text
stringlengths
0
7.84M
meta
dict
TEMPE, Ariz. -- Todd Graham made the decision to leave Pittsburgh for Arizona State so suddenly in December that he caught his own son Bo unaware, and Bo is a member of his coaching staff. Bo walked out of a recruiting visit in Philadelphia at 9:30 p.m. and his phone rang. Todd Graham's tenure at Pitt was short and turbulent. Justin K. Aller/Getty Images "Hey," Todd Graham said, "you need to come back here. Where are you?" "You sent me to Philly," Bo said. "Don't you remember? Why do I need to come back?" "Because I resigned my job." "You did what?" "I resigned my job." "Why? Why would you do that?" "Because I took another one." There have been plenty of coaches who have left their school after one season. They are called "gunslinger" or "mercenary" or, in basketball, "Larry Brown." "Obviously," Graham said, "when you're at a place one year, and you leave like that, you're going to get your head kicked in." Leaving early in and of itself isn't the reason that Graham incurred the wrath of the college football universe. Graham had been one-and-done before, moving from Rice to Tulsa after the 2006 season. No one thought much about it, especially after he stayed four seasons at Tulsa. In a business with little security, coaches climb up and down ladders as if they coached in the Candy Land Conference. And Graham has won -- in six years as a head coach, Graham has gone 49-29 (.628). Graham had reasons to justify leaving Pittsburgh. Arizona State is a bigger school. He left the Big East for the more stable Pacific-12 Conference. Most of all, he left for love.
{ "pile_set_name": "OpenWebText2" }
2018 ADAC GT Masters The 2018 ADAC GT Masters was the twelfth season of the ADAC GT Masters, the grand tourer-style sports car racing founded by the German automobile club ADAC. The season began on 14 April at Oschersleben and ended on 23 September at Hockenheim after seven double-header meetings. Entry list Race calendar and results On 29 November 2017, the ADAC announced the 2018 calendar. Championship standings Scoring system Championship points were awarded for the first ten positions in each race. Entries were required to complete 75% of the winning car's race distance in order to be classified and earn points. Individual drivers were required to participate for a minimum of 25 minutes in order to earn championship points in any race. Drivers' championships Overall Junior Cup Trophy Cup Teams' championship Notes References External links Category:ADAC GT Masters seasons ADAC GT Masters
{ "pile_set_name": "Wikipedia (en)" }
Effect of zinc supplementation on ethanol-mediated bone alterations. Ethanol consumption leads to bone alterations, mainly osteoporosis. Ethanol itself may directly alter bone synthesis, but other factors, such as accompanying protein malnutrition--frequently observed in alcoholics, chronic alcoholic myopathy with muscle atrophy, alcohol induced hypogonadism or hypercortisolism, or liver damage, may all contribute to altered bone metabolism. Some data suggest that zinc may exert beneficial effects on bone growth. Based on these facts, we analyzed the relative and combined effects of ethanol, protein malnutrition and treatment with zinc, 227 mg/l in the form of zinc sulphate, on bone histology, biochemical markers of bone formation (osteocalcin) and resorption (urinary hydroxyproline excretion), and hormones involved in bone homeostasis (insulin growth factor 1 (IGF-1), vitamin D, parathormone (PTH), free testosterone and corticosterone), as well as the association between these parameters and muscle fiber area and liver fibrosis, in eight groups of adult Sprague Dawley rats fed following the Lieber de Carli model during 5 weeks. Ethanol showed an independent effect on TBV (F=14.5, p<0.001), causing it to decrease, whereas a low protein diet caused a reduction in osteoid area (F=8.9, p<0.001). Treatment with zinc increased osteoid area (F=11.2, p<0.001) and serum vitamin D levels (F=3.74, p=0.057). Both ethanol (F=45, p<0.001) and low protein diet (F=46.8, p<0.01) decreased serum osteocalcin levels. Ethanol was the only factor independently related with serum IGF-1 (F=130.24, p<0.001), and also showed a synergistic interaction with protein deficiency (p=0.027). In contrast, no change was observed in hydroxyproline excretion and serum PTH levels. No correlation was found between TBM and muscle atrophy, liver fibrosis, corticosterone, or free testosterone levels, but a significant relationship was observed between type II-b muscle fiber area and osteoid area (rho=0.34, p<0.01). Osteoporosis is, therefore, present in alcohol treated rats. Both alcohol and protein deficiency lead to reduced bone formation. Muscle atrophy is related to osteoid area, suggesting a role for chronic alcoholic myopathy in decreased bone mass. Treatment with zinc increases osteoid area, but has no effect on TBV.
{ "pile_set_name": "PubMed Abstracts" }
Q: Cygwin permissions on Windows 7 I suppose this question is related to a previous answer on Cygwin permissions, but I have failed to work out how the answer can be applied to my situation. I am finding that when I edit a file (~/.screenrc in this case), I can make one change and then the permissions and ownership are reset. This is what I am doing after I make a single change to reset permissions again: Chi Site - ~/wd Sun Jul 30 - 03:12 PM > ls -la ~/.screenrc ; chown -R RobertMarkBram:Users ~/.screenrc ; chmod 777 ~/.screenrc ; ls -la ~/.screenrc ----rwxrwx+ 1 Administrators None 1921 Jul 30 15:12 /home/RobertMarkBram/.screenrc -rwxrwxrwx+ 1 RobertMarkBram Users 1921 Jul 30 15:12 /home/RobertMarkBram/.screenrc I read in the previous answer on Cygwin permissions about changing the set up of paths in /etc/fstab. This is what I have there, but it has not made a difference: none /cygdrive cygdrive binary,posix=0,user 0 0 none / cygdrive binary,posix=0,user 0 0 These are my mount points: Chi Site - ~/wd Sun Jul 30 - 03:20 PM > mount C:/cygwin/bin on /usr/bin type ntfs (binary,auto) C:/cygwin/lib on /usr/lib type ntfs (binary,auto) C:/cygwin on / type ntfs (binary,auto) C: on /c type ntfs (binary,posix=0,user,noumount,auto) D: on /d type ntfs (binary,posix=0,user,noumount,auto) A: This is a case of PEBKAC.. I had done too much messing around with permissions and didn't know how to get back. Firstly, under Windows Explorer > that folder > properties > security I noticed there was a NULL SID there that I removed.. my own user didn't have all rights anymore but the the EVERYONE group did. Then I followed advice on this social.technet.microsoft.com post: Permissions all messed up on folders within my profile on Windows 8 cd /d c:\[folders or files you would like to reset permission] icacls * /T /Q /C /RESET It took awhile but restored permissions.
{ "pile_set_name": "StackExchange" }
Q: Book stacking brain teaser I've been given a puzzle, and I just can't work out an answer. Can you help? I'd also like to know your thought process for solving, as this matters more than the correct answer. Does it belong to a pattern of puzzles? The scenario is this: There are six books by six different authors - J,K,L,M,N and O - which are to be placed on a bookcase with six shelves. The shelves are numbered from one, the highest, to six, the lowest, and exactly one book will be placed on each shelf. The book K must be on the second shelf below the book J The book O must be placed on either the first or sixth shelf. The book L cannot be placed on either the shelf immediately above or the shelf immediately below the book by M. Which one of the following is TRUE? K and L CANNOT be placed on shelves three and four respectively M and N CANNOT be placed on shelves three and four respectively J and M CANNOT be placed on shelves three and four respectively L and K CANNOT be placed on shelves three and four respectively N and J CANNOT be placed on shelves three and four respectively Thanks! A: I think that the answer is: $2$ and is only constrained by the first rule (about J and K). J and K have exactly 1 shelf between them. That means that they span 3 shelves. So, no matter the arrangement, either J or K must be one of the shelves 3 or 4. So, any solution that fills both 3 and 4 with neither J nor K can't happen. A: The true statement is: 2. M and N CANNOT be placed on shelves three and four respectively. Why? Book J can only occupy shelves 1, 2, 3, 4. Book K can only occupy shelves 3, 4, 5, 6. No matter where you place J and K, shelves 3 and 4 will always be occupied by one or the other. Proof: J on shelf 1, K on shelf 3. J on shelf 2, K on shelf 4. K on shelf 5, J on shelf 3. K on shelf 6, J on shelf 4.
{ "pile_set_name": "StackExchange" }
Elzbieta Szmytka & Levente Kende Chopin’s name is indissociable from the virtuoso literature for piano which he composed. However, he also wrote melodies often inspired by the popular poetry of his compatriot Stefan Witwicki. In his melodies, Chopin opted for a simple musical language, interspersed with Polish dances. Szymanowski’s melodies are clearly rooted in 19th century tradition, but are also influenced by the exoticism and orientalism which were so characteristic of the European art scene at the turn of the century. His melodies based on Polish texts are little gems of refinement, interspersed with unexpected rhythmic and harmonic changes. The art of Polish melody will also be highlighted via the neo-romantic musical language of Mieczysław Karłowicz. Elżbieta Szmytka and Levente Kende – who have performed on stage at La Monnaie in the past – have more than deserved their international success.
{ "pile_set_name": "Pile-CC" }
# Copyright(c) 2017 Google Inc. # # Licensed under the Apache License, Version 2.0 (the "License"); you may not # use this file except in compliance with the License. You may obtain a copy of # the License at # # http://www.apache.org/licenses/LICENSE-2.0 # # Unless required by applicable law or agreed to in writing, software # distributed under the License is distributed on an "AS IS" BASIS, WITHOUT # WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the # License for the specific language governing permissions and limitations under # the License. Import-Module -DisableNameChecking ..\..\..\BuildTools.psm1 try { Push-Location Set-Location IO.Swagger $url = "http://localhost:7412" $job = Run-Kestrel $url Set-Location ../IO.SwaggerTest $env:ASPNETCORE_URLS = $url dotnet test --test-adapter-path:. --logger:junit 2>&1 | %{ "$_" } } finally { Stop-Job $job Receive-Job $job Remove-Job $job Pop-Location }
{ "pile_set_name": "Github" }
Edward Snowden, the former National Security Agency (NSA) contractor turned whistleblower, has spoken out about mobile firm BlackBerry, claiming that its stance on privacy and cosy relationships with government spy agencies is why it would "be erased from the pages of history". Snowden, who was just granted extended asylum in Russia, is well-known around the world for leaking troves of internal NSA documentation in 2013 that detailed the vast surveillance apparatus used by multiple signals intelligence (Sigint) agencies, including Britain's GCHQ. He was speaking during a Canadian technology conference on Wednesday (18 January 2017), in reference to last year's revelation that the Royal Canadian Mounted Police (RCMP) had obtained access to BlackBerry's "global encryption key" to decode communications at will. Snowden linked this case to the experience of Apple, which was recently locked into a high-profile clash with the FBI over a court-order demanding it circumvent the encryption on an iPhone 5C gathered from the possessions of an Islamic State(Isis)-linked terrorist. "You can end up standing up for what is right, you have to trust that even if it is digital, if you take a principled stand that that will do more good not just for your bottom line or country, but for your society and future," said Snowden, as reported by BetaKit, a partner of the tech conference. He added: "This is why [BlackBerry is] going to be erased from the pages of history. Apple is a very successful company, particularly as they make this pivot towards enforcing quite publicly the privacy rights. Ultimately, we're not talking about privacy, we're talking about the quality of society." Last year, less than a week after BlackBerry was criticised in the press, particularly Vice News, the mobile firm's chief executive John Chen issued a statement. He claimed: "BlackBerry's guiding principle has been to do what is right for the citizenry." In his keynote, which was live-streamed from an unknown location in Russia, Snowden rubbished this position. He said: "[BlackBerry] follow the AT&T model, which is that the customer is not really the customer – the state is the customer. That's the only person they really have to please." In November last year, it was revealed that AT&T has close links to the US government's intelligence agencies, especially the NSA. Top secret diagrams leaked by The Intercept showed the highly secretive referenced the firm as an "access partner." The New York Times, in September 2013, exposed how an NSA-led operation called Project Hemisphere was conducted in partnership with AT&T and used to give drug agents access to vast swathes of communication records of everyday American citizens. In a broader sense, Snowden's stance on personal privacy has not softened in the years since his first disclosures – quite the opposite. "The stipulation [is that] if you have nothing to hide, you have nothing to fear. What this is encouraging is to live a life in a vulnerable state," he said. "To expose yourself to the depredations of an outside group to scrutinise how you live, what you think, what your ideas are as long as what you do is OK by them," he continued. "This misunderstands what rights are about and what privacy is about. "Privacy isn't about something to hide, it's about something to protect."
{ "pile_set_name": "OpenWebText2" }
Q: How to programatically add/remove nodes from main graph in Tensorboard? Tensorboard seems to arbitrarily select which nodes belong to the main graph and which do not. During graph visualization I can manually add/remove the nodes but it is tedious to do it every run. Is there a way to programmatically embed this information (which nodes belong on the main graph) during writing the graph summary? A: According to this github issue , it's not feasible at the moment. And according to this quote : Thanks @lightcatcher for the suggestion. @danmane, please take a look at this issue. If it is something we will not do in the short-term maybe mark it contributions welcome. If it is something you are planning to include in your plugin API anyways, please close the issue to keep the backlog clear. , and the status of the issue (contributions:welcomed), it's not something that is to be expected in the short term.
{ "pile_set_name": "StackExchange" }
Confined hydrogen atom by the Lagrange-mesh method: energies, mean radii, and dynamic polarizabilities. The Lagrange-mesh method is an approximate variational calculation which resembles a mesh calculation because of the use of a Gauss quadrature. The hydrogen atom confined in a sphere is studied with Lagrange-Legendre basis functions vanishing at the center and surface of the sphere. For various confinement radii, accurate energies and mean radii are obtained with small numbers of mesh points, as well as dynamic dipole polarizabilities. The wave functions satisfy the cusp condition with 11-digit accuracy.
{ "pile_set_name": "PubMed Abstracts" }
/* * Copyright 2006-2009, 2017, 2020 United States Government, as represented by the * Administrator of the National Aeronautics and Space Administration. * All rights reserved. * * The NASA World Wind Java (WWJ) platform is licensed under the Apache License, * Version 2.0 (the "License"); you may not use this file except in compliance * with the License. You may obtain a copy of the License at * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, software distributed * under the License is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR * CONDITIONS OF ANY KIND, either express or implied. See the License for the * specific language governing permissions and limitations under the License. * * NASA World Wind Java (WWJ) also contains the following 3rd party Open Source * software: * * Jackson Parser – Licensed under Apache 2.0 * GDAL – Licensed under MIT * JOGL – Licensed under Berkeley Software Distribution (BSD) * Gluegen – Licensed under Berkeley Software Distribution (BSD) * * A complete listing of 3rd Party software notices and licenses included in * NASA World Wind Java (WWJ) can be found in the WorldWindJava-v2.2 3rd-party * notices and licenses PDF found in code directory. */ package gov.nasa.worldwindx.examples; import gov.nasa.worldwind.avlist.AVKey; import gov.nasa.worldwind.geom.*; import gov.nasa.worldwind.globes.Globe; import gov.nasa.worldwind.layers.RenderableLayer; import gov.nasa.worldwind.render.*; import gov.nasa.worldwind.util.ContourList; import gov.nasa.worldwind.util.combine.ShapeCombiner; /** * Shows how to use the {@link gov.nasa.worldwind.util.combine.Combinable} interface and the {@link * gov.nasa.worldwind.util.combine.ShapeCombiner} class to combine WorldWind surface shapes into a complex set of * contours by using boolean operations. * <p> * This example creates two static SurfaceCircle instances that partially overlap and displays them in a layer named * "Original". A ShapeCombiner is used to combine the two surface circles into a potentially complex set of contours * using boolean operations. Three examples of such operations are given: union, intersection and difference. The result * of each operation is displayed in a separate layer beneath the original shapes. * * @author dcollins * @version $Id: ShapeCombining.java 2411 2014-10-30 21:27:00Z dcollins $ */ public class ShapeCombining extends ApplicationTemplate { public static class AppFrame extends ApplicationTemplate.AppFrame { public AppFrame() { ShapeAttributes attrs = new BasicShapeAttributes(); attrs.setInteriorOpacity(0.5); attrs.setOutlineWidth(2); // Create two surface circles that partially overlap, and add them to a layer named "Original". SurfaceCircle shape1 = new SurfaceCircle(attrs, LatLon.fromDegrees(50, -105), 500000); SurfaceCircle shape2 = new SurfaceCircle(attrs, LatLon.fromDegrees(50, -100), 500000); shape1.setValue(AVKey.DISPLAY_NAME, "Original"); shape2.setValue(AVKey.DISPLAY_NAME, "Original"); RenderableLayer originalLayer = new RenderableLayer(); originalLayer.setName("Original"); originalLayer.addRenderable(shape1); originalLayer.addRenderable(shape2); this.getWwd().getModel().getLayers().add(originalLayer); // Set up a ShapeCombiner to combine the two surface circles into a potentially complex set of contours // using boolean operations: union, intersection and difference. Globe globe = this.getWwd().getModel().getGlobe(); double resolutionRadians = 10000 / globe.getRadius(); // 10km resolution ShapeCombiner shapeCombiner = new ShapeCombiner(globe, resolutionRadians); // Compute the union of the two surface circles. Display the result 10 degrees beneath the original. ContourList union = shapeCombiner.union(shape1, shape2); this.displayContours(union, "Union", Position.fromDegrees(-10, 0, 0)); // Compute the intersection of the two surface circles. Display the result 20 degrees beneath the original. ContourList intersection = shapeCombiner.intersection(shape1, shape2); this.displayContours(intersection, "Intersection", Position.fromDegrees(-20, 0, 0)); // Compute the difference of the two surface circles. Display the result 30 degrees beneath the original. ContourList difference = shapeCombiner.difference(shape1, shape2); this.displayContours(difference, "Difference", Position.fromDegrees(-30, 0, 0)); } protected void displayContours(ContourList contours, String displayName, Position offset) { ShapeAttributes attrs = new BasicShapeAttributes(); attrs.setInteriorMaterial(Material.CYAN); attrs.setInteriorOpacity(0.5); attrs.setOutlineMaterial(Material.WHITE); attrs.setOutlineWidth(2); SurfaceMultiPolygon shape = new SurfaceMultiPolygon(attrs, contours); shape.setValue(AVKey.DISPLAY_NAME, displayName); shape.setPathType(AVKey.LINEAR); shape.move(offset); RenderableLayer layer = new RenderableLayer(); layer.setName(displayName); layer.addRenderable(shape); this.getWwd().getModel().getLayers().add(layer); } } public static void main(String[] args) { start("WorldWind Shape Combining", AppFrame.class); } }
{ "pile_set_name": "Github" }
Isotype-specific activation of cystic fibrosis transmembrane conductance regulator-chloride channels by cGMP-dependent protein kinase II. Type II cGMP-dependent protein kinase (cGKII) isolated from pig intestinal brush borders and type I alpha cGK (cGKI) purified from bovine lung were compared for their ability to activate the cystic fibrosis transmembrane conductance regulator (CFTR)-Cl- channel in excised, inside-out membrane patches from NIH-3T3 fibroblasts and from a rat intestinal cell line (IEC-CF7) stably expressing recombinant CFTR. In both cell models, in the presence of cGMP and ATP, cGKII was found to mimic the effect of the catalytic subunit of cAMP-dependent protein kinase (cAK) on opening CFTR-Cl-channels, albeit with different kinetics (2-3-min lag time, reduced rate of activation). By contrast, cGKI or a monomeric cGKI catalytic fragment was incapable of opening CFTR-Cl- channels and also failed to potentiate cGKII activation of the channels. The cAK activation but not the cGKII activation was blocked by a cAK inhibitor peptide. The slow activation by cGKII could not be ascribed to counteracting protein phosphatases, since neither calyculin A, a potent inhibitor of phosphatase 1 and 2A, nor ATP gamma S (adenosine 5'-O-(thiotriphosphate)), producing stable thiophosphorylation, was able to enhance the activation kinetics. Channels preactivated by cGKII closed instantaneously upon removal of ATP and kinase but reopened in the presence of ATP alone. Paradoxically, immunoprecipitated CFTR or CF-2, a cloned R domain fragment of CFTR (amino acids 645-835) could be phosphorylated to a similar extent with only minor kinetic differences by both isotypes of cGK. Phosphopeptide maps of CF-2 and CFTR, however, revealed very subtle differences in site-specificity between the cGK isoforms. These results indicate that cGKII, in contrast to cGKI alpha, is a potential activator of chloride transport in CFTR-expressing cell types.
{ "pile_set_name": "PubMed Abstracts" }
Aging alters visual processing of objects and shapes in inferotemporal cortex in monkeys. Visual perception declines with age. Perceptual deficits may originate not only in the optical system serving vision but also in the neural machinery processing visual information. Since homologies between monkey and human vision permit extrapolation from monkeys to humans, data from young, middle aged and old monkeys were analyzed to show age-related changes in the neuronal activity in the inferotemporal cortex, which is critical for object and shape vision. We found an increased neuronal response latency, and a decrease in the stimulus selectivity in the older animals and suggest that these changes may underlie the perceptual uncertainties found frequently in the elderly.
{ "pile_set_name": "PubMed Abstracts" }
Story highlights Kimmel: "There seems to be a lot of people upset with me" He asked a panel of children how they would resolve the U.S. debt to China Child panelist: "Shoot cannons all the way over and kill everyone in China" Groups protested, started petition drive against the ABC show Late night TV host Jimmy Kimmel apologized for airing a clip of a child suggesting that "killing everyone in China" could be a solution to America's debt problem. "You know, today is a weird day," Kimmel said on Monday's show. "There seems to be a lot of people upset with me, more upset than usual." Chinese-American groups organized several protests and a petition drive after the October 16 broadcast of ABC's "Jimmy Kimmel Live." The offending remark came while Kimmel was talking to a group of children, ages 5 and 6, about the United States government's debt, much of which is held by China. "America owes China a lot of money, $1.3 trillion," Kimmel told the children. "How should we pay them back?" "Shoot cannons all the way over and kill everyone in China," one boy said. "Kill everyone in China? OK, that's an interesting idea," Kimmel said. He then posed the question: "Should we allow the Chinese to live?" While one boy said, "No," most of the children said, "Yes." "If we don't allow them to live, then they'll try to kill us," a girl said. "Well, this has been an interesting edition of Kid's Table -- The Lord of the Flies edition," Kimmel said as the segment ended. ABC published an apology Friday, saying the network "would never purposefully broadcast anything to upset the Chinese community, Asian community, anyone of Chinese descent or any community at large." The letter from ABC executives addressed to the 80-20 National Asian American Political Action Committee promised "swift action to minimize the distribution of the skit by removing it from all platforms and editing it out of any future airings of the show." "I thought it was obvious that I didn't agree with that statement, but apparently it wasn't," Kimmel said Monday. "So I just want to say I am sorry. I apologize. It was certainly not my intent to upset anyone." He ended his apology by saying, "I'm here to turn frowns upside down."
{ "pile_set_name": "OpenWebText2" }
206 Okla. 199 (1952) 242 P.2d 448 RYAN v. ANDREWSKI et al. No. 34583. Supreme Court of Oklahoma. March 25, 1952. Champion, Champion & Wallace, Ardmore, and Pierce, Rucker, Mock, Tabor & Duncan, Oklahoma City, for plaintiffs in error. Champion, Fischl & Champion, Ardmore, for defendants in error. GIBSON, J. The parties appeared in the trial court in the same order as they appear in this court and will generally be referred to as plaintiffs and defendants. On August 20, 1947, Dan Ryan filed his petition in this action naming as defendants H.C. Andrewski, L.L. Robinson and the Prudential Insurance Company of America. He alleged a partnership between himself and the personal defendants and the issuance by the Prudential of ten separate insurance policies on his life, all payable to the partnership. He further alleged a dissolution of the partnership on February 29, 1944, and that due to an oversight no mention was made of the policies; that the insurable interest held by the partnership had terminated and although he had requested defendants to make a change, naming his wife as beneficiary, they had failed and refused so to do. He tendered the cash or loan value of the policies and prayed that the defendants be canceled as beneficiaries and that the Insurance Company be required to change the beneficiary as designated by him. On motion the petition was amended, naming the wives of the plaintiff and personal defendants as parties, it appearing that the wives were included as partners in the partnership agreement. Dan Ryan died October 14, 1948, and the action was revived with his widow, as executrix of his estate, named as a party plaintiff. Issue was joined and the case tried to the court. The Insurance Company pleaded that it was a stakeholder and *200 paid the proceeds of the policies into court, and is not a party to this appeal. Judgment was rendered for defendants, and plaintiffs appeal. On June 1, 1943, Dan Ryan, Jesse Willis Ryan, his wife, and the named defendants entered into a written partnership agreement to operate under the trade name "Oklahoma Distributing Company" to engage in the manufacture, sale and distribution of beer and other beverages, each partner acquiring an undivided one-sixth interest in all assets. The three husbands were named as managing partners. It was agreed that insurance on the life of each managing partner, in the sum of $50,000, should at all times be maintained and kept in force during the existence of such partnership, the premiums to be charged against the partnership. It was provided that a partner could terminate the partnership on specified notice, with the nonterminating partners having an option of purchase, for cash, and upon payment the partnership and assets should belong to those partners making the purchase, and further: "Upon any sale as herein provided the nonpurchasers shall thereupon cease to have any interest in the partnership property or its assets, and shall not be liable for any of its unsatisfied obligations or liabilities." Policies totaling $50,000 were purchased on the life of each of the three managing partners. In the application for Mr. Ryan's policies (ten in number, each for $5,000), Dan I. Ryan was named as "Proposed Insured", Oklahoma Distributing Company was "Applicant", and the beneficiary was named "Oklahoma Distributing Company of Ardmore, Oklahoma, a partnership, as such partnership now exists or may hereafter be constituted." Attached to each policy was the following endorsement: "Provisions as to Ownership and Control of the Policy "Subject to such limitations, if any, as may be hereinafter set forth, all legal incidents of ownership and control of the Policy, including any and all benefits, values, rights and options conferred upon the Insured by the Policy or allowed by the Company and any ultimate interest as beneficiary conferred upon the Insured or the Insured's estate by the Policy, shall belong to the following Owner: Oklahoma Distributing Co. of Ardmore, Okla., a partnership, as such partnership now exists or may hereafter be constituted." Thereafter the Company assigned all of the policies to Schlitz Brewing Company as collateral security for a loan of $100,000 payable in monthly payments. About nine months after its organization and on February 29, 1944, Ryan and wife withdrew from the partnership and elected to sell their interests to the other partners for cash, as provided in the partnership agreement. A new agreement on dissolution was executed by all partners. Among other things, it provided that the partnership was dissolved by mutual agreement; that each of the four remaining partners was to receive an undivided 1/4th interest "in and to all of the business assets and properties, real, personal and/or mixed, including accounts receivable and cash on hand remaining after the distribution of cash herein distributed to Dan Ryan and Jesse Willis Ryan"; that each of the Ryans was to receive in cash out of partnership assets an amount equal to 1/6th of the total net worth of the partnership at the time of its dissolution. Further, that the distributions so made were in full liquidation of said partnership, and the remaining four partners agreed to hold the Ryans harmless from any and all damage and liability occasioned on account of any partnership obligations. The books were audited by a certified public accountant and on his determination of the total net worth of the partnership Ryan and his wife were paid the sum of $65,118.04 for their 2/6ths interest in the enterprise. *201 The insurance policies were not specifically mentioned in the dissolution agreement. Some time later Mr. Ryan became ill. He began a series of requests or demands upon the Insurance Company and his former partners, contending that the Distributing Company as it then existed did not own the policy and requesting that the policies be returned and that his wife be named beneficiary. These negotiations were fruitless, and more than three years after dissolution of the partnership Mr. Ryan filed this action. Plaintiffs contend that the judgment is not supported by the evidence and is contrary to law. It is said that the policies were not disposed of in the written agreement of dissolution and that each partner was entitled to his pro-rata share of the undisposed assets, and that after the dissolution the resultant partnership had no insurable interest. The argument overlooks the provision of the dissolution agreement wherein there was distributed to the four remaining partners "all of the business assets and properties, real, personal and/or mixed ... after the distribution of the cash herein distributed to Dan Ryan and Jesse Willis Ryan etc.", and it overlooks the designated beneficiary which was the Distributing Company "as such partnership now exists or may hereafter be constituted." The accountant who made the audit, upon which the distribution of assets was based, did not list the policies as assets because, at that time, they had no cash value, but throughout the existence of the partnership the partners treated all policies as a business asset and property, and they had used the same to obtain a large loan for partnership use, which loan had not been repaid at the time of the dissolution. As a part of the agreement that obligation was assumed by the remaining partners and plaintiffs were held harmless from liability thereon. The premiums had been paid by the partnership and the sole beneficiary was the partnership. Miller v. Hall, 65 Cal. A.2d 200, 150 P.2d 287, cited by defendants, is not in point, by reason of the difference in facts from those of the instant case, including the designation of beneficiary. The case does hold that since the premiums were paid by the partnership the interest of the parties in the policies became partnership assets. Defendants say that a beneficiary irrevocably designated as such in a life policy has a vested right not subject to change at the insured's hand. In making this contention defendant is supported by the great weight of authority. "It is held by the great weight of authority that the interest of a designated beneficiary in an ordinary life policy vests upon the execution and delivery thereof, and, unless the same contains a provision authorizing a change of beneficiary without the consent thereof, the insured cannot make such change." Condon v. New York Life Ins. Co. of New York, 188 Iowa 658, 166 N.W. 452. The opinion cites many cases from various jurisdictions in support of the rule announced. See, also, Page v. Detroit Life Ins. Co., 11 Tenn. App. 417; Ruckenstein v. Metropolitan Life Ins. Co., 263 N.Y. 204, 188 N.E. 650. At the time of the dissolution agreement all policies were pledged with Schlitz Brewing Company to secure the partnership loan, and there was an unpaid balance of $70,000 on that debt. "Where partner contracted with his copartner that he should be beneficiary of partner's life policy, partner's attempt to change beneficiary after dissolution of partnership when partner owed money to copartner held ineffective (Rev. St. 1925, art. 5048)." Smith v. Schoellkopf (Tex. Civ. App.) 68 S.W.2d 346. While admitting that the partnership had an insurable interest in the life of Mr. Ryan, at the time the policies were written, plaintiffs say that there is no insurable interest possessed by *202 the partnership which continued after the dissolution. "An insurer is the only party who can raise question of insurable interest, and if insurer waives question of interest and pays money to named beneficiary, or into court, neither personal representative nor creditors can claim proceeds on grounds of beneficiary's lack of insurable interest. St. 1935, p. 636, sec. 10110." Jenkins v. Hill, 35 Cal. A.2d 521, 96 P.2d 168. Defendants say that a valid designation of a beneficiary remains so after the latter's insurable interest or relationship ceases, or, otherwise stated, insurable interest of the beneficiary of a life policy at the time of the death of the insured is immaterial, if it existed when the policy was issued. In support of this contention defendants cite Sinclair Refining Co. v. Long, 139 Kan. 632, 32 P.2d 464, which was a case in many respects similar to the present one. In the opinion the Kansas Supreme Court said: "... As applied to the situation here presented, the authorities generally are, and the recent ones practically ananimous, that the policy is not a mere contract of indemnity, but is a contract to pay to the beneficiary a certain sum in the event of the death of the insured. The authorities are practically unanimous also in support of the rule that where the insurable interest exists when the policy is issued, and a valid contract of insurance is then effected, it is not defeated by the cessation of the insurable interest unless the terms of the policy so provide. We quote from some of the leading authorities on this question: "In Grigsby v. Russell, 222 U.S. 149, 32 S.Ct. 58, 59, 56 L. Ed. 133, 36 L.R.A. (N.S.) 642, Ann. Cas. 1913B, 863, it was held: `A valid policy (of insurance) is not avoided by the cessation of the insurable interest, even as against the insurer, unless so provided by the policy itself.' "In Conn. Mut. Life Ins. Co. v. Schaefer, 94 U.S. 457, 24 L. Ed. 251, it was held: `A policy of life insurance originally valid does not cease to be so by the cessation of the assured's party's interest in the life insured, unless such be the necessary effect of the provisions of the instrument itself.' "In Wurzburg v. N.Y. Life Ins. Co., 140 Tenn. 59, 203 S.W. 332, L.R.A. 1918E, 566, it was held: `A manufacturing company has an insurable interest in the life of its manager, who is its guiding spirit and is largely carrying on its business. Where a manufacturing company took out a valid policy on the life of its general manager, who later severed his connection with the company, and it paid all premiums until his death, it was entitled to the whole of the insurance.'" We need not lengthen this opinion with the many additional citations, but we observe that defendants' above proposition is sustained by the great weight of authority. These involved insurance policies were business policies purchased for the protection of the partnership, and were designed to enchance the growth and success of the partnership undertaking. The designation of the beneficiary was an irrevocable designation. All partners then intended, just as set out in the provision of the policies, that all legal incidents of ownership and control of their respective policies and all benefits and rights conferred on the insured by the policies should belong to the Oklahoma Distributing Company as it then existed or as it might thereafter be constituted. The use of the policies for partnership purposes was intended from the day the partnership agreement was executed. Their continued use as collateral for the Schlitz Company loan until that debt was paid was contemplated by all parties when the dissolution agreement was signed, — an obligation which the remaining partners assumed while the plaintiffs were to be released therefrom. At that time the obligation was in excess of the total amount of Mr. Ryan's policies. It was then contemplated by the parties that the continuing partnership, of the four remaining partners, would meet that obligation. There is nothing in the record to indicate that the parties intended that as soon as the four remaining *203 partners used their own money to pay off the Schlitz indebtedness they would turn the policies over to Mr. Ryan or that he was to receive any further benefit from them. In all these transactions the insurance policies were treated as partnership property. Under the dissolution agreement Ryan and wife were paid cash for their interests in the partnership as specified in the partnership agreement in the event of a withdrawal of any partner. After use of the cash needed to pay them, "all of the business assets and properties, real personal and mixed" were assigned to the four remaining partners. Ryan and wife joined in this assignment. None of the assets were itemized or given specific mention. The insurance policies of all partners were and had been treated as business assets. In the audit upon which the amounts due to Ryan and wife were computed, the prepaid premiums were listed as assets. Thus Ryan and wife were reimbursed for their pro-rata share of premiums theretofore paid and withheld from all partners during the operation of the business. It cannot be said that the failure to mention the policies in the agreement was due to an oversight since the same thing could be said of any other assets. None was given specific mention. The parties intended the assignment to cover all assets remaining after the cash payment, and so said. Plaintiffs contend that the court erred in refusing to permit Mrs. Ryan to testify as to her understanding as to the taking out of the insurance policies. Following the court's ruling the plaintiffs tendered the following written offer of proof: "Plaintiff's Tender in Connection with Testimony of Jesse Willis Ryan, Wife of Deceased. "2. That Mrs. Ryan, wife of deceased, if permitted to testify would testify that it was her understanding as a partner that the insurance was only to be carried on Dan Ryan's life during the existence of the Partnership." To avoid the rule against use of parol evidence to vary the terms of a written agreement, plaintiffs contend that parol evidence was admissible to show that the written agreement was not intended to cover the subject of the policies, and cite 32 C.J.S. 1027, and numerous cases dealing with the admission of evidence to show the intent of the parties where the written instrument is ambiguous. We do not find ambiguity in the contract. As heretofore stated the parties were disposing of business assets and they had treated the policies as business assets. The offer was in conflict with the rule against admission of parol evidence to vary the terms of a written contract. Defendants also contend that there was error in the refusal of evidence that the omission of provision for disposition of the insurance policies was because of a mutual mistake of the parties. Mrs. Ryan was permitted to testify that the insurance policies were not mentioned or considered in the negotiations of settlement. There was no evidence of a mutual mistake of fact and no offer of evidence to establish a mutuality of mistake. There was no plea for reformation of the settlement contract because of a mutual mistake. The trial court did not err in refusing to admit the suggested testimony. Affirmed.
{ "pile_set_name": "FreeLaw" }
DETROIT (AP) — Plans are moving forward on $4.9 million in improvements at the Dossin Great Lakes Museum on Detroit’s Belle Isle. The Detroit Historical Society is holding a groundbreaking Monday on the first $1.5 million part of the four-phase outdoor enhancement project. The first phase is to be completed by November. Outdoor maritime artifact displays will be upgraded and the anchor from the freighter Edmund Fitzgerald, which sank in 1975 and was immortalized by Gordon Lightfoot’s song, will be highlighted in a Lost Mariners Memorial. Other phases are expected to be completed by 2021, including a riverfront trail and a landscape that would approximate the natural setting of Belle Isle before it became a park. The Historical Society has raised $1.9 million and seeks support for the rest of the project.
{ "pile_set_name": "OpenWebText2" }
Q: How to Read data from generic repository in ASP.NET controller class? I am using ASP.NET mvc 5 in visual studio 2013 and tending to read data from function table (SQL Server) in the controller class via generic repository. I have IGenericRepository which has IQueryable one function, I have GenericRepository class where i am implementing this interface. I got FunctionContext which is inherited from baseContext. The reason i have baseContext so all the dbcontexts can use one path to hit database but same time keep number of table limited to business need. I have manage to implement genericRepository but seems getting null data against _dbSet while debugging in GenericRepository and I cant read data in controller class either there plus getting error on "var query" An exception of type 'System.InvalidOperationException' occurred in EntityFramework.dll but was not handled in user code many thanks in advanced.... Generic Repository Interface public interface IGenericRepository<TEntity> : IDisposable { IQueryable<TEntity> GetAll(); } Generic Repository public class GenericRepository<TEntity> : IGenericRepository<TEntity> where TEntity : class { protected DbSet<TEntity> _DbSet; private readonly DbContext _dbContext; public GenericRepository() { } public GenericRepository(DbContext dbContext) { this._dbContext = dbContext; _DbSet = _dbContext.Set<TEntity>(); } public IQueryable<TEntity> GetAll() { return _DbSet; } public void Dispose() { } } BaseContext public class BaseContext<TContext> : DbContext where TContext : DbContext { static BaseContext() { Database.SetInitializer<TContext>(null); } protected BaseContext() : base("name = ApplicationDbConnection") { } } FunctionContext public class FunctionsContext : BaseContext<FunctionsContext> { public DbSet<App_Functions> Functions { get; set; } } Function Mapping class [Table("Functions")] public class App_Functions { public App_Functions() { } [Key] public int Function_ID { get; set; } [StringLength(50)] [Required] public string Title { get; set; } public int Hierarchy_level { get; set; } } Function Domain class public class Functions { public Functions() { } public int Function_ID { get; set; } public string Title { get; set; } public int Hierarchy_level { get; set; } } Controller class public class HomeController : Controller { public ActionResult Index() { using (var repository = new GenericRepository<Functions>(new FunctionsContext())) { ????????????????????????????????? var query = repository.GetAll().Select(x => new Functions { Function_ID = x.Function_ID, Title = x.Title, Hierarchy_level = x.Hierarchy_level }); foreach(var item in query) { var a2 = item.Title; } } return View(); } } A: The type parameter on your repository constructor is incorrect. It should be new GenericRepository<App_Functions>(new FunctionsContext())) Because App_Functions is the type of the entity.
{ "pile_set_name": "StackExchange" }
CODE_SIGN_IDENTITY = CONFIGURATION_BUILD_DIR = ${PODS_CONFIGURATION_BUILD_DIR}/Moya-macOS FRAMEWORK_SEARCH_PATHS = $(inherited) "${PODS_CONFIGURATION_BUILD_DIR}/Alamofire-macOS" "${PODS_CONFIGURATION_BUILD_DIR}/ReactiveSwift-macOS" "${PODS_CONFIGURATION_BUILD_DIR}/Result-macOS" "${PODS_CONFIGURATION_BUILD_DIR}/RxAtomic-macOS" "${PODS_CONFIGURATION_BUILD_DIR}/RxSwift-macOS" GCC_PREPROCESSOR_DEFINITIONS = $(inherited) COCOAPODS=1 OTHER_SWIFT_FLAGS = $(inherited) -D COCOAPODS PODS_BUILD_DIR = ${BUILD_DIR} PODS_CONFIGURATION_BUILD_DIR = ${PODS_BUILD_DIR}/$(CONFIGURATION)$(EFFECTIVE_PLATFORM_NAME) PODS_ROOT = ${SRCROOT} PODS_TARGET_SRCROOT = ${PODS_ROOT}/Moya PRODUCT_BUNDLE_IDENTIFIER = org.cocoapods.${PRODUCT_NAME:rfc1034identifier} SKIP_INSTALL = YES
{ "pile_set_name": "Github" }
In Pictures: Top 10 Smoking-Gun E-Mails Bill Detamore has seen plenty of smoking-gun e-mails as chief legal officer of IE Discovery, an Austin, Texas-based consulting firm that helps companies search through millions of electronic documents looking for evidence that could win--or torpedo--a case. Fortunately for prosecutors and hungry plaintiff lawyers, there are usually plenty. "When you're writing e-mails, you're not thinking about how a jury will take it," says Detamore. "Even sophisticated executives do it." Here's Detamore's list of the top 10 smoking-gun e-mails: Bear Stearns "...the entire subprime market is toast." This unwise, if frank, observation by former Bear Stearns executive Matthew Tannin came as he and his boss were assuring investors that the subprime funds they ran were still sound. Both were indicted for fraud June 19. Microsoft "Winning Internet browser share is a very, very important goal for us." Bill Gates may have been stating the obvious in this 1996 directive to subordinates, but superlawyer David Boies used this and scores of other incriminating e-mails to convince a federal judge Microsoft had conspired to drive Netscape out of the business. Chevron American Home Products "Do I have to look forward to spending my waning years writing checks to fat people with a silly lung problem?" This e-mail from an American Home Products executive, discovered by plaintiff lawyers and leaked to the press, helped drive a $20 billion settlement of fen-phen claims. Merck "I just can't wait to be the one to present those results to senior management," said an angry Merck scientist, Dr. Alise Reicin, in a 1997 e-mail after cardiovascular symptoms emerged with Vioxx. Ultimate tab to settle the litigation: $5 billion and counting. Arthur Andersen "Remind the engagement team of our documentation and retention policy." Arthur Andersen lawyer Nancy Temple's e-mailed instructions to the Enron auditing team preceded an orgy of document destruction and helped to seal Andersen's fate. Credit Suisse First Boston "Time to clean up those files." In a similar vein, former Credit Suisse First Boston banker Frank Quattrone was convicted of obstruction of justice in 2004 for allegedly instructing employees to thwart a Securities and Exchange Commission investigation with this e-mail. The conviction was reversed on appeal. Marsh & McClennan "I will give you clear direction on who (we) are steering business to and ... who we are steering business from." This 2002 e-mail from a top Marsh & McClennan executive helped former N.Y. Attorney General Eliot Spitzer make the case the insurance broker was engaged in a massive bid-rigging scheme. Former Houston District Attorney "The very next time I see you, I want to kiss you behind your right ear." One of the few printable e-mails from former Houston District Attorney Chuck Rosenthal, who resigned this year after this e-mail to his secretary and hundreds of others emerged in an unrelated civil rights suit. Former Detroit Mayor "Never busted. Busted is what you see! LOL." Detroit Mayor Kwame Kilpatrick was confident his affair with a city official was secret when he sent this text message. He was later indicted for denying the affair under oath. I am a senior editor at Forbes, covering legal affairs, corporate finance, macroeconomics and the occasional sailing story. I was the Southwest Bureau manager for Forbes in Houston from 1999 to 2003, when I returned home to Connecticut for a Knight fellowship at Yale Law Sch...
{ "pile_set_name": "Pile-CC" }
A conventional laser beam level instrument is quite complex for its structure or mechanism and also occupies a larger volume. The automatic optical levelling, plumbing and verticality-determining apparatus of U.S. Pat. No. 6,035,540 also granted to the same inventor of this application includes a frame (3) for securing the illuminators (6, 7, 8) and the plumb device (4) on the frame (3) rotatably mounted on the base (1), easily causing precision problem by such a rotatable mechanism; and a longer stem (42) for mounting the plumb device (4) on the stem on the frame (3), thereby increasing the total height of the instrument and causing unstable standing and inconvenient handling of the instrument. The present inventor has found the drawbacks of the conventional laser levelling or calibrating instrument and invented the present compact optical calibrating apparatus. The object of the present invention is to provide a compact optical calibrating apparatus including: a housing having a base formed on a bottom of the housing, a horizontality calibrator universally pendulously mounted in the housing, a plurality of illuminators embedded or secured in a plumb pendulously secured to the horizontality calibrator, and a switch device pivotally secured in the housing for switching on or off a power source supplied to the illuminators and for braking or releasing the pendulous movement of the plumb; whereby upon embedding of the illuminators in the plumb, the height and volume of the calibrating apparatus is decreased for obtaining a compact optical calibrating instrument.
{ "pile_set_name": "USPTO Backgrounds" }
Ma'aden and Natpet close plants for maintenance 3:38 AM MST | January 28, 2013 | Natasha Alperowicz Saudi Arabian Mining Company’s (Ma’aden) subsidiary Ma’aden Phosphate Co. (MPC; Riyadh) will shut down its di-ammonium phosphate (DAP) plant at Ras Al Khair, Saudi Arabia for maintenance. The company says that it decided on the shutdown because of lower seasonal demand for DAP. Maintenance work commenced today and will last approximately three weeks. MPC, a joint venture in which Ma’aden holds 70% and Sabic 30%, says the shutdown will have no impact on the company’s ability to meet its obligations towards customers. The upstream...
{ "pile_set_name": "Pile-CC" }
[Adacolumn apheresis for hepatitis C virus in patients waiting for kidney transplant. Preliminary study]. Hepatitis C virus (HCV) infection occurs much more frequently in the hemodialysis population than in the general population. Patients with chronic kidney disease with persistent HCV infection may develop serious and progressive chronic liver disease, with associated long-term morbidity and mortality related to cirrhosis and hepatocellular carcinoma. Monocytes and macrophages are known to produce extrahepatic breeding sites and spread the disease. Our aim was to lower the levels of macrophages, granulocytes, monocytes, proinflammatory cells and viremia using an extracorporeal device: the Adacolumn ® leukocyte apheresis system (Otsuka). The Adacolumn is a direct hemoperfusion-type leukapheresis device. The column is a single-use (disposable) polycarbonate column with a capacity of about 335 mL, filled with 220-g cellulose acetate beads of 2 mm in diameter bathed in physiological saline. The carriers adsorb ''activated'' granulocytes and monocytes/macrophages that bear Fc and complement receptors. The patients underwent five 1-hour sessions for five consecutive days. The column was placed in an extracorporeal setting with a perfusion rate of 30 mL/min and a duration of 60 minutes. A reduction of viremia was observed in all patients in association with a decrease in cytokine levels and a proportional decrease in immune cells. Although this study investigated responses in a small number of patients, it was shown that the Adacolumn changed the cellular immunity and promoted early viral response.
{ "pile_set_name": "PubMed Abstracts" }
1968–69 Oakland Seals season The 1968–69 Oakland Seals season was the Seals' second season in the NHL. For the first time in their short history they qualified for the Stanley Cup playoffs after finishing second in the West Division (albeit with seven more losses than wins). They were upset in the playoffs, losing their quarter-finals series to the fourth-place Los Angeles Kings in seven games. (Oakland's three playoff game victories against Los Angeles were the only ones the franchise would get in their entire ten-year history.) Offseason Amateur draft Regular season Final standings Record vs. opponents Schedule and results Player statistics Skaters Note: GP = Games played; G = Goals; A = Assists; Pts = Points; PIM = Penalties in minutes †Denotes player spent time with another team before joining Seals. Stats reflect time with the Seals only. ‡Traded mid-season Goaltenders Note: GP = Games played; TOI = Time on ice (minutes); W = Wins; L = Losses; T = Ties; GA = Goals against; SO = Shutouts; GAA = Goals against average Transactions The Seals were involved in the following transactions during the 1968–69 season: Trades Additions and subtractions Roster Playoffs The Seals made it into the playoffs and went against Los Angeles in the Quarter-finals in a best of seven series and lost in 7 games, or 3–4. References Seals on Hockey Database Seals on Database Hockey Category:California Golden Seals seasons Oakland Oakland
{ "pile_set_name": "Wikipedia (en)" }
using UnityEngine; using UnityEditor; namespace Lockstep { [CustomPropertyDrawer(typeof(PathObjectAttribute))] public class EditorPathObject : UnityEditor.PropertyDrawer { const float defaultPropertyHeight = 16f; public override float GetPropertyHeight(SerializedProperty property, GUIContent label) { return defaultPropertyHeight; } public override void OnGUI(Rect position, SerializedProperty property, GUIContent label) { PathObjectAttribute Atb = attribute as PathObjectAttribute; SerializedProperty prefabNameProp = property.FindPropertyRelative("_path"); //SerializedProperty prefabProp = property.FindPropertyRelative ("_editorPrefab"); //string lastName = prefabNameProp.stringValue; UnityEngine.Object obj = PathObjectFactory.Load(prefabNameProp.stringValue) as UnityEngine.Object; obj = (UnityEngine.Object)EditorGUI.ObjectField(position, label, obj, Atb.ObjectType, false); string relativePath = ""; if (obj != null) { if (PathObjectUtility.TryGetPath(obj, out relativePath) == false) { Debug.LogErrorFormat("Object '{0}' is not detected to be in a Resources folder.", obj); return; } } prefabNameProp.stringValue = obj != null ? relativePath : ""; /*if (lastName != prefabNameProp.stringValue) { if (PathPrefabFactory.Load (prefabNameProp.stringValue) == null) { prefabProp.objectReferenceValue = null; } }*/ } } }
{ "pile_set_name": "Github" }
Event Hosting and Promotions WhiteKnuckle Event Hosting & Promotions As an event manager, we get to work with the most diverse customers, projects and locations. That’s the beauty of the industry.No project is like the other. For years, we’ve been organising events ourselves, so we understand customers and we know what it’s like to have full responsibility. We understand very clearly where you’re coming from. And thanks to our experience in the ‘corporate events’ industry, we know how to bring these two worlds together. Every job is tailor-made. That’s one thing we’ve learned working in this game. So we approach every project as a unique chance to leave a lasting impression—however small and simple the event. With our background as event organizers, we’ve built a gigantic network of creatives, technical guru’s handymen and so on.
