text
stringlengths
0
7.84M
meta
dict
"Thank you, sir." "Next." "Goodday, Wallace Ritchie" "Passport, please, sir." "Thank you!" "Just flown over from America." "I'm an American." "It's a new passport." "It's not a very good picture." "I have a better picture." "That won't be necessary, sir." "You've got a great accent." "Are you from here?" "What is the purpose of your visit to this country, sir?" "Today is my birthday." "Happy birthday, sir." "Thank you." "My brother sent me money this year, so" "I thought I'd come over and surprise him." "He works in the Featherstone Finch bank." "James Ritchie." "Do you know him?" "Good evening." "Guten Abend." "Guten Abend." "Schon, dich zu sehen." "Schon, dich zu sehen." "Very good." "Sehr gut." "How long will you be staying in this country?" "That's a very good question." "Yes, I thought so, too." "I'd like to see everything but not have people know I'm a tourist, you know?" "Featherstone Finch believes that...one of our major strengths, if not our major strength, is our diversity..." "Is our diversification." "I want to see where the blitz was." "I've seen the film and its incredible." "Half a day." "I want to try that meat pudding." "I want to take a double-decker bus." "Half a day." "Good night, Garrett." "I want to see the queen riding a horse." "I want to get a suit made." "Okay." "Three weeks." "Welcome to Great Britain, Mr. Ritchie." "Thanks very much." "And it's Wallace..." "David." "Which door is England?" "That one there." "Stupid cow." "Stupid cow." "Stand by." "The client's in position." "Okay, look." "He's nervous." "He's nervous, so I want plenty of energy, please." "Be generous." "Stand by the phone, Des." "And dial." "And curtain up." "You stupid cow!" "Please, mister, you've got to help me!" "Give me a phone!" "Leave me alone!" "Give me a phone!" "You've got to help me!" "You can see me in the window!" "You've got to help me!" "Who are you on the phone to?" "None of your business." "Who are you talking to?" "Look who it is." "It's your favorite John." "Go on John." "Tell him not to talk to you like that." "Come on, come on." "What's the matter?" "Cat got your tongue?" "Tell him to piss off." "Look, this has gone quite far enough." "And?" "The way you're treating..." "Des." "What do you know about it?" "It isn't the way a man should behave..." "Otto." "What I'm saying is..." "I don't like him!" "Don't push your luck!" "He's got a black belt." "Haven't you?" "Go on, tell him." "Yes." "I've got a black belt in karate." "Karate chop this, then!" "What're you going to do now?" "Put the gun away!" "Put it down!" "Put it down or we'll have to take you in!" "Who called the police?" "Was it you?" "Want to take me?" "Do you?" "Stay there." "You're going to have to catch me!" "Come on!" "Second police unit." "They just left the building and are heading towards you." "I will follow at a discreet distance." "Stand by, man with dog." "Exciting stuff." "Tickets aren't cheap...but neither are the thrills in" "London's interactive theater experience:" "The Theater of Life." "There are real streets, real rooms." "If you've got a sense of adventure, you can be a real star for a night." "You don't even have to learn lines." "With help from your fellow actors, you improvise as you go along." "Our major strength is diversification." "My God, that can't be them." "Consuela, the door, the door." "I ordered some more champagne." "I better go." "Our major strength is diversity." "Our major strength is diversification." "We've got our fingers in many pies." "Sis!" "Let's have a hug." "Look at you." "You're a sweet little pocket-rocket." "I thought he had an uptight English gal." "I'm Mrs. Ritchie." "Can I help you?" "You're Barbara?" "I'm Mrs. Ritchie and this is our maid." "Is that champagne?" "No, it's some shirts and socks and a few pairs of jeans." "Oh, my God!" "I know this guy." "Look at you!" "Look at you." "You're still the ugly brother, thank God." "Barbara, this is my brother, Wallace." "Hello." "Pleased to meet you." "Sorry to scare you." "What're you doing here?" "Today's my birthday." "I thought you might not remember...so I came over to get my presents here." "How lovely." "Set another place for dinner." "Great idea." "No, no, bad idea." "Wally can't be here tonight." "Why?" "He seems very sweet." "He is sweet." "Yeah, but...?" "He's not the kind of guy you drop into a boring business dinner." "With Wally, you need a sense of humor." "And we have Germans coming for dinner." "Exactly." "Still, they might find him interesting, being in the film industry." "It's not exactly the film industry." "It is and it isn't." "It is." "I'm with Blockbuster in Des Moines." "So you're not a producer." "Not exactly." "Not at all, really." "It's just something I say." "We all say it." "It's something I say." "A joke." "We'll just get rid of you for the night." "No, we won't." "Not tonight." "It's his birthday." "Get rid of him, now." "What would he like?" "Drama or a musical?" "He likes it all." "He wanted to be an actor." "He got the lead in our high school play, but on opening night he..." "I never thought anybody could forget so much so fast without a blow to the head." "Damn, then this won't work." "Theater of Life." "It's on TV now." "One of those audience-participation things." "No, that sounds really embarrassing." "Pity." "It's three and a half hours long." "It sounds really embarrassing." "This is London." "This is theater land." "This is the hottest ticket in town." "I won't have to go on stage, will I?" "They call you, tell you who you are, where to go and help make up the rest." "There's nothing even to forget." "Can I see the hat?" "I wish we could hang out." "It's my birthday." "I tell you what..." "I was saving these for the dinner party." "Ambassadors." "The finest smokes you can buy." "You and I will fire them up when you get back." "Havana." "Birthday cigars." "That's them." "It's early." "I already laid out $117.50." "What's that in real money?" "Pick up the phone." "Spenser." "They want Spenser." "That's your character name." "Go on, say something back." "Go on." "Hello." "Number 6 Bishops Mews." "The back door is open." "The girl is upstairs." "Radio contact only from now on." "And Spenser, this time...remember to flush." "Out." "What'd they say?" "Remember to flush." "They were supposed to give you an address." "6 Bishops Mews, England." "That's right around the corner." "Come on." "I'll drop you off." "It's gonna be great." "Speak." "Help me!" "He's going to kill me!" "Give me that phone!" "Who is this?" "I'm in the flat across the street!" "You can see me in the window!" "Help me, please!" "Liar!" "You stupid cow!" "You lay one finger on me and I'm calling the police." "Call the police now, then!" "Go on!" "Bang on cue, your favorite john." "Johnny, tell him he can't talk to you like that." "Tell him to go to hell." "Tell him anything you want." "Yeah, tell me anything you want!" "Come on!" "Do you know what your problem is, apart from being a really ugly bastard?" "Come on!" "You big pansy!" "Give us your best shot, mouseballs!" "Excuse me, are...?" "Hello." "Why have we stopped, people?" "Is there a problem?" "Break a leg." "Gotta go." "Okay, later." "All right." "Have fun." "Wait." "What am I supposed to do when this is over?" "I have no idea where I am." "Take my phone." "When the show's over, around 11:30, don't worry, call me." "I'll pick you up and we'll smoke those Ambassadors by midnight." "Gotta be my birthday so 11:59, the latest." "11:59." "Knock them dead, big brother." "There'll be bodies all over the place." "Have you got any spare change?" "I don't have any of your money yet." "You sure about that?" "No, I'm not." "I'll give you what I have." "I do have American money." "It's just as good." "Here." "I'm sorry." "Nobody told me it already started." "All right, then, just go back to "Give me your money" or whatever the heck." "Just give me money or I'll cut you!" "Let me just do my line, first." "Please don't kill me." "I'll give you all the money I got." "I'll give you everything." "I got no jewelry." "I just got a couple of kids." "They don't want to see their daddy dead on the street." "I don't want to kill you." "I'm sorry." "I was not prepared for any of this stuff." "Just give me the money!" "One more." "It's getting so that decent people can't even go out on the street anymore...without scum like you trying to step on whatever's decent in this world." "But, you know something?" "Your type are just going to be the kind of crap...that sticks to the bottom of a good man's loafer." "I am stinking the place up." "Take the wallet and let's go on to the next scene." "Come on." "Take the money." "You take it." "He's a bloody nutter." "Come back with my wallet!" "Stop!" "Thieves!" "I know how much is in there!" "I want it back after." "Herr Schuster and Frau Schuster." "My wife, Felicity, you know." "How do you do?" "Wonderful to see you again." "Rupert Witherington, our chief overseas expert." "How do you do?" "His wife, Fiona." "Sylvia." "How nice to meet you." "My darling daughter, Barbara." "Pleased to meet you." "So pleased you could come." "My son-in-law, and our host:" "James Ritchie." "Guten Abend." "Guten Abend." "Schon, dich zu sehen." "Pleased to meet you, too." "Mr. Ritchie." "Yes?" "Your brother's on the telephone." "Please don't tell me it's over." "I just got mugged." "Two guys with knives took my wallet." "I got nervous, they were so nervous." "I can't talk now." "I can't talk either." "I got a scene with the girl." "Great." "Do it with the girl and have a wonderful time." "See you later." "How you doing...man?" "Gilbert..." "I've made the martinis!" "Be a good boy and bring them up to me." "Gilbert sent you, didn't he?" "Yes, he did." "You American?" "What are you?" "CIA?" "Mafia?" "Both." "I wondered what death would look like." "I didn't think he'd look like you." "Too scary?" "You gonna bring me that martini or must I suck it from the glass from here?" "No, I'll bring it over." "Do you think I look silly in this outfit?" "I could take it off, if you'd like." "No." "It's good silly." "And do I get a last request?" "You mean like a cigarette or something?" "I had something more substantial in mind." "A cigar?" "Now you're boasting." "I'm sorry." "I am so sorry." "Are you all right?" "Oh, you were going for the gun." "I didn't mean to." "Here." "Take it." "Take it." "I'm not playing that game, you sick bastard." "Did I break your nail?" "If you're going to shoot me, just do it." "Just do it." "Go on." "Just bloody well do it." "Go on then." "If I really have to." "But if you do, you'll never find the letters." "Blackmailing a government minister can be very profitable." "You and I could be very, very rich." "So, no death scene." "What do we do now?" "Here's our esteemed minister of defense." "Perfect." "You should get rid of him." "But you and I, we have more to do together?" "Sure." "What's your name?" "Lorelei." "Call me Lori." "What's yours?" "Spenser." "Spenser what?" "They just said Spenser." "Good luck, Mr. Spenser." "Thanks, Lorelei." "Hurry back." "Looking for something?" "My glasses." "I was visiting a friend." "Who are you?" "Spenser." "And I know who you are, too." "Gilbert." "Then you better get out of here, fast, before I call the police." "Let's have a scene with the bobbies." "Let's get them all in here." "We'll tell them the whole thing." "What whole thing?" "The whole plot thing." "What plot thing?" "She told me about the letters." "Letters?" "What letters?" "The letters." "She told me about them." "I know all about the letters." "How do you think I know?" "She told me." "That's how I found out." "My God, Daggenhorst sent you, didn't he?" "Maybe." "How do I know you are who you say you are?" "Oh, yeah..." "I got this." "Then, of course you are." "Dear God, I'll give you anything you want." "Just name your price." "Okay..." "Twenty." "Twenty?" "Fifty." "Fifty!" "I have to make a call." "Get away from that phone!" "Whoa, that was loud." "How'd I do that?" "Take this." "It's all of it." "It's all of it." "But, I'm sorry." "I will give you some more." "I'm sorry, I stepped out of the scene." "It was just a loud noise." "I'll give you lots more." "I'm afraid of loud noises." "Come on, let's do it again." "Let's take it from the top." "You've done something with your hair." "Where's Gilbert?" "I heard a shot." "Gilbert's gone." "Oh, no." "You cut it." "Look, when I said get rid of him, I didn't mean" "This is a very nice look for you." "Thanks." "Why don't you look out the front and see if it's clear?" "Sure." "Help!" "Pleased to meet you, girlie." "Where are the letters?" "Coming!" "Help me!" "Yeah, I'm coming." "Door's locked." "Kick it in!" "It's solid." "It's not balsa or anything." "Spenser, he's trying to kill me!" "Okay." "All right...all right." "Please hurry!" "Spenser, what are you doing?" ""Here's Johnny! "" "Hurry." "What have we here?" "Conveniently found a mallet outside, but I'm going to swap it for this one." "All right, punk." "I guess the question you got to ask yourself today is, "Do I feel lucky?"" "Well, punk, do you?" "Don't ever show your face on this mews again!" "Come on." "We've got to get out of here." "Let's go." "Go, go, go!" "I thought I could get the letters and then some maniac called Spenser...who says he works for you, fired a pistol at me!" "Listen, we are too close to let this fall apart." "Now, listen." "Hawkins, there is a loose cannon out there and I want him dealt with immediately." "Just think, Hawkins..." "This time next week, these lights will be flashing all across Russia." "This room will be alive again...with happy voices and the patter of little feet." "Voices from across Europe being monitored and decoded." "The feet of agents rushing in with urgent communiques." "The new funding...new equipment...new weapons, new poisons." "Happy days, Hawkins." "Happy days." "Yes, Sir Roger." "It seems there's a bit of a problem...with Spenser and the girl." "Problem?" "Embleton tried to collect the letters, Spenser tried to shoot him." "Shoot him?" "Embleton says he seemed a trifle unhinged." "But what about the girl?" "This is totally unacceptable." "The zero hour is a mere...three hours and 12 minutes away." "It's not possible." "With a mere...three hours, 11 minutes till zero hour?" "Keep calm." "We'll send in the plumbers to flush Spenser." "I call in Boris from deep cover." "Boris Blavasky?" "The maniac who decapitated poor old Ponsonby in Helsinki?" "Boris the Butcher?" "Phone for you, love." "Thank you, sweetie." "I know you, Sergei Nikolivich." "There's more to this than just dirty letters." "Why so gloomy?" "Is better than being butcher." "I like being butcher." "You know exactly who you are killing...and why." "What impresses me most...during our visits to Germany are his people." "There's a warmth, a quiet charm." "Everyone welcomes you with open arms." "You're sure you were in Germany?" "Downtown Brussels." "Wally." "Hello, everybody." "Jimmy's brother." "Don't get up." "What happened?" "We need a place to lie low for a while." "I thought this place would be safe." "Won't you introduce us to your friend?" "Everybody...this is Lori." "She's the defense minister's call girl." "Bastard!" "That really hurt." "I should've called her an actress." "She's great." "Jimmy paid for the whole thing." "I should go, I suppose." "Okay, bye." "We got these smutty letters we're going to blackmail some guy with." "Okay." "Later." "See you." "What line of work is your brother in?" "He's in the movie business." "The movie business." "Of course." "I'm sorry I was a little insensitive." "But, you know, I'm a hit man." "I'm only going to say this once." "I'm not a call girl." "I met Gilbert." "He liked giving me money." "I needed it." "So I let him, okay?" "Was that a tear?" "How do you people do it?" "Do you poke yourself in the eye?" "Or are you thinking right now:" ""My dog is dead"?" "What's the matter with you?" "Are you enjoying this?" "Enormously." "My dog is dead." "My dog is dead." "The letters are upstairs in the spare room." "You go get them." "I'll keep watch, okay?" "Yeah, sure, pintsize." "Last time we split up, you locked the door...and got strangled." "Let's go in together." "You don't trust me, do you?" "Say it." "Go on, say it." "I don't trust you?" "Wait." "I don't trust you." "I was going to ask you:" "Are we all going to stay afterwards and clean up?" "I think Goldilocks wears Old Spice." "You should pay your light bill." "There's a lamp over there on the table." "Oh, God!" "Gosh!" "You got me." "Did he get you?" "You got both of us." "I've never seen a dead body before." "I've seen lots, but this is..." "What're you doing?" "You gotta check and see just how dead they are." "You can never be sure." "Guy could be able to catch this!" "I'm impressed." "You are so twisted." "I would think you'd be impressed by the kind of concentration that is being" "Oh, man!" "I feel sick." "Do you think you trust me to go to the loo?" "The loo." "Off to the loo with you." "I know you worked together...but if I find the letters before she does, it'd be a real hoot." "How about a clue?" "Do you know anything about this girl?" "Is she going out with anyone in the cast?" "Spenser?" "Are you there, Spenser?" "Do that again." "Spenser?" "What's going on?" "Are you receiving me?" "You jerk." "You've got a radio." "Spenser, come in immediately." "This is a 42-20." "Cool." "Hello." "Spenser, here." "Have no fear, good buddy." "What's he talking about?" "Why is he using that ridiculous American accent?" "Cover." "Ask him if he's eliminated the girl." "Did you take the girl to the bathroom?" "No." "She went to the loo...by herself." "By herself?" "Suicide." "Finally, a spot of luck." "Ask him if he has disposed of the body." "Did you flush?" "I think she's going to do that, don't you, pal?" "I'll ask her." "Lori!" "He's talking to her." "She's still in the bowl?" "Maybe he tried but she floated back up." "Tell him to flush her." "Spenser knows how to deal with floaters." "Tell him to use the plunger or we're sunk." "Oh, no." "Listen here, you have to recycle the waste." "I don't know if we mentioned it, but there's a time limit on the operation." "I figure you got to tie up all your loose ends by...1 1:30 at the latest." "Did you tell him?" "Of course not." "Spenser, how did you arrive at that hour specifically?" "For one thing..." "I know a couple of guys who are hoping to fire up some big Ambassadors at 11:59." "Disaster!" "Disaster!" "He knows every detail." "Keep him talking, sir." "The plumbers will be there any minute." "I think I've screwed you guys completely up." "I'm way off the script." "I should've gone into the bathroom and flushed her and everything else." "I'm just gonna recycle her now, and we'll go from there, okay?" "Spenser." "Over and out." "Lori." "We know you're out there." "So you've decided to recycle me after all." "I think it'll be a little bit easier, a lot less confusion for everyone." "Sure, right." "Thank you." "Over here, then." "All right, say cheese." "Let's find the letters." "Oh, my God, what have I done?" "From three feet, I missed you." "I thought that was it." "We gotta get out of here." "We do?" "Oh, great." "Come on!" "Very good news." "Excuse us." "Hold it." "What?" "I'd just like to do one thing." "I'll be right down." "I have a lot more appreciation for what you people go through." "Thanks." "Nice working with you." "The letters." "You are the best." "Thanks for making it fun." "Freeze!" "Don't move!" "Hello?" "Wait up, Lori!" "The letters!" "Watch the foot." "Mail call." "Look what I found." "You're not going to give them to me." "No." "For half a second back there, I thought I saw a real human being." "Nobody asked me to be a human being." "Why don't we change it?" "Change it?" "What were you going to do with these?" "I'll help you." "Why would you do that?" "Because I'd much rather be a good guy." "You're not just acting?" "Well, we both are." "In the Theater of Life, I mean." "I suppose we are." "You know..." "I'm helping you out, but..." "I'm not a completely good guy." "There's something I want, and you're gonna have to let me do it." "It's like that, is it?" "I'm afraid so." "Typical man." "Oh, that feels good." "Thanks a lot." "It was really kind of you to let me drive." "So, partner." "What are you going to do with your share of the money?" "I'm going to get out of here." "Go to New York, buy a flat and I'm gonna study acting." "You don't need acting school." "You're a natural." "Think so?" "Know so." "Other side!" "He's good." "The stars are out tonight as statesmen and celebrities roll up...to celebrate the signing of the Midnight Peace Accord...by the leaders of Russia and Great Britain." "After many months of shuttle diplomacy and behind-the-scenes negotiations" "Listen, Sergei, you said, "Kill Spenser, kill girl and get letters."" "You said nothing about" "American Superman." "Daggenhurst here." "You did not tell me about American agent!" "Say again." "Don't play with me!" "If we cannot trust each other, how can we bring back Cold War together?" "Now, listen here, comrade." "I know nothing about any American agent." "If you're afraid your pinpoint bomb can't take out that top table...at least tell me." "Russian explosive is perfect!" "Will destroy everything in five-meter circle and nothing outside!" "Maybe you do not trust made-in-Britain timing mechanism!" "If your chap, Boris, has botched the job, I'm sure that my" "What is it?" "The plumbers say an American killed Spenser...kidnapped the girl, grabbed the letters and got away." "Doesn't that just bite it?" "Hello, Sergei, I think we may have a bit of a problem." "Police." "Quick." "Turn the lights on." "They're on." "License?" "Relax, the van is kosher." "Wait a minute." "Are those real cops?" "Good point." "They could be Gilbert's men." "We gotta lose them." "Move it!" "I'd love to." "We got a right one here now." "Follow him." "Keep following." "All right, who's going to stop here?" "Sorry, coming through." "I follow." "Follow, no follow, you cretin!" "This van is rubbish!" "It's not the van!" "This man is good!" "He's very good!" "Oh, man, they give you a real car chase." "You get to smash their stuff." "You guys can't be making a dime on this." "Come and get me!" "What's he on?" "This is great." "Here comes trouble." "Don't exhale." "Want me to call for backup?" "For what?" "For a bloody Mini?" "You must be joking." "I've always wanted to do this." "I've always wanted to do that." "Yeah." "Me, too." "That's gonna cost him." "We're losing them." "Oops!" "Sorry." "Force of habit." "Absolutely bloody brilliant." "Spenser, stop." "Come on." "Spenser, stop it." "I feel sick." "Sod this." "Hang on, Bill." "Clench your buttocks." "Where'd they go?" "That was fun." "Tomorrow night, I wanna go this way." "I don't think it's fair for these guys." "They can't possibly stay with me...going right to left." "I like mine." "I think I saw his face in a dream someplace." "Would you mind stepping out of the car, please, sir?" "You want to tell me what you think you were doing?" "Back in the straightaway...95." "I could've gone faster, but I'd have lost you." "You, too, young lady." "I hope you two are secure in your work...because my husband's on urgent government business." "Really?" "You'd better stop staring at my legs, too, otherwise he's gonna get really jealous." "Can I see your driving license, sir?" "No, you may not!" "The guys in the first scene have already taken it." "I'll show you my two-way radio...with which you may communicate directly with my superiors." "Breaker, breaker." "Coming out there for that good old H.Q." "Come on back." "Very funny, sir." "Mind if I have myself a cigarette while I wait for Scotty to beam me up?" "Knock yourself out." "Yes, come in." "We're receiving you." "Go ahead and say hi." "Hello?" "Who is this?" "Police Constable Cochrane from Shepherd's Bush." "What are you doing using one of our communicators?" "This gentleman refused to show me any identification." "Of course he didn't show you any identification." "He's a secret agent." "Put me on to him at once." "I'm sorry, sir." "It's all right." "You're just doing your job." "I'm proud of you." "This is Spense." "So you're still calling yourself that, are you?" "I think I just might, until 1 1:30." "How he mocks us." "What do you want?" "Would you excuse me one second?" "Of course." "May I step out of character for just one minute?" "I wish you would." "I think the reason my brother got me into this was to impress the Germans." "And if it ends here with the police..." "I don't think he's gonna be happy." "But I think we can offer you a more rewarding scenario...than the police could provide." "Great." "Fabulous." "Would you give us a moment to confer?" "How much left in the slush fund?" "A million and a half." "And Sergei's?" "The same." "If we arrange a meeting..." "They're fixing it." "Oh, great." "Great handcuffs." "The ones I've got have a chain in the middle." "Yeah, the old ones." "I love these." "So what's the pay like, then?" "They pay all your expenses." "You're licensed to kill." "But there's a downside." "What's that?" "Torture." "There's the women, though." "They're nice after the torture." "Believe me." "Not much of a car they give you." "It's a piece of crap." "I got an Aston Martin." "Had trouble with the surface-to-air missiles." "It's in the shop." "This will not be easy." "The man has...connections." "Come in, Spenser." "This is Spenser." "We'll give you three million in unmarked bills for the letters." "Three million." "Yes!" "I guess we'll take it." "Be in the lobby of the Grand Plaza London...in 20 minutes." "Keep it coming." "Thank you, bloke." "You get a load of this?" "What's that?" "For allergies." "Actually...it's a powerful agent...that sharpens my senses yet deadens my emotions." "I could do with some of that, sometimes." "What about our story?" "Are we just a doomed couple?" "We have to be Bonnie and Clyde?" "Can't it be like "The Getaway"?" "Couldn't it be like that?" "Could be." "You're acting." "I'm not acting." "Are you?" "Honestly..." "I can't act." "But I can do action." "We at Featherstone Finch believe our major strength...is diversity." "Leave it, the machine will get it." "And diversity" "I just kissed the girl I was with earlier." "She's got lips like your sofa." "Talk about big-car comfort." "And it wasn't just a kiss kiss." "The past five years have seen astonishing worldwide growth...with sexports-exports increased by 700 percent." "I want to do this every single day I'm here." "Either that was her tongue or she has three lips." "Hold it, Wally." "A truly remarkable record." "If you'll excuse me for just one minute." "What's the problem?" "It's not a problem, but you know those Ambassadors?" "Do you think we could...smoke them over here where I am...at the Grand Plaza London?" "Because it's already 10:30 and I really would like...to smoke them on my day." "I can't." "Think maybe we could have those smokes tomorrow night?" "I say, old chap, do have time?" "Yes, 10:30." "You just stabbed me with your pen." "Daddy...can I please borrow the keys to the station wagon?" "Hello, Theater of Life." "This is Mr. Ritchie." "My brother is doing your show." "Wait there, sir." "It's Ritchie." "Trace this call." "I want to ask" "We want to question him in connection with a murder." "And the call girl, too." "I know, I paid for it." "Mr. Ritchie, this is Chief Inspector Cockburn." "So now you're the chief." "Listen, Chief..." "Step out of character for a minute." "You don't realize the seriousness of the situation." "Is this an actor now or a human being?" "Neither, sir." "I'm a policeman." "Mr. Policeman..." "I need to buy some more time and I'll pay you handsomely for it." "Are you attempting to bribe an officer?" "Do you torture everybody like this, or just Americans?" "Look, Mr. Shakespeare, yes, yes, I want to bribe you." "Is the prime minister there?" "I'll bribe him!" "I bribe anybody, who talk to me!" "You invented the damn language, talk to me!" "No wonder you lost the empire!" "You know what?" "Scotland's next!" "Yes or no?" "!" "Yes or no, you socialist, artsy-fartsy little dweeb?" "!" "Mr. Ritchie" "Okay, fine." "You won't help us, it's not a problem." "We'll do something else." "Thank you." "American." "Charlie...it's just a hunch, but I think we might be dealing with...some sort of right-wing extremist what-have- you." "Did you trace that call?" "I'm an actor." "Right." "Did you trace that call?" "Yes, sir." "40 Overbridge Square." "Right." "Charlie." "Call out the Armed Response Unit." "I want this thing crushed, right now." "Thanks." "These actors don't know when to stop." "No, Mr. Ritchie." "The theater community at large are asking:" "What went wrong with the Theater of Life tonight?" "The police are anxious to interview a Mr. Wallace Ritchie...an American, dark, about six foot...and believed to be armed and extremely dangerous." "There you are, James." "There you are, finally." "Yes, indeed." "Before we continue, I'm going to...pop down to the cellar." "There's a nice bottle of port..." "We've already got one." "True." "But it's very dark there and it might take me a few minutes." "I'll be back with the port." "And the car keys." "Oh, dear." "Who's wearing Old Spice?" "Shut up." "I found letters." "But no identification." "Of course not, idiot." "He's a professional." "Everybody wants to check minibar." "Go away!" "It's the plumbers!" "Those sons of bitches blew up my Nikita in '79." "Nikita was vicious" "Forget about your dog." "Open the door." "Easy for you to say." "He's my dog, not your dog." "Come on." "Let go of me." "Get off me!" "I thought you were staying in the car." "This is busier than my butcher shop!" "Go away!" "Sergei Nikolivich." "Open up." "Don't shoot." "Good to see you." "Here we have our man, in the flesh." "How am I supposed to do my work?" "Stop complaining." "Give me the letters." "Quick." "So, this is him, in the flesh." "Where are the letters?" "Spenser, do something." "Those are my letters." "Bastards!" "Come, Sir Roger." "We are overdue for banqueting room." "Splendid." "I think...we begin with soft tissue." "Mr. Prime Minister..." "Mr. President...distinguished guests...my lords, ladies and gentlemen...it's my duty and privilege to welcome you this evening." "Before that historic moment at midnight...when the peace accord is signed between our two countries...we shall be treated to...music and dance that seek to embody the souls...of these two great nations." "Before torture, we try truth serum?" "Please." "Are you a member of our Frequent Renters' Club?" "We would like to be." "We have a two-night rental policy." "If the tape stays out longer than that, you're not charged the extra $1.50." "What is your real name?" "Wallace Ritchie." "Who is paying for all this?" "My brother Jimmy." "He's...trying to impress the Germans so he gave me this for my birthday." "Happy birthday." "Thank you." "Who you are working for?" "Blockbuster Video, Des Moines, Iowa." "Who you are working for?" "Blockbuster Video, Des Moines, Iowa." "Damn." "They trained him so well." "Give him the antidote." "I do it old-fashioned- way." "I beat it out of him." "This real pen." "Idiot." "I have antidote here." "That is so refreshing." "May I have one of those when we're all finished, please." "Who else knows about these letters, Mr. Ritchie?" "Please don't call me by my real name." "It destroys the reality I'm creating." "Who are the goddamn Germans?" "Time out." "I hate to break out of character, but...you cannot shout into a person's ear." "It does damage." "You know, the spitting I don't mind." "Boris, it's so big." "Boris." "Please." "Please." "Not like Ponsonby in Helsinki." "Is fun for you, but we have to clean up after." "Please." "We do have to do cleanup after?" "Always." "You're right." "Sometimes it's foolish to be so brave." "You leave us no alternative." "I will call Dr. Ludmilla Kropotkin." "She will take care of you." "The evil lady torturer?" "Bring her in here!" "Even perhaps you are not brave enough for taste of her medicine." "I'm not ticklish." "Get the rubber sheets." "And watch that man." "Yes, boss." "How come you not sniff on his turn?" "Boris' Old Spice is lingering." "Do you think we could open up the window a little bit?" "Hey, vodka...be a guy." "See that nasal spray?" "Could you pass me over a couple of snoots worth, please?" "Is poison maybe." "Good." "Give him." "Maybe we'll finish game." "I'm going to need one on each side." "Tilt." "Little tilt." "Deeper." "Oh, yeah, stop." "Stop." "Stop." "Can you back it out a little?" "It's stuck." "Don't push it in." "Stop it." "Don't push it in." "Wait." "Now it's too far in." "You squeeze it." "Wait, wait." "Squeeze it." "That's much better." "Fabulous." "Fabulous." "You're clumsy." "What're you doing?" "Don't joke." "Great, great spill." "I still need my stuff though." "You stay, I'll get it." "Come on." "Now really." "I know you do this every night and it can get boring, but you gotta give 100 percent." "Now I've got to figure out how to escape." "I'm going to show you what 100 percent looks like." "I'm right there." "Where's that big paw?" "Lori, am I good, or am I good?" "He's done it again." "My God, you're good." "Thank you." "Gonna untie me?" "Sorry." "Hurry, before they come back." "Dr. Ludmilla...we're ready for you now." "Why do you always go out the window?" "It's more dramatic, I guess." "It's kind of a Starsky and Hutch thing, isn't it?" "Where's our special scarves?" "Stop joking." "I risked my life." "I waited for you." "I didn't have to." "Why did you tonight?" "Don't make me say it now." "What about the money?" "We can't just rewrite the whole script." "Can't we?" "Is the money so important?" "Without the money, what the heck we got going on?" "Less than I thought, obviously." "Bye." "Albert, if you don't say it, it won't work." "What are you?" "I'm a very naughty boy." "Good." "What are you?" "I'm a very naughty boy." "Don't mind me." "If you hold it a bit lower down, you get more of a flick." "Thank you." "What are you?" "A very naughty boy." "If Featherstone Finch...were to move 40 million of Feathers' assets to..." "Tonga..." "Get your hands up!" "Get your hands behind your back!" "Where's Mr. Ritchie?" "Where's Mr. Ritchie?" "Where's Mr. Ritchie?" "Mr. Ritchie, he go for port." "Which port?" "Shut up, you!" "Which port?" "He go for port in his car." "Control." "Green 1." "Suspect Ritchie heading for unspecified port." "Over." "Control to Special Branch." "I want an all-ports alert, effective immediately." "Close all ports." "Up high!" "I'm the only one standing on a ledge!" "Jimmy!" "Oh, my God." "I'm stuck!" "Don't move!" "I won't!" "I can't!" "I'm coming, Wally." "Come on, damn it." "They're gone." "Here." "Come here." "Hold me." "Okay?" "We'll try from other side." "Stop!" "What happened?" "He went out the window." "You have beans!" "He jumped us." "He's not human." "Neither am I." "Get him!" "A nasty, wicked boy." "Jimmy." "Jimmy." "We get him from downstairs." "Wally." "Wally." "Jimmy." "Jimmy." "Where are you?" "I'm here on the ledge." "What's going on?" "My leading lady came out on the ledge, and I think I broke her heart." "And..." "So I followed her." "She came out here and she went down to this next room." "There's a hallway." "We can walk." "Not very theatrical, though." "I'm so sorry." "This isn't theater." "You don't get it." "It's experimental." "This is serious." "It's very raw, very" "No, no, no, no." "It's real." "It's so real." "Freeze!" "Put your hands in the air!" "I'm glad you came." "I think you're gonna like it." "You missed!" "You missed again!" "Not by much, though!" "Cut!" "Hold it!" "Hold it." "Time out." "Time out!" "I got something in my eye, jag-off!" "Stop it!" "Oh, God!" "Guys!" "Let's not think of my safety!" "I'm flying!" "I guess I got the drop on Dr. Ludmilla Kropotkin." "Get that thing away from that little boy's butt!" "Drop it!" "You all right, son?" "Yes, thanks." "...for him, hour after hour I just wait." "Of course, he" "I would like Lori's three million, please, or..." "Dr. Ludmilla Kropotkin will die." "But I am Dr. Ludmilla Kropotkin." "Keep back." "He's dangerous." "He might have bomb." "Plan B, then." "Lobby, please." "I'll just get her letters for her, then." "All right, even he cannot penetrate ballroom for letters." "Help!" "I'm being abducted." "You've got to" "Oh, you're together." "He's the brother." "Good." "Take him to bowels of hotel." "I go after the brother." "One false move and the doctor will get a taste of her own medicine." "Relax, we're actors." "Oh, please, I'm not a doctor." "I'm a manicurist." "It's our anniversary." "Yeah, I'd like to believe that...from one of the most dangerous women in the world." "I suppose you were involved with that business in Helsinki with Ponsonby." "Did you get your kicks, Doctor?" "We were just having a little fun." "You had your fun." "And he got his head sent home in a freezer bag." "The key is really to listen...to feel it and then...respond as if it were really happening." "You can do it." "Break a leg." "Help, please!" "She's a killer!" "Please." "She's dead." "What's wrong?" "It's our anniversary." "We are kidding." "We are only acting." "What?" "Just acting." "Wait." "You can't go without a security pass." "Russian Secret Service." "I need to see your pass." "Happy now?" "Excuse me!" "Excuse me!" "Hello, hello." "No pass, no entry, I'm afraid." "I'm looking for a tall American." "Aren't we all, dear." "But we've got a show to put on, in case you didn't notice." "Thank you." "You can wait outside." "Can we have all these swans together?" "Thank you." "And you'd be Mr. Nikolai, I presume." "Stop plaing without you get the rest of the costume?" "I'm not supposed to be in costume." "We are performing tonight, aren't we?" "Yeah" "Then get with it!" "You go before the public in two minutes." "I'm not ready for that." "My brother said I wouldn't have to" "Spare me the prima donna act." "It's really not the time." "Nikolai's come in from the cold, everyone." "On stage, please." "We know you and your German friends are financing all operation." "Your brother told us." "I'm a banker." "I'm mortgaged to the hilt." "I can't finance anything." "The longer you keep me here, the less I'm worth." "Let's have a little fun with electricity, shall we?" "My lords, ladies and gentlemen...the Baltic dancers from Russia will perform a dance...symbolizing man's growth from infancy to adulthood." "Good God!" "Where's Lori's letters?" "May I?" "Lori wants her letters back." "Boris, come quickly." "Okay, I bring dart gun." "Then it's curtains for Spenser." "Spineless little shit." "I'm very late." "I lost my ticket, but I'm a close friend of the minister of defense." "And my mom knows the queen of Sheba." "Maybe we should get out while we can." "Perhaps he could bring money." "Here, get Rasputin's money now." "How can we tell which doll is which?" "Only he can." "It's his plan." "He's open!" "Let's get out of here." "Where're you guys going?" "Here comes Hawkins with your money, now." "Great." "I wish my brother could be here." "He's missing everything." "Here's the stuff." "You idiot, go and get the brother, now!" "Please don't go anywhere." "I want to talk to you both after the show." "Oh, my God." "Stop!" "Don't torture him...or his brother will kill us all!" "The man is a god." "I finish this man to man." "He has disabled bomb." "Hold it right there, you two." "What did you think of the show?" "Here's the cash." "You can count it all now." "Thank you very much." "Two bags' worth." "Where's Lori?" "Do you know if she saw the show?" "I got her money." "She'll like it." "Love the hat." "Thank you." "Thank you very much." "Can you keep a secret?" "I'm taking this souvenir of my day." "I'm afraid he's a little groggy, but he's fine." "Wally." "Welcome back, stranger." "Here, take a load off." "Can I get you some tea?" "Please." "One lump or two?" "No lumps." "What have you been doing?" "I was tortured." "Great." "Did they make it fun?" "What?" "You know what they're signing?" "The death knell of our dreams." "We'll have to settle for half." "Ready?" "Ready." "Did you see what I did?" "In front of all these people, I had a solo." "I had the entire crowd eating out of my hand." "Is that what you were wearing?" "Maybe they made a tape." "I'm so proud of you." "I want to be just like you, Wally." "When I was back in that room, I thought I was going to die." "My life passed before my eyes and I realized I cared about the wrong things." "I've cared about money and success and getting to the top." "Prestige and..." "At the end of the day..." "There's a big guy standing behind you." "Yeah, well...maybe you'll feel better if you could see this tape." "Really behind me?" "You're everywhere." "This one is for you...buddy." "Bang." "Is joke." "Look." ""From KGB to Boris..." ""...fastest gun in the east."" "But there can only be one fastest gun." "And now, it's you." "I salute you." "Doreen and me, we go open butcher shop." "But you will always be my brother." "Oh, look!" "What?" "What's the matter?" "There's nothing in here but silly money." "What were you looking for?" "I lost my souvenir doll." "You really don't care about money at all, do you?" "It's not real." "The doll was beautiful." "How's this for a souvenir?" "Roger, you don't suppose maybe doll...?" "Don't be daft." "This is the one he picked for himself." "Terrible-looking thing." "Her stomach looks like her ass." "Is her ass, you idiot." "Give it to me." "There." "That was like an explosion." "Want to try again?" "Do you have insurance?" "Did you see this?" "We were right there." "We could've been killed." "It says this mystery guy...was equal parts "brilliant cunning and sheer testosterone."" "They were right about the second part." "Time out." "All right, drink man." "Now." "Compliments of the house." "Oh, my gosh." "You people are so nice." "Do you eat the flower?" "I'm sorry." "In the nose, too." "That's the worst." "Here, get a towel." "Did that make contact?" "Oh my gosh!" "Gesundheit myself." "You okay?" "Yeah, just another Old Spice guy." "Impressive performance, Mr. Spenser." "Sorry about the test, but we did have to be sure." "Only one candidate in a thousand even detects Amazonian arafrog toxin...much less incapacitates the messenger." "And it's rare that we even approach a candidate...until we've auditioned him for 12 or 18 months, but the other night..." "We witnessed the birth of a superstar." "We'd like you to join the team." "You want me to be a part of The Company?" "I don't know what to say." "This is all happening kind of fast." "Just tell us your demands, please." "What do I do?" "They think you're a superstar." "I think they expect you to act like one." "I would like fresh flowers in my room." "Rare tropical flowers...that smell good." "And ice in my dressing room...which should be a palace and so should Lori's be a palace." "And I want a dressing room for my pet bloodhound, too." "And a poodle." "And Lori's poodle." "They can bunk in together." "But there better be fresh flowers in there!" "And ice!" "Whatever." "Just so long as you produce the hits." "I'll do six a week." "Six?" "Five." "No, not six." "Five." "But one of them will be for free." "I want to do kids or old people one day a week." "And I want a StairMaster." "I want a JuiceMaster." "I want a ThighMaster and I want a ButtMaster." "If you can't give it to me, I'm going back to Des Moines." "Just don't hurt the help." "It's whatever you want." "What I want is this guy." "He's fantastic." "I love working with him." "I hope I've passed your audition." "Thank you for asking." "Let's get creative." "I'm thinking for our opening season, Lori...as Juliet." "Shakespeare in the Sand!" "You've got casting approval, okay?" "For your lead." "Joan of Arc for our action people." "I set you afire." "You behead him, right?" "Experimental." ""Cats."" "Wait a second!" "With people." "People as cats." "Let's workshop." "You're both cats." "You're my big cat." "I've got a giant cat." "Get down." "Creative producer." "Thank you." "You're the dog." "We've got a dog and a cat, but they hate each other." "Chase, chase." "Go, go!" "Cat, go, kitty, go!" "Lori and I are the husband and wife." "We have this cat and this dog." "We love each of them, but they hate each other." "So you're the bad cat." "The only thing we can do is" "Cut it out!" "Bad kitty!" "Bad cat!" "Is this working?" "Are you liking it?"
{ "pile_set_name": "OpenSubtitles" }
% Penalised least squares objective function and derivatives % phi(u) = 1/lambda * ||X*u-y||_2^2 + 2*sum( pen(s) ), s=B*u-t % % [f,df,d2f] = phi(u,X,y,B,t,lam,pen,varargin) where penaliser is evaluated % by feval(pen,s,varargin{:}) % % The return arguments have the following meaning: % f = phi(u), [1,1] scalar % df = d phi(u) / du, and [n,1] gradient vector (same size as u) % d2f = d^2 phi(u) / du^2. [n,n] Hessian matrix % % See also PLSALGORITHMS.M. % % (c) by Hannes Nickisch, Philips Research, 2013 August 30 function [f,df,d2f] = phi(u,X,y,B,t,lam,pen,varargin) s = B*u-t; r = X*u-y; if nargout==1 p = feval(pen,s,varargin{:}); elseif nargout==2 [p,dp] = feval(pen,s,varargin{:}); else [p,dp,d2p] = feval(pen,s,varargin{:}); end f = norm(r,2)^2/lam + 2*sum(p); if nargout>1 df = 2*([X']*r/lam + [B']*dp); if nargout>2 % evaluation of the Hessian is dangerous for large n if numel(dp)==numel(d2p) d2f = 2*(X'*X/lam + B'*diag(d2p)*B); % d2p is a vector else d2f = 2*(X'*X/lam + B'*d2p*B); % d2p is a scalar or a full matrix end end end
{ "pile_set_name": "Github" }
Q: Open multiple website in a single window in different tabs I want to open no. of urls and I want to open 1st url in new window and after that others in same window but in new tabs. I am using c# and its a window application I use a code provided by Firefox but it is not opening new tab. It opens new window. here is my code: private void btnSearch_Click(object sender, EventArgs e) { Process.Start("http://google.co.in","2048"); Process.Start("http://google.co.in","2048"); } thanks in advance. A: The problem starts when you don't have you're browser open. Else it would work perfect without the Thread.Sleep. Maybe you can try it like this The "_blank" Opens a new blank page in the same window "So a new tab" using System.Threading; private void button1_Click(object sender, EventArgs e) { Process.Start("http://www.google.com", "_blank"); Thread.Sleep(2000); Process.Start("http://www.google.com", "_blank"); }
{ "pile_set_name": "StackExchange" }
On the go and no time to finish that story right now? Your News is the place for you to save content to read later from any device. Register with us and content you save will appear here so you can access them to read later. "Oh, but you aren't one of us, are you?" he continued. "What I mean is, you aren't a scientist, are you?" The table now in silence, she replied: "Actually, yes I am." The man's forehead wrinkled, he smiled, and asked: "Oh, what kind of science? What I mean is, you aren't our kind of scientist, are you?" She said something to the man, headed straight for the bar, and it was there that she noticed her environment. At the tables behind her, filled mostly with students and postdoctoral researchers, the gender split was 50/50, while the tables surrounding hers, hosting working scientists, were largely full of men. At the front, where VIPs and members of the academy were seated, the ratio was again half and half - but only because the men had brought their wives. Dr Nicola Gaston says we're a long way from a level playing field for scientists. Dr Gaston's story paints a familiar picture for women in science. Figures collected by the Association for Women in Science (AWIS), as at 2011, showed a disproportionate number of men in senior positions at the country's Crown research institutes and among science heads of departments across our universities. Despite the fact that the past three recipients of our highest science and technology honour were women, the large majority of major science prize recipients are men. Fewer than 10 per cent of Fellows of the Royal Society of New Zealand were female, and the spread was uneven across the disciplines, with the larger proportion of women in the social sciences, health sciences and humanities. Computer science, engineering and physical sciences, physics and mathematics have been cited as the most under-represented areas. The society's chief executive, Dr Di McCarthy, said women were also under-represented on research funding committees. Yet there is no shortage of women in lower levels of the sector. Recent figures showed the proportion of women in the science workforce had increased to 50 per cent. Dr Gaston, a senior lecturer at Victoria University and president of the New Zealand Association of Scientists, said there were a good number of women today across lower university positions, giving the impression we were just seeing the change now. "But in reality, women made it to the junior academic ranks 30 to 40 years ago - we simply haven't seen them come through," she said. "This is true even in fields such as biology, which can be dominated by women at the lower levels of seniority." High-profile molecular biosciences lecturer Dr Heather Hendrickson said academic science required a long, low-paid apprenticeship period taking anything up to 12 years after a bachelor's degree, and while many women started down this track with passion, many did not persist. The Massey University scientist's personal experience of watching talented female friends choose other paths suggested there may be many women who were capable but left before they reached the faculty level. When she began graduate school 13 years ago, half her classmates were female, and many of them thought it would stay that way. "Those friends and women like them have left science by my stage, as lecturer, because either a partner's job was given preference, family issues took priority or because science was not a good fit." The challenges women in science faced, said AWIS national convener Dr Esther Haines, were complex and their relative importance varied from person to person. She characterised issues as structural, pragmatic and cultural, but all could interweave. "Examples of structural issues would be the long training period for scientists - four years for a first degree, and typically four years, or longer, after that to gain a PhD - and the prevalence of short-term contract positions in the early to mid-career stages of an academic career." Two pragmatic issues that came up frequently were difficulties in accessing high-quality childcare or with finding a job in the same geographic region as a partner, while cultural issues included unconscious bias, stereotype threat and family expectations. But Dr Gaston said there had been a change in attitudes, or recognition of the problem. "Sexism was sorted in the 70s, the trope goes, so any remaining difference is a matter of personal choice," she said. "It's definitely harder to get at the remaining causes of gender imbalance in science, but there is a lot of literature now on unconscious bias and stereotype threat, to name two examples, which really serve to highlight that the playing field remains unlevel, due to historical imbalances, despite a lack of concrete barriers in the present day." Microbiologist Dr Siouxsie Wiles, one of New Zealand's best-known scientists, believed the main issue was whether men and women really had the same opportunities to reach high-level positions, and whether they had to achieve equivalent standards to reach that level. "I have often heard it said that women feel they need to work harder than men to be seen to be as accomplished." Dr Wiles, who completed her PhD in 2000, said a squeeze on availability of research funds worldwide over recent times may have added to the issue as well. It had become much harder for fledgling scientists to survive in the "postdocalypse" - the period between gaining a PhD and becoming a permanent academic staff member - and with the few post-doctoral positions and mid-career fellowships available in New Zealand, the picture here was particularly dire. "The postdocalypse is where most people are lost from academia and what isn't clear to me is whether disproportionately more women will end up being lost than men, relative to their abilities," she said. "For example, if women take time out to have children around this time, they will end up having a less competitive CV compared to their male counterparts." The Prime Minister's chief science adviser, Sir Peter Gluckman, believed this to be a problem. "I think there are two separate issues - one is the increase in women going into the sciences started probably a couple decades ago, and that's still coming through, but the second issue is the way academics assess CVs, and I've got a lot of criticisms of that," he said. "CVs these days are largely based on the number of publications and the impact of publications, but academia doesn't look more broadly at the person's context very well." Dr Gaston said CVs and the performance of scientists, especially those early in their career, were repetitively assessed each time they applied for funding. Another factor was that the career path in science was very narrow and restrictive - and time out of the workforce "hurts a lot". "Simple changes such as changing criteria for awards or fellowships so that they take this into account - having them limited by years in the workforce, for example - can be a good start to coping with this, but the attitudes are slow to change." Sir Peter acknowledged this. Change would be needed, and soon. In interviews of women working in the science sector, undertaken by the National Advisory Council on the Employment of Women, pursuing a family at the same time as a research career was a particular issue among retention challenges. Distinguished Professor Margaret Brimble, a University of Auckland chemist and recipient of New Zealand's highest science honour, the Rutherford Medal, said the problem became more pronounced when women engaged in laboratory work returned to work, only to find the technology had advanced. "It would be nice to see some fellowships offered to enable women to re-enter the workforce after a career break," she said. "These could be directed at the more technical areas of science. Importantly, child rearing also coincides with the critical time when a woman is trying to establish an independent scientific career." Many institutions were, however, trying to improve their support for women. The University of Otago, for example, offered a Women in Leadership Programme and a mentoring programme for female academic staff. The Ministry of Women's Affairs is also working to identify ways to improve the pipeline of women in senior management and leadership roles, in science and across all sectors. Minister Jo Goodhew said organisations could improve these pipelines by supporting flexible work practices, addressing unconscious bias, and assisting career "on-and-off ramps" for women. In the meantime, Dr Gaston believed New Zealand could look at training science funding panels around unconscious bias. "On the other hand, I don't believe the playing field will be even until we have 50/50 representation - or until a generation has grown up in that environment - so we do still have an uphill battle." When would the battle be finally won? There was no simple answer, Dr Haines said. In a heavily male-dominated area like physics, even if the percentage of women among undergraduates suddenly rose to 50 per cent, it would still take 10 to 20 years for that to start influencing the percentage of women among Performance-Based Research Fund submitted researchers, she said. For the change to be fully reflected, it would take another 20 to 40 years. Otago University biochemist Professor Christine Winterbourn, a ground-breaking free-radical researcher and the first female winner of the Rutherford Medal, saw much cause for optimism. When she was a Chemistry MSc student in the mid-1960s, there were four women in a class of 25. Today in her field of biochemistry and cell biology, there would most likely be more women than men. Professor Winterbourn said there were still a good number of women at the student and more junior levels, and believed it was largely a matter of time and demographics for them to rise up through the ranks. To her, there was clear evidence this was happening. The two subsequent Rutherford Medal award winners after her were both women - Distinguished Professor Brimble and Distinguished Professor Dame Anne Salmond. "Also, at the ceremony where I received my medal, they gave out a number of awards to more junior scientists, a majority of whom are women," she said. "These are likely to be in the pool of future leaders." After the career-family crossroads, a helping hand for others Judy O'Brien knows well the value of having a good mentor when you need one. As many young professionals do, she arrived at the difficult crossroads between career and family. She chose to become a full-time mother to four sons, yet stayed connected with her career at the University of Auckland. But had it not been for her mentor at the time, Professor Dick Bellamy, she might not have been able to maintain that link. "Dick always stressed how important it was to maintain contact with my field of science so I could come back to it later," she said. "He enabled this to happen by coming up with part-time opportunities for me." Dr O'Brien believes her sons will be her greatest legacy but she has been able to enjoy a fulfilling and distinguished career. Today, she is development director at the university's School of Biological Sciences. Her role focuses on recruitment and career support for staff and postgraduate students, but she still lectures in a first-year biology class and is involved in school outreach activities at the university. She co-ordinates the Rotary National Science and Technology Forum at the school, and is a member of the Liggins Educational Network for Science Advisory board. She strives to be the mentor she had when she was a young mother, although admits the environment today is much different. In the 1980s, when she was considering coming back on a permanent part-time basis, people would recoil in shock and horror, asking if she realised how psychologically damaging it would be for her children not to have her home 24/7. "I think the attitude to childcare is now radically different, and it does allow people to find a solution that works without having a guilt trip laid on them." Balancing the needs of children and career is still a challenge, and many young researchers have approached her for advice, especially in her former role as the school's academic deputy director. "I used to get a lot of young females, from undergraduates onwards, coming to me because they knew I had taken time out to have children. They wanted to know how I managed it." She has watched many of the women she has helped go on to thrive in their careers. And her support hasn't gone unrecognised: last year, she was awarded the inaugural Miriam Dell Award by the Association for Women in the Sciences. Dr Kate Angel, who nominated Dr O'Brien for the award, described her mentor as someone "who gets things done ..." Appeal for female applicants One of Kiwi science's most honoured figures is calling on young female scientists to apply for new fellowships aimed at New Zealand and Australia. Entries recently opened for the L'Oreal Australia and New Zealand for Women in Science Fellowships, a progression of the prestigious global L'Oreal Unesco For Women In Science International awards, which have been recognising women in science for 16 years. University of Auckland chemist and Rutherford medallist Distinguished Professor Margaret Brimble is part of a global network of 2000 women who have been recognised by the global award - including two who later won the Nobel Prize. Other New Zealand recipients have included Cawthron Institute research scientist Dr Zoe Hilton, who specialises in oyster research, and Christchurch-based University of Otago kidney researcher Dr Suetonia Palmer. Distinguished Professor Brimble said L'Oreal NZ had worked hard to enable young New Zealand female scientists to be eligible to apply for what was previously an Australian fellowship. "These fellowships can be used by the awardees for any purpose to help their careers - including childcare."
