Berggren.
Alexander Bengtsson delgavs misstanke om brott gällande falsk larm den 23 mars. Han befaras ha omkommit den 24 mars. Vad sa han vid tillfället av delgivelsen då?
– Han nekade till brott.
Utsatts för hot
Alexander Bengtsson är moderat politiker med förtroendeuppdrag i det kommunala bostadsbolaget Uppsalahem. Han har profilerat sig som en förkämpe mot rasism och homofobi.
Så sent som för några dagar före bilbranden deltog Bengtsson i SVT:s Gomorron, och berättade om de många hot han har fått ta emot på grund av sitt politiska engagemang. | {
"pile_set_name": "OpenWebText2"
} |
Since a recent Stanford study showed that students at practically all grade levels can't determine fake news from the real stuff, the push to teach media literacy has gained new momentum. The study showed that while students absorb media constantly, they often lack the critical thinking skills needed to tell fake news from the real stuff.
Teachers are taking up the challenge to change that. NPR Ed put out a social media call asking how educators are teaching fake news and media literacy, and we got a lot of responses. Here's a sampling from around the country:
Fake news "Simon Says"
In Scott Bedley's version of Simon Says, it's not those two magic words that keep you in the game, but deciding correctly whether a news story is real or not.
To start off the game, Bedley sends his fifth-graders at Plaza Vista School in Irvine, Calif., an article to read on their laptops. He gives them about three minutes to make their decision — they have to read the story carefully, examine its source and use their judgment. Those who think the article is false, stand up. The "true" believers stay in their seats.
Bedley says he's been trying to teach his students for a while to look carefully at what they're reading and where it comes from. He's got a seven-point checklist his students can follow:
1. Do you know who the source is, or was it created by a common or well-known source? Example National Geographic, Discovery, etc.2. How does it compare to what you already know?3. Does the information make sense? Do you understand the information?4. Can you verify that the information agrees with three or more other sources that are also reliable?5. Have experts in the field been connected to it or authored the information?6. How current is the information?7. Does it have a copyright?
Subtle changes
Bedley also teamed up recently with Todd Flory at Wheatland Elementary School in Wichita, Kan., to do a fake news challenge via Skype. Flory's fourth-graders chose two real articles and wrote a fake article of their own. Then, they presented them to Bedley's class in California.
The fifth-graders had four minutes to do some extra research based on the presentations, and then they decided which article out of the three were fake. Most importantly, they had to explain why they thought it was fake. Otherwise, no points.
Flory says writing the fake news article was more difficult for his students than they expected because they had to make it believable.
"It really hammered home the idea to them that fake news doesn't have to be too sensational," he says. "It can be a very subtle change, but that subtle change can have big consequences."
Every Friday, Flory's class participates in what he calls Genius Hour. His students propose a question to answer through online research. But before they took to the Internet, Flory had to walk his students through the steps: What are reliable and trusted websites? How do you effectively search on the Internet and verify information?
He uses Skype to connect his students with researchers and scientists from all over the world. He calls this "authentic research."
"It's so much more powerful for them to do some of this authentic research when they're able to hear from a scientist who's seeing firsthand the effects of climate change," Flory says. This year's class got to talk to a penguin scientist.
Flory says he's not only teaching his students effective media literacy skills; he is also helping them to be better citizens through global engagement and interaction.
Let them eat fake (news)
Remember Marie Antoinette and "Let them eat cake" — her famous line about the poor that got her in all that trouble?
Thing is, it never happened. Fake news!
For Diane Morey and her ninth-graders at Danvers High School in Danvers, Mass., that's a teachable moment.
"The media of the day didn't have Facebook, Twitter or partisan websites," Morey says. "But they did have pamphlets."
She shows her class cartoons and pamphlets from the French Revolutionary period that criticized Antoinette, and then discusses the conclusions that were made from those sources. She also includes a primary source: a letter written by Antoinette.
Morey says history is rich with examples of fake news, and since source analysis is the core of her lesson plans, she doesn't need a textbook.
"We don't study [history] to memorize Marie Antoinette and Louis XVI," she explains. "We're studying this because we can see this happening in the current-day political climate."
Morey encourages students to bring in examples of articles from today's news that don't ring true.
"Once you expose it to them," she says, "it's like a game for them, seeing, 'Hey, I'm not sure I can trust this.' "
Extra layers
For 13 years, Larry Ferlazzo has been teaching kids who are learning English how to read and write. Now, he's adding another layer: helping them figure out if what they're reading is true.
Last month, he wrote a lesson plan on addressing fake news to English language learners (ELLs), which was published in The New York Times.
He says media literacy is especially important for ELLs for two reasons. First, they're not fluent in the language they're reading, adding an extra level of difficulty in deciding what to believe. On top of that, false or exaggerated news about immigration could have a major impact on their lives.
His lesson starts off with a few examples of reliable and fake news. Then, some basic journalism stuff: Students identify the different parts of the news, from the "lede" to quotations. They enter all that into a diagram on paper so they have a visual representation of what they're reading.
That diagram eventually becomes a guide for students to write their own fake news lede that they can share with other classmates or post on a class blog.
Media consumers and contributors
In 2015, Spencer Brayton and his colleague Natasha Casey revamped a media literacy course for students at Blackburn College in Carlinville, Ill. Brayton says the key is the critical approach.
"Students come in expecting that we're going to lecture," Brayton explains. "But we have them think about certain power structures in how information is produced and how it reaches them. If they're going to understand how they're going to take it in, then they have to know how the news is going to be produced."
To take the class, students need a Twitter account. From the very first week, they are asked to follow five to 10 accounts on Twitter that promote media and information literacy, like Media Literacy Now or Renee Hobbs.
As they follow these posts and add additional ones, the goal is that they'll start to recognize fake news and other biases or viewpoints in media.
By the end of the course, Brayton says students begin to see themselves not only as creators of information, but as credible sources of information too.
The Twitter assignments encourage his students to engage with social media - retweeting, following and commenting — which Brayton says helps his students see how they play a role in spreading information to other media consumers. That means they have to take what they share more seriously.
"In looking at this issue, people seem to want a quick solution to fake news, but I'm not sure there is a solution (at least an easy one)," Brayton writes in an email. "Students need to recognize that these skills and ideas need to stay with them through adulthood, but that's easier said than done — we all fall into this trap." | {
"pile_set_name": "Pile-CC"
} |
[Treatable hereditary neuro-metabolic diseases].
Hereditary metabolic diseases may appear during adolescence or young adulthood, revealed by an apparently unexplained neurological or psychiatric disorder. Certain metabolic diseases respond to specific treatments and should be identified early, particularly in emergency situations where rapid introduction of a treatment can avoid fatal outcome or irreversible neurological damage. The main diseases leading to an acute neurological syndrome in the adult are urea cycle disorders, homocysteine metabolisms disorders and porphyria. More rarely, Wilson's disease, aminoacid diseases, organic aciduria, or pyruvate dehydrogenase deficiency, beta-oxidation disordes or biotin metabolism may be involved. Most emergency situations can be screen correctly with simple tests (serum ammonia, homocysteine, lactate, urinary prophyrines, acylcarnitine pattern, amino acid and organic acid chromatography). For chronic situations, the main treatable diseases are Wilson's disease, homocysteine, cerebrotendinous xanthomatosis, Refsum's disease, vitamin E deficiency, Gaucher's disease, Fabry's disease, and neurotransmitter metabolism disorders. We present treatable metabolic disorders as a function of the different clinical situations observed in adults. | {
"pile_set_name": "PubMed Abstracts"
} |
Q:
Forest trees fitting on page
My forest looks like this but it does not fit on a page, this is my first time using this package. I am looking for suggestions to fit this into a page, hopefully they will not be too intensive because I plan on making an even bigger tree.
\documentclass{article}
\usepackage{forest}
\begin{document}
\begin{forest}
for tree={circle,draw, l sep=20pt}
[1,red
[2, edge label={node[midway,left] {A}}
[1,red,edge label={node[midway,left] {B}}
[2,red,edge label={node[midway,right] {C}}]
[2,red,edge label={node[midway,right] {D}}]
]
[1,red,edge label={node[midway,right] {C}}
[2,red,edge label={node[midway,right] {B}}]
[2,red,edge label={node[midway,right] {D}}]
]
[1,red,edge label={node[midway,right] {D}}
[2,red,edge label={node[midway,right] {B}}]
[2,red,edge label={node[midway,right] {C}}]
]
]
[2, edge label={node[midway,left] {B}}
[1,red, edge label={node[midway,left] {A}}
[2,red,edge label={node[midway,right] {C}}]
[2,red,edge label={node[midway,right] {D}}]
]
[1,red, edge label={node[midway,right] {A}}
[2,red,edge label={node[midway,right] {C}}]
[2,red,edge label={node[midway,right] {D}}]
]
[1,red,edge label={node[midway,right] {A}}
[2,red,edge label={node[midway,right] {C}}]
[2,red,edge label={node[midway,right] {D}}]
]
]
[2, edge label={node[midway,left] {C}}
[1,red,edge label={node[midway,left] {A}}
[2,red,edge label={node[midway,right] {B}}]
[2,red,edge label={node[midway,right] {D}}]
]
[1,red,edge label={node[midway,right] {B}}
[2,red,edge label={node[midway,right] {A}}]
[2,red,edge label={node[midway,right] {D}}]
]
[1,red,edge label={node[midway,right] {D}}
[2,red,edge label={node[midway,right] {A}}]
[2,red,edge label={node[midway,right] {B}}]
]
]
[2, edge label={node[midway,left] {D}}
[1,red,edge label={node[midway,left] {A}}
[2,red,edge label={node[midway,right] {B}}]
[2,red,edge label={node[midway,right] {C}}]
]
[1,red,edge label={node[midway,right] {B}}
[2,red,edge label={node[midway,right] {A}}]
[2,red,edge label={node[midway,right] {C}}]
]
[1,red,edge label={node[midway,right] {C}}
[2,red,edge label={node[midway,right] {A}}]
[2,red,edge label={node[midway,right] {B}}]
]
]
]
\end{forest}
\end{document}
A:
I would:
use geometry to get more sensible margins;
move some branches of the tree down to conserve space;
used squared edges to avoid branches crossing things and to reduce crowding and clutter;
avoid putting labels so that edges are drawn through them by repositioning them slightly for greater legibility;
use a style to simplify adding the edge labels, which allows their positions to be amended more easily and determined more consistently (and saves typing) e.g. my label in the example below;
consider adding colour automatically for trees where there is a pattern e.g. all final nodes are a different colour or all left-hand nodes or whatever (but this is just to save typing and clearly a matter of preference);
use pdflscape for larger trees (not needed for this one).
Here's an example:
\documentclass{article}
\usepackage{geometry}
\usepackage[edges]{forest}
\begin{document}
\noindent
\begin{forest}
my label/.style={%
if n=1{%
edge label={node [midway,left] {#1}}
}{%
if n'=1{%
edge label={node [midway,right] {#1}}
}{%
edge label={node [midway,below right] {#1}}
}
},
},
for tree={circle,draw, l sep=20pt},
before typesetting nodes={
where content={}{coordinate}{},
},
forked edges,
[1,red
[2, my label={A}
[1,red,my label={B}
[2,red,my label={C}]
[2,red,my label={D}]
]
[1,red,my label={C}
[2,red,my label={B}]
[2,red,my label={D}]
]
[1,red,my label={D}
[2,red,my label={B}]
[2,red,my label={C}, tier=this]
]
]
[, tier=this, my label={B}
[2
[1,red, my label={A}
[2,red,my label={C}]
[2,red,my label={D}]
]
[1,red, my label={A}
[2,red,my label={C}]
[2,red,my label={D}]
]
[1,red,my label={A}
[2,red,my label={C}]
[2,red,my label={D}]
]
]]
[2, my label={C}
[1,red,my label={A}
[2,red,my label={B}]
[2,red,my label={D}]
]
[1,red,my label={B}
[2,red,my label={A}]
[2,red,my label={D}]
]
[1,red,my label={D}
[2,red,my label={A}]
[2,red,my label={B}, tier=this]
]
]
[, tier=this, my label={D}
[2
[1,red,my label={A}
[2,red,my label={B}]
[2,red,my label={C}]
]
[1,red,my label={B}
[2,red,my label={A}]
[2,red,my label={C}]
]
[1,red,my label={C}
[2,red,my label={A}]
[2,red,my label={B}]
]
]]
]
\end{forest}
\end{document}
| {
"pile_set_name": "StackExchange"
} |
Die Bundesregierung will Tausende Asylbewerber nach Afghanistan abschieben. Einige von ihnen bezichtigen sich deshalb nun selbst als Terroristen – und bringen damit bizarrerweise die Justiz in Schwierigkeiten.
Anzeige
Am Mittwochabend hob die erste Maschine am Frankfurter Flughafen ab. Ihr Ziel: Kabul. An Bord waren 34 abgelehnte Asylbewerber aus Afghanistan. Nach dem Willen der Bundesregierung markiert der Flug den Beginn einer Massenabschiebung. Bis zu 12.500 Afghanen sollen bald schon in ihre Heimat zurückgebracht werden. Anfang Oktober hatte die Europäische Union (EU) mit der afghanischen Regierung ein Abkommen unterzeichnet, das im Gegenzug für ein milliardenschweres Hilfspaket die leichtere Abschiebung von Flüchtlingen ermöglicht.
Bundesweit kam es in den vergangenen Tagen zu Demonstrationen gegen die geplanten Rückführungen an den Hindukusch. Afghanistan, so die Gegner der Abschiebungspolitik, sei alles andere als ein sicheres Herkunftsland. Immerhin starben dort laut UN seit 2009 rund 23.000 Zivilisten durch Krieg und Terroranschläge.
Erste Sammelabschiebung nach Afghanistan Unter massiven Protesten von Pro Asyl hob Mittwoch erstmals ein Flugzeug mit rund 50 abgelehnten Asylbewerbern Richtung Kabul ab. In einem Fall mussten die Behörden aber eine Ausnahme machen. Quelle: Die Welt/Achim Unser
Trotz der Proteste werden Rückführungen von Flüchtlingen aus Deutschland nach Afghanistan wohl weitergehen. Einige afghanische Asylbewerber greifen daher nach Informationen der „Welt“ neuerdings zu einem kuriosen Trick: Sie bezichtigen sich selbst, Taliban-Kämpfer zu sein. Das wiederum stellt deutsche Behörden vor einige Probleme.
Paragraf 129 des Strafgesetzbuches als Hoffnungsanker
Anzeige
Die islamistische Taliban-Bewegung ist in der Bundesrepublik als ausländische Terrororganisation verboten. Ihre Mitglieder werden nach Paragraf 129 a und Paragraf 129 b Strafgesetzbuch von der Bundesanwaltschaft in Karlsruhe verfolgt. Wer sich den Taliban angeschlossen hat, muss mit einer Gefängnisstrafe von bis zu zehn Jahren rechnen.
Einige Afghanen scheinen dies bereitwillig und vielleicht sogar gezielt in Kauf zu nehmen. Sie behaupten beispielsweise in Asylgesprächen mit den Mitarbeitern des Bundesamts für Migration und Flüchtlinge (BAMF), in Afghanistan für die Taliban gekämpft zu haben – oder dazu gezwungen worden zu sein. Die bizarre Folge: Im schlimmsten Fall werden die Flüchtlinge festgenommen und verurteilt – aber eben nicht abgeschoben.
„Der Sachverhalt ist dem Bundesinnenministerium bekannt“, berichtete eine Sprecherin des Ministeriums auf Anfrage. Asylsuchende würden in der Tat behaupten, sie selbst oder ihre Familienmitglieder hätten in Afghanistan die Taliban unterstützt oder seien zur Zusammenarbeit mit diesen gezwungen worden. „Diese Behauptungen können zur Einleitung eines Ermittlungsverfahrens des Generalbundesanwalts wegen des Verdachts der Mitgliedschaft in einer terroristischen Vereinigung im Ausland führen“, hieß es weiter. Die Sicherheitsbehörden würden die Fälle sehr ernst nehmen und entsprechend verfolgen.
Am Ende kommt es meist gar nicht zu einer Anklage
Anzeige
Wie die „Welt“ aus Sicherheitskreisen erfuhr, stieg die Zahl dieser terroristischen Selbstbezichtigungen unter Afghanen in den vergangenen Wochen deutlich an. Sowohl die Landeskriminalämter (LKA) als auch das Bundeskriminalamt (BKA) bekommen gehäuft Meldungen von selbst ernannten Taliban-Kämpfern. Hinreichende Belege für eine Mitgliedschaft bei der Terrorgruppe gab es allerdings bislang nur in wenigen Fällen, heißt es vonseiten der Ermittler.
Seit Oktober ließ die Bundesanwaltschaft drei Afghanen festnehmen, bei denen es sich um ehemalige Taliban-Kämpfer handeln soll. Wajid S., 19, Abdullah S. K., 17, und Hekmat T., 20, stehen im Verdacht, bei den Taliban eine terroristische Ausbildung an Schusswaffen erhalten zu haben. Zwei Verdächtige sollen zudem an Angriffen auf afghanische Sicherheitskräfte beteiligt gewesen sein. Die Männer sitzen derzeit in Untersuchungshaft. Ob es in den Fällen auch tatsächlich zu Anklagen kommen wird, ist noch unklar.
Gerichtsfeste Belege für Terroraktivitäten werden deutsche Ermittler kaum erhalten, heißt es in Sicherheitskreisen. Auch weil die Zusammenarbeit mit den afghanischen Behörden in diesem Bereich eher schlecht als recht funktioniert. Die Ermittlungsverfahren gegen die angeblichen Taliban werden also womöglich ergebnislos eingestellt. Abgeschoben werden die Afghanen jedoch trotzdem nicht. Sie könnten darauf verweisen, dass ihnen in der Heimat Folter oder gar die Todesstrafe droht – und das wiederum wäre ein Asylgrund. | {
"pile_set_name": "OpenWebText2"
} |
Wes Brown made a goal-scoring return for Sunderland against Tottenham © Getty Images Enlarge
Sunderland manager Paolo Di Canio has revealed defender Wes Brown turned down a pay-off from the club as he wanted to continue his career at the Stadium of Light.
Brown, 33, joined Sunderland from Manchester United in 2011 but has suffered with injuries that have reduced him to just 20 appearances in two seasons, with his last competitive game for the Black Cats coming in January 2012.
That led to an offer to terminate his contract, but the former England defender made a goal-scoring return in Wednesday's 3-1 friendly victory over Tottenham and Di Canio has been impressed by his determination.
"The club had a conservation with him, but with his strong character, he [Brown] said: 'I feel a footballer, I want to stay here and prove it'," Di Canio told the Sunderland Echo. "Because I'm an intelligent manager, I didn't have any preclusion to anyone doing that.
"He was the perfect professional to have in a squad and what a player. He hasn't stopped for one minute in a training session. My pre-season is very tough, but he hasn't had any problems."
© ESPN Sports Media Ltd | {
"pile_set_name": "OpenWebText2"
} |
"There's no doubting the footballs been shite." Exactly Harry, wtf have i been saying and getting dogs abuse from you for two seasons? You haven't been saying that for two years you've been spouting 'Trust in Jose' and trying to claim that games that have been shite have been great and that every fucker is to blame but Jose. I'm not calling for his head i'm calling for better more consistent football. Give the players a chance to be attacking, creative, brave. And stop crowing about beating average or worse teams.
Jose should expect Pogba to be disiplined / capable of a variation in midfield play ,he ain't exactly asking him to play in goal or right back , he may not be as effective in that place but that's up to Jose where he gets the best out of the lad .
The jury is out on where Pogba should play but that ain't Jose's , fault for me I think he should be a numb 10 behind in the present side Sanchez, but then Jose is relying to much on Matic , has Fellani injured ( and possibly in the departure lounge) Herrera not good enough but ultimately have to use him the kid who played Sat plus Carrick finished and a makeshift Blind.