{ "pile_set_name": "Pile-CC" }
The Great Water Debate Environment Minister David Parker announced plans to limit nutrient loss from farmlands to waterways during yesterday's edition of Q + A. Speaking with host Corin Dann, Parker discussed halting further environmental degradation and making notable improvements to the overall state of the environment over the next five years, and then, in the succeeding generation, getting things "back to where they need to be". To achieve this Parker says nutrient limits will be implemented, which in some cases will force farmers to destock. This, he says, is in reaction to the fact that "In some areas, the number of cows per hectare is higher than the environment can sustain". Despite these stock-limiting measures being likely to severely impact the wallets of some farmers, Parker says there will be no compensation: "You don't compensate people for stopping pollution. Just because you could pollute last year doesn't mean you should now be paid to stop doing it." Parker says long-term solutions are the key; for example, moving towards more cropping and horticulture in South Canterbury, where these land uses are of higher value. Rather than subsidising this land use change, Parker says the government will enable it through the new technologies that they are willing to subsidise going forward, such as sensors, positioning systems and robotics. Parker says economics will drive change where there is a high value land use, and where economics wont, regulation will. This regulation will come in the form of new national policy statement which will forbid increases in land use intensity, and bring forward a methodology for the allocation of nutrients in nutrient-enriched catchments. These announcements come shortly after discussions over putting farmers into the emissions trading scheme, and, along with cuts to funding for irrigation schemes, and plans to stop oil and gas exploration, show the new Labour government's willingness to severely crack down on industries doing harm to the environment.
{ "pile_set_name": "Pile-CC" }
// Boost.Units - A C++ library for zero-overhead dimensional analysis and // unit/quantity manipulation and conversion // // Copyright (C) 2003-2008 Matthias Christian Schabel // Copyright (C) 2008 Steven Watanabe // // Distributed under the Boost Software License, Version 1.0. (See // accompanying file LICENSE_1_0.txt or copy at // http://www.boost.org/LICENSE_1_0.txt) #ifndef BOOST_UNITS_PRESSURE_DERIVED_DIMENSION_HPP #define BOOST_UNITS_PRESSURE_DERIVED_DIMENSION_HPP #include <boost/units/derived_dimension.hpp> #include <boost/units/physical_dimensions/length.hpp> #include <boost/units/physical_dimensions/mass.hpp> #include <boost/units/physical_dimensions/time.hpp> namespace boost { namespace units { /// derived dimension for pressure : L^-1 M T^-2 typedef derived_dimension<length_base_dimension,-1, mass_base_dimension,1, time_base_dimension,-2>::type pressure_dimension; } // namespace units } // namespace boost #endif // BOOST_UNITS_PRESSURE_DERIVED_DIMENSION_HPP
{ "pile_set_name": "Github" }
Why? It’s impossible to know for certain with a virus as complex and unknown as this one. But there is an obvious potential cause: Many political leaders in the United States, including President Trump, are not following the advice of public health experts. Those experts have urged a range of measures: continued social distancing until the number of cases falls further; a rapid expansion of virus testing; and planning an extensive program of “contact tracing” and quarantining, to allow for gradual reopening. The United States is taking some of these steps, but only some. In the meantime, Trump is also encouraging protests that defy social distancing, which will only spread the virus. And he is calling for an across-the-board reduction in immigration, which will do little if anything to reduce the virus’s spread. Some states are also taking counterproductive steps. Wisconsin’s insistence on holding an election in the midst of a pandemic has evidently led to some additional cases, as Alison Dirr of the Milwaukee Journal Sentinel reported. So maybe we shouldn’t be surprised that the United States isn’t reducing the spread of the virus as well as many other countries. We don’t seem to be trying as hard. If you are not a subscriber to this newsletter, you can subscribe here. You can also join me on Twitter (@DLeonhardt) and Facebook. Follow The New York Times Opinion section on Facebook, Twitter (@NYTopinion) and Instagram.
{ "pile_set_name": "OpenWebText2" }
I haven’t really thought about expanding in quite a while – the twin specific blogs have gone fallow a long while ago. A blog on nothing more than photographs would be on top of the list, but even with the visually impressive monotone (that adapts to the dominant color of the photograph) I haven’t taken the plunge yet. The idea of doing book or movie reviews on a separate blog does sound a bit attractive, but would also be a bit too much work and redundant. I haven’t been actually challenged, but that’s not a reason NOT to participate in a meme. The instructions are simple: Enter the fourth directory in your picture stash. Choose the fourth picture in your blog Describe when/why/how you took it. Challenge four people to participate Well, this picture is from New York, close to the WTC ground zero, taken in January 2002, after the cleaning crew was mostly done with the rubble. This was a cold day, easily fifteen below zero, the chill compounded by stiff winds off the rivers. The camera was a brand new Canon G3, and this image is the nineteenth picture taken with it. I fell for Richard Kelly’s Donnie Darko on a first view, and haven’t been able to shake the feeling. Even though his later career has not been exactly successful, especially in the box office, I still have faith. I hated domino, but liked Southland Tales pretty much more than anybody else. The arrival of S. Darko was a complete surprise – while it’s not a direct sequel to Kelly’s debut nor actually directed (or even written) by him, it’s still among the “films to check out in 2009″. Guillotine, published in 1998 by Wizards of the Coast, is a deceptively simple card game that is easily taught and enjoyed by pretty much anybody who can distinguish between gallows humor and actual celebration of nobility getting decapitated. Indeed, the subject of the game is on the grim side. It depicts a struggle between rival executioners in the last days of the French revolution. A struggle in which success is measured by the lopping off and collecting of as many nobles’ heads as possible. The game is easily learned, but the random nature of its course (especially when more than two players are involved) turns it into a chaotic affair where luck and skill alternate. The bloody nature of the topic is gracefully sidestepped with use of plain and humorous art. The images on the cards are provided by two veteran Wizards artists: Quinton Hoover and Mike Raabe, both with a long career of MtG-illustration as a merit. Even though the publisher is famous for flogging good games t death with expansions, Guillotine curiously never got anything additional designed for it. An omission that is tackled with the addition of new cards in boardgamegeek. The simple nature of the game lends itself to online play as well. A version was produced for the aborted Gleemax portal. It is now available on the gametableonline.com, and much more attractively on facebook as well. Haven’t tried either, but will do, soon. Yesterday was the chinese new year, when the year of the rat turned into the year of the ox. Helsinki celebrated the occasion for the third time, with a smallish festival on Lasipalatsinaukio in the middle of downtown. The weather was far from optimal. The consistent drizzle threatened to turn the bright red rice paper lanterns into mush, and definitely made the icy ground underfoot uncomfortably slippery. The square was packed with people. Especially the food court was stuffed and unruly enough to deter from queuing up. By far the most scrumptious offerings were by Dong Bei Hu – their barbecued squid on a stick is definitely something to try out on an inevitable visit. Had dinner in Tang Village in Kamppi instead. Clearly a popular alternative, since the staff was persuading everybody to stick to the buffet instead of ordering something off the menu. Which was a good choice, since the buffet was indeed filled with good dishes – with selection alternating somewhat between rounds (at least the grilled tofu was curiously absent before going for seconds). The evening was capped by a sponsored fireworks display over Töölönlahti. The fifteen minutes of pyrotechnics was occasionally impressive, and the vantage point on the side balcony of the parliament building provided an excellent view to all rockets but the ones shot low. The camera of the n96 proved to be spectacularly useless in the tough conditions. The list is wide indeed, covering both the biggest hits (Enter Sandman, One) and some great misses (Frantic). Too bad Four Horsemen is entirely absent, but the likes of Orion and Whiplash round out the selection nicely. Death Magnetic is represented by a single song only, but the entire album is available as downloadable content. As with the game centered on Aerosmith, other bands get their day in the sun as well – here the selection ranges from songs covered by Metallica (Lynyrd Skynyrd’s Tuesday’s Gone and as a definitive highlight Diamond Head’s Am I Evil?) and liked by the band (System of a Down, Corrosion of Conformity and Motörhead are all featured). Despite the name, this is a full-band game, and hopefully the Neversoft/Harmonix-promise of instruments being cross-usable between the Guitar Hero- and Rock Band-franchises remains watertight. Thus far I’ve avoided going beyond a single guitar (two, actually, but the PS2 and Xbox 360 instruments are not destined to meet), mainly due to space and availability reasons. The strong set list and my 20+ years as a Metallica fanboy do mean that this game will sooner or later find its way to the HQ. As the third (and way long overdue) mystery novel read over the christmas break, here’s the lowdown on the newest Maria Kallio-novel by Leena Lehtolainen: Väärän Jäljillä. It’s been three years since the previous novel, Rivo Satakieli, and the break’s been beneficial. Väärän jäljillä is a back to basics book, enjoyable in the encompassing familiarity, yet bringing in enough new spices not to be a rehash from the previous. The authors mannerisms are present, but way more subdued than in the previous novels. The subject is the murky world of sports, and the advance of commercialism. There are a lot of more than thinly veiled analogies to real-world figures, and all in all the plot has elements that wouldn’t be out of place inthe real world. Oddly enough, the franchise has now been decorated with a dedicated website of its own.
{ "pile_set_name": "Pile-CC" }
Q: What do I do when my ASP.Net website is not allowed to perform some operations defined by the security policy of my web hosting service? My asp.net site coded in C# is running fine on my local system but when I uploaded the files on the httpdocs folder through plesk I am getting the following error: Server Error in '/' Application. ________________________________________ Compilation Error Description: An error occurred during the compilation of a resource required to service this request. Please review the following specific error details and modify your source code appropriately. Compiler Error Message: CS0246: The type or namespace name 'Xyz' could not be found (are you missing a using directive or an assembly reference?) Source Error: Line 1: <%@ Application Language="C#" %> Line 2: <%@ Import Namespace="xyz" %> Line 3: <%@ Import Namespace="System.Web.Optimization" %> Line 4: <%@ Import Namespace="System.Web.Routing" %> Source File: g:\PleskVhosts\xyz.com\httpdocs\Xyz\Global.asax Line: 2 Show Detailed Compiler Output: C:\Windows\SysWOW64\inetsrv> "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /t:library /utf8output /R:"C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.Core\v4.0_4.0.0.0__b77a5c561934e089\System.Core.dll" /R:"C:\Windows\Microsoft.Net\assembly\GAC_32\System.Web\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Web.dll" /R:"C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.Web.WebPages.Deployment\v4.0_2.0.0.0__31bf3856ad364e35\System.Web.WebPages.Deployment.dll" /R:"C:\Windows\Microsoft.Net\assembly\GAC_MSIL\Microsoft.CSharp\v4.0_4.0.0.0__b03f5f7f11d50a3a\Microsoft.CSharp.dll" /R:"C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.Web.Services\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Web.Services.dll" /R:"C:\Windows\Microsoft.Net\assembly\GAC_32\System.EnterpriseServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.dll" /R:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorlib.dll" /R:"C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll" /R:"C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.WorkflowServices\v4.0_4.0.0.0__31bf3856ad364e35\System.WorkflowServices.dll" /R:"C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll" /R:"C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.ServiceModel\v4.0_4.0.0.0__b77a5c561934e089\System.ServiceModel.dll" /R:"C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.ServiceModel.Web\v4.0_4.0.0.0__31bf3856ad364e35\System.ServiceModel.Web.dll" /R:"C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.Web.DynamicData\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.DynamicData.dll" /R:"C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.Activities\v4.0_4.0.0.0__31bf3856ad364e35\System.Activities.dll" /R:"C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.Xml\v4.0_4.0.0.0__b77a5c561934e089\System.Xml.dll" /R:"C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.Web.ApplicationServices\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.ApplicationServices.dll" /R:"C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.Runtime.Serialization\v4.0_4.0.0.0__b77a5c561934e089\System.Runtime.Serialization.dll" /R:"C:\Windows\Microsoft.Net\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll" /R:"C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.IdentityModel\v4.0_4.0.0.0__b77a5c561934e089\System.IdentityModel.dll" /R:"C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.Data.DataSetExtensions\v4.0_4.0.0.0__b77a5c561934e089\System.Data.DataSetExtensions.dll" /R:"C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.ServiceModel.Activation\v4.0_4.0.0.0__31bf3856ad364e35\System.ServiceModel.Activation.dll" /R:"C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.Xml.Linq\v4.0_4.0.0.0__b77a5c561934e089\System.Xml.Linq.dll" /R:"C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System\v4.0_4.0.0.0__b77a5c561934e089\System.dll" /R:"C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.Configuration\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Configuration.dll" /R:"C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.ComponentModel.DataAnnotations\v4.0_4.0.0.0__31bf3856ad364e35\System.ComponentModel.DataAnnotations.dll" /R:"C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.ServiceModel.Activities\v4.0_4.0.0.0__31bf3856ad364e35\System.ServiceModel.Activities.dll" /out:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\Temporary ASP.NET Files\root\ba70df64\8ad7fdd9\App_global.asax.8gpjfmvi.dll" /debug- /optimize+ /w:4 /nowarn:1659;1699;1701;612;618 /warnaserror- "C:\Windows\Microsoft.NET\Framework\v4.0.30319\Temporary ASP.NET Files\root\ba70df64\8ad7fdd9\App_global.asax.8gpjfmvi.0.cs" "C:\Windows\Microsoft.NET\Framework\v4.0.30319\Temporary ASP.NET Files\root\ba70df64\8ad7fdd9\App_global.asax.8gpjfmvi.1.cs" Microsoft (R) Visual C# Compiler version 4.0.30319.17929 for Microsoft (R) .NET Framework 4.5 Copyright (C) Microsoft Corporation. All rights reserved. g:\PleskVhosts\xyz.com\httpdocs\Xyz\Global.asax(2,11): error CS0246: The type or namespace name 'Xyz' could not be found (are you missing a using directive or an assembly reference?) g:\PleskVhosts\xyz.com\httpdocs\Xyz\Global.asax(3,22): error CS0234: The type or namespace name 'Optimization' does not exist in the namespace 'System.Web' (are you missing an assembly reference?) g:\PleskVhosts\xyz.com\httpdocs\Xyz\Web.config(24,21): error CS0234: The type or namespace name 'AspNet' does not exist in the namespace 'Microsoft' (are you missing an assembly reference?) ________________________________________ Version Information: Microsoft .NET Framework Version:4.0.30319; ASP.NET Version:4.0.30319.18056 Any help would be great. ## New error ****Server Error in '/' Application. Security Exception Description: The application attempted to perform an operation not allowed by the security policy. To grant this application the required permission please contact your system administrator or change the application's trust level in the configuration file. Exception Details: System.Security.SecurityException: Request for the permission of type 'System.Security.Permissions.ReflectionPermission, mscorlib, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089' failed. Source Error: An unhandled exception was generated during the execution of the current web request. Information regarding the origin and location of the exception can be identified using the exception stack trace below. Stack Trace: [SecurityException: Request for the permission of type 'System.Security.Permissions.ReflectionPermission, mscorlib, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089' failed.] System.Delegate.DelegateConstruct(Object target, IntPtr slot) +0 Owin.Loader.DefaultLoader..ctor(Func`3 next, Func`2 activator, IEnumerable`1 referencedAssemblies) +69 Microsoft.Owin.Host.SystemWeb.OwinBuilder.GetAppStartup() +65 Microsoft.Owin.Host.SystemWeb.OwinHttpModule.InitializeBlueprint() +28 System.Threading.LazyInitializer.EnsureInitializedCore(T& target, Boolean& initialized, Object& syncLock, Func`1 valueFactory) +115 Microsoft.Owin.Host.SystemWeb.OwinHttpModule.Init(HttpApplication context) +106 System.Web.HttpApplication.RegisterEventSubscriptionsWithIIS(IntPtr appContext, HttpContext context, MethodInfo[] handlers) +418 System.Web.HttpApplication.InitSpecial(HttpApplicationState state, MethodInfo[] handlers, IntPtr appContext, HttpContext context) +172 System.Web.HttpApplicationFactory.GetSpecialApplicationInstance(IntPtr appContext, HttpContext context) +336 System.Web.Hosting.PipelineRuntime.InitializeApplication(IntPtr appContext) +296 Version Information: Microsoft .NET Framework Version:4.0.30319; ASP.NET Version:4.0.30319.18056**** A: You need to right click on your Project, and then select "Publish". You can either publish to the file system so you can alter your Web.config before you upload it to godaddy, or you could just set it to publish to the godaddy site. I'd choose the file system approach. One step at a time. As you said in your comments, "I added all files and folders except for the solution file in the Projects folder", that doesn't do anything. To execute from that, it needs to run from within the Visual Studio IDE. To properly set up where all of the files are supposed to be for production use, you must Publish your web project. A: Had the same problem, the error can be fixed using the web.config. Add the level="Full" level into trust element, like so: <system.web> ... <trust level="Full" /> ... </system.web>
{ "pile_set_name": "StackExchange" }
{ config, pkgs, lib, ... }: with lib; let cfg = config.services.jackett; in { options = { services.jackett = { enable = mkEnableOption "Jackett"; dataDir = mkOption { type = types.str; default = "/var/lib/jackett/.config/Jackett"; description = "The directory where Jackett stores its data files."; }; openFirewall = mkOption { type = types.bool; default = false; description = "Open ports in the firewall for the Jackett web interface."; }; user = mkOption { type = types.str; default = "jackett"; description = "User account under which Jackett runs."; }; group = mkOption { type = types.str; default = "jackett"; description = "Group under which Jackett runs."; }; package = mkOption { type = types.package; default = pkgs.jackett; defaultText = "pkgs.jackett"; description = "Jackett package to use."; }; }; }; config = mkIf cfg.enable { systemd.tmpfiles.rules = [ "d '${cfg.dataDir}' 0700 ${cfg.user} ${cfg.group} - -" ]; systemd.services.jackett = { description = "Jackett"; after = [ "network.target" ]; wantedBy = [ "multi-user.target" ]; serviceConfig = { Type = "simple"; User = cfg.user; Group = cfg.group; ExecStart = "${cfg.package}/bin/Jackett --NoUpdates --DataFolder '${cfg.dataDir}'"; Restart = "on-failure"; }; }; networking.firewall = mkIf cfg.openFirewall { allowedTCPPorts = [ 9117 ]; }; users.users = mkIf (cfg.user == "jackett") { jackett = { group = cfg.group; home = cfg.dataDir; uid = config.ids.uids.jackett; }; }; users.groups = mkIf (cfg.group == "jackett") { jackett.gid = config.ids.gids.jackett; }; }; }
{ "pile_set_name": "Github" }
Uridine kinase, adenylate kinase, and guanase in human lung tumors. In pulmonary neoplasms, the uridine kinase concentration was higher (2- to 20-fold) than in the noninvolved lung portions of each of the 12 subjects studied. The extent of elevation of uridine kinase in the different tumors showed a significant positive correlation with the rises (1.5- to 30-fold) in thymidine kinase, suggesting that neoplastic transformation in human lung involved coordinated increases in the capacity for the reutilization of different nucleoside phosphates. Adenylate kinase was always at lower levels in neoplasms compared to noninvolved areas of the same lung, and the extent of this loss in the different tumors correlated inversely with the gain in uridine kinase and thymidine kinase. Normal fetal human lung was also deficient in adenylate kinase, while its uridine kinase and thymidine kinase (and also guanase) activities were above the adult levels. The guanase activities of the different neoplasms, unrelated to their uridine kinase or thymidine kinase content, correlated with the activities in the subjects' noninvolved lung. These individual differences were much more striking than those between the neoplastic and control samples. Variations in guanase activity thus appear to be "random," whereas observations on the three other enzymes attest to the orderly nature of biochemical differences among individual tumors and between normal and neoplastic lung.
{ "pile_set_name": "PubMed Abstracts" }
Yam Ah Mee Yam Ah Mee (, born 2 July 1957) is a former Singaporean civil servant and Chief Executive Director of the People's Association. He shot to fame after Singaporeans took to his monotone voice and expressionless demeanour as the Returning Officer for the General Elections in 2011. Biography Yam studied at Hwa Chong Junior College and graduated from the University of New South Wales with a First Class Honours in Engineering and the Royal Military College, Duntroon in Australia, with The Queens Medal in 1980, on a Singapore Armed Forces scholarship. He also has a Masters in Business Administration degree from the National University of Singapore and a Masters in Public Administration degree from Harvard University. Yam served in the Republic of Singapore Air Force, writing an article in the Military Journal POINTER, rising to be the chief of staff of the air staff and commanding the ground-based, air-defence systems, including the new Igla short range surface to air missiles, before retiring as a Brigadier-General and entering the Civil Service. He joined the Public Service Division in August 1998 and was appointed the Deputy Secretary (Development) and the CEO & Dean of the Civil Service College. He was then posted to the Ministry of Transport as Deputy Secretary (Sea & Air) on 1 June 2004 and was appointed chief executive of Land Transport Authority on 11 May 2005. He was also President of the Singapore Youth Flying Club for 8 years from 1998 to 2006. Yam was honoured in 2008 with the Public Administration (Gold) Medal, a top National Day Award. On 1 May 2010, Yam was appointed CED-designate of the People's Association and on 1 June 2010 fully assumed the Chief Executive Director (CED) mantle, taking over from the retiring Tan Boon Huat. His appointment as Returning Officer also took effect on 1 June 2010. Elections Singaporean general election, 2011 Yam shot to fame during the election results release night/morning, as the Returning Officer (having replaced Tan Boon Huat, who retired). He was noted for his monotoned "nasal" voice and expressionless demeanour while reading out the 26 batches of results. Fan pages were soon created on Facebook while the results release was still ongoing. Netizens have also released music videos with clips and remixes of his voice on YouTube. A video of Yam doing the chicken dance with youths from Geylang Serai Community Club also went viral, before it was quickly taken down. Yam has since explained that his "robotic" and "nasal" voice is due to an operation he had to remove a fishbone in his larynx, although he has also said, explaining his impassive delivery to The Straits Times, that he "felt it was important to announce (the election results) clearly, concisely and impartially." Singaporean presidential election, 2011 Yam was appointed by Prime Minister Lee Hsien Loong as Returning Officer for the Singapore Presidential Election. Yam announced the results of the 4 nominated candidates for the Presidential Election on 4:24am (GMT +8). Hougang SMC by-election, 2012 Yam was named as the Returning Officer for the 2012 Hougang by-election. He delivered the nomination announcement at 12.35 pm on 16 May 2012. Punggol SMC by-election, 2013 This was Yam's last appearance as the Returning Officer. Post-elections After GE 2011 Yam's robotic voice announcing the results for Aljunied GRC had turned into a mix just within a few hours ensuing the elections. Many have taken clips of his voice and mixed it with various styles of music, from electro to dance, on popular video-sharing website YouTube. Within two days, Yam's Facebook account had reached the 5000 friends limit. Yam thus created an official page for himself ; although non-official pages had already appeared by then. After a week, he did a "spoof" video of himself, in which he announced PAssion Movie Night, held to celebrate a million PAssion Card memberships, in his trademark manner. Mr. Yam filmed a video in late May, to promote a K-pop dance event on 29 May 2011, to be held at Ngee Ann City. In less than 24 hours after the release of the presidential election results, a club mix of Yam announcing the results was released on YouTube, by the same user responsible for the earlier club mix of Yam's general elections "performance". Yam starred in a musical held to celebrate the opening of the first 12 stations of the Circle Line, on 2 October. People's Association As part of an effort to promote the PA and social cohesion, Yam made appearances at many youth and sporting events, particularly after his rise to fame in the elections. In January 2013, reports emerged that Yam had resigned from the PA and would leave the organisation by March, to be replaced by Health Promotion Board chief executive Ang Hak Seng. In an interview with RazorTV, he announced plans to pursue a career in the private sector after 36 years in the civil service. He held a farewell party on 28 March 2013 and ended his tenure at the PA on 31 March 2013. Sembcorp Yam joined Sembcorp Design and Construction as its managing director on 16 April 2013. References External links People's Association Directory OurCommunity.sg PAssion Card Category:1957 births Category:Living people Category:Singaporean people of Chinese descent Category:Singaporean civil servants Category:Hwa Chong Junior College alumni Category:John F. Kennedy School of Government alumni Category:National University of Singapore alumni Category:University of New South Wales alumni Category:Royal Military College, Duntroon graduates
{ "pile_set_name": "Wikipedia (en)" }
Search This Blog Loading... Wednesday, March 12, 2014 Online Solitaire Forever Card Game The first thing you do when you start using a computer is playing the most popular and classic card game. We suggest that you should play Solitaire online - one of the classic original card games ever made. The game has probably become one of the most popular games since its inclusion in Windows 95, but that was in '95… Now you can play Solitaire online. We wish you good luck! Play Solitaire online right now. If you liked it please do help us grow by sharing it with your friends Get 'Fun With Puzzles' updates via email... Enter your email address Please look out for the confirmation email that you’ll get shortly. If you don’t get it, check your junk mail folder as occasionally they do get filtered.
{ "pile_set_name": "Pile-CC" }
David So casual. So nonchalant. You’d think we were only acquaintances, that we’d once sipped a couple of beers together instead of tattooing love on our skin and reciting marriage vows. I read the e-mail again and analyze the shit out of it. How can I not? I count out the words: thirteen. The punctuation: four. His name, my name. A flippant, casual turn of phrase: catch up. In the end, there’s only so much psychoanalyzing you can do to a thirteen-word e-mail. I move on with my life, feeling rather pathetic. But not before I e-mail him back. And okay, sure, I don’t move on with my life. What does that even entail? Forgetting? Forgiving? Being happy? Besides, I know what he wants to talk about. I know why he’s coming. Hi David, Yeah, sounds good. Let me know when and where. Yara My e-mail is a word shorter. I’m that petty. Tarryn was born and raised in Johannesburg, South Africa. She immigrated to America with her parents when she was thirteen, and spent the next eighteen years in South Florida where she earned her degree in Psychology, wrote her first novel, and had two children. In 2012, on a whim, she moved her family to Seattle, Washington where she currently makes her home safely away from the sun. Tarryn is the founder of Guise of the Villain, a fashion blog, and has written eleven published novels. MY REVIEW Conflicted about this one Every time I don't love a Tarryn Fisher book I feel guilty, I must say. At first I thought of not leaving a review, but this is what I do for a hobby, I blog, and therefore I can't not be honest about it. I'm a PLN and that's why I feel guilty. I love Tarryn and her books, she's one of my favorite authors ever and will always continue to read her books with the same enthusiasm. I'll always get excited when we're announced a new TF is coming out, I'm sure of that. Now to the point: I liked this book as the personal journey of inner growth that Tarryn did herself, I actually love it in that sense. But I didn't love it as literature itself. I believe I like Tarryn's writing more when she's writing darker stories. Mud Vein and Marrow are still on the top for me. I love the writing style of those ones. Mud Vein is, for me, the better written, most poetical book of hers. And Marrow has a pace so accurately written I could cry. Just perfect. I can't say the same about AWNAP. It came out as a bit informal and not during the times that it needed to be informal given the characters points of view, but during the rest of the narration and I usually enjoy a poetical language a bit more. There were, either how, some passages and phrases that I completely love! I secondly couldn't connect with so many inner monologues going on. I believe more in show rather than tell and I know that she does as well, so this confused me as well. Regarding the characters, I have to say that I had a hard time connecting with them, I believe I did it almost at the end, but it was too late for me to fall head over heels for them. It's not that I didn't like their flaws (they were really flawed characters and I was totally okay with that, we're humans, right? Keep it real), but I just couldn't personally connect enough to fall in love with them. I did felt sad about them many times, but as they wrote their paths, not so much. However, I did love and fangirled about the ending and the previous parts that lead to that. I think that part three was my favourite from the book. I believe Yara getting a grip of her life was a breath of fresh air. Let's say I was kind of mad at her during the other parts of the book because, just as her friend said to her, I always believed she was putting excuses not to take responsibility for her existence and grew the ovaries to go after what she wanted. So I did enjoy her development. I liked David sometimes, didn't agree with him some others. I disliked Petra at first, until I started disliking David instead. I maybe liked Ferdinand more than the others even when we didn't get to know a lot about him. Regarding the plot I do remember we were told it was going to be TO styled, and I liked it even though I couldn't quite connect with the characters for a long part of the book. Either how the third part of it made the book worthy for me. Finally, though I'm on the minority with this book, I have to say that I do know why everyone loves this, many people needed a story like this as a wake up call and I'm glad they're feeling healed by it. The amazing thing about Tarryn is what she causes with her writing and though she didn't do it for me this time she did it for lots. So I did like the background of the story and the message it left. I'll leave you here with my favourite quotes now: ° I'm in love with cities, all of them. Each one had their own thing going on, a unique spice they add to the world, but they all had one thing in common: energy. ° Beauty was deceiving in the same way credit cards were. ° Relentless. There's something about a relentless man. You couldn't ignore them. If they asked long enough, eventually they wore you down. Women looked for that, persistent interest. An investor. We were, in ourselves, an entire universe. ° That was the thing about artists, they didn't often think of you. Their energy had a narrow focus, a spotlight on their art... their insecurities... the unfairness of the world. ° How often do we lie to ourselves and say we don't care about something when we do? ° There's no moving on when you're truly in love. You try and you keep trying, but that love is a stain in your life. It's just not that easy. ° It's the simple things that tell the most about our complexities. ° Someone should take you as you are, not have and agenda for how they want to change you. ° David was hesitant to talk about himself, he preferred to listen. To me, that was the mark of a true artist -someone who gathered instead of took. ° Men had a thing for female vulnerability. They wanted to be their hero. ° You can't just threaten kids with their futures when they don't understand the gravity of time. ° The spectrums of pain were meant to be felt and they were beautiful in their own way because they caused change. ° When you set out to find someone, you don't stop until you do. And then you have to deal with what you find. ° Love was a leap of faith, and love was just a word until someone gave it definition. ° It's not true what they say, that you can only give your heart away once. That's the philosophy of the young. The old know better, they know it's not your heart that you give away, but the mind. The mind is a powerful thing. It controls the heart but most people don't know that. ° It's okay to be you Yara, she says. The people who love you will work with your shortcomings, not against them. ° - Tell me, David Lisey, what's the meaning of love?- It's when you can't get someone out. They crawl inside you and they just live there for the rest of your life. ° When you're unhealthy, healthy things are frightening. ° You don't forgive because they deserve it. Most of the time they don't. You forgive to keep your heart soft. To move forward without bitterness. Forgiveness is for you. ° Even to your old age and grey hairs I am he, I am he who will sustain you. I have loved you and I will carry you; I will sustain you and I will rescue you. I would definitely recommend this book to someone who's in need of a soul lifting story about love. If you're in a place were you're afraid of love, or holding old resentments, then this is for you. As I've said before, I can't wait for Tarryn's next work no matter what, her words are my spirit animal. Lately I've been reading more and more that writers, actors, singers, and any celebrity shouldn't have an opinion over anything that's not what they do for a living and if they do they're being harassed over social media and told that they should shut their mouths and mind their own business (write/act/sing/etc). This, beyond being rude, seems terribly ridiculous to me. Why's that? Well, as a start, we're all citizens with rights and that some of those citizens are famous for their jobs doesn't end their right to freely express their opinions and act towards their ideals or beliefs. We all have that right, it's called freedom of expression and it's been a while since it was entitled to everyone and not just a few. We don't get to decide who can speak and what they can speak about. If what they're saying, for whatever reason, makes you uncomfortable, just skip it, maybe read something else in that moment and come back to them whenever they say something that may interest you. You don't have to agree a hundred percent with someone to like them, you wouldn't have a family or friends if not, but you also can't shut them. It's disrespectful. Imagine that someone comes and says 'Hey, you're housewife/chef/teacher/seller, just do your job and don't talk about anything else because I say so'. Well, people would start to have very little conversation with their neighbours, coworkers and even friends. Groups would be formed depending on what you work and you would ONLY talk about that. Imagine, if you already don't like to go to work EVERYDAY, how it'd be to have to JUST have to speak about it 24/7 for the rest of your life. It doesn't sound very enticing, huh? So be it, we're all people with the same rights and bla bla bla, I think you got me, but let's go beyond that. Let's ask ourselves, if those who have a voice that can be heard over the noise don't speak up, if those who can help the ones whose voices aren't being heard don't do it, if those who are in the place to shake things up don't shake them, then who? Then why? Why have a voice if you won't use it? Why have the power to give it to someone else? Why can you help but you don't? Everyone is entitled to choose their battles and if you don't like the battles they choose, just let them anyhow. If you're so sure that what they're saying is wrong then you should also be sure that they will go unheard. But if you, only for a second, tremble upon it and think they must be silenced, then maybe there's something in you that may be fearing they're right about whatever they're deciding to speak about... Anything you can do It’s been a decade since I’ve seen him, but our years on opposite coasts were less of a lasting peace and more of a temporary cease-fire. Now that we’re both back in our small town, I know Lucas expects the same old war, but I’ve changed since high school—and from the looks of it, so has he. The arrogant boy who was my teenage rival is now a chiseled doctor armed with intimidating good looks. He is Lucas Thatcher 2.0, the new and improved version I’ll be competing with in the workplace instead of the schoolyard. I’m not worried; I’m a doctor now too, board-certified and sexy in a white coat. It almost feels like winning will be too easy—until Lucas unveils a tactic neither of us has ever used before: sexual warfare. The day he pushes me up against the wall and presses his lips to mine, I can’t help but wonder if he’s filling me with passion or poison. Every fleeting touch is perfect torture. With every stolen kiss, my walls crumble a little more. After all this time, Lucas knows exactly how to strip me of my defenses, but I’m in no hurry to surrender. Knowing thy enemy has never felt so good. I am a lover of books, chocolate, reality TV, black labs, and cold weather. Seriously, if I had it my way I would be curled up on the couch with all of those things… everyday. I live in Texas where I spend my free time writing and reading. My favorite authors are Mindy Kaling & Jonathan Safran Foer. I’m a comedy geek and love all things “funny”. Women like Tina Fey, Amy Poehler, and Mindy Kaling are definitely the biggest inspirations for my writing, though I think my work tends to skew a bit smuttier than theirs. REVIEW R.S Grey's words were, once again, addictive I'm a sucker for Grey's stories, they instantly draw me in and this was no different. It was fun, well written and the pace of the story is fast. I read this in a day and didn't want to put it down. "Friction implies contact. What we have is magnetic repulsion." Daisy, though she may seem childish, is a sassy, a bit crazy, and hilarious woman. She reminds me of R.S. Grey's previous heroine, Georgie, who is my favourite from hers. I did enjoy her thinking and she got me laughing plenty times. This book speaks about subjects that matter, it's a story about self acceptance and self love. It is about overcoming your past and taking the leap for your future.Jessica is a young woman who is diagnosed as obese and with diabetic conditions. With ghosts from her past hunting her, she always seeked comfort in food. When she finally decides to start making choices to improve her life, and she moves to Santa Barbara, she meets Mikey, a hot veterinarian who sees her, really sees her, and won't stop until he gets the answer he wants from her. But Mikey also has a past to hide. Will they be able to heal?The premise of the story was hooking, the characters were interesting, but unfortunately, and I feel really bad about it, I couldn't quite connect with it as pretty much everyone else did. I particulary am more fond of action than inner monologue and I think that's what maybe didn't do it for me. I like being showed what happens more than I like being told, I connect more that way.Anyhow I still love Leslie's stories and I was really happy to see her other couples make an appearance in this book! It was fun to read.I will continue to read her stories and follow her advice to take the leap!*I voluntarily reviewed an Advance's Readers Copy of this book* This book is the third and final (?) installment of the Hidden Scars series and CAN'T BE READ AS AN STANDALONE unless you want to spoil yourself the plot of the previous books as happened to me. I'm having trouble to write this review because I thought I'd love this story but I didn't. The premise was good but the development didn't live up to it, at least not for me. BLURB Fate. I’ve been running from it most of my life – doing everything I can to avoid the future it had dictated for me. If I had learned one thing from the hell I went through as a child, it was that I never wanted to go back. Until I ran into someone who was running from her destiny just as hard as I was. And it just so happens that she’s one of my best friends. One night, emboldened by alcohol, she does something that has me questioning everything and it doesn’t take me long to realize that maybe instead of running away from something, I’ve been racing to her all along. But there is fear in her eyes and I know that her fate won’t be so easily shaken. Will I ever be able to work past her fear to show her everything we could be? Or am I destined for the same kind of desolate life I’ve been fleeing from since I was a kid? I enjoyed the first 40% or so of the story, I like the building of the romance between Addy and Trey though I really couldn't stand the heroine. There was way too much inner dialogue from her telling that she was sad because she wanted something really hard that she could never have. The first three times was okay, but when it kept being mentioned through the whole story it got to be annoying. You can mention it once or twice at most, the reader will understand. I really found myself reading some paragraphs as fast as I could to *kind of* skip those repetitive statements. Regarding the characters, Addy is really hard to empathise with, she's always complaining about her 'fate' without actually learning if her fears are sustained or not, and she pushes everyone she loves away for an illogical reason. Trey himself was much more enjoyable the first half of the book, but then started acting as an ass*ole, and even when it was understandable that he didn't know what to do with Addy because she wouldn't open to him, I didn't like at all that he kept justifying his behaviour by saying "You make me crazy, Addy". I mean, it sounds pretty messed up that you can't control yourself and blame the woman for 'making you crazy'. I'm sure he meant it in a 'romantic' way, but it ended up being disturbing.The secondary characters were more lovable than the heroes, for sure. Addy's friends were funny and loyal. And Trey's family is the sweetest and they're really supportive. I also fell in love with Addy's parents' story, I'd enjoy reading something from them. In conclusion, this story was sweet for some moments, but the protagonists wasted so much time that we barely got to see their bright side together. I did enjoyed the beginning and the ending, but I rushed through the middle, not fancing it so much.
{ "pile_set_name": "Pile-CC" }
Q: Which File Is Missing? "i686-apple-darwin11-llvm-g++-4.2: No such file or directory" I'm getting the following error from my compiler: g++ -c -m32 tracecone.cpp -I/usr/X11R6/include -I/usr/X11/include/GL -I/Users/owner/Documents/raytrace/Graphics -I../RayTrace -I/Users/owner/Documents/raytrace/Graphics -I/Users/owner/Documents/raytrace/VrMath -I/Users/owner/Documents/raytrace/OpenglRender -I/Users/owner/Documents/raytrace/RaytraceMgr g++ -o -m32 tracecone ../RayTrace/RayTraceData.o tracecone.o /Users/owner/Documents/raytrace/OpenglRender/GlutRenderer.o /Users/owner/Documents/raytrace/RaytraceMgr/SceneDescription.o -L/usr/X11/lib -L/usr/X11R6/lib -L/Users/owner/Documents/raytrace/Graphics -L/Users/owner/Documents/raytrace/VrMath -lglut -lGLU -lGL -lX11 -lXext -lXmu -lXext -lXmu -lXt -lXi -lSM -lICE -lraygraph -lvrmath i686-apple-darwin11-llvm-g++-4.2: tracecone: No such file or directory make: *** [tracecone] Error 1 However, I am not sure which file it's saying is not there. Does it mean tracecone? or one of the library files? Either way, it looks like everything is right where it should be. What could cause this error? Here is my make file: PROG = tracecone RBASE= /Users/owner/Documents/raytrace GDIR=$(RBASE)/Graphics MDIR=$(RBASE)/VrMath ODIR=$(RBASE)/OpenglRender MANDIR=$(RBASE)/RaytraceMgr CFLAGS = -w -s -O2 -ansi -DSHM XLIBS = -lX11 -lXext -lXmu -lXext -lXmu -lXt -lXi -lSM -lICE LIBS = -lglut -lGLU -lGL RAYLIBS = -lraygraph -lvrmath INCLS = -I/usr/X11R6/include -I/usr/X11/include/GL INCL1 = -I$(GDIR) -I../RayTrace -I$(GDIR) -I$(MDIR) -I$(ODIR) -I$(MANDIR) LIBDIR = -L/usr/X11/lib -L/usr/X11R6/lib -L$(GDIR) -L$(MDIR) #source codes SRCS = $(PROG).cpp #substitute .cpp by .o to obtain object filenames OBJS = $(SRCS:.cpp=.o) #in ../Graphics OBJOD = $(ODIR)/GlutRenderer.o OBJO = GlutRenderer.o OBJMAND = $(MANDIR)/SceneDescription.o OBJMAN = SceneDescription.o OBJ_temp = ../RayTrace/RayTraceData.o #$< evaluates to the target's dependencies, #$@ evaluates to the target $(PROG): $(OBJS) g++ -o -m32 $@ $(OBJ_temp) $(OBJS) $(OBJOD) $(OBJMAND) $(LIBDIR) $(LIBS) $(XLIBS) $(RAYLIBS) $(OBJS): g++ -c -m32 $*.cpp $(INCLS) $(INCL1) $(OBJ1): cd $(GDIR); g++ -m32 -c $*.cpp $(INCLS) $(OBJM): cd $(MDIR); g++ -m32 -c $*.cpp $(INCLS) $(OBJO): cd $(ODIR); g++ -m32 -c $*.cpp $(INCLS) $(OBJMAN): cd $(MANDIR); g++ -m32 -c $*.cpp $(INCLS) clean: rm $(OBJS) clean1: rm $(OBJD1) Thanks in advance. A: You should place your target right after -o flag: g++ -o $@ -m32 ... Flag -o means output and in case of g++ -o tracecone ... you'll specify tracecone as output, but in case g++ -o -m32 tracecone ... you are specifying -m32 as output and tracecone as one of the object files. And g++ says that there is no such object file because there is actually no such file.
{ "pile_set_name": "StackExchange" }
Listing of historic ships in Sweden The Maritime Museum in Stockholm is responsible for the listing of historic ships in Sweden (). The purpose of the listing is to encourage and support owners of historic ships and boats to preserve and take care of their vessels. The listing does not confer any legal protection on the vessels or obligations on their owners but entitles them to some privileges. Ships and pleasure boats Historic ships and boats can be listed in either of two categories: Listed historical ships or Listed historical pleasure boats. The purpose of listing vessels is similar in both cases; it is done in order to "make them better recognized, preserved and used". In addition, the listing aims to encourage conscious private cultural heritage ownership and management. Owners of listed ships are entitled to display a plaque that confirms the ship's listed status on board, and pleasure boats are equipped with a similar enamel sign. While the listing does not confer any legal protection on the ships – in contrast to listed buildings – the Maritime Museum notes that listed ships and boats under some circumstances enjoy reduced harbour fees and listed pleasure boats sometimes enjoy various benefits by harbours, canals, dockyards and boat clubs. For example, a news item from 2013 notes that at on Djurgården in central Stockholm, listed boats and ships may berth for a short period of time free of charge if they agree to let visitors come aboard. Listed pleasure boats are also e.g. exempted from a national ban on letting out toilet waste into the surrounding water. The museum is also responsible for providing financial aid to the restoration of culturally significant private ships and boats, and while there is no direct connection between owning a listed vessel and receiving aid, the Maritime Museum has concluded that many owners of listed ships have voiced the opinion that an important way to facilitate the management of listed ships is to increase this financial support. Some owners of listed pleasure boats have voiced that the listing has attracted attention to them and their boats from other boat owners, boat clubs, and in maritime festivals and competitions, as well as from local papers and radio channels. Commercial and utility ships have been listed since 2001, and pleasure boats since 2009. Sweden was the first country in Europe to list pleasure boats. The museum made an evaluation of its listing of ships in 2014, and of the listing of pleasure boats in 2017. Listing of ships For a ship to be eligible for inclusion on the historic ship list, it must meet the following criteria: It has to be at least long and wide. It has to be at least 50 years old or of such an age and character that it can be deemed significant from a cultural perspective. It was built or constructed in Sweden, or was registered in Sweden for a prolonged period or else deemed to be of very high value for the promotion of knowledge about the maritime history of Sweden. Commercial and utility vessels smaller than 12 by 4 metres can be eligible if there are special reasons. The owner of the ship submits an application to the museum containing, among other things, an account of the ship's history and its present state of preservation. The museum then makes an assessment based on seven criteria, taken from the handbook of assessing listed buildings issued by the Swedish National Heritage Board and adopted to maritime conditions. Listed ships are graded by the museum between I and III, where I represents the highest grade of cultural value. Listing of pleasure boats The following criteria must to be fulfilled for a boat to be eligible for listing by the museum: The boat was originally built as a pleasure craft. The boat was built in Sweden; or designed by a Swedish boat constructor; or is of a model which has been popular in Sweden; or in some other way considered important to preserve from a cultural perspective. It was built before 1965; boats constructed later may be considered for listing if they are large and have extraordinary cultural significance. The boat's history must be well-documented. It must be in a good and seaworthy condition. Repairs and alterations must have been made in a considerate way. The boat must not be a copy or reproduction of another vessel. Only individual boats are considered eligible, not entire series or models of boats. The owner of the boat may apply twice a year to have the boat listed. If a boat is listed and at a later point sold, the museum asks the owner to provide contact details to the new owner of the pleasure craft in order to be able to maintain knowledge about the fate of these boats. Traditional-ship classification The Maritime Museum also conducts Traditional-ship classification (T-classing) of ships of historic value. The classification is aimed at guaranteeing the seaworthiness of the ship while maintaining its historic value and allows older ships to obtain certificates needed in order to sail in international waters. Notes References External links Complete list of listed Swedish ships (in Swedish) Complete list of listed Swedish pleasure boats (in Swedish) Category:Cultural heritage of Sweden Category:Maritime history Category:Conservation in Sweden Category:Heritage registers in Sweden Category:Tourist attractions in Sweden Historic
{ "pile_set_name": "Wikipedia (en)" }
1H, 13C, and 15N NMR spectra of some pyridazine derivatives. (1)H, (13)C, and (15)N NMR chemical shifts for pyridazines 4-22 were measured using 1D and 2D NMR spectroscopic methods including (1)H-(1)H gDQCOSY, (1)H-(13)C gHMQC, (1)H-(13)C gHMBC, and (1)H-(15)N CIGAR-HMBC experiments.
