text
stringlengths
0
7.84M
meta
dict
Armchair Gaming Episode 15- Art, Aesthetics and Games Part 3 Welcome to another episode of Armchair Gaming. The goal for this show is simple: I want to help you learn more about philosophy, and I’ll be using video games as an instrument to help teach it. Today we will continue looking at art, Philosophy of Art and the Beautiful while playing Monster Hunter: World. In previous episodes we have looked for philosophical themes in games themselves. In this episode, we will be taking a look at the game industry as a whole, to address the argument of video games as a medium of art. In the last few weeks, we took our first look at whether or not games qualify as art. Being relatively new to human history, relative to other art forms, games have fought for a position in today’s society as more than just an escape from reality. In today’s episode, we will look at how video games have developed in the art community, and how they have changed the topography of the art world forever. About Armchair Gaming I had the chance to explore philosophy in high school and I loved it so much that I went on to study it at Trent University, where I obtained a Bachelor of Arts, majoring in philosophy. I feel so strongly about the subject that I often find myself going through the books I had purchased over my university career, as well as adding to the collection regularly. Philosophy is an amazingly exciting subject that can teach us not just what to think, but how to think. Unfortunately, a lot of people see philosophy as some intimidating monster, with difficult concepts and theories to grasp. Conversely, some see it as a waste of someone’s time and intellect. As someone who has dedicated their life to the subject, this Scholarly Gamer wants to bring philosophy to you in a way that is approachable, sometimes funny, and presented through a medium of great importance to himself and millions of other people around the world: Games. I hope you’ll join us on this journey. And remember, you never go a day in your life without living some philosophy. Sheldon was Born and raised in Canada's Capital City, Ottawa, where he came to love 4 things... Metal, Hockey, Knitting and Gaming. Sheldon has a B.A in philosophy from Trent University, and uses his critical analysis and knowledge from his 4 years accidentally ruining everything for everyone. In his limited spare time, He generally tries to be an upstanding Canadian Citizen SCHOLARS ONLINE With Scholarly Gamers, our team hopes to deliver a reporting platform above and beyond the standard set forth by loads of other media sources. We look to bring about critical thought and examination to a number of themes, technologies, implications, and more when it comes to the games that we share a passion for.
{ "pile_set_name": "Pile-CC" }
Volatile and non-volatile/semi-volatile compounds and in vitro bioactive properties of Chilean Ulmo (Eucryphia cordifolia Cav.) honey. Ulmo honey originating from Eucryphia cordifolia tree, known locally in the Araucania region as the Ulmo tree is a natural product with valuable nutritional and medicinal qualities. It has been used in the Mapuche culture to treat infections. This study aimed to identify the volatile and non-volatile/semi-volatile compounds of Ulmo honey and elucidate its in vitro biological properties by evaluating its antioxidant, antibacterial, antiproliferative and hemolytic properties and cytotoxicity in Caco-2 cells. Headspace volatiles of Ulmo honey were isolated by solid-phase microextraction (SPME); non-volatiles/semi-volatiles were obtained by removing all saccharides with acidified water and the compounds were identified by GC/MS analysis. Ulmo honey volatiles consisted of 50 compounds predominated by 20 flavor components. Two of the volatile compounds, lyrame and anethol have never been reported before as honey compounds. The non-volatile/semi-volatile components of Ulmo honey comprised 27 compounds including 13 benzene derivatives accounting 75% of the total peak area. Ulmo honey exhibited weak antioxidant activity but strong antibacterial activity particularly against gram-negative bacteria and methicillin-resistant Staphylococcus aureus (MRSA), the main strain involved in wounds and skin infections. At concentrations >0.5%, Ulmo honey reduced Caco-2 cell viability, released lactate dehydrogenase (LDH) and increased reactive oxygen species (ROS) production in a dose dependent manner in the presence of foetal bovine serum (FBS). The wide array of volatile and non-volatile/semi-volatile constituents of Ulmo honey rich in benzene derivatives may partly account for its strong antibacterial and antiproliferative properties important for its therapeutic use. Our results indicate that Ulmo honey can potentially inhibit cancer growth at least partly by modulating oxidative stress.
{ "pile_set_name": "PubMed Abstracts" }
[Early parenteral nutrition in complex post-operative periods]. The protein hypercatabolic state in critically ill pediatric patients can be minimized by an effective nutrition therapy. We conducted a study to evaluate the benefits of early parenteral nutrition (EPN) assessing its effect on nutritional parameters and clinical relevance after complex surgical procedures. Prospective randomized study in patients undergoing abdominal surgery in which nothing by mouth is anticipated for a period ≥ 3 days, between 2012 and 2014. Blood tests were performed assessing nutritional parameters in the first 24 hours and the 5th postoperative day. Two groups were created, starting EPN in group A and standard fluid therapy in group B, after the extraction of the first sample. Forty-four patients were included, 18 in group A and 26 in group B. In the first analysis all had decreased levels of prealbumin and retinol-binding protein. On the 5th day, 55,6% of group A normalized prealbumin levels compared to 11,5% of B (p: 0.003, EF = 80%) whereas retinol-binding protein was normalized in 66,7% and 34.6%, respectively (p: 0,07, EF = 48,4%). Three patients in group A (16,7%) had postoperative infectious complications compared to 8 in B (30,8%), difference no statistically significant but clinically relevant (NNT=7,1), since the latter showed low prealbumin levels and longer hospital stay. No complications related to EPN were detected. Administration of EPN in the complex postoperative patients appears to be safe and beneficial for their recovery, being the prealbumin an early indicator of good nutritional response.
{ "pile_set_name": "PubMed Abstracts" }
Q: Injecting JpaRepository directly Im looking for a way intercept all requests going to all the defined methods. (defined=whatever is on the JpaRepository interface). so for example when someone calls repo.findAll() I will be able to run a generic code before and after. (generic=same code of all the entities). So what I did is created a generic class and implemented methods in JpaRepository and then intercept all the requests. @Repository public class BaseJpaRepository<T> implements JpaRepository<T, Long> { @Autowired private JpaRepository<T, Long> repository; @Override public List<T> findAll() { //run some code here List<T> res = repository.findAll(); //run some code here return res; } // all other methods here... } this is the interface to inject into services: @Repository public interface UserRepository extends JpaRepository<UserEntity, Long> { } this is the Bean @Repository public class UserRepositoryBean extends BaseJpaRepository<User> implements JpaRepository<User, Long> { } The problem is that private JpaRepository<T, Long> repository; is not injecting, I assume that this is because spring needs the Entity type in bootstrap time. I also tried to inject explicit type it to the constructor if UserRepositoryBean and pass it to the parent. but its unsatisfied. @Repository public class UserRepositoryBean extends BaseJpaRepository<User> implements JpaRepository<User, Long> { public UserRepositoryBean(JpaRepositry<User, Long> repo){super(repo);} } Any way to intercept all the Spring jpa methods? Thanks A: First you define basic interface that all your custom repositories will be inherited from @NoRepositoryBean interface BaseJpaRepository<T, ID> extends JpaRepository<T, ID> { // You can also declare any generic methods here, // and override (intercept) them in BaseJpaRepositoryImpl as well } And it's implementation as well @NoRepositoryBean class BaseJpaRepositoryImpl<T, ID> extends SimpleJpaRepository<T, ID> implements BaseJpaRepository<T, ID> { public BaseJpaRepositoryImpl(JpaEntityInformation<T, ID> entityInformation, EntityManager em) { super(entityInformation, em); } // One of 'defined' methods inherited from SimpleJpaRepository (and in turn from JpaRepository) @Override public List<T> findAll() { //run some code here List<T> res = super.findAll(); //run some code here return res; } // other 'defined' methods to intercept ... } Your custom repository would then look just as usual except that it is now derived from your BaseJpaRepository interface instead of Spring's JpaRepository @Repository interface UserRepository extends BaseJpaRepository<User, Long> { } To make it all work, let's modify following annotation that is usually placed onto some @Configuration class or onto @SpringBootApplication-ed class @EnableJpaRepositories( basePackages = {"org.example.repositories"}, repositoryBaseClass = BaseJpaRepositoryImpl.class ) P.S. Another viable approach is to use Spring AOP. You can also check out similar Question here
{ "pile_set_name": "StackExchange" }
Andrew Stroup Andrew Myung Stroup (born May 22, 1985) is an engineer and entrepreneur, best known as a participant on the first season of the Discovery Channel's The Big Brain Theory. He currently is the Founder of LVRG. Early life Stroup was born in Seoul, South Korea and at the age of 4 months old, was adopted by an Oklahoma family (David and Jimmye Stroup). He grew up in Sand Springs, a suburb of Tulsa, Oklahoma, where he attended and graduated as Valedictorian from Charles Page High School in 2003. He attended Oklahoma State University and graduated in 2009 with two B.S. degrees in Aerospace Engineering and Mechanical Engineering from the College of Engineering, Architecture, and Technology with focuses in Mathematics and Business Management. During his Senior year (2008-2009) at Oklahoma State University, he co-led Team Black, an engineering team of 15 students, that placed first in the American Institute of Aeronautics and Astronautics Design/Build/Fly competition, hosted in Tucson, Arizona. Career Professional career Starting in 2006, he served as a project engineering manager for BarDyne, Inc., a fluid power engineering and consultant firm based in Stillwater, OK that originated from the Fluid Power Research Center (Oklahoma State University). During this time, he worked with organizations that spanned multiple industries, to include Walt Disney Imagineering, supporting their California Screamin' roller coaster in Anaheim, CA, and General Dynamics Amphibious Systems in Woodbridge, VA on the Expeditionary Fighting Vehicle program, developed for the United States Marine Corps. In 2009, Stroup relocated to Washington, D.C. to serve as a subject-matter expert (SME) defense contractor for the Department of Defense CBRN defense portfolio, specifically on aerospace platform integration efforts, to include the Joint Strike Fighter program. Mid 2011 he joined the Department of Defense civilian workforce through an insourcing initiative, where his roles and responsibilities shifted towards supporting the military medical community and the development of vaccines and drugs as medical countermeasures for the United States Armed Forces. His final position was an Informatics SME and Integration Lead on a White House Presidential Executive Order initiative called Biosurveillance. From October 2012 to March 2015, he served as the CEO of an internet security tech startup called CommonKey that provided a cloud-based identity and access management solution for small and medium enterprises through a software as a service management dashboard paired with a browser extension that provided single sign-on functionality. In June 2014 and until January 2015, Stroup became a co-founder of MegaBots, Inc. where he focused on fluid power design, fabrication, and business development and operations. In March 2015 he became the Director of Product and Technology for the White House Presidential Innovation Fellows, which is a competitive fellowship program that pairs top innovators from the private sector, non-profits, and academia with top innovators in government to collaborate on solutions that aim to deliver significant results in condensed timelines (four to twelve months). Afterwards, he transitioned into the financial services industry when he served as an Entrepreneur in Residence within the Global Information Security organization at Bank of America Merrill Lynch, leading a Technology Strategy and Business Enablement team. Stroup currently serves as the founder and CEO of LVRG, an AI-driven vendor relationship management platform that streamlines enterprise-wide external engagements. Additionally, he serves as an Advisory Board Member at Exygy, Entrepreneur in Residence at Oklahoma State University, Mentor at Entrepreneurs Roundtable Accelerator and Technology and Information Security Advisor for Human Rights Watch. TV career In 2013, Stroup appeared in the first season of Discovery Channel's reality TV series The Big Brain Theory: Pure Genius, an engineering competition consisting of 10 contestants from across the country, which aired from May to June 2013. Each week contestants were put to the test, competing against each other in two teams to design, build, and deliver solutions to difficult engineering problems. He survived six out of eight episodes. To promote the show he appeared in a series of interviews prior to and during the airing of the TV series. Philanthropic interests Stroup, along with Corey Fleischer, another contestant and winner of The Big Brain Theory, and Jason Hardebeck founded the Baltimore Foundery in 2013, a nonprofit organization makerspace (ref hackerspace) that focuses on providing access to industrial grade tools and education in the heart of Baltimore. Additionally, Stroup serves as a Trustee for the Awesome Foundation, which provide small grants for projects to people devoted to forwarding the interest of awesomeness in the universe. References External links Andrew Stroup's CrunchBase profile Category:1985 births Category:Living people Category:American aerospace engineers Category:Oklahoma State University alumni Category:Participants in American reality television series Category:People from Seoul
{ "pile_set_name": "Wikipedia (en)" }
Q: wmd markdown code problem i m using wmd markdown editor in my project and i have a problem with code tags: if i enter a code snippet , markdown does not convert to html correctly it converts in "<p>" tags but if i enter some text else first and then code snippet it converts correctly in "<code>" tags is this a bug of wmd markdown editor? and how can i solve this problem? A: I was actually working on this for my fixed version of WMD edit. Using regex you can quickly lop off the leading and trailing <p> tags which are most notably the causers of a lot of problems: html = html.replace(/^<p>/g, '').replace(/<\/p>$/g, ''); To enforce this in wmd.. (I'm asuming you're using the SO fork of wmd editor) Find this part of the code and change it as follows: var convertToHtml = function(){ if (wmd.showdown) { var markdownConverter = new wmd.showdown.converter(); } var text = inputBox.value; var callback = function(){ inputBox.value = text; }; if (!/markdown/.test(wmd.wmd_env.output.toLowerCase())) { if (markdownConverter) { inputBox.value = markdownConverter.makeHtml(text); // Add this line here: inputBox.value= inputBox.value.replace(/^<p>/g, '').replace(/<\/p>$/g, ''); top.setTimeout(callback, 0); } } return true; }; Untested, but you should get the idea.
{ "pile_set_name": "StackExchange" }
Q: Select all columns of a dataframe as a StructType In pyspark, I have two dataframes, dfA and dfB, with complex schemas. A common column in the schemas is 'time'. I'd like to make a new dataframe that is the union of these two, so that I can sort on time, however I don't want to lose anything in the original dataframes. I can't figure out how to get everything from one of the original dataframes and group it together in a new structType of the union. That is, if I have # dfA root |--time |--fieldA |--fieldB # dfB root |--time |--fieldC |--fieldD I'd like to create a union dataframe that has schema # root |--time |--dfA |--time |--fieldA |--fieldB |--dfB |--time |--fieldC |--fieldD After the union, the fields dfA and dfB will null sometimes, depending on which of the original dataframes the row came from. I imagine I could define the common schema by doing common_schema = T.StructType([T.StructField('time', T.TimestampType()), T.StructField('dfA', dfA.schema, True), T.StructField('dfB', dfB.schema, True)]) But then I get stuck on the syntax for how to select everything from a dataframe as a column. I'm looking for something like commonA = dfA.select('time', F.col('*').alias('dfA')) commonB = dfB.select('time', F.col('*').alias('dfB')) common_df = commonA.union(commonB) But this is an illegal use of '*' A: Select all columns of a dataframe as a StructType from pyspark.sql.functions import struct, lit commonA = dfA.select("time", struct(*[c for c in df.columns]).alias("dfA")) commonB = dfB.select("time", struct(*[c for c in df.columns]).alias("dfB")) but this cannot be unioned as described. You could: commonA_ = commonA.select("time", "dfA", lit(None).cast(dfB.schema).alias("dfB")) commonB_ = commonB.select("time", lit(None).cast(dfA.schema).alias("dfA"), "dfB") commonA_.union(commonB_) but it sounds you are looking for something more like outer join dfA.alias("A").join(dfB.alias("B"), ["time"], "fullouter")
{ "pile_set_name": "StackExchange" }
I have a normal class library (not a .NET Core/Standard library) that uses Entity Framework Core. After installing it I noticed it seems to pull in a whole bunch of NuGet packages I absolutely shouldn't need to be depending on. My library has nothing to do with ASP.NET, and yet because I want to use EF, it appears I have to have dependencies on parts of ASP.NET. Will EF Core run correctly if I remove these? I'm concerned that if my library is used by an ASP.NET application that these dependencies are going to cause problems.
{ "pile_set_name": "OpenWebText2" }
I have been bugging my Best Buy almost daily for updates and today they informed me that my 168gig is at the store and will be waiting for me as soon as they open. They are only receiving one 128 and one 64 however. I hope that others of you get better news :-! I have still not received any kind of emails from them updating me. I have just been working with a customer service rep in store. Aurora, CO Grats. The thread was made for people who have NOT received the email. We know some people have. No **** Sherlock, you posted that there were people having issues and I was trying to let people know it isn't everyone and that maybe..just maybe there is hope before tomorrow. Go take your frustration out on someone else jackass. No **** Sherlock, you posted that there were people having issues and I was trying to let people know it isn't everyone and that maybe..just maybe there is hope before tomorrow. Go take your frustration out on someone else jackass. Calm down kid. My point is that we already know people are getting their emails. Hence the title saying for people who HAVEN'T.
{ "pile_set_name": "Pile-CC" }
<!DOCTYPE html> <!-- this file is auto-generated. DO NOT EDIT. /* ** Copyright (c) 2012 The Khronos Group Inc. ** ** Permission is hereby granted, free of charge, to any person obtaining a ** copy of this software and/or associated documentation files (the ** "Materials"), to deal in the Materials without restriction, including ** without limitation the rights to use, copy, modify, merge, publish, ** distribute, sublicense, and/or sell copies of the Materials, and to ** permit persons to whom the Materials are furnished to do so, subject to ** the following conditions: ** ** The above copyright notice and this permission notice shall be included ** in all copies or substantial portions of the Materials. ** ** THE MATERIALS ARE PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, ** EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF ** MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. ** IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY ** CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, ** TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE ** MATERIALS OR THE USE OR OTHER DEALINGS IN THE MATERIALS. */ --> <html> <head> <meta charset="utf-8"> <title>WebGL GLSL conformance test: operators_001_to_008.html</title> <link rel="stylesheet" href="../../../../resources/js-test-style.css" /> <link rel="stylesheet" href="../../../resources/ogles-tests.css" /> <script src="../../../../resources/js-test-pre.js"></script> <script src="../../../resources/webgl-test.js"></script> <script src="../../../resources/webgl-test-utils.js"></script> <script src="../../ogles-utils.js"></script> </head> <body> <canvas id="example" width="500" height="500" style="width: 16px; height: 16px;"></canvas> <div id="description"></div> <div id="console"></div> </body> <script> "use strict"; OpenGLESTestRunner.run({ "tests": [ { "referenceProgram": { "vertexShader": "../default/default.vert", "uniforms": { "result": { "count": 1, "type": "uniform4fv", "value": [ 1.0, 1.0, 1.0, 1.0 ] } }, "fragmentShader": "../default/expected.frag" }, "model": null, "testProgram": { "vertexShader": "../default/default.vert", "fragmentShader": "postfixincrement_frag.frag" }, "name": "postfixincrement_frag.test.html", "pattern": "compare" }, { "referenceProgram": { "vertexShader": "../default/default.vert", "uniforms": { "result": { "count": 1, "type": "uniform4fv", "value": [ 1.0, 1.0, 1.0, 1.0 ] } }, "fragmentShader": "../default/expected.frag" }, "model": null, "testProgram": { "vertexShader": "postfixincrement_vert.vert", "fragmentShader": "../default/default.frag" }, "name": "postfixincrement_vert.test.html", "pattern": "compare" }, { "referenceProgram": { "vertexShader": "../default/default.vert", "uniforms": { "result": { "count": 1, "type": "uniform4fv", "value": [ 1.0, 1.0, 1.0, 1.0 ] } }, "fragmentShader": "../default/expected.frag" }, "model": null, "testProgram": { "vertexShader": "../default/default.vert", "fragmentShader": "postfixdecrement_frag.frag" }, "name": "postfixdecrement_frag.test.html", "pattern": "compare" }, { "referenceProgram": { "vertexShader": "../default/default.vert", "uniforms": { "result": { "count": 1, "type": "uniform4fv", "value": [ 1.0, 1.0, 1.0, 1.0 ] } }, "fragmentShader": "../default/expected.frag" }, "model": null, "testProgram": { "vertexShader": "postfixdecrement_vert.vert", "fragmentShader": "../default/default.frag" }, "name": "postfixdecrement_vert.test.html", "pattern": "compare" }, { "referenceProgram": { "vertexShader": "../default/default.vert", "uniforms": { "result": { "count": 1, "type": "uniform4fv", "value": [ 1.0, 1.0, 1.0, 1.0 ] } }, "fragmentShader": "../default/expected.frag" }, "model": null, "testProgram": { "vertexShader": "../default/default.vert", "fragmentShader": "prefixincrement_frag.frag" }, "name": "prefixincrement_frag.test.html", "pattern": "compare" }, { "referenceProgram": { "vertexShader": "../default/default.vert", "uniforms": { "result": { "count": 1, "type": "uniform4fv", "value": [ 1.0, 1.0, 1.0, 1.0 ] } }, "fragmentShader": "../default/expected.frag" }, "model": null, "testProgram": { "vertexShader": "prefixincrement_vert.vert", "fragmentShader": "../default/default.frag" }, "name": "prefixincrement_vert.test.html", "pattern": "compare" }, { "referenceProgram": { "vertexShader": "../default/default.vert", "uniforms": { "result": { "count": 1, "type": "uniform4fv", "value": [ 1.0, 1.0, 1.0, 1.0 ] } }, "fragmentShader": "../default/expected.frag" }, "model": null, "testProgram": { "vertexShader": "../default/default.vert", "fragmentShader": "prefixdecrement_frag.frag" }, "name": "prefixdecrement_frag.test.html", "pattern": "compare" }, { "referenceProgram": { "vertexShader": "../default/default.vert", "uniforms": { "result": { "count": 1, "type": "uniform4fv", "value": [ 1.0, 1.0, 1.0, 1.0 ] } }, "fragmentShader": "../default/expected.frag" }, "model": null, "testProgram": { "vertexShader": "prefixdecrement_vert.vert", "fragmentShader": "../default/default.frag" }, "name": "prefixdecrement_vert.test.html", "pattern": "compare" } ] }); var successfullyParsed = true; </script> </html>
{ "pile_set_name": "Github" }
Copper - Data analysis toolkit for python - dfrodriguez143 http://pypi.python.org/pypi?:action=display&name=copper&version=0.0.2 ====== johncoogan Looks awesome, always love seeing my favorite tools wrapped up in new ways. Thanks a lot for posting. Quick note, since PyPi doesn't seem to parse markdown, the more information link to GitHub is malformed. I believe the plain link will hyperlink automatically. (See <http://scrible.com/s/2acQ2> for details). Thanks again for the package.
{ "pile_set_name": "HackerNews" }
Looking for Melania Penirian? About placeholder profiles You are visiting the placeholder page for Melania Penirian. This page is here because someone used our placeholder utility to look for Melania Penirian. We created this page automatically in hopes Melania Penirian would find it. If you are not Melania Penirian, but are an alumni of Aragon High School, register on this site for free now.
{ "pile_set_name": "Pile-CC" }
Vale Railway The Vale Railway (reporting mark VAEX), formerly the INCO Railway (reporting mark INCX), is an industrial railway operating in the City of Greater Sudbury, Ontario, Canada. It is owned and operated by Vale Limited. An internal, private railway, the line connects Vale's mines and processing plants that dominates the city's skyline. The line serves Copper Cliff North Mine, Copper Cliff South Mine, Creighton Mine, Frood Mine, Stobie Mine, Clarabelle Mill, Copper Cliff Smelter, and Copper Cliff Nickel Refinery. The isolated Levack mine spur in the north end of the city serves Coleman Mine and is operated by the Canadian Pacific Railway. The line was once entirely electrified along its route. Electrification began in 1926, but ended in 2000 in favour of diesel locomotives. The following junctions exist with the line: Canadian Pacific Cartier Subdivision at Sprecher (MP 81.7) where loaded ore cars from Coleman Mine are delivered Canadian Pacific Cartier Subdivision at Levack (MP 102.5) where empty ore cars from Clarabelle Mill are delivered Canadian Pacific Nickel Subdivision at Clarabelle (MP 3.3) where freight is exchanged with both the Canadian Pacific Railway and the Canadian National Railway Canadian Pacific Webbwood Subdivision (leased to Huron Central) at Copper Cliff (MP 4.8) Locomotive roster VAEX rosters 8 re-manufactured EMD GP38-4M locomotives for use on ore trains from the mines, slag trains from the smelter, or for local plant switching of various chemicals and products. These locomotives have upgraded electrical systems and are set up for remote operation. References External links Inco Rail History Railways of Sudbury Category:Ontario railways Category:Industrial railways Category:Rail transport in Greater Sudbury
{ "pile_set_name": "Wikipedia (en)" }
Table of Contents LLVM Update This page summarizes the effort of updating LegUp from LLVM 2.9 to LLVM 3.4. LegUp Source Changes Required LLVM Header Files Moved/Deprecated The following header files have been renamed or removed. The functionality seems identical in most cases. LLVM Objects and Functions Renamed/Deprecated Red highlighting indicates changes that may cause problems, or may not be functionally correct. Yellow highlighting indicates changes that are probably fine, but may need to be double checked. Unhighlighted rows indicate trivial changes that should have little or no effect. Functionality Added to LegUp ConstantDataArray LLVM 3.4 now uses ConstantDataArray in several places where a ConstantArray was used previously. ConstantDataArray support was added to some LegUp files including: Ram.cpp Ram.h GenerateRTL.cpp IterativeModuloScheduling.cpp LegUp Makefile Changes Required llvm-ld Deprecated Use: llvm-link ... llvm-opt -std-link-opts ... instead. Unfortunately llvm-link cannot link archive files, only .bc files. As a result, instead of linking with liblegup.a, libm.a, etc, we need to link with liblegup.bc, libm.bc, etc, which are basically the same thing, just in a different format. llvm-gcc Deprecated llvm-gcc was used for OpenMP support. The LLVM project “dragonegg” can be used instead. dragonegg is a gcc plugin. It will be compiled along with the rest of LegUp. It requires gcc 4.5, 4.6, 4.7, or 4.8, and the corresponding gcc-4.X-plugin-dev package (available using apt-get). The main LegUp Makefile assumes the packages gcc-4.6 and gcc-4.6-plugin-dev are installed. If you wish to use a different version of gcc, you must change the DRAGONEGG variable in legup/examples/Makefile.config and DRAGONEGG_GCC_VERSION in legup/Makefile and recompile LegUp. LLVM Profiling Deprecated Vectorization LLVM 3.4 now produces vectorized code that is not currently supported by LegUp. Adding clang flags -fno-vectorize and -fno-spl-vectorize seems to solve this problem for now. In the future it may be desirable to add this functionality to LegUp in order to obtain more parallel hardware. See LLVM 3.4 Auto-Vectorization for more info. MIPS1 Target Deprecated llc no longer has a backend for mips1. Compiling for mips32 with flags -mno-ldc1-sdc1 -soft-float produces somewhat similar code, but it is still not perfect. An awk command can be used to lower conditional move instructions, and add a nop after each lw. Also, the LLVM mips backend was modified to not produce DSP instructions. This seems to work well enough that the mips binutils can assemble working binaries for Tiger. Changes Required to LegUp Examples Disable LegUp Features It was necessary to disable LOCAL_RAMS for the following benchmarks: chstone/blowfish chstone/gsm It was necessary to disable GROUP_RAMS_SIMPLE_OFFSET for the following benchmarks: chstone/jpeg Other chstone_hybrid/dfsin: the linker complains about multiple definitions of 'sin' when linking with libm.bc. sin() was renamed to dfsin() to fix this problem. use_begin iterator is now user_begin. Don't use the use_ iterators directly any more. Use is now a bookkeeping helper class for the User class. See:
{ "pile_set_name": "Pile-CC" }
Structured white light scanning of rabbit Achilles tendon. The cross-sectional area (CSA) of a material is used to calculate stress under load. The mechanical behaviour of soft tissue is of clinical interest in the management of injury; however, measuring CSA of soft tissue is challenging as samples are geometrically irregular and may deform during measurement. This study presents a simple method, using structured light scanning (SLS), to acquire a 3D model of rabbit Achilles tendon in vitro for measuring CSA of a tendon. The Artec Spider™ 3D scanner uses structured light and stereophotogrammetry technologies to acquire shape data and reconstruct a 3D model of an object. In this study, the 3D scanner was integrated with a custom mechanical rig, permitting 360-degree acquisition of the morphology of six New Zealand White rabbit Achilles tendons. The reconstructed 3D model was then used to measure CSA of the tendon. SLS, together with callipers and micro-CT, was used to measure CSA of objects with a regular or complex shape, such as a drill flute and human cervical vertebra, for validating the accuracy and repeatability of the technique. CSA of six tendons was measured with a coefficient of variation of less than 2%. The mean CSA was 9.9±1.0mm2, comparable with those reported by other researchers. Scanning of phantoms demonstrated similar results to μCT. The technique developed in this study offers a simple and accurate method for effectively measuring CSA of soft tissue such as tendons. This allows for localised calculation of stress along the length, assisting in the understanding of the function, injury mechanisms and rehabilitation of tissue.
{ "pile_set_name": "PubMed Abstracts" }
ABOUT SPATIALLY HEALTH We are a team of data scientists, healthcare professionals and accomplished startup veterans. The relentless pursuit of data truth unifies our diverse backgrounds, and places the power of spatial intelligence at your fingertips. OUR VISION We believe people have the right to live in dignity and to fulfill their human-centric needs. Spatial analytics reveal the underlying connections and relationships behind why people and communities interact with health choices the way they do. At Spatially, our mission is to help shape the future of healthcare by emphasizing this human-centric approach. Spatially Health starts by thinking proactively, not reactively, about the potential of streamlined, spatial-based data. We believe that addressing the first mile — instead of the last — in the customer journey is integral to dignified, individualized healthcare. Join us as we develop and deliver real-world analysis, providing the analytics that drive population evaluations, model strategic initiatives and interventions, and predict better outcomes.
{ "pile_set_name": "Pile-CC" }
--[[ 文件:classical-ai.lua 主题:经典战术 ]]-- --[[ PART 00:常用工具函数 ]]-- --判断卡牌的花色是否相符 function MatchSuit(card, suit_table) if #suit_table > 0 then local cardsuit = card:getSuit() for _,suit in pairs(suit_table) do if cardsuit == suit then return true end end end return false end --判断卡牌的类型是否相符 function MatchType(card, type_table) if type(suit_table) == "string" then type_table = type_table:split("|") end if #type_table > 0 then for _,cardtype in pairs(type_table) do if card:isKindOf(cardtype) then return true end end end return false end --[[ PART 01:3V3经典战术 内容:黄金一波流、绝情阵 ]]-- --黄金一波流-- --相关信息 sgs.GoldenWaveDetail = { KurouActor = {}, --苦肉执行者 YijiActor = {}, --遗计执行者 JijiuActor = {}, --急救执行者 EruptSignal = {}, --起爆信号(五谷丰登中,急救执行者得到的红色牌) } --判断是否使用黄金一波流 function GoldenWaveStart(self) local huanggai = self.player local room = huanggai:getRoom() sgs.GoldenWaveDetail.EruptSignal = {} if huanggai:hasSkill("kurou") then local guojia, huatuo if #self.friends_noself > 1 then for _,friend in pairs(self.friends_noself) do if friend:hasSkill("yiji") then guojia = friend elseif friend:hasSkill("jijiu") then huatuo = friend else room:setPlayerMark(friend, "GWF_Forbidden", 1) end end end if guojia and huatuo then sgs.GoldenWaveDetail.KurouActor = {huanggai:objectName()} sgs.GoldenWaveDetail.YijiActor = {guojia:objectName()} sgs.GoldenWaveDetail.JijiuActor = {huatuo:objectName()} room:setPlayerMark(huanggai, "GoldenWaveFlow", 1) room:setPlayerMark(guojia, "GoldenWaveFlow", 1) room:setPlayerMark(huatuo, "GoldenWaveFlow", 1) return true else sgs.GoldenWaveDetail.KurouActor = {} sgs.GoldenWaveDetail.YijiActor = {} sgs.GoldenWaveDetail.JijiuActor = {} room:setPlayerMark(huanggai, "GWF_Forbidden", 1) return false end end room:setPlayerMark(huanggai, "GWF_Forbidden", 1) return false end --黄金苦肉 function GWFKurouTurnUse(self) local huanggai = self.player local released = sgs.GoldenWaveDetail.EruptSignal["Released"] if released then if self.getHp() > 1 then return sgs.Card_Parse("@KurouCard=.") end else return sgs.Card_Parse("@KurouCard=.") end end --黄金遗计 function GWFYijiAsk(player, card_ids) local guojia = self.player local released = sgs.GoldenWaveDetail.EruptSignal["Released"] local huanggai = sgs.GoldenWaveDetail.KurouActor[1] local huatuo = sgs.GoldenWaveDetail.JijiuActor[1] if released then for _,id in ipairs(card_ids) do return huanggai, id end else for _,id in ipairs(card_ids) do local card = sgs.Sanguosha:getCard(id) if MatchType(card, "Crossbow|AOE|Duel") then return huanggai, id elseif card:isRed() and huatuo:isAlive() then return huatuo, id else return huanggai, id end end end end --黄金急救 function GWFJijiuSignal(card, player, card_place) local huatuo = player if #EruptSignal > 0 then if card:getId() == EruptSignal[1] then local cards = player:getCards("he") for _,id in sgs.qlist(cards) do if id ~= EruptSignal[1] then local acard = sgs.Sanguosha:getCard(id) if acard:isRed() then return false end end end sgs.GoldenWaveDetail.EruptSignal["Released"] = card:getId() end end return true end --命苦的郭嘉(未完成) --绝情阵 --相关信息 sgs.RuthlessDetail = { JianxiongActor = {}, --奸雄执行者 TianxiangActor = {}, --天香执行者 YijiActor = {}, --遗计执行者 } --判断是否使用绝情阵 function RuthlessStart(self) local caocao = self.player local room = caocao:getRoom() if caocao:hasSkill("jianxiong") then local xiaoqiao, guojia if #self.friends_noself > 1 then for _,friend in pairs(self.friends_noself) do if friend:hasSkill("yiji") then guojia = friend elseif friend:hasSkill("tianxiang") then xiaoqiao = friend else room:setPlayerMark(friend, "RL_Forbidden", 1) end end end if xiaoqiao and guojia then sgs.RuthlessDetail.JianxiongActor = {caocao:objectName()} sgs.RuthlessDetail.TianxiangActor = {xiaoqiao:objectName()} sgs.RuthlessDetail.YijiActor = {guojia:objectName()} room:setPlayerMark(caocao, "Ruthless", 1) room:setPlayerMark(guojia, "Ruthless", 1) room:setPlayerMark(xiaoqiao, "Ruthless", 1) return true else sgs.RuthlessDetail.JianxiongActor = {} sgs.RuthlessDetail.TianxiangActor = {} sgs.RuthlessDetail.YijiActor = {} room:setPlayerMark(caocao, "RL_Forbidden", 1) return false end end room:setPlayerMark(caocao, "RL_Forbidden", 1) return false end --绝情天香 function RLTianxiangSkillUse(self, data) local xiaoqiao = self.player local caocao = sgs.RuthlessDetail.JianxiongActor[1] local damage = data if damage then local aoe = damage.card if aoe and aoe:isKindOf("AOE") then local handcards = self.player:getCards("h") handcards = sgs.QList2Table(handcards) self:sortByUseValue(handcards, true) for _, id in ipairs(handcards) do local suit = card:getSuit() if suit == sgs.Card_Heart or (xiaoqiao:hasSkill("hongyan") and suit == sgs.Card_Spade) then return "@TianxiangCard="..id.."->"..caocao:objectName() end end end end end --绝情遗计 function RLYijiAsk(player, card_ids) local guojia = self.player local caocao = sgs.RuthlessDetail.JianxiongActor[1] local xiaoqiao = sgs.RuthlessDetail.TianxiangActor[1] for _,id in ipairs(card_ids) do local card = sgs.Sanguosha:getCard(id) if MatchType(card, "Crossbow|AOE|Duel|ExNihilo|Peach") then return caocao, id else local hearts = {sgs.Card_Heart, sgs.Card_Spade} if MatchSuit(card, hearts) and xiaoqiao:isAlive() then return xiaoqiao, id else return caocao, id end end end end --[[ PART 02:KOF经典战术 内容:苦肉一波带、控底爆发 ]]-- --苦肉一波带-- --判断是否使用苦肉一波带 function KOFKurouStart(self) local others = self.room:getOtherPlayers(self.player) if others:length() == 1 then local enemy = others:first() if self:hasSkills("fankui|guixin|fenyong|zhichi|jilei", enemy) then self:speak("不行,这家伙不好对付,慢苦为妙。") self.room:setPlayerMark(self.player, "KKR_Forbidden", 1) return false end self:speak("看我大苦肉一波带走!") self.room:setPlayerMark(self.player, "KOFKurouRush", 1) return true end return false end --一波苦肉 function KOFKurouTurnUse(self) local huanggai = self.player if huanggai:getHp() > 1 then return sgs.Card_Parse("@KurouCard=.") end if self:getCardsNum("Analeptic") + self:getCardsNum("Peach") > 0 then return sgs.Card_Parse("@KurouCard=.") end end --控底爆发-- --相关信息 sgs.KOFControlType = {} --起爆卡牌的类型 sgs.KOFControlSuit = {} --起爆卡牌的花色 sgs.KOFControlResult = {} --控底结果 sgs.KOFControlDetail = { --爆发详细信息 EruptSkill = {}, --待爆发技能名 MaxInterval = {}, --爆发时可容忍的两起爆卡牌间间隔 ControlFinished = {} --爆发结束标志 } --判断是否使用控底爆发战术 function KOFControlStart(player) local room = player:getRoom() if player:hasSkill("guanxing") or player:hasSkill("super_guanxing") then local tag = player:getTag("1v1Arrange") if tag then local followList = tag:toStringList() if followList then if #followList > 0 then local follow = 1 for _,name in ipairs(followList) do local general = sgs.Sanguosha:getGeneral(name) local flag = false if general:hasSkill("luoshen") then sgs.KOFControlSuit = {sgs.Card_Spade, sgs.Card_Club} sgs.KOFControlDetail.EruptSkill = {"luoshen"} sgs.KOFControlDetail.MaxInterval = {0} sgs.KOFControlDetail.ControlFinished = {false} flag = true elseif general:hasSkill("jizhi") then sgs.KOFControlType = {"TrickCard"} sgs.KOFControlDetail.EruptSkill = {"jizhi"} sgs.KOFControlDetail.MaxInterval = {1} sgs.KOFControlDetail.ControlFinished = {false} elseif general:hasSkill("xiaoji") then sgs.KOFControlType = {"EquipCard"} sgs.KOFControlDetail.EruptSkill = {"xiaoji"} sgs.KOFControlDetail.MaxInterval = {2} sgs.KOFControlDetail.ControlFinished = {false} elseif general:hasSkill("guhuo") then sgs.KOFControlSuit = {sgs.Card_Heart} sgs.KOFControlDetail.EruptSkill = {"guhuo"} sgs.KOFControlDetail.MaxInterval = {1} sgs.KOFControlDetail.ControlFinished = {false} elseif general:hasSkill("caizhaoji_hujia") then sgs.KOFControlSuit = {sgs.Card_Heart, sgs.Card_Diamond} sgs.KOFControlDetail.EruptSkill = {"caizhaoji_hujia"} sgs.KOFControlDetail.MaxInterval = {0} sgs.KOFControlDetail.ControlFinished = {false} flag = true end if #sgs.KOFControlType > 0 or #sgs.KOFControlSuit > 0 then room:setPlayerMark(player, "KOFControl", follow) if flag then room:setPlayerMark(player, "StrictControl", 1) end return true end follow = follow + 1 end end end end end room:setPlayerMark(player, "KFC_Forbidden", 1) return false end --执行控底观星 function KOFGuanxing(self, cards) local up = {} local bottom = {} local strict = self.player:getMark("StrictControl") > 0 for _,id in pairs(cards) do local card = sgs.Sanguosha:getCard(id) if MatchSuit(card, sgs.KOFControlSuit) or MatchType(card, sgs.KOFControlType) then --相符 if card:isKindOf("Peach") then --相符,但是桃子 if self:isWeak() then --相符、桃子、虚弱 table.insert(up, id) else --相符、桃子、不虚弱 table.insert(bottom, id) table.insert(sgs.KOFControlResult, id) self.room:setPlayerMark(self.player, "KOFInterval", 0) end else --相符、不是桃子 table.insert(bottom, id) table.insert(sgs.KOFControlResult, id) self.room:setPlayerMark(self.player, "KOFInterval", 0) end elseif strict then --不相符,严格 table.insert(up, id) elseif card:isKindOf("Crossbow") then --不相符、不严格、诸葛连弩 table.insert(bottom, id) table.insert(sgs.KOFControlResult, id) local marks = self.player:getMark("KOFInterval") self.room:setPlayerMark(self.player, "KOFInterval", marks+1) else --不相符、不严格、不为诸葛连弩 local marks = self.player:getMark("KOFInterval") local maxInterval = sgs.KOFControlDetail.MaxInterval[1] if maxInterval and marks < maxInterval then --不相符、不严格、不为诸葛连弩、间隔较小 local value = sgs.ai_use_value[card:objectName()] if value and value > 4 then --不相符、不严格、不为诸葛连弩、间隔较小、使用价值高 table.insert(bottom, id) table.insert(sgs.KOFControlResult, id) self.room:setPlayerMark(self.player, "KOFInterval", marks+1) else --不相符、不严格、不为诸葛连弩、间隔较小、使用价值低 table.insert(up, id) end else --不相符、不严格、不为诸葛连弩、间隔较大 table.insert(up, id) end end end return up, bottom end --判断中间武将是否需要让路(待完善) function KOFNeedDeath(player) return false end --[[ PART X:控制总部 ]]-- sgs.classical_func = {} function Tactic(skillname, self, data) local func = sgs.classical_func[skillname] if func then return func(self, data) end end --观星 sgs.classical_func["guanxing"] = function(self, up_only) if not up_only then if self.player:getMark("KFC_Forbidden") == 0 then if self.player:getMark("KFC_Control") > 0 then return KOFGuanxing end if KOFControlStart(self.player) then return KOFGuanxing end end end end --苦肉 sgs.classical_func["kurou"] = function(self, data) local mode = string.lower(self.room:getMode()) if mode == "02_1v1" then if self.player:getMark("KOFKurouRush") > 0 then return KOFKurouTurnUse elseif self.player:getMark("KKR_Forbidden") == 0 then if KOFKurouStart(self) then return KOFKurouTurnUse end end elseif mode == "06_3v3" then if self.player:getMark("GoldenWaveFlow") > 0 then return GWFKurouTurnUse elseif self.player:getMark("GWF_Forbidden") == 0 then if GoldenWaveStart(self) then return GWFKurouTurnUse end end end end --遗计 sgs.classical_func["yiji"] = function(self, data) local mode = string.lower(self.room:getMode()) if mode == "06_3v3" then if self.player:getMark("GoldenWaveFlow") > 0 then return GWFYijiAsk elseif self.player:getMark("Ruthless") > 0 then return RLYijiAsk end end end --急救 sgs.classical_func["jijiu"] = function(self, data) local mode = string.lower(self.room:getMode()) if mode == "06_3v3" then if self.player:getMark("GoldenWaveFlow") > 0 then return GWFJijiuSignal end end end --天香 sgs.classical_func["tianxiang"] = function(self, data) local mode = string.lower(self.room:getMode()) if mode == "06_3v3" then if self.player:getMark("Ruthless") > 0 then return RLTianxiangSkillUse end end end
{ "pile_set_name": "Github" }
Consistency is contrary to nature, contrary to life. The only completely consistent people are dead – Aldous Huxley Looking for a half-season motto for these New York Rangers? Good ol’ Aldous pretty much sums it up. For this is a team that has uniquely redefined inconsistency on ice: Franchise record-setters the first six weeks, slipping through the sobering doldrums of December, now in a restorative midseason rebuild that brings philosophical questions for the Garden Faithful at the statistical halfway point. Is this glass half-empty or half-full? Has it been halfway decent or half-hearted? Are the Rangers haves or have-nots? It is a debate with as much variation and division as we have seen in the Metro Division, where the Rangers have gone from 7-up to 16-down – a standings swing of 23 points in just 23 games, dating to Nov. 23. So what happened, other than an otherworldly stretch of Capital punishment from a team that has shown equal parts will and skill? From my vantage point between the benches, there was a noticeable inconsistency in the Rangers’ battle level since their astonishing 16-3-2 start. Couple that with a December schedule on the ice and on the road that permitted only six full-squad off-day practices, and you have what could now be seen as an inevitable leveling off. Excuse? Some might say that. Explanation? Absolutely. But it’s also indicative of a team that, as we have seen the past two seasons under Alain Vigneault, is among a small handful of legitimate Stanley Cup favorites when their collective work ethic and attention to detail is peaking. But without proper practice time, that sharpness often dulls. In hockey, and pretty much any other sport. From what I see and hear at ice level, the Rangers’ passion has always been in place. There is spirit, there is encouragement and there is togetherness (which was the unofficial buzzword during the aforementioned doldrums). And so, there is reason to believe that this group grasps this situation and will much more resemble the October/November team than the month that followed. Or, as that equally erudite poet Adam Duritz once sang, “It’s been a long December but there’s reason to believe, maybe this year will be better than the last.” BETWEEN THE BENCHES The question I am most often asked by hockey fans and friends, other than how much that puck to the face hurt nearly three years ago, is this: What are the best things you hear between the benches? More often than not, the A-plus material is reported on the air, albeit edited for family viewing. As you might expect, frustration is the prevalent emotion expressed on ice, usually in short, four-letter bursts, and most notably after a missed scoring opportunity or a bad turnover or injury. But every now and then, the interaction between opponents presents humorous or eye-opening snapshots. For instance, the time Mats Zuccarello – late in a game the Rangers had comfortably tucked away – encouraged an opponent to “score some goals, I have you in my fantasy league.” That brought a smile from the foe, even as defeat was imminent. Or the time “Zucc” told Sidney Crosby that Evgeni Malkin was his favorite Penguin. Crosby had no response. As you would expect, Tanner Glass is a lightning rod for bench-jockeying, often trying to knock star players off their mental game as often as he tries to knock any player off their skates. Glass’ general intellect (he’s an Ivy Leaguer from Dartmouth) and knowledge of every nugget of a player’s career is often put to use in the quest to gain even the slightest advantage for his team. But what amazes me most is that when the gloves actually drop, nothing is said. No words during or after the fight, except perhaps for a “good job” if it’s warranted. Then there is Dylan McIlrath, who has wasted no time establishing himself as a physical and verbal presence. Recently, while yelling at the opposition bench, a player said to McIlrath, “Who the (bleep) are you? I don’t even know who you are.” McIlrath calmly responded: “Fight me. You’ll learn who I am real quick.” Because of my ability to watch replays on a monitor in the box, players from both sides often ask about borderline hits, or goal calls or offsides. In the preseason, Flyers center Claude Giroux asked if a call against his team was legitimate. I didn’t think it was and I told him that. “That’s OK, our PK could really use the help.” What also stands out from my standing-room-only spot is the human side of the players, coaches and trainers. When a Ranger comes to the bench injured, head trainer Jim Ramsey kicks into part-time mind-reader mode, not wanting to approach the player unless it’s significant enough for that player to not persevere through on his own. It’s a fascinating give-and-take, especially because players never want to admit injury. They really are most remarkable athletes. There also is a lot of encouragement and in-game coaching from coaches to players and from one player to another. The coaches’ use of iPads on the bench has brought instant teaching moments into the 21st century, but there’s still nothing like player-to-player communication. In fact, the most consistently vocal and upbeat player on the Rangers bench might come as a surprise: It’s Keith Yandle, who hasn’t even been with the team for a full year And just a few weeks ago, in the midst of a frustrating loss to the Rangers, Ottawa tough guy Chris Neil tried to throw a late-game message-sending hit on a Ranger between the benches. He missed, and in doing so, his stick slammed into my box and clipped me on the shoulder. I watched as Neil headed to the bench, slammed the door in anger and sat with his head down on the Senators bench. About 10 seconds later, Neil leaned over and said: “Hey buddy. Sorry about the stick. My bad.” I thought that was pretty amazing, given where his mindset was at that split second. While those moments and others are noteworthy, you might be surprised to hear that the majority of the in-game communication consists of simple line-change orders from Vigneault, brief and specific instruction from assistants Ulf Samuelsson and Scott Arniel, mostly even-tempered messages of motivation and largely level-headed discussions with officials about why something was or wasn’t called. It’s not nearly the “Slap Shot“-level dialogue that you might imagine. Of course, there are exceptions. And when they occur, I’ll be there to report them. REACH OUT In fact, we plan to make this little literature soirée a weekly feature here on MSGNetworks.com. Feel free to share your Rangers thoughts, comments, questions with me on Twitter: @jaygeemsg. I always look forward to interacting with the Faithful. Thanks for reading Vol. I.
{ "pile_set_name": "OpenWebText2" }
Pork meat would be kosher if it were “grown” in a lab, Israeli Modern Orthodox Rabbi Yuval Cherlow told Calcalist on Sunday. Mr. Cherlow addressed the issue at a panel on kosher food and genetic modification on Thursday at Bar-Ilan University near Tel Aviv. According to Mr. Cherlow, existing kosher laws could not be applied to lab-grown meat, since, well, it was never alive. Jewish religious law prohibits consumption of pork, shellfish, and the eating of of meat and dairy products together. Kosher laws also dictates the manner in which animals should be slaughtered and the way meat is processed. Technological advancements in the field of genetic modification and synthesized foods are pressing religious leaders to reevaluate, and at times, redefine these long-standing traditions. Pigs. Photo: Bloomberg A formal religious ruling on this issue could have a significant financial implication on the cultured meat industry, as the global kosher food market supports a multi-billion dollar industry, and the global halal market is estimated to become a multi-trillion dollar industry in the coming decade. Mr. Cherlow is not alone in this reasoning. In 2013, Rabbi Menachem Genack, who heads the kosher certification division at the New York’s Orthodox Union, addressed the religious implications of lab-grown meat following the reveal of the world’s first cultured beef hamburger, developed that year by Maastricht, Netherlands-based company Mosa Meat. Mr. Genack said there is no religious restriction on eating a lab-produced hamburger with cheese or dairy products. Also in 2013, prominent Israeli Rabbi Shlomo Aviner said that lab-grown meat should not be considered a meat product, and could, therefore, be consumed with dairy. More stringent Jewish law scholars do not differentiate between lab-cultured pork and other meats from traditional animal products, saying kosher laws are to be applied to these foods regardless of the way they were created. Global demand for meat is projected to double by 2050, according to the UN Food and Agriculture Organization. Since the first lab-grown hamburger was digested in 2013, other companies have attempted to turn lab-cultured meat, or believable meat substitutes, into a viable food source and business model. These companies include El Segundo, California-based Beyond Meat and Redwood City, California-based Impossible Foods which are developing plant protein-based meat products that taste and “bleed” like real meat, and New York-based early stage biotechnology startup Finless Foods Inc., which is aiming to develop and mass manufacture lab-cultured alternatives to conventionally caught and commercially farmed seafood. San Francisco-based Memphis Meats, which produces beef, chicken and duck products by culturing animal cells, released the world’s first cultured meatball in February 2016 and the world’s first cultured poultry in March 2017. Cultured meat companies say their products reduce exposure to food-borne illnesses and reduce pollution and water consumption. Tel Aviv-based cultured chicken company SuperMeat says its products require 99% less land and 98% less water than conventional meat products and emit 96% fewer greenhouse gases. Mr. Cherlow is a Modern Orthodox rabbi and an authority on Jewish law. He heads the ethics department of the Tzohar rabbinical organization in Israel, and regularly advises on issues pertaining to Jewish religious law, often voicing liberal-leaning attitudes. “There is a deeply religious and moral motivation to develop food-based on genetic research,” he said. The cultivation of meat from single cells is a meaningful new technology, Mr. Cherlow said, due to its positive environmental impact and its potential ability to feed a growing population as the world’s food resources are dwindling. “Genetic engineering is important because meat production is one of the biggest polluters in the world and consumes a great deal of natural resources, such as water and land, and because of the moral problems of mass production of meat,” Mr. Cherlow said. “Based on Jewish religious law, when you use a cell from a pig and use it to produce food, the cell loses its original identity and therefore cannot be defined as a forbidden food,” Mr. Cherlow said. “It cannot even be defined as meat.” Based on this principle, Mr. Cherlow said, there should not be a restriction on pairing lab-grown meat with dairy.
{ "pile_set_name": "OpenWebText2" }
AWAR – The Catch Up AWAR has been setting recording booths on fire, especially with his most recent work, The Winning Team, his collaborative album with producer Vanderslice. Whether killing verses alongside Freddie Gibbs or Roc Marciano or holding it down solo on tracks like “Orange Boxcutter,” AWAR continued to cement his place in the game as a real lyricist. In our latest episode of The Catch Up, AWAR takes us through some of his most recent cuts, as well as songs from his catalogue that helped get him to where he is now. Packed with insightful stories about his journey as an MC, how certain songs came together, and stories behind his rhymes, this episode of The Catch Up will only make you more of a fan of the one and only AWAR.