As for the MEN article the manager was criticised for publicly calling out players early season and when he gives them encouragement in public he gets a pelter too?
"There's no doubting the footballs been shite." Exactly Harry, wtf have i been saying and getting dogs abuse from you for two seasons? You haven't been saying that for two years you've been spouting 'Trust in Jose' and trying to claim that games that have been shite have been great and that every fucker is to blame but Jose. I'm not calling for his head i'm calling for better more consistent football. Give the players a chance to be attacking, creative, brave. And stop crowing about beating average or worse teams.
Belt up you big tart. What the fuck do you know about consistency. It doesn't matter how they've played you've always found time to slate Joey. End of.
I saw that Jose said something about the need to work on our "attacking dynamic", or something like that, after the last game. I'm glad that he recognises that. Sanchez is a good player who improves our forward line, but it really doesn't look like it's more than the sum of its parts, it's just three (or four) individual players doing their thing.
We were banging in the goals in the first month of the season, but our scoring rate has been gradually dribbling downward since then. In fact, after the first six games, which we did really well in, our record for the past 20 games is exactly the same as Liverpool's.
"Despite his reputation, United manager's faith in youth has put Guardiola in the shade"
It was mostly overlooked at the time, a casualty of the fanfare surrounding Alexis Sanchez's signing a few days earlier, but when Manchester United announced Jose Mourinho had signed a new contract last month, there was a line from the club's executive vice-chairman, Ed Woodward, praising the manager's commitment to blooding youth."He has embraced the club's desire to promote top quality young players to the first team," said Woodward, a pointed response to those who suggested the Portuguese would pay little more than lip service to the club's rich traditions of cultivating home-grown talent.Those suggestions had solid enough foundations. For all the success Mourinho's managerial career has brought him, there has been a perennial black splodge next to the box marked youth development and no one has been more aware of this than the man himself.It has felt very different at United, though, and while entrenched reputations can take a long time to change, certain perceptions are, for now at least, being challenged.There has been an understandable rush to measure Mourinho and United's every move against what Pep Guardiola has been doing at Manchester City. But while Guardiola has raised all sorts of bars this term, there is a certain irony that Mourinho - "the monster that kills the little kids" as he sarcastically described himself last week - has bought into the academy ethos in a way his great adversary, often heralded as a champion of youth, has yet to do with any particular conviction down the road.Tomorrow marks the 60th anniversary of the Munich air disaster, and on a weekend when United supporters honoured the memory of the Busby Babes - one of the ultimate symbols of the potency of youth - there was something rather poignant about Mourinho dropping Paul Pogba and playing academy graduate Scott McTominay in the £89million man's place against Huddersfield.Before anyone hints at an ulterior motive there, it is worth remembering that Mourinho has never been one for sentiment and that McTominay had already made more starts this season than the entirety of the five academy graduates at City who have fleetingly tasted first-team football under Guardiola since August. Note, too, that Marcus Rashford has made more appearances - 90 - than anyone since Mourinho took charge at United and another academy graduate, Jesse Lingard, who has also flourished, is fourth on that list.While Mourinho was extolling the virtues of McTominay, or the "kid" as he affectionately calls him, Guardiola was whining about not having enough players in the wake of a mounting injury list and a failed move for Riyad Mahrez, and reiterated the point with a grimly petty decision to name only six substitutes against Burnley.Such arguments really do not hold much sway when you have spent £450 million in 19 months and have an academy awash with exciting talents, any number of whom would have benefited from the experience of a match-day with the first-team squad. "If you're the academy or reserve-team manager at Manchester City, you must think, 'I'm wasting my time'," said Gary Neville, the former United defender and Sky Sports pundit. "Rather than saying in an interview, 'I haven't got the players', he could say he's brought a young player from the youth team who has been wonderful this season. It's really poor. And I can guarantee you the youth-team coach and reserve-team coach at Manchester City will feel disheartened by him having six players on the bench."It was a wretched move Mourinho's critics might have once expected him to make but the tide seems to be turning. | {
"pile_set_name": "Pile-CC"
} |
In this category you can find us all stand for the presentation of your cupcakes. Choose between different types of stands, in different materials and prices. Present your creations correctly and completely or Set a beautiful showcase. | {
"pile_set_name": "Pile-CC"
} |
Q:
Are there any good tools to generate a Google Sitemap?
Can you recommend any tools? Should we build our own? Should we create the sitemap manually?
A:
The Google Sitemap Generator for IIS generates a sitemaps based on actual HTTP requests to your server (unlike other sitemap generators that rely on a crawlable path from the homepage, Google's approach doesn't actually crawl your site).
It is uniquely suited to dynamic applications, particularly those that have a deep bank of data that's surfaced through user queries alone.
| {
"pile_set_name": "StackExchange"
} |
Petticoat affair
The Petticoat Affair (also known as the Eaton Affair), was a U.S. scandal involving members of President Andrew Jackson's Cabinet and their wives, from 1829 to 1831. Led by Floride Calhoun, wife of Vice President (VP) John C. Calhoun, these women, dubbed the "Petticoats," socially ostracized then–Secretary of War John Eaton and his wife Peggy Eaton, over disapproval of the circumstances surrounding the Eaton's marriage; what they deemed as her failure to meet the "moral standards of a Cabinet Wife".
The Petticoat Affair rattled the entire Jackson Administration, and inevitably led to the resignation of all but one Cabinet member. The ordeal facilitated Martin Van Buren's rise to the presidency, and was in part responsible for VP Calhoun's transformation from a "Nationwide political figure with Presidential aspirations", into a "Sectional-leader of the Southern states".
Background
Margaret "Peggy" Eaton was the eldest daughter of William O'Neill, owner of The Franklin House, a boarding house and tavern located in Washington, D.C. a short distance from the White House that was a well-known social hub popular with politicians and military officials. Peggy was well-educated for a woman of that era - she studied French and was known for her ability to play the piano. William T. Barry, who later served as Postmaster General, wrote "of a charming little girl ... who very frequently plays the piano, and entertains us with agreeable songs." As a young girl, her reputation had already begun to come under scrutiny, due to being employed in a bar frequented by men as well as her casual bantering with the boarding house's clientele. In her elder years, Peggy reminisced, "While I was still in pantalettes and rolling hoops with other girls, I had the attention of men, young and old; enough to turn a girl's head."
When Peggy was 15 years old, her father intervened to prevent her attempt to elope with an Army officer. In 1816, the now-17-year old married John B. Timberlake (1777-1828), a purser in the United States Navy. Timberlake, aged 39, had a reputation as a drunkard and was heavily in debt. The Timberlakes became acquainted with John Eaton in 1818. At the time, Eaton was a wealthy 28-year-old widower and newly elected U.S. Senator from Tennessee, despite not yet having reached the constitutionally-mandated minimum age of 30. He was also a long-time friend of Andrew Jackson.
Once Timberlake told Eaton of his financial troubles, Eaton unsuccessfully attempted to have the Senate pass legislation that would authorize payment of the debts Timberlake had accrued during his Naval service. Eventually, Eaton paid Timberlake's debts, and procured him a lucrative posting to the U.S. Navy's Mediterranean Squadron; many rumormongers asserted that Eaton aided Timberlake as a means to remove him from Washington, in order for Eaton to socialize with Peggy. While with the Mediterranean Squadron, Timberlake died on April 2, 1828. This served to fuel new rumors throughout Washington, suggesting he had taken his own life, as the result of Eaton's supposed affair with Peggy. Medical examiners concluded Timberlake had died of pneumonia, brought on by pulmonary disease.
Controversy
Jackson was elected president in 1828, with his term set to begin on March 4, 1829. He was reportedly fond of Peggy Timberlake and encouraged Eaton to marry her. They were wed on January 1, 1829; only nine months after her husband's death. Customarily, it would have been considered "proper" for their marriage to have followed a longer mourning period.
Historian John F. Marszalek explained his opinion on the "real reasons Washington society found Peggy unacceptable":
"She did not know her place; she forthrightly spoke up about anything that came to her mind, even topics of which women were supposed to be ignorant. She thrust herself into the world in a manner inappropriate for a woman. ... Accept her, and society was in danger of disruption. Accept this uncouth, impure, forward, worldly woman, and the wall of virtue and morality would be breached and society would have no further defenses against the forces of frightening change. Margaret Eaton was not that important in herself; it was what she represented that constituted the threat. Proper women had no choice; they had to prevent her acceptance into society as part of their defense of that society's morality."
When Jackson assumed the presidency, he appointed Eaton as Secretary of War. Floride Calhoun, Second Lady of the United States, led the wives of other Washington political figures, mostly those of Jackson's cabinet members in an "anti-Peggy" coalition, which served to shun the Eatons socially and publicly. The women refused to pay courtesy calls to the Eatons at their home, to receive them as visitors, and denied them invitations to parties and other social events.
Emily Donelson, niece of Andrew Jackson's late wife Rachel Donelson Robards, and the wife of Jackson's confidant Andrew Jackson Donelson, served as Jackson's "surrogate First Lady". Emily Donelson chose to side with the Calhoun faction, thus leading to Jackson replacing her with his daughter-in-law Sarah Yorke Jackson, as his official hostess. Secretary of State, Martin Van Buren, was a widower, and the only unmarried member of the Cabinet; he raised himself in Jackson's esteem by aligning himself with the Eatons.
Jackson's sympathy for the Eatons stemmed in part from his late wife Rachel being the subject of innuendo during the presidential campaign, when questions arose as to whether her first marriage had been legally ended before she married Jackson. Jackson believed these attacks were the cause of Rachel's death on December 22, 1828, several weeks after his election to the presidency.
Eaton's entry into a high-profile cabinet post helped intensify the opposition of Mrs. Calhoun's group. In addition, Calhoun was becoming the focal point of opposition to Jackson; Calhoun's supporters opposed a second term for Jackson because they wanted Calhoun elected president. In addition, Jackson favored and Calhoun opposed the protective tariff that came to be known as the Tariff of Abominations. U.S. tariffs on imported goods generally favored northern industries by limiting competition, but southerners opposed them because the tariffs raised the price of finished goods, but not the raw materials produced in the south. The dispute over the tariff led to the Nullification Crisis of 1832, with southerners - including Calhoun - arguing that states could refuse to obey federal laws to which they objected, even to the point of secession from the Union, while Jackson vowed to prevent secession and preserve the Union at any cost. Because Calhoun was the most visible opponent of the Jackson administration, Jackson felt that Calhoun and other anti-Jackson officials were fanning the flames of the Peggy Eaton controversy in an attempt to gain political leverage. Duff Green, a Calhoun protégé and editor of the United States Telegraph, accused Eaton of secretly working to have pro-Calhoun cabinet members Samuel D. Ingham (Treasury) and John Branch (Navy) removed from their positions.
Eaton took his revenge on Calhoun. In 1830, reports had emerged which accurately stated that Calhoun, while Secretary of War, had favored censuring Jackson for his 1818 invasion of Florida. These reports infuriated Jackson. Calhoun asked Eaton to approach Jackson about the possibility of Calhoun publishing his correspondence with Jackson at the time of the Seminole War. Eaton did nothing. This caused Calhoun to believe that Jackson had approved the publication of the letters. Calhoun published them in the Telegraph. Their publication gave the appearance of Calhoun trying to justify himself against a conspiracy, which further enraged the President.
Resolution
The dispute was finally resolved when Van Buren offered to resign, giving Jackson the opportunity to reorganize his cabinet by asking for the resignations of the anti-Eaton cabinet members. Postmaster General William T. Barry was the lone cabinet member to stay, and Eaton eventually received appointments that took him away from Washington, first as governor of Florida Territory, and then as minister to Spain.
On June 17, the day before Eaton formally resigned, a text appeared in the Telegraph stating that it had been "proved" that the families of Ingham, Branch, and Attorney General John M. Berrien had refused to associate with Mr. Eaton. Eaton wrote to all three men demanding that they answer for the article. Ingham sent back a contemptuous letter stating that, while he was not the source for the article, the information was still true. On June 18, Eaton challenged Ingham to a duel through Eaton's brother in law, Dr. Philip G. Randolph, who visited Ingham twice and the second time threatened him with personal harm if he did not comply with Eaton's demands. Randolph was dismissed, and the next morning Ingham sent a note to Eaton discourteously declining the invitation, and describing his situation as one of "pity and contempt." Eaton wrote a letter back to Ingham accusing him of cowardice. Ingham was then informed that Eaton, Randolph, and others were looking to assault him. He gathered together his own bodyguard, and was not immediately molested. However, he reported that for the next two nights Eaton and his men continued to lurk about his dwelling and threaten him. He then left the city, and returned safely to his home. Ingham communicated to Jackson his version of what took place, and Jackson then asked Eaton to answer for the charge. Eaton admitted that he "passed by" the place where Ingham had been staying, "but at no point attempted to enter ... or besiege it."
Aftermath
In 1832, Jackson nominated Van Buren to be Minister to Great Britain. Calhoun killed the nomination with a tie-breaking vote against it, claiming his act would "...kill him, sir, kill him dead. He will never kick, sir, never kick." However, Calhoun only made Van Buren seem the victim of petty politics, which were rooted largely in the Eaton controversy. This raised Van Buren even further in Jackson's esteem. Van Buren was nominated for vice president, and was elected as Jackson's running mate when Jackson won a second term in 1832. Van Buren thus became the de facto heir to the presidency, and succeeded Jackson in 1837.
Although Emily Donelson had supported Floride Calhoun, after the controversy ended Jackson asked her to return as his official hostess; she resumed these duties in conjunction with Sarah Yorke Jackson until returning to Tennessee after contracting tuberculosis, leaving Sarah Yorke Jackson to serve alone as Jackson's hostess.
John Calhoun resigned as vice president shortly before the end of his term, and returned with his wife to South Carolina. Quickly elected to the U.S. Senate, he returned to Washington not as a national leader with presidential prospects, but as a regional leader who argued in favor of states' rights and the expansion of slavery.
In regard to the Petticoat affair, Jackson later remarked, "I [would] rather have live vermin on my back than the tongue of one of these Washington women on my reputation." To Jackson, Peggy Eaton was just another of many wronged women who over his lifetime he had known and defended. He believed that every woman he had defended in his life, including her, had been the victim of ulterior motives, so that political enemies could bring him down.
According to historian Daniel Walker Howe, the episode influenced the emergence of feminism. The Cabinet wives insisted that the interests and honor of all women were at stake. They believed a responsible woman should never accord a man sexual favors without the assurance that went with marriage. A woman who broke that code was dishonorable and unacceptable. Howe notes that this was the feminist spirit that in the next decade shaped the woman's rights movement. The aristocratic wives of European diplomats in Washington shrugged the matter off; they had their national interest to uphold, and had seen how life worked in Paris and London.
Legacy
Historian Robert V. Remini says that "the entire Eaton affair might be termed infamous. It ruined reputations and terminated friendships. And it was all so needless."
The 1936 film The Gorgeous Hussy is a fictionalized account of the Petticoat affair. It featured Joan Crawford as Peggy O'Neal, Robert Taylor as John Timberlake, Lionel Barrymore as Andrew Jackson, and Franchot Tone as John Eaton.
References
Bibliography
External links
"Andrew Jackson and the Tavern-Keeper's Daughter", Women's History
Andrew Jackson on the Web: Petticoat Affair
J. Kingston Pierce, "Andrew Jackson's 'Petticoat Affair'", The History Net, June 1999
This American Life, #485 "Surrogates", Act One: Petticoats in a Twist, (January 25, 2013). Sarah Koenig talks with historian Nancy Tomes about the Petticoat Affair.