{ "pile_set_name": "Pile-CC" }
Delano Municipal Airport Delano Municipal Airport is two miles southeast of Delano, in Kern County, California. Most U.S. airports use the same three-letter location identifier for the FAA and IATA, but Delano Municipal Airport is DLO to the FAA and has no IATA code. Facilities Delano Municipal Airport covers and has one asphalt runway (14/32) measuring . In the year ending January 23, 2006 the airport had 19,000 aircraft operations, average 52 per day, all general aviation. 44 aircraft are based at this airport: 68% single engine, 5% multi-engine and 27% helicopters. History Delano Airport opened in April 1940. It was built by the federal government with monies appropriated by Congress for Development of Landing Areas for National Defense (DLAND). It was built by the Civil Aeronautics Administration (CAA). In late 1943 the United States Army Air Forces acquired usage rights to the airport. It was placed under the jurisdiction of the IV Fighter Command. The 481st Night Fighter Operational Training Group (NFOTG) used the facility, named Delano Army Airfield as part of the Army Air Forces Night Fighter School which had transferred from Florida to Hammer Field, California. Delano was used as an auxiliary training airfield and the school operated a combination of modified Douglas A-20 Havocs for night fighter operations, designated P-70, and new prototype YP-61 Black Widow purpose-built night fighters Between 31 March and 15 June 1944, the 426th Night Fighter Squadron trained at Delano; the 548th Night Fighter Squadron between June and September 1944. In addition, flights of P-61s from the 427th, 547th, 549th and 550th Night Fighter Squadrons moved in and out of Delano AAF during 1944 as part of their training prior to being deployed to combat units, primarily in the Pacific and CBI theaters. In December 1944, the 481st NFOTG was inactivated as part of an AAF reorganization. Delano Field was transferred over to the jurisdiction of Air Technical Service Command on 10 December. It was placed on standby status and the airport was only used for emergency, being under the control of Hammer Field. With the end of the war, the base was declared excess to requirements and returned to civil control. Delano has had almost no scheduled airline flights, but did appear in the OAG circa 1969. See also California World War II Army Airfields List of airports in Kern County, California References External links Category:1940 establishments in California Category:Airports in Kern County, California Category:Airfields of the United States Army Air Forces in California Category:Airports established in 1940
{ "pile_set_name": "Wikipedia (en)" }
Q: opencv installation on ubuntu 11.10 I'm trying to install OpenCV on Ubuntu11.10 using the terminal. But it gives me the following error. I've not been able to resolve it. Notice the last four lines. $sudo apt-get install opencv Reading package lists... Done Building dependency tree Reading state information... Done The following extra packages will be installed: libopencv2.3 The following NEW packages will be installed: libopencv2.3 opencv 0 upgraded, 2 newly installed, 0 to remove and 2 not upgraded. Need to get 11.8 MB of archives. After this operation, 88.7 MB of additional disk space will be used. Do you want to continue [Y/n]? Y Get:1 http://ppa.launchpad.net/gijzelaar/opencv2.3/ubuntu/ oneiric/main libopencv2.3 i386 2.3.1-3 [11.5 MB] Get:2 http://ppa.launchpad.net/gijzelaar/opencv2.3/ubuntu/ oneiric/main opencv i386 2.3.1-3 [264 kB] Fetched 11.8 MB in 22s (528 kB/s) (Reading database ... 240623 files and directories currently installed.) Unpacking libopencv2.3 (from .../libopencv2.3_2.3.1-3_i386.deb) ... dpkg: error processing /var/cache/apt/archives/libopencv2.3_2.3.1-3_i386.deb (--unpack): trying to overwrite '/usr/lib/libopencv_highgui.so.2.3.1', which is also in package libopencv-highgui2.3 2.3.1-4ppa1 dpkg-deb: error: subprocess paste was killed by signal (Broken pipe) Unpacking opencv (from .../opencv_2.3.1-3_i386.deb) ... dpkg: error processing /var/cache/apt/archives/opencv_2.3.1-3_i386.deb (--unpack): trying to overwrite '/usr/bin/opencv_createsamples', which is also in package libopencv-core-dev 2.3.1-4ppa1 dpkg-deb: error: subprocess paste was killed by signal (Broken pipe) Errors were encountered while processing: /var/cache/apt/archives/libopencv2.3_2.3.1-3_i386.deb /var/cache/apt/archives/opencv_2.3.1-3_i386.deb E: Sub-process /usr/bin/dpkg returned an error code (1) $ A: For an error like this: dpkg: error processing /var/cache/apt/archives/AAA (--unpack): trying to overwrite `/usr/lib/BBB', which is also in package CCC dpkg-deb: subprocess paste killed by signal (Broken pipe) Errors were encountered while processing: AAA E: Sub-process /usr/bin/dpkg returned an error code (1) (where AAA,BBB,CCC are placeholder names, in case it wasn’t clear) do sudo dpkg -i --force-overwrite AAA (give full path of AAA), and then run sudo apt-get -f install again. And also, try googling before posting a question cause there are tons of links explaining how to fix this error!
{ "pile_set_name": "StackExchange" }
Violent behaviour from young adults and the parents of paediatric patients in the emergency department. Violence in healthcare is a significant issue and one that is increasing in prevalence globally. Nurses have been identified as the professional group at most risk, with patients the main source of this violence. The aim of this study was to describe the experiences of Australian ED nurses with episodes of patient-related violence from young adults (16-25years of age) and the parents of paediatric patients. Data analysis of semi-structured interviews led to the identification of antecedents to episodes of violence and behaviours specific to these two groups of interest. These behaviours included: "performing" and attention-seeking behaviours and violent behaviours including both verbal and physical abuse. Antecedents discussed by participants included: parental emotions and alcohol and substance abuse. Overall the results speak to a working environment where participants regularly feel unsafe. Violence in the ED is perceived to occur frequently and to such an extent that participants have become resigned to expect and accept it as part of their job. The role played by distinct groups such as young adults and the parents of paediatric patients must be acknowledged and this knowledge used along with other known risk factors to help identify patients at risk of potential violence.
{ "pile_set_name": "PubMed Abstracts" }
DUMONT, N.J. — Urstadt Biddle Properties (UBP) has purchased an equity interest in a new entity that owns Washington Commons Shopping Center, retail center that includes a residential component in Dumont. The two-building property features a freestanding 44,300-square-foot Stop & Shop and a three-story building that is occupied by retail tenants Valley Medical Group, Great Clips, Pet Valu, Blimpie and that includes 26 residential apartments. The residential unit mix consists of studio, one- and two-bedroom layouts. At the time of acquisition, the property was 100 percent leased. The transaction was structured as a DownREIT partnership whereby the seller, a regional real estate developer, received a combination of cash and operating partnership units in a new entity formed to purchase the property. UBP is the managing member of the newly formed equity and will manage and lease the property. UBP’s initial equity in the DownREIT was approximately $3.9 million, which represents an approximate 31.4 percent equity interest.
{ "pile_set_name": "Pile-CC" }
1. Field of Invention The present invention relates to modular overload protectors for communication systems, and in particular, to modules that include; overvoltage protection utilizing solid state devices and line identification. 2. Discussion of the Relevant Art In communication systems, such as telephone systems, it is necessary to position overload protectors at various positions to protect sensitive parts of the system and to protect equipment connected to the line from lightning strikes or other causes of overvoltage appearing on the communication lines. Typically these overvoltage protection devices incorporated the carbon block type which provided parallel air gaps. However, the carbon block protector during normal operation on the communication line could cause static to appear on the line and thus, the gas tube type surge protectors replaced them. These devices generally used back up protection, which utilized thermally sensitive plastics that were assembled with spring pressure on them and thus, when overheated would yield and short the communication terminal line to ground. With the inherent desire to protect the communication equipment several different types of protectors have been used over the years, each including thermally active members, which when overheated cause the line terminals to short to ground. Initially the thermally sensitive material was a low temperature melting solder pellet, which when melted because of the extreme heat caused by an overvoltage, would permit the assembly in some manner to short the line terminal to ground. Further improvements in the state of the art replaced the solder pellet used with the gas filled tube. Still further improvements of the protection devices, which proved to be more reliable, utilized a back-up air gap together with the thermally sensitive material for overheating protection in the assemblies that provides provide protection of the line if the gas tube associated therewith for some reason vented its gas. However, all of the devices known in the prior art required that the technician in replacing any of the components after a lightning strike or overvoltage condition to carefully replace the components as it was originally assembled so that the protection would be restored. This type of assembly work performed in the field proved to be a handicap and thus, it was found more desirable to provide a device which is completely sealed and when it has provided its useful protection, is just thrown away and replaced with a new unit. This, of course, became feasible only with the advent of inexpensive thermally sensitive plastics and/or inexpensive solid state protection devices together with a new type of construction which reduced the cost of the protection device. However, it has been determined that the sealing material sometimes referred to as a potting or encapsulating material, generally composed of some type of epoxy compound was found to interfere with the operation of the solid state surge arrester thereby making the apparatus less reliable so that a protective housing was needed to protect the solid state surge arresters from contamination. Therefore, it is an object of the present invention to provide a miniature station protector module for communication systems which is completely sealed and may be disposed of once it has served its purpose for protecting the communication line. It is another object of the present invention to provide a miniature station protector module which combines all of the features of the earlier type devices including fail-safe shorting, highly stable and efficient, as well as being inexpensive to manufacture. It is still a further object of the present invention to provide a miniature station protector module which utilizes a solid state protector device. It is yet another object of the present invention to provide a miniature station protector module, as described above, which further includes a protective housing to protect the solid state surge protector from contamination because it comes into contact with the sealing or potting material. The foregoing and other objects and advantages will appear from the description to follow. In the description reference is made to the accompanying drawing which forms a part hereof and in which is shown by way of illustration a specific embodiment in which the invention may be practiced. These embodiments will be described in sufficient detail to enable those skilled in the art to practice the invention, and it is to be understood that other embodiments may be utilized and that structural changes may be made without departing from the spirit and scope of the invention. The following detailed description is, therefore, not to be taken in a limited sense, and the scope of the present invention is best defined by the appended claims.
{ "pile_set_name": "USPTO Backgrounds" }
Arbroath 0 Alloa Athletic 3 By Footymad PreviewerLast updated : 02 October 2004 Viewed : Alloa deservedly won this basement battle to put some breathing space between themselves and Arbroath at the foot of division two. Alloa had the advantage of playing with the Gayfield Park wind in the first half and controlled the early proceedings. A neat one-two between Stuart Callaghan and Andy Brown opened up the Arbroath defence, and Neil Inglis did well to push Brown's shot wide for a corner. Alloa went on to force six corners before the break, and from an in-swinging Callaghan corner Michael Daly should have scored but headed wide from two yards. Arbroath's only chance of the first half was a Stuart MacDonald free-kick that curled just wide from 20 yards. However, despite their dominance, Alloa's first goal had more than a touch of fortune about it. A speculative effort by Callaghan struck John Cusick leaving the stranded Inglis helpless and the home side a goal down. After the interval, Alloa continued to look the more dangerous side and doubled their lead after 52 minutes. A swift counter attack resulted in a Dougie Hill cross only being half cleared by Chris McLeod, and Callaghan side-footed home from the edge of the box. Callaghan was unlucky not to hit his hat-trick when Kevin McMullen cleared his in-swinging corner on to his own bar. However, with seven mintues remaining, Alloa wrapped up the game. A Callaghan corner again struck the bar and appeared to bounce off Steven Rennie and into the net, although Callaghan is claiming the goal.
{ "pile_set_name": "Pile-CC" }
Xiaomi is known for its wide range of home products including thermometers, Hygrometers and others. Some of the products are released under its crowdfunding platform but are designed to meet Xiaomi’s quality standard. The Chinese tech giant has released yet another thermometer but this time it is an ultra-cheap product dubbed Seconds-test medical electronic thermometer Mijia custom version. The product comes at just 19.9 Yuan (~$3) which is considerably cheaper than other models with similar specification priced between 20 – 200 Yuan. Compared to the traditional mercury clinical thermometer, the new Mi digital thermometer does not contain mercury, it is entirely digital. Thus, there won’t be any need for users to bother about damage caused by glass breakage or mercury leakage. The gadget is also manufactured using medical grade materials and has undergone stringent bio-compatibility tests. All these are to ensure that the materials are safe and harmless to the human body. Read More: Xiaomi Has Sold Over 10 Million IoT Smart Home Products Globally Talking about the design, the Mi Digital Thermometer comes with an 18.8mm LCD screen where the temperature reading is displayed boldly. This makes it easy for both the elderly and Children to easily read the temperature reading. The device also comes with a replaceable battery. The thermometer uses a high-precision thermistor and analog-digital conversion module giving it a measurement accuracy of ± 0.1 (35 °C -39 °C). The measurement accuracy is CFDA certified. The MIJIA custom thermometer can be used for subgingival and oral temperature measurement. The gadget will be on sale from April 3 on Xiaomi Mall, YouPin, Jingdong, Suning and Mi Home. (source) ALWAYS BE THE FIRST TO KNOW - FOLLOW US!
{ "pile_set_name": "OpenWebText2" }
As London police continue to investigate the disappearance of a city woman, they’ve responded to public calls for a ground search by saying it wouldn’t be effective — for now. Police did not originally do a ground search for Shelley Desrochers because of the lapse of time between when she was last seen and when she was reported missing, Const. Sandasha Bough said. As well, Desrochers’ disappearance when she was first reported missing was not considered suspicious in nature, she said. “We consider whether to do a ground search based on a case by case basis, based on our search urgency evaluation,” Bough said. But police haven’t ruled out a search in the future, if additional information warrants it, she said. Friends of Desrochers, desperate for answers, have publicly wondered why police did not do a ground search for her or why they don’t now. They’re considering trying their own, although they have already looked in parts of east London for clues. The 42-year-old mother and grandmother was seen in the area of Ernest and Bradley avenues about 2 p.m. on Jan. 2, and about 10 a.m. Jan. 5, near Hamilton Road and Rectory Street. Desrochers worked in London’s dangerous street-level sex trade. Police didn’t get a report about her disappearance until Jan. 21. They issued a missing person’s notice Feb. 1 after Desrochers didn’t access her bank account for a government deposit. Desrochers’ disappearance is the third of a woman involved in what police call a “high risk lifestyle” in six years in London, and has renewed calls for improving safety for women. Some of Desrochers’ friends and advocates are planning a meeting Monday to discuss how to keep women at risk safer. As well, a city hall-led plan to help women in the street-level sex trade, developed with the help of 24 organizations, is expected to be launched this year. The same committee steering that plan also is looking at how agencies can share information when anyone struggling with homelessness, addiction, mental illness or life on the street goes missing.
{ "pile_set_name": "OpenWebText2" }
Q: Dynamic Inline form in angular using material I am trying to build a dynamic form with the help of angular material. The requirement is the I need two input columns in one row and the number of input values can be dynamic. Is there any way such that I can build this form using ng-repeat with two input box in one row. Thanks. Any help is appreciated. A: You can use Flexbox. I am not sure how efficient this solution is, but it will surely give you a start. CSS .myrow { display: flex; flex-wrap: wrap; } .mygrid { flex: 1; min-width: 25%; padding : 10px; } HTML <form name="userFormTwo" novalidate> <div class="myrow"> <div class="form-group" ng-repeat="user in formDataTwo.users" ng-class="{ 'has-error' : userFieldForm.email.$invalid }"> <div class="mygrid"> <ng-form name="userFieldForm"> <label>{{ user.name }}'s Email</label> <input type="email" class="form-control" name="email" ng-model="user.email" required> <p class="help-block" ng-show="userFieldForm.email.$invalid">Valid Email Address Required</p> </ng-form> </div> </div> </div> </form> Demo Plunker You can also use bootstrap class(row and col-xs-12), but then you'll have to tweak your ng-repeat to loop with the increment of 2, to accommodate a pair of array elements in a single row, which would ultimately require some extra effort on the controller part just for that.
{ "pile_set_name": "StackExchange" }
Q: MouseMotionListener is not working with Canvas This is my code so far, what I want to do is to add a new Object every time the mouse is moved, but the system is not even accessing the MouseEvent class after hours of thinking, I still am not able to figure the problem. Please Help!! My main class: package testing; import java.awt.Canvas; import java.awt.Color; import java.awt.Graphics; import java.awt.image.BufferStrategy; import java.util.Random; public class Wincall extends Canvas implements Runnable { public static final int HEIGHT = 640, WIDTH = 1080; private WinTest w; private Handler handler; private ME me = new ME(this); public Wincall(){ handler = new Handler(); w = new WinTest(WIDTH, HEIGHT, "Test", this); } public synchronized void run(){ while(true){ long now = System.currentTimeMillis(); this.tick(); this.render(); long after = System.currentTimeMillis(); int tt = (int) (after-now); if(tt>5) try { Thread.sleep(10); } catch (InterruptedException e) { e.printStackTrace(); } System.out.println("Time Taken in millisecs : " + tt); } } public void tick(){ handler.tick(); } public void render(){ BufferStrategy bs = this.getBufferStrategy(); if(bs == null) { this.createBufferStrategy(3); return; } Graphics g = bs.getDrawGraphics(); //render g.setColor(Color.BLACK); g.fillRect(0 ,0 ,WIDTH, HEIGHT); handler.render(g); //render end g.dispose(); bs.show(); } public void addStuff(){ handler.addObject(new TestGO(me.getX(), me.getY(), 32, 32)); } public static void main(String[] args){ new Wincall(); } } My MouseEvent class: package testing; import java.awt.event.MouseEvent; import java.awt.event.MouseMotionListener; public class ME implements MouseMotionListener{ private int mx = 0, my = 0; private Wincall game; public ME(Wincall game){ this.game = game; } public void mouseDragged(MouseEvent e){} public void mouseMoved(MouseEvent e) { game.addStuff(); mx = e.getX(); my = e.getY(); System.out.println(mx); System.out.println(my); } public int getX(){ return mx; } public int getY(){ return my; } } My window class: package testing; import java.awt.Canvas; import javax.swing.JFrame; public class WinTest { private static final long serialVersionUID = -369751247370351003L; public WinTest(int h, int w, String title, Wincall game){ JFrame f = new JFrame(title); f.setDefaultCloseOperation(JFrame.EXIT_ON_CLOSE); f.setSize(h, w); f.add(game); f.setVisible(true); f.requestFocus(); f.setResizable(false); f.setFocusable(true); game.addMouseMotionListener(new ME()); game.run(); } } A: Though its not clear what you are trying to do. But you need to add the MouseMotionListener to canvas not to the JFrame. Since you are adding canvas to the JFrame, it is the canvas which should capture MouseEvents. Hence, your Wintest should probably look like this : public class WinTest extends Canvas { private static final long serialVersionUID = -369751247370351003L; public WinTest(int h, int w, String title, Wincall game, ME me) { JFrame f = new JFrame(title); f.setDefaultCloseOperation(JFrame.EXIT_ON_CLOSE); f.setSize(h, w); f.add(game); f.setVisible(true); f.requestFocus(); f.setResizable(false); f.setFocusable(true); // f.addMouseMotionListener(me); game.addMouseMotionListener(me); game.run(); } } Update : Wincalll Class: public class Wincall extends Canvas implements Runnable { public static final int HEIGHT = 640, WIDTH = 1080; private WinTest w; // private Handler handler; private ME me = new ME(this); public Wincall() { // handler = new Handler(); w = new WinTest(WIDTH, HEIGHT, "Test", this, me); } public synchronized void run() { while (true) { long now = System.currentTimeMillis(); this.tick(); this.render(); long after = System.currentTimeMillis(); int tt = (int) (after - now); if (tt > 5) try { Thread.sleep(10); } catch (InterruptedException e) { e.printStackTrace(); } // System.out.println("Time Taken in millisecs : " + tt); } } public void tick() { // handler.tick(); } public void render() { BufferStrategy bs = this.getBufferStrategy(); if (bs == null) { this.createBufferStrategy(3); return; } Graphics g = bs.getDrawGraphics(); // render g.setColor(Color.BLACK); g.fillRect(0, 0, WIDTH, HEIGHT); // handler.render(g); // render end g.dispose(); bs.show(); } public void addStuff() { System.out.println("addStuff"); // handler.addObject(new TestGO(me.getX(), me.getY(), 32, 32)); } public static void main(String[] args) { new Wincall(); } }
{ "pile_set_name": "StackExchange" }
Re: Start-up programs I've got a ton of stuff in the start-up program that I would like to remove. If I remove them from the the Start menu, will I still be able to double click the desktop icon and run the program from there? It seems that all of these programs in the start menu decrease system resources. Deleting these from the start menu would increase my system resources, yes? Thanks...
{ "pile_set_name": "Pile-CC" }
Q: PKPA to Supercede TLS/AES etc? I wont give the name of the company, but here's a quote from a white paper they published: Our innovative Polymorphic Key Progression Algorithm (PKPA) technology is designed to overcome the flaws and inadequacies associated with today’s encryption algorithms. I know enough about crypto to be dangerous, but my thoughts are that this is a technology that is trying to solve a problem that doesn't exist. They cite numerous hacks, but am I wrong in assuming that such hacks are very seldom the result of the crypto technology, and instead usually the result of someone leaving the keys in the car? A: Sounds like snake oil for me. The phrase you cite can be easily googled and tracked back to a white paper by CipherLoc in which they suggest that AES can be broken by using frequency analysis of english text when reusing the same encryption key for many inputs. In their explanation they deliberately ignore the role of a random IV with AES which should make such attacks infeasible. And their "solution" against this is this "PKPA" thing which somehow scrambles the data before encryption to make such frequency analysis impossible. Apart from that this is not intended to replace AES but instead used additionally to it. A: I agree with Steffen Ullrich's answer that this is snake oil and that a random IV would solve this problem. Just to add on to to his answer, the paper makes a number of misleading or outright false claims. They say on page 2 that However, with the rapid advances in computing horsepower continuing, it was clear that the era of DES (and 3DES) encryption was coming to a close and a new way to secure data was needed. This is only partially correct. DES was vulnerable to brute force attacks, but not 3DES. 3DES is still secure when properly implemented, but has fallen out of favor for its high complexity and extremely poor performance. However, with the passage of time, even AES has become susceptible to the massive amounts of computing horsepower available in today’s world and the increasing sophistication of cyber criminals Complete nonsense. AES is perfectly fine when properly implemented with a mode of operation appropriate for the use case. No currently known attacks on AES are feasible. About the 3 different key sizes, they say the following: Interestingly, the fact that the standard supports increasingly large key sizes was perhaps an early indication that the security may not be entirely scalable – i.e. if AES security was stable, then no change in key size should in fact be required. The key size requirements were made by NIST before the AES competition concluded. They have nothing to do with concern over Rijndael; any cipher that won would have those 3 key sizes. Furthermore, this has more to do with the fact that it was a government competition, and the government thinks in terms of "security levels". The thought was you would have a fast, lower security version (AES-128); a medium performance, medium security version (AES-192); and a lower performance, high security version (AES-256). In reality, they're all fast, they're all secure, and there's no reason to split hairs unless you're worried about quantum computing, in which case you'd pick AES-192 or AES-256. See this answer by Thomas Pornin. After totally ignoring the role of the IV as mentioned above, they go on to suggest something a bit absurd: As a further protection, it is also possible to use different encryption algorithms for each segment of data to be secured. For example, segment A could use AES-256, segment B could use Blowfish, segment C could use 3DES, etc. In fact, each segment of data could then be further re-encrypted dozens, hundreds, or even thousands of times. This is one of the characteristics that makes CipherLoc’s technology very scalable. As hackers get more sophisticated and continue to have access to ever-increasing amounts of computing horsepower, our technology can be easily and quickly scaled to even greater levels of security through a variety of techniques including, but not limited to, massive amounts of re-encryption. This solves nothing that properly applied AES does not already solve, while introducing an absolutely unfathomable amount of complexity. If you're using AES, the weaknesses in your system will not be your cipher. They will be side channel attacks, nonce reuse (if applicable), poor random number generators, fixed IVs, lousy KDFs, wrong modes of operation, lack of authentication, and plenty of other common vulnerabilities, all of which would apply anyway in this scheme. Furthermore, I shudder to think of the performance of a system that re-encrypts thousands upon thousands of times with multiple ciphers. In summary, this scheme is unnecessary and the paper misleading (and that's being charitable).
{ "pile_set_name": "StackExchange" }
---------------------- Forwarded by Jane M Tholt/HOU/ECT on 06/12/2000 01:51 PM --------------------------- "Bautista, Larry L." <BautistaL@EPEnergy.com> on 06/06/2000 08:39:45 PM To: ALEX GOLDBERG <agoldberg@lgl.twc.com>, ANDREW KOLESAR <abk@sloverandloftus.com>, BARBARA JOST <bjost@huberlaw.com>, BARRY GRAY <bgray@epelectric.com>, BOB GRAY <bgray@cc.state.az.us>, BRUCE CONNELL <bruce.a.connell@usa.conoco.com>, CARLA JOHNSON <carla.j.johnson@usa.conoco.com>, CAROLYN CORWIN <ccorwin@cov.com>, CARRIE SAFFORD <csafford@mbolaw.com>, CATHY BULF <cbulf@oneok.com>, "Cox, Robin" <CoxR@EPEnergy.com>, CURT BRECHTE <cbrechte@apsc.com>, DARRYL SMETTE <darryl.smette@dvn.com>, DAVID CLARK <dclark@sempra.com>, DAVID HUARD <dlh@jmbm.com>, "DAVID I. BLOOM" <dbloom@mayerbrown.com>, DEBBIE SWANSTORM <daswanstrom@verner.com>, DEBRA BOLTON <debra.bolton@bakerbotts.com>, DIANE MCVICKER <dbmcvick@srpnet.com>, "DONALD G. AVERY" <dga@sloverandloftus.com>, "DONALD W. PETERSEN" <dwp9@pge.com>, DONNA FULTON <dfulton@enron.com>, DOUG CANTER <dmcwash@mshpc.com>, DOUG SCHANTZ <doug_schantz@kmmktg.com>, "DOUGLAS K. PORTER" <porterdk@sce.com>, ED ROSS <earo@dynegy.com>, "ELISABETH R. MYERS-KERBAL" <emyerskerbal@shb.com>, ERIC EISENMAN <exe3@pge.com>, FRANK LINDH <frl3@pge.com>, GERARDO ESPINOSA <gespinosa@gas.pemex.com>, GORDON SMITH <gsmith@jhenergy.com>, HARVEY MORRIS <hym@cpuc.ca.gov>, JAMES MCGREW <jhmcgrew@brugen.com>, JAMES MORIARTY <jmoriarty@fw-law.com>, JANE THOLT <jane.m.tholt@enron.com>, JANICE ALWARD <jalward@cc.state.az.us>, JOANN RUSSELL <joann.russell@et.pge.com>, "JOEL L. GREENE" <jlgreene@energyadvocates.com>, JOHN GREGG <jgregg@mbolaw.com>, JOHN HESTER <john.hester@swgas.com>, "JOHN P. ARMATO" <jpa3@pge.com>, "JOHN P. BEALL" <bealljp@texaco.com>, "JOHN R. STAFFIER" <jstaffier@sdsatty.com>, JUDY JOHNSON <jaheineman@aol.com>, JUNE SUWARA <jsuwara@sempra.com>, KAREN TOMCALA <karen.tomcala@pge-corp.com>, KARYL LAWSON <karyl_lawson@kmmktg.com>, KATHIE EDWARDS <kbedwards@gkrse-law.com>, "KATHLEEN L. MAZURE" <klm@dwgp.com>, KAY KERN <kernks@sce.com>, KEITH MCCREA <kmccrea@sablaw.com>, "KELLY A. DALY" <kadaly@moheck.com>, KEVIN LIPSON <kjlipson@hhlaw.com>, "KIM M. CLARK" <kclark@jhenergy.com>, L PERSON <l.person@czn.com>, LARRY BLACK <llblack@ibm.net>, LUIS MANUEL PADILLA <lpadilla@gas.pemex.com>, M BERGERN <mbergero@czn.com>, MARIA OROPEZA <oro@cpuc.ca.gov>, "MARK T. MITCHELL" <mitchellm2@epenergy.com>, "MARK W. SCHWIRTZ" <mschwirt@aepnet.org>, MIKE MCELRATH <mmcelrath@phelpsdodge.com>, NORMAN PEDERSEN <napedersen@jonesday.com>, PATRICIA ANDERSON <pat.anderson@southernunionco.com>, PATRICK BROWN <pabrown@socalgas.com>, "PATRICK G. GOLDEN" <pgg4@pge.com>, PAUL KEELER <pkeeler@br-inc.com>, PENNY BARRY <barryp@bp.com>, PETE FROST <pete.frost@usa.conoco.com>, PETER CERVIN <pcervin@br-inc.com>, RANDY RICH <rrich@bracepatt.com>, REBECCA CANTRELL <rebecca.w.cantrell@enron.com>, RICHARD JORDAN <richard.jordan@swgas.com>, RICHARD STAPLER <richard.stapler@williams.com>, ROB DAVIS <redavis@sempra.com>, ROBERT FOSS <rfoss@coral-energy.com>, SANDRA ROVETTI <sjs@cpuc.ca.gov>, SARAH TOMALTY <seto@dynegy.com>, SHERRI BOOYE <sbooye@skadden.com>, "SHERRI L. BOOYE (2)" <nizra@earthlink.net>, STEVE KEEHN <skeehn@sempra.com>, STEVE TARPEY <tarpeysp@bp.com>, SUSAN GINSBERG <susan.ginsberg@coastalcorp.com>, TED MCMURTRIE <edward.mcmurtrie@swgas.com>, TOM CARLSON <tcarlson@apsc.com>, TOM ROTH <tom.roth@et.pge.com>, VIRGIL SPURGEON <vrspurg@ppco.com>, WAYNE ELLIS <wayne.ellis@williams.com>, "WILLIAM S. SCHERMAN" <wscherma@skadden.com> cc: "Healy, William H." <HealyW@EPEnergy.com>, "Clark, Al W." <ClarkA@EPEnergy.com>, "Ferguson, Michael D." <FergusonM@EPEnergy.com>, "Shelton, Patricia A." <SheltonP@EPEnergy.com>, "Derryberry, Richard L." <DerryberryR@EPEnergy.com>, "Tomlinson, Robert T." <TomlinsonR@EPEnergy.com> Subject: EPNG Settlement Proposal > As promised at the last ADR meeting, attached are three documents > summarizing the settlement proposal El Paso would like to discuss at the > June 12 meeting in San Francisco. > > This document outlines the proposal: > <<Outline of Settlement Proposal 6-6-00.doc>> > > This document summarizes the receipt and delivery right assignments. For > simplicity, all of the assignments have been summarized on the worksheet > labeled "Consolidated Results." The remaining worksheets in this workbook > are the detailed calculations used to arrive at the individual > assignments. > <<June 12 Proposal Without J4JB in Mcfd.xls>> > > > This document summarizes the flow assumptions used in generating the > receipt and delivery right assignments: > <<Flow Assumptions.ppt>> > > Bill Healy > (915) 496-2144 > healyb@epenergy.com ****************************************************************** This email and any files transmitted with it from El Paso Energy Corporation are confidential and intended solely for the use of the individual or entity to whom they are addressed. If you have received this email in error please notify the sender. ****************************************************************** - Outline of Settlement Proposal 6-6-00.doc - June 12 Proposal Without J4JB in Mcfd.xls - Flow Assumptions.ppt
{ "pile_set_name": "Enron Emails" }
Prognostic importance of plasma lipoprotein-analyses in patients with unstable coronary artery disease. The lipoprotein (Lp) pattern was analysed in patients with suspected unstable coronary artery disease (UCAD), to compare the pattern as a prognostic instrument regarding subsequent coronary events with smoking, hypertension, diabetes mellitus and with the result of an early exercise test. Included were 295 patients with UCAD. Blood samples for Lp values were obtained in the acute phase and after one year. Apolipoprotein-A1, Apolipoprotein-B (Apo-B), Lipoprotein(a) (Lp[a]) HDL-Cholesterol, Cholesterol (Chol) and Triglycerides (TG). were estimated in serum. During the 1-year follow-up coronary events (myocardial infarction, cardiac death, coronary artery by-pass surgery) occurred in 48 patients. The severity of CAD, overweight, smoking and beta-blockade influenced the Lp-pattern. Chol-, TG- and Apo-B-levels were highest in the group with a coronary event. Apo-B turned out to be the second best predictive variable in multiple regression analysis, in men. In women no such analysis was done because of very few coronary events during follow-up. Nevertheless, the exercise test variables, ST depression and pain were more predictive of coronary events than Apo-B in men.
{ "pile_set_name": "PubMed Abstracts" }
Today the smallest silicon transistors are already achieving atomic limits -- a 4-nanometer silicon transistor channel, for instance, would consist of about 20 atoms. To go to the next silicon generation, all sorts of imperfections and uneven doping problems are facing the further downsized silicon transistors. If IBM, or others -- in fact China is now leading in nanotube research -- can perfect the 1.4-nanometer transistor channel, then Moore's law can keeping marching forward a little while longer. If not, a whole new paradigm may have to be invented. Relatively recently, the nanotube transistor guru, IBM Fellow Phaedon Avouris, found greener pastures to explore in plasmonics and photonics. The nanotube team is now led by Wilfried Haensch at the T.J. Watson research lab of Yorktown Heights, N.Y. Haensch is facing the same problem that Avouris has been facing, that of how to position such impossibly small components into nice neat straight lines for transistor canals. He has a few new tricks up his sleeve, some put there by James Hannon, head of IBM's molecular assemblies and devices group. The source and drain electrodes cover the carbon nanotubes channel, all controlled by the same local back gate. (Source: IBM) One new idea is not to depend on just a single nanotube, but to use multiple nanotubes for a transistor channel, hoping that at least a few work. In simulations, they have lined up six relatively parallel 1.4-nanometer-wide and 30-nanometer-long nanotubes with a generous spacing of 8-nanometers between them. The ends are embedded in the source and drain of the nanotube, leaving 10-nanometer channels suspended over the gate electrode at the bottom of the stack. Their next simulation will be to label the substrate and nanotubes chemically for correct alignment, then strip away the chemicals for a real finished chip -- an IBM Power7. Haensch tells EE Times: The six-tube device structure came out of complex optimization process that models the performance of an entire microprocessor, in this case an IBM Power7 chip. The optimizer varies the layout of the device, including the wiring, and predicts the system performance. The International Technology Roadmap for Semiconductors (ITRS) calls for the 5-nanometer node to be reached by 2019, so IBM has set is goal for nanotube transistors by 2020.