{ "pile_set_name": "Pile-CC" }
Direct Bindings and Interposition Interposition can occur when multiple instances of a symbol, having the same name, exist in different dynamic objects that have been loaded into a process. Under the default search model, symbol references are bound to the first definition that is found in the series of dependencies that have been loaded. This first symbol is said to interpose on the other symbols of the same name. Direct bindings can circumvent any implicit interposition. As the directly bound reference is searched for in the dependency associated with the reference, the default symbol search model that enables interposition, is bypassed. In a directly bound environment, bindings can be established to different definitions of a symbol that have the same name. The ability to bind to different definitions of a symbol that have the same name is a feature of direct binding that can be very useful. However, should an application depend upon an instance of interposition, the use of direct bindings can subvert the applications expected execution. Before deciding to use direct bindings with an existing application, the application should be analyzed to determine whether interposition exists. To determine whether interposition is possible within an application, use lari(1). By default, lari conveys interesting information. This information originates from multiple instances of a symbol definition, which in turn can lead to interposition. Interposition only occurs when one instance of the symbol is bound to. Multiple instances of a symbol that are called out by lari might not be involved in interposition. Other multiple instance symbols can exist, but might not be referenced. These unreferenced symbols are still candidates for interposition, as future code development might result in references to these symbols. All instances of multiply defined symbols should be analyzed when considering the use of direct bindings. If multiple instances of a symbol of the same name exist, especially if interposition is observed, one of the following actions should be performed. Localize symbol instances to remove namespace collision. Remove the multiple instances to leave one symbol definition. Define any interposition requirement explicitly. Identify symbols that can be interposed upon to prevent the symbol from being directly bound to. The following sections explore these actions in greater detail. Localizing Symbol Instances Multiply defined symbols of the same name that provide different implementations, should be isolated to avoid accidental interposition. The simplest way to remove a symbol from the interfaces that are exported by an object, is to reduce the symbol to local. Demoting a symbol to local can be achieved by defining the symbol “static”, or possibly through the use of symbol attributes provided by the compilers. A symbol can also be reduced to local by using the link-editor and a mapfile. The following example shows a mapfile that reduces the global function error() to a local symbol by using the local scoping directive. Although individual symbols can be reduced to locals using explicit mapfile definitions, defining the entire interface family through symbol versioning is recommended. See Chapter 5, Interfaces and Versioning. Versioning is a useful technique typically employed to identify the interfaces that are exported from shared objects. Similarly, dynamic executables can be versioned to define their exported interfaces. A dynamic executable need only export the interfaces that must be made available for the dependencies of the object to bind to. Frequently, the code that you add to a dynamic executable need export no interfaces. The removal of exported interfaces from a dynamic executable should take into account any symbol definitions that have been established by the compiler drivers. These definitions originate from auxiliary files that the compiler drivers add to the final link-edit. See Using a Compiler Driver. The following example mapfile exports a common set of symbol definitions that a compiler driver might establish, while demoting all other global definitions to local. You should determine the symbol definitions that your compiler driver establishes. Any of these definitions that are used within the dynamic executable should remain global. By removing any exported interfaces from a dynamic executable, the executable is protected from future interposition issues than might occur as the objects dependencies evolve. Removing Multiply Defined Symbols of the Same Name Multiply defined symbols of the same name can be problematic within a directly bound environment, if the implementation associated with the symbol maintains state. Data symbols are the typical offenders in this regard, however functions that maintain state can also be problematic. In a directly bound environment, multiple instances of the same symbol can be bound to. Therefore, different binding instances can manipulate different state variables that were originally intended to be a single instance within a process. For example, suppose that two shared objects contain the same data item errval. Suppose also, that two functions action() and inspect(), exist in different shared objects. These functions expect to write and read the value errval respectively. With the default search model, one definition of errval would interpose on the other definition. Both functions action() and inspect() would be bound to the same instance of errval. Therefore, if an error code was written to errval by action(), then inspect() could read, and act upon this error condition. However, suppose the objects containing action() and inspect() were bound to different dependencies that each defined errval. Within a directly bound environment, these functions are bound to different definitions of errval. An error code can be written to one instance of errval by action() while inspect() reads the other, uninitialized definition of errval. The outcome is that inspect() detects no error condition to act upon. Multiple instances of data symbols typically occur when the symbols are declared in headers. int bar; This data declaration results in a data item being produced by each compilation unit that includes the header. The resulting tentative data item can result in multiple instances of the symbol being defined in different dynamic objects. However, by explicitly defining the data item as external, references to the data item are produced for each compilation unit that includes the header. extern int bar; These references can then be resolved to one data instance at runtime. Occasionally, the interface for a symbol implementation that you want to remove, should be preserved. Multiple instances of the same interface can be vectored to one implementation, while preserving any existing interface. This model can be achieved by creating individual symbol filters by using a FILTERmapfile keyword. This keyword is described in SYMBOL_SCOPE / SYMBOL_VERSION Directives. Creating individual symbol filters is useful when dependencies expect to find a symbol in an object where the implementation for that symbol has been removed. For example, suppose the function error() exists in two shared objects, A.so.1 and B.so.1. To remove the symbol duplication, you want to remove the implementation from A.so.1. However, other dependencies are relying on error() being provided from A.so.1. The following example shows the definition of error() in A.so.1. A mapfile is then used to allow the removal of the error() implementation, while leaving a filter for this symbol that is directed to B.so.1. The function error() is global, and remains an exported interface of A.so.2. However, any runtime binding to this symbol is vectored to the filtee B.so.1. The letter “F” indicates the filter nature of this symbol. This model of preserving existing interfaces, while vectoring to one implementation has been used in several Oracle Solaris libraries. For example, a number of math interfaces that were once defined in libc.so.1 are now vectored to the preferred implementation of the functions in libm.so.2. Defining Explicit Interposition The default search model can result in instances of the same named symbol interposing on later instances of the same name. Even without any explicit labelling, interposition still occurs, so that one symbol definition is bound to from all references. This implicit interposition occurs as a consequence of the symbol search, not because of any explicit instruction the runtime linker has been given. This implicit interposition can be circumvented by direct bindings. Although direct bindings work to resolve a symbol reference directly to an associated symbol definition, explicit interposition is processed prior to any direct binding search. Therefore, even within a direct binding environment, interposers can be designed, and be expected to interpose on any direct binding associations. Interposers can be explicitly defined using the following techniques. With the LD_PRELOAD environment variable. With the link-editors -z interpose option. With the INTERPOSEmapfile keyword. As a consequence of a singleton symbol definition. The interposition facilities of the LD_PRELOAD environment variable, and the -z interpose option, have been available for some time. See Runtime Interposition. As these objects are explicitly defined to be interposers, the runtime linker inspects these objects before processing any direct binding. Interposition that is established for a shared object applies to all the interfaces of that dynamic object. This object interposition is established when a object is loaded using the LD_PRELOAD environment variable. Object interposition is also established when an object that has been built with the -z interpose option, is loaded. This object model is important when techniques such as dlsym(3C) with the special handle RTLD_NEXT are used. An interposing object should always have a consistent view of the next object. A dynamic executable has additional flexibility, in that the executable can define individual interposing symbols using the INTERPOSEmapfile keyword. Because a dynamic executable is the first object loaded in a process, the executables view of the next object is always consistent. The following example shows an application that explicitly wants to interpose on the exit() function. The letter “I” indicates the interposing nature of this symbol. Presumably, the implementation of this exit() function directly references the system function _exit(), or calls through to the system function exit() using dlsym() with the RTLD_NEXT handle. At first, you might consider identifying this object using the -z interpose option. However, this technique is rather heavy weight, because all of the interfaces exported by the application would act as interposers. A better alternative would be to localize all of the symbols provided by the application except for the interposer, together with using the -z interpose option. However, use of the INTERPOSEmapfile keyword provides greater flexibility. The use of this keyword allows an application to export several interfaces while selecting those interfaces that should act as interposers. Symbols that are assigned the STV_SINGLETON visibility effectively provide a form of interposition. See Table 12-20. These symbols can be assigned by the compilation system to an implementation that might become multiply instantiated in a number of objects within a process. All references to a singleton symbol are bound to the first occurrence of a singleton symbol within a process.
{ "pile_set_name": "Pile-CC" }
Q: Determine whether a Python function is already implemented in C extension Suppose I have a Python program that runs slow- after profiliing and I have identified the bottleneck. One particular function from a 3rd party module I imported is particularly slow. For this particular case, I know that function is implemented in Python (Used Eclipse and it's easy to jump to the function definition). So I know that I can convert that function into Cython as a speed-up option. (If it is already implemented in C, there is no point in writing it in Cython...). If I don't have an IDE, what would be an easy option to determine this? I know that I can go to the directory where the module is installed and infer that it is in C if the module is in .so. But is there any alternative? Thanks A: Check whether it is an instance of types.FunctionType: >>> import types >>> isinstance(len, types.FunctionType) False >>> def mylen(): pass ... >>> isinstance(mylen, types.FunctionType) True Probably you'd be safer to check for isinstance(X, (types.FunctionType, types.LambdaType). C functions are instances of builtin_function_or_method: >>> len.__class__ <type 'builtin_function_or_method'> >>> np.vdot.__class__ <type 'builtin_function_or_method'> You can access this type as types.BuiltinFunctionType/types.BuiltinMethodType. Alternatively you can check whether the function has a __code__ attribute. Since C functions do not have bytecode, they can't have __code__. Note sometimes what seems like a function is actually a class, e.g. enumerate but some 3rd party library may do the same. This means that you should also check whether a class is implemented in C or not. This one is harder since all classes are instances of type. A way may be to check whether the class has a __dict__ in its dir, and if it doesn't have you should check for __slots__. Something like the following should be pretty accurate: def is_implemented_in_c(obj): if isinstance(obj, (types.FunctionType, types.LambdaType)): return False elif isinstance(obj, type): if '__dict__' in dir(obj): return False return not hasattr(obj, '__slots__') # We accept also instances of classes. # Return True for instances of C classes, False for python classes. return not isinstance(obj, types.InstanceType) Example usage: >>> is_implemented_in_c(enumerate) True >>> is_implemented_in_c(len) True >>> is_implemented_in_c(np.vdot) True >>> is_implemented_in_c(lambda x: True) False >>> is_implemented_in_c(object) True >>> class A(object): ... __slots__ = ('a', 'b') ... >>> is_implemented_in_c(A) False
{ "pile_set_name": "StackExchange" }
In the spectacular pre-title credits opening sequence, Agent 007 James Bond (Roger Moore) was pursued by four machine gun-wielding Russian KGB agents in an exciting ski-chase down a steep slope in the Austrian Alps. In the opening scene, the existential hero simply named the Driver (Ryan O'Neal) stole a prospective client's 4-door Mercedes V-8 Sedan and then auditioned his skills. He showed the three terrified bad guys how talented he was as a freelance, ace getaway driver/wheelman for bank heists. He plowed through a cramped, underground parking garage and narrow alleyways in LA to demonstrate his prowess and prove that he was worth every penny of his high-priced fee. The film had three spectacular car chase sequences as well (including a night-time chase through LA). Hooper (1978) In a film filled with stunts and daredevil challenges, a car driven by stuntman Sonny Hooper (Burt Reynolds) drove through a collapsing factory (and barely missed its falling chimney) and made a rocket-propelled leap over a 456' chasm over a river where a bridge used to be before it collapsed. In the final hour of this 11th James Bond film, agent 007 (Roger Moore) ventured to the Amazonian jungle in Brazil, where he was pursued in his armored Glastron Hydrofoil Speedboat on the Tapirape River by henchman sent by villainous billionaire industrialist Hugo Drax (Michael Lonsdale). They launched an armed attack on his craft with explosive depth charges. From the rear of his boat, Bond deployed mines, blowing up one boat and killing three thugs. As he raced forward, two other boats joined in the pursuit - one held steel-toothed Jaws (Richard Kiel) who was wielding a machine-gun. Bond then launched torpedoes from his speedboat, and destroyed a second boat with three men onboard. When Bond's speedboat approached the massive Iguacu Falls, he escaped death when he launched himself from his speedboat onto a hang glider that was deployed from the craft's roof - and he soared away to safety. Jaws (with two other thugs) in the last boat crashed over the falls. The Blues Brothers (1980) Cool ex-con, renegade musicians named the Blues Brothers - who were "on a mission from God" - were siblings, who both wore black suits, hats, and shades: Joliet "Jake" Blues (John Belushi) Elwood Blues (Dan Aykroyd) In one of the comedy film's earlier scenes, there was an incredible jump over an open drawbridge [the 95th Street bridge] ("This car's got some pickup"), then a spectacular chase through an entire indoor shopping mall in the Chicago area [the former Dixie Square Mall] - when they were pursued by state police in their Bluesmobile (a converted 1974 Dodge Monaco police cruiser sedan), with dozens of crashes through store windows (J. C. Penney's, Toys R Us, etc.) - that sent shoppers fleeing. In the last half hour of the film, they sped 106 miles in their car toward downtown Chicago while pursued by lots of squad cars, with a maniacal death-defying chase that reportedly had the largest number of car crashes (demolition derby style) in film history. One police car ended up crashing into the side of a freight truck ("We're in a truck!"). At the conclusion, the two - driving at 120 mph at times - plowed their vehicle through a flock of pigeons and a crowd of pedestrians and into the lobby of the Richard J. Daley Center municipal building at Daley Plaza. Once they had reached their final destination, their car literally collapsed and completely fell apart after they stepped out of it. [Mack Sennett's The Keystone Kops short films were an inspiration for this film.] The Cannonball Run (1981) Here was another chase film from Hal Needham (similar to his earlier The Gumball Rally (1976)), featuring a cross-country, car-crashing road-race from Connecticut to Southern California with the tagline: "You'll never guess who wins."
{ "pile_set_name": "Pile-CC" }
HomeUncategorizedObserve your dog obey all orders by using a good dog training collar Observe your dog obey all orders by using a good dog training collar While your family dog might have turned into the apple of your eyes, he or she also needs appropriate training and you can easily observe your dog abide by all of the commands by using a good dog training collar Http://dogbadge.com. There are several kinds of training collars available for dogs of all age groups, shapes, as well as sizes and you ought to choose one that suits your beloved pet and also fits within your budget. Dogs have been domesticated over centuries by man and also numerous training methods have been refined over the years to exercise better control over all of them. A training collar can help train your dog very quickly and also hold her or him in hand too. There are several types of collars to pick from including choke training collars which are also known as chain collars, martingale collars, prong collars, as well as remote training collars or even electronic training collars, which feature that latest within electronic technology. Traditional training collars that involve choke collar training probably won’t appeal to you given that this involves tightening of the chain around your dogs neck in case he or she becomes overactive as well as tries to tug hard on the leash. A copyrighted variant that is similar to the principle of the choke training collar is definitely the good dog training collar. This inventive collar features ridges situated on the inside of the dog collar that are connected together through tiny links that can be added or even taken out depending on the dimensions of the dogs neck. This particular training collar has two loops at each end that are attached to a free-sliding leash. This kind of design ensures that the dog collar tightens across the neck of your dog in a very accurate and delicate manner if she or he tries to distance themself from you as well as relaxes the moment she or he comes back towards you. This specific training collar is an inexpensive way of coaching your pet dog quickly and your pet dog will definitely stop pulling at the leash within a very short period of time. On the other hand, if you wish to control your dog remotely or perhaps wish to coach your own hunting dog from afar then you can certainly opt for another form of good dog training collar that is available in the form of remote training collars or even electronic training collars. You should use the corresponding e-collar as a hunting dog training collar or simply to coach your own domesticated pet, based on your particular requirements. These collars include a remote transmitter that will remain in your hand along with a receiver fitted on the collar of the dog. You’ll be able to send electrical stimulation as well as beeps or even use vibrations through varying strengths to manage your dog. These collars usually have a range between about half and one mile although higher end versions even feature GPS tracking of your dog. You can browse between numerous models of dogtra training collars as well as sportdog training collars that are made by dogtra and sportdog, two of the very best respected manufacturers of remote control training collars. If you’d like your pet dog to consistently act just like a good dog as well as stay in your control at all times then you definitely have to start using the best possible training collar to coach her or him with ease. You can undoubtedly watch your dog obey all of the commands by using a good dog training collar that enables you to coach your beloved family dog in a very gentle way. Related Articles Embroidery badges can be made at home. You simply need some imagination and creativity and you can make customized badges yourself that won’t only be prominent but will also enable you to get a large […] When you’d like to spice up a piece of clothing, accessory, luggage piece or even hats you can sew on badges to have the fresh look easily. Badges or patches when placed strategically can immediately […]
{ "pile_set_name": "Pile-CC" }
Due to the heavy storms this month several cities in TX, and several parishes in LA, have been declared Disaster areas. Because of this, those area have a filing deadline of July 15, 2016. If you have already filed your 2015 tax return, you have the option to amend...
{ "pile_set_name": "Pile-CC" }
// // detail/winrt_ssocket_service.hpp // ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ // // Copyright (c) 2003-2015 Christopher M. Kohlhoff (chris at kohlhoff dot com) // // Distributed under the Boost Software License, Version 1.0. (See accompanying // file LICENSE_1_0.txt or copy at http://www.boost.org/LICENSE_1_0.txt) // #ifndef ASIO_DETAIL_WINRT_SSOCKET_SERVICE_HPP #define ASIO_DETAIL_WINRT_SSOCKET_SERVICE_HPP #if defined(_MSC_VER) && (_MSC_VER >= 1200) # pragma once #endif // defined(_MSC_VER) && (_MSC_VER >= 1200) #include "asio/detail/config.hpp" #if defined(ASIO_WINDOWS_RUNTIME) #include "asio/error.hpp" #include "asio/io_service.hpp" #include "asio/detail/addressof.hpp" #include "asio/detail/winrt_socket_connect_op.hpp" #include "asio/detail/winrt_ssocket_service_base.hpp" #include "asio/detail/winrt_utils.hpp" #include "asio/detail/push_options.hpp" namespace clmdep_asio { namespace detail { template <typename Protocol> class winrt_ssocket_service : public winrt_ssocket_service_base { public: // The protocol type. typedef Protocol protocol_type; // The endpoint type. typedef typename Protocol::endpoint endpoint_type; // The native type of a socket. typedef Windows::Networking::Sockets::StreamSocket^ native_handle_type; // The implementation type of the socket. struct implementation_type : base_implementation_type { // Default constructor. implementation_type() : base_implementation_type(), protocol_(endpoint_type().protocol()) { } // The protocol associated with the socket. protocol_type protocol_; }; // Constructor. winrt_ssocket_service(clmdep_asio::io_service& io_service) : winrt_ssocket_service_base(io_service) { } // Move-construct a new socket implementation. void move_construct(implementation_type& impl, implementation_type& other_impl) { this->base_move_construct(impl, other_impl); impl.protocol_ = other_impl.protocol_; other_impl.protocol_ = endpoint_type().protocol(); } // Move-assign from another socket implementation. void move_assign(implementation_type& impl, winrt_ssocket_service& other_service, implementation_type& other_impl) { this->base_move_assign(impl, other_service, other_impl); impl.protocol_ = other_impl.protocol_; other_impl.protocol_ = endpoint_type().protocol(); } // Move-construct a new socket implementation from another protocol type. template <typename Protocol1> void converting_move_construct(implementation_type& impl, typename winrt_ssocket_service< Protocol1>::implementation_type& other_impl) { this->base_move_construct(impl, other_impl); impl.protocol_ = protocol_type(other_impl.protocol_); other_impl.protocol_ = typename Protocol1::endpoint().protocol(); } // Open a new socket implementation. clmdep_asio::error_code open(implementation_type& impl, const protocol_type& protocol, clmdep_asio::error_code& ec) { if (is_open(impl)) { ec = clmdep_asio::error::already_open; return ec; } try { impl.socket_ = ref new Windows::Networking::Sockets::StreamSocket; impl.protocol_ = protocol; ec = clmdep_asio::error_code(); } catch (Platform::Exception^ e) { ec = clmdep_asio::error_code(e->HResult, clmdep_asio::system_category()); } return ec; } // Assign a native socket to a socket implementation. clmdep_asio::error_code assign(implementation_type& impl, const protocol_type& protocol, const native_handle_type& native_socket, clmdep_asio::error_code& ec) { if (is_open(impl)) { ec = clmdep_asio::error::already_open; return ec; } impl.socket_ = native_socket; impl.protocol_ = protocol; ec = clmdep_asio::error_code(); return ec; } // Bind the socket to the specified local endpoint. clmdep_asio::error_code bind(implementation_type&, const endpoint_type&, clmdep_asio::error_code& ec) { ec = clmdep_asio::error::operation_not_supported; return ec; } // Get the local endpoint. endpoint_type local_endpoint(const implementation_type& impl, clmdep_asio::error_code& ec) const { endpoint_type endpoint; endpoint.resize(do_get_endpoint(impl, true, endpoint.data(), endpoint.size(), ec)); return endpoint; } // Get the remote endpoint. endpoint_type remote_endpoint(const implementation_type& impl, clmdep_asio::error_code& ec) const { endpoint_type endpoint; endpoint.resize(do_get_endpoint(impl, false, endpoint.data(), endpoint.size(), ec)); return endpoint; } // Set a socket option. template <typename Option> clmdep_asio::error_code set_option(implementation_type& impl, const Option& option, clmdep_asio::error_code& ec) { return do_set_option(impl, option.level(impl.protocol_), option.name(impl.protocol_), option.data(impl.protocol_), option.size(impl.protocol_), ec); } // Get a socket option. template <typename Option> clmdep_asio::error_code get_option(const implementation_type& impl, Option& option, clmdep_asio::error_code& ec) const { std::size_t size = option.size(impl.protocol_); do_get_option(impl, option.level(impl.protocol_), option.name(impl.protocol_), option.data(impl.protocol_), &size, ec); if (!ec) option.resize(impl.protocol_, size); return ec; } // Connect the socket to the specified endpoint. clmdep_asio::error_code connect(implementation_type& impl, const endpoint_type& peer_endpoint, clmdep_asio::error_code& ec) { return do_connect(impl, peer_endpoint.data(), ec); } // Start an asynchronous connect. template <typename Handler> void async_connect(implementation_type& impl, const endpoint_type& peer_endpoint, Handler& handler) { bool is_continuation = clmdep_asio_handler_cont_helpers::is_continuation(handler); // Allocate and construct an operation to wrap the handler. typedef winrt_socket_connect_op<Handler> op; typename op::ptr p = { clmdep_asio::detail::addressof(handler), clmdep_asio_handler_alloc_helpers::allocate( sizeof(op), handler), 0 }; p.p = new (p.v) op(handler); ASIO_HANDLER_CREATION((p.p, "socket", &impl, "async_connect")); start_connect_op(impl, peer_endpoint.data(), p.p, is_continuation); p.v = p.p = 0; } }; } // namespace detail } // namespace clmdep_asio #include "asio/detail/pop_options.hpp" #endif // defined(ASIO_WINDOWS_RUNTIME) #endif // ASIO_DETAIL_WINRT_SSOCKET_SERVICE_HPP
{ "pile_set_name": "Github" }
Erich Emminger Erich Emminger (25 June 1880 – 30 August 1951) was a German lawyer and Catholic politician of the Center Party (Zentrum) and later of the Bavarian People's Party (BVP). He served as Minister of Justice in the Weimar Republic from 30 November 1923 until 15 April 1924 under Chancellor Wilhelm Marx. Early life Erich Emminger was born on 25 June 1880 in Eichstätt, Bavaria. His parents were Johann Adolf Erich Emminger (1856-1909), a Gymnasialprofessor, and his wife Marie Therese (1854–99), née Müller, daughter of an Augsburg notary. Emminger married Maria Schärft in 1906. Their children included Otmar Emminger, future president of the Deutsche Bundesbank. Following his training as a lawyer at Münster, Emminger practiced law at Augsburg (1906–08) and Nuremberg (1908–09). In 1909 he became a civil servant (state prosecutor and Amtsrichter). He participated in World War I first as a voluntary soldier and later as a Kriegsgerichtsrat (military judge). Political career Emminger was a member of the Catholic Center Party (Zentrum)and, from 1913-18 held a seat in the Reichstag for the constituency of Weilheim. In 1918, he joined the Bavarian People's Party (BVP) and represented it in the Reichstag 1920-33. Emminger was Minister of Justice in the first cabinet of chancellor Wilhelm Marx, which took office on 30 November 1923. His tenure was defined by the passage of three decrees of 22 December 1923, 4 January and 13 February 1924, which were based on the of 8 December 1923. These significantly changed civil and criminal law and the judiciary system with an eye towards speeding up proceedings. The reform of 4 January became known as the so-called Emminger Reform that among other things abolished the jury as trier of fact and replaced it with a mixed system of judges and lay judges in Germany's judiciary which still exists today. Schwurgerichte (formerly based on jurors) kept their name but were in fact replaced by lay judges. Since the reforms were successful, they were kept in place by later legislation once the enabling law had lapsed. Late 1923 was among the most tumultuous times of the Weimar Republic, bringing the peak of hyperinflation and the ongoing Occupation of the Ruhr. One of Emminger's main goals as a politician and lawyer became a revaluation of the currency to partially offset the adverse social consequences of hyperinflation. As a minister he prevented the planned Aufwertungsverbot from becoming law and continued to fight for revaluation as a Reichstag delegate. Emminger left office on 15 April 1924 and his Secretary of State, Curt Joël, took over as acting Minister of Justice. He remained a member of the Rechtsausschuss of the Reichstag and 1927-31 served as chairman of the Zentralvorstand der deutsch-österreichischen Arbeitsgemeinschaft which worked towards a harmonisation of German and Austrian laws. He also contributed to a reform of the criminal law. Emminger was re-elected to the Reichstag in 1933 but the Nazi takeover ended his political activities. He worked as a judge at the Oberste Landesgericht of Bavaria in 1931-35 and then at the Oberlandesgericht. From 1946 until his retirement in July 1949, he was Senatspräsident there. Emminger died in Munich on 30 August 1951. Publications Die Aufwertungsfrage im aufgelösten Reichstage, 1924 References External links Erich Emmminger at the Akten der Reichskanzlei online version (German) Bio of Erich Emminger in a databank on (Imperial) Reichstag delegates (German) More biographical information on Erich Emminger, Datenbank der deutschen Parlamentsabgeordneten (German) Category:1880 births Category:1951 deaths Category:People from Eichstätt Category:People from the Kingdom of Bavaria Category:German Roman Catholics Category:Centre Party (Germany) politicians Category:Bavarian People's Party politicians Category:Justice ministers of Germany Category:Members of the 13th Reichstag of the German Empire Category:Members of the Reichstag of the Weimar Republic
{ "pile_set_name": "Wikipedia (en)" }
Encyclopedia of Anti-Revisionism On-Line Progressive Workers Movement On the Question of Liu Shao-chi First Published:Progressive Worker [Canada] Vol. 4, No. 5, March 1968Transcription, Editing and Markup: Malcolm and Paul SabaCopyright: This work is in the Public Domain under the Creative Commons Common Deed. You can freely copy, distribute and display this work; as well as make derivative and commercial works. Please credit the Encyclopedia of Anti-Revisionism On-Line as your source, include the url to this work, and note any of the transcribers, editors & proofreaders above. The Belgian journal, La Voix du Peuple, has given considerable attention of late to a speech by Sidney Rittenberg, an American who has lived in China for more than 20 years. An extremely long article purporting to be a criticism of the Rittenburg lecture has extended over a number of issues during November, December and January. Criticism of Rittenburg is the stated aim but the authors appear to have a much more sinister objective in mind. Rittenburg spoke to a Peking meeting sponsored by a group known as the “Bethune-Yenan Rebel Regiment”, apparently composed in the main of foreign experts working in China. This event took place in April 1967 and the address was subsequently mineographed and distributed abroad in Belgium (in French) and in England ( in English), under the title “Liu Shao-ehi and His Evil Book”. Copies of the speech together with articles attacking its main content have been received in Canada and we propose to comment on the lengthy polemic which appeared in La Voix du Peuple. While we might be disposed to be somewhat critical of Rittenburg’s speech for being poorly constructed, not too carefully prepared and containing some careless formulatons, we are in agreement with its basic content in criticizing and repudiating the bourgeois-reactionary line of Liu Shao-chi and upholding the proletarian-revolutionary line of Mao Tse-tung. However, the Belgian trio of Jacques Grippa, Rene Raindorf and Stephen Strulens who are of the opposite opinion, in reply to Rittenburg’s 40 to 50 minute speech inscribed a, reply that would fill a good-sized book. The extreme length of this literary attack is largely caused by the authors’ ranging far beyond the limits of the Rittenburg speech which did not provide them with sufficient scope for the objective they had in mind. In order to correct this situaton Rittenburg is charged with not saying certain things, and the things which were not said provide the main basis for the attack. The authors list a total of ten so-called “omissions” in the speech: “ . .. no denunciation of American fascist imperialism”; “... no analysis of the social base of social-democratic reformism and revisionism”; “... no analysis of the contradictions in the contemporary world or the role of fundamental contradiction”; “nothing about revolutionary movements for national liberation”; “no reference to the contradictions between imperalists and revisionists on the one hand and socialist countries on the other hand”; “no allusion to the new stage of working class struggle ... in imperialist countries”; “nothing ... on the subject of contradictions between the capitalists and between the imperalists”; “no reminder of the essential nature of our period as Lenin and other Marxist-Leninists have defined it”; “nothing . . . which recalls that this is a period during which imperialism will be destroyed and the proletarian revolution victorious”; “These ’omissions’ suggest strange conclusions about the real world ...” If these alleged “omissions” had been discussed, several days would have been added to a 50 minute speech. But let us leave it to the authors themselves to make reply to their charges of “omissions”. In part four of their literary marathon, having ’forgotten what they had written several weeks previous, the authors, criticizing Rittenburg, unwittingly supplied their own answer to the false cry of ’omissions”; as follows: “It is also necessary to refute the false argument that is purely and simply a diversion and consists of saying that How to be a Good Communist does not deal with such and such a question. With that reasoning no Marxist-Leninist work except a complete encyclopedia would be of any value.” That is fitting enough reply – nothing need be added. However, we did not take up the pen to defend Rittenberg; the relentless attack on his speech is but the prologue to the real aim of his detractors – a covert attack on Chairman Mao Tse-tung and the Proletarian Cultural Revoluton in China, an attack masked by vehement declarations of loyalty to Marxist-Leninist principles and with loud cries of “long live Mao Tse-tung.” But not every shouter of slogans is a Marxist-Leninist and the lengthy article in La Voix du Peuple is a prime example of that point. In part 2 of the article we read: “...the Marxist-Leninists of the world have always contributed new jewels to the common treasure of Marxist-Leninist thought, as Mao Tse-tung has done so brilliantly in many areas.” We have no desire to disparge the contributions of many working-class journalists around the world, (including our own modest effort), who work under difficult and trying circumstances. But we cannot agree that the vast and important contributions to Marxist-Leninist theory and practice made by the chief architect and leader of the Chinese Revolution are to be considered in the same light, for what the authors imply here is that Mao Tse-tung is just another contributor instead of presenting him in the proper light as the equal of Marx, Engels, and Lenin, the one who advances the work begun by these brilliant minds. Mao Tse-tung has brilliantly applied and developed Marxism-Leninism in the era of the final defeat of imperialism and of victorious proletarian revolution, and particularly in solving the problem of how to carry on the proletarian revolution under the dictatorship of the proletariat – a task which Marx, Lenin, and Engels could not, and did not carry out. To downgrade the great contribution of Mao Tse-tung as la Voix du Peuple does means denying the authority of Marxist-Leninist thought in our day, it means lowering the banner of revolution. The thought of Mao Tse-tung is not just one more of many contributions, it IS Marxism-Leninism in our time and upholding Marxism-Leninism, defending the proletarian revolution and proletarian dictatorship requires that revolutionaries uphold and defend the authority of the thought of Mao Tse-tung. The above-quoted passage fails in this respect – it lowers the banner of the thought of Mao Tse-tung, hence it lowers the banner of proletaian revolution in the world. The “Center” of Revolution When representatives of the Progressive Workers Movement returned from a trip to China last year, they stated: The outcome of the struggle now taking place will determine the future destiny of China and will exercise a decisive influence on the whole world because, as far as the present era is concerned, it is China that plays the really decisive role in the world. It is China that is the decisive factor so far as revolution, not only in China but in the world, is concerned. We can say with confidence there will be hope in the world so long as China does not fall and does not change its colour. The Great Proletarian Cultural Revolution is an event of vast importance which has a vital bearing on the destiny of the whole of mankind (Progressive Worker, Vol.3, No.9, July, 1967). The passage of time and events have not caused us to alter our opinion. On the contrary, we are now more firmly convinced that the consolidation of the proletarian dictatorship and winning new victories in the Cultural Revolution in China constitute objectives that are of supreme importance to the cause of the anti-imperialist struggle and the world revolution. From the contents of the article in la Voix du Peuple it appears that Grippa, Raindorf and Streulens are far from agreeing with us. Rittenberg, after commenting on the revisionist seizure of power in the Soviet Union, went on to say: Was that going to happen in China? Were they going to take down the picture of Chairman Mao that hangs over the Tien An Men gate tower one day? Were they going to announce that China would not be the center of world revolution, that China will cease and desist from giving unstinted aid to the embattled peoples of all countries, particularly of Asia, Africa and Latin America in return for false assurances of peace and moderation from the imperialists. Taking a distorted version of this passage as their point la Voix du Peuple presents an argument that conveys the impression that the defeat of the Chinese Revolution would be but a minor tragedy. Here, in part, is la Voix du Peuple rebuttal to Rittenberg: For us Marxist-Leninists, the Soviet Union was for a long time the only socialist country, the only one where the victorious proletarian revolution showed the way...and constituted a powerful force for the proletarian world revolution... When the revisionists usurped power in the U.S.S.R., we were not for long disoriented and discouraged – we did not feel we had lost our ’center’. We considered this setback, this temporary defeat of the Russian Revolution, just as a setback, a check for ourselves and for the world revolution, a regrettable mishap for class struggle on a world scale, but we preserved intact our fighting will... When the Chinese revolution was victorious and the People’s Republic of China was proclaimed we saluted that victory, considered it as our own... (Part 3). Ignoring for the moment the all-too-casual way in which the Russian Revolution is written off, and the very low estimate of the extent of that defeat, let us examine its meaning as it applies to China for it is the very obvious intention of la Voix du Peuple that it is intended to convey their opinion of a possible defeat in China. According to these writers, then, the downfall of the Chinese Revolution would be “just a setback”, a “check”, a “regrettable mishap for the class struggle” that would make no substantial difference to the world Marxist-Leninist movement and the anti-imperialist struggle. Apparently we can depend on the editors of La Voix du Peuple to “preserve intact their fighting will”, step into the breach and challenge international reaction led by U.S. imperialism and aided by Soviet revisionism. With all due respect to La Voix du Peuple we simply cannot buy their theory. For us the Chinese revolution is a subject of outstanding importance the defeat of which could never be written off as a “regrettable mishap.” Certainly struggle would go on. It is inevitable that struggle will continue, but under what vastly altered and unfavourable circumstances! It would take nothing away from the outstanding heroism of the Vietnamese people, nor would we be underestimating their brilliant application of, and contribution to the strategy and tactics of peoples war, to say that, without revolutionary China as their firm and reliable rear, their struggle would be infinitely more difficult, if not impossibe in its present highly-developed form. Without China, Soviet revisionist and treachery pressure to yield imperialist blackmail would go unchallenged. It is not without significance that it is in Southeast Asia where the Chinese revolution has the greastest influence, and not in the Middle East or Latin America, that U.S. imperialism is meeting its most formidable challenge just now. Are we not justified in believing that had China fallen to the revisionists the anti-imperialist struggle in Vietnam and elsewhere would not now be in its present highly-developed form? If that diaster had occured the counter-revolutionary policy of peaceful co-existence with the imperialists, and not that of the revolutionary anti-imperialist peoples war, would be the dominant characteristic in the world in this period. Should we, then accept the opinion that this would be only a “regrettable mishap.” We cannot accept the way in which La Voix du Peuple presents the sequence of events quoted above. It happens that the Russian revolution suffered a “regrettable mishap” following which the courageous editors of the Belgium journal “preserved intact their fighting will, the determination to struggle”, then, happily, along came the Chinese Revolution which the editors “claimed as their own.” We have not such short memories. We will remember that the Chinese revolution was victorious for some seven years before the outright seizure of power by the Kruschovites and that it was the Chinese Party that was in the lead in exposing that betrayal by the revisionists. We know that it was still another seven years, in 1963, before Grippa and his colleagues effected an organizational break with the revisionists in Belgium. Had there been no Red China to stand against and expose revisionist treachery the struggle to build a Marxist-Leninist movement would have been more difficult. In his preface to the second edition of The Peasant in Germany Engels said of the German workers: “If the German workers proceed in this way, they not march exactly at the head of the movement – it is not in the interests of the movement that the workers of one country should march at the head of all – but they will occupy an honourable place on the battle line, and they will stand armed for battle when other unexpected grave trials or momentuous events will demand heightened courage heightened determination, and the will to act”, and further on in the preface, they “form the vanguard of the proletarian struggle.” What could be said of the German workers a century ago, without state power in their confrontation with reaction is a thousand times more applicable to China today. The working people of China certainly occupy an honourable place in the battle line, and those who have been privileged to see China in these days of victory in the Cultural Revolution know that the Chinese people, mobilized around the revolutionary banner of Mao Tse-tung, stand armed for battle when grave trials or momentuous events demand heightened courgae. The Book of Liu Shao-chi The true extent of La Voix du Peuple becomes clear in Part 4 which appeared in the issue of December 1st. Rittenberg’s speech is but the means to an end, that end being defence of the book by Liu Shao-chi. This fact is established in the very first phrase when Rittenberg’s criticism of How to be a Good Communis is referred to as “vituperations against the book by Liu Shao-chi”. This categorical rejection of any criticism of the book is made still clearer later when Rittenberg’s critical remarks are classed as, “frantic attacks against Marxist-Leninist parties”, “a peridious campaign against Marxism-Leninism”, “an anti Marxist-Leninist counter-revolutionary line”, etc. Repudiation of the line of Liu Shao-chi is discribed as an “invention of Rittenberg and his masters” used with the “intention of destroying Marxist-Leninist parties by any means.” La Voix du Peuple makes numerous allusions to “Rittenberg, his masters and agents” with the obvious intention of having all criticism of Liu Shao-chi and his book automatically associated with an alleged international counter-revolutionary conspiracy. In this way the authors of the article strive to suppress criticism of the line of Liu Shao-chi and, at the same time, give their actions the appearance of defending Marxism-Leninism. If Rittenberg does have “masters and agents” they must total in the hundreds of millions – presently engaged in sharp criticism and repudiation of the line of Liu Shao-chi. This repudiation of Liu Shao-chi and his book is an important part of the Cultural Revolution, and a fact which cannot help but be known to La Voix du Peuple. One of the authors, Stephen Strulens, arrived in China last spring apparently there to discuss some questions in connection with the Rittenberg speech. We met Strulens and his companion at the Shanghai Airport and spent several hours with them there. We were with them when airport workers gave a concert featuring the thought of Mao Tse-tung by means of song and dance – one encounters these impromptu concerts all over China. Propaganda teams of the thought of Mao Tse-tung can be found in all corners of the land and they number in the millions. In unison with the working masses of China these teams raise the cry “Down with Liu Shao-chi and his evil book.” Strulens witnessed this phenomena at Shanghai and when we saw him again on our return to Peking we know he could not fail to see millions of workers repeating the slogan in the great square at Tien An Men, not far from the Hotel Peking. Strulens, therefore, could not fail to observe that “Down with Liu Shao-chi and the capitalist roaders” was the demand of millions and not a plot devised by a small band of counter-revolutionary conspirators. Strulens must have communicated this fact to his colleagues. What purpose do they have, then, in attempting to have this appear as an “invention of Rittenberg, his masters and his agents”? They can have only one aim in view – rehabilitation of the bourgeois-reactionary line of Liu Shao-chi as sumanzed in his book How to be a Communist La Voix du Peuple gives an edited and abbreviated version of the following passage from Rittenberg’s speech: “ the poison smuggled into the Communist movement by Liu Shao-chi and the representatives of his line, particularly reflected in his book, must be eradicated, not only in China, but throughout the revolutionary movement. Otherwise, it will be impossible to really establish a proletarian revolutionary line and carry the revolution forward to victory.” Responding to this la Voix du Peuple says: “Rittenberg his masters and agents have thrown their ultimate to Marxist-Leninist: those who do not yell ’Down with Liu Shao-chi and his book How to be a Good Communist’ become ’false revolutionaries,’ ’revisionists,’ ’counter revolutionaries.’” This type of ’reply’ only amounts to an evasion of the real point at issue by a resort to invective. If Rittenberg is justified in his criticism of the book – and we agree he is – then those who do not join in repudiating it are false revolutionaries and revisionists, and resorting to invective connot erase that fact. Again it is evident La Voix du Peuple is anxious to defend Liu Shao-chi by any avaible means. Following the above passage the editors express righteous indignation over an “order” said to have come from Ritenberg: “... at their order, our Party is supposed to serviley reject, totally, on the spot, with no discussion, a book which for all this time has been considered good...” There is no part of Rittenberg’s speech which could possibly be interpreted as an order to servilely reject anything. As for “no discussion”, the editors of la Voix du Peuple must surely know that Liu Shao-chi and his book have been important items for discussion for many months and that numerous articles and pamphlets on the subject have been published in many languages. If there has been no discussion of this question in Belgium then the fault rests with the Belgian movement for failing to read, study, and discuss the wealth of material and information available. And if there has been no discussion, as the above quotation clearly indicates, on what did la Voix du Peuple base their decision to reject Rittenberg’s thesis and defend the book by Liu Shao-chi? It seems they have decided to accept the line of Liu Shao-chi “with no discussion”. That the authors of the article in la Voix du Peuple do defend How to be a Good Communist is not in doubt as the following passage form Part 4 will demonstrate: Rittenberg condemns How to be a Good Communist because it mentions nowhere the problem of taking revolutionary power. This is not true. Not only does the whole book deal with the education of the Communist Party, of the cadre in the revolutionary struggle, thus implying the necessity of the taking of power by the proletariat allied to the other classes of the labouring population, that is to say the dictatorship of the proletariat, but also deals explicitly with the fundamental question of power, in relation to the deportment of Communists. It is significant that the authors are unable to quote Liu Shao-chi DIRECTLY on the dictatorship of the proletariat, but, in giving the lie to Rittenberg, are limited to making the unsubstantiated claim that Liu Shao-chi IMPLIES the necessity of taking power, which can be considered as no more than an opinion of the editors, and a very unreliable one at that. The truth is that How to be a Good Communist, first published in China in 1939, and revised and republished many times thereafter until 1962, maintains total silence on the proletarian dictatorship. (First published in the fierce struggle of the anti-Japanese war, it never once touched upon that conflict until the 1962 edition, long after the war, when a brief reference to it was thrown in). Liu Shao-chi simply describes the state as “centralized and at the same time democratic” and nowhere mentions the necessity for dictatorship over the class enemy. What is that but the Kruschovite “state of the whole people”? However it is not necessary for us to enter into an endless debate over this question of implicit or explicit references to proletarian power for it is easy to establish the fact that Liu Shao-chi not only does not mention the subject but actually eliminates all references to it in every one of the many editions issued since 1939. In 1962 – the year of the most recent edition (English edition 1964) – the question of proletarian power was under sharp attack from the revisionists led by the Soviet ruling clique, therefore Marxist-Leninists were duty-bound to rise in defence of this concept which is central to Marxism-Leninism. Yet Liu Shao-chi continued to erase it from his book. On pages 40 and 41 (1961 English edition) Liu Shao-chi cites two passages from Left-Wing Communism by Lenin but he eliminates important sections from the body of each quotation. In the quotation on Page 40 the following section is excluded: The dictatorship of the proletariat is a persistent struggle – bloody and bloodless, violent and peaceful, military and economic, educational and administrative – against the forces and traditions of the old society... Without an iron party tempered in the struggle, without a party enjoying the confidence of all that is honest in the given class, without a party capable of watching and influencing the mood of the masses, it is impossible to conduct such a struggle successfully. And on Page 41 we find the following excluded from the quotation from Lenin: “The dictatorship of the proletariat is essential.” So we can see clearly that Liu Shao-chi ELIMINATED all references to proletarian dictatorship when he “quoted” from Lenin and made no reference to the subject himself. Was this just an oversight, an accident repeated in each new and revised edition of How to be a Good Communist? How could any Marxist-Leninist possibly overlook the all-important question of proletarian power? It is not Rittenberg but the editors of la Voix du Peuple who are wrong about Liu Shao-chi failing to deal with the dictatorship of the proletariat. And in view of the charge by la Voix du Peuple that “Rittenberg and his masters” are trying to destroy the Marxist-Leninist movement it is significant that Liu Shao-chi erases Lenin’s reference to the type of party required UNDER THE DICTATORSHIP OF THE PROLETARIAT. The Belgian article states: “Engels, Lenin and Stalin ought to disappear according to Rittenberg”. This is to our way of thinking a completely unjustified accusation, all the more slanderous in view of the failure to point out how Liu Shao-chi did, in fact, cause Engels and Stalin to disappear. In all the editions of his book until 1962 Liu Shao-chi wrote: “be the best pupils of Marx, Engels, Lenin and Stalin” and quoted three passages from Chapter Four of the History of the CPSU. But in nineteen-sixty-two, he revised this to read: “Be worthy pupils of Marx and Lenin” and deleted entirely the passages previously quoted from the History of the CPSU. To do this in nineteen-sixty-two could only mean conforming to the wishes and needs of the Soviet revisionists who attacked Stalin to destroy Marxism-Leninism. In order to delete the name of Stalin he made Engels a co-victim with him. For us the evidence seems clear and irrefutable: Liu Shao-chi opposes proletarian dictatorship and the party of a revolutionary type which Lenin fought for and Mao Tse-tung did so much to build in China. In Conclusion We have not exhausted the subject of Liu Shao-chi whose activities range well beyond those dealt with here. There is a lot of material available which can be obtained from Advance Books and Periodicals, Neither have we dealt completely with the lengthy article in la Voix du Peuple. We feel however, that we are justified in drawing the conclusion that the editors of la Voix du Peuple are committed to defending the bourgeois-reactioary line of Liu Shao-chi and are intent on making it appear that criticism of Liu Shao-chi is an attack on the Communist Party and the thought of Mao Tse-tung. But these two are representatives of two fundamentally different lines which cannot be reconciled. Liu Shao-chi represents the counter-revolutionory line of the bourgeois while Mao Tse-tung represents the proletarian revolutionary line. One must choose between these two. The Central Committee and the vast majority of cadres and Party members, together with the Chinese masses, guided by the thought of Chairman Mao, are criticizing and repudiating the reactionary line of Liu Shao-chi who is the top party person in authority taking the capitalist road. The speech by Rittenberg, as we have noted above, might justifiably be criticized for its style and some careless formulations. But this is not what the editors of la Voix du Peuple are concerned with. On the basic point of repudiating Liu Shao-chi and defending Mao Tse-tung Rittenberg is correct. But it is precisely against this correct point that the attack is directed. It is clear that the authors, behind the screen of a pretended attack on Rittenberg, are in reality mounting an attack on Mao Tse-tung and the Proletarian Cultural Revolution. We firmly state our opposition to the line advanced by La Voix du Peuple, which we consider to be pointing a revisionist course and, in essence, counter-revolutionary. We take our stand now, as always, on the side of Chair Mao Tse-tung and China’s Great Proletarian Cultural Revolution.
{ "pile_set_name": "Pile-CC" }
Associated Co-operative Creameries Associated Co-operative Creameries (ACC), formerly CWS Milk Group, was a subsidiary and operating division of the Co-operative Group. Associated Co-operative Creameries Limited is an industrial and provident society that was first registered in 1961, and became a subsidiary of the North Eastern Co-operative Society (NECS), a large regional consumer co-operative based in Gateshead. It became one of the largest milk processors and distributors in north-east England. After NECS merged with the Co-operative Wholesale Society (CWS, now the Co-operative Group) in 1992, Associated Co-operative Creameries absorbed CWS Milk Group, a milk processor and distributor based in Wales and north west England. The abbreviated trading name ACC was adopted in 2001 when the milk and distribution operations were split. By 2004, Associated Co-operative Creameries Limited, trading as ACC Milk, was the UK's fourth largest dairy business, when it was sold to yet another co-operative, Dairy Farmers of Britain of Nantwich, Cheshire, forming Britain's largest milk co-operative, and the UK's third largest milk processor. ACC moved its registered address to Nantwich at that time. ACC Distribution was the logistics division of The Co-operative Group and supplied not only stores belonging to The Co-operative Group itself but other co-operative societies. ACC Distribution is still owned by the Co-operative Group and is today known as Co-operative Retail Logistics. References Category:Former co-operatives of the United Kingdom Category:Agricultural marketing cooperatives Category:Dairy products companies of the United Kingdom Category:The Co-operative Group
{ "pile_set_name": "Wikipedia (en)" }
The direct line to Brown University students and the Brown way of life: brought to you by Brown University Admissions Office From Albania to Zimbabwe: My Very First Halloweekend Hi there! My name is Akira Camargo, a freshman hailing from Tokyo, Japan who will try to crack funny jokes and puns from time to time as I write posts for From Albania to Zimbabwe, the ins and outs of being at Brown from an international student’s perspective. Through my posts, you’ll be able to learn more about all things international here, ranging from international events at Brown (cool guest speakers, festivals and parties) to my thoughts on living in America for the first time (!!!), and a bunch of other interesting stuff as my first year at Brown unfolds. Hope you enjoy reading them! Happy November! I hope all of you had a great one. For those of you applying to colleges, the Early Decision deadline just passed…! I congratulate those of you who submitted your first college application! That’s a commendable honor. I remember exactly a year ago, I was in my high school library looking over my Brown application and hitting submit while my friend Sumika (who also got admitted to Brown and is in the above photo on the left) did a last-minute run through of my essays. It’s really weird to think how much my life has changed in just a year. Spooky… Speaking of spooky, Halloweekend is just making its final run at Brown. I dressed up with all of my friends, had a lot of fun at some awesome Halloween-themed parties and I am now procrastinating from all the work I didn’t do this week. Anyway, this was my first Halloween in America and in college, and I must say, WOW. I was overwhelmed by the enthusiasm and passion everyone had with regards to what costume they wanted to wear, what parties to go to and much much more. Back at home, we really didn’t do much for Halloween except for Trick-or-Treating when I was younger, so it was a big change to do a whole set of different things. It was an overwhelming couple of days but I sure did have a lot of fun. On Friday, I dressed up with my friend as superheroes and went to a party that was hosted by our college neighbor next door, RISD. I met a bunch of cool people and even made a new Japanese friend! The international world is small, and you are bound to find people who you share mutual friends with. Take advantage of your international background! On Saturday, the Japan Cultural Association had its annual Haunted House, which was tiring and exicting all at the same time. We created our own haunted house, in a series of small classrooms in a basement of an old buildling at Brown. Scary right? It was a great success and I had a lot of fun scaring people (I didn’t think that would be fun, but hey, it really was!). As an international student, you will definitely experience a lot of ‘firsts’, just like Halloween. Don’t forget to be open-minded and try new things. That being said, no one really pressures you, and it’s also cool to stick to what you’re used to as well. Stay warm, folks. It just started snowing here and I am freaking out! Winter is coming! Best, Akira If you have any more questions, comments, suggestions of what I should write about or just want to chat, feel free to message me at akira_camargo@brown.edu.
{ "pile_set_name": "Pile-CC" }
Multivariate modelling of infectious disease surveillance data. This paper describes a model-based approach to analyse multivariate time series data on counts of infectious diseases. It extends a method previously described in the literature to deal with possible dependence between disease counts from different pathogens. In a spatio-temporal context it is proposed to include additional information on global dispersal of the pathogen in the model. Two examples are given: the first describes an analysis of weekly influenza and meningococcal disease counts from Germany. The second gives an analysis of the spatio-temporal spread of influenza in the U.S.A., 1996-2006, using air traffic information. Maximum likelihood estimates in this non-standard model class are obtained using general optimization routines, which are integrated in the R package surveillance.