Category:Political scandals in the United States
Category:Political controversies in the United States
Category:1831 in the United States
Category:John C. Calhoun
Category:Presidency of Andrew Jackson | {
"pile_set_name": "Wikipedia (en)"
} |
As Erick noted earlier today, my fellow Texans have a clear, distinct choice as to who will be the Speaker of the Texas House coming up this Tuesday, January 11th. Let’s be honest. There is a clear cut difference between Joe Straus and Ken Paxton. For more on that, check this site out. In spite of all the ads he has bought on Drudge, NewsMax | Read More »
As Erick noted earlier today, my fellow Texans have a clear, distinct choice as to who will be the Speaker of the Texas House coming up this Tuesday, January 11th. Let’s be honest. There is a clear cut difference between Joe Straus and Ken Paxton. For more on that, check this site out. In spite of all the ads he has bought on Drudge, NewsMax | Read More » | {
"pile_set_name": "Pile-CC"
} |
"Ooooh... yes..." "Barry." "Oh... oh... uh-huh..." "I can honestly say I never thought I'd be doing anything like this." "Shh, shh, shh." "Stop wiggling around." "Oh, Barry." "I hope that was good for you, because... it's going to cost you." " Whew!" " I think I'm going to love stake-outs." "Oh, that... stop." "We don't want the client to hear that on playback." "Men these days have no idea how to treat a woman." "He could have at least sprung for a motel room." "Um... no." "No motel - no receipt." "No receipt - no paper trail." "Which is why the wife has me following him around." "Let's see." "You know, I was once caught in 'flagrante delicto', with the girlfriend of a Vegas mobster." "The mug popped me twice in the gut." "I'm having a hard time picturing you as gangster." "When Bugsy caught me bumping uglies with his twist he went off the track, clipped me on the spot." "Had his boys dump me in the Vegas landfill like I was yesterday's garbage." "He figured, he figured I was down for the long dirt nap... but by the next night, I was back with his skirt, ribbed up with the perfect song." "Hey, wait a minute, you need blood to heal." "There's lots of life in a dump, and beggars can't be choosers." "Oh, wow, I hope she was worth it." "Love is always worth the risk." "Eternity is a long time to live with regret." "Did you ever consider writing greeting cards?" "Dad, I already did that." "The muscle tone isn't nearly supple enough." "What if his wife were to reach out and hold his hand?" "All she would feel is his death." "Now apologize." "Sorry." "Not to me." "Mr. Swanson, I apologize." "Now you may activate the pump." "Let's give Mr. Swanson some privacy, shall we?" "BLOOD TIES 1x10 "NECRODOME" Subtitles subXpacio" "Words can not begin to express how terribly sorry I am about this, Mrs. Swanson." "Rest assured this has never happened before." "Diesel's funeral was supposed to be this afternoon!" "As soon as your husband is retrieved..." "Retrieved!" "He's not some bone for a dog to find, Mr. Ulyanov!" "I'm going to the police." "No one wants this sad final chapter of Mr. Swanson's life to become public knowledge." "Ms. Nelson, thank you for coming so quickly." "Well your message did say it was urgent." " Yes, very urgent." " Mrs. Swanson, this is private detective I was telling you about." "She will ensure that your husband is found as quickly as possible." "You'll find my Diesel?" "I'll do my best." "If you'll excuse me, I believe Mr. Ulyanov and I have some... particulars to discuss about your case." "Thank you Ms. Nelson." "You come highly recommended." "Dr. Mohadevan assures me I can expect results." "Well in the future, you might want to make sure I'll actually take the case... before you start making promises." "And you can be discreet, yes?" "This matter requires discretion above all else." "And results." "Discretion and results." "Why don't you just start by telling me what happened to the late Mr. Swanson." "He arrived two days ago." "Liver failure." "Jaundice wreaks havoc with the skin tones, so he was scheduled for an overnight." "When I came in this morning to check on the status of his embalming procedure, he was gone." "Was there any evidence of a break-in?" "The back door was jimmied open." "He must have came and left that way." "Are you sure?" "Ivan and I were in the front office working on some paperwork." "We would have seen go out the front." "Dr. Mohadevan also assures me that I can afford you the courtesy... of full disclosure." "And you haven't call the police because... why?" "There are aspects of this situation that the authorities wouldn't necessarily comprehend." "This was taken by our security camera." "What is he doing?" "I need that disc." "And a very large retainer." "Take a look at this." "What are you doing?" "There's something different about you." "I don't think so." "Same soap." "Same shampoo." "Same detergent." "Something more primal." "I changed my fabric softener." "You smell like death." "Okay, how is that even remotely a turn-on?" "Decay is a common base-note in most perfume." "Usually derived from jasmine." " Oh." "The fusion of attractive and repulsive scents... creates a sense of urgency, don't you think?" "Not really." "Now watch, please." " Who was that?" " 'Sweet' Diesel Swanson." "Not exactly my type." "He was the Heavyweight Champion for about 10 minutes, until the Boxing Commission found out he'd bet on himself." "Are you investigating his death?" "Not exactly." "There!" "What is that?" "Is that some kind of voodoo?" "It's a form of necromancy, a particularly foul magic practiced on the dead." "From the looks of that mask, I'd say Egyptian." " Hm." " What else do you have?" "Well, the guy who broke in," "I mean, he knew the location of every one of the surveillance cameras... so he picked the door closest to the prep room." "Never shows his face." "He left no fingerprints." "He knows his way around this place." "Boris Ulyanov a necromancer?" "Impossible." "He hired you to find Mr. Swanson." "Well unfortunately, in my business, client does not always equal innocent." "How long have you know him?" "As long as I've worked here." "He is a most dedicated mortician." "A heinous crime has been committed against Mr. Swanson." "There is nothing worse than an Easter Weekend." "I take it you don't mean the holiday with the bunnies and the chocolate." "She's talking about a resurrection." "There's a code word for 'walking dead'?" "Well, many colleagues have had experiences... that would sound 'crazy' to a lay person." "When I started, I would see things out of the corner of my eye that I... chalked up to tricks of light." "Now I accept the supernatural as a fact of life." "And apparently a fact of death." "All right, thanks." "So if Boris Ulyanov didn't kill him, perhaps a disgruntled employee?" "No, disgruntled employees take office supplies." "So where does that leave us?" "Well, why resurrect the dead?" "Love." "His wife." "Maybe he arranged all this for himself." " Is that what you think?" " No, I think it's a possibility." "He found out he had liver failure, he couldn't face it, so he went out and... found someone who could resurrect him." "For the record, Swanson is re-animated." "I am resurrected." "There's a difference?" "Diesel Swanson is still walking only... because of the dark magic to serve the Necromancer who raised him." "He has no freedom of will." "He has no life." "I maintain my personality, my intelligence, my wit." "Your humility." "My soul." "This whole walking dead thing must be pretty weird for you." "Pays the bills." "I've seen a lot of weird stuff." "I grew up here, you know." "Was that difficult for you?" "No, it was a pretty typical childhood, actually, except for the dead bodies." "I used to hide under the... caskets during the funerals and pretend to drive the hearse." "This whole place was like my play room." "I think the other kids thought I was pretty cool, you know, in a freak show kind of way." "When my Grade Seven teacher died in a car accident, they... brought her body here and everyone wanted to see it." "Ha, here I was having slumber parties." "Billy, my best friend at the time - we were pretty young - he dared me and I dared him back, and you know how that goes." "He pulled back the sheet and she sat straight up." " She wasn't dead?" " Oh, she was dead." "Yeah, head-on collision." "But I could swear, though, she was looking right at me." "I thought my dad was going to kill us." "How about recently, have you noticed anything strange?" "Dead body walking around is pretty strange." "What about disgruntled former employees or dissatisfied customers?" "No, it's just my dad and I." "And we've never had a dissatisfied customer... until now." "Hi, I wonder if I could ask you a few questions?" "If you don't mind, I'd like to get this done." " You're moving?" " To my sister's." "I have to, no insurance." "Diesel tried hard but he wasn't the best with money." "Do you mind if I ask you some questions about his activities in the last few months?" "If he wasn't here, he was at the Dome." "It's a sports joint down on King." "Big screen TVs, big breasted waitresses, big everything." "He took a job as a host." "Six hundred a week plus free food and booze to sit at the bar... and schmooze the paying customers." "It was embarrassing." "He was only 36 and he was acting like his career was over." " Yeah, he was quite a boxer." " 46 and 1, every victory a knock-out." "He disserved that championship belt." "I heard about the bet." "The Commission decided to make an example of him." "Fined him and lay down a 10 year ban?" "Must have made him pretty angry." "He gave up." "I tried to tell him that his career wasn't over, but he couldn't get over the guilt and the humiliation." "That's when he started drinking." "What does this have to do with someone stealing his body?" "Nothing." "How about friends or family?" "Is there anyone else who... might have taken his death particularly hard?" "He traded them all in for bartenders in the last few months." "You can tell me if you're not going to find him." "I'm not going to make you any promises but I will do everything I can." "Thanks for your time." "No one could ever hover as well as you." "Hey, you remember Diesel Swanson?" "Diesel, the boxer, yes." "Yeah, his body was stolen from a mortuary a couple of days ago." "And the reason the police weren't called is...?" "This is where it gets a little tricky." "It was theft by resurrection, reanimation." "He's walking around." "At first I thought maybe it was somebody who had something against Swanson." "And then I thought, maybe had something against the funeral home." "I got to thinking, and I wondered, you know, maybe this has happened before." "Maybe he's not the only one." "Well, if body-snatching is the new joy- riding, I haven't heard anything about it." " Could you check?" " What?" "Body-snatchers?" " Yeah, or grave-robbers." " Look, Vicki, I find out why people go into the ground, not why they come out." "Okay?" "Call me when he starts eating brains." " He's eating brains." " Nice try." " His body was stolen." " Making it a case for Major Crimes." " And he's walking around." " And that is a Vegas act." "Look, Vicki, I have five active cases here, okay?" "I wish I could help you, but I can't." "All right, if you find anything out, will you let me know?" "If I find something I promise you will be the first to know." " Thank you." " You're welcome." "The mask is a representation of Anubis." "Ah, the Egyptian God of the Dead." "According to the myth, he resurrected Osiris from the dead." "My friend's a security guard at the museum." "He lets me borrow reference material from time to time." " You stole this." " Borrowed - can't find everything on the Internet." "Ah, now all I have to do is find an Egyptian Necromancer... operating somewhere in the city." "I love my job." "Thanks for this." "Good work." "Klepto." " You could knock." " You could call." "You didn't seem all that interested in the case." "Because I didn't consider the well-being of Mr. Swanson's corporeal husk to be an... urgent priority." "Well, I've got to admit, you seemed a bit flippant." "You're searching for a body." "I have absolutely no doubt that his soul was at peace..." "Yeah, I'm not so sure about that." "Egyptian Funeral Rituals and Resurrection Mythology by William Carmichael." "Sounds exciting." "Well, it's 300 pages of university grade double-speak, complete with footnotes." "He did have the courtesy to throw in a few photos." "Is there anything of value in it?" "Well, let's see, the Egyptians believed that the soul..." " ...was divided into seven parts." " The Ren is your name." "The Sekhem, energy." "The Akh is best described as your ghost." "Ka, life force." "Ba, soul." "Sheut, shadow." "And the Sekhu, your physical remains." "Well, gee, you'd pass the pop quiz." " I spent a little bit of time in Egypt." " Yeah, I figured." "The important ones for us, though, are Ba and Sekhu, soul and remains." "The Ba is what was summoned back into the Sekhu during the resurrection ritual, 'cause they believed that if the soul didn't recognize... its remains it wouldn't return to it." "Hence mummification of the corpse." "But what does that have to do with Swanson?" "Welcome to the Necrodrome!" "Ready?" "Fight!" "Winner!" " Hey." " What's up man?" "Nothing like a body dump first thing in the morning, huh?" "Don't be like that, brother." "I mean, this is our bread and butter." "Aw, come on." "Trace evidence is completely spoiled." "We've got no witnesses." "There's never any way in with these." "Why do you always got to look at the down side of it, man?" "I mean, here we are, you know, out here in the fresh air, you know, checking some fresh anatomy." "It never fails to amaze me how much you actually enjoy these." "Here give me that." "That's my childhood, man." "Walking by vacant lots, checking for, you know, any kind of corpse I could find." "This is why you joined the force?" "That's why every day's like Christmas, man, except for the dead bodies." "Yeah, and you're the normal part of my life." "Just great." "Dispatch said the body's been all beaten up." "Chest all cut apart." "Yup, that's a thoracic abdominal incision." "This guy's had an autopsy already." "Well, how do you know it's not some guy trying to play amateur pathologist?" "Carl Blundell?" "The Iron Fist?" "Local wrestler?" "Yeah?" "What did they do to him?" "The guy died of a brain aneurysm a couple of months ago." "Yo, this dude is famous!" "Oh, shoot man." "You've got to get a picture of us, man." "You just..." "Just playing, man." "You know, it's interesting," "Vicki's working a body snatch case involving a missing boxer." "Man, that lady sure does get some weird cases." "Blundell's supposed to be six feet under." "What do you want to bet that Swanson and Blundell were taken by the same guy?" "Yeah, but we're Homicide not Lost and Found." "What?" "Two dead athletes in a month?" "Two corpses taken?" "That doesn't raise any red flags for you?" "Well, it don't add up to murder." " Hey, Doc." " Hello." "Did you get anything on those names I fired over to you?" "Carl Blundell died of a brain aneurysm." "Diesel Swanson succumbed to liver failure." "So they both died of natural causes?" "Blundell, definitely natural causes." "I can't be as certain with Swanson." "According to Swanson's toxicology report, his blood contained high levels of paracetamol." "Oh, it's an over-the-counter pain medication." "A high level of paracetamol can cause irreversible liver failure." "The attending pathologist should have flagged it." "Are you saying that somebody poisoned him?" "Or he poisoned himself." "You were supposed to call me." "Yeah, Swanson's not the only body that's gone missing this month." "I know" " Carl Blundell." "Mohadevan called me." "Ah, the things you girls talk about." "Look, Mike, you need to be careful." "This is not your usual body snatching." "Yeah, maybe not, but one's a possible homicide." "Swanson may have been poisoned." " Have any suspects?" " Maybe." "We both know the type of killer that prefers poison as a murder weapon." "Naw, I don't think the wife's good for this." "Well, thank you very much." "I'll take that under advisement." "You know, this kind of connects our cases." "Oh, yeah, and you've been so helpful up 'til now." "Come on, come on, come on." "What do you got?" "Actually, not much." "All I know was that Swanson was resurrected by a type of Egyptian necromancy." "Okay, you got anything that I can actually use?" "I'm not sure, but I think there's a connection between his death and his abduction." "Right." "Well, you know what?" "I'm going to use good old-fashioned reality and see what the wife has to say." " What do you think about that, huh?" " Knock yourself out." "I think I will." "As I told Detective Celluci, some of his postmortem injuries are suspicious." "There is something in his throat." "You know, on that surveillance tape, the Necromancer put something in Swanson's mouth." "Really?" "Perhaps this is the evidence you seek." "Before Mr. Swanson passed away, was he on any medication?" "Not that I know of." "Was he taking Aspirin or Ibuprofen?" " Any kind of pain-killers?" " Alcohol." "You're asking a lot of questions about a man whose liver gave out." "Well, Mrs. Swanson, the coroner... found abnormal levels of paracetamol in your husband's blood." "It's a headache medicine... or poison, depending on the dosage." "You think I poisoned by husband?" "For what?" "The money?" "I'm not blaming anyone of anything, it's just that... if Diesel were hitting you or... you found yourself not being able to take it anymore..." "Should I be calling a lawyer?" "You tell me." "Diesel was a good man who gave up on life." "Or maybe somebody helped him along." "If anyone poisoned him, it was those bastards at the Dome who fed him all that booze." "Why don't you go and arrest them?" " Hey." " Oh, we're not open for another hour." "Detective Celluci, Metro PD." "Mind if I ask you a few questions?" "Ever see this guy hanging out here?" "Yeah, Diesel, yeah, yeah." "He works here." "Or he used to." "Nice guy." "He tipped even when his booze was comped." "So you guys must have talked a lot, huh?" "If he wasn't talking to a fan he wasn't really talking." "Ever see anybody that had a beef with him?" "Naw, everybody loved him and if they didn't, they'd sit out of his way." "The coroner found something suspicious during his autopsy so, you know how it goes." "Well, thanks for your time." "I didn't catch you name." "William Carmichael." "If you can think of anything else with Diesel, I'd appreciate a call." "Sure thing." "Oh, one more thing." "Did you ever see a guy named Carl Blundell, hanging around here?" "No." "If he did, I didn't see him." "All right." "Thanks again, William." "Well, I think they might be the same on both sides." "Yeah, that's Bennu bird." " And that's Osiris." " That's the Ba." " What is that?" " Diesel Swanson." "How do you know that?" "Am I the only one in the room who read the Rosetta Stone?" "You gotta be kidding me." "God, I feel old." "Okay, Bennu bird, Osiris, Ba." "Diesel Swanson?" "I think this is a requisition form for a soul." "There would be rituals involved in enchanting the tablet but essentially, yes." "But why does he snap the tablet in half?" "Maybe the guy who wrote this can help." "He mentions a lost chapter of the Book of the Dead." "Describes a resurrection ritual." "It involves a clay tablet." "He's the closest thing we've got to an expert." "I think he may be more than that." "The same magic he describes in his thesis is being practiced to raise the dead." "I think William Carmichael might be our Necromancer." " Anybody home?" " I don't sense anyone." "Never a good sign." "Stay away or I'll kill you, too!" " He can talk?" " He can do a lot more than that!" "You can really hear Swanson." "He's trapped in there." "I'd feel sorrier for the man if he didn't try to take my head off." "What are we looking for?" "Anything." "Is that really necessary?" "This from a man who spent a weekend in a Vegas dumpster?" "What you found was code for some kind of Internet site." "And here we go..." "What's a Necrodrome?" " Necro." "Dead." "Drome." "Arena." "It's a snuff film." "Technically they're already dead." " Okay, I've seen enough." " Excuse me." " Are you okay?" " I'm fine." "Shall we?" "See what's next." "Less than 24 hours 'til the next fight." "Man, I hate working to a deadline." "Who are you calling?" "Hey Mike, it's me." "I've got something for you." "Motive." "No!" "Screw your schedule!" "I haven't had time to find another fighter yet!" "Well, because I was busy stripping the apartment of any evidence." "Because some cop was asking questions, all right?" "No, you know what?" "You find yourself someone." "I'm busy." "Hey!" "Hey, what are you waiting for?" "Get in there." "Come on." "All right, that's enough." "Where did you get this?" "Coreen dug up a thesis on Egyptian resurrection rituals." "We went to go talk to the author and found Swanson's corpse... guarding his apartment and then I, yeah..." " William Carmichael?" " What, you know him?" "Swanson's favorite bartender." "So wait, Blundell dies of natural causes, gives Carmichael the idea for Necrodrome, and then he needs a challenger." "So Carmichael slips Swanson a paracetamol soda." " He had ample opportunity." " Steals the body and... sets up his next little cage match." "Yeah, but take a look at this." "It's a count-down timer to the next match." "Carmichael's promising another fight which means he needs another fighter." "Yeah, all right." "We're going to send an APB out on Carmichael and..." "I'll see what our tech guys can find out on this Website." " Okay, Henry and I will..." " You're going to stay out of it." "What?" "I give you information and you cut me off?" "What, didn't I say thank you?" "Okay, you know what?" "Finding Carmichael is your case, but retrieving Swanson's body is mine." "Knock yourself out." "Did you have any luck with that site?" "Tech Server's in Bulgaria." "They tried hiding it with a re-routed IP address." "That's a bad thing." "Uploads originate here via wireless." "And that means what?" "Sourcing location." "Triangulate." "Okay." "That's here in the city." " Yup." " Oh, great work, Jeb." "Thank you." " You got it." "Go get 'em, sir." "Vicki!" "Please tell me you've got something." "Maybe, I can hear something in the background on this audio." "Can I?" "You're going to have to trust me on this one unless you can hear subsonic sounds." " Okay, what is it?" " Train 79 Montreal." "Now boarding." "Okay, there's a night train to Montreal out of Union Station." "We'll head down there and work our way out." "You know this can't have a happy ending." "When we find Swanson, we're going to have to stop him." "Literally." "Yeah, well at least Darlene will be able to say goodbye properly." "That should be worth something." "Swanson?" "Please..." "Let me die." "Looks like we found our next challenger." "Let's go!" "Move it." "Move it." "They're on in a few minutes." " That's Mike's car." " He must be close." "I'm going to have to have a little chat with him about sharesies." "Must be something." "Well, I guess I should have dressed up." "Oh, I'm looking forward to this." "I wish I could share the same enthusiasm." "Looks like this could be a tough party to crash." "Looks can be deceiving." "Ohhh...!" "Okay, uh... you know what, go to Mike's car, give me three minutes, then switch on the sirens then head back in here." "How do I do that?" "It's the switch marked 'sirens'." "Sirens." "Connoisseurs of the grotesque!" "Welcome to the Necrodrome!" "Any time now, Henry." "Nobody move!" "Vicky, wait!" "He's got my... gun." "Great." "You and Carmichael partners." "Nice business plan." "We were partners, 'til somebody got scared." "Billy!" "Come forward." "The power to resurrect the dead and this is how you use it?" "This is how it was meant to be used." "I'm not going to grow old massaging dead people's hands." "I spent years watching my father fawning over them like they were something special." "More concerned about them than his own family." "The dead... are meant to serve us." " They will serve me." " They're people." "And you're enslaving them for some sick sport." "A fight?" "Ah, it's a promotional tool just to showcase their skills." "And when the right people realize what I've accomplished here..." "I'd be lying if I said I hadn't thought about the military applications." "Billy!" "Take her!" "Billy, of course, William, your friend in the prep room." "I told you to keep your nose out of this." "Yeah, well, I ignored you." "Besides, somebody's got to save your cute little ass." "Yeah, and you're doing a wonderful job, by the way." "It gets better." "Don't worry." "All right Ivan, I'm going to give you one last chance to surrender." "I got you prisoner." "I've got the zombies and the gun." "Kill them!" " You okay?" " Yeah, yeah." "Diesel!" "Don't!" "Safety's on." "Diesel!" "Stop!" "Can't... stop!" "You can beat this!" "You're strong!" "You're stronger than him!" "Diesel, you're wife sent us!" " Darlene..." "" " Henry!" "No!" "This is what you want." "This is what you want." "Henry, are you sure this is such a good idea?" "Vicki, on your left." "Diesel!" "Diesel!" "Give him to me!" "As much as I would like to do that, Diesel, he's our responsibility now." "Diesel!" "Stop!" "Time to find out what a head shot does to a zombie." " He's not a zombie!" " He's not a zombie!" "You let him do this, it's murder!" "Where's he going?" "Oh, god!" "I think I know where!" "Diesel!" "Diesel!" "Stop!" " I want to see her." "You're in no condition." "No." "Tell her I.." " She knows." "And she loves you." "She knows you love her." "Maybe there is a way." "Oh, baby." "I'll always love you." "It's like he's asleep." "Proceeds from the door." "I'll take care of it." "It's time, my friend." "Thank you." "What's going to happen to Ivan?" "With any luck, he'll go away for life for Swanson and Carmichael's murders." "Being caught in a warehouse surrounded by dead people shouldn't help his case any." "I think I get it now." "That sweetness of death." "It's an acquired taste." "transcript: swsub. com synchro: subXpacio" | {
"pile_set_name": "OpenSubtitles"
} |
Posted by OrdainWomen on Oct 12, 2016 in Blog |
Lorie Winder Stromberg serves on the Ordain Women executive board as chair of the Long-term Planning Committee.
[This is part 2 of a two-part series. Please follow this link to read part 1.]
Before Elder Oaks’ April 2014 priesthood session talk, some Church leaders seemed to be ditching the “men have priesthood; women have motherhood” parallel, which is good news. The bad news is that some are substituting equally absurd parallels, such as “men have priesthood; women have influence”—whatever that means. Elder Oaks didn’t mention motherhood with a capital “M,” but he spoke about women’s ability to create new life as a counterpoint to men having priesthood. This, of course, is problematic. It ignores men’s contribution to the creation of life and the fact that there’s very little creativity in incubating. Most mammals are capable of it. Creativity comes in parenting, which both men and women optimally share. Even Sherri Dew suggests there are problems with the priesthood/motherhood equation. Though there are a few holdouts, I’m hoping using motherhood to justify an all-male priesthood is on the wane.