{ "pile_set_name": "OpenWebText2" }
Introduction ============ Aggressive mature B-cell lymphomas harboring concurrent translocations of 8q24/*MYC* mainly with 18q21/*BCL2* are called "double-hit lymphomas (DHL)" now referred to as "high grade B-cell lymphoma with *MYC* and *BCL2* and/or *BCL6* rearrangements (DH-HGBL)" according to the current World Health Organization (WHO) classification of lymphoid neoplasms.^[@b1-1041417]^ The concurrent translocations of 8q24/*MYC* and 18q21/*BCL2* usually lead to overexpression of both proteins, and DH-HGBL clinically forms a specific group among "double-protein-expression lymphomas (DPL)".^[@b1-1041417]--[@b3-1041417]^ The most common histological type of DH-HGBL is diffuse large B-cell lymphoma (DLBCL), which has heterogeneous clinicopathological, immunophenotypic, and genetic features.^[@b1-1041417],[@b4-1041417]^ Gene expression signatures have stratified DLBCL into germinal center B-cell (GCB)-like, activated B-cell (ABC)-like, and other subtypes, each of which results from different pathogenic mechanisms.^[@b1-1041417],[@b5-1041417],[@b6-1041417]^ DH-HGBL cases with DLBCL morphology frequently result in disastrous consequences in spite of showing the GCB phenotype, which is regarded as a relatively favorable marker for survival.^[@b1-1041417],[@b2-1041417],[@b4-1041417]^ Thus, to be DHL and DPL (DH-DPL) seems to have a negative impact on survival, especially in GCB-like DLBCL cases.^[@b1-1041417]--[@b3-1041417]^ MYC is a powerful transcriptional activator, target genes of which are associated with cell proliferation, DNA replication, protein synthesis, and cell metabolism, and its overexpression is a hallmark of tumor aggressivity.^[@b7-1041417],[@b8-1041417]^ In contrast, BCL2 is the first identified anti-apoptotic regulator that contributes to the survival of lymphoma cells.^[@b9-1041417],[@b10-1041417]^ Dysregulation of both genes likely generates aggressive lymphoma cells showing a fast growth rate and resistance to apoptotic stimuli. Clinically, DH-DPL has a poor prognosis when treated with the standard rituximab-combined cyclophosphamide, doxorubicin, vincristine, and prednisone (R-CHOP) regimen, with a median survival of around 20 months.^[@b2-1041417],[@b11-1041417]^ Until now, optimal therapeutic strategies against DH-DPL remain to be determined. Recent reports suggest that targeting MYC and BCL2 may be a promising strategy to control DH-DPL.^[@b12-1041417]--[@b15-1041417]^ BRD4, a member of the bromodomain and extra-terminal domain (BET) family, is considered to be a convenient target for MYC-driven lymphomas.^[@b16-1041417],[@b17-1041417]^ BET family proteins recognize acetylated chromatin and act as transcription co-factors.^[@b18-1041417]^ BRD4 is upregulated in DLBCL and Burkitt lymphoma cells, and its inhibition leads to a strong downregulation of MYC and its regulating genes, resulting in suppression of their cell growth.^[@b16-1041417],[@b17-1041417]^ Meanwhile, the selective BCL2 inhibitor venetoclax demonstrated excellent antitumor effects in chronic lymphocytic leukemia.^[@b19-1041417],[@b20-1041417]^ BCL2 and its family proteins function as inhibitors and activators of the intrinsic apoptotic pathway at the mitochondrial membrane level.^[@b10-1041417],[@b21-1041417]^ They contain at least one of four BCL2 homology (BH) domains (BH1-4) and are classified into three groups based on their structure and function: i.e., the pro-survival proteins (BCL2, BCL-xL, MCL1, BFL1, and BCLw) sequester the pro-apoptotic BH3-only proteins (BID, BIM, BAD, NOXA, PUMA, BMF, HRK, and BIK), which in turn activate the pore-forming proteins (BAX and BAK).^[@b10-1041417],[@b21-1041417]^ Oligomerization of BAX/BAK permeabilizes the mitochondrial membrane, resulting in cytochrome c release and apoptosis.^[@b10-1041417],[@b21-1041417]^ The BH3 mimetic venetoclax binds to the BH3 domain of BCL2, releases BH3-only proteins, and induces apoptosis.^[@b10-1041417],[@b21-1041417]^ Although short exposure to venetoclax can trigger significant antitumor effects in DLBCL cells,^[@b12-1041417]--[@b15-1041417],[@b19-1041417],[@b22-1041417]--[@b24-1041417]^ this drug's clinical efficacy in DLBCL is less promising,^[@b25-1041417]^ probably because the apoptotic sensitivity to venetoclax is influenced not only by total amounts of BCL2, but also by its phosphorylation status, especially at serine 70 (Ser70), and the further presence of other pro-survival proteins.^[@b14-1041417],[@b15-1041417],[@b22-1041417]--[@b24-1041417],[@b26-1041417]--[@b28-1041417]^ Among the pro-survival proteins, MCL1 is considered the major determinant of resistance to venetoclax.^[@b22-1041417]--[@b24-1041417],[@b28-1041417]^ Therefore, the therapeutic application of venetoclax to DH-DPL needs further investigation. In this study, we examined the apoptotic sensitivity of GCB-like DLBCL cells to the BRD4 inhibitor JQ-1 and BH3 mimetics, focusing on the association of BCL2 with MCL1. Methods ======= Reagents -------- The BCL2 inhibitor venetoclax (Selleck Chemicals, Houston, TX, USA), MCL1 inhibitor S63845 (ApexBio, Houston, TX, USA), BCL-xL inhibitor A-1155463 (Selleck Chemicals), and BRD4 inhibitor JQ-1 (Sigma-Aldrich, St. Louis, MO, USA) were dissolved with dimethyl sulfoxide (DMSO; Nacalai Tesque, Kyoto, Japan) and added to the culture medium. Cell lines ---------- We used four GCB-like DLBCL cell lines: BJAB,^[@b29-1041417]^ SU-DHL10 (ATCC, Manassas, VA, USA), Karpas231 (ECACC, Salisbury, UK), and OCI-Ly8 (kindly provided by Dr. Masao Seto, Kurume University, Kurume, Japan). They were maintained as described previously.^[@b29-1041417]^ Fluorescence *in situ* hybridization analyses --------------------------------------------- Fluorescence *in situ* hybridization analyses were performed using a Vysis LSI MYC dual-color, break-apart rearrangement probe, a Vysis LSI IGH/MYC/CEP8 tri-color dual-fusion probe, and a Vysis LSI *IGH/BCL2* dual-color, dual-fusion translocation probe (Abbott Molecular, Des Plaines, IL, USA). Clinical samples and immunohistochemistry ----------------------------------------- Clinical samples were obtained at biopsy performed for initial diagnosis at our institution between September 2012 and October 2018. Diagnoses were made according to the current WHO classification,^[@b1-1041417]^ and GCB-like DLBCL was defined using the Hans criteria.^[@b30-1041417]^ A bone marrow specimen from one patient (UPN3) was subjected to *in vitro* susceptibility testing using venetoclax after having obtained written informed consent. Immunohistochemistry was performed on formalin-fixed, paraffin-embedded specimens using standard techniques. The primary antibodies used are listed in the *Online Supplementary Methods*. The percentages of stained lymphoma cells were evaluated by visual estimation and recorded in 10% increments by at least two observers. The study protocol was approved by the Ethics Review Board of St. Marianna University. Cell proliferation and annexin V-binding assays ----------------------------------------------- We performed direct cell counting using a trypan blue-exclusion test (Thermo Fisher Scientific, Carlsbad, CA, USA) and annexin-V binding/7-amino-actinomycin D (7-AAD) rejection assays (Beckman Coulter, Brea, CA, USA) with a FACSCalibur flow cytometer (BD Bioscience, Franklin Lakes, NJ, USA). Acquired data were analyzed using FlowJo software (BD Bioscience). Western blot analysis --------------------- Cell lysates were prepared as described previously.^[@b29-1041417]^ Equal amounts of protein (30 μg/well) were separated on a discontinuous sodium dodecyl sulfate-10% polyacrylamide gel and blotted onto a nitrocellulose membrane (Bio-Rad, Hercules, CA, USA). The primary antibodies used are listed in the *Online Supplementary Methods*. Antibody signals were visualized using Western blue (Promega, Madison, WI, USA). Immunoprecipitation ------------------- Whole cell lysate (100 μg of total protein) was added to 1/200 volume of each rabbit antibody and adjusted to 680 μL of volume with the lysis buffer. The antibodies used are listed in the *Online Supplementary Methods*. Rabbit serum-saturated protein G-Sepharose beads (20 μL) (GE Health Care, Uppsala, Sweden) were added to each lysate, and immunoprecipitation was performed for 1 h while rotating at 4°C. After incubation, the beads were washed three times with ice-cold lysis buffer and boiled for 3 min with 20 μL/tube of loading buffer. The supernatant was subjected to western blot analysis. Statistical analysis -------------------- Differences in positive rates of MYC and BCL2 family proteins between DH-HGBL and other GCB-like DLBCL were calculated using a two-tailed Mann-Whitney U test and Student *t* test. *P* values \<0.05 were considered statistically significant. All analyses were performed using EZR (Saitama Medical Center, Jichi Medical University, v.1.33).^[@b31-1041417]^ Results ======= MCL1 overexpression is less frequently observed in DH-HGBL ---------------------------------------------------------- We initially evaluated the protein expression of MYC and BCL2 family members in clinical samples. A total of 27 cases were analyzed because they had minimal data and specimens for immunohistochemical and cytogenetic evaluations (*Online Supplementary Table S1*). Immunohistochemistry and fluorescence *in situ* hybridization analyses using *MYC* split and *IGH-BCL2* fusion probes confirmed that these clinical samples comprised eight DH-HGBL cases harboring both *MYC* and *BCL2* gene rearrangements and 19 GCB-like DLBCL cases. Of course, all DH-HGBL cases showed the GCB phenotype, and seven of the eight cases corresponded to DH-DPL (*Online Supplementary Table S1*). Among the 19 GCB-like DLBCL cases, five showed overexpression of both MYC and BCL2 proteins and were regarded as non-DH DPL (*Online Supplementary Table S1*). Although immunohistochemistry clearly detected overexpression of both MYC and BCL2 proteins more frequently in DH-HGBL than in other GCB-like DLBCL (Mann-Whitney U test, *P*=0.028 in MYC and *P*=0.013 in BCL2), differences between DH-HGBL and non-DH DPL were not seen ([Figure 1A](#f1-1041417){ref-type="fig"}). Among the BCL2 family proteins, immunhistochemistry clearly confirmed the expression of BCL2, MCL1 and BIM, but rarely detected BAX regardless of the groups ([Figure 1A,B](#f1-1041417){ref-type="fig"}, and *Online Supplementary Figure S1*). There were no differences in the rates of positivity for BIM and BAX among the three groups, whereas MCL1 overexpression was detected significantly more frequently in other GCB-like DLBCL than in DH-HGBL (Mann-Whitney U test, *P*=0.005) ([Figure 1A](#f1-1041417){ref-type="fig"}). This significance was also observed between DH-HGBL and non-DH DPL (Student *t* test, *P*=0.019) ([Figure 1A](#f1-1041417){ref-type="fig"}). Concerning the staining pattern for MCL1, we found differences between DH-HGBL and other GCB-like DLBCL including non-DH DPL. All DH-HGBL cases showed the cytoplasmic staining pattern, whereas two of five non-DH DPL (40%) and six of 14 other GCB-like DLBCL cases (43%) exhibited the nuclear staining pattern ([Figure 1B](#f1-1041417){ref-type="fig"}, *Online Supplementary Table S1*). These results suggest that the intrinsic anti-apoptotic activities in DHL-HGBL or DH-DPL may be dependent on BCL2 rather than MCL1. ![Expression of MYC and BCL2 family proteins in germinal center B-cell-like diffuse large B-cell lymphoma. (A) Immunohistochemistry-detected protein expression of MYC, BCL2, MCL1, BIM and BAX in clinical samples of double-hit (DH) high grade B-cell lymphoma with *MYC* and *BCL2* rearrangements (HGBL) and other germinal center B-cell (GCB)-like diffuse large B-cell lymphomas (DLBCL) including non-DH double-protein-expression lymphoma (DPL). Straight bars represent the mean of each positive rate. The differences in positivity were calculated using the Mann-Whitney U test\* and Student *t* test\*\*. The positive rates of MYC and BCL2 were significantly higher in DH-HGBL than in other GCB-like DLBCLs (*P*=0.028 and *P*=0.013, respectively). In contrast, MCL1 was significantly less expressed in DHL-HGBL than in other GCB-like DLBCL (*P*=0.005). This significance was also observed between DH-HGBL and non-DH DPL (*P*=0.019). *P* values are described only when each statistical power was above 0.8. (B) MCL1 was stained mainly in the cytoplasm in all eight cases with DH-HGBL, whereas eight of 19 (42%) other GCB-like DLBCL cases, including non-DH DPL, showed the nuclear and cytoplasmic staining pattern.](1041417.fig1){#f1-1041417} Karpas231 and OCI-Ly8 are DH-DPL cells -------------------------------------- We next performed *in vitro* investigations to characterize DH-DPL cells. Fluorescence *in situ* hybridization analyses confirmed that all four GCB-like DLBCL-derived cell lines have the 8q24/*MYC* translocation ([Figure 2A](#f2-1041417){ref-type="fig"}). *MYC* was fused to *IGH* in BJAB, SU-DHL10, and OCI-Ly8 ([Figure 2A](#f2-1041417){ref-type="fig"}). In addition to the rearrangement, *IGH-BCL2* fusion resulting from t(14;18)(q32;q21) was detected in SU-DHL10, Karpas231, and OCI-LY8 ([Figure 2A](#f2-1041417){ref-type="fig"}). Western blot analysis showed that the four lines express BCL6, MYC, BRD4, MCL1, BCL-xL, BIM, BAD, BAK, and BAX at a variety of levels ([Figure 2B](#f2-1041417){ref-type="fig"}). Among the pro-apoptotic BH3-only proteins, BIM was abundantly expressed in each cell line ([Figure 2B](#f2-1041417){ref-type="fig"}). The results were consistent with those from clinical samples. In contrast, protein expression levels of BCL-xL and MCL1 were relatively low in SU-DHL10 and OCI-Ly8, respectively ([Figure 2B](#f2-1041417){ref-type="fig"}). Although SU-DHL10 has the *IGH-BCL2* fusion, we failed to detect BCL2 protein expression in this line ([Figure 2B](#f2-1041417){ref-type="fig"}). Also, NOXA was not detected in BJAB cells ([Figure 2B](#f2-1041417){ref-type="fig"}). These results indicate that BJAB represents non-DH DPL cells and that SU-DHL10, Karpas231 and OCI-Ly8 are regarded as DH-HGBL cells. Furthermore, Karpas231 and OCI-Ly8 correspond to DH-DPL cells having relatively abundant BCL2 proteins, a considerable part of which is phosphorylated at Ser70. ![Characteristics of four germinal center B-cell-like diffuse large B-cell lymphoma-derived cell lines. (A) The four germinal center B-cell-like diffuse large B-cell lymphoma-derived cell lines have the *MYC* rearrangement. *MYC* is fused to *IGH* in BJAB, SU-DHL10, and OCI-Ly8 cells, while the *IGH-BCL2* fusion was detected in SU-DHL10, Karpas231, and OCI-Ly8 cells. Fluorescence *in situ* hybridization analyses confirmed that SU-DHL10, Karpas231, and OCI-Ly8 are double-hit high grade B-cell lymphoma cell lines with *MYC* and *BCL2* rearrangements. (B) Western blot analysis showed that the four lines express BCL6, MYC, BRD4, MCL1, BCL-xL, BIM, BAD, BAK, and BAX at a variety of levels. Despite the presence of the *IGH-BCL2* fusion, SU-DHL10 cells failed to show BCL2 protein expression. In contrast, Karpas231 and OCI-Ly8 cells had abundant BCL2 protein, a considerable part of which is phosphorylated (pBCL2) at serine 70. The results indicate that Karpas231 and OCI-Ly8 correspond to double-hit and double-protein-expression lymphoma cells.](1041417.fig2){#f2-1041417} Exposure to 200 nM of venetoclax effectively induces apoptosis in DH-DPL cells ------------------------------------------------------------------------------ We subsequently evaluated the growth inhibitory effect and apoptotic sensitivity to JQ-1 and three BH3 mimetics in each cell line. Except for the BJAB cell line, JQ-1 similarly suppressed cell proliferation in a dose-dependent manner, while the inhibitory effects of BH3 mimetics were different among the four lines ([Figure 3A](#f3-1041417){ref-type="fig"}). Venetoclax effectively suppressed proliferation of Karpas231 and OCI-Ly8 cells even at low concentrations (20 nM and 200 nM), whereas this agent had no effect on either BJAB or SU-DHL10 cells ([Figure 3A](#f3-1041417){ref-type="fig"}). In contrast, S63845 clearly showed an inhibitory effect at low concentrations (10 nM and 100 nM) only in SU-DHL10 cells ([Figure 3A](#f3-1041417){ref-type="fig"}). Although A-1155463 inhibits cell growth at levels less than 1 μM in sensitive cells,^[@b28-1041417],[@b32-1041417]^ at nanomolar levels this agent failed to suppress the proliferation of any cell line ([Figure 3A](#f3-1041417){ref-type="fig"}). ![Growth inhibitory effect and apoptotic sensitivity of the four cell lines to JQ-1 and three BH3 mimetics. (A) JQ-1 suppressed proliferation in three cell lines, but not in BJAB, in a dose-dependent manner. Venetoclax inhibited proliferation of Karpas231 and OCI-Ly8 cells even at a concentration of 20 nM, but had no effect on either BJAB or SU-DHL10 cells. S63845 showed the inhibitory effect only in SU-DHL10 cells. At nanomolar concentrations, A-1155463 failed to suppress the proliferation of any cell lines. (B) Although 50 μM of JQ-1 suppressed cell proliferation in the SU-DHL10, Karpas231, and OCI-Ly8 lines, the exposure was insufficient to induce apoptosis in Karpas231 (annexin V^+^ 7-aminoactinomycin D^+^ 30.3%) and OCI-Ly8 (annexin V^+^ 7-aminoactino-mycin D^+^ 4.4%) cells. Exposure to 200 nM of venetoclax effectively led to apoptotic changes (annexin V^+^) in more than 80% of both Karpas231 and OCI-Ly8 cells. Exposure to 100 nM of S63845 induced cell death only in SU-DHL10 cells. Consistent with the results in cell proliferation assays, 1 μM of A-1155463 did not induce even modest cell death in any cell lines. DMSO: dimethyl sulfoxide.](1041417.fig3){#f3-1041417} Flow cytometry detected apoptotic changes 24 h after exposure to these drugs. Although 50 μM of JQ-1 efficiently suppressed proliferation of SU-DHL10, Karpas231, and OCI-Ly8 cells, the exposure was insufficient to induce apoptosis in the two DH-DPL-cell lines. Approximately 70% of SU-DHL10 cells were positive for annexin V, whereas the positive rates were limited to around 18\~40% in Karpas231 and OCI-Ly8 cells ([Figure 3B](#f3-1041417){ref-type="fig"}). Exposure to 200 nM of venetoclax effectively led to apoptotic changes in Karpas231 and OCI-Ly8 cells. More than 80% of the cells were positive for annexin V in both DH-DPL-cell lines ([Figure 3B](#f3-1041417){ref-type="fig"}). Conversely, exposure to 100 nM of S63845 induced cell death only in SU-DHL10. Although around 60% of the cells were annexin V-positive, more than 90% of SU-DHL10 cells were stained with 7-AAD ([Figure 3B](#f3-1041417){ref-type="fig"}). In this study, exposure to 1 μM of A-1155637 did not induce even modest cell death in each cell line ([Figure 3B](#f3-1041417){ref-type="fig"}). These results indicate that anti-apoptotic activities in the four lines were less related to BCL-xL. We further evaluated the alteration of apoptotic sensitivity to venetoclax in combination with S63845. In BJAB cells, the addition of S63845 to venetoclax led to a clear increase in annexin V-positive cells, indicating that S63845 and venetoclax had a synergic effect on inducing apoptosis ([Figure 4A](#f4-1041417){ref-type="fig"}). In contrast, S63845 did not show even an additive effect in Karpas231, OCI-Ly8, and SU-DHL1 cells ([Figure 4B](#f4-1041417){ref-type="fig"}). Although the expression levels of MCL1 were nearly equal between BJAB and Karpas231 cells, S63845 failed to exert additive pro-apoptotic effects in Karpas231 cells. These results indicate that the intrinsic anti-apoptotic activities in BJAB are equally dependent on BCL2 and MCL1, but those in the two DH-DPL-cell lines and SU-DHL10 cells depend mainly on BCL2 and MCL1, respectively. We, therefore, focused on the biological effects of venetoclax especially in the two DH-DPL cell lines. ![Alteration of apoptotic sensitivity to venetoclax in combination with S63845. (A) The proportion of annexin-V-positive cells was counted using flow cytometry in triplicate. Addition of 100 nM of S63845 to 200 nM of venetoclax led to a clear increase of annexin V-positive cells in the BJAB line, indicating that S63845 and venetoclax had a synergic effect on inducing apoptosis. (B) In contrast, 100 nM of S63845 or 200 nM of venetoclax did not show even an additive effect in Karpas231, OCI-Ly8, and SU-DHL1 cells. DMSO: dimethyl sulfoxide.](1041417.fig4){#f4-1041417} Venetoclax leads to dephosphorylation of BCL2 and downregulates MCL1 expression in DH-DPL cells ----------------------------------------------------------------------------------------------- We then examined alterations of protein levels after exposure to venetoclax. Western blot analysis showed that expression levels of BCL2 were unchanged at least 6 h after exposure to venetoclax in Karpas231 and OCI-Ly8 cells ([Figure 5A,B](#f5-1041417){ref-type="fig"}). In contrast, phosphorylation of BCL2 was clearly downregulated, and expression levels of BIM were also decreased 3 h after exposure to venetoclax in both DH-DPL cell lines ([Figure 5A,B](#f5-1041417){ref-type="fig"}). In contrast, although the total protein levels of BCL2 were slightly decreased, the proportion of phosphorylated BCL2 was increased 6 h after exposure to venetoclax in BJAB cells ([Figure 5C](#f5-1041417){ref-type="fig"}). Unexpectedly, MCL1 showed decreased expression levels in both Karpas231 and OCI-Ly8 cells within 3 h after exposure to venetoclax ([Figure 5A,B](#f5-1041417){ref-type="fig"}). This phenomenon was not observed in the BJAB and SU-DHL10 lines ([Figure 5C, D](#f5-1041417){ref-type="fig"}). Furthermore, the expression of protein phosphatase 2A (PP2A) B56α, which has a critical role in dephosphorylation of BCL2,^[@b33-1041417]^ was decreased within 3 h after exposure to venetoclax in both DH-DPL cell lines ([Figure 5A,5B](#f5-1041417){ref-type="fig"}). The expression levels of another regulatory subunit, PP2A B56δ,^[@b34-1041417]^ were unchanged in each cell line ([Figure 5A-D](#f5-1041417){ref-type="fig"}). These results confirmed that venetoclax clearly changes the biological behavior of BCL2 and MCL1 in the two DH-DPL cell lines. ![Venetoclax leads to dephosphorylation of BCL2 and downregulates MCL1 expression in the two double-hit and double-protein-expression lymphoma cell lines. (A-D) Although BCL2 protein levels were unchanged at least 6 h after exposure to venetoclax in Karpas231 (A) and OCI-Ly8 (B) cells, the proportion of phosphorylated BCL2 (pBCL2) was clearly decreased, and expression levels of BIM were also decreased 3 h after exposure to venetoclax in both double-hit and double-protein-expression lymphoma (DH-DPL) cell lines (A, B). Although the BCL2 protein levels were slightly decreased, the proportion of pBCL2 was increased 6 h after to venetoclax in BJAB cells (C). Unexpectedly, MCL1 showed decreased protein expression within 3 h after exposure to venetoclax in Karpas231 (A) and OCI-Ly8 (B) cells, but not in BJAB (C) and SU-DHL10 (D) cells. PP2A B56α showed decreased expression within 3 h after exposure to venetoclax in both DH-DPL cell lines (A, B), but not in BJAB (C) and SU-DHL10 (D) cells. In contrast, protein expression levels of PP2A B56δ were unchanged in all cell lines (A-D).](1041417.fig5){#f5-1041417} Treatment with venetoclax augments the accumulation of PP2A B56α in BCL2 in DP-DHL cells ---------------------------------------------------------------------------------------- Immunoprecipitation and western blot analyses of Karpas231 and OCI-Ly8 cells showed that BCL2 was substantially associated with BIM at steady state ([Figure 6A](#f6-1041417){ref-type="fig"}). Likewise, BCL2 was bound to PP2A B56α ([Figure 6A](#f6-1041417){ref-type="fig"}). We also confirmed that PP2A B56α was bound to MCL1 in both DH-DPL cell lines (*data not shown*). We then evaluated alterations of these associations after exposure to venetoclax. Within 60 min after treatment with venetoclax, total protein levels of BIM bound to BCL2 were decreased similarly in Karpas231 and OCI-Ly8 cells ([Figure 6B](#f6-1041417){ref-type="fig"}). In contrast, the proportion of PP2A B56α bound to BCL2 was slightly increased ([Figure 6B](#f6-1041417){ref-type="fig"}). Although BIM protein levels decreased gradually following exposure to venetoclax, total levels of BCL2 bound to BIM were decreased at the early phase of venetoclax treatment in both DH-DPL cell lines ([Figure 6B](#f6-1041417){ref-type="fig"}). These results indicate that venetoclax not only disrupts the association between BCL2 and BIM, but also augments the accumulation of PP2A B56α in BCL2. ![Treatment with venetoclax augments the binding of PP2A B56α to BCL2 in the double-hit and double-protein-expression lymphoma cells. (A) Immunoprecipitation (IP) and western blot (WB) analyses showed that BCL2 was bound to BIM and PP2A B56α at steady state. Rabbit (R) IgG was used as a negative control for the IP studies. (B) Although total BIM proteins bound to BCL2 were decreased similarly in Karpas231 and OCI-Ly8 cells within 60 min after exposure to venetoclax dissolved in dimethyl sulfoxide (DMSO), the proportion of B56α bound to BCL2 was slightly increased. Total BCL2 proteins bound to BIM were also decreased in the early phase of venetoclax treatment in both double-hit and double-protein-expression lymphoma cell lines.](1041417.fig6){#f6-1041417} Exposure to 200 nM of venetoclax induces apoptosis in primary DH-DPL cells -------------------------------------------------------------------------- We also evaluated the apoptotic sensitivity of primary DH-DPL cells to venetoclax *in vitro*. The fresh bone marrow specimen was obtained from one patient with DH-DPL (UPN3) and exposed to 200 nM of venetoclax. Examination of the bone marrow revealed massive infiltration of blastoid cells with a mature B-cell phenotype \[terminal deoxynucleotidyl transferase (TdT)-negative and BCL6-positive\] ([Figure 7A](#f7-1041417){ref-type="fig"}). Immunohistochemistry confirmed that MYC, BCL2, and MCL1 were highly expressed in the neoplastic cells ([Figure 7A](#f7-1041417){ref-type="fig"}). Flow cytometry clearly detected the apoptotic change 24 h after exposure to venetoclax ([Figure 7B](#f7-1041417){ref-type="fig"}). Almost all the blastoid DH-DPL cells were positive for annexin V ([Figure 7B](#f7-1041417){ref-type="fig"}). Consistent with the results in Karpas231 and OCI-ly8 cells, the primary DH-DPL cells were highly susceptible to low concentrations of venetoclax. ![A low concentration of venetoclax induces apoptosis in primary double-hit and double-protein-expression lymphoma cells. (A) The bone marrow examination of one patient (UPN3) revealed massive infiltration by blastoid double-hit and double-protein-expression lymphoma (DH-DPL) cells with a mature B-cell phenotype terminal deoxynucleotidyl transferase (TdT)-negative and BCL6-positive \[Wright-Giemsa (WG) stain ×1000, hematoxylin-eosin (HE) stain ×600\]. Immunohistochemistry confirmed that the cells expressed high levels of MYC, BCL2, MCL1 and BIM (×600). (B) Flow cytometry clearly detected apoptotic changes 24 h after exposure to venetoclax dissolved in dimethyl sulfoxide (DMSO). More than 99% of blastoid DH-DPL cells were positive for annexin V.](1041417.fig7){#f7-1041417} Discussion ========== Since DH-DPL is a rapidly progressing disease and often refractory to even intensive therapies, patients with this lymphoma have dismal survival outcomes unlike those with any other type of DLBCL.^[@b2-1041417],[@b3-1041417],[@b11-1041417]^ Hence, it is urgently necessary to develop effective treatments for DH-DPL. Appropriate balances between pro-survival and pro-apoptotic BCL2 family proteins are usually disrupted in GCB-like DLBCL including DH-DPL, in which the overexpression of pro-survival proteins, including BCL2, MCL1, and BCL-xL, likely confers resistance to chemotherapeutic agents.^[@b10-1041417],[@b12-1041417],[@b15-1041417]^ In this study, we found that BCL2 seems to play crucial roles in anti-apoptotic activities in DH-DPL, and further verified that venetoclax is still a promising agent for this type of lymphoma. The present DH-HGBL cases, mostly corresponding to DH-DPL, showed lower levels of MCL1 expression, associated with resistance to venetoclax, compared with other GCB-like DLBCL cases. In addition, the frequent nuclear localization of MCL1 in non-DH DPL and other GCB-like DLBCL cases not only indicates the abundant expression, but also implies the presence of distinct functions from its anti-apoptotic activity in these groups.^[@b28-1041417],[@b35-1041417]^ Furthermore, our *in vitro* study confirmed that the inhibition of MCL1 by S63845 did not have any additive pro-apoptotic effect to that of venetoclax in the two DH-DPL cell lines, whereas S63845 restored the apoptotic sensitivity to low concentrations of venetoclax in the non-DH DPL-cell line BJAB. A previous study showed that overexpression of MCL1 is observed more frequently in ABC-like DLBCL than in GCB-like DLBCL.^[@b36-1041417]^ Our observations indicate that the anti-apoptotic activity of MCL1 for DH-DPL seems to be less limited than that for any other type of GCB-like DLBCL. DH-DPL seems to be dependent mainly on BCL2 for survival, and the pro-apoptotic action of venetoclax in DH-DPL cells may be less affected by intrinsic MCL1 expression. The BRD4 inhibitor JQ-1 is considered a promising drug for the treatment of MYC-driven lymphomas.^[@b16-1041417],[@b17-1041417]^ Although JQ-1 suppressed cell proliferation, this agent did not lead to adequate apoptosis in the two DH-DPL-cell lines. Since BET inhibitors can induce cell-cycle arrest,^[@b37-1041417]^ this raises concerns that JQ-1 might fail to exterminate malignant cells. Although the combination with BH3 mimetics is supposed to be a promising strategy, antagonistic effects have been observed.^[@b15-1041417]^ BET inhibitors are effective at inhibiting tumor expansion, but might be inappropriate for eradicating of residual lymphoma cells. The antitumor effect of venetoclax has mainly been discussed with regard to its physiological association with BCL2.^[@b21-1041417],[@b22-1041417],[@b24-1041417]^ In the present study, we demonstrated for the first time that venetoclax not only disrupts the association between BCL2 and BIM, but also modulates signal transduction related to BCL2 and MCL1 in DH-DPL cells. Phosphorylation at Ser70 and its mutant in the BCL2 loop domain has been shown to enhance binding to BIM and BAK, and confirmed to inhibit the effects of BH3 mimetics on its replacement of BIM in leukemia cells.^[@b27-1041417]^ Although protein levels of phosphorylated BCL2 are relatively high, venetoclax clearly led to dephosphorylation of BCL2 and effectively induced apoptosis in Karpas231 and OCI-Ly8 cells. In both DH-DPL cell lines, the dephosphorylation was probably mediated through accumulation of PP2A B56α in BCL2. The increased binding of PP2A B56α to BCL2 is likely to promote dephosphorylation of this protein. Consequently, a considerable part of phosphorylation at Ser70 seemed to be removed within 6 h after exposure to venetoclax. Dephosphorylation of BCL2 should cause increased sensitivity to venetoclax in DH-DPL cells. Therefore, phosphorylation at Ser70 in BCL2 at steady state is less likely to be a common mechanism of resistance to venetoclax in these DH-DPL cells. We further found that venetoclax altered the levels of expression of MCL1 in both DH-DPL cell lines. The stability of MCL1 is mainly controlled by its phosphorylation status.^[@b38-1041417],[@b39-1041417]^ Phosphorylated MCL1 can be an easy target of an E3 ubiquitin ligase complex and is mostly driven to proteasomal degradation.^[@b38-1041417],[@b39-1041417]^ PP2A dephosphorylates MCL1 and prevents interaction between MCL1 and the complex.^[@b38-1041417],[@b39-1041417]^ A previous study showed that PP2A inhibition dramatically decreased the protein levels of MCL1 within 2 h in Burkitt lymphoma cells.^[@b39-1041417]^ Although we confirmed that PP2A B56α is bound to MCL1 in both Karpas231 and OCI-Ly8 cells, the association was unchanged after exposure to venetoclax (*data not shown*). However, total amounts of PP2A B56α, which should be bound to MCL1, were clearly decreased 3 h after exposure to venetoclax. Therefore, a considerable part of MCL1 protein may be phosphorylated and disassembled within 3 h after exposure to venetoclax in the two DH-DPL cell lines. We further verified that 200 nM of venetoclax was sufficient to induce cell death even in primary DH-DPL cells, despite these cells showing relatively abundant MCL1 expression. Venetoclax achieves and maintains plasma exposure levels of approximately 4 μM at daily doses ranging from 400 mg to 1200 mg in patients with chronic lymphocytic leukemia or lymphomas.^[@b25-1041417],[@b40-1041417]^ Prolonged exposure to very low concentrations of venetoclax may raise new issues about resistance due to the expression of other BCL2 family proteins such as BFL1.^[@b14-1041417]^ However, we believe that venetoclax should kill primary DH-DPL cells at daily doses recommended in patients with chronic lymphocytic leukemia. In conclusion, DH-DPL cells seem to be dependent mainly on BCL2 for survival and relatively low concentrations of venetoclax effectively induced apoptosis regardless of MCL1 expression. Venetoclax not only disrupts the BCL2-BIM interaction, but also leads to dephosphorylation of BCL2 and further downregulates MCL1 expression, probably through modulation of PP2A B56α activity in DH-DPL cells. Although further investigation is needed for clinical application, targeting BCL2 with venetoclax is a promising strategy for the treatment of DH-DPL. Supplementary Material ====================== ###### Uchida et al. Supplementary Appendix ###### Disclosures and Contributions This study was not supported by any grant. We thank Dr. Masao Seto (Kurume University, Kurume, Japan) for providing OCI-Ly8 cells. We also thank Mr. Manabu Kubota for a technical assistant on immunohistochemistry. Check the online version for the most updated information on this article, online supplements, and information on authorship & disclosures: [www.haematologica.org/content/104/7/1417](http://www.haematologica.org/content/104/7/1417) [^1]: AU and YI contributed equally to this work.
{ "pile_set_name": "PubMed Central" }
Dicepolia amazonalis Dicepolia amazonalis is a moth in the family Crambidae. It was described by James E. Hayden in 2009. It is found in the central Amazon basin, along the main trunk of the Amazon River and its tributaries. The length of the forewings is 7.8–9 mm. The forewings are brown, with reddish at the distal veins. The costa and lines are dark brown. The hindwings are pale brownish bronze with a brown termen. Adults have been recorded on wing in February, from July to August and in September. Etymology The species name refers to the distribution. References Category:Moths described in 2009 Category:Odontiinae
{ "pile_set_name": "Wikipedia (en)" }
ve of 0*k**3 + 0 - 2*k + 1/126*k**7 + 0*k**2 - 1/30*k**6 + 0*k**5 + 1/9*k**4. Factor y(x). x**2*(x - 2)**2*(x + 1)/3 Let y(k) be the first derivative of -k**5/25 + k**4/20 + 3. Determine f, given that y(f) = 0. 0, 1 Factor 9/5*y**4 + 9/5*y**3 + 0*y + 3/5*y**5 + 0 + 3/5*y**2. 3*y**2*(y + 1)**3/5 Let j(v) = -v**2 - v + 1. Let u(n) = 5*n**2 + 5*n - 2. Let s = -16 - -18. Let c(y) = s*j(y) + u(y). Factor c(a). 3*a*(a + 1) Let f be 26/8 + (-7)/28. Let -f*u**2 + 9*u + 6 + 4*u**2 - 3*u**2 + 5*u**2 = 0. Calculate u. -2, -1 Let u be (((-14)/(-1))/(-2))/(-1). Let d be u/14 + (-77)/(-6). Let 16/3*v**3 + 17/3*v - 2/3 - d*v**2 = 0. Calculate v. 1/4, 2 Let u(a) be the second derivative of 0*a**2 + 1/135*a**6 - 6*a + 0 + 0*a**4 + 1/90*a**5 + 0*a**3. Factor u(p). 2*p**3*(p + 1)/9 Solve -109*y + 59*y + y**2 + 54*y = 0. -4, 0 Let r be 6/(-4)*12/(-54). Let j(c) be the first derivative of -r*c**3 - 1/4*c**4 + 1/10*c**5 + 1/4*c**2 + 1/2*c + 1/12*c**6 - 2. Factor j(s). (s - 1)**2*(s + 1)**3/2 Factor 15*q - 3*q - 5*q**2 + q**2. -4*q*(q - 3) Let u = -4 + 6. Let t(o) be the second derivative of 1/6*o**u - 1/126*o**7 + 0 - 5/18*o**3 - 1/6*o**5 + o + 5/18*o**4 + 1/18*o**6. Factor t(c). -(c - 1)**5/3 Let i(m) be the first derivative of m**4/22 + 2*m**3/33 - 2*m**2/11 - 3. Factor i(l). 2*l*(l - 1)*(l + 2)/11 Let z = -1 + 5. Factor -3*t**3 + 5*t**3 + 2*t**z + t**4 - 3*t**2 - 6*t + 4*t**3. 3*t*(t - 1)*(t + 1)*(t + 2) Let t(a) = 5*a**2 - 24*a + 39. Let g(x) = 10*x**2 - 47*x + 77. Let w(y) = 6*g(y) - 13*t(y). Suppose w(f) = 0. Calculate f. 3 Let y(z) be the first derivative of z**3/3 - z**2/2 - 2*z - 9. Factor y(x). (x - 2)*(x + 1) Let n(m) be the third derivative of -m**5/150 - 3*m**2. Factor n(t). -2*t**2/5 Let f(o) = 2*o**2 - 3*o. Let s be f(2). Find d such that 0 + 0*d + 2/3*d**4 - 4/3*d**3 + 2/3*d**s = 0. 0, 1 Let f(n) be the third derivative of 0*n**3 - 2/5*n**4 + 8*n**2 + 0*n - 1/200*n**6 + 0 + 2/25*n**5. Factor f(y). -3*y*(y - 4)**2/5 Suppose 1/2*q**2 + 0*q - 1/2 = 0. Calculate q. -1, 1 Let m(u) = u**3 + u. Let v(y) = -12*y**3 - 10*y. Suppose 0 = z + 4*z + 10. Let o be (1 - -1)/(z/(-2)). Let j(k) = o*v(k) + 22*m(k). Factor j(x). -2*x*(x - 1)*(x + 1) Let b(u) be the third derivative of u**6/360 - u**5/45 + 5*u**4/72 - u**3/9 + u**2. What is q in b(q) = 0? 1, 2 Let u be (-11)/(-4) - (-6)/24. Let a(s) be the first derivative of -1/6*s**4 - 1/3*s + 2 - 2/3*s**2 - 5/9*s**u. Find b, given that a(b) = 0. -1, -1/2 Let o(s) be the third derivative of s**6/180 - s**5/30 + s**4/12 + s**3/2 + 4*s**2. Let k(h) be the first derivative of o(h). Determine r so that k(r) = 0. 1 Factor 10*z**2 + 5*z**4 - 5*z**3 - 9*z**2 - z**4. z**2*(z - 1)*(4*z - 1) Let r(t) = -t - 6. Let u(w) = 2*w - 2. Let m be u(-3). Let v be r(m). Factor -4 - 10*c - 2*c**3 - 3*c**2 + 0 - 5*c**v. -2*(c + 1)**2*(c + 2) Let s(g) = -g**3 - g**2 + g - 1. Let w(o) = 7*o**3 - o**2 - 7*o + 19. Let y(c) = -18*s(c) - 2*w(c). Factor y(u). 4*(u - 1)*(u + 1)*(u + 5) Suppose 0 = 2*v + 2*v. Suppose -5 + v = -x. Solve -4*b**2 + x*b**4 - 4*b**4 - 2 - 3*b**4 + 8*b**2 = 0. -1, 1 Factor -t**4 + 4*t - 5*t**4 - 4*t**3 + 4*t**4 + 2 + 0*t**4. -2*(t - 1)*(t + 1)**3 Factor 5*i + 0 - 5/2*i**2. -5*i*(i - 2)/2 Factor 3*f**4 - 7*f**2 - 7*f**2 + 11*f**2 - 3*f + 3*f**3. 3*f*(f - 1)*(f + 1)**2 Let y(o) be the first derivative of o**3/3 + o**2/3 - o/3 + 2. Factor y(r). (r + 1)*(3*r - 1)/3 Let t(s) = -4*s**5 - 2*s**2 - 2*s - 2. Let g(y) = 9*y**5 + y**4 + y**3 + 4*y**2 + 5*y + 5. Let q(z) = 2*g(z) + 5*t(z). Solve q(i) = 0 for i. -1, 0, 1 Let l be (-3 - -3)/2*1. Let r be (-16)/(-168)*(-28)/(-6). Factor 2/9*u**2 + 0 - r*u**3 + 2/9*u**4 + l*u. 2*u**2*(u - 1)**2/9 Let b be (-4 - 24/(-6))/(3 + -1). Suppose -1/3*o**3 + 1/3*o**2 + 0*o + b = 0. What is o? 0, 1 Let k(p) be the third derivative of p**6/90 - p**5/45 - p**4/18 + 2*p**3/9 + 5*p**2. Find t, given that k(t) = 0. -1, 1 Let i(x) = -2*x**5 - 2*x**4 - 22*x**3 - 22*x**2 - 6. Let p(q) = q**5 + 3*q**4 + 23*q**3 + 21*q**2 + 5. Let c(t) = 5*i(t) + 6*p(t). Find m, given that c(m) = 0. -1, 0, 4 Let f(t) be the third derivative of t**2 - 1/120*t**5 - 1/720*t**6 - 1/3*t**3 - 1/48*t**4 + 0 + 0*t. Let v(y) be the first derivative of f(y). Factor v(i). -(i + 1)**2/2 Suppose -78 = -12*m - m. Factor -m*u**3 + 9/2*u + 3/2 + 0*u**2. -3*(u - 1)*(2*u + 1)**2/2 Let i(f) = f**4 - f**3 - f**2 - f - 1. Let k(r) = 3*r**5 + 3*r + 3. Let x(z) = 3*i(z) + k(z). Factor x(d). 3*d**2*(d - 1)*(d + 1)**2 Suppose -106*z + 35*z + 213 = 0. What is i in 2/5*i + 8/5 + 6/5*i**4 - 14/5*i**2 - 2/5*i**z = 0? -1, 1, 4/3 Let l = 11 - 9. Let g(b) be the second derivative of -l*b + 0*b**2 + 1/30*b**4 - 1/50*b**5 + 0*b**3 + 0. Factor g(r). -2*r**2*(r - 1)/5 Let f(m) be the first derivative of -m**6/1980 - m**5/330 - m**4/132 - 5*m**3/3 - 5. Let i(l) be the third derivative of f(l). Factor i(t). -2*(t + 1)**2/11 Let q(p) be the first derivative of p**5/80 - p**4/12 + 5*p**3/24 - p**2/4 - 2*p - 3. Let a(l) be the first derivative of q(l). Suppose a(r) = 0. What is r? 1, 2 Let r = -189 + 191. Determine f, given that 9/2 - 6*f + 3/2*f**r = 0. 1, 3 Let j(k) be the third derivative of k**6/480 + 7*k**5/240 + k**4/12 - 2*k**3/3 - 59*k**2. Factor j(g). (g - 1)*(g + 4)**2/4 Let c(d) be the second derivative of -1/15*d**4 + 0 - 1/15*d**3 + 0*d**2 - 1/50*d**5 + 3*d. Factor c(b). -2*b*(b + 1)**2/5 Let v(l) = -l**2 + 2*l + 1. Let u(t) = -t**2 + 3*t + 1. Let a(j) = 2*u(j) - 3*v(j). Solve a(r) = 0. -1, 1 Let c be (1/3)/((-3)/(-36)). Let a(m) = c*m - 3 - 4*m**3 - 2*m**2 + 7 + 1 + 6*m**2. Let u(o) = -o**3 + 1. Let w(z) = -a(z) + 5*u(z). What is h in w(h) = 0? -2, 0 Factor -3*q + 1 + 3*q**2 + 3*q**3 - 3*q**4 - 1 + 0. -3*q*(q - 1)**2*(q + 1) Suppose 34*r - 12 = 30*r. Determine u, given that 2*u + 1/2*u**r + 2*u**2 + 0 = 0. -2, 0 Let t(j) = -j**3 - 6*j**2 - j - 3. Let h be t(-6). What is r in 1/3*r**2 + 0 - 1/3*r**5 - r**h + r**4 + 0*r = 0? 0, 1 Let y = -788 + 790. Factor 0 + 0*j + 0*j**y + 2/5*j**3 - 1/5*j**4. -j**3*(j - 2)/5 Let r(k) = 2*k**3 + 4*k**2 - 2*k - 4. Let b be r(-2). Find m, given that 2/7*m + 0 - 4/7*m**2 + 4/7*m**4 + b*m**3 - 2/7*m**5 = 0. -1, 0, 1 Suppose 5*m + 3*i - 143 + 56 = 0, -1 = m - 4*i. Suppose -m = -9*l + 4*l. Suppose -1/4*j**4 + 0 - 1/2*j**l - 1/4*j**2 + 0*j = 0. Calculate j. -1, 0 Let v(l) = -12*l**3 + 2*l - 10. Let a(u) = 6*u**3 + 1. Let s(z) = -z**3. Let p(m) = a(m) + 5*s(m). Let j(r) = 10*p(r) + v(r). What is d in j(d) = 0? -1, 0, 1 Factor -5 - 7*i + 4*i**2 + 16*i - 7*i**2 - 1. -3*(i - 2)*(i - 1) Let j(z) be the first derivative of 2*z**6/27 - 2*z**5/15 + z**4/18 + 9. Factor j(y). 2*y**3*(y - 1)*(2*y - 1)/9 Let i(v) be the third derivative of -1/3*v**3 + 1/60*v**5 - 1/24*v**4 + 0*v - 4*v**2 + 0. Factor i(n). (n - 2)*(n + 1) Let d(w) be the first derivative of -w**6/600 + w**5/100 - w**4/40 + w**3/3 - 4. Let l(g) be the third derivative of d(g). Suppose l(a) = 0. What is a? 1 Let h(n) be the third derivative of -n**9/37800 + n**8/8400 - n**7/6300 + n**4/6 + 3*n**2. Let c(i) be the second derivative of h(i). Factor c(l). -2*l**2*(l - 1)**2/5 Let j(g) be the second derivative of -1/3*g**3 + 0 + 0*g**2 + 1/5*g**5 + 1/6*g**4 - g. Factor j(h). 2*h*(h + 1)*(2*h - 1) Suppose 4*g - 2*g + 4 = 0. Let b be (10/(-4))/(g - 0). Suppose 0 - 3/4*p**4 - 1/4*p + b*p**3 - p**5 + 3/4*p**2 = 0. Calculate p. -1, 0, 1/4, 1 Let h(x) be the first derivative of 3*x**4/20 - x**3 + 9*x**2/10 + 27*x/5 - 12. Factor h(g). 3*(g - 3)**2*(g + 1)/5 Factor 9/4*n - 1 - 3/2*n**2 + 1/4*n**3. (n - 4)*(n - 1)**2/4 Let h(g) be the first derivative of -g**8/84 - 4*g**7/105 - g**6/30 - g**2 - 2. Let m(o) be the second derivative of h(o). Factor m(l). -4*l**3*(l + 1)**2 Factor 0 + 1/4*v**3 - 1/2*v - 1/4*v**2. v*(v - 2)*(v + 1)/4 Let v(o) be the third derivative of -o**7/210 - 6*o**2. Factor v(p). -p**4 Let o(k) be the second derivative of k**9/68040 + k**8/10080 + k**7/3780 + k**6/3240 - 5*k**4/12 + 6*k. Let p(c) be the third derivative of o(c). Factor p(h). 2*h*(h + 1)**3/9 Let u(n) = -n**2 - 40*n + 200. Let v(j) = 6*j**2 + 200*j - 1000. Let x(g) = 16*u(g) + 3*v(g). Factor x(i). 2*(i - 10)**2 Let t(y) = 5*y**5 + 12*y**4 - 17*y**3 - 17*y**2 + 5*y + 12. Let d(u) = -3*u**5 - 8*u**4 + 11*u**3 + 11*u**2 - 3*u - 8. Let m(z) = -7*d(z) - 5*t(z). Factor m(w). -4*(w - 1)**2*(w + 1)**3 L
{ "pile_set_name": "DM Mathematics" }
Tiniest Violin This is the tiniest violin. It is very small. We at Zanopan Design saw a lack of very tiny violins available, and set out to make the smallest one we could. There are other violins out there, but they range from regular-sized to small - we saw none as tiny as this one. We hope you enjoy this tiny, tiniest violin. Note: due to limitations of being so tiny, this violin cannot play all the notes a real violin could. It comes with four note samples that can be played by moving your finger in different directions on the screen. In the future, we may overcome the limits of this tiny technology to bring you a full-featured violin, but for now please consider your full violin needs before purchasing. It may be better to buy a larger, and possibly real, violin if you need more notes and a full violin experience. Download it now on the App Store
{ "pile_set_name": "OpenWebText2" }
c - w - 16. Suppose 4*k - 15 = 3*q, -4*q - c = k - 3*k. Solve k*j - 7 = 2 for j. 3 Suppose y - 6*y = 0. Suppose -3*a + 164 = 4*b, y*b - 232 = -4*a - 2*b. Let h = a - 56. Solve -h*q - 2 - 6 = 0 for q. -2 Let w = -37 + 42. Suppose 0*l - l + 11 = 3*g, -21 = -2*l - w*g. Let x be 15/((-12)/l + 3). Solve b - x = -b for b. 5 Let m = -286 + 288. Suppose -4*x + 23 = -3*s + 4*s, m*s - 5*x = -19. Solve 18 = -3*y + s for y. -5 Let c = -1765 - -1886. Solve 4*g = -133 + c for g. -3 Let o = 27 + -10. Let q(f) = -f**2 + 18*f - 15. Let r be q(o). Suppose -3*p + 44 = 5*t, -4*t + 3*t - 4*p + r = 0. Solve 4*g + t = 26 for g. 4 Let s = -19624 - -19714. Solve s*w = -75 + 525 for w. 5 Suppose -3*i = -3*o - 11 - 52, 4*i - 36 = o. Let a be (-174)/464 + (-70)/o. Let n(j) = j**3 + 3*j**2 - 3*j + 1. Let s be n(-3). Solve -2*f - a + s = 0 for f. 3 Let j be (-125)/150 - 2/12. Let d be (-3 - 44/(-4)) + -3 + j. Solve 0 = -4*w + 5*w - d for w. 4 Suppose -a + 2 = -0*a. Let g(d) = 56*d + 504. Let y be g(-9). Solve y = -a*w - 8 + 2 for w. -3 Let a be (-82)/(-123) - (-2)/(-3) - -267. Solve -a*p = -269*p + 4 for p. 2 Let q be (-3)/6*(-6 - -2). Let i be 3 + 6 - -1 - (-6 - (-7 + -1)). Solve 10*y - q - i = 0 for y. 1 Let j(y) = y**2 + 8*y + 19. Let g be j(-5). Suppose -692 = 7*q - 797. Solve g*n = 9*n + q for n. -3 Suppose -15*b - 105 + 1305 = 0. Solve 219 + 101 = b*x for x. 4 Let c(x) = -4*x - 12*x**2 + 1 + 7*x + 9*x + 13*x**2. Let p be c(-12). Let n be (-9)/((-36)/32)*p. Solve n = -s - 3*s for s. -2 Let r = 24 - 27. Let y be (-44)/(-2) + (1 + -1)/r. Suppose 0 = -2*h + y - 6. Solve -f + h = 3*f for f. 2 Let v = -26 + 20. Let x = v + 10. Suppose -x*p + 78 = 2*p. Solve -5*w - 7 = p for w. -4 Let x = -87 + -211. Let s = -266 - x. Solve 7*j = -j + s for j. 4 Suppose 5*x - 2*n + 6 = -0, 2*x + n = 3. Suppose -2*c = -4*r + 40 + 16, 0 = -3*r. Let a = -25 - c. Solve x = -a*k - 0*k + 6 for k. 2 Let y be (4/5)/((-2)/(-10)). Suppose -4*b - 13 + 13 = 0. Let z be 4*(27/(-6))/(-6 - b). Solve -y*s = 1 + z for s. -1 Let d be (-10 + 4)*1/(8/(-12)). Solve -d*u - 19 = 17 for u. -4 Let m be -1 + 1 + (-26 - -11). Let i be 2/(-5) + (-2 - 936/m). Let c = i - 60. Solve t - 3*t + 6 = c for t. 3 Suppose 30 = 5*r + 10*r. Suppose -7*a - r = -30. Solve 3 = -a*k + 5*k for k. 3 Let j = 106 - 70. Let a = -36 + j. Suppose a = -5*o + 3*o + 4*r - 8, -5*r = -10. Solve o = -4*f + 7 + 1 for f. 2 Let z(l) = l**2 - 14*l - 15. Let p be z(15). Let j be (p - -8) + 0/9. Suppose 5*t = -5*d + 10, j = 5*t - 2*d + 6*d. Solve t = -b + 7 - 3 for b. 4 Suppose 4*l + s - 708 = 0, -562 = -5*l + 4*s + 302. Solve l = -10*d + 126 for d. -5 Let s be 30/12 + 855/114. Solve -42 + 32 = s*d for d. -1 Let m be 12/(-20) + 0 + (-2140)/(-25). Suppose 7*o = -10*o + m. Solve -8 = o*k - 18 for k. 2 Let r be -10*-2*((-24)/(-3) + -7). Solve 5*t + r = 9*t for t. 5 Let y be 360/10 + (2 - 0). Solve -26*j - 12 = -y*j for j. 1 Let y = -2157 - -2157. Solve 12*v - 18 - 42 = y for v. 5 Let o(x) = -x**3 + 16*x**2 - 27*x - 9. Let m be o(14). Let h be (10/(-8))/((-4)/96). Let a be (-40)/6*6/(-4). Solve -m*w = a - h for w. 4 Let x be (0*11/55)/2. Solve x = 91*d - 100*d + 27 for d. 3 Suppose -2*r = -4*r + 4. Suppose 4*h = 2*w + 10, -5*w + 26 = 5*h - 3*w. Let s(u) = -u**3 + 5*u**2 - 4*u. Let x be s(h). Solve c + 3 - r = x for c. -1 Suppose t - 60 + 47 = -5*o, -3*o = -5*t + 233. Solve -t*u + 424 = 123 for u. 7 Let p be (30/9)/(-5*(-3)/315). Let q be (-14)/(-4)*120/p. Solve 9 = -15*s + q*s for s. -1 Let d(j) = -5*j - 4*j + 3*j + 10*j - 38. Let s be d(10). Let c(n) = -3*n + 3. Let p be c(-3). Solve -5*q + s*q + p = 0 for q. 4 Suppose -212301*r + 6524 = -212287*r. Solve -448*z + 72 = -r*z for z. -4 Suppose -4*p - 153 = 5*d, 3*p - 2*d = 3*d - 141. Let m = -39 - p. Solve 4*q = m*q - 3 for q. -3 Let z = -5211 + 5259. Solve 6*y = -2*y + z for y. 6 Let i = 130 + -127. Suppose 2*j + x = 4*j - 3, -3*x + i = 0. Solve -l = -j*l - 5 for l. -5 Let c be 1/(2 - (-738)/(-147) - -3). Let f = c - -49. Suppose 0 = 3*b - f*b - 3. Solve -v = -b - 1 for v. 2 Let z(u) = u**2 - 3*u - 1. Let m be z(4). Suppose -4*h - 14 = -11*h. Solve -h*l = m*l for l. 0 Suppose -6*d = -5*d - 5*m - 13, -2*d = 4*m + 16. Let s be (-4)/6*(-9)/d + 10. Solve 21 + 7 = -s*r for r. -4 Let u(x) = x + 10. Let s be u(0). Let c(k) be the first derivative of -k**3/3 + 4*k**2 + 20*k + 329. Let n be c(s). Solve -1 = -f - n*f for f. 1 Suppose 0 = w + 4*w - 100. Suppose 14*b = 19*b - w. Solve -5 = 5*y - b*y for y. -5 Let g(j) = 11*j**2 + 16*j + 22. Let r(f) = 9*f**2 + 9*f + 24. Let k(n) = 4*g(n) - 5*r(n). Let m = 2 + 15. Let y be k(m). Solve 0 = 3*z + 1 + y for z. -1 Let c(a) = 2*a**3 - 16*a**2 + 137*a - 1094. Let k be c(8). Solve -4*p + 2*p = -k for p. 1 Let g be (-12)/(576/(-176))*12. Solve -112 - 64 = g*h for h. -4 Let o = 962 - 947. Solve o = 205*q - 210*q for q. -3 Let i(w) = -w**3 + 3*w**2 + 64*w - 39. Let z be i(-7). Solve -639 + 636 = z*v for v. -1 Suppose 5*y = -2*t + 19 + 2, 3*y = -2*t + 15. Suppose 0 = -6*d + 11 + 13. Solve y*c - d*c = -1 for c. 1 Suppose 29*j + 43*j - 7830 = 18*j. Solve 32*m - 3*m = j for m. 5 Let o = 773 - 767. Solve -o*y - 189 + 213 = 0 for y. 4 Let y(f) = 7*f + 97. Suppose 5*q = -94 + 34. Let m be y(q). Solve m*g = 12*g for g. 0 Suppose 8*d = 46 + 90. Suppose -77 = -d*c + 10*c. Solve 0 = -9*l + c*l + 10 for l. -5 Let y(b) = -37*b + 1492. Let j be y(37). Solve -109*x = -j*x + 42 for x. 3 Suppose -h + 42 + 23 = 3*x, 4*h - 2*x - 204 = 0. Solve h*f = 44*f for f. 0 Suppose -p - 3 = r - 2*r, 2*r + 3*p = -14. Let g be (0 + 0)*(18/(-12) - r). Solve v = -g - 5 for v. -5 Suppose 5*j = -8*j + 5*o + 8, 0 = 3*o - 3. Solve -25 = -8*t - j for t. 3 Let i = -33 - -43. Let a be -4 + (-5)/5 + i. Let h(c) = 2*c**2 + 2*c + 1. Let v be h(3). Solve 0*j - a*j = v for j. -5 Let u = 14 + -12. Suppose 7015 = -37*c + 7089. Solve 3*z + c = u*z for z. -2 Let t = -4142 - -4158. Solve 0 = -6*m + t*m + 30 for m. -3 Let g(s) = s**3 - 41*s**2 - 85*s - 43. Let z be g(43). Solve 223*m - 228*m - 10 = z for m. -2 Let l = -512 + 525. Suppose 5*c + l = -3*v + 4, -4*c - 12 = 4*v. Solve -u = -c*u + u for u. 0 Suppose -2304 = -65*w + 25*w - 8*w. Solve -w*l = -51*l + 18 for l. 6 Suppose 3*y + 4*g = 114, 0 = 7*y - 6*y - 2*g - 18. Let t = -12 + 14. Solve -t*v = 22 - y for v. 4 Suppose -72 = -18*g + 17*g - v, -11*v = 0. Solve -23*r + 47*r = g for r. 3 Let o(j) = -j**3 + 4*j**2 + 2*j - 1. Let w be o(3). Suppose -u + w = -5*x + 3, 2*x = -u + 18. Suppose 6*r + 4 = u. Solve -8 = r*n - 6*n for n. 2 Suppose -5*z - x = -90, 0 = 5*z + x - 6*x - 90. Let d = z - 16. Suppose 4*a + 2 = -n - 8, 2*n = -d*a - 2. Solve -n*q = -4*q - 2 for q. -1 Let m be 7/(350/(-4))*5*5. Let v be (-436)/(-36) + m/36*2. Solve -3 - v = -3*k for k. 5 Suppose 3*j + z = 138 + 108, -4*j + 2*z + 318 = 0. Solve -36 = -75*c + j*c for c. -6 Let l be (-1)/((-3)/27)*1 - 2. Suppose -y = 2*s + 23, -4*y + l*s - 152 = 3*s. Let j = y - -33. Solve -q - q + 8 = j for q. 4 Let b(u) = 2*u**2 - 3*u + 3. Suppose 9 = -2*n - 5*f + 31, 5*n = 2*f - 3. Let g be b(n). Let j = 98 + -92. Solve x + j = -g*x for x. -2 Let v = 12 - -10. Suppose 0 = -5*m - 2 + v. Solve 4*j - 16 = -m for j. 3 Suppose -77*w + 396 = -55*w. Solve w*z - 24 = 21*z for z. -8 Suppose -82*f = -88*f. Let i(b) = b**2 + 4*b + 5. Let z be i(-5). Solve f = -7*s + z*s + 6 for s. -2 Suppose -101*f - 100*f + 188*f + 676 = 0. Solve -f*z = -55*z + 12 for z. 4 Suppose 0 = k + 3*p + 3, -7*p = 2*k - 3*p + 4. Suppose k*g + 4*g + 17 = -x, 0 = -3*x + 5*g + 34. Solve -i + 0*i + x = 0 for i. 3 Let o(d) = -18*d + 45. Let t be o(2). Suppose 33 = 6*i + t. Solve f = i*f + 6 for f. -2 Let k(j) = 3*j - 14. Let r be k(6). Suppose 2 = -2*d - r*f, 3*d - 3*f + 15 = -d. Let s be d - ((5 - 1) + -12). Solve 3 = -4*b - s for b. -2 Suppose -47*t - 16*t = 0. Let a(f) = 48*f + 16. Let z be a(t). Solve z*k = -k + 17 for k. 1 Suppose 312 = -26*z + 33*z + 32*z. Let h = -7 + 13. Solve -h = z*g + 26 for g. -4 Let o = 1069 - 375. Let n = 707 - o. Solve 0 = -9*d + n*d + 20 for d. -5 Let n(j) = -j**3 - 7*j**2 - 6*j + 8. Let t be n(-6). Suppose -d + 2*m = -9 + 2, 3*d + 2*m - 29 = 0. Solve t*a + 3 = d*a for a. 3 Let q(b) = -3081*b + 22 + 3071*b + 40. Let y be q(6). Solve y*h + 4 = h for h. -4 Suppose 3*u = -5*k - 806, -5*u = -0*u + 10. Let x be (-3)/2*(k/24 + 4). Solve -x*
{ "pile_set_name": "DM Mathematics" }
Hi, how's things? Did we decide that you and Ted and Kim would be a team in the finance class? Signed, No Memory
{ "pile_set_name": "Enron Emails" }
The ontogeny of the somatotropic axis in Hereford calves from birth to one year of age and its response to administration of exogenous bovine somatotropin. Administration of exogenous bovine ST (bST) increases growth rate, feed efficiency, and carcass quality in beef cattle. The magnitude of response to bST in beef cattle is variable and related to the age of the animal. Our objective was to determine the response of the somatotropic axis, in particular IGF-I, IGFBP-2, and IGFBP-3, to bST treatment from birth to 1 yr of age. Blood samples were collected before and after a single injection of bST (500 mg) every 50 d from birth to 1 yr of age in male and female Hereford calves. Body weights and serum concentrations of ST, IGF-I, IGFBP-2, and IGFBP-3 were determined. At birth, serum concentrations of ST, IGF-I, and IGFBP-3 increased (P < 0.05) following bST treatment. From 50 to 350 d of age, average concentrations of ST and IGF-I were greater (P < 0.05) in males, whereas IGFBP-2 concentrations were greater (P < 0.05) in females. No gender differences in IGFBP-3 concentrations were observed. Following bST treatment, IGF-I increased (P < 0.05) from 50 to 350 d of age, IGFBP-2 decreased (P < 0.05) from 50 to 200 d of age, and IGFBP-3 increased (P < 0.05) at 250 d of age. At 250 d of age, baseline concentrations of IGFBP-2 decreased (P < 0.05). Due to the positive response of IGFBP-3 and decreased baseline IGFBP-2 at 250 d of age, we conclude that this is an age at which the somatotropic axis is most responsive to exogenous bST, and it therefore may be an appropriate age to begin bST treatment in beef calves to realize the positive influence of bST on BW gain, feed efficiency, and carcass composition.