{ "pile_set_name": "PubMed Abstracts" }
Send this page to someone via email The City of Toronto has cancelled events through June 30 amid the coronavirus pandemic, including the annual Pride Parade. Toronto Mayor John Tory made the announcement during an update on the city’s response to COVID-19 Tuesday afternoon. “Due to the COVID-19 pandemic, the City of Toronto is cancelling all city-led major events, festivals, conferences, and cultural programs and is also cancelling all city permits for major events organized by external groups,” Tory said. 1:27 Coronavirus outbreak: Toronto cancels all public events through June 30 Coronavirus outbreak: Toronto cancels all public events through June 30 Story continues below advertisement “This is not an easy decision to make, but it is necessary to protect the public and to save lives … While we treasure many of these events and the important contribution they make to life in our city, protecting the health and safety of Toronto residents has to be our primary concern right now.” Tory said Pride month in June will still be celebrated, but the annual Pride Parade has been cancelled. 1:57 Toronto Pride parade cancelled over concerns of COVID-19 Toronto Pride parade cancelled over concerns of COVID-19 “Many of these events of course involve thousands of people, sometimes hundreds of thousands of people, and it is doubtful that the health environment will be where it needs to be on the originally-scheduled spring dates if these events are to happen in a healthy, safe, and stress-free way,” Tory said. [ Sign up for our Health IQ newsletter for the latest coronavirus updates ] Pride Toronto responded to news of the City’s policy in a statement Tuesday. Story continues below advertisement “Pride Toronto will no longer host the Festival Weekend on June 26-28th 2020,” the statement read. “Our team is working hard to deliver Pride celebrations in new, creative, and unique ways that ensure safety and physical distancing … Any future programming will be in alignment with the recommendations of the public health authorities and the communities we serve.” Toronto Public Health said as of 1 p.m. Tuesday, there were 793 cases of COVID-19 in Toronto, with 628 confirmed cases and 165 probable cases. LISTEN: Sixty-five people are in hospital, with 33 in intensive care. Eight deaths have been reported in the city and 43 people are considered recovered. Story continues below advertisement Health officials attribute 25 per cent of the cases to community spread. “We will only be able to get through this and reopen city buildings, businesses, playgrounds, restart our economy, get our festivals back and celebrate life in our city again by stopping the spread of COVID-19,” Tory said. 1:32 Coronavirus outbreak: Toronto nears 800 COVID-19 cases Coronavirus outbreak: Toronto nears 800 COVID-19 cases Meanwhile, Dr. Eileen de Villa said she was concerned with the number of people in the city who are not following physical distancing advice. “I have been stating repeatedly the importance of physical distancing and I am truly disappointed that there continue to be people in our community who are simply not listening,” de Villa said. “The only way we can reduce the spread of the virus is by staying home and away from other people … Story continues below advertisement “I am in active discussions with all of our partners about the potential for other increased measures and I will soon share what that means and what that looks like.” Tweet This Since March 24, officials have received 597 complaints related to the use of park amenities. Officials said education is their “first line of enforcement.” Still, nine $750 tickets have been issued by police. Due to the COVID-19 pandemic, and in response to the provincial emergency order to prohibit organized public events and gatherings of more than five people, the City of Toronto has cancelled all mass events and permits through to June 30. News release: https://t.co/yYjLq2yS0x pic.twitter.com/1tlOse6NEa — City of Toronto (@cityoftoronto) March 31, 2020
{ "pile_set_name": "OpenWebText2" }
The Game Skanker - Welcome - Over 35,000 games indexed covering every console imaginable and all for FREE! NES Nintendo Entertainment SystemSuper Mario Brothers Walkthroughs and GuidesOutside link to all the information you'll need on this game, and more!Courtesy of: Gamefaqs.com TOP SECRET AREA Go to to the Ghost castle in the Donut World with a cape. When you enter right above you is a space in the ceiling. Fly up to the space and you'll be in the attack of the ghost castle. Run as fast as you can to the right of hte screen. You'll fall down into this areas with 4 yellow boxes, each one holds a fre life mushroom. Caution: There are still lost of ghost flying around you while you're there. If you're going to get the free lives, be fast) Then go through the door you'll be out of the ghost castle and you end the level. Now you have beaten the ghost castle and a road should lead to the north from the ghost castle to a level. Enter the level, there should be two mushrooms/ or flowers, a yoshi/ or free life mushroom, and two capes. GAME CONTINUEHold A at the game over screen. While keeping that button held, press Start when the title screen appears. Or try. On the Title Screen, hold A and press: Start, Start. WARP TO WORLDS 2, 3 AND 4 In Level 1-2, near the end there are lifts going up. Go on one of them and jump above the exiting pipe. Keep walking and you'll go into the WARP ZONE. WARP TO WORLD 5 In 4-2 at some stage go on top and walk along to the end of the level. Go past the exiting pipe and you will go into another WARP ZONE. WARP TO WORLDS 6, 7, and 8 In 4-2, a little way from the start you will see three evil mushrooms. Keep going a bit further. After that there will be a gap. Jump it then jump up to reveal invisible blocks. Inside an ordinary block, there will beanstalk. Climb the Beanstalk and go to the end of the level. Again you will be in a WARP ZONE. NOTE: The world 6, 7 and 8 warp is easier to get when you're small.
{ "pile_set_name": "Pile-CC" }
; RUN: opt < %s -instcombine -S | FileCheck %s ; <rdar://problem/10803154> ; There should be no transformation. ; CHECK: %a = trunc i32 %x to i8 ; CHECK: %b = icmp ne i8 %a, 0 ; CHECK: %c = and i32 %x, 16711680 ; CHECK: %d = icmp ne i32 %c, 0 ; CHECK: %e = and i1 %b, %d ; CHECK: ret i1 %e define i1 @f1(i32 %x) { %a = trunc i32 %x to i8 %b = icmp ne i8 %a, 0 %c = and i32 %x, 16711680 %d = icmp ne i32 %c, 0 %e = and i1 %b, %d ret i1 %e }
{ "pile_set_name": "Github" }
Our Mission: Do what we say we will do, consistent with the needs of the customer. Operating under our 200,000 square foot facility, our team of highly-trained chemists and quality production personnel utilize technologically advanced manufacturing systems to produce quality rubber products that are unmatched in the industry. With a nationwide network of distributors and more than 50,000 square feet of ready-to-ship inventory, BRP continues to be on the leading edge of the industry. We are committed to being your best vendor. That means we will continue to add services, equipment and internal systems to make working with us efficient and reliable, providing you with the highest quality products in the industry. For more than a century, people have trusted the products we manufacture. Our customers take pride in knowing that our products are built with integrity and unparalleled craftsmanship and our products are considered to be the workhorses of the industry. While all now carry the BRP label, you may be assured that each is manufactured to the same high standards of quality, consistency and reliability you’ve trusted for generations. Pride – Excellence – Integrity By providing superior quality with superior speed, our intent is to be recognized by our customers, suppliers, and peers as the best value added supplier of rubber products in the industry and to achieve a leadership position for profitability and growth. Contact us to learn more about our high-quality, American-made rubber products.
{ "pile_set_name": "Pile-CC" }
Q: javascript, changing page content I'm trying to do an example in which I use javascript to change a page content. Suppose I have a page as : <html> <head> </head> <body> <select id="a96780" multiple="multiple" name="a96780" size="3" value="deneme"> <option selected="selected" value="#ANY">ALL</option> <option value="1111294">Ex1</option> <option value="1111292">Ex2</option> <option value="1111290">Ex3</option> </select> </body> </html> I would like to be able to close all the options, Ex1, Ex2, Ex3 (set their type's to hidden or by other means) when the page loads. In order to achieve this I followed the instructions online however failed to do so by doing: <script type="text/javascript"> function myFunction() { var selectBox = document.getElementById("a96780"); alert("smt"); alert(selectBox.name); } myFunction(); </script> In the script above, I'm trying to print out the name of the element to confirm that I actually have a hold of it. Last line however is never printed. How can I comfirm that I have a initialized the element as selectBox and how should I proceed from there. Would the option values be enough to refer to the items: "Ex1, Ex2 and Ex3" ? edit 1 : I have absolutely no link to the html, I can not modify the body tag nor can put any buttons that can start myFunction thereby whatever I do, I must do it by js only. Besides this it would also be wonderful if you can lead me regarding how I should proceed. For instance can I refer to the option items from their values ? A: My solution was : <html> <head> <script type="text/javascript"> function initialTypeCorrection() { var selectBox = document.getElementById("a96780"); if(selectBox != null) { var options = selectBox.getElementsByTagName("option"); for (var i = 0; i < options.length; i ++) { // Alternative 1 if(options[i].value=="1111294" || options[i].value=="1111292" || options[i].value=="1111290") { options[i].disabled = "true"; options[i].text = ""; } } } } window.onload = initialTypeCorrection; </script> </head> <body> <select id="a96780" multiple="multiple" name="a96780" size="4"> <option selected="selected" value="#ANY">all</option> <option value="1111294">a1</option> <option value="1111292">a2</option> <option value="1111290">a3</option> </select> </body> </html>
{ "pile_set_name": "StackExchange" }
Tuesday, August 4, 2015 First Glimpse, the Other Side Hannarah grasped the cup in her hand, the warmth of the tea spreading slowly up her arm. This was a comfortable tent, as far as those go, well lit and spacious. There were even enough blankets and pillows that one could forget that there was no bed, no mattress, no civilization out beyond these fabric walls. Hannarah closed her eyes, letting her awareness drift over the feel of the chair under her, against her back, to the cup cradled between her hands. She slowly lifted the warm ceramic cup to her lips, though did not drink, not yet. The breath she exhaled mingled with the steam rising from the liquid surface and flowed back over her face. Inhaling, the mint and ginger aromas tickled her nostrils. She felt a tingling wave of comfort spread down her neck and back. She pressed her lips gently to the rim of the cup, feeling its warmth, and then sipped the tea into her mouth, slurping a little, so as to spray the tea all over her tongue, so she could feel the flavors make sense of themselves. Her focus, her mindfulness, was a difficult thing to maintain, as there were unfamiliar sounds beyond the tent walls, beckoning her to lose her grasp on the moment, to let fear overtake her. The way the citrusy, peppery flavor of the ginger mingled with the cool, sweet flavor of the mint inspired her to take a deep breath. She felt the minty vapors mingle with the humid jungle air, and opened her eyes. She looked around the tent again, trying to remind herself that she was just as safe here, in undiscovered country, among savage aborigines, with the small contingent of soldiers she was here to take care of to protect her, as she would have been in her own bed back at the Capital Temple. “Maiden, Mother, Crone,” she whispered, taking special note of the feel of the ground beneath her feet, “please, help me to be a pillar of strength for these men, and a good companion, and an able healer, should the time come that such skills are needed. Help me to remember that no matter where I go, you are already there, and you are not only the Allmother, but my Mother. Remind me of your love and your protective spirit. Maiden, Mother, Crone, so mote it be.” She sighed, the prayer giving her some strength. She stood from her chair, and took her linens from the hook, wrapping them about herself in the prescribed way, covering her and revealing her at the same time, the tension of the long strip of fabric enough to keep it tight against her skin, wrapped and rewrapped to form the semblance of a halter, a corset, even a flowing loin skirt for the ends. The wrap was the traditional garb of her creed, and her body fit it well. She then wrapped the sandals to her feet, the leather straps tying up her shin. Finally, she took the robe from it’s hook, and slipped into it easily. She glanced in the polished silver mirror they hung from one of the tent poles, and applied what little makeup she had brought with her on this long journey. She wasn’t meant to be a regal and royal temple consort on this mission, but the consort to soldiers and sailors, and they were grateful enough for a listening ear, a capable healer, and the occasional shared bed. She was pleased enough with her appearance, and turned to leave the temple of her tent. Suddenly, the lieutenant stepped into the tent, his face sweaty, dirty, and tight with tension. Not fear, exactly, but the focus of a soldier. “Mother Hannarah, please, stay inside. Some of the men haven’t gotten back from their patrols, and we need to make sure everything is okay before you come out. Len will be right outside to guard you.” And with that, the officer was gone again. Now that Hannarah had a jolt of panic in her system, her senses were on fire, and she could hear the men outside mobilizing, anxiety in their voices and movements. As they prepared, she heard them speaking quietly to each other. Something in the woods seemed to be spooking them. She felt a bit nervous herself, and she went back to sit, facing the entrance to her tent. It seemed like a few of them began to make their way away from base camp, and in moments, Hannarah heard sounds of fighting. Angry shouts, gunshots, the clanging of metal on metal, the grunts and screams of men dying. They were not a large group, their resources would not hold out for long. If the threat was not stopped soon, then their would be no one left but her. The numbers of participants in the combat outside began to dwindle, and soon it sounded like their was only one man left, the lieutenant himself, fighting whatever it was outside. It didn’t sound like there was a mob out there, either, so whoever, whatever, it was killing her men was very dangerous. Hannarah wasn’t sure to be scared of the ferociousness of a small force, or eased that they weren’t being overrun. As the last stretch of hand-to-hand combat outside ensued, the sounds of imminent danger reminded her of another time in her life.
{ "pile_set_name": "Pile-CC" }
making my world greener, one day at a time Navigation Monthly Archives: September 2013 Post navigation I have a habit of doing things spur of the moment. Like this afternoon, for instance. I decided I wanted to go experience an olive oil and balsamic tasting first hand…so I did. Immediately upon thinking of it. This is how I roll. A few months ago, a new tasting shop opened in St. Catharines called Della Terra Tasting Bar. As soon as I saw that it was opening my taste buds started yelling at me to treat them. There was never enough time in the day when I did think of it until today. So as soon as it crossed my mind I grabbed my purse and jumped in my car. It was quickly decided that my daughter and her friend would come along for the new experience. I would have just as happily gone solo had they not been interested. Olive Oils & Balsamic We were lucky that the tasting bar was having a quiet moment and had the full service of a knowledgeable guide. She walked me through the types of olive oils and handed me samples as we talked, explaining the differences. She was a wonderful wealth of information. I never thought of sipping olive oils as something I would enjoy so thoroughly. There is such a huge leap from regular store-bought olive oil that is often blended or of inferior quality to imported, cold pressed pure olive oils from different countries. I had come into this knowledge a few years ago while in California and had sampled high quality oils and balsamics and have been searching for comparable quality in this area ever since. Today, I struck pure gold! Or should I say green? The rich, smooth texture of the oils was sublime. Each oil was vastly unique. I sampled mild, medium and robust olive oils and ended up purchasing a medium oil called Picual. Oh my. The robust oils hit my throat like I had just ingested liquid pepper. So not expected (even though she warned me)! It was fantastic. It was fun watching my daughter and her friend taste the oil. My daughter stuck her tongue in the sample cup then declared it wasn’t for her. They couldn’t get over the fact that I was sipping cup after cup of the stuff and watched with wide eyes. They quickly zipped over to the balsamics when given their leave. After the straight up olive oils I moved on to the flavored olive oils. So many to choose from…sinfully delicious varieties. Swoon. I decided on a blood orange infused olive oil that is out of this world. It is so divine I don’t want it to even touch other flavors but go straight to my palate unadulterated. But that would be greedy not to allow the flavor sensation to meld with other foods, wouldn’t it? It’s experiment time! Next, I sidled up to the balsamic tasting bar and got busy. My first sample knocked my socks off (well, if I was wearing socks it would have) – coconut white balsamic. After having the smoothness of olive oil sliding down my throat the sharpness of vinegar took me back slightly but the coconut flavor was strong and true. It would be a great summer fruit salad accompaniment. I only had eyes for the dark balsamics though. Sinful and luxurious they beckoned me to them. I had the intention of finding figs to have with a great aged balsamic this weekend but instead found a fig balsamic that took me by aback. It came home with me. No surprise there. I believe that we all need to indulge ourselves with experiences and things that make us feel alive. Today this is what I desired,so I treated myself. “The lesson adults can learn here is that the world is filled with things for our enjoyment.” – Allen Klein Post navigation Follow Blog via Email Hi, I’m LLBG! With this blog, I share my stories of triumphs as well as not-so-successful accounts of making my world a better place. Making our world friendlier and safer for everyone starts within our own home. Come along with me...maybe we can both learn a thing or two.
{ "pile_set_name": "Pile-CC" }
The time signature, also known as meter signature, of a piece of music defines how the beat is organized by prescribing how many beats occur per measure and what kind of note designates one beat. Each beat is counted sequentially. Repetition and contrast are the two most basic elements of musical form. These concepts evolved as a response to the human need for comfort in the familiar and then, becoming bored with the familiar, a change to something new. Music Fundamentals for Dance is a text for student dancers, choreographers, and dance educators written by an experienced educator and choreographer. This book presents foundational knowledge of the elements of music and describes their application to dance performance, choreography, and teaching. It includes a web resource offering exercises, activities, projects, downloadable examples of music, and web links that provide a range of active learning experiences. If you are a member of the HK Rewards Program, when buying a new print edition of this book, you will be granted the option for downloading the e-book edition at no additional charge. Learn more. Description Author Ancillaries Multimedia Product Description Music Fundamentals for Dance provides students with a fundamental understanding of music and how it applies to dance performance, composition, and teaching. This valuable reference helps professional choreographers, dance educators, and dancers expand their knowledge of music and understand the relationships between music and dance. Music Fundamentals for Dance helps dancers understand of the elements of music—form and structure, musical time, melody, texture, and score reading—and how they relate to dance performance and choreography. They will learn music vocabulary for easier communication with other dancers, musicians, and conductors. Overviews of musical forms, styles, and genres are complemented by an examination of their relation to dance and choreography. Each chapter ends with exercises, activities, and projects that offer students a range of active learning experiences to connect music fundamentals to their dance training. An accompanying web resource contains these features: Extended learning activities and support materials, including practice opportunities combining music skills with dance or choreography, chapter summaries, a glossary, websites, and handouts to help students practice music skills Music clips on the website offer ready-made examples, which students can use in applying concepts from the book Written by an experienced dance educator, dancer, and choreographer, Music Fundamentals for Dance is the only current text that explains essential concepts of music and examines these concepts in relation to dance performance, composition, and teaching. By providing readers with a foundation of music knowledge, Music Fundamentals for Dance assists both future and current professionals in understanding the art form that will enhance their contributions as performers, choreographers, and educators. Text for undergraduate and high school dance courses. Supplemental text for dance composition or dance methods courses. Reference for dancers, choreographers, and dance educators. Nola Nolen Holland, MFA, is an assistant professor in the department of dance at Slippery Rock University of Pennsylvania. For 10 years Nolen Holland taught courses in music for dance. Her search for a music text written specifically for dancers led her to create Music Fundamentals for Dance. An experienced dancer, dance educator, and choreographer, Nolen Holland danced with Pittsburgh Ballet Theatre and has initiated several composer collaborations in order to develop original music for her dance works. She is president of CORPS de Ballet International, Inc., a professional organization for ballet teachers in higher education. Recognition for Nolen Holland’s choreography includes presentation of her work at the 1992 American College Dance Festival National Gala; the 1994 5th Biennial International University Dance Festival at the Université Lumière in Lyon, France; and the 2007 International Dance Alliance Festival in Chennai, India.
{ "pile_set_name": "Pile-CC" }
Introduction {#Sec1} ============ Pre-diabetes (pre-DM), typically defined as blood glucose levels above normal but below diabetes thresholds, has been increasing globally and has a high chance of developing diabetes mellitus (DM)^[@CR1]^. It is estimated that there were 318 million adults suffering from impaired glucose tolerance in the world by 2015^[@CR2]^. As to the Chinese adult population, a cross-sectional survey in 2010 reported that the estimated prevalence of pre-DM was 50.1%^[@CR3]^. Previous studies^[@CR4]^ have shown that about 5--10% of pre-DM progressed to DM every year, and persistent hyperglycemia leads to the complications that are the major source of morbidity, mortality, and cost. Nowadays, There is a common conception that this natural history is not inevitable^[@CR5]^. Randomized controlled trials showed that lifestyle intervention or glucose-lowering medications could delay and even reverse the natural course of pre-DM^[@CR6]--[@CR8]^. The American Diabetes Association (ADA) recommends at least annual screening via testing fasting plasma glucose (FPG), 2-hr 75 g oral glucose tolerance test (OGTT), or hemoglobin A1c (HbA1c) in those with pre-DM^[@CR9]^. However, clinicians are far from satisfied with the presently used method of monitoring glycemic level because of its hysteresis. FPG, OGTT and HbA1c are used more as a diagnostic than a predictive marker. Interestingly, multiple cross-sectional and prospective cohort studies have revealed the metabolism of impaired branched-chain amino acid (BCAA), aromatic amino acid (AAA), free fatty acid (FFA), acylcarnitines and glycerophospholipid are associated with insulin resistance, and many metabolites were considered as biomarkers for the prediction of pre-DM and DM^[@CR10]--[@CR13]^. However, little is known about the potential metabolic biomarkers of different glycemic prognoses among subjects with pre-DM. More importantly, building a metabolic model for predicting the transition from pre-DM to NGR or DM would be helpful for the early prevention and treatment among individuals with pre-DM. Metabolomics provides a snapshot of the metabolic dynamics that reflects the response of living systems to pathophysiological stimuli and/or genetic modifications and surrounding environment. Furthermore, in many ways, tanscriptomic, genomic, and proteomic changes are upstream of the final physiology of cells, whereas the metabolic profile is likely closer in response to the disease process^[@CR14]^. Ultra-performance liquid chromatography-quadrupole time-of-flight mass spectrometry (UPLC-QTOF-MS) of biofluids can easily detect hundreds of individual species in a single clinical sample, reflecting the biochemical fingerprint of the organism^[@CR15]^. Characterized by sensitivity and high mass accuracy, the technique has been employed in identifying novel biomarkers for cancers^[@CR16],[@CR17]^, metabolic disorders^[@CR18]--[@CR20]^, drug toxicity and function^[@CR21],[@CR22]^, and so on. With the current study, we characterized the metabolic profiles of fasting plasma samples among the 108 pre-DM at baseline with different outcomes ten years later utilizing untargeted UPLC-QTOF-MS analysis. 23 and 22 metabolites were identified as biomarkers for transition to NGR and DM from pre-DM, respectively. And the underlying biochemical pathways leading to different prognoses were investigated. Results {#Sec2} ======= Demographic and Clinical Characteristics {#Sec3} ---------------------------------------- 108 participants with pre-DM from a longitudinal cohort study were followed up for ten years and were divided into 3 groups according to different glycemic outcomes. 20 participants progressed to DM, 20 regressed to NGR, and 68 remained at pre-DM, respectively. At baseline, there were no significant differences in ages, gender, body mass index, blood glucose, lipid profile, blood pressure as well as general health conditions among these 3 groups (Supplemental Table [S1](#MOESM1){ref-type="media"}). At the end-point of the study, no significant differences in the biochemical characteristics were found among the three groups, except for fasting glucose, 2-h glucose and HbA1c (Table [1](#Tab1){ref-type="table"}).Table 1Characteristics of the study participants at end-point.NGR (n = 20)Pre-DM (n = 68)DM (n = 20)Age, years57.4 ± 8.860.4 ± 8.957.9 ± 10.1Gender, N, male/female7/1325/437/13Body mass index, kg/m^2^24.0 ± 3.124.8 ± 2.926.1 ± 3.9Waist circumference, cm83.3 ± 7.587.1 ± 8.488.3 ± 11.9Waist-hip ratio0.88 ± 0.040.90 ± 0.060.92 ± 0.08Hypertension, %45.057.470.0Family history of DM, %35.033.845.0Current smoker, %5.022.115.0Current drinker, %15.013.20.0**Physical activity**Inactive, %5.011.810.0Medium, %70.073.575.0Active, %25.014.715.0SBP, mmHg132.5 ± 19.4138.9 ± 14.8138.7 ± 17.5DBP, mmHg77.4 ± 8.880.5 ± 9.580.4 ± 10.4Fasting glucose, mmol/L5.2 ± 0.2^\*^5.6 ± 0.58.0 ± 2.9^\*\*\#^2-h glucose, mmol/L6.0 ± 0.8^\*\*^7.6 ± 1.813.1 ± 4.7^\*\*\#^HbA1c, %5.3 ± 0.5^\*\*^5.8 ± 0.37.2 ± 1.4^\*\*\#^Fasting insulin, pmol/mL8.4 ± 3.79.2 ± 5.011.3 ± 3.8^\*a^2-h insulin, pmol/mL38.9 ± 23.571.2 ± 65.458.7 ± 36.8HDL, mmol/L1.4 ± 0.31.5 ± 0.41.5 ± 0.4LDL, mmol/L3.1 ± 0.73.0 ± 0.93.5 ± 1.1TC, mmol/L5.2 ± 1.25.5 ± 1.86.2 ± 1.3^b^TG, mmol/L1.4 ± 0.72.0 ± 2.62.8 ± 2.3^\*\#^BUA, umol/L311.9 ± 69.7338.7 ± 88.5321.3 ± 79.4CR, umol/L81.1 ± 18.672.8 ± 29.062.6 ± 25.7ALT, U/L20.8 ± 9.023.0 ± 16.833.1 ± 32.7AST, U/L24.5 ± 6.527.3 ± 17.828.1 ± 16.8γGT, U/L24.0 ± 21.431.8 ± 30.531.8 ± 17.2Values are mean ± SD or %. \*p \< 0.01, \*\*p \< 0.001 compared to pre-DM and ^\#^p \< 0.001 compared to NGR. ^a^Exact significance (2-tailed), p = 0.015 compared to NGR; ^b^p = 0.017 compared to pre-DM. SBP: systolic blood pressure; DBP: diastolic blood pressure; HbA1c: hemoglobin A1c; HDL: high density lipoprotein; LDL: low density lipoprotein TC: total cholesterol; TG: triglyceride; BUA: blood uric acid; CR: creatinine; ALT: alanine transaminase; AST: aspartate transaminase; γGT: γ glutamyl transferase. Quality control {#Sec4} --------------- The robustness and stability of the method was assessed by repeat analysis of a representative pooled quality control (QC) sample during sample runs. The overlapped total ion current chromatograms of the QC sample demonstrated the repeatability of our UPLC-QTOF-MS system (Supplemental Fig. [S1A](#MOESM1){ref-type="media"}). The principal component analysis (PCA) performed on QC and other groups revealed that QC samples were clustered in the PCA scores plot (Supplemental Fig. [S2A](#MOESM1){ref-type="media"}). The percentage coefficient of variation (CV%) of peak intensity was estimated as 4.1--18.6%. These results collectively indicated good repeatability, reliability, and stability of this method for metabolite analysis. Plasma metabolite profile and makers for NGR and DM {#Sec5} --------------------------------------------------- Representative base peak intensity (BPI) chromatograms of plasma samples indicated that the sample metabolites attained suitable separation. Typical single UPLC-QTOF/MS base peak intensity chromatograms of a healthy control, a patient with pre-DM and a patient with DM are presented in Supplemental Fig. [S1B](#MOESM1){ref-type="media"}. Multivariate statistical analysis was performed to determine whether the plasma metabolic profiles were different among participants progressed to DM, regressed to NGR and remained at pre-DM. The PCA score plots of the three groups, NGR vs DM, NGR vs pre-DM and pre-DM vs DM are presented in Supplemental Fig. [S2B--D](#MOESM1){ref-type="media"}. The R2X values of PCA analysis were \> 0.5 (0.651, 0.604, 0.631, respectively). Partial least squares discriminant analysis (PLS-DA) results of pair-wise groups indicated separations in the three groups (Fig. [1A](#Fig1){ref-type="fig"}) and sub-comparison groups (Fig. [1B--D](#Fig1){ref-type="fig"}) with valid model fits (R2Y(cum) \> 0.7 and Q2(cum) \> 0.4)^[@CR23]^. Variable importance in projection (VIP) values were obtained from the models and pair-wise statistical test for difference was performed. Variables with VIP value \> 1.0 and statistical p value \< 0.05 were selected and verified by loading plots. Finally, a metabolite was annotated according to MS information, structure information, accurate mass, retention time, fragmentation pattern and standards.Figure 1PLS-DA score plots of different groups based on plasma spectral data of UPLC-QTOF-MS positive ion mode. One point stands for one subject. (**A**) PLS-DA score plot of the NGR vs pre-DM vs DM groups. (**B**) PLS-DA score plot of the NGR vs DM groups. (**C**) PLS-DA score plot of the NGR vs Pre-DM groups. (**D**) PLS-DA score plot of the pre-DM vs DM groups. Based on the above steps, a panel of 23 (Table [2](#Tab2){ref-type="table"}) metabolites distinctively discriminated NGR and DM groups as well as NGR and pre-DM groups with a same trend, which were considered to be the potential metabolic biomarkers for the prognosis to NGR. Similarly, a panel of 22 (Table [3](#Tab3){ref-type="table"}) metabolites discriminated NGR and DM groups as well as DM and pre-DM groups with a same trend were considered to be metabolic markers for the prognosis to DM. Compared to the pre-DM group, 18 biomarkers were up-regulated and 5 biomarkers were down-regulated in the NGR group, while 5 biomarkers increased and 17 biomarkers declined in the DM group. Of the substances that were screened in this study, several substances appear to be unknown. We will attempt to identify these unknown substances in future studies.Table 2Discriminative metabolites between NGR and pre-DM (ESI+ mode).MetabolitesMeasured mass, DaCalculated mass, DaMass accuracy, ppmQuasi-molecular ionVIP^\*^FC^‡^p^†^Identification2,3-Epoxymenaquinone347.1612347.1618−1.7283M + Na1.361.500.0005HMDBPc(14:1/16:1)740.4650740.46332.2959M + K1.521.320.0152STD5-methoxytryptamine213.1025213.10097.5081M + Na1.463.560.0041STDN(6)-(octanoyl)lysine311.1732311.1737−1.6068M + K1.311.310.0204STD3-Phenylbutyric acid356.1910356.19061.12302 M + 3H2O + 2 H1.311.290.0337HMDBLysyl-Tyrosine327.2046327.20285.5011M + NH41.291.220.0401HMDBN6-Acetyl-L-lysine399.2205399.2214−2.25442 M + Na1.301.230.0468STDPantetheine301.1185301.1198−4.3172M + Na1.351.460.0013HMDBS-(hydroxymethyl)glutathione355.1262355.1287−7.0398M + NH41.281.520.0042STD3-Ethylphenol283.1110283.10955.29832 M + K1.111.340.0085HMDBLysoPE(20:5/0:0)532.2992532.3034−7.8490M + CH3OH + H1.261.180.0437HMDBDelta 8,14 -Sterol487.2746487.27391.4366M +  + 2 K + H1.261.230.0488HMDBCaprylic acid306.2666306.26398.8158M + NH41.081.150.0319HMDB1-Stearoylglycerophosphoglycerol576.3257576.3272−2.5767M + ACN + Na1.331.630.0028HMDBEndomorphin-1649.2475649.2535−9.2415M + K1.571.730.0026HMDB20-Hydroxy-leukotriene E4473.2654473.2680−5.4937M + NH41.281.280.0004HMDBLysopc(18:3)518.3237518.3241−0.8007M + H1.860.290.0020STDLysopc(20:5)542.3238542.3241−0.5808M + H1.730.110.0000STDcis-13,16-Docosadienoic acid354.3349354.3372−6.4910M + NH41.541.600.0029HMDBLysopc(20:4)544.3356544.3398−7.6515M + H1.600.700.0397STDL-palmitoylcarnitine400.3410400.3421−2.8351M + H2.112.250.0075STDPc(18:3/20:3)806.5683806.5694−1.4022M + H1.090.380.0336HMDBLysoPC(20:3)546.3487546.3554−12.2925M + H1.620.140.0013STD^\*^Variable importance in the projection (VIP) was obtained from PLS-DA with a threshold of 1.0. ^†^p values were calculated from tests of statistical difference. Difference was considered statistically significant when p \< 0.05. ^‡^Fold change (FC) was calculated from the arithmetic mean values of NGR and pre-DM groups. Fold change with a positive value indicates a relatively higher concentration present in NGR patients while negative indicates lower. Table 3Discriminative metabolites between DM and pre-DM (ESI+ mode).MetabolitesMeasured mass, DaCalculated mass, DaMass accuracy, ppmQuasi-molecular ionVIP^\*^FC^‡^p^†^Identifi-cationPc(16:0/14:0)782.4430782.4499−8.8121M + 2 K + H1.160.820.0351HMDB2-Pyrroloylglycine191.0420191.0427−3.7165M + Na1.190.840.0070STDDityrosine383.1181383.1219−9.9186M + Na2.431.230.0188STDKynuramine203.0561203.0581−9.9529M + K3.111.250.0007HMDBL-lysine188.1400188.13943.4496M + ACN + H1.270.740.0025STDL-threonine164.0296164.02941.2010M + 2Na-H2.330.590.0002STD5-hydroxy-2-oxo-4-ureido-2,5-dihydro-1h-imidazole-5-carboxylate220.0656220.0676−9.2791M + NH41.850.690.0002HMDB1,3,7-trimethyluric acid274.0925274.09115.2719M + ACN + Na1.981.520.0071STDBetaine118.0858118.0863−3.8531M + H1.280.710.0006HMDBIso-valeraldehyde104.1077104.10751.9211M + NH42.160.740.0000HMDBL-carnitine162.1132162.11301.2337M + H1.190.730.0005STD2-ketobutyric acid103.0397103.03951.9410M + H1.390.720.0003HMDB3,5-dihydroxybenzoic acid187.0605187.06012.1490M + CH3OH + H1.770.610.0010HMDBUric acid169.0358169.03561.0885M + H1.970.200.0001STDLysope(16:0/0:0)454.2908454.2928−4.4355M + H2.070.240.0006HMDBPantetheine301.1181301.1198−5.6456M + Na1.150.740.0336HMDBPalmitic amide256.2629256.2635−2.3062M + H1.420.410.0279HMDB3-dehydroxycarnitine184.0736184.0740−2.1730M + K1.631.300.0061STDLysopc(18:1)544.3363544.3403−7.3484M + H1.060.710.0184STDLinoleic acid341.3053341.30500.8174M + H1.141.190.0212HMDBLysopc(18:0)524.3706524.3711−0.8887M + H1.340.420.0398STDPc(18:0/18:2)786.5968786.6007−4.9975M + H1.290.090.0054HMDB^\*^Variable importance in the projection (VIP) was obtained from PLS-DA with a threshold of 1.0. ^†^p values were calculated from tests of statistical difference. Difference was considered statistically significant when p \< 0.05. ^‡^Fold change (FC) was calculated from the arithmetic mean values of DM and pre-DM groups. Fold change with a positive value indicates a relatively higher concentration present in DM patients while negative indicates lower. Metabolic pathways {#Sec6} ------------------ Pathway analysis carried out by IPA software revealed that three metabolic pathways including glycerophospholipid metabolism, Lipoate Biosynthesis and Incorporation II, and Melatonin Degradation II were found to contribute in the process from pre-DM to NGR (Fig. [2A](#Fig2){ref-type="fig"}). While L-carnitine Biosynthesis, Superpathway of Methionine Degradation, Mitochondrial L-carnitine Shuttle Pathway, and Choline Degradation I were associated with the development of DM (Fig. [2B](#Fig2){ref-type="fig"}).Figure 2Biological network and canonical pathways related to the identified metabolites in NGR (**A**) and DM (**B**). Molecules are represented as nodes, and the biological relationship between two nodes is represented as a line. Red symbols represent up-regulated metabolites; green symbols represent down-regulated metabolites. The solid lines and dotted lines show direct and indirect functional relationships, respectively. Verification and Optimization of Potential Biomakers {#Sec7} ---------------------------------------------------- Receiver operating characteristic (ROC) curves for each potential biomarker were established to test the probability of 'single biomarkers'. Area under curve (AUCs) and their CV% values in QC samples are showed in Supplemental Tables [S2](#MOESM1){ref-type="media"} and [S3](#MOESM1){ref-type="media"}. To assess how multiple metabolites collectively classify the NGR/DM and the Pre-DM groups, we built logistic regression model using stepwise selection on the 23/22 metabolites for the samples, respectively.Figure 3(**A**) ROC analysis for discrimination of pre-DM and NGR groups by logistic regression model combining 20-Hydroxy-leukotriene E4, Lysopc(20:4), 5-methoxytryptamine, Endomorphin-1, Lysopc(20:3). (**B**) ROC analysis for discrimination of pre-DM and DM groups by logistic regression model combining Iso-valeraldehyde, linoleic acid, Lysopc(18:1), 2-Pyrroloylglycine, Dityrosine. From pre-DM to NGR, five metabolites entered the multiple regression model: 20-Hydroxy-leukotriene E4 (standardized \[std\] β = 2.135, p = 0.004), Lysopc(20:4) (std β = −1.423, p = 0.027), 5-methoxytryptamine (std β = 0.606, p = 0.047), Endomorphin-1 (std β = 4.685, p = 0.018),and Lysopc(20:3) (std β = −19.176, p = 0.002) with an overall correct percentage of 86.0%. We calculated the sensitivity and specificity based on estimates of the final model built on the samples (logitP1 = −1.847 + 2.135(20-Hydroxy-leukotriene E4) − 1.423(Lysopc(20:4) + 0.606 (5-methoxytryptamine) + 4.685 (Endomorphin-1) − 19.176 (Lysopc(20:3)), and the model fit very well (AUC = 0.910, 95% CI \[0.838, 0.983\], sensitivity = 84.2%, specificity = 91.0%) with cut-off value −0.08 and p value \< 0.001. Meanwhile, five metabolites entered the multiple regression model from pre-DM to DM: Iso-valeraldehyde (standardized \[std\] β = −1.544, p = 0.049), linoleic acid (std β = 2.194, p = 0.019), Lysopc(18:1) (std β = −4.769, p = 0.013), 2-Pyrroloylglycine (std β = −2.922, p = 0.044) and Dityrosine (std β = 0.285, p = 0.007) with an overall correct percentage of 95.4%. The final model (logitP2 = −1.119--5.144(Iso-valeraldehyde) + 2.194(linoleic acid) − 4.769(Lysopc(18:1) − 2.922(2-Pyrroloylglycine) + 0.285 (Dityrosine)) showed satisfactory fitness (AUC = 0.976, 95% CI \[0.943, 1.000\], sensitivity = 90.0%, specificity = 98.5%) with cut-off value −0.33 and p value \< 0.001. The ROC curves of the combined biomarkers are shown in Fig. [3](#Fig3){ref-type="fig"}. Both of them were statistically different from single metabolites as they showed a higher lower bound of 95% CI of AUCs than most of the upper bounds of 95% CI of single metabolites, and were further validated by comparison of AUCs with MedCalc Statistical Software with a statistical p value \< 0.05^[@CR24]^. Relative concentrations of these metabolites in the logistic regression equations are presented in Fig. [4](#Fig4){ref-type="fig"}. These data strongly support the robustness of UPLC-QTOF-MS to identify metabolic differences in the plasma samples of pre-DM patients with different prognoses (NGR or DM).Figure 4Box plots of mean intensity of ten representative metabolites in plasma samples of NGR, pre-DM and DM patients. Discussion {#Sec8} ========== Early diagnosis in hyperglycemia, prior to developing into diabetes, can improve the living quality of those suffering from pre-DM. The rapid rise in pre-DM worldwide raises urgent needs to develop effective prognostic biomarkers and prognosis evaluation methods based on the easily accessible materials, such as blood and urine. Using UPLC-QTOF-MS based metabolic profiling combined with pattern recognition techniques on plasma samples, we identified molecular markers that discriminate the prognoses to NGR and to DM in 108 pre-diabetic patients in a longitudinal study with more than ten years of follow-up. In this study, a total of 23 metabolites involved in different biochemical metabolic pathways with high statistical significance were associated with the outcome of NGR, while 22 metabolites with the outcome of DM. Of these perturbed metabolic pathways, particular importance should be given to glycerophospholipid metabolism. Earlier studies have demonstrated that diabetes is intimately associated with metabolic disorders of lipids, especially phospholipids^[@CR25],[@CR26]^. Phosphocholine metabolites, including PC and LysoPC, are key components of the biomembranes of cells, as well as participating in various biological pathways^[@CR27],[@CR28]^, especially in cellular signaling and metabolism. Correspondingly, significant changes in phosphatidylcholine metabolism were observed in our study. PC (16:0/14:0) and PC (18:0/18:2) showed a reduction in level from pre-DM to DM, while PC (14:1/16:1) increased and PC (18:3/20:3) decreased from pre-DM to NGR. This is in line with a previous prospective cohort study based on 866 participants with seven years' follow-up that a series of PC such as C32:1, C36:1, C38:3, and C40:5 were independently associated with increased risk of T2D and C34:3, C40:6, C42:5, C44:4, and C44:5 with decreased risk^[@CR29]^. However, it was also demonstrated that the type of linkage between phospholipid core and fatty acid residue may be the key factor contributing to the antithetical association between two phosphatidylcholine subclasses and T2DM risk^[@CR29]^. Therefore, the specific structural formula of the PCs detected needs further validation. What's more, some studies have reported that changed concentrations of lysoPCs are associated with the risk of T2DM, especially lysoPC(18:2), which was significantly altered in patients with impaired glucose tolerance (IGT) and was identified as an IGT-specific biomarker^[@CR30]^. LysoPCs can mediate many cell-signaling pathways in monocytes/macrophages^[@CR29],[@CR31]^ and specific receptors^[@CR32]^, and therefore participate in the inflammatory response. In our results, several lysoPC species (LPC C20:4, LPC C18:3, LPC C20:5, LPC C20:3) were down-regulated from pre-DM to NGR group, while the plasma level of LPC C18:1 were higher and LPC C18:0 were lower in DM than pre-DM patients, possibly owing to altered activity of phospholipase A2 which catalyzes PC hydrolysis to lysoPC^[@CR33]^. In mouse models, Yea, K *et al*. have reported that the blood glucose lowering effect of LPC were found to be sensitive to variations in LPC acyl chain length^[@CR34]^, which may elucidate the divisive findings mentioned above. In recent years, 5-methoxytryptamine (5-MT) has been revealed to play a pivotal role in the alternative melatonin synthetic pathway, in which serotonin is first O-methylated to 5-MT and, thereafter, 5-MT is N-acetylated to melatonin (N-acetyl-5-methoxytryptamine)^[@CR35]^. Melatonin was reported as a free radical scavenger and an antioxidant for protection from the oxidative stress^[@CR36]--[@CR38]^, especially reducing oxidative damage to lipids, which is important for the maintenance of mitochondrial homeostasis. Letra-Vilela, R. *et al*. observed that removal of the N-acetyl group enhances the antioxidant and neuroprotective properties of the maletonin^[@CR39]^. The elevated level of plasma 5-MT concentrations contributed to scavenge radicals and radical products and functioned as antioxidant against reaction oxygen species (ROS). Meanwhile, an increased level of plasma S-(hydroxymethyl)glutathione concentration was observed in patients regressed to NGR. S-(hydroxymethyl)glutathione interconverts with glutathione (GSH), later of which is a key antioxidant and marker for conditions with oxidative stress^[@CR40]^. Therefore, we can conclude that a balance between oxidation and antioxidation was achieved in patients regressed to NGR. Caprylic acid, also named octanoic acid, is a medium-chain fatty acid which down-regulates a number of key adipogenic genes including peroxisome proliferator activated receptor (PPAR), CCAAT/enhancer binding protein alpha. Rats fed on diet rich in medium-chain fatty acids had smaller fat pads, reduced adipose tissue lipoprotein lipase activity and improved insulin sensitivity and glucose tolerance^[@CR41]^. Thus the elevated level of caprylic acid may be another contributor to glucose tolerance recovery. In this study, a major alteration observed in patients progressed to DM was amino acid metabolism with a decreased level of L-lysine, L-threonine, Betaine, Iso-valeraldehyde, 2-ketobutyric acid, and 2-Pyrroloylglycine. 2-Ketobutyric acid is a substance that is involved in the metabolism of many amino acids, such as glycine, methionine, valine, leucine, serine, threonine and isoleucine. It is also one of the degradation products of threonine, which can be converted to propionyl-CoA (and subsequently methylmalonyl CoA, which can be converted to succinyl CoA, a citric acid cycle intermediate), and thus enter the citric acid cycle. Our research is consistent with the report that 2-ketobutyric acid is associated with both prevalent diabetes (OR: 1.43, 95% CI (1.06,1.92)) and incident diabetes (OR: 1.81, 95% CI (1.35, 2.42)^[@CR42]^ while glycine is found inversely associated with diabetes risk^[@CR43],[@CR44]^. This suggest that increased activity in the L-threonine-2-ketobutyric acid-citric acid cycle and decreased glycine, which plays an important role in metabolic regulation and anti-oxidative reactions^[@CR45]^ may account for diabetes risk. Betaine, also glycine betaine, has been reported to be disturbed in diabetes and it is regarded as a marker of diabetes in plasma and urine samples^[@CR46]--[@CR48]^. It is inversely associated with several components of metabolic syndrome including obesity, hypertension, and hyperlipemia^[@CR49]^. Mouse model studies suggest increased betaine metabolism in diabetes, which could be expected to lower plasma betaine^[@CR50]^. In agreement with these findings, a reduction of betaine level is an important contribution to DM development. A decreased level of L-carnitine and an increased level of dityrosine and 3-dehydroxycarnitine were detected in patients progressed to DM. These results are consistent with an interesting study investigating the relationship between the consumption of red meat and the development of associated diseases^[@CR51]^. L-carnitine is known to be a long-chain fatty acid transporter in the "Mitocondrial L-carnitine Shuttle Pathway"^[@CR52]^, and 3-dehydroxycarnitine has been identified as an intermediate metabolite in the intestinal bacterial catabolism of L-carnitine^[@CR53]^, which may give a hint the involvement of gut microbiota in DM development. Dityrosine has been proposed as a biomarker of oxidative stress under a variety of conditions and biological systems including aging, exposure to oxygen free radicals, nitrogen dioxide, and lipid hydroperoxides^[@CR54]^. Increases in dityrosine levels have been associated with pathologies such as atherosclerosis, Alzheimer's Disease, and so on^[@CR55],[@CR56]^. Together, these findings reflect impaired mitochondrial β-oxidation and perturbed fatty acid metabolism in the development of insulin resistance. To make it better to apply the identified biomarkers for prediction of pre-DM prognosis in the long run in clinical setting, the key of this study was to select and combine several specific biomarkers for establishing a noninvasive and accurate predict method for prognosis of pre-DM. The candidate biomarker selection rationale was as follows: first, the biomarkers must be confirmed by standards; second, the biomarkers with high VIPs in the pattern recognition analysis and significant discrepancy between groups; and last, the biomarkers in the logistic regression equation with higher AUCs and predictive sensibility and specificity. As a result, five biomarkers (20-Hydroxy-leukotriene E4, Lysopc(20:4), 5-methoxytryptamine, Endomorphin-1, Lysopc(20:3)) and five biomarkers (Iso-valeraldehyde, linoleic acid, Lysopc(18:1), 2-Pyrroloylglycine, Dityrosine) were included in the predictive equation of NGR and DM, respectively. In summary, our study comprehensively captured alterations in the human metabolome associated with different glucose tolerance outcomes of pre-DM in a longitudinal cohort study. A decreased glycerophosphoslipid metabolism and balanced oxidation and antioxidation contributed to the transition to NGR, while impaired amino acid metabolism and perturbed mitochondrial β-oxidation were associated with the development of DM. Targeting the pathways that involve in these newly prognosis biomarkers would be beneficial for the regression to NGR and the early prevention of DM among participants with pre-DM. Subjects and Methods {#Sec9} ==================== Ethics Statement {#Sec10} ---------------- This study was approved by Ruijin Hospital Ethics Committee (approval no. 2014--114). Written informed consent signed by each of participants was provided before blood samples were taken. All methods were carried out in accordance with the relevant guidelines and regulations. Study design and Subjects {#Sec11} ------------------------- This study was from a population-based prospective cohort study of 2132 men and women aged 18--76 years, from November 2002 to January 2003, among whom 778 participants were pre-DM at baseline. The follow-up visit was conducted from July 2013 to October 2014 and 526 participants who were pre-DM at baseline were followed, among whom 334 individuals both answered questionnaires and had plasma glucose measurement during an oral glucose tolerance test (OGTT). Serum lipid profile and liver function were also assayed. After excluded the individuals on anti-diabetes medication or with serious liver, renal dysfunction and cancer, the remaining 108 individuals were included in our final analysis. This study design has been described previously^[@CR57]--[@CR59]^. According to different glycemic outcomes at follow up, the 108 participants were divided into 3 groups. 20 participants progressed to diabetes DM, 20 regressed to NGR, and 68 remained at pre-DM. Details of the study population are presented in Supplemental Fig. [S3](#MOESM1){ref-type="media"}. Venous blood samples were collected at baseline and follow-up. The glucose level was measured by means of glucose oxidase method. Pre-DM and diabetes were diagnosed according to American Diabetes Association (ADA) 2010 Guidelines^[@CR60]^. Pre-DM refers to subjects with impaired fasting glucose (fasting glucose ranging from 5.6 to \< 7.0 mmol/L, as well as 2-hour glucose \< 7.8 mmol/L) and subjects with impaired glucose tolerance (2-hour glucose ranging from 7.8 to \< 11.1 mmol/L). Both impaired fasting glucose and impaired glucose tolerance were confined to non-diabetic fasting and 2-hour concentrations. Fasting plasma samples were used to analyze biochemical indexes and metabolomics. Sample collection and preparation {#Sec12} --------------------------------- Fasting blood samples were drawn under sterile conditions from an antecubital vein of all the study participants between 6:30 and 9:30 after a 12-hour overnight fast, and were collected directly into heparinized tubes. The tubes were centrifuged at 12000 g for 10 min and the supernatant (plasma sample) was aspirated and stored at −80 °C until analysis. The plasma sample (100 μl) was thawed at 4 °C. 100 μl of plasma was spiked with 300 μl mixed solution (methanol: acetonitrile = 3:2) and vigorously vortexed for 30 seconds. The sample solution was centrifuged at 12000 × *g* for 10 min at 4 °C, and the supernatant was analyzed using UPLC-QTOF-MS. Study samples were analyzed in random order using a random-number generator in Excel 2015 (Microsoft, Redmond, Washington). QC samples were prepared by mixing equal volumes (10 μl) of different individual plasma samples and one QC sample was run after every ten study sample injections throughout the analytical workflow. UPLC-QTOF-MS conditions {#Sec13} ----------------------- In this study, a Waters ACQUITY^TM^ ultra performance liquid chromatography system (Waters Corp., Milford, USA) coupled with aSynaptG2 quadrupole time-of-flight (Q/TOF) tandem mass spectrometer (Waters, Milford, MA) was used to perform the analysis of plasma samples. The set-up parameters for the UPLC-QTOF-MS analysis were as follows: A T3 C18 chromatographic column (Waters, 2.1 mm × 100 mm, 1.7 μm) was used to separate metabolites contained in plasma with column temperature set at 45 °C. The eluted solution was 0.1% formic acid combined with 5 mM ammonium acetate in water (A) and acetonitrile (B) with a flow rate of 300 μl/min. The gradient elution program for analysis of plasma samples was as follows: 0--1 min, A: 98%; 1--3 min, A: 98--50%; 3--8 min, A: 50--45%; 8--12 min, A: 45%; 12--17 min, A: 45%−10%; 17--20 min, A: 10--98%. The MS parameters were set up as follows: the electrospray ionization source (ESI) interface operated with a positive mode, capillary voltage of 3000 V, sample cone voltage of 40 V, extraction cone voltage of 4.0 V, desolvation gas flow of 650 L/h at 450 °C, source temperature of 120 °C, and cone gas flow of 50 L/h. Centroid data were collected under a scan time of 0.25 s and an inter scan delay of 0.02 s condition in continuum mode which ranged from m/z 100 to m/z 1200 Da. To avoid possible contamination and keep the signal stable, the Q-TOF mass spectrometer system was tuned for optimum accuracy and reproducibility using leucine-enkephalin (m/z 556.2771) as the lock mass in all analyses at a concentration of 0.5 μg/mL. The lock spray frequency was set at 5 s and the lock mass data were averaged over 10 scans. MS^E^ was applied for the MS2 analysis with the low collision energy of 5 eV and the high collision energy of 30 eV. Data extraction and multivariate statistics {#Sec14} ------------------------------------------- The raw data produced by UPLC-QTOF-MS were initially processed using MarkerLynx Applications Manager version 4.1 (Waters Corp., Manchester, UK). The data were peak-detected and noise-reduced so that only true peaks are further processed by the software. The data were presented with the ion intensities corresponding the retention time and m/z for each peak. The main parameters were set as follows: retention time window 0.5--16.5 min, mass range 100--1200 Da, XIC window 0.02 min, automatically calculate peak width and peak-peak baseline noise, use the raw data during the deconvolution procedure, marker intensity threshold (count) 1000, mass window 0.02 Da, retention time windows 0.2 min, noise elimination level 6.0, and retain the isotopic peaks. The internal standard was used for data quality control and data normalization (reproducibility). The ion peaks generated by the internal standard were removed and the metabolites were filtered by the QC samples. The 80% rule was applied to treat the missing values^[@CR61]^ and a data matrix that consisted of the ion intensities corresponding the retention time and m/z for each peak was generated and then exported to Simca-P software (v13.0, Umetrics, Umea, Sweden) followed by a series of pattern recognition (PR) methods. Multivariate statistical analyses, including principal component analysis (PCA) and a partial least squares discriminant analysis (PLS-DA) were carried out using SIMCA-P 13.0 software. The score plots from PLS-DA showed the differentiation of metabolic profiles of different groups. In addition, loading plots indicated the variables contributing to the classification. The quality of the model was described by the cross-validation parameter Q2 (cum), and R2Y, which represents the total explained variation for the X matrix. After the analysis of the three groups, pair-wise analysis (NGR vs pre-DM, DM vs pre-DM and NGR vs DM) was conducted to searching for the discrepant metabolites between groups. Identification of potential biomarkers and metabolic pathway analysis {#Sec15} --------------------------------------------------------------------- The metabolites responsible for the separation of metabolic profiles of the pair-wise groups were obtained based on a variable importance in projection (VIP) threshold (VIP \> 1 represented higher influence on the classification)^[@CR17]^ from PLS-DA models accompanied with loading plots and a statistical test for difference (*p* \< 0.05 was considered significant). A two-tailed t test or a nonparametric Mann-Whitney test was used for significance evaluation following data normality test with Shapiro-Wilk tests, which was performed with the R statistical software 3.3.2 for Windows. A metabolite was detected and identified based on accurate mass, retention time, MS information and metabolite structure information from related databases: METLIN (<https://metlin.scripps.edu/index.php>) and HMDB (<http://www.hmdb.ca/>). Some of the metabolites were confirmed by comparison of retention time and fragmentation pattern with authentic standards. The pathway analysis and network of potential biomarkers contributing to the classification between groups was carried out by IPA software (IPA, Ingenuity^s^ Systems, <http://www.ingenuity.com>). The schematic flow chart of the metabolic profiling and biomarker identification and optimization strategy used in the study is shown in Fig. [5](#Fig5){ref-type="fig"}.Figure 5Schematic flow chart of the metabolomics analysis in the study. NGR: normal glucose regulation; Pre-DM: pre-diabetes; DM: diabetes; UPLC-QTOF-MS: Ultra-performance liquid chromatography-quadrupole time-of-flight mass spectrometry; VIP: variable importance in the projection; ROC: receiver operating characteristic curve; AUC: area under the curve. Statistical analysis {#Sec16} -------------------- Demographic and biochemical characteristics were presented as the mean (±SD) for continuous variables and % for categorical variables. Data normality and homogeneity of continuous variables were confirmed with Shapiro-Wilk tests and Levene tests, respectively. If data were normally distributed and variances were equal, data were analyzed by means of one-way analysis of variance (ANOVA) with LSD test; Otherwise, Kruskal-Wallis test with a nonparametric two-tailed Mann-Whitney test was used (alpha was adjusted to 0.05/3 here). And categorical variables were analyzed by χ2 test or Fisher's exact test. Difference was considered statistically significant when p \< 0.05. Multiple logistic regression analysis of the potential metabolites was performed and receiver operating characteristics (ROC) analysis was used to evaluate predictive ability of potential metabolic biomarkers. Area under the curve (AUC), best cut-off point, sensitivity and specificity were determined using the maximum value of the Youden index. The analyses were performed using SPSS software version 23.0 (IBM Corp., USA). Electronic supplementary material ================================= {#Sec17} Supplementary information Hailuan Zeng and Renchao Tong contributed equally to this work. A correction to this article is available online at <https://doi.org/10.1038/s41598-017-14856-1>. **Electronic supplementary material** **Supplementary information** accompanies this paper at doi:10.1038/s41598-017-06309-6 **Change History:** A correction to this article has been published and is linked from the HTML version of this paper. The error has been fixed in the paper. **Publisher's note:** Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations. We are indebted to staff and participants of the study for their important contributions. We gratefully acknowledge grants supported by the National Natural Science Foundation of China (No. 81270935 and 81573581), Transform Medicine Innovation Foundation of Shanghai Jiao Tong University School of Medicine (15ZH2001), the fund of the Key Laboratory of Stem Cell Biology of Chinese Academy of Sciences (No. 201601), Shanghai Municipal Health Bureau Foundation (20114301), the Program of Shanghai Subject Chief Scientist (17XD1403500) and Shanghai Science and Technology Commission Project (15401902400). J.T. and L.Y. designed the study. H.Z., R.T., W.T., Q.Y., M.Q., A.X. performed experiments. H.Z. and R.T. analyzed data and wrote the paper. L.D., S.S., H.Z., J.T. and L.Y. reviewed and edited the manuscripts. All authors reviewed and approved the final article. Competing Interests {#FPar1} =================== The authors declare that they have no competing interests.