{ "pile_set_name": "PubMed Abstracts" }
Q: Summarize ndarray by 2d array in Python I want to summarize a 3d array dat using indices contained in a 2d array idx. Consider the example below. For each margin along dat[:, :, i], I want to compute the median according to some index idx. The desired output (out) is a 2d array, whose rows record the index and columns record the margin. The following code works but is not very efficient. Any suggestions? import numpy as np dat = np.arange(12).reshape(2, 2, 3) idx = np.array([[0, 0], [1, 2]]) out = np.empty((3, 3)) for i in np.unique(idx): out[i,] = np.median(dat[idx==i], axis = 0) print(out) Output: [[ 1.5 2.5 3.5] [ 6. 7. 8. ] [ 9. 10. 11. ]] A: To visualize the problem better, I will refer to the 2x2 dimensions of the array as the rows and columns, and the 3 dimension as depth. I will refer to vectors along the 3rd dimension as "pixels" (pixels have length 3), and planes along the first two dimensions as "channels". Your loop is accumulating a set of pixels selected by the mask idx == i, and taking the median of each channel within that set. The result is an Nx3 array, where N is the number of distinct incides that you have. One day, generalized ufuncs will be ubiquitous in numpy, and np.median will be such a function. On that day, you will be able to use reduceat magic1 to do something like unq, ind = np.unique(idx, return_inverse=True) np.median.reduceat(dat.reshape(-1, dat.shape[-1]), np.r_[0, np.where(np.diff(unq[ind]))[0]+1]) 1 See Applying operation to unevenly split portions of numpy array for more info on the specific type of magic. Since this is not currently possible, you can use scipy.ndimage.median instead. This version allows you to compute medians over a set of labeled areas in an array, which is exactly what you have with idx. This method assumes that your index array contains N densely packed values, all of which are in range(N). Otherwise the reshaping operations will not work properly. If that is not the case, start by transforming idx: _, ind = np.unique(idx, return_inverse=True) idx = ind.reshape(idx.shape) OR idx = np.unique(idx, return_inverse=True)[1].reshape(idx.shape) Since you are actually computing a separate median for each region and channel, you will need to have a set of labels for each channel. Flesh out idx to have a distinct set of indices for each channel: chan = dat.shape[-1] offset = idx.max() + 1 index = np.stack([idx + i * offset for i in range(chan)], axis=-1) Now index has an identical set of regions defined in each channel, which you can use in scipy.ndimage.median: out = scipy.ndimage.median(dat, index, index=range(offset * chan)).reshape(chan, offset).T The input labels must be densely packed from zero to offset * chan for index=range(offset * chan) to work properly, and the reshape operation to have the right number of elements. The final transpose is just an artifact of how the labels are arranged. Here is the complete product, along with an IDEOne demo of the result: import numpy as np from scipy.ndimage import median dat = np.arange(12).reshape(2, 2, 3) idx = np.array([[0, 0], [1, 2]]) def summarize(dat, idx): idx = np.unique(idx, return_inverse=True)[1].reshape(idx.shape) chan = dat.shape[-1] offset = idx.max() + 1 index = np.stack([idx + i * offset for i in range(chan)], axis=-1) return median(dat, index, index=range(offset * chan)).reshape(chan, offset).T print(summarize(dat, idx))
{ "pile_set_name": "StackExchange" }
Biography I am happy that you are using this web site and hope that you found it useful. Unfortunately, the cost of making this material freely available is increasing, so if you have found the site useful and would like to contribute towards its continuation, I would greatly appreciate it. Click the button to go to Paypal and make a donation. Dorothea Benckendorff, Princess Lieven (1784-1857) Dorothea, Princess Lieven, was born in December, 1784, into the Russian Baltic nobility at Riga, now in Latvia. Her father, General Christopher von Benckendorff, served as military governor of Russia’s Baltic provinces; her mother, Anna Juliane née Schilling von Cannstatt, held a high position at the Russian court as senior lady-in-waiting and best friend of Empress Maria Fyodorovna, the wife of Czar Paul and mother of the Czars Alexander I and Nicholas. Princess Lieven had two brothers. Count Alexander Benkendorf, four years her senior, was aide-de-camp to the Emperor Nicholas, and at one time Chief of the Secret Police. He died in 1844. Count Constantine Benkendorf was born in the same year as the Princess; he rose to the rank of General in the Russian service, and died of fever, in 1828, at Pravadi, during the first campaign of the war against Turkey. Dorothea was educated at the Smolny Convent Institute in St Petersburg and then was assigned as a maid of honour to the Empress Maria. In 1801, at the age of sixteen, some months after finishing her studies, Dorothea married General Count (later Prince) Christopher Lieven. Princess Lieven had, in all, five sons and one daughter. Two sons, Alexander and Paul, alone survived their parents. Of the younger children, the only daughter died, presumably, in infancy; Arthur and George died at Petersburg, of scarlet fever, in 1835, while Constantine, having incurred his father's displeasure, left his family and died in America in the year 1838. At the Peace of Tilsit, in 1807, Count Lieven had attained the rank of Lieutenant-General, and in 1810 was accredited to Berlin as Russian Minister Plenipotentiary, at the Court of Frederick-William III. In 1812 Count Lieven was appointed Ambassador in London, and held this post for the following twenty-two years. Dorothea used her intelligence, charisma, and social skills to contribute materially to the success of her husband’s embassy. In England's political environment, the Princess discovered that she had a flair for politics. By 1814, if not earlier, she was elected as one of the patronesses of Almack's Assembly Rooms, the first foreigner to be so honoured; she is said to have introduced the German Waltz to Almack's. She was a prominent political hostess: invitations to her house were the most sought after. She held the confidence of some of the most important statesmen in London and Europe and she was considered to be at least as politically important, if not more so, than her ambassador husband who, at the time of the coronation of the Emperor Nicholas in September, 1826, received the title of Prince. The Princess participated, either directly or indirectly, in every major diplomatic event between 1812 and 1857. She knew ‘everyone in the Courts and cabinets for thirty or forty years [and] knew all the secret annals of diplomacy’, wrote a French diplomat. Dorothea devoted herself tirelessly to the welfare of Russia, assiduously sleeping with every major statesman on the European stage, including Metternich, George IV and each successive British prime minister except George Canning, whom she saw as a plebeian with no manners. Her lovers changed with each Cabinet reshuffle. She performed at least one secret diplomatic mission for the Tsar when, in 1825 Tsar Alexander entrusted Dorothea with a secret overture to the British government. ‘It is a pity Countess Lieven wears skirts’, the Tsar wrote to his foreign minister Count Nesselrode. ‘She would have made an excellent diplomat.’ The Tsar’s mission marked Dorothea Lieven’s debut as a diplomat in her own right. During Prince Lieven’s ambassadorship in England, (1812-1834) the Princess played a key role in the birth of modern Greece, and made a notable contribution to the creation of today’s Belgium. In London, Princess Lieven cultivated friendships with the foremost statesmen of her day. She and Austrian Chancellor Prince Klemens Lothar Wenzel von Metternich had a notorious liaison. Her friendships with George IV, Prince Metternich, the Duke of Wellington, George Canning, Count Nesselrode, Lord Grey, and François Guizot gave Dorothea Lieven the opportunity to exercise authority in the diplomatic councils of Great Britain, France, and Russia. In 1834 Prince Lieven was recalled from London, and was named Governor to the young Czarevitch, later Emperor Alexander II. Despite her residence in London, the Princess had already been appointed senior lady-in-waiting to the Empress Alexandra in 1829. Soon after the Lievens returned to Russia, their two youngest sons died suddenly. This tragedy and her declining health caused the Princess to leave her native land and settle in Paris. Though she suffered from ill health in the last decades of her life, she continued to be involved in politics and diplomacy. Her collected letters provide a wickedly gossipy insight into Regency England. In a city where salons served a unique social and political purpose, Princess Lieven’s Paris salon, known as ‘the listening/observation post of Europe’, empowered her to be an independent stateswoman. In 1837 she and François Guizot entered into a close personal partnership that lasted until the Princess's death. Dorothea Lieven died peacefully at her home, 2 rue Saint-Florentin, Paris1 on 27 January 1857 . She was buried, according to her wish, at the Lieven family estate, Mežotne near Jelgava, next to her two young sons who had died in St. Petersburg. These materials may be freely used for non-commercial purposes in accordance with applicable statutory allowances and distribution to students. Re-publication in any form is subject to written permission.
{ "pile_set_name": "Pile-CC" }
{ "jsonSchemaSemanticVersion": "1.0.0", "imports": [ { "corpusPath": "cdm:/foundations.1.1.cdm.json" }, { "corpusPath": "/core/operationsCommon/Common.1.0.cdm.json", "moniker": "base_Common" }, { "corpusPath": "/core/operationsCommon/DataEntityView.1.0.cdm.json", "moniker": "base_DataEntityView" }, { "corpusPath": "/core/operationsCommon/Tables/SupplyChain/ProductInformationManagement/Main/InventTable.1.0.cdm.json" }, { "corpusPath": "/core/operationsCommon/Tables/SupplyChain/ProcurementAndSourcing/WorksheetHeader/PurchTable.1.0.cdm.json" }, { "corpusPath": "/core/operationsCommon/Tables/SupplyChain/ProcurementAndSourcing/Transaction/VendPackingSlipJour.1.0.cdm.json" }, { "corpusPath": "/core/operationsCommon/Tables/SupplyChain/ProcurementAndSourcing/Transaction/VendPackingSlipTrans.1.0.cdm.json" }, { "corpusPath": "/core/operationsCommon/Tables/Finance/Ledger/Main/CompanyInfo.1.0.cdm.json" } ], "definitions": [ { "entityName": "PurchPackingSlipTmp", "extendsEntity": "base_Common/Common", "exhibitsTraits": [ { "traitReference": "is.CDM.entityVersion", "arguments": [ { "name": "versionNumber", "value": "1.0" } ] } ], "hasAttributes": [ { "name": "ExternalItemNum", "dataType": "ExternalItemId", "isNullable": true, "description": "" }, { "name": "InventDimPrint", "dataType": "FreeTxt", "isNullable": true, "description": "" }, { "name": "InventDimProduct", "dataType": "InventDimPrint", "isNullable": true, "description": "" }, { "name": "ItemId", "dataType": "ItemId", "isNullable": true, "description": "" }, { "name": "JournalRecId", "dataType": "VendPackingSlipJourRecId", "description": "" }, { "name": "Name", "dataType": "ItemFreeTxt", "isNullable": true, "description": "" }, { "name": "Ordered", "dataType": "PurchQty", "isNullable": true, "description": "" }, { "name": "PackingSlipId", "dataType": "PackingSlipId", "isNullable": true, "description": "" }, { "name": "pdsCWQty", "dataType": "PdsCWInventQty", "isNullable": true, "description": "" }, { "name": "pdsCWStr", "dataType": "String255", "isNullable": true, "description": "" }, { "name": "pdsCWUnitId", "dataType": "PdsCWUnitId", "isNullable": true, "description": "" }, { "name": "PurchId", "dataType": "PurchIdBase", "isNullable": true, "description": "" }, { "name": "PurchUnitTxt", "dataType": "UnitOfMeasureReportingText", "isNullable": true, "description": "" }, { "name": "Qty", "dataType": "PurchDeliveredQty", "isNullable": true, "description": "" }, { "name": "Remain", "dataType": "PurchQty", "isNullable": true, "description": "" }, { "name": "ValueMST", "dataType": "AmountMST", "isNullable": true, "displayName": "Value", "description": "" }, { "name": "VendPackingSlipTrans", "dataType": "VendPackingSlipTransRecId", "description": "" }, { "name": "DataAreaId", "dataType": "string", "isReadOnly": true }, { "entity": { "entityReference": "InventTable" }, "name": "Relationship_InventTableRelationship", "resolutionGuidance": { "entityByReference": { "allowReference": true } } }, { "entity": { "entityReference": "PurchTable" }, "name": "Relationship_PurchTableRelationship", "resolutionGuidance": { "entityByReference": { "allowReference": true } } }, { "entity": { "entityReference": "VendPackingSlipJour" }, "name": "Relationship_VendPackingSlipJourRelationship", "resolutionGuidance": { "entityByReference": { "allowReference": true } } }, { "entity": { "entityReference": "VendPackingSlipTrans" }, "name": "Relationship_VendPackingSlipTransRelationship", "resolutionGuidance": { "entityByReference": { "allowReference": true } } }, { "entity": { "entityReference": "CompanyInfo" }, "name": "Relationship_CompanyRelationship", "resolutionGuidance": { "entityByReference": { "allowReference": true } } } ], "displayName": "Show packing slip" }, { "dataTypeName": "ExternalItemId", "extendsDataType": "string" }, { "dataTypeName": "FreeTxt", "extendsDataType": "string" }, { "dataTypeName": "InventDimPrint", "extendsDataType": "string" }, { "dataTypeName": "ItemId", "extendsDataType": "string" }, { "dataTypeName": "VendPackingSlipJourRecId", "extendsDataType": "bigInteger" }, { "dataTypeName": "ItemFreeTxt", "extendsDataType": "string" }, { "dataTypeName": "PurchQty", "extendsDataType": "decimal" }, { "dataTypeName": "PackingSlipId", "extendsDataType": "string" }, { "dataTypeName": "PdsCWInventQty", "extendsDataType": "decimal" }, { "dataTypeName": "String255", "extendsDataType": "string" }, { "dataTypeName": "PdsCWUnitId", "extendsDataType": "string" }, { "dataTypeName": "PurchIdBase", "extendsDataType": "string" }, { "dataTypeName": "UnitOfMeasureReportingText", "extendsDataType": "string" }, { "dataTypeName": "PurchDeliveredQty", "extendsDataType": "decimal" }, { "dataTypeName": "AmountMST", "extendsDataType": "decimal" }, { "dataTypeName": "VendPackingSlipTransRecId", "extendsDataType": "bigInteger" } ] }
{ "pile_set_name": "Github" }
Immunogenicity of hepatitis A vaccine in children with celiac disease. The response to hepatitis A vaccine has not been studied in children with celiac disease (CD). The aim of the present study was to evaluate the immunogenicity of an inactivated hepatitis A virus (HAV) vaccine and the effect of the human leukocyte antigen (HLA) type on immunogenicity in children with CD. Thirty-three patients with CD and 62 healthy controls were enrolled in the study. Inactivated HAV vaccine (Havrix; GlaxoSmithKline Biologicals, Rixensart, Belgium) containing 720 enzyme-linked immunosorbent assay units of alum-adsorbed hepatitis A antigen was administered intramuscularly in a 2-dose schedule at 0 and 6 months. Seroconversion rates and antibody titers of HAV were measured at 1 and 7 months. At 1 month, seroconversion rates were 78.8% and 77.4% and geometric mean titers were 50.7 and 49.9 mIU/mL in the CD and control groups, respectively (P > 0.05). At 7 months, seroconversion rates were 97% and 98.4% and geometric mean titers were 138.5 and 133 mIU/mL in the CD and control groups, respectively (P > 0.05). The most frequent HLA types were HLA-DQ2, -DR3, and -DR7 alleles in patients with CD and HLA-DQ3, -DQ6, -DR11, and -DR14 in the controls. There was no association between HLA alleles and antibody titers of hepatitis A vaccine. Children with CD have a good immune response to hepatitis A vaccine, similar to healthy controls.
{ "pile_set_name": "PubMed Abstracts" }
Disparity of innate immunity-related gene effects on asthma and allergy on Karelia. We investigated the interactive effects of 11 innate immunity-related genes (IL10, IL12b, IL8, TLR2, TLR4, CD14, IFNGR, CC16, IFNg, CMA1, and TGFB) and four IgE response genes (IL4, IL13, IL4RA, and STAT6) with 'Western' or 'Eastern' environments/lifestyles on asthma and allergy in Karelian children. Karelian children (412 Finnish and 446 Russian) were recruited and assessed for a range of allergic conditions, with 24 single-nucleotide polymorphisms genotyped in 15 genes. The genotype-phenotype relationships differed in Finnish and Russian Karelian children. The interaction between polymorphisms and the variable representing 'Western' and 'Eastern' environments/ lifestyles was significant for IL10-1082 (p = 0.0083) on current rhinitis, IL12b 6408 on current conjunctivitis (p = 0.016) and atopy (p = 0.034), IL8 781 on atopic eczema (p = 0.0096), CD14 -550 on current rhinitis (p = 0.022), IFNgR1 -56 on atopic eczema(p = 0.038), and STAT6 2964 on current itchy rash (p = 0.037) and total serum IgE (p = 0.042). In addition, the G allele of IL13 130 was associated with a lower level of total serum IgE in Finnish (p = 0.003) and Russian (p = 0.01) children and overall (pooling the two populations together, p = 0.00006). After adjusting for multiple tests, the association between IL13 130 and IgE and the interactive effects of IL10-1082 on current rhinitis and IL8 781 on atopic eczema were significant by controlling a false-positive rate of 0.05 and 0.10, respectively. Living in an Eastern vs. Western environment was associated with a different genetic profile associated with asthma and allergy in the Karelian populations.
{ "pile_set_name": "PubMed Abstracts" }
Aspects of Human Genetics: With Special Reference to by PDF Read or Download Aspects of Human Genetics: With Special Reference to X-Linked Disorders Symposium on X-Linked Diseases Held by the European Society of Human Genetics, Madrid, September-October 1982: Selected Papers PDF The concept “thoughts turn into issues” has turn into a meme in pop culture. It’s held as a company proposition in metaphysics, and a few religious lecturers ascribe countless powers to the brain. yet are those claims scientifically exact? What does the medical proof let us know in regards to the scope of the human brain to remodel ideas into truth? Antiepileptic medicines are one of the most typically prescribed medicinal drugs via either neurologists and psychiatrists, as they exert a couple of results which expand a ways past their anticonvulsant houses. there's becoming facts that every antiepileptic drug is characterized by means of a selected behavioural profile. Additional info for Aspects of Human Genetics: With Special Reference to X-Linked Disorders Symposium on X-Linked Diseases Held by the European Society of Human Genetics, Madrid, September-October 1982: Selected Papers
{ "pile_set_name": "Pile-CC" }
Diagnostic value of emergency medical services provider judgement in the identification of head injuries among trauma patients. Previous studies have reported that many patients with a severe head injury are not transported to a higher-level trauma centre where the necessary round-the-clock neurosurgical care is available. The aim of this study was to analyse the diagnostic value of emergency medical services (EMS) provider judgement in the identification of a head injury. In this multicentre cohort study, all trauma patients aged 16 years and over who were transported with highest priority to a trauma centre were evaluated. The diagnostic value of EMS provider judgement was determined using an Abbreviated Injury Scale score of ≥1 in the head region as reference standard. A total of 980 (35.4%) of the 2766 patients who were included had a head injury. EMS provider judgement (Abbreviated Injury Scale score ≥1) had a sensitivity of 67.9% and a specificity of 87.7%. In the cohort, 208 (7.5%) patients had a severe head injury. Of these, 68% were transported to a level I trauma centre. Identification of a head injury on-scene is challenging. EMS providers could not identify 32% of the patients with a head injury and 21% of the patients with a severe head injury. Additional education, training and a supplementary protocol with predictors of a severe head injury could help EMS providers in the identification of these patients.
{ "pile_set_name": "PubMed Abstracts" }
What’s up with ARM - pmjordan http://ldn.linuxfoundation.org/blog-entry/what%E2%80%99s-with-arm ====== edderly Some context: _Gaah. Guys, this whole ARM thing is a f-cking pain in the ass_ <https://lkml.org/lkml/2011/3/17/492> _Let ARM rot in the mainline. I really don't care anymore._ <https://lwn.net/Articles/441384/> It'll be interesting to see what direction this goes. Considering also the forks for the Android kernel and the different directions ARM development wants to go compared to Intel. ~~~ dochtman Yeah, this isn't really new to anyone who reads the LWN (which is edited by the author of the OP, BTW). The LWN is really very good, and subscribing is worth it for those hackers who care about the larger Linux/POSIX ecosystem. ------ zdw This is very welcome. ARM has tended to be somewhat difficult to port to - vendors have multiple versions of the instruction set out there depending on device size/power requirements, with different floating point units (NEON, VFP) etc. The result is we end up with situations like OpenEmbedded supporting multiple kernel trees in it's build engine just to take care of the wide range of hardware it supports. Hopefully this will make the situation somewhat better. ~~~ rbanffy Anything that increases functionality/LoC in the kernel is good. In any complex software project - and the Linux kernel is about as complex as sanity and present technology will allow - you have to do periodical codebase clean- ups. This is one case where the pain to maintain is forcing a cleanup. And, as always, it's discussed openly, so, whoever depends on it doesn't get surprised by the next release. ------ paines This biggest problem with ARM devices is, that the only devices out there for usage are embedded ones. Up to now there is only one Notebook out there (alwaysinnovating) which could be used as a computer on a daily basis. But IMHO 10'' is too small to do serious stuff. 13'' is minimum. Hope we will see them soon in the wild.
{ "pile_set_name": "HackerNews" }
海外で「グリーンラッシュ」、すなわち大麻ビジネスが爆発的に拡大中だ。鎮静作用などを持ち、安全性の高いといわれる大麻由来成分「CBD」は、薬品から食品や化粧品、ペット用品まで製品化が進む。2025年に数百億ドル規模になるとされる大麻市場に企業や投資家の注目が集まる。日本にも到来の予兆がある大麻ビジネスの現状を追った。 海外で「グリーンラッシュ」、すなわち大麻ビジネスが爆発的に拡大中だ。鎮静作用などを持ち、安全性の高いといわれる大麻由来成分「CBD」は、薬品から食品や化粧品、ペット用品まで製品化が進む。2025年に数百億ドル規模になるとされる大麻市場に企業や投資家の注目が集まる。日本にも到来の予兆がある大麻ビジネスの現状を追った。 そうま・るみ/立命館大学卒業後、02年にダイヤモンド社に入社。週刊ダイヤモンド記者となり、銀行、家電などを担当。07年に転職し、結婚・出産、女性誌の編集者などを経て、18年に記者として出戻る。流通・小売を担当。主な担当特集に「職場の発達障害」など。趣味は息子との消防車鑑賞。 Photo:Olga Volkovaia/gettyimages 「CBD」という成分をご存じだろうか。CBDとは、鎮静作用などさまざまな効果が期待される大麻由来成分のことだ。2025年にはCBD市場は世界で数百億ドル規模になるとされ、ゴールドラッシュになぞらえ、「グリーンラッシュ」とも呼ばれる大麻特需が起きている。そして日本にもその波はすでに来ているのだ――。(ダイヤモンド編集部 相馬留美) 「グリーンラッシュ」、すなわち大麻特需が世界に爆速的に拡大中だ。大麻といえば、マリファナなど精神作用があるイメージが強い。だが、精神作用がなく安全性が高いといわれる大麻由来成分「CBD」のビジネスが盛んだ。鎮静作用などさまざまな効果を持つという研究が進んでおり、海外では薬品だけでなく、食品や化粧品、ペット用品まで製品化が進んでいる。 その市場規模は2025年には数百億ドルとなるとされ、投資家も注目している。しかも日本にもグリーンラッシュ到来の予兆があり、虎視眈々とチャンスをうかがっている人々がいるのだ。特集「グリーンラッシュがやってくる」は、初回の11月11日(月)から15日(金)まで、全5回の連載を予定している。 #1 11月11日(月)配信 「大麻」に群がる企業たち、ビールからペット用品まで! 大麻といえば覚醒剤に並ぶ日本の違法薬物の代名詞だ。しかし海外では、医薬品をはじめ、食品や日用品など幅広い分野で、鎮痛作用などを伴う大麻由来成分を含んだ製品の販売が拡大している。そして日本でも、すでに大麻由来成分を含んだ製品を手に入れることができるのだ。 >>記事はこちら #2 11月12日(火)配信 大麻が含む夢の成分「CBD」の効果とは?気になる法制度も解説 世界を席巻する「グリーンラッシュ」。大麻に含まれるCBDは、なぜそこまで人々を魅了しているのだろうか。大麻の基礎知識から、CBDの効果・効能、日本におけるCBDに関する法律や制度まで、徹底解説する。 >>記事はこちら(11月12日〈火〉配信) #3 11月13日(水)配信 日本でも「大麻ビジネス」合法化の予兆、総合商社も舌なめずり 今年10月、CBDを冠した大学教授のセミナーには300人近い聴講者が集まった。会場に詰め掛けたのは、CBDビジネスを行っている事業者だけではなく、官僚、大手メーカーや総合商社の関係者の姿もあったようだ。日本にもグリーンラッシュの波は確実にやって来ている。 >>記事はこちら(11月13日〈水〉配信) #4 11月14日(木)配信 大麻ビジネスも「ガラパゴス化」に陥った日本の残念な現状 CBDビジネスが盛り上がりを見せる一方で、違法なCBD製品が日本国内で発覚したケースはすでに存在している。なぜそんなことが起きたのか。なぜ税関を通り抜けることができたのか。制度も法も追い付いていない日本はグリーンラッシュとどう向き合えばいいのか。 >>記事はこちら(11月14日〈木〉配信) #5 11月15日(金)配信 大麻由来成分の国内販売製品を抜き打ちチェック!違法性は大丈夫? Photo:ZUMA Press/アフロ 11月15日に配信予定だった「#5 大麻由来成分の国内販売製品を抜き打ちチェック!違法性は大丈夫?」は、データ取得の見通しが立たなくなったため、配信を中止させていただきます。ご愛読いただいている皆様にご迷惑をおかけし、重ねてお詫び申し上げます。 Banner designed by Kaoru Kurata
{ "pile_set_name": "OpenWebText2" }
A formal enantioselective acetate Mannich reaction: the nitro functional group as a traceless agent for activation and enantiocontrol in the synthesis of beta-amino acids. A two-step procedure involving the enantioselective addition of alpha-nitro esters to imines, followed by reductive denitration, provides a convenient new enantioselective synthesis of beta-amino acids. Specifically, beta-phenyl alanine derivatives with up to 98% ee are formed in good yield (64-88%) over two steps. The utility of the approach is demonstrated through the first enantioselective synthesis of the key beta-amino acid of (+)-chaenorhine.
{ "pile_set_name": "PubMed Abstracts" }
You are here Yamaha Motif Rack It seems simple enough — take the successful Motif workstation, remove the keyboard, and release it as a more affordable rack unit. But there's lots more to the Motif Rack than meets the eye... As the owner of a studio best described as compact and bijou, I have always applauded the practice of repackaging synthesizers and other keyboard instruments into space-saving rack modules — and latterly, zero-mass software! In many cases, it can be some time after the release of the original keyboard version until the rack module makes an appearance — time enough for the manufacturer to gauge the success of the original instrument, and thus infer a viable market for a module. Yamaha claim on their web site that a modular version of the Motif has been their most-requested product — so, one-and-a-half years after the release of the acclaimed Motif 6, 7 and 8 workstations, the Motif Rack is born. The Motif 7 was reviewed in depth by Derek Johnson and Debbie Poyser in SOS September 2001, so I recommend referring to this for a detailed description of the Motif synthesis engine and other features. The Motif Rack can essentially be described as 'the sound of the Motif in a box' — however, there are some significant functional and feature differences between the keyboard and rack versions. The Motif Rack is a 1U rack, measuring 35cm in depth. The front silver-and-blue liveried panel hosts the 20 buttons, rotary encoder dial and 160x64 backlit LCD display that control the synth within. A master volume control, headphone socket and power switch complete the line-up. Round the back we find the usual wall-wart power connection and MIDI In/Out/Thru. There are six analogue outputs (a stereo Master plus four assignables), S/PDIF and optical digital outputs as standard, and a USB connector. Anyone familiar with the numerous controls on the Motif keyboards may be wondering how on earth all of its features can be condensed down to 20 buttons and a dial. Obviously the control faders and knobs of the keyboard are absent, as are the (redundant) master keyboard controls. Two other principal features of the keyboard versions are also missing from the Motif Rack. Firstly, the Motif Rack has no onboard sampling, nor is there any facility for importing samples — hence no internal sample RAM. Secondly, there is no onboard sequencer — the Motif Rack is purely a tone generator. The Motif synth engine has nevertheless not been compromised in any way as a result of these omissions — if anything, it has been given a shot of steroids The basic Voice structure remains the same — AWM2 (ie. sample-based) waveforms, four AWM2 elements per Voice with subtractive synthesis, each element having ADDSR envelopes for Amp, and HADDSRs for both Filter and Pitch, 20 filter types (six low-pass filters, two high-pass filters, four band-pass filters, one notch filter — or band-elimination filter, as it is called here — and seven dual filters) and one LFO. The major enhancement here is a polyphony of 128 voices, as opposed to the Motif's 62. The effects have also been upgraded to Business Class; the Global effects now boast eight new reverb algorithms (totalling 20) and there are 44 chorus options, which include a selection of 25 reverb/delays and 19 chorus-type effects (see the 'Rack Vs Keyboard Versions' box below). The two Insert effects have also had a makeover — each Insert now has a range of 107 effects to choose from, whereas the Motif had 25 for Insert 1 and 104 for Insert 2. The number of Preset Voices has been upped from three banks to five — each with 128 Presets, totalling 640. There are now two user-programmable banks of 128 instead of one, and even the outputs have been augmented to a total of six — one master stereo pair and four assignables. Due to the absence of an onboard sequencer, the Motif Keyboards' Performance and sequencer Song modes are now represented on the Motif Rack by a Multi mode. This actually handles both of the latter modes in one. You can either dial up a Multi directly from the User bank, or you can access a preset 'library' of Multis. On the review model, this library contains 124 configurations, arranged into two Banks. Bank 1 consists of 59 Performance-type Multis — ie. up to four velocity and keyrange-scaleable parts, all receiving on one fixed MIDI channel, thus making complex layered sounds, some with a drum groove at the lower end of the keyboard overlapping with a pad in the middle and a lead sound at the top. Bank 2 contains 65 Multi-type presets, or 16-part multitimbral configurations, for use with a sequencer. Setups for a variety of musical genres are available here; if you wish, you can simply select the library preset closest to your requirements, then copy it to the temporary buffer. From here you can edit it out of all recognition if you desire, then save it to the Multi User bank. The Arpeggiator remains basically the same as on the original Motif, save for the absence of a User bank — so no bespoke patterns can be created. Nevertheless, fans of Philip Glass will have a whale of a time with the 256 patterns on offer — especially the chordal types. There are various ways to manipulate the patterns; notes can be sorted in the order in which they are played, key velocity can be acknowledged or ignored, and key and velocity ranges can be set. The velocity range is especially useful — if you set the arpeggiator to engage above a certain point, say velocity 120, then any notes played below that threshold will play the voice as normal. In this way you could play an acoustic guitar melody, then hit a chord hard for an instant flamenco flourish — olé! Unlike the Motif, the Motif Rack transmits its arpeggiations from the MIDI Out port, enabling you to arpeggiate any external synth, or to record the arpeggios into a sequencer. My only wish would be that you could have more than one instance of the arpeggiator in a Multi — unfortunately it can only be assigned to one Part, but this is exactly when the ability to record the arpeggio's output to a sequencer should come in very handy indeed. Although the Motif Rack lacks the sampler functions of the keyboard Motifs, it still retains the option to install plug-in boards from Yamaha's PLG range. These plug-ins offer different types of synthesis — analogue modelling, FM and acoustic physical modelling, for example. Not only do they add a complete new instrument to the Motif Rack, they also add their own polyphony and effects — meaning the Motif Rack's own engine is augmented, not compromised. See the 'Plug-In Boards' box for a list of the boards currently suitable for the Motif Rack. Whereas the keyboard Motifs can accommodate three such plug-in boards, the Motif Rack can only take two, due to the obvious size restrictions. The Presets for these boards are already in the Motif Rack's OS, so the sounds are ready to roll from the moment you install a board. The Motif Rack ships with a CD containing audio demos of the PLG plug-ins, plus various application softwares. As well as the requisite Yamaha USB drivers, there are various voice editors — Voice Editor for Motif Rack, editors for each of the PLG plug-ins, and a sequencer, SQ01. Of these, the voice editor and SQ01 sequencer are of particular interest here. The Motif Rack's 160x64 display and 20 buttons, while not too painfully minimalist, are about as economical as they could be without being obstructive. The software editor therefore comes as a welcome bonus, and it was a simple matter to install the USB drivers and software. The voice editor is well-thought-out and very intuitive, making deep-level voice-editing of Motif Rack sounds a relative doddle. Sadly you cannot edit Multis in this program, which means you must endure a certain amount of cursoring and dialling. Nevertheless, you can download the entire voice contents of the Motif Rack to your computer, edit and rearrange the voices, save them, edit effects and so on. There's also an integral librarian function, so all your sounds can be archived to your hard drive. SQ01 deserves a special mention too — it is a fully functional MIDI + Audio sequencer, and while it may not exactly be Sonar or Cubase SX, I was surprised at the extent of the facilities it offers for a free program. Certainly it would be a great help for anyone starting out on a limited budget who wants to get into some serious Motif Rack action while waiting for the funds to accrue towards a sequencer upgrade. The bad news is that SQ01 is only available for Windows... For a 1U rack, the Motif Rack offers a decent number of outputs (one main stereo pair plus four mono assignable outs), plus the MIDI and USB connectors.Photo: Mark Ewing Editing without the software editor can be fairly slow — there's a lot of cursoring to be done, and the rotary dial can sometimes be annoyingly slow when going from one parameter extreme to the other. An Undo facility would help when you're experimenting with values — my dialling finger would certainly agree. Some voice parameters are perhaps not as detailed as on other synths — others more so. For example, each element has only one LFO, with a choice of only three waveforms, and the LFO delay time is combined into one parameter with the fade-in time. By comparison, Roland's XV synth tones have two LFOs, each with 11 waveforms, separate LFO delay and fade, and four fade modes. That said, the Motif Rack voice has 20 filter types as opposed to the Roland's six, not to mention a global Common LFO that enjoys 13 waveforms, and the Motif's amplifier and filter keyboard scaling is blessed with four adjustable breakpoints — very nice — in contrast to the Roland's linear slope. There are a few other editing issues: there is no means of editing two or more elements simultaneously, and you can't copy the settings of one element to another within the Temp Edit buffer. This is true even when editing from your computer. You can copy elements from already saved voices, but each time you want to copy an element, you have to save the sound you're editing before you've finished, which isn't too sensible. In Multi mode, you can make some basic 'offset' type edits to voices while they are in situ within the Multi, but you don't have access to fully detailed, individual element parameters. The amount of reverb and chorus applied to a Voice is global — in other words, there is no individual send level for each Voice element. Although up to four Insert effects can be used per Multi, they must have been programmed into the relevant Voices first. While this is not as flexible as on some other synths, the quality of the effects is consistently first class. One disturbing thing came to light whilst constructing a test multitimbral piece in Sonar — the Motif Rack exhibited some conspicuous timing problems when playing a simple six-part tune. Initially, I thought it was due to the Motif being sluggish to respond over its MIDI ports, but the problem persisted, even when I banished MIDI in favour of the USB port. Loading the same song into SQ01 produced the same timing errors. In order to confirm there was no problem within the sequencers, I copied the drum part to an adjacent track, and routed it to a completely different synth module. This played the drum part back perfectly in time — while the duplicate Motif Rack drum part stumbled conspicuously, and was noticeably late in triggering. In order to get some idea of exactly how much, I recorded an audio snippet of the twin drum parts and inspected the waveform at a high zoom factor. The results showed an average discrepancy of around 1800 samples — ie. 40 milliseconds at 44.1kHz sample rate (the sequence was at 86bpm). Mindful of the fact that sequencers prioritise the scanning of tracks in numerical order (the Motif drums were on track 10, according to their default MIDI channel) I moved both drum tracks to the top of the track list. The problem was slightly ameliorated, but there was still a distinct flamming between the part from the Motif and the one from the other module, more than would otherwise be expected from 'normal' MIDI-timing discrepancies. This time, the delay measured on average 400 samples, which translates into around nine milliseconds — better, but still perceptable. This is a potentially serious problem for a multitimbral synth. As a performance synth, the Motif Rack is a fine-sounding machine, made all the more attractive by the option to add plug-in synth boards. The sounds it produces cover a vast palette of musical genres, and are well-suited to meet the increasing demand for an all-purpose synth that can tackle pretty much any style of music. However, as a multitimbral workstation module, the Motif Rack fared less well at the time of this review due to the timing problems reported above. Yamaha were made aware of this problem, and at the time of going to press were trying to nail it down and see if it was something that could be resolved with a software upgrade, as opposed to a more serious hardware-based problem. Depending on what they find, UK customers may have the benefit, as the Motif Rack was about to start shipping in the UK when Yamaha found out about the problem, and the release has been delayed at the time of writing. As we went to press, Yamaha had the following to say on the subject: "To date, we're unaware of any problematic issues relating to Motif Rack, however thanks to the diligence of the Sound On Sound team we're taking steps to fully investigate this situation, and will be able to respond shortly. Unfortunately, because of the deadlines involved with this issue, we cannot make a full statement, but will of course do so before the product ships within the UK market. For any updates and news, please keep an eye on the SOS web site, where you'll be the first to hear the latest." I really do like the Motif Rack as a synth, so the altruist in me feels compelled to find some way to make it workable as it is. If you used the Motif Rack as your sole sound source, and adopted the practice of assigning any timing-critical parts to the lowest possible track numbers (ie. to the top of the list) then the timing issues might be considered negligible. However, I'm duty-bound to point out that the discrepancies begin to show up when the Motif Rack is part of a larger MIDI setup, in which context it is, after all, likely to be used — so this is clearly an issue which has to be resolved at the earliest opportunity. Taking the optimistic view that a solution is possible, I'll round up by saying that, given the choice of similarly priced (and cheaper) alternatives now available in the sample-based, multitimbral synth module arena, it is the additional sonic potential of those plug-in boards that is most likely to sway potential buyers in favour of the Motif Rack. Since Yamaha have been championing the mLAN cause by fitting the Motif 6/7/8 with a slot for an optional mLAN8E board, it's interesting to note that they have omitted this option from the Motif Rack — especially in view of the recent launch at Frankfurt of the mLAN-equipped 01X Production Studio. As we know, mLAN is supposed to be able to cope with many hundreds of MIDI channels and up to 128 channels of audio down one cable, and while this may be more relevant to the Motif 6/7/8 (with its integrated sampling sequencer), surely it would also be a useful feature on the Motif Rack? Particularly since the 01X can also function not only as an audio mixer but as a complete MIDI control surface — which could naturally be used to extend the performance potential of the Motif Rack. At present, it's not too clear when or whether other manufacturers will embrace mLAN (much less stick to the same set of rules...), so maybe Yamaha are biding their time until they release the next incarnation of the Motif. Extended polyphony and improved range of effects over Motif keyboards. Arpeggiator outputs over MIDI. cons Button-intensive editing without the software editor. Slightly inflexible effects deployment. Some worrying timing problems in multitimbral use at the time of review. summary The essential sound of the keyboard Motifs in a 1U rack, with enhancements. The absence of the sampler and sequencer facilities are made up for with a doubling of polyphony, more effects and outputs, extra preset and user banks, arpeggiator output over MIDI and an excellent (if PC-only...) software sequencer. However, at the time of writing, the Motif Rack is compromised when operating multitimbrally, and this must be addressed before it can be considered a practical alternative to the Motif keyboard.
{ "pile_set_name": "Pile-CC" }
Background I began to learn to program in my 6th-grade year of elementary school. I’m currently in my final year of high school, so that puts my programming career at around 6 years, but programming has always been nothing more than a hobby until recently. My first programming language was Visual Basic. Not the nice VB.NET, but the ugly VB4. I then moved between many BASIC based languages until I found VB.NET, finally. It was amazing. I shortly moved to C# with around 1 year of programming experience in. From here, I’ve continued using C# along with some other languages on the side. I then got into OS development and learned x86 assembly and C on bare bones. Then I lost that craze and moved to Rust about 5 months ago. After I started experimenting with Rust I was hooked. From then on, Rust has been my language of choice along with C# for my class in game development I take as an elective in school. The Rusty Hook That Reeled Me In Although I didn’t start writing this blog when I started writing in Rust, I remember clearly why I started writing in Rust. From what I had been doing in C#, none of it utilized multiple threads. Multi-threaded programming had always been a sore topic for me. Things like thread synchronization and message passing never really made sense to me. I learned Rust mainly due to its promises for ease of programming for multiple threads. Once hearing that things like parts of Firefox were written using it, and the Mozilla themselves were very strongly invested in Rust, I had more reason to start writing in it. I’d assume that if Mozilla were to invest so much in a programming language, it must have some sort of benefits over your usual C and C++ programming languages. Even further than that, I’ve heard of some game studios adopting Rust in their games and I was pretty much hooked at that point. First Impressions My first impressions of Rust and my first times using it to write things like “Hello World” and some more complicated versions of “Hello World” which I usually do which include things like Fizz-buzz and even a Chip-8 emulator, I was so pleasantly surprised with how easy it was to use. I forgot at a lot of times that this was a fully compiled language with no sort of garbage collection or anything. It was so easy to not really worry about when things were being destroyed. I was able to reap the benefits of ease of use of a garbage collected language like C# and the performance boosts of languages like C++ and C. Also, the really nice struct system of Rust and their system of inheritance called Traits was a very nice addition. It felt a lot like C# Interfaces. Their strong standard library made it easy to jump right in with things like vectors which felt much like C#’s lists. Of course, much like other beginners, I fought and fought with the borrow checker, but unlike most beginners which usually go towards things like Rc or Arc, I instead tried to change my program logic to follow the borrow checker much more. The compile-time errors helped a lot for showing me why the borrow checker was getting angry at me and was very invaluable in helping me understand exactly how the borrow checker worked. I felt that experimenting with what things the borrow checker would allow and what things it wouldn’t allow were the best way for me to learn how to use it. Programming Style Changes Because of Rust’s borrow checker, it forces a programmer to think differently. Although most of the time, you don’t have to worry about when values are being thrown away or when they drop out of scope, you do need to worry about when the value is being used and what’s using it. Learning how to deal with this has completely changed how I program in most cases. Thinking about things in a more data-oriented fashion instead of nice faces to hide ugly code, which C# really does best (whether that’s a compliment or an insult to the language is up to you to decide), is one of the most important changes that Rust has done to me. It’s helped me in my C# programming in not only cleaning up my code but also with performance issues I used to have with my C# programs, especially when working with Unity, where sharing data between different objects could cause performance hits like nobody’s business. Thinking about which data objects hold and which data other objects may use is usually an object-oriented way of thinking, but Rust makes you think about this in a more open manner. Instead of using things like accessors, setting the field to public was usually a better idea most of the time. Rust is very good at deciding on which fields of a struct are borrowed and which aren’t, and using something like an accessor would just cause the full struct to be borrowed, and when you’re trying to use different data from the same struct which is completely borrowed when you’re only getting one bit of data is just an all around bad experience in Rust. The fact that Rust makes things difficult to do is a good thing to me. It’s forced me to become a better programmer. Overall Ease-of-Use as A Programming Language The overall ease of use of Rust was a large selling point for me when starting and is a big selling point for when I’m trying to get other people to begin to learn Rust. Although the borrow checker is admittedly annoying and frustrating at first, it’s saved me from a lot of different situations such as use after frees and similar data associated programming errors. The struct system is extremely easy to use and intuitive. The standard library makes many things which are daunting in languages like C seem like a piece of cake. Things like list and hash maps are amazing in Rust and I’ve never had any hard times using them as I have with C. Their error system of Options and Results are invaluable to me. They’re a godsend compared to things like implementing exceptions in C#. The enum system of Rust is something I wish every language had. I find that whenever I’m working in C# in Unity, I wish I had the Rust enum system. The ability to associate data with their variant in an enum is something which took me a while to start to use, but once I did, I haven’t been able to live without it. Although I still cannot say how hard or easy Rust is for multi-threaded loads because, ironically enough, I still haven’t written any multi-threaded code for it, I have heard many a soul praising a crate called “rayon” for easy multithreading, and reading their documentation on how to use the crate, I would agree from the surface view. Along with the multithreading parts of Rust, there are many parts of the language which I haven’t used, not because I don’t find them to be good parts of the language, but because I haven’t had the need to use them yet. Things like closures and the unsafe side of Rust are just not necessary for the things that I write, but I know of many projects which gladly use them and usually praise their usefulness when they are needed (especially closures). The Not-So-Rusty Rust Ecosystem The Rust ecosystem is an ecosystem which rivals any sort of other programming languages I’ve used. Their packaging system, Cargo, has been the easiest packaging system I’ve ever used. It’s been easier than even npm and pip. Adding a dependency, or crate as it’s called in Rust terms, to your program is as easy as adding a line to a file. The crates which that crate depends on is managed automatically by Cargo and you’ll never have to worry about version conflicts. If one crate is needed by two crates that you have as dependencies in your program, but each crate requires a different version of that one crate, Cargo automatically downloads their respective versions and compiles them without you having to lift a finger. Although the collection of crates is small compared to the number of libraries available for languages like C or C++ (especially in the graphics side of things), the ecosystem is still young, and I personally see many new crates being released daily. The community is very learner friendly, and although its enthusiasm about the Rust language is a bit excessive sometimes, that enthusiasm gets channeled back into a love for the language and the enthusiasm shows in how helpful it can be to not only learners of the language, but people who have been using the language for years. Conclusion My experience with Rust has been, for the most part, extremely positive. Although there have been some walls in learning it like the borrow checker and their Trait system, I’ve learned a lot which has helped me grow not only as a Rust user but as a programmer in general. Rust has been a great language to work with and I hope to use it for years to come. I strongly recommend you go take a look at their website. You can also interact with the Rust community at the fourms or at the subreddit.
{ "pile_set_name": "OpenWebText2" }
Cyberpunk 2077 will have multiplayer, but CD Projekt Red has been keeping the feature pretty close to its chest. In a recent investor call, however, president Adam Kiciński did briefly touch on the subject of monetisation, though without giving very much away. "As far as the monetisation on the multiplayer for Cyberpunk is concerned, we believe right now it's definitely too early to share any details on that," he told investors. "The project is in a relatively early stage. We keep experimenting—this is our first multiplayer game, and we check different options and possibilities, and it's definitely not the time to point you to a certain specific direction on that." "Monetisation" is pretty broad. CD Projekt Red previously swore off microtransactions, but that still leaves the door open to multiplayer DLC and other methods of parting players from their cash. Investors were assured that the developer wouldn't change its policy on deals with players, and that the monetisation would be "wise" and good value for money. While Kiciński said Cyberpunk 2077's multiplayer was a first for the studio, that honour actually goes to Gwent, which seems to have been forgotten. It does contain microtransactions, but unlike Cyberpunk 2077 it's a free-to-play game, so the monetisation model is likely to be very different. Cyberpunk 2077 is now in the final stretch, according to its financial results, shared in a video above. It's set to release on April 16, 2020, but the multiplayer won't appear until all of the free DLC has already launched, giving CD Projekt Red more time to figure out its approach.
{ "pile_set_name": "OpenWebText2" }
Tumour micrometastases: the influence of angiogenesis. Many cancer patients have undetected micrometastatic disease at first presentation which ultimately progresses. Angiogenesis-the development of an independent blood supply-is a key event in the growth of metastases. Improved understanding of the influence of angiogenesis on micrometastatic growth may lead to new therapeutic intervention. This study examines current concepts of the significance of micrometastases and the role of angiogenesis in their development and destruction. A comprehensive review of the literature on micrometastasis and angiogenesis was performed using the Medline database between 1966 and 1999. Advances in technology have improved our ability to diagnose metastatic disease, but micrometastases in loco-regional lymph nodes and at distant sites can only be detected by sophisticated histological techniques. While the significance of micrometastases remains controversial, there is increasing evidence that micrometastatic status provides useful prognostic information and should be part of standard staging techniques. Anti-angiogenic therapy has the potential to favourably influence management of certain cancers by manipulating a number of key events in the metastatic process.
{ "pile_set_name": "PubMed Abstracts" }
Q: Sorting HealthKit data by date I'm trying to get pulse data from HealthKit and sort them by date for use in a line chart. I'm running a 'for loop' to get the correct dates and put the results in an array before putting the results in the chart but it seems like they get put in a random order and I don't understand why. class Pulse { var pulse = 0.0 var startDate = Date() } var pulseData: [Pulse] = [] func getHeartBeatsForAWeek() { for i in 1...7 { getHeartBeats(startDate: date.getStartOfSpecificDateByAddingToToday(day: -i), endDate: date.getStartOfSpecificDateByAddingToToday(day: -i + 1)) } } func getHeartBeats(startDate: Date, endDate: Date) { PulseHelper.shared.averageHearthRate(startDate: startDate, endDate: endDate) { (data) in DispatchQueue.main.async { self.pulseData.append(data) self.updateGraph() } } } Here is my function for fetching the heart rate: func averageHearthRate(startDate: Date, endDate: Date, completion: @escaping (Pulse) -> Void) { let typeHeart = HKQuantityType.quantityType(forIdentifier: .heartRate) let startDate = startDate let endDate = endDate let predicate: NSPredicate? = HKQuery.predicateForSamples(withStart: startDate, end: endDate, options: HKQueryOptions.strictEndDate) let query = HKStatisticsQuery(quantityType: typeHeart!, quantitySamplePredicate: predicate, options: .discreteAverage, completionHandler: {(query: HKStatisticsQuery, result: HKStatistics?, error: Error?) -> Void in DispatchQueue.main.async(execute: {() -> Void in let quantity: HKQuantity? = result?.averageQuantity() let beats: Double? = quantity?.doubleValue(for: HKUnit.count().unitDivided(by: HKUnit.minute())) print("Got: \(String(format: "%.f", beats!)) from \(startDate)") let pulse = Pulse.init() pulse.pulse = beats! pulse.startDate = startDate completion(pulse) }) }) PermissionsHelper.shared.store.execute(query) } This is what I get when I print the results: Got: 82 from 2019-03-30 23:00:00 +0000 Got: 74 from 2019-03-31 22:00:00 +0000 Got: 73 from 2019-03-25 23:00:00 +0000 Got: 74 from 2019-03-27 23:00:00 +0000 Got: 70 from 2019-03-26 23:00:00 +0000 Got: 74 from 2019-03-29 23:00:00 +0000 Got: 108 from 2019-03-28 23:00:00 +0000 I'd like them to get in correct order. A: Just after adding an element to your array, you need to use the sort() function. Here you can find the documentation about all the ways you can implement it. In this situation, if pulseData is an array of Date ( [Date] ), you just need to call: self.pulseData.sort() EDIT: As you could see in the link to documentation I posted, there are several ways to use the sort() function in order to apply your sorting rule to a custom object. In this situation, let's assume you have this class: class Pulse { var pulse: Double = 0.0 var startDate = Date() init(p: Double,d: Date) { self.pulse = p self.startDate = d } } Create an array of Pulse objects: let pulse1 = Pulse(p: .., d: Date(...)) let pulse2 = Pulse(p: .., d: Date(...)) var pulseData: [Pulse] = [pulse1, pulse2] You can sort the array in this way: //Ascending order pulseData.sort(by: {$0.startDate < $1.startDate})
{ "pile_set_name": "StackExchange" }
Sundby Church Sundby Church (Danish: Sundby Kirke) is a Church of Denmark parish church located on Amagerbrogade in Copenhagen, Denmark. Completed in 1870 to designs by Hans Jørgen Holm, it is the oldest church on the northern part of Amager. History In the middle of the 19th century, Sundby still belonged to the parish of Tårnby but the old village church there was located almost five kilometres away. A local committee was therefore established in 1868 to raise money for the construction of a new church, charging the architect Hans Jørgen Holm with its design. Construction began in 1869 and the new church was consecrated in 1870. Nathanael's Parish was disjoined from Sundby Parish in 1899. The church was refurbished by Frederik Zeuthen and Cai Bertelsen in 1963. Architecture The church has a cruciform plan and is built in red brick to a Neo-Romanseque design. The roof is topped by an octagonal flèche. The chancel faces north-east. Decorations include corner leseness and round arched friezes on the gables. A porch was built at the nave's south-west gable in 1941. Its tympanum and bronze door were designed by the artist Max Andersen. The bronze door was installed in 1974 to mark the 100th anniversary of the church. The tympanum's relief is identical to the one above the entrance of Absalon Church on Sønder Boulevard. The six reliefs on the bronze door show scenes associated with the Passion of Christ. Interior Sundby Cemetery Sundby Cemetery (Danish: Sundby Kirkegård) was established in 1872 at a site a little to the south of the church and is the main cemetery for Amager. It consists of an old and a modern section, located on either side of Kastrupvej, with a combined area of 10 hectares. The old section will be decommissioned in 2020. References External links Official website Concerts in the church Category:Lutheran churches in Copenhagen Category:Churches completed in 1870 Category:1870 establishments in Denmark
{ "pile_set_name": "Wikipedia (en)" }
Smoke billows following a reported air strike by Syrian government forces in the rebel-held parts of Jobar in Damascus, Syria on August 9, 2017. Islamic State's days of territorial gains and military wins in Iraq and Syria might be over as the last vestiges of territory are won back from the self- proclaimed caliphate, but international experts are warning that any hopes that the group is gone and forgotten are premature and misguided. The U.K.'s minister of state for the Middle East and North Africa said Thursday that even as ISIS crumbles, its influence remains strong. "There's no doubt that the threat to us all continues to grow," Alastair Burt said Thursday, speaking at a counterterrorism conference hosted by U.K.-based defense and security think tank, the Royal United Services Institute (RUSI). "Even as we see Daesh (ISIS) push back on the physical battlefield, we know that they will continue to pose a threat in the region. We also know that the battle of ideas is far from won, Daesh is still capable of inspiring people to carry out attacks in its name and, as such, it remains a serious global threat," he said. "We've seen tragic evidence of this on the continent, in the U.S. and here in the U.K., with five deadly terrorist attacks this year alone," he added. Gilles de Kerchove, the EU's counter-terrorism coordinator, agreed that the violent terror group was likely to be defeated soon but the reasons for its creation, which go back into the early 2000s but evolved to counter Syrian President Bashar Assad's regime in recent years, had not been addressed. "If we don't address the grievances which led to the creation of Daesh - Sunni grievances against sectarian Shia policies – and state violence from Assad, we're likely to see the resurgence of something that could be Daesh 2.0," De Kerchove told the RUSI conference. Not gone, and not forgotten The so-called Islamic State is largely made up of Sunni militants from Iraq and Syria but has drawn jihadi fighters from across the Muslim world and Europe. There is increasingly positive noise that the group, which has controlled swathes of Iraq and Syria amid governmental and regional instability, is soon to be defeated. Syrian and Iraqi government forces and disparate rebel groups, particularly in Syria, have fought to reclaim territories lost to ISIS over the last few years as it attempted to spread a caliphate – a state governed by a strict interpretation of Islam. The tide has turned more strongly against ISIS this year, however, with the group losing Raqqa (in Syria), Mosul (in Iraq) and numerous other strongholds to such an extent that . He thanked those who had fought against ISIS in Syria and Iraq for helping to "put an end to a group that did not bring anything for us but evil, misery, destruction, murder and savagery." In addition, on Thursday, Iraqi forces launched an operation to clear the desert bordering Syria of Islamic State militants, calling it a final campaign to clear the group from Iraqi territory. Iraqi Prime Minister Haider al-Abadi was cautious earlier this week, saying he'd only declare that ISIS had been defeated once its militants were dispelled from the desert. Shiraz Maher, deputy director of The International Centre for the Study of Radicalisation and Political Violence (ICSR) at King's College London, had a similar view. "I don't think we're anywhere near looking at an after-Daesh reality. Daesh is here, it's very much remaining as a player on the ground," he told the RUSI conference. "It is now reverting to type – this was a group that emerged from being insurgency to a protest state and it's now pulling back to what it knows best. It will slip back into the deserts ready to regroup, to return and to fight another day," he said. Sleeper cells With martyrdom a key factor of Islamic State's jihadist ideology (drawing on the concept of a "holy war"), many of the group's fighters are expected to die in the last battles for territorial control. Some, however, are expected to go underground and reconvene in so-called "sleeper cells" in their countries of origin, although the number of both cells and returning fighters is unknown. The EU's De Kerchove said that he expected a "trickle" of ISIS fighters flowing back to Europe and that there were still "cells" already within the continent. "For those who do return we need to spot them at the border," he said. Hopes of ISIS' defeat have risen after the Syrian army and its allies took control of Abu Kamal (also known as Al-Bukamal), the last significant stronghold of Islamic State in Syria. The loss of Abu Kamal leaves the group with only a handful locations in the country, a far cry from 2014 when the terrorist network controlled swathes of Iraq and Syria. Since then there has been a concerted global push to demolish the militant group, which has inspired and claimed responsibility for numerous deadly terrorist attacks around the world. Islamic State's towns and territories have been bombarded by a U.S.-led coalition of Western allies overseeing airstrikes but ground forces made up of rival bands of fighters and militias have done a large part of the hard work in routing out ISIS forces from towns and cities across Syria and Iraq. That's not to say that those forces have been a coherent body, with the battle sometimes seeming of secondary importance to rebel groups and regional powers vying for power, influence and territory. Indeed, the battle against Islamic State quickly became a complex web of rival rebel groups and international powers with shifting allegiances making it far from clear cut. While some rebel groups and their international backers are loyal to controversial Syrian President Assad (such as Russia and Iran and mainly Shia Muslim militias) others would prefer to see him removed from power. This particularly applies to the U.S.-led coalition as well as Saudi Arabia, Turkey and other Sunni Muslim countries that have backed a range of rebel groups, some of whom have been fighting both Assad troops and Islamic State. To complicate matters further, Syrian Kurds who have declared an autonomous region in the north of the country also entered the fray and have been widely regarded as one of the most effective fighting forces against ISIS. However, Turkey (which is located to the north of Syria) and the Kurds have a long-standing history of hostility and Turkish forces have been accused of attacking Kurdish anti-ISIS forces just as much as ISIS itself in a bid to stop the Kurds gaining territory at its border. As it stands, Syria is largely divided into four camps of government-controlled areas, rebel-controlled areas, ISIS-controlled areas (albeit a quickly dwindling area) and a Kurdish-controlled area. Crumbling, but still deadly Despite the complexities and mixed motives, a combined push against Islamic State has made the pseudo-state crumble, according to the statistics. IHS Markit's specialist research unit, Jane's Terrorism and Insurgency Centre (JTIC), released a report Wednesday underlining the "extent of the degradation of the Islamic State's armed campaign in the country (Iraq)" with the number of attacks and resultant fatalities hitting the lowest level since ISIS declared a caliphate in 2014.