{ "pile_set_name": "PubMed Abstracts" }
The Global Cyber Alliance has given the world a new free Domain Name Service resolver, and advanced it as offering unusually strong security and privacy features. The Quad9 DNS service, at 9.9.9.9, not only turns URIs into IP addresses, but also checks them against IBM X-Force's threat intelligence database. Those checks protect agains landing on any of the 40 billion evil sites and images X-Force has found to be dangerous. The Alliance (GCA) was co-founded by the City of London Police, the District Attorney of New York County and the Center for Internet Security and styled itself "an international, cross-sector effort designed to confront, address, and prevent malicious cyber activity." IBM's helped the project in two ways: back in 1988, Big Blue secured the 9.0.0.0/8 block of 16 million addresses, which let it dedicate 9.9.9.9 to the cause. The Alliance, which oversees the initiative, said the other partner, Packet Clearing House, gave the system global reach via 70 points of presence in 40 countries. It claimed users wouldn't suffer a performance penalty for using the service, but added it plans to double the Quad9 PoPs over the next 18 months. GCA, which did the development work, also coordinated the threat intelligence community to incorporate feeds from 18 other partners, “including Abuse.ch, the Anti-Phishing Working Group, Bambenek Consulting, F-Secure, mnemonic, 360Netlab, Hybrid Analysis GmbH, Proofpoint, RiskIQ, and ThreatSTOP.” The organisation promised that records of user lookups would not be put out to pasture in data farms: “Information about the websites consumers visit, where they live and what device they use are often captured by some DNS services and used for marketing or other purposes”, it said. Quad9 won't “store, correlate, or otherwise leverage” personal information. Google makes the same promise for its 8.8.8.8 DNS service, saying: “We don't correlate or combine information from our temporary or permanent logs with any personal information that you have provided Google for other services.” However, most home users accept the default configuration for their ISP, each of which will have its own attitude to monetising user data. GCA also said it hoped the resolver would attract users on the security-challenged Internet of Things, because TVs, cameras, video recorders, thermostats or home appliances “often do not receive important security updates”. If you're one of the lucky few whose ISP offers IPv6, there's a Quad9 resolver for you at 2620:fe::fe (the PCH public resolver). ®
{ "pile_set_name": "OpenWebText2" }
(function (g) { function t(a, b, d) { return "rgba(" + [Math.round(a[0] + (b[0] - a[0]) * d), Math.round(a[1] + (b[1] - a[1]) * d), Math.round(a[2] + (b[2] - a[2]) * d), a[3] + (b[3] - a[3]) * d].join(",") + ")" } var u = function () { }, o = g.getOptions(), i = g.each, p = g.extend, z = g.format, A = g.pick, q = g.wrap, l = g.Chart, n = g.seriesTypes, v = n.pie, m = n.column, w = HighchartsAdapter.fireEvent, x = HighchartsAdapter.inArray, r = []; p(o.lang, {drillUpText: "◁ Back to {series.name}"}); o.drilldown = { activeAxisLabelStyle: { cursor: "pointer", color: "#0d233a", fontWeight: "bold", textDecoration: "underline" }, activeDataLabelStyle: {cursor: "pointer", color: "#0d233a", fontWeight: "bold", textDecoration: "underline"}, animation: {duration: 500}, drillUpButton: {position: {align: "right", x: -10, y: 10}} }; g.SVGRenderer.prototype.Element.prototype.fadeIn = function (a) { this.attr({opacity: 0.1, visibility: "inherit"}).animate({opacity: A(this.newOpacity, 1)}, a || {duration: 250}) }; l.prototype.addSeriesAsDrilldown = function (a, b) { this.addSingleSeriesAsDrilldown(a, b); this.applyDrilldown() }; l.prototype.addSingleSeriesAsDrilldown = function (a, b) { var d = a.series, c = d.xAxis, f = d.yAxis, h; h = a.color || d.color; var e, y = [], g = [], k; k = d.levelNumber || 0; b = p({color: h}, b); e = x(a, d.points); i(d.chart.series, function (a) { if (a.xAxis === c)y.push(a), g.push(a.userOptions), a.levelNumber = a.levelNumber || k }); h = { levelNumber: k, seriesOptions: d.userOptions, levelSeriesOptions: g, levelSeries: y, shapeArgs: a.shapeArgs, bBox: a.graphic.getBBox(), color: h, lowerSeriesOptions: b, pointOptions: d.options.data[e], pointIndex: e, oldExtremes: { xMin: c && c.userMin, xMax: c && c.userMax, yMin: f && f.userMin, yMax: f && f.userMax } }; if (!this.drilldownLevels)this.drilldownLevels = []; this.drilldownLevels.push(h); h = h.lowerSeries = this.addSeries(b, !1); h.levelNumber = k + 1; if (c)c.oldPos = c.pos, c.userMin = c.userMax = null, f.userMin = f.userMax = null; if (d.type === h.type)h.animate = h.animateDrilldown || u, h.options.animation = !0 }; l.prototype.applyDrilldown = function () { var a = this.drilldownLevels, b; if (a && a.length > 0)b = a[a.length - 1].levelNumber, i(this.drilldownLevels, function (a) { a.levelNumber === b && i(a.levelSeries, function (a) { a.levelNumber === b && a.remove(!1) }) }); this.redraw(); this.showDrillUpButton() }; l.prototype.getDrilldownBackText = function () { var a = this.drilldownLevels; if (a && a.length > 0)return a = a[a.length - 1], a.series = a.seriesOptions, z(this.options.lang.drillUpText, a) }; l.prototype.showDrillUpButton = function () { var a = this, b = this.getDrilldownBackText(), d = a.options.drilldown.drillUpButton, c, f; this.drillUpButton ? this.drillUpButton.attr({text: b}).align() : (f = (c = d.theme) && c.states, this.drillUpButton = this.renderer.button(b, null, null, function () { a.drillUp() }, c, f && f.hover, f && f.select).attr({ align: d.position.align, zIndex: 9 }).add().align(d.position, !1, d.relativeTo || "plotBox")) }; l.prototype.drillUp = function () { for (var a = this, b = a.drilldownLevels, d = b[b.length - 1].levelNumber, c = b.length, f = a.series, h = f.length, e, g, j, k, l = function (b) { var c; i(f, function (a) { a.userOptions === b && (c = a) }); c = c || a.addSeries(b, !1); if (c.type === g.type && c.animateDrillupTo)c.animate = c.animateDrillupTo; b === e.seriesOptions && (j = c) }; c--;)if (e = b[c], e.levelNumber === d) { b.pop(); g = e.lowerSeries; if (!g.chart)for (; h--;)if (f[h].options.id === e.lowerSeriesOptions.id) { g = f[h]; break } g.xData = []; i(e.levelSeriesOptions, l); w(a, "drillup", {seriesOptions: e.seriesOptions}); if (j.type === g.type)j.drilldownLevel = e, j.options.animation = a.options.drilldown.animation, g.animateDrillupFrom && g.animateDrillupFrom(e); j.levelNumber = d; g.remove(!1); if (j.xAxis)k = e.oldExtremes, j.xAxis.setExtremes(k.xMin, k.xMax, !1), j.yAxis.setExtremes(k.yMin, k.yMax, !1) } this.redraw(); this.drilldownLevels.length === 0 ? this.drillUpButton = this.drillUpButton.destroy() : this.drillUpButton.attr({text: this.getDrilldownBackText()}).align(); r.length = [] }; m.prototype.supportsDrilldown = !0; m.prototype.animateDrillupTo = function (a) { if (!a) { var b = this, d = b.drilldownLevel; i(this.points, function (a) { a.graphic.hide(); a.dataLabel && a.dataLabel.hide(); a.connector && a.connector.hide() }); setTimeout(function () { i(b.points, function (a, b) { var h = b === (d && d.pointIndex) ? "show" : "fadeIn", e = h === "show" ? !0 : void 0; a.graphic[h](e); if (a.dataLabel)a.dataLabel[h](e); if (a.connector)a.connector[h](e) }) }, Math.max(this.chart.options.drilldown.animation.duration - 50, 0)); this.animate = u } }; m.prototype.animateDrilldown = function (a) { var b = this, d = this.chart.drilldownLevels, c = this.chart.drilldownLevels[this.chart.drilldownLevels.length - 1].shapeArgs, f = this.chart.options.drilldown.animation; if (!a)i(d, function (a) { if (b.userOptions === a.lowerSeriesOptions)c = a.shapeArgs }), c.x += this.xAxis.oldPos - this.xAxis.pos, i(this.points, function (a) { a.graphic && a.graphic.attr(c).animate(a.shapeArgs, f); a.dataLabel && a.dataLabel.fadeIn(f) }), this.animate = null }; m.prototype.animateDrillupFrom = function (a) { var b = this.chart.options.drilldown.animation, d = this.group, c = this; i(c.trackerGroups, function (a) { if (c[a])c[a].on("mouseover") }); delete this.group; i(this.points, function (c) { var h = c.graphic, e = g.Color(c.color).rgba, i = g.Color(a.color).rgba, j = function () { h.destroy(); d && (d = d.destroy()) }; h && (delete c.graphic, b ? h.animate(a.shapeArgs, g.merge(b, { step: function (a, b) { b.prop === "start" && e.length === 4 && i.length === 4 && this.attr({fill: t(e, i, b.pos)}) }, complete: j })) : (h.attr(a.shapeArgs), j())) }) }; v && p(v.prototype, { supportsDrilldown: !0, animateDrillupTo: m.prototype.animateDrillupTo, animateDrillupFrom: m.prototype.animateDrillupFrom, animateDrilldown: function (a) { var b = this.chart.drilldownLevels[this.chart.drilldownLevels.length - 1], d = this.chart.options.drilldown.animation, c = b.shapeArgs, f = c.start, h = (c.end - f) / this.points.length, e = g.Color(b.color).rgba; if (!a)i(this.points, function (a, b) { var i = g.Color(a.color).rgba; a.graphic.attr(g.merge(c, { start: f + b * h, end: f + (b + 1) * h }))[d ? "animate" : "attr"](a.shapeArgs, g.merge(d, { step: function (a, b) { b.prop === "start" && e.length === 4 && i.length === 4 && this.attr({fill: t(e, i, b.pos)}) } })) }), this.animate = null } }); g.Point.prototype.doDrilldown = function (a) { for (var b = this.series.chart, d = b.options.drilldown, c = (d.series || []).length, f; c-- && !f;)d.series[c].id === this.drilldown && x(this.drilldown, r) === -1 && (f = d.series[c], r.push(this.drilldown)); w(b, "drilldown", {point: this, seriesOptions: f}); f && (a ? b.addSingleSeriesAsDrilldown(this, f) : b.addSeriesAsDrilldown(this, f)) }; q(g.Point.prototype, "init", function (a, b, d, c) { var f = a.call(this, b, d, c), h = b.chart, e = (a = b.xAxis && b.xAxis.ticks[c]) && a.label; if (f.drilldown) { if (g.addEvent(f, "click", function () { f.doDrilldown() }), e) { if (!e.basicStyles)e.basicStyles = g.merge(e.styles); e.addClass("highcharts-drilldown-axis-label").css(h.options.drilldown.activeAxisLabelStyle).on("click", function () { i(e.ddPoints, function (a) { a.doDrilldown && a.doDrilldown(!0) }); h.applyDrilldown() }); if (!e.ddPoints)e.ddPoints = []; e.ddPoints.push(f) } } else if (e && e.basicStyles)e.styles = {}, e.css(e.basicStyles); return f }); q(g.Series.prototype, "drawDataLabels", function (a) { var b = this.chart.options.drilldown.activeDataLabelStyle; a.call(this); i(this.points, function (a) { if (a.drilldown && a.dataLabel)a.dataLabel.attr({"class": "highcharts-drilldown-data-label"}).css(b).on("click", function () { a.doDrilldown() }) }) }); var s, o = function (a) { a.call(this); i(this.points, function (a) { a.drilldown && a.graphic && a.graphic.attr({"class": "highcharts-drilldown-point"}).css({cursor: "pointer"}) }) }; for (s in n)n[s].prototype.supportsDrilldown && q(n[s].prototype, "drawTracker", o) })(Highcharts);
{ "pile_set_name": "Github" }
(CNN) -- A Florida teenager made famous for her extensive bout with hiccups faces first-degree murder charges after meeting a man online and allegedly luring him to a vacant home, where he was robbed of between $50 and $60 and killed, police said. Jennifer Mee, 19, was arrested and charged Sunday -- as were two men, Laron Raiford and Lamont Newton -- hours after Shannon Griffin was found dead. He had been shot several times. The victim "friended" Mee on a social networking site last week and the two exchanged messages in subsequent days, according to St. Petersburg, Florida, police. Authorities do not believe Mee or Griffin, a Wal-Mart employee who had recently moved to Florida from the Gulf Coast, knew each other prior to their online encounter. After telling family members around 10 p.m. that he was heading out to meet a woman, Griffin rode his scooter to a vacant home where he had his first face-to-face encounter with Mee, police said. Mee led Griffin around to the back, where Raiford and Newton were armed and waiting, according to police. Griffin was shot with .38-caliber revolver while struggling in what the three murder suspects described to police as a "robbery gone awry." "All three suspects admitted to their involvement and were charged with first-degree felony murder," St. Petersburg Police Sgt. T.A. Skinner said in a statement. Mee will face the same murder charge as the two men, even though she didn't actually shoot Griffin, police said. "She was well aware of what was going on," St. Petersburg, Florida, Police Chief Chuck Harmon said. "She was obviously the set-up person in this robbery." In 2007, Mee's non-stop hiccups gained national attention. She earned the nickname "Hiccup Girl" and appeared multiple times on NBC's "Today" show. Her desperate search for a hiccup cure included trying "sugar, peanut butter, breathing in a bag, having people scare me," she said in a photo slideshow posted on the St. Petersburg Times' website in February 2007. But after her hiccups faded, Mee continued to draw attention. In June 2007, local media reported that she ran away from home. In January 2010, St. Petersburg police once again issued a missing person report for Mee. Her mother told CNN affiliate WFTS that her daughter had stormed off after getting into a fight with her boyfriend. Mee was found after a friend called police, the affiliate said. Mee had been living with Raiford and Newton, police said. Police arrived at the scene of Saturday's shooting shortly after 11 p.m, finding a gun in some of the suspects' clothing, Harmon said. The three suspects were arrested and charged Sunday, after they were "cooperative" in talking with police. In an interview with WFLZ radio, the teenager's mother, Rachel Robidoux, described her daughter as a gentle, somewhat naive person who had never before gotten into trouble. Her life had taken a turn for the worse, Robidoux said, ever since her bout with the hiccups. "It wasn't a case of the hiccups, it was a curse of the hiccups," she said. She called Mee's arrest "a nightmare." Also on WFLZ, Griffin's ex-girlfriend Rachel Hagabone said the victim was a good man. "All he ever wanted to do was make somebody happy," she said. "He's the nicest guy ever." St. Petersburg police described Griffin, who had no criminal record, as somewhat of a "social introvert" who lived with a cousin and was often on the computer. Besides his online encounter, he did not appear to know any of the suspects, police said. "This is the far end of the spectrum, as far as something that could happen" with social networking websites, said Harmon. "The message: Be careful who you're having a conversation with online. You never know." CNN's Catherine E. Shoichet contributed to this report.
{ "pile_set_name": "OpenWebText2" }
The impasse in the peace process is sending the Middle East back "into the darkness," Jordan's King Abdullah II said in an interview with an Israeli newspaper, parts of which were published on Thursday. "We're sliding back into the darkness," Abdullah told the Tel Aviv-based Haaretz. The king stated that establishing a Palestinian state was key to a wider peace deal to end the Arab-Israeli conflict. "Is Israel going to be fortress Israel or is it going to be part of the neighbourhood? Because if there is no two-state solution, what future do we all have together?. "Show me the future of Israel 10 years from now. Where do you want Israel to be vis-a-vis its relationship with Jordan and other Arab countries? "I understand that you tend to live in the here and now. You are worried about the next threat. It is difficult for an Israeli to look into the future because of the security aspect. But if there is peace and stability, then people can look into the future." Abdullah also urged Israel to stop settlement activity in Arab east Jerusalem. Jerusalem is "a tinderbox that will have a major flashpoint throughout the Islamic world," he said. "It is important to understand the need of ending all settlement activities and other unilateral actions that threaten the identity of the Holy City."
{ "pile_set_name": "Pile-CC" }
Pages Monday, May 7, 2012 The (un)desirable and (un)wanted girls… The desire of a male child leads to brutal killing of Afreen and Falak, clearly stating the message that you are not wanted here. A 23-year-old woman gets gang-raped in Gurgaon and our super active government comes with a solution in no time- NO women on streets after 8 pm. Fortunately if you can survive the foeticide, infanticide then unfortunately get ready to be raped. Women are assaulted at will and raped frequently even after marriage by their husband. Many countries have made spousal rape a criminal offence, not India. It is treated only as a form of noncriminal domestic violence and accepted as husband’s right. Being late out at night, drinking, talking, dressing, which is normal for a guy, if done by a girl, surprisingly becomes a perfect invitation for getting raped! It needs some strange extraterrestrial logic to explain this. I guess our police have something to explain here: “If girls don’t stay within their boundaries, if they don’t wear appropriate clothes, then naturally there is attraction. This attraction makes men aggressive, prompting them to just do it.” “You cannot drive alone at 2 am on Delhi’s roads and then claim that the Capital is unsafe. You should take your brother or driver with you. These reasonable precautions are expected to be taken by all citizens of the city.” BK Gupta Delhi Police CommissionerQuite a reasonable precautions! Add one more – only couples to be allowed in the club must be siblings. I mean what kind of biological phenomenon is this that a normal guy turns into a sex-crazy animal ready to rape any possible approachable female. And then what kind of law is this that blames women for this heinous crime. And then what kind of humans are we, tolerating this entire nuisance in the society. In our country a female baby is killed by drowning, force feeding, abandoning and even burying alive. Our country’s capital is called the rape capital; where she is not safe even with her husband; where she cannot move freely and dress liberally. This isn't a sorry state of women, its the sorry state of men. I feel sad when a girl passing by me and refuses to see into my eyes avoiding the so called wrong signal of, “inviting to rape”. I feel ashamed to be considered just another lewd lecherous guy by her. It is a distressing feeling to live in a society which makes some stupid postulation that the girl’s pride is above her life and then the same society rapes that pride off just to prove the point. Why do we need these proponents of gender equality, why do we need these women right commissions, why do we need special agencies to protect their rights, why do we need convoluted laws to give them justice? And we call our system liberal with equal rights to all, what kind of liberalism is this? Yes, indeed they are undesired and unwanted at the time of their birth and if by chance they are into this world they are desired and wanted by these lecherous and obnoxious mentally ill men, who have lost their morality along with sanity. 28 comments: Anonymous said... Hi Chirayu, I am not exactly your friend, but I am on your friend list on Facebook and have met you few times as well. But still I am choosing to be anonymous for some reasons. I'll let you know about this reason in last part of my comment. I have read this argument many a times which u too have put here again that women should not be blamed for rape crimes just because they were not wearing conservative dresses or they were too late out in the night. I completely agree to your argument. I also strongly favour that women should have the liberty to dress or to roam around freely, as they want to be. But tell me as a prospective father to your children (boy or girl) tomorrow - what would you advice them while going out at nights at some party places (where usually guys are drunk) or while they'll be coming back from office or from some other place ? Well, if I have to answer this I will say - "Take care while you are outside ... don't roam around much late in the night - as there may be some bad people who can harm you." And this will apply to both my son and my daughter as well. Other than rape (which is normally girl specific ) - they can rob them of their money or may be some drunk guy driving a car can hit them on road Chances of such events increases more in the night time.So I will always advice them (even strictly) that yes you guys have freedom to do whatever you want, but DO Take Precautions. It is the same way when someone advises women to have some knife etc in her bag for such bad guys. And thats what I have grown up listening from my own parents. My logic is that showing my courage by enjoying my freedom at night, doesn't going to change the attitude of bad guys out there. So shouldn't we take some precautions for ourselves. Changing the attitude of society is a subtle process which will take time. So whats wrong if someone advices a women to take some precautions for her own safety. This applies to women more not because she is weak but because rape chances are more for them and if something like this happens to her she'll be devastated for lifetime. And I am not saying this because our society treats a raped women like she is some criminal herself, but I am saying this because rape is psychologically a very very bad experience for any individual. If tomorrow rapes of boys start increasing much, the same precautions will apply to them as well ! The administration is doing the same. It is advising the women to take precautions and at the same time they are trying to improve law and order situation. There are various cases where police has shown the positive response in such cases as well. But they can't be available at every place. And again there are many cases where girls themselves decided to choose the wrong guys ! If a girl trusts a guy without much knowing about him and then she becomes victim of such crimes - agree that she should not be further blamed for this crime, as she has already suffered a big trauma. But can't we even advise other girls to at least know much about the guy before trusting him blindly .. to at least have some precautions ? Is it wrong ? Now the reason why I am anonymous - because the moment I put this argument before any liberal minded people - they start accusing me that you are of backward mentality .. and comments like that. And no one even tries to listen rationally to my argument. Go through my comment once more and think about it. I hope I have made some sense. When a human go to a jungle with full of wild animals - it is always advisable to take precautions .. like be in a group of people, don't go in night etc. Because the wild animals they just need an opportunity to attack humans - they don't go into the logics. What humans can do is - take some precautions. Of course it is a matter of great shame that our human society is full of such pathetic animals who just need a excuse for raping a girl - but then we can at least take some precautions, before our society grows up to a more human level ! I m in no way justifying the existence of such animals in our society but then I can't think of any solution which will turn our society immediately into a place where each women is treated with respect. Till that time, I think we all need to take some precautions. Hi Anonymous friend,Indeed my point was to send across the message that we need a society devoid of monsters, which you have also strengthened by your arguments. Good to see that you took time to put your perspective. And i am happy to see that I was able to convey my message. If I am a father of a boy I will make sure that everytime he goes out, I will advice him to behave humanly. and yes in current situation I will advice my daughter to behave carefully. I feel its time for bad guys to change, we do not need them anymore. I will not compare robbery to rape. I appreciate your viewpoint, what you said would have made equal sense to me even if you would have written in your name. And you are right change will take time, but hope that time comes soon... :) And yes I agree (infact already stated it before as well) Rape is not comparable to robbery .. and that is why we tend to ask girl 'only' to have more precautions. Also I read your Tehlka link on facebook. I had put a statement in my first comment that "administration is doing the same"I would like to clarify for further readers of my comment that my this statement and the one in the Tahlka link are two different point of views. I don't agree with the Police as quoted in the Tehlka story - 1. They say that almost 90% rapes are consensual sex but gone bad later. Although yes ground realities are always different than what we read in newspaper, but then I can't believe that there are very rare cases of actual rape in NCR region. The incidence of actual rape would be very high than what police wants to believe. 2. Police says that they dress up to invoke others - so that they do rape them. I strongly condemn this statement. As a part of young generation I know we all (boys and girls) tend to dress up to look beautiful/smart, to get some more attention/appreciation in our "friend circle". So this in no way means that a girl is inviting anyone to rape her, not even someone in her friend circle ! A girl may want to have sex with a particular boy (which is in the same way a boy may want to have sex with a particular girl) .. and for this girl may try to attract that particular boy (like a boy tries to flirt with a girl to gain her attention) .. but that doesn't mean that this gives a license to anyone, even that particular guy to rape that girl. But then girl on her part should consider a little about her dress/timings/taking drugs etc, if she is going to be in a place alone where there may be some drunk unknown lecherous guy. And at the same time Police should be more vigilant and strict to deal with such cases. That is what my whole point is. Freedom is never absolute. It comes always with some reasonable restrictions ! In our society we are still not that much open for sex related issues. Unlike western society, where sex is more taken as a natural need for people, we still think of it as a taboo. And that is also a reason why these things tend to be complex even in friend circle sometimes ! (though yes in western model too there are some flaws) I would be happy if some more people come to read my comments and give their feedback regarding my views. respected anonymous sir,let me introduce you to the counter anonymous...:)...please don't mind my grammer..as for the thoughts you will be forced to mind....we are focusing on male to keep humanity...we are blaming the system for the rapes....and not the women....just b,cause we want to kill the mentality of rape....suppose we do according to your advice and let women are ready to be carefull and defend themselves...will rape stops....no...never...offcourse it will diminishes but doesn't extinct.....here we are trying to unroot this curse....and that can will only be ensured by distillation of mentality....girls never say rape me...and what do think thats all b,cause their attire....no it is the work of devil....there are many cases of raping child girls....nuns...village girls....i think their outfit will not be the reason behind that....as of the being alert is concerned...will you like to keep gun in your house or you like to have no terrorist at all....woman can't be blamed....as of being adviced...they got lot of that through out their life....also...as a father surely we will advice both boy and girl to do the right things....and any father will be embraced to have their child drunked and gone ashtray....but this type of offence can be corrected but could you correct a rape..!!dear frnd girls are being taught over the limit...let them have the right to liberty...its true they are not so good at handelling it...but let them try..doesn't they have been guided enough...let them learn on their own....if you want to do some good to them watch them....help them before they fall...doesn't take advantage of their liberty...their liberty is still in its ADOLESCENCE...hope i m expressive....:) Thanks for commenting and I really didn't mind your reply. However I think you didn't get my point when I asked to imagine as a prospective parent. The line by you which I am putting below were not in sync with my comment - "also...as a father surely we will advice both boy and girl to do the right things....and any father will be embraced to have their child drunked and gone ashtray....but this type of offence can be corrected but could you correct a rape..!!" We all agree that rape can't be corrected .. thats why as a guardian or well wisher of my daughter I will adivse her more strongly to take precautions. Also taking precautions is NOT equivalent to putting restriction on freedom. Won't you as a father or mother would adivse your daughter to be little careful during nights .. won't you ask them not to go out with drunk guys ? I also whole heartedly agree that we need to attack the mentality of boys to uproot this cause, but it will take some 100-200 years before we'll see appreciable change. Till then shouldn't we also make efforts to keep our girls safe ? And at the same time we also trying to strengthen the administration so that such crimes go down. Also at the same time we'll have to teach boys more strong moral lessons. These all three things have to go hand in hand. I agree that let the girls learn at their own, they are already over advised ... but then if somehow in this particular case, some girls fail to learn at their own .. its cost may be another rape. By advising them others are only helping them in their learning .. And I m saying only advise them, but don't put any restrictions on them. Let them choose what is right for them. And at the same time, advise should not be taken as a symbol of any backward mentality. Today even if some parents say something for children's own good, they tends to ignore it in name of their freedom rights. A lot many boys defy their parents, but unlike girls in boy's cases, if something wrong happens, boys don't have to go through rape. So thats why parents tend to advise girls more and girls should at least listen to the parents if they are saying something good for them. I too wa my daughter to enjoy as much freedom as my son, but more than that, I won't be able to see if something wrong like rape happens to her. Society will change gradually and till then all three things (explained before) will go hand in hand. P.S. - Here is the link to the story which was put by Chirayu and I too have referred it in one of my comments - http://www.tehelka.com/story_main52.asp?filename=Ne140412Coverstory.asp I just read a comment on facebook - somebody describing it as fight b/w anonymous vs anonymous. Well I would like to say its not fight first of all, since we all agree for the end goal - there is no doubt about. Its just about some apsects of our approach which is also common in two respects ie strengthen law and install strong moral values in boys. The third one that whether girls should be advised or not - there is slight difference with my opinion. Also there is no doubt about the fact that we should not curtail the freedom of girls .. again repeating that Advising someone is NOT equivalent to curtailing his/her freedom. I too blog sometimes but then if I had put these things on my blog then I was afraid of too much bashing and things would have turned to ego fights rather than healthy discussion. Thats why I am anonymous and as Chirayu's blog has good number of reader, so I guess I can get some neutral arguments in response to my views. So please don't see it as fight or something ! now i got that you are concerned with immediate steps and also that you are not denying our purpose also....you just want to add some more steps...like cleaning our home first....i m agreed with you...and the steps mentioned by you are also taken, its other thing that they were not preffered....and i think that other points like changing the mentality and the system....are more important and thus should be given more prefference.as for the improving the morals of girls are concerned...many article and notices...has been published in many newspapers....and beside basic advices they are provided with many equipments like...sprays...karate classes etc..it is true that they should be motivated towards these things....you are right if you are urging for their awareness....to kill that devil certainly we have to be prepared and attack from every end......but if we talk about whom to blame.....we can't blame girls.if they are unattentive,careless,or uninformed...that doesn't mean that they want us to do the wrong deed.being careless will lead you to death in an road accident...b,cause there was not enough time to think.....but what if a girl gone careless in front of us....we always have enough time and sense to judge whats right and whats wrong.....therefore....for rape cases women can't be blamed...teaching is better option than blaming....its always better to find a SOLUTION than to give the ANSWER..... i m totally agreed with my anonymous brother about the misunderstanding of our so called fight....its not that but its other way round....actually we are learning from each other..and thats i think is what counts more in life.....:) "That everyone who advises girls doesn't mean that they are blaming girls for rapes." I also condemned the statement given by some police officers because they were more blaming the girls rather than advising others. But what happens these days that even if someone tries to advise a girl in these matters - it is either taken as that they are blaming the girls itself for rape or it is seen as attack on girls freedom or seen as a symbol of backward mentality .. which is not right ! i think chirayu....that as the other anonymous has said(lets not treat him as rapist....after all he put good points which can't be ignored...at all...and dares...so that we got chance to analyse the topic from both sides...)....we should advice girls to take precautions till we are able to change the mentality....,don;t take his word as blame to girls and also dont compare him with those bloody policemen...its not about blaming....its like be carefull till the job is done....m i right mr. anonymous...?..i think now the matter really is how to tackle it....as i have said earlier..we need solution....not answer....:) ohh i doesn't mean that it was just...i think it would have been better if i had put a ( :) ) with that sentence....:)..dear that was without any offence....yes the solution lies within ourselves...but beside...introspection...we can share the actions that can be taken....like i think it will be right to remove black film from car's windows...and pubs should have a good watch over their costmer... Agree that a guys has no right to rape a girl even if girl is drunk or on drugs (I think u meant this only)... for that I said that we need to install strong moral in boys. And the blog posts like these does send the same message. But again change will take time ... till that time its better if girls can take few precautions and avoid such things. Girls do have liberty to have drinks/drugs etc but then they can be a little more careful about their environment/company. For instance there is one comment in Tehlka story by a police officer - "If a girl asks for a birthday party and is alone with 2-3 boys and sees they are drinking, she knows what is likely to happen. When she herself goes for such a party, she can’t complain of rape. How can you call it rape if she is sitting and drinking with them? You are a student and have brain of your own. Why are you going out with them?" In this case ofcouse a guy has no right to rape the girl, but girl could have avoided this trauma easily had she chosen the right persons or decided not to join them at the first instance. If I can avoid easily going into a lion's den, why should I go then ? Now I am not generalizing that all the rape cases could have avoided if girl had taken such precautions, but then certainly a few can be avoided. This is evident from the many cases reported in newspapers. And yes there are many more cases when girls have no fault of their but still they have to go through such inhumane experience ! Again clarifying this doesn't mean that I am blaming the girl here, I just want other girls to be more careful while exercising their freedom. And yes as the Anonymous-3 has interperated me right. Thanks for understanding my point. And precisely Anonymous-3, we need Solutions .. I also can vent out my frustrations about these rape crimes by saying that the mentality of boys is wrong and it needs to be changed, which is correct, but before that will happen, I also have to ensure that no more girls should go through such trauma anymore and that needs some practical steps taken by girls along with efforts of adminstartion and police. a..i think we are two there is no one else as anonymous...beside ourselves...and chirayu is known to both of us...:).....what about putting a compulsary course in indian education system...'how to interact'....maximum....girls and boys dont know how to interact each other till they cross the age of i think aprox....20yrs....they keep guessing and fantasying...about each other...they starts doing thing secretly and thus god knows how much misconceptions they create about each other.... aint women getting raped in the day? who are these bad guys?dont good guys also turn bad when the animal inside them is uncontrollable?forget about partying and drinking in the night, is a woman safe walking in a saree during the night?is a woman safe inside her own house? aint there more cases of rape wid women who belongs to family where short clothes aint even allowed? instead of advising our sons or daughters about why not to roam around late in the night or patying, wouldnt it be better if we upbring our kids in a manner where they learn to respect a woman whether drunk or sober? Why would you want to connect rape with nightlife? why only partying and drinking? The rape happens any and every hour of the day. Do you intend to say that drinks and short clothes after 8 invites rape or rapists? Is it really a crime for a girl to wear short clothes? Men can get drunk and do whatever and women are aske to wear sarees and hide inside their houses. We can have men raoming topless on roads and women cant even wear short clothes. men roam on the beaches in VIP underwears disgustingly and women are asked to cover themselves so that no one oggles. we are indeed a male oriented and dominated society and it is very sick! Yes, we need proper sex education in our system. But we do have moral science in our curriculum, which I guess is not helping much. And as I said before and the anonymous guy above also believes, the change lies withing, we should be responsible enough to not to do these things, society will change. And yes our society is not exemplary, but if we want we can make one. I still believe in fact that society should not be such, that girls have to be concerned about rape while going out. Phew, Chiryau, you are fighting a strong battle for us women!!! Thank you!!! Yes,we have the right to wear what we please, go out whenever and yes, it is sad state of affairs that I cannot do what I choose to--having known many many women who were raped and suffered incest and having been molested myself--not only am I scared of the dark outside and the bars, I am scared of the well-lighted home, a doctor's chamber, a sophisticated office interior, a nice-looking car--fear stalks everywhere, even when you are fully clothed and with no makeup. This is what I feel about what you wrote. May be I'd seem swaying away from the issue of rape in my reply, but it's just an attempt to verbalize what I feel about such problems/issues from holistic viewpoint. It might sound a bit brash, impractical, and may be censuring to you, but my intention is not :P. Though I might also be faulty at places but I have written it according to my present level of awareness and understanding of life. Having read this article, I could understand two things - 1. It's again about accusing and cursing the society for it's evils, this time rape 2. It panics and frightens me, both as a girl and boy, about the plight situation of this world without giving me an insight into the root cause of why someone rapes, and what as an individual, I can do about it. I feel the changes you desire can not be brought at societal level by imposing a suppressive discipline on people, be it the restriction of girls not going out after 8 PM or urging men, again and again, to be controlled and contained in their sexual desires. How can you change society? It don't even exist in physical form. It's just a concept created by our mind. It's just a name give to accumulation of us with all our positive (e.g. love, compassion, trust) and negative qualities (e.g. anger, hatred, anguish) and what you want is to morph it into something better like an industrial batch process. That's not possible. You can't even hold all the negativities together, so how can you modify it. I feel that change can happen only at individual level, by us growing in our awareness, understanding our mind's functioning, getting out of that consuming mind's momentum which enslaves us everyday, by getting aligned to our natural make up, and by being more connected to the life-force or existence. Then only a balance can be manifested and world can become a better place. (or May be world doesn't have to be a better place. It's just a mindful wish of ours, not the intention of life :P). We as individuals need to take a decision and change our attitude towards getting more connected to natural/higher intelligence, which is unquestionably and unarguably larger than our mind's intelligence. It orchestrates the whole universe after all :). Only then we would be able to put forth decisions/solutions consciously to the society/humanity unlike our leaders/politicians/social workers who keeps pushing solutions originating totally from their conditioned, pattern-based, lack-based mind. I feel that before starting the journey of changing society, we must embark on the journey of understanding/changing ourselves. Coming to reason of why someone rapes, I shall not delve deeper into psychology, but somewhere I know that it's another form of negativity stuffed in a person and being spewed out in form of monstrous (or May be not monstrous because it's your brain/mind which is assessing. Life doesn't assess. :P) act of rape. The same negativity could also drive someone to do other fiendish acts like robbery, murder et al. But the root cause is same, negativity, it's just manifesting itself in various forms. Size of this manifestation could be as small as getting unconsciously angry on someone or as large as raping someone. I feel that society doesn't need a revolution. We need it as individuals! I would also like to know, out of my curiosity, about the drive/place in you where this article came from. Is it a real situation you went through and the agony or frustration you are feeling from it? Is it the motivation coming from the fact that you are feeling sulky about the society/world around you and want to change it? Is it that you want to foray into a career of social journalism? @anirudhI am sorry I did not get what you want to say@BhavnaI feel really sad when I hear about these things. :(@AbhishekWhat i got out of your comment is, that you too mean to say that change is needed to be brought from within. I have been emphasizing this time and again that I do not wish to compare other crimes to Rape. I also understand our society is not an ideal one. What other people have been discussing and you too will approve is that till the time our society doesn't reach the levels of higher morality or in your words higher intelligence these things wont stop. And that's what depresses me, and that's what provokes me to write. Each and every post of my blog originates from my heart and my mind supports it to write, with only one wish that if my post is able to help or change (for good) even a single person, i have done my job... From societal, judemental, or in terms of measuring the heinousness of the act and then punishing the culprit is concerned, you won't compare various forms of crimes. But to me, holistically, they are all same, originating from the same root cause of negativity instilled in us. I feel rape comes when someone is deeply lost in the dimension of hatred in his/her mind. Morality and intelligence are two different things to me. Morality, as I understand, is another form of imposed discipline and can not bring forth a real/authentic change. The wish that world should reach a fancy state of ideality has been resonating since ages. But look at history, it has never been achieved. The whole past of humanity has been spent in striving/chasing that dreamt of state for world, but every time nature/life/existence infuses the bad things in world just to create a contrast, just to enjoy the play. Because only through contrast we can experience the good things in life. For my next point, I'm skeptical, I'm still ruminating, but I'm expressing - If it depresses you, you are taking it too seriously, from the narrow viewpoint of your brain, not from the wholeness of life. If you realize the oneness of all lifeforms, you will realize that zillions of rapes/forced matings are happening everyday and life doesn't asses. And if it's provoking you, then it might again be an unconscious reaction from your brain, not a response coming from a place of wisdom. Despite saying all this, I whole-heartedly support your INTENTION: "...with only one wish that if my post is able to help or change(for good) even a single person, I have done my job" My last question (from anyone who reads it): Say a person has raped someone. Should he be punished severely? Should he be looked upon from the eyes of abhorrence? Should he be ousted from the society? Would you marry (if you are a girl) him even if you know he is a rapist? P.S - By using the word wisdom/intelligence I dont' intend to question your intelligence anywhere :P- By saying all this I don't mean to support rape. I appreciate your comment :) and its perfectly ok to challenge any of my arguments of even intelligence :) I always believe in a positive change and will keep the hope. It's always easy to blame society etc. but to blame ourselves and work for a change. And I am not oblivion to reality, also I do understand what state we live in, what happens around.I live in a composed manner, but things like these are not acceptable to me, to my conscience. And about rape comes for hatred!!, Seems quite bizarre to me, will definitely not approve of this. I feel, Morality is not an imposed discipline, if you say self imposed I may agree, and it surely has power to bring a change. I used hatred as an overarching term for different reasons which motivate someone to commit a rape. These reasons, as I can think of, are hatred towards opposite sex (female here), deprivation of love from closed ones and others, imbalance in expression of sexuality and bitterness and hatred towards life in general. What I meant to say is that when the quality of hatred, as compared to other qualities - love, joy, fear, boredom, is overpowering in someone's mind he/she would be more susceptible to commit a rape. Very well written, but I agree with anonymous, to some extent we are trying to create a utopia by imagining to alleviate all the bad things. In no way I am trying to say that those police men are right. But one have to protect herself, this can happen with you in any part of the world. There is a constant conflict between evil and good, yin and yang. The overall condition of girls in India is bad I agree, but I think the girls always invite dreadful things, by going after a wrong person. There are many views,hard to write everything here.... Don't forget to share... Who am I? People call me Chirayu. I find myself everyday and everyday I am someone different. I try to give shape to my imaginations every moment. I dream, i dream a lot, and work for them, because dreams do come true. Few words by Tantia Tope always inspire me: "Its better to live a day like a Lion than a lifetime like a sheep" Also, I am a B.Tech graduate from IIT Roorkee, India. Now into field of Nuclear Science. It's Physics that brings peace in my life and takes me closer to spirituality...
{ "pile_set_name": "Pile-CC" }
Types Industries What’s up on WhatsApp: connecting with an audience of millenials Picking the right tools can make or break a project. This white paper discusses how Pulsar’s qualitative research arm could prove that using existing technologies that are native to the consumers being researched resulted in a much higher engagement, meaning the team could deliver better insights to their clients. Share this post Where next? Insights17 May 2019 How big is the spoiler conversation? With the Game of Thrones saga finally coming to an end this Sunday, the online conversation about spoilers is reaching fever pitch. Insights15 May 2019 The audience conversation for TV shows: drops vs. weekly releases TV shows released all in one 'drop' create a different 'shape' of the audience conversation compared to shows going out weekly. Communities9 May 2019 How politics took over the DNA test conversation Different communities talk about DNA kits very differently Stay in the know on all things Pulsar Sign up to our newsletter for the latest audience intelligence trends and techniques This website only uses cookies that are necessary for the site to function and they do not contain any personal data. You can find out more about the cookies used in our Privacy Policy. I understandPrivacy policy
{ "pile_set_name": "Pile-CC" }
NucleiNet: A convolutional encoder-decoder network for bio-image denoising. Generic and scalable data analysis procedures are highly demanded by the increasing number of multi-dimensional biomedical data. However, especially for time-lapse biological data, the high level of noise prevents for automated high-throughput analysis methods. The rapid developing of machine-learning methods and particularly deep-learning methods provide new tools and methodologies that can help in the denoising of such data. Using a convolutional encoder-decoder network, one can provide a scalable bio-image platform, called NucleiNet, to automatically segment, classify and track cell nuclei. The proposed method can achieve 0.99 F-score and 0.99 pixel-wise accuracy on C. elegans dataset, which means that over 99% of nuclei can be successfully detected with no merging nuclei found.