{ "pile_set_name": "PubMed Central" }
"Enjoy this moment @RealJackSwagger@WWEZeb because you two made a mistake, I'm still on my feet,and i will break you both in pieces. Every mark on my body will be a broken bone for you. So start counting #PERROS"
{ "pile_set_name": "Pile-CC" }
from __future__ import unicode_literals from __future__ import print_function from threading import Thread, RLock, Event from datetime import datetime, timedelta from operator import attrgetter import logging log = logging.getLogger("moya.runtime") class Task(object): """A task scheduled for a given time""" def __init__(self, name, callable, run_time=None, repeat=None): self.name = name self.callable = callable self.run_time = run_time self.repeat = repeat def __unicode__(self): if self.repeat: return "<task '{}' repeats {}>".format(self.name, self.repeat) else: return "<task '{}'>".format(self.name) __repr__ = __unicode__ def advance(self): """Set run time to next cycle""" if self.repeat: self.run_time = self.run_time + self.repeat return True else: return False def ready(self, t): """Check if this task is ready to be execute""" return t >= self.run_time def run(self): """Run the task in it's own thread""" run_thread = Thread(target=self._run) run_thread.start() def _run(self): try: self.callable() except Exception as e: log.exception("Error in scheduled task '%s'", self.name) class Scheduler(Thread): """A thread that manages scheduled / repeating tasks""" # The granularity at which tasks can be scheduled # Super precision is not required given that tasks are unlikely to be more than one a minute poll_seconds = 1 def __init__(self): super(Scheduler, self).__init__() self.lock = RLock() self.quit_event = Event() self.tasks = [] self.new_tasks = [] def run(self): while 1: # Better than a sleep because we can interrupt it self.quit_event.wait(self.poll_seconds) if self.quit_event.is_set(): break with self.lock: self.tasks += self.new_tasks del self.new_tasks[:] self._check_tasks() del self.tasks[:] with self.lock: del self.new_tasks[:] def stop(self, wait=True): """Stop processing tasks and block till everything has quit""" self.quit_event.set() if wait: self.join() def _check_tasks(self): if not self.tasks: return t = datetime.utcnow() ready_tasks = None self.tasks.sort(key=attrgetter("run_time")) for i, task in enumerate(self.tasks): if not task.ready(t): ready_tasks = self.tasks[:i] del self.tasks[:i] break else: ready_tasks = self.tasks[:] del self.tasks[:] if ready_tasks: for task in ready_tasks: if self.quit_event.is_set(): break task.run() if task.advance(): self.tasks.append(task) def add_repeat_task(self, name, callable, repeat): """Add a task to be invoked every `repeat` seconds""" if isinstance(repeat, (int, long, float)): repeat = timedelta(seconds=repeat) run_time = datetime.utcnow() + repeat task = Task(name, callable, run_time=run_time, repeat=repeat) with self.lock: self.new_tasks.append(task) return task if __name__ == "__main__": import time def hello(): print("Hello") def world(): print("world") scheduler = Scheduler() print(scheduler.add_repeat_task("hello", hello, repeat=5)) print(scheduler.add_repeat_task("world", world, repeat=3)) scheduler.start() try: while 1: time.sleep(1) except: scheduler.stop() print("Stopped") raise
{ "pile_set_name": "Github" }
Q: Why does this flex item have its height limited? I've stumbled across something that happens to my flex child items, illustrated in this JSFiddle. This is the code: <div style="position:absolute; top:10px; left:10px; background-color:yellow; height:50px; width:200px; display:flex; flex-direction:column;"> <div style="overflow:hidden;">inner div text<br>inner div text<br>inner div text<br>inner div text<br>inner div text</div> </div> <div style="position:absolute; top:10px; left:250px; background-color:green; height:50px; width:200px;"> <div style="overflow:hidden;">inner div text<br>inner div text<br>inner div text<br>inner div text<br>inner div text</div> </div> <div style="position:absolute; top:200px; left:100px; border:1px solid black; height:300px; width:300px; overflow:hidden;"> <div style="overflow:hidden;"> Why does the inner div on the yellow left have its height limited to that of its container, but not the inner div on the green right? As far as I can tell there are 4 things combined that trigger this:<br>1) the container has position:absolute<br> 2) the container has a fixed height/width<br> 3) the container is flexbox<br> 4) the flex item has overflow:hidden<br><br>But I can't find anything exactly in the flexbox spec to cause this behaviour. Why is it happening? </div> </div> Basically, the flex item inside a flexbox container with a fixed height is getting its height limited to that of the flexbox container when overflow:hidden is set. On the other hand, an equivalent div inside a fixed height non-flex container just expands to the size of its content. Where in the flexbox spec is this behaviour specified? Is it just a browser quirk? That seems unlikely as it happens in Firefox, Chrome, and IE. Assuming it is well-defined flexbox behaviour, I'd like to know exactly how and when it is triggered. Also note that when you remove overflow:hidden from the child (not the container), its height stops getting limited. A: OK, I think I figured out what's happening. Up until flexbox, there was no way to cause an element to be smaller than the size of its content without explicitly settings its width/height. With flexbox, there is a second way. Para 9.11 of the flexbox spec talks about how to calculate a flex-item's cross size. Basically if the flex item has align-self: stretch set (which in my example it does), it will try to fill the container's flex line (in my example the vertical line, ie. height). This is implicitly setting the flex item's height, without explicitly using the height property. The container itself needs to have a definite height, too, to be handed down to the flex item (in my example the container's height is explicitly set through the height CSS attribute, which I guess ultimately needs to be done at some point in the chain). However, two conditions need to be met: the browser needs to want to resize the item, and the item needs to be resizable. To make the browser want to resize the item, it needs to be a flex item that meets the conditions mentioned above for its cross size (which ultimately may determine its width or height) to be calculated by the browser with relation to its container's cross size. To make the item resizable in this context, it needs to both not have flex-shrink set to 0 (note that flex:none is shorthand for setting flex-shrink to 0, amongst other things), and have overflow:hidden set (presumably giving the browser "permission" to resize the flex item such that its content will be larger than it, and get hidden). Only then will the browser actually resize the flex item itself. This is notably different behaviour to what happens outside the flexbox model, where the child of a fixed height/width container may have it content clipped, but it will retain the necessary size to hold its content. Part of the content will merely be hidden. Here, the flex item really is being (potentially) resized to be smaller than its content, which has quite important implications (particularly if you want a child element to have a scrollbar for its content).
{ "pile_set_name": "StackExchange" }
National Route 101 (Argentina) National Route 101 is a national road in the NW of Misiones Province, Argentina ending at Iguazu National Park. It runs for near the border between Argentina and Brazil crossing the Missiones Province Departments of General Manuel Belgrano and Iguazú. After decades of difficult travel through this road, especially after rains, it was decided to pave it starting from the south end. The work was contracted with a financial agreement with the federal government and under the technical supervision and administration of the Dirección Provincial de Vialidad (Provincial Dept. of Transportation). In 2006 the Dirección Provincial de Vialidad paved the section between Bernardo de Irigoyen and San Antonio. The next until the rural area known as Piñalito Norte were completed in mid-2007. The section between Piñalito Norte and Provincial Route 19 is under construction. The following until Puerto Iguazú International Airport is unpaved, while the section from the airport to the junction with National Route 12 is paved. References Category:Roads in Argentina Category:Tourism in Argentina
{ "pile_set_name": "Wikipedia (en)" }
Q: appium driver throws Exception when using regex? I am using appium to do some ui automation.I am having problems with regex; WebDriverException throwed with the code,and the element totally exists: phonedriver.findElement(By.xpath("//android.view.View[matches(@text,'sometext\\d+')]")) Here are exception message: An unknown server-side error occurred while processing the command. Original error: java.lang.IllegalStateException: Unable to evaluate expression. See cause Here are my capability info: Capabilities {appActivity: com.tencent.mm.ui.LauncherUI, appPackage: com.tencent.mm, deviceName: 127.0.0.1:62001, fastReset: false, fullReset: false, newCommandTimeout: 999999, noReset: true, platformName: Android, platformVersion: 5.1.1, resetKeyboard: true, udid: 127.0.0.1:62001} Here are my pom: <groupId>io.appium</groupId> <artifactId>java-client</artifactId> <version>7.3.0</version> <groupId>org.seleniumhq.selenium</groupId> <artifactId>selenium-java</artifactId> <version>3.141.59</version> A: You have two issues: matches() is only available in XPath 2.0 and not 1.0 see: http://www.w3.org/TR/xquery-operators/#func-matches Selenium, but also Chrome and Firefox browser are using Xpath 1.0. You can try any Xpath 2.0 functions in the JS-console of the browser and it will show you an error. e.g.: $x("lower-case('ABC')") to get the text use . or text() e.g $x("//*[contains(text(),'bob')]") As a solution for your problem, you can get all elements containing your text "//android.view.View[contans(text(),'sometext')]") and then loop through them in JAVA to find the correct one
{ "pile_set_name": "StackExchange" }
We do not have an overdose crisis. We have a poisoned drug supply. Fentanyl and its analogs are killing tens of thousands of Americans every year. Alarmingly and with ominous future implications, fentanyl-laced cocaine fatalities in Ohio are now outstripping fentanyl-laced herion fatalities. This trend began in 2016 but the Ohio Bureau of Criminal Investigation (BCI), who operates the three state crime labs that first learned about it, never made the data public. In this episode we speak with Dennis Cauchon, founder of Harm Reduction Ohio, who just this summer used public records laws to obtain the data from BCI and publish it, warning people that this poisoning crisis had now spread far beyond just the heroin market. Who is adding fentanyl and carfentanil to the cocaine supply? How many lives has Cauchon saved by spreading this information to the public? And why did BCI sit on the data for three years and not tell anyone? According to Cauchon, they simply didn't realize what they were looking at. Disconnected from the drug culture, they just assumed that mixing fentanyl with cocaine was a new drug trend. They had no idea that cocaine users were unaware that their cocaine contained fentanyl, and that they didn't want their drugs contaminated with it. Cauchon was able to educate some of the folks in BCI. "After initially being reluctant to provide the information," he say, "BCI was remarkably helpful, which showed a real concern about drug overdose deaths, not just helping police convict people on drug charges." This is the state of prohibition. This is drug war culture. In this episode we also speak to Donna May, a mother who lost her daughter to heroin after her doctor cut her off from the prescription opiates that relieved her symptoms of anxiety. We hear from Dr. Torsten Passie, who helped spearhead heroin maintenance programs in Germany. And we talk to Dr. Gabor Maté, best-selling author and addiction treatment specialist from Vancouver, Canada, who explains why drug users are one of the most scapegoated groups in our culture. This episode describes the problem as well as the solution. And the solution lies not just in changing drug laws, but also our own attitudes and false beliefs about drugs and the people who use them. Edited by Emanuel Sferios Sound engineered by Jimmy Martin Opening music track by Frankum, creative commons.
{ "pile_set_name": "OpenWebText2" }
Q: Is this a wrong way of doing things? answering questions just for bounty? So I am in need of more rep as you can clearly see. But I do not want to answer questions just because there is a bounty on them because of the times my questions (bounty less) have been answered well. So is it wrong to just target bountified (sp) questions? Does it go against some rule aside from morality? A: If you can answer them, answer them! Bountied questions are on the "featured" tab. This is mostly done to attract more attention, because the OP is looking for a (good) answer. So, no, this is perfectly normal to answer the questions on which a bounty is set. However, it is common to see an extensive answer being posted, rather than a quick-n-dirty one. A: There's no obligatory minimum level of participation on a Stack Exchange site. It's neither immoral nor against prevailing community standards, even if you didn't participate at all. Of course, we appreciate it when someone contributes to this community; it's a good thing. But it is by no means obligatory. Since there's no obligation to participate at all, there's certainly no obligation to answer any particular kind of question. Every time you post a valuable answer, you're helping the community. Even if you only or mostly answered bountied questions, you would be helping the community. (Assuming your answers are good, that is.) There's nothing wrong with this. With that said, focusing on bountied questions to the total exclusion of non-bountied isn't necessarily the course of action that will achieve your goals best. Why? If you want reputation, you can get it by posting good answers to lots of questions. Most bountied questions are especially difficult to answer well (though there are exceptions). You can get lots of reputation from answering bountied questions but you can get lots more by answering plenty of "easier" questions. If you want to help people, and you see a question and know the answer, then you might as well post it, whether or not the question has a bounty. When a question has a bounty, you're not guaranteed to get it just by posting an answer. Whether or not a question has a bounty, you can gain reputation by having your answers upvoted. Of course, complications sometimes arise in that some answers take significant time and effort to compose. You might choose to focus more on bountied questions, while still also answering some non-bountied questions. Most people are interested in reputation points and in helping people, to varying degrees. However much each one interests you, it makes sense to consider answering non-bountied questions as well as bountied ones. Finally, please note that answers are not the only way to help. In particular, asking good questions is an important way to contribute. Sometimes people worry that they've asked too many questions and not posted enough answers. But a question is a positive contribution to the community, assuming it is asked well. (In this way, questions are like answers--good questions and answers help us all.)
{ "pile_set_name": "StackExchange" }
The Mysterious Secret Society of Assassins Secret societies are mysterious enough, but sometimes they go beyond merely enigmatic, spooky organizations and gather a dark reputation as being a lethal force to be reckoned with, reaching out to deal death to those who oppose them. Such is the story of a shadowy secret order of assassins which was formed in ancient Persia and which kept the region under the grip of terror for over a century. Always lurking in the shadows, they could be anyone, and they were always ready to pounce, patiently waiting for word from their master to bloom outwards from the darkness and shadows to deliver death at a moment’s notice. Let us delve into some of the murky history of one of the most secretive and lethal secret orders of the ancient world and indeed history as a whole. The road to the formation of one of the most terrifying secret societies the world would ever know began in Egypt in the first millennium AD, which was then under the control of the Ismaili sect of Shiite Islam, which had long been a small minority group within the religion, who followed Ismail bin Jafar, an iman who was not recognized by the larger Shiite group, and practiced a faith marked by radical egalitarianism and shunning of the luxury in which the ruling Sunni Abbasid caliphs enjoyed. At the time, the Ismaili sect had long been despised and persecuted by both the Sunnis and other Shiites alike, and they were considered to be revolutionary heretics. Mostly scattered and powerless, this sect had lived on the fringes of Islam for years, secretly preaching their ideology through missionaries known as da’is. It was one of these da’is by the name of Ubayd Allah who would launch a successful revolt to overthrow the local Sunni dynasty of what is now Tunisia and subsequently start the Fatimid caliphate in 910 AD, which quickly went on to conquer Egypt, Palestine, the holy cities of Mecca and Medina, and parts of Syriainto, from which they spread their brand of theology. Hassan-i Sabbah It was in the base of Ismaili operations that Hassan-i Sabbah was born between 1040 and 1050, and converted to the Ismaili sect as a young man. Charismatic, intelligent, and intense, Hassan quickly rose in prominence within the Ismaili community and garnered a reputation in western Persia as being a firebrand missionary, known for his fierce intelligence, debating skills, fanatical fervor, hot temper, and toughness. It was these qualities that would land him in trouble at times, as he was known to have intense religious arguments with his instructors and he was even arrested at one point to spend a stint in a political prison after offending the local Chief of the Army, Badr al-Jamalī. He was subsequently kicked out of Cairo, where he had received advanced instruction in the ways of missionary work. Nevertheless, despite his exile from Cairo, Hassan went on to be one of Ismaili’s most valued missionaries, carrying out his work all over Persia. At the time, the Ismailis were somewhat in decline, which was brought about by internal disputes among its leaders, a schism in ideologies, with the group gradually dividing into the Mustali Ismailis and the Nizari Ismailis due to conflict over who should be the heir to the caliphate, and an increasing loss of territory to the intruding Sunni Abbasid caliphs. In his zealous drive to spread the word of his Ismaili sect, Hassan went about trying to create a stronghold, a base of operations from which he and his followers could continue their dangerous work and raise the prominence of their doctrine throughout the region in safety. After traversing the land looking for a suitable location, Sabbah found it in the mountains of northern Persia near the Shah River in the form of an impressive citadel by the name of Alamut, which was perched atop soaring cliffs high above a valley floor, making it virtually inaccessible to enemies. Easily defendable, with a clear view for miles over the landscape below, it was seen as the perfect spot from which to launch their operation. However, there was a problem. First of all, Alamut belonged to the the Seljuk Empire, who obviously were not just going to give it to them. Second, Hassan and his men were badly outnumbered, and considering that Alamut was well-defended and difficult to reach they had no chance at all of taking it by force. Most would have realized the futility of trying to gain the citadel, but for Hassan these were merely minor annoyances, and he went about an elaborate campaign to just go ahead and steal it anyway. The first step to this plan involved sending out missionaries into the surrounding areas in order to fan out and win over converts from the local populace, especially village leaders and other people of prominence. The next step was more daring, with Sabbah and his men actually secretly infiltrating the citadel and converting members of the defending garrison. The commander of the fort began to suspect something suspicious was going on, but he was powerless to do anything about it because by that time most of the garrison and the local populace had already converted to the Ismaili cause and now followed Hassan. Outnumbered and outmaneuvered, the commander had no choice but to surrender the fort, and thus after nearly two years of patiently enacting his plan, Hassan had gained his prize without bloodshed or violence. The account of the taking of Alamut has often been romanticized. One popular legend concerning the acquisition of Alamut is that Hassan offered the owner of the fort 3,000 dinars for an amount of land that could fill a buffalo hide. The owner accepted, thinking that this would turn him over a tidy profit, after which Hassan cut a buffalo hide into long, thin strips which he then linked together around the perimeter of the fort before paying the promised money and sending the outsmarted owner on his way. With Alamut secured, Hassan knew that it was only a matter of time before the Seljuks would come to take it back, and indeed an enraged Seljuk emir came rampaging through the valley in revenge, destroying towns, razing crops, and brutally slaughtering any Ismailis he could find, but Alamut proved to be just as impenetrable as Hassan had hoped, repelling the attack and sending the emir home in frustrated defeat. In the aftermath of this attack, with many of the crops and homes in the valley lying in smoking ruin, Hassan launched a campaign to increase his presence and capture other fortified positions within the region, sometimes through tact or propaganda and at other times through force, until he had created practically his own miniature state. As the Ismaili presence in the region spread, the Seljuks began to realize the threat they posed and decided on a more powerful response. Two armies were dispatched to the region to squash the Ismailis and Alamut was held under siege, yet Hassan in his impregnable fortress was able to ultimately thwart all such aggression. It was at around this time that he would turn to a new way to fight his enemies, and which would lead to the formation of his order of assassins. It came to Hassan’s attention that one of his worst enemies, a Vizier Nizam al-Mulk, was traveling from the Seljuk capital of Isfahan to the Abbasid caliph’s residence in Baghdad along with the Sultan Malik Shah. Hassan then sent one of his most trusted assistants, a young man named Bu-Tahir, to infiltrate the entourage dressed as a Sufi mystic and armed with a concealed dagger. On the morning of October of 1092, when Nizam had just finished having breakfast with the Sultan and was on his way back to his tent, the disguised Bu-Tahir approached with a paper in his hand, claiming it was a petition that he wanted the vizier to look at. When Nizam reached out for it, Bu-Tahir grabbed him and fatally stabbed him through the heart before being promptly subdued and killed by the vizier’s men. Although this operation had left its agent dead, it had fulfilled its purpose and had a powerful psychological effect on the Seljuks, and indeed any others who would oppose Hassan. The Ismailis had shown that they had the ability and the determination and fearlessness to silently reach out and deal death as they pleased, despite their inferior numbers and relatively small territory. Encouraged by the success of this first assassination, Hassan went about forging an elite group of individuals who could be called upon to undertake similar missions. Recruits for this new group were gathered from among Hassan’s own men, as well as the surrounding villages. The most prized traits in these potential recruits were resourcefulness, intelligence, ruthlessness, fearlessness, and religious zeal. In some cases, it is said that young boys were recruited, who could be more completely indoctrinated and trained in the ways of death. The recruits were trained in the use of various weapons, hand-to-hand combat, stealth, disguise, intelligence gathering, and psychological warfare, but the most important training they received was the the intense ideological commitment and fanaticism which was fostered within them through constant bombardment of propaganda and religiously fired up speeches. Hassan sought to make them totally obedient to him and the cause, going to great lengths to convince them that he was their one true savior, and that only by dying under his servitude would they achieve heavenly bliss. At the end of all of this training, ideally the recruit would have been transformed into a stealthy, deadly killer who was disciplined, fanatical, totally committed to his cause, not afraid to die, and ready to follow any orders given without question. Such newly forged human weapons of war were called the fidaiyn, which roughly translates to “sacrifice,” or more to the point “those who risk their lives voluntarily,” and which is typically spelled today as fedayeen. This group of assassins would then go on to be called the Hashashin, which means “followers of Hassan,” and is the word from which the English word “assassin” likely originates. Since much of the history of how this group was really trained is lost or has been tainted and clouded by the biased observations of the Crusaders, European explorers, and most notably the accounts of Marco Polo, which are probably mixed with some amount of fanciful fiction, there have been many legends that have sprung up about their training methods. For instance, it was said that the assassin recruit would be tricked into thinking they had died, only to wake up in a luxurious, opulent garden, which they would think was heaven. There Hassan would be waiting for them and the recruit would think he was some divine entity with the power to send them back to the land of the living, thus cementing their loyalty. Other stories explain that young boys spent all of their time in this garden, living in luxury until they were cast out and told that if they did not obey their master they would never return. In another tale, Hassan was said to have lowered a man into a hole in the ground with only his head showing, which was then surrounded with blood to make it seem as if he had been decapitated. The recruits were then shown the head and Hassan would appear to make the “head” speak and move, thereby proving in their minds that their master had great powers. To make it seem even more convincing, when the recruits left the room, Hassan supposedly had the cooperative person actually killed and decapitated, his head paraded about on a pole in order to show that he was really dead. It was also said that the assassins constantly smoked hashish, which you most likely know as marijuana, in order to take the edge off, make them more easily manipulated, and increase fearlessness. In fact, it is this tale that has given rise to the idea that the name Hashashin actually comes from the Arabic word hashishi, meaning “hashish users,” although this would have been very against the Muslim tradition of eschewing intoxicants. It is uncertain just how much truth any of these stories hold, but it shows how much power the Hashashin had to fire up the imagination. When they were finally sent into the field, the Hashashin, or Assassins, were extremely bold, preferring to attack targets in very public areas with a lot of bystanders, such as mosques or city streets, in order to strengthen the psychological impact of their strikes, cultivate their sinister reputation, and sow terror, although they went through great lengths to ensure that no innocent person was harmed. In fact, it was very important to them that innocents be spared and that there be no killing of those not specifically targeted. This habit of killing where many could witness the act ensured that word of mouth spread quickly and further showed everyone that the Hashashin could be anywhere at anytime. Killings were meticulous and almost always carried out with a close quarter weapon such as a dagger, and they avoided any weapons which would allow the victim to possibly escape, such as bows or poisons. This was all done with complete lack of fear, and although the Assassin would try to escape if they could, they were not afraid to die at the hands of their enemy, although they would never commit suicide. Assassinations were not always such straightforward affairs. Sometimes the Assassin would spend years learning the language and culture of the place they wished to infiltrate and getting close to their intended target, penetrating the inner circle and getting through the veil of security. To this end, they were masters of deceit and disguise, using whatever costume or cover they had to in order to patiently and inexorably get within striking distance. Blending in with their enemy, they could be peasants working the fields, soldiers, or loyal trusted servants. They could be anybody. The fact that the Hashashin were not afraid to die and that indeed, considering their high profile targets, were most certainly ensured of it, also added to the terror they invoked. It drove home the fact that there was no escape, and that anyone targeted for assassination was doomed no matter what they did. On many occasions, the Hashashin did not kill at all, but rather relied on psychological warfare, with which they were well versed. One example of this was to infiltrate the quarters of a person of prominence and leave a dagger upon their pillow, usually with a message such as “You have been warned,” “You are in our grip,” or something menacing to that effect, leaving the potential victim terrified. These sorts of terror tactics were so effective that they allowed the Hashashin to exert influence on political figures or people of prominence without having to rely upon violence at all. In other cases, an assassination would be intentionally botched, with the victim being allowed to escape an attack with just a few injuries, making them very aware that they could be killed at any time and keeping them in the constant grip of fear, sometimes with them resorting to wearing armor under their clothes or keeping bodyguards to watch over them 24 hours a day. Even then, it was never apparent where an attack might come from, and since no one knew who could be an Assassin, since even a bodyguard or trusted advisor or servant could be one, there was a good amount of paranoia. For even the most well-protected and powerful rulers, no one ever knew just which one their faithful entourage might be an Assassin waiting for word to strike. Assassination attempt on Edward I of England These terror tactics were remarkably effective, and often just a mere mention of the Hashashin was enough to keep many in line, to keep them submissive without these shadowy assassins having to do anything at all. In many cases, it became easier to just bend to their demands or forms truces with Hassan rather than face the possibility of an attack at any time. This constant threat of assassination and never-ending state of fear instilled in his enemies had a potent deterrent effect, and became a powerful bargaining chip for Hassan, allowing him to wield far more clout against far larger, more formidable enemies than his inferior numbers and relative low military might would suggest. It also ensured that far fewer lives were risked or lost than conventional military action. The list of victims targeted by the Hashashin included religious leaders, emirs, sharifs, caliphs, high ranking political or military leaders, and just about anyone else who was a potential threat to Hassan or his Ismaili faith, but this list was always changing depending on his agenda. Even the the great Muslim general Saladin faced several attempts on his life by the Hashashin. During the Crusades, the Hashashin had a tenuous relationship with the Crusaders, sometimes working for them and sometimes targeting them, whatever best aided them in maintaining the balance of power or suited their interests. In fact, some of the most famous Hashashin targets came about at this time. One well-known assassination by the Hashashin at this time was that of the Crusader military commander from northern Italy, Conrad of Montferrat, who had been elected King of Jerusalem in April of 1192. Two Hashashin disguised as monks spent 6 months getting close to him, going so far as to convert to Christianity in order to allay any suspicions, before cutting him down as he walked home from a friend’s house escorted by two knights. It has often been speculated that these Assassins had been working for one of his many Christian enemies, such as Richard the Lionheart and Henry of Champagne. Another famous assassination attempt by the Hashashin was that of Edward I of England, who was wounded by a dagger in an ultimately unsuccessful bid to end his life in 1271. The Hashashin would operate in the region and keep all of the Middle East in the grip of fear for over 125 years, under the guidance of a total of 8 grand masters. Their reign of fear was all encompassing, but all things must come to an end. Towards the beginning of the 13th century, a terrifying new power was sweeping across the land, the armies of the Mongols, under their ferocious leader Genghis Kahn, against whom the Hashashin would ultimately prove to be powerless. At first, the Hashashin had little to worry about. Although the Mongol armies were laying waste to vast swaths of central Asia between 1219 and 1223, the Hashashin remained relatively unaffected, with the Mongols’ attention focused elsewhere. However, Genghis Khan’s grandson, Mongke Khan, began to set his sights on invading Islamic territory and hoped to eventually conquer Baghdad. When the Hashashin learned of this new threat, they made an attempt to assassinate Mongke by sending a team of assassins to pose as citizens offering submission and surrender to the warlord before killing him. Things did not go according to plan. The team was turned away by the suspicious guards and the assassination was a failure. It was with this close call, in addition to word spreading to the Mongols of the deadly threat posed by the Hashashin, that they became more interested in wiping this shadowy, lethal group out. Mongke ordered his brother, Hülegü Khan, to go to Alamut and decisively destroy the Hashashin sect once and for all. In early 1256, the Mongols came at the Hashashin in their Alamut fortress with all of their might, and they were smashed under such a relentless force. The Hashashin grandmaster at the time, a Khur-Shah, who was considered to be rather weak willed compared to his predecessors, desperately tried to negotiate with the invading Mongols, offering his surrender in exchange for mercy, but the enemy did not honor this bargain and slaughtered the grandmaster in the wilds. They then went about hunting down and killing any Assassins or indeed any Ismailis they could find in a ruthless orgy of blood. The remaining Hashashin were scattered all over Asia, including India, Afghanistan, and the Himalayas, and their age ended. In the ensuing madness, the stronghold of the Hashashin, Alamut, was razed to the ground and its vast libraries and records totally destroyed, leaving us with an incomplete picture of their history and practices. Indeed when looking at the saga of the Hashashin order of assassins, its history is murky, muddied by the accounts of the Crusaders, who were largely ignorant of Muslim culture and prone to exaggeration and romanticization of the order, as well as unreliable accounts by explorers such as Marco Polo, which were exaggerated and colored to the point where it is difficult to disentangle fact from fiction. Their history remains shadowy, cloaked in legend, myths, misinformation, and misunderstanding. The dramatic notion of an outnumbered secret society of assassins causing their more powerful enemies to cower before their might with the threat of stealthy agents of death certainly lends itself to exaggeration and legend, and when looking at their history, the lack of any solid information certainly makes it difficult to get a clear picture of the reality of this shadowy group. It is easy to get caught up in the swashbuckling cinematic quality of it all. In modern times, this romantic, dramatized view of the Hashashinin can still be seen in popular culture, such as in the popular video game Assassin’s Creed. Yet for all of the misinformation and gaps in our knowledge of the Hashashin and their ways, they most certainly did exist. Perhaps the Hashashin’s legacy in the modern world can best be seen in the turmoil it faces. After all, they were the first pioneers of using terror tactics, insidious psychological warfare, the use of cells embedded within their enemies ready to strike, and suicide attacks, which can all still be seen in terrorist organizations such as Hamas, Hezbollah, and al Qaeda, although the Hashashin would have no doubt frowned upon the blatant imperiling of innocent bystanders that seems to be common practice today. The Hashashin have also proved to be the potential inspiration behind various other secret cults and societies, having a pronounced impact on how we see these secretive groups and how they operate. Author West Moore said of this in his book Disinformation: During the Crusades, the Hashshashins fought both for and against the Crusaders, whichever suited their agenda. As a result, the Crusaders brought back to Europe the Assassins’ system, which would be passed down and mimicked by numerous secret societies in the West. The Templars, the Society of Jesus, Priory de Sion, the Freemasons, the Rosicrucians, etc. all owe their organizational efficiency to Hasan. We may never have a full, clear picture of this mysterious order of assassins. The Hashashin remain just as shadowy in death as they were in life, with their myth and legend overshadowing any truths that we are able to glean from them. Now they are just a dark, romanticized footnote in history, but in their day the Hashashin were one of the most secretive, ingenious, and deadly secret orders in the world, their mere presence enough to shift the balance of power and change history, the potential for death to come for anyone at any time enough to influence politics and mold ancient Persia. They remain a fascinating account of a secret society that not only thrived, but was a powerful transforming force of history. Brent Swancer is an author and crypto expert living in Japan. Biology, nature, and cryptozoology still remain Brent Swancer’s first intellectual loves. He's written articles for MU and Daily Grail and has been a guest on Coast to Coast AM and Binnal of America.
{ "pile_set_name": "Pile-CC" }
<?php /* * This file is part of PHPExifTool. * * (c) 2012 Romain Neutron <imprec@gmail.com> * * For the full copyright and license information, please view the LICENSE * file that was distributed with this source code. */ namespace PHPExiftool\Driver\Tag\FLIR; use JMS\Serializer\Annotation\ExclusionPolicy; use PHPExiftool\Driver\AbstractTag; /** * @ExclusionPolicy("all") */ class DetectorBoard extends AbstractTag { protected $Id = 4; protected $Name = 'DetectorBoard'; protected $FullName = 'FLIR::Parts'; protected $GroupName = 'FLIR'; protected $g0 = 'MakerNotes'; protected $g1 = 'FLIR'; protected $g2 = 'Camera'; protected $Type = 'undef'; protected $Writable = false; protected $Description = 'Detector Board'; protected $flag_Permanent = true; protected $Index = 5; }
{ "pile_set_name": "Github" }
IRTA1+ monocytoid B cells in reactive lymphadenitis show a unique topographic distribution and immunophenotype and a peculiar usage and mutational pattern of IgVH genes. The origin and function of monocytoid B cells (MBCs) are poorly understood. Taking advantage of their strong expression of IRTA1 (a receptor that is also associated with MALT marginal zone B cells), we have comprehensively analysed MBCs in 25 cases of lymphadenitis of different aetiologies, shedding new light on the topographical distribution, immunophenotype and IgV(H) gene usage and mutational profile of this B cell subset. IRTA1(+) MBCs, although predominantly located in the subcapsular and intermediary sinuses, were also observed scattered within germinal centres (GCs) in all lymphadenitis cases examined. The molecular characterization of IgV(H) genes revealed that IRTA1(+) MBCs residing in different areas of the lymph node (subcapsular sinus, intermediary sinuses and GCs) can be clonally related (with intraclonal variation), and that those located in GCs are consistently more mutated and selected for expression of a functional antigen receptor than those located in the sinuses. Moreover, by contrast, IRTA1(+) MBCs in GCs express the memory B cell marker CD27. Finally, in toxoplasmic lymphadenitis, the IRTA1(+) MBC population shows a highly preferential usage of the V(H) genes 3-7 and 3-30 (without any obvious peculiarity in their CDR3s), possibly suggesting that a superantigen expressed by Toxoplasma gondii may be involved in the early activation of this B cell subset.