{ "pile_set_name": "OpenWebText2" }
Maternal satisfaction with active management of labor: a randomized controlled trial. Active management of labor reduces the length of labor and rate of prolonged labor, but its effect on satisfaction with care, within a randomized controlled trial, has not previously been reported. The study objectives were to establish if a policy of active management of labor affected any aspect of maternal satisfaction, and to determine the independent explanatory variables for satisfaction with labor care in a low-risk nulliparous obstetric population. Nulliparous women at National Women's Hospital in Auckland, New Zealand, in spontaneous labor at term with singleton pregnancy, cephalic presentation, and without fetal distress were randomized after the onset of labor to active management (n = 320) or routine care (n = 331). Active management included early amniotomy, two-hourly vaginal assessments, and early use of high dose oxytocin for slow progress in labor. Routine care was not prespecified. Maternal satisfaction with labor care was assessed by postal questionnaire at 6 weeks postpartum. Sensitivity analyses were performed, and logistic regression models were developed to determine independent explanatory variables for satisfaction. Of the 651 women randomized in the trial, 482 (74%) returned the questionnaires. Satisfaction with labor care was high (77%) and did not significantly differ by treatment group. This finding was stable when sensitivity analysis was performed. The first logistic regression model found independent associations between satisfaction and adequate pain relief, one-to-one midwifery care, adequate information and explanations by staff, accurate expectation of length of labor, not having a postpartum hemorrhage, and fewer than three vaginal examinations during labor. The second model found fewer than three vaginal examinations and one-to-one midwifery care as significant explanatory variables for satisfaction with labor care. Active management did not adversely affect women's satisfaction with labor and delivery care in this trial. Future studies should concentrate on measurement of potential predictors before and during labor.
{ "pile_set_name": "PubMed Abstracts" }
Occasional bird treats award your conure with extra attention, and birds quickly learn that a between-meal snack is a fun treat. We offer vegetable or fruit snacks, treat jars, the latest fortified commercial snacks, and much more at reasonable prices you expect from Drs. Foster and Smith. For finches, we recom... Read more Occasional bird treats award your conure with extra attention, and birds quickly learn that a between-meal snack is a fun treat. We offer vegetable or fruit snacks, treat jars, the latest fortified commercial snacks, and much more at reasonable prices you expect from Drs. Foster and Smith. Description: Made from fortified, nutritious ingredients specifically for your parakeetAttached hanger allows you to easily hang the treat in your bird's cage 3 different waysA fun to eat way to add variety and activity to your parakeet's diet Made in ...
{ "pile_set_name": "Pile-CC" }
Q: Not able to append command line variable in shell script Here is my code: export ALLOW_RPM_UPGRADE=True path='/opt/rpm/latest/' echo $1 file=$1 echo $file dest=${path}${file} echo $dest cp $source $dest Problem: The three echo statements are printing the same value. The third one is not appending path to $dest variable. A: This is because I had created shell script on windows machine. Before executing it on linux we need to covert it through DOS2Unix utility. OR Just create shell script on Linux and save. After this it is working fine. Thanks
{ "pile_set_name": "StackExchange" }
Q: Read multiple files in Hive table by date range Let's imagine I store one file per day in a format: /path/to/files/2016/07/31.csv /path/to/files/2016/08/01.csv /path/to/files/2016/08/02.csv How can I read the files in a single Hive table for a given date range (for example from 2016-06-04 to 2016-08-03)? A: Assuming every files follow the same schema, I would then suggest that you store the files with the following naming convention : /path/to/files/dt=2016-07-31/data.csv /path/to/files/dt=2016-08-01/data.csv /path/to/files/dt=2016-08-02/data.csv You could then create an external table partitioned by dt and pointing to the location /path/to/files/ CREATE EXTERNAL TABLE yourtable(id int, value int) PARTITIONED BY (dt string) ROW FORMAT DELIMITED FIELDS TERMINATED BY ',' LOCATION '/path/to/files/' If you have several partitions and don't want to write alter table yourtable add partition ... queries for each one, you can simply use the repair command that will automatically add partitions. msck repair table yourtable You can then simply select data within a date range by specifying the partition range SELECT * FROM yourtable WHERE dt BETWEEN '2016-06-04' and '2016-08-03'
{ "pile_set_name": "StackExchange" }
Eulamprotes atrella Eulamprotes atrella, the two-spotted neb, is a moth of the family Gelechiidae. It was described by Michael Denis and Ignaz Schiffermüller in 1775. It is found from most of Europe, east to Japan. The habitat consists of mixed deciduous woodlands. The wingspan is 10.8–13 mm. The forewings are brilliantly brownish fuscous, with a yellow blotch on the costa at the apical one-third and also on the tornus. The hindwings are greyish fuscous. Adults are on wing from May to August in one generation per year. The larvae feed on Hypericum species, including Hypericum maculatum. They feed internally in the stems and shoots. Pupation takes place in a case made from part of a leaf. References Category:Moths described in 1775 Category:Eulamprotes
{ "pile_set_name": "Wikipedia (en)" }
Full text search with Sygic Mobile SDK Written by RS 20. 04. 2017 · 1 min read Today we are going to take a look at another great thing about upcoming Sygic Mobile SDK and it is called Full text Autocomplete Search. Full text search Autocomplete Part of Sygic’s Mobile SDK is super-fast customizable Full text Autocomplete Search engine. One of its advantages is searching POIs in categories, supporting also searching by postal codes. Search is also completely capable to work with misspellings. Speed The main asset of Full text search is its speed, while results are displaying in matter of milliseconds. The more misspellings are in input, the long search it takes. Intelligent Search Full text search considers language localization of the name in the map and also language of user. It gives you results based on your actual position as well. For example, if you type in simple “pizza Paris”, you get all possible pizza restaurants around. It helps you to effectively browse objects around you moreover you can easily add your custom data to already existing ones
{ "pile_set_name": "Pile-CC" }
All relevant data are within the paper and its Supporting Information files. Introduction {#sec005} ============ Globally, an estimated 225 million women have unmet need for family planning \[[@pone.0153907.ref001]\]. Increasing acceptance and use of family planning requires more than increasing access to health services: truly effective family planning programs must address the social and gender norms that present critical barriers to sexual and reproductive health. Use of family planning is powerfully shaped by social norms, including perceived acceptability of family planning, social pressure for large families, and perceived opposition to family planning by religious and community leaders and spouses \[[@pone.0153907.ref002]\]. Rigid gender roles and unequal power between men and women inhibit couple communication and joint decision-making about family planning: power dynamics in couples have been found to influence the use of family planning and other health services \[[@pone.0153907.ref003]--[@pone.0153907.ref005]\]. Fear of and experience with intimate partner violence or gender-based violence are barriers to contraceptive use \[[@pone.0153907.ref006]--[@pone.0153907.ref009]\]. Women who report intimate partner violence are at higher risk for unintended pregnancy than women who do not report violence \[[@pone.0153907.ref008]\]. Analyses of data from Demographic and Health Surveys (DHS) in a number of African countries suggest that key dimensions of gender equity and women's empowerment---including equitable beliefs about gender roles, women's ability to negotiate sexual activity, and women's control over household economic decision-making---are associated with higher contraceptive use \[[@pone.0153907.ref010]\]. Several studies have also found a positive association between spousal communication and the use of contraception \[[@pone.0153907.ref011]--[@pone.0153907.ref014]\]. Despite evidence demonstrating the important relationships between gender, women's empowerment, and family planning, there is little consensus about how to best measure these complex social constructs. Researchers have attempted to measure specific domains of women's empowerment, and several scales have been developed including measures of mobility \[[@pone.0153907.ref015]\], power in relationships \[[@pone.0153907.ref003]\], gender norms and decision-making autonomy \[[@pone.0153907.ref016]\], control over assets \[[@pone.0153907.ref017]\], and social capital \[[@pone.0153907.ref018],[@pone.0153907.ref019]\]. The lack of a standard set of widely used measures for women's empowerment, however, hampers our ability to compare program effects across studies, populations, and cultural contexts. The objective of the research described in this article was to evaluate the impact of a CARE intervention that catalyzed community-level dialogue about gender, sexuality, and family planning on household-level gender dynamics and reported use of family planning among men and women in Kenya. For this evaluation, we used several scales from WE-MEASR (Women's Empowerment-Multidimensional Evaluation of Agency, Social Capital, and Relations) (see [S1 File](#pone.0153907.s001){ref-type="supplementary-material"}), a new tool that CARE developed following multi-year research into the effects and impact of our women's empowerment programming \[[@pone.0153907.ref020]\]. Methodology {#sec006} =========== Study Setting {#sec007} ------------- According to the 2008--09 Kenya DHS, approximately one in four women has an unmet need for family planning \[[@pone.0153907.ref021]\]. A 2013 analysis of DHS data found that Kenyan women who do not use family planning report method-related concerns, especially fear of harmful side effects, as the most common reason for non-use (43%); opposition to family planning (both the perceived religious prohibition of family planning and opposition by husbands/partners) is the second most commonly cited reason (16%) \[[@pone.0153907.ref022]\]. CARE conducted the research described here as part of the Family Planning Results Initiative (FPRI), which we implemented in Siaya County, Nyanza province, Kenya from July 2009 through December 2012. The majority of the county's population of 842,304 is under 30 years old, and 46.1% are between 0 and 14 years of age \[[@pone.0153907.ref023]\]. Over 90% of Siaya County is rural and, like the rest of Nyanza, falls behind the national average on various indicators of development, gender inequality, poverty, education, and health, including infant and under-five mortality, antenatal care coverage, and HIV prevalence \[[@pone.0153907.ref021]\]. The contraceptive prevalence rate among married women in Nyanza province is among the lowest in Kenya: 37.3% of women use any method (compared to 45.5% nationally), and only 32.9% use a modern method (39.4% nationally) \[[@pone.0153907.ref021]\]. The Intervention {#sec008} ---------------- CARE used its *Social Analysis and Action* approach \[[@pone.0153907.ref024]\] to shape FPRI's central intervention about 150 community-based facilitators were trained and held ongoing community dialogues about gender, sexuality, and family planning over three and a half years (July 2009-December 2012). At any one time, an average of 65 facilitators were actively convening dialogues. Monthly planning meetings were held to plan activities and ensure adequate location coverage and topic variation over the entire study area. On a quarterly basis, CARE observed and provided feedback on dialogues and completed progress reviews with facilitators. Based on our monitoring data, CARE organized 759 dialogues between July 2009 and December 2012. Dialogues were held in a variety of venues and were promoted by community leaders or organized around pre-scheduled community meetings. Based on proximity to a respective venue, they were attended by participants from several villages, and, many times, were included in villages' development plans. The dialogues were designed to normalize communication about sensitive topics like gender norms and FP, and to catalyze participants' critical analysis of how gender norms and dynamics restrict family planning acceptability and use. During dialogues, community leaders and satisfied family planning users acted as role models and overtly expressed support for family planning, equitable gender norms, open communication and shared decision-making regarding family planning between spouses. Trained, community-based facilitators convened dialogues in an array of settings, such as markets, churches, women's groups and village meetings. Local theatre groups often performed during the dialogues. Facilitators included community health care workers, religious leaders, local government officials, and teachers. CARE provided ongoing support to facilitators in the form of training and supervision, and also provided transport reimbursement and lunch/refreshments on days when dialogues or trainings were conducted; no incentives were provided for participation in intervention activities to any other community members. All of CARE's activities were coordinated with the District Health Medical Team (DHMT.) During the intervention period, the DHMT coordinated several interventions designed to increase availability and access to contraceptives, including in-service training for providers, strengthening of systems for ordering contraceptives, and some community outreach activities (FP counseling and method provision). To our knowledge, no other similar FP dialogue interventions or activities were implemented by other organizations during the intervention period. Theory of Change {#sec009} ---------------- The intervention aimed to challenge and shift key community norms about gender dynamics and family planning, with the ultimate goal of creating a social environment that is more supportive of equitable gender relations and the use of family planning. Our research goals were to determine whether and how the ongoing dialogues shifted social norms, and whether and how these shifts at the community level influenced communication, decision-making, and family planning use at the couple or household level. Our theorized pathway of change is shown in [Fig 1](#pone.0153907.g001){ref-type="fig"}. ![CARE's Family Planning Results Initiative Theory of Change.\ This theory of change illustrates, from left to right, the activities undertaken as part of CARE's Family Planning Results Initiative, the expected intermediate outcomes that will lead to improvements in three key determinants of family planning which, ultimately, increase use of family planning in the intervention community.](pone.0153907.g001){#pone.0153907.g001} Evaluation Design {#sec010} ----------------- We used both qualitative and quantitative methods to evaluate the intervention. At baseline (February 2009) and again at endline (December 2012), we conducted household surveys to collect data about men and women's socio-demographic characteristics, pregnancy intentions, family planning knowledge, beliefs, attitudes, and use. At endline only, we measured key gender-related beliefs and behaviors and exposure to the intervention, which enabled us to determine whether these were important predictors of family planning use. Also at endline, we conducted in-depth, qualitative interviews with purposively selected couples from the intervention area (described below) to explore changes in communication, decision-making, and gender roles over the previous four years and to identify specific enablers and barriers to family planning use. Ethics Statement {#sec011} ---------------- CARE obtained approval to conduct this research from the Institutional Research and Ethics Committee at Moi University in Eldoret, Kenya. Quantitative Data Collection {#sec012} ---------------------------- Through independent, cross-sectional household surveys, married men (20--49 years) and women (18--45 years) were interviewed by trained interviewers using standardized questionnaires at baseline and endline. Although the two samples were entirely independent (no attempt was made at endline to include or exclude respondents who participated at baseline), both were drawn from the same Siaya county using an identical two-stage cluster sampling approach. Separately at baseline and endline, thirty sub-counties were randomly selected from Siaya's 130 sub-counties, and 60 villages were randomly selected from this sub-set of sub-counties (2 villages from each sub-county,). Households were then randomly selected for interviews using a systematic approach, selecting every 3^rd^ household for women and every 5^th^ household for men. Respondents were eligible for interview if they were married or in union and of reproductive age, as defined above. If household member listing revealed more than one woman/man meeting the eligibility criteria, one interviewee was randomly selected in each household. A total of 1,240 women (n = 650 at baseline, n = 590 at endline) and 590 men (n = 305 baseline, n = 285 endline) completed interviews. Data were double-entered and cleaned by trained clerks under the supervision of a data manager. Qualitative Data Collection {#sec013} --------------------------- To further explicate the quantitative findings, we used qualitative methods to explore gender dynamics and influences on family planning use at the couple level. Data were collected using face-to-face, in-depth interviews, and a visual timeline tool to elicit relationship histories and to explore changes in communication, decision-making, and gender roles during the previous four years. FPRI project staff identified men and women from married couples in the intervention county, and conducted interviews until saturation on key themes was reached (n = 10 couples). In each couple, one or both partners were between the ages of 18 and 49 and had participated in a minimum of three intervention dialogues between 2009 and 2012. Interviews were conducted separately with the man and woman of each couple; each was interviewed by a trained, gender-matched interviewer in the Luo language. Interviews were recorded, detailed notes were taken by a trained observer during the interview, and recordings were used to transcribe, review, and confirm completeness and accuracy of notes. To help ensure data integrity, interviewers completed written summaries on the same day as data collection. Two senior researchers confirmed completeness and clarity of notes from each interview. Narratives from each of the men's and women's interviews were then analyzed and triangulated to create a narrative summary of each couple's relationship and history of family planning use. After each couples' story was analyzed, content analysis was conducted across all narrative summaries to identify key themes related to the theory of change. Quantitative Measures {#sec014} --------------------- ### Family Planning Measures (baseline and endline) {#sec015} At both baseline and endline, men and women were asked identical questions about family planning knowledge, beliefs, attitudes, and use in order to measure changes in family planning over time (see [S2 File](#pone.0153907.s002){ref-type="supplementary-material"}). ### Family Planning Knowledge, Beliefs and Attitudes (Independent Variables) {#sec016} Men and women were asked to report the total number of family planning methods known, and if they knew where to obtain a method of family planning. Beliefs about family planning were measured using a 4-item index, in which men and women reported whether they disagreed (scored as 1), were unsure (scored as 2), or agreed (scored as 3) with four common family planning-related myths. The index score range is 4--12, and a higher score indicates less accurate knowledge about family planning. An index assessed men's and women's approval of family planning use in 5 different circumstances, with each response scored as 1 if the respondent approves and 0 if he/she does not approve. The index was constructed by summing the item scores. The index score range is 1‐5, and a higher score indicates a higher level of approval for family planning. Men and women were also asked if they believed it was acceptable for women to use a family planning method without their partner/husbands' permission, and women (but not men) were asked if they believed they could suggest using a condom to their partner/husband. ### Family Planning Use (Dependent Variable) {#sec017} Men and women were asked if they or their spouse had ever used a method to avoid or delay pregnancy; those who answered 'yes' were asked to list all the methods they had ever used. Men and women were also asked if they or their spouse were currently using a method to avoid or delay pregnancy; those who answered 'yes' were asked to list all the methods they were currently using. These data were used to create two dependent variables: *current use of any contraceptive method* and *current use of a modern contraceptive method* (oral contraceptives, male/female condoms, vasectomy and tubal ligation, intrauterine device, injectable contraception, hormonal implants). ### Exposure, Pregnancy Intentions and Gender Measures (Endline only) {#sec018} In order to measure key predictors of family planning use, at endline we asked men and women questions about their exposure to the intervention as well as their pregnancy intentions. We also used several indices and scales from CARE's WE-MEASR tool to measure key dimensions of gender equity and women's empowerment in the endline survey: men's belief in traditional gender roles (asked of men only), self-efficacy to use family planning (asked of women only), spousal communication and women's decision-making power (asked of both sexes). The WE-MEASR scales used in the evaluation were tested and confirmed to be statistically reliable for use with both men and women in this sample. ### Exposure to the intervention {#sec019} We asked men and women about their exposure to the intervention between 2009 and 2012. To ensure that reported exposure did represent participation in the intervention, FPRI managers suggested unique indicators of exposure, including a mix of dialogue topics unique to the intervention. The three exposure variables were: exposure to any dialogues (yes/no), the number of topics exposed to during the dialogues (\#), and exposure to dialogues specifically focused on family planning (yes/no). ### Pregnancy intentions {#sec020} At endline, we asked men and women whether they would like to have a child/another child, no more children, could not become pregnant, or were unsure. Those who reported wanting another child or being unsure were asked if they would like to get pregnant in the next 12 months, after 1--2 years, after more than 3 years or don't know. Men and women who did not want to have children or were not able to have children (due to sterilization or infertility) were not asked this question. Women/couples who were currently pregnant were also asked if they wanted to have another child after the child they were expecting now, wanted no more children or were unsure. Those who reported wanting another child or being unsure were asked how long they wanted to wait to have another child: within 12 months of the birth of the child they were expecting now, after 1--2 years, after more than 3 years, or don't know. ### Men's beliefs about gender (men only) {#sec021} We used a 9-item scale to measure how much men agreed or disagreed with statements about the roles and entitlements of men and women. We used a 5-point Likert scale, where Strongly Agree = 5, Agree = 4, Neither Agree Nor Disagree = 3, Disagree = 2, and Strongly Disagree = 1. The scale score was the sum of item scores divided by the number of items. The scale score range was 1‐5, and a higher scale score indicated a higher support for traditional gender roles (male dominance). Scale reliability in this sample was good (Chronbach's alpha = .66). ### Spousal communication (men and women) {#sec022} We used a 5-item scale with both men and women to measure interspousal communication across a range of topics. Men and women were asked to report how often they communicated about: what had happened during their day, their worries and fears, their household finances, their fertility intentions/desired family size, and use of family planning. We used a 5‐point Likert scale, where Always = 5, Often = 4, Sometimes = 3, Seldom = 2 and Never = 1. The scale score was the sum of item scores divided by the number of items. The scale score range was 1‐5, and a higher scale score indicated a higher level of interspousal communication. Scale reliability for both samples was good (men: Chronbach's alpha = .63; women: Chronbach's alpha = .75). ### Women's decision-making power (men and women) {#sec023} We measured women's decision-making power in the household by asking both men and women who usually made a range of key household decisions. The scale was not intended to measure a woman's decision‐making power over a specific kind of decision (e.g. household finances), but rather measure a woman's influence over a range of key decisions that affect her life. We used slightly different scales for men and women, as detailed below. We used a 12-item scale to ask women who usually made decisions about her health care, large household purchases, household purchases for daily needs, when she will visit family/relatives/friends, when the whole household will visit family/relatives/friends, how to use the money she brings into the household, how to use the money her spouse brings into the household, when to sell a large asset (e.g. cow), when to sell a small asset (e.g. chicken), whether she can work to earn money, when she and her husband have sex, and whether the woman and her husband use family planning. Item response options included: wife alone, wife and husband together, husband alone, mother‐ or father‐in‐law, someone else, and mother or father. Responses of wife alone or wife and husband together were scored as a 2 and all other responses were scored as a 1. The scale score was the sum of item scores divided by the number of items. The scale score range was 1‐2, and a higher scale score indicated women's self-perceived higher decision-making power. Reliability of this scale for women was good (Chronbach's alpha = .74). With men, we used a similar, 10-item scale that included all items described above, except whether women can work to earn money and who makes decisions about women's health care, The scale score range was 1‐2, and a higher scale score indicated men's perceptions of women's higher decision-making power. The reliability of this scale for men was also good (Chronbach's alpha = .79). ### Women's self-efficacy to use family planning (women only) {#sec024} We used a 4-item scale to measure women's self-efficacy. Women were asked how much they agreed or disagreed with four statements about how sure they felt that they could: discuss family planning with their husband, tell their husband they wanted to use family planning, use family planning, and use family planning without their spouses' approval. We assessed responses based on a 5‐point Likert scale, where Completely Sure = 5, Somewhat Sure = 4, Neither Sure/Unsure = 3, Somewhat Unsure = 2, and Not at all Sure = 1. The scale score was the sum of item scores divided by the number of items. The scale score range was 1‐5, and a higher scale score indicated higher self‐efficacy to discuss and use family planning. We found this to be a reliable scale (Chronbach's alpha = .75). Analyzing Changes in Family Planning Use {#sec025} ---------------------------------------- Sample characteristics were compared between baseline and endline using chi-squared tests for proportions and t-tests for means. We found several significant differences in the characteristics of the samples drawn at baseline and endline, and therefore used propensity scores to establish comparable samples at the two time points. Propensity scoring is a method of matching that uses available information on the characteristics of the study population to establish, in our case, matched pairs of baseline and endline survey respondents. To derive the propensity score used for matching, logistic regression models with survey round (endline vs. baseline) as the primary outcome variable were estimated separately for men and women using the following covariates: respondent's age, age difference between respondent and partner, number of living children, education, partner's education, whether the respondent works for cash, whether the woman makes decisions regarding use of any cash earned, pregnancy intentions, the number of family planning methods known, the summed score on the index assessing family planning beliefs, and the summed score on index assessing approval of family planning use. Only in the estimation models for men, we included knowledge of where to obtain family planning and score on a scale assessing beliefs about gender roles; and, only for women, we included the score on a family planning self-efficacy scale and a variable to assess whether they believed they could suggest the use of condoms to their partners. The predicted probabilities of being interviewed at endline vs. baseline from the models served as propensity scores, and the scores were then used with Stata's psmatch2 command to examine the average difference in family planning use (any family planning method and modern family planning methods) between baseline and endline. After assessing the use of different propensity score matching techniques, we chose kernel matching due to its efficiency. Only propensity score values included in the common support region (the area in which the distribution of propensity scores for being interviewed at endline overlapped with the distribution of propensity scores for being interviewed at baseline) were used in the analysis. This excluded respondents who were least likely to produce a reliable baseline-endline match based on the observed characteristics, specifically, 35 of 1,240 women and 12 of 590 men in our samples. Characteristics of the study population before and after propensity score matching were assessed to ensure that the data were fully balanced with respect to the covariates used to derive the propensity scores. Analyzing Predictors of Family Planning Use at Endline {#sec026} ------------------------------------------------------ To explore associations between exposure to the intervention and use of family planning at endline, we used the endline survey data and fitted separate logistic regression models for two key family planning outcomes: current use of any family planning method and current use of a modern family planning method. The key exposure covariates of interest used in three separate models were: exposure to the intervention (yes/no), the number of discussion topics exposed to during the intervention, and exposure to family planning discussions during the intervention (yes/no). Our multivariate models also explored the associations between current use of family planning (any and modern methods) and other key potential predictors of family planning use, including: childbearing intentions, family planning knowledge and beliefs, men's belief in traditional gender roles, men's and women's reports of spousal communication, men's and women's reports about women's household decision-making power, and women's self-efficacy to use family planning. The multivariate analysis controlled for several background factors, including age of respondent (less than 25 years, 25--29 years, 30--34 years, 35 years or older), years of school completed by respondent and by partner, religion (Protestant, Catholic, or other), and number of living children. We also included a variable measuring difference in spousal age (0--5 years, 5--9 years, 10--14 years, and more than 15 years' difference) which we hypothesized might magnify decision-making power differences between spouses. Analyses were conducted using Stata version 12.0. Results {#sec027} ======= Quantitative Results {#sec028} -------------------- ### Characteristics of Survey Sample {#sec029} [Table 1](#pone.0153907.t001){ref-type="table"} summarizes characteristics of the survey samples. A total of 1,240 women aged 15--45 (n = 650 at baseline, n = 590 at endline) and 590 men aged 18--49 (n = 305 baseline, n = 285 endline) completed interviews. At baseline, 55.6% of women interviewed were under the age of 29, as were 63.9% of women interviewed at endline. By contrast, only 34.7% of men at baseline and 44.9% of men at endline were under the age of 29. Most respondents did not report a large age difference between them and their spouses: 71.1% of women at baseline and 64.9% of women at endline reported age differences of fewer than 10 years. 10.1371/journal.pone.0153907.t001 ###### Sample characteristics. ![](pone.0153907.t001){#pone.0153907.t001g} Characteristics Women Men -------------------------------------------------------------------------------------------------- ------------ ------------ --------- -------------- -------------- --------- **Socio-demographic** Age (years; %) \<25 34.5 34.8 \<0.001 13.1 17.9 0.042 25--29 21.1 29.1 21.6 27.0 30--34 17.9 19.0 21.3 21.8 ≥35 26.6 16.4 43.9 33.3 Age difference between male and female partners (years; %)[^c^](#t001fn003){ref-type="table-fn"} \<5 30.3 31.0 0.030 41.0 41.4 0.962 5--9 40.8 33.9 38.4 39.7 10--14 18.9 21.0 14.4 13.3 ≥15 10.0 14.1 6.2 5.6 Number of living children Mean (std dev)[^d^](#t001fn004){ref-type="table-fn"} 3.5 (2.1) 3.3 (1.9) 0.025 3.4 (2.2) 2.8 (2.0) 0.001 Religion (%) Protestant 52.3 48.8 0.107 51.5 49.5 0.750 Catholic 27.1 25.6 30.5 31.9 Other 19.2 24.8 16.1 17.5 None/missing 1.4 0.9 2.0 1.1 Education (years) Mean (std dev) 7.0 (3.0) 8.2 (3.0) \<0.001 8.0 (3.2) 8.9 (3.4) \<0.001 Partner education (years) Mean (std dev) 8.4 (2.9) 9.1 (3.3) \<0.001 7.2 (2.9) 8.3 (2.8) \<0.001 Works outside home for cash (%) Yes 39.1 32.4 0.014 61.3 60.4 0.057 **Women's empowerment / Gender beliefs /Relationship with partner/pregnancy intentions** Woman makes decisions about spending the cash she earns (%) No cash earned 60.9 67.6 0.084 64.6 61.8 \<0.001 All cash 27.2 21.7 29.5 11.9 Some cash 10.6 9.8 5.9 16.5 Missing 1.2 0.9 0.0 9.8 Men's gender beliefs scale score[^e^](#t001fn005){ref-type="table-fn"} Mean (std dev) 2.0 (0.04) 2.0 (0.03) 0.820 Participation in household decision-making scale score[^f^](#t001fn006){ref-type="table-fn"} Mean (std dev) 1.6 (0.2) 1.6 (0.3) Inter-spousal communication scale[^g^](#t001fn007){ref-type="table-fn"} Mean (std dev) 2.9 (0.3) 3.4 (0.8) Pregnancy intentions (%) Wants pregnancy in next 12 months 30.1 35.1 0.001 60.0 64.2 0.026 Wants to delay pregnancy for ≥ 1 year 21.2 26.6 16.17 9.8 Wants no more children 23.9 21.7 4.3 8.4 Does not think about/not sure/not applicable 24.8 16.6 19.7 17.5 **Family planning knowledge/attitudes/subjective norms/ self-efficacy** Family planning beliefs score[^h^](#t001fn008){ref-type="table-fn"} Mean (std dev) 9.1 (1.6) 8.4 (1.9) \<0.001 8.8 (0.1) 8.4 (0.1) 0.005 \# methods known[^i^](#t001fn009){ref-type="table-fn"} Mean (std dev) 3.2 (1.3) 3.9 (1.5) \<0.001 3.4 (0.1) 3.4 (0.1) 0.784 Believe woman can use family planning w/o partner's permission (%) Agree 66.3 11.6 Believe woman can suggest use of condoms (%) Agree 19.4 15.4 0.067 Disagree/unsure 80.6 84.6 0.067 Score on family planning use approval questions[^j^](#t001fn010){ref-type="table-fn"} Mean (std dev) 11.1 (2.0) 11.9 (2.0) \<0.001 11.63 (0.12) 10.82 (0.10) \<0.001 Family planning self-efficacy scale score[^k^](#t001fn011){ref-type="table-fn"} Mean (std dev) 4.2 (1.0) Knows where to get family planning (%) Yes 45.4 **Exposure to intervention** Exposure to intervention, all topics (%) Yes 64.2 66.3 Number of topics exposed to during intervention Mean (std dev) 1.5 (1.5) 2.0 (1.8) Exposure to FP discussions during intervention (%) Yes 60.9 57.9 ^a^We restricted our sample to women aged 15--45 and men 18--49 in both survey rounds, in order to compare women and men of the same age range at the two time points. Thus, only 590 of the 617 women who completed surveys at endline were included in our analysis, and only 285 of the 302 men who completed surveys at endline were included in our analysis. Some information was collected only at endline ^b^Chi-squared tests used to compare percentages and t-tests used to compare means ^c^Difference between age of male and female partners ^d^Std dev: Standard deviation ^e^Range 1--3 ^f^Range 1--2 ^g^Range 1--5 ^h^Range 4--12 ^i^Range 1--12 ^j^Range 5--15 ^k^Range 1--5 Women reported completing fewer years of education than men at both time points, and endline samples comprised slightly more educated men and women. About half of men and women in both samples reported being Protestant. At both interview times, about a third of women and three fifths of men reported working outside the home for cash. Fewer men and women at endline than at baseline reported that women made decisions about the cash they earned: 28.4% vs 35.4%, respectively, among men and 31.6% vs 37.8%, respectively, among women. As measured at endline, men in this sample did not report strong support for traditional gender roles (mean score of 2.0 on a scale of 1--5, where 5 indicates stronger agreement with traditional gender roles). Both sexes reported that women had moderate to high household decision-making power (mean of 1.6 for both men and women on a scale ranging between 1 and 2, where a higher score indicates higher women's decision-making power). Also, men and women both reported moderate to high levels of spousal communication (mean for women 2.9, and for men, 3.4, on a scale of 1--5 where 5 indicates high levels of spousal communication.) At endline, only 11.6% of men as compared to 66.3% of women reported approving of women using family planning without their partners' permission. Very few women (15.4%) believed they could suggest the use of condoms to their husbands. Men and women also reported widely incongruent pregnancy intentions: 30.2% of women interviewed at baseline and 35.1% at endline reported wanting to get pregnant at the time of their last pregnancy, but 60.0% and 64.2% of men reported so at baseline and endline, respectively. Notably, over 20% of women at both time points reported wanting to limit childbearing compared to only 4.3% and 8.4% of men at baseline and endline, respectively. ### Changes in Family Planning Use from Baseline to Endline {#sec030} [Table 2](#pone.0153907.t002){ref-type="table"} shows unmatched and propensity score-matched differences in use of any and of modern methods of family planning between baseline and endline for men and women. Based on propensity score-matched results, 36.5% and 34.0% of women used any method and a modern method, respectively, at baseline, while 51.8% and 51.2%, respectively, did so at endline. Similarly, 33.7% and 27.9% of men used any method and a modern method, respectively, at baseline, and 53.8% and 52.2% did so, respectively, at endline. 10.1371/journal.pone.0153907.t002 ###### Changes in family planning use between baseline and endline. ![](pone.0153907.t002){#pone.0153907.t002g} Outcome Baseline (%) Endline (%) \% difference (std dev) ---------------------------------------------------------------- -------------- ------------- ------------------------- **Women** **Current use of any method** Unmatched 31.7 51.7 20.0 (2.7) Propensity score-matched[^a^](#t002fn001){ref-type="table-fn"} 36.5 51.8 15.3 (3.4) **Current use of modern methods** Unmatched 29.4 51.0 21.6 (2.7) Propensity score-matched 34.0 51.2 17.3 (3.2) **Men** **Current use of any method** Unmatched 29.5 54.0 24.5 (4.0) Propensity score-matched 33.7 53.8 20.1 (5.0) **Current use of modern methods** Unmatched 24.3 52.6 28.3 (3.9) Propensity score-matched 27.9 52.2 24.3 (4.8) ^a^Propensity scores (kernel matching technique) derived from logistic regression models with survey round (endline vs baseline) as outcome variable adjusted for the following covariates: respondent's age, age difference between respondent and his/her partner, number of living children, education, partner's education, whether the respondent works for cash, whether the woman makes decisions regarding spending of any cash earned, pregnancy intentions, the number of family planning methods known, the summed score on the index assessing family planning beliefs, the summed score on index assessing approval of family planning use, knowledge of where to obtain family planning (men only,) score on a scale assessing beliefs about gender roles (men only), score on family planning self-efficacy scale (women only) and whether they believed they could suggest the use of condoms to spouse (women only). At baseline, 19.5% of women in the sample were using injectables, 3.3% condoms, 2.9% oral contraceptives, 2.6% had a tubal ligation, 1.4% used implants or IUDs, and 2.0% traditional methods. Notably different at endline, 29.7% of women in the sample were using injectables, 8% used oral contraceptives and 6.8% condoms. Among men, 18.5% and 27.2% reported use of condoms at baseline and endline, respectively; while 4.7% and 3.7% reported that their partners used injectables and oral contraceptives at baseline, 18.3% and 10.4% did so, respectively, at endline (data not shown). ### Predictors of Family Planning at Endline {#sec031} Our fully adjusted regressions models identified significant associations between participation in the intervention and both current use of any method and current use of a modern method of family planning for women ([Table 3](#pone.0153907.t003){ref-type="table"}), but not for men ([Table 4](#pone.0153907.t004){ref-type="table"}). As expected, the strongest associations were found among women exposed to discussions specifically about family planning: these women were 1.78 times more likely to use any method or a modern method than women who were not exposed to these discussions. Yet exposure to any topic covered during the intervention increased the odds of women using any method of family planning by 62% and the odds of using a modern method by 60%. 10.1371/journal.pone.0153907.t003 ###### Key determinants of and use of family planning among women at endline. ![](pone.0153907.t003){#pone.0153907.t003g} Characteristics Current use any method Current use modern method --------------------------------------------------------------------------------------------------------------------------------- ----------------------------- ----------------------------- ----------------------------- ----------------------------- ----------------------------- ----------------------------- **Socio-demographic** Age (years; \<25 = ref) 25--29 **1.89 (1.15, 3.10)** **1.89 (1.15, 3.11)** **1.86 (1.13, 3.06)** **1.84 (1.12, 3.01)** **1.85 (1.13, 3.03)** **1.81 (1.11, 2.97)** 30--34 **1.82 (1.01, 3.27)** **1.80 (1.00, 3.24)** **1.83 (1.01, 3.29)** **1.87 (1.04, 3.34)** **1.86 (1.04, 3.33)** **1.88 (1.05, 3.37)** ≥35 0.79 (0.40, 1.57) 0.77 (0.39, 1.53) 0.78 (0.39, 1.56) 0.78 (0.39, 1.53) 0.76 (0.38, 1.50) 0.77 (0.39, 1.53) Age difference between partners (years; \<5 = ref)[^d^](#t003fn004){ref-type="table-fn"} 5--9 0.99 (0.62, 1.56) 1.02 (0.64, 1.62) 0.99 (0.62, 1.57) 0.91 (0.57, 1.44) 0.94 (0.59, 1.49) 0.91 (0.57, 1.43) 10--14 1.12 (0.65, 1.91) 1.13 (0.66, 1.93) 1.11 (0.65, 1.89) 1.10 (0.65, 1.88) 1.12 (0.66, 1.91) 1.09 (0.64, 1.86) ≥15 1.02 (0.56, 1.85) 1.02 (0.56, 1.86) 1.02 (0.56, 1.85) 1.00 (0.55, 1.81) 1.01 (0.56, 1.84) 1.00 (0.55, 1.82) Number of living children **1.21 (1.06, 1.37)** **1.21 (1.07, 1.38)** **1.20 (1.05, 1.36)** **1.20 (1.06, 1.36)** **1.21 (1.06, 1.37)** **1.19 (1.05, 1.36)** Religion (Christian Protestant = ref)[^e^](#t003fn005){ref-type="table-fn"} Catholic 0.89 (0.57, 1.30) 0.88 (0.56, 1.38) 0.90 (0.57, 1.41) 0.91 (0.58, 1.42) 0.90 (0.58, 1.41) 0.92 (0.59, 1.44) Other 0.88 (0.55, 1.42) 0.87 (0.54, 1.39) 0.90 (0.56, 1.44) 0.90 (0.57, 1.44) 0.89 (0.56, 1.42) 0.92 (0.57, 1.47) Education (years) 1.00 (0.94, 1.07) 1.00 (0.94, 1.07) 0.99 (0.93, 1.06) 0.99 (0.93, 1.06) 1.00 (0.93, 1.07) 0.99 (0.92, 1.06) Partner education (years) 1.05 (0.99, 1.12) 1.05 (0.98, 1.11) 1.05 (0.98,1.11) 1.04 (0.98, 1.11) 1.04 (0.98, 1.10) 1.04 (0.98, 1.10) **Women's empowerment / Gender beliefs /Relationship with partner/pregnancy intentions** Woman makes decisions about spending the cash she earns (women with no cash earned = ref)[^e^](#t003fn005){ref-type="table-fn"} All cash 1.46 (0.91, 2.33) 1.50 (0.93, 2.39) 1.49 (0.93, 2.38) **1.59 (1.00, 2.54)** **1.63 (1.02, 2.60)** **1.62 (1.02, 2.59)** Some cash 1.27 (0.67, 2.40) 1.22 (0.64, 2.31) 1.29 (0.68, 2.44) 1.24 (0.66, 2.32) 1.19 (0.63, 2.23) 1.26 (0.67, 2.36) Participation in household decision-making scale score 0.71 (0.28, 1.79) 0.72 (0.29, 1.79) 0.72 (0.29, 1.81) 0.66 (0.26, 1.63) 0.65 (0.26, 1.63) 0.66 (0.26, 1.65) Inter-spousal communication scale **1.32 (1.05, 1.65)** **1.30 (1.04, 1.63)** **1.30 (1.04, 1.64)** **1.30 (1.04, 1.63)** **1.29 (1.03, 1.61)** **1.29 (1.03, 1.61)** Pregnancy intentions (wants pregnancy in next 12 months at time of survey = ref) Wants to delay pregnancy for ≥ 1 year 0.91 (0.57, 1.47) 0.93 (0.58, 1.50) 0.90 (0.56, 1.45) 0.93 (0.58, 1.49) 0.95 (0.59, 1.52) 0.91 (0.57, 1.47) Wants no more children 0.98 (0.57, 1.67) 0.98 (0.57, 1.69) 0.96 (0.56, 1.66) 1.01 (0.59, 1.72) 1.01 (0.59, 1.72) 0.99 (0.58, 1.69) Has not thought about/not sure/not applicable 0.64 (0.37, 1.13) 0.62 (0.35, 1.09) 0.62 (0.35, 1.09) 0.66 (0.38, 1.15) 0.63 (0.36, 1.11) 0.63 (0.36, 1.10) **Family planning knowledge/attitudes/subjective norms self-efficacy** Family planning beliefs score 0.99 (0.90, 1.10) 0.99 (0.89, 1.09) 0.99 (0.90, 1.09) 0.98 (0.89, 1.09) 0.98 (0.89, 1.08) 0.98 (0.89, 1.08) \# methods known 1.10 (0.95, 1.26) 1.11 (0.96, 1.27) 1.09 (0.95, 1.26) 1.05 (0.91, 1.20) 1.06 (0.92, 1.21) 1.04 (0.91, 1.20) Woman can use family planning without partner's permission (no = ref) *1*.*48 (0*.*98*, *2*.*21)* *1*.*50 (0*.*99*, *2*.*25)* *1*.*50 (0*.*99*, *2*.*25)* *1*.*45 (0*.*97*, *2*.*18)* *1*.*48 (0*.*99*, *2*.*21)* *1*.*47 (0*.*98*, *2*.*21)* Woman can suggest use of condoms (disagree/unsure = ref) 0.96 (0.56, 1.65) 0.96 (0.56, 1.65) 1.00 (0.58, 1.72) 0.98 (0.57, 1.68) 0.97 (0.57, 1.67) 1.02 (0.59, 1.74) Score on family planning use approval questions 0.99 (0.89, 1.09) 0.99 (0.89, 1.09) 0.99 (0.89, 1.09) 0.99 (0.89, 1.09) 0.99 (0.89, 1.09) 0.99 (0.89, 1.09) Family planning self-efficacy scale score **1.39 (1.12, 1.73)** **1.40 (1.12, 1.74)** **1.36 (1.09, 1.69)** **1.39 (1.12, 1.72)** **1.39 (1.12, 1.72)** **1.35 (1.09, 1.68)** **Exposure to intervention** Exposure to intervention (no = ref) **1.62 (1.08, 2.41)** **1.60 (1.07, 2.38)** Number of topics exposed to during intervention **1.15 (1.02, 1.30)** **1.16 (1.02, 1.31)** Exposure to FP discussions during intervention (no = ref) **1.78 (1.20, 2.65)** **1.78 (1.20, 2.63)** ^a^ Models adjusted for all factors shown; Model I adjusted for exposure to the intervention (yes/no); Model II adjusted for the number of topics of exposure; Model III adjusted for exposure to FP discussions ^b^OR: Odds ratio: statistically significant ORs at p\<0.05 are shown in bold; statistically significant ORs at p\<0.10 are shown in italic. ^c^CI: Confidence Interval ^d^Difference between age of male and female partners ^e^Category for missing data indicator included in the model. 10.1371/journal.pone.0153907.t004 ###### Key determinants of FP use among men at endline. ![](pone.0153907.t004){#pone.0153907.t004g} Characteristics Current use any method Current use modern method -------------------------------------------------------------------------------------------------------------------------- ----------------------------- ----------------------------- ----------------------------- ----------------------- ----------------------- ----------------------- **Socio-demographic** Age (years; \<25 = ref) 25--29 0.56 (0.22, 1.41) 0.55 (0.22, 1.39) 0.56 (0.22, 1.42) 0.64 (0.26, 1.59) 0.63 (0.25, 1.57) 0.64 (0.26, 1.60) 30--34 0.87 (0.32, 2.34) 0.85 (0.31, 2.29) 0.88 (0.33, 2.36) 0.99 (0.37, 2.64) 0.97 (0.36, 2.59) 1.00 (0.37, 2.65) ≥35 0.82 (0.26, 2.63) 0.81 (0.26, 2.58) 0.83 (0.26, 2.65) 0.92 (0.29, 2.90) 0.92 (0.29, 2.87) 0.93 (0.30, 2.93) Age difference between partners (years; \<5 = ref)[^d^](#t004fn004){ref-type="table-fn"} 5--9 **2.72 (1.39, 5.32)** **2.79 (1.42, 5.49)** **2.71 (1.38, 4.31)** **2.62 (1.35, 4.10)** **2.68 (1.37, 4.22)** **2.62 (1.35, 4.09)** 10--14 **2.82 (1.06, 5.53)** **2.81 (1.05, 6.51)** **2.82 (1.05, 4.52)** 2.15 (0.82, 4.49) 2.13 (0.82, 4.57) 2.14 (0.82, 4.49) ≥15 2.32 (0.53, 6.04) 2.24 (0.52, 5.68) 2.21 (0.51, 5.51) 2.45 (0.57, 5.98) 2.38 (0.56, 5.90) 2.37 (0.55, 5.87) Number of living children 0.99 (0.82, 1.20) 0.99 (0.82, 1.20) 0.99 (0.82, 1.20) 1.00 (0.82, 1.20) 1.00 (0.82, 1.20) 1.00 (0.82, 1.21) Religion (Christian Protestant = ref)[^e^](#t004fn005){ref-type="table-fn"} Catholic 1.29 (0.66, 2.50) 1.29 (0.67, 2.51) 1.28 (0.66, 2.47) 1.27 (0.66, 2.45) 1.27 (0.66, 2.46) 1.25 (0.65, 2.41) Other 1.79 (0.80, 3.99) 1.88 (0.83, 3.22) 1.72 (0.80, 3.58) 1.49 (0.67, 3.30) 1.55 (0.70, 3.47) 1.48 (0.67, 3.27) Education (years) 1.04 (0.94, 1.16) 1.04 (0.94, 1.16) 1.04 (0.94, 1.16) 1.03 (0.92, 1.15) 1.03 (0.92, 1.15) 1.03 (0.92, 1.15) Partner education (years) *1*.*12 (0*.*98*, *1*.*29)* *1*.*13 (0*.*98*, *1*.*29)* *1*.*12 (0*.*98*, *1*.*28)* 1.12 (0.97, 1.28) 1.12 (0.98, 1.29) 1.11 (0.97, 1.28) Man works outside home for cash (no = ref) 1.64 (0.86, 3.13) 1.65 (0.86, 3.16) 1.65 (0.87, 3.15) 1.68 (0.89, 3.19) 1.69 (0.89, 3.21) 1.69 (0.89, 3.20) **Gender beliefs and roles /relationship with partner/pregnancy intentions** Woman makes decisions re spending cash she earns (women with no cash earned = ref)[^e^](#t004fn005){ref-type="table-fn"} All cash 1.85 (0.74, 4.34) 1.80 (0.72, 3.51) 1.83 (0.73, 3.59) 1.91 (0.77, 3.76) 1.87 (0.75, 3.33) 0.90 (0.76, 3.72) Some cash 1.02 (0.36, 2.87) 0.69 (0.27, 1.82) 0.72 (0.28, 1.89) 0.55 (0.21, 1.41) 0.54 (0.21, 1.40) 0.56 (0.22, 1.45) Male dominance scale score **0.55 (0.31, 0.98)** **0.52 (0.29, 0.94)** **0.54 (0.30, 0.97)** **0.57 (0.32, 1.00)** **0.55 (0.31, 0.98)** **0.57 (0.32, 1.00)** Participation in household decision-making scale score 1.69 (0.45, 3.38) 1.69 (0.45, 4.38) 1.71 (0.45, 4.04) 1.77 (0.47, 4.15 1.76 (0.47, 4.13) 1.78 (0.47, 4.18) Inter-spousal communication scale 1.08 (0.74, 1.59) 1.06 (0.72, 1.56) 1.08 (0.74, 1.59) 1.08 (0.74, 1.59) 1.07 (0.73, 1.56) 1.09 (0.74, 1.59) Pregnancy intentions (wants pregnancy in next 12 months at time of survey = ref) Wants to delay pregnancy for ≥ 1 year 1.63 (0.61, 3.35) 1.70 (0.63, 3.55) 1.58 (0.59, 3.26) 1.78 (0.67, 3.73) 1.85 (0.70, 3.90) 1.75 (0.66, 3.68) Wants no more children **3.19 (1.04, 6.74)** **3.34 (1.08, 7.27)** **3.30 (1.08, 7.10)** 2.58 (0.87, 5.43) 2.66 (0.89, 5.60) 2.64 (0.90, 5.60) Has not thought about/not sure/not applicable 0.97 (0.43, 2.19) 0.97 (0.43, 2.21) 0.96 (0.42, 2.18) 1.06 (0.47, 2.38) 1.06 (0.47, 2.40) 1.06 (0.47, 2.38) **Family planning knowledge/attitudes/subjective norms self-efficacy** Family planning beliefs score **1.16 (1.00, 1.36)** **1.17 (1.00, 1.36)** **1.16 (1.00, 1.36)** 1.13 (0.97, 1.31) 1.13 (0.97, 1.31) 1.12 (0.97, 1.31) \# methods known 1.02 (0.85, 1.23) 1.00 (0.82, 1.21) 1.01 (0.84, 1.22) 1.01 (0.84, 1.22) 0.99 (0.82, 1.20) 1.01 (0.84, 1.21) Woman can use family planning without partner's permission 1.48 (0.60, 3.63) 1.50 (0.61, 3.65) 1.43 (0.59, 3.46) 1.30 (0.52, 3.19) 1.31 (0.54, 3.18) 1.26 (0.52, 3.04) Score on family planning use approval questions **1.53 (1.25, 1.88)** **1.53 (1.25, 1.89)** **1.53 (1.24, 1.87)** **1.45 (1.19, 1.77)** **1.45 (1.19, 1.77)** **1.44 (1.18, 1.76)** Knows where to get family planning (no = ref) 0.34 (0.06, 1.85) 0.34 (0.06, 1.84) 0.34 (0.06, 1.86) 0.15 (0.02, 1.36) 0.15 (0.02, 1.35) 0.15 (0.02, 1.36) **Exposure to intervention** Exposure to intervention (no = ref) 1.26 (0.67, 2.40) 1.22 (0.65, 2.30) Number of topics of exposed to during intervention 1.12 (0.94, 1.33) 1.10 (0.93, 1.30) Exposure to family planning discussions during intervention (no = ref) 1.32 (0.72, 2.40) 1.23 (0.68, 2.23) ^a^ Models adjusted for all factors shown; Model I adjusted for exposure to the intervention (yes/no); Model II adjusted for the number of topics of exposure; Model III adjusted for exposure to FP discussions ^b^OR: Odds ratio: statistically significant ORs at p\<0.05 are shown in bold; statistically significant ORs at p\<0.10 are shown in italic. ^c^CI: Confidence interval ^d^Difference between age of male and female partners ^e^Category for missing data indicator included in the model We also found that women were significantly more likely to report use of any method or of a modern method of family planning if they reported more spousal communication and higher self-efficacy to use family planning. Reported control over their own cash earnings was significantly associated with women's use of modern methods. Beliefs that women can use family planning without their spouses' permission also appears to be positively associated with current use of any or of modern methods, but these associations were not statistically significant (at p\<0.05). Women's younger age and higher number of living children were also significant positive predictors of use of both any and modern family planning methods. As noted, none of the intervention exposure measures was significantly associated with men's reports of current use of any or modern methods of family planning. However, men were significantly more likely to use any or a modern method if they had higher approval scores for use of family planning. Further, for both any and modern methods, men who reported more traditional beliefs about gender roles were less likely to use family planning. Men who reported accurate knowledge about family planning were more likely to use modern methods, but this relationship was not statistically significant. Finally, men who reported that they did not want to have any more children were three times as likely to use any method as those who wanted a pregnancy in the future. Qualitative Results {#sec032} ------------------- ### Description of the Sample {#sec033} Data for this analysis were drawn from ten married couples. All couples were determined to be 'real' marriages or current unions based on the triangulation of key events and stories in the relationship histories from both partners. All couples reported living together in Siaya County during the intervention timeframe. At the time of data collection, couples had been married for between 5 and 32 years. Women were between the ages of 21 and 49 years; four were over the age of 35. Men's ages ranged between 23 and 68 years. Wives were younger than their husbands in all of the relationships, and in six of the 10 couples spouses were within 5 years of age of each other. All couples reported a pregnancy within the first two years of marriage, and at least half of the women reported becoming pregnant prior to marriage. Seven of the ten women interviewed reported having dropped out of school due to pregnancy, lack of school fees, or both. Women reported having between 2 and 5 living children, and one was pregnant at the time of the interview. All respondents reported using at least one method of family planning at some point during their marriage, including calendar, condoms, pills, IUD, injections, implants, and bilateral tubal ligation. Five women reported using a family planning method in secret at some point during their marriage. Two of the relationships were polygamous, and in five relationships the husband was known or suspected to have had sex with someone else during the marriage. There were no reports of wives having other sexual partners than their husbands during the marriage. All couples reported one or both partners having been tested for HIV. In five couples, one or both partners reported incidents of inter-partner violence, all of which involved husbands physically abusing their wives. There was variability in how couples were introduced to the intervention. In some cases, initial exposure occurred by accident (encountered a drama group performing in the community) and in others by invitation (a friend invited them to join a group for couples). Likewise, sometimes the husband participated in dialogues, sometimes the wife participated, and sometimes both husband and wife from the same couple participated in the same dialogues. Men and women from two of the couples interviewed reported actively sharing their stories about family planning during a dialogue convened through the intervention. ### Experience of Participation in the Intervention {#sec034} Several participants discussed attending dialogues about family planning at *barazzas* (community meetings) or events. > *"I was invited to these meetings by a friend*, *and during these meetings there were discussions about role-sharing at home and also \[use of\] family planning*!*"* Men and women reported learning about family planning in community dialogues. One woman recalled her husband's report upon returning from a *barazza*. > *"Today the discussion at the Chief's* barazza *was very heated*. *Imagine*, *we discussed about family chores and family planning*. *I have never known that family planning issues were real*.*"* The intervention offered exposure to discussion of the benefits of family planning: one woman recounted how her peers not only described, but provided 'living proof,' of positive experiences. Both men and women reported learning by contrasting real examples of health and economic stability between family planning users and non-users in the community. Others described feeling comfortable publicly sharing their own family planning stories when they perceived that the social environment was becoming more openly supportive of couples' use of family planning. One man, who had previously opposed family planning, described how learning of others' positive experiences dispelled his beliefs that it caused infertility and birth defects. Dialogues appear to have increased the acceptability of not only talking about, but also using family planning, especially when key opinion leaders (e.g. chiefs and religious leaders) both advocated for and modeled open communication with spouses and use of family planning. One woman described how community members openly supported others to use family planning during the dialogues; she and her husband reported that their ongoing involvement in dialogues about family planning and gender roles influenced how they communicated about these issues at home. ### Shifting Gender Norms {#sec035} Women described shifts towards more equitable household roles, with husbands beginning to help with household duties. Some men also described helping with chores that were traditionally considered 'women's work.' For example, one man spoke of learning the importance of sharing household responsibilities at a dialogue. He cited collecting firewood, going to the *posho* mill, cooking and fetching water as examples of things he now does. One woman relayed a story of how she and the children were shocked when, unprompted, her husband cooked for the family. She recalled her children telling her: > *"Mom*! *Guess what happened in our house today? Dad cooked us lunch!"* Some couples described starting to manage household budgets together and making more joint decisions about household purchases and assets. One woman said that one of the best moments of her marriage was when she and her husband "*made decisions together as man and wife*." Together, they decided to sell the scrap metal her husband had accumulated and bought a cow; when the cow was old enough, they sold it and bought materials for the new house they are now planning to build. One man said: > *"Before*, *what was ours was mine*. *Now*, *what's ours is ours*. *"* Despite such reported changes, both men and women stated that women still did the majority of household work, and that men maintained the majority of household decision-making power. ### Couple Communication {#sec036} Men and women reported more open and equitable communication about family planning. Several women who had previously used a method in secret reported less opposition towards family planning from their partners, and described how they now openly communicated and reached mutual agreement to use a method. One man reported that he reminded his wife to get regular injections and offered to accompany her to the clinic. Another man described extensive communication on selecting a family planning method: the couple jointly decided against oral contraceptives because of the need for daily adherence, and instead chose injectable contraception. Men reported that couple concordance about fertility intentions and desired family size helped them resist external pressure for large families. Previously, some women had experienced conflict about the ideal number of children and family planning use, including questioning and pressure from husbands about getting pregnant. Several men and women reported that improved communication with their spouses both decreased conflict about family planning and increased the "*love and harmony*" in their relationship overall. One woman cited her husband's support for family planning as an enabler for her use of family planning: it boosted her morale and brought harmony to her marriage. Previously she had used family planning without her husband's consent or knowledge, and this had contributed stress and conflict in the relationship. While women described the many benefits of having partner support for using family planning, including increased relationship harmony, they also discussed the critical importance of being able to independently access family planning methods when faced with partner opposition. One woman recalled using family planning without her husbands' permission as a time when she was able to control something about the relationship, and was happy to be free of worry that she would become pregnant. Another recalled that she had learned about family planning methods in the privacy of a health care facility, and started using a method in secret. Family planning use, she said, had helped ensure her children were adequately spaced and that she had children when she had the resources to support them, but she also described experiencing significant stress because her husband continued to pressure her for a baby and was suspicious when she did not get pregnant. She also spoke of the stress of managing side effects on her own. Subsequently, she and her husband came to agreement about the use of family planning, and she has recently switched to a more effective method with her husband's support. However, she stated that she would still be using a method in secret if her husband had not changed his attitude. She emphasized that her previous use of family planning had "*cost her harmony...but it was worth it*" to be able to control her fertility. Discussion {#sec037} ========== Our results suggest that an intervention that supports open and public dialogue about gender, sexuality, and family planning may increase use of family planning among couples in settings where the prevalence of use is relatively low. First, self-reported family planning use increased significantly for both women and men in our study samples between baseline and endline. Reports of family planning use by women at baseline closely matched use estimates for Nyanza Province in the 2008--2009 Kenya DHS \[[@pone.0153907.ref021]\]. In the analysis of endline data, use of family planning by women was significantly associated with participation in the intervention, particularly in specific dialogues on family planning. The intervention's effects were significant for use of both any and modern contraceptive methods and after adjusting for key socio-demographic factors. While similar interventions may have been implemented in similar settings, there are limited evaluation data of such interventions in the published literature. Yet, in line with results from our study, published evaluation data show positive effects of similar community-level interventions in addressing social factors and shifting social norms with regard to reproductive health issues. For example, in 2004, CARE implemented and evaluated a 3-year adolescent reproductive health project to address related behavior changes and local social norms in a rural district of the Republic of Georgia. Community engagement strategies included promoting community support for adolescent reproductive health and using \'Theatre for Development\' to promote community dialogue about social norms. Project evaluation data demonstrated improved knowledge, attitudes, behavior about FP and evidence of shifts in gender norms. \[[@pone.0153907.ref025]\] More recently, Campbell et al. explored pathways between community participation and HIV prevention, treatment and impact mitigation in Zimbabwe, reviewing six qualitative studies in Manicaland \[[@pone.0153907.ref026]\]. These found that community group membership is often associated with decreased HIV incidence and that participation in formal community groups and informal local networks provides opportunities for critical dialogue about HIV/AIDS, often facilitating renegotiation of harmful social norms, sharing of personal experiences of HIV/AIDS, formulation of positive action plans and solidarity to action them. We found that a greater level of spousal communication, and higher self-efficacy to discuss and use family planning, were significant predictors of use for women at endline. As our theory of change suggests, couple communication and self-efficacy are two of three key variables we expected to be positively associated with exposure to the intervention. However, the third key variable---women's greater participation in household decision-making---was not a significant predictor of family planning use. The comprehensive household decision-making measure we used assessed decisions across a wide range of domains. While it may provide a more robust measure of women's overall decision-making power in the household, it is not narrowly focused on decisions about family size, contraceptive use, or healthcare seeking, and therefore may be less predictive of such outcomes; future studies could compare various proposed measures of household decision-making power to compare their predictive power on a range of maternal health outcomes, including family planning. Moreover, it may be that self-efficacy to use family planning is a better measure of women's power to enact these behaviors, and may have accounted for most of the variance in this domain. Reported control over their own cash earnings was also significantly associated with use of modern methods, suggesting that economic empowerment may be associated with access to and/or use of FP. Finally, greater age and a higher number of children were significantly associated with women's family planning use, yet women's reproductive intentions were not a significant predictor of use. For men, approval of family planning, more equitable (less traditional) beliefs about gender roles, and a desire to not have more children were the strongest predictors of family planning use. Neither the scale measuring women's decision-making power in the household, nor any of the intervention exposure variables, were significant predictors of men's current use of any or of modern methods. Of note, the two areas with the most striking differences in men's and women's responses at endline were reproductive intentions (60.0% of men and 30.2% of women wanted another pregnancy at the time of the interview or within the next 12 months) and approval of women's use of family planning without her partners' permission (66.3% of women and only 11.6% of men approved of such use). Given these differences between men and women, an intervention that supports more open communication about reproductive decision-making and family planning seems appropriate. Our findings suggest that improved communication may have enabled more couple acceptance of family planning, and thus increased use of family planning over time. In addition, men's desire not to have any more children was a strong predictor of family planning use among men, whereas women's reproductive intentions were not a predictor of family planning use among women even though women were much more likely to want to delay or limit childbearing than were men. Rather than indicate that men's childbearing desires are more important to a couple's use of family planning use than women's, these results might suggest that when men's intentions are more closely aligned with women's, the couple is more likely to use family planning. Our qualitative results provide additional insight into the ways in which the intervention may have contributed to changes in couple communication and family planning behavior--the mixed-method approach we used is one of the strengths of our analysis. Public dialogues may have increased the perceived social acceptability of family planning and of the benefits of open couple communication about family planning, and these normative shifts at community level may have enabled more equitable communication and decision-making at the couple level. Ongoing, public discourse---often explicitly supported or led by community leaders---may have normalized discussions about family planning and influenced family planning acceptability at the community level. The participation of prominent male opinion leaders in these dialogues may have helped to legitimize men's participation in communication and decision-making about family planning, and may have positively influenced their approval of family planning, thus increasing use. Our quantitative results support this: men's approval of family was an important predictor of family planning use. Public discourse precipitated conversations on family planning in the household as couples discussed what they heard and learned. Men described a change in their acceptance of family planning, and women reported that men began to demonstrate more shared decision-making, better communication, and increased support for family planning. Male support of and male involvement in family planning also appear to be important factors for helping with method adherence. Women reported partners accompanying them to get methods and reminding them to take their pills daily. Increased couple communication may also have contributed to increased harmony and a decrease in conflict. Relationship harmony was highly valued by both men and women. Limitations {#sec038} =========== Our survey data are cross-sectional without a comparison group and we used a two-stage cluster sampling approach, thus the sample obtained does not cover the population as evenly as in the case of simple random sampling. Both our quantitative and qualitative results are subject to self-report bias. Propensity scores were used to reduce selection bias by equating the baseline and endline survey samples based on key measured covariates, yet propensity score matching only accounts for observed covariates: imbalances may remain even after propensity score adjustment if relevant survey respondent characteristics were not measured or were measured imprecisely. Thus, the larger estimated differences in baseline-endline family planning use based on unmatched results may be real. Importantly, self-selection to participation in the intervention is a limitation of our analyses examining associations between exposure to the intervention and family planning use at endline. Yet, some reassurance is provided since the intervention was widely advertised and supported by community leaders, and since 65% of the respondents were exposed. In addition, we cannot account for potential effects of other sources of family planning information (e.g. health providers, HIV/STI testing and counseling, domestic violence counseling, media) to the observed differences in family planning use between baseline and endline surveys and the associations observed at endline. However, to our knowledge, no other similar interventions took place in the study area during the intervention period. Also, the intensity of the intervention was measured as the number of topics covered during intervention activities attended and not as the amount of time of exposure to the intervention. Our qualitative interview guide elicited more reports on the positive than the negative aspects of the intervention and family planning use; this may be the result of social desirability bias or of the nature of our intervention activities (i.e. involvement of community leaders, theatre groups, other forms of entertainment). Finally, we do not have information on women who refused to be interviewed or completed only part of the questionnaire. Conclusion {#sec039} ========== Our results suggest that an intervention that encourages and supports dialogue and communication about gender norms and sexuality can shift gender relations and positively influence family planning use, especially for women. Participation in the intervention and greater spousal communication, in addition to variables indicative of more empowerment (self-efficacy for family planning and control over household assets), all contributed to greater use of family planning for women. For men, approval of family planning, more equitable beliefs about gender roles, and a desire to not have more children were the strongest predictors of family planning use. These findings are consistent with other research that suggests more equitable gender norms and spousal communication are linked to contraceptive use and positive reproductive health outcomes, and provide an effective intervention model for achieving those goals through community-based dialogues. While not definitive, our promising evaluation results now allow for smaller scale studies to examine the impact of specific types of dialogues and experience sharing on specific outcomes. Future studies should consider the local context and, if possible, use a similar mixed-method approach. Supporting Information {#sec040} ====================== ###### WE MEASR Scales and Indices. (DOC) ###### Click here for additional data file. ###### Family Planning Measures. (DOC) ###### Click here for additional data file. ###### Men's Data. (XLS) ###### Click here for additional data file. ###### Women's Data. (XLSX) ###### Click here for additional data file. ###### Codebook for Women's and Men's Datasets. (DOC) ###### Click here for additional data file. We would like to recognize all the CARE staff who contributed to the successful implementation of the FPRI project, especially Luis Ortiz-Echevarria, Marcie Rubardt and Mary Yetter of CARE USA, and Rosemary Mbaluka, Ferdinand Moseh, Rhodah Litoroh, Cynthia Muhambe, Henry Anyona, Mary Nyakomitta and Jude Otogo of CARE Kenya. We would also like to acknowledge Katina Pappas-DeLuca and Colleen Smith for their contributions to the endline program evaluation. Our special thanks go to the team of community-based facilitators who partnered with us throughout the project, and to the District Health Medical Health Team in Siaya for their ongoing support and coordination. [^1]: **Competing Interests:**The authors have declared that no competing interests exist. [^2]: Conceived and designed the experiments: CW CG. Performed the experiments: CW EW. Analyzed the data: CW AC CG. Contributed reagents/materials/analysis tools: CW CG EW. Wrote the paper: CW AC CG EW.