{ "pile_set_name": "PubMed Abstracts" }
Older driver safety is a complex phenomenon that extends beyond the person level to multiple systems (e.g., regulatory, policy-making, societal and health care). Although a myriad of predictors for safe driving have been identified in the existing literature, they are not integrated into a meaningful causative model. Unless we use an integrated approach, grounded in a unifying public health model, we will not have taken the adequate steps to understand how behavioral, ecological, health education, administrative, policy and regulatory strategies may promote safe elderly driving. Continued neglect of these needs, accompanied with the "graying of America", could sharply increase the number of older people killed in crashes, and leave many more injured and disabled. The work I propose will develop a unifying public health model for safe elder driving. The Precede-Proceed Model of Health Promotion will provide the theoretical framework to: 1) review the current literature systematically by applying the Cochrane Collaborative Descriptive Methodology; 2) test the fit of existing population-based a) quantitative data, using epidemiological methods and structural equation modeling (SEM), and b) qualitative data using content analysis; and 3) refine the model to develop an intervention plan for safe elderly driving. This career development plan, vital to enhance my understanding of promoting safe elderly driving, includes: 1) supervised training in systematic reviews, data base analyses (SEM), model refinement and application; 2) research projects producing a narrative synthesis and meta-analysis of the older driver literature, (dis)confirmation of the Precede-Proceed model of health promotion for the older driver, and developing a pilot plan for safe elderly driving; and 3) formal didactic coursework to culminate fulfilling the requirements of this proposal. This period of supervised research and training, with the guidance from the College of Public Health and Health Professions and the College of Medicine's Departments of Epidemiology and Health Policy Research, and Biostatistics, combined with the specific supervised research proposed in this plan, will allow me to obtain novel data for application of a NIH R-03 award. This step will facilitate my transition to an independent federally funded investigator, and is directly related to my long-term goal of testing a public health model to guide a plan of assessment, prediction and promotion of safe elderly driving.
{ "pile_set_name": "NIH ExPorter" }
As published Keyword Abstract Harmful algal blooms (HABs) cause significant economic and ecological damage worldwide. Despite considerable efforts, a comprehensive understanding of the factors that promote these blooms has been lacking because the biochemical pathways that facilitate their dominance relative to other phytoplankton within specific environments have not been identified. Here, biogeochemical measurements demonstrated that the harmful 43 Aureococcus anophagefferens outcompeted co-occurring phytoplankton in estuaries with elevated levels of dissolved organic matter and turbidity and low levels of dissolved inorganic nitrogen. We subsequently sequenced the first HAB genome (A. anophagefferens) and compared its gene complement to those of six competing phytoplankton species identified via metaproteomics. Using an ecogenomic approach, we specifically focused on the gene sets that may facilitate dominance within the environmental conditions present during blooms. A. anophagefferens possesses a larger genome (56 mbp) and more genes involved in light harvesting, organic carbon and nitrogen utilization, and encoding selenium- and metal-requiring enzymes than competing phytoplankton. Genes for the synthesis of microbial deterrents likely permit the proliferation of this species with reduced mortality losses during blooms. Collectively, these findings suggest that anthropogenic activities resulting in elevated levels of turbidity, organic matter, and metals have opened a niche within coastal ecosystems that ideally suits the unique genetic capacity of A. anophagefferens and thus has facilitated the proliferation of this and potentially other HABs.
{ "pile_set_name": "Pile-CC" }
Spoilers for book 1 and Deadhouse Gates to Chapter 2| More info and previous posts |Please no spoilers for future books/events In my plan to read The Malazan Book of The Fallen, I’m now on book 2, Deadhouse Gates. This post covers chapter 2. Chapter Two Duiker is wandering around in Hissar, looking at markings on the wall, which are some sort of local pictographic code. He makes his way to a trader camp, mixing with the locals and feeling out the public opinion. He’s good enough that no one recognises that he’s actually Malazan. He also witnesses two seers doing some sort of ritual, foretelling the spirit of Dryjhna and bloody times ahead. Then one of them drops dead, probably to make sure we take it extra seriously. I wonder if Dryjhna is an actual god(dess) like Shadowthrone, or something more abstract. Once he’s done with his undercover shenanigans, Duiker goes to a meeting with Coltaine. There is some banter about past battles, Dujek’s lost arm is mentioned. Now I feel stupid for expecting some big epic backstory to it, turns out a horse just randomly bit it off. They bring in a warlock to the council as well. Interestingly, all warlocks were killed by Laseen a while ago but fortunately their souls/power were collected by crows and they were reborn. Um, what? Are these seven cities people for real? I can swallow resurrection, but Magic soul transporting crows?! Maybe Coltaine/Bult are just messing with Duiker. Also, what’s the difference between a warlock and a regular magician? Is it just a local term, or do they do some different sort of warren stuff? Anyway, the council proceeds. There’s the usual talk of seven cities rising up, which I think has been mentioned at least a couple dozen times so far in the books. Then Mallick Rel gives Coltaine his orders from the High Fist, which are to pack up and go to Aren so Pormqual can check out the Seventh. Coltaine tells him to sod off. It was expected with the way Coltaine’s been acting and talked about, but still fun. But he clearly likes Duiker. Soon after, the meeting is adjourned and Kulp and Duiker go off to chat. Duiker wants Kulp to help rescue Heboric (and presumably Felisin) from the Otataral mines. Kulp seems reluctant, but I think he’ll cave. Good for Heboric and friends, but why does Duiker give a crap about him? Is there a secret Illuminati-esque Historian association? *grabs tinfoil hat* We are treat to some extensive backstory about the city of Ehrlitan. Spooky stuff. Apparently Seven Cities was founded by seven Ascendants. On a sidenote, the depiction of Seven Cities as this exotic, unwelcoming place steeped in aaaaancient history is starting to feel a bit heavy handed. I mean, every place has its own history, right? Anyway, Fiddler watches a bunch of Red Swords brutalise some random unarmed citizens. In their wake, two little girls are snatched by a pimp. Fiddler goes after him, and rescues the girl by the brilliant tactic of buying them from the pimp. Rescue of the day right there. Then he escorts them back to their house, and loses most of the respect he gained from me by selling them back to their people. Dude, not cool. It’s one thing to accept some reward, another to demand it. Anyway, the girls’ family is quite pleased, and invites him in. Their grandfather turns out to be some sort of big shot Tano wizard/priest. They chat a bit, he tells Fiddler about the upcoming convergence in Raraku. “A gate. The Prophecy of the Path of Hands. Soletaken and D’ivers. A gate promising…something. They are drawn as moths to a flame.” Well that was certainly illuminating. NOT. He does elaborate though, saying that this might be a way to Ascendancy. Hmm, that is certainly a prize that would draw all sorts of nutters. Although I’m still not clear exactly what it is. Then the guy offers to sing a magic song that has the potential to make all the Bridgeburners Ascendants (the shapeshifters ought to be chasing this guy), but Fiddler doesn’t have time to tell their story, and so he’s sent off with a conch shell for protection. Also, we learn this guy, Kimloc Spiritwalker, is so powerful he could’ve decimated the Malazan armies, but didn’t because that would not stop the Empire. They would send the T’lan Imass after. Fiddler returns and reports his findings to Kalam, and the two of them then administer this epic burn to Crokus: Crokus dragged a chair to the table, dropped into it and reached for the wine. “We’re tired of waiting,” he pronounced. “If we have to cross this damned land, then let’s do it. There’s a steaming pile of rubbish behind the garden wall, clogging up the sewage gutter. Crawling with rats. The air’s hot and so thick with flies you can barely breathe. We’ll catch a plague if we stay here much longer.” “Let’s hope it’s the bluetongue, then,” Kalam said. “What’s that?” “Your tongue swells up and turns blue,” Fiddler explained. “What’s so good about that?” “You can’t talk. Now it’s Kalam’s turn to have a trip into the city. He goes to meet an old frenemy, and asks him for signs that will keep them safe on their journey. The man tells him that it’s the sign of the Whirlwind. Dude, even I could have guessed that. Kalam also takes a book from the guy. This is a special book, the Book of Dryjhna, to be delivered to Sha’ik in Raraku, at which point she will supposedly unleash the apocalypse. Kalam decides to take it as insurance against betrayal. When Kalam is gone, some other warriors come to talk. They’re Red Blades, and intend to tail Kalam and kill Sha’ik. They’re also curious about what Kalam’s plans are. Hmm, schemes upon schemes within schemes… Icarium and Mappo meanwhile are still on their desert safari. They’ve run up against other D’ivers, this time a bunch of leopards that they slaughtered down to the last one. Mappo seems apprehensive that this will bring out some sort of madness in Icarium. I would be worried too, but considering the (relative) ease with which the Jaghut tyrant was taken care of in the last book, I’m not. Anyway, they arrive at an inhabited cliff, and set to looking for a way in. A Soletaken, this time a bear, comes, and transforms back into a man. They recognise him as Messremb. The guy makes an interesting observation, that Icarium’s scent is close to Jaghut, but not quite. Wait, so he’s not actually a Jaghut? What is Icarium then? Ex-Jaghut? Is this related to his amnesia? The bearman soon leaves, and someone else arrives, a guy on a mule. You know, for a desert, this place is feeling pretty packed. The guy and the mule are a pretty weird pair though. For a start the mule is also a shapeshifter, for another the guy – Iskaral Pust, seems to be batshit crazy. At least partly. The cliff turns out to be an abandoned monastery, now occupied by Shadow people, with Pust as their High Priest. The four make their way into the cliff. Surprisingly, Icarium doesn’t remember their fight with the leopards. So his memory loss is continuous? Memento: Malazan incoming? Another very late post. My excuses are the same as before, but I have not, and don’t intend to, give up on the read. It’s just going to be slower than I expected. I hoped this one would come out sooner and be longer, but stuff happened, like me falling and getting a back injury. Oh well, let’s hope I speed up, or we’ll be doing this for like twenty years at this rate. Anyway, the plot. In the tradition of big fantasy series, the beginning of a book is not generally where the exciting stuff happens. It takes a lot of time and pages to setup the explosive finales, after all. So we’ve got people pretty much just slowly making their way through the plot. Just like chapter one, Fiddler and co. probably had the best scenes. I’m still mad at him for trying to haggle for a reward when he returned those girls though. I’m warming up to Icarium and Mappo a bit, though their whole plot remains weird and inscrutable as ever, and Iskaral Pust’s craziness won’t help. Maybe they’ll run into Kalam and co. as they pass through the desert. Yeah I know the Raraku and Pat’potsun Odhan are different deserts, but they’re still pretty close together, so it’s not that outlandish. Also I’m getting the feeling that Kalam’s assassination mission might not be resolved within this book, from the pace they’re moving at, and the number of other side plots. Maybe this upcoming convergence will form the climax of book two. Though I’d hate for climax = convergence to become a pattern. How Duiker’s and Felisin’s plotlines will figure into this I can’t guess.
{ "pile_set_name": "OpenWebText2" }
UN secretary general Ban Ki-moon, second left, has given world leaders a video pep talk before the summit in Addis Ababa, which will decide how to finance the sustainable development goals. Photograph: UN Photo Financing the sustainable development goals will rely heavily on the tax factor | Jonathan Glennie “Our goal is to end poverty and hunger, and to achieve sustainable development in its three dimensions through promoting inclusive economic growth, protecting the environment, and promoting social inclusion. We commit to respect all human rights, including the right to development. We will ensure gender equality and women’s and girls’ empowerment. We will promote peaceful and inclusive societies and advance fully towards an equitable global economic system where no country or person is left behind, enabling decent work and productive livelihoods for all, while preserving the planet for our children and future generations.” Campaigners say financing must reflect this ambition. This is what the outcome document says: “Solutions can be found, including through strengthening public policies, regulatory frameworks and finance at all levels, unlocking the transformative potential of people and the private sector, and incentivizing changes in financing as well as consumption and production patterns to support sustainable development.” There are also strong words on gender equality, but these will need to be matched, campaigners say, with firm funding commitments: “We recommit to adopt and strengthen sound policies and enforceable legislation and transformative actions for the promotion of gender equality and women’s and girls’ empowerment at all levels, ensure women’s equal rights, access and opportunities for participation and leadership in the economy and to eliminate gender-based violence and discrimination in all its forms.” But the SDG targets will not be formally adopted until March 2016, meaning that the conference will have to decide on financing before figuring out how progress will be measured. How much money is currently spent on development? Domestic investment accounted for a third of all funding currently available for developing countries in 2012, while foreign aid made up just 0.4% of the total. “Domestic resources that developing countries raise themselves will be the largest single resource for funding development in most countries,” said Jesse Griffiths, director of European Network on Debt and Development (Eurodad). This funding is being “tragically undermined” by international tax evasion and avoidance, which cost developing countries hundreds of billions of dollars every year, Griffiths said. Reducing illicit financial flows by 2030, with a view to eventually eliminating them. Campaigners have long noted that such illicit flows coupled with aggressive tax avoidance, repatriation of profits and debt repayments are depriving developing nations of much-needed resource Setting out a new social compact to provide “fiscally sustainable and nationally appropriate social protection systems and measures for all” Financing for low-carbon and climate resilient development. The draft outcome document says: “Public and private investments in innovations and clean technologies will be needed, while keeping in mind that new technologies will not substitute for efforts to reduce waste or efficiently use natural resources.” What are the main challenges? The world’s increasingly volatile financial outlook means that finding the money to pay for the SDGs will be difficult. The Greek debt crisis, China’s economic slowdown and a host of pressing humanitarian emergencies, including Syria’s civil war and Europe’s migration crisis, are clamouring for donors’ attention. And the stakes? As the words used repeatedly to describe the summit – critical, key, historic – indicate, they could not be higher. In a video pep talk for world leaders posted on YouTube in May, UN secretary general Ban Ki-moon said, “This year, we can make history by adapting an ambitious, sustainable development agenda and a universal climate agreement. But without the right financing and policies, we cannot achieve our ambitions… Addis Ababa can be the starting point for a new era of global partnership.” Owning your own development policy. The draft accord says, “Each country has primary responsibility for its own economic and social development and the role of national policies and development strategies cannot be overemphasised.” International systems do have a role to play, though, through trade, monetary and financial systems, and strengthened global economic governance Guidelines for debtor and creditor responsibilities in sovereign borrowing and lending Improved data to monitor impact of development spending and progress toward goals Particular measures to help least developed countries, landlocked developing countries and small island developing states
{ "pile_set_name": "Pile-CC" }
We reported two weeks ago that Samsung was going to launch the Galaxy S8+ with 6GB RAM and 128GB storage in Hong Kong soon. Samsung is only selling this variant of its flagship handset in select markets and the Special Administrative Region of Hong Kong is one of them. The 6GB Galaxy S8+ has been launched in Hong Kong in addition to the 4GB variant with 64GB of storage that has been released globally. Samsung is selling the 4GB and 6GB variants of the Galaxy S8 and Galaxy S8+ for HK $6,390 ($820) and HK $6,998 ($898) respectively in Hong Kong. Samsung has confirmed today that it’s going to start shipping units to customers who place an order now by May 25th. It’s likely going to be an unlocked model which means that it won’t be locked to a particular carrier. This means that it will be possible to buy a 6GB Galaxy S8+ in Hong Kong and use it anywhere else in the world. Other than the increased RAM and storage, it’s the same Galaxy S8+ that has been out for several weeks now. It features the same 6.2-inch 1440 x 2960 pixel resolution display, Snapdragon 835 processor, 12-megapixel rear and 8-megapixel front camera, facial recognition, iris scanner, Android 7.0 Nougat and more.
{ "pile_set_name": "OpenWebText2" }
1. Field of the Invention The present invention generally relates to security of consumer goods and, more particularly, to the use of smart tags in maintaining product security. 2. Background Description There is a need for certain products to be equipped with some apparatus which can provide information about the current state of the product as a result of events the product was subjected to prior to becoming in the possession of a potential consumer. Examples include the state of medical or food products prior to their being used by a consumer. Also, consumers sometimes have the right and/or the need to know whether a product is brand new or not. This is especially true of expensive items. There is also a need for a product to be equipped by some apparatus which can record some aspects of the product history, for example in the case of automobiles where today odometers indicate, not very securely, one aspect of the history of the automobile. Another context for the invention is the fact that, in some cases, the containers of some products are reused by the manufacturer, and the consumer would like to know if the product in the container is new or not, and if the container has been reused by a third, unauthorized, party. There is also a need for a method to detect whether the product has deteriorated, either because of defects, or because its expiration date has passed, or because of unwanted change in the environment, for instance in the form of excessive cold, heat or humidity. These scenarios require an apparatus which can detect the physical forces a product was subjected to as a result of use, handling, tampering or environmental factors. For either human intervention or environmental factors, it may be important in some circumstances that the recorded history of such events be very difficult to modify or counterfeit. The prior art contains many methods involving seals and enclosures which allow one to detect when a package has been tampered with. Such prior art go way back in history, and a multitude of improvements, with very general or very specific uses, have been proposed which benefit from the general progress of technology. For example, U.S. Pat. No. 5,159,629 to Glen P. Double and Steve H. Weingart describes an intrusion barrier for protecting an electronic assembly from tampering. The prior art also contains methods of recording chronological information such as a data logger which stores information on a product as described in U.S. Pat. No. 5,010,560 to Mark A. Janney, Roger Newey, and Irwin J. Robinson. However, these methods do not overcome the problem of providing a tamper evident history of a product and/or of its environment. The prior art does not allow the information about the history of a product and/or of its environment to be securely recorded and kept. It is therefore an object of the present invention to provide a novel improvement on the prior art of tamper evident packaging which can detect when a product has been tampered with and resists the efforts of a tamperer, or anyone else who would benefit from hiding the tampering, or to hide the signs of tampering. In the following, terms such as xe2x80x9cimpossible to changexe2x80x9d or xe2x80x9ctamper-proofxe2x80x9d should be understood to describe situations in which sufficient resistance to tampering is provided to make successful attacks rare due to cost/benefit issues, since codes, etc., can theoretically be broken if sufficient resources are brought to bear on the attack. The invention uses a smart card, as described in U.S. Pat. Nos. 3,971,916, 4,007,355, 4,092,524, and 4,102,493 to Roland Moreno, or, more generally, a smart token, in combination with sensors attached to the product and/or to the smart card: upon tampering, or as a response to other circumstances, the sensors generate signals which are encrypted and recorded in the memory or storage device of the smart card attached to the product. Recall that, for example, by using a zero-knowledge protocol, a smart card can be authenticated but cannot be duplicated. This technology has been disclosed for instance in U.S. Pat. No. 5,140,634 to Guillou, et al. This is the property which characterizes a smart card. Accordingly, in the rest of the present disclosure, any electronic component with these properties and which has some memories and/or some processing capabilities, will be called xe2x80x9ca smart tokenxe2x80x9d or xe2x80x9ca smart cardxe2x80x9d, even if it does not actually take any form resembling a card. A general reference to smart card technology and applications can be found in Smart Cards: A Guide to Building and Managing Smart Card Applications, by Henry Dreifus and J. Thomas Monk, John Wiley and Sons, 1998. When the product or its packaging is tampered with, some attribute of the product or its environment changes. This change is what is detected by (at least some of) the sensors attached to a smart card, and the smart card will record this change irreversibly by erasing or writing some information within the smart card memory. The smart card also can be made duplication resistant by using a zero-knowledge protocol so that only the manufacturer of the original product, and/or possibly a trusted third party, for example, can produce or buy such smart cards. The smart card also can record the history of these changes in its internal memory.
{ "pile_set_name": "USPTO Backgrounds" }
Few U.S. officials in 2011 could have imagined Syria would look this bad for the U.S. in 2016. Syrian President Bashar Al Assad is the strongest he’s been since the war began, despite President Barack Obama’s statement in 2011 that “the time has come for President Assad to step aside.” Radical Islamic fighters are the only strong opposition forces left, even though the U.S. has spent hundreds of millions of dollars supporting moderate groups. The Islamic State holds vast swaths of territory, after the U.S. spent $11 billion and two years fighting the terrorist group. Iran and Assad played a major role in shaping the Syria of 2016, but the most decisive actor in the conflict has been Russian President Vladimir Putin. In 2015, the picture of Syria was quite different than it is today. The Assad regime appeared to be on its last legs, controlling less territory than at any time since the war began. The U.S. was the predominant Western power inside Syria, with a new $500 million train and equip program. Obama envisioned thousands of U.S.-backed fighters trained in Turkey and Jordan fighting ISIS with U.S. supplied weapons. [dcquiz] In 2015, Putin faced the most combative geopolitical climate since he assumed office in 1999. “Russia’s intervention in Ukraine and annexation of Crimea had adverse effects,” Franklin Holcomb, a Research Assistant at the Institute for the Study of War explained to The Daily Caller News Foundation. Holcomb elaborated, “Russia’s standing in the international community collapsed.” Putin’s decision to directly militarily intervene in Syria, coupled with an inept Pentagon, reversed the roles significantly as 2015 unfolded. The U.S. discontinued the train and equip program in October 2015, after the Pentagon spent millions of taxpayer dollars and only trained a handful of fighters. Worse, several U.S. fighters defected to al-Qaida’s Syrian affiliate and turned over their weapons. Obama administration officials admitted to The New York Times in 2015, that their strategy simply wouldn’t work because most Syrian rebels were focused on fighting the Assad regime and didn’t much care about ISIS. Putin, seeing his client state of Syria on the verge of collapse, decided Syria offered him multiple opportunities of redemption. Michael Kofman, a Global Fellow at The Woodrow Wilson Institute explained to TheDCNF, the dire battlefield position of the Assad regime at the time “forced Russia to intervene more directly.” Putin decided to bill his Syrian intervention as a “Counter-terrorism” mission, saying Russian targets would only strike terrorists who were trying to destabilize the Assad regime. Throughout Russia’s intervention in Syria, the country has labeled any group opposing the regime, regardless of ideology, “terrorists.” Putin’s labeling of his mission as “Counter-terrorism,” was part of a larger scheme to re-legitimize himself on the world stage. TheNYT enumerated Putin’s five goals inside Syria: Prevent regime change in Syria because of the outside interference; Disrupt Washington’s plans to isolate Moscow; Prove that Russia is more reliable ally than the US; Demonstrate new Russian weapons; New foreign policy performance for the Russian public tired of the Ukrainian war, yet still in need to be distracted from collapsing economy. Amidst Russia’s vigorous intervention in Syria, Obama sought to clarify his own goals and what program he would pursue going forward. Kofman assesses that in the wake of Russia’s intervention, Obama “basically bowed out.” He elaborated that the U.S. has “accepted” that Assad is likely to stay in power. Obama’s efforts have largely been focused on assisting local forces that are only focused on fighting ISIS, and not on the broader struggle for control of Syria’s future. Russia, in partnership with Iran and Assad, provided overwhelming air support to the Syrian military against any force holding territory it desired. A SkyNews investigation revealed in August that Russia is hiring hundreds of private military contractors to fight on the ground in Syria, catching the government in a lie that it only assists Syria from the air. The military size and scope of Russia’s commitment to Assad is simply orders of magnitude larger than what the U.S. is willing to commit. Kofman and Snegovaya cautioned Russia may be fighting in Syria for many more years to come. Snegovaya highlighted that “Russia cannot completely pull away from Syria, but cannot start a ful-blown operation either.” She elaborated, “The Kremlin simply has no resources and lacks serious domestic support for a full-fledged military operation at the moment.” Despite these limitations, Kofman assessed that the U.S. has all but conceded “who will be, and who will form a transitional government after the civil war. It now looks like Russia has the opportunity to clarify this conflict and remove most of the opposition.” Reports now indicate the U.S. is on the verge of reaching a military cooperation deal with Russia inside Syria. Under the deal, the U.S. will pursue joint counter-terrorism operations against jihadist groups inside Syria. The deal has been met with widespread objection from nearly all partners in the U.S, including anti-ISIS coalition within the U.S. government, and from non-jihadist Syrian opposition groups fighting on the battlefield. Opponents of the deal also highlight that by partnering with Putin in Syria, the U.S. is playing a major role in legitimizing Russia on the world stage. Kofman, who favors a deal with Russia, closed his conversation with TheDCNF saying “we lost the proxy war, we weren’t ever that committed to it.” Follow Saagar Enjeti on Twitter Send tips to saagar@dailycallernewsfoundation.org Content created by The Daily Caller News Foundation is available without charge to any eligible news publisher that can provide a large audience. For licensing opportunities of our original content, please contact licensing@dailycallernewsfoundation.org.
{ "pile_set_name": "OpenWebText2" }
<?xml version="1.0"?> <tallies> <mesh id="1"> <type>regular</type> <lower_left>-10 -1 -1 </lower_left> <upper_right>10 1 1</upper_right> <dimension>10 1 1</dimension> </mesh> <filter id="1"> <type>mesh</type> <bins>1</bins> </filter> <tally id="1"> <filters>1</filters> <scores>flux</scores> </tally> </tallies>
{ "pile_set_name": "Github" }
module tests.it.runtime.regressions; import tests.it.runtime; import reggae.reggae; import std.path; @("Issue 14: builddir not expanded") @Tags(["ninja", "regressions"]) unittest { with(immutable ReggaeSandbox()) { writeFile("reggaefile.d", q{ import reggae; enum ao = objectFile(SourceFile("a.c")); enum liba = Target("$builddir/liba.a", "ar rcs $out $in", [ao]); mixin build!(liba); }); writeFile("a.c"); runReggae("-b", "ninja"); ninja.shouldExecuteOk; } } @("Issue 12: can't set executable as a dependency") @Tags(["ninja", "regressions"]) unittest { with(immutable ReggaeSandbox()) { writeFile("reggaefile.d", q{ import reggae; alias app = scriptlike!(App(SourceFileName("main.d"), BinaryFileName("$builddir/myapp")), Flags("-g -debug"), ImportPaths(["/path/to/imports"]) ); alias code_gen = target!("out.c", "./myapp $in $out", target!"in.txt", app); mixin build!(code_gen); }); writeFile("main.d", q{ import std.stdio; import std.algorithm; import std.conv; void main(string[] args) { auto inFileName = args[1]; auto outFileName = args[2]; auto lines = File(inFileName).byLine. map!(a => a.to!string). map!(a => a ~ ` ` ~ a); auto outFile = File(outFileName, `w`); foreach(line; lines) outFile.writeln(line); } }); writeFile("in.txt", ["foo", "bar", "baz"]); runReggae("-b", "ninja"); ninja.shouldExecuteOk; ["cat", "out.c"].shouldExecuteOk; shouldEqualLines("out.c", ["foo foo", "bar bar", "baz baz"]); } } @("Issue 10: dubConfigurationTarget doesn't work for unittest builds") @Tags(["ninja", "regressions"]) unittest { import std.path; import std.file; with(immutable ReggaeSandbox()) { writeFile("dub.json", ` { "name": "dubproj", "configurations": [ { "name": "executable", "targetName": "foo"}, { "name": "unittest", "targetName": "ut"} ] }`); writeFile("reggaefile.d", q{ import reggae; alias ut = dubConfigurationTarget!(Configuration(`unittest`), CompilerFlags(`-g -debug -cov`)); mixin build!ut; }); mkdir(buildPath(testPath, "source")); writeFile(buildPath("source", "src.d"), q{ unittest { static assert(false, `oopsie`); } int add(int i, int j) { return i + j; } }); writeFile(buildPath("source", "main.d"), q{ import src; void main() {} }); runReggae("-b", "ninja"); ninja.shouldFailToExecute(testPath); } }
{ "pile_set_name": "Github" }
In her new book The Diversity Delusion, Heather Mac Donald takes on identity politics far more forthrightly than Francis Fukuyama dared to in his new book Identity, which I reviewed last week. Just compare their subtitles: Mac Donald chose How Race and Gender Pandering Corrupt the University and Undermine Our Culture, while Fukuyama went with The Demand for Dignity and the Politics of Resentment, even though “dignity” is hardly the first word suggested by identity politics. As I foresaw: Nor do I expect the upcoming Supreme Court nomination hearing/teen sex comedy to be a high point in the history of American dignity. The Diversity Delusion... Heather Mac Donald Best Price: $12.99 Buy New $12.60 (as of 12:05 EST - Details) Interestingly, both Fukuyama and Mac Donald studied literary theory at Yale under deconstructionist Paul de Man, a remarkable con man who successfully sailed with whatever tide was flowing, whether the Nazi occupation in his native Belgium or French high theory in America. But eventually both Fukuyama and Mac Donald realized French postmodernism is pernicious nonsense. Nonetheless, I think Michel Foucault was onto something with his constant harping on how power infiltrates language. Granted, Foucault’s obsession with power was an offshoot of his gay sadomasochism, which led to him dying of AIDS in 1984. Still, his notion that elites would naturally try to socially construct how people think in order to preserve their privileges is hardly implausible. Yet that ought to lead to the question: Who, precisely, are “the powerful” in 2018? We are constantly lectured about how the increasingly distant past has apparently permanently marginalized various identity groups, so they must be handed ever more power in the present. But aren’t those who are being paid to do this lecturing part of the powerful? Identity: The Demand f... Francis Fukuyama Best Price: $6.98 Buy New $9.50 (as of 05:40 EST - Details) Mac Donald shines her spotlight on institutional power in the universities, especially California colleges such as UCLA. Many today might assume that inclusion is a recent development of just the past few slightly more enlightened years. Personally, though, I worked in summer jobs in 1981–82 for a black UCLA vice-chancellor. Through him I met the mayor of Los Angeles, Tom Bradley (1973–93), who had been a UCLA student in the 1930s and was nearly elected governor of California in 1982. My boss’ office was in UCLA’s Bunche Hall, which was named after the African-American diplomat Ralph Bunche, valedictorian of his UCLA class in the 1920s, who won the 1950 Nobel Peace Prize for mediating an armistice to halt the first Israeli-Arab war. Bunche Hall is not far from UCLA’s Jackie Robinson Stadium, named after the UCLA four-sport letterman of 1939–41. Read the Whole Article
{ "pile_set_name": "OpenWebText2" }
DOT Physicals Beginning October 15, DOT Physicals at the Chipola Quick Care location will only be available Monday-Friday 7AM-7PM. Weekend DOT Physicals plan to resume in early December. Chipola Quick Care – 850.526.6700
{ "pile_set_name": "Pile-CC" }
Alex Mack, Mitchell Schwartz The Browns lost Alex Mack and Mitchell Schwartz in one day. (John Kuntz, Cleveland.com) CLEVELAND, Ohio -- On the first day of free agency, the Browns lost two-fifths of their offensive line in center Alex Mack and right tackle Mitchell Schwartz, their starting free safety in Tashaun Gipson, and their speedy receiver and returner in Travis Benjamin. Along the way, the front office, led by Executive Vice President Sashi Brown, got hammered from coast-to-coast for botching the day. NFL Network analysts blasted them all afternoon, and words like "debacle" and "disaster" described them on social media. In addition to losing some of their own free agents, they also failed to land any of the big-name players they had been linked to, such as Bengals receiver Marvin Jones. But Brown and coach Hue Jackson had made it clear that they wouldn't panic, that they'd be disciplined and that they'd build through the draft. Jackson went so far as to say "it will not be disappointing" if we lose the big-four free agents. Here's a behind-the-scenes look at what happened on the challenging first day: 1. Mitchell Schwartz: The Browns made Schwartz an offer shortly before the NFL Combine that was far below what he felt he could get on the open market. Sources said it was somewhere in the $7 million-a-year range. His agent, Deryk Gilmore, told the Browns that the former second-round pick would test free agency. Schwartz' goal was about $8 million to $10 million a year, taking into account the growing importance of the position against the Von Millers of the world. When Schwartz opted to test the market, the Browns assumed he was gone and turned their attention to other players. But Gilmore told cleveland.com Thursday that Schwartz wanted to return to Cleveland and wishes he could've stayed. His fiancee is from here, he purchased a house here and he's entrenched in the community. After testing the market, which wasn't good for right tackles, Schwartz went back to the Browns in the hours before free agency and ultimately planned to accept their pre-combine offer. But they were informed by Cleveland that the offer no longer stood, at least not at $7 million a year. It may have been posturing on the Browns' part, but any hopes of reaching a deal were apparently dashed when NFL Network reported Wednesday morning that the Browns had pulled their offer. Feeling Cleveland was no longer an option, Schwartz opted to sign a five-year, $33 million deal with the Chiefs, including about $15 million guaranteed. His brother, Geoff Schwartz, congratulated him on the deal after the "nonsense'' he endured during the day, presumably from the Browns. NFL Network's Mike Silver reported that the Browns didn't negotiate in good faith. In the end, the Browns had moved on before Wednesday when Schwartz opted to test the market without engaging with their $7 million offer. For Schwartz' part, it's common for a player to shop a team's number in hopes of making more. Ultimately, he didn't, at least not in terms of yearly average. The $6.6 million a year average makes him the second-highest paid right tackle in the NFL, but it's short of the payday he was hoping for. The Browns now have to hope that Austin Pasztor can step in, or they need to find a replacement. Bottom line: It didn't have to come to this. The Browns were willing to pay Schwartz $7 million a year, more than he's getting from the Chiefs. His $15 million guaranteed from Kansas City is more than what the Browns were offering, but a deal could've been struck had things not gotten ugly on Wednesday. It's unfortunate for both sides. 2. Alex Mack: The Browns wanted to keep Mack, but only at the right price, and he knew he could make more on the open market. Peter King of Sports Illustrated reported that Mack will average $9.5 million a year, and that he turned down $500,000 more per year from the Browns to join Kyle Shanahan in Atlanta. I'm told that the $9.5 million represents the maximum value of the contract, with every incentive being hit and that the actual average is more like $9 million a year. As for Mack taking less money to play for the Falcons, the Browns never actually made him a concrete offer after he voided the final three years of his contract (at $8 million a year) last week. Mack's representatives agreed to keep the Browns in the loop, but it was generally assumed that Mack, 30, would make more than the Browns wanted to pay. As for the Mack team, they found the Browns to be extremely professional and easy to work with and they look forward to doing business again in the future. 3. Travis Benjamin: The Browns wanted Benjamin back and made him an offer, but it wasn't close to what he could get in free agency. The Browns viewed him more as a situational player and returner, and didn't want to go as high as the Chargers did: four years, $24 million, $13 million guaranteed and $18 million over the first three years. The Chargers paid him like a No. 2 receiver, and will likely use him as such. 4. Tashaun Gipson: The Browns did not aggressively pursue Gipson and basically let him walk. He signed a five-year deal with the Jaguars worth $35.5 million, including a $12 million signing bonus. Incentives push it to $36 million. The Browns made him a multi-year offer before last season and he opted to play out his $2.356 million tender. He also skipped some voluntary workouts in an apparent contract statement, and then missed three games because of a sprained ankle. Gipson never seemed to recover from the contract issues of last year. The Browns will likely count on Jordan Poyer to replace him. 5. Marvin Jones: The Browns threw out a number for Jones, but it wasn't competitive and they weren't viewed as serious contenders. A source said if Jackson had really pushed it, the Browns may have gone after him harder. But Jackson probably knew the Browns wouldn't match what Jones got from the Lions: five years, $40 million including an $8 million signing bonus and $20 million guaranteed. The Browns will have to keep looking for receivers, because they don't have nearly enough weapons. They can't count on Josh Gordon coming back from suspension to save the day, and they're not. If he's reinstated, they'll go from there. But hanging out with Johnny Manziel is not the way to make a good first impression.
{ "pile_set_name": "OpenWebText2" }
Q: Difficulty in deciding correct data structure Two objects are interacting (Object Alpha, Object Beta) Each contain a point (x,y) which will be used to make comparisons, among other things. Object Alpha's point (x,y) attribute is dynamic and will change. Object Beta's point (x,y) attribute is final. I need to construct a data structure that contains all Object Beta's. I was thinking of some sort of multidirectional arraylist with an index corresponding to the values of the point attribute so I can simply iterate backward and forwards to find the closest Beta's within a given range, however, how would I construct a datastructure like this? Perhaps a linked multidimensional array? Although this would be incredibly complex when one adds or removes elements. Any other thoughts? Use case - Object Beta essentially is an object occupying an object in real space. Ie, it's point attribute corresponds to it's GPS location. Object Alpha is another object in real space and it's point attribute also corresponds to a GPS location. I want to quickly find the closest x amount of Beta's to Alpha's present location. Also add and remove Beta from this structure without completely redefining the entire structure. There could potentially be 1000+ object Beta's in this data structure. A: I recommend using an R-tree (link to Wikipedia). This is the standard data structure that most use for doing this sort of spatial indexing. R-trees are tree data structures used for spatial access methods, i.e., for indexing multi-dimensional information such as geographical coordinates, rectangles or polygons. The R-tree was proposed by Antonin Guttman in 1984[1] and has found significant use in both theoretical and applied contexts.[2] A common real-world usage for an R-tree might be to store spatial objects such as restaurant locations or the polygons that typical maps are made of: streets, buildings, outlines of lakes, coastlines, etc. and then find answers quickly to queries such as "Find all museums within 2 km of my current location", "retrieve all road segments within 2 km of my location" (to display them in a navigation system) or "find the nearest gas station" (although not taking roads into account). The R-tree can also accelerate nearest neighbor search[3] for various distance metrics, including great-circle distance.[4] This is a pretty thoroughly explored topic, I recommend reading the entire Wikipedia article linked at the top of the answer. Implementations in a few different languages: Java R-Tree Python R-Tree C# R-Tree
{ "pile_set_name": "StackExchange" }
March 30, 2009 How Do You Feel About the Economy? Enter the word that best describes your current mood about the economy. You can submit a response once a day. This page will update with the most popular choices from NYTimes.com readers.
{ "pile_set_name": "OpenWebText2" }
Euglenozoa The euglenozoa are a large group of flagellate Excavata. They include a variety of common free-living species, as well as a few important parasites, some of which infect humans. There are two main subgroups, the euglenids and kinetoplastids. Euglenozoa are unicellular, mostly around in size, although some euglenids get up to long. Structure Most euglenozoa have two flagella, which are inserted parallel to one another in an apical or subapical pocket. In some these are associated with a cytostome or mouth, used to ingest bacteria or other small organisms. This is supported by one of three sets of microtubules that arise from the flagellar bases; the other two support the dorsal and ventral surfaces of the cell. Some other euglenozoa feed through absorption, and many euglenids possess chloroplasts, the only eukaryotes outside Diaphoretickes to do so without performing kleptoplasty, and so obtain energy through photosynthesis. These chloroplasts are surrounded by three membranes and contain chlorophylls A and B, along with other pigments, so are probably derived from a captured green alga. Reproduction occurs exclusively through cell division. During mitosis, the nuclear membrane remains intact, and the spindle microtubules form inside of it. The group is characterized by the ultrastructure of the flagella. In addition to the normal supporting microtubules or axoneme, each contains a rod (called paraxonemal), which has a tubular structure in one flagellum and a latticed structure in the other. Based on this, two smaller groups have been included here: the diplonemids and Postgaardi. Classification The euglenozoa are generally accepted as monophyletic. They are related to Percolozoa; the two share mitochondria with disk-shaped cristae, which only occurs in a few other groups. Both probably belong to a larger group of eukaryotes called the Excavata. This grouping, though, has been challenged. Phylogeny The phylogeny based on the work of Cavalier-Smith 2016. Taxonomy Phylum Euglenozoa Cavalier-Smith 1981 emend. Simpson 1997 [Euglenobionta] Subphylum Glycomonada Cavalier-Smith 2016 Class Diplonemea Cavalier-Smith 1993 emend. Simpson 1997 [Diplosonematea; Diplonemia Cavalier-Smith 1993] Order Diplonemida Cavalier-Smith 1993 [Hemistasiida] Family Hemistasiidae Cavalier-Smith 2016 [Entomosigmaceae] Family Eupelagonemidae Okamoto & Keeling 2018 Family Diplonemidae Cavalier-Smith 1993 [Rhynchopodaceae Skuja 1948 ex Cavalier-Smith 1993] Class Kinetoplastea Honigberg 1963 emend. Margulis 1974 [Kinetoplastida Honigberg 1963; Kinetoplasta Honigberg 1963 stat. nov.] Family ?Cephalothamniidae Order ?Bordnamonadida Family Bordnamonadidae Cavalier-Smith 2013 Order ?Trypanophidida Family Trypanophididae Poche 1911 Subclass Prokinetoplastina Vickerman 2004 Order Prokinetoplastida Vickerman 2004 Family Ichthyobodonidae Isaksen et al., 2007 Subclass Metakinetoplastina Vickerman 2004 Order Neobodonida Vickerman 2004 Family Rhynchomonadidae Cavalier-Smith 2016 Family Neobodonidae Cavalier-Smith 2016 Order Parabodonida Vickerman 2004 Family Parabodonidae Cavalier-Smith 2016 [Cryptobiaceae Poche 1911; Trypanoplasmatidae Hartmann & Chagas 1910] Order Bodonida Hollande 1952 emend. Vickerman 1976 [Eubodonida Vickerman 2004] Family Bodonidae Bütschli 1883 [Bodonaceae Lemmermann 1914; Bodoninae Bütschli 1883; Pleuromonadidae Kent 1880] Order Trypanosomatida Kent 1880 stat. n. Hollande, 1952 emend. Vickerman 2004 Family Trypanosomatidae Doflein 1901 Subphylum Plicomonada Cavalier-Smith 2017 Infraphylum Postgaardia Cavalier-Smith 2016 stat. nov. Cavalier-Smith 2017 Class Postgaardea Cavalier-Smith 1998 s.s. [Symbiontida Yubuki et al., 2009] Order Bihospitida Cavalier-Smith 2016 Family Bihospitidae Cavalier-Smith 2016 Order Postgaardida Cavalier-Smith 2003 Family Calkinsiidae Cavalier-Smith 2016 Family Postgaardidae Cavalier-Smith 2016 Infraphylum Euglenoida Bütschli 1884 emend. Senn 1900 stat. nov. Cavalier-Smith, 2017 [Euglenophyta; Euglenida Buetschli 1884; Euglenoidina Buetschli 1884] Parvphylum Entosiphona Cavalier-Smith 2016 stat. nov. Cavalier-Smith 2017 Class Entosiphonea Cavalier-Smith 2016 Order Entosiphonida Cavalier-Smith 2016 Family Entosiphonidae Cavalier-Smith 2016 Parvphylum Dipilida Cavalier-Smith 2016 stat. nov. Cavalier-Smith 2017 Class Stavomonadea Cavalier-Smith 2016 [Petalomonadea Cavalier-Smith 1993; Petalomonadophyceae] Subclass Heterostavia Cavalier-Smith 2016 Order Heterostavida Cavalier-Smith 2016 Family Serpenomonadidae Cavalier-Smith 2016 Subclass Homostavia Cavalier-Smith 2016 Order Decastavida Cavalier-Smith 2016a Family Decastavidae Cavalier-Smith 2016a Family Keelungiidae Cavalier-Smith 2016a Order Petalomonadida Cavalier-Smith 1993 [Sphenomonadales Leedale 1967; Sphenomonadina Leedale 1967] Family Sphenomonadidae Kent 1880 Family Petalomonadidae [Petalomonadaceae Buetschli 1884; Notosolenaceae Stokes 1888; Scytomonadaceae Ritter von Stein 1878] Class Ploeotarea Cavalier-Smith 2016 Order Ploeotiida Cavalier-Smith 1993 Family Lentomonadidae Cavalier-Smith 2016 Family Ploeotiidae Cavalier-Smith 2016 Superclass Spirocuta Cavalier-Smith 2016 Class Peranemea Cavalier-Smith 1993 emend. Cavalier-Smith 2016 Subclass Acroglissia Cavalier-Smith 2016 Order Acroglissida Cavalier-Smith 2016 Family Teloproctidae Cavalier-Smith 2016a Subclass Peranemia Cavalier-Smith 2016 Order Peranemida Bütschli 1884 stat. nov. Cavalier-Smith 1993 Family Peranematidae [Peranemataceae Dujardin 1841; Pseudoperanemataceae Christen 1962] Subclass Anisonemia Cavalier-Smith 2016 Order Anisonemida Cavalier-Smith 2016 [Heteronematales Leedale 1967] Family Anisonemidae Saville Kent, 1880 em. Cavalier-Smith 2016 [Heteronemidae Calkins 1926; Zygoselmidaceae Kent 188] Order Natomonadida Cavalier-Smith 2016 Suborder Metanemina Cavalier-Smith 2016 Family Neometanemidae Cavalier-Smith 2016 Suborder Rhabdomonadina Leedale 1967 emend. Cavalier-Smith 1993 [Astasida Ehrenberg 1831; Rhabdomonadia Cavalier-Smith 1993; Rhabdomonadophyceae; Rhabdomonadales] Family Distigmidae Hollande, 1942 Family Astasiidae Saville Kent, 1884 [Astasiaceae Ehrenberg orth. mut. Senn 1900; Rhabdomonadaceae Fott 1971; Menoidiaceae Buetschli 188; Menoidiidae Hollande, 1942] Class Euglenophyceae Schoenichen 1925 emend. Marin & Melkonian 2003 [Euglenea Bütschli 1884 emend. Busse & Preisfeld 2002; Euglenoidea Bütschli 1884; Euglenida Bütschli 1884] (Photosynthetic clade) Subclass Rapazia Cavalier-Smith 2016 Order Rapazida Cavalier-Smith 2016 Family Rapazidae Cavalier-Smith 2016 Subclass Euglenophycidae Busse and Preisfeld, 2003 Order Eutreptiida [Eutreptiales Leedale 1967 emend. Marin & Melkonian 2003; Eutreptiina Leedale 1967] Family Eutreptiaceae [Eutreptiaceae Hollande 1942] Order Euglenida Ritter von Stein, 1878 stat. n. Calkins, 1926 [Euglenales Engler 1898 emend. Marin & Melkonian 2003; Euglenina Buetschli 1884; Euglenomorphales Leedale 1967; Colaciales Smith 1938] Family Euglenamorphidae Hollande, 1952 stat. n. Cavalier-Smith 2016 [Euglenomorphaceae; Hegneriaceae Brumpt & Lavier 1924] Family Phacidae [Phacaceae Kim et al. 2010] Family Euglenidae Bütschli 1884 [Euglenaceae Dujardin 1841 emend. Kim et al. 2010; Colaciaceae Smith 1933] (Mucilaginous clade) References External links Tree of Life: Euglenozoa Category:Bikont phyla Category:Taxa named by Thomas Cavalier-Smith
{ "pile_set_name": "Wikipedia (en)" }
About Us The board members of the Swainsboro-Emanuel County Joint Development Authority (SECJDA) have the experience to help your business succeed. We realize that where a company is located has a significant impact on its ability to control costs, generate income and maximize business productivity. SECJDA is a one-stop organization that assists in all your location or expansion needs. There is no red tape. You get immediate answers to your questions. The city and county governments and the SECJDA work together to provide incentive packages, based on job creation and private investment, that help your business become profitable in the shortest amount of time. SECJDA realizes that your location/expansion is on a definite timeline. We help you meet that timeline with seven different industrial parks to choose from, some of which have pad ready sites with all infrastructure in place. For other sites, we are in the process of “certifying” sites by doing the preparation work in advance, such as environmental studies, geotechnical studies and others, to minimize time to ground breaking and to meet your critical timelines. One 40 acre pre-qualified site is already in place with all utilities at the site. A 51 Acre Georgia Ready for Accelerated Development (GRAD) site is located at the Airport industrial park and adjacent to the the four-lane U.S. 1 By-pass. Our newest park, the Highway 297 Industrial Park, 376 acres with rail, has all utilities at the site with construction to begin in late Summer 2018 to put water and sewer on site. Another significant factor is our county and labor draw area can provide qualified labor at the right wages and salaries. Plus, if you meet certain criteria, the state of Georgia, through its Quick Start Program, can provide free training for your new employees. There are many reasons to choose Emanuel County. Please contact us to set up a visit so that we can show you why you should come to Emanuel County! Jack Bareford President 478-237-6426 jbareford@goemanuel.org Our Board Members Will Donaldson Chairman Wade JohnsonVice Chairman Tim GarrettMember Butch FryeMember Rufus YoumansMember Greg BennettMember Kenny GriffinMember Richard McNeelyBoard Attorney Our Staff Ken WarnockChief Executive Officer, Swainsboro-Emanuel County Chamber of Commerce and Joint Development Authority
{ "pile_set_name": "Pile-CC" }
from pyomo.environ import * # create the concrete model model = ConcreteModel() # set the data (native python data) k1 = 5.0/6.0 # min^-1 k2 = 5.0/3.0 # min^-1 k3 = 1.0/6000.0 # m^3/(gmol min) caf = 10000.0 # gmol/m^3 # create the variables model.sv = Var(initialize = 1.0, within=PositiveReals) model.ca = Var(initialize = 5000.0, within=PositiveReals) model.cb = Var(initialize = 2000.0, within=PositiveReals) model.cc = Var(initialize = 2000.0, within=PositiveReals) model.cd = Var(initialize = 1000.0, within=PositiveReals) # create the objective model.obj = Objective(expr = model.cb, sense=maximize) # create the constraints model.ca_bal = Constraint(expr = (0 == model.sv * caf \ - model.sv * model.ca - k1 * model.ca \ - 2.0 * k3 * model.ca ** 2.0)) model.cb_bal = Constraint(expr=(0 == -model.sv * model.cb \ + k1 * model.ca - k2 * model.cb)) model.cc_bal = Constraint(expr=(0 == -model.sv * model.cc \ + k2 * model.cb)) model.cd_bal = Constraint(expr=(0 == -model.sv * model.cd \ + k3 * model.ca ** 2.0)) # run the sequence of square problems solver = SolverFactory('ipopt') model.sv.fixed = True sv_values = [1.0 + v * 0.05 for v in range(1, 20)] print(" %s %s" % (str('sv'.rjust(10)), str('cb'.rjust(10)))) for sv_value in sv_values: model.sv = sv_value solver.solve(model) print(" %s %s" %(str(model.sv.value).rjust(10),\ str(model.cb.value).rjust(15)))
{ "pile_set_name": "Github" }
[Longitudinal study on the body mass index (BMI) of dialysis patients]. Chronic renal failure is commonly related to hyponutrition, affecting approximately on third of patients with advanced renal failure. We carried out a longitudinal study to assess nutritional evolution of 73 patients on a regular hemodialysis program, assessing changes in the anthropometrical parameter body mass index (BMI) and its correspondence to biochemical nutritional parameters such as total protein (TP) levels and serum albumin (Alb). Every three months plasma TP and albumin levels were collected and BMI was calculated by the standard formula: post-dialysis weight in kg/height in m2. For classifying by BMI categories, overweight and low weight were defined according to the WHO Expert Committee. Studied patients had a mean age of 53 years, 43 were male and 30 were female patients. BMI in women was lower than that in men (p < 0.001), as well as TP (p < 0.001) and Alb (p < 0.001) levels. Mean BMI was 29.3 kg/m2. Three point two percent of the determinations showed low weight, 12.16% overweight, and 83.97% normal BMI. TP were normal in 90.76% and decreased in 9.24%. Alb was normal in 82.2% and low in 17.78%. After the follow-up time (21.6 months, minimum 18 months, maximum 53 months), the Kruskal-Wallis test did not show a statistically significant change for BMI but it did show a change for the biochemical parameters albumin and total proteins (p < 0.05): nutritional impairment in CRF patients is manifested on biochemical parameters (TP and Alb) with no reflection on anthropometrical data.