Unfortunately, separate but equal, complementarian rhetoric still holds sway. As President Burton noted in a video that was released on April 5, 2013, soon after Ordain Women launched its website, men and women “have different complementary roles and are happy with that. Equality is an interesting term. It doesn’t always mean sameness, but we are of equal value …” While it’s true that equality isn’t about sameness, it is about equal access and opportunity.
Finally, priesthood blessings, power, authority, office, and keys are being parsed and distinctions drawn in ways still shy of ordination but that attempt to be more inclusive of women. Late 20th century Church discourse responded to the women’s movement primarily by asserting that both men and women enjoyed the blessings of the priesthood. Such attempts spawned rhetoric that occasionally bordered on the absurd. For example, Elder Bruce C. Hafen, speaking at the BYU Women’s Conference in 1985, attempted to diffuse cries of gender inequity with the following: “The one [and, we are to assume, only] category of blessing in which the role of women is not the same as that of men holding the priesthood is that of administering the gospel and governing all things.” A mere trifle.
More recently, leaders have asserted that women can access both the blessings and the power of the priesthood. In the April 2013 video interview with the general women auxiliary presidents released a few weeks after the launch of the Ordain Women website, President Burton said: “I don’t think women are after the authority; I think they’re after the blessings and are happy that they can access the blessings and power of the priesthood. There are a few that would like both. But most of the women, I think, in the Church are happy to have all the blessings.”
In her review of Dew’s book, Valerie Hudson wrote: “Dew’s greatest contribution in this book … is her assertion that endowed women possess Godly power, or priesthood power. (103) She [Dew] begins with a statement by … Ballard that in the temple, both men and women are ‘endowed with the same power, which by definition is priesthood power.’ (105) [This was reiterated in Elder Dallin Oak’s April 2014 priesthood session talk.] Dew goes on to state that once endowed, a woman has ‘direct access to priesthood power for her own life and responsibilities.’ (114) … Priesthood power . . . is the power of God Himself available to men and women alike . . . who have been endowed in the house of the Lord (122) . . . men and women who are endowed in the house of the Lord have been given a gift of power, and they have been given a gift of knowledge to know how to access and use that power.’”(125)
“This,” says Hudson, “is really a very remarkable assertion. The formula has always been that women are the beneficiaries of priesthood power, and so only ‘share’ it vicariously by being married to a man. … But Dew is plainly saying that endowed women have been given priesthood power in the temple, which power they can use to benefit others. In other words, for the first time it is being articulated that women are not simply passive recipients of divine power that has been coded male, but are able to hold and use divine power as agents without a male intermediary. As Dew puts it, ‘Both men and women would have full access to this [heavenly] power, though in different ways.’” (74)
“Dew continues: ‘[W]omen, unlike men, are not required to be ordained to the Melchizedek priesthood in order to enter the house of the Lord, though the ordinances performed there are all priesthood ordinances. Neither are women required to be ordained to the priesthood to serve as leaders in the Lord’s Church. Why is that the case?’ (109)
“Now, that’s an interesting question to pose, isn’t it?” asks Hudson. “It’s a question that … is apparently a bridge too far for Dew and she does not answer it in her book.”
Increasingly, a distinction is being made between the authority and the power of the priesthood. Authority and power traditionally have been associated with office and, thus, available only to men. Power now seems to be available to all and is conditioned on righteousness. This is being said over and over again, although it’s not well developed.
In his April 2014 priesthood session talk, Elder Oaks went further and asserted that women not only enjoy the blessings and the power of the priesthood, they also exercise its authority in their callings. In the institutional Church, “priesthood authority is governed by priesthood holders who hold priesthood keys, and … all that is done under the direction of those priesthood keys is done with priesthood authority.”
While women do not currently hold priesthood keys and office, Elder Oaks asserted that both women and men are recognized as having “the authority of the priesthood in their Church callings.” He continued: “We are not accustomed to speaking of women having the authority of the priesthood in their Church callings, but what other authority can it be?” asked Elder Oaks. “When a woman—young or old—is set apart to preach the gospel as a full-time missionary, she is given priesthood authority to perform a priesthood function. The same is true when a woman is set apart to function as an officer or teacher in a Church organization under the direction of one who holds the keys of the priesthood. Whoever functions in an office or calling received from one who holds priesthood keys exercises priesthood authority in performing her or his assigned duties.”
Again, as with the power of the priesthood, we are still left scratching our heads and wondering what it means for women to exercise the authority of the priesthood in their callings. Can a Relief Society president, for example, bless the women over whom she presides by the authority of the holy priesthood, which she exercises by virtue of her calling?
Obviously, we still have work to do, but it’s clear that the question of women’s ordination isn’t going away.
Note: This post is taken from my 2014 Sunstone Symposium presentation. It can be accessed with complete references in the Afterword of my essay “The Birth of Ordain Women: The Personal Becomes Political,” in Voices for Equality: Ordain Women and Resurgent Mormon Feminism, (Draper, UT: Greg Kofford Books), 3-26. | {
"pile_set_name": "OpenWebText2"
} |
Q:
Ng-repeat-start in angular2 - aka repeat multiple elements using NgFor
I need to repeat several li-elements in a list in Angular2 for each item. In angular 1.x I used ng-repeat-start and ng-repeat-end for this. I can't find the right way to do it in Angular 2. There are some older blog posts about this, but their suggestions don't work in the newest beta of Angular2.
All <li>-elements should be repeated for each category:
(which I would normally do with the attribute *ngFor="#category of categories" - but I can't find where to put it...
Help?
<ul class="dropdown-menu" role="menu">
<li class="dropdown-header">
{{ category.title }}
</li>
<li>
<a href="{{ '/music/' + tag.keyword }}" *ngFor="#tag of category.tags" [hidden]="tag.deleted === 1">{{ tag.tag_title_da }}</a>
</li>
<li class="divider"></li>
<li class="dropdown-header">Alle musikstykker</li>
<li><a href="/music/all">Alle musikstykker</a></li>
</ul>
A:
If you want to repeat the contents, use the template tag, and remove the * prefix on ngFor.
According to Victor Savkin on ngFor and templates:
Angular treats template elements in a special way. They are used to
create views, chunks of DOM you can dynamically manipulate. The *
syntax is a shortcut that lets you avoid writing the whole
element.
<ul class="dropdown-menu" role="menu">
<template ngFor #category [ngForOf]="categories">
<li class="dropdown-header">
{{ category.title }}
</li>
<li>
<a href="{{ '/music/' + tag.keyword }}" *ngFor="#tag of category.tags" [hidden]="tag.deleted === 1">{{ tag.tag_title_da }}</a>
</li>
<li class="divider"></li>
<li class="dropdown-header">Alle musikstykker</li>
<li><a href="/music/all">Alle musikstykker</a></li>
</template>
</ul>
Update angular ^2.0.0
You can use ng-container and just change #var to let var.
<ng-container> behaves the same as the <template> but allows to use the more common syntax.
<ul class="dropdown-menu" role="menu">
<ng-container *ngFor="let category of categories">
<li class="dropdown-header">
{{ category.title }}
</li>
<li>
<a href="{{ '/music/' + tag.keyword }}" *ngFor="let tag of category.tags" [hidden]="tag.deleted === 1">{{ tag.tag_title_da }}</a>
</li>
<li class="divider"></li>
<li class="dropdown-header">Alle musikstykker</li>
<li><a href="/music/all">Alle musikstykker</a></li>
</ng-container>
</ul>
A:
In the newer versions it works like this:
<ul class="dropdown-menu" role="menu">
<template ngFor let-category [ngForOf]="categories">
<li class="dropdown-header">
{{ category.title }}
</li>
<li>
<a href="{{ '/music/' + tag.keyword }}" *ngFor="#tag of category.tags" [hidden]="tag.deleted === 1">{{ tag.tag_title_da }}</a>
</li>
<li class="divider"></li>
<li class="dropdown-header">Alle musikstykker</li>
<li><a href="/music/all">Alle musikstykker</a></li>
</template>
</ul>
--> let-category instead of #category
| {
"pile_set_name": "StackExchange"
} |
[Imagination: its definition, purposes and neurobiology].
Imagination, distinct from imagery, memory, and cognition, is a poorly understood but fascinating cognitive ability of human beings. Herein, imagination is defined as 'the cognitive process which enables the individual to manipulate intrinsically generated phenomenal information in order to create a representation perceived by the mind's senses.' This definition is expanded within the context of the neurobiology of the brain and the possible purposes the imagination fulfills in daily living, human development, and normal behavior. | {
"pile_set_name": "PubMed Abstracts"
} |
Q:
error rgding definition & no extension method for System.Web.Routing.RouteValueDictionary
I am going through tutorial at 4GuysFromRolla website regarding Sorting and Paging a Grid of Data in ASP.NET MVC 2 by Scott Mitchell. I am receiving an error CS1061: 'System.Web.Routing.RouteValueDictionary' does not contain a definition for 'AddQueryStringParameters' and no extension method 'AddQueryStringParameters' accepting a first argument of type 'System.Web.Routing.RouteValueDictionary' could be found (are you missing a using directive or an assembly reference?). I am not sure if I need to add a dll reference or something else. Please could someone advise how to solve this thanks in advance. Also I downloaded the demo and there is no problem. error is in PagerLink.ascx file..routeData.AddQueryStringParameters(); // error pointing here
RouteValueDictionaryExtensions.cs looks like this (this is the helper file)...
using System.Web.Routing;
namespace Web
{
public static class RouteValueDictionaryExtensions
{
public static RouteValueDictionary
AddQueryStringParameters(this RouteValueDictionary dict)
{
var querystring = HttpContext.Current.Request.QueryString;
foreach (var key in querystring.AllKeys)
if (!dict.ContainsKey(key))
dict.Add(key, querystring.GetValues(key)[0]);
return dict;
}
public static RouteValueDictionary ExceptFor(this RouteValueDictionary
dict, params string[] keysToRemove)
{
foreach (var key in keysToRemove)
if (dict.ContainsKey(key))
dict.Remove(key);
return dict;
}
}
}
Global.asax.cs looks like this...
enter code here
namespace GridDemosMVC
{
// Note: For instructions on enabling IIS6 or IIS7 classic mode,
// visit http://go.microsoft.com/?LinkId=9394801
public class MvcApplication : System.Web.HttpApplication
{
public static void RegisterRoutes(RouteCollection routes)
{
routes.IgnoreRoute("{resource}.axd/{*pathInfo}");
routes.MapRoute(
"Default", // Route name
"{controller}/{action}/{id}", // URL with parameters
new { controller = "Home", action = "Index", id =
UrlParameter.Optional } // Parameter defaults
);
}
protected void Application_Start()
{
AreaRegistration.RegisterAllAreas();
RegisterRoutes(RouteTable.Routes);
}
}
}
I am also using Dynamic.cs file which is available at microsoft to download.
A:
You need to add a using statement and <%@ Import directive for the namespace with the extension method.
Alternatively, you can move the extension method into your project's namespace.
| {
"pile_set_name": "StackExchange"
} |
Sandrine Clet-Guet
Sandrine Clet-Guet (born 1971) is a French ski mountaineer.
Selected results
2002:
8th, World Championship team race (together with Laetitia Gachet)
2006:
2nd, Montée Pelluaz
Pierra Menta
2002: 6th, together with Laetitia Gachet
2003: 10th, together with Laetitia Gachet
References
Category:Living people
Category:French female ski mountaineers
Category:1971 births | {
"pile_set_name": "Wikipedia (en)"
} |
Balaban (instrument)
Balaban, or balaman () is cylindrical-bore, double-reed wind instrument about long with eight finger holes and one thumb hole. Balaban, one of the ancient wind instruments, is played in all corners of Azerbaijan. This instrument is played in Iranian Azerbaijan and in the Republic of Azerbaijan.
Balaban can be made of mulberry or other harder woods, such as walnut. The bore through the instrument is about in diameter. The double reed is made out of a single tube of cane about six cm long and pressed flat at one end. The performer uses air stored in his cheeks to keep playing the balaban while he inhales air into his lungs. This “circular” breathing technique is commonly used with all the double-reed instruments in the Middle East.
Structure
Balaban, which is often called also yasti (flat) balaban for flat mouthpiece and soft sound, consists of body made of apricot tree, cane, barrow and cover. Body has 8 holes on the surface and 1 on the back in the middle of 1st and 2nd holes (sound fret) on the surface. It consists of a stem, a reed, a regulator, and a cap.
The stem of the balaban, or govda, is a cylindrical tube made primarily of apricot wood (sometimes also hazel, pear, mulberry, boxwood, etc.). The process of carving a balaban stem is called balaban chakma. The upper end of the stem (bash or kup) is given a round shape, whereas the lower end (ayag) is sharpened. The bore is in diameter. Eight holes or "tones" constituting a "sound tone" (sas pardasi) are made on the obverse and another one is made on the bottom side, opposite of the interval between the first and the second holes of the sas pardasi. Sometimes an additional hole called nizam pardasi is made on the lower end of the bottom side to ensure good timbre.
The holes made on the stem are classified as follows:
The reed (gamish, garghy or dil) made of club-rush that grows in an arid area is inserted into the upper end. It flattens and takes the shape of a double reed. It is tied to a long and wide regulator (kharak, boghazlig, boyundurug, ulama, akma) made of a willow or grape branch cut lengthways. The reed is then fixed by a collar-like regulator on one side and a pivot on the other side. The cap (qapaq, aghizlig, kip, band, etc.) made of willow, hazel, cornel or mulberry is put on the reed to prevent it from damage. It is tied to the regulator in order not to be lost.
Use
On solemn occasions such as weddings and holiday ceremonies, a balaban-player is accompanied by a percussionist. A traditional Azeri musical group consisting of two balaban-players and a percussionist is called balabanchilar dastasi. The short selection of Azerbaijani mugham played in balaban, national wind instrument was included on the Voyager Golden Record, attached to the Voyager spacecraft as representing world music, included among many cultural achievements of humanity. It was also used in pastoral songs and funeral music. According to Huseyngulu Sarabski, hunters played the balaban to attract quails. Certain types of the balaban are also used in ashik music.
Legacy
Kamil Jalilov's recording of the song with balaban was included on the Voyager Golden Record, attached to the Voyager spacecraft as representing mugham, only Azerbaijani song included among many cultural achievements of humanity.
Gallery
References
External links
Ch. Albright. BĀLĀBĀN. Iranica.
Balaban, Duduk and Mey (video)
Category:Single oboes with cylindrical bore
Category:Azerbaijani musical instruments
Category:Iranian musical instruments
Category:Azerbaijani inventions
Category:Azerbaijani words and phrases | {
"pile_set_name": "Wikipedia (en)"
} |
I tweeted a thank you to the guys over at Seq recently because Seq was instrumental in finding and eliminating a very difficult issue we came across. But technology choice alone isn’t enough, so I’ve decided to blog about some of the logging practices we tend to follow as a rule, and some specific practices that we used in a particularly complex application we’ve been developing over the last couple of months.
Logging best practices and @getseq_net have been an absolute god-send for tracking down tricky problems. Much love. pic.twitter.com/6fubnhSnOo — Tommy Long (@Smudge202) January 4, 2017
Contents
Foreword
This is going to be a lengthy post, and several of the practices shown are circumstantial, subjective, situational, and so forth. Add these practices to your developer toolbelt, and decide for yourself when they best fit your needs.
The system we’ve been working on is a series of commercial applications subject to standard IP clauses, so I’ve included as much code as I can in this post. Wherever possible the code is sans abstraction and obfuscation, but I won’t be able to provide the applications themselves as samples.
The code is primarily contained within 15 .Net Core libraries targeting the full .Net Framework (4.5.2) due to dependency requirements. 4 of those libraries are what we call application hosts, containing no business logic, designed to host a selection of the libraries as a .Net Core Console Application which can be deployed inside Docker containers, as a Windows Service, or in Azure. (This is a practice that our company tends to follow and has a collection of composition helpers for so that the applications can be ran anywhere, leaving deployment considerations to our IT department.)
In addition to the above, we have a considerable amount of heritage code in other solutions which is NuGet packaged and deployed by TFS/Octopus, which is then pulled down by one of our microservices at runtime and installed/executed within a separate AppDomain . As you might imagine, with this many moving parts, logging is essential.
Service (Collection) Extensions
Our company has adopted the IServiceCollection extension method approach of building up our composition roots. That is, our application host will contain code similar to the following:
1 2 3 4 5 6 7 8 9 10 using Microsoft.Extensions.DependencyInjection ; public static int Main ( string [] args ) { var services = new ServiceCollection () . AddServicesFromOurClassLibrary (); services . BuildServiceProvider () . GetRequiredService < SomeService >() . Run (); }
NB: Extremely simplified for sake of brevity.
In turn, our class libraries expose their services as follows:
1 2 3 4 5 6 7 8 using Microsoft.Extensions.DependencyInjection ; using Microsoft.Extensions.DependencyInjection.Extensions ; public static IServiceCollection AddServicesFromOurClassLibrary ( this IServiceCollection services ) { services . TryAddSingleton < Foo , Bar >(); return services ; }
Whilst it’s up to you how you manage the composition of your application, this is based on the practice used by ASP.Net Core and is the assumption throughout the rest of this article.
Abstractions
First and foremost, let’s get our abstractions installed. All of our class libraries depend upon the Microsoft.Extensions.Logging.Abstractions NuGet Package. The package is lightweight as you would expect of any series of abstractions. Whilst there are other abstractions available, some of which we inevitably need to integrate with through façades, I’ve found this one of the most well adopted logging abstractions, especially given the recent flurry of activity surrounding .Net Core.
Once installed, don’t forget to add services.AddLogging() to your service extensions. After which, any class can rely upon ILogger<TCategory> as a dependency, giving us an easy to use logging abstraction.
NB: This step alone will not output any logs.
Sinks (Basic)
With the above in place, your application hosts become responsible for hooking up log outputs/sinks so that you’re logs actually go somewhere. I recommend the following as a bare minimum:
Personally, I prefer to swap out the Microsoft.Extensions.Logging.Console for the following, which will give me coloured console output:
By adding the Serilog.Extensions.Logging package, you open up your application to dozens of high quality outputs via Serilog Sinks. For example, if you’re working on an application that does not have a Console, such as a Windows service, you might consider adding:
We can now adapt the application host code shown above to something like:
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 using Microsoft.Extensions.DependencyInjection ; using Microsoft.Extensions.Logging ; using Serilog ; using Serilog.Events ; public static int Main ( string [] args ) { var services = new ServiceCollection () . AddServicesFromOurClassLibrary (); var provider = services . BuildServiceProvider (); var loggerFactory = provider . GetRequiredService < ILoggerFactory >(); loggerFactory . AddDebug ( LogLevel . Trace ); var serilogConfiguration = new LoggerConfiguration () . MinimumLevel . Is ( LogEventLevel . Verbose ) . WriteTo . RollingFile ( "my-app-{Date}.log" ); if ( Environment . UserInteractive ) serilogConfiguration . WriteTo . LiterateConsole (); Log . Logger = serilogConfiguration . CreateLogger (); AppDomain . CurrentDomain . DomainUnload += ( o , e ) => Log . CloseAndFlush (); loggerFactory . AddSerilog (); provider . GetRequiredService < SomeService >() . Run (); }
With the updated code, we get log messages pushed out to Visual Studio output window, a rolling file adjacent the exe, and if available, we will also get nicely coloured logs in a console window.
NB: The Environment.UserInteractive check may not be necessary for you, but we follow this practice to ensure we don’t attempt to output to a console when, for example, the application is running as a Windows Service.