{ "pile_set_name": "PubMed Central" }
Nokia may have been gradually building out its mapping empire for more than 10 years, but it’s only now preparing to really ramp up its presence in the mobile navigation realm as it prepares to launch for Android and iOS this year, only months after selling its Devices and Services division to Microsoft. But how did it all begin? Here’s a quick summary of how Nokia’s efforts have come to fruition. A potted history of Nokia’s maps The Finnish tech titan’s mapping efforts started to take shape in 2001 with its involvement in TellMaris, a consortium that pushed the Smart2Go 3D map interface, before Nokia went on to gain the rights to the software through its acquisition of mapping, routing and navigation company Gate5 in 2006. The following year, Nokia revealed it was making the Smart2Go application free to download for select Nokia and Windows Mobile devices, bringing mapping and routing to 150 countries, with turn-by-turn navigation in more than 30 markets. Perhaps the pivotal moment in Nokia’s onward march in the mapping sphere came in late 2007, when it snapped up Chicago-based NAVTEQ in a deal worth more than $8 billion. As one of the leading providers of digital map data for in-car navigation systems, mobile devices, online applications and more, NAVTEQ was very much a future-gazing move from Nokia. Following a handful of further acquisitions, Nokia launched 3D maps covering 20 cities in early 2011, and bought street-level 3D mapping company Earthmine a year later. Meanwhile, Nokia had rebranded Ovi Maps as Nokia Maps in May 2011, before pulling all its location and mapping services under the HERE banner in 2012, an occasion marked by the launch of its first native app on iOS. However, the iOS relationship came to an end when the app was pulled a year later for technical reasons (more on that later). Today, Nokia’s HERE Maps is regarded as one of the four big guns in the global online mapping space, alongside Google Maps, TomTom and OpenStreetMap. Other brands you may be familiar with typically use one of the aforementioned companies’ maps, including Apple, which largely uses TomTom, though also taps additional third-party data from the likes of OpenStreetMap. No longer tethered to its mobile phone dominance, Nokia is beginning to push HERE maps out into the connected devices ecosystem. A tie-up with Samsung announced in late August, revealed that HERE would be bundled with its new Gear S Tizen smartwatch, serving up turn-by-turn navigation on your wrist. The following day, it was announced that HERE would finally arrive in native form for Android phones – replete with offline maps – though exclusively on Samsung Galaxy devices initially. Nokia has been teasing updates ever since, including the news that HERE would return to iOS by the end of the year, and would be made available on all Android devices too. It’s not all about mobile phones of course – Nokia has also started beta testing a new version of the Web-based HERE service, with a focus on context and discovering new places. By the end of 2014, Nokia could have an omnipresent mobile mapping brand on its hands, with full offline maps and navigation available across Android, Windows Phone and iOS, and a retooled and retuned Web incarnation too. The Next Web caught up with Sean Fernback, Senior Vice President, Everyday Mobility, at Nokia’s HERE division, to get the lowdown on where things are currently at, and where they could go from here. Presence HERE’s presence across the mapping spectrum is more extensive than you might think, thanks to licensing tie-ups with the likes of Amazon, Microsoft (Bing Maps), Yahoo (Yahoo Maps) and Garmin. HERE also has a big in-car presence with automotive giants such as BMW and Mercedes – in fact, it may surprise you to learn that Nokia lends its mapping data to 80 percent of in-car navigation systems. Earlier this year Nokia announced a $100 million fund to invest in automotive technology and services, a ‘Connected Car Fund’ fund managed by Nokia Growth Partners (NGP) and aligned closely with the HERE mapping division. The ultimate remit is to “…identify and invest in companies whose innovations will be important for a world of connected and intelligent vehicles.” If you don’t use HERE in your car, you’re probably most familiar with the maps from Nokia’s and Microsoft’s handsets, or you perhaps have used them via the mobile Web on other devices too. But as noted already, things are about to change, as Nokia gears up to push HERE out across the smartphone fraternity. “It was always the ambition to be on Android, we just took a decision at the beginning of the year to accelerate the program,” explained Fernback, in a frank opening to our interview. “And also to ensure when we talk about apps, we’re serving both common platforms, which is, of course, Android and iOS.” “We’re winding down Windows Phone app development” Wait… so does this mean that Windows Phone is being given the elbow now that the Microsoft/Nokia partnership has come to an end? HERE maps wasn’t part of the deal, after all. “As a result of the transaction, we’re having to wind down our Windows Phone app development and shift it over towards Android and iOS,” explains Fernback. Fernback did stress that support for Windows Phone isn’t being phased out completely, not at the moment at least. It’s just limiting the resources it throws at the platform, including time and money spent developing for it. “It’s a dialogue we’re having [with Microsoft], so we will see where it takes us,” he continues. Another quirk in the Nokia/Microsoft partnership was the recent launch of an Android-based smartphone called Nokia X. With the acquisition yet to be finalized at that point, Nokia was authorized to pursue the development of the program even though an Android-based Nokia phone was clearly at odds with Microsoft’s interests. Indeed, Microsoft has subsequently started switching some of these products over to the Windows Phone realm since the acquisition was completed. So now that Nokia has parted ways with Microsoft and is pursuing its other interests, does this mean that there has been a complete change of focus within the HERE division? “Not really, partly because today we still maintain the [HERE] Windows Phone apps, it has our brand on it so we need to look after it,” says Fernback. “Although we’re not particularly investing in them at the moment, that could still change. With the Nokia X program, we were authorized to continue to work on it until about now really, but that work is about to cease. I think there have been a number of different programmes that have continued through the year onto different platforms, but now it’s just going to focus on the two – Android and iOS.” ‘The big two’ Okay, so Android and iOS it is. And it does make perfect sense, given their mobile market share. But what about HERE’s previous flirtation with iOS that fizzled out, can we expect much to be different this time around? It’s probably worth looking back at the circumstances around what happened in late 2013, shortly after iOS 7 rolled out. It turns out this was the crux of the problem for the HERE app, though Fernback was quick to point out that it was very much an in-house error that led to the problem with the app, and Apple wasn’t to blame. “We basically made a silly mistake – when iOS 7 came out, there was a change in how the pixels were rendered, and it wasn’t very well tested this end – when you pinched-to-zoom, you got this terrible effect,” explains Fernback. For the upcoming Android app launch and the subsequent re-arrival on iOS, Nokia and HERE will be using a common codebase, and as such the iOS version will have a different codebase to the one it was built with initially in 2012. So hopefully, things will be a lot more smooth this time around. “It’s a ground-up development” “It’s a ground-up development, and Android is a greenfield development, as is iOS,” adds Fernback. “We have a master codebase which, the way we’ve structured it, means it’s platform agnostic. So if we decide that we want to invest in the Windows Phone app again, we would take that new codebase and compile it for Windows.” Uphill battle? Though Google pretty much has maps sewn up already on Android, and has a firm footing on iOS too, doesn’t HERE face an uphill battle to win the hearts and minds of the masses? Perhaps it does, but it will come armed with a big differentiator when it launches – completely free offline mode. By offline mode, we mean you will be able to download entire countries and continents to your device without paying a penny, which will be particularly useful for those traveling abroad, or those who are otherwise concerned about their data consumption. And we’re told that there will more-or-less be feature parity between the Android and iOS incarnations, so there should be a fairly consistent experience on both platforms. However, Fernback stresses that the version arriving this year is just the beginning. “We’re not trying necessarily to compete with others” “It’s a long program – what we ship this year will be the start of what will be a great product,” he says. “We’re not trying necessarily to compete with others, or follow others, we’re trying to look at the needs and problems we’re trying to solve for consumers in urban mobility and mobile navigation. “Wait and see, we’ve got some nice ideas, we’re trying to look at some unique problems that others possible aren’t solving, and I’d like that to remain a surprise.” What was a surprise was that the Android launch will be a Samsung exclusive initially. So how did this tie-up come about? “I was looking at some of the accounts, I came across Samsung and thought, ‘we’ve been talking to Samsung for many years, but haven’t done anything with them,” says Fernback. “So a group of us went down to see them in South Korea, and we just had a conversation with them. We came up with an idea to do a navigation app on Gear with Tizen, and we did a mock-up with a little video. They loved it.” It transpires that HERE for Android didn’t exist at all 14 weeks ago – it was pretty much a video and a PowerPoint presentation. Though the iOS app isn’t quite ready yet, it seems the Android one is pretty much good to go. “We just used the existing workforce who did a bit of Android training, read the books and so on,” adds Fernback. Show me the money Offline maps is a great boon and a big selling point for HERE on both Android and iOS, but what are the plans to make money from it? Will downloads eventually cost money? “I want the focus to be on building a great product and build a big user-base, then we can talk about how we might want to monetize,” explains Fernback. “Look at Facebook and advertising, it had been kicking about for a few years before it started advertising because it then had critical mass. I think advertising is an example, but there are many things we could look at that could create value for consumers as well as monetization for us.” Whether Nokia can make big inroads on Android and iOS, stealing a piece of the Google Maps pie, remains to be seen. But fresh from its acquisition of personalized travel planning platform Desti, it seems the wheels are very much in motion to create a more-than-viable cross-platform alternative. Nokia’s HERE should be landing for Samsung Galaxy devices shortly, with support for iOS and other Android devices to follow by the end of 2014. Related read: The rise of OpenStreetMap: A quest to conquer Google’s mapping empire ➤ HERE Read next: Seek Thermal's new smartphone camera-app combo lets you 'see' the heat
{ "pile_set_name": "OpenWebText2" }
Astrocyte lipid metabolism is critical for synapse development and function in vivo. The brain is considered to be autonomous in lipid synthesis with astrocytes producing lipids far more efficiently than neurons. Accordingly, it is generally assumed that astrocyte-derived lipids are taken up by neurons to support synapse formation and function. Initial confirmation of this assumption has been obtained in cell cultures, but whether astrocyte-derived lipids support synapses in vivo is not known. Here, we address this issue and determined the role of astrocyte lipid metabolism in hippocampal synapse formation and function in vivo. Hippocampal protein expression for the sterol regulatory element-binding protein (SREBP) and its target gene fatty acid synthase (Fasn) was found in astrocytes but not in neurons. Diminishing SREBP activity in astrocytes using mice in which the SREBP cleavage-activating protein (SCAP) was deleted from GFAP-expressing cells resulted in decreased cholesterol and phospholipid secretion by astrocytes. Interestingly, SCAP mutant mice showed more immature synapses, lower presynaptic protein SNAP-25 levels as well as reduced numbers of synaptic vesicles, indicating impaired development of the presynaptic terminal. Accordingly, hippocampal short-term and long-term synaptic plasticity were defective in mutant mice. These findings establish a critical role for astrocyte lipid metabolism in presynaptic terminal development and function in vivo. GLIA 2017;65:670-682.
{ "pile_set_name": "PubMed Abstracts" }
Q: Set method for java not working So for my assignment it needs to look like this: Assignment The problem I am facing with this is the setIndent isn't setting the indent but when I mainly change int indent = 20; it will add the indent to the boxes. Also I am confused as to why Rectangle@6bdf28bb is appearing in my code. Here is my code for the assignment. Client // Use this client to help test your Rectangle class for Lab13 // Download it into the same folder as your Rectangle.java file. // Add other tests if you want to. public class RectangleClient { public static void main( String[] args ) { Rectangle box1 = new Rectangle( 4, 5 ); box1.setIndent(-1); System.out.println( box1 ); Rectangle box2 = new Rectangle( 6, 12, '+', 'X' ); box2.setIndent( 5 ); System.out.println( box2 ); Rectangle box3 = new Rectangle( 11, 20, '$', 'o' ); box3.setIndent( 20 ); System.out.println( box3 ); } } Class //Using rectangle class to test public class Rectangle { public double length; public double width; public char fill = ' '; public char pen = '*'; public int indent; //Set variables public void setLength(double len){ if (len <= 0){ throw new IllegalArgumentException("Invalid length for Rectangle object"); } else{ length = len; } } public void setWidth(double wid){ if (wid <=0){ throw new IllegalArgumentException("Invalid width for Rectangle object"); } else{ width = wid; } } public void setPen(char c){ pen = c; } public void setFill(char c){ fill = c; } public void setIndent(int n){ if (n < 0){ indent = 0; } else { indent = n; } } //Get variables public double getLength(){ return length; } public double getWidth(){ return width; } public double getIndent(){ return indent; } //Main method public Rectangle (){ int count = 0; String indents = ""; String topBottom = ""; String middle = ""; String line = ""; //Creates the indent string while (count<indent){ indents = indents + " "; count++; } //Top boarder and bottom one count = 0; while (count<width){ topBottom += pen; count++; } //Fill inside square width = width - 2; count = 0; while (count<width){ middle += fill; count++; } //Prints square line = pen + middle + pen; count = 0; while (count<length){ if (count == 0 || count == length - 1){ System.out.println(indents + topBottom); count++; } else{ System.out.println(indents + line); count++; } } } // using default or set fill and boarder public Rectangle (double l, double w){ int count = 0; String indents = ""; String topBottom = ""; String middle = ""; String line = ""; //Creates the indent string while (count<indent){ indents = indents + " "; count++; } //Top boarder and bottom one count = 0; while (count<w){ topBottom += pen; count++; } //Fill inside square w = w - 2; count = 0; while (count<w){ middle += fill; count++; } //Prints square line = pen + middle + pen; count = 0; while (count<l){ if (count == 0 || count == l - 1){ System.out.println(indents + topBottom); count++; } else{ System.out.println(indents + line); count++; } } } //To set values without using .setWidth etc public Rectangle (double l, double w, char p, char f){ int count = 0; String indents = ""; String topBottom = ""; String middle = ""; String line = ""; //Creates the indent string while (count<indent){ indents += " "; count++; } //Top boarder and bottom one count = 0; while (count<w){ topBottom += p; count++; } //Fill inside square w = w - 2; count = 0; while (count<w){ middle += f; count++; } //Prints square line = indents + p + middle + p; topBottom = indents + topBottom; count = 0; while (count<l){ if (count == 0 || count == l - 1){ System.out.println(topBottom); count++; } else{ System.out.println(line); count++; } } } } The error I'm getting is that it is not adding the indents and the random Rectangle@2ff4f00f A: You want to move the printing process of your Rectangle outside of the constructor, otherwise it'll always print immediately upon the use of new Rectangle(...), before you're able to use Rectangle#setIndent(int). You should instead set the Rectangle fields' values with your constructor, and then have a separate method for printing the Rectangle. For instance, your constructor which is used to define a specific Rectangle with a custom width, length, pen and fill: public Rectangle(double l, double w, char p, char f) { this.length = l; this.width = w; this.pen = p; this.fill = f; } This would set the Rectangle instance's fields to the values parsed as arguments when using new Rectangle(...). (Note, you might want to redo your other constructors to comply with this as well). To visualize it, you could try add the following code to your Rectangle class @Override public String toString() { return getClass().getSimpleName() + "[w: " + width + "; l: " + length + "; p: " + pen + "; f: " + fill + "; indent: " + indent + "]"; } And then use the following in your RectangleClient Rectangle box1 = new Rectangle(4, 5, '+', 'X'); System.out.println(box1); box1.setIndent(50); System.out.println(box1); It should print Rectangle[w: 5.0; l: 4.0; p: +; f: X; indent: 0] Rectangle[w: 5.0; l: 4.0; p: +; f: X; indent: 50] Since we removed the logic for printing the box from the constructor, we should add it somewhere else. With a separate method for printing the Rectangle, you could do something similar to public void printRectangle() { int count = 0; String indents = ""; String topBottom = ""; String middle = ""; String line = ""; // Creates the indent string while (count < indent) { indents += " "; count++; } // Top boarder and bottom one count = 0; while (count < this.width) { topBottom += this.pen; count++; } // Fill inside square this.width = this.width - 2; count = 0; while (count < this.width) { middle += this.fill; count++; } // Prints square line = indents + this.pen + middle + this.pen; topBottom = indents + topBottom; count = 0; while (count < this.length) { if (count == 0 || count == this.length - 1) { System.out.println(topBottom); count++; } else { System.out.println(line); count++; } } } This is basically just the logic from your constructor, just with the exception that instead of using the local variables (passed as arguments), we use the Rectangle instance's field values instead (e.g. this.width instead of w). Maybe your instructor explicitly wanted you to override the #toString() method, and inside the overridden method, you'd have your logic for printing the Rectangle. If that is the case, you'd of course just move the logic from the #printRectangle() to the overridden #toString() method, which would allow you to use System.out.println(box1) (replace the previous sampled #toString() method, of course). @Override public String toString() { // Logic from #printRectangle() here } If you choose to override #toString(), you should not use System.out.println in the logic, but rather build a string, which you'll return at the end of the #toString() logic. You could take a look at StringBuilder for this.
{ "pile_set_name": "StackExchange" }
MtgbRainstorm.COM is for sale (Mtgb Rainstorm) Please call 1-303-893-0552 for more information, or Contact Us to inquire about the price for MtgbRainstorm.COM Create a blog, promote your business, or build a site for your personal use. Your web address is memorable and uniquely your own. Call us for more information: 1-303-893-0552
{ "pile_set_name": "OpenWebText2" }
PECL/mysqlnd_ms is a client-side load balancer for PHP that supports any MySQL cluster. It does read-write splitting, failover, introduces a quality of service concept, supports partitioning and, of course, load balancing. New mysqli API (begin, *savepoint) calls in PHP 5.5.0 help to improve transaction awareness. New read only in MySQL 5.6 promise major performance gains (think 2x) and an option to reduce the load on a MySQL Replication master. Read how the features go together in PECL/mysqlnd_ms 1.5. Load balancing – transaction aware? A load balancer must not switch connections in the middle of a transaction. A load balancer must send all queries to the server a transaction has been started on until the transaction ends. Unfortunately, it is very hard to develop a transparent load balancer for MySQL. In general there are four approaches: forget about transparency and require applications to hint the load balancer about transaction boundaries (buuuh!) have the MySQL server announce transactions to clients on the wirte protocol (buggy 🙁) monitor SQL queries controlling transactions monitor API calls controlling transactions PECL/mysqlnd_ms supports the basic hinting and the API monitoring approach. Using SQL hints to control load balancing during transactions is possible but very uncomfortable. $mysqli = new mysqli(...); $mysqli->query("BEGIN"); /* stop load balancing, force use of last server */ $mysqli->query(sprintf("/*%s*/INSERT INTO test(id) VALUES (1)", MYSQLND_MS_LAST_USED_SWITCH)); sprintf("/*%s*/COMMIT", MYSQLND_MS_LAST_USED_SWITCH)); API monitoring is a step forward. If transaction stickiness has been configured, PECL/mysqlnd_ms stops load balancing once autocommit is turned off. Given you set trx_stickiness=master , the load balancer will run all transactions on the master. $mysqli->autocommit(false); /* autocommit is off, must not switch connections if transaction_stickiness is set */ $mysqli->query("INSERT INTO test(id) VALUES (1)"); $pdo->setAttribute(PDO::ATTR_AUTOCOMMIT, false); /* if trx_stickiness is set, no connection switch allowed */ $stmt = $pdo->prepare("SELECT @myrole AS _role"); $stmt->execute(); $result = $stmt->fetchAll(PDO::FETCH_ASSOC); Internally, PECL/mysqlnd_ms hooks the autocommit() C API function of mysqlnd. PDO_MySQL and mysqli call it and thus, PECL/mysqlnd_ms recognizes the change. Any PHP MySQL application | $pdo->setAttribute(PDO::ATTR_AUTOCOMMIT, false); $mysqli->autocommit(false); mysqlnd autocommit() PECL/mysqlnd_ms autocommit() : transaction stickiness set and in transaction? | MySQL Master MySQL Slave However, remember that if you used SQL to control the autocommit mode, PECL/mysqlnd_ms would not recognize the change and transaction stickiness would not work. MySQL C API vs. PHP API As a PHP user, you may be surprised to hear that autocommit() is the only call monitored in PECL/mysqlnd_ms 1.4. That’s because its pretty much all the MySQL C API had to offer and thus, all the plugin could hook and use to detect transaction boundaries. For example, PECL/mysqlnd_ms 1.4 cannot be made aware of a call to PDO::beginTransaction() because PDO::beginTransaction() does not map to any MySQL C API call that the plugin could monitor. A close look unveils that SQL offers way more options to control transactions than the MySQL C API. SQL MySQL C API PHP 5.4 MySQL APIs SET autocommit mysql_autocommit() mysqli_autocommit(), PDO::ATTR_AUTOCOMMIT START TRANSACTION n/a PDO::beginTransaction() START TRANSACTION transaction_characteristic (e.g. READ ONLY) n/a n/a COMMIT mysql_commit() mysqli_commit(), PDO::commit() COMMIT [WORK] [AND [NO] CHAIN] [[NO] RELEASE] n/a n/a ROLLBACK mysql_rollback() mysqli_rollback(), PDO::rollBack() ROLLBACK [WORK] [AND [NO] CHAIN] [[NO] RELEASE] n/a n/a SAVEPOINT n/a n/a RELEASE SAVEPOINT n/a n/a ROLLBACK [WORK] TO [SAVEPOINT] identifier n/a n/a The feature gap between SQL and PHP (mysqli) API is closed in PHP 5.5. The mysqlnd C library has been extended to offer C calls for all SQL features. Those C calls can be monitored by PECL/mysqlnd_ms 1.5. And, those calls are exported to the mysqli API. The transaction aware load balancing of PECL/mysqlnd_ms 1.5 is no longer limited to autocommit() but covers all of the below mysqli_*-functions. SQL PHP 5.5 MySQL APIs SET autocommit mysqli_autocommit(), PDO::ATTR_AUTOCOMMIT START TRANSACTION mysqli_begin_transaction(), PDO::beginTransaction() START TRANSACTION transaction_characteristic (e.g. READ ONLY) mysqli_begin_transaction([option [, name]]) COMMIT mysqli_commit(), PDO::commit() COMMIT [WORK] [AND [NO] CHAIN] [[NO] RELEASE] mysqli_commit([option]) ROLLBACK mysqli_rollback(), PDO::rollBack() ROLLBACK [WORK] [AND [NO] CHAIN] [[NO] RELEASE] mysqli_rollback([option, [name]]) SAVEPOINT mysqli_savepoint(name) RELEASE SAVEPOINT mysqli_release_savepoint(name) ROLLBACK [WORK] TO [SAVEPOINT] identifier mysqli_rollback([option, [name]]) PDO_MySQL has not been modified yet to use the new mysqlnd API calls. Work in progress… even the mysqli API additions have not been documented yet. mysqli constant Comment MYSQLI_TRANS_START_WITH_CONSISTENT_SNAPSHOT , MYSQLI_TRANS_START_READ_WRITE , MYSQLI_TRANS_START_READ_ONLY For mysqli_begin_transaction() . See SQL. MYSQLI_TRANS_COR_AND_CHAIN , MYSQLI_TRANS_COR_AND_NO_CHAIN , MYSQLI_TRANS_COR_RELEASE , MYSQLI_TRANS_COR_NO_RELEASE Use with mysqli_commit() , mysqli_rollback() . See SQL. Better load balancing in PECL/mysqlnd_ms 1.5 MySQL 5.6 introduces read only transactions. If you tell InnoDB in advance that a transaction will perform read operations only, it can be executed faster than a transaction that may perform a write. Early MySQL 5.6 Release Candidate benchmarks hinted that read only transactions could run twice as fast as normal transactions. You can use the SQL statement START TRANSACTION READ ONLY to begin a read only transaction, or you use the new mysqli API features of PHP 5.5.0. $mysqli->begin_transaction(MYSQLI_TRANS_START_READ_ONLY); $mysqli->query(...); $mysqli->query(...); $mysqli->commit(); Using the API has the advantage that PECL/mysqlnd_ms 1.5 can do transaction aware load balancing: the plugin picks a server to run the transaction and continues using it until the transaction ends. If MYSQLI_TRANS_START_READ_ONLY is set, the plugin may try to run the transaction on a slave in order to reduce the load on the master. Whether the transaction will end up on a slave depends on a number of additional factors. trx_stickiness setting mysqli call version requirements PECL/mysqlnd_ms load balancing not set $mysqli->begin_transaction() Ignored! Load balancer may switch connections at any time. Not transaction safe! master $mysqli->autocommit(), PDO::ATTR_AUTOCOMMIT PHP 5.4, PECL/mysqlnd_ms 1.2 If autocommit is turned off, choose master and used it until autocommit is enabled again. Once autocommit is enabled, switching servers may happen at any time. master $mysqli->begin_transaction() PHP 5.5, PECL/mysqlnd_ms 1.5 Choose a master: if failover is enabled, search a master until you find one based on failover rules. Once a master has been found stop load balancing, stop failover. Use master until the end of the transaction, monitor mysqli_commit(), mysqli_rollback() C API counterparts to learn about the end of the transaction. on $mysqli->begin_transaction(MYSQLI_TRANS_START_READ_ONLY) PHP 5.5, PECL/mysqlnd_ms 1.5 Try to use a slave to run the transaction on. Try to use slave only if master-on-write and the current quality of service setting allows it. For example, if strong consistency has been requested, slaves will not be considered. If no slaves are configured or all slaves have failed, try using a master (see above). Beside all the improvements, it would be so much easier for clients to do proper transaction aware load balancing if the server would announce the begin and end of a transaction on the wire protocol… Happy hacking! @Ulf_Wendel
{ "pile_set_name": "OpenWebText2" }
The body of an Ebola victim remains contagious after death, so collectors must carry full protective gear as they prepare to do their job. Tommy Trenchard for NPR Listen Listening... / Originally published on December 31, 2014 7:40 am "When I wake up in the morning, I will pray to God to give me strength and focus," says 21-year-old Sorie Fofana. His job is collecting the bodies of those who die from Ebola in Monrovia, Liberia's capital city of roughly 1 million people. Before, Fofana was an artist, making designs for T-shirts. The new job pays better — $1,000 a month. But every morning, the lanky, laid-back Fofana has to steel himself to go out and do the job. Fofana serves on one of four government teams of specially trained body collectors in Monrovia, funded by the International Federation of the Red Cross. It's a critical task as the Ebola epidemic worsens in Liberia, with more than 1,300 suspected and confirmed cases, and nearly 700 deaths. In the densely populated city, when someone dies of Ebola, many more people may become infected by coming into contact with the body. On a recent morning, the body collectors pull up to their first stop: a dirt lot at the edge of a steep hill overlooking a river. They've come to collect the corpse of Rachel Wleh. The men change out of jeans and sneakers, into surgical scrubs and rubber boots. Alexander Nyanti, 23, used to study economics at a local college. But the college is closed, along with every other school here, because of the Ebola outbreak. Nyanti isslender and soft-spoken. He looks a little nervous at the thought of going into Wleh's house. "I don't feel fine," he says. "But I have to go there. I must go there." Mark Korvayan is the team leader. He's a longtime employee of the Ministry of Health and a father figure to the crew. The men gather up their gearand begin the difficult hike down the hillside, carefully picking their way over rocks strewn with trash and drying laundry. At the base of the hill, they walk past a cluster of cement-block homes at the river's edge. People stream out of the doorways. The whole neighborhood is turning out to watch. Wleh's husband was the doctor at the local clinic. That's also where the family lived. He came down with Ebola earlier this month and died a few days ago. Wleh took sick soon after. She died the day before. Wleh's four children, ages 15 to 22, stand to one side. They hug their arms to their chests and hang their heads. "She was vomiting," says Larry, the oldest. "She said she was just feeling weak." As Larry describes his mother's symptoms, Korvayan strides up to warn him that he and his brothers and sister absolutely must get tested for Ebola. If they touched their mother while she was sick, there's a good chance they've been infected, too. Wleh's kids just stare back at him, panic flickering in their eyes. Finally, Larry speaks up. He mumbles that their health is fine. Their problem is a different one: In the space of a few days, they've become orphans: "We don't have a father. We don't have a mother." The team dons the last layer of protective gear. They unfurl white plastic jumpsuits and pull them on. Next come face masks and goggles. They tape their sleeves shut with meticulous care and check each other for exposed skin. Their life depends on getting this right: The corpse of a person who dies of Ebola leaks bodily fluids loaded with the virus. Anyone who comes into contact with those fluids can become infected. Their last defense is a prayer. The men gather in a circle and touch hands: "God our father, ... as we are going in ... may you be the protector. We will take the precautionary measures, but may you seal us with your holy spirit and with your angels ..." Korvayan claps his hands twice to signal it's time to go in. They enter the house slowly, single file, and head into a bedroom. They emerge a few minutes later. They've packed Wleh in a green body bag and drag it across the floor. They pause at the door to figure out the best way to lift the body safely, then proceed out of the house. As they carry Wleh past the crowd, several women begin wailing. Others join in. The cries swell to a chorus. Wleh was beloved in this neighborhood. This is the closest thing she'll get to a funeral. The hike back up the hill is excruciating. At the top, the men stop under a tree and collapse against it. Korvayan says the state of Wleh's corpse was unnerving. "When I saw the body," he says, "my skin creeped." She was lying on a bed, blood leaking from her mouth. The men carry Wleh's body over to a long flatbed truck. They heave it in and drag it to the back. Now comes the most dangerous part: getting out of their protective suits. They arch their backs and contort their limbs in an awkward shimmy to avoid touching the outside of the suit. Then they spray each suit with disinfectant and place the suits in a trash bag. Despite the pay — generous by Liberian standards — the men say their families do not want them doing the work. Nyanti, the economics student, says his parents won't even let him stay in the house. They're worried he's going to infect them all. Fofana's parents have begged him to quit. "My mom and dad don't want me to do this job," he says. "But I feel I should do it to save my nation." Like the other men, Fofana says that what started as just a job has become a calling. He is seeing firsthand how crucial this work is to stopping Ebola's spread. He knows the risks. But, he says, someone's got to do it: "I'm going to save my country. If I die, I die for my country." The men close up the back of the truck. Korvayan says he can't even guess how many bodies he's picked up since he started this work. "I cannot give you a specific number. I've gone far. I have picked up enough." But their work is never done. They've got six more bodies to pick up today, and after that a long drive to the city's crematorium. Tomorrow they'll do it all over again. NPR's reporting from Monrovia has been produced by Nicole Beemsterboer. Copyright 2014 NPR. To see more, visit http://www.npr.org/. Transcript MELISSA BLOCK, HOST: Twenty-thousand - that's how many people the World Health Organization predicts will be infected with Ebola in the next six to nine months. 3,000 people are known to have already come down with the deadly virus. About half of them have died. One of the epicenters of Ebola is the West African country of Liberia. In the densely populated capital of Monrovia, a major concern is how corpses are handled; they're highly infectious. Every day, specially trained teams go out to collect the bodies and they're not able to keep up with the demand. NPR's Nurith Aizenman went out with one of those teams. NURITH AIZENMAN, BYLINE: The body collectors pull up to their first stop of the day. It's a dirt lot at the edge of a steep hill overlooking a river. They've come to collect the corpse of a woman who died in a house at the bottom. Her name was Rachel Wleh. The men change out of jeans and sneakers into surgical scrubs and rubber boots. They're one of four teams doing this work in Monrovia with funding from the International Federation of the Red Cross. ALEXANDER NYANTI: I have my surgical gloves, as you can see. I have my heavy-duty gloves. I have my goggles. AIZENMAN: Alexander Nyanti is pulling on his surgical gloves and gathering his goggles. He used to be a student studying economics at a local college. But the college has been closed along with every other school here because of the Ebola outbreak. Nyanti's 23, slender and soft-spoken. He looks a little nervous at the thought of going into Wleh's house. NYANTI: I don't feel fine, but I have to go there. I must go there. AIZENMAN: A few feet away, Sorie Fofana is more nonchalant. He's the creative one. SORIE FOFANA: I was an artist - T-shirts, drawings. AIZENMAN: People used to pay him to put his designs on their T-shirts, but this job pays better. He's 21, lanky and laid-back. Still, he says, every morning he has to steel himself to go out. FOFANA: When I wake up in the morning I will pray to God to give me strength and focus. AIZENMAN: Mark Korvayan is the team's leader. He's a longtime employee of the Ministry of Health and a father figure to the crew. MARK KORVAYAN: I'm the head of the team - the burial team personnel. AIZENMAN: The men gather up their gear and begin the slow climb down the hillside, picking their way carefully over rocks strewn with trash and drying laundry. At the base of the hill, they walk past cement block homes at the river's edge. People stream out of the doorways. The whole neighborhood is turning out to watch this. Wleh's husband was the doctor at the local clinic - that's also where the family lived. He came down with Ebola earlier this month and died a few days ago. Wleh got sick soon after. She died yesterday afternoon. Wleh's children stand to one side. They hug their arms to their chests and hang their heads. The eldest, Larry Wleh, is 22. LARRY WLEH: She was vomiting. She had chills. She was feeling weak. AIZENMAN: As he describes his mother's symptoms, Korvayan marches up to warn Larry Wleh that he and his brothers and sister absolutely must get tested. If they touched their mother while she was sick, there's a good chance they've been infected too. KORVAYAN: You say you did not touch your mother? Now, who touched her? The person that touched her needs to report himself to the center. AIZENMAN: Wleh's kids stare back at Korvayan in mute horror. Finally Larry, the eldest, speaks up. He mumbles that their health is fine. Their problem is a different one - in the space of a few days they've become orphans. WLEH: We don't have a father, we don't have a mother. AIZENMAN: The team begins putting on their last layer of protective gear. They unfurl white plastic jumpsuits and pull them on. Next come the face masks and goggles. They tape their sleeves shut with meticulous care and check each other for exposed skin. Their life depends on getting this right. The corpse of a person who dies of Ebola is extremely dangerous. It leaks bodily fluids loaded with the virus. Anyone who comes into contact with those fluids can become infected. Their last defense is a prayer. The men gather in a circle and touch hands. God, our father - as we are going in, may you be the protector, Korvayan says. We will take the precautionary measures, but may you seal us with your holy spirit and with your angels. Korvayan claps his hands to signal it's time to go in. The men walk into the house slowly, single file and head into a bedroom. They emerge a few minutes later. They've packed Wleh in an army green body bag and drag it across the floor. They pause at the door and discuss the best way to lift up the body safely and then proceed out of the house. As they carry Wleh past the crowd, several women begin wailing. The cries swell to a chorus. Wleh was beloved in this neighborhood. This is the closest thing she'll get to a funeral. The hike back up the hill is excruciating. At the top, the men stop under a tree and collapse against it. Korvayan says the state of Wleh's corpse was unnerving. KORVAYAN: Well, when I saw the body, my skin creeped. AIZENMAN: He says they found Wleh lying on a bed, blood leaking from her mouth. KORVAYAN: Her nose, I saw was saliva. Very wet saliva. Wet. But her mouth - she was leaking with blood. AIZENMAN: The men carry Wleh's body over to a long flatbed truck. They heave it in and drag it to the back. Now comes the most dangerous part - getting out of their protective suits. They arch their backs and contort their limbs in an awkward shimmy to avoid touching the outside. Then they spray each suit with disinfectant solution and place it in a trash bag. The men are paid for this work, a thousand dollars a month - generous by Liberian standards. But their families do not want them doing it. Nyanti, the economic student, says his parents won't even let him stay in the house. They're worried he's going to infect them all. Fofana's parents have begged him to quit. FOFANA: My mom and dad do not want me to do the job. But I feel I can do it to save my nation. AIZENMAN: Like the other men, Fofana says that what started out as just a job, a way to earn a living, has become a calling. He's seeing firsthand how crucial this work is to stopping the Ebola's spread. He knows the risks, but he says, someone's got to do it for the country. FOFANA: I'm going to serve my country. If I die, I die for my country. AIZENMAN: The men close up the back of the truck. They've got six more bodies to pick up today. And after that, a long drive to the crematorium. Tomorrow they'll do it all over again. Korvayan says he can't even guess how many bodies he's collected since he started this work. Related Content The two U.S. patients who were treated for Ebola have been discharged from Emory University Hospital in Atlanta, where they had been in an isolation ward since returning from Liberia early this month. They are the first patients treated for Ebola on American soil. Dr. Kent Brantly and missionary Nancy Writebol have been released after "a rigorous course of treatment and thorough testing," Emory's Dr. Bruce Ribner said. He added that he's confident that their release from care "poses no public health threat." What’s on the bottom of Lake Washington? Listener Merry McCreery wanted to know. For KUOW Public Radio’s Local Wonder project, I embarked on a strange journey that took me to the heart of this vast lake that separates Seattle from the Eastside. What I learned was astonishing, often gross and, on occasion, heartbreaking. Ross Reynolds talks with KUOW online editor Isolde Raftery about some extra stories that didn't make it into our series, "Labor Intensive." The stories from the labor and delivery ward at UW Medical Center in Seattle are often told breathlessly. A nurse tells of a pregnant woman who arrived at the hospital brain dead after being airlifted from Eastern Washington. She was kept alive as nurses pumped her breasts to feed her baby, who had been delivered by cesarean section. During the Cold War, thousands of Soviet and U.S. fishermen worked together on the high seas of the Pacific Ocean, trawling by day and sharing Russian bread, vodka and off-color jokes in the evenings, while their governments maintained a posture of pure hostility toward each other.