{ "pile_set_name": "PubMed Abstracts" }
<template lang="html"> <div> <b-modal ref="tokenModal" :title="$t('interface.tokens.modal.title')" hide-footer class="bootstrap-modal nopadding max-height-1" centered static lazy @hidden="resetCompState" > <form class="tokens-modal-body" @keydown.enter.prevent> <div> <input v-model="tokenAddress" v-validate="'required'" :class="[ 'custom-input-text-1', tokenAddress !== '' && !validAddress ? 'invalid-address' : '' ]" :placeholder="$t('interface.tokens.modal.ph-contract-addr')" name="Address" type="text" /> <span v-show="tokenAddress !== '' && !validAddress" class="error-message" > {{ $t('interface.tokens.modal.error.addr') }} </span> <input v-model="tokenSymbol" :placeholder="$t('interface.tokens.modal.ph-symbol')" name="Symbol" type="text" class="custom-input-text-1" /> <input v-model="tokenDecimal" :placeholder="$t('interface.tokens.modal.ph-decimals')" name="Decimal" type="number" min="0" max="18" class="custom-input-text-1" /> <span v-show="tokenDecimal < 0 || tokenDecimal > 18" class="error-message" > {{ $t('interface.tokens.modal.error.decimals') }} </span> </div> <div class="button-block"> <button :class="[ allFieldsValid ? '' : 'disabled', 'save-button large-round-button-green-filled clickable' ]" @click.prevent="addToken(tokenAddress, tokenSymbol, tokenDecimal)" > {{ $t('common.save') }} </button> <interface-bottom-text :link-text="$t('common.help-center')" :question="$t('common.dont-know')" link="https://kb.myetherwallet.com" /> </div> </form> </b-modal> </div> </template> <script> import InterfaceBottomText from '@/components/InterfaceBottomText'; import { mapState } from 'vuex'; import { isAddress } from '@/helpers/addressUtils'; export default { components: { 'interface-bottom-text': InterfaceBottomText }, props: { addToken: { type: Function, default: function () {} } }, data() { return { tokenAddress: '', tokenSymbol: '', tokenDecimal: '', validAddress: false }; }, computed: { ...mapState('main', ['web3']), allFieldsValid() { if (!this.validAddress) return false; if (this.tokenSymbol === '') return false; if ( this.tokenDecimal < 0 || this.tokenDecimal > 18 || this.tokenDecimal === '' ) return false; if ( this.errors.has('address') || this.errors.has('symbol') || this.errors.has('decimal') ) return false; return true; } }, watch: { tokenAddress(newVal) { const strippedWhitespace = newVal.toLowerCase().trim(); const regTest = new RegExp(/[a-zA-Z0-9]/g); this.validAddress = regTest.test(strippedWhitespace) && isAddress(strippedWhitespace); this.toAddress = strippedWhitespace; this.tokenAddress = strippedWhitespace; }, tokenSymbol(newVal) { this.tokenSymbol = newVal.substr(0, 7); } }, methods: { resetCompState() { this.tokenAddress = ''; this.tokenSymbol = ''; this.tokenDecimal = ''; this.validAddress = false; } } }; </script> <style lang="scss" scoped> @import 'InterfaceTokensModal.scss'; </style>
{ "pile_set_name": "Github" }
Q: Wix: How to write to 32bit registers on 64 bit machine I was looking for solution for some time but without success. I must admitt that I am begginer with wix. I have got one project (WPF + caliburn, using Visual Studio 2015) beeing compiled separately for x86 and x64. I use x64 machine to create both MSIs. Unfortunately during installation the setup always writes to 64bit registers which causes problems for the application. I have created following components, trying to fix it using Win64="no" entry, unfortunately with no success. Can somone please advice correct component configuration? <DirectoryRef Id="TARGETDIR"> <?if $(var.Platform)="x64"?> <Component Id="Registry_DefaultStoragePath" Guid="123-456-789" Win64="yes"> <RegistryKey Root="HKLM" Key="Software\KeyName" Action="createAndRemoveOnUninstall"> <RegistryValue Type="string" Name="DefaultStorageLocation" Value="[DEFAULTSTORAGE]" KeyPath="yes"/> </RegistryKey> </Component> <Component Id="Registry_InstallType" Guid="123-456-789" Win64="yes"> <RegistryKey Root="HKLM" Key="Software\KeyName" Action="createAndRemoveOnUninstall" > <RegistryValue Type="string" Name="InstallType" Value="[INSTALLTYPE]" KeyPath="yes"/> </RegistryKey> </Component> <?endif?> <?if $(var.Platform)="x86"?> <Component Id="Registry_DefaultStoragePath" Guid="132-456-789" Win64="no"> <RegistryKey Root="HKLM" Key="Software\KeyName" Action="createAndRemoveOnUninstall"> <RegistryValue Type="string" Name="DefaultStorageLocation" Value="[DEFAULTSTORAGE]" KeyPath="yes"/> </RegistryKey> </Component> <Component Id="Registry_InstallType" Guid="123-456-789" Win64="no"> <RegistryKey Root="HKLM" Key="Software\KeyName" Action="createAndRemoveOnUninstall" > <RegistryValue Type="string" Name="InstallType" Value="[INSTALLTYPE]" KeyPath="yes"/> </RegistryKey> </Component> <?endif?> A: The main problem is that <?if $(var.Platform)="x64"?> is handled by the preprocessor, so it is evaluated at compile-time, not runtime. In order to handle x86/x64 runtime you can do this: <component ....> <condition>NOT VersionNT64</condition> <!-- 32 bit component --> <!-- Add component content here --> </component> <component ....> <condition>VersionNT64</condition> <!-- 64 bit component --> <!-- Add component content here --> </component>
{ "pile_set_name": "StackExchange" }
"I think the delayed implementation date was really important out of respect for parents who are out there who have car seats," Meade said. "Now we just have to get out there and educate the public so people know what to do."
{ "pile_set_name": "OpenWebText2" }
<?php /** * Magento * * NOTICE OF LICENSE * * This source file is subject to the Academic Free License (AFL 3.0) * that is bundled with this package in the file LICENSE_AFL.txt. * It is also available through the world-wide-web at this URL: * http://opensource.org/licenses/afl-3.0.php * If you did not receive a copy of the license and are unable to * obtain it through the world-wide-web, please send an email * to license@magento.com so we can send you a copy immediately. * * DISCLAIMER * * Do not edit or add to this file if you wish to upgrade Magento to newer * versions in the future. If you wish to customize Magento for your * needs please refer to http://www.magento.com for more information. * * @category design * @package base_default * @copyright Copyright (c) 2006-2020 Magento, Inc. (http://www.magento.com) * @license http://opensource.org/licenses/afl-3.0.php Academic Free License (AFL 3.0) */ ?> <div class="page-title"> <h1><?php echo $this->__('Share Your Wishlist') ?></h1> </div> <?php echo $this->getMessagesBlock()->toHtml() ?> <form action="<?php echo $this->getSendUrl() ?>" id="form-validate" method="post"> <div class="fieldset"> <?php echo $this->getBlockHtml('formkey')?> <h2 class="legend"><?php echo $this->__('Sharing Information') ?></h2> <ul class="form-list"> <li class="wide"> <label for="email_address" class="required"><em>*</em><?php echo $this->__('Up to 5 email addresses, separated by commas') ?></label> <div class="input-box"> <textarea name="emails" cols="60" rows="5" id="email_address" class="validate-emails required-entry"><?php echo $this->getEnteredData('emails') ?></textarea> </div> </li> <li class="wide"> <label for="message"><?php echo $this->__('Message') ?></label> <div class="input-box"> <textarea id="message" name="message" cols="60" rows="3"><?php echo $this->getEnteredData('message') ?></textarea> </div> </li> <?php if($this->helper('wishlist')->isRssAllow()): ?> <li class="control"> <div class="input-box"> <input type="checkbox" name="rss_url" id="rss_url" value="1" title="<?php echo Mage::helper('core')->quoteEscape($this->__('Check this checkbox if you want to add a link to an rss feed to your wishlist.')) ?>" class="checkbox" /> </div> <label for="rss_url"><?php echo $this->__('Check this checkbox if you want to add a link to an rss feed to your wishlist.') ?></label> </li> <?php endif; ?> <?php echo $this->getChildHtml('wishlist.sharing.form.additional.info'); ?> </ul> </div> <div class="buttons-set form-buttons"> <p class="required"><?php echo $this->__('* Required Fields') ?></p> <p class="back-link"><a href="<?php echo $this->getBackUrl(); ?>"><small>&laquo; </small><?php echo $this->__('Back')?></a></p> <button type="submit" title="<?php echo Mage::helper('core')->quoteEscape($this->__('Share Wishlist')) ?>" class="button"><span><span><?php echo $this->__('Share Wishlist') ?></span></span></button> </div> </form> <script type="text/javascript"> //<![CDATA[ Validation.addAllThese([ ['validate-emails', '<?php echo Mage::helper('core')->jsQuoteEscape($this->__('Please enter a valid email addresses, separated by commas. For example johndoe@domain.com, johnsmith@domain.com.')) ?>', function (v) { if(Validation.get('IsEmpty').test(v)) { return true; } var valid_regexp = /^[a-z0-9\._-]{1,30}@([a-z0-9_-]{1,30}\.){1,5}[a-z]{2,4}$/i; var emails = v.split(','); for (var i=0; i<emails.length; i++) { if(!valid_regexp.test(emails[i].strip())) { return false; } } return true; }] ]); var dataForm = new VarienForm('form-validate', true); //]]> </script>
{ "pile_set_name": "Github" }
Endocrine response to acute cold exposure by lactating and non-lactating Norway rats. Plasma levels of corticosterone, prolactin and thyroxine (T4) were measured in lactating and non-lactating Norway rats at 22 degrees C and 4 degrees C. Acute cold exposure increased corticosterone secretion in all groups, although non-lactating female levels rose higher than those of mother rats. While prolactin levels are unaffected by acute cold exposure in non-lactating females, mothers with their litters had lower prolactin levels in the cold. T4 levels increased during cold exposure in lactating females, suggesting that the low T4 levels observed during lactation may not be due to lactational competition for available iodine.
{ "pile_set_name": "PubMed Abstracts" }
På skive MICHAEL FOSTER & BEN BENNETT «In It» ASTRAL SPIRITS «In It» is the sophomore release of the American free jazz-underground duo of sax player Michael Foster, known from the Andrew Barker Trio, Weasel Walter Large Ensemble and New York Review of Cocksucking, and drummer Ben Bennett, following their self-produced, digital download-only 2015 debut «». «In It» still keeps the underground spirit and is published by the Texan label Astral Spirits as a limited-edition of 150 cassette tapes plus digital download. «In It» was recorded during two days on May 2016 in Brooklyn. Foster and Bennett departure point is John Coltrane iconic sax and drums duets with drummer Rashied Ali (as captured on the «Interstellar Space», Impulse, 1974). There is a similar spiritual vein, especially on the ritualistic, folksy introduction. But later on Foster and Bennett emphasize that both sketch their own independent course and don’t subscribe only the American blues and jazz legacies, in their many incarnations, Both are willing to embraces rock and punk aesthetics and their improvisation strategies owe much to the European school of free-improvisation. Both sound as more inspired now by John Butcher and Mats Gustafsson or Han Bennink and Paul Lovens than the classic Coltrane-Ali duet. The intimate yet stormy duet feature both Foster and Bennett all over their instruments, pushing themselves and their instruments sonic ranges into the most extreme terrains. Foster talks and shouts through the saxes mouthpieces and often uses his instruments as percussive instruments in addition to his strong rhythmic articulation while Bennett blows on his membranes as if there were reeds instruments. Both have developed such a close affinity that they can shift the level of intensity and energy within a second or instantly alternate between a muscular, roaring blow-out and an abstract, almost silent sonic searches. There is a sense of thematic development to Foster and Bennett performance as both communicate a kind of story full of hair-raising adventures and wild twists that demands a certain showmanship. No doubt, these two hard-working improvisers know how to keep their audience alert and attentive.
{ "pile_set_name": "Pile-CC" }
USS Brisk (PG-89) HMS Flax, a modified , was laid down on 28 February 1942 at Kingston, Ontario, Canada, by War Supplies Ltd., for the Royal Navy. Launched on 15 June 1942 it was reallocated to the United States under the so-called "Reverse Lend-Lease" program and renamed and redesignated Brisk (PG-89) on 14 August 1942. Completed on 5 December 1942, the ship was commissioned on 6 December 1942, Lt. Norman B. Denel, USNR, in command. Service history She departed Kingston on 7 December bound for Montreal and reached that city on the 10th. Four days later, she sailed for Quebec, arriving on the 16th. There, the remaining work to complete the ship for service was carried out. On 8 January 1943, Brisk headed for Boston in company with by way of Halifax, Nova Scotia. Upon her arrival at the Boston Navy Yard, Brisk underwent repairs and alterations. Once this work was completed, the gunboat commenced her shakedown on 26 February. Then, after three days of anti-submarine warfare training out of New London, she reached New York City on 10 March. Soon thereafter, Brisk commenced escorting convoys between New York and Guantanamo Bay, Cuba, a prosaic but highly important duty that kept her employed through V-E Day in the spring of 1945. Brisk saw action on August 1st 1943 while escorting Convoy NG-376 30 miles west of Great Inagua. She drove down U-boat U-732 that was lying in wait for the convoy, allowing it to pass unmolested. Upon the conclusion of her last convoy mission, with GN-204 (Guantanamo to New York) — which reached New York on 15 May 1945 — Brisk sailed for Norfolk, Virginia, on 11 June. She continued south from there on 23 June and arrived in Charleston, South Carolina, two days later. Brisk served at Charleston into the autumn of 1945. She was decommissioned there on 9 October 1945, and her name was struck from the Navy list on 24 October 1945. Transferred to the War Shipping Administration on 18 October 1946 for disposal, she was operated in mercantile service into the mid-1950s, initially retaining her name Brisk. Later, however, she was documented under the names Ariana (1951) and Arvida Bay (1955). See also List of United States Navy ships Patrol boat References External links Category:World War II naval ships of the United States Category:Ships built in Ontario Category:1942 ships Brisk
{ "pile_set_name": "Wikipedia (en)" }
Cyclophora dispergaria Cyclophora dispergaria is a moth in the family Geometridae. It is found in Surinam. References Category:Moths described in 1882 Category:Cyclophora Category:Moths of South America
{ "pile_set_name": "Wikipedia (en)" }
Case presentation ================= A 46-year-old Caucasian woman presented to the gynaecology outpatient\'s department complaining of menorrhagia, bladder pressure and a feeling of heaviness in the pelvis. She had recently also started experiencing deep dyspareunia. She reported no bowel or constitutional symptoms. She was a housewife and was a teetotal, non-smoker. She had one child, born by vaginal delivery and her previous cervical smears were normal. She was healthy and had no significant medical, surgical or family history. Examination revealed an enlarged, fourteen-week size uterus. There were no adnexal masses felt. In view of her symptoms, she was counselled about the various treatment options for menorrhagia. She declined all conservative measures and was very keen on having a total abdominal hysterectomy. An ultrasound scan was requested and her operation was booked. Before diagnostic imaging could be performed, she attended hospital for her hysterectomy. Surgery was done through a Pfannenstiel incision, which revealed some haemorrhagic fluid in the abdomen. This was sent for cytology. The uterus was found to be uniformally enlarged, the fallopian tubes looked thickened and the ovaries appeared to have carcinomatous deposits on their surface. The upper abdomen was explored. The omentum was caked with tumour, a biopsy was taken and frozen section performed. This showed deposits of mucin with some signet ring cells -- suspicious of carcinoma of the bowel. The surgical consultant was called, at which time examination demonstrated a palpable tumour in the caecum. A decision was taken to proceed with total abdominal hysterectomy and bilateral salpingo-oophorectomy and to defer hemi-colectomy to a later date, until further investigations could be performed. Subsequent gastroscopy was normal but her colonoscopy was limited due to looping of the bowel. A computerized tomography scan of the chest, abdomen and pelvis revealed no mediastinal nodes or lung parenchymal deposits. Her upper abdomen was normal. However there was thickening of the right para-colic area and caecal pole consistent with local infiltration. Histology of her pelvic organs showed extensive infiltration of the cervix, basal endometrium, myometrium, ovaries and tubal tissues by poorly differentiated adenocarcinoma, with a signet ring pattern showing mucin production. This was identical to the omental biopsy. The impression was that these appeared to be metastases rather than intrinsic lesions. The patient was later referred for palliative chemotherapy as the tumour was felt to be incurable. She subsequently died of her disease some twelve months later. Discussion ========== Bowel cancers invade adjacent structures dependent on their site. Ascending colon tumours tend to invade the duodenum and liver, whilst rectal tumours are more likely to invade the genital organs \[[@B1]\]. In general, non genital malignancies rarely metastasize into the uterus. But should this occur, metastatic uterine cancer may cause uterine enlargement and thickening of the myometrium \[[@B2]\]. Thus mimicking a variety of gynaecological symptoms, which could suggest intrinsic uterine pathology. Our case report re-iterates the importance of considering bowel pathology in the differential diagnosis of all patients presenting with gynaecological symptoms. These days, it is vitally important to bear in mind that diagnostic imaging must be obtained prior to any surgical intervention, as we run the risk of missing serious pathology is we omit this step. In this case imaging prior to surgery may not have changed the eventual outcome, but it may have triggered further investigation, which could have led to the correct diagnosis prior to surgery. Consent ======= Written informed consent was obtained from the patient\'s next of kin for publication of this case report. Unfortunately the patient has died as a result of her condition. A copy of the written consent is available for review by the Editor-in-Chief of this journal. Competing interests =================== The authors declare that they have no competing interests. Authors\' contributions ======================= Both SD\'s and HS were integrally involved in the patient\'s management and diagnosis. All also contributed to writing of the case report. LI performed the literature search and final copy-editing the paper. All authors read and approved the final manuscript.
{ "pile_set_name": "PubMed Central" }
Q: SetIntersection size without allocation Given 2 sets (C++) is there a convenient way to get the size of the intersection without any alocations (as std::set_intersection does) Sure, I could copy the implementation minus the assignment but I always rather not re-invent the wheel int count = 0; while (first1!=last1 && first2!=last2) { if (*first1<*first2) ++first1; else if (*first2<*first1) ++first2; else { count++; ++first1; ++first2; } } I was considering using std::set_intersection and pass a "counting" interator...? A: With some help from Boost Iterator library and C++14's generic lambdas: #include <set> #include <algorithm> #include <iostream> #include <boost/function_output_iterator.hpp> int main() { std::set<int> s1 { 1,2,3,4 }; std::set<int> s2 { 3,4,5,6 }; int i = 0; auto counter = [&i](auto){ ++i; }; // C++14 // auto counter = [&i](int ){ ++1; }; // C++11 // pre C++11, you'd need a class with overloaded operator() std::set_intersection( s1.begin(), s1.end(), s2.begin(), s2.end(), boost::make_function_output_iterator(counter) ); std::cout << i; } Output is 2.
{ "pile_set_name": "StackExchange" }
IN THE ( COURT OF CRIMINAL APPEALS OF TEXAS JOSE GONZALES 111, Petitioner/ THE STATE OF TEXSS/ Appellee. COURT OF CRIMINALappeals PETITION FOR DISCRETIONARY REVIEW FROM THE COURT OF APPEALS AUG 05 2015 THIRTEENTH DISTRICT OF TEXAS Abe) Acosta, Clerk CAUSE NO. 13-13-00011-CR. ORAL ARGUMENT REQUESTED TABLE OF CONTENTS PAGE NO TABLE OF CONTENTS I. INDEX OF AUTHORITIES II-IV. STATEMENT REGARDING ORAL ARGUMENT Vo STATEMENT OF THE CASE . o - . . VI . STATEMENT REGARDING PROCEDURAL HISTORY.. VII. GROUNDS FOR REVIEW • - VIII-I3i>: ARGUMENTS AND AUTHORITIES 1-16. CONCLUSION 16. PRAYER FOR RELIEF. «... - 16. CERTIFICATE OF SERVICE 16. APPENDIX... end. I. IINDEX OF AUTHORITIES TEXAS CASE: PAGE NO. BELL Mr. STATE, 356 S.W.3d:528. ... 1. DRAKE v.hSTATE, 686 S.W.2a 935,944 7. ERVlM:ivu; STATE, 991 S.W.2d 804,814 3. EX PARTE CASTILLO, 432 S,W.3d 457.... • ...4,5. EX PARTE CAVAZOS, 203 S=W.3d 333 4,5. EX PARTE DUFFY, 607 S.W.2d 507 16 = EX PARTE RATHNELL, 717 S.W.2d 33,36 .-5. GIRDY V. STATE, 213 S.W.3d 315,319 3. GARCIA V. STATE, 919 S.W.2d 370,381... . 2. HOLLY V.STATE/ 469 S.W.2d 136,137...... 7. LACY V. STATE, 160 TEX.CRIM.9599261773 .W.2d 139^141 7. MENDOZA y. STATE, 1 S.W.3d 829 . . . 1. PHILLIPS V. STATE, 787 S.W.2a 391-95 5. RUSSEL V. STATE, 146 S.W.Sd 705,714..,.........^. 11. VAUGHN v.SSTATE, 239 S.W.3d 351 4. VON BYRD V. STATE, 569 S.W.2d 883,890-91.. ... 11. WILLIAMS V. STATE, 897 S.W.2d 351, CERT.DENIED 516 U.S. 946... 9-10. YGLESIAS V. STSTB/: 252 S.W.3d 733S(HDfii®E^^iREP'D 1. CRAWFORD V. STATE, 685 S.W.2d 343,349-50 ..x....,ll. LANDERS V. STATE, 957 S.W.2d 558r560... 5. FEDERAL CASES: MAYOLA V. ALABAMA, 623 F.2d 992,998. (5TH CIR.1980) 11. U.S. V. DURHAM, 287 F.3D 1297,1304 (llTH CIR.2002). 2. SUPREME COURT CASES: BENTON V . •iHARYLAND , 395 U.S. 784 3. BLOCKBURGER V. U.S., 284 U.S. 294 3. BROWN V.OOHIO, 432 U.S. 161 3. FARETTA V. CALIFORNIA, 422 U.S. 806,821 .... 12. GRADY V. CORBIN, 495 U.S. 299 3- ILLINIOS V. VITALE, U.S. 410 3. STRICKLAND, 466 U.S. 688 ...............6,7,8,12,16 TRAVINO V. THALER/ 569 U.S.^ (2013). 16. UNITED STATES V. CRONIC, 466 AT? 656-57 . 12. U.S. V. DIXON/ 509 U.S. 688 3. II. AUTHORITIES CONT: PAGE NO^ TEXAS CONSTITUTION: TEX.CONST. ARTICLE 1 § 14 3. UNITED STATES CONSTITUTION: U.S.C.A. CONST, amend 5 ......... 3, U,S.C.A. CONST. AMEND 6 1/2,6/8,12, 11/13. U.S.C.A. (pClNST. AMEND 3j4 ......................................X,2/6,8,12, 11/13. TEXAS STATUTES: V.T.C.A. PENALCOODE § 19.03 (a)(2) ...4,7. V.T.C.A. PENAL CODE § 30.02(a)(2) ..4, V.T.e.A. PENAL CODE § 22.02 5. V.T.C.A. PENALCOODE § 8.01 13,14,15. V.T.C.A. PENAL CODE § 3.04 (a) 7. FAMILY CODE § 71.003 5. FAMILY CODE § 71.0021 (b) ....5. EAMILY CODE § 71.005 (b) 5. TITLE 7 PENAL CODE 7. TITLE 5 PENALCOODE .,..7. V.T.C.C.P. ART.l.lOd) . . 3^ V.T.C.C.P. ART.1,14 8. V.T.C.C.P. ART.21.24. . . 5^7^ V.T.C.C.P. ART.31.01.. .....11. V.T.C.C.P-AART.31.03(a) .9. V.T.C.C.P. ART.42.12 (d)(8)(c)... 12. V.T.C.C.P. ART.46.03. . . 14. CRIMINAL LAW; CRIMINALILaW KEYNOTE-144 4. CRIMINAL LAW KEYNOTS!620 . ( 3 ) . CRIMINAL LAW KEYNOTE-641.13 ( 2) 7. CRIMINAL LAW KEYNOTE-637 . 2 CRIMINAL LAW KEYNOTE-773 13. INDICTMENT AND INFORMATION KEYNOTE-127 INDICTMENT AND INFORMATION KEYNOTE-129(1) 6. OTHER STATUTES: V.T.C.A. PENAL CODE § 3.01(a) .7. III. AUTHORITIES CONT: PAGE NO. 88 P.A.291 (1879) .16, IV. STATEMENT REGARDING ORAL ARGUMENT EETITIONER URGES THE COURT TO ALLOW ORAL ARGUMENT FOR THE FOLLOWING REASONS; TO WIT: petitioner's claim of double jeopardy is based on the Gavazos casg 203 S.W-3d 333 (Tex.Grim-App.2006) and the Castillo case that the State cited in its brief: Ex parte Castillo/ 432 S.W.3d 433 (Tex.App. -San Antonio 2014/no pet-h-). Furthermore/ this error is an error whether objected to or not. Petitioner briefed said error in his Pro/se brief which the 13th Court of Appeals failed to adjudicate oniits merits. Because their is a misjoinder issue in multiple count indictment Petitioner needs futher redress from the Court of Appeals to address said grounds. Also because the, record was fully developed before the Court Petitioner claimed ineffective assistance of counsels on both direct appeal as well as trial attorneys. Fetitoner should be given the full adjudication of ineffective assistance of counsel as outlined in Trevino v. Thaler/569 U.S. (2013). Furthermore/ Petitioner urges the Court for oral argument that Petitioner's attorney on direct appeal filed Anders brief and motion to withdraw/ the Court assigned Stephen W. Byrne as attorney who filed motion to withdraw based on ill-health and no Ander's brief. Because he was the attorney of record the 13th Court of appeals was in error and abused their discretion by ruling on Anders brief filed by attorney Fred Jiminez whom was no longer Petitoner's attorney of record and such Anders brief filed was moot by operation of law. Because the remainder of the errors are based on ineffective assistance of counsel Petitioner urges the Court to allow oral argument. V. STATEMENT OF THE CASE on December 12/ 2011 Jose Gonzales III, hereinstyled Petitioner was charged with Capital Murder in the course of. committting a Burglary of a Habitation of one Leslie Morin/ by shooting Leslie Morin with a firearm. In Count 11/ Petitioner was charged with Burglary of a Habitation on or about December 12/2011 in Nueces County/ Texas- There and then Intentionally and knowingly enter a habitation with out the effective consent of Vida,l Rodriguez who had greater right to said property/ and attempt to commit or committed the felony offense of Aggravated Assault with a Deadly Weapon. Petitioner was employed as a Alice police officer in the City of Alice/ Texas on the:: day of the offense- In a high profile trial Petitioner was convicted on both counts by a biased and highly ^ prejudiced jury- The court sentenced Petitioner to life with out parole on count 1/ and life with parole on count II. Wherein said convictions are constu- tionally infirm- The trial was overwhelmed by the media, and public pressure. Change of venue was warranted. VI- STATEMENT REGARDING PROCEDURAL HISTORY Petitoner was charged by indictment with one count of :Capital murder during the course of committing a burglary of a habitation, and one count of burglary of a habitation with the intent to commit aggravated assault or a felony. A, jury convicted him of both offenses as alleged in the indictment on December 6/ 2012. The Court assessed punishment at life without the possibility of parole for the Capital Murder charge and life in the Institutional Division of the Texas department of Criminal Justice-CID for the Burglary of a habitation charge- The Petitioner filed notice of appeal on December 10, 2012. Petitioner's attorney of record Fred Jiminez filed an Anders brief on July 18, 2013. On July 24, 2013 Attorney Fred Jiminez filed a motion to withdraw as attorney. On August 16, 2013 the trial court appointed Stephen W. Byrne to represent Petitoner. On September 8^ 2013 Stephen W. Byrne filed motion to withdraw citing ill-health and requested the court to appoint new counsel. No Anders brief was filed and no new attorney was appointed. Petitioner filed a motion in the 13th Court of Appeals for trial record. Petitioner filed his Pro/se brief on May 23, 2014, along with request for oral argument. Furthermore, Petitioner filed a motion in the 13th Court of appeals for his trial attorney to produce the psychological report generated from his court ordered evaluation. Such report was never, made part of the record- The State was ordered to file their brief. The case was due for submission on August 13, 2014. The State filed their brief on August 12, 2014 with a motion for an extension of time. Petitioner filed a motion to hold said appeal in abeyance in order to respond to State's brief. On August 14, 2014 the Court affirmed in an unpublished unsigned boilerplate opinion by Justice Dori Contreras Garza, which appear to be the work of a clerk or para-legal employed by said justice refering soley to the Anders brief that attorney Fred Jiminez submitted that should have been ruled moot. Petitioner filed motion for rehearing on August 30, 2014. The State filed brief agreeing with Petitioner's claim of double jeopardy wherein the San Antonio Court rendered relief for the exact same issue- Rehearing was denied on January 21, 2015- VII - GROUNDS FOR REVIEW GROUND ONE; PAGE NO. TRIAL COURT ERRED IN ALLOWING PETITIONER TO BE TRIED IN SHACKLES IN VIOLATION OP U-S-C-A. CONST. AMENDS 6TH AND 14TH. TRIAL COURT INFRINGED UPON PETITIONR'S PERSUMPTION OF INNOCENCE/ AND HIS RIGHT TO COUNSEL. INEFFECTIVE ASSISTANCE OF COUNSEL FOR NOT OBJECTING TO PETITIONER BEING SHACKLED AND PROCEDURALLY DEFAULTING PETITIONER'S CLAIM- GROUND TWO; THE STATE COMMITTED DOUBLE JEOPARDY WHEN IT PROSECUTED PETITIONER FOR multiple BURGLARIOUS ENTRIES WHERE THERE WAS ONLY ONE UNLAWFUL ENTRY, IN VIOLATION OF TEXAS CONSTITUTION ARTICLE I/§14 AND U-S.C.A. CONST. AMEND 5TH/ ALSO V.T.C.C.P. ART. 1.10. GROUND THREE; INEFFECTIVE ASSISTANCE OF COUNSEL FOR NOT OBJECTING TO MISJOINDER OF TWO DISTINCT OFFENSES IN THE SAME INDICTMENT. COUNSEL DID NOT FILE PRETRIAL MOTIONS/ NOR OBJECT DURING TRIAL TO MISJOINDER OF OFFENSES THEREBY EFFECTING THE OUTCOME OF TRIAL/ SUCH OBJECTIONS WOULD HAVE RESUffiED IN DIFFERENT OUTCOME. GROUND FOUR; INEFFECTIVE OF COUNSEL; COUNSEL'S FAILURE TO FILE MOTION TO QUASH AFFIDAVIT AND INFORMATION THAT WAS UNSIGNED, HENCE/ PROSE CUTION COMMENCED UPON THESSTRENTGH OF AWUNSIGNED INFORMATION. GROUND FIVE; ineffective ASSISTANCE OF COUNSEL FOR NOT FILING MOTION FOR CHANGE OF VENUE IN HIGH PROFILE CRIMINAL PROSECUTION IN ACCORDANCE WITH V.T.C.C.P. ART.31.03/ WAIVER BY ATTORNEY PROCEDURALLY DEFAULTED PETITIONER'S RIGHT TO R'aSEiSE CLAIM FOR APPELLATE REVIEW. GROUND SIX: TRIAL JUDGE ABUSED HER DISCRETION BY NOT ORDERING CHANGE OF VENUE AFTER IT BECAME IMPeSSIBEE.TO SEAT A JURY THAT WAS UNBAISED IN HIGH PROFILE CASE. GROUND SEVEN; INEFFECTIVE ASSISTANCE OF COUNSEL: COUNSEL ABANDONED PETITIONER/ ACTING AS NO COUNSEL AT ALL/ MERELY FRIEND OF COURT. VIII. GROUNDS FOR REVIEW CONT: GROUND EIGHT: PAGE NO, PETITIONER'S COUNSEL FOR DIRECT APPEAL FRED JIMINEZ COMMITTED INEFFECTIVE ASSISTANCE OF COUNSEL BY PLACING A FRAUD BEFORE THE COURT BY FILING FRIVOLOUS BRIEF, FOR SUCH ACTION WERE MOTIVATED BY POLITICAL ASPIRATIONS AND NEPOTISM/ AND THE HIGHiEjeOSSltEE NATURE OF THE CASE. THE COURT ASSIGNED STEPHEN W. BYRNESAS APPEAL ATTORNEY/ RENDERING FRED JIMINEZ'S BRIEF MDOTi BY OPERTION OF LAW. STEPHEN W. BYRNE FORCED INDIGENT PETITIONER TO FILE PRO/SE BRIEF WHO IS NOT EDUCATED IN THE LAW. GROUND NINE: PETITIONER'S COUNSEL RENDERED INEFFECTIVE ASSISTANCE OF COUNSEL FOR NOT RAISING AN AFFIRMATIVE DEFENSE OF TEMPORARY INSANITY/ AFTER ATTORNEY MADE QUESTION REGARDING PETITIONER'S MENTAL STATE AT THE TIME OF OFFENSE. IX". COMES NOW/ JOSES GONZALESIIII / HEREINSTYLED, PETITIONER/ FILES.; THIS PETITION FOR DISCRETIONARY REVIEW IN ACCORDANCE WI^H TEXAS RULES-^sAPPELLATE PROCEDURE RULE«68. TO WIT: ARGUMENT GROUND ONE: TRIAL COURT ERRED IN ALLOWING PETITONER TO BE TRIED I=N SHACKLES IN VIOLATION OF U.S.C-A. CONST. AMENDS 6TH & 14TH. TRIAL COURT INFRINGED UPON PETITIONER'S PERSUMPTION OF INNOCENCE/ AND HIS RIGHT TO COUNSEL. INEFFECTIVE aSSlSTAHGE OF COHNSBIL FOR OBJECTING TO PETITIONER BEING SHACKLED AND THEREBY PROGEDURALLY DEFAULTING PETITtlONESFSSCCAIHa- Petitioner contends the trial court abused its discretion in requi ring Petitioner to wear shackles during trial/ and the wearing of shackles was not harmless. (RR.Vol.3/ Pg.l26/Line 3-13). From this colloquy between the court and the Petitioner ^estEaihtsr.as articulated by the court line 8, does not justify shackling of the Petitioner. The Court of Criminal' Appeals has repeatedly critized Nueces County Courts for rountinely shackling defendants without articulating a need for restraints. Criminal Law Keynote-637-2: Grounds and circumstances affecting the use of restraints in general. Essential State interest justifying shackling a defendant is found where there is a danger of escape or injury to the jury/ counsel/ or other trial participants. U.S. V- Banegas/ 600 F.3d 342. Criminal Law Keynote-637.2: Rountine shackling oi'defendants is prohibited. Bell v. Stated 356bS.W.3d 528/ rehearing overruled. (Tex-App.Houston[14th Dist.]2008).Generally a defen dant has right to be tried without being shackled/ whether or not the shackles are visible - to the jury? however/the trial r<s&U-r:t has discretion to order restriants if there is a ^showing of a manifest need or execep- tional circumstances/ such as-when a defendant poses a threat to himself or others, yglesias v. State/ 252 S.W.Sd 733/ PDR rev. refd (Tex.App. Houstonv[14th Dist.] 2007). Requiring a defendant to be tried in shackles without adequate reasons is repugnant to iire spirit of r.the law and ideas of justice whether those restriants visiblecor unseen-Grayson v.viState/ 19225.W. 3d 790/ also see/ Mendoza v. State/ 1 S.W.3d 829 (Tex.App.-Corpus Christi 1999)(Reversed Aug.31/1999). The Court of Criminal Appeals admoni shed Nueces County Courts for rountinely shackling defendants. Peitioner was "required to stand every time the jury exited or entered the courtroom as well as move to a different courtroom for furthdfvior dire. Said restri- 1. ARGUMENTS CONT: ^ants were visible to the jurors.. See Vol ^3 .pg. 126. The Petitioner was denied the persuiaptibn of innocence and every aspect of due process under the U.S. Const.14th Amend/ 6th Amends/ Equal Protection Clause. Ineffective Assistance of Gounseli To Wit: Because Petitioner's counsel did not object to petitioner being shackled/ said counsel procedurally defaulted said claim for purpose of appellate review and such deficient performance prejudiced the out come and because of this act and ommission there is a probability that the outcome would have been different. Shackling of•Petitioner without a demonstrative need compromised the formal dignity of the court and judicial proceedings and lead to harmful collateral effects- Such eff'ects cheifly included curtailing Petitioner's ability to communicate: freely v/with counsel because of the physical limi tations imposed by shackles and simply the distraction and embarrasment they caused the Petitioner. See/ United State/ v. Durham/ 287 F-3d 1297/ 1304 <llth Gir.2002) ("Even if the [shackles] placed on the defendant are visible to the jury/ they still - may... confuse the defendant/ impair his . ability to confer with counsel/ and significantly affected the trial strategy he choose to follow.") . Petitioner's attorney made the follow ing statement to the prospective jurors that tainted the whole trial process: I frankly/ rprobably will not be spending any'tiffie'-qiaeStioning that type of evidence because as I told you right from the get go/ Jose is in fact guilty of criminal homicide/ the question is what sort of criminal hombcide is he in fact guilty of? See/ (Vol.3/pg.147/4-9). Because Petitioner was shackled he did not approve of such trial strategy/ whie^imade the trial process unfair and confused Petitioner/ and impaired , his ability to communicate/ and significantly effected the trial strategy/ wherein Petitioner was not informed of such trial strategy. Petitioner believed that temporary insanity would be the trial strategy and course his attorney would take. It appears that attorney's error for not object ing to shackling/ along with the attorney's anprofessional error that believing that Petitioner was guilty and shackling implied dangerousness in the jurries mind/ serverly infringed on Petitioners persumption of innocence/ was defificent performance that reasonable effected the out come ofcthe case. Petitioner was made to stand for the jury on numerous occassions/ not only were the shackles visible/ but because of the movement/ the chains were heard byithe jurors. In such a high profile trial/ here the errors originated from the trial court's saa sponte order/ and trial court's reason for shackling the Petitioner are insufficient as a matter of law. See/ Garcia v. State/ 919 S.W.2d 370,381 (Tex.Crim.App.- 1994). Because of errors appearing in the record PDR should be granted. 2. GROUND TWO: THE STATE COMMITTED DOUBLE JEOPARDY WHEN IT PROSECUTED PETITIONER FORMMUETIEEE BURGLARIOUS ENTRIES WHERE THERE WASOONEY (1) UNLAWFUL ENTRY. IN VIOLATION OF TEXAS CONST. ARTICE 1§14 AND U.S.C-A- CONST- AMEND. 5th AND V.T.C.C.P. ARTICLE 1.10. TO WIT: Petitioner was convicted in a single trial and given multiple punishments for the same conduct/ thereby invoking the jeopardy clause in the P»S. Const. & the Texas Const. Petitioner was charged by indictment in Count I with coniitting Murder in the course of a Burglary of a Habitation, and in Count II/ Burglary of a Habitation with Intent to Commit Aggravated Assault or a Felony- In Art- 1.10 V.T.C.C.P. States: No person for the same offense shall twice be put inr jeopardyief life-be it-b©rtyf snor shall a person be again put upon for trial for the same offense; after a verdict of not guilty in court of competent jurisdiction. The rule is a State may notpplace a defendant in doiable jeopardy; U.S. Const. V; Tex. Const. Art. I§14; Benton v. Maryland/ 395 U.S. 781 (1969). This means the State may not:. :.(1) prosecute a. defendant fGrvthd same offense after an acquittal; and (2) prosecute a defendant for the same offense after a conviction; or (3) obtain multiple punishments in a single trial for the same offense- Illinios v. Vitale/ 477 U.S. 410 (1980); Brown v. Ohio, 432 U.S- 161 (197? 7). What we are concerned here is; "that Count I for Capital Murder is predicated on a burglarious entry in order to be upgraded to Capital Mureder- See, Tex. Penal Code § 19.03. Count 11, under Penal Code § 30.02 Burglary of a Habitation intent to Commit Aggravated Assault or a Felony- The "same elements" test found in Blockburger v. U.S., 284 U.S. 299 (19- 32) questions whether the State is attempting to punish the defendant twice for the same offense- This test asks the Court to examine each of the statutes to determine whether each require a proof of:apdifferent element the other does not- The Court abandoned the "Same ebsdaet" test by overrulling Grady v. Corbin, 495 U.S. 508 (1990), in U.S. v. Dixon, 509 U.S. 688 (1993) . But in double jeopardy/mCiitiple punishment claims, Blockburger is not the solo focus- Ervin v. State$?991 S.W.2d 804,814 (Tex.Ceim.App.1999)- .IfIthe Court has actual legislative intent of the two statutes, that intent is the critical factor- If not then look at Girdy V. State/ 213 S.W.3d 315/319 (Tex.Crim.App.2006)(if the prosecution, in proving one element of one offense, also necessarily proves another charged offense; if so, there must be clear legislative intent to punish the offense seperately or multiple punishments are barred.) 3. GROUND TWO CONT: The allowable unit of prosecution is the individual entry for burglary is • not the number of individual crimes committed once the defendant makes the unlawful entry. Ex parte Gavazos* 203 S.W.3d 333 (Tex.Grim.- App.2006). Vaughn v. State/ 239 S.W.3d 351 (Tex.App.-San Antonio 2007). Here we have Petitioner sentenced to multiple punishments for one un lawful entry. See/ Ex parte Castillo/ 432 S.W.Sd 457 (Tex-Crim.App.-San Antonio 2014/ no petih; iDouble Jeopardy Keynote-4: Double jeopardy clause impose few/ if any/ limitations on the legislative power to esta blish and define the offense. U.S.C.A. Const.5th Amend. Double Jeopardy Keynbte-144: Convictions for Capital Murder during the course of commit ting Burglary of a Habitation/ and Burglary of a HabitatlgnrrinfefeBt to eommxt a Felony (Aggravated Assault) violated double jeopardy clause; even thou there were two victims/ the alloable unit of prosecution was the unlawful entry. Not the complainant/ and the defendant was punished multiple times' for a single entry. U.S.C.fiA 5; V.T.C.A. Pen. Code § 30.02 Ca). Double Jeopardy Kefnded-r32.1: Thie "most serious offense" which is retained when convictions violate double jeopardy clause is the offense of conviction which the greatest sentence was assessed; other::£getors such as the degree of the felony, range of punishment, and rules govern ing parole eligibility and awarding of good-conduct time/ are not consi derations; overrulfling Landers v- State/ 957 S.W-2d 58/ U.S.C-A. Amend 5. 'h The issue before us is convicting Petitioner of two burglarious entries each with a different complainant but arising from a single unlawful en try of a habitation constitute double jeopardy? The prosecutions theory in the charging instrument that Petitioner committed Capital Murder in the course of committing Burglary of a Habitation in Count:!. The pre requisite of felony murder upgraded to capital ..murder is outlined in V.T.- G-A. Penal Code § 19.03 (a)(2). Wherefore without the burglarious entry '"I Petitioner could only be convicted murder as defined. The integral part of the conviction in Count I is the burglary of a habitation- It was established at trial/ that Petitoner kicked in the front door/ shot/at:: Vidal Rodriguez/ then proceeded to the back bedroom and shot his estranged wife-multiple times. See, (RR.Vol.4/pg.11-17. The theory of the indictment differed from the theory at trial. Wherein the capital murder was placed in a stratigic position of appearing first/ when in fact it was the-' result of Count II/ Burglary of a Habitation intent to commit a Felony (Aggravated Assault). Burglary of a Habitation is complete once the unlawful entry is made, without regard tb whether the intended theft or felony is also completed. V.T.C-A. Penal Code § 30.02 (a)$2)/ V.T.C.A. i ! 4. GROUND TWO CONT: § 22.02 Aggravated Assault (1) Causes serious bodily injury to another, including the person's spouse; or (2) Uses or exhibits a deadly weapon during the commission of the assault and causes serious bodily injury to a person whose relationship to or association with the defendant is described by by Sections 71.003/ 71.0021 (b)/ 71.005 (b), an offense under this statute is a felony of the second degreeif; (to end of statute)- The allowable unit of prosecution for assaultive offense is each complian- ant. See, Phillips v. State, 787 S.W.2d 391^95(Tex.Crim.App.(1990)(Assault) Ex parte Rathnell, 717 S.W.2d 33 ,36 (Tex. Grim. App .1986) (VoltiintaEy/Manslaugh ter) . Burglary, however is not an assaultive offense; rather, its place ment within Title 2 indicates that the legislature determined burglary to be crime against property. Thus the complainant is not the allowable Vinit-of prosecution in burglary, rather, the allowable unit of prosecution is the unlawful entry. When a defendant is convicted of two or more offense- s that are the "same" for double-jeporady purposes, our case law tells us that the conviction for the most serious offense is retained and the other conviction is set aside. See, Landers v. State, 957 S.W.2d 558/5S9— 60 (Tex.Grim.App.1997). Landers statesr^that the ^ni©st?sgf:ious" offense is determined by the degree of the felony range of punishment and sentence imposed. Landers is overruled by Ex parte Cavazos'. The third reason applies some what differently to the double-jeopardy ebntext than the misjionder context, we.fashioned a rule'designed to best ascertain what offense the State would elected to proceed upon upon at the time of trial. We did so because, in the misjionder context the State is not permitted to prosecute both offenses at the same time. Hence our evaluation of the seriousness of the offense coming into play only when the cahgejof punish ment and the degree of the offense being the same- It is this very rea son why Petitioner need competent legal counsel, for the complexity of such issue. Petitioner's counsel acted as No Counsel at All! We shall visit the misjionder doctrine in our next point of error. For the record reflects that double jeopardy has appeared from the record, to the degree that both sentences are equal in respect that Petitioner was sentenced to life on both Counts, and the Court has ruled in Gavazos, 203 S^W-3d 333 (Tex-Crim-2006)- The most serious offense retained.-In this case both sentences are equal, thereby jeopardy nullifying both- There being jeo pardy appearing from the record, said convictions should be remanded and aggHi^tal?/ or in lieu with instructions. See also. Ex parte Castillo/ 432 S.W.3d 457 (Tex.App.-San Antonio 2014, no pet. h.). 5. GROUND THREE: INEFFECTIVE ASSISTANCE OF COUNSEL FOR NOT OBJECTING TO MISJIONDER OF TWO DISTINCT OFFENSES IN THE SAME INDICTMENT. COUNSEL DID NOT FILE PRETRIAL MOTION NOR OBJECT DURING TRIAL TO MISJOINDER OF OFFENSES THEREBY EFFECTING THE OUTCOME OF TRIAL. SUCH OBJECTION WOULD HAVE RESULTED IN A DIFFERENT OUTCOME. Criminal Law Keynote-620(3): Mandatory serverance of offenses only applies to joinder of property offenses. V.T.C.A. Penal Code § 3.06(a). Indictment and Information Keynote-127: State is prevented in the presence of objection/ from alleging more than one non-property offense in a single indictment/ regardless of the number of transactions involved. V.T.C-C-P. Art.21.24. Indictment and Information-Reynote-127/129 (1): For State to avoid joinder problems/ indictment for non-property offenses/ whether arising from one transaction or seperate transactions/ should contain only one Count in as many paragraphs as are necessary to allege various manner and means of committing the one alleged offense. V.T.C.C.P • ;\ART. 21.24 (a). Indictment and Information Keynote-196(7): To avail himself of pleading limitations with respect to non-property offenses, defendant should file pretrial motion to quash indictment orrurge/ sometime during trial/ that State make an election; failure to object will result in waiver of plead ing requirements. V-A.T.C.C.P- art- 21.24. Indictment and Information Keyn©te-127: Indictment was invalid on basis of misjoinder where indictment alleged more than r.pne:: rionproperty offense and property offense- INEFFECTIVE ASSISTANCE OF COUNSEL petitioner's counsel not filing Motion to Sever offenses/ nor Motion to Elect/ nor Objecting to misjionder/ resulted in Petitioner's claims to be procedurally defaulted for purposes of appellate reviex^. Prejudiced the outcome of the trial/ resulted in the convictions for two offenses for the same transaction which resulted In two life sentences- Because of counsels deficient performance thereri-s treasonable probability that the outca>!he would have been different- Such ommissions by the Petitioner's counsel gave the State a-tactical advantage over Petitioner/ which resul ted in the trial being unfair and biasd jury. U-S.C.A- Const- Amend- 6 & 14 Counsel's failure to file pretrial motion to quash/ or object was far "below the range expected of reasonable/ professional competent assistance of counsel." Counsel's performance thiis/ "did not measure up to the stan dard required in the holding in StricMand/v466 U.S. 688(1984), and [if it had/] there is a reasonable probability that the results would have been different in the sentencing phase." 