What to Log
Now we know how to output logs, the next and most important question:
What should I be logging?
There is no simple answer to this, no rules that should be followed; the subject of logging will always be subjective. In my opinion though, there are 5 key components to useful logging…
Exceptions
The first and most obvious thing to log is your exceptions. However, simply wrapping everything in a try / catch > log would be pretty wasteful and probably not as useful as you might think. I don’t want to dwell on exception management for too long, but I will mention a few things.
For starts, if you are in the habit of throwing exceptions for non exceptional circumstances, such as failed user input validation, you should stop doing this. If you were throwing an exception to produce log output, you now have an alternative. If you were throwing an exception to produce a different execution flow, this is called exception logic and is typically considered a bad practice.
Next up, don’t be afraid to allow exceptions to bubble up to a location that may have much more context regarding the current operation. Here’s a somewhat abstract example that hopefully demonstrates this point:
1 2 3 4 5 6 7 8 9 10 11 12 13 public async Task DisableUser ( Guid userId ) { try { var user = await _data . GetUserAsync ( userId ); // continue to disable user } catch ( DatabaseException dex ) { _logger . LogError ( 0 , dex , "Unable to disable user '{UserID}'" , userId . ToString ( "N" )); throw new DisableUserException ( userId , dex ); } }
In the above snippet, whilst my _data implementation could independently log the DatabaseException , I’ve decided the additional context available in the consumer would be better. I can therefore omit logging and even omit the try / catch in the data implementation (not shown here), and output the logs in the data consumer alongside information that we were attempting to disable a user when this exception occurred.
NB: For those wondering why I haven’t simply re-thrown the original exception after logging the output, this is a practice I try to follow. The DatabaseException is an implementation detail of the class shown. I don’t want consumers of this class to catch (DatabaseException) , nor have to catch (Exception) . The DisableUserException or something slightly more generic if preferred, allows the consumer to maintain cohesion and not depend upon this class’ dependencies directly.
Decisions
This is a lot trickier than logging exceptions, because you’ll need to decide what decisions are important to you. Everytime you write an if or switch statement, you probably branch the execution flow. Therefore, each time you find yourself writing an if / switch , consider whether it would be useful to output a trace message explaining such.
Whilst I believe this is good advice to follow, I can’t really provide examples; each case will be unique. I certainly don’t believe it necessary to output every decision made, but the odd Trace / Debug / Verbose log entry can be crucial in tracking down problems, especially if the issue arises in other environments that you’re not actively debugging.
State
Don’t forget to include useful state information in your log outputs. Yes, you can output the full stack trace for a particular exception, but how much easier would it be in replicating an exception if you also have the Customer ID, Order ID, etc. that was being processed at the time?
In addition to this, if you’ve followed my advice and added Serilog integration, you also gain access to Enrichers. For example, I can add the following NuGet packages:
With these packages installed, I can update our application host to Enrich the the serilog configuration as shown here:
1 2 3 4 5 6 7 8 var serilogConfiguration = new LoggerConfiguration () . Enrich . FromLogContext () . Enrich . WithMachineName () . Enrich . WithEnvironmentUserName () . Enrich . WithProcessId () . Enrich . WithThreadId () . MinimumLevel . Is ( LogEventLevel . Verbose ) . WriteTo . RollingFile ( "my-app-{Date}.log" );
Whilst this enrichment won’t be particularly useful to the sinks so far mentioned, it can provide considerable value when combined with the recommendations in the Advanced Sinks section towards the end of this article.
Correlation
Nowadays, it’s common to be working with applications that are, in some fashion, able to process concurrent requests. When we’re writing code that handles a web request in an ASP.Net Website for example, we can often just think about that one request and not worry about how the framework might be managing multiple of these requests at the same time. However, this concurrency can have a profound effect on logging:
Request 1 ----> Logs Foo A -------------------------------------> Logs Bar F --->
Request 2 -------> Logs Foo B -------------------------------> Logs Bar E --->
Request 3 ----------> Logs Foo C -------------------------> Logs Bar D --->
We simply cannot predict or rely upon even identical concurrent requests executing in the same order. In the above, although request 3 starts last, it finishes first. Why is this important? Consider your log output:
1 2 3 4 5 6 Foo A Foo B Foo C Bar D Bar E Bar F
Without correlation, we have no idea that Foo A corresponds with Bar F and Foo B with Bar E , etc. This is usually very simple to resolve by adding a little bit more context:
1 2 3 4 5 6 Request 1 Foo A Request 2 Foo B Request 3 Foo C Request 3 Bar D Request 2 Bar E Request 1 Bar F
Now it’s much more clear which Foo and Bar messages belong together. It may seem like common sense now, but it’s all too easy to forget about correlation!
Performance
The final subject for consideration are performance metrics. If you’re going to do this, I recommend doing so somewhat scarecly. For example, we log the time an overall request takes, which may involve any number of execution flows and thousands of lines of code, so provides only a very high level metric for the overall system performance. I don’t recommend using logging for lower level performance monitoring.
For more intricate performance monitoring, consider using Benchmark.Net to test smaller pieces of code in isolation, and/or outputting metrics using ETW.
The point being, logging can be useful for highlighting an area that you should more thoroughly investigate, but the output should also be taken with a pinch of salt.
What Level to Log
There are only a couple pieces of advice I can give you on this subject.
Log Levels
The first is to make sure you understand the order of the log levels in the frameworks you choose to use. For example, at one stage, the Microsoft Logging Abstractions used the following levels:
Debug
Verbose
Information
Warning
Error
Critical
However, this was changed, so the current Microsoft logging levels are as follows:
Trace
Debug
Information
Warning
Error
Critical
Whether you agree with the order of these levels or not, it is important to be aware of it. Similarly, the Serilog logging levels are:
Verbose
Debug
Information
Warning
Error
Fatal
As you can see, the updated Microsoft logging levels do map better to the Serilog levels, though they’re not identical. These log levels are typically used to filter your log outputs. For example, in local development and test environments, you may choose you want to output all of the logs, so you’ll set the Minimum log level in your application hosts to the lowest level available. However, in later stages of your deployment cycle you may choose to reduce the log spam of high throughput environments so that Production for example, may output only Warning and above.
Also make sure you’re aware what the default levels are of your logging frameworks, i.e. when no minimum level is configured or specified, what level will your framework use by default. For both Microsoft and Serilog, this tends to be Information .
Log Spam
As alluded to in the previous section, log spam can be an issue. When writing new functionality I tend to add a lot of logging at Trace and Debug levels, knowing that running the code in a production environment would very quickly consume disk space and generally overload my sinks. Whilst testing, I’ll then try to decide which of my log entries have proven to be the most useful in either tracking down issues with the code, or in confirming that the code has worked as intended. Anything I deem to be less useful can either be changed to a lower log level, or removed completely if it provides no value.
In contrast, any log messages that prove to be crucial can have their log levels promoted. Make sure you test your log entries when you test your code! The last thing you want is to start outputting millions of log entries per second when your code hits production, bringing the application to a standstill or masking real problems!
Practices
This next section will walk through some additional handy tips and tricks, some applicable to all situations whilst others are specific to the examples given. As per the foreword, you need to decide for yourself when these tips apply to your situation.
Interpolation
One of the most common mistakes I’ve seen since the release of C#6 is people interpolating all of their strings. Don’t do this for logs! When using a proper logging framework, the string.Format style signatures will often store the arguments separately or display them differently. For example:
1 2 3 4 5 var messageType = "Interpolated" ; _logger . LogInformation ( $"This is an ' { messageType } ' log entry." ); messageType = "Classic" ; _logger . LogInformation ( "This is an '{messageType}' log entry." , messageType );
The above will output to the Console (via Serilog.Sinks.Literate ) as follows:
Notice that the interpolated entry has no highlighting. That’s because it’s simply considered a part of the text, whereas the classic entry can be coloured, can be stored into queryable database columns, etc. This is because the parameters are available to the logger instead of being “burned in” at runtime, prior to reaching the logger. If you’ve ever had to regex through log files to find the lines you want, you’ll know exactly what I mean here.
Disposable Tracking
At last we finally reach the subject that drove this blog post. The application we’ve been working on was working perfectly in development and lower stages of our deployment cycle. However, when we put the application through load testing it completely fell apart.
Thanks to our application of the above logging practices, not to mention the advanced sink tips below, it was immediately obvious that we were not managing our disposable connections correctly. This particular issue is often very easy to find because most usages of IDisposable objects will be in a using statement. Given the right Roslyn analysers, you can simply check the Warnings page in VS and find the problem. However, the complexity of our application and the necessity to integrate with legacy code meant that in places we couldn’t simply wrap using statements around everything. For example, we use the IServiceScopeFactory to instantiate parts of the legacy code and rely on the Microsoft Dependency Injection container to track our transient disposables and tear them down for us when we Dispose the scope.
So, we needed a smarter way to track our connections, whilst the code that consumed said connections were essentially a black box to us given it could have been anywhere in millions of lines of heritage code.
Thanks to our aforementioned service collection extensions practice, the first step was simply to append a diagnostics connection factory to the IServiceCollection :
1 2 3 4 services . AddSingleton < DiagnosticsConnectionFactory >(); services . AddSingleton ( provider => provider . GetRequiredService < DiagnosticsConnectionFactory >() . CreateConnection ());
The next step was to start logging when a connection was allocated, to what class the connection was allocated to, and of course, when that class released the connection. I’ve reduced the actual code used which also entailed pooling / throttling for sake of brevity, but the following should give you an idea of how it works:
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 public class DiagnosticsConnectionFactory { // this is the connection provider that was originally // used before we added this diagnostics provider. private readonly OriginalConnectionProvider _originalProvider ; private readonly ILogger _logger ; public DiagnosticsConnectionFactory ( OriginalConnectionProvider originalProvider , ILogger < DiagnosticsConnectionFactory > logger ) { _originalProvider = originalProvider ; _logger = logger ; } public IDbConnection CreateConnection () { // the int provided to the StackFrame constructor determines how many frames // to skip up the stack. Zero would point to this method, each number greater // to further up the stack. We found it most useful to move two frames up the // stack because one frame would typically simply point us to the ctor of an // entity framework context. What we actually wanted to see was the consumer // of said context. Tweak this number or do something more intelligent as // you deem fit. var stackFrame = new System . Diagnostics . StackFrame ( 2 ); var allocateeMethod = stackFrame . GetMethod (); var allocatee = $" { allocateeMethod . DeclaringType ?. Name ?? "Unknown" } . { allocateeMethod . Name } " ; var connection = new DiagnosticsDbConnection ( _originalProvider . CreateConnection , DeallocateConnection , allocatee ); _logger . LogDebug ( "Database connection '{ConnectionID}' allocated to '{Allocatee}'. (Stack: '{StackFrame}')" , connection . Id , connection . Allocatee , stackFrame ); return connection ; } private void DeallocateConnection ( DiagnosticsDbConnection connection ) { connection . DisposeUnderlyingConnection (); _logger . LogDebug ( "Database connection '{ConnectionID}' that was allocated to '{Allocatee}' has been released." , connection . Id , connection . Allocatee ); } [ DebuggerDisplay ( "Connection {" + nameof ( Id ) + "}" )] private class DiagnosticsDbConnection : IDbConnection { private readonly Lazy < DbConnection > _connection ; private readonly Action < DiagnosticsDbConnection > _deallocate ; public string Id { get ; } public string Allocatee { get ; } public DiagnosticsDbConnection ( Func < DbConnection > connection , Action < DiagnosticsDbConnection > deallocate , string allocatee ) { Id = Guid . NewGuid (). ToString ( "N" ); _connection = new Lazy < DbConnection >( connection ); _deallocate = deallocate ; Allocatee = allocatee ; } // this is the crucial element, when the consumer attempts to Dispose // the connection, it will actually just pass control back to our // connection provider. public void Dispose () => _deallocate ( this ); // whether you're pooling or not, you still need the ability to // dispose the actual connection. internal void DisposeUnderlyingConnection () => _connection . Value . Dispose (); // the rest of this class contains what is hopefully an // obvious pass-through of all IDbConnection members. // for example: public ConnectionState State => _connection . Value . State ; } }
Whilst the above isn’t a practice that we will follow often, and certainly isn’t something I would want to deploy to Production, it very quickly highlighted our connection problems to us when we used this implementation under load.
Sinks (Advanced)
So, you’re armed with pretty much all the advice I can justify putting into this blog post at least. What else is there? So, so much more. If nothing else, before you leave, check out some of the very cool stuff you can do with some slightly more advanced sinks.
Seq
Despite following Nicholas Bulmhardt on twitter for quite some time, I only recently became aware of Seq. I’ve been waiting for our IT department to setup an ELK instance for me, so decided to see if there were any simple alternatives I could get on with myself. Having spent less than a minute installing Seq to my local machine, I went ahead and added the Serilog.Sinks.Seq package and the single line of code required to enable it:
1 serilogConfiguration . WriteTo . Seq ( "http://localhost:5341" );
I should point out, this blog post isn’t in anyway affiliated or sponsored by Seq, but I can’t praise it enough. It was so simple, and made our logs so accessible. With the above in place, you can jump into your Seq web portal and watch the logs live, filter events, write queries, and so much more. The documentation is very thorough and easy to follow, the web interface easy to use, and the value added is immense. It does have a cost, but the guys at Seq were very helpful (actually extended our trial period for us whilst we waited for Finance to get the PO sorted).
My only gripe is, whilst the web portal is incredibly RESTful, generating URL’s for your queries and filters, the same does not appear to be true when you enable the live update. You’ll find yourself enabling the live feed constantly because everytime you expand a log entry or make a change, the page (correctly) disables the live update so the log entry you’re working with doesn’t scroll off the page. It would be great however to have a query value for this in the URL so that we can, for example, put the logs on an information radiator without having to configure an automatic refresh, or simply bookmark the feed with updates enabled.
One other feature that is definitely worth mentioning and enabling. Follow the guidance shown here to enable Dynamic Level Control. Once done, you can control the Minimum Log Levels we discussed earlier, at runtime, which again can prove immensely useful. Being able to temporarily change your Production environment from Information to Debug log levels while you’re trying to track down a difficult to reproduce issue is an awesome piece of functionality to have at your disposal, especially given how very simple it is to set up.
Summary
As has been mentioned throughout this article, logging practices are mostly opinion and conjecture. I hope people find some of the information here useful, but don’t take it for gospel. Look around for other blogs and articles on logging (feel free to drop a comment below if you have a post you think I should link). For example, although it’s not mentioned here, our systems also make considerable use of Application Insights, Google Analytics, and so forth.
Make sure you understand how your log frameworks and tooling work, and be sure to test your logging the same way you would test any piece of functionality you add to your code. Try to separate log output configuration from the code that actually produces log output, usually through use of abstractions. Finally, try not to re-invent the wheel with custom logging. There are simply too many high quality options out there to be wasting time and money homebrewing. | {
"pile_set_name": "OpenWebText2"
} |
That's why she seemed so familiar, she looks like her and has a computer backpack just like Velma could pull a large computer out of no where. The only part I figured out is she's voiced by the same voice actress who did Rika in Digimon. | {
"pile_set_name": "OpenWebText2"
} |
Analysis of telomerase processivity: mechanistic similarity to HIV-1 reverse transcriptase and role in telomere maintenance.
The key protein subunit of the telomerase complex, known as TERT, possesses a reverse transcriptase (RT)-like domain that is conserved in enzymes encoded by retroviruses and retroelements. Structural and functional analysis of HIV-1 RT suggests that RT processivity is governed, in part, by the conserved motif C, motif E, and a C-terminal domain. Mutations in analogous regions of the yeast TERT were found to have anticipated effects on telomerase processivity in vitro, suggesting a great deal of mechanistic and structural similarity between TERT and retroviral RTs, and a similarity that goes beyond the homologous domain. A close correlation was uncovered between telomerase processivity and telomere length in vivo, suggesting that enzyme processivity is a limiting factor for telomere maintenance. | {
"pile_set_name": "PubMed Abstracts"
} |
486 So.2d 855 (1986)
STATE of Louisiana
v.
Michael BURGE.
No. 85 KA 0899.
Court of Appeal of Louisiana, First Circuit.
March 25, 1986.
Rehearing Denied April 29, 1986.
*857 Stephen L. Laiche and William B. Faust, III, Asst. Attys. Gen., New Orleans, for the State.
J. Michael McDonald and David E. Stanley, Baton Rouge, for defendant.
Before GROVER L. COVINGTON, C.J., and WATKINS and SHORTESS, JJ.
WATKINS, Judge.
Michael Burge was originally charged by a single grand jury indictment with three counts of first degree murder. Prior to trial on the merits, the indictment was amended to reduce each charge to second degree murder in violation of LSA-R.S. 14:30.1. Thereafter, defendant withdrew his former plea of not guilty and not guilty by reason of insanity and entered a plea of not guilty. Following trial by jury, defendnat was convicted on each count as charged by the amended indictment. The trial court sentenced defendant to a term of life imprisonment, without benefit of parole, probation, or suspension of sentence, on each count. The sentences for counts one and two are to be served consecutively to each other and to any other sentence defendant *858 is now serving. The sentence for count three is to be served concurrently.
Defendant brings this appeal urging ten assignments of error:
1. The trial court erred in failing to suppress the confession of the defendant.
2. The trial court erred in failing to suppress inflammatory, prejudicial photographs.
3. The trial court erred in not granting a mistrial after two violations of its order of sequestration of witnesses.
4. The trial court erred in failing to grant a mistrial after the misconduct and harassment of defense witnesses by the state.
5. The trial court erred in failing to grant a mistrial after harassment by the state of the defendant.
6. The trial court erred in failing to grant a mistrial after improper conduct of the prosecution by referring to a nickname of the defendant in violation of court order.
7. The trial court erred in failing to grant a judgment of acquittal.
8. The trial court erred in failing to grant a mistrial or a new trial because of the cumulative prejudicial effect of the acts of the state and prosecution.
9. The trial court erred in failing to grant a mistrial or seat an alternate juror when a juror viewed the defendant shackled.
10. The trial court erred in admitting into evidence the autopsy report of Dr. Cavalier.
It is conceded by defendant that, shortly after midnight on a Sunday night, he fatally stabbed Ricky Gray, Mark Vincent and Lester Allen with a knife fashioned from a sharpened file. A fourth individual, Darryl Washington, was also stabbed by defendant, but he survived.[1] At the time of the instant offenses, defendant and the victims were all inmates of Louisiana State Penitentiary at Angola, housed in Magnolia 3 dormitory.
Magnolia 3 dormitory is a prison structure capable of housing sixty inmates, who sleep in one large room with their individual beds arranged side by side in several long rows. Prison personnel characterize the facility as an appropriate placement for an inmate who is not easily integrated into the general prison population.
After making a formal request for protection because of difficulties encountered in another placement at Angola, defendant was moved to Magnolia 3 dormitory some six weeks before the stabbing incident occurred. Robert Shriver was already housed in that facility. Shriver and defendant, both white inmates, subsequently developed a homosexual relationship. Antagonism developed between defendant and Shriver and a group of several black inmates, which included the instant victims. One of those inmates, Larry Thomas, testified that he and Lester Allen broke the lock on Shriver's locker box during the Friday preceding the stabbing incident and stole several items. Larry Thomas admitted that defendant asked to have half of his and Shriver's things returned; however, Thomas was unwilling or unable to comply. Thomas maintains that defendant threatened to recover his property "one way or another." Warren Cain, an inmate who testified for the state, claims to have overheard a conversation among defendant, Shriver, Lester Allen and Mark Vincent during the afternoon immediately preceding the stabbing incident. Cain characterized Allen's and Vincent's response to defendant's request to have his property returned as one of indifference. Defendant was advised to seek return of his property whatever way he wanted.