{ "pile_set_name": "Pile-CC" }
require 'tzinfo/timezone_definition' module TZInfo module Definitions module America module Halifax include TimezoneDefinition timezone 'America/Halifax' do |tz| tz.offset :o0, -15264, 0, :LMT tz.offset :o1, -14400, 0, :AST tz.offset :o2, -14400, 3600, :ADT tz.offset :o3, -14400, 3600, :AWT tz.offset :o4, -14400, 3600, :APT tz.transition 1902, 6, :o1, 724774703, 300 tz.transition 1916, 4, :o2, 7262864, 3 tz.transition 1916, 10, :o1, 19369101, 8 tz.transition 1918, 4, :o2, 9686791, 4 tz.transition 1918, 10, :o1, 58125545, 24 tz.transition 1920, 5, :o2, 7267361, 3 tz.transition 1920, 8, :o1, 19380525, 8 tz.transition 1921, 5, :o2, 7268447, 3 tz.transition 1921, 9, :o1, 19383501, 8 tz.transition 1922, 4, :o2, 7269524, 3 tz.transition 1922, 9, :o1, 19386421, 8 tz.transition 1923, 5, :o2, 7270637, 3 tz.transition 1923, 9, :o1, 19389333, 8 tz.transition 1924, 5, :o2, 7271729, 3 tz.transition 1924, 9, :o1, 19392349, 8 tz.transition 1925, 5, :o2, 7272821, 3 tz.transition 1925, 9, :o1, 19395373, 8 tz.transition 1926, 5, :o2, 7273955, 3 tz.transition 1926, 9, :o1, 19398173, 8 tz.transition 1927, 5, :o2, 7275005, 3 tz.transition 1927, 9, :o1, 19401197, 8 tz.transition 1928, 5, :o2, 7276139, 3 tz.transition 1928, 9, :o1, 19403989, 8 tz.transition 1929, 5, :o2, 7277231, 3 tz.transition 1929, 9, :o1, 19406861, 8 tz.transition 1930, 5, :o2, 7278323, 3 tz.transition 1930, 9, :o1, 19409877, 8 tz.transition 1931, 5, :o2, 7279415, 3 tz.transition 1931, 9, :o1, 19412901, 8 tz.transition 1932, 5, :o2, 7280486, 3 tz.transition 1932, 9, :o1, 19415813, 8 tz.transition 1933, 4, :o2, 7281578, 3 tz.transition 1933, 10, :o1, 19418781, 8 tz.transition 1934, 5, :o2, 7282733, 3 tz.transition 1934, 9, :o1, 19421573, 8 tz.transition 1935, 6, :o2, 7283867, 3 tz.transition 1935, 9, :o1, 19424605, 8 tz.transition 1936, 6, :o2, 7284962, 3 tz.transition 1936, 9, :o1, 19427405, 8 tz.transition 1937, 5, :o2, 7285967, 3 tz.transition 1937, 9, :o1, 19430429, 8 tz.transition 1938, 5, :o2, 7287059, 3 tz.transition 1938, 9, :o1, 19433341, 8 tz.transition 1939, 5, :o2, 7288235, 3 tz.transition 1939, 9, :o1, 19436253, 8 tz.transition 1940, 5, :o2, 7289264, 3 tz.transition 1940, 9, :o1, 19439221, 8 tz.transition 1941, 5, :o2, 7290356, 3 tz.transition 1941, 9, :o1, 19442133, 8 tz.transition 1942, 2, :o3, 9721599, 4 tz.transition 1945, 8, :o4, 58360379, 24 tz.transition 1945, 9, :o1, 58361489, 24 tz.transition 1946, 4, :o2, 9727755, 4 tz.transition 1946, 9, :o1, 58370225, 24 tz.transition 1947, 4, :o2, 9729211, 4 tz.transition 1947, 9, :o1, 58378961, 24 tz.transition 1948, 4, :o2, 9730667, 4 tz.transition 1948, 9, :o1, 58387697, 24 tz.transition 1949, 4, :o2, 9732123, 4 tz.transition 1949, 9, :o1, 58396433, 24 tz.transition 1951, 4, :o2, 9735063, 4 tz.transition 1951, 9, :o1, 58414073, 24 tz.transition 1952, 4, :o2, 9736519, 4 tz.transition 1952, 9, :o1, 58422809, 24 tz.transition 1953, 4, :o2, 9737975, 4 tz.transition 1953, 9, :o1, 58431545, 24 tz.transition 1954, 4, :o2, 9739431, 4 tz.transition 1954, 9, :o1, 58440281, 24 tz.transition 1956, 4, :o2, 9742371, 4 tz.transition 1956, 9, :o1, 58457921, 24 tz.transition 1957, 4, :o2, 9743827, 4 tz.transition 1957, 9, :o1, 58466657, 24 tz.transition 1958, 4, :o2, 9745283, 4 tz.transition 1958, 9, :o1, 58475393, 24 tz.transition 1959, 4, :o2, 9746739, 4 tz.transition 1959, 9, :o1, 58484129, 24 tz.transition 1962, 4, :o2, 9751135, 4 tz.transition 1962, 10, :o1, 58511177, 24 tz.transition 1963, 4, :o2, 9752591, 4 tz.transition 1963, 10, :o1, 58519913, 24 tz.transition 1964, 4, :o2, 9754047, 4 tz.transition 1964, 10, :o1, 58528649, 24 tz.transition 1965, 4, :o2, 9755503, 4 tz.transition 1965, 10, :o1, 58537553, 24 tz.transition 1966, 4, :o2, 9756959, 4 tz.transition 1966, 10, :o1, 58546289, 24 tz.transition 1967, 4, :o2, 9758443, 4 tz.transition 1967, 10, :o1, 58555025, 24 tz.transition 1968, 4, :o2, 9759899, 4 tz.transition 1968, 10, :o1, 58563761, 24 tz.transition 1969, 4, :o2, 9761355, 4 tz.transition 1969, 10, :o1, 58572497, 24 tz.transition 1970, 4, :o2, 9957600 tz.transition 1970, 10, :o1, 25678800 tz.transition 1971, 4, :o2, 41407200 tz.transition 1971, 10, :o1, 57733200 tz.transition 1972, 4, :o2, 73461600 tz.transition 1972, 10, :o1, 89182800 tz.transition 1973, 4, :o2, 104911200 tz.transition 1973, 10, :o1, 120632400 tz.transition 1974, 4, :o2, 136360800 tz.transition 1974, 10, :o1, 152082000 tz.transition 1975, 4, :o2, 167810400 tz.transition 1975, 10, :o1, 183531600 tz.transition 1976, 4, :o2, 199260000 tz.transition 1976, 10, :o1, 215586000 tz.transition 1977, 4, :o2, 230709600 tz.transition 1977, 10, :o1, 247035600 tz.transition 1978, 4, :o2, 262764000 tz.transition 1978, 10, :o1, 278485200 tz.transition 1979, 4, :o2, 294213600 tz.transition 1979, 10, :o1, 309934800 tz.transition 1980, 4, :o2, 325663200 tz.transition 1980, 10, :o1, 341384400 tz.transition 1981, 4, :o2, 357112800 tz.transition 1981, 10, :o1, 372834000 tz.transition 1982, 4, :o2, 388562400 tz.transition 1982, 10, :o1, 404888400 tz.transition 1983, 4, :o2, 420012000 tz.transition 1983, 10, :o1, 436338000 tz.transition 1984, 4, :o2, 452066400 tz.transition 1984, 10, :o1, 467787600 tz.transition 1985, 4, :o2, 483516000 tz.transition 1985, 10, :o1, 499237200 tz.transition 1986, 4, :o2, 514965600 tz.transition 1986, 10, :o1, 530686800 tz.transition 1987, 4, :o2, 544600800 tz.transition 1987, 10, :o1, 562136400 tz.transition 1988, 4, :o2, 576050400 tz.transition 1988, 10, :o1, 594190800 tz.transition 1989, 4, :o2, 607500000 tz.transition 1989, 10, :o1, 625640400 tz.transition 1990, 4, :o2, 638949600 tz.transition 1990, 10, :o1, 657090000 tz.transition 1991, 4, :o2, 671004000 tz.transition 1991, 10, :o1, 688539600 tz.transition 1992, 4, :o2, 702453600 tz.transition 1992, 10, :o1, 719989200 tz.transition 1993, 4, :o2, 733903200 tz.transition 1993, 10, :o1, 752043600 tz.transition 1994, 4, :o2, 765352800 tz.transition 1994, 10, :o1, 783493200 tz.transition 1995, 4, :o2, 796802400 tz.transition 1995, 10, :o1, 814942800 tz.transition 1996, 4, :o2, 828856800 tz.transition 1996, 10, :o1, 846392400 tz.transition 1997, 4, :o2, 860306400 tz.transition 1997, 10, :o1, 877842000 tz.transition 1998, 4, :o2, 891756000 tz.transition 1998, 10, :o1, 909291600 tz.transition 1999, 4, :o2, 923205600 tz.transition 1999, 10, :o1, 941346000 tz.transition 2000, 4, :o2, 954655200 tz.transition 2000, 10, :o1, 972795600 tz.transition 2001, 4, :o2, 986104800 tz.transition 2001, 10, :o1, 1004245200 tz.transition 2002, 4, :o2, 1018159200 tz.transition 2002, 10, :o1, 1035694800 tz.transition 2003, 4, :o2, 1049608800 tz.transition 2003, 10, :o1, 1067144400 tz.transition 2004, 4, :o2, 1081058400 tz.transition 2004, 10, :o1, 1099198800 tz.transition 2005, 4, :o2, 1112508000 tz.transition 2005, 10, :o1, 1130648400 tz.transition 2006, 4, :o2, 1143957600 tz.transition 2006, 10, :o1, 1162098000 tz.transition 2007, 3, :o2, 1173592800 tz.transition 2007, 11, :o1, 1194152400 tz.transition 2008, 3, :o2, 1205042400 tz.transition 2008, 11, :o1, 1225602000 tz.transition 2009, 3, :o2, 1236492000 tz.transition 2009, 11, :o1, 1257051600 tz.transition 2010, 3, :o2, 1268546400 tz.transition 2010, 11, :o1, 1289106000 tz.transition 2011, 3, :o2, 1299996000 tz.transition 2011, 11, :o1, 1320555600 tz.transition 2012, 3, :o2, 1331445600 tz.transition 2012, 11, :o1, 1352005200 tz.transition 2013, 3, :o2, 1362895200 tz.transition 2013, 11, :o1, 1383454800 tz.transition 2014, 3, :o2, 1394344800 tz.transition 2014, 11, :o1, 1414904400 tz.transition 2015, 3, :o2, 1425794400 tz.transition 2015, 11, :o1, 1446354000 tz.transition 2016, 3, :o2, 1457848800 tz.transition 2016, 11, :o1, 1478408400 tz.transition 2017, 3, :o2, 1489298400 tz.transition 2017, 11, :o1, 1509858000 tz.transition 2018, 3, :o2, 1520748000 tz.transition 2018, 11, :o1, 1541307600 tz.transition 2019, 3, :o2, 1552197600 tz.transition 2019, 11, :o1, 1572757200 tz.transition 2020, 3, :o2, 1583647200 tz.transition 2020, 11, :o1, 1604206800 tz.transition 2021, 3, :o2, 1615701600 tz.transition 2021, 11, :o1, 1636261200 tz.transition 2022, 3, :o2, 1647151200 tz.transition 2022, 11, :o1, 1667710800 tz.transition 2023, 3, :o2, 1678600800 tz.transition 2023, 11, :o1, 1699160400 tz.transition 2024, 3, :o2, 1710050400 tz.transition 2024, 11, :o1, 1730610000 tz.transition 2025, 3, :o2, 1741500000 tz.transition 2025, 11, :o1, 1762059600 tz.transition 2026, 3, :o2, 1772949600 tz.transition 2026, 11, :o1, 1793509200 tz.transition 2027, 3, :o2, 1805004000 tz.transition 2027, 11, :o1, 1825563600 tz.transition 2028, 3, :o2, 1836453600 tz.transition 2028, 11, :o1, 1857013200 tz.transition 2029, 3, :o2, 1867903200 tz.transition 2029, 11, :o1, 1888462800 tz.transition 2030, 3, :o2, 1899352800 tz.transition 2030, 11, :o1, 1919912400 tz.transition 2031, 3, :o2, 1930802400 tz.transition 2031, 11, :o1, 1951362000 tz.transition 2032, 3, :o2, 1962856800 tz.transition 2032, 11, :o1, 1983416400 tz.transition 2033, 3, :o2, 1994306400 tz.transition 2033, 11, :o1, 2014866000 tz.transition 2034, 3, :o2, 2025756000 tz.transition 2034, 11, :o1, 2046315600 tz.transition 2035, 3, :o2, 2057205600 tz.transition 2035, 11, :o1, 2077765200 tz.transition 2036, 3, :o2, 2088655200 tz.transition 2036, 11, :o1, 2109214800 tz.transition 2037, 3, :o2, 2120104800 tz.transition 2037, 11, :o1, 2140664400 tz.transition 2038, 3, :o2, 9861987, 4 tz.transition 2038, 11, :o1, 59177633, 24 tz.transition 2039, 3, :o2, 9863443, 4 tz.transition 2039, 11, :o1, 59186369, 24 tz.transition 2040, 3, :o2, 9864899, 4 tz.transition 2040, 11, :o1, 59195105, 24 tz.transition 2041, 3, :o2, 9866355, 4 tz.transition 2041, 11, :o1, 59203841, 24 tz.transition 2042, 3, :o2, 9867811, 4 tz.transition 2042, 11, :o1, 59212577, 24 tz.transition 2043, 3, :o2, 9869267, 4 tz.transition 2043, 11, :o1, 59221313, 24 tz.transition 2044, 3, :o2, 9870751, 4 tz.transition 2044, 11, :o1, 59230217, 24 tz.transition 2045, 3, :o2, 9872207, 4 tz.transition 2045, 11, :o1, 59238953, 24 tz.transition 2046, 3, :o2, 9873663, 4 tz.transition 2046, 11, :o1, 59247689, 24 tz.transition 2047, 3, :o2, 9875119, 4 tz.transition 2047, 11, :o1, 59256425, 24 tz.transition 2048, 3, :o2, 9876575, 4 tz.transition 2048, 11, :o1, 59265161, 24 tz.transition 2049, 3, :o2, 9878059, 4 tz.transition 2049, 11, :o1, 59274065, 24 tz.transition 2050, 3, :o2, 9879515, 4 tz.transition 2050, 11, :o1, 59282801, 24 end end end end end
{ "pile_set_name": "Github" }
Senate Democrats are urging the Trump administration not to move forward with changes to ObamaCare that could lead to increased healthcare costs for older Americans. In a letter to Tom Price, the newly confirmed secretary of the Department of Health and Human Services (HHS), Democratic Sens. Maggie Hassan (N.H.), Sherrod Brown Sherrod Campbell BrownEmboldened Democrats haggle over 2021 agenda Hillicon Valley: Russia 'amplifying' concerns around mail-in voting to undermine election | Facebook and Twitter take steps to limit Trump remarks on voting | Facebook to block political ads ahead of election Top Democrats press Trump to sanction Russian individuals over 2020 election interference efforts MORE (Ohio), Amy Klobuchar Amy KlobucharEPA delivers win for ethanol industry angered by waivers to refiners It's time for newspapers to stop endorsing presidential candidates Biden marks anniversary of the Violence Against Women Act, knocks Trump and McConnell MORE (Minn.), Tom Carper Thomas (Tom) Richard CarperDemocrat asks for probe of EPA's use of politically appointed lawyers Overnight Energy: Study links coronavirus mortality to air pollution exposure | Low-income, minority households pay more for utilities: report OVERNIGHT ENERGY: Democrats push resolution to battle climate change, sluggish economy and racial injustice | Senators reach compromise on greenhouse gas amendment stalling energy bill | Trump courts Florida voters with offshore drilling moratorium MORE (Del.) and Kirsten Gillibrand Kirsten GillibrandSuburban moms are going to decide the 2020 election Jon Stewart urges Congress to help veterans exposed to burn pits The Hill's Campaign Report: 19 years since 9/11 | Dem rival to Marjorie Taylor Greene drops out | Collin Peterson faces fight of his career | Court delivers blow to ex-felon voting rights in Florida MORE (N.Y.) warn against adjusting the age rating requirement in ObamaCare. The Huffington Post reported last week that a forthcoming HHS regulation could change the ratio set under ObamaCare on how much more insurers can charge older people than younger people. ADVERTISEMENT “We write to express our serious concerns that the Trump administration is reportedly considering a change to the Affordable Care Act (ACA) that would have the direct impact of increasing health insurance costs for older adults and ask that this policy be removed from consideration,” the senators wrote. “We oppose rolling back consumer protections established in the ACA that protect older Americans from discrimination. Loosening the age rating requirements in the ACA without also expanding advance premium tax credits is a misguided policy that will make health insurance less affordable for millions of Americans.” Right now, the ratio is 3:1, meaning insurers can charge older people, who tend to have higher health costs, three times as much in premiums as younger people. Insurers have long been pushing to loosen up that requirement and allow for charging older people more. The Huffington Post reported that the Trump administration is considering a regulation to change the ratio to 3.49:1, under the theory that 3.49 still “rounds down” to three and therefore follows the law. Republican-sponsored bills in the House would change the ratio to 5:1. “We are concerned that the reported proposal to relax the age band will amount to an insurance company give-away at the expense of older adults,” the senators said. AARP, the powerful seniors lobby, has threatened to sue the Trump administration if it follows through on the regulation.
{ "pile_set_name": "OpenWebText2" }
%verify "executed" %include "arm-vfp/funop.S" {"instr":"ftosizs s1, s0"}
{ "pile_set_name": "Github" }
U.S. Supreme Court OREGON v. MATHIASON, 429 U.S. 492 (1977) 429 U.S. 492 OREGON v. MATHIASON ON PETITION FOR WRIT OF CERTIORARI TO THE SUPREME COURT OF OREGON No. 76-201. Decided January 25, 1977 Where respondent in response to a police officer's request voluntarily came to a police station for questioning about a burglary and was immediately informed that he was not under arrest, and at the close of a half-hour interview left the station without hindrance, respondent was not in custody "or otherwise deprived of his freedom of action in any significant way," Miranda v. Arizona, 384 U.S. 436, 444 , so as to require that his confession to the burglary obtained during such interview be suppressed at his state criminal trial because he was not given Miranda warnings prior to being questioned. Certiorari granted; 275 Ore. 1, 549 P.2d 673, reversed and remanded. PER CURIAM. Respondent Carl Mathiason was convicted of first-degree burglary after a bench trial in which his confession was critical to the State's case. At trial he moved to suppress the confession as the fruit of questioning by the police not preceded by the warnings required in Miranda v. Arizona, 384 U.S. 436 (1966). The trial court refused to exclude the confession because it found that Mathiason was not in custody at the time of the confession. The Oregon Court of Appeals affirmed respondent's conviction, but on his petition for review in the Supreme Court of Oregon that court by a divided vote reversed the conviction. It found that although Mathiason had not been arrested or otherwise formally detained, "the interrogation took place in a `coercive environment'" of the sort to which Miranda was intended to apply. The court conceded that its holding was contrary to decisions in other jurisdictions, and referred in particular to People v. Yukl, 25 N. Y. 2d 585, 256 N. E. 2d 172 (1969). The State of Oregon has [429 U.S. 492, 493] petitioned for certiorari to review the judgment of the Supreme Court of Oregon. We think that court has read Miranda too broadly, and we therefore reverse its judgment. The Supreme Court of Oregon described the factual situation surrounding the confession as follows: "An officer of the State Police investigated a theft at a residence near Pendleton. He asked the lady of the house which had been burglarized if she suspected anyone. She replied that the defendant was the only one she could think of. The defendant was a parolee and a `close associate' of her son. The officer tried to contact defendant on three or four occasions with no success. Finally, about 25 days after the burglary, the officer left his card at defendant's apartment with a note asking him to call because `I'd like to discuss something with you.' The next afternoon the defendant did call. The officer asked where it would be convenient to meet. The defendant had no preference; so the officer asked if the defendant could meet him at the state patrol office in about an hour and a half, about 5:00 p. m. The patrol office was about two blocks from defendant's apartment. The building housed several state agencies. "The officer met defendant in the hallway, shook hands and took him into an office. The defendant was told he was not under arrest. The door was closed. The two sat across a desk. The police radio in another room could be heard. The officer told defendant he wanted to talk to him about a burglary and that his truthfulness would possibly be considered by the district attorney or judge. The officer further advised that the police believed defendant was involved in the burglary and [falsely stated that] defendant's fingerprints were found at the scene. The defendant sat for a few minutes and then said he had taken the property. This occurred within five minutes after defendant had come to the office. The [429 U.S. 492, 494] officer then advised defendant of his Miranda rights and took a taped confession. "At the end of the taped conversation the officer told defendant he was not arresting him at this time; he was released to go about his job and return to his family. The officer said he was referring the case to the district attorney for him to determine whether criminal charges would be brought. It was 5:30 p. m. when the defendant left the office. "The officer gave all the testimony relevant to this issue. The defendant did not take the stand either at the hearing on the motion to suppress or at the trial." 275 Ore. 1, 3-4, 549 P.2d 673, 674 (1976). The Supreme Court of Oregon reasoned from these facts that: "We hold the interrogation took place in a `coercive environment.' The parties were in the offices of the State Police; they were alone behind closed doors; the officer informed the defendant he was a suspect in a theft and the authorities had evidence incriminating him in the crime; and the defendant was a parolee under supervision. We are of the opinion that this evidence is not overcome by the evidence that the defendant came to the office in response to a request and was told he was not under arrest." Id., at 5, 549 P.2d, at 675. Our decision in Miranda set forth rules of police procedure applicable to "custodial interrogation." "By custodial interrogation, we mean questioning initiated by law enforcement officers after a person has been taken into custody or otherwise deprived of his freedom of action in any significant way." 384 U.S., at 444 . Subsequently we have found the Miranda principle applicable to questioning which takes place in a prison setting during a suspect's term of imprisonment on a separate offense, Mathis v. United States, 391 U.S. 1 (1968), and to questioning taking place in a [429 U.S. 492, 495] suspect's home, after he has been arrested and is no longer free to go where he pleases, Orozco v. Texas, 394 U.S. 324 (1969). In the present case, however, there is no indication that the questioning took place in a context where respondent's freedom to depart was restricted in any way. He came voluntarily to the police station, where he was immediately informed that he was not under arrest. At the close of a 1/2-hour interview respondent did in fact leave the police station without hindrance. It is clear from these facts that Mathiason was not in custody "or otherwise deprived of his freedom of action in any significant way." Such a noncustodial situation is not converted to one in which Miranda applies simply because a reviewing court concludes that, even in the absence of any formal arrest or restraint on freedom of movement, the questioning took place in a "coercive environment." Any interview of one suspected of a crime by a police officer will have coercive aspects to it, simply by virtue of the fact that the police officer is part of a law enforcement system which may ultimately cause the suspect to be charged with a crime. But police officers are not required to administer Miranda warnings to everyone whom they question. Nor is the requirement of warnings to be imposed simply because the questioning takes place in the station house, or because the questioned person is one whom the police suspect. Miranda warnings are required only where there has been such a restriction on a person's freedom as to render him "in custody." It was that sort of coercive environment to which Miranda by its terms was made applicable, and to which it is limited. The officer's false statement about having discovered Mathiason's fingerprints at the scene was found by the Supreme Court of Oregon to be another circumstance contributing to the coercive environment which makes the Miranda rationale applicable. Whatever relevance this fact [429 U.S. 492, 496] may have to other issues in the case, it has nothing to do with whether respondent was in custody for purposes of the Miranda rule. The petition for certiorari is granted, the judgment of the Oregon Supreme Court is reversed, and the case is remanded for proceedings not inconsistent with this opinion. So ordered. MR. JUSTICE BRENNAN would grant the writ but dissents from the summary disposition and would set the case for oral argument. MR. JUSTICE MARSHALL, dissenting. The respondent in this case was interrogated behind closed doors at police headquarters in connection with a burglary investigation. He had been named by the victim of the burglary as a suspect, and was told by the police that they believed he was involved. He was falsely informed that his fingerprints had been found at the scene, and in effect was advised that by cooperating with the police he could help himself. Not until after he had confessed was he given the warnings set forth in Miranda v. Arizona, 384 U.S. 436 (1966). The Court today holds that for constitutional purposes all this is irrelevant because respondent had not "`been taken into custody or otherwise deprived of his freedom of action in any significant way.'" Ante, at 494, quoting Miranda v. Arizona, supra, at 444. I do not believe that such a determination is possible on the record before us. It is true that respondent was not formally placed under arrest, but surely formalities alone cannot control. At the very least, if respondent entertained an objectively reasonable belief that he was not free to leave during the questioning, then he was "deprived of his freedom of action in a significant way." 1 [429 U.S. 492, 497] Plainly the respondent could have so believed, after being told by the police that they thought he was involved in a burglary and that his fingerprints had been found at the scene. Yet the majority is content to note that "there is no indication that . . . respondent's freedom to depart was restricted in any way," ante, at 495, as if a silent record (and no state-court findings) means that the State has sustained its burden, see Lego v. Twomey, 404 U.S. 477, 489 (1972), of demonstrating that respondent received his constitutional due. 2 More fundamentally, however, I cannot agree with the Court's conclusion that if respondent were not in custody no warnings were required. I recognize that Miranda is limited to custodial interrogations, but that is because, as we noted last Term, the facts in the Miranda cases raised only this "narrow issue." Beckwith v. United States, 425 U.S. 341, 345 (1976). The rationale of Miranda, however, is not so easily cabined. Miranda requires warnings to "combat" a situation in which there are "inherently compelling pressures which work to undermine the individual's will to resist and to compel [429 U.S. 492, 498] him to speak where he would not otherwise do so freely." 384 U.S., at 467 . It is of course true, as the Court notes, that "[a]ny interview of one suspected of a crime by a police officer will have coercive aspects to it." Ante, at 495. But it does not follow that because police "are not required to administer Miranda warnings to everyone whom they question," ibid., that they need not administer warnings to anyone, unless the factual setting of the Miranda cases is replicated. Rather, faithfulness to Miranda requires us to distinguish situations that resemble the "coercive aspects" of custodial interrogation from those that more nearly resemble "[g]eneral on-the-scene questioning . . . or other general questioning of citizens in the fact-finding process" which Miranda states usually can take place without warnings. 384 U.S., at 477 . In my view, even if respondent were not in custody, the coercive elements in the instant case were so pervasive as to require Miranda-type warnings. 3 Respondent was interrogated in "privacy" and in "unfamiliar surroundings," factors on which Miranda places great stress. Id., at 449-450; see also Beckwith v. United States, supra, at 346 n. 7. The investigation had focused on respondent. And respondent was subjected to some of the "deceptive stratagems," Miranda v. Arizona, supra, at 455, which called forth the Miranda decision. I therefore agree with the Oregon Supreme Court that to excuse the absence of warnings given these facts is "contrary to the rationale expressed in Miranda." 275 Ore. 1, 5, 549 P.2d 673, 675 (1976). 4 [429 U.S. 492, 499] The privilege against self-incrimination "has always been `as broad as the mischief against which it seeks to guard.'" Miranda v. Arizona, supra, at 459-460, quoting Counselman v. Hitchcock, 142 U.S. 547, 562 (1892). Today's decision means, however, that the Fifth Amendment privilege does not provide full protection against mischiefs equivalent to, but different from, custodial interrogation. 5 See also Beckwith v. United States, supra. It is therefore important to note that the state courts remain free, in interpreting state constitutions, to guard against the evil clearly identified by this case. 6 It has been noted that as a logical matter, a person who honestly but unreasonably believes he is in custody is subject to the same coercive pressures as one whose belief is reasonable; this suggests that such persons also are entitled to warnings. See, e. g., LaFave, "Street Encounters" and the Constitution: Terry, Sibron, Peters, and Beyond, 67 Mich. L. Rev. 39, 105 (1968); Smith, The Threshold Question in Applying Miranda: What Constitutes Custodial Interrogation?, 25 S. C. L. Rev. 699, 711-714 (1974). [ Footnote 2 ] The Court's action is particularly inappropriate because the record of this case has not been transmitted to us, and thus our knowledge of the facts is limited to the information contained in the petition and in the opinions of the state courts. [ Footnote 3 ] I do not rule out the possibility that lesser warnings would suffice when a suspect is not in custody but is subjected to a highly coercive atmosphere. See, e. g., Beckwith v. United States, 425 U.S. 341, 348 -349 (1976) (MARSHALL, J., concurring in judgment); ALI, Model Code of Pre-Arraignment Procedure 110.1 (2) (Approved Draft 1975) (suspects interrogated at police station must be advised of their right to leave and right to consult with counsel, relatives, or friends). [ Footnote 5 ] I trust today's decision does not suggest that police officers can circumvent Miranda by deliberately postponing the official "arrest" and the giving of Miranda warnings until the necessary incriminating statements have been obtained. In Opperman, this Court reversed a decision of the South Dakota Supreme Court holding that routine inventory searches of impounded automobiles, made without probable cause or consent, violated the Fourth Amendment. The case was remanded, like this one, "for further proceedings not inconsistent with [the] opinion." 428 U.S., at 376 . On remand, the South Dakota Supreme Court held that such searches violated a nearly identical provision of the State Constitution, and that therefore the seized evidence should have been suppressed. State v. Opperman, 89 S. D. ___, 228 N. W. 2d 152 (1976). MR. JUSTICE STEVENS, dissenting. In my opinion the issues presented by this case are too important to be decided summarily. Of particular importance [429 U.S. 492, 500] is the fact that the respondent was on parole at the time of his interrogation in the police station. This fact lends support to inconsistent conclusions. On the one hand, the State surely has greater power to question a parolee about his activities than to question someone else. Moreover, as a practical matter, it seems unlikely that a Miranda warning would have much effect on a parolee's choice between silence and responding to police interrogation. Arguably, therefore, Miranda warnings are entirely inappropriate in the parole context. On the other hand, a parolee is technically in legal custody continuously until his sentence has been served. Therefore, if a formalistic analysis of the custody question is to determine when the Miranda warning is necessary, a parolee should always be warned. Moreover, Miranda teaches that even if a suspect is not in custody, warnings are necessary if he is "otherwise deprived of his freedom of action in any significant way." If a parolee being questioned in a police station is not described by that language, today's decision qualifies that part of Miranda to some extent. I believe we would have a better understanding of the extent of that qualification, and therefore of the situations in which warnings must be given to a suspect who is not technically in custody, if we had the benefit of full argument and plenary consideration.
{ "pile_set_name": "Pile-CC" }
Mesoscia procera Mesoscia procera is a moth of the family Megalopygidae. It was described by Walter Hopp in 1930. It is found in Amazonas, Brazil. References Category:Moths described in 1930 Category:Megalopygidae
{ "pile_set_name": "Wikipedia (en)" }
Title: Wine 0.9.41 发布 Date: 2007-07-14 08:02 Author: toy Category: Apps Slug: wine-0941-released [Wine](http://www.winehq.org/) 于昨日获得了小幅更新,发布了新的 0.9.41 版。这个版本不仅实现了一些新的改进,而且也修订了许多 bug。目前,仅有该版本的源码包可用,适用于常见 Linux 发行版的二进制包还需稍作等待。 ![Wine](http://i.linuxtoy.org/i/2007/04/winehq.png) 据悉,该版本的 Wine 主要包括下列改进: - 实现了许多 gdiplus 函数 - 更为完整的 pdh.dll 实现 - 支持 MSI 远程调用 - 在 crypt32.dll 中提供了消息支持 现在,你可以[获取 Wine 0.9.41 的源码包](http://prdownloads.sourceforge.net/wine/wine-0.9.41.tar.bz2)自行编译。当然,你也可以等候官方提供预编译的二进制包。
{ "pile_set_name": "Github" }
Benedetto Bartolo Benedetto Bartolo (1627–1684) was a Roman Catholic prelate who served as Bishop of Belcastro (1684–1685) and Bishop of Lacedonia (1672–1684). Biography Benedetto Bartolo was born in Giarutana, Italy on 16 December 1627 and ordained a priest on 11 March 1668. On 12 September 1672, he was appointed by Pope Clement X as Bishop of Lacedonia. On 18 September 1672, he was consecrated bishop by Cesare Facchinetti, Bishop of Spoleto. On 18 September 1684, he was appointed by Pope Innocent XI as Bishop of Belcastro. He served as Bishop of Belcastro until his death in November 1685. Episcopal succession While bishop, he was the principal co-consecrator of: Giambattista Morea, Bishop of Lacedonia (1684); Pietro Luigi Malaspina, Bishop of Cortona (1684); and Giovanni Riccanale, Bishop of Boiano (1684). References External links and additional sources (for Chronology of Bishops) (for Chronology of Bishops) (for Chronology of Bishops) (for Chronology of Bishops) Category:17th-century Roman Catholic bishops Category:Bishops appointed by Pope Clement X Category:Bishops appointed by Pope Innocent XI Category:1627 births Category:1685 deaths
{ "pile_set_name": "Wikipedia (en)" }
Q: Inequality problem: with $x,y,z>0$, show that $\frac{x^5}{y^3}+\frac{y^5}{z^3}+\frac{z^5}{x^3}\geq x^2+y^2+z^2$ I am studying AM-GM inequalities in school and have this problem: With $x,y,z>0$ show that $\frac{x^5}{y^3}+\frac{y^5}{z^3}+\frac{z^5}{x^3}\geq x^2+y^2+z^2$. A: Idea behind the solution By AM-GM you have for each $\alpha, \beta, \gamma \in \mathbb N$ $$\frac{\alpha\frac{x^5}{y^3}+\beta\frac{y^5}{z^3}+\gamma\frac{z^5}{x^3}}{\alpha+\beta+\gamma}\geq \sqrt[\alpha+\beta+\gamma]{(\frac{x^5}{y^3})^\alpha(\frac{y^5}{z^3})^\beta(\frac{z^5}{x^3})^\gamma}$$ Then by symmetry you can permute circularly the coefficients and add the inequalities. Now, set the RHS $=x^2$. This yields $$5 \alpha -3 \gamma = 2\alpha+2\beta+2\gamma \\ 5 \beta- 3 \alpha=0 \\ 5 \gamma -3 \beta =0 $$ Since the third equation is the sum of the first two (this comes from the fact that your inequality is homogeneous) your system has infinitely many solutions. Solving you get $$9 \alpha =15 \beta =25 \gamma$$ In particular the following is a solution: $$\alpha=25 \\ \beta =15 \\ \gamma=9$$ The solution By AM-GM you have $$\frac{25\frac{x^5}{y^3}+15\frac{y^5}{z^3}+9\frac{z^5}{x^3}}{49}\geq \sqrt[49]{(\frac{x^5}{y^3})^{25}(\frac{y^5}{z^3})^{15}(\frac{z^5}{x^3})^{9}}=x^2\\ \frac{9\frac{x^5}{y^3}+25\frac{y^5}{z^3}+15\frac{z^5}{x^3}}{49}\geq \sqrt[49]{(\frac{x^5}{y^3})^{9}(\frac{y^5}{z^3})^{25}(\frac{z^5}{x^3})^{15}}=y^2\\ \frac{15\frac{x^5}{y^3}+9\frac{y^5}{z^3}+25\frac{z^5}{x^3}}{49}\geq \sqrt[49]{(\frac{x^5}{y^3})^{15}(\frac{y^5}{z^3})^{9}(\frac{z^5}{x^3})^{25}}=z^2\\ $$ Add them together. A: By AM-GM $$2x^5+3y^5\geq5\sqrt[5]{(x^5)^2(y^5)^3}=5x^2y^3,$$ which gives $$\frac{x^5}{y^3}\geq\frac{5x^2-3y^2}{2}.$$ Id est, $$\sum_{cyc}\frac{x^5}{y^3}\geq\sum_{cyc}\frac{5x^2-3y^2}{2}=\sum_{cyc}x^2.$$
{ "pile_set_name": "StackExchange" }
Benign essential blepharospasm (BEB) and spasmodic torticollis (ST) are progressive forms of focal dystonia characterized by their unique presentation in upper facial musculature and cervical musculature, respectively. Little is known about the role of the cerebral cortex despite the fact that emotional and stress-related events, behaviors regulated by the cerebral cortex, often trigger and exacerbate these disorders. Furthermore, cortical control of lower motor neurons innervating muscles implicated in these movement disorders is poorly understood. This study is designed to isolate for the first time cortical neural systems that directly innervate facial motor neurons selectively engage in BEB and spinal accessory motor neurons selectively engage in ST. Once identified, synaptic interactions of these neuronal assemblies will be anatomically characterized. The major goals of this project are to examine the corticobulbar projection from the face/neck representation of the cingulate motor cortex (M3 or Area 24c) to the facial and spinal accessory nuclei. The investigators will determine if the M3 projection: 1) targets lower motor neurons innervating the orbicularis oculi, corrugator supercilia, frontalis, sternocleidomastoid and trapezius; 2) makes direct contact with these motor neurons; 3) is excitatory or inhibitory. Their studies are designed to test the hypothesis that the cerebral cortex plays a role in the physical expression of BEB and ST. It is further hypothesized that recruitment of musculature in BEB and ST patient is a consequence of neuroplastic alterations, such as local sprouting. This project will lead to an increased understanding of cortical systems governing upper facial expression and cervical torsion. These data will be used to design a cortical model of focal dystonia and provide guidance in developing new approaches to surgical treatment of intractable cranial-cervical dyskinesias.
{ "pile_set_name": "NIH ExPorter" }
Your cart is empty. Keep shopping! Vintage, nostalgic mood to this Krakow scene of a bicycle resting beneath one the city's many charming old streetlamps. The black borders are not part of the print but only there to help the image display better, as because of its portrait shape the top and bottom would otherwise appear cropped off in thumbnail previews! ;) This print measures 7x5" in portrait format and is offered with free shipping ... other sizes can be made available upon request with prices adjusted accordingly, let me know if you would prefer a larger print and I can give you a quote for the size of your choice and make a custom order. A professionally printed photograph on archival paper with inks that will not fade in a lifetime. Suitable for matting and framing (not included) International shipping is free (first class mail in the UK, airmail for international orders) The file loaded for display purposes is a small, low resolution file but the shipped print will be printed from the large, high resolution file and the watermark will not appear. Print will be signed on the reverse only if requested All photos in my shop are my own work and I own all rights reserved full copyright, for sale is the printed image only
{ "pile_set_name": "Pile-CC" }
Left-hander Wade Miley said he is well aware of the angst among Milwaukee Brewers fans over the great season (13-4, 3.06 ERA) he is having with the Houston Astros. “My agent keeps me updated with that,” said Miley, who missed pitching in the two-game series at Miller Park by one day. “My agent is on Twitter and he’s always checking up on that stuff.” Most of it is second-guessing because of the team’s pitching issues, but fans have complained that the Brewers allowed Miley to leave after playing a key role (5-2, 2.57 in 16 starts) in helping them advance within a game of the World Series. Miley said the Brewers did make him an offer to stay but the Astros gave him a better deal. “I don’t really want to get into that,” Miley said Tuesday afternoon before the series opener. “I don’t want to create any bad blood either way with that. I made a decision to come to Houston. I loved my time here. I would have loved to come back here, no doubt. It just didn’t work out.” BOX SCORE:Astros 3, Brewers 2 (10 innings) RELATED:Springer's homer in 10th inning sinks Brewers RELATED:'Bad umpiring' led to crucial strike-three call on Yelich RELATED:Counsell has more arms in bullpen but can't go to same ones every day Asked how close the offers were, Miley said, “I mean, it wasn’t close enough, obviously. And it was getting late in the year. It was kind of the same as the year before when I signed here late on a minor league deal. “I’m the type of person that I want to pitch. I don’t want to drag this thing out into spring training again. I just told my agent, ‘I want a job.’ Houston’s close to home. It’s nice. It’s been great. I went with it and no looking back, no regrets. There’s no hard feelings anywhere.” Miley said he didn’t blame the Brewers for wanting to develop their own starting pitchers in Corbin Burnes, Freddy Peralta and Woodruff, who was doing just fine before getting injured. “You can’t just throw them in Triple-A forever,” Miley said. “It just didn’t work out. If it works out, nobody says a word. So, it’s hindsight. Those guys are really good. You can’t take anything away. I think they’re going to turn out to be great major leaguers. It’s just a matter of time.” Miley is well aware that Burnes struggled badly, both in the majors and minors, but said he believes he will bounce back in 2020. “I think he’s going to be great,” Miley said. “He’s going to clear his mind in the offseason and he’ll be back to doing fine. His stuff is too good. It plays up too well. He’s going to be fine. It’s hard to pitch up here, especially when you struggle early.”
{ "pile_set_name": "OpenWebText2" }
Love, Beauty, and Charity Inasmuch as love grows in you, in so much beauty grows; for love is itself the beauty of the soul. Augustine of Hippo There is a variant translation to this quote. “Beauty grows in you to the extent that love grows, because charity itself is the soul’s beauty.” Philanthropy is love in action. Through your actions, through your philanthropy, through your charity, you share your love for the world with the world. When love is shared, love grows making yourself and the world a little more beautiful. In whatever way that looks like in your life, I want to thank you for bringing more beauty, more love, more charity, and more change to this world. As 2017 comes to a close, we mark the end of another year at Change Gangs. It was a great year, and together we donated $13,683 to great charities around the world. Since we founded, we’ve given $65,243.50 to nearly 100 different charities. Here are our final recipients of the year. People for Pets Giving Circle This year, the Pets Giving Circle gave $5,335 for a total of $25,833 to great pet charities. For our last donation in 2017, we chose Big Bones Canine Rescue. Big Bones is a 100% volunteer based shelter and foster based rescue network for all breeds of Mastiff and Great Danes. They receive dogs that are about to be euthanized from shelters in CA, TX, OK, KS, and NM. They have a 13 acre property in Windsor, CO with 4 buildings that can hold up to 30 dogs. All the dogs have indoor and outdoor areas that they can access, plus there are isolated kennels to keep new or sick dogs until their health and temperament can be assessed. In 2015, they adopted out 598 dogs. In 2016, they adopted 860 dogs- 250 of whom were puppies. Poverty Busters This year, Poverty Busters donated $4,727.50 for a total of $26,460. For our last donation in 2017, we chose Project Self-Sufficiency. Located in Loveland, CO, Project Self-Sufficiency creates opportunities for single parent families to become selfpowered by providing intensive support to parents who are ready to build new career pathways. When participants enter the program they are partnered with a skilled advisor who helps them calculate a living wage for the family and then customizes a career planning curriculum and time frame for meeting that living wage. While in school or training for a new career, participants receive help to improve the family’s health (physical and mental), access to reliable transportation, child care, and affordable housing. It can take several years to graduate from the program. Veterans Giving Circle This year, the Veterans Giving Circle donated $2,745.50 for a total of $10,625. For our last donation in 2017, we chose War Horses for Heroes.WarHorses for Heroes provides equine-assisted therapy to veterans who have sustained service-related mental or physical injuries. As a therapy partner for those with mental illness, a horse is intuitive and non-judgmental, providing a trusting and open environment for processing and healing. Veterans with histories of depression or PTSD who participate in equine assisted therapy experience consistent improvement in depression symptoms and increased sociability. Veterans with physical injuries also benefit. Horseback riding benefits the rehabilitation process because the rhythm of a horse’s gait is similar to that of a human’s. It provides the sensation of movement to those with severe injuries affecting mobility. Veterans with spinal cord injuries or other physical disabilities experience improved muscle strength and better balance after participating in equine assisted therapy programs. Do you want a donation team? I’d love to welcome you to one of our giving circles. Just click here to choose the cause you care about most. Connect With Us… Like On Facebook About Sharon Throughout my life, I have donated to help animals, the environment, the homeless, the poor, the Food Bank, the Red Cross and more. You name it, and I’ve probably sent them money. Like many others in today’s economy, the few dollars I had left at the end of the month for philanthropy weren’t making a significant difference for the causes I cared most about– until I discovered the power of giving circles. I'm dedicated to helping people make a big impact on the causes they care about most. Quote “Never doubt that a small group of thoughtful, committed citizens can change the world; indeed, it’s the only thing that ever has.” Margaret Mead Another Quote Past the seeker as he prayed came the crippled and the beggar and the beaten. And seeing them… he cried, “Great God, how is it that a loving creator can see such things and yet do nothing about them?” God said, “I did do something. I made you.” Sufi Teaching Yet Another Quote “What we think or what we know or what we believe is, in the end, of little consequence. The only consequence is what we do.” John Ruskin
{ "pile_set_name": "Pile-CC" }
Q: What library or project generator to use for a first STM32F3 project? I'm about to start my first STM32 project. (I have previously used atmega MCUs, and have decades of experience with C, mostly server-side.) There seem to be three choices, given that I want to develop on the command-line in Linux, using make. an STM32CubeMX generated makefile project, an STM32CubeMX generated makefile project, including FreeRTOS, or a makefile project using libopencm3. The application will process and send messages on 4 or more serial ports, using different protocols. Occasionally GPIOs will be set or cleared. My questions are: Why does libopencm3 exist? Why would someone choose it over an STM32CubeMX-generated makefile project. Is learning FreeRTOS worthwhile for such a project? A: There are no good free project generation tools that I know. I worked mostly with STM32CubeMX and I can tell you that it's surely useful (expecially for novices) but long from being something you can trust on. I found lots of bugs in it in the years, some has been fixed, others are still in there. IMHO, in general, you should use code generator tool with care better as a training instrument maybe taking snippets of code out of them. I've used FreeRTOS a lot and I can tell you I feel good with it. Maybe it's not good as as a commercial grade product but surely it's well documented and easy to handle. Haven't had any problem with it.
{ "pile_set_name": "StackExchange" }
SF millennials won’t be able to buy a home for 20 years, says survey - rajnathani https://sf.curbed.com/2018/12/13/18139261/millennial-renters-homebuyers-san-francisco-apartmentlist-down-payment ====== pontifier Every dollar paid in rent increases the value of property in support of those who already own it. It's a double whammy. I myself benefit from this situation, but see it's vicious cycle. As long as people keep paying rent, rents will rise and property values will rise as well. It's not sustainable indefinitely, and I see problems on the horizon as people change their priorities. ~~~ rajnathani The only direct variable which has an inverse relation to the vicious cycle is the property tax rate, as higher property taxes increases the effective price for property ownership. In California due to Prop 13, the property tax rate (of ~1% of the initially appraised market value of the home) gets negated by inflation, and it's further countered in regions such as the Bay Area by the sustained increase in demand from the influx of residents and higher wage growth.
{ "pile_set_name": "HackerNews" }
// Copyright 2015 Dolphin Emulator Project // Licensed under GPLv2+ // Refer to the license.txt file included. #pragma once #include <memory> #include <optional> #include <vector> #include "Common/CommonTypes.h" class PointerWrap; namespace DiscIO { struct Partition; } namespace DVDInterface { enum class ReplyType : u32; } namespace DiscIO { enum class Platform; class Volume; } // namespace DiscIO namespace IOS::ES { class TMDReader; class TicketReader; } // namespace IOS::ES namespace DVDThread { void Start(); void Stop(); void DoState(PointerWrap& p); void SetDisc(std::unique_ptr<DiscIO::Volume> disc); bool HasDisc(); bool IsEncryptedAndHashed(); DiscIO::Platform GetDiscType(); u64 PartitionOffsetToRawOffset(u64 offset, const DiscIO::Partition& partition); IOS::ES::TMDReader GetTMD(const DiscIO::Partition& partition); IOS::ES::TicketReader GetTicket(const DiscIO::Partition& partition); bool IsInsertedDiscRunning(); // This function returns true and calls SConfig::SetRunningGameMetadata(Volume&, Partition&) // if both of the following conditions are true: // - A disc is inserted // - The title_id argument doesn't contain a value, or its value matches the disc's title ID bool UpdateRunningGameMetadata(const DiscIO::Partition& partition, std::optional<u64> title_id = {}); void StartRead(u64 dvd_offset, u32 length, const DiscIO::Partition& partition, DVDInterface::ReplyType reply_type, s64 ticks_until_completion); void StartReadToEmulatedRAM(u32 output_address, u64 dvd_offset, u32 length, const DiscIO::Partition& partition, DVDInterface::ReplyType reply_type, s64 ticks_until_completion); } // namespace DVDThread
{ "pile_set_name": "Github" }
As an experienced solo artist and newly inducted full-time member of the legendary Pacific Northwest rock group Death Cab For Cutie, Dave Depper has had quite the share of experiences in his musical career. Between the release of his first solo record in the summer of 2017, Emotional Freedom Technique, and preparing for the release of a new Death Cab album and tour this coming fall, Depper has a lot going on. After playing Travelers’ Rest in Montana this past Saturday with Death Cab, he was having so much fun that he decided to hitch a ride with his friends in The Decemberists instead of flying home a day earlier. Casual enough, right? Fortunately, Dave was able to sit down and have a conversation with the Daily over the phone, and talk about his latest album, songwriting and working with a band like Death Cab For Cutie. The Michigan Daily: So, your website describes you as the “go-to guy” in the Northwest music scene. Tell me about how you built yourself up as a musician to become this in demand player in the Northwest. How did you establish yourself as this prominent multi-instrumentalist as both a soloist and a collaborator? Dave Depper: Well, it was not by design, it was sort of accidental. I moved to Portland in 2003, and I had a background of playing guitar and piano and bass, and it all sort of happened accidentally when I fell in with this group of people that were based around a record label called Hush Records, who actually were the first people to sign The Decemberists. I joined a band called Norfolk and Western, and at the time their drummer Rachel Blumberg was also the drummer of the Decemberists, which is apropos because I was sleeping on their tour bus last night. the singer of Norfolk opened up this studio called Type Foundry, which is still here today. It was kind of a focal point for Portland music and recording. And for whatever reason, I sort of became his go to session guy. I was just very open to wanting to collaborate with anyone, and I never said no to an opportunity. And it wasn’t some big ambitious plan to be “the guy” or anything, I just genuinely loved working with new people. It didn’t happen overnight. TMD: And now you’ve got your own album out and you’re playing with Death Cab For Cutie. I’d say that’s a pretty good run. DD: Thank you. Yeah, when people ask me like, how do you make it, I tell then to work hard at what you do, but also being the guy or gal that people want to ride in a van with for hours at a time is just as important in this industry. TMD: So now that you’ve had these experiences working as a solo and touring musician, what sort of takeaways have you gotten from working in one area that have benefited the other? DD: Ah, good question. I would say that working on an album like Emotional Freedom Technique sharpened my skill set all around, because I was really committed to playing everything on that record. I was a confident guitarist, but not a super confident singer, and okay keyboardist, but I also didn’t know too much in synthesizer, so I did my best to level up in all of those areas. And then right when that album finished, we started on the Death Cab album, so I went into that album feeling a lot more confident musically. So if I wasn’t confident going in the studio writing with the band, at least I had this musical confidence, and the rest sort of caught up. And the other way around, I feel like Death Cab really hasn't influenced me too much besides I’ve just been listening to them forever. I put out my album before I joined the band officially, and it was just this bedroom project that seemed to have no finish date. And then when I did join the band, I realized that I wouldn’t be putting it out as this moderately successful Portland session guy, I’d be putting it out as a member of Death Cab, which seemed like a bigger thing to me. TMD: What’s it been like writing with Death Cab compared to your solo stuff? DD: It’s been a pretty amazing opportunity. I’ve been playing with them for four years as a live guitarist, but then like a year and a half ago, I started getting demos from Ben in my inbox, and I was like, woah, these are new songs that have never been heard, this is very surreal. Then I sort of had to find my place in writing, like, is it my place to say I don’t like the bridge on this song, or whatever. But we sat down and had some pretty frank talks about what was gonna be expected, and he [Gibbard] said, “look, we brought you into this band because we like your musicality and trust you… you don’t get to produce the record but your ideas will be taken in just like anyone else’s”. It did take a minute to get used to, but at the end of the day, I got to play a big part in how the album sounds and I’m super grateful for that. TMD: Yeah, and that’s coming out really soon isn’t it? DD: Yeah, it’s coming out next Friday, it’s surreal. TMD: And then after the release, you’ve got your upcoming tour for the album. What’s it been like preparing for the tour, especially compared to preparing for live sets of your solo music? DD: Well, obviously Death Cab has a much larger infrastructure around it compared to Death Cab, my own things is just me and my friend doing our own things, putting things together and doing our own sound, while Death Cab has this big crew and guitar techs and stuff like that. So yeah, they’re pretty different. I do find my own shows to be much more intimidating than Death Cab shows although there’s a fraction of the people there just cause… I don’t think I’m a natural front person, and I get very nervous about having all the crowd’s attention on me the whole show. So props to people like Ben that carry on two hour rocks shows with people staring at them the whole time. But yeah there’s just a lot of moving part to Death Cab. But we’ve really delved into the tech side of things, there’s been a lot of sitting in dark studio rooms on sunny days dealing with computers and pedals and things, just getting it all ready to go. But I think it’s all gonna pay off. The tour this fall, I think, is going to pretty spectacular. Emotional Freedom Technique is out now, and Death Cab for Cutie’s new album, Thank You For Today comes out on August 17.
{ "pile_set_name": "OpenWebText2" }
/* * Copyright (c) 2003, 2011, Oracle and/or its affiliates. All rights reserved. * DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER. * * This code is free software; you can redistribute it and/or modify it * under the terms of the GNU General Public License version 2 only, as * published by the Free Software Foundation. Oracle designates this * particular file as subject to the "Classpath" exception as provided * by Oracle in the LICENSE file that accompanied this code. * * This code is distributed in the hope that it will be useful, but WITHOUT * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or * FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License * version 2 for more details (a copy is included in the LICENSE file that * accompanied this code). * * You should have received a copy of the GNU General Public License version * 2 along with this work; if not, write to the Free Software Foundation, * Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA. * * Please contact Oracle, 500 Oracle Parkway, Redwood Shores, CA 94065 USA * or visit www.oracle.com if you need additional information or have any * questions. */ package java.lang.instrument; /* * Copyright 2003 Wily Technology, Inc. */ /** * This class serves as a parameter block to the <code>Instrumentation.redefineClasses</code> method. * Serves to bind the <code>Class</code> that needs redefining together with the new class file bytes. * * @see java.lang.instrument.Instrumentation#redefineClasses * @since 1.5 */ public final class ClassDefinition { /** * The class to redefine */ private final Class<?> mClass; /** * The replacement class file bytes */ private final byte[] mClassFile; /** * Creates a new <code>ClassDefinition</code> binding using the supplied * class and class file bytes. Does not copy the supplied buffer, just captures a reference to it. * * @param theClass the <code>Class</code> that needs redefining * @param theClassFile the new class file bytes * * @throws java.lang.NullPointerException if the supplied class or array is <code>null</code>. */ public ClassDefinition( Class<?> theClass, byte[] theClassFile) { if (theClass == null || theClassFile == null) { throw new NullPointerException(); } mClass = theClass; mClassFile = theClassFile; } /** * Returns the class. * * @return the <code>Class</code> object referred to. */ public Class<?> getDefinitionClass() { return mClass; } /** * Returns the array of bytes that contains the new class file. * * @return the class file bytes. */ public byte[] getDefinitionClassFile() { return mClassFile; } }
{ "pile_set_name": "Github" }
A film experience Although the film is based on history, “Red Tails” is no staid documentary. It is an action-packed experience that plunges the audience deeply into fast-paced World War II dogfights. It also draws the audience into the brotherhood of black fighter pilots facing the battle against Nazis and racism. The film gives a realistic look back at the struggle of the first Tuskegee Airmen to be recognized as capable pilots despite a long history of prejudice in America’s military. “We had an agenda of really inspiring and uplifting youth. It’s one page being turned out of many in getting our stories told,” Hemingway said. Nate Parker, who plays flight leader Marty “Easy” Julian in the film, said portraying a character based on a real person made him feel a greater responsibility to give an “honest and true” performance. Parker, 32, said connecting with the experience of being a young black man in the era of Jim Crow was easier when he began to draw the parallel between the obstacles of the young men of the 1940s with those of modern times. “The men then are the men now,” Parker said. “We’re still dealing with a very alive struggle.”