6. GROUND THREE CONT: Under the applicable State prcedures there would have been an election, and Petitioner would not have to face two offenses under the same jury. Turning to the prejudice issue: Counsel Abandoned His Client; The manda tory severance under §3.04 (a), applies to joinder of property offenses listed under Title 7 of the Penal Code. See/ Waythe v. State/ 533 S.W.2d 849 iiTex.Criin-App.1976) - Capital Murder is not a property offense. It is listed as an offense against the person, under Title Eive of the Penal Code. V.T.C.A. Penal Coddoig.03.. However , the right iso-foeeesaTi election# which follows from implicit statutory restrictions relating to the manner in which non-property offenses may be joined in an indictment/ is support- edbby precedent# it holds that the legilature/ by its amendment of art. 21i24 / has implicitly prevented the State::fromiiailegiagv. in a. single indictment two or more nonproperty offenses if those offenses arose out of the same criminal "incident/ act or transaction'."" Generally/"transac tion" has come to mean a criminal event and the various paetieulaf offenses committed within that event. See, Drake/ supra/ at pp.945-49/ (Petitioner's original Brief and Appendix pg.l6). Thereby counsel abandoning his client in a^critical stage of the proceeding resulted in inadequacy of representa tion. fhere being ineffective assistance of counsel appearing from the record/ said cause should be reversed and remanded with instructions. INEFFECTIVE ASSISTANCE OF COUNSEL: COUNSEL'S FAILURE TO FILE MOTION TO QUASH AFFIDAVIT AND INFORMATION THAT WAS UNSIGNED; HENCE PROSECUTION COMMENCED UPON THE STRENGTH OF AN UNSIGNED INFORMATION. GROUND FOUR: TO V3ITi Petitioner's attorney failed to file motion to qaush the Information that does not have signature on it. We are left with the proposition that the case proceeded to a conconclusion with a documentation in the file to reflect that Mark Skurka or anyone else signed the Information charging Petitioner with an offense a further jurisdictional defect of itself. See, Holly v.State//i469 S.W.2d 136 ,137 (Tex .Crim.App. 1970) . See/ Exhibit "A" Pet- Appelate Brief). T-C-C-P- art- 21.21(a)/ Lacy V-State/ 160 Tex. Crim. 95/ 267 S'^;]W-2d 139/141(1948)- Because Petitoner is in need of aJity. at every stage of the proceeding it is emphasized here that attorney's knowledge and skill of the law and practices of the criminal trial and proceedings. Criminal Law Keynote-641.13(2): Performance of defense coun sel was not only unconstitutional unreasonable and ineffective, but coun sel abandoned required duty, of loyalty to his client; Counsel he acted with reckless disregard -for his client's best interest and at times, appearantl^ to weaken his client's case. Just simply poor strategic choices. U-S-C-A- 7. GROUND FOUR CONT: Const- Amend- 6th- It is emphasized that a "defendant need not show that counsel's deficient conduct more than likely altered the outcome of the case." Instead the defendant bears the burden of showing "that there is reasonable probability that/ but for counsel's unprofessional errors, the results of the proceeding^-/would have come /out different. A reasonable probability sufficient to, undermine, confidence in the outcome." Id-/ 694/ 104 S-Ct- at 2068/ T-C-C-P- art-1.14 Waiver of Rights: Punishing a lawyer's intentional and unintentional errors by closing the courthouse door to his client is both senseless and misdirected method of deterring the slight of State rules. It is senseless because unplanned and unintentional action action of any kind generally is not;, subject to deterrance; and to the extent that it is hoped that a; threatend sanction addressed to the defense induce greater care and caution on the part of trial lawyers, thereby forestalling negligent conduct and errors The potential loss of valuable State remedies would be sufficient to this end. And it is misdirected sanction because even if penalization of incompetence or carelessness will enciourage more legal trianing and trial. preparation / the Petitioner / \as oppossed to his lawyer, hardly is the proper recipient of such a penalty. Espicially with fundamental constitutional rights at stake, no fictional relationship of principal-agent or the like can justify holdingthe crimi nal defendant accountable for the naked errorscg^ his attorney. This is espicially true when so many indigent defendants are without any realistic choice in selecting who ultimately represents them at trial. Indeed, if responsibilty for error must be apportioned between the parties, it is the State through its attorney's admissions and certifications policies, that is more fairly held to blame for the fact that practicing lawyers too often are ill-equipped to act carefully and knowledgeably when faced with decisions governed by State procedural requirements. Hence, Petitioner agrees with the proper functioning of our system of criminal justice, necessarily places a heavy reliance on the professionalism and the judgment of trial attorneys. A system that ascribes absolute forefiture of Petition er's constitutional claim where his lawyer manifestly excercise no pro fessional judgment at ail-where carelessness, mistakes, or ignorance is the explanation of the procedural defaults. It is regrettable that certain errors/.that might have been cured earlier had trial counsel acted expediti- ously, must be corrected collaterally and belatedly. Hence, Petitioner s attorney was was deficient and such deficient conduct prejudiced the outcome of the trial. Because of attorney's acts and ommissions said cause should be reversed and remand with instructions- 8. GROUND FIVE: INEFFECTIVE ASSISTANCE OF COUNSEL FOR NOT FILING MOTION FOR CHANGE OF VENUE IN HIGH PROFILE CRIMINAL PROSECUTION IN ACCORDANCE WITH V-A-T-C-C-P. ART- 31.03. SAID WAIVER BY ATT0RNEY:EEFSUL"TED PETITIONER' S RIGHT TO RAISE GROUND FOR APPELLATE REVIEW. Petitioner complains that deficient perforraace by attorney defaulted his claim for appellate review, and prejudiced the outcome of trial. Petitioner an Alice police officer was the subject of extensive media coverage in the County and surrounding Counties wherein the instant offense took place. Furthermore/ the Internet and Social Media followed said case. Petitoner was the subject of a documentary/ wherein a series of local television stations broadcast the sventsrand circumstances surrounding the case. See/ (App- Brief Bxh3)li>it "G"). Under art. 31.03 (a)/ a change of venue may be granted in a felony ©r5at.misdemeanor case punish able by confinement on the written motion of the defendant. There was a dangerous combination against him instituted by very influential persons/ by reason of which he canot expect a fair trial. Said publicity was per vasive/ prejudicial/ and inflammatory. Here we aiee concerned with the attorney not filing motion for change of venue/ after it became apperant that Petitioner could not recieye a fair and impartial trial/ and if atorney's deficient performace prejudiced Petitioner? The court asked the panel anyone knows about the case? (RR'iVol .2/pg.30/ line:6-23) Over 70 jurors raised their hands who had:personal knowledge of the case- In VoJ'.2# pg.30/ line: 23S25.) 27 people had already made up their minds could not be fair and impartial. In (RR.Vol.2/ pg-58/1-25/pg.59/1-25 & pg.60/1-25)/ juror no.2 explains in detail about the coverage in the Callei Times. She describes the kidnapping of Petitioner's son/ wherein she has formed an opinion as to the violence of the case. Also defense attorney Woener Stated: "he never seen so many people who have made their minds up in a case/ even with more publicity. fVol.2/pg.56/23-24). Defense counsel should immeadiately filed a Motion for Change of Venues Kealizing from the percentage of potential jurors that had already formed an opinion about the guilt of the Petitioner/ that his elient could not recieve a fair an impartial trial, "a defendant must show an ability to obtain a fair an impartial trial." Coupled with counsel's disenchanment Petitioner could not have recieved a fair and impartial trial because defense counsel a'lready given up. See/ Williams v- State, 897 S.W-2d 351 {Tex-CriM*App.^ cert, denied/ 516 U.S. 946, 116 S.Ct.385, 133 L.Ed.2d 307 (1995). To 9. GROUND FIVE CONT: •gastify a change of venue based on reGen.tfarid'significant ^amounts of media coverage and that publicity regarding similar cases had the effect of creating greater prejudice/ bringing "some afore-thought to people' and making it "very hard" to find a fair and impartial jury. Petitioner's attorney could, have called upon a number of potential witnessesa that were listed on the prosecution's witness Irist for this eventuality. The , prosecution was prepared to fight a'change of venue motion/ witnesses from several television stations/ newspapers/ and other social media outlets were prepared to testify to the number of potential jurors exposed to these segments. See/ (Appellants Brief Exhibit "C"). Petitioner's attorney could have produced the requisite affidavits need to bolster his Client's positior See/ (C.R. pg-30/32/ and 43). Here you have .77 members of the array who have followed the case in the media, who have extensive knowledge of the case, including kidnapping of Petitioner's son/ (ah offense he was not on trial for), which further excebarrated the coverage and the amount of times this coverage was repeated in a course of a year was-astronomlcal- Therefore, even after the court conducted its vlbr.dire, it was clear from the record that the trial court tried to rehabilitate the remainder of this poisoned panel, we must also bear in mind, that the court was in a unique position of hearing the testimony of the .jurors and guaglng the. siacerity of ,their responses in light of the publicity about the case. Petitioner was entitled to a change of venue if he could show that the there;.was influences in the commiiiity which could affect answers on the vior dire. There are two things that distinguish this case from others in which a majority of the venire is familiar with- the case.. First the nature of the publicity is quite different because/ Petitioner was a police officer/ there was a buiglary/ a murder/ kidnapping/ an Amber alert went out/ there was a school lockdown/ there was a Swat-standoff/hostage situation. NewsrStationsrreport ed widely and did extensive coverage on the day of the offense/ and for a year after until the date of trial. Potential jurors had the oppertunity to watch it unfold. Second/ a large number of potential jurors could not set- aside their opinion. This strongly indicates that pretrial publicity result ed in actual identifiable prejudice to Petitioner. Also media coverage was not accurate and objective/ because it reported an actual kidnapp were there was none. Because Petitioner's attorney not filing the motion for change of venue, it rendered him deficient in his performance/ and because of -the ommission/ it is a probability that the outcome of the trial would have been different. It must be remembered that the court ordered a Gag Order on the case. See, (CR.pg.30). Here we have the acts and ommisssions 10. GROUNDdFIVE CONT: of said attorney / who effectively abandoned his his Client. Said cause should be reversed and remanded. GROUND SIX: TRIAL JUDGE ABUSED HER DISCRETION BY NOT ORDERING A CHANGE OF VENUE AFTER IT BECAME IMPOSSIBLE TO SBAffiCMJURYVTHIST WASiiHNBTASDCiNi'HIGH PROFILE CASE. In change of venue cases; T.C.C.P. art.31.01/ the trial judge should have filed her own motion to change venue after the vior dire revealed that Petitioner could not recieve a fair and impartial trial. Because the jury that was actually seated was tainted by the rest of the array, along with the fact that this case was tried in the media before the actual jury was pooled. The Sixth Amendment gives the Petitoner the right to, a fair and impartial trial/ it is the presiding judge who condu cts the vior dire. It was impossible to seat a- jury in this high profile, media driven trial, trial judge abused her discretion. The large number of venire panelist were disqualified for cause, because they could not not set aside their opinions of the. Petiioner's guilts See, (RR-vol.2/pg. 30/9,22/ & pg.31/13-25). See/ 14th Amend U.S. Const. Also/ V.T-C.C.P. art. 31.03 (a)/ Mayola v. Alabama/ 623 F.2d 992/ 998 (5th Cir.l980)/ Von Byrd v. State/ 569 S.W-2d 883/ 890-91/ Russel v. State/ $46 S-W.3d 705/714 (Tex,4App.Texarkana 2004) pet. ref d) / Crawfeord V. State, 685 S.W-2d 343/ 349-r350. The number of jurors that were unable to serve on the jury in this case demonstrates the extent of the pretrial publicity had permeated the community. Here out of 100 a large percentage more than %could be- impag/ tial and already formed their opinions. See, (RR.Vol.2/pg.31/22-25). These panelist could not set aside their opionions is reasn enough to consider the entire community 'infected" by the pretrial publicity and prejudice. Thp inflammatory atmosphere and those actually seated were polsioned by the others. For this reason said cause should be reversed and remanded, and said former trial judge should be taken on vior dire for her acts and ommissions. GROUND SEVEN: INEFFECTIVE ASSISTANCE OF COUNSEL FOR ABANDONING PETITIONER ACTED AS NO COUNSEL AT ALL: ACTING AS MERE FRIEND OF COURT. Said counsel abandoned his Client at critical stage of the proceedings. In the toality of representation by defense counsels', Mr. Mark Woerner, Mr. Steve Schiwetz, and Mr. Mark Gonzales abandoned their client. Mr. Woerner at the orjset of trial was not concerned about shackling of Client, nor did any othei: attorney object- Furthermore, Mr. Woerner told the 11. GROUND SEVEN CONT: that his client was guilty, which nullified any defense in regard to Count II/ and resulted in the jury bein^ biased. A strategy the Petitioner did not approve of/ nor able to communicate his disbelief about such remarks that infringed upon his persumption of innocence, the Supreme Court has longed recgonized that 'the right to counsel is the right to effective assistance of counsel'" under the Sixth Amendment/ Strickland v. Washington 466 D.S. 688 (1984); In this case, We find that the defease counsel did not put up any meaningful defense during the punishment phase/ nor file any,pretrial motion that Petitioner was never convicted of any felony in this State or any other State/ See, V.T.C.C.P. art.42-12(d)(8)(c) states: A defendant is eligible for community supervision under this section only if before the. trial begins the defendant files a sworn ai6£i6ft"to the judge that the defedant has not been previously convicted of a felony in this or any other state/ and the jury enter in the verdict a finding that the infor mation is true. See, (RR.Vol.2/pga9/l-I7). Because of the forceful argument by State's attorney Mr. McCaig that Petitioner was not eligible for proba tion/ Petitioner's attorney should have researched further in the same code to ascertain that Petitioner was eligible for probation. Furthermore/ counsel did not reasonably argue on his client's behalf during punishment phase/ espicially in regard to Count II. See/ (RR.Vol.5.pg.126/3-13). Furthe -more/ defense counsel failed to investigate the extensive media coverage/ Television Documentary which featured Petitioner in family violence^ failed to adequately prepare a defense/ nor subject the State's case to the advesa rial testing process/ by having fellow police officer's who were having illicit affairs with his wife there to testify. Nor did he interview them/ nor have them appear before the court/ Officers Noe Roel/ Emede Reyes/ Buzz esparza/ Luis Rene Ozuna/ and Frank Estrada. Defense Counsel did produce phone records.-See/ petitioner's appeal brief Exhibit "14-16"). That was the extent of the preperatxon:for..the capital murder trial. Eortheraore/ although court ordered physcological testing of the Petitioner/ there was no report by the psychologist included in the record/ nor was he called to testify as to the Petitioner's mental state at the time of offense. Once the attorney told the jury his client was guilty/ he was wholly unprepared to make a platable defense of his theory/ and effectively undermined the persumption of innocence in Count I and Count II. This was no defense at all/ but a tactical retreat/ and pure abandoment of his client. Even grant ing deference to counsel's choices/- we cannot conclude that he need-not undertake further investigation/ "before proceeding with an argument he was wholly unprepared to make. Burger/ 107 S.Ct. at 3126. The Court should find elSarly established that Petitioner's counsels' so abandoned their "overarching duty to advocate the Petioneir's cause/ that the State proceed- 10 GROUND SEVEN CONT: -ing were almost non-adversarial. Informing the jury that his client was guilty/ permeated that guilt thru both counts and destroyed any persumption of innocence f or Gccurit: II - Counsel's actions in regard to sentencing in Count II even more clearly indicate the abandonment of his duty of loyalty/ by switching -from the jury to sentence/ to judge/ and failed to put on any mitigating factors/ and failed to advo cate his client's position. The most striking indication of counsel's performance and failure to fufill his duty of loyalty to his client is from his behavior at the t r i a l itself. "Counsel at the summation of the trial / counsel reffered to the difficulty his client had presented to him. See, (RR.vol.5.pg.99 / line 20-25/ Pg.lOOllilne 1-20) . Counsel is in fact telling the jury he could not present any mitigating eirCQmstances/ when evidence against his client is so overwhelming. In closing counsel lamenated : (RR.Vol.5/pg.102/13-16). Petitioner's attorney did not simply make poor choices; he acted with reckless disregard for his client's case. Whatever the reason the record supports that counsel turned against his client. There is no apperent reason for counseil's behavior/ although he repeated many times that his client was guilty and how difficult this case was. This conflict in loyalty unquestionably affected his represen tation. A defense attorney who abandons his duty of loyalty to his client and effctively helps the State in an effort to obtain a conviction suffers from an obivious conflict of interest^ Sich an attorney/-like unwanted counsel/ ''represent' the defendant only through a legal fiction." See/ Faretta v. California/ 422 D-S- 806#821 (1975). In fact an attorney is burdened by a conflict between his client's interest and his own sympa thies to the prosecution's position is considerably worse than an attorney with loyalty to other defendants/ because the interests of the State and the defedant are necessarily in opposition. As the Supreme Court has assereted: "The right to effective assitance of counsel M thus the right of the accused to require the prosecution's to survive the crucible of meaniningfuii adversarial testing. . . [i]f the process losses its character as confrontation between adversaries/ the constitutional guarantee is violated." See# Cronic# 466 U.S. at 656-57. Petitioner urges the Court/ that reversable error has appeared from the record because of sadd coun sel's deficient performance that prejudiced the outcome of the trial. Said cause should be reversed and remanded. Ground Eight: S>fiT!DafM®^R;';S counsel for direct appeal FRED JIMINEZ COMMITTED lENEFFEC- ASSISTANCE OF COUNSEL BY BLACING A FRAUD BEFORE THE COURT BY FILING 1 3. GROUND EIGHT CONT: FRIVOLOUS BRIEF, FOR SUCH ACTIONS MOTIVATED BY POLITICAL ASPIRATIONS^ NEPOTISM/ AND THE HIGH PROFILE NATURE OF THE CASE. THE COURT ASSIGNED STEPHEN W. BYRNE AS APPEAL ATTORNEY/ RENDERING FRED JIMINEZ'S BRIEF MOOT BY OPERATION OF LAW. STEPHEN W. BYRNE FORCED INDIGENT PETITIONER TO FILE PRO/SE BRIEF WHO IS NOT EDUCATED IN THE LAW- Erejudice/ whether necessary or not/ is established under any applicable standard. Petitioner was.charged with several crimes/ the State assi^^edf counsel Fred Jiminez to represent him on his direct review of convictions. Fred Jiminez's wife was the District attorney for Nueces County/ (Anna Jiminez)/ whose office prosecuted the Petitioner. Becausg -of the conflict of interest ,.iand the high profile nature of the case, said attorney filed a frivolous v, brief/ knowing well that Petitioner's case was filled with meritorious claims. Such insidious intent is demonstrated by the fraudulent document foisted upon the Court as an Anders brief. Because of the political aspirations of Attorney's wife and the high profile nature of'.: the case/ who was at the time of the filing of brief embattled with the State over corruption charges while she was in office/ said attorney did not bring his legal-skill and knowledge to bear. Petitioner would have succeeded . Because Stephen W.. "Brynd was the counsel chosen to repla ce Fred Jiminez / because the court was not satisfied with Fred .jiminez's representation. -The purpose of the SiuxaarAiriend guarantee: is to insure that defendants are represented by counsel and not have to face lybrinth of the criminal justice system unawares. Judicial scrutiny of cioxttk®!''^ performance must be differential (highly)^ Petitioner urges the Court because -the record was fully developed/ Petitioner should be allowed to proceed with ineffective assistance of counsel claims as postulated by the opinion in Trevino v. Thaler/569 U.S._(2013)(citation ommitted). Because of the con flict of interest (See/ Exhibit "D" Appellate Brief)/ and attorneys abandon ing etitioner there is a probability that the outcome would have been different. Because revers.ible error has appeaared in the record,/ Petitione urges the Court to allow him to take said attorneys on vior dire to further develop the record/ as well as reverse and remand said cause. . GROUND NINE: PETIiETIONER' S COUNSEL RENDERED INEFFECTIVE ASSISTANCE OF COUNSEL FOR NOT RAISING AN AFFIRMATIVE DEFENSE OF TEMPORARY INSANITY, AFTER ATTORNEY MADE QUESTION REGARDING PETITIONER'S MENTAL STATE AT THE TIME OF OFFENSE. Ciriminal Law Keynote-773: If evidence from any source raises the issue of insanity, the trial court must include an instruction on insanity defense in jury charge.V.A.A.C.P.art.46.03; V.T.C.A., Penal Code §8.01. u 14.' GROUND NINE CONT: When considered with the facts and circumstances concerning an accused and defense/ lay opinion testimony may be sufficient to raise the defense of insanity. V-T.C.A./ Penal Code § 8.01. During the trial on the merits/ Petitioner's counsel raised the issue of Petitioner's mental state that lead up to the commission of the offense. See/(RR.Vol.5/pg.99 line 25#pg. 100 line 1-2G).From the foregoing by Petitioner's counsel demonstrates that he was of the opinion that his client "snapped." Which is eln off color remark of insanity.Petitioner's attorney filed motion for psychological testing which was granted by the court. See/ (CR-pg48). It appears from the record that counsel was headed towards this defense/ then abandoned thi, defense/ even thou that was the agreement between Petitioner and attorney. Knowing that; Petitioner was a former Border patrol Agent/ got hurt on this assignment/ suffered from Post Iraumatic Stress snydrome from this assign ment. Also/ as an Alice Police Officer/ which greatly effected his physco- logical well being/ coupled with the fact that Petitioner's wife was having multiple affairs with Petitioner's co-workers who were Police Officers. Also/ the amount of stress that police officers' experience on a day to day level/ such amount of stress police officers' on a national level is well documented, and the amount of domestic violence involving officers' and members of the armed Forces in like situations. Petitioner's attorney was derilict in his duty for not preparing for this defense, soi if by moral insanity it be understood only a disorder or perverted state of affections or moral powers of the mind/ it cannot soon be disgarded as -affording any shelld from punishment for crime: if it can be truly said that one indulges in violent emotions/ such as remorse/ anger/ shame/ grief/ and the like is afflicted with homocidal insanity/ it would be diffucult/ yes/ impossible/ to say. where sanity ends/ and insanity begins* We say to you/ as a result of our refelections on this branch of the subject/ that if the prisoner was actuated by an irresistable inclination to kill/ and was unable to control or subjugate his intellect... he is entitled to acquittal. (|te Justice PaxsoH/ 88 PA.291/Jan.20/1879). What then is that form of diease/ Dominated Ho'irtocidal Mania/ which will excuse one for having committed a Murder? Cheif justice Gipson calls it that unseen ligament pressing on the mind and drawing it to the consequences which it under coecerion which/ while it results are clearly percieved-/ is incable of resistance-aii invisible inclination to kill. It was error for trial counsel not ask for instructione punishment stage of trial due to insanity/ furthermore/ Petitioner's attor ney and State's attorney Ms. Dorsey put the charge together/ so it was ineffective assitance of counsel that his attorney subjected his cl to such eregrious harm both great and apperant. Ex parte Duffy/ - / is:. Ground Nine Cont: S.W.2d 507 (T6x.Criin.App.1980) . This standard requires that the court evaluate complaint of;ineffective assistance at the punishment Stage deter mining first/ whether counsel was reasonably likely to render ineffective assistance of counsel/ and second/ whether counsel reasonabley rendered ineffective assistance. The record is replete with the litanies of the grave and fatal errors committed by counsel in this case- These errors jctp^ged by the totality of the repesentation / denied him a fair trial. Mer- ly showing that they had some conceivable effect on the proceedings is inadequate. Strickland/ 466 U.S. at 693. Petitioner urges the Court to rev.- said cause and remand with instructions . , CONCLUSION Petitioner would urge the Court/ that he falls under the narrow ruling in Trevino Th4ier/ wherein the record was fully developed and the errors of his attorney were plain and apperrant. Said trial was overwhelmed by media and public pressure/ which resulted in the impossibility to seat a fair and impartial jury^/Petitioner was forced to wear leg shackles during the entire trial with no demonstrative reason by trial judge/ and counsel did not even object/ because he was assisting the State in helping to obtain -a conviction - Counsel rendered ineffective assistance on numerous occasions/ destroying Petitioner's persumption of innocence when he decided to abandon the temporary insanity defense and just throw his client to the wovles. Petitioners appellate attorney completely missed the double jeopar dy issue/and affadavit and information not being signed, as well as was motivated by nepotism and other factors and filed a frivolous brief. From the numerous litanies and acts and ommissions of counsels' in this case.' Said cause should be reversed and remanded. PRAYBB Petitioner Prays that the Court grant him this PDR and any and all relief requested herein. CERTIFICATE OF SERVICE A true and correct copy was hand delievered to the Nueces County district attorney Hark Shurka on 7/ /15. At the litieces County Courthouse/ 901 Leopard St- Corpus Christi# Texas 78401/ also Atty/General P.O.Box 12405/ Aastin/ Texas 78711. Respectfully ^ubnj^tte^ By: Jose (^nzales All #1832029 James v. Allred unit 201 FM 369 N. Iowa Park/ fexas 76367 16-. APPENDIX NUEOES COUNTY COURTHOUSE CHIEF JUSTICE 901 LEOPARD. 10TH FLOOR ROGELIOVALDEZ CORPUS CHRISTI, TEXAS 78401 361-888-0416 (TEL) JUSTICES 361-888-0794 (FAX) NELDAV. RODRIGUEZ DORI CONTRERAS GARZA HID/M.GO COUNTY G!NAM.BENAV!DES ADMINISTRATION BLDG. GREGORY T. PERKES NOPAL LONGORIA Coitrt of 100 E. CANO. 5TH FLOOR EDINBURG, TEXAS 78539 956-318-2405 (TEL) CLERK DORIAN E. RAMIREZ tS^irteentj) Bisttrict of tlDexasi 956-318-2403 (FAX) August 14, 2014 Hon. Adoifo Aguilo Jr. Hon. Fred Jimenez Assisfent District Attorney Attorney At Law Nueces County Courthouse 509 Lawrence, Suite 301 §©TteDprard - Room 206 Corpus ChristIi TX 78401 Corpus Christi, TX 78401 * DELIVERED VIA E-MAIL * DELIVERED VIA E-MAIL * Mr. Jose Gonzales III Hon. Mark Skurka TDCJ #1832029 District Attorney James V. Allred Unit 901 Leopard Street, Room 205 2101 FM 369 North Corpus Christi, TX 78401 Iowa Park, TX 76367 * DELIVERED VIA E-MAIL * Re: Cause No. 13-13-00.011 -CR Tr.a.No. 11-GR^14W , Style: JOSE GONZALES III v. THE STATE OF rEXAS Enclosed please find the opinion and judgment issued by the Court on this date. Very truly yours, Dorian E. Ramirez, Clerk DER:dsr Enc. cc: State Prosecuting Attorney (DELIVERED VIA E-MAIL) 105th District Court (DELIVERED VIA E-MAIL) Hon. Patsy Perez, District Clerk (DELIVERED VIA E-MAIL) Hon. J. Rolando Olvera Jr., Presiding Judge, 5th Administrative Judicial Region, (DELIVERED VIA E-MAIL) THE THIRTEENTH COURT OF APPEALS 13-13-00011-CR JOSE GONZALES III V. THE STATE OF TEXAS On Appeal from the 105th District Court of Nueces County, Texas Trial Cause No. 11-CR-4141-D JUDGMENT THE THIRTEENTH COURT OF APPEALS, having considered this cause on appeal, concludes that the judgment of the trial court should be AFFIRMED. The Court orders the judgment of the trial court AFFIRMED. We further order this decision certified below for observance. August 14, 2014 NUMBER 13-13-00011-CR OF APPEALS THIRTEENTH DISTRICT OF TEXAS CORPUS CHRISTI - EDINBURG JOSE GONZALES III, Appellant, THE STATE OF TEXAS, Appellee. On appeal from the lOSth District Court of Nueces County, Texas. MEMORANDUM OPINION Before Justices Rodriguez, Garza and Benavldes Memorandum Opinion by Justice Garza Ajury found appellant Jose Gonzales III guilty of capital murder, a capital felony offense, see Tex. Penal Code Ann. § 19.03(a)(2), (b) (West, Westlaw through 2013 3d C.S.), and burglary of a habitation to cpmn^it afelony (aggravated assault), a first-degree felony offense. See id. §30.02(a)(3), (d)(1) (West, Westlaw through 2013 3d C.S.). The trial court assessed appellant's punishment for the capital murder offense at life without parole, see id. § 12.31(a)(2) (West, Westlaw through 2013 3d C.S.), and assessed punishment for the burglary of a habitation offense at life Imprisonment, with the sentences ordered to run concurrently. Appellant's court-appointed counsel has filed an Anders brief. See Anders v. Califomia, 386 U.S. 738, 744 (1967). We affirm. I. Anders Brief Pursuant to Anders v. Califomia, appellant's court-appointed appellate counsel has fired a brief and a motion to withdraw with this Court, stating that his review of the record yielded no grounds of error upon which an appeal can be predicated. See id. Counsel'sbrief meets the requirements ofAnders as itpresents a professional evaluation demonstrating why there are no arguable grounds to advance on appeal. See In re Schulman, 262 S.W.3d 403, 407 n.9 (Tex. Crim. App. 2008) ("In Texas, an Anders brief need not specifically advance 'arguable' points of error if counsel finds none, but it must provide record references to the facts and procedural history and set out pertinent legal authorities.") (citing Hawkins v. State, 112 S.W.3d 340, 343-44 (Tex. App.—Corpus Christi 2003, no pet.)); Stafford v. State, 813 S.W.2d 503,510 n.3 (Tex. Crim. App. 1991). In compliance with High v. State, 573 S.W.2d 807, 813 (Tex. Crim. App. [Panel Op.] 1978) and Kelly v. State, PD-0702-13, 2014 WL 2865901, at *3 (Tex. Crim. App. June 25, 2014), appellant's counsel carefully discussed why, under controlling authority, there is no reversible error inthe trial court's judgment. Counsel has informed this Court, in writing, that counsel has; (1) notified appellant that counsel has filed an Anders brief and a motion to withdraw; (2) provided the appellant with copies of both pleadings; and (3) informed the appellant of appellant's rights to file a pro se response, and review the 1The Texas Court of Criminal Appeals has held that "the pro se response need not comply with the rules of appellate procedure in order to be considered. Rather, the response should identify for the court those issues which the indigient appellant believes thecourt should consider in deciding whether the 2 record preparatory to filing that response. See Anders, 386 U.S. at 744; Kelly, 2014 WL 2865901, at *3, Stafford, 813 S.W.2d at 510 n.3: see also In re Schulman, 252 S.W.3d at 409n.23. The record shows that appellant was provided a copy of the record on October 21, 2013. After this Court granted several motions for extension of time in which to file his pro se response, appellant filed his pro se response on May 23,2014. II. Independent Review Upon receiving an Anders brief, we must conduct a full examination of all the proceedings to determine whether the case is wholly frivolous. Penson v. Ohio, 488 U.S. 75,80 (1988). When an Anders brief and a subsequent pro se response are filed, a court of appeals reviews the entire record, and: (1) detemriines that the appeal is wholly frivolous and issues an opinion explaining that it finds no reversible error; or (2) determines that there are arguable grounds for appeal and remands the case to the trial court for appointment of new appellate counsel. Bledsoe v. State, 178 S.W.3d 824, 826^ 27 (Tex. Crim. App. 2005). If the court finds arguable grounds for appeal, it may not review those grounds until after new counsel has briefed those issues on appeal. Id. We have reviewed the entire record, counsel's brief, and appellant's pro se response, and we have found nothing that would arguably support an appeal. See id. at 827-28 ("Due to the nature of Anders briefs, by indicating in the opinion that itconsidered the issues raised in the briefs and reviewed the record for reversible error but found none, the court of appeals met the requirement of Texas Rule of Appellate Procedure 47.1."); case presents any meritorious issues." Inre Schulman, 252 S.W.Sd 403,409 n.23(Tex. Crim. App. 2008) (quoting Wilson v. State, 955 S.W.2d 693,696-97 (Tex. App.—Waco 1997, no pet.)). 3 Stafford, 813 S.W.2d at 509. There is no reversible error in the record. Accordingly, the judgment of the trial court Is affinmed. III. Motion Tb Withdraw In accordance with Anders, appellant's attorney has asked this Court for pemiission to withdraw as counsel for appellant. See Anders, 386 U.S. at 744; see also In re Schulman, 252 S.W.3d at 408 n.17 (citing Jefferyv. State, 903 S.W.2d 776, 779-80 (Tex. App.—Dallas 1995, no jaet.) ("[I]f an attorney believes thei appeal is frivolous, he must withdraw from representing the appellant. To withdraw from representation, the appointed attomey must file a motion to withdraw accompanied by a brief showing the appellate court that the appeal is frivolous.") (citations omitted)). We grant counsel's motion to withdraw. Within five days of the date of this Court's opinion, counsel is ordered to send a copy of this opinion and this Court's judgment to appellant and to advise him of his right to file a petition for discretionaiy review.^ See Tex. R. App. P. 48.4; see also In re Schulman, 252 S.W.3d at 412 n,35: Ex parte Owens, 206 S.W.3d 670,673 (Tex. Crim. App. 2006). DORI CONTRERAS GARZA, Justice Do not publish. fEX.-R.App.P.47.2<b). Delivered and filed the 14th day of August, 2014. ^ No substitute counsel will be appointed. Siiould appellant wish to seel<further review of this case by the Texas Court of Criminal Appeals, he must either retain an attomey to file a petition for discretionary review or file a pro se petition for discretionary review. Any petition for discretionary review must be filed within thirty days from the date of either this opinion or the last timely motion for rehearing or timely motion for en banc reconsideration that was overruled by this Court. See Tex. R. App. P. 68.2. Any petition for discretionary review must be filed with the clerk of the Court of Criminal Appeals, see Tex. R. App. P. 68.3, and should comply with the requirements of Texas Rule of Appellate Procedure 68.4. See Tex: R. App. P. 68.4. 4 ^ms. {/, omaoJ priority UNITED STATES ★ MAIL t ^'•u^' roJ^ /7^,: ^POSTAL SERVICE i express' • by ACCOUNT (If applicable) tOBIGlN (POSTAL SERVICE USE ONLY) • dpo OPTIONS ^Customer Use Only) .•2-Day • Mililary • • 1-C3ay Scheduled Dellvety Data Postage PO ZIP Cods (MM/OD/YY), J • f i:3'7.o£> )ptlona Saturday Dellvety (delivered next business day) zma Dale Accepted (MM/DD/YY^ iduled D.iillve_ry,'nma Insurance Fee ^.^- ,day/HoIlday Dellverv Required (additional (se, v.ha™ a«l able ) 10:30 AM •3;o6pM $ MAM Delivery Required (addlUonal lee, where actable ) tartoUSPS.cnm' orlocal Pnst Ottlce for avallabllllY. g. .S-.- /6 •*12 noon • '" 10:30 AMDeliveryFee Return Receipt Fee-' Uiva Animal TransportationFee vSEPRI^ Time Accepted _ .76rAM - a 'BO Sunday/Holiday Premium F« P^ QKhJ2^- WelgHV . •FlalRate $•• \rA vO- )4 '.•J'V. . /lerr-i • / oL Acceptance Efnpl,<^a Initials 9-^<0 "1- •^O • I j ^cir- IbELIVERr(POSTAL SERVICE USE ONLY) Ennployee Signature \ )r:t- • - Deliveiy Attompl (MM/DDA^ U.S. • am • PM Employee Signature pelivery Attempt (MM/DDA^ Oam Ickup or USPSTracking", visit USPS.com or call 800-222-1811. • PM 00 insurance Included. 3-ADDRESSEE COPY label 11-B,JANUARY 2U14 PSN 7690-02-000-9996 ,s ,© ..e Q .r?\ © © I• Q E mnrnJsmES s MLSJUfllL ' n P<^MSERVIC& ******^- ^ FREE SUPPLIES ONLINE
{ "pile_set_name": "FreeLaw" }
Ultrastructure of mesangial type III collagen deposition in a patient with IgA nephropathy. We report a case of IgA nephropathy with focal and segmental deposition of type III collagen in mesangium, confirmed by immunohistochemical and electron microscopic methods. Tissue negative staining showed that focal and segmental fibrotic lesions in the mesangial area consisted of disarrayed or curled striated collagen fibers and striated membranous structures. Diabetes mellitus, hypertension, and advanced glomerular sclerosis were absent in this case, and mesangial cells surrounding the type III collagen showed vacuolar degeneration revealed by electron microscopy. Production of type III collagen may be the marker for phenotypic change of mesangial cells in immune-mediated glomerular diseases.
{ "pile_set_name": "PubMed Abstracts" }
Q: Issue with datepicker in ios xcode project objective c off by a day I have a program that works fine with datepicker except when I go forward to print days in which I will be alive. It skips a day so goes 0 on birthday 0 next day and then one. When I go backwards for days alive it goes 0 1 2 ect. Can anyone help with where I went wrong? To clarify it is a simple program in a beginner level class with 2 buttons. one makes an alert box with the day of the week. The other does the same for how many days you have passed or need to pass until you will be born. #import "ViewController.h" @interface ViewController () @property (weak, nonatomic) IBOutlet UIDatePicker *datePicker; - (IBAction)tapBtn:(id)sender; - (IBAction)aliveBtn:(id)sender; @end @implementation ViewController - (void)viewDidLoad { [super viewDidLoad]; // Do any additional setup after loading the view, typically from a nib. } - (void)didReceiveMemoryWarning { [super didReceiveMemoryWarning]; // Dispose of any resources that can be recreated. } // day of the week - (IBAction)tapBtn:(id)sender { NSDate *date = [self.datePicker date]; NSDateFormatter *dateFormatter = [[NSDateFormatter alloc] init]; [dateFormatter setDateFormat:@"EEEE"]; UIAlertView *alertView = [[UIAlertView alloc] initWithTitle:@"The day is" message:[dateFormatter stringFromDate:date] delegate:nil cancelButtonTitle:@"Okay" otherButtonTitles: nil]; [alertView show]; } //days alive or will be alive from selected birthday - (IBAction)aliveBtn:(id)sender { NSDate *date1 = [NSDate date]; NSDate *date2 = [self.datePicker date]; NSTimeInterval secondsBetween = [date2 timeIntervalSinceDate:date1]; int numberOfDays = secondsBetween / 86400; if(numberOfDays < 0){ numberOfDays *= -1; NSLog(@"You have been alive %d days.", numberOfDays); UIAlertView *alertView = [[UIAlertView alloc] initWithTitle:@"Days alive" message:[NSString stringWithFormat:@"You have been alive %d days.",numberOfDays] delegate:nil cancelButtonTitle:@"Okay" otherButtonTitles: nil]; [alertView show]; }else{ NSLog(@"you will be alive in %d days.", numberOfDays); UIAlertView *alertView = [[UIAlertView alloc] initWithTitle:@"Days will be alive in" message:[NSString stringWithFormat:@"You will be alive in %d days.",numberOfDays] delegate:nil cancelButtonTitle:@"Okay" otherButtonTitles: nil]; [alertView show]; } } @end A: Okay! So the problem you are seeing is when you move the date picker forward exactly ONE day, your aliveBtn: method returns 0 days until the user will be born, correct? While debugging, did you try moving the minutes forward by one? It would make the aliveBtn: method return 1 day until birth. So, this problem stems from the math you do in aliveBtn: int numberOfDays = secondsBetween / 86400; Just between the time I moved the day forward, secondsBetween was equal to 86394.30585... The problem is that you declared numberOfDays as an int. An integer can only be whole numbers; so computing 86394.30585/86400 is equal to 0.99999 which in turn, since we are speaking in integers only, becomes 0. To fix this problem, we use one of the math functions from C called ceil(double). Simply changing int numberOfDays = secondsBetween / 86400; to int numberOfDays = ceil(secondsBetween / 86400); Will fix your problem. Good luck, I hope this fixes your problem. If it does, please mark this answer as accepted :)
{ "pile_set_name": "StackExchange" }
1. Field of the Invention The present invention relates to a surface-mountable glass-sealed light-emitting diode including a glass-sealed LED bare chip. 2. Description of the Related Art In a conventional glass-sealed light-emitting diode (LED), for example, a pair of leads 33 are connected to anode and cathode electrodes of an LED bare chip 31, respectively, as shown in FIG. 4. A glass seal 32 is employed to integrally cover connections between the LED bare chip 31 and electrodes and the leads 33 for hermetic sealing. In the light-emitting diode 30 thus configured, when power is supplied through the leads 33 to the LED bare chip 31, an active region thereof emits light, which is guided from the side of the LED bare chip 31 through the glass seal 32 and output to external. There is an incident light that is emitted from the active region in the LED bare chip 31 and arrives at an interface between the LED bare chip 31 and the glass seal 32. This incident light has an angle (incident angle) from the normal to the interface at the incident point. If the incident angle is smaller than a critical angle, the light arrived at the interface is output from the LED bare chip 31 into the glass seal 32. If it is larger than the critical angle, the light is reflected back to the LED bare chip 31 and can not be output into the glass seal 32. In comparison of glass with air as materials that form interfaces with the LED bare chip, glass has a relatively larger refractive index and therefore a relatively larger critical angle. This means that a light can be output from the LED bare chip without being reflected at a larger incident angle from the interface with glass compared to air. When glass is selected as a material that adjoins the LED bare chip because it has a larger refractive index compared to air, a ratio of light output from the LED bare chip 31 can be increased relative to the total light emitted from the active region in the LED bare chip 31. This is effective to improve the external quantum efficiency (light-extraction efficiency). (For example, see Patent Document 1: Japanese Patent Application Laid-Open No. 61-67971, page 2, FIG. 1). The above-described glass-sealed light-emitting diode includes leads for supplying power from external to drive the light-emitting diode. The leads extend outward from both sides of the light-emitting diode. When such the light-emitting diode is implemented on a printed circuit board, the leads are inserted into through-holes in a double-sided through-hole printed-circuit board and soldered to achieve fixation and electrical conduction. Recently, as electronic instruments are downsized and light-weighted, it is also intensively promoted to address downsizing and surface mounting of electronic components. In order to make the conventional glass-sealed light-emitting diode support surface mounting, it is required to mount surface mounting components other than the light-emitting diode on the double-sided through-hole printed-circuit board by a method of reflow or dip soldering and then the light-emitting diode by a method of manual soldering. Alternatively, it is required to use a high-temperature solder to solder the surface mounting components and then use a lower melting point solder to solder the light-emitting diode by a method of dip soldering. When these methods are employed to implement the conventional light-emitting diode on the same substrate together with the surface mounting components, they cause the following problems: (1) When only the surface mounting components are implemented, a single-sided board with circuits formed only on one side functions sufficiently. In contrast, when the conventional light-emitting diode is mixed together, a double-sided through-hole board with circuits formed on both sides is required, which increases the cost of the printed circuit board. (2) After the surface mounting components are implemented on the printed circuit board, it is required to solder the conventional light-emitting diode additionally. This requirement increases the number of processes for mounting components on the printed circuit board and elevates the production cost. (3) When a high-temperature solder is used to solder the surface mounting components and then a lower melting point solder is used to solder the light-emitting diode by the method of dip soldering, the second soldering may impart stress to the surface mounting components and badly influences on the reliability. The present invention has been made in consideration of the above problems and has an object to provide a glass-sealed light-emitting diode capable of achieving a high reliability and a high external quantum efficiency as an optical semiconductor component, and a high reliability and a low cost as for a components-implemented printed-circuit board.
{ "pile_set_name": "USPTO Backgrounds" }
Oracle SQL Hints --- Abstraction SQL HINT description and demonstration SQL Hint is one of most important approaches to change the activity of optimizer and SQL execution, it’s also pretty important for SQL tuning. For instance, HINT is a part of the SQL Profiler advised by SQL Tuning Advisor. In each Oracle version, corresponding to the SQL features changes, new hints will be introduced, and old hints may be obsolete. Oracle introduced a new dynamic view, V$SQL_HINT, to show in which version the hint was involved in, and in which version it began work as outline data. The hints are associated with special SQL features. It will work only if the related features are enabled. Take HASH_AJ for example, it’s a CBO (QKSFM_CBO) feature hint, and it will not work if the SQL optimizer mode is set to RBO. Some hints are only effect in the internal recursive SQLs, cannot be used in user SQL directly. The embedded hints in SQL are a piece of comment, with the format /*+ <hint 1> [<hint 2> ...]*/. One comment may involve multiple hints, and one SQL may also involve multiple hint comments. And the hint will work only if they exist in the comment following the key words, SELECT, UPDATE, INSERT, MERGE and DELETE. If the SQL is a complex query involved in sub-query, the hint could be written as global or local format.The local format hints exist in the sub-query, and it can only affect the sub-query. While the global format hits exist in the main part of the query, it can be specified to affect any object in whole query by adding <object>@<block>. The alias could be used to replace the object name. Tip: Since the embedded SQL hint is a piece of comment, its format could also be --+<hint>. For example, HELLODBA.COM>select --+full(u) 2 * from t_users u where user_id =1; We will descript all of hints, and also give demonstration of their usage. SQL Features Below hierarchy diagram shows all SQL features and their dependencies. Be aware, some features may be based on multiple features.
{ "pile_set_name": "Pile-CC" }
Q: How do I trim the bottom of an image? I'm trying to cut off the bottom of a image so the next row of images an fit. I've tried to trim the bottom but it hasn't worked. I want to bottom edge to be in line with the image next to it. Here is the current page: My Page img.left { padding: 0 12px 0 0; height: auto; float: left; width: 33.33%; }` What it currently looks like A: You could put the images into a div and control the size of that div with height, width and overflow attributes in css. A bit like this; <div class="control" style="height: 600px;overflow: hidden; width: 100%;"> <img class="big" src="images/35473299826_50c6ced1ec_k.jpg" alt="boy with ferry"> <img class="right" src="images/34628953174_408fac96c3_z.jpg" alt="flowers"> <img class="left" src="images/34702862403_ddf655f873_z.jpg" alt="One of my pictures"> </div> The output looks like this for me; enter image description here
{ "pile_set_name": "StackExchange" }
Worker ‘left accident scene’ An aerospace worker drove away from an accident scene after colliding with another car. Neil Davies stopped to collect his number plate which had fallen off during the crash but he did not exchange details with the other driver. Davies, 31, of Halton Gardens, South Shore, pleaded guilty to failing to stop after an accident and failing to report it. He was fined £175 with £85 costs plus £20 victims’ surcharge and had five motoring penalty points put on his licence by Blackpool magistrates. Alison Quanbrough, prosecuting, said the incident happened on December 20 at around 12.15pm . The court heard how Davies’ Ford Fiesta came out of a retail park on Cornelian Way, Marton, and collided with another Fiesta driven by a woman. He got out to pick up his number plate from the debris and then drove off. When interviewed by police he said he panicked after the collision and left the scene. Davies, who had no previous convictions, told magistrates: “The woman pulled out in front of me. I braked, but we collided. I got out and nodded to her to see if she was OK. I picked up my number plate and again indicated to ask if she was OK. She did not get out of the car. It was very busy in the area.”