{ "pile_set_name": "PubMed Abstracts" }
Sally Mann Sally Mann HonFRPS (born May 1, 1951) is an American photographer, widely known for her large-format, black-and-white photographs—at first of her young children, then later of landscapes suggesting decay and death. Early life and education Born in Lexington, Virginia, Mann was the third of three children. Her father, Robert S. Munger, was a general practitioner, and her mother, Elizabeth Evans Munger, ran the bookstore at Washington and Lee University in Lexington. Mann was raised by an atheist and compassionate father who allowed Mann to be "benignly neglected". Mann was introduced to photography by her father, who encouraged her interest in photography; his 5x7 camera became the basis of her use of large format cameras today. Mann began to photograph when she was sixteen. Most of her photographs and writings are tied to Lexington, Virginia. Mann graduated from The Putney School in 1969, and attended Bennington College and Friends World College. She earned a BA, summa cum laude, from Hollins College (now Hollins University) in 1974 and a MA in creative writing in 1975. She took up photography at Putney where, she claims, her motive was to be alone in the darkroom with her boyfriend. She made her photographic debut at Putney with an image of a nude classmate. Mann has never had any formal training in photography and she "never read[s] about photography". Early career After graduation from Hollins College, Mann worked as a photographer at Washington and Lee University. In the mid-1970s she photographed the construction of its new law school building, the Lewis Hall (now the Sydney Lewis Hall), leading to her first solo exhibition in late 1977 at the Corcoran Gallery of Art in Washington, DC The Corcoran Gallery of Art published a catalogue of Mann's images titled "The Lewis Law Portfolio". Some of those surrealistic images were also included as part of her first book, Second Sight, published in 1984. While Mann explored a variety of genres as she was maturing in the 1970s, she truly found her trade with her book, At Twelve: Portraits of Young Women (Aperture, 1988). In 1995, she was featured in an issue of "Aperture". On Location with: Henri Cartier-Bresson, Graciela Iturbide, Barbara Kruger, Sally Mann, Andres Serrano, Clarissa Sligh" which was illustrated with photographs. At Twelve: Portraits of Young Women Her second collection, At Twelve: Portraits of Young Women, published in 1988, stimulated minor controversy. The images “captured the confusing emotions and developing identities of adolescent girls [and the] expressive printing style lent a dramatic and brooding mood to all of her images”. In the preface to the book, Ann Beattie says “when a girl is twelve years old, she often wants – or says she wants – less involvement with adults. […] [it is] a time in which the girls yearn for freedom and adults feel their own grip on things becoming a little tenuous, as they realize that they have to let their children go.” Beattie says that Mann's photographs don't “glamorize the world, but they don’t make it into something more unpleasant than it is, either”. The girls photographed in this series are shown “vulnerable in their youthfulness” but Mann instead focuses on the strength that the girls possess. In one image from the book (shown to the right), Mann says that the young girl was extremely reluctant to stand closer to her mother's boyfriend. Mann said that she thought it was strange because “it was their peculiar familiarity that had provoked this photograph in the first place”. Mann didn't want to crop out the girl's elbow but the girl refused to move in closer. According to Mann, the girl's mother shot her boyfriend in the face with a .22 several months later. In court the mother “testified that while she worked nights at a local truck stop he was ‘at home partying and harassing my daughter.’” Mann said “the child put it to me somewhat more directly”. Mann says that she now looks at this photograph with “a jaggy chill of realization”. Immediate Family and controversy Mann is widely known for Immediate Family, her third collection, first exhibited in 1990 by Edwynn Houk Gallery in Chicago and published as a monograph in 1992. The New York Times said, “Probably no photographer in history has enjoyed such a burst of success in the art world”. The book consists of 65 black-and-white photographs of her three children, all under the age of 10. Many of the pictures were taken at the family's remote summer cabin along the river, where the children played and swam in the nude. Many explore typical childhood themes (skinny dipping, reading the funnies, dressing up, vamping, napping, playing board games) but others touch on darker themes such as insecurity, loneliness, injury, sexuality and death. The controversy on its release was intense, including accusations of child pornography (both in America and abroad) and of contrived fiction with constructed tableaux. One of her detractors, Pat Robertson of the Christian Broadcasting Network, has said that “selling photographs of children in their nakedness for profit is an exploitation of the parental role and I think it’s wrong”. He views such work as a violation of the responsibility of parents to do everything in their power to protect, shelter, and nurture their children. More negative criticism came from Raymond Sokolov's article Critique: Censoring Virginia in the Wall Street Journal. He questioned whether children should be photographed nude and whether federal funds should be appropriated for such artworks. Accompanying his article was a modified image by Mann of her daughter Virginia (Virginia at 4), in which her eyes, nipples, and pubic region were now covered with black bars. Mann said he used the image without permission “to illustrate that this is the kind of thing that shouldn’t be shown”. Mann claimed that after Virginia saw the article, she started touching herself on the areas that were blacked out, saying, “what’s wrong with me?” Mann responded to the criticisms saying she did not plan the photographs and that when she was young, she was often nude, so she raised her children similarly. Many of her other photographs containing her nude or hurt children caused controversy. For example, in The Perfect Tomato, the viewer sees a nude Jessie, posing on a picnic table outside, bathed in light. Jessie told Steven Cantor during the filming of one of his movies that she had just been playing around and her mother told her to freeze, and she tried to capture the image in a rush because the sun was setting. This explains why everything is blurred except for the tomato, hence the photograph's title. This image was likely criticized for Jessie's nudity and presentation of the adolescent female form. While Jessie was aware of this photograph, Dana Cox, in her essay, said that the Mann children were probably unaware of the other photographs being taken as Mann's children were often naked because “it came natural to them”. This habit of nudity is a family thing because Mann says she used to walk around her house naked when she was growing up. Cox states that “the own artist’s childhood is reflected in the way she captures moments in her children’s lives”. One image that deals more with another aspect of childhood besides "naked play", Jessie's Cut, shows Jessie's head, wrapped in what appears to be plastic, with blood running down the side of her face from the cut above her left eye. The cut is stitched and the blood is dry and stains her skin. As painful as the image looks, there are a great number of viewers who could relate to Jessie when they think about the broken bones and stitched up cuts they had during childhood. Mann herself considered these photographs to be “natural through the eyes of a mother, since she has seen her children in every state: happy, sad, playful, sick, bloodied, angry and even naked”. Critics agreed, saying her “vision in large measure [is] accurate, and a welcome corrective to familiar notions of youth as a time of unalloyed sweetness and innocence”, and that the book “created a place that looked like Eden, then cast upon it the subdued and shifting light of nostalgia, sexuality and death".<ref>Lyle Rexer, “Art/Architecture; Marriage Under Glass: Intimate Exposures”, ‘’The New York Times, November 10, 2000. ART/ARCHITECTURE - Marriage Under Glass - Intimate Exposures - NYTimes.com</ref> When Time magazine named her “America’s Best Photographer” in 2001, it wrote: Mann recorded a combination of spontaneous and carefully arranged moments of childhood repose and revealingly — sometimes unnervingly — imaginative play. What the outraged critics of her child nudes failed to grant was the patent devotion involved throughout the project and the delighted complicity of her son and daughters in so many of the solemn or playful events. No other collection of family photographs is remotely like it, in both its naked candor and the fervor of its maternal curiosity and care.The New Republic considered it "one of the great photograph books of our time". Despite the controversy, Mann was never charged with the taking or selling of child pornography, even though, according to Edward de Grazia, law professor and civil liberties expert, “any federal prosecutor anywhere in the country could bring a case against [Mann] in Virginia, and not only seize her photos, her equipment, her Rolodexes, but also seize her children for psychiatric and physical examination”. Before she published Immediate Family, she consulted a Virginian federal prosecutor who told her that some of the images she was exhibiting could have her arrested. In 1991, she initially decided to postpone the publication of the book. In an interview with New York Times reporter, Richard Woodward, she said “I thought the book could wait 10 years, when the kids won’t be living in the same bodies. They’ll have matured and they’ll understand the implications of the pictures. I unilaterally decided.” The children apparently did not like this decision and Mann and her husband arranged for Emmett and Jessie to talk to a psychologist to be sure their feelings were honest, and so that they understood what the publication would do. Each child was then allowed to vote on which photographs were to be put in the book. To further protect the children from “teasing”, Mann told Woodward that she wanted to keep copies of Immediate Family out of their home town of Lexington. She asked bookstores in the area not to sell it and for libraries to keep it in their rare-book rooms. Dr. Aaron Esman, a child psychiatrist at the Payne Whitney Clinic believes that Mann is serious about her work and that she has “no intention to jeopardize her children or use them for pornographic images”. He says that the nude photographs don't appear to be erotically stimulating to anyone but a “case-hardened pedophile or a rather dogmatic religious fundamentalist”. Mann stated, "I didn't expect the controversy over the pictures of my children. I was just a mother photographing her children as they were growing up. I was exploring different subjects with them." Her fourth book, Still Time, published in 1994, was based on the catalogue of a traveling exhibition that included more than 20 years of her photography. The 60 images included more photographs of her children, but also earlier landscapes with color and abstract photographs. Later career In the mid-1990s, Mann began photographing landscapes on wet plate collodion 8x10 inch glass negatives, and used the same 100 year-old 8x10 format bellows view camera that she had used for all the previous bodies of work. These landscapes were first seen in Still Time, and later featured in two shows presented by the Edwynn Houk Gallery in NYC: Sally Mann – Mother Land: Recent Landscapes of Georgia and Virginia in 1997, and then in Deep South: Landscapes of Louisiana and Mississippi in 1999. Many of these large (40"x50") black-and-white and manipulated prints were taken using the 19th century “wet plate” process, or collodion, in which glass plates are coated with collodion, dipped in silver nitrate, and exposed while still wet. This gave the photographs what the New York Times called “a swirling, ethereal image with a center of preternatural clarity", and showed many flaws and artifacts, some from the process and some introduced by Mann. Filmmaker Steven Cantor directed two films about Mann's life: Blood Ties: The Life and Work of Sally Mann (1994) was nominated for an Oscar for best documentary short, and What Remains: The Life and Work of Sally Mann premiered on television in 2007. Mann uses antique view cameras from the early 1890s. These cameras have wooden frames, accordion-like bellows and long lenses made out of brass, now held together by tape that has mold growing inside. This sort of camera, when used with vintage lenses, softens the light, which makes the pictures timeless. Mann's fifth book, What Remains, published in 2003, is based on the show of the same name at the Corcoran Gallery in Washington, DC. The book is broken up into four sections: Matter Lent, December 8, 2000, Antietam, and What Remains. The first section contains photographs of the remains of Eva, her greyhound, after decomposition, along with the photographs of dead and decomposing bodies at a federal forensic anthropology facility (known as the ‘body farm’). The second part details the site on her property where an armed escaped convict was killed in a shootout with police. The third part is a study of the grounds of Antietam, the site of the bloodiest single day battle in American history during the Civil War. The fourth part is a study of close-up faces of her children. Thus, this study of mortality, decay and death ends with hope and love. Mann's sixth book, Deep South, published in 2005, with 65 black-and-white images, includes landscapes taken from 1992 to 2004 using both conventional 8x10 film and wet plate collodion. These photographs have been described as “haunted landscapes of the south, battlefields, decaying mansion, kudzu shrouded landscapes and the site where Emmett Till was murdered". Newsweek picked it as their book choice for the holiday season, saying that Mann “walks right up to every Southern stereotype in the book and subtly demolishes each in its turn by creating indelibly disturbing images that hover somewhere between document and dream". Mann's seventh book, Proud Flesh, published in 2009, is a study taken over six years of the effects of muscular dystrophy on her husband Larry Mann. Mann photographed her husband using the collodion wet plate process As she notes, "The results of this rare reversal of photographic roles are candid, extraordinarily wrenching and touchingly frank portraits of a man at his most vulnerable moment." The project was displayed in Gagosian Gallery in October 2009. Mann's eighth book, The Flesh and The Spirit, published in 2010, was released in conjunction with a comprehensive show at the Virginia Museum of Fine Arts in Richmond, Virginia. Regarding this exhibition, the museum director stated, "She follows her own voice. Her pictures are imbued with an amazing degree of soul." Though not strictly a retrospective, this 200-page book included new and recent work (unpublished self-portraits, landscapes, images of her husband, her children's faces, and of the dead at a forensic institute) as well as early works (unpublished color photographs of her children in the 1990s, color Polaroids, and platinum prints from the 1970s). Its unifying theme is the body, with its vagaries of illnesses and death, and includes essays by John Ravenal, David Levi Strauss, and Anne Wilkes Tucker. In May 2011 she delivered the three-day Massey Lecture Series at Harvard. In June 2011, Mann sat down with one of her contemporaries, Nan Goldin, at Look3 Charlottesville Festival of the Photograph. The two photographers discussed their respective careers, particularly the ways in which photographing personal lives became a source of professional controversy. This was followed by an appearance at the University of Michigan as part of the Penny W. Stamps lecture series. Mann's ninth book, Hold Still: A Memoir with Photographs, released May 12, 2015, is a melding of a memoir of her youth, an examination of some major influences of her life, and reflections on how photography shapes one's view of the world. It is augmented with numerous photographs, letters, and other memorabilia. She singles out her "near-feral" childhood and her subsequent introduction to photography at Putney, her relationship to her husband of 40 years and his parent's mysterious death, and her maternal Welsh relative's nostalgia for land morphing into her love for her land in the Shenandoah Valley, as some of her important influences. Gee-Gee, a black woman who was a surrogate parent, who opened Mann's eyes to race relations and exploitation, her relationship with local artist Cy Twombly, and her father's genteel southern legacy and his eventual death are also examined. The New York Times described it as "an instant classic among Southern memoirs of the last 50 years". An article by Mann adapted from this book appeared with photographs in The New York Times Magazine in April 2015. Hold Still was a finalist for the 2015 National Book Award. Mann's tenth book, Remembered Light: Cy Twombly in Lexington was published in 2016. It is an insider's photographic view of Cy Twombly's studio in Lexington. It was published concurrently with an exhibit of color and black-and-white photographs at the Gagosian Gallery. It shows the overflow of Twombly's general modus operandi: the leftovers, smears, and stains, or, as Simon Schama said in his essay at the start of the book, "an absence turned into a presence". Mann's eleventh book, Sally Mann: A Thousand Crossings, authored by Sarah Greenough and Sarah Kennel, is a large (320 pages) compendium of works spanning 40 years, with 230 photographs by Mann. It served as a catalog for an exhibit at the National Gallery of Art entitled Sally Mann: A Thousand Crossings which opened March 4, 2018 and was the first major survey of the artist's work to travel internationally. In her recent projects, Mann has started exploring the issues of race and legacy of slavery that were a central theme of her memoir Hold Still. They include a series of portraits of black men, all made during one-hour sessions in the studio with models not previously known to her. Mann was inspired by Bill T. Jones' use of the Walt Whitman 1856 poem "Poem of the Body" in his art, and Mann "borrowed the idea, using the poem as a template for [her] own exploration". Several pictures from this body of work were highlighted in Aperture Foundation magazine in the summer of 2016. and they also appeared in A Thousand Crossings. This book and exhibit also introduced a series of photographs of African American historic churches photographed on expired film, and a series of tintype photographs of a swamp that served as refuge for escaped slaves. Some critics see in Mann's work a deep working through of the legacy of white violence in the South, while others have voiced concern that Mann's work at times repeats rather than critiques tropes of white domination and violence in the American southeast. Personal life Mann, born and raised in Virginia, is the daughter of Robert Munger and Elizabeth Munger. In Mann's introduction for her book Immediate Family, she "expresses stronger memories for the black woman, Virginia Carter, who oversaw her upbringing than for her own mother". Elizabeth Munger was not a big part of Mann's life, and Elizabeth said “Sally may look like me, but inside she’s her father’s child.” Virginia (Gee-Gee) Carter, born in 1894, raised Mann and her two brothers and was an admirable woman. “Left with six children and a public education system for which she paid taxes but which forbade classes for black children beyond the seventh grade, Gee-Gee managed somehow to send each of them to out-of-state boarding schools and, ultimately, to college.” Virginia Carter died in 1994. In 1969 Sally met Larry Mann, and in 1970 they married. Larry Mann is an attorney and, before practicing law, he was a blacksmith. Larry was diagnosed with muscular dystrophy around 1996. They live together in their home which they built on Sally's family's farm in Lexington, Virginia. They have three children together: Emmett (b.1979), who took his own life in 2016, after a life-threatening car collision and a subsequent battle with schizophrenia, and who for a time served in the Peace Corps; Jessie (b.1981), who herself is an artist and was a candidate for an advanced degree in neurobiology, and whose heroes include Helen Keller, Martin Luther King Jr, and Madonna; and Virginia (b.1985), now a lawyer. She is passionate about endurance horse racing. In 2006, her Arabian horse ruptured an aneurysm while she was riding him. In the horse's death throes, Mann was thrown to the ground, the horse rolled over her, and the impact broke her back. It took her two years to recover from the accident and during this time, she made a series of ambrotype self-portraits. These self-portraits were on view for the first time in November 2010 at the Virginia Museum of Fine Arts as a part of Sally Mann: the Flesh and the Spirit. Recognition Her works are included in the permanent collections of the Metropolitan Museum of Art, the National Gallery of Art, the Hirshhorn Museum and Sculpture Garden, the Museum of Fine Arts, in Boston, the San Francisco Museum of Modern Art, and the Whitney Museum of New York City among many others. Time magazine named Mann "America's Best Photographer" in 2001. Photos she took have appeared on the cover of The New York Times Magazine twice: first, a picture of her three children for the September 27, 1992 issue with a feature article on her "disturbing work", and again on September 9. 2001, with a self-portrait (which also included her two daughters) for a theme issue on "Women Looking at Women". Mann has been the subject of two film documentaries. The first, Blood Ties, was directed by Steve Cantor, debuted at the 1994 Sundance Film Festival, and was nominated for an Academy Award as Best Documentary Short. The second, What Remains was also directed by Steve Cantor. It premiered at the 2006 Sundance Film Festival and was nominated for an Emmy for Best Documentary in 2008. In her New York Times review of the film, Ginia Bellafante wrote, "It is one of the most exquisitely intimate portraits not only of an artist’s process, but also of a marriage and a life, to appear on television in recent memory." Mann received an honorary Doctor of Fine Arts degree from the Corcoran College of Art + Design in May 2006. The Royal Photographic Society (UK) awarded her an Honorary Fellowship in 2012. Mann won the 2016 Andrew Carnegie Medal for Excellence in Nonfiction for Hold Still: A Memoir in Photographs. Publications Books At Twelve: Portraits of Young Women. Aperture, New York, 1988. Immediate Family. Aperture, New York, 1992. Still Time. Aperture, New York, 1994. Sally Mann (2005), 21st Editions, South Dennis, MA (edition of 110) Sally Mann: Proud Flesh. Aperture Press; Gagosian Gallery, New York City, NY, 2009. Southern Landscape (2013), 21st Editions, South Dennis, MA (edition of 58) Exhibition catalogues The Lewis Law Portfolio, at Corcoran Gallery of Art, Washington DC, 1977 Sweet Silent Thought, at the North Carolina Center for Creative Photography, Durham, NC, 1987 Still Time, at the Allegheny Highland Arts and Crafts Center, Clifton Forge, VA, 1988 Mother Land, at the Edwynn Houk Gallery, New York City, NY, 1997 Sally Mann, at the Gagosian Gallery, New York City, NY, 2006 Sally Mann: Deep South/Battlefields, at the Kulturhuset, Stockholm, Sweden, 2007 Collections Ferdinand Protzman, Landscape: Photographs of time and Place. National Geographic, 2003. R. H. Cravens, Photography Past/Forward: Aperture at 50. Aperture Press, 2005. Other Film and television Blood Ties: The Life and Work of Sally Mann. Directed by Steven Cantor and Peter Spirer. Moving Target Productions. 30 minutes, color, DVD. Nomination for an Academy Award for Best Documentary: Short Subject (1992) "Giving Up the Ghost". Egg, The Arts Show. Produced by Thirteen/WNET, New York. “Place”. Episode One. Art 21- Directed by Catherine Tatge, Art in the Twenty-First Century, PBS Broadcasting, Virginia. 14 minutes. Color. DVD. (2002) What Remains: The Life and Work of Sally Mann. Directed by Steven Cantor. Zeitgeist Films, New York. 80 minutes, color, DVD. (2004). Winner of Best Documentary. Jacksonville Film Festival. Won Grand Jury Prize for Best Documentary Film. Nantucket Film Festival Won Best Storytelling in Documentary Film. Nantucket Film Festival Official Selection. Sundance Film Festival New York Loves Film Documentary Award. Tribeca Film Festival. (2006) "Some Things Are Private". Playwrights Deborah Salem Smith, Laura Kepley. Trinity Repertory Theatre, Dowling Theater. Providence, RI. (2008) "The Genius of Photography: We Are Family". Episode 6. BBC Four Productions, Wall to Wall Media Ltd. (2008) "Thalia Book Club: Sally Mann Hold Still". Ann Patchett, Symphony Space (13 May 2015) References External links The main works of Mann Biography, interviews, essays, artwork images and video clips from PBS series Art:21 - Art in the 21st Century, Season One (2001). TV interview with Charlie Rose in 2016 21st Photography Platinum Series'' by Sally Mann, a Lucie Award Winner in 2005 Sally Mann Exhibition at Gagosian Gallery Links to sites with her photographs: Link to some pictures from Immediate Family Link to more Sally Mann pictures Immediate Family and Landscape images at Strother Fine Arts Links to sites about the documentaries: Category:Portrait photographers Category:Nude photography Category:1951 births Category:Living people Category:American women photographers Category:Guggenheim Fellows Category:Bennington College alumni Category:Hollins University alumni Category:People from Lexington, Virginia Category:The Putney School alumni Category:20th-century American photographers Category:21st-century American photographers Category:20th-century American writers Category:21st-century American writers Category:20th-century American women artists Category:21st-century American women artists Category:20th-century women writers Category:21st-century women writers Category:Photographers from Virginia
{ "pile_set_name": "Wikipedia (en)" }
George William Dimotakis April 9, 1933 – December 31, 2013 / George William Dimotakis, 80, of Manteca, passed away peacefully in his home on December 31, 2013. He was born in Santa Cruz in 1933, and moved with his family to Manteca in 1938. He was a 1951 graduate of Manteca High School and enlisted in the U.S. Air Force on March 25, 1952. George was actively involved in farming for 60 years. He was fondly called “Theo Georgie” by his relatives. George is preceded in death by his father and mother, William and Mary Dimotakis; his brothers Nick and Leftare, and his sisters Despina Xirakis, Alpena Makis, Rae Calimeris, Katherine Nicolozakis, Virginia Skandalis, and Esther Rundell Peterson. He is survived by his loving wife of 42 years, Jonnie, twin daughters Stefanie and Esther Dimotakis, sons George Dimotakis, Jr. and Charles Dimotakis, and numerous nieces and nephews. A public viewing will be held on Tuesday, January 7, 2014 from 4-7 p.m., and a private graveside service will be held on Wednesday, January 8, 2014 from 1-2 p.m., both at Park View Cemetery in Manteca. A celebration of life will be held at the Dimotakis Family Farm, immediately following the graveside service.
{ "pile_set_name": "Pile-CC" }
Q: vector::erase(remove(....)) is not working I came up with a program #include <vector> #include <algorithm> using namespace std; int main() { vector<int> a = {1,2,3,7,1,5,4}; vector<int> b = {6,7,4,3,3,1,7}; a.erase(remove(a.begin(),a.end(),a[0]),a.end()); b.erase(remove(b.begin(),b.end(),b[0]),b.end()); return 1; } For this specific example, my GNU gdb Ubuntu states that at return 1 line: a = {2,3,7,1,5,4} which is not expected (only deletes one 1), and b = {7,4,3,3,1} which is not expected. My expectation is a and b should be a=2,3,7,5,4 and b=7,4,3,3,1,7. What's going on here? A: std::remove takes the third argument by reference and it invalidates references into the range it works on (in the sense that it shifts stuff around and thus changes values of elements in the range). The problem is that you change a[0], the reference argument, during the call, which you must not do. To fix this, pass a copy instead: a.erase(remove(a.begin(),a.end(),int{a[0]}),a.end());
{ "pile_set_name": "StackExchange" }
Various tumors express oligosaccharide sequences which are different from the non-malignant glycosylation of the same cell or tissue type. Examples of the known or speculated cancer associated oligosaccharide structures include: glycolipid structures such as globo-H (Fucα2Galβ3GalNAcβ3Galα4LacβCer), gangliosides: GM1 Galβ3GalNAcβ4(NeuNAcα3)LacβCer or GD2 GalNAcβ4(NeuNAcα8NeuNAcα3)LacβCer; Lewis-type fucosylated structures such as Lewis a and x: Galβ3/4(Fucα4/3)GlcNAc, Lewis y: Fucα2Galβ4(Fucα3)GlcNAc, sialyl-Lewis x: NeuNAcα3Galβ4(Fucα3)GlcNAc, and some combinations of these on polylactosamine chains; O-glycan core structures, such as T-antigen Galβ3GalNAcαSer/Thr-Protein, Tn-antigen GalNAcαSer/Thr-Protein or sialyl Tn-antigen NeuNAcα6GalNAcαSer/Thr-Protein. Presence of non-human structures such as N-glycolyl-neuraminic acid in cancers has also been indicated. Association and specificity of oligosaccharide structures with regard to cancers have been well established only in few cases, some of the structures are present in normal cells and tissues and are possibly only more concentrated in cancers. One report has indicated that structures with terminal GlcNAcβ3Galβ4GlcNAc sequence are present in human leukaemia cells (Hu et al., 1994). The structures may also be equally present on normal leukocytes. Thus, the relation of the finding to glycosylation patterns generally present in solid tumors was not indicated. This type of saccharide structures may be a part of rare normal glycosylations of human tissues: GlcNAcβ3Galβ4GlcNAcβ6 sequence linked on O-glycans is probably present on human gastric mucin. A study shows that a monoclonal antibody recognizing GlcNAcβ3Galβ4GlcNAcβ6 sequence may possibly recognize similar structures on malignant tissues, such as mucinous ovarian neoplasms, pseudopyloric metaplasia of gallbladder and pancreatic epithelia, gastric differentiated carcinoma of stomach, gallbladder and pancreas, and on non-malignant tissues, such as human amniotic fluid, but, however, the structures from malignant tissues were not characterized (Hanisch et al., 1993). The antibody did not recognize neoglycolipid structure GlcNAcβ3Galβ4GlcNAcβ3Galβ4 nor carcinomas of lung, colorectum, endometrium or other organs. Another monoclonal antibody raised against testicular cells probably recognizes branched N-acetyllactosamines such as GlcNAcβ3(GlcNAcβ6)Galβ4GlcNAc- (Symington et al., 1984). Terminal GlcNAc has also been reported from mucins of human foetal mucin (Hounsell et al., 1989). In normal tissues terminal GlcNAc may be present in minor amounts as biosynthetic intermediates in the biosynthesis of poly-N-acetyllactosamines. Several monoclonal antibodies has been raised against a semisynthetic glycolipid GlcNAcβ3Galβ4GlcNAcβ3LacβCer, these antibodies were shown to recognize glycolipids from cultured colon cancer cell lines and tumors (Holmes et al., 1991). However, the antibodies recognized several structures and the binding data was contradictory. Moreover the glycolipids were not recognized by all of the antibodies and the glycolipid structures from cancer cells or tumors were not characterized. Therefore the presence of terminal GlcNAc structures on tumors were not established. Another study showed production of a monoclonal antibody against GlcNAcβ3LacβCer (Nakamura et al., 1993). This antibody also weakly recognized the pentasaccharide structure described above. Moreover, the antibody recognized a protease sensitive epitope on COS-1 cells, which cell line is not of human origin. The immunization protocols of these studies did not describe induced antibody responses against polyvalent conjugates of the saccharides, but immunization by glycolipids. Normally there are large amounts of antibodies recognizing terminal GlcNAc structures in human serum. There are also a class of natural antibodies recognizing terminal Galα3Galβ4GlcNAc- structures. The Galα antigen is not naturally present in man and recently it was also shown that the natural antibodies bind structures such as GalNAcα3Galβ4GlcNAc, GalNAcβ3Galβ4GlcNAc, and GlcNAcβ3Galβ4GlcNAc (Teneberg et al., 1996). The X2-structure, GalNAcβ3Galβ4GlcNAc, is a normal antigen on human tissues and structures GalNAcα3Galβ4GlcNAc and Galα3Galβ4GlcNAc have not been described from normal or cancer tissues. Thus, the present finding that the terminal GlcNAc structure is a tumor antigen indicates that the actual function of the natural antibodies might be the prevention of cancers having terminal GlcNAc structures. The following patents describe cancer antigens and their use for making antibodies for therapeutic and diagnostic uses and for cancer vaccines. The antigen structures are not related to saccharides of the present invention: Cancer vaccines: U.S. Pat. Nos. 5,102,663; 5,660,834; 5,747,048; 5,229,289 and 6,083,929. Therapeutic antibodies: U.S. Pat. Nos. 4,851,511; 4,904,596; 5,874,060; 6,025,481 and 5,795,961. Diagnostics: U.S. Pat. Nos. 4,725,557; 5,059,520; 5,171,667; 5,173,292; 6,090,789; 5,708,163; 5,679,769; 5,543,505; 5,902,725 and 6,203,999. In the prior art tumor diagnostic and therapeutic antibodies recognizing chitobiose-mannose trisaccharides has been described in DE 38 07 594 A1. The application also describes other N-glycans with numerous varying terminal structures some of which may also comprise non-reducing terminal N-acetyl glucosamine. Several of the desired structures have been later characterized as normal glycans and not cancer specific structures. The application claims to describe structures useful for cancer applications. However, it is not quite clear from the application what the structures of desired glycan are. It is indicated that the GlcNAc residues can be α2, α4, or α6-linked. The present invention is not directed to such unusual structures. Another patent application WO 00/21552 claims several unusual O-glycan structures isolated from bovine submaxillary mucin. Some of the structures such as GlcNAcβ6GalNAcα6GalNAc and GalNAcβ3(GlcNAcβ6)GalNAc comprise terminal GlcNAc-residues. Present invention is not directed to these structures comprising two GalNAc-residues. The application contains speculation about potential therapeutic use of the structures as antigens related to cancer. It has not been shown that the structures are related to bovine cancer but the structures are present in bovine normal submaxillary secretion. Moreover, it is even less probable that the structures would be present in human tissues, as the glycosylations are species specific and vary between human and bovine, so that glycosyltransferase and glycosylation profiles are different in bovine and human. The human genome is also known and glycosyltransferases which could be related to synthesis of the claimed bovine structures has not been produced and characterized. So far none of the six novel glycosyltransferases claimed has been described from human, or human cancer (nor from bovine cancer). Moreover, any bovine glycosylations has not been found from human salivary mucins which have been carefully characterized.
{ "pile_set_name": "USPTO Backgrounds" }
In fact it’s been a week since my previous blog post. We’ve had the total lunar eclipse last Wednesday and observations from Hanoi were not so much disappointing, despite the inherent urban light pollution. In my case I was observing from the rooftop of our house in Dao Tan, Hanoi located close to the Lotte shopping center and didn’t manage to spot the totality of this eclipse due to aforementioned reasons. Therefore I was waiting on the rooftop as sun was setting and scrutinizing the surrounding with my pair of binoculars. Although the Moon was not seen in the sky at the times when it was supposed to be above the horizon, I was still waiting to to encounter the remaining part of this amazing natural phenomenon. Clock was ticking and it passed the threshold 18:22h -local time, when the full phase of the eclipse was supposed to end and there was yet no sign of Moon. As I mentioned before the urban city lights contributed to create atmospheric fog and block the torrents of photons that were being reflected from Moon. Then the skyscrapers in the city added to that by disguising the horizon and making it almost impossible to detect Moon as it slowly rose above the horizon. Soon afterwards, around 18:30h- local time, Moon began to be seen and that kept me busy for a while. I’m sharing herewith some photos that I managed to capture during the remainder of this lunar eclipse. Please mind the quality of the photos as they’ve been taken by my mere iPhone which is not the best type of device for this kind of activity. 18:36h 18:43h Above : As the eclipse begins to be seen.. notice the light pollution. 18:36h 18:38h 18:55h 18:59h 19:08h Above : Some snaps taken during the course of the partial eclipse. Please note that some of them have different scales and hence the dimensions are not necessarily the same. 2 commentaires Cool photos Desh! The eclipse wasn’t visible in Europe so I missed it, but I have a friend living in Timor-Leste. She said the streets went crazy for it, the folk banging and clanging around to remind God they’re alive. 😀
{ "pile_set_name": "Pile-CC" }
Gira language Madi, or Gira (Girara), is one of the Finisterre languages of Papua New Guinea. References Bibliography A brief overview of the Gira language is found on p. 50. Category:Finisterre languages Category:Languages of Papua New Guinea Category:Languages of Madang Province
{ "pile_set_name": "Wikipedia (en)" }
Computer networking in an ambulatory health care setting. Computers are a ubiquitous part of the ambulatory health care environment. Although stand-alone computers may be adequate for a small practice, networked computers can create much more powerful and cost-effective computerized systems. Local area networks allow groups of computers to share peripheral devices and computerized information within an office or cluster of offices. Wide area networks allow computers to securely share devices and information across a large geographical area. Either singly or in combination, these networks can be used to create robust systems to help physicians automate their practices and improve their access to important clinical information. In this article, we will examine common network configurations, explain how they function, and provide examples of real-world implementations of networking technology in health care.
{ "pile_set_name": "PubMed Abstracts" }
Canada is lagging behind in combating right-wing extremism. Recent intelligence efforts and new funding to study right-wing groups is not enough, experts argue. The government needs to move beyond just researching groups — and quickly. “Extremism and extremist sentiment is being normalized in mainstream media, language and communication, and it’s being normalized into children’s lives” “Extremism and extremist sentiment is being normalized in mainstream media, language and communication, and it’s being normalized into children’s lives,” said Candyce Kelshall, president of the Vancouver branch of the Canadian Association for Security and Intelligence Studies, one of relatively few groups of researchers tracking the growth of the far right in Canada “That’s something we haven’t seen since the KKK or national socialism.” Right-wing attacks, protests and groups have become increasingly common in recent years, gaining visibility in media and in mainstream society. The far right resists easy political or organizational definition, though, which is what makes it dangerous, Kelshall said. Recently, the Canadian government added neo-Nazi network Blood & Honour and its militant wing, Combat 18, to its official list of terror groups. But these types of groups are often decentralized, functioning more as movements than formal terrorist organizations, and often reform and rebrand at unusual speeds to avoid detection. “We understand organized crime. We understand groups like the Hells Angels. We understand terrorist groups,” said Kelshall. “We look for hierarchical connections, communication, evidence people have gone over for training, and that’s how we classify actions we would consider to be terrorist.” Social media fuels spread of extremism The federal government’s 2018 Public Report on the Terrorist Threat to Canada describes right-wing extremism as “sporadic and opportunistic” — the same language used in 2017’s report. “CSIS continues to engage government and law enforcement partners on the right-wing extremism landscape and emerging threats and continues to provide extensive analytical advice,” wrote CSIS spokesperson John Townsend in an email, using language directly taken from the 2018 report. “CSIS has increased its posture to gain a better understanding of the landscape in Canada, gain insight into the key players and assess the nature of the current threat environment.” 44 per cent of Canadians now see the far right as the biggest threat to national security, more than any other movement. But a January 2019 CSIS report obtained through freedom of information requests includes an international assessment of right-wing extremism, acknowledging “identifying links” between European, American and Canadian movements formed by social media. “Social media is transnational by nature and allows individuals and groups from around the world to share their extreme right-wing views,” reads the assessment. “Several studies analyzing social networks demonstrate the ease by which European and American extreme right-wing content is consumed by like-minded Canadians.” In some cases, lone actors are inspired by greater movements even though they may not be an official member of a far-right group, like the perpetrator of the 2017 Quebec mosque shootings. Reports in the Globe and Mail and VICE have revealed that Bryer Schmegelsky, one of two wanted young men linked to a series of murders in northern B.C., owned Nazi flags and symbols. The exact nature of his motivations, however, remains unclear at this time. A Mainstreet Poll found 44 per cent of Canadians now see the far right as the biggest threat to national security, more than any other movement. However, many experts in the field say that public response is lagging. Canada’s response still in the research phase The 2018 budget earmarked $23 million in funding for Canadian Heritage to “support cross-country consultations on a new national anti-racism approach” in response to “the rise of ultranationalist movements, and protests against immigration, visible minorities and religious minorities.” Earlier this year, Public Safety Canada announced it would give $366,985 to Dr. Barbara Perry and Dr. Ryan Scrivens of the University of Ontario Institute of Technology to assess the number and membership of far-right groups in Canada. In 2015, they estimated there were well over a hundred. Experts say this funding is inadequate, and isn’t yet applied towards actual security measures. “Almost all the funding is in jihadism and countering that terrorism.” said Kelshall. “There’s virtually no funding, with the exception of the recent money, invested by public safety. And that’s it.” “Almost all the funding is in jihadism and countering that terrorism. There’s virtually no funding ... invested by public safety.” They also point out ties between anti-hate organizations and law enforcement are often non-existent. “Our relationship with them is we provide them with information, and we just hope they act on it,” said Evan Balgord, executive director of the Canadian Anti-Hate Network. “It’s completely opaque.” Balgord said some activists are frustrated with local police, who they see as relatively inactive. “The impression among the anti-racist community is that they’re not doing anything,” he said. “When it comes to proactively monitoring those hate groups, in general, we don’t see them.” The 2017 report promised RCMP would begin a “dedicated module” on right-wing extremism as part of its First Responder Terrorism Awareness Program. In a statement, RCMP spokesperson Caroline Duval wrote that it “is offered to first responders namely health services, police of jurisdiction, firefighters and paramedics, as well as to those with a nexus to critical infrastructure.” She declined to say how many officers were involved in it. The RCMP also clarified it will not actually investigate these groups unless they have already committed a crime. “The RCMP does not investigate movements or ideologies but will investigate the criminal activity of any individuals who threaten the safety and security of Canadians,” wrote RCMP spokesperson Michelle Schmidt. “The RCMP investigates any act of potential terrorism regardless of political motivation, including ideologically violent groups such as the far right or the far left.”
{ "pile_set_name": "OpenWebText2" }
Q: Cron Tasks on load balanced web servers I'm looking for better solution to handling our cron tasks in a load balanced environment. Currently have: PHP application running on 3 CentOS servers behind a load balancer. Tasks that need to be run periodically but only on a single machine at a time. Good old cron set up to run those tasks on the first server. Problems if the first server is out of play for whatever reason. Looking for: Something more robust and de-centralized. Load balancing the tasks so multiple tasks would run only once but on random/different servers to spread the load. Preventing not having the tasks run when the first server goes down. Being able to manage tasks and see aggregate reports ideally using a web interface. Notifications if anything goes wrong. The solution doesn't need to be implemented in PHP but it would be nice as it would allow us to easily tweak it if needed. I have found two projects that look promissing. GNUBatch and Job Scheduler. Will most likely further test both but I wonder if someone has better solution for the above. Thanks. A: You can use this small library that uses redis to create a temporary timed lock: https://github.com/AlexDisler/MutexLock The servers should be identical and have the same cron configuration. The server that will be first to create the lock will also execute the task. The other servers will see the lock and exit without executing anything. For example, in the php file that executes the scheduled task: MutexLock\Lock::init([ 'host' => $redisHost, 'port' => $redisPort ]); // check if a lock was already created, // if it was, it means that another server is already executing this task if (!MutexLock\Lock::set($lockKeyName, $lockTimeInSeconds)) { return; } // if no lock was created, execute the scheduled task scheduledTaskThatRunsOnlyOnce(); To run the tasks in a de-centralized way and spread the load, take a look at: https://github.com/chrisboulton/php-resque It's a php port of the ruby version of resque and it stores the data in the same exact format so you can use https://github.com/resque/resque-web or http://resqueboard.kamisama.me/ to monitor the workers and see reports A: Assuming you have a database available not hosted on one of those 3 servers; Write a "wrapper" script that goes in cron, and takes the program you're running as its argument. The very first thing it does is connect to the remote database, and check when the last time an entry was inserted into a table (created for this wrapper). If the last insertion time is greater than when it was supposed to run, then insert a new record into the table with the current time, and execute the wrapper's argument (your cron job). Cron up the wrapper on each server, each set X minutes behind the other (server A runs at the top of the hour, server B runs at 5 minutes, C at 10 minutes, etc). The first server will always execute the cron first, so the other two servers never will. If the first server goes down, the second server will see it hasn't ran, and will run it. If you also record in the table which server it was that executed the job, you'll have a log of when/where the script was executed.
{ "pile_set_name": "StackExchange" }
Cartoon violence Cartoon violence is the representation of violent actions involving animated characters and situations. This may include violence where a character is unharmed after the action has been inflicted. Animated violence is sometimes partitioned into comedic and non-comedic cartoon violence. Influence on real-life behavior Opinions on the influences of cartoon violence vary. Some researchers believe that high level of violence in cartoons can make children more aggressive. Their studies also found that young children tend to mimic the negative behavior they see on television. Output aimed at children as young as seven, which include a number of cartoons, had the highest levels of violence. Researchers also concluded across the early and middle childhood, laboratory experiments using cartoons with comedic violence have consistently failed to demonstrate significant differences in person-oriented aggression. In contrast, field experiments have consistently shown that aggressive behavior towards peers increases following the viewing of non-comedic violent cartoons. Other researchers believe that people need to consider the ways in which children process information, the amount of mental effort they invest, and their own life experience to gain an understanding of how television violence affects children. For instance, recent research has indicated that children do not appear to mimic acts of violence in the media, whether television or cartoons. Blumberg, Bierwirth and Schwartz argue that children possess the ability to differentiate real life from animation, as well as the ability to understand right from wrong. They know that violent acts qualify as immoral and infringe on the welfare of others, therefore the violence witnessed in cartoons will register as "make believe" to children and will not be applied into their real lives. Options for parents and restriction There are a number of ways parents can control their children’s exposure to violence. One of the most effective and common ways of prevention is restricting the number and types of programs children watch. With older children, parents might want to discuss, and explain television. This can help children to understand television material and overcome the effect TV violence has on their outlook and behaviors. Three initiatives have been put in place to combat violence in cartoons (). The first is The Children's Television Act which requires broadcasters to air shows which are educational and provide information for the children. The second initiative is the V-chip legislation that gives parents the opportunity to block out violent shows from their television. The third legislation against violent cartoons is the National Cable Television Association’s TV Parental Guidelines, which is a system that rates the Television shows based on their contents. In action-adventure oriented cartoons, the most consistent avenue of addressing violence is the use of a form of fantasy violence in which no one is injured or killed on screen. In science fiction cartoons, for example, enemy forces are typically said to be robots so that they may be destroyed in bulk by the heroes without concern over killing living beings. In cases where vehicles are known to be piloted by living beings, tanks, aircraft, and other war vehicles that are destroyed in combat always allow time for the pilot to escape or bail out. Realistic firearms are often replaced with futuristic beam weapons which still seldom hit anyone. Swords and other bladed weapons may be prohibited from being used as offensive weapons but may be used defensively or be depicted as magical weapons. Direct violence is frequently limited to hand to hand combat where directly kicking or punching another character may or may not be allowed. The majority of action adventure cartoons over the past decades have used these methods of depicting dynamic action scenes although their use has been heavily criticized as "sanitized violence". Cartoons based on the Voltron, Transformers, G.I. Joe, and Masters of the Universe franchises (especially the versions produced during the 1980s) are notable examples using variations on fantasy violence. Victor C. Strasburger, Amy B. Jordan and Ed Donnerstein, writing in Pediatrics, say that parents should limit the total screen time for children older than two years of age to no more than one to two hours per day. Children under two years of age should avoid watching television altogether. Televisions should be kept out of children’s bedrooms and parents should watch television with their children and discuss the content. Health practitioners can also play their part by taking the time to ask their young patients how much time per day they spend with entertainment media and if there is a television or computer with Internet access in their bedroom. Effects Effects of cartoon violence on youth remain controversial. Research has generally been divided on this issue with no consensus reached regarding the effects of violence on behavior. F.C. Blumberg, K.P. Bierwirth, and A.J. Schwartz, in a 2008 paper in Early Childhood Education Journal, say that the impact of exposure to violence may remain regardless of whether children choose to imitate it. References Category:Adult animation Category:Violence
{ "pile_set_name": "Wikipedia (en)" }
Q: Java Program to make Tic Tac Toe not working For my programming class I'm supposed to make a program that simulates a game of tic tac toe. My teacher provided all the methods and said we shouldn't need to add any or take any away, and told us we shouldn't change the playGame method, but no matter what I do there seems to be some sort of disconnect between the playGame method and the processComputerMove/processHumanMove methods. Whenever I try to run the program, it seems like those methods just get skipped over entirely even if they have nothing in them but a simple print statement. I was wondering how to fix this. Here's my (unfinished and not working) code so far: import java.util.*; public class TicTacToe { private static Scanner keyboard = new Scanner(System.in); private static char[] board = new char[9]; // ******************************************************* public static void main(String[] args) { String answer; System.out.println("Welcome to Tic-Tac-Toe!!"); System.out.print("Do you want to play a game? (Y/N) "); answer = keyboard.next(); if (answer.charAt(0) == 'Y' || answer.charAt(0) == 'y' ) { playGame(); } else if (answer.charAt(0) == 'N' || answer.charAt(0) == 'n'){ System.out.println("Goodbye!"); } } // ******************************************************* private static void playGame() { char currentPlayer = determineFirstPlayer(); System.out.println("The computer is X, the human is O.\n"); initializeGameBoard(); while (!isDone()) { if (currentPlayer == 'c' || currentPlayer == 'C') { // the computer processComputerMove(); currentPlayer = 'h'; // the human } else { displayGameBoard(); processHumanMove(); currentPlayer = 'c'; // the computer } } displayGameBoard(); System.out.println("Game over!"); } public static char determineFirstPlayer() { System.out.print("Who would you like to make the first move? (h = human/c = computer) "); String response = keyboard.next(); char player = response.charAt(0); return player; // return 'c' or 'h' as appropriate } // ******************************************************* private static void initializeGameBoard() { String playBoard = " | | \n---+---+---\n | | \n---+---+---\n | | "; board[0] = playBoard.charAt(2); board[1] = playBoard.charAt(6); board[2] = playBoard.charAt(10); board[3] = playBoard.charAt(13); board[4] = playBoard.charAt(17); board[5] = playBoard.charAt(21); board[6] = playBoard.charAt(24); board[7] = playBoard.charAt(28); board[8] = playBoard.charAt(32); } // ******************************************************* private static void processComputerMove() { Random rand = new Random(); int array = rand.nextInt(8); int comp = rand.nextInt(8); if (board[array] != 'X' || board[array] != 'O') { board[array] = 'X'; System.out.println("The computer chooses cell "+board[array]+"."); } else { board[array] = board[comp]; board[comp] = 'X'; } } // ******************************************************* private static void processHumanMove() { System.out.println("Enter an empty position number (0-8) "); int position = keyboard.nextInt(); if (board[position] != 'X' || board[position] != 'O') { board[position] = 'O'; } else { System.out.println("Error! Must enter an empty position from 0-9."); } } // ******************************************************* private static void displayGameBoard() { System.out.println(" "+board[0]+" | "+board[1]+" | "+board[2]+" \n---+---+---\n "+board[3]+" | "+board[4]+" | "+board[5]+" \n---+---+---\n "+board[6]+" | "+board[7]+" | "+board[8]+" "); } // ******************************************************* private static boolean isDone() { isComputerWin(); isHumanWin(); isTie(); if (isComputerWin()) { return true; } else if(isHumanWin()) { return true; } else if (isTie()) { return true; } else { return false; } } // ******************************************************* private static boolean isComputerWin() { if ((board[0] == 'X' && board[1] == 'X' && board[2] == 'X') || (board[0] == 'X' && board[3] == 'X' && board[6] == 'X') || (board[0] == 'X' && board[4] == 'X' && board[8] == 'X') || (board[3] == 'X' && board[4] == 'X' && board[5] == 'X') || (board[1] == 'X' && board[4] == 'X' && board[7] == 'X') || (board[2] == 'X' && board[5] == 'X' && board[8] == 'X') || (board[6] == 'X' && board[7] == 'X' && board[8] == 'X') || (board[6] == 'X' && board[4] == 'X' && board[2] == 'X')){ return true; } else { return false; // return true or false as appropriate } } // ******************************************************* private static boolean isHumanWin() { if ((board[0] == 'O' && board[1] == 'O' && board[2] == 'O') || (board[0] == 'O' && board[3] == 'O' && board[6] == 'O') || (board[0] == 'O' && board[4] == 'O' && board[8] == 'O') || (board[3] == 'O' && board[4] == 'O' && board[5] == 'O') || (board[1] == 'O' && board[4] == 'X' && board[7] == 'O') || (board[2] == 'O' && board[5] == 'O' && board[8] == 'O') || (board[6] == 'O' && board[7] == 'O' && board[8] == 'O') || (board[6] == 'O' && board[4] == 'O' && board[2] == 'O')){ return true; } else { return false; // return true or false as appropriate } } // ******************************************************* private static boolean isTie() { if (!((board[0] == 'O' && board[1] == 'O' && board[2] == 'O') || (board[0] == 'O' && board[3] == 'O' && board[6] == 'O') || (board[0] == 'O' && board[4] == 'O' && board[8] == 'O') || (board[3] == 'O' && board[4] == 'O' && board[5] == 'O') || (board[1] == 'O' && board[4] == 'X' && board[7] == 'O') || (board[2] == 'O' && board[5] == 'O' && board[8] == 'O') || (board[6] == 'O' && board[7] == 'O' && board[8] == 'O') || (board[6] == 'O' && board[4] == 'O' && board[2] == 'O')) || !((board[0] == 'X' && board[1] == 'X' && board[2] == 'X') || (board[0] == 'X' && board[3] == 'X' && board[6] == 'X') || (board[0] == 'X' && board[4] == 'X' && board[8] == 'X') || (board[3] == 'X' && board[4] == 'X' && board[5] == 'X') || (board[1] == 'X' && board[4] == 'X' && board[7] == 'X') || (board[2] == 'X' && board[5] == 'X' && board[8] == 'X') || (board[6] == 'X' && board[7] == 'X' && board[8] == 'X') || (board[6] == 'X' && board[4] == 'X' && board[2] == 'X'))) { return true; } else { return false; } } } EDIT: shoot, I accidentally posted before I was done typing. I think the error is in processComputerMove/processHumanMove methods, because even when I put just print statements in there, nothing shows up from them when I run the program. A: Your isTie() method is one of the culprits. Looking at it with a debugger, I observe that your boolean statements to check for a "tie" condition are evaluation to true every time. Yes, I mean this monster statement: (!((board[0] == 'O' && board[1] == 'O' && board[2] == 'O') || (board[0] == 'O' && board[3] == 'O' && board[6] == 'O') || (board[0] == 'O' && board[4] == 'O' && board[8] == 'O') || (board[3] == 'O' && board[4] == 'O' && board[5] == 'O') || (board[1] == 'O' && board[4] == 'X' && board[7] == 'O') || (board[2] == 'O' && board[5] == 'O' && board[8] == 'O') || (board[6] == 'O' && board[7] == 'O' && board[8] == 'O') || (board[6] == 'O' && board[4] == 'O' && board[2] == 'O')) The actual evaluation is false, but since you negate it, you flip the value to true, thus short-circuiting your entire expression, causing you to (eventually) return true. My gut tells me that your definition of a tie is skewed - wouldn't a tie be easier defined as neither a human win, nor a computer win? If we trim down the isDone() method to only look at isHumanWin and isComputerWin (as well as get rid of the useless method calls at the top), and delete the unnecessary isTie method, we get a (mostly) playable Tic-Tac-Toe game. It kind of peters out towards the fourth move, but that is an exercise to the reader. private static boolean isDone() { return isComputerWin() || isHumanWin(); }
{ "pile_set_name": "StackExchange" }
Vaccination of cattle against Mycobacterium bovis. Protection of cattle against bovine tuberculosis by vaccination could be an important control strategy in countries where there is persistence of Mycobacterium bovis infection in wildlife and in developing countries where it is not economical to implement a 'test and slaughter' control programme. Early field trials with Bacille Calmette Guerin (BCG) M. bovis vaccine in cattle produced disappointing results, with induction of tuberculin skin-test reactivity following vaccination and low levels of protection. However, recent studies using a low dose of BCG vaccine in cattle have produced more encouraging results and field trials should now be carried out in developing countries to determine whether this low dose BCG vaccination strategy will reduce the spread of infection. The options for new candidate tuberculosis vaccines have increased markedly in the last decade with the advent of new attenuated strains of M. bovis, and sub-unit protein and recombinant DNA vaccines. Some of these new types of vaccines have recently been tested in cattle. New attenuated M. bovis vaccines induced greater protection than BCG vaccine in cattle which had been sensitized to environmental mycobacteria prior to vaccination. In contrast, it has proved difficult to stimulate appropriate immune responses in cattle necessary for protection with sub-unit protein and recombinant DNA vaccines and better immunological adjuvants are required for these types of vaccines. Progress in the development of new tuberculosis vaccines has been very rapid in the past decade and the prospects for vaccination to control and eradicate bovine tuberculosis are encouraging.
{ "pile_set_name": "PubMed Abstracts" }
The Smoking Tire hits the canyons with one of the fastest Audi's on the road: Stasis Engineering's Supercharged R8 5.2 FSI. Matt Farah wrings out the red Spyder on an empty canyon road, proving that no amount of horsepower is ever too much.
{ "pile_set_name": "Pile-CC" }
Development of antibody to human GM3 synthase and immunodetection of the enzyme in human tissues. Polyclonal antibody was raised to a cloned fragment of human GM3 synthase. Affinity purified R27C1 antibody to the tagged recombinant protein inhibited GM3 synthase activity in human liver and HL-60 cells in a dose-dependent manner. However, the R27C1 antibody did not affect liver sialyltransferase activity towards asialofetuin. We are the first to measure GM3 synthase activity in human liver (194 +/- 60 pmol NeuAc/h per mg protein), which was about 10-fold lower than in phorbol myristate acetate-stimulated HL-60 cells (1353 +/- 573 pmol NeuAc/h per mg protein). On immunoblotting the R27C1 antibody recognized a common protein band in a number of human tissues (liver, brain, atherosclerotic aortic intima, HL-60 cells) with molecular mass of about 60 kD, which is similar to that of the purified GM3 synthase from rat liver. In human liver and aortic intima, the 60-kD band was almost a single band, which makes possible the use of the R27C1 antibody for immunohistochemical studies in these tissues.