{ "pile_set_name": "Pile-CC" }
Q: Nullpointer exception error for using split and comma operators I want to store the values HTRANS and HBURST in one list and 2'b00 and 3'b000 in another list. But i am getting a null pointer exception in the code which i have written, I have written an SSCCE for the same, please help. import java.util.ArrayList; import java.util.List; public class SSCCE1 { public static void main(String[] args) { List<String> bins = new ArrayList<String>(); bins.add("HTRANS = 2'b00 to 2'b11"); bins.add("HTRANS = 2'b00 to 2'b11, HBURST = 3'b000 to 3'b111"); String[] bins_splitcomma = null; String temp; for(int i =0; i < bins.size(); i++) { temp = bins.get(i); if(temp.contains(",")) { // if element of bins contains comma, case 2. bins_splitcomma = temp.split(","); } else { bins_splitcomma[0] = temp; // if element of bins does not contain a comma, case 1. } } } } Output: Exception in thread "main" java.lang.NullPointerException at codecoveragetool.SSCCE1.main(SSCCE1.java:28) Java Result: 1 My full code: String temp1; String[] bins_splitcomma = null; String[] bins_split; List<String> bins_name = new ArrayList<String>(); List<String> bins_bitrange = new ArrayList<String>(); //List<String> bins_bits = new ArrayList<String>(); ArrayList<ArrayList<String>> bins_bits = new ArrayList<ArrayList<String>>(); List<String> bins = dataStr.get("bins"); System.out.println(bins); for(int i =0; i < bins.size(); i++) { temp1 = bins.get(i); if(temp1.contains(",")) { bins_splitcomma = temp1.split(","); } else { bins_splitcomma = new String[]{temp1}; } for(int j = 0; j < bins_splitcomma.length; j++) { bins_split = bins_splitcomma[j].split("="); // HBURST = 3'b000 to 3'b111 if(!(bins_name.contains(bins_split[0].trim()))) { bins_name.add(bins_split[0].trim()); // HBURST bins_bitrange.add(bins_split[1].trim()); // 3'b000 to 3'b111 ArrayList<String> tempo = returnBits(bins_split[1].trim()); // [3'b000, 3'b001, 3'b010, 3'b011, ... , 3'b111] bins_bits.add(tempo); } } } A: Your line bins_splitcomma[0] = temp; is trying to set an element of a null array as defined in your line String[] bins_splitcomma = null; A: As you first element does not contain ,, so your code will go in else statement which will try to put value at 0th position of bins_splitcomma. But you never initialized it. Try this code ... else { if (bins_splitcomma == null) { bins_splitcomma = new String[5]; } bins_splitcomma[0] = temp; // if element of bins does not contain a comma, case 1. }
{ "pile_set_name": "StackExchange" }
--- abstract: 'Spermatozoa self-propel by propagating bending waves along an active elastic flagellum. The structure in the distal flagellum is likely incapable of actively bending, and as such is largely neglected. Through elastohydrodynamic modeling we show that an inactive distal region confers a significant propulsive advantage when compared with a fully active flagellum of the same length. The optimal inactive length, typically 2–5% (but up to 37% in extremes), depends on both wavenumber and viscous-elastic ratio. Potential implications in evolutionary biology and clinical assessment are discussed.' author: - 'Cara V. Neal' - 'Atticus L. Hall-McNair' - 'Meurig T. Gallagher' - 'Jackson Kirkman-Brown' - 'David J. Smith' date: October 2019 title: 'Doing more with less: the flagellar end piece enhances the propulsive effectiveness of spermatozoa' --- Spermatozoa, alongside their crucial role in sexual reproduction, are a principal motivating example of inertialess propulsion in the very low Reynolds number regime. The time-irreversible motion required for effective motility is achieved through the propagation of bending waves along the eukaryotic axoneme, which forms the active elastic internal core of the slender flagellum. While sperm morphology varies significantly between species [@austin1995evolution; @fawcett1975mammalian; @werner2008insect; @mafunda2017sperm; @nelson2010tardigrada; @anderson1975form], there are clear conserved features which can be seen in humans, most mammals, and also our evolutionary ancestors [@cummins1985mammalian]. In gross structural terms, sperm comprise (i) the head, which contains the genetic cargo; (ii) the midpiece of the flagellum, typically a few microns in length, containing the ATP-generating mitochondria; (iii) the principal piece of the flagellum, typically 40–50$\,\mu$m in length (although much longer in some species [@bjork2006intensity]), the core of which is a “9+2” axoneme, producing and propagating active bending waves through dynein-ATPase activity [@machin1958wave]; and (iv) the end piece, typically a few microns in length, which consists of singleton microtubules only [@zabeo2019axonemal]. Lacking the predominant “9+2” axonemal structure it appears unlikely that the end piece is a site of molecular motor activity. Since the end piece is unactuated, we will refer to it as ‘inactive’, noting however that this does not mean it is necessarily ineffective. Correspondingly, the actuated principal piece will be referred to as ‘active’. A detailed review of human sperm morphology can be found in [@gaffney2011mammalian; @lauga2009hydrodynamics]. While the end piece can be observed through transmission electron and atomic force microscopy [@fawcett1975mammalian; @ierardi2008afm], live imaging to determine its role in propelling the cell is currently challenging. Futhermore, because the end piece has been considered to not have a role in propelling the cell, it has received relatively little attention. However, we know that waveform has a significant impact on propulsive effectiveness, and moreover changes to the waveform have an important role in enabling cells to penetrate the highly viscous cervical mucus encountered in internal fertilization [@smith2009bend]. This leads us to ask: *does the presence of a mechanically inactive region at the end of the flagellum help or hinder the cell’s progressive motion?* The emergence of elastic waves on the flagellum can be described by a constitutively linear, geometrically nonlinear filament, with the addition of an active moment per unit length $m$, which models the internal sliding produced by dynein activity, and a hydrodynamic term $\bm{f}$ which describes the force per unit length exerted by the filament onto the fluid. Many sperm have approximately planar waveforms, especially upon approaching and collecting at surfaces [@gallagher2018casa; @woolley2003motility]. As such, their shape can be fully described by the angle made between the tangent and the head centreline, denoted $\theta$, as shown in Fig. \[fig:sperm-schematic\]. Following [@moreau2018asymptotic; @hall2019efficient] we parameterize the filament by arclength $s$, with $s=0$ corresponds to the head-flagellum joint and $s=L^{*}$ to the distal end of the flagellum, and apply force and moment free boundary conditions at $s=L^{*}$ to get $$E(s)\,\partial_s \theta(s,t) - \bm{e}_3\cdot\int_s^{L^{*}} \partial_{s'} \bm{X}(s',t) \times \left(\int_{s'}^{L^{*}} \bm{f}(s'',t) ds''\right) ds' - \int_s^{L^{*}} m(s',t)\,ds' =0, \label{eq:elasticity0}$$ with the elastic stiffness given, following [@gaffney2011mammalian], by $$E(s)= \begin{cases} (E_p^*-E_d^*)\left( \frac{s-s_d^*}{s_d^*}\right)^2 + E_d^* & s \leq s_d^*, \\ E_d^* & s>s_d^*, \end{cases}$$ where parameters $E_p^* = 8\times10^{-21}$Nm$^2$, $E_d^*=2.2\times10^{-21}\,$Nm$^2$ and $s_d^*=39\,\mu$m$=3.9\times10^{-5}\,$m have been chosen to model the tapering structure of mammalian sperm flagella and match to experimental stiffness measurements [@Lesich2004; @Lesich2008]. The position vector $\bm{X}=\bm{X}(s,t)$ describes the flagellar waveform at time $t$, so that $\partial_s\bm{X}$ is the tangent vector, and $\bm{e}_3$ is a unit vector pointing perpendicular to the plane of beating. Integrating by parts leads to the elasticity integral equation $$E(s)\,\partial_s \theta(s,t) + \bm{e}_3\cdot\int_s^{L^{*}} (\bm{X}(s',t)-\bm{X}(s,t)) \times \bm{f}(s',t) \, ds' - \int_s^{L^{*}} m(s',t)\,ds' =0. \label{eq:elasticity}$$ The active moment density can be described to a first approximation by a sinusoidal traveling wave $m(s,t)=m_0^* \cos(k^*s-\omega^* t)$, where $k^*$ is wavenumber and $\omega^*$ is radian frequency. The inactive end piece can be modeled by taking the product with a Heaviside function, so that $m(s,t) = m_0^* \cos(k^*s-\omega^* t)H(\ell^* -s)$ where $0<\ell^*\leqslant L^*$ is the length of the active tail segment. At very low Reynolds number, neglecting non-Newtonian influences on the fluid, the hydrodynamics are described by the Stokes flow equations $$-\bm{\nabla}p + \mu^* \nabla^2\bm{u} = \bm{0}, \quad \bm{\nabla}\cdot \bm{u} = 0,$$ where $p=p(\bm{x},t)$ is pressure, $\bm{u}=\bm{u}(\bm{x},t)$ is velocity and $\mu^*$ is dynamic viscosity. These equations are augmented by the no-slip, no-penetration boundary condition ${\bm{u}(\bm{X}(s,t),t)=\partial_t\bm{X}(s,t)}$, i.e. the fluid in contact with the filament moves at the same velocity as the filament. A convenient and accurate numerical method to solve these equations for biological flow problems with deforming boundaries is based on the ‘regularized stokeslet’ [@cortez2001method; @cortez2005method], i.e. the solution to the exactly incompressible Stokes flow equations driven by a spatially-concentrated but smoothed force $$-\bm{\nabla}p + \mu^* \nabla^2\bm{u} + \psi_\varepsilon(\bm{x},\bm{y})\bm{e}_3 = 0, \quad \bm{\nabla}\cdot \bm{u} = 0,$$ where $\varepsilon\ll 1$ is a regularization parameter, $\bm{y}$ is the location of the force, $\bm{x}$ is the evaluation point and $\psi_\varepsilon$ is a smoothed approximation to a Dirac delta function. The choice $$\psi_\varepsilon(\bm{x},\bm{y})=15\varepsilon^4/r_\varepsilon^{7},$$ leads to the regularized stokeslet [@cortez2005method] $$S_{ij}^\varepsilon(\bm{x},\bm{y})=\frac{1}{8\pi\mu}\left(\frac{\delta_{ij}(r^2+2\varepsilon^2)+r_ir_j}{r_\varepsilon^3} \right) ,$$ where $r_i=x_i-y_i$, $r^2=r_i r_i$, $r_\varepsilon^2=r^2+\varepsilon^2$. The flow $u_j(\bm{x},t)$ produced by a filament $\bm{X}(s,t)$ exerting force per unit length $\bm{f}(s,t)$ is then given by the line integral $\int_0^{L^*} S_{jk}^\varepsilon(\bm{x},\bm{X}(s,t))f_k(s,t)\,ds$. The flow due to the surface of the sperm head $\partial H$, exerting force per unit area $\bm{\varphi}(\bm{Y},t)$ for $\bm{Y}\in\partial H$, is given by the surface integral $\iint_{\partial H} S_{jk}^\varepsilon(\bm{x},\bm{Y})\varphi_k(\bm{Y})\,dS_{\bm{Y}}$, yielding the boundary integral equation [@smith2009boundaryelement] for the hydrodynamics, namely $$u_j(\bm{x},t)=\int_0^{L^*} S^\varepsilon_{jk}(\bm{x},\bm{X}(s,t))f_k(s,t)\,ds+\iint_{\partial H} S_{jk}^\varepsilon(\bm{x},\bm{Y})\varphi_k(\bm{Y},t)\,dS_{\bm{Y}}. \label{eq:flow}$$ The position and shape of the cell can be described by the location $\bm{X}_0(t)$ of the head-flagellum join and the waveform $\theta(s,t)$, so that the flagellar curve is $$\bm{X}(s,t)=\bm{X}_0(t)+\int_0^s [\cos\theta(s',t),\sin\theta(s',t),0]^T \,ds'. \label{eq:geometry}$$ Differentiating with respect to time, the flagellar velocity is then given by $$\bm{u}(\bm{X}(s,t),t)=\dot{\bm{X}}_0(t)+\int_0^s\partial_t\theta(s',t)[-\sin\theta(s',t),\cos\theta(s',t),0]^T \,ds'. \label{eq:kinematic1}$$ Modeling the head as undergoing rigid body motion around the head-flagellum joint, the surface velocity of a point $\bm{Y}\in\partial H$ is given by $$\bm{u}(\bm{Y},t)=\dot{\bm{X}}_0(t)+\partial_t \theta(0,t)\,\bm{e}_3 \times (\bm{Y}-\bm{X}_0). \label{eq:kinematic2}$$ Eqs.  and couple with fluid mechanics (Eq. ), active elasticity (Eq. ), and total force and moment balance across the cell to yield a model for the unknowns $\theta(s,t)$, $\bm{X}_0(t)$, $\bm{f}(s,t)$ and $\bm{\varphi}(\bm{Y},t)$. Non-dimensionalising with lengthscale $L^*$, timescale $1/\omega^*$ and force scale $\mu^*\omega^* {L^*}^2$ yields the equation in scaled variables (dimensionless variables denoted with $\,\hat{}\,$ ) $$\partial_{\hat{s}} \theta(\hat{s},\hat{t})+ \bm{e}_3\cdot\mathcal{S}^4\int_{\hat{s}}^1 (\hat{\bm{X}}(\hat{s}',\hat{t})\,-\hat{\bm{X}}(\hat{s},\hat{t})) \times \hat{\bm{f}}(\hat{s}',\hat{t}) \,d\hat{s}' - \mathcal{M}\int_{\hat{s}}^1 \cos(\hat{k}\hat{s}'-\hat{t})H(\ell-\hat{s}') \,d\hat{s}' =0, \label{eq:elasticityND}$$ where $\mathcal{S}=L^*(\mu^*\omega^*/E^{L})^{1/4}$ is a dimensionless group comparing viscous and elastic forces (related, but not identical to, the commonly-used ‘sperm number’), $\mathcal{M}=m_0^*{L^*}^2/E^{L}$ is a dimensionless group comparing active and elastic forces, and $\ell=\ell^*/L^*$ is the dimensionless length of the active segment. Here $E^L$ is the stiffness at the distal tip of the flagellum ($\hat{s}=1$) and the dimensionless wavenumber is $\hat{k}=k^*L^*$. The problem is numerically discretised as described by Hall-McNair *et al*. [@hall2019efficient], accounting for non-local hydrodynamics via the method of regularized stokeslets [@cortez2005method]. This framework is modified to take into account the presence of the head via the nearest-neighbor discretisation of Gallagher & Smith [@gallagher2018meshfree]. The head-flagellum coupling is enforced via the dimensionless moment balance boundary condition $$\partial_{\hat{s}}\theta(0,\hat{t}\,)-\bm{e}_3\cdot\mathcal{S}^4\iint_{\partial \hat{H}}(\hat{\bm{Y}}(\hat{t}\,)-\hat{\bm{X}}_0(\hat{t}\,))\times\hat{\bm{\varphi}}(\hat{\bm{Y}},\hat{t}\,)\,dS_{\hat{\bm{Y}}}=0.$$ Note that for the remainder of this letter we will work with the dimensionless model but drop the $\,\hat{}\,$ notation used to represent dimensionless variables for clarity. The initial value problem for the flagellar trajectory, discretised waveform and force distributions is solved in MATLAB^^ using the built in solver $\mathtt{ode15s}$. At any point in time, the sperm cell’s position and shape can be reconstructed completely from $\bm{X}_0(t)$ and $\theta(s,t)$ through equation (\[eq:geometry\]).\ *Results.* The impact of the length of the inactive end piece on propulsion is quantified by the swimming speed and efficiency. Velocity along a line (VAL) is used as a measure of swimming speed, calculated via $$% \text{VAL}^{(j)} = \frac{||\bm{X}_0^{(j)}-\bm{X}_0^{(j-1)}||}{T}, \text{VAL}^{(j)} = \|\bm{X}_0^{(j)}-\bm{X}_0^{(j-1)}\| / T ,$$ where $T=2\pi$ is the period of the driving wave and $\bm{X}_0^{(j)}$ represents the position of the head-flagellum joint after $j$ periods. Lighthill efficiency [@lighthill1975mathematical] is calculated as $$% \eta^{(j)} = \frac{\left(\text{VAL}^{(j)}\right)^2}{\overline{W}}, \eta^{(j)} = \left(\text{VAL}^{(j)}\right)^2 / \,\overline{W}^{(j)},$$ where $\overline{W}^{(j)} = \left< \int_{0}^{1}\bm{u} \cdot \bm{f} ds' \right>$ is the average work done by the cell over the $j$^th^ period. In the following, $ j $ is chosen sufficiently large so that the cell has established a regular beat before its statistics are calculated ($j=3$ is sufficient for what follows). ![ The effect of the inactive end piece length on swimming speed and efficiency of propulsion at various wavenumbers, along with velocity-optimal waveforms and example data for human sperm. (column 1) Velocity along a line (VAL) versus active length $\ell$ for viscous-elastic parameter choices $\mathcal{S}=18,\,13.5,\,9$, and wavenumbers $k=3\pi,\,4\pi,\,5\pi$; (column 2) Lighthill efficiency versus active length $\ell$ for the same choices of $\mathcal{S}$ and $k$; (column 3) velocity-optimal cell waveforms for each $\mathcal{S}$ and $k$; (column 4) experimental data showing the instantaneous waveform of a human sperm in high viscosity medium, with centerline plotted in purple (tracked with FAST [@gallagher2019rapid]), scale bar denotes 5$\mu$m. []{data-label="fig:results-main"}](results_main_mtg.png){width="90.00000%"} The effects of varying the dimensionless active tail length on sperm swimming speed and efficiency for three choices of dimensionless wavenumber $k$ are shown in Fig. \[fig:results-main\]. Here $ \ell=1 $ corresponds to an entirely active flagellum and $ \ell = 0 $ to an entirely inactive flagellum. Values $ 0.5 \leqslant \ell \leqslant 1 $ are considered so that the resulting simulations produce cells that are likely to be biologically realistic. Higher wavenumbers are considered as they are typical of mammalian sperm flagella in higher viscosity media [@smith2009bend]. Results are calculated by taking $ m_0^* = 0.01 \,\mu^* \omega^* {L^{*}}^2 k / \mathcal{S} $ ($k$ dimensionless, $m_0^*$ dimensional) and hence $ \mathcal{M} = 0.01\, k \mathcal{S}^3 $, the effect of which is to produce waveforms of realistic amplitude across a range of values of $k$ and $\mathcal{S}$. Optimal active lengths for swimming speed, $\ell_{\text{VAL}}$, and efficiency, $\ell_{\eta}$, occur for each parameter pair $(\mathcal{S},k)$; crucially, in all cases considered in Fig. \[fig:results-main\], the optima are less than 1, indicating that by either measure some length of inactive flagellum is generally always better than a fully active flagellum. Values of $ \ell_{\text{VAL}} $ and $ \ell_{\eta} $ for the $ (\mathcal{S},k) $ parameter pairs considered in Fig. \[fig:results-main\] are given in Table \[table:lopt\]. Typically $ \ell_{\text{VAL}} \neq \ell_{\eta} $ for a given swimmer. For each metric, optimum active length remains approximately consistent regardless of the choice of $ \mathcal{S} $ when $ k=3\pi $ or $4\pi $. When $k=5\pi$, much higher variability in optimum active length is observed. In Fig. \[fig:results-colormaps\], the relationship between optimum active flagellum length and each of VAL and $ \eta $ is further investigated by simulating cells over a finer gradation in $ \mathcal{S} \in [9,18] $. When $ k=3\pi $ and $ 4\pi $, we again observe that a short inactive distal region is beneficial to the cell regardless of $ \mathcal{S} $. For $ k=5\pi $, there is a clear sensitivity of $ \ell_{\text{VAL}} $ to $ \mathcal{S} $, which is not observed between $ \ell_{\eta} $ and $ \mathcal{S} $. In all cases, the optimum values $ \ell_{\text{VAL}} $ and $ \ell_{\eta} $ are strictly less than 1. ![ Normalized VAL (top row) and normalized Lighthill efficiency (bottom row) values for varying $ 0.5 \leqslant \ell \leqslant 1 $ and $ 9 \leqslant \mathcal{S} \leqslant 18 $, for three values of dimensionless wavenumber $ k $. Values in each subplot are normalized with respect to either the maximum VAL or maximum $ \eta $ for each $ k $. []{data-label="fig:results-colormaps"}](results_colormaps.pdf){width="65.00000%"} The waveform and velocity field associated with flagella that are fully-active and optimally-inactive for propulsion are shown in Fig. \[fig:results-streamlines\]. The qualitative features of both waveform and the velocity field are similar, however the optimally-inactive flagellar waveform has reduced curvature and tangent angle in the distal region, and increased velocity in both ‘oblique’ regions (i.e. where $\theta\approx\pm\pi/4$).\ ![ Comparison of the normalized flow fields around the end of a simulated sperm for (a) a fully active flagellum, and (b) a flagellum featuring an inactive distal region of length $ 1-\ell_{\text{VAL}} $. The active part of the flagellum is drawn in red and the inactive region in black. Fluid velocity is scaled against the maximum velocity across both frames, with magnitude indicated by the colorbar and direction by the field lines. Here, $ k=4\pi $, $ \mathcal{S}=13.5 $ and $ \ell_{\text{VAL}} = 0.95$. []{data-label="fig:results-streamlines"}](results_streamlines.pdf){width="75.00000%"} *Discussion.* In simulations, we observe that spermatozoa which feature a short, inactive region at the end of their flagellum swim faster and more efficiently than those without. For $k=3\pi $ and $ k=4\pi $, cell motility is optimized when $ \approx 5\% $ of the distal flagellum length is inactive, regardless of $\mathcal{S}$. Experimental measurements of human sperm indicate an average combined length of the midpiece and principal piece of $ \approx 54\mu $m and an average end piece length of $ \approx 3\mu $m [@cummins1985mammalian], suggesting that the effects uncovered here are biologically important. Results for waveforms that are characteristic of those in higher viscosity fluids indicate that in some cases ($k=5\pi$) much longer inactive regions are optimal, up to $ \approx\SI{22}{\micro\meter}/\SI{57}{\micro\meter} $ or $\approx 37\%$ of the flagellum – substantially longer than the end piece observed of human spermatozoa. Sperm move through a variety of fluids during migration, in particular encountering a step change in viscosity when penetrating the interface between semen and cervical mucus, and having to swim against physiological flows [@Tung2015]. Cells featuring an optimally-sized inactive end piece may form better candidates for fertilization, being able to swim faster and for longer when traversing the female reproductive tract [@holt2015sperm]. The basic mechanism by which the flagellar wave produces propulsion is through the interaction of segments of the filament moving obliquely through the fluid [@gray1955propulsion]. Analysis of the flow field (Fig. \[fig:results-streamlines\]) suggests that the lower curvature associated with the inactive end piece enhances the strength of the interaction between the obliquely moving region and the fluid. At high viscous-elastic ratio and wavenumber, a ‘normal’ flagellar waveform can be produced by a relatively large inactive region of around one wavelength (Fig. \[fig:results-main\]). This effect may have physiological relevance in respect of biochemical energy transport requirements from the mitochondria, which are situated in the midpiece. An inactive region of flagellum is not a feature unique to human gametes - its presence can also be observed in the sperm of other species [@fawcett1975mammalian], as well as other microorganisms. In particular, the axomenal structures of the bi-flagellated algae *chlamydomonas reinhardtii* deplete at the distal tips [@jeanneret2016], suggesting the presence of an inactive region. The contribution to swimming speed and cell efficiency due to the inactive distal section in these cases remains unknown. By contrast, the tip of the “9+2" cilium is a more organized “crown" structure [@kuhn1978structure], which will interact differently with fluid than the flagellar end piece modeled here. Understanding this distinction between cilia and flagella, as well as the role of the inactive region in other microorganisms, may provide further insight into underlying biological phenomena, such as chemotaxis [@ALVAREZ2014198] and synchronization [@guo2018bistability; @goldstein2016elastohydrodynamic]. Further work should investigate how this phenomenon changes when more detailed models of the flagellar ultrastructure are considered, taking into account the full “9+2” structure [@ishijima2019modulatory], sliding resistance associated with filament connections [@coy2017counterbend], and the interplay of these factors with biochemical signalling in the cell [@carichino2018]. The ability to qualitatively assess and model the inactive end piece of a human spermatozoon could have important clinical applications. In live imaging for diagnostic purposes, the end piece is often hard to resolve due to its depleted axonemal structure. Lacking more sophisticated imaging techniques, which are often expensive or impractical in a clinical environment, modeling of the end piece combined with flagellar tracking software, such as FAST [@gallagher2019rapid], could enable more accurate sperm analysis, and help improve cell selection in assisted reproductive technologies. Furthermore, knowledge of the function of an inactive distal region has wider applications across synthetic microbiology, particularly in the design and fabrication of artificial swimmers [@dreyfus2005microscopic] and flexible filament microbots used in targeted drug delivery [@montenegro2018microtransformers].\ *Summary and Conclusions.* In this letter, we have revealed the propulsive advantage conferred by an inactive distal region of a unipolar “pusher” actuated elastic flagellum, characteristic of mammalian sperm. The optimal inactive flagellum length depends on the balance between elastic stiffness and viscous resistance, and the wavenumber of actuation. The optimal inactive fraction mirrors that seen in humans sperm ($\approx 3\,\mu$m$/57\,\mu$m, or $ \approx 5\% $). These findings have a range of potential applications. They motivate the development of new methodology for improving the analysis of flagellar imaging data; by model fitting the experimentally visible region it may be possible to resolve the difficult to image distal segment. Inclusion of an inactive region may be an interesting avenue to explore when improving the efficiency of artificial microswimmer design. Finally, important biological questions may now be posed, for example does the presence of the inactive end piece confer an advantage to cells penetrating highly viscous cervical mucus?\ *Acknowledgments.* D.J.S. and M.T.G. acknowledge funding from the Engineering and Physical Sciences Research Council (EPSRC) Healthcare Technologies Award (EP/N021096/1). C.V.N. and A.L.H-M. acknowledge support from the EPSRC for funding via PhD scholarships (EP/N509590/1). J.C.K-B. acknowledges support from the National Institute for Health Research (NIHR) U.K. The authors also thank Hermes Gadêlha (University of Bristol, UK), Thomas D. Montenegro-Johnson (University of Birmingham, UK) for stimulating discussions around elastohydrodynamics and Gemma Cupples (University of Birmingham, UK) for the experimental still in Fig. \[fig:results-main\] (provided by a donor recruited at Birmingham Women’s and Children’s NHS Foundation Trust after giving informed consent). [10]{} C.R. Austin. Evolution of human gametes: spermatozoa. , 1995:1–19, 1995. D.W. Fawcett. The mammalian spermatozoon. , 44(2):394–436, 1975. M. Werner and L.W. Simmons. Insect sperm motility. , 83(2):191–208, 2008. P. S. Mafunda, L. Maree, A. Kotze, and G. van der Horst. Sperm structure and sperm motility of the african and rockhopper penguins with special reference to multiple axonemes of the flagellum. , 99:1–9, 2017. D. R. Nelson, R. Guidetti, and L. Rebecchi. Tardigrada. In [*Ecology and classification of North American freshwater invertebrates*]{}, pages 455–484. Elsevier, 2010. W. A. Anderson, P. Personne, and A. BA. The form and function of spermatozoa: a comparative view. , pages 3–13, 1975. J.M. Cummins and P.F. Woodall. On mammalian sperm dimensions. , 75(1):153–175, 1985. A. Bjork and S. Pitnick. Intensity of sexual selection along the anisogamy–isogamy continuum. , 441(7094):742, 2006. K.E. Machin. Wave propagation along flagella. , 35(4):796–806, 1958. D. Zabeo, J.T. Croft, and J.L. H[ö]{}[ö]{}g. Axonemal doublet microtubules can split into two complete singlets in human sperm flagellum tips. , 593(9):892–902, 2019. E.A. Gaffney, H. Gad[ê]{}lha, D.J. Smith, J.R. Blake, and J.C. Kirkman-Brown. Mammalian sperm motility: observation and theory. , 43:501–528, 2011. E. Lauga and T.R. Powers. The hydrodynamics of swimming microorganisms. , 72(9):096601, 2009. V. Ierardi, A. Niccolini, M. Alderighi, A. Gazzano, F. Martelli, and R. Solaro. characterization of rabbit spermatozoa. , 71(7):529–535, 2008. D.J. Smith, E.A. Gaffney, H. Gad[ê]{}lha, N. Kapur, and J.C. Kirkman-Brown. Bend propagation in the flagella of migrating human sperm, and its modulation by viscosity. , 66(4):220–236, 2009. M.T. Gallagher, D.J. Smith, and J.C. Kirkman-Brown. : tracking the past and plotting the future. , 30(6):867–874, 2018. D.M. Woolley. Motility of spermatozoa at surfaces. , 126(2):259–270, 2003. C. Moreau, L. Giraldi, and H. Gad[ê]{}lha. The asymptotic coarse-graining formulation of slender-rods, bio-filaments and flagella. , 15(144):20180235, 2018. A.L. Hall-McNair, T.D. Montenegro-Johnson, H. Gad[ê]{}lha, D.J. Smith, and M.T. Gallagher. Efficient [I]{}mplementation of [E]{}lastohydrodynamics via [I]{}ntegral [O]{}perators. , 2019. K. Lesich and C. Lindemann. Direct measurement of the passive stiffness of rat sperm and implications to the mechanism of the calcium response. , 59:169–79, 11 2004. K. Lesich, D. Pelle, and C. Lindemann. Insights into the [M]{}echanism of [ADP]{} [A]{}ction on [F]{}lagellar [M]{}otility [D]{}erived from [S]{}tudies on [B]{}ull [S]{}perm. , 95:472–82, 08 2008. R. Cortez. The method of regularized [S]{}tokeslets. , 23(4):1204–1225, 2001. R. Cortez, L. Fauci, and A. Medovikov. The method of regularized [S]{}tokeslets in three dimensions: analysis, validation, and application to helical swimming. , 17(3):031504, 2005. D. J. Smith. A boundary element regularized stokeslet method applied to cilia- and flagella-driven flow. , 465(2112):3605–3626, 2009. M. T. Gallagher and D. J. Smith. Meshfree and efficient modeling of swimming cells. , 3(5):053101, 2018. J. Lighthill. . SIAM, 1975. M.T. Gallagher, G. Cupples, E.H Ooi, J.C Kirkman-Brown, and D.J. Smith. Rapid sperm capture: high-throughput flagellar waveform analysis. , 34(7):1173–1185, 06 2019. C-k. Tung, F. Ardon, A. Roy, D. L. Koch, S. Suarez, and M. Wu. Emergence of upstream swimming via a hydrodynamic transition. , 114:108102, 2015. W. V. Holt and A. Fazeli. Do sperm possess a molecular passport? mechanistic insights into sperm selection in the female reproductive tract. , 21(6):491–501, 2015. J. Gray and G.J. Hancock. The propulsion of sea-urchin spermatozoa. , 32(4):802–814, 1955. R. Jeanneret, M. Contino, and M. Polin. A brief introduction to the model microswimmer [*hlamydomonas reinhardtii*]{}. , 225, 06 2016. C. Kuhn III and W. Engleman. The structure of the tips of mammalian respiratory cilia. , 186(3):491–498, 1978. L. Alvarez, B.M. Friedrich, G. Gompper, and K. U.Benjamin. The computational sperm cell. , 24(3):198 – 207, 2014. H. Guo, L. Fauci, M. Shelley, and E. Kanso. Bistability in the synchronization of actuated microfilaments. , 836:304–323, 2018. R. E. Goldstein, E. Lauga, A. I. Pesci, and M.R.E Proctor. Elastohydrodynamic synchronization of adjacent beating flagella. , 1(7):073201, 2016. S. Ishijima. Modulatory mechanisms of sliding of nine outer doublet microtubules for generating planar and half-helical flagellar waves. , 25(6):320–328, 2019. R. Coy and H. Gad[ê]{}lha. The counterbend dynamics of cross-linked filament bundles and flagella. , 14(130):20170065, 2017. L. Carichino and S. D. Olson. Emergent three-dimensional sperm motility: coupling calcium dynamics and preferred curvature in a kirchhoff rod model. , 2018. R. Dreyfus, J. Baudry, M.L. Roper, M. Fermigier, H.A. Stone, and J. Bibette. Microscopic artificial swimmers. , 437(7060):862, 2005. T.D. Montenegro-Johnson. Microtransformers: [C]{}ontrolled microscale navigation with flexible robots. , 3(6):062201, 2018.
{ "pile_set_name": "ArXiv" }
Wednesday, September 10, 2008 How to be the most awesome Dad ever To be the most awesome Dad ever, capable of carrying out feats of skill and mastery usually reserved for the likes of the Avatar, James Bond, or the Doctor, requires just a few common ingredients: The locked, most secret diary of a pre-adolescent daughter (who has lost the key), The knowledge that all such cheap locks are the same, A set of cheap luggage locks with keys, A frantic pre-adolescent daughter in possession of #1 but not #2 or #3, and A flair for the dramatic, with which one discloses that one knows how to pick locks, but it's a secret handed down from master spy to master spy, therefore the work must be done behind a locked door (which neatly conceals the fact that you're rummaging around in your bedroom drawer to find #3).
{ "pile_set_name": "Pile-CC" }
Zendaya and Val Chmerkovskiy after their performance finale on Monday night's 'Dancing with the Stars.' Tonight's final is at 9 p.m. on WRTV (Channel 6). / Screenshot from ABC.com The monstrous tornado roared through the Oklahoma City suburbs, flattening entire neighborhoods with winds up to 200 mph, setting buildings on fire and landing a direct blow on an elementary school. Here, teachers carry children away from Briarwood Elementary after its destruction Monday. KFOR-TV and NBC News reported that seven of the dead were children who drowned at Plaza Towers Elementary, where 75 students and staff members were huddled when the tornado struck around 3 p.m. (4 p.m. EDT). U.S. Rep. Tom Cole, who has lived in Moore for more than 50 years, told CNN the school did not have an underground shelter, just interior rooms with no windows. Estimates of the tornado’s size ranged from a half-mile to two miles wide; video showed a large debris ball at its base at some points. The National Weather Service preliminarily categorized it as an EF-4 in strength. Expect another sticky and hot day, with a high in the 80s, and stay alert for scattered showers and storms, Poteet says. Many residents already heard plenty of thunder overnight: Thousands were without power following an overnight line of storms that downed trees and took down power lines. The fire ravaged the home of Stephanie Eppert, who lived there with her four children, three of whom have autism. Two of them, brother and sister Genesis Eppert, 9, and Forrest Eppert, 8, were killed in the blaze. The family was expected to move this year into a new home specially built by Habitat for Humanity for the children. “Shame on Vogel for not genuflecting when he mentioned the Heat, or for volunteering to kiss James’ ring — ring singular, not rings,” wrote the columnist, tongue firmly in cheek. If you recall, Vogel said on Saturday that Miami was simply the “next” team in the Pacers’ way to an NBA Finals; James took it for an insult. The teams meet next on Wednesday night for Game 1 of the Eastern Conference finals. The poverty rate rose faster in Indianapolis in the last decade than in all but seven other large cities, according to a book released Monday on poverty in metropolitan areas. The share of the city’s population in poverty increased from 11.95 percent to 21.4 percent between 2000 and 2011. The suburban poverty rate in metro Indianapolis rose from 5 percent to 7.7 percent. Said Robert Wilson of Gleaners Food Bank: “We’re just not creating jobs fast enough, and we’re not creating enough good paying jobs that you can support a family on. So we are continuing to distribute record-breaking amounts of food.” The lawsuit pits seven stylists at Lou’s Creative Styles in Lawrence against a former co-worker, Christina “Christy” Shaw, who holds the winning ticket in a Feb. 16 Hoosier Lottery drawing worth an estimated $9.5 million. Shaw’s co-workers says they are due a share of the winnings. Between 2009 and 2012, the company shielded at least $74 billion in profits by setting up shell companies in Ireland, the report said. While the practice of using foreign operations to avoid U.S. taxes is legal and common, Apple’s scheme was unprecedented in its use of multiple affiliates that had no semblance of a physical presence, Senate staffers said. Apple CEO Tim Cook plans to vehemently defend the company before the panel on Tuesday, arguing that Apple does not break any tax laws, according to a copy of the firm’s prepared testimony. Manzarek succumbed to bile duct cancer, according to his manager, Tom Vitorino. He founded the groundbreaking band in 1965 with the singer and lyricist Jim Morrison, later joined by drummer John Densmore and guitarist Robby Krieger. While Morrison died young and achieved legendary status, Manzarek also played a crucial role in developing their sound and popularity. When the comedian was just starting out, he struck up a friendship with Elizabeth “Mimi” Haist, a woman who volunteered at a Los Angeles laundromat and depended on tips from customers, the New York Daily News reports. When Galifianakis learned a few years ago that his friend, 87, had fallen on hard times and was homeless, he got her an apartment and started taking her to red carpet events. “I’m looking forward to it, I like the excitement of it,” Haist said of his latest movie premiere. Zendaya has a 1-point edge on Kellie Pickler after Monday night’s performance final. One casualty beyond the other two teams: Val Chmerkovskiy bloodied his face when he bashed it during Monday rehearsals when Zendaya accidentally hit him just above the eye with her elbow. Tonight’s two-hour finale at 9 p.m. on WRTV (Channel 6) will include one last "instant" dance for the stars. Scores will be added to the public vote to determine a winner.
{ "pile_set_name": "Pile-CC" }
Q: Showing that a topological space is ${\rm T}_1$ Let $X$ be a topological space and let $\Delta = \{(x,x) : x\in X \}$ be the diagonal of $X\times X$ (with the product topology). I was asked to prove that $X$ is ${\rm T}_1$ if and only if $\Delta$ can be written as intersection of open subsets of $X\times X$. I think is better (maybe easier) to use the well-known result "$X$ is ${\rm T}_1$ if and only if $\{x\}$ is a closed set $\forall x\in X$". What I've done: Assuming that $X$ is ${\rm T}_1$, let $Y=(X\times X) \setminus\Delta$ and note that (trivially) $$Y = \bigcup_{y\in Y} \{y\}.$$ Then $$\Delta = (X\times X) \setminus Y = (X\times X) \setminus \left(\bigcup_{y\in Y} \{y\} \right) = \bigcap_{y\in Y} (X\times X)\setminus \{y\},$$ where $(X\times X)\setminus\{y\}$ is open since each $\{y\}$ is closed. The other direction seems be a bit harder, I've tried unsuccessfully. Any ideas? Thanks in advance. A: Suppose that $$\Delta = \bigcap \{O_i: i\in I\}$$ for some index set $I$, and all $O_i$ open in $X \times X$. Let $x\neq y$, to show $T_1$-ness, we need to find an open set $O$ of $X$ that contains $x$ but misses $y$. So consider $(x,y)$, which is not in $\Delta$, so there is an $i \in I$ such that $(x,y)\notin O_i$. Now $(x,x) \in \Delta \subseteq O_i$, so by using the product base we can find an open set of the form $U\times V$ that contains $(x,x)$ and sits inside $O_i$. But then $O=U \cap V$ contains $x$ but not $y$, as $y \in U \cap V$ would imply $(x,y) \in U \times V \subseteq O_i$, while we had $(x,y) \notin O_i$ by choice of $i$. So we have our open set as required.
{ "pile_set_name": "StackExchange" }
Today is my mother’s birthday. She would have been 72. I remember vividly her birthday last year. She, me and all the Milks, my sister, her husband and their girls, and a special day out at London Zoo. I’d just had my fringe cut and, as always, was nervous what my mum would think. At 33, her opinion was still the most important to me. A daughter dancing for her mother’s attention. We had taken a picnic. A trademark affair. Couscous and roasted vegetable salad, an assortment of sandwiches, delicious rye bread from the deli. We sat on a rounded bench encircling a dwarf maple, our feast of delights spread out around us, carefully placed among the splattering of pigeon droppings. Later, we sang happy birthday as my mother pretended to hide under the hood of her jacket, much to the delight of the children, as we tucked into the most delicious coffee cake I’ve ever eaten. (made by my clever sis). And I remember thinking fleetingly – “Could this be the last time we all celebrate together like this?”. I don’t know why this thought came into my head that day. Perhaps holding something perfect in your hands makes you fear the loss of it. 2 months later as we all sat together on my mother’s old red velvet sofa and posed for a photograph the same thought came into my head. “What if this is the last picture we have all together like this?” 2 months later came the diagnosis, and 4 months later my mother passed away. I don’t know why, and I don’t know how, but I knew what was to come. Instinct wrought from intimacy. I miss you mummy, every day. Brahm’s lullaby – played at her funeral.
{ "pile_set_name": "OpenWebText2" }
The transmembrane protein CD47, also known as integrin-associated protein (IAP), ovarian cancer antigen OA3, Rh-related antigen and MER6, is an immunoglobulin superfamily member involved in multiple cellular processes, including cell migration, adhesion and T cell function. CD47 was originally identified as a tumor antigen on human ovarian cancer and was subsequently shown to be expressed on multiple human tumor types, including both hematologic and solid tumors. The interaction between CD47 and signal regulatory protein alpha (SIRPα), an inhibitory protein expressed on macrophages, prevents phagocytosis of CD47-expressing cells. CD47 is expressed at low levels on virtually all non-malignant cells, and loss of expression or changes in membrane distribution can serve as markers of aged or damaged cells, particularly on red blood cells (RBC). However, high expression of CD47 on cancer cells blocks phagocytic uptake, subsequent antigen cross-presentation and T cell activation, which collectively contribute to tumor immune evasion. Certain human leukemias upregulate CD47 to evade macrophage killing (U.S. Pat. No. 8,562,997). In many hematologic cancers, high CD47 expression is believed to be associated with poor clinical outcomes, for example, Non-Hodgkin Lymphoma, Acute Lymphocytic Leukemia, etc. (U.S. Pat. No. 9,045,541). Similarly, high CD47 expression has been observed in solid tumors such as small cell lung cancer (see, Weiskopf et al. (2016) J. CLIN. INVESTIGATION 126(7): 2610-2620). Agents that block the CD47-SIRPα interaction can restore phagocytic uptake of CD47+ target cells and lower the threshold for macrophage activation, which can enhance the efficacy of therapeutic antibodies with ADCC-enabling activity. Despite the advances made to date, there is still ongoing need for additional agents that block the CD47-SIRPα interaction for use in the treatment of various diseases, including cancers, that are associated with elevated levels of CD47 expression.
{ "pile_set_name": "USPTO Backgrounds" }
Rafael Nadal had to fight like a junkyard dog in the longest match of the week to shake off the determined challenge of the young Russian prospect, Karen Khachanov, and his chances of retaining the US Open title might need some reassessment. Looking serene and commanding all the way to the third round, the Spaniard was forced to grind for a flawed 5-7, 6-5, 7-6 (7), 7-6 (3) win on Arthur Ashe Stadium that took him fours and 23 minutes. The latter part of that was played out under the roof when rain arrived to soothe reddened brows across a venue that has been slowly sizzling since day one. “I don’t think the roof had any impact on the match,” he said courtside. “He is a great opponent, and it was a tough situation. There are things to work on for the next round.” Nadal had to scrap for nearly every point, soaked up 22 aces without reply and endured the indignity of being broken to love when he first served for the match. He blew too many chances to be totally convincing, and he got the job done almost despite himself. Several times he went to the last tick of the shot clock, to add suspense to the drama. He can rest until Sunday, when he plays the unseeded Georgian Nikoloz Basilashvili, who earlier had a mid-match crash before outlasting the Argentinian Guido Pella, 6-3, 6-4, 1-6, 7-6 (4) in two hours and 46 minutes. Nadal, broken early before he found a reliable rhythm, saved three set points in a tense 12th game but, after 55 minutes of high-grade rallying from deep, Khachanov clipped the corner of the deuce box and drilled his eighth ace past the Spaniard’s outstretched racket at 129mph. What began as a minor setback morphed into a crisis when Nadal traded breaks at the start of the second set then, after saving two break points, butchered an easy forehand to hand his disbelieving opponent a 5-4 lead. Khachanov, who had already struck 11 aces and 21 unreturned serves at an efficiency rate of 79%, was within two points of a two-set advantage against the world No 1 but Nadal got hold of his third break opportunity with venom, mid-court, and forced a weak response from the baseline that put him back on level terms. During the break, Nadal had had his right knee strapped, just under the knee-cap, an area that has intermittently made his life a misery in 17 years on the tour. Then, towards the end of a fiercely hot first week, the unexpected: cooling rain. After two hours of a tense and engaging contest, enough drizzle hit the playing area in this extraordinary cement shell to persuade the officials to draw the roof across for the second time on day five. The players were off the court for maybe six minutes; night owls in the UK will be aware that Prime was off the air for a little longer, missing the resumption. Nadal held without fuss, and Khachanov hit a dreadful double-fault (his fourth of the match) on game point. When Nadal drove a crisp forehand down the unprotected ad line for set point, Khachanov looked forlorn – and even sadder when his backhand volley in the subsequent deciding exchange drifted slowly long. Nadal called for the trainer again, for more strapping on his knee. They each had scored exactly 80 points, with a set apiece, in two hours and 10 minutes, but it did not feel like parity. The steam had temporarily leaked from the Russian’s engine, and Nadal was brought sharply back to life in the third, where the battle remained at a grueling level. Both had their chances before they reached the tie-break and it was there that Nadal again showed nerves, wasting four set points before forcing one last mistake from Khachanov’s racket in a 39-shot rally after nearly three and a half hours. Despite having to go to the limits of his stamina and effort – as they entered the deciding set, the defending champion had not hit a single ace in reply to Khachanov’s 18 – Nadal, 10 years older, looked the more likely winner – until broken to love when serving for the match. Within 10 minutes he had to save set point to force the tie-break. He could not have looked much more relieved when it was over.
{ "pile_set_name": "OpenWebText2" }
Nowadays, as processes for producing fat powder, in general, two processes are known, that is, a process for producing fat powder comprising spray-drying a fat or oil which has been emulsified into an oil-in-water type emulsion with water, an emulsifying agent and a hydrophilic base (spray-drying method); and a process for producing fat powder comprising atomizing a molten fat or oil in the atmosphere at a temperature which is lower than the melting point of the fat or oil (spray-cooling method). Among them, by the spray-drying method, stable, free-flowing fat powder can be obtained regardless of the melting point or S.F.I. (Solid Fat Index) of the fat or oil used because the surface of the fat or oil is coated with the hydrophilic base. However, there are many problems such as energy cost for evaporating water, deterioration of flavor of the fat at high temperature, and loss of volatile flavor by volatilization. To the contrary, in the spray-cooling method, although such problems as the above energy cost and deterioration of the flavor are not present, there is a marked disadvantage in that it is difficult to powder a fat or oil having a low S.F.I. and, even if it is powdered, the resulting powder has a low fluidity since the fat or oil containing unsaturated fatty acids segregates on the surface of the powder to make it adhesive. Due to this marked difference in fluidity, fat powder obtained by the spray-drying method has been predominantly and widely used in the fields such as various mixes for bread, cakes and cookies, instant milk powder, soup powder, fodder powder and the like. However, recently the consumers' have demanded products of a higher grade and genuine taste, thus, the excellent flavor peculiar to fat powder obtained by the spray-cooling method has been reevaluated. Nevertheless, the improvement of the fluidity of products obtained by the spray-cooling method is strongly needed. Heretofore, as a process for improving fluidity of fat powder, 10 to 50% by weight of wheat flour, starch and sugar have been added to the powder. Further, in Japanese Pat. Kokoku No. 50-14650 entitled "Process for Producing Fat Powder", there is disclosed a process of melting a starting fat or oil material at a temperature of at highest 15.degree. C. higher than the melting point thereof; cooling it to a temperature of the range between the solidifying point and the melting point of the fat or oil and lower than one third from the bottom of the range; forming a stable b-type crystal nucleus completely by maintaining it at this temperature for 2 to 30 minutes; and then heating to a temperature of at highest 10% higher than the melting point (1st crystalization step); and followed by spraying it into a crystalization chamber maintained at -15.degree. C. to -30.degree. C.; aging the powder obtained at 0.degree. C. to 10.degree. C. for 0.5 to 10 minutes successively in an aging chamber (2nd crystalization step); and mixing the powder with powder of non-oil soluble natural solid material. However, in order to practice this process, an extremely complicated adjustment of the starting liquid material and strict control of the temperature are required and, therefore, many difficulties in operation must be overcome, if it is to be produced on an industrial basis.
{ "pile_set_name": "USPTO Backgrounds" }
The Atlanta University Center Consortium Council of Presidents and Mayor Kasim Reed announced the completion of a collaborative surveillance program that strategically places video cameras and license plate readers around the campus community to create a safer environment. Working through the University Community Development Corp., a community development arm of the AUC, Presidents John Wilson, Ronald Johnson, Valerie Montgomery Rice, and Mary Schmidt Campbell have forged a partnership with the Atlanta Police Foundation and the Atlanta Police Department to install 35 cameras and five license plate readers around the AUC community. The cameras are monitored by AUC police at their respective schools and APD’s video integration center. Each institution – Clark Atlanta University, Morehouse College, Morehouse School of Medicine, Spelman College – paying equal amounts, and the mayor’s office contributing the remaining balance, funded the $700,000 project. The effort highlights the priority the AUC institutions and the city have to combat crime in the community. The VIC’s state-of-the-art system provides a cohesive unit of 24/7 video feeds from the cameras to serve as an additional layer of security to increase the scope and reach of existing campus police departments.