Defendant and defense witnesses, Al Bates and Aubrey Thompson, maintain that, when questioned about returning defendant's property, Lester Allen advised defendant to get a knife or "check out." However, defendant testified that he did not request a transfer from Magnolia 3 dormitory because he did not want to be separated from Shriver. Rather, defendant *859 retrieved a homemade knife from the prison recreation yard, brought it inside the dormitory, and hid it with his belongings.
On Sunday night in Magnolia 3 dormitory, lights were turned off at 10:00 p.m.; and the dormitory television was turned off at midnight. All inmates were expected to be in bed by midnight. James Slaven, the correctional officer on duty when the stabbing incident occurred, made a head count at 12:30 a.m. Officer Slaven recalled that defendant, Shriver, and Warren Cain were all awake when that count was made. While Officer Slaven was in the shower room reporting his head count, four inmates were stabbed. When the lights were turned on, Officer Slaven observed defendant standing by his bed with a knife in his hand. Defendant's knife, in reality a sharpened file, was held in place by a glove or by gauze wrapped around his hand. No other weapons were found in the dormitory "shake down" following this incident. As defendant was escorted from the dormitory, he remarked to Captain John Purpera of the prison security staff, "I stabbed all four of them."
Accounts of the stabbing incident differ greatly. Inmates Warren Cain and Mark Duhon testified that they saw defendant get out of his bed and proceed to stab Ricky Gray and Mark Vincent as they lay in bed. Gray occupied a bed immediately adjacent to defendant's bed. Vincent's bed was located on the other side of Gray's bed. While Gray and Vincent were being stabbed, Shriver went to Lester Allen's bed and hit Allen with a sock containing batteries. With Gray and Vincent immobilized, defendant went to Shriver's assistance. Defendant stabbed Allen and in the process disturbed Darryl Washington, who occupied the bed immediately adjacent to Allen's bed. Washington was stabbed several times but managed to grab a radio which he hurled against a post.
Robert Shriver acknowledged that he had a sock filled with batteries and was also aware that defendant had brought a knife into the dormitory. He claims ignorance as to Ricky Gray's or Mark Vincent's role in the fight. Rather, Shriver contends that the fight began when Lester Allen approached his bed and said, "Come on and do something for me." In response to that proposition, Shriver got out of his bed, which was positioned end on end relative to defendant's bed, and struck Allen with the sock full of batteries. Defendant came to Shriver's assistance.
Defendant's version of the incident is supported in part by the testimony of fellow inmates, Al Bates, Aubrey Thompson and Donald Fontenot. Defendant maintains that when Shriver and Allen first started arguing he put on a glove and placed the homemade knife in his left hand. Defendant denied utilizing any tape or gauze to wrap his hand. When defendant got up to help Shriver, he was attacked by Ricky Gray and Mark Vincent. Gray had a knife in his right hand, and Vincent appeared unarmed. Defendant grabbed Gray's right hand; and defendant, Gray and Vincent fell onto a bed. Defendant described his encounter with Gray and Vincent: "[W]e was kinda rassling (sic), all three of us on the bed, standing up, falling back down, and I was just stabbing." After Gray and Vincent were incapacitated, defendant intervened in the fight between Shriver and Allen. Defendant stabbed Allen "once or twice". Defendant did not know if Allen had a weapon.
Defendant and Shriver were neither bruised nor cut as a result of the incident. Dr. Emile Laga performed autopsies on Ricky Gray and Mark Vincent. Dr. Laga noted that Gray had four stab wounds to the upper, left half of his body. One deep wound penetrated the front wall of his heart. No defensive injuries were found on Gray's extremities. Dr. Laga was certain that the assailant and Gray had been face to face when Gray was stabbed, and he hypothesized that Gray might have been in a supine position. Vincent suffered two stab wounds to his chest. Again, one wound penetrated the cardial sac, and Dr. Laga was certain that the assailant and Vincent had been face to face when Vincent was stabbed.
*860 Dr. Debra Cavalier, who performed the autopsy of Lester Allen, noted two stab wounds, one positioned in the mid-abdomen and the other on Allen's right side. Allen also had two cuts on his face and a laceration on his forehead. Again, no defensive wounds were located on Allen's hand or forearms, and Dr. Cavalier opined that Allen and his assailant had been face to face during the attack.
ASSIGNMENT OF ERROR NUMBER 1:
By this assignment, defendant contends that the trial court erred by failing to suppress a written statement made by him. Defendant argues that his written statement was tainted because prior to making that statement he had been taken into custody and orally questioned about the incident without having been advised of his Miranda rights. In addition, defendant contends that his written statement was involuntary because he was not advised by his interrogators, prior to making that statement, that any of the victims of the stabbing incident had died.
Testimony from the hearing on the motion to suppress reveals that a series of oral statements was made by defendant after he was escorted from the interior of Magnolia 3 dormitory. The first statement was to Captain John Purpera of the prison security force. As defendant was being led from the crime scene, he spontaneously remarked to Captain Purpera, who had just arrived on the scene, "I got all four of them." The trial court found that Captain Purpera had asked no questions, that defendant's statement was freely and voluntarily given, and, thereby, it was admissible at trial. Defendant does not contest that ruling on appeal.
Defendant was then handcuffed and placed in custody as the suspect of a homicide by Lieutenant Dallas Constance. From that point in time, defendant was in the immediate and personal control of an officer. Accordingly, his freedom was restricted beyond that of an ordinary inmate. Without advising defendant of his Miranda rights, Lt. Constance asked defendant why he had stabbed a fellow inmate. Defendant replied that he had stabbed four inmates. The trial court suppressed defendant's statement to Lt. Constance, finding that any questioning at that point should have been preceded by advising defendant of his constitutional rights. That particular ruling is not contested; however, defendant urges that the circumstances surrounding the giving of that statement, and an oral statement to Warden Ross Maggio, served to taint his later written statement.
According to his testimony at the hearing on the motion to suppress, Warden Maggio first spoke with defendant about 1:00 a.m. on the walkway outside Magnolia 3 dormitory. Warden Maggio stated that the primary focus of this conversation with defendant was to determine if any inmates, who remained in Magnolia 3 dormitory, were in danger because of the stabbing incident. Without advising defendant of his Miranda rights, Warden Maggio asked defendant what had happened. Defendant testified at the hearing that he answered Warden Maggio's questions because he wanted to explain the incident. Defendant did not feel compelled to answer. Defendant's response to this questioning was described as detailing the same basic sequence of events which defendant later set forth in his written statement. The trial court did not rule on the admissibility of defendant's oral statement to Warden Maggio because the state indicated that it would not seek to introduce it at trial.
At approximately 2:40 a.m., defendant was taken to Capt. Purpera's office. In the presence of Deputy Ivy Cutrer of the St. Francisville Sheriff's Office, Assistant Warden Prentice Butler, Deputy Warden C.M. Lensing, and Warden Ross Maggio, defendant was fully advised of his Miranda rights and executed a written waiver. Thereafter, defendant detailed the antagonism which existed among various inmates housed at Magnolia 3 dormitory and outlined the scenario which culminated in *861 the instant stabbing incident.[2] Handwritten notes of defendant's oral statement were taken by Deputy Warden Lensing and prepared in typed form. At approximately 3:30 a.m., defendant read and signed the typed statement, which was ruled admissible by the trial court and introduced into evidence by the state.
In written reasons for judgment on the motion to suppress, the trial court relied on Oregon v. Elstad, ___ U.S. ___, 105 S.Ct. 1285, 84 L.Ed.2d 222 (1985), in rejecting defendant's contention that his written statement was tainted by the earlier unadvised questioning of Lt. Constance and Warden Maggio.
The United States Supreme Court recently decided in Oregon v. Elstad, supra, that a careful and thorough administration of Miranda warnings may cure the condition that rendered previous unwarned statements inadmissible.[3] The Miranda warning, itself, when properly administered, conveys the relevant information and thereafter a suspect's choice whether or not to exercise a privilege to remain silent should ordinarily be viewed as an act of free will. The United States Supreme Court reasoned that there is no basis for presuming coercive effect where the suspect's initial inculpatory statement, although technically in violation of Miranda, was voluntary.
In the instant case, defendant acknowledged during the hearing on the motion to suppress that he did not feel compelled to answer Warden Maggio's initial questions. Defendant also admitted that he was anxious to explain his side of the incident. We do not find that Warden Maggio's initial questioning of defendant was coercive or a deliberately conceived improper tactic to obtain defendant's initial statement. At that point in time, Warden Maggio's primary concern was to protec those inmates remaining in Magnolia 3 dormitory. The scene was one of confusion following a violent confrontation which left three inmates dead. Cf. New York v. Quarles, 467 U.S. 649, 104 S.Ct. 2626, 81 L.Ed.2d 550 (1984).
As Justice O'Connor explained in Oregon v. Elstad, supra:
It is an unwarranted extension of Miranda to hold that a simple failure to administer the warnings, unaccompanied by any actual coercion or other circumstances calculated to undermine the suspect's ability to exercise his free will so taints the investigatory process that a subsequent voluntary and informed waiver is ineffective for some indeterminate period. Though Miranda requires that the unwarned admission must be suppressed, the admissibility of any subsequent statement should turn in these circumstances solely on whether it is knowingly and voluntarily made.
105 S.Ct. at 1293-1294.
Therefore, under Oregon v. Elstad, the relevant inquiry to be made in determining *862 whether a post-Miranda statement is admissible is whether it was voluntarily made. In addition, Louisiana statutory law requires that, before a confession or inculpatory statement may be introduced in evidence, the state must prove affirmatively and beyond a reasonable doubt that the statement was free and voluntary, and not made under the influence of fear, duress, intimidation, menaces, threats, inducements or promises. LSA-R.S. 15:451; La.C.Cr.P. art. 703(G); State v. Nathan, 444 So.2d 231 (La.App. 1st Cir.1983), cert. denied, 445 So.2d 1232 (La.1984).
In this context, defendant argues that the action of the interrogating officers in withholding knowledge of the inmates' deaths constituted a form of inducement or coercion, rendering his written statement inadmissible as not being freely and voluntarily made.
Once a defendant alleges specific instances of police misconduct in reference to a statement, it is incumbent upon the state to specifically rebut each instance. State v. James, 459 So.2d 28 (La.App. 1st Cir.1984). The trial court's conclusions on credibility are entitled to the respect due those made by one who saw the witnesses and heard them testify. State v. Collins, 470 So.2d 549 (La.App. 1st Cir.1985). The decision of the trial court on the question of whether the confession was voluntarily given is entitled to great weight and will not be overturned on appeal unless it is not supported by the evidence. State v. Haynie, 395 So.2d 669 (La.1981).
At the hearing on the motion to suppress, defendant testified that he inquired about the health status of the inmates he had stabbed. Only Warden Maggio recalled discussing that topic with defendant. In response to defendant's inquiry, Warden Maggio advised defendant that he was not fully aware of the condition of those inmates. However, he noted that defendant was positioned in such a location that he would have been able to see medical personnel moving at least one inmate's body from the interior of the dormitory. In written reasons for judgment, the trial court noted: "... by the sheer brutality of the stabbing attacks, Burge was fully aware of the high probability that one or all of the victims would die as a result."
Assuming for the sake of argument, that defendant did not know the fatal effect of the wounds he had inflicted upon his fellow inmates, this fact alone would not compel a conclusion that defendant's statement was not freely and voluntarily made. Cf. State v. James, supra. The Louisiana Supreme Court has established that the central determination of voluntariness is whether the statement was the product of the defendant's free and rational choice. State v. Richey, 364 So.2d 566 (La.1978). Making that determination requires an examination of the totality of the circumstances. Edwards v. Arizona, 451 U.S. 477, 101 S.Ct. 1880, 68 L.Ed.2d 378 (1981).
Defendant knew at the least that his victims were in extremely serious condition after having been stabbed by him a number of times. He was also aware of the illegal nature of his act. The record supports the conclusion that defendant fully understood his rights and the consequences of waiving them. Defendant's statement was the product of his free and rational choice, despite the fact that he may not have had knowledge of the fatal effects of his criminal actions. In light of all the circumstances, the record supports the trial court's conclusion that the defendant's statement was freely and voluntarily made and thus admissible.
Moreover, since defendant's testimony at trial is free of any constitutional taint and of equal cast with his prior inculpatory statement, we find admission of his statement, even if improper, was harmless error beyond a reasonable doubt. La.C. Cr.P. art. 921. See, State v. Robertson, 464 So.2d 760 (La.App. 1st Cir.1984), writ denied, 467 So.2d 534 (La.1985).
ASSIGNMENT OF ERROR NUMBER 2:
By means of this assignment, defendant contends that the trial court erred by failing *863 to suppress inflammatory, prejudicial photographs depicting the victims and the crime scene.
The admission of allegedly gruesome photographs will not be overturned unless it is clear that the prejudicial effect of the photographs outweighs their probative value. State v. Johnson, 475 So.2d 394 (La.App. 1st Cir.1985), writ denied, 478 So.2d 143 (La.1985). Photographs which illustrate any fact, shed light upon any fact or issue in the case, or are relevant to describe the person, place or thing depicted, are generally admissible. State v. Kirkpatrick, 443 So.2d 546 (La.1983), cert. denied, 466 U.S. 993, 104 S.Ct. 2374, 80 L.Ed.2d 847 (1984).
The record indicates that the trial court closely examined each photograph submitted at the hearing on the motion to suppress, rejecting those which were repetitious or of little probative value. After examining the contested photographs, we find no error in the trial court's ruling that the probative value of those admitted photographs outweighs any prejudicial effect. Accordingly, these photographs were properly admitted over defense counsel's objection.
This assignment of error is without merit.
ASSIGNMENT OF ERROR NUMBER 3:
By this assignment, defendant contends that the trial court erred by failing to grant a mistrial after the state violated the witness sequestration order on two different occasions.
In the first instance, the record reveals that during the course of the trial, defense counsel noted of record that he had personally observed the prosecutor meeting with several prospective witnesses during a noontime recess. The witnesses in attendance were identified by the prosecutor as Dr. Emile Laga and Dr. Debra Cavalier. Dr. Laga performed the autopsies on Ricky Gray and Mark Vincent, and Dr. Cavalier performed the autopsy on Lester Allen. The prosecutor admitted that he had met with these two physicians and others; however, he maintained that each autopsy was discussed on an individual basis with the respective physician. Dr. Laga had just taken the witness stand when the objection was voiced and, outside the presence of the jury, confirmed the prosecutor's characterization of the meeting. Dr. Laga also testified that his prospective testimony was not influenced by that meeting. In denying the defense motion, the trial court relied on Dr. Laga's testimony and the fact that the witnesses at issue had been called to testify as medical experts.
In the second instance, defense counsel noted of record that defendant's father, Al Burge, had observed the prosecutor engaged in conversation with two state witnesses, Lt. Constance and Capt. Purpera, during a noontime recess prior to their testifying at trial. Under examination by the trial court, the prosecutor stated that he had not told either witness about testimony of prior witnesses but had asked each officer individually, in the presence of the other officer, about policy on transferring an inmate within the Louisiana State Penitentiary. At the time of defense counsel's objection, both officers had already testified during trial on the merits. The trial court noted that each officer's testimony had been of a limited nature and substantially the same as his respective testimony during the hearing on the motion to suppress defendant's confession. Finding no particular breach, the trial court denied defendant's motion.
Louisiana Code of Criminal Procedure article 764 provides for sequestration of witnesses upon the court's own motion or upon request of the state or of the defense. The purpose of sequestration is to assure that a witness will testify as to his own knowledge of events, to prevent the testimony of one from influencing the testimony of others, and to strengthen the role of cross-examination in developing facts. State v. Nolan, 457 So.2d 1246 (La. App. 1st Cir.1984), writ denied, 462 So.2d 190 (La.1984). It is within the sound discretion of the trial court to permit witnesses who have violated the order to testify.
*864 This may be done where the purpose of the sequestration order has not been thwarted or there is no evidence that the witness's testimony has been tainted. Id.
We find no prejudice to defendant arising from the trial court's application of the sequestration rule in this case. There is no evidence that any witness' testimony was tainted by the prosecutor's casual approach to the sequestration order. Dr. Laga and Dr. Cavalier testified as expert witnesses called to address different factual considerations. Although Lt. Constance and Capt. Purpera were questioned about internal transfer of inmates, the subject matter of the group meeting, this was not "a major issue in the case" as defendant contends in brief. Defendant, himself, freely admitted during his testimony at trial that he had not sought to be transferred from Magnolia 3 Dormitory because he did not want to be separated from Robert Shriver. Defendant was not concerned that procedural obstacles attendant to requesting that relief would have served to thwart his efforts.
For the foregoing reasons, this assignment of error is without merit.
ASSIGNMENTS OF ERROR NUMBERS 4 AND 5:
By means of these assignments, defendant contends that the trial court erred in failing to grant a mistrial due to harassment of the defendant and defense witnesses by the state.
The alleged harassment is based on the assertion that defendant and defense witnesses, Wayne Martin and Daniel Holmes, were moved by Louisiana State Penitentiary personnel to administrative lockdown, i.e., a cell block situation, several days prior to commencement of trial on the merits. Before these individuals testified at trial, defense counsel noted his objection of record citing possible prejudice "if these people come to court and don't want to testify because the power of the State has been brought upon them."
However, the record reveals that defense counsel's fears were not realized. Wayne Martin and Daniel Holmes each testified fully as to his knowledge of relevant circumstances surrounding the incident. On cross-examination, each admitted that his testimony at trial was not adversely affected by his transfer within the penitentiary. Defendant also took the stand on his own behalf. In detailing the relationship between Robert Shriver and Lester Allen, defendant noted they had, at one time, been housed together in the "dungeon". In defining the term "dungeon", defendant provided: "It is [sic] proper term would be administrative lockdown. It is where they put you when you [sic] waiting to go to court, or you have a rule infraction or you check out." Thus, contrary to defense counsel's voiced concerns, defendant apparently perceived placement in administrative lockdown as a routine administrative procedure which might be implemented prior to an inmate's courtroom appearance.
The record clearly reveals that the anticipated prejudicial impact did not materialize. In addition, it was not demonstrated that internal movement of these prisoners was grounded on any consideration other than appropriate operation of the penal system. Under these circumstances, these assignments of error are without merit.
ASSIGNMENT OF ERROR NUMBER 6:
By this assignment, defendant contends that the trial court erred by failing to grant a mistrial following improper comment by the prosecutor, who referred to defendant's nickname in violation of a court order.
The record reveals that defendant filed a motion in limine seeking inter alia to prevent the state from referring to defendant's prison nickname of "Iron Mike" in the presence of the jury. During the hearing on that motion, the prosecutor suggested that a definitive ruling be deferred. Thereafter, the trial court noted: "If his (defendant's) character is at issue, I'm not going to try to prevent that. If his character is not at issue, I'll instruct the State not to use that nickname."
During cross-examination of defendant, the prosecutor asked defendant his nickname after defendant acknowledged that *865 he was regarded as a strong inmate. Before defendant could respond, defense counsel objected; and the trial court sustained the objection. No further relief was sought.
If an objection is sustained, defendant cannot on appeal complain of the alleged error unless at trial he requested and was denied either an admonition to disregard or a mistrial. State v. Michel, 422 So.2d 1115 (La.1982). Moreover, assuming for the purpose of argument that the prosecutor's question was improper, the general rule regarding reversible error due to improper questioning requires a clear showing that the matters complained of are of such an extremely prejudicial nature that defendant was deprived of a fair and impartial trial. See, State v. Morris, 404 So.2d 1186 (La.1981).
In this instance, no such showing was made. The prosecutor's question did not reveal defendant's nickname. In addition, through defendant's opening statement, the jury learned that prisoners routinely referred to each other by nicknames. Thus, the fact that defendant was known by a nickname was entirely customary. In view of the foregoing, this assignment of error is without merit.
ASSIGNMENT OF ERROR NUMBER 7:
By means of this assignment, defendant contends that the trial court erred by failing to grant his motion for post-verdict judgment of acquittal.