{ "pile_set_name": "PubMed Abstracts" }
"Sangre nuevo, homes." "Police." "Hold it right there." " Hands up." "Against the car." " Turn around." " I didn't do nothing, man." " Buenos noches, muchachas." " Nice boa." " Sí." "New tags, new ink." "What's up with that, Chapa?" "We're just changing brands." "Torrucos now." " Torrucos now?" " Simón." "Armadillo's calling you guys?" "Armadillo's bro looks good behind bars, huh?" "You tell him I called." "Someone torched Tio's drug crib." " What if our blow was in there?" " Then it's gone." "Hey, we got a lot of bread tied up in that shipment." "You're so worried about your goddamn money you don't get it." "This could open up an investigation into Tio's business." "If we're not careful, all roads are gonna lead back to us." "Go find Tio." "I'll take care of this." " Let's just call Lem." "I'll stay here and help." " Did I ask for your help?" " Hey." " Morning, gentlemen." " Guess I missed the weenie roast." " What happened?" "Arson." "Started on the first floor." "Then the whole place went up." "They were able to determine that already?" "Whoever set the fire didn't try to hide it." "Gas can out back." " What brings you here?" " My case." "We found the same graffiti as the necklace tire executions." " Do we have a motive yet?" " That's not all we have." " Huh?" "Is that a kid?" " Not exactly." "I'm shaking down the new king cholo." "Armadillo." "I gave my card to a few of his recruits." "I guess they weren't kosher." "Armadillo's my case." "He raped a 12-year-old girl last night to cover the tire murders." " He raped a kid?" "Why isn't he in Central by now?" " Her brother's uncooperative." "I think he took her back to Mexico." "No victim, no arrest." " Why would he burn this building?" " I spoke to some of the locals." "It appears the owner is a Theodore Osmond." "He's selling more than comic books." "Drug dealer." "Armadillo burns out his competition and sends me a message." " Me and my boys'll handle this." " Hey, I'm just giving you information." "This is my case." "You see that little piggy with my card spiked to its head?" "This is gangland..." "my domain." " I'm already on it." " Detective, let me show you something." "Any reason why the two of you shouldn't pair up together?" "I just think it would make more sense if I handled this on my own." "You're gonna see some kind of kicking and screaming you didn't know existed..." " you try pulling me off this." " You both want it." "It's big enough for the two of you." "Work it together." " Fine." " Great." "Whoa, hold." "Maybe the doorbell works." " Armadillo." " What's this about?" "It's all about love, ese." "Come on, boys." "Let's go for a walk." "You heard him." "Let's go." " Where were you..." " I was with some friends when the fire was set." "I'll give you their names." "You and your brother are into a lot of things." " Pimping drugs, consolidating chulitos." " No, I'm not like my brother." "Navaro enjoys parties, late nights." "I'm much more comfortable in bed with a good book to read." "And a little girl to rape." "I have no outstanding warrants." "My visas are in perfect order." "There are no drugs, guns or money in the house." "If you're such a good boy then you do as I say." "Pack up your shit and get on the next donkey back to home." "No." "I just got here." "I want to be staying for a while, hmm?" "Fine." " Maybe you can stay at my house for a little while." " What's the charge?" "I'll think of something on the way." "Anyone of you guys not named Martinez?" "This guy Perez, his license expired eight months ago." "I'm calling it in." "What's up with that, Xavier?" "Lines too long at the D.M.V.?" "Yeah, okay." "This guy Xavier, man." "He's got an outstanding warrant for aggravated assault." "Oh." "Now we got you for harboring a felon." " For my wall, right next to your brother." " Can I get a copy?" "This guy's got a notorious reputation, but his rap sheet's squeaky clean." "Unlike his brother, he's smart." "No mistakes so far." " Good morning." " Oh, morning." "Have you met our civilian auditor?" "Claudette Wyms." "Lanie Kellis." " Hello." " Hi." "Another one?" "Yeah." "The brother of that Mexican national." "If anything, he's worse." "Wow." "Oh, I'm sorry." "I didn't mean to interrupt." "Oh, well, not at all." "I was just saying that... unless we get this guy on something else, the harboring charges won't hold him." "I know." "So does he." "We have to find the guy who set the fire, connect it to Armadillo... then get him for the arson." "I want him for more than that." "We'll start with the shop owner." "You know where I can find him?" " No." " Really?" "'Cause it says Theodore Osmond is registered as one of your confidential informants." "Oh, Tio." "I haven't seen him in months." "Theodore Osmond?" "That's his real name?" "I'll get the word out." " Meantime, I'll have my guys hunt down the firebug." " Good." "I'd like to observe Detective Mackey on this." " Sure." "Give us a chance to talk." " Actually, I was just coming to get you." " A city official has just been shot." " Who?" "I don't have all the details, but I'm sure your people will want you down there." " Dutch, you've met Lanie Kellis?" " Of course." "We've got a city official shot at Benton and Hollis." "I need you down there right away." " Lanie's gonna ride along." " Great." "About you, not the city official." " Do we know who the victim is?" " Uh, not yet." " Okay." "You ready?" "Let's go." " Uh, I" "I guess so." "You have a connection with the drug dealer whose place just got burnt down?" " Yeah." " Jesus Christ." "I asked you if there was any reason not to bring Claudette into this." "Hey, you're the politician." "Learn to read between the goddamn lines." "I told you I wanted to handle this thing myself." "What does this mean for us?" "It just means I'll have to be careful." "Tio's laying low at his kid's mom's place." "He's spooked." " How long you freezing us out?" " Until I can trust the three of you again." " Look, I'm really sorry, boss." " Me too." " We made a mistake." " Yeah, you did." "I need one of you to come with me." "I don't give a damn which one." " You wanna go higher?" " No." "No higher." "Okay." "All right." "Come on." "Go inside with your mom, baby." "Beautiful kid." "Hi." "You okay?" "No." " A Mexican psycho torched my goddamn building." " Yeah, we saw." "What'd you lose?" "I got lucky." "Most of the product was cut, bagged, and out." "I had some cash and my records in the safe." " What safe?" " What records?" " Accounts ledger..." "income, expenses, you know." " No, I don't know." "I'm running a business." "I gotta know what's coming in and going out." "Going out?" "Like payments to me?" "My name is in that goddamn ledger?" "It's in code, man." "I call you "Landlord."" "Hey, you and your boys didn't have a problem with the way I do business..." " when I damn near doubled your cut." " Where's the safe?" "Back room of the shop." "One of those corporate espionage deals." "You try to force it open, it destroys the contents." " All right, all right." "I'll get the safe." " And I'll get Armadillo." " I want you to stay here and lay low." " This can't go unanswered." "It won't." "I need a couple of your guys, names and numbers." "Guys that know how to use a Zippo." " Find out where the Torrucos are hanging." " Want us to roust them?" "No." "Give them this address." "Tell them to burn it on my signal." "And just the building." "No bodies." "I wanna send a message, not start a war." "You think you can handle that?" " It's locked." " Have Lem pick you up." "Need to use my phone?" "It's pretty quiet for the shooting of a city official." "I figured there'd be some news crews, at least one of the independents." "Ray, what do we know?" "The victim was Helen Zamorski." "Shot three times in the back." "No witnesses." "No weapon." " Took her to Mission Cross." " Helen Zamorski." " Who is she?" " P.E.O." " P.E.O.?" " Parking enforcement officer." " A meter maid?" "You gotta be shitting me." " This is her machine right here." "This is our city official?" "Will you get your captain on the phone for me, please?" "Hey." "Got a call from the fire inspector." "The safe was in the back of the shop." "Cocaine residue and scales were found upstairs." " That will give us probable cause for the search and seizure." " Nice work." " Can't wait to see what's inside." " That makes two of us." " What do we have?" " The building's owner was definitely peddling." "He's M.I.A., but we found his safe." "Maybe there's something inside to tie Armadillo to him." "Tio's no saint, but he's the victim here." "We have to go after Armadillo." "Get whoever set that fire to roll on him." "I know Tio's your C.I., but Armadillo hit him for a reason." "Motive's a pretty good starting point." "I'll get a warrant to open the safe." " I got a guy who can crack that." " Great." " Any luck finding Tio?" " We got a couple of leads." " What do you got?" " An address in Colorado Springs." " Where?" " She's staying with a Camille Briskin." " Some chick she went to college with." " My kids with her?" " I'm on the next flight." " Uh..." "I just talked to my guy there." " She's packing up to go someplace." " Packing?" " Did this guy spook her?" " No, look." "I trust him." "Let him stay on her." "Look, you go there now... she's liable to be someplace else by the time you land." "Let's just see how it plays out." "All right." " My mom's the one that called." " Yeah?" "Is your mom around?" " Yeah." " Ma'am, are you the one that called us?" " About apartment two." " What's the problem?" " There's a terrorist in there." " Terrorist?" " Tell them about the smells." " Chemicals, like he's makin' dirty bombs or something." "My babies sleep on the other side of that wall." "Look." "I'm trying to raise two boys by myself." " Now I gotta deal with these people?" " Okay." "Fine." "We'll check it out." "I should come with you." "No, ma'am." "You should stay right here." " Mr. Al-Thani?" " Zayed, yes." "Zayed, I'm Officer Sofer." "This is Officer Lowe." " Yes?" " We've received a complaint." "A complaint?" "About me?" "It's her." "She told you I was a terrorist, didn't she?" " Sir, if we could just come in..." " I did nothing wrong." "You people pick on me for no reason." " Okay." "Just let us come in, take a quick look around." " So." "I am a suspect just because I am Arab?" "No, sir." "You're a suspect because 19 guys who look like your twin brother... killed 3,000 Americans." "Look, the easiest way for us to handle this is just let us come in, take a look around." "Or we can file a report with the federal government and let them check you out." " God bless America." " After you, sir." "My brother sends it to me from home." " I cannot control what they print." " Where's home?" " Damascus." " How long have you been in this country?" "Five years." "I have a job." "I pay taxes." "My wife." " What you making?" " Pickled fish." "Mmm." "Well, thank you." "We appreciate your cooperation." "So you will tell the black one that I am no terrorist?" "We'll tell her." "I found out where Armadillo's boys are working from." "The old Sugar Cube Lounge on Juniper." "Salsa by night, distribution by day." "I doubt they have permits." "Go in." "Tell them you're with Alcohol Control." "Close it down." "Have Tio's boys light it up once it's all clear." "Hey, Vic." "We got a positive I.D. on Armadillo's fire starter." " Ripley Verdugo." "He's, uh, flame retarded." " Bring him in." "Hey, Vic." "Shane told me about your family splitting'." "I'm really sorry, man." "Are you an idiot?" " Smith, you old drunk." " Mackey, you bald bastard." " What are you doing?" " Same old." "You look good, man." " How's the brood?" " They're good." "So Shane brought you up to speed?" "Yeah." "You need me to open some safe?" "Right." "Only I need you to go through the front lock." "The boys said it's a smart safe." "By going through the lock... it'll trigger the acid and destroy whatever's inside." "Oh." "I get it." "Oh, Smith." "This is Detective Wyms." " Smith the locksmith?" "That's convenient." " Yeah, I get that." " Looks like the Omni 600 series." " Actually, it's the 700 series." "Right." "Hold on." "The manufacturer said you gotta go through the back to disarm the destruct mechanism." "What the hell's going on, man?" "I thought you'd worked on these things before." "Yeah, sorry." "I'll go through the back." " Good catch." " Yeah." "It would take more than a few bullets to bring down Officer Zamorski." "Officer Zamorski?" "She's a meter maid." "We're all officers here." "You know how much revenue we bring in for this city?" "If it wasn't for people like Helen Zamorski risking her life every day... you guys would be making less than schoolteachers." "And we appreciate it." "This is awful." "Helen writes 30% above her quota every month." " Helen's electronic ticket book was smashed to pieces." " Animals." " Restroom?" " Yeah, it's in the back." "I'd like to see who she wrote tickets for today... specifically the last ticket she wrote before she was shot." "I'd also like names of people she's written large numbers of tickets to over the last year." "I'll print them out." "Hey, uh... who can I talk to about a parking snafu?" " I got this $63 ticket." " Ah, "No Parking 4:00 to 7:00."" "Right." "Yeah." "In front of the courthouse." "See, I was on the job." "I was testifying in a kiddie porn case." "We got the sick bastard, thank God." "But anyway, I got this ticket." "Aren't the police provided parking off of Grand Avenue?" "Yeah, but that's like six blocks away." "I was running late for this, uh, child pornography case." "Well, I guess you're gonna have to challenge it in court." "Come on, a little help maybe." "One officer to another." "I don't fix parking tickets, sir." "And being a police officer doesn't place you above the law." " All set?" " Mm-hmm." " This guy was quite the bookkeeper." " Oh, yeah?" "What's he got in there?" "Nothing about Armadillo, but look at this." "He was making monthly payments to a landlord when he owns the building." "Well, maybe Armadillo's the landlord." "Tio got tired of shelling out." " Fire was the payback." " Black dealer, Latino boss man?" "I doubt it." "Besides, he was making payments weeks before Armadillo crossed the border." "Oh." "Maybe this is the guy Armadillo's trying to squeeze out." " Your boys find Tio?" " Yeah." " Well, good." "Let's bring him in." " It's not that easy." "Sure it is." "Come on." " I'll bring him out." " I'll come with." "Uh..." "He's my C.I. I just bring a stranger in there, it'll blow the trust." "You said you hadn't seen him in months." "You don't know how squirrelly this guy might be." " You're not going in there without backup." " Look." "Tio's still valuable to me, all right?" "Now wait here." "I'll handle this." "Something I should know about you and this guy?" "No." "I'll be right out." "If you come in voluntarily, it'll look like you've got nothing to hide." " You gonna watch my back, right?" " Yeah." "And you're gonna watch mine." "She wants Armadillo." " Thinks grilling'you about the landlord will lead to him." " What do I tell her?" "You're just another local shop owner forced to pay protection money." "Choose your favorite band of brothers." " One-niners, The Monks, Jack-uzis, got it?" " Yeah, I'm good." "Yeah, so is Wyms." "You be careful." "I'm trying to lead her down a different path." "Here's the guy you're gonna I.D." "I'm pretty sure he's the firebug." "Now, you tell us that you saw him casing the building last night before you left." "No problem." "What are we doing about hitting Armadillo?" "We found out where the Torrucos hang." "Your little friends are gonna rip a three-alarmer through it tonight." "Vic." " You get the plan?" " Yeah, I'm good." "Everything okay in here?" "Sure." "Everything's fine." "This is a list of your property." "I want you to take a look at it." "That the bitch that burned my place up?" "You're here to tell us what you know." " Hey, Vic." " I'm in the middle of something." " It's important." " Give me a minute." "I'll start without you." " What's up?" " My guy." "Followed Corrine to the Colorado Springs airport." "Airport?" "Where's she going?" "Come on." "Where the hell is she going?" " Who does she know in Phoenix?" " Phoenix?" " Mm-hmm." " No clue." "That's what I'm paying you to find out." " And I'm trying, Vic." " Are the kids with her?" "Just the baby." "Cassidy and Matthew are still with the friend." "And I got another guy waiting for her on that end." "Phoenix?" " Look, I gotta go." "Call me as soon as you know something." " All right." "I will." " What did I miss?" " Tio found our guy." "This is the dude." "Couldn't miss that inked baldhead." "Saw him hangin' out in the back lot when I was leavin'." " Ripley Verdugo." "Seven priors, three for arson." " Consider him picked up." " You coming with?" " No, you go ahead and pick up the suspect." "I'm gonna have a little talk with Tio." "Juice?" "Soda?" "A new distribution crib?" " I'm here to help, lady." " Good." "Let's talk about your record keeping." "There are some pretty interesting things in this ledger." "I'll tell you what." "I've never seen Vic this pissed." "He's pissed about his kids." "It's classic displacement, man." " It's classic replacement I'm worried about." " Think he'll boot us?" "Gimme a break." " What would Vic be without us?" " Maybe we'll find out." "I'm not going back to Traffic." "Let's just do our jobs, and do it well." "Oh, so now that plan makes sense to you?" " Shut up." " No, you shut up." " Damn!" "Put on a shirt, bitch." "Racked up quite the parking portfolio, Barney." " Thirteen hundred and eighty-six dollars." "Wow." " Uh, yeah." "I get a lot on the job." "I lose track." " What is your job?" " I'm a messenger." " I gotta pay for any tickets I get." " You got another one today." "Oh, yeah." "So?" "So the woman who wrote that ticket was shot three times this morning." "She's gonna live, but not like she used to." " I'm sorry to hear that." " She wrote you 34 tickets in the last seven months." " Maybe you're a little upset about that." " Uh, yeah." "Yeah, I'm upset." "I don't have 1,300 bucks." "And I could lose my job." "But I didn't shoot her." "Where were you at 9:30?" "I was, uh, in traffic on my way to L.A.X." " You fired a gun today, Barney?" " Of course not." " You willing to take a G.S.R.?" " What is that?" "Gunshot Residue Test." "Standard government test." "It detects whether you've fired a gun recently." "Oh, yeah, sure." "If it'll help." "How does a novice comic book merchant buy two buildings, cash?" "Man, I can barely cover my mortgage." "I'm smart with money." "If you're smart, how come you're making payments to a landlord when you don't have one?" "Being a C.I. isn't a "get out of jail free" card." "We found scales and drug residue above your shop." " I know you're dealing." " Reality check." "My building getting smoked makes me a victim." "I can get that stack of cash in the safe and the dollar amounts in this ledger... and have search warrants for your home and other building." "What we find there gonna make you a victim too?" "Can I help you somehow?" "Help me get Armadillo, and I ignore this ledger." "That's Tio?" "He's the guy the Long Beach sheriffs pulled over with your team." "Right." " What else haven't you told me?" " Be quiet." "I'm trying to listen." "How deep is your relationship with this guy?" "Deep enough." " Can he hurt us?" " He won't." " He can't or he won't?" " He won't." "We had a deal." "You said you were gonna clean up your act." "I'm in control." "I've got a watchdog in my house, and now one of my best detectives... is grilling the guy who can blow the whistle on you." "Hey, how's she doing?" "Aren't you working a case?" "I got half an hour before my next evil parking suspect shows up." " We gotta stop this." " Yeah, and we gotta be careful the way we play Claudette." "Come on, greaseball." "Let's go." "Beauty." " Firebug's here." "Wanted to give you the first crack at him." " Thanks." "Let Tio stew." "I haven't finished with him yet." "Sure." "Look at my prayer mat." "I hang it here to dry." "And she had her dog rip it to pieces." "Anyone could have done that." "If it's so sacred, you shouldn't leave it out." "Somebody needs to put that animal to sleep." "Is that what you're doing in there?" "Cookin'up gas to put us all to sleep?" "That's enough!" "Look, you had us search his place, and we did." "He's not a terrorist." "Go back inside and restrain that dog before I call animal control." "And you, stop egging her on." "Stop threatening her dog." "And stop acting like such a victim." "Both of you go inside and stay inside your own apartments." "You do not want us coming back here again." " You're learning." " Good teacher." "Wanna tell me where you were last night, Ripley?" "I was home." "Jerkin' off into a sock." "You wanna see the evidence?" "Have some manners when you talk to me." "How long since you looked like that?" "The shaved head thing went out like six months ago." "Why?" " Jesus, I can't catch a goddamn break." " What now?" " Tio I.D.'d a bald guy." " Vic!" " Yeah?" " You care to tell me how our eyewitness Tio... identified a thug from a year-old police mug shot that only you and I had?" "No clue, but I'm gonna help you find out." "It's okay." "You've done enough." "I'll get to the bottom of this." "You identified the right guy, but the wrong hair." "Wrong hair?" "That's weird." "Now, you're gonna tell me why you lied and who you're protecting, right now!" "Tio will hold up." "He knows the drill." "You wanna put both our careers in this guy's hands?" "Why'd she do that?" "Who are you paying protection money to?" "I saw who I saw." "What's your connection to Mackey?" "I'm just a C.I." "I tie that payout to a cop, and I'll get you for racketeering." "You hitch that to the intent to distribute charge... and you won't see your baby girl until she's 35." " Now talk to me!" " Claudette, you got a second?" " Now?" " Yes." "A club on Juniper just went up in flames." "F.D. says it looks like the same arson M.O. as the comic book store." " I want you down there." " I'm in the middle of this." " Questioning a witness can wait." " He could be the key to getting Armadillo." "An hour ago it was your mandate." "Now you've got me chasing fire engines?" "I have a civilian auditor evaluating my every move." "You're the primary detective on this case." "I need you on scene." " This isn't a discussion." " What is it exactly?" "The cop said this was about that parking lady that was shot today?" "That's right, Izzy." "And the last ticket she wrote before that happened was to you." "Which means you're either a witness or a suspect." " Take a seat." " Well, I didn't see anything." " I guess that makes you a suspect." " A suspect?" "Look, I take the tickets 'cause it's cheaper than the garage." " Cheaper?" " The parking structure is 22 bucks for the day." "I usually get two, maybe three $30 tickets a week." "110 versus 90." "I'm saving 20 taking the fines." "So you knew you were gonna get the ticket?" " It's part of doing business." " Are you willing to take a Gunshot Residue Test?" " Will it cost me anything?" " Only if you're lying." " Burn this." "No more bookkeeping." " Understood." "You're out of here." "Lay low." " Yeah?" " Corrine caught a connecting flight in Phoenix." "She's due in Burbank in 40 minutes." " She's coming here?" "I should go..." " Let me tail her." "See what she's planning." "Be ready for my call." "Okay." "A high-level city official." "I know." "I'm sorry." "I didn't have a chance to return your call." "Is there some reason you didn't want me following Detective Mackey today?" " Of course not." " Excuse me." "It was arson." "But it was Torruco base." " Someone trying to pay back Armadillo." " That was fast." "I'll see if Tio knows anything." " We cut him loose." " What?" "Didn't have enough to hold him." "We had to release him and his property." " The ledger?" " Yes." "What ledger?" "Nothing important." "Three shots." "The victim's book was smashed to pieces." " This was a rage crime." "Try this." " Nope." " Mr. Thrifty knew he was getting the ticket." " Mm-hmm." " Mmm, it's homemade." "Try it." " Yeah?" "Barney's just way too passive." " Plus, they both willingly agreed to a G.S.R." " So what are you gonna do now?" "I'll take a look at other crimes in the area this morning." "Make sure somebody wasn't trying to avoid being put at the wrong place at the right time." " G.S.R. results came back on Barney Plotkin." "Positive." " What?" "Oh, the "way too passive" guy?" "Let me see that." "Look out." "You failed the G.S.R., Barney." "Oh, really?" "Can I take it again?" "No." "In ten minutes, I'll have a search warrant for your car and home." "I'm gonna find the gun you used to shoot Helen Zamorski." " It's three inches." " Excuse me?" "My tire was in the red three inches... and she gave me a ticket." "She finds me every time." "I asked her nicely." "She just laughed." "Barney." "If you knew you shot her, why did you agree to the residue test?" "Well, if I didn't take it, I'd look guilty." "And..." "And you said it was a government test... so I figured, how reliable could it be?" "I just got off the phone with the D.A. They cut a deal with Ripley." "He confessed to the arson and turned in two accomplices... with the understanding that the three of them will do time together at Terminal Island." "This guy's taking over the goddamn prisons, consolidating his guys into one place." "The D.A. never should've signed that." "And we can never charge Armadillo with this crime." "And since we've got nothing on the rape, he walks." "I'm afraid so." "You send me on a bogus run." "You cut loose the only lead I have." "And then you let this guy cut a deal that buries my case." "What the hell is going on?" " We want this as much as you do." " We got three arsonists off the streets." " That's a pretty good day." " Save the statistic crowing for your civilian auditor." "What happened here today was bullshit!" "I don't know exactly what the puzzle looks like yet... but the pieces I see are pretty goddamn ugly." "I have never interfered with how you run your team... or how you run for office." "I get assigned a case." "I'm gonna find the truth." "And if I have to go through both of you..." "I'll get it." "Dutch just got the meter maid shooter." "Is there a problem?" "Just a little misunderstanding." "A difference of opinion." "Keeps us all honest." ""Harboring a felon"?" "Come on." "That's a stretch, even for this precinct." " I'll be in touch." " I know." "I'd rather it didn't cover my window." "It wouldn't hurt you to look out and be reminded of what country you're living in." " I am reminded every time I look at your ugly face." " Hey, hey!" " This is my window, my property." " Move back to your cave, Osama." "Why don't you go back to the jungle?" "No job, raising fat, stupid children." "That's it!" " Sir, get back in the house." " Back inside." "Talk about my boys like that, and I'll cut your tongue out!" " Drop it!" " Don't you talk about my boys!" " You don't protect me." "Allah protect me." " Put down the gun!" " Drop the gun!" " I do nothing wrong." " Drop the gun right now!" " I just don't want to be bothered by her, him, or you." "Zayed." "Zayed!" "Zayed!" "Where's your Allah now?" " Sounds like a clean shoot." " I didn't have a choice." "C.I.I.D. will be here to do follow up." "Fatality involved." "Mandatory downtime for the next two days." "Just take it easy, okay?" "Call if you need anything." "Okay." "Everything seems exceptionally calm." "No one seems too concerned about a dead Arab, I guess." "How bad would this scene be for you if the other neighbor were laying there dead?" "People are still looking for a reason to riot." "It would be very bad." "Is there someone I can call for you?" "No one at all?" " What do you mean disappeared?" " I mean they're bone gone." "Three of my best dealers." " You called?" " Callin', paging', two-wayin' They ain't answering', man." "It's Armadillo." "He's probably already got tires around their goddamn necks." "All right, relax." "Round up the rest of your guys." "Get them to lay low." "He's completely punking us, man." " It's time to send his "cholo-ing" ass south." " Yeah, like six feet south." "Hey, you relax too." "Jesus Christ, am I the only one thinking around here?" "How did the arson go?" "All smoke and mirrors." "Why so vague?" " You don't wanna know." " Sure, I do." "You mean, you don't wanna tell me." "And you think you can't read women." " You okay?" " Oh, yeah, fine." "Thanks." "Why?" "Just..." "Nothing." "It was great spending time with you." "I hope I didn't make too many mistakes." "Not at all." "Thank you for all your time." "If you wanna talk some more, maybe we could grab a meal sometime." "Dutch, hitting on me..." "that is a mistake." "N-No." "I meant if you wanted to ask some more questions..." "I've got a girlfriend." "Christ." "She made a stop at the county courthouse." "Made copies of the kids' birth certificates, came here." " What, a P.I.?" " Yeah." "A big one." "He played one season for the Rams." "Thinks he's Dick Butkus." "Jesus." " Oh, God." " Liman." " Morgal." " This is a confidential matter." "Yeah, a matter of betrayal." "She took his children away from him." "He's been looking for them for over a month." " Where are Cassidy and Matt?" " I'm not gonna do this." " You don't have to answer him." " Who the hell is this ape?" " Your children are where you can't hurt them." "Hur..." "What is he talking about?" "Corrine." "I'm sorry." "I don't know what else to do." " Let me do the talking, Corrine." " Shut your mouth, you big, fat-necked prick." " One more step and she signs a restraining order." " Stop it." " Corrine!" " I'm scared for our kids." "'Cause of what happened with Gilroy?" "That was a one-time thing." " Let's go." " Don't do this, Corrine." " Sorry." " Corrine, you're not gonna at least talk to me?" "It's not just Gilroy." "It's all of it." " Get out of my way!" " This is exactly the kind of behavior I'm talking about." " That's my daughter!" " No!" " Hey, no!" " That's enough, Morgal." " The I.A.D. investigations." "The civil suits." "The money that mysteriously appears." "You got a lot to answer for." "You're investigating me?" "Corrine." "Corrine!" " I don't know what else to do." " Corrine!" " Don't." "We'll get them back." "Vic!" "We'll get them back." " What?" " Mackey!" "Mackey!" "Tio?" " I asked you to leave." " This is my house." "Unless you have a warrant, you're breaking the law." "One of these laws?" "I told you to leave." "Vic!" "Vic!" "You ready to go now, huh?" "Vic, Jesus!" "I don't have to leave." "You planning to leave?" "You'll just have to kill me." "Tell me you're leaving." "Say it!" "Vic!" "I wanna hear you say it." "Say it!" "Vic!" "Vic, that's it!" "Come on." "It's all over now." " No!" " Take it easy."
{ "pile_set_name": "OpenSubtitles" }
1. Introduction {#sec1-pharmaceutics-10-00021} =============== The discovery of vascular endothelial growth factor (VEGF) \[[@B1-pharmaceutics-10-00021],[@B2-pharmaceutics-10-00021]\] and the subsequent recognition of its critical role in the pathogenesis of several chorioretinal vascular conditions constitute the most important advances in ophthalmology over the past 30 years. Strong evidence correlates the development of both neovascularization and macular edema in the two most common causes of blindness in industrialized nations---neovascular age-related macular degeneration (nAMD) and diabetic retinopathy (DR)---with the upregulation of VEGF \[[@B3-pharmaceutics-10-00021]\]. Furthermore, disease severity frequently correlates with intraocular VEGF concentrations, thereby making VEGF a logical target for therapeutic intervention. Soon after VEGF was discovered and sequenced, the production of inhibitory molecules began \[[@B4-pharmaceutics-10-00021]\]. Thus far, five VEGF-neutralizing molecules (pegaptanib, Macugen^®^, Bausch & Lomb, Bridgewater, NJ, USA; ranibizumab, Lucentis^®^, Genentech, S. San Francisco, CA, USA/Roche, Basel, Switzerland; aflibercept, Eylea^®^, Regeneron, Tarrytown, NY, USA; conbercept, Chengdu Kanghong Pharmaceutical Group, Chengdu, China; and bevacizumab, Avastin^®^, Genentech, S. San Francisco, CA, USA/Roche, Basel, Switzerland) have been used to treat ophthalmologic conditions, though only the first three have received United States Food and Drug Administration (US FDA) approval for intraocular use. Intravitreal therapy usually begins with monthly injections (in accordance with package labeling) but most physicians will attempt to extend the time between injections as much as possible with either monthly *pro re nata* (PRN) or treat and extend strategies \[[@B5-pharmaceutics-10-00021]\]. Treatment intervals for many patients cannot be extended beyond eight weeks \[[@B6-pharmaceutics-10-00021]\], resulting in a large group of patients who require frequent injections for long periods of time. This large number of intravitreal injections burdens physicians and their staffs, and challenges patients' compliance. Therefore, new, longer acting anti-VEGF medications and drug delivery systems are needed to improve outcomes, optimize compliance, and reduce the total cost of care. This manuscript discusses extended duration anti-VEGF therapies that have been recently introduced, as well as those that are in various stages of development. 2. Vascular Endothelial Growth Factor (VEGF) Physiology and Pharmacokinetics {#sec2-pharmaceutics-10-00021} ============================================================================ VEGF was discovered independently by two research groups in 1989 \[[@B1-pharmaceutics-10-00021],[@B2-pharmaceutics-10-00021]\] and its important role in both physiologic angiogenesis and pathological neovascularization was realized almost immediately. VEGF is actually a group of molecules that segregate into seven closely related families: VEGF-A, VEGF-B, VEGF-C, VEGF-D, VEGF-E, VEGF-F, and placental growth factor (PlGF) \[[@B7-pharmaceutics-10-00021]\]. Each of the families is characterized by common, critical binding sequences, and most families contain multiple isoforms that share similar binding properties and biological actions. VEGF-A synthesis is upregulated in eyes with chorioretinal vascular conditions, including nAMD, diabetic macular edema (DME), and retinal vein occlusion (RVO) \[[@B3-pharmaceutics-10-00021]\], and is believed to play a central role in the development of these conditions. Several in vivo models show that VEGF-A promotes the growth of choroidal neovascular membranes \[[@B8-pharmaceutics-10-00021]\] and produces retinal vascular lesions that resemble DR \[[@B9-pharmaceutics-10-00021]\]. Evidence suggests that VEGF~165~ may be the most biologically active isoform because of its high tissue concentrations and 10-fold potentiation of activity through its interaction with the transmembrane co-receptor neuropilin-1 \[[@B10-pharmaceutics-10-00021]\]. Most VEGF inhibitory molecules block the receptor binding region (amino acids 81--92) of VEGF-A isoforms, whereas pegaptanib interacts with the heparin binding region (amino acids 110--165) of VEGF~165~. Research suggests that VEGF-B, VEGF-C, VEGF-D, and PlGF may also contribute to pathologic ocular angiogenesis in humans but their relative contribution is not known \[[@B11-pharmaceutics-10-00021],[@B12-pharmaceutics-10-00021]\]. Increased VEGF synthesis by vascular endothelial cells, glia, pericytes, Müller cells, retinal pigment epithelium (RPE) cells, and invading leukocytes \[[@B13-pharmaceutics-10-00021],[@B14-pharmaceutics-10-00021]\] results from tissue ischemia and inflammation \[[@B15-pharmaceutics-10-00021],[@B16-pharmaceutics-10-00021]\]. Cells throughout the retina and choroid respond to increased VEGF concentrations but the primary targets are retinal and choroidal vascular endothelial cells \[[@B17-pharmaceutics-10-00021]\]. VEGF-A has a short half-life of 30 min in the eye and serum, and homeostatic concentrations are generally low (approximately 9 ng/mL) \[[@B18-pharmaceutics-10-00021]\]. Some systemic conditions increase serum VEGF concentrations but chorioretinal vascular conditions produce insufficient VEGF to meaningfully change serum levels. 3. Currently Available Therapies {#sec3-pharmaceutics-10-00021} ================================ Several anti-VEGF drugs have been developed exclusively for ocular use or, in the case of bevacizumab, are used off-label for chorioretinal vascular conditions. Peak clinical efficacies of these drugs (except for pegaptanib) are similar and though product labels describe different injection intervals (monthly or every two months) the differences in their duration of action are on the order of only days. Currently available drugs, recently failed therapies, and drugs and systems under development are listed in [Table 1](#pharmaceutics-10-00021-t001){ref-type="table"}. 3.1. Pegaptanib {#sec3dot1-pharmaceutics-10-00021} --------------- Pegaptanib (molecular weight (MW) of 50 kDa), an aptamer to VEGF, was the first ocular drug approved for the intravitreal treatment of neovascular age-related macular degeneration (nAMD). Clinicians hoped that q6week treatment with pegaptanib would improve best corrected visual acuity (BCVA) but in most eyes it only decreased the rate of vision loss by approximately one half \[[@B19-pharmaceutics-10-00021]\]. Its use dropped significantly when more potent anti-VEGF drugs were introduced and pegaptanib is rarely used today. 3.2. Bevacizumab {#sec3dot2-pharmaceutics-10-00021} ---------------- Bevacizumab is a full-length, recombinant, humanized, monoclonal antibody (MW of 149 kDa) that binds all isoforms of VEGF-A. It was developed and approved for the intravenous treatment of several advanced solid tumors (colorectal carcinoma, non-small cell lung carcinoma, renal cell carcinoma, glioblastoma, and breast cancer, though this approval was rescinded in 2011) \[[@B20-pharmaceutics-10-00021]\]. Single injections of bevacizumab were first given to patients with nAMD and macular edema due to a central retinal vein occlusion (CRVO) in 2005 \[[@B39-pharmaceutics-10-00021],[@B40-pharmaceutics-10-00021]\], and within six months off-label use of bevacizumab had become the accepted standard-of-care treatment of chorioretinal vascular conditions. Hundreds of ocular disease studies have established bevacizumab's efficacy and safety, though the best evidence comes from the Comparison of Age-related Macular Degeneration Treatment Trials (CATT) for nAMD and the Diabetic Retinopathy Clinical Research Network Protocol T trial for DME \[[@B6-pharmaceutics-10-00021],[@B21-pharmaceutics-10-00021]\]. The use of bevacizumab varies among countries due to regulatory restrictions, reimbursement policies, and availability of safely compounded drug. Because physicians have accumulated extensive clinical experience with bevacizumab and are able to acquire it inexpensively, bevacizumab remains the most commonly used anti-VEGF drug in the United States. 3.3. Ranibizumab {#sec3dot3-pharmaceutics-10-00021} ---------------- Ranibizumab is a recombinant, humanized, monoclonal antibody fragment (Fab with MW of 48 kDa) that binds all isoforms of VEGF-A \[[@B4-pharmaceutics-10-00021]\]. It has been approved by the United States Food and Drug Administration (USFDA) for the treatment of nAMD (2006), DME, DR, macular edema due to vein occlusions, and choroidal neovascular membranes (CNVM) associated with high myopia \[[@B22-pharmaceutics-10-00021]\]. Following completion of the phase III MARINA and ANCHOR trials, ranibizumab was approved for the monthly treatment of nAMD and subsequently for PRN treatment. The CATT trial reported that PRN treatment is non-inferior to monthly treatment for nAMD \[[@B6-pharmaceutics-10-00021]\] though pooled data from CATT and IVAN suggest that PRN is inferior to monthly injections. Ranibizumab is approved for the monthly treatment of DME, but after one year of intensive treatment in the Diabetic Retinopathy Clinical Research (DRCR).net Protocol I trial, less frequent injections are needed during subsequent years \[[@B41-pharmaceutics-10-00021]\]. Because ranibizumab was the first approved intravitreal anti-VEGF drug (after pegaptanib), it became the standard against which other drugs have been compared in most randomized, controlled trials. These trials have included CATT \[[@B6-pharmaceutics-10-00021]\], IVAN \[[@B42-pharmaceutics-10-00021]\], and the other national AMD trials; the VIEW 1 and 2 trials (nAMD) \[[@B43-pharmaceutics-10-00021]\]; CEDAR and SEQUOIA (nAMD); and DRCR.net Protocol T (DME) \[[@B21-pharmaceutics-10-00021]\]. 3.4. Aflibercept {#sec3dot4-pharmaceutics-10-00021} ---------------- Aflibercept is a recombinant fusion protein (MW of 115 kDa) consisting of the natural (all human) extracellular ligand binding sequences of VEGFR1 (domain 2) and VEGFR2 (domain 3) attached to the Fc portion of an IgG molecule \[[@B24-pharmaceutics-10-00021]\]. Aflibercept is approved for the treatment of nAMD, DME, DR, and macular edema due to RVO \[[@B23-pharmaceutics-10-00021]\]. The three-dimensional configuration of aflibercept enables it to simultaneously bind both sides of the VEGF dimer in a "two-fisted grasp". This results in a higher binding affinity for VEGF~165~ (*k~D~* = 0.45 pM) compared to ranibizumab (*k~D~* = 46--172 pM) and bevacizumab (*k~D~* = 58--1100 pM) \[[@B44-pharmaceutics-10-00021]\]. Rabbit studies suggest that aflibercept has a slightly longer intravitreal half-life that either bevacizumab or ranibizumab but head-to-head human studies have not been performed \[[@B45-pharmaceutics-10-00021]\]. Peak efficacy of aflibercept in patients with nAMD is similar to that of ranibizumab but the duration of action is slightly longer \[[@B46-pharmaceutics-10-00021]\]. Though aflibercept is approved for q8week dosing (compared to monthly for ranibizumab), its duration of action exceeds that of ranibizumab by only five to seven days. So despite the fact that the phase III trials suggested that aflibercept could be equally effective with only half the dosing frequency of ranibizumab, clinical use suggests that the difference is considerably shorter. Ziv-aflibercept (Zaltrap^®^, Regeneron, Tarrytown, NY, USA) is the intravenous formulation of aflibercept that is used to treat advanced colorectal carcinoma. Small series of patients with nAMD, DME, and RVOs have responded well to intravitreal ziv-aflibercept with excellent improvements in macular morphology and visual acuity \[[@B47-pharmaceutics-10-00021]\]. Head-to-head studies with aflibercept have not been performed, but the two molecules will likely perform comparably, though the lower dose of ziv-aflibercept (1.25 mg vs. 2 mg) may provide a slightly shorter duration of action. 3.5. Conbercept {#sec3dot5-pharmaceutics-10-00021} --------------- Conbercept (KH902, Chengdu Kanghong Biotech Co., Sichuan, China) is a recombinant, fusion protein (MW of 143 kDa) that contains the second immunoglobulin (Ig) binding domain from VEGFR1, the third and the fourth binding domains from VEGFR2, and the Fc region of human IgG. Like aflibercept, conbercept acts as a soluble, decoy receptor \[[@B24-pharmaceutics-10-00021],[@B25-pharmaceutics-10-00021]\] that binds all isoforms of VEGF-A, VEGF-B, and placental growth factor. Conbercept has a high affinity for VEGF~165~ (*k~D~* = 0.77 pM) because the fourth Ig domain of VEGFR2 enhances the association rate of VEGF to the receptor \[[@B25-pharmaceutics-10-00021]\]. At concentrations between 100 ng/mL and 100 µg/mL, conbercept is not cytotoxic to cultured human retinal vascular endothelial cells (hRVACs). Conbercept significantly suppresses glucose-induced migration and sprouting of hRVACs by downregulating the expression of phosphoinositide 3-kinase and inhibiting the activation of Src, Akt1, and Erk1/2 \[[@B48-pharmaceutics-10-00021]\]. Four weeks after intravitreal injection, conbercept-treated diabetic rats had better retinal electrophysiological function, less retinal vessel leakage, and lower levels of PlGF, VEGFR2, PI3K, Akt, p-Akt, p-ERK and p-SRC than did Pbs or bevacizumab-treated rats \[[@B49-pharmaceutics-10-00021]\]. The distribution of claudin-5 and occludin in the retinal vessels of diabetic rats treated with conbercept was smoother and more uniform than those of diabetic rats treated by Pbs or bevacizumab. Conbercept is approved in China for the treatment of nAMD and a phase III trial evaluating the efficacy of conbercept for the treatment of DME is currently enrolling patients. Conbercept trials within the United States are now being planned. 4. Therapies under Development {#sec4-pharmaceutics-10-00021} ============================== The currently available anti-VEGF drugs have significantly advanced our treatment of chorioretinal vascular conditions and have benefitted hundreds of thousands of patients, but injections must usually be administered every four to eight weeks and treatment often continues for years. The extended durations of action that were promised by the newer drugs have not concretized, since a wealth of clinical experience shows us that the differences among the drugs are far shorter than are suggested by the packaging labels. Nevertheless, research continues with new drugs and delivery methods that developers hope will extend the clinical duration of action. Several of the most promising drugs and some of the recent failures are discussed below. 4.1. Abicipar Pegol {#sec4dot1-pharmaceutics-10-00021} ------------------- Abicipar pegol is a designed ankyrin repeat protein (DARPin) that binds all isoforms of VEGF-A. Its small size (MW = 34 kDa) would suggest a brief intraocular half-life, but pegylation (binding to a poly(ethylene) glycol moiety) may give it the pharmacokinetic characteristics of a much larger molecule (approximately 250--350 kDa) \[[@B50-pharmaceutics-10-00021]\]. Abicipar has an intravitreal half-life of six days in rabbits and, in a small DME study of four eyes, of 13.4 days in humans \[[@B26-pharmaceutics-10-00021]\]. Its strong binding affinity to VEGF~165~ (*k~D~* = 2 pM) also favors a long duration of action. In dose escalation trials, a maximum tolerated dose of 4.2 mg was found, so investigators elected to develop the two-milligram dose. In the phase II PALM DME trial, abicipar injections every 8 or 12 weeks were non-inferior to monthly ranibizumab \[[@B51-pharmaceutics-10-00021]\]. In the ongoing phase III nAMD CEDAR (NCT02462928) and SEQUOIA (NCT02462486) trials, q8week and q12week abicipar is being compared to monthly ranibizumab. 4.2. Brolucizumab {#sec4dot2-pharmaceutics-10-00021} ----------------- Brolucizumab is a single-chain, high binding affinity (*k~D~* for VEGF~165~ = 1.6 pM), antibody fragment currently being developed by Alcon/Novartis (Ft. Worth, TX; Basel, Switzerland) for the treatment of nAMD \[[@B52-pharmaceutics-10-00021]\]. Its small size (MW = 26 kDa) allows for the injection (six milligrams) of 12--24 times as many molecules as with the other anti-VEGF drugs \[[@B27-pharmaceutics-10-00021]\]. A phase II clinical trial compared brolucizumab to aflibercept in patients with nAMD. The trial's primary objective was to compare the efficacy of six-milligram brolucizumab against two-milligram aflibercept with the primary endpoint being the mean change in BCVA from baseline to 12 weeks. Patients continued receiving q8week treatment until week 40, though brolucizumab patients were eligible for two q12week cycles. At week 12, BCVA gains with brolucizumab (+5.75 letters) were similar to those with aflibercept (+6.89 letters). Approximately 50% of brolucizumab patients were stable during the q12week cycles \[[@B53-pharmaceutics-10-00021]\]. The phase III nAMD clinical trials, HAWK and HARRIER, were initiated in December 2014, with an enrollment goal of 1700 patients in more than 50 countries. These two-year, double-masked, multi-center trials randomize patients with untreated nAMD to one of two dosage intervals of brolucizumab, or aflibercept bimonthly. At the 48-week primary endpoint, mean BCVA gains in both brolucizumab arms were non-inferior to aflibercept. The majority of patients receiving six milligrams brolucizumab (57% and 52%) were maintained exclusively on q12week dosing \[[@B28-pharmaceutics-10-00021]\]. 4.3. Ranibizumab Port Delivery System {#sec4dot3-pharmaceutics-10-00021} ------------------------------------- A refillable ranibizumab port delivery system is being co-developed by Genentech and ForSight Vision 4 to reduce the need for repeated intravitreal anti-VEGF injections. The preloaded implant is surgically implanted beneath the conjunctiva through a 3.2 mm scleral incision over the pars plana. The reservoir tip can be accessed easily in the office and refilled through the conjunctiva as needed. The device continuously releases ranibizumab into the vitreous between refills. A phase I trial for patients with nAMD was performed in Latvia \[[@B29-pharmaceutics-10-00021]\]. At baseline, the reservoir was implanted and eyes were given 500 µg of ranibizumab, 250 µg into the vitreous and 250 µg into the reservoir for sustained release. Additional refills were performed when indicated by optical coherence tomography (OCT) evaluation of disease activity. The primary endpoint was 12 months with an observation period that extended through 36 months. The primary objective of the study was safety assessment, with secondary objectives that included functional measurements. Four of the patients suffered significant or serious adverse events (endophthalmitis, vitreous hemorrhage (2), and traumatic cataract) but three of these four had improved vision by the study's endpoint. The average visual acuity gains for the cohort were +10 letters, 10 eyes (50%) gained at least three lines, and two (10%) lost at least three lines. The mean number of refills through 12 months was 4.8 per patient. The multicenter, randomized, treatment-control, phase II LADDER trial will include 220 patients at 55 U.S. sites. Patients will be randomized 3:3:3:2 to receive one of three different ranibizumab implant doses or monthly 0.5 mg ranibizumab injections. Study enrollment was completed in October 2017 \[[@B30-pharmaceutics-10-00021]\]. 4.4. Gene Therapy {#sec4dot4-pharmaceutics-10-00021} ----------------- Avalanche Biotechnologies developed a viral delivery system (AVA-101) to induce long-term anti-VEGF receptor synthesis by the outer retina. An adenovirus vector inserts the DNA for a naturally occurring sFLT-1 (soluble VEGF receptor-1) into RPE cells. Infected cells synthesize and excrete the soluble VEGF inhibitory protein into the outer retina and choriocapillaris. In a phase IIa trial, 21 patients with nAMD received AVA-101, with 0.5 mg ranibizumab injected both at baseline and one month, and as rescue therapy when needed. Patients underwent core vitrectomy and subretinal injection of AVA-101 adjacent to the macula at day seven. Evaluations were performed monthly and patients were eligible for rescue ranibizumab therapy based on pre-specified criteria. Eleven control patients received only 0.5 mg ranibizumab monthly. At the 52-week endpoint, mean improvement in BCVA was +2.2 letters in the AVA-101 group compared to −9.3 letters in the control group \[[@B31-pharmaceutics-10-00021]\]. These differences were statistically significant. Mean center point thickness improved by −27 µm in the AVA-101 group and −85 µm in the control group. There were no serious ocular adverse events in the AVA-101 group and no systemic safety signals were noted. All patients in the AVA-101 group that were phakic at baseline developed cataracts and three (14%) developed moderate vitreous hemorrhages. Gene therapy was well tolerated by patients but the technology failed to provide a complete or durable anti-VEGF response. Though AVA-101 produced superior BCVA changes compared to the control group, the overall performance of the AVA-101 group was disappointing. Soon after the phase IIa trial results were announced, Avalanche decided not to proceed with phase IIb trials \[[@B54-pharmaceutics-10-00021]\]. 4.5. Encapsulated Cell Technology {#sec4dot5-pharmaceutics-10-00021} --------------------------------- Encapsulated cell technology (ECT) uses immortalized RPE cells that have been programmed to over-synthesize a specified biochemical product, and packages them in a cylinder lined by semi-permeable membranes that allow ingress of nutrients and egress of the synthesized product. The membrane prevents outward migration of the modified cells while shielding them from the body's immune system. The 10 mm long cylinder is surgically implanted through the pars plana and is sutured to the sclera. Trials with ciliary neurotrophic factor (CNF) production have been completed in eyes with retinitis pigmentosa and atrophic AMD \[[@B32-pharmaceutics-10-00021]\]. Pharmacokinetic analyses showed that the half-life of CNF production was 54 months and the ECT cylinder was well tolerated. Unfortunately, the trials failed to meet their primary therapeutic endpoints. Phase I trials with a cylinder that produces a high-affinity VEGF binding protein similar to aflibercept have been completed. A multi-center phase II trial compared a higher dose, anti-VEGF implant against ranibizumab therapy. The trial was discontinued early because a larger number of patients than expected required intravitreal rescue injections \[[@B33-pharmaceutics-10-00021]\]. No further nAMD trials have been announced but Neurotech continues to develop the platform for other retinal vascular conditions such as macular telangiectasia. 4.6. Colloidal Carriers {#sec4dot6-pharmaceutics-10-00021} ----------------------- Injections of some liposomal drug formulations have shown promise including early work with anti-VEGF agents. In experimental models, in vitro release of ranibizumab from negatively charged liposomes was exhausted at two days, whereas ex vivo transport across sclera (simulating a subconjunctival injection) occurred in a linear manner for seven days \[[@B34-pharmaceutics-10-00021]\]. This suggests that sclera acts as a classic membrane that allows the diffusion of liposomal-formulated ranibizumab and raises the possibility that subconjunctival injections could serve as long-acting depots. These results differ from those reported by Kim et al. \[[@B55-pharmaceutics-10-00021]\] in which poly lactic-co-glycolic acid nanoparticles and liposomes do not facilitate drug diffusion across sclera. A steep concentration gradient created by the thick sclera, Bruch's membrane-choroid, and retinal pigment epithelium results in low drug concentrations within the retina. 4.7. Pump Delivery {#sec4dot7-pharmaceutics-10-00021} ------------------ Microelectromechanical system (MEMS) technology is a miniaturized system that is currently used in insulin pumps to deliver drug to tissues. The Posterior MicroPump Drug Delivery System (PMP, Replenish Inc., Pasadena, CA, USA) using MEMS technology is implanted on the sclera, similar to placement of a glaucoma drainage device, to deliver drug into the eye. Long-term safety after implantation into animal eyes has been demonstrated \[[@B35-pharmaceutics-10-00021],[@B36-pharmaceutics-10-00021]\] as the PMP reliably delivered 100 programmed doses of an anti-VEGF drug (equivalent to over eight years of therapy). The PMP was well tolerated by 11 patients with DME over three months, with no cases of endophthalmitis or strabismus \[[@B37-pharmaceutics-10-00021]\]. 4.8. Topical Therapy {#sec4dot8-pharmaceutics-10-00021} -------------------- PanOptica, Inc. is developing a topical anti-VEGF medication (PAN-90806) for the treatment of nAMD and proliferative diabetic retinopathy (PDR). In animal models, pharmacokinetic measurements show excellent drug concentrations in the central retina and choroid as long as 17 h after administration. Control of leakage and bleeding from choroidal neovascular membranes was comparable to that achievable with intravitreal anti-VEGF antibodies, but with minimal systemic exposure to the drug. In a phase II trial with 50 treatment-naïve nAMD patients, an independent panel of experts judged that PAN-90806 showed promise as a therapeutic agent \[[@B38-pharmaceutics-10-00021]\]. Approximately 45--50% of treated patients experienced improvements in vascular leakage, retinal morphology, and vision. No systemic adverse events were noted and ocular surface irritation due to the eye drops reversed when therapy was discontinued. PanOptica plans to investigate higher doses in a phase I/II nAMD trial, and a phase I trial for the treatment of PDR is underway. 5. Discussion {#sec5-pharmaceutics-10-00021} ============= The quest for longer duration anti-VEGF therapies continues along several fronts with the injectable drugs abicipar and brolucizumab most likely to achieve US FDA approval. Each drug may be shown to be effective as q12week therapy---roughly half of the brolucizumab patients were sustained on q12week injections---but the importance of such a finding is not clear. Control groups in the phase III trials were treated with q4week ranibizumab and q8week aflibercept but neither of these drugs was tested in a q12week arm. Therefore, true head-to-head comparisons of these control drugs to abicipar and brolucizumab have not been performed with similar injection frequencies. In the VIEW trials, q4week ranibizumab was compared to q8week aflibercept during the first year. Aflibercept-treated patients experienced comparable improvements in BCVA and edema at 52 weeks compared to ranibizumab and was approved for q8week therapy (compared to q4week for ranibizumab). However, when patients received PRN (with 12-week cap) injections in the second year of the trials, aflibercept-treated patients received a mean of 4.2 injections, compared to 4.7 for ranibizumab. This difference in durations of action has been estimated to be five to seven days and post-approval experience also suggests that the difference is small. It is reasonable to suspect that post-approval differences with abicipar and brolucizumab will also be disappointingly small. The quest for a single application, long-term anti-VEGF therapy has been disappointing. Encapsulated cell technology and adenovirus-mediated gene therapy are exciting technologies, but both failed to perform adequately in phase II trials and neither developer will pursue phase III anti-VEGF trials. The ranibizumab port delivery system allows for trans-conjunctival (as opposed to intravitreal) injections as needed. However, since the phase I trial required a mean of 4.8 refills over the course of 12 months, this does little to decrease the frequency of clinic visits or injections. Unless the new dosing arms in the phase II trials decrease the number of refills, many physicians will likely continue with PRN and treat and extend regimens since they have comparable treatment burdens. The use of eye drops does not constitute long-duration therapy but some patients will prefer self-administering drops when coupled with infrequent visits to the clinic. Eye drops effectively treat many anterior segment conditions and experimental CNVM in rats, but drops do not effectively treat retinal disorders in humans. Because topically delivered medications must pass through cornea, conjunctiva, sclera, uvea, and vitreous to reach the retina, the molecule must be small. Therefore, antibody-related macromolecules would be ineffective in eye drop form. We have been fortunate in identifying VEGF as a pivotal molecule in the pathogenesis of chorioretinal vascular conditions, but just as the search for additional molecular targets has been disappointing, our attempts to significantly extend the duration of action of anti-VEGF therapy has met with more failures than successes. Despite ongoing research, it remains likely that frequent injection of anti-VEGF drugs will remain the standard-of-care for several years to come. Michael W. Stewart was solely responsible for the production of this manuscript. Alkahest: Consultant; Allergan: Institutional research support; Bayer: Consultant; Regeneron: Institutional research support. pharmaceutics-10-00021-t001_Table 1 ###### This table lists the currently available anti-VEGF drugs, several that have failed clinical trials, and others that are in various stages of development. Additional information includes regulatory approvals and comments on drug characteristics, pharmacokinetics, preclinical studies, and clinical trials. AMD: age-related macular degeneration; DME: diabetic macular edema; DR: diabetic retinopathy; RVO: retinal vein occlusion; VEGF: vascular endothelial growth factor; PlGF: placental growth factor; CNVM: choroidal neovascular membrane; RPE: retinal pigment epithelium; BCVA: best corrected visual acuity. ---------------------------------------------------- ---------------------------------------------------------------------------------------------------- ----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- **Currently Available Drugs** **Drug** **Approvals** **Comments** Pegaptanib Neovascular AMD Binds to VEGF~165~Poor efficacy \[[@B19-pharmaceutics-10-00021]\], used rarely Bevacizumab Advanced carcinomas \[[@B20-pharmaceutics-10-00021]\] Off-label for all ophthalmic use Recombinant, humanized, murine antibody to VEGF-ANational Eye Institute sponsored studies have established effectiveness for neovascular AMD \[[@B6-pharmaceutics-10-00021]\], DME \[[@B21-pharmaceutics-10-00021]\], and RVOsInexpensive dose cost after compoundingMost commonly used intraocular anti-VEGF drug in the United States Ranibizumab Neovascular AMD, DME, DR, Macular edema due to RVOs, Myopic CNVM \[[@B22-pharmaceutics-10-00021]\] Recombinant, humanized, murine antibodyfragment (Fab) to VEGF-A \[[@B4-pharmaceutics-10-00021]\]Most thoroughly studied anti-VEGF drug Aflibercept Neovascular AMD \[[@B23-pharmaceutics-10-00021]\], DME, DR, Macular edema due to RVOs Completely human, fusion protein, soluble receptor \[[@B24-pharmaceutics-10-00021]\]High affinity for VEGF-A, VEGF-B, and PlGF Conbercept Neovascular AMD (China only) Similar structure and binding affinity as aflibercept \[[@B24-pharmaceutics-10-00021],[@B25-pharmaceutics-10-00021]\]In phase III DME trialUnited States trials being planned **Therapies Under Development or Recently Failed** **Drug** **Technology** **Comments** Abicipar Designed Ankyrin Repeat Protein (DARPin) Pegylation may extend intravitreal half-life (estimated as 13.4 days in humans) \[[@B26-pharmaceutics-10-00021]\]Phase III CEDAR and SEQUOIA nAMD trials have completed enrollmentq8week and q12week experimental arms; control is q4week ranibizumab Brolucizumab Single strand, antibody fragment Small size (26 kDa) allows for injection of large quantity of drug \[[@B27-pharmaceutics-10-00021]\]Phase III nAMD trials recently completed57% and 52% of eyes sustained with q12week injection intervals \[[@B28-pharmaceutics-10-00021]\] Ranibizumab Port Delivery System Trans-scleral refillable drug reservoir Reservoir is refilled via trans-conjunctivalinjectionPhase I study showed +10 letter improvement in BCVA with average of 4.8 refills \[[@B29-pharmaceutics-10-00021]\]Phase II LADDER trial underway with three different dose treatment arms \[[@B30-pharmaceutics-10-00021]\] AVA-101 Adenovirus vector Insertion of soluble VEGF-receptor DNA Injected subretinally after vitrectomyBCVA changes were better than ranibizumab in phase II trial but both arms performed poorly with minimal decrease in edema \[[@B31-pharmaceutics-10-00021]\] NT-503 Encapsulated Cell Technology using immortalized RPE cells Ciliary neurotrophic eluting device failed in dry AMD and retinitis pigmentosa trials \[[@B32-pharmaceutics-10-00021]\]High dose (NT-503) device failed in phase II neovascular AMD trial \[[@B33-pharmaceutics-10-00021]\]Currently being tested in patients with macular telangiectasia Colloidal Carriers Liposomal formulated ranibizumab Liposomal formulation delays drug releaseRanibizumab can cross sclera after subconjunctival depot \[[@B34-pharmaceutics-10-00021]\] Posterior Micropump Delivery System Microelectromechanical Systems (MEMS) Technology Same technology as in insulin pumpsSafely delivered 100 injections in animal models \[[@B35-pharmaceutics-10-00021],[@B36-pharmaceutics-10-00021]\]Three-month DME trial in humans was well tolerated \[[@B37-pharmaceutics-10-00021]\] PAN-90806 Small molecular weight drug Formulated for eye drop deliveryIn animal models, found to produce high retinal concentrations 17 h laterJudged to show therapeutic promise in small human nAMD study \[[@B38-pharmaceutics-10-00021]\] ---------------------------------------------------- ---------------------------------------------------------------------------------------------------- -----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
{ "pile_set_name": "PubMed Central" }
//===- llvm/Assembly/PrintModulePass.h - Printing Pass ----------*- C++ -*-===// // // The LLVM Compiler Infrastructure // // This file is distributed under the University of Illinois Open Source // License. See LICENSE.TXT for details. // //===----------------------------------------------------------------------===// // // This file defines two passes to print out a module. The PrintModulePass pass // simply prints out the entire module when it is executed. The // PrintFunctionPass class is designed to be pipelined with other // FunctionPass's, and prints out the functions of the module as they are // processed. // //===----------------------------------------------------------------------===// #ifndef LLVM_ASSEMBLY_PRINTMODULEPASS_H #define LLVM_ASSEMBLY_PRINTMODULEPASS_H #include <string> namespace llvm { class FunctionPass; class ModulePass; class raw_ostream; /// createPrintModulePass - Create and return a pass that writes the /// module to the specified raw_ostream. ModulePass *createPrintModulePass(raw_ostream *OS, bool DeleteStream=false, const std::string &Banner = ""); /// createPrintFunctionPass - Create and return a pass that prints /// functions to the specified raw_ostream as they are processed. FunctionPass *createPrintFunctionPass(const std::string &Banner, raw_ostream *OS, bool DeleteStream=false); } // End llvm namespace #endif
{ "pile_set_name": "Github" }
Known couplings, of the type defined above employ an exterior power means such as a source of fluid under pressure (see U.S. Pat. No. 2,958,315 and FR-A-2,187,051 and 1,085,087).