{ "pile_set_name": "Pile-CC" }
Background ========== The prevalence of type 2 diabetes rapidly rose over the past three decades. However its burden is not homogeneously distributed: racial and ethnic minorities usually experience higher prevalence than their non-minority counterparts \[[@B1]\] and are at higher risk of developing diabetes-related complications such as blindness, kidney damage, or depression, impacting both quality of life and mortality rates \[[@B2],[@B3]\]. Self-management, defined as the patient's ability to manage not only the symptoms inherent to a chronic condition but also its treatment and associated lifestyle changes \[[@B4]\], has become increasingly important in the treatment of type 2 diabetes \[[@B5],[@B6]\]. However, because adequate diabetes self-management (DSM) may require considerable lifestyle changes to several domains, namely having a healthy diet, exercising, or glucose monitoring, not all the patients are able to properly follow the self-management plans agreed with their healthcare professionals or advised by clinical guidelines. Racial and ethnic minorities are less likely to engage in DSM behaviors than other population groups, which partially explains observed disparities in health outcomes \[[@B7]\]. Some of the barriers faced by these groups for achieving an adequate DSM are related to characteristics of the groups (such as health literacy or health beliefs) and also of the healthcare system (namely accessibility of culturally sensitive information) \[[@B8],[@B9]\]. Several review studies have assessed the effect of DSM educational programs on the general population \[[@B6],[@B10]-[@B17]\]. Those studies have established that DSM educational programs can improve glycemic control \[[@B11]-[@B16]\], and identified the key characteristics for improving glycemic control, including face-to-face delivery, teaching methods based on cognitive reframing \[[@B11]\], and higher contact time between participant and educator \[[@B16]\]. A smaller number of studies have reviewed the evidence of the effect of these programs on racial/ethnic minorities \[[@B18]-[@B20]\]. Only one study \[[@B18]\] examined their impact on glycemic control, observing a reduction on glycated hemoglobin of 0.32%. There were however some limitations underlying that study, as some of the included interventions combined educational programs with other types of quality improvement strategies, making it difficult to disentangle the individual effect of the educational components. More importantly, no previous meta-regression study has identified the key common characteristics of successful educational programs targeted to racial/ethnic minority groups. This represents a considerable gap in the literature, as programs for racial/ethnic minority groups should have different components from those targeting other population groups, namely addressing the cultural idiosyncrasies associated with each group. Therefore it is not reasonable to assume that the same type of successful program will be equally successful when applied to racial/ethnic minority groups. Additionally, in the past years several clinical trials examining the impact of educational programs to improve diabetes self-management on racial/ethnic minorities have been published, making now possible a more detailed review and analysis of the available evidence regarding the effectiveness of these interventions. In this work we systematically reviewed DSM educational interventions specifically targeted to racial/ethnic minority groups. We studied the characteristics and costs of the interventions, and analyzed their impact on diabetes knowledge, self-management behaviors, and clinical outcomes. Whenever data were available, we performed meta-analyses to examine the short and long-term effects of the interventions, and meta-regressions to identify common characteristics of the interventions associated with better results. Methods ======= The review and its procedures were planned, conducted, and reported according to the Preferred Reporting Items for Systematic Reviews and Meta-Analyses (PRISMA) guidelines \[[@B21]\]. Data sources and searches ------------------------- A comprehensive core search strategy was developed for Medline through Ovid (combining MeSH terms and keywords) and then adapted and implemented in EMBASE and CINAHL (search strategy available in Additional file [1](#S1){ref-type="supplementary-material"}: Table S1). Gray literature and additional articles were searched in twelve more bibliographic sources (Additional file [2](#S2){ref-type="supplementary-material"}: Table S2). The search was not restricted by language or publication date. For all the references selected to be included in the review, backward and forward citation searches were performed in ISI Web of Knowledge. All searches were conducted in October 2012. A bibliographical database was created using EndNote X6, and used to store and manage the retrieved references. Study selection --------------- We included studies analyzing the effectiveness of DSM educational programs targeted to racial/ethnic minority groups with type 2 diabetes. We only included those studies in which at least 90% of the participants pertained to a racial/ethnic minority group considered to be at a higher risk for diabetes complications than the majority population group. Racial/ethnic minority group was defined as a population group with a race or ethnicity different from that of the majority population group of the host country. Groups at higher risk of diabetes complications were identified based on available literature. Interventions had to be exclusively educational, without including any other component such us financial incentives, clinician education or case management. In order to avoid possible comparisons between programs carried out in very heterogeneous settings, with very different health systems and population needs, we restricted this review to those interventions conducted in countries that were members of the OECD \[[@B22]\], when study selection was conducted (November 2012). Eligible designs were randomized controlled trials (RCTs), including cluster randomized controlled trials; controlled trials, including quasi-randomized trials; controlled before-after studies; and non-controlled before-after studies. Studies including a control group were only eligible in case the intervention was compared with care as usual. Titles and abstracts were screened for eligibility, and those fulfilling the inclusion criteria were included in the next stage, where the full texts of the selected articles were retrieved and assessed. Those that met the inclusion criteria were included for data extraction. Two reviewers independently screened citations, and any disagreements were solved by consensus with a third reviewer. Data extraction and quality assessment -------------------------------------- We designed and used structured forms to extract information of interventions' characteristics and their effectiveness. We used a previously developed taxonomy of DSM educational programs to characterize the interventions \[[@B23]\]. The following information was extracted: setting, ethnic group, administration formats, teaching methods, educational contents, educators' background, use of peer educators, and duration. Information of interventions' cost and cost-effectiveness was also extracted. We critically appraised the studies using the Quality Assessment Tool for Quantitative Studies \[[@B24]\], which enables the assessment of both internal and external validity, classifying them into three categories (good, fair or poor) depending on six aspects: selection bias, study design, confounders, blinding, data collection and withdrawals/ dropouts. Two reviewers independently extracted all the information and critically appraised the studies. Disagreements were solved through discussion with a third reviewer. When necessary we contacted the authors of the studies to request additional information. Data synthesis and analysis --------------------------- The effectiveness of the interventions was assessed in terms of their impact on 1) diabetes knowledge, 2) diabetes self-management behavior, and 3) clinical outcomes. Diabetes knowledge was ascertained by measures reflecting the theoretical knowledge the patients had about their condition. Diabetes self-management behavior measured the performance of specific activities related to adequate DSM (diet, exercise, glucose control, foot self-examination, etc.). Clinical outcomes included hemoglobin A1c (HbA1c), body mass index (BMI), or blood pressure, amongst others. All outcomes in all the studies were examined and classified as measuring one of these three domains. Variables that measured other domains were not included in the analysis. Additionally, we conducted independent meta-analyses to analyze short and long-term (six months post-intervention) effect of the interventions on glycemic control. Eligibility criteria for the meta-analyses included randomized controlled trials comparing the interventions with usual care. The mean (standard deviation) of HbA1c levels in each study were extracted. This information was transformed into weighted mean difference and 95% confidence intervals (CI) were calculated and combined using random-effects models. We imputed unreported standard deviations by use of established methods \[[@B25]\]. Heterogeneity was quantified by the I^2^ statistic, where I^2^ ≥ 50% was considered evidence of substantial heterogeneity \[[@B26]\]. Sources of heterogeneity were investigated by a Galbraith plot. Publication bias was quantitatively assessed with Egger test. We used bivariate meta-regression to explore relationships between effect size (ES) and interventions characteristics. The number of included studies was insufficient to perform a multivariate regression analysis. We conducted a sensitivity analysis, excluding the studies with higher risk of bias. All analyses were conducted with Stata, version 12.0 (StataCorp, College Station, Texas). For all the analyses, statistical significance was accepted at *p* \< 0.05. Results ======= Article identification ---------------------- Figure  [1](#F1){ref-type="fig"} reports the screening process. A total of 1,988 unique references were retrieved. 1,386 references were excluded based on title and abstract, resulting in 602 references being included in the next stage. Full text articles were retrieved and assessed, with 24 studies meeting the eligibility criteria. Backward and forward search of these 24 articles identified thirteen additional studies, resulting in thirty seven articles being included in the review \[[@B27]-[@B63]\]. Thirty five of them reported one single intervention, whereas two articles reported two distinct interventions per article. Overall, thirty seven articles were identified, which analyzed the effectiveness of thirty nine different interventions. ![Summary of evidence search and selection.](1472-6823-14-60-1){#F1} Characteristics of the studies and interventions ------------------------------------------------ Table  [1](#T1){ref-type="table"} shows the aggregated characteristics of the interventions and of the studies used to assess their effectiveness. Most of the studies identified were conducted in the US (92%), and published from 2001 onwards (84%). Almost two thirds of the studies were RCTs (73%), and approximately two thirds presented moderate or low risk of bias (65%). ###### Characteristics of the studies and interventions   **Number (N)\*** **Percentage (%)** ----------------------------------------------------------- ------------------------------ -------------------- ---- **Characteristics of the studies (n = 37)**     Country where the intervention took place       United States 34 92   United Kingdom 2 5   Netherland 1 3 Design       Randomized controlled trial 27 73   Quasi-experimental 10 27 Years of publication       Before 2001 6 16   2001-2006 16 43   2007-2012 15 41 Risk of bias       Low 8 22   Moderate 16 43   High 13 35 Number of participants 159 (117)† 7-529‡ **Characteristics of the interventions (n = 39)**     Ethnicity       African American 13 33   Latinos 16 41   Asiatic 2 5   Alaskan-Eskimos 1 2   Multiethnic group 7 18 Place where intervention took place       General Practice 16 44   Community Center 12 33   Home 3 8   Hospital 1 3   Other 4 11 Setting       One-on-one 13 33   Group 17 44   Both 9 23 Family invited to take part in the intervention       Yes 12 31   No 27 69 Delivery       Face-to-face 27 69   Telecommunication 5 13   Both 7 18 Number of teaching methods       1 7 18   2 24 62   3 or more 8 26 Teaching method\*       Didactic 32 82   Goal-setting, dictated 8 21   Goal-setting, negotiated 10 26   Situational problem solving 23 59   Cognitive reframing 7 18   Other 2 5 Number of educational contents       One 7 18   Two 5 13   Three 5 13   Four of more 22 56 Educational Content       Diet 33 85   Exercise 24 65   Self-monitored blood glucose 23 59   Basic diabetes knowledge 21 54   Medication adherence 11 28   Psycho-social 19 49   Other 11 28 Number of educators       One 18 46   Two 14 36   Three or more 4 10 Educators       Nurse 15 39   Dietitian 21 54   Psychologist 2 5   Physician 2 5   Research team or staff 4 10   Other 16 41   Unclear/unspecified 2 5 Peer provider       Yes 12 31   No 26 67 Culturally adapted       Yes 33 85   No 4 10   Unclear/unspecified 2 5 Length of the interventions (months) 8.2 (8.4)† 0.25-48‡ Length of the interventions (number of sessions) 13.1 (13.6)† 1-52‡ Length of the sessions (minutes) 90 (52.9)† 14-240‡ Length of the interventions (total hours of intervention) 23.3 (36.7)† 0.25-180‡ Intensity (total hours of intervention per month) 4.9 (6.9)† 0.2-36‡ \*N is not equal to 37 for all variables, as some characteristics were not reported for all the interventions. †mean (sd); ‡min-max. In relation to the characteristics of the interventions, most of them targeted African American (33%) or Latinos (41%) and took place either in General Practices (41%) or in Community Centers (31%). Face to face was the most common format of delivery (70% of the interventions). Almost half of the interventions followed a group format (44%), whereas one third was delivered individually. Patients were encouraged to bring their relatives in nearly a third of the interventions (31%). On average programs lasted eight months and included 13 sessions, with each session lasting 90 minutes. Most of the programs included multiple teaching methods and multiple contents. Approximately half of the programs were delivered by multidisciplinary educators (54%). Effectiveness of the interventions ---------------------------------- Additional file [3](#S3){ref-type="supplementary-material"}\'; Table S3 shows the characteristics of each study and their impact on diabetes knowledge, self-management behaviors and clinical outcomes. Fifteen studies analyzed the impact of the interventions on diabetes knowledge \[[@B27],[@B29],[@B32],[@B34],[@B37]-[@B39],[@B44],[@B47],[@B48],[@B50],[@B53],[@B56],[@B60],[@B62]\]. In the majority of studies (nine out of fifteen), diabetes knowledge was only measured immediately after the intervention program was finished. Different types of instruments were used to measure outcomes such as diabetes knowledge and its complications or how to conduct adequate diabetes self-management. Eleven of these studies observed that the interventions significantly improved patients' knowledge, whereas the remaining four did not observe significant effects. Health beliefs were additionally analyzed in two studies, without observing a significant improvement. Twenty studies examined the potential of the interventions to improve self-management behaviors \[[@B27],[@B28],[@B30]-[@B32],[@B34]-[@B36],[@B43]-[@B45],[@B50],[@B54],[@B55],[@B57]-[@B62]\]. Behavioral outcomes were heterogeneous, being related in most instances to dietary or physical activity behaviors, but also to behaviors related to blood glucose testing, foot care, or medication adherence. Fifteen out of twenty studies (75%) observed that the interventions produced improvements in behavioral outcomes. Interventions were more successful in improving dietary behaviors than in promoting physical activity or medication adherence. Thirty-one studies assessed the impact of the interventions on clinical outcomes \[[@B27],[@B29]-[@B33],[@B37]-[@B44],[@B46]-[@B60],[@B62],[@B63]\]. The most frequent clinical outcome was HbA1c, but blood pressure, fasting blood glucose or BMI were also included in a substantial number of studies. Twenty two studies (71%) observed that the educational programs produced statistically significant improvements in clinical outcomes. Educational programs more frequently improved fasting blood glucose, HbA1c and blood pressure (improved in 71%, 59%, and 57% of the studies, respectively) than other clinical outcomes such as lipid profile (40%), weight/BMI (28%) or waist circumference (25%). Costs were reported in only two studies \[[@B33],[@B40]\]. The cost per patient per year was approximately \$280 in the intervention developed by Banister et al. \[[@B33]\] and \$461 in the intervention by Culica et al. \[[@B40]\]. No study included a formal cost-effectiveness analysis. Effectiveness of the intervention on glycated hemoglobin -------------------------------------------------------- Twenty-one interventions employed HbA1c measures and were included in an initial meta-analysis that assessed possible baseline HbA1c differences between intervention and control groups. No statistically significant differences were found (HbA1c mean difference = -0.02% \[95% CI -0.22% to 0.18%\]). A second meta-analysis was conducted to estimate the pooled difference in HbA1c between the intervention and control group immediately after the intervention was completed, observing a significant reduction in the overall HbA1c of -0.47% (95% CI -0.76% to -0.17%). Although heterogeneity was high (I^2^ = 66.3%), it was mainly associated with one intervention \[[@B55]\], and once that intervention was excluded, heterogeneity was reduced to 0%. Twenty interventions were therefore included in the final meta-analysis, reporting on 3,094 patients (1,551 in the intervention and 1,543 in the control group). The combined effect of the intervention produced a significant reduction in the overall HbA1c of -0.31% (95% CI -0.48% to -0.14%) (Figure  [2](#F2){ref-type="fig"}). Egger test indicated the absence of publication bias (*p* = 0.22). One of the studies included in the meta-analysis presented high risk of bias \[[@B44]\]. We conducted a sensitivity analysis excluding it, obtaining very similar results. ![**Forest plot.** HbA1c, Glycated hemoglobin; 95% CI = 95% confidence interval.](1472-6823-14-60-2){#F2} Only three studies measured HbA1c at six months post-intervention \[[@B30],[@B45],[@B52]\]. A meta-analysis of these three studies observed a reduction in pooled HbA1c of -0.47%, although no significant differences were observed (*p* = 0.13). Intervention characteristics associated with treatment effects -------------------------------------------------------------- We conducted bivariate meta-regressions of the 20 RCTs included in our meta-analysis in order to identify the characteristics associated with increased short-term HbA1c reduction (results reported in Table  [2](#T2){ref-type="table"}). Interventions delivered face to face obtained better results than those interventions supported by telecommunication. Also, those delivered individually performed better than those delivered in a group format. As for the teaching methods, both interventions that employed cognitive reframing techniques, as well as those including only one teaching method, were associated with better outcomes. Finally, those interventions that included at least one peer educator produced significantly better effects than those not including any peer educator. ###### Meta-regression of the effect of intervention´s characteristics on pooled glycated hemoglobin (N = 20)   **Number interventions**^**a**^ **SMD** **95% CI** **Residual I**^**2**^ ---------------------------------------------- ----------------------------------------------- ---------------------------------------------- ------------- ----------------------- ---------------- -------------- --- Country       0.00%   US 18 -0.28\*\* -0.47; -0.09     Netherland 1 -0.82 -1.85; 0.21     UK 1 -0.06 -0.88; 0.77   Year       1.74%   Prior 2001 2 -0.51 -1.29; 0.26     2001-2006 6 0.32 -0.52; 1.15     2007-2012 12 0.18 -0.60; 0.97   Setting       0.00%     Primary Care 9 -0.23 -0.58; 0.11       Community center 6 -0.03 -0.48; 0.41       Other 5 -0.24 -0.74; 0.26   Mean HbA1c at baseline in intervention group       0.08%     HbA1c \< 9% 10 -0.39\*\* -0.96; 0.17       HbA1c ≥ 9% 10 0.06 -0.32; 0.43   Target population       3.33%   Ethnic minority 10 -0.30 -0.58; -0.04     Rural ethnic minority 3 0.31 -0.41; 1.03     Women from ethnic minority group 2 -0.23 -1.04; 0.58     Other (elderly or low income or low literacy) 5 -0.05 -0.47; 0.36   Ethnic minority group       0.00%     African-American 7 -0.10 -0.48; 0.28       Latinos 7 -0.31 -0.80; 0.17       Asiatic 2 -0.54 -1.28; 0.20       Multi-ethnic 4 -0.15 -0.66; 0.35   Individual Vs Group delivered       0.00%     Individual 7 -0.45 -0.75; -0.14       Group 7 0.13 -0.29; 0.56       Both 4 0.32 -0.14; 0.79   Patients accompanied by family       0.00%     No 5 -0.23\*\* -0.44; -0.04       Yes 15 -0.38 -0.84; 0.07   Face to face Vs. telecommunication       0.00%     Exclusively face to face 12 -0.37\*\* -0.62; -0.12       Exclusively telecommunication 3 -0.08 -0.53; 0.37       Combining face to face and telecommunication 5 0.33 -0.11; 0.77   Teaching methods       0.00%     Didactic       0.39%       Yes 14 -0.30\*\* -0.53; -0.07         No 6 -0.03 -0.42; 0.35       Goal setting negotiated       0.00%       Yes 8 -0.29\*\* -0.57; -0.01         No 12 -0.03 -0.41; 0.34       Goal setting dictated       0.00%       Yes 7 -0.26 -0.55; 0.02         No 13 -0.09 -0.48; 0.29       Situational problem solving       0.00%       Yes 10 -0.28\*\* -0.50; -0.06         No 10 -0.08 -0.47; 0.30       Cognitive reframing       0.00%       Yes 4 -0.47\*\* -0.91; -0.03         No 16 0.20 -0.29; 0.68       Number of teaching methods used       0.00%       1 4 -0.58\*\* -1.04; -0.12         2 10 0.37 -0.16; 0.92         3 or more 4 0.27 -0.27; 0.80   Content             Diet       0.00%       Yes 18 -0.35\* -0.54; -0.15         No 1 -0.74 -2.00; 0.50       Exercise       0.00%       Yes 15 -0.33\* -0.54; -0.12         No 4 -0.20 -0.68; 0.28       Blood glucose self-monitoring       0.00%       Yes 13 -0.26\* -0.48; -0.03         No 6 -0.39 -0.81; 0.04       Basic diabetes knowledge       0.00%       Yes 8 -0.28\* -0.53; -0.02         No 11 -0.21 -0.60; 0.17       Medication adherence       0.00%       Yes 9 -0.25\* -0.49; -0.05         No 10 -0.19 -0.58; 0.20       Psycho-social       0.00%       Yes 11 -0.18\* -0.40; 0.03         No 9 -0.38 -0.76; 0.01     Number of contents       5.17%     1 or 2 4 -0.36 -0.84; 0.12       3 or 4 9 0.02 -0.55; 0.58       5 or more 7 0.84 -0.48; 0.65   Educators             Nurse       2.59%       Yes 5 -0.02 -0.43; 0.39         No 14 -0.29\* -0.52; -0.06       Dietician       0.77%       Yes 11 -0.10 -0.27; 0.47         No 8 -0.35\* -0.62; -0.08       Psychologist       2.47%       Yes 1 0.05 -0.65; 0.76         No 18 -0.30\* -0.50; -0.11       Physician       0.00%       Yes 2 0.21 -0.29; 0.72         No 17 -0.33\* -0.54; -0.13       Research team       2.13%       Yes 2 -0.10 -0.77; 0.58         No 17 -0.29\* -0.49; -0.09   Number of types of educators       0.00%     One 11 -0.30\* -0.55; -0.04       Two 6 -0.41 -0.90; 0.07       Three or more 2 0.17 -0.34; 0.70   Peer provider       0.00%     Yes 7 -0.54 -0.93; -0.15\*       No 13 0.29 -0.15; 0.74   Duration of the intervention (months) 8.4 (1.4)† -0.02 -0.05; 0.02   Number of sessions 12.1 (2.1)† -0.01 -0.02; 0.01 0.00% Average duration of each session (hours) 1.5 (0.2)† -0.01 -0.25; 0.23 0.00% Total hours of intervention 21.9 (7.0)† -0.01 -0.01; 0.01 0.00% Intensity (number of hours/month) 4.6 (1.3)† -0.01 -0.09; 0.07 1.60% SMD = standardized mean difference; I^2^ = Variation in standardized mean difference attributable to heterogeneity; 95% CI = 95% confidence interval; HbA1c = glycated hemoglobin. ^a^N is not equal to 20 for all variables, as some characteristics were not reported for all the interventions. \**p* \< 0.05; \*\**p* \< 0.001, † = mean (SE). No statistically significant differences were observed for the total duration of the intervention, the number of sessions included, the duration of each session, the total number of hours of intervention or its intensity (number of hours per month). Discussion ========== In this systematic review we identified and characterized 39 DSM educational programs specifically targeted to racial/ethnic minority groups. Most programs produced some benefits over care as usual in improving diabetes knowledge, self-management behaviors, and clinical outcomes. Furthermore, meta-analyses indicated that these interventions decreased HbA1c, which was significant both from statistical and clinical perspectives. Larger reductions in HbA1c were observed in those interventions delivered individually and face to face, involving peer educators, based on cognitive reframing techniques, and employing a lower number of teaching methods. Long-term effects and cost-effectiveness were rarely assessed. The estimated 0.31% reduction in HbA1c observed in our meta-analysis is modest but clinically significant, as evidence suggests that every percentage point decrease in HbA1c over 10 years is associated with a risk reduction of 21% for deaths related to diabetes, 14% for myocardial infarctions, and 37% for microvascular complications \[[@B64],[@B65]\]. A substantial body of evidence for the effectiveness of educational interventions to improve glycemic control in general population has been generated \[[@B11],[@B12],[@B15],[@B16]\], observing similar effects to the one obtained by our meta-analysis for racial/ethnic minority groups. Our results also reiterate those obtained in a previous meta-analysis of interventions targeting racial/ethnic minority groups (-0.32%) \[[@B18]\]. This is the first meta-regression study analyzing the effect of specific characteristics of educational programs targeted to racial/ethnic minorities. Moreover, meta-regressions of programs targeted to non-minority groups have explored a more reduced number of characteristics \[[@B11],[@B16]\]. Educational programs delivered face to face produced a greater improvement in glycemic control than those delivered using telecommunication based formats. The comparative effectiveness of these two formats of administration is currently a topic of substantial interest, and there is no previous evidence in the context of self-management education in ethnic minorities. Although telecommunication programs have the potential to improve attrition rates, as they can help to overcome barriers such as competing responsibilities and distance to the service, they can represent an additional barrier to patients from racial/ethnic minority groups, who are more likely to have decreased access to information technologies and lower digital literacy \[[@B66]\]. Additionally, our meta-regression suggested that interventions delivered individually produced better results than those delivered in a group format. Previous research on general population has specifically explored this issue, without observing differences between individual and group administration \[[@B10],[@B64]\]. Both the lower maintenance costs and the potential for promoting patient-patient interactions \[[@B67]\] make group-based interventions very appealing. Individual education, however, can more efficiently address patients' individual characteristics and needs, producing better patient engagement. More research is needed to confirm our results. Most of the educational programs included in our review were based on traditional didactic methods, either alone or in tandem with other educational techniques. However, those interventions based on cognitive reframing techniques produced better results. Similar results were obtained in a previous meta-regression of educational programs in the general population \[[@B11]\]. Furthermore, they corroborate previous findings that knowledge of lifestyle guidelines is a necessary but not the only factor required to facilitate the appropriate behavioral changes \[[@B15],[@B17]\], suggesting that a patient's inability to adhere to an adequate self-management might be grounded in motivational factors. The importance of motivational factors to promote the adherence to lifestyle interventions has been previously acknowledged and included in interventions targeting racial and ethnic minorities \[[@B68],[@B69]\]. The involvement of peer providers also produced better results. The benefit of including peer educators has been previously suggested \[[@B70],[@B71]\], and partially explained by the fact that peers can provide a more credible source of information, empower those involved, and reinforce learning through ongoing contact \[[@B72]\]. In order to estimate the complexity of the interventions, we calculated the number of teaching methods and educational contents included in each program. Contrary to our expectations, we observed an inverse association with HbA1c, indicating that less complex interventions led to greater improvements in glycemic control. This is the first study analyzing the relation between complexity and effectiveness, and more research is needed to confirm this potential dilution effect. Strengths and weaknesses ------------------------ The main strength of this study is the comprehensiveness of the searches. Systematic and manual searches were performed in the most relevant bibliographic databases for biomedical research, as well as in specific sites of gray literature. We also examined the effect of a high number of intervention characteristics with the potential to produce better effects, some of which has not previously explored, namely the complexity of the programs or its intensity. Additional strengths are that we specifically focused our review on exclusively educational interventions (i.e., excluding those interventions with additional components such as case management, financial incentives or health provider education) and included sensitivity analysis excluding those studies with higher risk of bias. Our review also has some limitations. First, although we attempted to identify studies conducted in OECD countries, a vast majority of the interventions were conducted in the US, which limits the external validity of our results. Second, our meta-analysis and meta-regression was restricted to glycemic control. Although we attempted to conduct meta-analyses on other relevant outcomes such as diabetes knowledge, they were not consistently available or uniformly measured. Finally, although formal tests on publication bias seemed to exclude its presence, we cannot completely rule out its existence. Remaining gaps in knowledge --------------------------- More than 90% of the studies included in this review were conducted in the US, which limits the external validity of our results. Ethnic/racial inequalities in rates of diabetes-related complication have been observed in multiple countries and ethnic minorities \[[@B3]\]. Therefore, the effectiveness of interventions specifically targeting minorities needs to be assessed. This review also found that there is a considerable knowledge gap regarding the long-term effects of these interventions. Only about a fourth of the studies included had a post-test assessment, the majority of occurred within six months after the intervention ended. Given that type 2 diabetes is a chronic condition, it is crucial to understand not only that self-management educational programs can produce a discrete impact, but also whether the impact is sustained in the long term. Also importantly, a quarter of the interventions included in this review were evaluated through quasi-experimental studies. Some of these studies did not include a randomization element in the design, whereas other did not include a control group (non-controlled before-after studies). Moreover, a significant proportion of the studies (35%) presented a high risk of bias, which included small sample sizes, relevant confounders not adequately being controlled for, and participants not blinded to the intervention. Notwithstanding the difficulties underlying the execution of this type of complex clinical trials, larger and methodologically more robust trials are very much needed to confirm the findings of the present review, and to further identify characteristics of successful programs. Finally, only a small proportion of studies included cost-effectiveness estimation, which constitutes another important area for future research. Conclusions =========== In this systematic review we identified and analyzed DSM educational programs specifically targeted to racial/ethnic minority groups, observing that most of them can improve diabetes knowledge, self-management behavior, and clinical outcomes. Interventions producing higher improvements in glycemic control are those delivered individually and face to face, involving peer educators, based on cognitive reframing techniques, and employing a lower number of teaching methods. The long-term effects on patient-centered and clinically important outcomes, as well as cost effectiveness, remain unknown. Competing interests =================== The authors declare that they have no competing interests. Authors' contribution ===================== IRC and IRP designed the study. DCG, ARG and GP selected the articles and extracted relevant data. MRB conducted the statistical analysis. IRC drafted article. All authors provided input during the preparation of the manuscript, and approved the final version. IRC is the guarantor of this article. Pre-publication history ======================= The pre-publication history for this paper can be accessed here: <http://www.biomedcentral.com/1472-6823/14/60/prepub> Supplementary Material ====================== ###### Additional file 1: Table S1 Search strategy in Medline (Ovid). ###### Click here for file ###### Additional file 2: Table S2 Registry of the Bibliographic Searches. ###### Click here for file ###### Additional file 3: Table S3 Characteristics and Effectiveness of the Diabetes Self-management Educational Interventions. ###### Click here for file Acknowledgments =============== The authors thank Victor Sarmiento (Andalusian Agency for Health Technology Assessment, Andalusia, Spain) for designing the bibliographic searches. Funding source -------------- National Institute of Health Carlos III (Study PS09/00747). The funding source had no role in the design and conduct of the study; collection, management, analysis, and interpretation of the data; and preparation, review, or approval of the manuscript.
{ "pile_set_name": "PubMed Central" }
A Windows feature which can result in bypassing User Group Policy - miles https://medium.com/tenable-techblog/bypass-windows-10-user-group-policy-and-more-with-this-one-weird-trick-552d4bc5cc1b ====== gruez _yawn_ yet another case of an "exploit" that involves being other side of an airtight hatchway[1]. most/all of the important group policy settings are machine, rather than user. the user group policy settings are mainly with appearance/styling. Let's go through each of the "implications". >Single File Code Execution If you were able to drop that file, you're either that user, or an administrator on the computer. If you're that user, you could also achieve "single file code execution" by dropping a file to the startup folder, or creating an autorun registry key. If you are an administrator, you already own the machine. >Antivirus/EDR Bypass possibly, although your payload would still have to get pass behavioral analysis when it's executing. >Denial of Service yeah, but you can achieve the same thing by adding "logoff" as an autorun entry. [1] [https://devblogs.microsoft.com/oldnewthing/?p=100665](https://devblogs.microsoft.com/oldnewthing/?p=100665), or search for that term on the blog, there are multiple entries. ~~~ wolrah > If you were able to drop that file, you're either that user, or an > administrator on the computer. If you're that user, you could also achieve > "single file code execution" by dropping a file to the startup folder, or > creating an autorun registry key. If you are an administrator, you already > own the machine. As I see it the biggest practical issue with this is that it provides a method for persistence that no user will ever find and even most Windows administrators will have no idea to look for. ~~~ gruez >As I see it the biggest practical issue with this is that it provides a method for persistence that no user will ever find This isn't relevant because if you're logged in as the affected user, nothing you see can be trusted because you're already pwned. For instance, the attacker could have replaced the regedit icon with a patched regedit, or attached a debugger to every process and patched any system calls. The only safe course of action would be to create a new profile. > and even most Windows administrators will have no idea to look for. AFAIK user hives aren't loaded until they're logged in, in which case they're subject to the caveats of the previous paragraph. Also, are administrators really going around and loading each user's registry hive to check for infections? The only real threat I can think of is antivirus vendors not knowing about this feature and not scanning the file as a registry hive. ~~~ throwanem As the article mentions, the threat model here is primarily an insider one, with a "rogue" user leveraging this method to obtain capabilities the domain administrator intends to deny. There are certainly more effective exploits for an outside attacker to use, but that's beside the point. ~~~ dfox User Group Policy isn't exactly a security mechanism, it exists to prevent users from unintentionally breaking their profile. There is multitude of ways how the user in question can inject arbitrary code into processes that are affected by user group policy as these processes are owned by that user. ------ jve Is this a real concern? I always treat User Settings overridable, because they happen either in security context of user or within user registry which lives in %userprofile% - the user has full access to ntuser.dat file. IMHO for real security stuff, Computer Settings are way to go. > Some exploits may be able to drop a file somewhere on the Windows filesystem > as non-admin. If the exploit dropped a “%USERPROFILE\ntuser.man”, with an > autostart registry key to execute a file off of a remote SMB share, then the > exploit now gained reliable code execution simply by dropping one non- > executable file. Well, if malicious guy can write your %USERPROFILE% folder, it's already no- go. You could potentially plant powershell profile scripts etc. > By dropping an empty ntuser.man file in %userprofile%, ProfSvc will fail to > load registry and thus prevent the user from logging in You've already got bigger problems if someone can write %userprofile% ~~~ ocdtrekkie I wonder how many sysadmins truly think about User Settings that way. They should, but I imagine when people are trying to apply a setting to a group of people, and they feel those permissions should follow them regardless of what PC they are on, they would just think to make it a user setting. ~~~ GordonS I work for a mega corp, and many security-related policies are indeed set at the user, rather than machine, level. Even ones that apply to everyone, no idea why. They also enabled the "disable registry editing" policy, but for obvious reasons this only prevent the official regedit app from running, so anyone with local admin can edit the registry using a different app. I feel like I'm pushed in the direction of wasting my time figuring out ways to bypass what I see as silly restrictions - why would you disable registry editing for a developer? Why would you force credentials to be entered _every_ time the UAC prompt is shown? The list goes on... ------ userbinator _Microsoft deemed this to be expected behavior and not a security issue._ For once, thank you for not caving into corporate pressure to make the work experience even more dystopian... those who have worked in such environments will known what I'm referring to. (I wonder if their developers themselves make use of this.) ~~~ Ididntdothis I rely on several of these “exploits” in order to be able to do my job on my work machines. I think even IT knows about these tricks but luckily they look the other way. ~~~ cosmie Besides the one referenced in the article, any tips (or references) about those tricks? ~~~ GordonS I got one I mentioned elsewhere here - if registry editing is disabled, just use a different registry app (there are some on Github that are better than the standard one anyway). Then you can undo group policy settings at will, as long as you know which registry keys to flip. A good site for this is: [https://gpsearch.azurewebsites.net](https://gpsearch.azurewebsites.net) Some settings are set in the local security policy file, rather than in the registry. From memory, if you have local admin rights you have to specifically grant your user account full control to the adm files, then you can use the local security policy MMC snap in to change settings. Once you change things, they will periodically be set back, which is annoying, but the tip near the end of the article might work to stop that. Another tip is to install a dual boot version of Windows on an encrypted partition, and use that instead of the "official" install. Of course, this only works if you don't need frequent access to resources on the domain. ------ Spivak This is actually one of those features that GNOME gets right with dconf lockdown. You can, on a per setting basis, decide whether users are allowed to override each setting. ------ amaccuish Agree with others, yawn. Unplug your computer during login to interrupt the profile load and be assigned a temporary profile (unless disabled) and you'll see no user policies applied.
{ "pile_set_name": "HackerNews" }
Physicochemical properties of cross-linked and acetylated starches and products of their hydrolysis in continuous recycle membrane reactor. The aim of the present work was to study the physicochemical properties of doubly modified, by cross-linking and acetylating, starches as well as the products of their enzymatic hydrolysis. A two step procedure of hydrolysis, including the batch and membrane reactors, were investigated. The second step of enzymatic processes were carried out in a continuous recycle membrane reactor (CRMR). Three kinds of commercial starches--two preparations of acetylated distarch adipate E1422 of different degrees of cross-linking, as well as one preparation of acetylated distarch phosphate E1414 were examined. It was found that the degree of substitution of acetyl groups in the macromolecules of starch did not influence the effectiveness of hydrolysis. However, the degree of cross-linking with adipate groups slightly decreased the efficiency of processing in the CRMR. Additionally, the relationship between the type of hydrocolloid and its adsorption activity in the air/water and oil/water systems was considered. All obtained derivatives revealed adsorption properties and reduced the surface/interface tension in the air/water and oil/water systems. The efficiency and effectiveness of adsorption of the investigated hydrocolloids were affected by the type of modification as well as the degree of substitution of acetyl groups in the macromolecules of starch. Particle size distributions formed in aqueous solutions for all investigated hydrolyses were determined and compared with results obtained for commercial products.
{ "pile_set_name": "PubMed Abstracts" }
Today I’m going to write about how economic theory views trade and how that relates to financial markets (stocks, bonds, etc.) The short answer is that things being exchanged on financial markets doesn’t really match the model that economists have in mind when they develop theories of trade, and that means some economic conclusions about trade are wrong when applied to financial trading. Economists have an image in mind when they think about trade. They imagine that a baker has a bunch of bread, and a butcher has a bunch of ham. They trade some of the bread for some of the ham and then they can both eat ham sandwiches, and they are both happier than if they each had to eat bread or ham alone. This model makes a few assumptions: The goods being traded are valued for their own sake. They are being acquired to be consumed, not to be traded later for something else. Everyone involved in the trade knows how much value they place on each of the goods or combination of goods. Everyone’s knowledge is true about how valuable the goods are to themselves. This is a vitally important point! Different people might value the same goods differently, but the valuation comes from the person desiring the goods for their own sake. The butcher and baker both know how much more they would rather eat a ham sandwich than bread or ham alone. They have true knowledge about how much they want the goods. Each person’s desire for the goods is fixed a priori. Those desires will not be changed by anything that happens in the act of trading, and will not change after the trade is done. If those assumptions are true, then you can conclude that any voluntary trade will create value. Each party to the trade looks at how much they value what they have before the trade and what they would have after the trade. If after is more valuable, they agree to the trade. If everyone agrees to the trade, then everyone must have more value after the trade so the sum of all the values must be higher after than before. Q.E.D. Here’s the rub. Everyone has true knowledge about how much they will value what they will get after the trade. Before the trade the baker is thinking, “I would rather have both bread and ham than what I have now.”, and after the trade those desires are still true. Imagine if instead, both parties stick something in a sack. The other party doesn’t know what’s in the sack they are trading for. They may have a belief about what might be in the sack, but that belief can be wrong. They agree to the trade believing that what’s in the sack is more valuable to them, but it turns out not to be what they thought, and they regret the trade. Their value goes down. In this case, the statement “everyone must have more value after the trade” no longer holds. Now let’s look at financial markets. What kind of trading goes on there? Do people buy things that they value for their own sake in order to consume them? Generally not. Ok, there’s a little of that. On the commodities market companies like airlines buy fuel that they plan to burn in their planes, or meat packing companies buy pork bellies, etc. But even on the commodities market only a small percentage of trading volume is companies buying things that they will eventually take possession of and use, and on the stock and bond markets there’s essentially none of that. Most trading on financial markets is people buying something to try to sell it for more money later. So these financial trades, do they satisfy the other assumptions of the economic model of trading? Do people have true knowledge about how much they will value what they are trading for after the trade is done? Are these desires for the trade goods fixed and will remain the same after the trade? No! They are trading for this thing hoping the price will go up after the trade. They don’t know if it will or not. They may have a belief about how the price will change after the trade, but that belief can be wrong. Financial trades are like trading for the mystery sack. So a lot of conservatives advocate deregulating financial markets, and the argument they use to support that is “Any voluntary trade automatically creates value.” But that argument is false for financial trades! Now, I’m not saying that financial markets have no use at all. What I’m saying is that the theory currently being used to intellectually defend our modern financial market system is broken, and some of what our modern financial markets are doing is hurting, not helping, the real productive sector of the economy. I’m pretty sure that zero-sum millisecond computer trading isn’t creating any value, and it’s bad for market stability. We need to develop an intellectually sound theory of how financial markets actually work, and then use that to determine what kind of markets would be most economically beneficial.
{ "pile_set_name": "OpenWebText2" }
This invention relates to a sensor, particularly to an accelerometer, its fabrication method and acceleration sensors which includes such accelerometer. Nowadays, accelerometers have been used in various applications, such as, measuring the magnitude of earthquake and gathering seismic data, detecting the magnitude of collision during a car collision, and detecting the tilting direction and angle of a mobile phone or a game console. As the micro-electro-mechanical systems (MEMS) technology continues to progress, many nano-scale accelerometers have been widely commercially used. In general, the accelerometers can be categorized into two kinds, one is parallel plate accelerometer, such as Chinese invention patent with publication No. CN102768290A. The parallel plate accelerometer measures the acceleration through the parallel plate capacitor formed between the top cap, the mass, and the bottom cap. When there is an acceleration, the frame displaces towards the direction of acceleration, but due to inertia, the displacement of the mass is relatively small causing the distance or the area of projection between the top cap, the mass, and the bottom cap to change. The capacitance between the top cap, the mass, and the bottom cap also changes. Integrated circuits calculates the direction and magnitude of the acceleration based on the change of capacitance. Another type of accelerometer is comb structure accelerometer, such as Chinese invention patent with publication No. CN1605871. Comb structure accelerometer detects acceleration by measuring the change in capacitance of two spaced apart comb structures. The comb structure comprise movable teeth provided on the mass, and fixed teeth adjacent to the movable teeth. As the mass displaces due to acceleration, the movable teeth also displaces; thus the distance or the area of projection between the movable teeth and the fixed teeth changes, leading to a change in capacitance. Integrated circuits calculates the direction and magnitude of the acceleration based on the change of capacitance. In a parallel plate accelerometer, the mass is relatively large, and the relation between the measurement accuracy and the mass is shown in: Acceleration ⁢ ⁢ due ⁢ ⁢ to ⁢ ⁢ noise ⁢ : ⁢ ⁢ a ¨ _ = F n _ A 1 = F n _ m = 4 ⁢ ⁢ k B ⁢ T ⁢ ⁢ ω 0 mQ where kB represents Boltzmann constant, T represents temperature, ω0 represents resonance frequency, Q represents quality factor, m represents mass. Therefore, when the resonance frequency and the quality factor are fixed, increasing the mass reduces the effect by noise. The capacitance formed between the mass and the cap is also relatively large, which means the sensitivity is high. However, during fabrication, parallel plate accelerometer has a high squeeze-film damping force; thus it requires vacuum environment for packaging, which dramatically increases the packaging and fabrication cost. In comparison, the comb structure accelerometer has a low squeeze-film damping force. Based on the book “Analysis and Design Principles of MEMS Devices” the coefficient of damping force in MEMS chip can be calculated by: c rec = μ ⁢ ⁢ LB 3 h 3 ⁢ β ⁡ ( B L ) , where ⁢ ⁢ L ⪢ B , β = 1 , β = 0.42 ; For example, the coefficient of damping force of 1000 um×1000 um accelerometer with 100 pairs of 500 um×20 um comb teeth is 1.5% of the coefficient of damping force of 1000 um×1000 um accelerometer without comb teeth. Therefore, comb structure accelerometers can be packaged under non-vacuum environment, which means the packaging cost is low. However, due to the characteristics of comb structure, the mass is relatively small, and the capacitance in a comb structure accelerometer is smaller than parallel plate accelerometer. Thus, the sensitivity of comb structure accelerometer is lower compared with parallel plate accelerometer. Furthermore, comb structures are fabricated by using photolithography and etching. The spacing between the movable teeth and the fixed teeth is limited by the etching process to 2 um. On the other hand, parallel plate accelerometers are fabricated by bonding, the spacing between the mass and the caps can be controlled in 1 um. However, the accuracy of bonding technique is lower than photolithography and etching. In conclusion, both parallel plate accelerometers and comb structure accelerometers have their own advantages and disadvantages.
{ "pile_set_name": "USPTO Backgrounds" }
Q: How do you define a generic getter method in Typescript with multiple overloads? I'm trying to define a method that operates as a getter, taking an optional parameter. The getter provides access to an object of type T, and should return either the entire object, or a property on that object. The challenge is that I am trying to defined the method in two places, first in an interface, and second in the actual implementation. Here's my approach: // Getter defines both overloads interface StoreGetter { <T>(): T; <T, K extends keyof T>(prop: K): T[K]; } // Store has a generic type, and exposes that type and properties on that type interface Store<T> { get: StoreGetter; // Either one works individually // get: <T>() => T; // get: <T, K extends keyof T>(prop: K) => T[K]; } export function makeStore<T>(initial: T): Store<T> { let value: T = initial; // Apparently, you can only define overloads via a function declaration // function get<T>(): T; // function get<T, K extends keyof T>(prop: K): T[K]; function get(prop?: keyof T) { if (typeof prop !== 'undefined') { return value[prop]; } return value; } return { get, }; } const store = makeStore({ text: '', items: [], num: 1 }); // Argument of type '"text"' is not assignable to parameter of type 'never'.(2345): store.get('text') // Object is of type 'unknown'.(2571) store.get(). Unfortunately, the two definitions seem to clobber each other. How can I define this method with overloads, and have correct type inference for both calls? A: After many failed attempts, I've discovered one configuration that produces the expected inferences: interface StoreGetter<T> { (): T; <K extends keyof T>(props: K): T[K]; } interface Store<T> { get: StoreGetter<T>; set: (val: any | T) => void; } export function makeStore<T>(initial: T): Store<T> { let value: T = initial; let listeners: Function[] = []; function get(): T; function get<K extends keyof T>(prop: K): T[K]; function get(prop?: keyof T): T | T[keyof T] { if (typeof prop !== 'undefined') { return value[prop]; } return value; } return { get, set: (val: any) => { value = { ...value, ...val, }; listeners.forEach(fn => fn(value)); } }; } const store = makeStore({ text: '', items: [], num: 1 }); // Both work with type inference store.get('text').toUpperCase store.get().items Still hoping to find a way to do it with an inline/anonymous function. On a positive note, this approach works seamlessly in a declarations file (e.g., store.d.ts), enabling the use of a single declaration: interface StoreGetter<T> { (): T; <K extends keyof T>(props: K): T[K]; } interface Store<T> { get: StoreGetter<T>; } export function makeStore<T>(initial: T): Store<T>; export function useStore<T>(store: T, prop?: string): [T|any, (newState: T|any) => void]; And then in a separate JS file: const store = makeStore({ keypresses: 0, text: '', arrows: [], }); // Both inferred: store.get('keypresses').toFixed store.get().arrows.push This produces the expected annotations in VS code:
{ "pile_set_name": "StackExchange" }
A college student from Fort Worth has been arrested in Mississippi and charged with murder in connection with the death of a 21-year-old female Ole Miss student. Lafayette County Sheriff's Office Maj. Alan Wilburn said 22-year-old Brandon Austin Theesfeld is charged with murder in the death of Alexandria "Ally" Madison Kostial, a student from St. Louis whose body was found over the weekend. Kostial, officials said, was the victim of foul play. Investigators said she had been shot eight times and her body was found about 20 miles from campus in the Harmontown community near Sardis Lake, a recreation area popular with Ole Miss students. Kostial was last seen in city surveillance video stopping at the door of a bar Friday night, NBC affiliate WMC reports. Later, she and Theesfeld were seen on surveillance video not far from where her body was found hours later. Theesfeld, of Fort Worth, was booked into the Lafayette County Jail Monday afternoon. He appeared before a judge and was arraigned Tuesday; he is currently being held without bond and bail will be set at a later time. NBC 5 received a statement from Tony Farese, Attorney for Brandon Theesfeld Wednesday night: "Steve Farese, Sr. and I were retained today as co-counsel with Swayze Alford of Oxford, Ms., to defend Brandon Theesfeld on the charge of murder filed against him. We are in the process of investigating the events surrounding the allegations against our client. It is far too early to make further comments on this matter." Sheila Robertson Investigators have not revealed a motive in the slaying and wouldn't say much else about the ongoing investigation. "We are not releasing details of the investigation as this is an ongoing investigation," Wilburn said. "We will release when it is appropriate and not before." An arrest affidavit released Tuesday afternoon didn't reveal much else about the case, though in it Wilburn did write that Theesfeld, "feloniously and willfully and unlawfully with deliberate design to effect the death of Alexandria Madison Kostial, kill Alexandria Madison Kostial." Theesfeld's attorney has been identified as Swayze Alford, of Oxford, Mississippi. NBC News reached out to Alford's office but have not yet received a response. Theesfeld, NBC 5 has learned, attended Fort Worth Country Day School from 2012 to 2014, but after his sophomore year did not return for "academic reasons," according to the private, college prep school. From there, Theesfeld attended and graduated from the San Marcos Academy in San Marcos in 2016. Daniel Theesfield, father of Brandon Theesfeld, is a doctor in Fort Worth and gave a statement to NBC affiliate WMC: "I know my son is innocent. And I have reasons to believe that I can't share anything now. But I would ask everybody to please give him the presumption of innocence until proven otherwise." The University of Mississippi, meanwhile, confirmed Tuesday afternoon that Theesfeld was a student in the School of Business Administration and has been suspended and said they would support Kostial's family in "every way we can." I want to extend our deepest sympathies once again to Ally’s family, friends and all others who knew her or interacted with her on campus. Ally was an engaged member of our community with friends across our campus and a promising future. The university will support the Kostial family in every way we can during this traumatic time. These events remind us of the importance of leaning on each other in the wake of an event that we cannot understand. Ally’s death shocks the conscience and causes much pain and sorrow, but it does not define our campus community. We must draw strength from what brings us together as a community, even as we grieve this unspeakable loss. -- Larry D. Sparks, interim chancellor The victim's father, Keith Kostial, initially confirmed the news of his daughter's death on Facebook, where he posted: "Saturday afternoon we were visited by police, who communicated to us that our beautiful dear Alexandria (Ally) Kostial was the victim of a homicide." .medium .leadMediaRegion.city_module iframe {height:421px;} The university said Kostial was working toward a bachelor's degree in marketing. Kostial's father said on Facebook that his daughter had been attending summer school and teaching fitness classes at the university. He said she graduated from Lindbergh High School in 2016. The discovery stunned both Kostial's fellow students and those living nearby, the TODAY show reported. On social media, friends are posting emotional tributes. "It's just hard for me, because all I can think about when I see her face is what she went through, what she was thinking, what she was saying," said Anna Pasco, a friend of Kostial. "It's really, really hard." "She was the brightest light and always had a smile on her face," one wrote. "She truly was a ray of sunshine." "Praying justice is served soon and that god wraps his arms around the Kostial family," posted another. Check back for the latest updates on this story.
{ "pile_set_name": "OpenWebText2" }
The world is full of allegedly haunted places which are often saturated with high strangeness and dark, morbid history. Yet how often does one get a chance to actually own such a place? For years, a quaint, pristine island in the middle of one of Europe’s hottest tourist destinations has sat on the market for a rock bottom price, left untouched and unwanted in an area frequented by some of the world’s richest and most famous people. Here one can find everything they expect in a romantic island getaway, with private beaches, gorgeous views, and a charming villa, as well as some things one might not expect, lurking under the stunning postcard perfect veneer. For this island carries with it a grim past and perhaps even ghosts. Welcome to Daksa island, a place perhaps inhabited by the dead and which you can own right now. Located on the coast of the Adriatic Sea, in the region of Dalmatia in Croatia, there is the prosperous and historical city of Dubrovnik. The city is a UNESCO World Heritage Site and is renowned as a premiere tourist spot throughout Europe and indeed the world, a vacation spot that has played host over the years to such big name stars as Catherine Zeta Jones, Michael Douglas, Gwyneth Paltrow, Tom Cruise, Sharon Stone, Clint Eastwood, and Steven Spielberg. Situated just 1.5 nautical miles from this resort paradise, just in front of Dubrovnik’s port Gruz, is a tiny island known as Daksa, a name derived from the Greek word deksios, meaning “right hand.” Long known as a haven for sailors seeking to take shelter from foul weather and once home to a 13th century Franciscan monastery, the island is the smallest of the Elaphite archipelago, being a mere 500 meters long and 200 meters wide for a total area of just 0.07 km2 (17 acres). Despite its picturesque cypress woodland, orange grove, quaint lighthouse, ruins, and attractive, idyllic views, Daksa could easily be mistaken for just another of Croatia’s 10,000 other Adriatic islands and islets. However, this tiny uninhabited speck of land sitting practically a stone’s throw from one of Europe’s most prestigious resort cities has a dark shadow hanging over its history, and is the scene of one of the most violent, horrific incidents the region has ever seen. For most of World War II, the country of Croatia did not even exist, instead being a part of Yugoslavia and invaded by Nazi forces at the start of the war. The Germans went through great lengths to capitalize on the Croatians’ contempt for the Serbs, who they thought had been given too much power since Yugoslavia had been created at the end of World War I. Under Nazi control, Croatia was made an independent state and Croatian soldiers were pressured to change sides. At the same time, a vicious campaign of persecution was launched against the Serbs, Jews, Gypsies, and Croatians not loyal to the fascist Ustaša regime (Croatian Revolutionary Movement) which the Nazis had put into power. Through a merciless bloodbath of violence, massacres, and the notorious Jasenovac concentration camp, it is estimated that hundreds of thousands of people lost their lives in these dark days. This black cloud of violence hanging over the region did not lift until the Nazi backed Ustaša fell from power and Croatia became a republic within the Socialist Federal Republic of Yugoslavia. Considering the ruthless slaughter and suffering they had endured, it is perhaps not surprising that many of the Croatians under this new government still had a bad taste in their mouth concerning the Nazis, and were intent on getting vengeance against those who had oppressed them and their sympathizers. This seething lust for revenge boiled until 18 October 1944, when a mob of Yugoslav Partisans howling for blood descended upon the city of Dubrovnik and proceeded to start arbitrarily arresting anyone who they thought could be a Nazi or Nazi supporter. In total, more than 300 citizens of the city were rounded up, including the newly appointed mayor of Dubrovnik, Niko Koprivica, and the local parish priest, Petar Perica. 53 of them, along with the mayor and priest, were brought over to the uninhabited island of Daksa, where the prisoners awaited a horrible fate amidst its ruins and quaint seaside views. Here on the island of Daksa, every last one of the 53 prisoners was mercilessly executed without any trial, mostly by a gunshot to the head. The bodies of the dead were more or less left to rot where they fell, being unceremoniously dumped into two shallow mass graves. When the ruthless executioners returned to the mainland after carrying out their dark work, they distributed flyers throughout Dubrovnik that announced that a number of the residents of the city had been sentenced to death by firing squad “in the name of peoples of Yugoslavia,” as well as the victims’ names. The outraged relatives of those killed, many of which staunchly denied any involvement with the Nazis, were further told that the same fate would await them if they should feel the inclination to go investigate the island where their loved ones had been gunned down in cold blood. Interestingly, at the time only the names of 35 of the victims were listed in the flyer and this would be the official number for many decades, as no one bothered to venture to Daksa to check it out. It was not until September of 2009 that the gruesome truth would start to come into the light. It was then that an initial six bodies were uncovered on Daksa, and after that the president of the Croatian Helsinki Committee, Ivo Banac, called for an investigation. An archeological examination of the island was launched, which uncovered two separate grave sites, one of which was located within an old farmhouse basement, and anthropological examinations of the remains that were found identified a total of 53 distinct victims who were all male. Along with the remains was an assortment of various other objects such as buttons, necklaces, rosaries, a priestly collar, crosses, bullets and bullet shells. It was not until June of 2010 that many of the remains were moved back to the mainland and finally given a proper burial after rotting in their shallow graves for over 60 years. Although 53 sets of remains were found, it is believed that there could be even more buried somewhere on the island that have not been unearthed yet. Despite the ghastly nature of the findings and the callous barbarity of the massacre, not a single person has ever been arrested or tried, and the guilt or innocence of the victims has never been established. It is perhaps this bloody, dark history and the lack of justice in no one ever answering for the crime that has made the island of Daksa unsurprisingly an allegedly intensely haunted place. Those who come here report of hearing voices whisper in their ear or a profound sense of being watched, as well as an almost palpable sense of panic and dread. Even more frightening is that disembodied voices of the unjustly murdered are said on occasion to howl at visitors to go away, and those who do venture upon the deserted island have reported all manner of ghostly activity, such as being pushed, poked, scratched, and shoved by unseen hands. Rowboats that approach the island are also sometimes said to experience being rocked or banged from the bottom by some invisible force. There are also apparently many apparitions and shadow figures that are regularly seen lurking about the island, particularly in the vicinity of the mass graves, as well as orbs and mysterious lights. These rumors of restless, vengeful ghosts are so pervasive that it is enough to keep most people from daring to venture to this otherwise pristine, romantic locale, even during peak tourist seasons. Even the current owners of the island, Nila Perica Dusilo Florshutz and Franica Dusilo Cavich, won’t live there, and they have indeed been actively seeking to sell it for years. Daksa was actually put up for sale by the owners for an original asking price of 6 million dollars, but the persistent spooky rumors and numerous reports of ghosts on the island have long scared off potential buyers, with the price falling steadily over the years to a mere 2 million euros. With its unspoiled attractive woodland landscape, spacious villa, citrus groves, boathouse, dock, lighthouse, private beaches, and charming views of the sea, this would seem to be a steal for a whole private island, yet even in this paradise among other surrounding islets owned by the rich and famous, no buyers have ever come forward to make an offer or to even come make a viewing. It would seem that most people do not find the thought of living on an island so wrapped in a gruesome dark history to be very appealing, whether there are actually ghosts there or not. Perhaps it is better this way. Perhaps it is better to leave any shadowy denizens of the island alone amongst the picturesque scenery, where they can seethe in their eternal anger in solitude, and where the ire spurred by the anguished memories of their wicked past will not spill over and harm the living. Or, if you don’t believe in that sort of thing and have 2 million euros lying around, you could own your own island for a bargain, as well as a piece of sinister history. Just remember that as you sit out on the beach enjoying your new purchase, there is a chance that you may not be alone.
{ "pile_set_name": "OpenWebText2" }
.@StormyDaniels will receive a Key to the City of West Hollywood, California tomorrow (designated "Stormy Daniels Day") at Chi Chi LaRue's at 4pm. We should all thank Stormy for her courage and fortitude through this process! #Basta — Michael Avenatti (@MichaelAvenatti) May 22, 2018 WEST HOLLYWOOD, Calif. (KABC) -- Adult-film star Stormy Daniels will receive a key to the city of West Hollywood to honor her legal battle against President Donald Trump.The city plans to proclaim "Stormy Daniels Day" on Wednesday as Daniels also makes an appearance at Chi Chi La Rue's."In these politically tumultuous times, Daniels has proven herself to be a profile in courage by speaking truth to power even under threats to her safety and extreme intimidation," the city said in a statement announcing the event.The porn star, whose real name is Stephanie Clifford, has been engaged in a battle with Trump and his legal team over a non-disclosure agreement and payment she received to keep quiet about an alleged affair with Trump."Trump administration has been a direct threat to the people of the city of West Hollywood - our LGBTQ community, our immigrant community, women here in this community - so Stormy Daniels has really showed up as the woman to save the Republic," Mayor John Duran said.Daniels is suing Trump and his attorney, Michael Cohen, in federal court in Los Angeles in hopes of invalidating the agreement she signed before the 2016 presidential election. She claims the document is invalid because Trump never signed it.Through White House officials, Trump has denied the affair.Daniels is also scheduled to hold a meet-and-greet and autograph-signing session at 7 p.m. at the store in an event promoting her #TeamStormy apparel line. She also has a 10 p.m. meet-and-greet planned at the Abbey nightclub.
{ "pile_set_name": "OpenWebText2" }
I am not satisfied in making money for myself. I endeavor to provide employment for hundreds of the women of my race. Madam C.J. Walker In its famous paradox, the equation of money and excrement, psychoanalysis becomes the first science to state what common sense and the poets have long known - that the essence of money is in its absolute worthlessness. Norman O. Brown The middlebrow is the man, or woman, of middlebred intelligence who ambles and saunters now on this side of the hedge, now on that, in pursuit of no single object, neither art itself nor life itself, but both mixed indistinguishably, and rather nastily, with money, fame, power, or prestige. There's a great deal of disturbance in this country and how black feel about what happened in Katrina, and, you know, many of the comics, many of performers are in Las Vegas and New Orleans trying to raise money for what happened there. Michael Richards Waste neither time nor money, but make the best use of both. Without industry and frugality, nothing will do, and with them everything. Billions are wasted on ineffective philanthropy. Philanthropy is decades behind business in applying rigorous thinking to the use of money. Michael Porter For money you can have everything it is said. No, that is not true. You can buy food, but not appetite; medicine, but not health; soft beds, but not sleep; knowledge but not intelligence; glitter, but not comfort; fun, but not pleasure; acquaintances, but not friendship; servants, but not faithfulness; grey hair, but not honor; quiet days, but not peace. The shell of all things you can get for money. But not the kernel. That cannot be had for money. Arne Garborg There seems to be a frenzy, a momentum to grab up anything you can. The decisions seem to be dictated by money and political expediency.
{ "pile_set_name": "Pile-CC" }
Im an Athiest So I wont get to tell them "I told you so" 516 shares
{ "pile_set_name": "OpenWebText2" }