Defendant acknowledges that he stabbed his fellow inmates and that the stab wounds caused their deaths. It is defendant's contention that he was justified in killing Ricky Gray, Mark Vincent, and Lester Allen in self-defense or in defense of Robert Shriver.
A defendant in a homicide prosecution who asserts that he acted in self-defense does not have the burden of proof on that issue because the state bears the burden of establishing beyond a reasonable doubt that the homicide was not perpetrated in self-defense. State v. Brown, 414 So.2d 726 (La.1982). LSA-R.S. 14:20, in pertinent part, provides: "A homicide is justifiable: (1) when committed in self-defense by one who reasonably believes he is in imminent danger of losing his life or receiving great bodily harm and that killing is necessary to save himself from that danger...." It is also justifiable "to kill in the defense of another person when it is reasonably apparent that the person attacked could have justifiably used such means himself, and when it is reasonably believed that such intervention is necessary to protect the other person." LSA-R.S. 14:22. However, an aggressor or one who brings on difficulty, as a general rule, cannot claim the right of self-defense unless he withdraws from the conflict in good faith and indicates his intention of abandoning the difficulty. LSA-R.S. 14:21. The relevant inquiry on appeal is whether, after viewing the evidence in the light most favorable to the prosecution, any rational trier of fact could have found beyond a reasonable doubt that the homicide was not committed in self-defense. State v. Brown, supra.
As often happens, eyewitnesses presented the jury with conflicting accounts of the incident. Defense witnesses suggest that defendant was initially attacked by Ricky Gray and Mark Vincent and while wrestling with both men, he stabbed each man several times. State witnesses, Warren Cain and Mark Duhon, testified that they saw defendant get out of his bed and proceed to stab Ricky Gray and Mark Vincent, who were lying in adjacent beds. This account was corroborated by forensic evidence detailing the situs of the wounds and by the lack of evidence suggesting a struggle.
The trier of fact is free to accept or reject in whole or in part, the testimony of any witness. State v. Richardson, 459 So.2d 31 (La.App. 1st Cir.1984). Apparently, the jury exercised its lawful prerogative and chose to believe the outline of events presented by the state. Moreover, Shriver's own account of his and defendant's confrontation with Lester Allen fails to *866 support justification for stabbing the unarmed Allen. Shriver testified that he answered Allen's proposition by striking Allen with a sock filled with batteries. By the time defendant intervened in that fist fight, Allen had already fallen back onto his bed and had stopped fighting, thereby negating justification for use of deadly force.
The law cannot permit even a harassed and threatened inmate of a penal institution to take the law into his own hands, arm himself, attack his enemy with a knife, and then, because of prior threats, claim justification for a homicide which follows. After consideration of all the state's evidence, we conclude that any reasonable trier of fact could have found that the state carried its burden in establishing beyond a reasonable doubt that the homicides of Ricky Gray, Mark Vincent, and Lester Allen were not committed in self-defense or in defense of Robert Shriver.
For the foregoing reasons, this assignment of error is without merit.
ASSIGNMENT OF ERROR NUMBER 9:
By means of this assignment, defendant contends that the trial court erred by failing to grant a mistrial or to seat an alternate juror after one juror viewed defendant shackled.
The record reveals that, during the course of the instant trial, defense counsel noted of record that he had observed one of the jurors downstairs in the courthouse waiting for transportation home after trial had been adjourned for the day. As that juror waited, defendant was brought downstairs in handcuffs and shackles to be transported from the courthouse to Louisiana State Penitentiary at AngoLa.Defendant moved for a mistrial on the basis of this inadvertent sighting. In denying the defense motion, the trial court acknowledged that it too had observed the juror waiting for transportation. However, at that point in the trial, the jury was already fully aware of defendant's status as an inmate of the Louisiana State Penitentiary at AngoLa.The trial court weighed the need for security in transporting defendant and the juror's prior knowledge of defendant's inmate status in determining that the inadvertent sighting did not prejudice defendant.
We find that the trial court did not abuse its discretion in refusing to grant a mistrial. Under the circumstances, the possibility that on one occasion a juror may have seen the defendant shackled does not appear to have so prejudiced defendant as to warrant relief on appeal. Mistrial is a drastic remedy and should only be granted on a showing of substantial prejudice. State v. Murphy, 463 So.2d 812 (La.App. 2d Cir.1985), writ denied, 468 So.2d 570 (La. 1985). There is no showing that defendant's presumption of innocence was destroyed or that any juror was influenced by seeing defendant in handcuffs and shackles.
Accordingly, this assignment of error is without merit.
ASSIGNMENT OF ERROR NUMBER 10:
By means of this assignment, defendant contends that the trial court erred by admitting into evidence the autopsy report of Lester Allen prepared by Dr. Cavalier.
The record reveals that following the examination of Dr. Cavalier the state sought to introduce into evidence the autopsy report of Lester Allen. Defendant grounded his contemporaneous objection to its admission on an allegation that the state had failed to provide him with a copy of that report in response to defendant's discovery request. Following a bench conference held off the record, the trial court overruled the objection finding that the state's failure to furnish the report was inadvertent and that defendant was neither surprised nor prejudiced by this omission.
The state's failure to comply with discovery procedures will not automatically demand a reversal. See La.C.Cr.P. art. 729.5; State v. Faulkner, 447 So.2d 1139 (La.App. 1st Cir.1984), writ denied, 449 So.2d 1345 (La.1984), cert. denied, ___ U.S. ___, 105 S.Ct. 164, 83 L.Ed.2d 100 (1984). We agree with the trial court's reasoning *867 and find no undue surprise or prejudice. Before trial, defense counsel was aware of, and sought to take advantage of, the inadvertent error. Defense counsel was aware prior to trial testimony of Dr. Cavalier that she had performed the autopsy on Lester Allen. [See assignment of error number three.] In addition, existence of the autopsy report was revealed during direct examination of Dr. Cavalier. Rather than seeking a recess, defense counsel chose to vigorously participate in examination of that witness.
Under these circumstances, we find this assignment of error without merit.
ASSIGNMENT OF ERROR NUMBER 8:
By this assignment, defendant urges that the cumulative effect of the above referenced errors was so prejudicial as to preclude defendant's receiving a fair trial.
For reasons more fully set forth in our treatment of defendant's other arguments urged on appeal, we find this assignment of error meritless.
The conviction and sentence are therefore affirmed.
CONVICTION AND SENTENCE AFFIRMED.
NOTES
[1] The attack on Darryl Washington does not form a part of this prosecution.
[2] In pertinent part, defendant stated that after Robert Shriver and Lester Allen started fighting he got up from his bed and retrieved a knife from his pillow. Defendant intervened in the fight between Shriver and Allen. Defendant stabbed Allen "a couple of times". Defendant was attacked by Ricky Gray and Mark Vincent and also stabbed each of those inmates "a couple of times".
[3] We note that by adoption of Article I, § 13 of the 1974 Louisiana Constitution, Louisiana incorporated the prophylactic rules of Miranda v. Arizona, 384 U.S. 436, 86 S.Ct. 1602, 16 L.Ed.2d 694 (1966). See State In The Interest of Dino, 359 So.2d 586 (La.1978), cert. denied, 439 U.S. 1047, 99 S.Ct. 722, 58 L.Ed.2d 706 (1978). Decisions of the United States Supreme Court, although given careful consideration, do not necessarily control or dictate decisions by Louisiana courts construing the Louisiana Constitution, nor replace the independent judgment of the Louisiana courts so long as the state decisions do not infringe on federal constitutional rights. The decision of Oregon v. Elstad is well grounded in law and supported by strong policy considerations. It advances the legitimate interests of the criminal justice system without sacrificing the individual rights guaranteed by the constitution. Exercising the independent judgment of this Louisiana court, we adopt the Oregon v. Elstad holding (that a voluntary unwarned statement in a non-coercive environment does not "taint" a subsequent statement made after full warnings and waiver) as applicable to cases arising under Article I, § 13 of the Louisiana Constitution, for the sound reasons set forth in the majority opinion of the United States Supreme Court.
| {
"pile_set_name": "FreeLaw"
} |
C++ unit testing with Qt Test – part 2 – advanced testing
This tutorial explores more advanced topics in C++ unit testing with Qt Test. A working example is discussed and analysed in detail. Full qmake project and C++ source code are provided.
More C++ unit testing with Qt Test
In this tutorial I am going to introduce more advanced features of Qt Test, the Qt framework for C++ unit testing. In particular I will explain how to handle a project with multiple unit tests and how to implement data driven testing. I will also give examples of more testing macros and I will show you the integration offered by Qt Creator.
This is the second post of a series dedicated to Qt Test. The posts of this series are:
I recommend to read the previous posts of the series, in particular the first part of C++ unit testing with Qt Test, to fully understand new concepts I will introduce here.
Creating a better project
Last time I showed how to create an unit test project using the “Auto Test Project” template. Another (slightly more advanced) option to do the same is the “Qt Unit Test” template:
This wizard will allow you to chose which Qt modules you want to include in the project and will offer more options in the Details section.
As seen in the first tutorial, the Qt Test philosophy is that every test case is an independent executable. In real projects you usually have hundreds or even thousands of different unit tests and running them all manually is definitely not an option. The best way to run and manage them is creating a “parent” project. The right choice in this case is the “Subdirs Project” template, which is listed in the “Other Project” group of the “New Project” dialog.
After creating the project you will get back to the templates dialog to create a first project to include. You can cancel that and proceed to add your existing projects. In the end you will get something like this:
For this tutorial I extended the TestCalculator unit test project and I created a new one called TestIntBitset. The new project tests a simplified bitset implementation. Once again, the code to test (the IntBitset class) is included in the unit test project for simplicity.
Data driven testing
An advanced feature of Qt Test is data driven testing. The idea is to separate tests and data to avoid to have a long list of similar QVERIFY or QCOMPARE macros and to replicate all the code needed to initialise a test.
To provide data to a test function you have to create another private slot with the same name of the function and add the “_data” suffix. For example the data function for testDiff() is testDiff_data().
Implementing a data function is a bit like inserting data into a database. First you define your data like if you were defining a table:
void TestCalculator::testDiff_data() { QTest::addColumn<int>("a"); QTest::addColumn<int>("b"); QTest::addColumn<int>("result");
Then you add rows of values:
QTest::newRow("all 0") << 0 << 0 << 0; QTest::newRow("same number") << 10 << 10 << 0; // ... more data ... }
Each row contains a name and a list of values. You can imagine that the previous code is converted to something like the following table:
INDEX NAME a b result 0 “all 0” 0 0 0 1 “same number” 10 10 0
Once we have defined the data function we can write the test function which is divided in 2 parts.
The fist part retrieves the data:
void TestCalculator::testDiff() { // retrieve data QFETCH(int, a); QFETCH(int, b); QFETCH(int, result); // set value mCalc.SetA(a); mCalc.SetB(b);
The second part uses the data to perform checks:
// test QCOMPARE(mCalc.Diff(), result); }
Without a data driven approach we should have repeated the instructions to set the values and the QCOMPARE check many times.
When a data driven test is executed the test function is called once per set of data and the log message looks like this:
PASS : TestCalculator::testDiff(all 0) PASS : TestCalculator::testDiff(same number) ... more lines ...
As you can notice the name of the data row is reported in the log to help you differentiate the cases.
Other useful macros
Qt Test offers few extra macros to help you handling different situations in your unit tests.
Failing a test
One of these macros is QFAIL, which makes the current test fail. It can be used when you know that something will make the test fail. In that case there’s no point in wasting time executing the test, you can just fail and move on.
void TestIntBitset::initTestCase() { if(sizeof(int) != 4) QFAIL("Int size is not 4 on this platform."); }
In my example project I used QFAIL in the initTestCase and cleanupTestCase functions, which are special functions executed before and after the test functions are executed. When initTestCase fails none of the tests in the test case is executed.
Failing a single check
In case you know that a particular QVERIFY or QCOMPARE is going to fail, but you still want to continue executing the test, you can precede a check with the macro QEXPECT_FAIL:
void TestIntBitset::testSetOff() { mBS.setAllOn(); unsigned int bitsOff = 0; mBS.setBitOff(BITS_IN_BYTE * bitsOff++); mBS.setBitOff(BITS_IN_BYTE * bitsOff++); QEXPECT_FAIL("", "isAnyOff not implemented yet", Continue); QVERIFY(mBS.isAnyOff()); // ... more test code ... }
Its first parameter identifies a row of data when doing data driven testing, but it can be set to an empty string during normal testing. The second one is a log message and the third one lets you decide if you want to Continue or Abort the test on failure.
When running the previous test the output log will show something like this:
XFAIL : TestIntBitset::testSetOff() isAnyOff not implemented yet Loc: [../../UnitTests/TestIntBitset/TestIntBitset.cpp(67)]
Skipping a test
void TestIntBitset::testOperators() { QSKIP("Operators have not been implemented yet..."); }
No code after QSKIP will be executed, but the code before will, so if any check there fails the test will be considered failed.
Running a skipped test will show the following text in the logs:
SKIP : TestIntBitset::testOperators() Operators have not been implemented yet... Loc: [../../UnitTests/TestIntBitset/TestIntBitset.cpp(28)]
Deciding when using QFAIL and when using QSKIP can be debatable sometimes. In general there is not a precise rule and it’s all about your design choices. Personally I tend to use QFAIL when I know in advance that something is going to fail and I want to highlight that, whereas QSKIP when it doesn’t matter executing a test or part of it.
Warning messages
If you want to print a warning message in the tests log you can use QWARN. This macro can be useful when you want to notify that something is not going as expected in a test.
void TestIntBitset::testSetOff() { mBS.setAllOn(); unsigned int bitsOff = 0; mBS.setBitOff(BITS_IN_BYTE * bitsOff++); // ... more test code ... // this test will trigger a warning if((BITS_IN_BYTE * bitsOff) < BITS_IN_INT) QVERIFY(!mBS.isBitOff(BITS_IN_BYTE * bitsOff)); else QWARN("trying to verify bit out of set bounds"); // ... more test code ... }
In this case the QVERIFY check will fail because input data is somehow wrong. It would be unfair to fail the test because of a possible bug in the local code, but this situation needs to be highlighted. A warning is a good way to achieve that.
When running a test containing a warning, the output log will show something like this:
WARNING: TestIntBitset::testSetOff() trying to verify value out of set bounds Loc: [../../UnitTests/TestIntBitset/TestIntBitset.cpp(75)]
The warning message will always have a message and will show where the warning was issued.
Qt Creator integration
Not surprisingly, Qt Creator offers an excellent integration with Qt Test.
One of the panels in the left sidebar is called “Tests” and it shows all the unit test found in your container project.
Using this panel you can disable some tests, run them all or run only a specific one. When doing data driven testing, you can also select which data sets are enabled. All this is extremely useful in a real project where you can have hundreds or even thousands of unit tests and you need to check/debug only one/few.
When running the unit test from the Tests panel the results are shown in the Test Results panel that you can also open with ALT-8.
This panel will show clearly which tests passed and which not, but it will also show other useful information, especially in case of failure. In particular you click on results to jump to any fail or warning in the code. Furthermore, the panel lets you filter what events you want to see in the log, so for example you can check only fails or warnings.
The 2 panels combined make a great addition to Qt Creator and Qt Test and offer a very powerful tool for free.
Source code
The full source code of this tutorial is available on GitHub and released under the Unlicense license.
In this case you will find 3 qmake projects, but you only need to load the top level one (UnitTests.pro) to build.
References
To know more about Qt Test you can check out the latest documentation of the QTest namespace.
If you want to learn more about Qt have a look at the other Qt tutorials I posted.
Conclusion
The features discussed in this tutorial make Qt Test a more usable and complete framework than the one introduced in the first part of this series. In particular the integration with Qt Creator is extremely useful and effective. Data driven testing can also be very powerful to reduce testing code and to test different cases very easily.
Things will get even more interesting when I will discuss GUI testing in the next tutorial, so stay tuned for more.
In case you need help to handle your C++ unit tests with Qt Test feel free to contact me.
Stay connected
Don’t forget to subscribe to the blog newsletter to get notified of future posts.
You can also get updates following me on Github, Google+, LinkedIn and Twitter. | {
"pile_set_name": "OpenWebText2"
} |
Development of a streamlined rat whole embryo culture assay for classifying teratogenic potential of pharmaceutical compounds.
This study describes a novel rat whole embryo culture (rWEC) teratogenicity assay that applies a simplified experimental design and statistical prediction model, resulting in reduced animal requirements and increased throughput with low prediction error rate for classifying teratogenic potential of compounds. A total of 70 compounds (38 teratogens and 32 nonteratogens) were evaluated, and the prediction model was generated from a dataset of 59 compounds. The rWEC assay requires only one test concentration (1μM) and three structural endpoints (group average morphological scores of spinal cord, heart, and number of somite pairs), which are used in a recursive partition model for classifying teratogenic liability. The model fitting concordance between the WEC assay and in vivo outcome was 83% with a standard deviation (SD) of 4.9%. The predictivity for future compounds was evaluated by using two statistical methods. Fivefold cross-validation estimated the predictivity of this model at 73% (SD 5.8%). A second estimation of predictivity was obtained from an independent test set of 11 compounds that were not used to build the prediction model and reached 82% (SD 11.6%). The overall estimate for prediction concordance is 74% (SD 5.2%). There is no statistically significant difference (p value > 0.50) in the predictivity between this model and the model supporting European Center for the Validation of Alternative Methods WEC assay with predictivity of 80% (SD 10.6%). Overall, the streamlined WEC assay is estimated to reduce animal use and operational costs by more than 50%. It substantially improves results turnaround with no loss of predictivity. | {
"pile_set_name": "PubMed Abstracts"
} |
Tag: crocodiles
Crocodiles like to lurk in the shallows, preparing to pounce. They are not, as a general rule, strong enough swimmers to go on extended ocean cruises whenever they feel like it. Despite this, these creatures managed to reach islands across the South Pacific. How?
Surfing.
A group of scientists led by Craig Franklin, and including the late “Crocodile Hunter” Steve Irwin, studied saltwater crocs from the Kennedy River area of Northeastern Australia for about a year for a study forthcoming in the Journal of Animal Ecology. The team tagged 20 animals with receivers to give both their position and body temperature.
They found that eight crocodiles undertook a total of 42 long-distance journeys of more than 10 kilometres [6.2 miles] per day. In 96% of these trips, the reptiles traveled with the current flow. In contrast, the crocodiles were equally likely to travel with and against the current flow when making short journeys [Nature].
The body temperature reading gave the scientists another way to verify this, besides matching croc travel habits to changing ocean currents. When the tide went against the crocs, they just hung out on the beach and their body temperature rose to 90 degrees F as they soaked up the sun. However, when the current became favorable and they went traveling, their temperatures descended to more like 77 degrees.
A thrilling set of ancient crocodile fossils have been unearthed in northern Africa. A “saber-toothed cat in armor” and a pancake-shaped predator are among the strange crocodile cousins whose bones have been found beneath the windswept dunes of the Sahara, archaeologists say [National Geographic News].
At a news conference organized by the National Geographic Society, which sponsored the research, scientists announced that the fossils represent 5 species; 3 new species and 2 that were previously known. These ancient croc ancestors, known as crocodilyforms, are unlike any crocodiles encountered in the Northern Hemisphere, according to the research team. Their findings are detailed in the journal ZooKeys.
The crocs were spectacularly diverse, and included a species that ate dinosaurs, two that grew up to 20 feet long, and two that had long legs for quick movement on land but also had long tails for swimming. The three new species are:
• BoarCroc (Kaprosuchus saharicus), a 20-foot meat-eater. It used its snout for ramming and three sets of dagger-shaped fangs for slicing dinosaurs it ate.
• PancakeCroc (Laganosuchus thaumastos): a 20-foot-long, squat fish-eater with a 3-foot long flat head with spike-shaped teeth.