{ "pile_set_name": "USPTO Backgrounds" }
Q: ArcGIS API - call function onClick() I have managed to get my tiled maps working using the ArcGIS javascript API. However, I want to be able to switch layers (showing different years). I created a function that will do this: require(["esri/map", "esri/layers/ArcGISTiledMapServiceLayer", "esri/geometry/Point", "esri/SpatialReference", "dojo/domReady!"], function (Map, Tiled, Point, SpatRef) { ... function veranderTiled(jaar){ map_Thema_2.removeAllLayers(); tiled = new Tiled( "http://tiles.arcgis.com/tiles/nSZVuSZjHpEZZbRo/arcgis/rest/services/Historische_tijdreis_"+jaar+"/MapServer"); map_Thema_2.addLayer(tiled); } ... }); I want to call this function when I, say, press a button at a random place on my page. Like this: <input name="" type="button" onClick="veranderTiled(2015)" value="Ander jaar" /> The function itself works fine, but I cannot seem to call it from anywhere outside of the require(...) part. I am not sure how javascript handles such accessibility (mostly used to C++), but I do wonder what I should change in order to be able to call this function from outside this particular script. Edit: as expected, the console returns that the function is not defined. Is there a way to point it to the right location (something like map.veranderTiled(2015)?) A: This is an issue of scope - as you surmised, the function is only defined within the scope of the require callback. There are typically 2 ways to solve this problem. The first is to give the button an ID and assign it the event handler within the require callback (assuming that either your scripts are at the end of body or you have required dojo/domReady! to wait for the body to load first): require(..., function (...) { ... document.getElementById('veranderTiledButton').onclick = function () { veranderTiled(2015); }; }); (You could also use dojo/on to hook up the event, though it's not crucial in this case.) The second way is to make the function globally available, which is generally discouraged since the global variable scope quickly becomes the wild west if your code does this sporadically: var veranderTiled; // Declare outside to be globally available require(..., function (...) { ... // Define inside to be able to use loaded modules veranderTiled = function (jaar) { ... }; ... });
{ "pile_set_name": "StackExchange" }
In recent years, technologies have emerged which can provide high density electrical interconnections between an integrated circuit (IC) chip and a substrate to form IC assemblies, otherwise known as IC packages. These technologies for forming electrical connections between an IC chip and a substrate are commonly known as wire bonding, tape-automatic bonding (TAB) and solder flip-chip bonding. Although, all these bonding techniques can be used to form high density electrical interconnections, the use of one particular technique over another is typically dictated by the desired number and spacing of the electrical connections on the IC chip and the substrate, as well as the permissible cost for assembling the IC package. In a comparison of these three techniques, wire bonding is the most common technique for electrically connecting an IC chip to a substrate. This is due to that fact that this technique provides the maximum number of chip connections with the lowest cost per connection. A disadvantage of wire bonding is that inductance present in the wires used in connecting the IC chip to the substrate degrades the electrical performance of the assembled IC package. Moreover, since the wires connect perimeter connections of the IC chip to contacts on the substrate in areas not occupied by the IC chip, wire bonding electrical interconnects require a relatively large surface area of the substrate. Lastly, since wire bonding requires each connection between the IC chip and the substrate to be made one at a time, the process of electrically interconnecting an IC chip to a substrate using the wire bonding technique is somewhat time consuming. TAB bonding permits a higher density of electrical interconnects when compared to wire bonding. However, TAB bonding is more expensive than wire bonding because TAB bonding requires special tooling for each different IC chip design. Also, like wire bonding, TAB bonding requires perimeter connections and therefore a relatively large surface area of the substrate to accomplish the IC chip and substrate electrical interconnect. Moreover, like wire bonding, undesirable inductance as a result of TAB bonding degrades the electrical performance of the IC chip circuitry. Flip-chip bonding is achieved by providing an IC chip with an area array of solder wettable contact pads which comprise the signal terminals on the chip. A matching footprint of solder wettable contact pads are provided on the substrate. Before assembly onto the substrate, solder bumps are deposited on the metal pads of the chip and/or the substrate. The chip is then placed upside down on the upper surface of the substrate such that the metal pads (solder bumps) of the chip are in alignment with the metal pads (solder bumps) of the substrate. All connections between the chip and the substrate are then made simultaneously by heating the solder bumps to a reflow temperature at which the solder flows and an electrically conductive joint is formed between the contact pads of the IC chip and the substrate. When compared to wire bonding and TAB bonding, flip-chip bonding of an IC chip to a substrate provides the advantage of requiring less surface area on the substrate, and thereby facilitates high-density interconnections commonly required in IC assemblies. Since the interconnections between the substrate and the IC chip in flip-chip bonding are short, well controlled electrical characteristics are provided, and undesirable inductance that can degrade the electrical performance of the IC chip circuitry is minimized. In other words, high speed signals are thus propagated in and through the packaged integrated circuits with minimum delay and distortion. There is a need for improved integrated circuit assemblies. In particular there is a need for an improved integrated circuit assembly that can be assembled using flip-chip bonding techniques to achieve a packaged integrated circuit having low interconnect capacitance, thereby improving signal speed and eliminating some need for off chip driver cells. The improved integrated circuit assembly should provide these features while being amenable to high volume low defect manufacturing.
{ "pile_set_name": "USPTO Backgrounds" }
Brain metastases from epithelial ovarian cancer: a review of the literature. Brain metastases from epithelial ovarian cancer (EOC) are rare. This report is based on a review of the literature. This review summarizes the incidence, clinical features, pathophysiology, and diagnostic evaluation of EOC. The section on current treatment includes a thorough evaluation of the literature, highlights controversies over treatment options, and provides insight into novel approaches. Current treatment options include surgical resection, whole-brain radiation therapy (WBRT), stereotactic radiosurgery, and chemotherapy. Corticosteroids and anticonvulsant medications are commonly used for the palliation of mass effects and seizures, respectively. In the reviewed series, a better outcome was seen following surgical resection and WBRT with or without chemotherapy for solitary and resectable brain metastases. The prognosis for patients with brain metastases from EOC is poor. A better outcome might be obtained using multimodality therapy. Because of the small number of patients included in the reported studies, multicenter clinical trials are needed for further investigation in order to critically evaluate the clear benefit of these treatment options in selected patients.
{ "pile_set_name": "PubMed Abstracts" }
This post by me was also on Left Foot Forward this morning: Boris Johnson is proposing that the UK should, post-Brexit, have at least ten freeports. So it’s worth examining what they do. The first thing to say is that just as tax havens come in many shapes and forms so too do freeports. It’s not wholly clear what the UK has in mind. In this case, the types need explaining. From warehouses to laundering-zones Some freeports are little more than what are called ‘bonded warehouses’. These have existed for many years and are locations where goods may be temporarily imported to a country without tariffs, excise duties and other taxes being paid before the goods are shipped on again. It’s hard to argue against the usefulness of such facilities if, and this is the key point, the goods are never intended to stay in the place where they have been landed, temporarily. The arrangement avoids double tax, and double taxation has no more virtue than no tax. Such warehouse can be at either sea or airports. Form here the story goes downhill. Another form of freeport are those described by Oddný Helgadóttir of Copenhagen Business School, with whom I have worked, as ‘luxury freeports’. These are usually located at airports. By far the most common item held in such places are works of art, although other small, high value items might also be found there. The one in Geneva is thought to hold more than a million such works of art, long unseen by their owners or anyone else, come to that. Why do that? The attraction might be tax. Luxury freeports are usually exempt from all taxes, whether that be import tariffs, value added tax, capital gains tax or other charges that could be levied on the owner of art. And if that art is held through an anonymously owned offshore company (and the evidence is that it very often is) then it is also highly likely that the artwork will also be outside the scope of wealth taxes, and other rules on inheritance because its ownership will simply not be declared. Hiding in plain sight Economist Gabriel Zucman has suggested the ultra wealthy might be the biggest tax evaders in the world. Freeport activity of this sort is a way to achieve that, apparently legitimately. That’s not the only attraction of such places though. Mobile, and untraceable, goods of inherently uncertain value can be very useful indeed for another purpose, and that is money laundering. Any old copy artwork can mysteriously inflate in value when a dodgy certificate of provenance is attached to it in such a place, and what went in as a poor canvas comes out as the way of turning illicit funds into legitimate cash, and all very often behind very opaque doors that mean no one can trace what is going on. Something stinks The hint of corruption has always hung over such freeports as a consequence, and who knows if recent law changes in the EU requiring improved money laundering controls upon such places will apply in a no-deal Brexit Britain? If not, any such locations in the UK would be very popular indeed. What else do freeports do? Between the useful and the illicit as already described, there is the downright dodgy. These are the often quite sizeable freeports where businesses are encouraged to relocate themselves within a country. The incentive to move is a range of pretty dubious tax and regulatory incentives. These might be in the form of lower or no import tariffs; lower rates of tax on employing staff; an absence of business rates; reduced corporation tax, and more besides – including direct subsidies. The aim is to supposedly incentivise new business activity. There is no real evidence from developing countries, where such arrangements are commonplace, that this ever works. All that happens is that existing business relocates into the freeport and their owners get richer. This point is important, because the regulatory relaxations that goes alongside these tax reliefs often relate to employee protection; exemption from minimum wage and other employment rules; relaxation of health and safety requirements and even relaxed rules on product standards. All of those are a licence to abuse of course, and not just employees but consumers as well. Who takes advantage of all this? Get-rich-quick employers, of course. And is there any chance of ‘trickle down’? Almost none at all, research suggests: that’s another spurious claim for such relaxations of tax and regulations for which evidence is remarkably lacking. The real motive So why establish freeports? To aid and abet the free and possibly corrupt flow of wealth around the world is one answer. And to help capitalists of the worst sort make a quick buck is the other possible answer. And that’s about it, because no one else in society really benefits. But they do pick up the costs, in supporting low pay; having less tax revenue flow into the economy; seeing the wealth divide increase; and suffering the type of ‘fly-by-night’ regulatory abuse that government should exist to stop, and not encourage. Freeports are almost always a step in the wrong direction for any country. For the UK they will be another leap into the post-Brexit dark.
{ "pile_set_name": "OpenWebText2" }
Newsletter Union, SRS security contractor still at odds after 2 weeks Striking security worker John Emery, right, pickets with other workers at the Savannah River Site Tuesday afternoon August 15, 2017 in Jackson, SC. The main sticking points in negotiations with Centerra were an increase in insurance premiums and changes in how the company handles employee transfers. MICHAEL HOLAHAN/STAFF George Parks, chief steward of United Professional Pro-Force of Savannah River, Local 125, broke ranks and did not go on strike. He received a threatening letter at his home and has been ostracized at work. The union president says he’ll be kicked out when the strike is over. Mathias Miller, president of United Professional Pro-Force of Savannah River, Local 125, says Centerra-SRS is trying to take rights from workers. Nobody’s getting what they wanted. The president of the union that represents security workers at Savannah River Site says the company they work for, Centerra-SRS, is trying to strip rights from workers as it prepares to seek a new contract with the Department of Energy in 2019. The union’s chief steward, who helped negotiate the contract, is not striking and says members were misled about the contract and the strike was called too hastily. Striking workers are figuring that out and returning to work every day, he says. The company says it negotiated in good faith and the result was “the most lucrative Protective Force Collective Bargaining Agreement ever proposed at a DOE Site anywhere in the country.” It wants to let striking workers know they are not locked out and can come back to work anytime. As the strike marks its 15th day today, the two sides seem no closer to resolution than when it began. The company wants workers to change their minds on the “last, best and final offer.” The union wants the company to bend on health insurance co-pays and a provision it says would let the company change the agreement “mid-stream.” Meanwhile, striking workers have no benefits, unless they buy their own health insurance through the federal COBRA program. No new negotiations have been started, and the union says the strike will continue until it gets “back to the table” with Centerra. The chief steward, George Parks, is paying a high price for breaking ranks. He says he’s received threats and has become an outcast among his brotherhood. Mathias Miller, president of United Professional Pro-Force of Savannah River, Local 125, says Parks will be kicked out when it’s all over because he’s an executive board member and should support the union’s position. “It hurts a little that guys whose children I’ve held, who I’ve represented in arbitration, are yelling at me when I drive by,” said Parks, who has worked at SRS more than 30 years and was elected to the executive board three times. Coming in to work a couple of days before the strike, a fellow worker said to him: “You’re going the wrong way, aren’t you?” After someone put a threatening letter in Parks’ mailbox at home, he filed a report with the Columbia County Sheriff’s Office, which now routinely patrols past his house. “You should be ashamed of yourself standing in front of the Union body and taking up for the company,” the letter, laced with racial epithets, read. “We know where you live and hang out and we will handle business with (you) real soon!” “The letter was not signed and was not in an envelope, which suggests that someone hand-delivered the letter to the mailbox,” a deputy wrote in his report. Parks said he’s doing what’s best for his family. “I believe in the right to strike, and to be pro-union, but I have to be able to live with myself and do what’s right,” he said. In contract negotiations, issues are addressed one at a time and when there’s agreement between union and company, they’re codified in a temporary agreement signed by both parties, Parks said. A series of temporary agreements eventually becomes the contract, and there were no hangups over policies, just money, he said. “A lot of people didn’t read the contract, and they were told ‘You gotta be a fool to vote for this contract. It’s all take-aways,’” Parks said. He believes he did a good job in negotiating, and defended the contract, knowing he would suffer for it, he said. “As we speak right now, people are coming back to work,” Parks said last week. “They’re trickling in. I don’t believe they were educated about what happens during a strike.” The company says more than 40 union members either did not strike or have returned. Miller, the union president, said he only knows of 32. Here’s a brief look at two key sticking points that led to the strike: Healthcare: The new contract would have instituted co-pays —$15 to visit a primary physician, $30 for a specialist — something workers didn’t have to pay before, Miller said. Out-of-pocket maximums would have been not more than $1,000 for an individual, not more than $2,000 for a family. Some visits or procedures might require a “co-insurance” payment of about 10 percent up front, and would count toward the out-of-pocket maximum. Actual premiums can’t be calculated until actuaries tally the claims from the past 24 months and forecast the amount of money needed to pay future claims, according to Centerra. The company pays 83 percent of the premium for an individual and 78 percent for a family. The union says the company would not give it an estimate of how much premiums might rise, but Centerra issued a news release Thursday that said it would likely be $3 a week for an individual, $9 for a family. Parks said he thinks that’s not too much for workers earning $80,000 to $100,000 a year. Amending the collective bargaining agreement: The union’s president says the contract “basically says if there’s a change in future that would normally be negotiated — if company and union can’t agree, there would a shortened negotiation and if that wasn’t successful the company could implement the change,” essentially voiding the contract. Centerra says any such changes would be dictated only by circumstances or changes in the company’s mission. The union would be notified and could negotiate. Either party could seek mediation, and if it failed, expedited non-binding arbitration. If that didn’t work, “the Company then could implement changes in accordance with the Company’s contractual obligations to the Government.”
{ "pile_set_name": "Pile-CC" }
Dress to Profess: What Should Scientists Wear? - jawns http://sciencecareers.sciencemag.org/career_magazine/previous_issues/articles/2014_04_24/caredit.a1400104 ====== tedsanders I'm a scientist. I'm at conference this second, in fact. Plenty of people are wearing suits. Also, lab coats in lab make sense. You don't to spill acids or solvents on an expensive suit. You also want to be mobileoso you can reach into hard to access machines and spaces. A suit is not practical for mobility. ~~~ chrisBob Conferences are completely different. At a conference there is a 50% chance I will wear a suit, but back at work on a regular day I am in jeans and a T-shirt which makes me _very slightly_ underdressed compared to my peers. A conference is more similar to a job interview which is the one time that even scientists get dressed up.
{ "pile_set_name": "HackerNews" }
Maintain Application Performance with real-time monitoring and instrumentation for any application. Learn More! The first major version of the scalable timeseries database I work on, Gnocchi, was a released a few months ago. In this first iteration, it took a rather naive approach to data storage. We had little ideas about if and how our distributed back-ends were going to be heavily used, so we stuck to the code of the first proof-of-concept written a couple of years ago. Recently we got more feedbacks from our users, ran a few benchmarks. That gave us enough feedback to start investigating improving our storage strategy. Data Split Up to Gnocchi 1.3, all data for a single metric are stored in a single gigantic file per aggregation method (min, max, average…). This means that the file can grow to several megabytes in size, which makes it slow to manipulate.For the next version of Gnocchi, our first work has been to rework that storage and split the data into smaller parts. The diagram above shows how data are organized inside Gnocchi. Until version 1.3, there would have been only one file for each aggregation methods. In the upcoming 2.0 version, Gnocchi will split all these data into smaller parts, where each data split is stored in a file/object. This allows us to manipulate smaller pieces of data and to increase the parallelism of the CRUDoperations on the back-end – leading to large speed improvement. In order to split timeseries into several chunks, Gnocchi defines a maximum number of N points to keep per chunk, to limit their maximum size. It then defines a hash function that produces a non-unique key for any timestamp. It makes it easy to find in which chunk any timestamp should be stored or retrieved. Data Compression Up to Gnocchi 1.3, the data stored for each metric is simply serialized using msgpack, a fast and small serialization format. However, this format does not provide any compression. That means that storing datapoints needs 8 bytes for a timestamp (64 bits timestamp with nanosecond precision) and 8 bytes for a value (64 bits double-precision floating-point), plus some overhead (extra information and msgpack itself). The first technique I implemented is easy enough and is inspired from delta-of-delta encoding. Instead of storing each timestamp for each data point, and since all the data points are aggregated on a regular interval, we transpose points to be the time difference divided by the interval. For example, the suite of timestamps timestamps =[41230, 41235, 41240, 41250, 41255] is encoded into timestamps =[41230, 1, 1, 2, 1], interval = 5. This allows regular compression algorithms to reduce the size of the integer list using run-length encoding. The XOR based compression scheme described in the Gorilla paper mentioned above – that I had to implement myself. For reference, it also exists a Go implementation in go-tsz. I then benchmarked these solutions: The XOR algorithm implemented in Python is pretty slow, compared to LZ4. Truth is that python-lz4 is fully implemented in C, which makes it fast. I've profiled my XOR implementation in Python, to discover that one operation took 20% of the time:count_lead_and_trail_zeroes, which is in charge of counting the number of leading and trailing zeroes in a binary number. I tried 2 Python implementations of the same algorithm (and submitted them to my friend and Python developer Victor Stinner by the way). The first version, using string search with .index() is 10× faster than the second one that only does integer computation. Ah, Python… As Victor explained, each Python operation is slow and there's a lot in the second version, whereas.index() is implemented in C and really well optimized and only needs 2 Python operations. Finally, I ended up optimizing that code by leveraging cffi to use directly ffsll() andflsll(). That decreased the run-time of count_lead_and_trail_zeroes by 45 %, making the entire XOR compression code speed increased by a small 7%. This is not enough to catch up with LZ4 speed. At this stage, the only solution to achieve a high-speed would probably to go with a full C implementation. Considering the compression ratio of the different algorithms, they are pretty much identical. The worst case scenario (random values) for LZ4 compress down to 9 bytes per data point, whereas XOR can go down to 7.38 bytes per datapoint. In general XOR encoding beats LZ4 by 15%, except for cases where all values are 0 or 1. However, LZ4 is faster than XOR by a factor of 4×-70×depending on cases. That means that we'll use LZ4 for data compression in Gnocchi 2.0. It's possible that we could achieve as fast compression/decompression algorithm, but I don't think it's worth the effort right now – it'd represent a lot of code to write and to maintain. Collect, analyze, and visualize performance data from mobile to mainframe with AutoPilot APM. Get a Demo!
{ "pile_set_name": "Pile-CC" }
Evolution of HLA-class I compared to HLA-class II polymorphism in Terena, a South-American Indian tribe. We have studied the HLA alleles of 60 unrelated healthy Terena and 10 Terena families. They are members of an isolated Brazilian tribe located in Mato Grosso do Sul (South Central Brazil). Six novel alleles were found in this population: HLA-A*0219 (gf = 0.02), A*0222 (gf = 0.15), HLA-B* 3520 (gf = 0.01), B*3521 (gf = 0.03), B*3912 (gf = 0.03) and B*4803 (gf = 0.16). Five of the six novel alleles differ from their putative progenitors by amino acid replacements in residues that contribute to the pockets of the peptide-binding site. Many of the variants defined by molecular methods were not identified correctly by serological typing. We calculated heterozygosity values (H) for HLA-A, -B, -C, DRB1, DQB1 and DPB . The highest values were observed at the HLA-B locus, followed by HLA-A, -DRB1 and DQB1. Residue positions 9, 24, 45, 62, 67, 95, 114, 116, 156, and 163 of HLA class I showed heterozygosity values greater than 0.50. Nine of them contribute to the peptide-binding specificity pockets and one to the T cell receptor binding site. If HLA antigens are useful for defense against pathogenic agents, heterozygosity would offer an advantage by allowing binding of a larger repertoire of peptides to the class I molecules. Individuals that are heterozygous at these positions would probably have a wider repertoire of peptide presentation to T cells. The observed results including the presence of novel alleles in the class I HLA loci suggest a functionally significant, more rapid evolution of class I compared to class II loci in this South American isolated population.
{ "pile_set_name": "PubMed Abstracts" }
1. Field of the Invention This invention relates primarily to the treatment of cereal grains to recover the starch and protein fractions. 2. Description of the Art Practices U.S. Pat. No. 3,951,938 issued to Kerkkonen et al on Apr. 20, 1976 describes a process for separating the components of a cereal grain into a starch and gluten fraction. The '938 process is stated to be advantageous over the Martin process which while initially using small quantities of water eventually uses larger quantities of water than the '938 process. The differences between the presently described process and the '938 process are described in detail infra. The agglomeration of protein is a necessary step as conventional processing requires that the protein be screened to be recovered. The larger the agglomerates of protein are, the easier the screening process is conducted. More importantly, when the protein is efficiently agglomerated less is lost to the waste stream. Throughout the specification and claims percentages and ratios are by weight and temperatures are in degrees Celsius unless otherwise noted. U.S. Pat. No. 3,951,938 is herein incorporated by reference.
{ "pile_set_name": "USPTO Backgrounds" }
/* xoreos - A reimplementation of BioWare's Aurora engine * * xoreos is the legal property of its developers, whose names * can be found in the AUTHORS file distributed with this source * distribution. * * xoreos is free software; you can redistribute it and/or * modify it under the terms of the GNU General Public License * as published by the Free Software Foundation; either version 3 * of the License, or (at your option) any later version. * * xoreos is distributed in the hope that it will be useful, * but WITHOUT ANY WARRANTY; without even the implied warranty of * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the * GNU General Public License for more details. * * You should have received a copy of the GNU General Public License * along with xoreos. If not, see <http://www.gnu.org/licenses/>. */ /** @file * A container of The Witcher objects. */ #ifndef ENGINES_WITCHER_OBJECTCONTAINER_H #define ENGINES_WITCHER_OBJECTCONTAINER_H #include <list> #include <map> #include "src/common/types.h" #include "src/aurora/nwscript/objectcontainer.h" #include "src/engines/witcher/types.h" namespace Engines { namespace Witcher { class Object; class Module; class Area; class Waypoint; class Situated; class Placeable; class Door; class Creature; class Location; /** A class able to sort objects by distance to a target object. */ class ObjectDistanceSort { public: ObjectDistanceSort(const Witcher::Object &target); bool operator()(Witcher::Object *a, Witcher::Object *b); private: float xt, yt, zt; float getDistance(Witcher::Object &a); }; class ObjectContainer : public ::Aurora::NWScript::ObjectContainer { public: ObjectContainer(); ~ObjectContainer(); void clearObjects(); /** Add an object to this container. */ void addObject(Witcher::Object &object); /** Remove an object from this container. */ void removeObject(Witcher::Object &object); /** Return the first object of this type. */ ::Aurora::NWScript::Object *getFirstObjectByType(ObjectType type) const; /** Return a search context to iterate over all objects of this type. */ ::Aurora::NWScript::ObjectSearch *findObjectsByType(ObjectType type) const; static Witcher::Object *toObject(::Aurora::NWScript::Object *object); static Module *toModule (Aurora::NWScript::Object *object); static Area *toArea (Aurora::NWScript::Object *object); static Waypoint *toWaypoint (Aurora::NWScript::Object *object); static Situated *toSituated (Aurora::NWScript::Object *object); static Placeable *toPlaceable(Aurora::NWScript::Object *object); static Door *toDoor (Aurora::NWScript::Object *object); static Creature *toCreature (Aurora::NWScript::Object *object); static Creature *toPC (Aurora::NWScript::Object *object); static Location *toLocation(Aurora::NWScript::EngineType *engineType); private: typedef std::list<Witcher::Object *> ObjectList; typedef std::map<ObjectType, ObjectList> ObjectMap; ObjectMap _objects; }; } // End of namespace Witcher } // End of namespace Engines #endif // ENGINES_WITCHER_OBJECTCONTAINER_H
{ "pile_set_name": "Github" }
Q: How to make a for loop slower? setInterval(()=>{ for (j = 0; j < obj.length; j++) { } }) I have this loop setup, is there any way to make the for loop go slower? obj length can be as big as 200-400 arrays. Jquery answers accepted. A: Promise based delay: const delay = x => new Promise(res => setTimeout(res, x)); (async () => { for (let j = 0; j < 10; j++) { console.log(j); await delay(1000); } })(); (Furthermore, i believe that jQuery should never be used.)
{ "pile_set_name": "StackExchange" }
Semiconductor light-emitting devices including light emitting diodes (LEDs), resonant cavity light emitting diodes (RCLEDs), vertical cavity laser diodes (VCSELs), and edge emitting lasers are among the most efficient light sources currently available. Materials systems currently of interest in the manufacture of high-brightness light emitting devices capable of operation across the visible spectrum include Group III-V semiconductors, particularly binary, ternary, and quaternary alloys of gallium, aluminum, indium, and nitrogen, also referred to as III-nitride materials. Typically, III-nitride light emitting devices are fabricated by epitaxially growing a stack of semiconductor layers of different compositions and dopant concentrations on a sapphire, silicon carbide, III-nitride, or other suitable substrate by metal-organic chemical vapor deposition (MOCVD), molecular beam epitaxy (MBE), or other epitaxial techniques. The stack often includes one or more n-type layers doped with, for example, Si, formed over the substrate, one or more light emitting layers in an active region formed over the n-type layer or layers, and one or more p-type layers doped with, for example, Mg, formed over the active region. Electrical contacts are formed on the n- and p-type regions. A light emitting device such as an LED is often combined with a wavelength converting material such as a phosphor. FIGS. 1A-1E are side cross-sectional views illustrating process steps needed to fabricate a wavelength conversion chip, described in more detail in US 2012/0086028. The process is described as follows in US 2012/0086028: The first step in the process for forming wavelength conversion chips is to select a substrate 100, which is shown in a side cross-sectional view in FIG. 1A. The substrate provides a physical support for the subsequent deposition of the wavelength conversion layer. Substrate 100 has a bottom surface 120 and a top surface 140 opposite bottom surface 120. Substrate 100 can be a polymeric material or an inorganic material. See, for example, paragraph 77. The next process step is to deposit a wavelength conversion layer 200 on the top surface 140 of substrate 100 as illustrated in a side cross-sectional view in FIG. 1B. The wavelength conversion layer 200 has a bottom surface 220 in direct contact with the top surface 140 of substrate 100 and a top surface 240. The wavelength conversion layer 200 is formed from wavelength conversion materials. The wavelength conversion materials absorb light in a first wavelength range and emit light in a second wavelength range, where the light of a second wavelength range has longer wavelengths than the light of a first wavelength range. The wavelength conversion materials may be, for example, phosphor materials or quantum dot materials. The phosphor materials may be in the form of powders, ceramics, thin film solids or bulk solids. See, for example, paragraphs 78 and 79. The next process step is an optional annealing step, as illustrated in FIG. 1C, to thermally anneal or radiation anneal 300 the wavelength conversion layer 200 in order to increase the wavelength conversion efficiency of the layer or, in the case of a phosphor powder, to sinter the powder to form a ceramic layer. See, for example, paragraph 85. The next process step is to segment the wavelength conversion layer 200 into a plurality of wavelength conversion chips 500. Grooves or streets 400 are formed through the wavelength conversion layer 200 as shown in a side cross-sectional view in FIG. 1D. The streets 400 are fabricated in two directions (only one direction is shown) to form a plurality of wavelength conversion chips 500 that can be square, rectangular or any other planar geometric shape. See, for example, paragraph 88. The final step is to remove the plurality of wavelength conversion chips 500 from substrate 100. For example, the plurality of wavelength conversion chips 500 can be removed by directing a pulsed laser beam 600 though substrate 100 to destroy the adhesion of the bottom surface 220 of the wavelength conversion layer 200 to the top surface 140 of the substrate 100 as shown in a side cross-sectional view in FIG. 1E. See, for example, paragraph 89.
{ "pile_set_name": "USPTO Backgrounds" }
The Freedom From Religion Foundation is cautioning the Ohio governor that his exemption of religious gatherings from coronavirus-related restrictions is putting innumerable Ohioans at risk. Ohio’s stay-at-home order, amended April 2, leaves out religious gatherings by defining them as “essential services.” This will quite certainly imperil Ohioans, FFRF warns. The data doesn’t lie, asserts the national state/church watchdog. One-third of all COVID cases in one large California county can be traced to church services. The numbers are even bigger elsewhere. Reuters reports: “South Korea announced thousands of coronavirus cases in the space of only a few days in late February. The surge in cases centered mostly around one main cluster from a church in Daegu city.” Gov. Mike DeWine has vocally encouraged churches to abide by prohibitory orders, but his call is undermined by his exemption, which is inadvisable on multiple counts, FFRF contends. First, religious freedom does not require exempting churches from prohibitory orders. “Americans have rights to worship and to assemble, but neither of those rights is unlimited and neither includes the right to risk other people’s lives,” FFRF Co-Presidents Annie Laurie Gaylor and Dan Barker write to Gov. Mike DeWine and Ohio Health Director Dr. Amy Acton. “Most importantly, neither right includes the right to risk or threaten the lives of other citizens.” More than 100 years ago, the U.S. Supreme Court explained in a 7-2 opinion that society’s interest in stopping the spread of smallpox was greater than an individual’s religious rights, FFRF adds. And the court has reiterated this again and again. States already regularly limit worship gatherings that jeopardize public health. For instance, the government requires that church buildings comply with necessary fire and other building codes. Preventing large gatherings due to a pandemic is even more crucial. Second, FFRF maintains, such exemptions unconstitutionally favor churches. Courts have long ruled that the Establishment Clause of the First Amendment bars the government from preferring one religion over another, or religion over nonreligion. The exemption for church services violates the First Amendment. “Prohibiting large gatherings is not a ban on worship any more than speed limits are a ban on driving,” FFRF writes. “The short-term ban is guided by science: The more people that gather, the more viruses spread.” Third, such exemptions are immoral and deadly, FFRF avers. Clerics seeking exemption from social-distancing orders are not simply asking for a right to gather and worship, they are also asking for a right to threaten the lives of every other member of the community. DeWine needs to revise the stay-at-home order and remove the exemption for religious gatherings, FFRF urges. It is undermining the leadership and foresight he has displayed in battling the pandemic, with the exception of the governor’s callous exploitation of the coronavirus to try to shut down abortion clinics in his state, endangering women’s right to choose. The Freedom From Religion Foundation has more than 31,000 members and several chapters all over the country, including over 800 members and a chapter in Ohio. FFRF protects the constitutional separation between state and church, and educates about nontheism.
{ "pile_set_name": "OpenWebText2" }
Q: && Syntax Error AGP for Dummies So, I am currently learning off of the Android Game Programming For Dummies book, and have run into the problem where (On page 128) I'm given the code case MotionEvent.ACTION_DOWN: if (X > (screenW-playButtonUp.getWidth())/2 && X < ((screenW-playButtonUp.getWidth())/2) + playButtonUp.getWidth()) && Y > (int)(screenH*0.45) && Y < (int)(screenH*0.45) + playButtonUp.getHeight()) { playButtonPressed = true; } break; and the 4th to 6th lines are accompanied by the error "Syntax error on token "&&", throw expected". I have no idea on how to fix this, I'd really appreciate any alternatives or help. A: The parentheses are messed up. Specifically, the second ) in this line: // -- This one // v playButtonUp.getWidth()) && matches the ( starting the if condition, meaning the && after it is not part of the condition. Remove that extra ). Here's a parentheses analysis: if (X > (screenW-playButtonUp.getWidth())/2 && // ( = 3, ) = 2; Nested level: 1 X < ((screenW-playButtonUp.getWidth())/2) + // ( = 3, ) = 3; Nested level: 1 playButtonUp.getWidth()) && // ( = 1, ) = 2; Nested level: 0 Y > (int)(screenH*0.45) && // ( = 2, ) = 2; Nested level: 0 Y < (int)(screenH*0.45) + // ( = 2, ) = 2; Nested level: 0 playButtonUp.getHeight()) { // ( = 1, ) = 2; Nested level: -1?!? playButtonPressed = true; // Total ( = 12, ) = 13 }
{ "pile_set_name": "StackExchange" }
Hello Rustaceans! It's time for another meetup. This meetup is dedicated to some of the data science projects being developed in Rust. We have three speakers lined up: * Dan Burkert (dburkert): kudu-rs (https://github.com/danburkert/kudu-rs): Using Rust with Apache Kudu (http://getkudu.io/) * Ulrik Sverdrup (bluss) (remote): ndarray (https://github.com/bluss/rust-ndarray) - N-Dimensional Arrays * Michael Hirn (remote): Autumn (http://autumnai.com/), Leaf (https://github.com/autumnai/leaf), and Collenchyma (https://github.com/autumnai/collenchyma): Deep Neural Networks in Rust The doors will open at 6pm, and the talks go live at 7pm. As always, Mozilla will be graciously providing food, drink, and a live stream of the meetup. The stream will also be archived on Air Mozilla (https://air.mozilla.org/). I'll update this page with the link to the talk once it goes live. I hope you all can make it! -Erick edit: Here's the link (https://air.mozilla.org/bay-area-rust-meetup-march-2016/) that will be used for the live stream and archived video.
{ "pile_set_name": "OpenWebText2" }
Genetic and clinical features of p450 oxidoreductase deficiency. P450 oxidoreductase (POR) deficiency is an autosomal recessive disorder of steroidogenesis with multiple clinical manifestations. POR is the electron donor for all microsomal P450 enzymes, including the three steroidogenic enzymes P450c17 (17alpha-hydroxylase/17,20-lyase), P450c21 (21-hydroxylase), and P450aro (aromatase). Since the first description of POR mutations in 2004, about 50 patients have been reported. Serum steroid profiles indicate partial deficiencies in 21-hydroxylase, 17alpha-hydroxylase and 17,20-lyase. The 17-OH progesterone levels are elevated, as in 21-hydroxylase deficiency, while androgen levels are low; cortisol may be normal but is poorly responsive to adrenocorticotropic hormone. Most patients also have associated skeletal malfor- mations (craniosynostosis, radio-ulnar synostosis, midface hypoplasia, bowed femora) termed Antley-Bixler syndrome. Antley-Bixler syndrome with normal steroidogenesis is caused by autosomal dominant gain-of-function mutations in fibroblast growth factor receptor 2. Males with POR deficiency are often undervirilized, while females can be virilized. The prognosis for patients with POR deficiency appears to depend on the severity of the bony malformations and their timely treatment. The potential impact of POR mutations on drug metabolism by other hepatic P450 enzymes requires further investigation. Given the varied physical and biochemical phenotype of POR deficiency and the risk of adrenal insufficiency, clinicians should be alert to this potential diagnosis.
{ "pile_set_name": "PubMed Abstracts" }
Tag: adrian sosa Adrian Sosa joins Team LeftJab Boxing Radio to talk about last weekend’s exciting six-round welterweight battle with Khiry Todd at The Foxwoods Resort.Both fighters came in undefeated and Sosa won a close majority decision.Sosa gives his thoughts on the fight and why he feels he won as well as what’s next for him. Be sure to check … Khiry Todd joins Team LeftJab Boxing Radio to talk about last weekend’s thrilling six-round welterweight clash with Adrian Sosa at The Foxwoods Resort.Both fighters came in undefeated and Sosa won a close majority decision.Todd gives his thoughts on the fight and why he feels he won as well as why he wants an immediate rematch …
{ "pile_set_name": "Pile-CC" }
137 F.3d 1420 98 Cal. Daily Op. Serv. 1704, 98 Daily JournalD.A.R. 2393Arthur CALDERON, Warden, of the California State Prison, SanQuentin, Petitioner,v.UNITED STATES DISTRICT COURT FOR THE CENTRAL DISTRICT OFCALIFORNIA, Respondent. No. 97-70139. United States Court of Appeals,Ninth Circuit. Argued and Submitted Nov. 25, 1997.Decided March 10, 1998. J. Robert Jibson, Deputy Attorney General, Sacramento, CA, for petitioner. Peter Giannini, Los Angeles, CA, for real party in interest, Malone. Petition for Writ of Mandamus. Before: FLETCHER, FARRIS and KOZINSKI, Circuit Judges. KOZINSKI, Circuit Judge. 1 Kelvin Shelby Malone, currently incarcerated in California, is under sentence of death both in that state and in Missouri. His federal habeas petition in California is in its initial stages. By contrast, habeas review of Malone's Missouri conviction and sentence is almost complete; the Eighth Circuit has the case under submission. Because Malone's Missouri execution date may be imminent, the governor of Missouri made a formal request to the governor of California asking that Malone be released into Missouri's custody. See Uniform Criminal Extradition Act, Cal.Penal Code §§ 1547-1556.2 and Mo.Rev.Stat. §§ 548.011-548.300. The governor of California agreed and the two entered into an executive agreement providing for Malone's extradition to Missouri. Malone unsuccessfully challenged the extradition in California state court and also sought a stay from the district court with jurisdiction over his California-based habeas petition. The district court granted the requested relief; it entered an order staying the extradition unless certain conditions were met (most notably, that Missouri submit to the district court's jurisdiction). In its petition for a writ of mandamus California seeks to have that ruling reversed. 2 Mandamus is not to be used as a substitute for an appeal: "[A] court of appeals has no occasion to engage in extraordinary review by mandamus ... when it can exercise the same review by a contemporaneous ordinary appeal." Moses H. Cone Mem'l Hosp. v. Mercury Constr. Corp., 460 U.S. 1, 8 n. 6, 103 S.Ct. 927, 933 n. 6, 74 L.Ed.2d 765 (1983). See also Calderon v. United States Dist. Court, 134 F.3d 981, 983-84 (9th Cir.1998) (mandamus not available when petitioner could have filed direct appeal); Herrington v. County of Sonoma, 706 F.2d 938, 940 (9th Cir.1983) (same); Bauman v. United States Dist. Court, 557 F.2d 650, 654 (9th Cir.1977) (same). The district court's order was not a final judgment, so the state could not have appealed it under 28 U.S.C. § 1291. But was it the kind of interlocutory order that could have been appealed as of right pursuant to 28 U.S.C. § 1292? 3 Under 28 U.S.C. § 1292(a)(1) interlocutory injunctions are immediately appealable.1 That the district court here did not label its order an injunction is not dispositive. In determining whether an order is appealable under section 1292(a)(1), we consider the substantial effect of the order. See Tagupa v. East-West Ctr., Inc., 642 F.2d 1127, 1129 (9th Cir.1981) (looking not to form of district court's order but to its actual effect); Santana Prods., Inc. v. Compression Polymers, Inc., 8 F.3d 152, 154 (3rd Cir.1993) (same); Sierra Club v. Marsh, 907 F.2d 210, 213 (1st Cir.1990) (same); 11A Charles Alan Wright, Arthur R. Miller & Mary Kay Kane, Federal Practice and Procedure, § 2962 (2d ed.1995) (same). 4 At Malone's request, the district court entered an order prohibiting California from turning him over to Missouri. Were the state to ignore the order and release Malone into Missouri's custody, it could surely be brought before the district court to answer contempt charges. This order thus restrains a party, on penalty of contempt, from taking an action that it could otherwise take. We have no trouble concluding that the order is in fact an injunction. Had California filed a timely notice of appeal, we would have had jurisdiction pursuant to 28 U.S.C. § 1292(a)(1).2 5 Because California could have obtained review of the district court's order through an ordinary appeal, mandamus is not available. Had the state filed its mandamus petition within the time allowed for filing a notice of appeal, we would have treated it as a notice of appeal and reached the merits. See Helstoski v. Meanor, 442 U.S. 500, 508 n. 4, 99 S.Ct. 2445, 2449 n. 4, 61 L.Ed.2d 30 (1979); Diamond v. United States Dist. Court, 661 F.2d 1198, 1198-99 (9th Cir.1981). But it did not.3 The state is thus in the same unhappy position as other litigants who failed to comply with jurisdictional requirements for perfecting an appeal. See Pratt v. McCarthy, 850 F.2d 590, 591 (9th Cir.1988), overruled on other grounds Pioneer Inv. Servs. Co. v. Brunswick Assoc. Ltd. Partnership, 507 U.S. 380, 113 S.Ct. 1489, 123 L.Ed.2d 74 (1993); Mann v. Lynaugh, 840 F.2d 1194, 1197 (5th Cir.1988). While we harbor serious doubts about the district court's order, it is not reviewable by writ of mandamus. 6 DISMISSED. 1 Section 1292(a) was not mentioned by the state in its briefs and the deputy attorney general who argued the case seemed unaware of its existence when asked about it. This is not unusual. See McLain v. Calderon, 134 F.3d 1383, 1384 n.3 (9th Cir.1998) 2 Because the order is not explicitly labeled an injunction, it is arguable that the requirements of Carson v. American Brands, Inc., 450 U.S. 79, 101 S.Ct. 993, 67 L.Ed.2d 59 (1981), would have had to have been satisfied before an immediate appeal could have been taken. Carson held that, to be appealable under section 1292(a)(1), a district court ruling must (1) have the practical effect of entering an injunction, (2) have serious, perhaps irreparable, consequences, and (3) be such that an immediate appeal is the only effective way to challenge it. Id. at 84, 101 S.Ct. at 996-97. Carson involved an order denying relief; it is unclear whether Carson also applies when the order in question grants injunctive relief. For the reasons explained in Cohen v. Board of Trustees of Univ. of Medicine and Dentistry, 867 F.2d 1455, 1466-67 (3rd Cir.1989), it may well not. However, we have not been consistent on this point, sometimes applying Carson to determine the appealability of orders granting relief, see e.g., Thompson v. Enomoto, 815 F.2d 1323, 1326-27 (9th Cir.1987), and other times not, see e.g., United States v. Gila Valley Irrigation Dist., 31 F.3d 1428, 1441 (9th Cir.1994). Here it doesn't matter. We have already held that the first Carson requirement is satisfied, see p. 1422 supra; if the second and third requirements are not satisfied, the state would, a fortiori, not be entitled to mandamus. See Bauman v. United States Dist. Court, 557 F.2d 650, 654 (9th Cir.1977) 3 The time to file a notice of appeal expired on January 26, 1997; the state filed its petition on February 12, 1997
{ "pile_set_name": "FreeLaw" }
Conway says the Republican plan enjoys “presidential leadership,” explaining that Trump has personally taken it upon himself to push the bill through. She added that the president is “ But when the discussion turned to the bill’s name, TPM A White House spokesperson struck a If only it were that simple. Kellyanne Conway, one of Donald Trump’s top White House advisers, appeared on Fox News yesterday and touted the new Republican health care plan, which, she said, enjoys the president’s full support. There was, however, some quibbling about what to call the GOP proposal.Conway says the Republican plan enjoys “presidential leadership,” explaining that Trump has personally taken it upon himself to push the bill through. She added that the president is “ really husbanding ” the legislation through the process.But when the discussion turned to the bill’s name, TPM reported that Conway insisted this is”serious business” and “isn’t about branding according to someone’s name.” She added, “I’ll call it Trumpcare if you want to, but I didn’t hear President Trump say to any of us, ‘Hey, I want my name on that.’”A White House spokesperson struck a more emphatic note with Politico, arguing “It’s not ‘Trumpcare.’ … We will be calling it by its official name,” the American Health Care Act. He built his career in large part by plastering his name on skyscrapers, hotels, casinos, books, wines and steaks, but there appears to be one place President Donald Trump does not want his favorite five-letter word – the Republican health care bill. Before Obamacare, there was Romneycare. Back in the 1990s, there was Hillarycare. For a brief moment in the 2012 GOP primary, there was even Obamneycare (Minnesota Gov. Tim Pawlenty quickly abandoned the phrase and, in August 2011, his campaign for the nomination). But the White House, for all its messaging woes and infighting, has settled on the fact that – for the time being – it’s steering clear of Trumpcare.
{ "pile_set_name": "OpenWebText2" }
Sunil Kumar Jakhar Sunil Kumar Jakhar (born 9 February 1954) is an Indian Politician and President of Punjab Pradesh Congress Committee. Elected consecutively three times from Abohar constituency (2002-2017), he was a Leader of opposition in Punjab Vidhan Sabha from 2012-2017. He is a member of the Indian National Congress(INC). He was elected from Gurdaspur, Punjab to the Lok Sabha the lower house of Indian parliament in a by-election. Political career He first became a member of Punjab Vidhan Sabha from Abohar in 2002. In 2007 and 2012, he was re-elected from Abohar. he became member of parliament after winning a by-election in Gurudaspur. Controversy On 7 January 2017, Jakhar sent a complaint to the Punjab chief election officer alleging that local Shiromani Akali Dal leader Shivlal Doda and his nephew used seven different mobile numbers while in a Fazilka prison. References |- Category:State cabinet ministers of Punjab, India Category:Living people Category:Punjab, India MLAs 2002–2007 Category:Punjab, India MLAs 2007–2012 Category:Punjab, India MLAs 2012–2017 Category:People from Fazilka district Category:16th Lok Sabha members Category:Indian National Congress politicians Category:Leaders of the Opposition in Punjab, India Category:Lok Sabha members from Punjab, India Category:People from Gurdaspur district Category:1954 births
{ "pile_set_name": "Wikipedia (en)" }
Northern Army (Home Forces) Northern Army was a home service formation of the British Army during the First World War, responsible for the defence of East Anglia. It was formed on 11 April 1916 under the command of Sir Bruce Hamilton, with headquarters at Mundford. The Army was composed of 1st Cyclist Division, 62nd (2nd West Riding) Division, 64th (2nd Highland) Division and four provisional brigades (3rd, 4th, 5th and 6th), with 68th (2nd Welsh) Division attached for training purposes. The Army was disbanded on 16 February 1918. References Category:Field armies of the United Kingdom in World War I Category:Military units and formations established in 1916 Category:Military units and formations disestablished in 1918
{ "pile_set_name": "Wikipedia (en)" }
MLB Statistics Historical (past-seasons) WARP is now based on DRA.. cFIP and DRA are not available on a by-team basis and display as zeroes(0). See TOT line for season totals of these stats.Multiple stints are are currently shown —Click to hide. YEAR Team Lg G GS IP W L SV H BB SO HR oppTAv PPF H/9 BB/9 HR/9 K/9 GB% BABIP TAv WHIP FIP ERA cFIP DRA DRA- WARP 2013 SDN MLB 11 9 54.7 3 3 0 53 15 40 6 .250 98 8.7 2.5 1.0 6.6 39% .283 .255 1.24 3.81 4.12 110 4.89 115.2 0.0 2014 SDN MLB 13 11 61.3 4 5 0 71 15 46 6 .250 97 10.4 2.2 0.9 6.8 43% .332 .286 1.40 3.66 4.99 112 4.71 110.6 0.1 2015 SDN MLB 3 3 17.0 1 2 0 16 2 10 1 .264 102 8.5 1.1 0.5 5.3 52% .294 .193 1.06 3.28 4.76 105 4.61 107.6 0.1 2016 SDN MLB 3 2 15.7 1 2 0 12 3 13 3 .256 97 6.9 1.7 1.7 7.5 43% .231 .238 0.96 4.59 4.02 102 4.33 102.9 0.2 Career MLB 30 25 148.7 9 12 0 152 35 109 16 .252 98 9.2 2.1 1.0 6.6 42% .301 .260 1.26 3.77 4.54 110 4.73 111.1 0.4 Statistics for All Levels 'opp' stats - Quality of opponents faced - have been moved and are available only as OPP_QUAL in the Statistics reports now.Minor league stats are currently shown —Click to hide. Don't sleep on Enny Romero. I think there is a better chance of him providing impact in the bullpen, but I've been working on the Rays system lately and scouts really like this kid's stuff; I've seen it several times myself, so I can definitely appreciate a mid-90s FB and hard breaking ball from a southpaw. The command concerns, but if he can develop into an effectively wild type, he has the stuff to pitch above the middle-of-a-rotation. Projection is #2/3 type, but I think a late-innings arm is the realistic role. (Jason Parks) Robbie Erlin closed the season 32 IP 1.96 ERA 1.06 WHIP 24 K 7 BB, but with the Josh Johnson signing appears out of the mix in SD. Kennedy, Ross, Johnson, and Cashner are givens. Then you have Stults, Luebke, Wieland, and Burch Smith to contend with. What does SD do? Trade Cashner? Just keep the depth in AAA?(Joe Rockpile from Tuscaloosa) Keep. The. Depth. JJ and Cash are both health risks, and an outstanding name combo for a late 70s buddy cop show. (Harry Pavlidis) Do you think Aroyds Vizcaino is a good bet to contribute in 2014? What about Padres pitching prospects Robbie Erlin and Joe Wieland? Any chance any are rotation bound next year? I've got them all as minor leaguers in a deep NL-only 12 team keeper league, hoping at least one pans out as a middle of the rotation arm. (brokenarrow from Texas) I'm done on Vizcaino, never really loved him. He's gotta prove something to me. LOVE Erlin and like Wieland as well. I think both can contribute, maybe even later this year if needs arise for SD, but definitely next year. (Paul Sporer) Hey, John. Professor Parks and the minor-league gang probably have a better read on this stuff, but if you're looking for raw peripherals, Blackburn does seem to fit the bill. Two others to keep an eye on: Rangers RHP Cody Buckel, who found a groove late after struggling initially in Double-A, and Padres LHP Robert Erlin. (Daniel Rathman) BP Roundtables No BP Roundtables have mentioned this guy. PITCHf/x Pitcher Profile Robbie Erlin has thrown 2,701 pitches that have been tracked by the PITCHf/x system between 2012 and 2016, including pitches thrown in the MLB Regular Season, Spring Training and Fall/Winter Ball. In 2016, he has relied primarily on his Fourseam Fastball (89mph) and Change (82mph), also mixing in a Curve (73mph). He also rarely throws a Cutter (85mph).
{ "pile_set_name": "Pile-CC" }
Norwegian Entomological Society The Norwegian Entomological Society (, NEF) was established in 1904. The purpose of the society is to promote interest in and the study of entomology in Norway and to establish contact between the interested parties. The society is open to both amateurs and experts. Anyone with an interest in insects or other arthropod groups can become a member. Local branches of the society are located in the largest Norwegian cities, and they organize excursions to particularly interesting sites and guides, who offer advice connected with identifying species and preparing collected material. History The society was founded by ten enthusiasts; none of them were entomologists by profession, but two were biologists. All of them shared an interest in insects. Thomas Georg Münster originally came up with the initiative, and he served as the society's first chairman. The following year, two more members joined the society and it received its first charter. Work with butterflies and beetles occupied the society's members during its early years. Institutions were allowed to become members of the society in 1921, the first one being the Norwegian College of Agricultural in Ås. in 1922 the society started admitting individual members from abroad. Membership of the society gradually grew, and in 1930 there were about 40 individual members. The society had about 400 members in 2008. The society is open to anyone that would like to be a member. This has not always been the case; previously, another member had to recommend individuals for membership in the society, and membership was approved after assessment by the board. For example, Arne Semb-Johansson became a member in 1939 at the recommendation of Fridthjof Økland. In the process, he received a letter from Leif Reinhardt Natvig, stating: "Through Dr. Økland I have been informed that you would like to become a member of the Norwegian Entomological Society. To that end, I am bound to obtain some information from you: date of birth, place of birth, position, and which insect group you collect or are especially interested in. I will then present the matter at the society's next board meeting. Yours, Leif Reinhardt Natvig." Later Semb-Johansson received a second letter: "I have the honor to inform you that you have been admitted as a member of the Norwegian Entomological Society." Surveying insects in Norway In order to be able to survey the prevalence of Norwegian insects, a simple geographical system for locating sightings was needed. In 1924, Thomas Georg Münster and others created a system that divided Norway into bio-geographical sectional areas for botanists and zoologists using number codes. Eventually it turned out that this was little used. In 1943, Andreas Strand came up with a new system called Inndeling av Norge til bruk ved faunistiske oppgaver (Division of Norway for Use in Fauna Tasks), popularly known as the Strand System. In it, Norway was divided into 37 regions based on municipal and county boundaries, and it took into account that the fauna in the interior parts of the country differed from the fauna on the coast. Therefore, most Norwegian counties are divided into smaller areas (e.g., inner, outer, north, or south). Strand chose letter codes instead of numbers; for example, HOY is the code for outer Hordaland (Hordaland, ytre). The system was revised in 1981 by Karen Anna Økland because the municipal boundaries had also been revised. This system is recommended by the society and is used in all publications. Since the 1960s, UTM coordinates have routinely been used for mapping species. Since 1978, the European Invertebrate Survey (EIS) system has been recommended. In this system, Europe is divided into squares of . In a separate limited system for Norway, the squares are adapted to the Norwegian map and numbered from 1 to 189. For example, Oslo is in the square designated EIS 28. This gives the Norwegian map a grid that is well suited for demarcating a species' distribution. In May 2008, the Norwegian Species Observation System (Artsobservasjoner) was launched; this is an internet-based service where sightings can be published. The Norwegian Entomological Society is one of five organizations working with the Norwegian Biodiversity Information Centre (Artsdatabanken) to operate the website. Journal and other publications There were no Norwegian entomological journals in the early years. The first publications by Norwegian entomologists appeared in the Swedish Entomologisk Tidskrift (Entomological Journal), which was not unexpected because Norway was in a union with Sweden. Other articles also appeared in series published by the Royal Norwegian Society of Sciences and Letters and in Nyt Magazin for Naturvidenskaberne (New Journal for the Natural Sciences). This situation was not satisfactory, and the first issue of Norsk Entomologisk Tidsskrift (now Norwegian Journal of Entomology) appeared in May 1921. Norwegian Journal of Entomology is the association's research journal, and it is sent to all members. It is issued twice a year. The journal has been published since 1921; it was originally called Norsk Entomologisk Tidsskrift and it has changed its name several times. Back issues are posted online and can be read at the Norwegian Entomological Society's website. Catalogus Coleopterorum Daniae et Fennoscandiae (Register of Beetles of Denmark and Fennoscandia) inventoried beetles and was published in 1939. It was the first complete register of the distribution of a group of insects in Norway. Atalanta norvegica (The Norwegian Atalanta) was published from 1967 to 1983, and it was a companion publication to the Norwegian Journal of Entomology. It was dedicated to the study of Norwegian butterflies. The journal is no longer published, but it can be read on the Norwegian Entomological Society's website. Insekt-Nytt (Insect News) is written in a popular science style and is the society's members' magazine. It was first published in 1976, and it appears four times a year. It contains material on collection and preparation, literature on Norwegian insects, brief presentations of insects or insect groups, and new discoveries. Other arthropod groups such as arachnids are also covered in the magazine. Issues of the magazine over five years old can be read on the Norwegian Entomological Society's website. Insecta norvegiae (Insects of Norway) is a journal that publishes major works such as individual volumes, checklists, bibliographies, and so on. It is published at iregular intervals. Norske Insekttabeller (Norwegian Insect Tables) is a series of inexpensive Norwegian-language booklets with identification tables for smaller groups of Norway's insect fauna. All the booklets are available on the Norwegian Entomological Society's website. Catalogus Lepidopterorum Norvegiae (Register of Norwegian Butterflies) appeared in 2002, and it is based on about 125,000 sightings of butterflies in Norway. Its information is available in a searchable database. Chairs of the society Thomas Georg Münster, 1904–1937 Leif Reinhardt Natvig, 1937–1949 Arne Semb-Johansson, 1950–1953 Ragnhild Sundby, 1954–1959 and 1964–1967 Alf Bakke, 1960–1963 and 1971–1974 Hans Kauri, 1968–1970 Reidar Mehl, 1975–1976 Karl Erik Zachariassen, 1977–1990 Sigmund Hågvar, 1991–1995 Preben S. Ottesen, 1996–2000 Leif Aarvik, 2003–2007 Geir E. E. Søli, 2008– Honorary members Thomas Georg Münster Andreas Strand Magne Opheim Carl Fredrik Lühr Eivind Sundt Astrid Løken Tore Randulff Nielsen Lauritz Sømme References External links Norwegian Entomological Society website Artsobservasjoner: Norwegian Species Observation System Category:Entomological organizations Category:Scientific organisations based in Norway Category:Organizations established in 1904 Category:1904 establishments in Norway
{ "pile_set_name": "Wikipedia (en)" }
--- abstract: 'The $f(R)$ gravity models formulated in Einstein conformal frame are equivalent to Einstein gravity together with a minimally coupled scalar field. We shall explore phantom behavior of $f(R)$ models in this frame and compare the results with those of the usual notion of phantom scalar field.' --- .5cm -26pt -.85in \ ${\bf Yousef~Bisabr}$[^1]\ \ Introduction ============ There are strong observational evidences that the expansion of the universe is accelerating. These observations are based on type Ia supernova [@super], cosmic microwave background radiation [@cmbr], large scale structure surveys [@ls] and weak lensing [@wl]. There are two classes of models aim at explaining this phenomenon: In the first class, one modifies the laws of gravity whereby a late-time acceleration is produced. A family of these modified gravity models is obtained by replacing the Ricci scalar $R$ in the usual Einstein-Hilbert Lagrangian density for some function $f(R)$ [@carro] [@sm]. In the second class, one invokes a new matter component usually referred to as dark energy. This component is described by an equation of state parameter $\omega \equiv \frac{p}{\rho}$, namely the ratio of the homogeneous dark energy pressure over the energy density. For a cosmic speed up, one should have $\omega < -\frac{1}{3}$ which corresponds to an exotic pressure $p<-\rho/3$. Recent analysis of the latest and the most reliable dataset (the Gold dataset [@gold]) have indicated that significantly better fits are obtained by allowing a redshift dependent equation of state parameter [@data]. In particular, these observations favor the models that allow the equation of state parameter crossing the line corresponding to $\omega=-1$, the phantom divide line (PDL), in the near past. It is therefore important to construct dynamical models that provide a redshift dependent equation of state parameter and allow for crossing the phantom barrier.\ Most simple models of this kind employ a scalar field coupled minimally to curvature with negative kinetic energy which referred to as phantom field [@ph] [@caldwell]. In contrast to these models, one may consider models which exhibit phantom behavior due to curvature corrections to gravitational equations rather than introducing exotic matter systems. Recently, there is a number of attempts to find phantom behavior in $f(R)$ gravity models. It is shown that one may realize crossing the PDL in this framework without recourse to any extra component relating to matter degrees of freedom with exotic behavior [@o] [@n]. Following these attempts, we intend to explore phantom behavior in some $f(R)$ gravity models which have a viable cosmology, i.e. a matter-dominated epoch followed by a late-time acceleration. In contrast to [@n], we shall consider $f(R)$ gravity models in Einstein conformal frame. It should be noted that mathematical equivalence of Jordan and Einstein conformal frames does not generally imply that they are also physically equivalent. In fact it is shown that some physical systems can be differently interpreted in different conformal frames [@soko] [@no]. The physical status of the two conformal frames is an open question which we are not going to address here. Our motivation to work in Einstein conformal frame is that in this frame, $f(R)$ models consist of Einstein gravity plus an additional dynamical degree of freedom, the scalar partner of the metric tensor. This suggests that it is this scalar degree of freedom which drives late-time acceleration in cosmologically viable $f(R)$ models. We compare this scalar degree of freedom with the usual notion of phantom scalar field. We shall show that behaviors of this scalar field attributed to $f(R)$ models which allow crossing the PDL are similar to those of a quintessence field with a negative potential rather than a phantom with a wrong kinetic term.                                                                      Phantom as a Minimally coupled Scalar Field =========================================== The simplest class of models that provides a redshift dependent equation of state parameter is a scalar field minimally coupled to gravity whose dynamics is determined by a properly chosen potential function $V(\varphi)$. Such models are described by the Lagrangian density [^2] $$L=\frac{1}{2}\sqrt{-g}(R-\alpha ~g^{\mu\nu}\partial_{\mu}\varphi \partial_{\nu}\varphi-2V(\varphi)) \label{a1}$$ where $\alpha=+1$ for quintessence and $\alpha=-1$ for phantom. The distinguished feature of the phantom field is that its kinetic term enters (\[a1\]) with opposite sign in contrast to the quintessence or ordinary matter. The Einstein field equations which follow (\[a1\]) are $$R_{\mu\nu}-\frac{1}{2}g_{\mu\nu}R=T_{\mu\nu} \label{a2}$$ with $$T_{\mu\nu}=\alpha~\partial_{\mu}\varphi \partial_{\nu}\varphi-\frac{1}{2}\alpha~g_{\mu\nu} \partial_{\gamma}\varphi \partial^{\gamma}\varphi-g_{\mu\nu} V(\varphi) \label{a3}$$ In a homogeneous and isotropic spacetime, $\varphi$ is a function of time alone. In this case, one may compare (\[a3\]) with the stress tensor of a perfect fluid with energy density $\rho_{\varphi}$ and pressure $p_{\varphi}$. This leads to the following identifications $$\rho_{\varphi}=\frac{1}{2}\alpha \dot{\varphi}^2+V(\varphi)~,~~~~~p_{\varphi}=\frac{1}{2}\alpha \dot{\varphi}^2-V(\varphi) \label{a4}$$ The equation of state parameter is then given by $$\omega_{\varphi}=\frac{\frac{1}{2}\alpha \dot{\varphi}^2-V(\varphi)}{\frac{1}{2}\alpha \dot{\varphi}^2+V(\varphi)} \label{a5}$$ In the case of a quintessence (phantom) field with $V(\varphi)>0$ ($V(\varphi)<0$) the equation of state parameter remains in the range $-1<\omega_{\varphi}<1$. In the limit of small kinetic term (slow-roll potentials [@slow]), it approaches $\omega_{\varphi}=-1$ but does not cross this line. The phantom barrier can be crossed by either a phantom field ($\alpha<0$) with $V(\varphi)>0$ or a quintessence field ($\alpha>0$) with $V(\varphi)<0$, when we have $2|V(\varphi)|>\dot{\varphi}^2$. This situation corresponds to $$\rho_{\varphi}>0~~~~~,~~~~~p_{\varphi}<0~~~~~,~~~~~V(\varphi)>0~~~~~~~~~~~~~~~phantom \label{a51}$$ $$\rho_{\varphi}<0~~~~~,~~~~~p_{\varphi}>0~~~~~,~~~~~V(\varphi)<0~~~~~~~~~~quintessence\label{a52}$$ Here it is assumed that the scalar field has a canonical kinetic term $\pm \frac{1}{2}\dot{\varphi}^2$. It is shown [@vik] that any minimally coupled scalar field with a generalized kinetic term (k-essence Lagrangian [@k]) can not lead to crossing the PDL through a stable trajectory. However, there are models that employ Lagrangians containing multiple fields [@multi] or scalar fields with non-minimall coupling [@non] which in principle can achieve crossing the barrier.\ There are some remarks to do with respect to $V(\varphi)<0$ appearing in (\[a52\]). In fact, the role of negative potentials in cosmological dynamics has been recently investigated by some authors [@neg]. One of the important points about the cosmological models containing such potentials is that they predict that the universe may end in a singularity even if it is not closed. For more clarification, consider a model containing different kinds of energy densities such as matter, radiation, scalar fields and so on. The Friedmann equation in a flat universe is $H^2 \propto \rho_{t}$ with $\rho_{t}=\Sigma_{i}\rho_{i}$ being the sum of all energy densities. It is clear that the universe expands forever if $\rho_{t}>0$. However, if the contribution of some kind of energy is negative so that $\rho_{i}<0$, then it is possible to have $H^2=0$ at finite time and the size of the universe starts to decrease [^3]. We will return to this issue in the context of $f(R)$ gravity models in the next section.\ The possibility of existing a fluid with a surenegative pressure ($\omega<-1$) leads to problems such as vacuum instability and violation of energy conditions [@carroll]. For a perfect fluid with energy density $\rho$ and pressure $p$, the weak energy condition requires that $\rho\geq 0$ and $\rho+p \geq 0$. These state that the energy density is positive and the pressure is not too large compared to the energy density. The null energy condition $\rho+p\geq 0$ is a special case of the latter and implies that energy density can be negative if there is a compensating positive pressure. The strong energy condition as a hallmark of general relativity states that $\rho+p \geq 0$ and $\rho+3p\geq 0$. It implies the null energy condition and excludes excessively large negative pressures. The null dominant energy condition is a statement that $\rho\geq |p|$. The physical motivation of this condition is to prevent vacuum instability or propagation of energy outside the light cone. Applying to an equation of state $p=\omega \rho$ with a constant $\omega$, it means that $\omega \geq -1$. Violation of all these reasonable constraints by phantom, gives an unusual feature to this principal energy component of the universe. There are however some remarks concerning how these unusual features may be circumvented [@carroll] [@mc].                                                                                  $f(R)$ Gravity ============== Let us consider an $f(R)$ gravity model described by the action $$S=\frac{1}{2} \int d^{4}x \sqrt{-g}~ f(R) + S_{m}(g_{\mu\nu}, \psi)\label{b1}$$ where $g$ is the determinant of $g_{\mu\nu}$, $f(R)$ is an unknown function of the scalar curvature $R$ and $S_{m}$ is the matter action depending on the metric $g_{\mu\nu}$ and some matter field $\psi$. It is well-known that these models are equivalent to a scalar field minimally coupled to gravity with an appropriate potential function. In fact, we may use a new set of variables $$\bar{g}_{\mu\nu} =p~ g_{\mu\nu} \label{b2}$$ $$\phi = \frac{1}{2\beta} \ln p \label{b3}$$ where $p\equiv\frac{df}{dR}=f^{'}(R)$ and $\beta=\sqrt{\frac{1}{6}}$. This is indeed a conformal transformation which transforms the above action in the Jordan frame to the Einstein frame [@soko] [@maeda] [@wands] $$S=\frac{1}{2} \int d^{4}x \sqrt{-g}~\{ \bar{R}-\bar{g}^{\mu\nu} \partial_{\mu} \phi~ \partial_{\nu} \phi -2V(\phi)\} + S_{m}(\bar{g}_{\mu\nu} e^{2\beta \phi}, \psi) \label{b4}$$ In the Einstein frame, $\phi$ is a minimally coupled scalar field with a self-interacting potential which is given by $$V(\phi(R))=\frac{Rf'(R)-f(R)}{2f'^2(R)} \label{b5}$$ Note that the conformal transformation induces the coupling of the scalar field $\phi$ with the matter sector. The strength of this coupling $\beta$, is fixed to be $\sqrt{\frac{1}{6}}$ and is the same for all types of matter fields.\ Variation of the action (\[b4\]) with respect to $\bar{g}_{\mu\nu}$, gives the gravitational field equations $$\bar{G}_{\mu\nu}=T^{\phi}_{\mu\nu}+\bar{T}^{m}_{\mu\nu} \label{b6}$$ where $$\bar{T}^{m}_{\mu\nu}=\frac{-2}{\sqrt{-g}}\frac{\delta S_{m}}{\delta \bar{g}^{\mu\nu}}\label{b7}$$ $$T^{\phi}_{\mu\nu}=\partial_{\mu} \phi~\partial_{\nu} \phi -\frac{1}{2}\bar{g}_{\mu\nu} \partial_{\gamma} \phi~\partial^{\gamma} \phi-V(\phi) \bar{g}_{\mu\nu} \label{b8}$$ Here $\bar{T}^{m}_{\mu\nu}$ and $T^{\phi}_{\mu\nu}$ are stress tensors of the matter system and the minimally coupled scalar field $\phi$, respectively. Comparing (\[a3\]) and (\[b8\]) indicates that $\alpha=1$ and $\phi$ appears as a normal scalar field. Thus the equation of state parameter which corresponds to $\phi$ is given by $$\omega_{\phi} \equiv \frac{p_{\phi}}{\rho_{\phi}}=\frac{\frac{1}{2} \dot{\phi}^2-V(\phi)}{\frac{1}{2} \dot{\phi}^2+V(\phi)} \label{b9}$$ Inspection of (\[b9\]) reveals that for $\omega_{\phi}<-1$, we should have $V(\phi)<0$ and $|V(\phi)|>\frac{1}{2}\dot{\phi}^2$ which corresponds to (\[a52\]). In explicit terms, crossing the PDL in this case requires that $\phi$ appear as a quintessence (rather than a phantom) field with a negative potential.\ Here the scalar field $\phi$ has a geometric nature and is related to the curvature scalar by (\[b3\]). One may therefore use (\[b3\]) and (\[b5\]) in the expression (\[b9\]) to obtain $$\omega_{\phi}=\frac{3\dot{R}^2 f''^2(R)-\frac{1}{2}(Rf'(R)-f(R))}{3\dot{R}^2 f''^2(R)+\frac{1}{2}(Rf'(R)-f(R))} \label{b10}$$ which is an expression relating $\omega_{\phi}$ to the function $f(R)$. It is now possible to use (\[b10\]) and find the functional forms of $f(R)$ that fulfill $\omega_{\phi}<-1$. In general, to find such $f(R)$ gravity models one may start with a particular $f(R)$ function in the action (\[b1\]) and solve the corresponding field equations for finding the form of $H(z)$. One can then use this function in (\[b10\]) to obtain $\omega_{\phi}(z)$. However, this approach is not efficient in view of complexity of the field equations. An alternative approach is to start from the best fit parametrization $H(z)$ obtained directly from data and use this $H(z)$ for a particular $f(R)$ function in (\[b10\]) to find $\omega_{\phi}(z)$. We will follow the latter approach to find $f(R)$ models that provide crossing the phantom barrier.\ We begin with the Hubble parameter $H\equiv \frac{\dot{a}}{a}$. Its derivative with respect to cosmic time $t$ is $$\dot{H}=\frac{\ddot{a}}{a}-(\frac{\dot{a}}{a})^2 \label{b11}$$ where $a(t)$ is the scale factor of the Friedman-Robertson-Walker (FRW) metric. Combining this with the definition of the deceleration parameter $$q(t)=-\frac{\ddot{a}}{aH^2} \label{b12}$$ gives $$\dot{H}=-(q+1)H^2 \label{b13}$$ One may use $z=\frac{a(t_{0})}{a(t)}-1$ with $z$ being the redshift, and the relation (\[b12\]) to write (\[b13\]) in its integration form $$H(z)=H_{0}~exp~[\int_{0}^{z} (1+q(u))d\ln(1+u)] \label{b14}$$ where the subscript “0" indicates the present value of a quantity. Now if a function $q(z)$ is given, then we can find evolution of the Hubble parameter. Here we use a two-parametric reconstruction function characterizing $q(z)$ [@wang][@q], $$q(z)=\frac{1}{2}+\frac{q_{1}z+q_{2}}{(1+z)^2} \label{b15}$$ where fitting this model to the Gold data set gives $q_{1}=1.47^{+1.89}_{-1.82}$ and $q_{2}=-1.46\pm 0.43$ [@q]. Using this in (\[b14\]) yields $$H(z)=H_{0}(1+z)^{3/2}exp[\frac{q_{2}}{2}+\frac{q_{1}z^2-q_{2}}{2(z+1)^2}] \label{b16}$$ In a spatially flat FRW spacetime $R=6(\dot{H}+2H^2)$ and therefore $\dot{R}=6(\ddot{H}+4\dot{H}H)$. In terms of the deceleration parameter we have $$R=6(1-q)H^2 \label{b17}$$and $$\dot{R}=6H^3 \{2(q^2-1)-\frac{\dot{q}}{H}\} \label{b18}$$ which the latter is equivalent to $$\dot{R}=6H^3 \{2(q^2-1)+(1+z)\frac{dq}{dz}\} \label{b19}$$ It is now possible to use (\[b15\]) and (\[b16\]) for finding $R$ and $\dot{R}$ in terms of the redshift. Then for a given $f(R)$ function, the relation (\[b10\]) determines the evolution of the equation of state parameter $\omega_{\phi}(z)$.\ As an illustration we apply this procedure to some $f(R)$ functions. Let us first consider the model [@cap] [@A] $$f(R)=R+\lambda R^n \label{b20}$$ in which $\lambda$ and $n$ are constant parameters. In terms of the values attributed to these parameters, the model (\[b20\]) is divided in three cases [@A]. Firstly, when $n>1$ there is a stable matter-dominated era which does not follow by an asymptotically accelerated regime. In this case, $n = 2$ corresponds to Starobinsky’s inflation and the accelerated phase exists in the asymptotic past rather than in the future. Secondly, when $0<n<1$ there is a stable matter-dominated era followed by an accelerated phase only for $\lambda<0$. Finally, in the case that $n<0$ there is no accelerated and matter-dominated phases for $\lambda>0$ and $\lambda<0$, respectively. Thus the model (\[b20\]) is cosmologically viable in the regions of the parameters space which is given by $\lambda<0$ and $0<n<1$.\ Due to complexity of the resulting $\omega_{\phi}(z)$ function, we do not explicitly write it here and only plot it in Fig.1a for some parameters. As the figure shows, there is no phantom behavior and $\omega_{\phi}(z)$ remains near the line of the cosmological constant $\omega_{\phi}=-1$. We also plot $\omega_{\phi}$ in terms of $n$ and $\lambda$ for $z=1$ in Fig.1b. The figure shows that $\omega_{\phi}$ remains near unity except for a small region in which $-1\leq \omega_{\phi}<0$ and therefore the PDL is never crossed.\ Now we consider the models presented by Starobinsky [@star] $$f(R)=R-\gamma R_{c} \{1-[1+(\frac{R}{R_{c}})^2]^{-m}\} \label{b21}$$ and Hu-Sawicki [@hs] $$f(R)=R-\gamma R_{c}\{\frac{(\frac{R}{R_{c}})^m}{1+(\frac{R}{R_{c}})^m}\} \label{b22}$$ where $\gamma$, $m$ and $R_{c}$ are positive constants with $R_{c}$ being of the order of the presently observed effective cosmological constant. Using the same procedure, we can obtain evolution of the equation of state parameter for both models (\[b21\]) and (\[b22\]). We plot the resulting functions in Fig.2. The figures show that while the model (\[b22\]) allows crossing the PDL for the given values of the parameters, in the model (\[b21\]) the equation of state parameter remains near $\omega_{\phi}=-1$. To explore the behavior of the models in a wider range of the parameters, we also plot $\omega_{\phi}$ in the redshift $z=1$ in Fig.3.\ It is interesting to consider violation of energy conditions for the model (\[b22\]) which can exhibit phantom behavior. In Fig.4, we plot some expressions corresponding to null, weak and strong energy conditions. As it is indicated in the figures, the model violates weak and strong energy conditions while it respects null energy condition for a period of evolution of the universe. Moreover, Fig.4a indicates that $\rho_{\phi}<0$ for some parameters in terms of which the PDL is crossed. This is in accord with (\[a52\]) and (\[b9\]) which require that in order for crossing the PDL, $\phi$ should be a quintessence field with a negative potential function.                                                                            Concluding Remarks ================== We have studied phantom behavior for some $f(R)$ gravity models in which the late-time acceleration of the universe is realized. Working in Einstein conformal frame, we separate the scalar degree of freedom which is responsible for the late-time acceleration. Comparing this scalar field with the phantom field, we have made our first observation that the former appears as a minimally coupled quintessence whose dynamics is characterized by a negative potential. The impact of such a negative potential in cosmological dynamics is that it leads to a collapsing universe or a big crunch [@neg]. As a consequence, the $f(R)$ gravity models in which crossing the phantom barrier is realized predict that the universe stops expanding and eventually collapses. This is in contrast to phantom scalar fields in which the final stage of the universe has a divergence of the scale factor at a finite time, or a big rip [@ph] [@caldwell].\ We have used the reconstruction functions $q(z)$ and $H(z)$ fitting to the Gold data set to find evolution of equation of state parameter $\omega_{\phi}(z)$ for some cosmologically viable $f(R)$ models. We obtained the following results :\ \ 1) The model (\[b20\]) does not provide crossing the PDL. It however allows $\omega_{\phi}$ to be negative for a small region in the parameters space. For $n=0$, the expression (\[b20\]) appears as the Einstein gravity plus a cosmological constant. This state is indicated in Fig.1b when the equation of state parameter experiences a sharp decrease to $\omega_{\phi}=-1$.\ \ 2) We also do not observe phantom behavior in the Starobinsky’s model (\[b21\]). In the region of the parameters space corresponding to $m>0.5$ the equation of state parameter decreases to $\omega_{\phi}=-1$ and the model effectively appears as $\Lambda$CDM.\ \ 3) The same analysis is fulfilled for Hu-Sawicki’s model (\[b22\]). This model exhibits phantom crossing in a small region of the parameters space as it is indicated in Fig.2b and Fig.3b. Due to crossing the PDL in this case, we also examine energy conditions. We find that in contrast to weak and strong energy conditions which are violated, the null energy condition hold in a period of the evolution.\ Although the properties of $\phi$ differ from those of the phantom due to the sign of its kinetic term, violation of energy conditions remains as a consequence of crossing the PDL in both cases. However, the scalar field $\phi$ in our case should not be interpreted as an exotic matter since it has a geometric nature characterized by (\[b3\]). In fact, taking $\omega_{\phi}<-1$ as a condition in (\[b10\]) just leads to some algebraic relations constraining the explicit form of the $f(R)$ function. [99]{} A. G. Riess et al., Astron. J. [**116**]{}, 1009 (1998)\ S. Perlmutter et al., Bull. Am. Astron. Soc., [**29**]{}, 1351 (1997)\ S. Perlmutter et al., Astrophys. J., [**517**]{} 565 (1997) L. Melchiorri et al., Astrophys. J. Letts., [**536**]{}, L63 (2000)\ C. B. Netterfield et al., Astrophys. J., [**571**]{}, 604 (2002)\ N. W. Halverson et al., Astrophys. J., [**568**]{}, 38 (2002)\ A. E. Lange et al, Phys. Rev. D [**63**]{}, 042001 (2001)\ A. H. Jaffe et al, Phys. Rev. Lett. [**86**]{}, 3475 (2001) M. Tegmark et al., Phys. Rev. D [**69**]{}, 103501 (2004)\ U. Seljak et al., Phys. Rev. D [**71**]{}, 103515 (2005) B. Jain and A. Taylor, Phys. Rev. Lett. [**91**]{}, 141302 (2003) S. M. Carroll, V. Duvvuri, M. Trodden, M. S. Turner, Phys. Rev. D [**70**]{}, 043528 (2004) S. M. Carroll, A. De Felice, V. Duvvuri, D. A. Easson, M. Trodden and M. S. Turner, Phys. Rev. D [**71**]{}, 063513 (2005)\ G. Allemandi, A. Browiec and M. Francaviglia, Phys. Rev. D [**70**]{}, 103503 (2004)\ X. Meng and P. Wang, Class. Quant. Grav. [**21**]{}, 951 (2004)\ M. E. soussa and R. P. Woodard, Gen. Rel. Grav. [**36**]{}, 855 (2004)\ S. Nojiri and S. D. Odintsov, Phys. Rev. D [**68**]{}, 123512 (2003)\ P. F. Gonzalez-Diaz, Phys. Lett. B [**481**]{}, 353 (2000)\ K. A. Milton, Grav. Cosmol. [**9**]{}, 66 (2003) A. G. Riess et al., Astrophys. J. [**607**]{}, 665 (2004) U. Alam, V. Sahni, T. D. Saini and A. A. Starobinsky, Mon. Not. Roy. Astron. Soc. [**354**]{}, 275 (2004)\ S. Nesseris and L. Perivolaropoulos, Phys. Rev. D [**70**]{}, 043531 (2004) R. R. Caldwell, Phys. Lett. B [**545**]{}, 23 (2002) R. R. Caldwell, M. Kamionkowski and N. N. Weinberg Phys. Rev. Lett. [**91**]{}, 071301 (2003) K. Bamba, C. Geng, S. Nojiri, S. D. Odintsov, Phys. Rev. D [**79**]{}, 083014 (2009) K. Nozari and T. Azizi, Phys. Lett. B [**680**]{}, 205 (2009) G. Magnano and L. M. Sokolowski, Phys. Rev. D [**50**]{}, 5039 (1994) Y. M. Cho, Class. Quantum Grav. [**14**]{}, 2963 (1997)\ E. Elizalde, S. Nojiri and S. D. Odintsov, Phys. Rev. D [**70**]{}, 043539 (2004)\ S. Nojiri and S. D. Odintsov, Phys. Rev. D [**74**]{}, 086005 (2006)\ S. Capozziello, S. Nojiri, S. D. Odintsov and A. Troisi, Phys. Lett. B [**639**]{}, 135 (2006)\ K. Bamba, C. Q. Geng, S. Nojiri and S. D. Odintsov, Phys. Rev. D [ **79**]{}, 083014 (2009)\ K. Nozari and S. D. Sadatian, Mod. Phys. Lett. A [**24**]{}, 3143 (2009) R. J. Scherrer and A. A. Sen, Phys. Rev. D [**77**]{}, 083515 (2008)\ R. J. Scherrer and A. A. Sen, Phys. Rev. D [**78**]{}, 067303 (2008)\ S. Dutta, E. N. Saridakis and R. J. Scherrer, Phys. Rev. D [**79**]{}, 103005 (2009) A. Vikman, Phys. Rev. D [**71**]{}, 023515 (2005) C. Armendariz-Picon, V. Mukhanov and P. J. Steinhardt, Phys. Rev. D [**63**]{}, 103510 (2001)\ A. Melchiorri, L. Mersini, C. J. Odman and M. Trodden, Phys. Rev. D [**68**]{}, 043509 (2003) R. R. Caldwell and M. Doran, Phys.Rev. D [**72**]{}, 043527 ( 2005)\ W. Hu, Phys. Rev. D [**71**]{}, 047301 (2005)\ Z. K. Guo, Y. S. Piao, X. M. Zhang and Y. Z. Zhang, Phys.Lett. B [**608**]{}, 177 (2005)\ B. Feng, X. L. Wang and X. M. Zhang, Phys. Lett. B [**607**]{}, 35 (2005)\ B. Feng, M. Li, Y. S. Piao and X. Zhang, Phys. Lett. B [**634**]{}, 101, (2006) L. Perivolaropoulos, JCAP 0510, 001 (2005) A. Linde, JHEP 0111, 052 (2001)\ J. Khoury, B. A. Ovrut, P. J. Steinhardt and N. Turok, Phys. Rev. D [**64**]{}, 123522 (2001)\ P. J. Steinhardt and N. Turok, Phys. Rev. D [**65**]{}, 126003 (2002)\ N. Felder, A.V. Frolov, L. Kofman and A. V. Linde, Phys. Rev. D [**66**]{}, 023507 (2002) A. de la Macorra and G. German, Int. J. Mod. Phys. D [ **13**]{}, 1939 (2004) S. M. Carroll, M. Hoffman and M. Trodden Phys. Rev. D [**68**]{}, 023509 (2004) B. McInnes, JHEP 0208, 029 (2002) K. Maeda, Phys. Rev. D [**39**]{}, 3159 (1989) D. Wands, Class. Quant. Grav. [**11**]{}, 269 (1994) Y.G. Gong and A. Wang, Phys. Rev. D [**73**]{}, 083506 (2006) Y. Gong and A. Wang, Phys. Rev. D [**75**]{}, 043520 (2007) S. Capozziello, V. F. Cardone, S. Carloni and A. Troisi, Int. J. Mod. Phys. D [**12**]{}, 1969 (2003) L. Amendola, R. Gannouji, D. Polarski and S. Tsujikawa, Phys. Rev. D [**75**]{}, 083504 (2007) A. A. Starobinsky, JETP. Lett. [**86**]{}, 157 (2007) W. Hu and I. Sawicki, Phys. Rev. D [**76**]{}, 064004 (2007) ![a) The plot of $\omega_{\phi}$ in terms of $z$ and for some values of the parameters $\lambda$ and $n$. There is not any phantom behavior in these cases. b) The plot of $\omega_{\phi}$ for the redshift $z=0.25$. Even though in a small region $\omega_{\phi}$ takes negative values, it does not however cross the PDL. ](fig1a.eps "fig:"){width="0.45\linewidth"} ![a) The plot of $\omega_{\phi}$ in terms of $z$ and for some values of the parameters $\lambda$ and $n$. There is not any phantom behavior in these cases. b) The plot of $\omega_{\phi}$ for the redshift $z=0.25$. Even though in a small region $\omega_{\phi}$ takes negative values, it does not however cross the PDL. ](fig1b.eps "fig:"){width="0.45\linewidth"} ![The plot of $\omega_{\phi}(z)$ for (a) Starobinsky’s and (b) Hu-Sawicki’s models. As the figures indicate, there is a phantom-like behavior in the latter.](fig2a.eps "fig:"){width="0.49\linewidth"} ![The plot of $\omega_{\phi}(z)$ for (a) Starobinsky’s and (b) Hu-Sawicki’s models. As the figures indicate, there is a phantom-like behavior in the latter.](fig2b.eps "fig:"){width="0.49\linewidth"} ![The plot of $\omega_{\phi}$ in the redshift $z=0.25$ for (a) Starobinsky’s and (b) Hu-Sawicki’s models. As the figures show the PDL can be crossed in the latter in a small region of the parameters space.](fig3a.eps "fig:"){width="0.43\linewidth"} ![The plot of $\omega_{\phi}$ in the redshift $z=0.25$ for (a) Starobinsky’s and (b) Hu-Sawicki’s models. As the figures show the PDL can be crossed in the latter in a small region of the parameters space.](fig3b.eps "fig:"){width="0.43\linewidth"} ![image](fig4a.eps){width="0.45\linewidth"} ![image](fig4b.eps){width="0.45\linewidth"} ![Variations of (a) $\rho_{\phi}$ , (b) $\rho_{\phi}+p_{\phi}$ and (c) $\rho_{\phi}+3p_{\phi}$ in terms of the redshift for Hu-Sawicki’s model. The plots indicate that $\rho_{\phi}< 0$ and $\rho_{\phi}+3p_{\phi}<0$ while $\rho_{\phi}+p_{\phi}>0$ for $z<0.4$. The curves are plotted for the same values of the parameters $\gamma$ and $m$ appeared in Fig.2b.](fig4c.eps){width="0.45\linewidth"} [^1]: e-mail: y-bisabr@srttu.edu. [^2]: We use the unit system $8\pi G=\hbar=c=1$ and the metric signature $(-,+,+,+)$. [^3]: For a more detailed discussion see, e.g., [@mac].
{ "pile_set_name": "ArXiv" }
Q: How to display comma delimited JSON value as a list? Say I have an array like this: var ARTISTS: Artist[] = [ { "name": "Barot Bellingham", "shortname": "Barot_Bellingham", "reknown": "Royal Academy of Painting and Sculpture", "bio": "Some bio here...", "friends": "James, Harry, Bob" } Is it possible to display values for the key “friends” as an unordered list where each friend would be it’s own list item, e.g.: <ul> <li>James</li> <li>Harry</li> <li>Bob</li> </ul> I do realize the "friends" would be better stored as a nested array in order to display as a list, but I'm looking into this as a potential workaround for another issue. Thank you! P.S. I'm using Angular 2. A: You can use String.prototype.split() to get an array of friends. var arrayOfFriends = Artist[0].friends.split(", "); // arrayOfFriends = ['James', 'Harry', 'Bob'] From there loop over the array and create your list
{ "pile_set_name": "StackExchange" }