Who knew that baby crocodiles are such tender little creatures? According to researchers, they start crying out for their mothers before they’ve even cracked their shells and poked their long noses out into the world: The little crocs make an “umph! umph! umph!” sound right before they hatch [Reuters]. Now a study has shown that the noises they make from within their shells aren’t just idle chatter, but instead play an important role in the hatching.
A team of French researchers studied Nile crocodiles, and found that the calls prompted mother crocodiles to dig the eggs out of the dirt. The cries also seemed to alert all the babies inside their shells that it was time to hatch, leading to a neatly synchronized hatching that could have an evolutionary benefit, researchers say. | {
"pile_set_name": "Pile-CC"
} |
WP8: low on battery? go “ease of access”
Windows Phone comes with a “battery saver” feature that can be a life saver when you are running low on battery. This feature turns off some services while on standby and preserve battery life. When this service is on you can still receive calls and text, but apps run only when you open them and email must be synced manually.
Another way I have found to significantly extend my battery life is Ease of Access . This “side effect” IS NOT reflected in the Estimated Time Remaining which is updated when you turn batter saver on. The key to this is AMOLED.
Ease of Access allows you to turn high contrast on. This feature changes the colors for some features, and hides some of their background images. A lot of mobile phones today use AMOLED displays, which according to Wikipedia its power consumption is based on color displayed.
“The amount of power the display consumes varies significantly depending on the colour and brightness shown. As an example, one commercial QVGA OLED display consumes 0.3 watts while showing white text on a black background, but more than 0.7 watts showing black text on a white background, while an LCD may consume only a constant 0.35 watts regardless of what is being shown on screen.[10] Because the black pixels actually turn off, AMOLED also has contrast ratios that are significantly better than LCD.”
Ease of Access turns off a large percentage of the screen to black (including no lock screen image) and in the process extending battery life significantly (this assertion is based on experience no empirical measurements). In fact, I use it permanently now not only for the benefit of battery life but it makes my phone look more eccentric.
Here is what the start page looks like under both settings.
Ease of Access on
Only apps using system colors are affected when the setting is turn on.
Steps to turning Ease of Access:
Select Settings, then scroll down and select Ease of Access, turn High contrast ON. – done! | {
"pile_set_name": "Pile-CC"
} |
Tuesday, 12 September 2017
Organisation : Karshaka Information Systems Services And Networking (KISSAN)Organisation Profile : Karshaka Information Systems Services And Networking (KISSAN) is an integrated, multi-modal delivery of agricultural information system, which provides several dynamic and useful information and advisory services for the farming community across Kerala. It is one of the leading citizen centric e-governance projects of the Department of Agriculture, Govt. of Kerala. The project was conceived, developed and managed by the Indian Institute of Information Technology and Management- Kerala for the Department of Agriculture, Govt. of Kerala.
Tuesday, 15 August 2017
Organisation : Institute of Human Resources Development (IHRD)Organisation Profile : Institute of Human Resources Development (IHRD) is an autonomous educational institution established by the Government of Kerala in 1987. The institute is registered under The Travancore – Cochin Literary, Scientific and Charitable societies registrations Act 12 of 1955. The management of the institute is vested with a Governing Body composed of with the Hon’ble Minister of Education, Kerala State, as the Chairman and Additional Chief Secretary, Higher Education Department, Government of Kerala as the Vice-Chairman.
Wednesday, 9 August 2017
Organisation : Indian Institute of Handloom Technology (IIHT - Kerala)Organisation Profile : Indian Institute of Handloom Technology is an autonomous institute under the Ministry of Industries, Government of Kerala and the nodal agency in the State for giving input of Science and Technology to the traditional Handloom Textile Industry. The Institute was established and registered under the Societies Registration Act of 1860 in the year 1987 in the name of Institute of Handloom and Textile Technology(IHTT). Now the Institute of Handloom and Textile Technology is amalgamated to Indian Indian Institute of Handloom Technology which is working on the guidelines of Indian Institute of Handloom Technologies (IIHTs),Ministry of Textiles and Govt of India.
Monday, 7 August 2017
Information Kerala Mission (IKM) : Address, Phone & Email
Organisation : Information Kerala Mission (IKM)Organisation Profile : Information Kerala Mission (IKM), an autonomous institution under Local Self Government Department, Government of kerala has been setup with a mandate to strengthen the local self-governance through ICT applications. It is largest and most comprehensive local body computerization initiative in the country, which envisage computerizing and networking the 1209 local self government institutions in Kerala. It addresses the entire gamut of issues concerning local body governance, decentralized planning, and economic development at local economic development.
Infopark, Kakkanad, Kochi : Address, Phone & Email
Organisation : Infopark, KochiOrganisation Profile : Infopark located at Kochi, is the new IT Park being developed by the Government of Kerala. To set up this project, Government has transferred 100 acres of land which is now under the ownership and possession of Infoparks Kerala, which is an independent Society fully owned by the Government.Infopark has ambitious plans to become one of the major IT Parks in the country. With this vision, it has been growing fast ever since its inception in 2004, and within a short period of time, has attracted investments from IT majors like Tata Consultancy Services, Wipro, Affiliated Computer Services, OPI Global, IBS Software Services and US Technology. Because of the fast growth rate achieved and strategic positioning of the Park in the upcoming city of Kochi (previously known as Cochin), Infopark is well known among the IT/ITES investors as a very potential destination. | {
"pile_set_name": "Pile-CC"
} |
Home | Historical Sources | Scholarship | Web Resources | Search | About American Egyptomania is a joint project of the Center for History and New Media, the Department of English, and the College of Arts and Sciences Technology Across the Curriculum program at George Mason University. | {
"pile_set_name": "Pile-CC"
} |
RELATED COMPANIES
x
Loading data...
NEW DELHI: The aviation ministry has opposed the government’s demand for all of the Airports Authority of India’s profit for fiscal 2018 to be paid as dividend. The state-owned airport operator needs money to fund upgrades and expansion, aviation minister Suresh Prabhu said in a note to finance minister Arun Jaitley that was sent last month, said a senior government official.
“Exemption from payment of full profit as dividend has been sought on grounds that AAI has to invest a lot of money in upgrades at various airports and this money would be required over and above the money that we are planning to raise,” said the official, who did not want to be identified.
The government, through the Department of Investment and Public Asset Management (DIPAM), has sought payment of profits in their entirety by government-owned companies as dividend. The move has been resisted by others PSUs too.
AAI has vast infrastructure plans as it looks to meet the requirements of the country’s aviation market, which has been growing in double digits for over four years now, putting pressure on existing facilities. It’s in the process of raising Rs 9,500 crore over a period of three years from the market to meet these upgrade costs. | {
"pile_set_name": "Pile-CC"
} |
The man ordered his food but was upset that his meal "cost too much." He drove from the drive-thru but stopped his car in front of the store. The police report said the employees were in the lobby when the man entered the restaurant. | {
"pile_set_name": "OpenWebText2"
} |
[Primary hyperlipoproteinemias. Clinical, biological and physiopathological aspects].
Primary hyperlipoproteinemias are of great interest as for the physician, as for the searcher, because of their atherogenic properties; on the other hand, a new type of hyperlipoprotenemia, namely hyperalphalipoproteinemia, seems to be a protective factor against clinical complications of atherosclerosis. The clinical, biological and pathophysiologic aspects of these diseases are studied both from author's experience and from the literature data. | {
"pile_set_name": "PubMed Abstracts"
} |
Cyclotelus rufiventris
Cyclotelus rufiventris is a species of stiletto flies in the family Therevidae.
References
Category:Therevidae
Category:Articles created by Qbugbot
Category:Insects described in 1869 | {
"pile_set_name": "Wikipedia (en)"
} |
rms in -10*h**2 + 8*h**2 - 133383*h + 133383*h + 6*h**2.
4*h**2
Collect the terms in -2845*n**3 - 4194*n**3 - 4205*n**3 + 11243*n**3.
-n**3
Collect the terms in 2 + 4422*h**2 + 7365*h**2 + 8*h**3 - 2.
8*h**3 + 11787*h**2
Collect the terms in -33919*s + 5650*s + 5652*s + 5657*s + 5632*s + 5661*s + 5655*s.
-12*s
Collect the terms in 3 - 3 - 32531*t**3 - 136588*t**3.
-169119*t**3
Collect the terms in 1193*f**2 + 17*f + 32*f + 1902*f**2 + 202*f**2 + 5.
3297*f**2 + 49*f + 5
Collect the terms in 0 - 31893*h - 2 + 30573*h.
-1320*h - 2
Collect the terms in 24*s**2 - 374*s + 170*s + 158*s - 9*s**2 - 17*s**2.
-2*s**2 - 46*s
Collect the terms in 381*p - 130*p - 1178*p - 574*p.
-1501*p
Collect the terms in -4274*l**3 + 51*l**2 + 4271*l**3 - 150*l - 51*l**2.
-3*l**3 - 150*l
Collect the terms in -2067*p + 465*p + 403*p + 407*p + 396*p + 404*p.
8*p
Collect the terms in -4104*o + 8245*o + 14 + 9 - 27 - 4123*o + 4.
18*o
Collect the terms in 67*k**2 - 122*k**2 + 54*k**2 + 6565 - 6565.
-k**2
Collect the terms in 97280*y + 97237*y - 194965*y - 4.
-448*y - 4
Collect the terms in 21081807*h**2 - 21081807*h**2 - 2*h**3.
-2*h**3
Collect the terms in -24873173*g**3 + 49746273*g**3 - 24873146*g**3.
-46*g**3
Collect the terms in -21*g - 292 + 290 + 147*g + 121*g - 22*g + 61*g.
286*g - 2
Collect the terms in 7 + 17*j**2 - 12*j**2 + 21 + 22.
5*j**2 + 50
Collect the terms in 839740001866*r**2 - 839740001866*r**2 + 2*r**3.
2*r**3
Collect the terms in 128*r**3 + 142*r**3 + 115*r**3.
385*r**3
Collect the terms in -458*f**3 + 554*f**3 + 396*f**3 - 465*f**3.
27*f**3
Collect the terms in 135 + 154 - 4*q + 155 + 154.
-4*q + 598
Collect the terms in -1357564*n - 7*n**2 + 678778*n - 7*n**3 - 8*n**3 + 678786*n + 14*n**3.
-n**3 - 7*n**2
Collect the terms in -6183173*i + 334981*i - 1358235*i.
-7206427*i
Collect the terms in -11972*w - 13503*w - 22596*w.
-48071*w
Collect the terms in 1542 - 52*n**2 - n + 43*n + 29*n**2 + 25*n**2.
2*n**2 + 42*n + 1542
Collect the terms in -391513*l**2 - 67329*l**2 - 169710*l**2.
-628552*l**2
Collect the terms in -15 - 2018*t + 15 - 3712*t.
-5730*t
Collect the terms in -6*f**3 + 73*f - 106 - 885*f - 486*f - 191*f.
-6*f**3 - 1489*f - 106
Collect the terms in -15*p - 2*p - 2781 + 54*p - 28*p + 2779.
9*p - 2
Collect the terms in 2 - 5 - 131478425706*k + 131478425679*k + 3.
-27*k
Collect the terms in -86926*j**2 + 173850*j**2 - 86984*j**2 - 1 + 3.
-60*j**2 + 2
Collect the terms in 15254*i**3 - 11939*i**3 + 26668*i**3.
29983*i**3
Collect the terms in -127*g - 117*g - 886*g**2 - 49*g**2 + 369*g - 123*g.
-935*g**2 + 2*g
Collect the terms in -7*h**3 - 20*h**3 - 2122639*h + 2122639*h.
-27*h**3
Collect the terms in 7 - 8 + 3 + 1069*j**3 + 2492*j**3 + 658*j**3.
4219*j**3 + 2
Collect the terms in 14375*l + 16110*l - 30466*l.
19*l
Collect the terms in 3711*h**3 - 7660*h**3 - 1 - 4325*h**3 - 6823*h**3.
-15097*h**3 - 1
Collect the terms in 2523*k**2 + 2900*k**2 - 62 + 29 + 22 + 13.
5423*k**2 + 2
Collect the terms in 16 - 52 + 77*b + 14 + 22 - 3*b.
74*b
Collect the terms in -631 + 614*r**2 - 38*r + 38*r - 631 - 612*r**2 + 1262.
2*r**2
Collect the terms in 8270 - 2755 - 2757 + 173*n - 2757 - 287*n.
-114*n + 1
Collect the terms in 2690*r**2 - 3 - 8348*r**2 + 5664*r**2.
6*r**2 - 3
Collect the terms in -35826*a - 282 + 150 + 132.
-35826*a
Collect the terms in 2 + 0 - 145238*l**3 - 2 + 145223*l**3.
-15*l**3
Collect the terms in 11 - 43 + 29 + 1032*a.
1032*a - 3
Collect the terms in -3 - 6152*s**2 - 5*s + 2053*s**2 + 2053*s**2 + 3 + 2045*s**2.
-s**2 - 5*s
Collect the terms in 310 + 15*y**2 - 3*y + 16*y**2 - 23*y**2.
8*y**2 - 3*y + 310
Collect the terms in 2025252894352 + 2*t**2 + 15*t**2 - 2025252894356.
17*t**2 - 4
Collect the terms in 681*f - 2755*f + 653*f + 705*f + 656*f.
-60*f
Collect the terms in 21*p + 33*p + 73127 + 24615 - 19*p.
35*p + 97742
Collect the terms in -31866 - 31863 + 1238*p + 63729.
1238*p
Collect the terms in -352*r - 358*r + 1416*r - 345*r - 364*r.
-3*r
Collect the terms in -254*i - 244*i - 336*i**3 + 812*i - 314*i.
-336*i**3
Collect the terms in 22306509*x**3 - 22306592*x**3 + 39*x**2 - 39*x**2.
-83*x**3
Collect the terms in -20 - 45 - 72*m - 46 - 44 + 35.
-72*m - 120
Collect the terms in -1856995*x**2 + 187 - 116 + 316 + 1856997*x**2.
2*x**2 + 387
Collect the terms in -1257 - 1213 + 62*v + 2471 - 96*v.
-34*v + 1
Collect the terms in -11850*i**2 - 9452*i**2 - 3771*i**2.
-25073*i**2
Collect the terms in 5*o**2 + 1 + 10*o**2 - 3*o**2 + 2*o**2 + 39*o - 605*o.
14*o**2 - 566*o + 1
Collect the terms in -103*i**2 + 113446 - 226862 + 113416.
-103*i**2
Collect the terms in -489*y**3 - 468*y**3 - 106*y**3 + 91*y**3.
-972*y**3
Collect the terms in 18532*j**2 - 9267*j**2 + 254*j**3 - 206*j**3 - 9265*j**2.
48*j**3
Collect the terms in -222 - 29 - 8*t**2 - 118 + 369.
-8*t**2
Collect the terms in -57963*c + 57963*c - 1870*c**2.
-1870*c**2
Collect the terms in 369456918*b + 35*b**3 - 369456918*b.
35*b**3
Collect the terms in -3130*f**2 - 4*f**3 + 1566*f**2 + 1564*f**2 - 2*f**3 - 3*f**3 + 5*f**3.
-4*f**3
Collect the terms in -38 + 1 + 3 + 23*j + 27 + 2 + 31*j.
54*j - 5
Collect the terms in -6566*x**3 - 150 + 277 - 589*x**3 - 127.
-7155*x**3
Collect the terms in -72315840 - 17*i + 72315840.
-17*i
Collect the terms in -4783*y**2 + 253*y**2 + 6654*y**2 + 1.
2124*y**2 + 1
Collect the terms in 734151*s**2 + 3 - 839318*s**2 - 3.
-105167*s**2
Collect the terms in -266403*k**3 - 15*k**2 + 9*k**2 + 6*k**2.
-266403*k**3
Collect the terms in 3*k - k + 333586 - 8*k + 4*k.
-2*k + 333586
Collect the terms in 5*z**2 + 1 - z**2 - 12*z**2 + 560*z**3 + 8*z**2 - 103*z**3.
457*z**3 + 1
Collect the terms in -3729*l**3 + 2*l**2 + 1790*l**3 + 1958*l**3.
19*l**3 + 2*l**2
Collect the terms in 14015*o + 15602*o + 9930*o.
39547*o
Collect the terms in -1 + 1 + 141369*y - 282730*y + 141310*y.
-51*y
Collect the terms in -2098258 + 1048976 - 2*p + 1049282.
-2*p
Collect the terms in -201005*l + 402 - 402.
-201005*l
Collect the terms in -2*r - 156*r**3 - 316*r**3 + 1127*r**3 - 247*r**3 - 508*r**3 - 484*r**3.
-584*r**3 - 2*r
Collect the terms in -24*x + 931 + 952 - 1884.
-24*x - 1
Collect the terms in -2753*d**2 - 1535*d**2 + 1343*d**2 - 2899*d**2 - 504*d**2.
-6348*d**2
Collect the terms in 28*x - 14 + 34*x + 15 + 25*x - 5*x - 13*x.
69*x + 1
Collect the terms in -12 + 69*c**3 - 31 - 21 - 224*c**3 + 156*c**3 - 28 + 26.
c**3 - 66
Collect the terms in -88121*v + 369338*v**3 + 88121*v.
369338*v**3
Collect the terms in 39880*y**3 + 2*y**2 + 39897*y**3 - 4*y**2 + 39950*y**3 - 119836*y**3 + 2*y**2.
-109*y**3
Collect the terms in 18*m**2 + 4579 - 4579 - 300*m**2.
-282*m**2
Collect the terms in -5*r**2 - 298 + 546 + 8*r**2 - 4*r**2 - 248.
-r**2
Collect the terms in -804 + 2332 - 741 - 787 + 18*v**3.
18*v**3
Collect the terms in -124*c**3 - 210626*c - 210656*c - 3 + 421245*c.
-124*c**3 - 37*c - 3
Collect the terms in -165122*k + 0 + 165307*k - 2 + 2.
185*k
Collect the terms in -340*s - 173*s + 2621*s + 2778*s.
4886*s
Collect the terms in 168309437202*j - 336618874397*j + 168309437194*j.
-j
Collect the terms in -9495113*t**2 + 2*t**3 + 3 - 9495102*t**2 + 18990215*t**2 - 3.
2*t**3
Collect the terms in -132385 - 3*m**2 + 262621 - 130236.
-3*m**2
Collect the terms in -5*l - 41*l - 2*l - 3*l + 53*l.
2*l
Collect the terms in -228 - 6*r**2 + 662 - 209 - 225.
-6*r**2
Collect the terms in 124*b**2 - 9 + 116 + 2861*b - 2863*b.
124*b**2 - 2*b + 107
Collect the terms in -74*f**3 - 383*f**3 - 404*f**3 + 426*f**3 + 1 - 1.
-435*f**3
Collect the terms in 21*t + 1388 + 1382 - 4275 + 1503 + 30*t.
51*t - 2
Collect the terms in 109 + 84*f**2 - 5*f + 106 - 215 - 169*f.
84*f**2 - 174*f
Collect the terms in -121186*r + 808338*r + 751584*r.
1438736*r
Collect the terms in -237*p + 451*p - 205*p + 580*p.
589*p
Collect the terms in -6*i - 9*i - 9810 + 9824 - 2*i - 3*i.
-20*i + 14
Collect the terms in -1476*x + 743*x - 3953*x**2 + 733*x.
-3953*x**2
Collect the terms in 5065*f + 5516*f - 2042*f + 7180*f - 39.
15719*f - 39
Collect the terms in -195*c**3 - 1 + 1 - 4*c**3 - 10*c**3.
-209*c**3
Collect the terms in -5464 - 482*z**2 + 243*z**2 + 245*z**2.
6*z**2 - 5464
Collect the terms in 1420*b**3 - 5*b - 18*b - 172*b**3 + 23*b.
1248*b**3
Collect the terms in -1185 - x**2 - 9652*x - 108 + 9650*x.
-x**2 - 2*x - 1293
Collect the terms in -5* | {
"pile_set_name": "DM Mathematics"
} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.