{ "pile_set_name": "Pile-CC" }
Melkein jo naurattaa. Mutta vaan melkein. Kyse on tietysti Suomen ”alkoholipolitiikasta” joka tällä hetkellä tukahduttaa muutenkin ahdistuneen ravintola-alan ja suomalaisen juhlimisen entistä syvemmälle nurkkaan. Häpeämään. Koska viskin ja muun alkoholin nauttiminen on synti jota meidän tulisi välttää ja paheksua. Tässä seuraa minun kirjeeni Suomen Päättäjille. Rakas Suomen Päättäjä, Olen ex-baarimikko. Kahdeksan vuotta kerkesin vääntää juhlakansalle valkovenäläisiä ja viskiä. On the rocks tai ihan straight up. Tykkäsin työstäni niin paljon että päätin kirjoittaa kauppakorkeakoulun maisterin lopputyöni (joka hyväksyttiin tänään) Suomalaisista yökerhoista. Ymmärrän että Suomen valtio haluaa vähentää alkoholinkulutusta alkoholin haittavaikutusten aiheuttamista kuluista ja kansan yleisen terveyden vuoksi. Mitä vähemmän viskiä Suomessa juodaan, sen parempi. Haluaisin kuitenkin muistuttaa sinua, rakas päättäjä, muutamista faktoista koskien suomalaisten viskinjuontia ja isosta pahasta sudesta joka on Suomen ravintola-ala. 1. Ravintola-ala on tärkeä osa Suomen taloutta ja yhteiskuntaa Haluaisin aloittaa muistuttamalla että ravintola-ala ja suomalaisten juhliminen ja viskinjuonti ei ainoastaan tuota valtiolle kuluja. Matkailu- ja ravintola-ala työllistää Suomessa 140 000 työntekijää. Tämä on enemmän kuin elintarviketeollisuus. Suuri osa työntekijöistä, noin 30 %, ovat nuoria. Mainittakoon myös että nämä työpaikat pysyvät Suomessa. Nyt ja tulevaisuudessa. Kuten tekevät myös verotulot. Veroista puheen ollen, matkailu- ja ravintola-ala tuo Suomen valtiolle 5,2 miljardia euroa vuodessa ja edustaa 3,8 % Suomen BKT:stä. Tähän päälle voidaan tietysti vielä lisätä työntekijöille maksetun palkan verotulot. Ja juomayhtiöt. Kaikki tämä on faktaa, ei keksittyä. Voit halutessasi tarkistaa numerot (uudistuneilta) Matkailu- ja Ravintolapalvelut MaRa Ry:n sivuilta. 2. Yksitoista prosenttia alkoholikulutuksesta tapahtuu ravintoloissa Viime vuonna ainoastaan 11 % Suomen alkoholikulutuksesta tapahtui ravintoloissa, loput kulutuksesta tapahtui muualla, kuten kotona ja puistoissa. Samaan aikaan kun ravintoloissa nautittu alkoholin osuus putoaa, tuonti sen kun kasvaa. Viime vuonna Suomeen tuotiin kaksi kertaa enemmän alkoholia, 22 %, kun mitä ravintoloissa nautittiin. Tämä Jutta Urpilaisista ja muista ”asiantuntijoista” huolimatta, jotka lupasivat että tuonti ei tule alkoholiveron noustessa lisääntymään. Nämäkin luvut löytyvät MaRa:n sivuilta. Mutta entäs se kaikista pahin viskin ja viinan juonti, eli se 02.00-04.00 hurja kulutus. Se juhliminen joka pitäisi Päivi Räsäsen mielestä kieltää. Siirrymme kolmanteen faktaan. 3. Noin kaksi prosenttia Suomen alkoholikulutuksesta tapahtuu aamu kahden ja neljän välillä. KAKSI PROSENTTIA! Yökerhot ylipäätänsä edustaa ainoastaan muutamaa prosenttia Suomen alkoholikulutuksesta. Tämä kaksi prosenttia työllistää kuitenkin lukemattoman määrän baarimestareita, plokkareita, ovimiehiä, DJtä, artistia ja siivoojaa. Lukuun ottamatta snägärit, taksikuskit ja, olin melkein unohtamassa, yrittäjät itse. 4. Ravintolassa tapahtuva viskin anniskelu on valvottua Kun Daniela Dokaaja lähtee kimalteleva tanttu päällä ja korkkarit jalassa ravintolaan juomaan viskiä, taphtuu se valvotussa tilassa. Se tarkoittaa että ravintolasssa tapahtuva viskin juonti on turvallisempaa kun Daniela Dokaajan himassa juoma viskipullo. Olisikin mukavaa jos sinä, rakas Suomen päättäjä, voisit hetkeksi pysähtyä ja miettiä mikä suomalaisten alkoholikulutukseen oikeesti vaikuttaa. Ravintolat ei nähtävästi ole se ongelma. Voisiko jopa olla niin, että kaikki nämä lait ja säädökset jotka estävät Koffin hevoset, räikeät aurinkovarjot, Kukon maamerkin omassa tehtaassa, Fifty-Sixty Matti juoman, Ron de Jeremy rommin, viskitislaamon nettisivut, yksityishenkilöiden blogikirjottamista jne eivät oikeastaan vaikuta suomalaisten alkoholikulutukseen? Haluaisin perustella tämän väitteen seuraavalla faktalla joka ei ole fakta vaan mielipide. 5. Suomalaiset eivät ole tyhmiä Tällä hetkellä Suomen alkoholilaki perustuu siihen, että suomalainen on tyhmä. Jos pullossa on Matti Nykäsen kuva niin mitä? Tuleeko minusta sillon neljän olympiakullan mäkihyppääjä? Jos pullon keulassa on Matin sijaan Ron Jeremy, tuleeko minusta silloin mies? Vai pornotähti? Seksiä ja alkoholia ei saa yhdistää, mutta miksi ei? Eikö seksiä voi harrastaa myös kännissä? Eikö moni lähde juuri se paljettitanttu päällään ravintolaan toivoen että löytäisi sieltä kumppanin? Tällä hetkellä Suomessa keskitytään tuotteisiin eikä siihen ongelmaan: suomalainen alkoholikulttuuri. Jos kulutusta halutaan vähentää tapahtuu se muokkaamalla kulttuuria, ei lakeja. Se tapahtuu valistamalla, ei pakottamalla. Alkoholi ei ole pahe. Maltillisesti nautittuna se tuottaa yhteiskuntaamme ravintoloita, työpaikkoja, verotuloja, hauskanpitoa ja sosiaalista kanssakäymistä Haluaisin elää yhteiskunnassa jossa viinalla ei pelotella lapsiamme, vaan valistamme heitä siitä. Yhteiskunnassa jossa kannustamme siirtämään kulutuksen ravintolaan, ei juomaan Viron viinoja himassa. Ja yhteiskunnassa jossa vähennämme kulutusta, mutta oikealla tavalla. Voisitko jo nyt, rakas päättäjä, lopettaa tämän loputtoman kieltämisen? Sen sijaan voisit miettiä miten saataisiin kulutusta vähennettyä siten, että se olisi jokaisen suomalaisen oma päätös. Ei sinun.
{ "pile_set_name": "OpenWebText2" }
A world leading professional services firm, providing accounting and auditing services, management consulting and legal and tax advice. In Belgium they are the largest professional service provider. The offices offer services to multi-national and large organisations, public institutions and innumerable small, fast-growing companies.
{ "pile_set_name": "Pile-CC" }
In recent years, advances in technology, as well as ever evolving tastes in style, have led to substantial changes in the design of automobiles. One of the changes involves the power usage and complexity of the various electrical systems within automobiles, particularly alternative fuel vehicles, such as hybrid, electric, and fuel cell vehicles. Many of the electrical components, including the electric motors used in such vehicles, receive electrical power from alternating current (AC) power supplies. However, the power sources (e.g., batteries) used in such applications provide direct current (DC) power. Thus, devices known as “power inverters” are used to convert the DC power to AC power. Such power inverters often utilize several switches, or transistors, operated at various intervals to convert the DC power to AC power. Typically, the switches of the inverter are operated by using pulse-width modulation (PWM) techniques to control the amount of current and/or voltage provided to the electric motor. Often, a microprocessor generates PWM signals for the switches in the inverter, and provides the PWM signals to a gate driver, which turns the switches on and off. The microprocessor and gate driver often reside on separate circuit card assemblies, and interface via one or more buffers, amplifiers, and other discrete components. During operation, it is often possible to improve the efficiency of the electric motor and/or the inverter by varying the switching frequency of the PWM signals or the manner in which they are generated. However, the additional tasks and computations required to dynamically adjust the PWM signals using software can increase processing overhead and thereby reduce the throughput of the microprocessor and add latency to the system. Current systems are challenged to provide dynamic real-time operation of the electric motor, and are thus, limited in terms of efficiency.
{ "pile_set_name": "USPTO Backgrounds" }
Newcastle United’s squad is valued at £147million, according to new stats from the CIES Observatory – a football think tank based in Switzerland. CIES place United’s squad as the 25th most expensive in Europe – but only the 11th in the Premier League, behind the likes of Crystal Palace, Leicester and West Ham. The data is based on fees spent on the squad to assemble it. The data illustrates the growing chasm between Europe’s super-elite clubs and even the Premier League’s clubs. (Image: Newcastle United) The values are given in Euros – top of the charts are Manchester City, who invested a record value of €853 million in transfer fees to assemble its current squad. This value is €850 million for Paris St-Germain and €784 million for previous record holder Manchester United. Newcastle boss Rafa Benitez, of course, wanted to see more investment to break into the top ten in the Premier League but he will no doubt be satisfied with back-to-back top flight wins. United’s net spend was worked out by the think tank as £27million – 22nd highest in Europe. That is below Huddersfield and Brighton and 11th highest in the Premier League. CIES have also worked out valuations for four of United’s big summer signings. They rate Mikel Merino at £6.6million, Joselu at £3.4million and Florian Lejeune at £13.25million.
{ "pile_set_name": "OpenWebText2" }
Watch and Yearn Julia pulled open the front of her black lace kimono style wrap and brought both of her hands up to her breasts. Pulling down her black lace push-up bra slightly, she began brushing her fingertips gently back and forth over her nipples, causing them to stiffen hastily. She then began pinching and pulling on both at the same time. An elegant, fine-boned woman in her late forties, she was clearly comfortable with her sexuality, as well as her own body. A low moan escaped her lips as she flipped her head back in elation, the soft, sinuous waves of her luscious blonde shoulder length hair swinging seductively. She could feel her pussy getting wet. While still tweaking her left nipple, she reached down and slipped her right hand inside her black, lace-trimmed hip-hugger panties. As her fingers connected with her clit, she gasped lightly, arching her back as her piercing, almost cat-like eyes stared at the scene playing out on the bed in front of her. Lisa was facing her, turned away from Roger and straddling his hips in a reverse cowgirl position. Julia knew how much her husband enjoying having sex this way and could tell that this young woman's body was built for it. She watched in blissful awe as the slim 28-year-old's tight little pussy stretched over his cock as her perfect ass slammed up and down repeatedly. He groaned quietly as she reached down and began playing with his balls as she rode atop him, her modest sized tits dancing to the rhythm of their fucking. She lightly bit her lower lip as she reached back and slapped herself once on her right ass cheek, making sure to steal periodic glances at her lover's wife sitting only a few feet in front of her. Roger let out a ravenous grumble as he watched the sumptuous ribbons of long, shiny brown curls bounce radiantly in front of him with each plunge onto his dick. The slender, darkly handsome 53-year-old ran one hand through his bristling, brush cut salt and pepper hair while she took hold of the other one and placed it on her firm ass. Following her lead, his hand almost immediately pulled away from her flesh and then quickly came crashing back down onto her cheek with a loud smack that echoed throughout the bedroom. He smiled in satisfaction as he heard the distinctive yelp of pleasure and pain from his young lover. Julia was still absent-mindedly playing with her left nipple as her other hand plunged her middle finger deep into her pussy. She took a sharp breath and arched her back as she began to finger herself to the sight and sound of her husband being ridden by this beautiful creature. Her hand left her breast and joined its partner in between her legs, rhythmically massaging her clit as she marvelled at how utterly turned on she was by watching Roger fuck another woman. Pumping her middle finger in and out of her cunt, she began fucking herself as if her finger were a small penis. She tried to match the couple's lovemaking tempo, pushing her hips forward to meet her thrusting finger in time with their cadence. Her eyes made contact with her husband's lover as she fucked herself silly with her finger. Lisa was grinding her pussy down onto him now, his cock buried deep inside her as she writhed in ecstasy. As good as the dick felt in her insatiable cunt, seeing his wife masturbating right in front of them and enjoying the show was just as fulfilling. The two women's eyes met and they both knew that they were trying hard to reach orgasm at the same time. A shiver of exhilaration rippled through her body as she once again began slowly gliding her wet snatch up and down his shaft. Roger's eyes darted back and forth between the hot young vixen on top of him and his wife pleasuring herself a few feet away. Even in his wildest fantasies, he never imagined how incredibly arousing such a scenario truly would be. An involuntary groan of pleasure escaped his lips as he took hold of his lover's hips and started to guide her motions, attempting to synchronize her movements with those of his wife's thrusting hips. Julia increased the pressure on her clit as she put another finger in her pussy. When she and her husband had first discussed the idea of bringing a third party into their bed, she was instantly turned on by the thought of watching him fuck another woman, but this was even better than she had hoped for. By now she was almost panting for breath, her two fingers buried deep in her cunt and her sticky juices slowly starting to run down from her engorged slit. Watching the two of them fuck was the most erotic thing she had ever seen. Lisa's body glistened with sweat as she ran her hands through her curly mane and licked her lips, all the while keeping her eyes locked on the woman fingering herself in front of her. She had always been an adventurous girl sexually, so when the not-so-innocent flirting with her boss escalated to an offer to join him and his wife in the bedroom, it had not taken her very long to accept. With a wry smile to their audience of one, she finally laid back on top of him so she was facing the ceiling. She pinched her nipples firmly as she continued to wiggle back and forth on his cock. Roger buried his nose into the mass of curls tickling his face and wrapped his arms around her waist, pulling her down harder on top of his dick. Once he and his wife became seriously committed to their new sexual venture, his thoughts on potential candidates quickly narrowed to one young lady in particular. Ever since she had started tending bar at his restaurant six months earlier he had felt a strong attraction to her and, based on her flirtatious personality and the gossip about her promiscuity, he was cautiously optimistic that she would be open to his invitation. His hands moved from her hips and joined hers on top of her tits as she turned her head to the side and touched her lips to his. Julia's body quivered as she took in the intimate kiss between her husband and his new lover. Subconsciously, her legs spread even further apart as she thrilled at the sight. Leaning further back in her chair, her fingers teased her clit with little circular motions as her other hand returned to her bosom to caress the nipple on her left breast. She could tell how much he was enjoying fucking this young woman, and was quite certain that his gratification was easily being matched, if not surpassed by her own. A soft moan warbled from deep inside her as she watched the couple reposition themselves on the bed. Lisa knelt on all fours, facing her lover's wife and presenting her beautiful ass to him. Her long, curly brown hair flowed over her left shoulder as she turned to smile at him, and her body trembled as he reached under her to caress her pendulous tits, gently swaying back and forth as he began to massage them. Never before had she had any interest in voyeurism or given much thought to just how exhilarating being watched could be, but this was quickly turning into one of the most sexually satisfying exploits she had ever experienced. She locked eyes with their spectator and licked her lips as she felt his hands slide up her back and steadily work their way down to her firm ass. Roger's hands glided over her perfect ass and onto her thighs, where he guided her legs apart as he quickly got on his knees behind her. His rigid cock slid easily into her smouldering snatch and he immediately began pounding away into her deliciously tight cunt. Reaching forward, he grabbed a length of his young lover's curly locks and yanked her head back as he shoved his dick as far into her pussy as it would go. As his thighs slapped continuously against her ass cheeks, he made sure to shoot a look at his wife as she enjoyed the show. Seeing her so thoroughly engrossed in the act of pleasuring herself as she watched her husband slam into this young vixen, he was fairly certain that his prick had never been harder in his life. Julia was desperate to come. While one hand rubbed her sensitive clit, she pumped the middle two fingers of her other hand in and out of her fiery cunt. Her hands were a blur as her ass almost lifted completely off the seat to allow her pumping fingers to penetrate deeper. Focusing her gaze on the expression on the face of her husband's lover, she could tell that he was fucking her as hard and as fast as he possibly could. Jealousy non-existent, a jolt of pure erotic bliss rocked her body as she started to come. Lisa's eyes widened as she saw her lover's wife bring herself to orgasm right in front of her. It was an unbelievable sight and one that was arousing her in ways she had never imagined. As the hard cock pounded into her from behind, she lifted her ass up as far as she could thrust it and rested her head on her arms to watch their voyeur come down from her orgasm. Within seconds, she was lost in the intensity of her own explosion as he stroked in and out of her mercilessly. Roger marvelled at the double satisfaction of seeing his wife get off watching him fuck another woman combined with his new lover enjoying her own release thanks to his hard working dick. Wanting to put off his own orgasm as long as possible, he hunkered down over her body and placed his hands over hers, riding her deeply as she began thrusting backwards to meet each of his strokes. He never realized anything could feel as good as this did, his cock buried deep inside one hot babe as his beautiful wife fingered herself steps away. Julia tried to catch her breath as she spread her legs wide and gently grazed her fingers over her dripping slit. She knew that her husband had always loved to watch her masturbate and she had always thoroughly enjoyed doing it for him, but never before had she ever felt an orgasm quite as powerful as the one she had just experienced. There was no doubt that watching the young woman on the bed reach her own release at the hands (and cock) of her husband was definitely to thank for taking her to new levels of sexual gratification. Lisa squeezed her eyes shut and tried to steady herself as she came down from her release. She had known from the moment that he slid his hard-on into her tight, hot cunt that she was likely going to enjoy her biggest and best orgasm ever, and she had not been disappointed. As sexually liberated as she had always thought she was, what she was experiencing right now was by far her most satisfying and erotic escapade. Her eyelids fluttered open and she once again locked eyes with her lover's wife. The two women smiled knowingly in each other's direction, their sexual connection, though not physical, was electric, and filled the room. Roger could not take it much longer. Watching both of these amazing women explode, plus fucking one of them as furiously as he possibly could, had driven him to the edge. He pulled out of his young lover and flipped her onto her back as he wrapped his hand around his shaft and began to stroke. Groaning in anticipation, he watched as she squeezed her tits and bit her lower lip hungrily while his hand slid over his throbbing cock. Finally, his balls began to boil and he knew he was about the come. Julia gasped aloud as she watched her husband, dick in hand, take aim at the young woman laid out in front of him. The first shot of come splattered across the bottom of her tits, with the second landed between them and ran up her chest all the way up to her neck. His wife stared in wonderment and lust as he seemed to spurt an endless fountain of come. Lisa smiled widely and her eyes darted over to her lover's wife just as a shot of come splattered across her face. Her fingers moved to her breasts and she pulled on her nipples mercilessly as another string of his hot fuck juice splashed across her chest. She clutched her tits in her hands and began rubbing them, smearing his come into her skin. Roger, completely spent, collapsed onto the bed beside his come-drenched lover and tried to catch his breath. He watched as she mindlessly continued caressing her breasts, rubbing his jizz around her nipples, and could not help but smile at the sight. As impressed as he was with that vision, when his eyes moved to take in his wife, his grin widened even further as he watched her gaze fixed on the sticky young woman massaging his come onto her tits. To his own amazement, his cock was already starting to get hard again as he saw his wife's hand slip back in between her legs and a sensual moan escape her lips.
{ "pile_set_name": "Pile-CC" }
Q: Am I likely to need multiple pairs of boots on the Appalachian Trail? Reading up on a hiking boot size question, I came across this review from Silver Spring, Maryland for a wide hiking boot. This boot has a "lifespan" of 400 miles. Is that typical of a hiking boot? Since the Appalachian Trail (AT) is over 2,000 miles long, should I expect one or more pairs of boots to wear out and become unusable during the course of a through-hike? Also, if my feet do change size over the course of the hike-- or if a pair of shoes does wear out-- how do I get a new, better-fitted pair while on the trail? A: Do boots really last (only) 400 miles? In short, yes. If you are a hard-man/woman, you might stretch one pair of boots to half the AT. Normal people go through quite a few pairs - I used 10-ish pairs of trail runners on the PCT (Pacific Crest Trail), partially because my feet grew 2 sizes and I didn't realize that was why I was suddenly getting blisters from my previously comfortable shoes. So if you know what's up, I think 6-8 pairs for the AT would be reasonable. Boots last a bit longer (as Kevin said, 400 miles maybe), so you might only need 4-5 pairs. The trouble with boots in that situation is that you generally need to break them in, and a large number of thru-hikers end up with bigger feet within a few hundred miles of starting. So, you can't really buy ahead until you know whether you are the "feet grow" or "feet don't grow" type of person. Thus, using runners is pretty normal - they wear out faster but don't need breaking in. Logistically, how do you get more boots as you hike? On the AT, because of it's popularity, you should be able to identify some gear/shoe stores around the 200-400 miles-in corridor where you could go to try on more boots in a variety of sizes. Alternatively, and what I've done many times, is to only buy one pair before you start hiking. If your feet stay the same size for the first month, you are probably safe, so have someone at home buy enough pairs for the rest of the trail, and mail them to you via General Delivery at post offices along the trail. If your feet change sizes, and continue to change, order a range of sizes-widths via the internet (or someone at home) and again, have them delivered via a Post Office. Return all pairs that don't fit. Big sites like Zappos.com will do this no problem (including delivering to post offices and free returns). So once you establish your new size, you walk another 300 miles in your new boots, then order the next pair to the next PO you'll reach. Repeat until done :)
{ "pile_set_name": "StackExchange" }
Q: Why don't membrane proteins move? I understand that based on their tertiary structure, intrinsic proteins have hydrophobic non-polar R-groups on their surface and that they 'interact with the hydrophobic core of the cell membrane to keep them in place'. But how does the hydrophobicity of both the protein and the cell membrane prevent the protein from moving? A: Proteins can move around the membrane. Most proteins do move within the membrane. The membrane is a liquid crystal and has fluid behaviour. Specifically, this is due to the membrane being in a gel-state. This gel state allows phase behaviour which means that the protein is able to move around on the surface. This results in an effect that is often referred to as the fluid mosaic model. Proteins tend not to move out of the membrane. The protein doesn't leave the membrane as a result of the transmembrane helix being very hydrophobic. This hydrophobicity and the hydrophobicity of the lipid tails means that they self-associate. A better way of describing it is that they fiercely dissociate from the water. A molecular dynamics simulation showed that even in simulations the membrane will readily self-assemble as a result of the hydrophobicity. This is achieved by a few properties of the TMH sequence. There is a large amount of hydrophobic residues like leucine. At either end of the helix are large aromatic residues called the aromatic belt. Further is the electrostatic satisfaction offered by Gunnar von Heijne's famous positive inside rule and the recently identified negative-outside rule present in helices with evolutionary pressure to optimise anchorage. (Image source: Baker et al., 2017) Cymer et al. published a study showing the free energies associated with each part of the transmembrane protein helix (figure below). The overall ΔG for a transmembrane helix in the membrane is ~-12kcal mol−1. This means that the association of the helix in the membrane is typically spontaneous. (Image source: Cymer et al., 2015) A: No other answer has mentioned this so I created an account just to say this. Some membrane proteins do not move. This is because they are fixed in that position in the membrane due to the cytoskeleton. Erythrocytes are a good example of this. The main protein that is immobilised in erythrocyte membrane is Band 4.1 protein, and its immobilised by Spectrin. Spectrin forms a tetramer(2 dimers together) that acts like a chain/rope connecting membrane proteins and locking them in place. Spectrin connects to the Band 4.1 protein (also to actin, but less important). Spectrin also binds to Band 3 protein (via ankyrin, just a protein that connects spectrin to band 3). Band 3 is an anion channel (for HCO3- and Cl-, which is important for red blood cells to function. you want these band 3 proteins to remain evenly spaced out, so they are fixed in the membrane to make sure) It is important for some membrane proteins not to move. Otherwise the cell will lose its function in some cases(like intestinal epithelial cells), imagine if SGLUT-1 (glucose + galactose transporter) moves from the luminal side(facing lumen) to the basolateral side(the other side)... what do you think happens to its ability to take in glucose from intestinal lumen? Finally as a bonus, some membrane proteins are also fixed in the plasma membrane in plants (does not move around) by cell wall. Anyway, if you are bored of someone immediately saying "fluid mosaic model means proteins always move around!" then read my answer A: There are two types of proteins that are present in a membrane, because you have not been specific about which type of protein you are talking about I will consider that you are talking about Integral membrane proteins. For more clarity I will begin by explaining to you what are these proteins present in the membrane. As I said there are two types of proteins 1. Integral membrane proteins - these are proteins that are present inside the membrane. Peripheral membrane proteins - These are the proteins present outside the membrane on either side linked through weak electrostatic interactions with the lipids or the integral membrane proteins. As it is clear from the diagram given below. [2] You have not been clear about which type of protein you are talking about so I assume that you are talking about Integral proteins. You stated in a nutshell that protein is hydrophilic so it should move out of the membrane as the membrane is hydrophobic. ( correct me if I am wrong here). You are highly mistaken here. Yes there are R groups present on the protein but when the protein undergoes transitions to secondary and tertiary structure these hydrophilic R groups move to the innermost in the protein structure and hydrophobic groups are outside facing the lipid sea, so they can establish hydrophobic interactions with the lipids. Integral proteins Do not move out of the membrane because of the strong hydrophobic interactions. But they do move inside the membrane. As the membrane structure is fluid mosaic. Imagine of proteins as floating in a sea of lipids. https://www.ncbi.nlm.nih.gov/books/NBK26878/ 1 = Principles of Biochemistry Lehninger. [2] = http://cbc.arizona.edu/classes/bioc462/462a/NOTES/LIPIDS/Membranes.html for the image.
{ "pile_set_name": "StackExchange" }
Fine needle aspiration biopsy of the penis: transitional cell carcinoma of the urinary bladder with mucinous differentiation. We report a case of transitional cell carcinoma of the urinary bladder metastatic to the penis. The diagnosis was established by fine needle aspiration biopsy (FNAB). Malignant cells showed mucinous differentiation. Ancillary studies carried out in the FNA material as well as in the primary bladder carcinoma suggested transitional cell carcinoma with mucinous differentiation. FNAB proved to be effective in diagnosing a secondary neoplasm to the penis. Mucoid differentiation of urothelial cells can be seen in FNAB specimens and might pose a problem in differential diagnosis.
{ "pile_set_name": "PubMed Abstracts" }
<!DOCTYPE html> <html> <head> <title>APIドキュメント</title> <meta http-equiv="Content-Type" content="text/html; charset=UTF-8"/> <meta name="viewport" content="width=device-width, initial-scale=1"> <link type='text/css' rel='stylesheet' href='../../../apidoc/stylesheets/bundled/bootstrap.min.css'/> <link type='text/css' rel='stylesheet' href='../../../apidoc/stylesheets/bundled/prettify.css'/> <link type='text/css' rel='stylesheet' href='../../../apidoc/stylesheets/bundled/bootstrap-responsive.min.css'/> <link type='text/css' rel='stylesheet' href='../../../apidoc/stylesheets/application.css'/> <!-- IE6-8 support of HTML5 elements --> <!--[if lt IE 9]> <script src="//html5shim.googlecode.com/svn/trunk/html5.js"></script> <![endif]--> </head> <body> <div class="container-fluid"> <div class="row-fluid"> <div id='container'> <ul class='breadcrumb'> <li> <a href='../../../apidoc/v2.ja.html'>Foreman v2</a> <span class='divider'>/</span> </li> <li> <a href='../../../apidoc/v2/architectures.ja.html'> Architectures </a> <span class='divider'>/</span> </li> <li class='active'>create</li> <li class='pull-right'> &nbsp;[ <a href="../../../apidoc/v2/architectures/create.ca.html">ca</a> | <a href="../../../apidoc/v2/architectures/create.cs_CZ.html">cs_CZ</a> | <a href="../../../apidoc/v2/architectures/create.de.html">de</a> | <a href="../../../apidoc/v2/architectures/create.en.html">en</a> | <a href="../../../apidoc/v2/architectures/create.en_GB.html">en_GB</a> | <a href="../../../apidoc/v2/architectures/create.es.html">es</a> | <a href="../../../apidoc/v2/architectures/create.fr.html">fr</a> | <a href="../../../apidoc/v2/architectures/create.gl.html">gl</a> | <a href="../../../apidoc/v2/architectures/create.it.html">it</a> | <b><a href="../../../apidoc/v2/architectures/create.ja.html">ja</a></b> | <a href="../../../apidoc/v2/architectures/create.ko.html">ko</a> | <a href="../../../apidoc/v2/architectures/create.nl_NL.html">nl_NL</a> | <a href="../../../apidoc/v2/architectures/create.pl.html">pl</a> | <a href="../../../apidoc/v2/architectures/create.pt_BR.html">pt_BR</a> | <a href="../../../apidoc/v2/architectures/create.ru.html">ru</a> | <a href="../../../apidoc/v2/architectures/create.sv_SE.html">sv_SE</a> | <a href="../../../apidoc/v2/architectures/create.zh_CN.html">zh_CN</a> | <a href="../../../apidoc/v2/architectures/create.zh_TW.html">zh_TW</a> ] </li> </ul> <div class='page-header'> <h1> POST /api/architectures <br> <small>アーキテクチャーの作成</small> </h1> </div> <div> <h2>例</h2> <pre class="prettyprint">POST /api/architectures { &quot;architecture&quot;: { &quot;name&quot;: &quot;i386&quot; } } 201 { &quot;created_at&quot;: &quot;2020-03-11 07:55:01 UTC&quot;, &quot;updated_at&quot;: &quot;2020-03-11 07:55:01 UTC&quot;, &quot;name&quot;: &quot;i386&quot;, &quot;id&quot;: 922134522, &quot;operatingsystems&quot;: [], &quot;images&quot;: [] }</pre> <h2>パラメーター</h2> <table class='table'> <thead> <tr> <th>パラメーター名</th> <th>記述</th> </tr> </thead> <tbody> <tr style='background-color:rgb(255,255,255);'> <td> <strong>location_id </strong><br> <small> 任意 </small> </td> <td> <p>Set the current location context for the request</p> <p><strong>Validations:</strong></p> <ul> <li> <p>Must be a Integer</p> </li> </ul> </td> </tr> <tr style='background-color:rgb(255,255,255);'> <td> <strong>organization_id </strong><br> <small> 任意 </small> </td> <td> <p>Set the current organization context for the request</p> <p><strong>Validations:</strong></p> <ul> <li> <p>Must be a Integer</p> </li> </ul> </td> </tr> <tr style='background-color:rgb(255,255,255);'> <td> <strong>architecture </strong><br> <small> 必須 </small> </td> <td> <p><strong>Validations:</strong></p> <ul> <li> <p>Must be a Hash</p> </li> </ul> </td> </tr> <tr style='background-color:rgb(250,250,250);'> <td> <strong>architecture[name] </strong><br> <small> 必須 </small> </td> <td> <p><strong>Validations:</strong></p> <ul> <li> <p>Must be a String</p> </li> </ul> </td> </tr> <tr style='background-color:rgb(250,250,250);'> <td> <strong>architecture[operatingsystem_ids] </strong><br> <small> 任意 , nil可 </small> </td> <td> <p>オペレーティングシステム ID</p> <p><strong>Validations:</strong></p> <ul> <li> <p>Must be an array of any type</p> </li> </ul> </td> </tr> </tbody> </table> </div> </div> </div> <hr> <footer></footer> </div> <script type='text/javascript' src='../../../apidoc/javascripts/bundled/jquery.js'></script> <script type='text/javascript' src='../../../apidoc/javascripts/bundled/bootstrap-collapse.js'></script> <script type='text/javascript' src='../../../apidoc/javascripts/bundled/prettify.js'></script> <script type='text/javascript' src='../../../apidoc/javascripts/apipie.js'></script> </body> </html>
{ "pile_set_name": "Github" }
Image credit: Bob Brown’s confident prediction was made in 1931. Sourced from James Gleick’s blog. Originally written for the Creative Industries Innovation Centre, 2011. Closing the 2011 Sydney Writers’ Festival was a plenary address by author James Gleick, whose book The Information has been recently described by the ABC’s Robyn Williams as the ‘best science book ever’. Detailing the modern history of information technology, The Information tracks how it was that ‘information’ came to be conceived as an abstract quantity, giving rise to terms like ‘bit’ to describe a unit of data. It’s obvious to us now, but it took people like Bell Telephone Labs engineer Claude Shannon to imagine that everything from the morse code to thermodynamics to jungle drums might have a measurable scientific quantity, before the information age we now live in could emerge. But while The Information offers readers insights into how the abstraction of data has created what he calls an ‘information flood’, Gleick’s SWF address, titled ‘Perish the Thought’ was far less inclined to treat books as mere ‘containers’ of ‘content’. “The separation”, he suggests, “is not entirely satisfying – we interact with a book in a more complex way”. A book is not merely a container for content, in the way that a wine bottle holds the wine. It is, he suggests, a “peak technology – one that is ideally suited to its task”. That means, contrary to the deafening roar of technology boosters and bloggers, the book will never die. To support his case, Gleick took us on a journey through the many moments of the book’s anticipated demise. In the 1930s, for example, a relatively obscure American author Robert Brown wrote a manifesto declaring books “antiquated word containers”. We were reminded of Marshall McLuhan’s impassioned embrace of print’s demise in the early 1960s – the potentials then offered by fuzzy black and white television were, to MacLuhan, portents of new participatory forms of literacy in the coming ‘electric age’. Nicholas Negroponte was calling for an end to the book back in 1996, just as he claimed in 2010 that “the physical book is dead” – that digital books will replace physical books as the dominant form. So it’s not that the claims are new. It’s just that the e-book is now a reality, and what’s more it’s splendid. Jacob Weisberg wrote in Slate in 2009 how much he loves the Kindle as his “cool new literature delivery system”. Audiences agree: last week Amazon announced a new milestone, now selling more Kindle versions of book titles than print. Forget the future – the death of the book is clearly happening right now. Not so, says Gleick. As someone who has thought a lot about the relationships between ‘containers’ and their ‘content’, Gleick is more inclined to think of the value of the book as lying in its print form. It’s the human instinct to collect objects of value that makes us love the book as an object, he suggests, and he quotes I.A Richards, who thought of the books as ‘a machine to think with’. Like other treatments on the subject, such as John Thompson’s Merchants of Culture, Gleick tends to think the bigger problem at hand is not in fact the demise of the book – after all 2010 saw the publication of 316,000 new titles, and that’s not including the nearly one million titles borne of ‘internet-driven’ non-traditional publishing – but rather the publishing industry itself. Gleick contends here that the trouble may be less about digital formats and more to do with the short-termism of publishers and their insatiable greed, chasing after block busters and leaving the backlists for dead. It’s these characteristics that are only letting the e-books down too, he claims. Sloppy editing, too many widows and orphans, charging readers too much, paying writers too little – they all stand in the way of creating a satisfying e-book experience. ‘Enhanced’ e-books offering readers embedded video and applets may be well and good, but don’t, he pleas, start embedding hyperlinks into text, and don’t start introducing social bookmarks! In other words don’t introduce anything that will take the reader out of the book. This may be a fanciful desire on Gleick’s part, but it also goes to the crux of the matter. The word not mentioned in this address was ‘narrative’, and it seemed a strange omission – after all, isn’t the only thing distinguishing ‘the book’ from ‘the internet’ in an age of e-publishing the coherence of the narrative perspective? And that old authorial voice? In the end, for Gleick, it came down to a bit more than narrative consistency, and the trusted authorial voice nourished by publishers committed to the task of connecting writers with their audiences. The book as a ‘peak technology’ was key. Technology barriers limit the time horizon of video to around 100 years. For the internet, the time horizon is around 20 years; Facebook give or take a couple of years. The genius of the book as a peak technology is its ability to break through the technological barriers of the past, with a time horizon dating to the beginning of human history. In the antiquity of the book, then, lies its future. To Gleick: “When we find ourselves living in the perpetual present, books become the furniture of eternity”. James Gleick is an author, journalist and biographer whose books explore the cultural ramifications of science and technology. His most recent book, ‘The Information: A History, a Theory, a Flood’, is being hailed as his crowning work. Gleick is also the author of the bestselling books ‘Chaos’, ‘Genius’, ‘Faster’ and a biography of Isaac Newton. Three of these books have been Pulitzer Prize and National Book Award finalists, and have been translated into more than 20 languages. James divides his time between New York City and Florida. Sarah Barns gets excited by digital publishing, but judging by the unwieldy pile of books stacked up by her bedside, remains stuck with the antiquated habits of what Ben Ehrenreich would call a ‘biblio-necrophiliac’. I could tell you how many steps make up the streets rising like stairways, and the degree of the arcades’ curves, and what kind of zinc scales cover the roofs; but I already know that this would be the same as telling you nothing. The city does not consist of this, but of relationships between the measurements of space and the events of its past. —Italo Calvino, Invisible Cities, 1974 In Italo Calvino’s Invisible Cities fluid assemblages of signs and images litter a subterranean landscape which mark the destinations to which Marco Polo has travelled. Polo recounts these destinations to his Emperor Kublai Khan without recourse to a map or a wayfaring guide; we are given little by way of their geography, or any sense of the spatial connections between each recalled location. Instead there are only fragments, the improbable exceptions of remembrance and experience. Calvino’s invisible cities are all given names, women’s names like Irene, Chloe, Raissa, Adelma: Irene, for example, “is the city visible when you lean out from the edge of the plateau at the hour when the lights come on” (1974: 112). There are many cities, but always the one: Venice. This is the Venice collapsed or hidden behind its contemporary, over-exposed tourist façade, whose ‘invisibility’ is cultivated as the imaginative potentiality of everyday encounters with a familiar space. Of this Venice there are no general claims made, instead, from the singularity of this one city, are teased provisional cities that capture a mood, a memory, a fleeting gesture, the tracery of a half-glimpsed pattern… What might Calvino’s peculiar treatments of urban spatiality offer to today’s practitioners of urban computing? M. Christine Boyer (1996: 142) has noted the way Invisible Cities represents a network “much like the matrix of a hypertext, in which the reader can select multiple routes and draw a variety of conclusions”. During the 1960s Calvino was interested in what the combinatory complexities of cybernetics meant as a way of perceiving the world, one that could divide it into a series of discrete, divisible parts, rather than continuous in form, a shift he considered radical in the way it altered the theoretical image of our mental processes. Invisible Cities sees this recombinatory logic of cybernetics in action, allowing for an imaginary projection of urban space via a set of algorithmic relationships that enable places to exchange their form, order, and distances, as qualities assorted “like the letters in a name” (Calvino 1974: 164). In Invisible Cities this recombinatory logic incorporates not only discrete spatial entities, but also “the measurements of space and the events of its past”. An imaginative projection of the city’s spatiality is thus evoked as intimately temporal – but again, this temporality is not continuous, as in the steady passage of time, but is rather experienced as discontinuous and elliptical. Just as there is no clear linear passage through the spatial environment of the city of Venice, so too there is no clear passage through its shifting temporalities, or the discrete stages of Marco Polo’s journey: “all the future Berenices”, for example, “are already present in this instant” (1974: 146). For this is a temporality that figures like the experience of memory, in which recollections emerge without warning, as discrete, embodied moments, which might flash up at any given time – such as, perhaps, when you lean out of a window in the early evening. In this way Calvino animated invisible cities as topologies of moments, whose recombinations and recollections continue to haunt imagistic projections and abstract modes of knowledge. Released two years after the publication of Invisible Cities, Jonothan Raban’s Soft City (1974) offered a similar treatment of the urban terrain as intimately personal, and therefore malleable and indeterminate: “Decide who you are, and the city will again assume a fixed form around you” (Raban 1974: 1). The fractured identity of the modern condition was mirrored in the malleability of urban space, as Raban’s narrative itinerary teased out the many from the singular, navigating agitated spaces of illusion, myth, aspiration and nightmare. The dynamic of cities was presented as “plastic by nature”, criss-crossing both the real and the imagined, the voice of commentary mixing it up with the musings of a wondering, wandering traveler. Dense with labyrinthine alleyways of possibility and happenstance, Soft City presented urban spaces “in our images; they, in turn, shape us by the resistance they offer when we try to impose our own personal form on them” (Raban 1974: 1-2). Both writers offered their accounts of the city not as scholars of urbanism but instead as conjurors of stories. Jeannette Winterson (2001) has written that “[r]eading Calvino reading Venice is a reminder of how often the controlled, measured world of knowledge fails us. So much of life resists the facts. Imagining Venice is imagining yourself, as Khan discovers – an unsettling exercise, but necessary, perhaps.” At one point in his account of invisible cities, Calvino describes the way Kublai Khan had focused so narrowly on a chessboard of black and white squares that the game’s meaning had eluded him, as it had simply become an abstract piece of wood (Boyer 1996: 143). But when Marco Polo reminded him that this chessboard was “inlaid with two woods, ebony and maple” Khan’s imagination took flight. As Boyer has suggested, in this way Calvino teaches us a lesson: we might reduce events to abstract patterns that facilitate the procedures of logical operations, or we can work to engender or revive imaginary projections – in this case, making words reveal the very tangible qualities of a given object – which in turn might allow for the continued presence of the unfathomable, the invisible (ibid). This Chapter considers some of the ways in which we might continue to encounter the elliptical invisibilities of contemporary ‘real-time ‘ cities. Today, the ability to graphically enhance our imaging of cities as multi-scalar, networked environments offers profound potentials, introducing an array of new urban management and design techniques using more detailed, real-time urban data. Just as a shapeless dust cloud invaded the continents of Invisible Cities, today’s real-time cities are underpinned by an information architecture of sensors and applications, whose databases express the mutating, multi-scalar complexities of the material world. The ability to visualize these interactions in real-time radically disrupts our conception of the city, by representing urban spaces according to their everyday uses as much as by their physical, built structures. Real-time usage patterns can, for example, be applied to predict the impact of new developments, replacing of out of date census data with predictive models more closely attuned to the complex interactions and spatial flows of the city. Embedded sensor networks reveal that which might otherwise be invisible to the naked eye; like coins rubbed over waxpaper, they make visible a myriad of fluid, complex exchanges between material, social and informational universes. For many, this computational intensification of the material world retrieves hidden, hitherto banished possibilities, and can be put to disruptive uses (Foth 2008: 19). To Foth, practitioners of urban informatics can act as ‘urban anatomists’, dissecting urban environments and infrastructure by “trying to microscopically uncover the connections and interrelations of city elements”, seeking to “picture the invisible and to zoom into a fine-grained resolution of urban environments”. Peter Hall and Janet Abrams have suggested “[m]apping has emerged in the information age as a means to make the complex accessible, the hidden visible, the unmappable mappable” (2006: 12). The application of hyper-local, multi-scalar and real time mapping techniques, it is argued, present opportunities to expose ‘hidden’ or hitherto invisible relationships, including the relationships between centre and periphery, power and influence (see Sassen 2008; Boyer 2006). For Dan Hill, there is the potential to avoid grand infrastructural interventions which become “hardwired into the urban fabric” for subsequent generations, and to instead develop a more “iterative, responsive field of ‘urban acupunctures”. Location-aware computing has in such ways been seen to greatly expand the range of possibilities for artists, architects and designers to “re-enchant the world”, offering “a way of making visible all these hidden stories of place” (Crang and Graham 2007: 815). The embedding of microprocessors via sensor web networks in physical environments also enables the informational life-worlds of millions of ‘users’, human or otherwise, to be made visible, such that needs not only of humans but also natural environments can be revealed as diffuse, complex systems of interaction. But as practitioners of urban computing seek to actively to disrupt established views of the city, visualizing that which has hitherto remained hidden from view, a return to Invisible Cities also prompts us to reconsider the enduring presence of that which still remains out of view in today’s real-time cities. In a sense, many of the potentials associated with real-time mobile networks are predicated on making visible that which might otherwise remain unseen. But the twentieth century has already witnessed many costly lessons associated with relying too heavily on technologies of visual abstraction and representation as a means to progress urban reform. So when we today assess the potentials associated with enhanced, contextually-aware spatial representations of the real-time city, Calvino’s writing reminds us of the need to be remain mindful not only of what this capacity for spatial measurement reveals, but to consider also how we might continue to enfold the ‘the events of its past’ within these emergent, distributed networked configurations. The title for the chapter was inspired by reading Virginia Woolf’s Street Haunting, in which she takes her readers on a walk through London one winter’s eve in search of a pencil. Happily, it’s available online now, and can be read below. Another inspiration for the piece are the Lost Laneways of Sydney – one of the images from this fine collection is below. It captures a man walking down Exeter Place in Sydney, 1906. Exeter Place was obliterated as part of the Wexworth St Resumption. NSW SuburbLabs is a pilot project connecting historical content in government and public archives and institutions to the testbed locations of the National Broadband Network in NSW. The project was funded by the NSW Government in 2010 as part of its Broadband Testbed Trials. Two of the test-bed locations feature here: Middleton Grange and Kiama. The project differed from some other recent digital archives projects, in that it focused on what you could do with widely-accessible publishing platforms like WordPress and Flickr. It also benefited a great deal from Trove, launched by the National Library of Australia in 2010. As I pieced together collection materials drawn from vastly dispersed collections relating to highly-localised sites, whose significance rested primarily on their having been chosen as broadband test-beds (rather than their particular historical significance), I was once again reminded of the the importance of storytelling, context and interpretation. The tools of the trade for curators and historians, whose work remains vital even as the data – in the form of digital archives – becomes accessible to many in ways not seen before. And what stories! Middleton Grange was only given its name in 2005, but explorations of the archives reveal many a fascinating tale about this perimeter suburb of Sydney. Hoxton Park, for example, has long been a place to which struggling inner-city types fled in search of easy money through property – a not unfamiliar tale to residents of the city today. It also happens that Australia’s first published poet, Barron Field, took up humble residence on the 2000 acres known as Hinchinbrook – publishing his much-maligned ‘Kangoroo’ while employed as a judge on the NSW Supreme Court. Much of the archives work featured on this site has contributed to a PhD I’ve been undertaking through the University of Technology Sydney. It’s been a long and winding journey – starting out in the Faculty of Computing and IT and ending up in Public History – and finally submitted in August 2010. Titled The Death and Life of the Real-Time City: Re-imagining the City of Digital Urbanism, this is a somewhat ‘non-traditional’ PhD which traverses a number of different fields and takes in ideas relating to urban computing, utopian images of the city, urban activism during the 20th century, sound practices, and the digital distribution of media archives today. If you’re wondering how all those ideas fit together, you best have a read. A copy of the unpublished dissertation can be downloaded here. The Abstract begins like this: Information and communications technologies are becoming increasingly diffused within the material spaces of the city, generating novel ways of representing complex, hitherto ‘invisible’ urban behaviours in real-time. Many digital urbanists are inspired by the capacity of these network technologies to radically transform our perceptions and experiences of urban space. But how ‘new’, really, is this emergent vision of the city? My primary interest has been to critically interrogate how it is that digital urbanists approach the space of the city – not only in descriptive terms, in terms of the ‘what is’, whether that be current GPS-enabled bicycle trips or mobile phone usage patterns, but by projecting a kind of anticipatory urban imaginary which agitates for ‘what might be’ and in doing so, is implicitly critical of the status quo. By digital urbanists, I basically mean those practitioners and researchers who are excited by the potential for urban computing – wireless networks, mobile devices and so forth – to alter the way we use and understand urban spaces. Just as the term ‘urbanism’ is sometimes used to denote a passionate interest in, or engagement with, the vicissitudes of urban life, I’ve used the term ‘digital urbanism’ to capture a largely optimistic engagement in the potential for urban computing technologies to reform cities. MIT SENSEable City Lab 2010. Project: Network & Society I’ve been fascinated with the rise of digital urbanism because it stands quite apart from the orientation of many cyberspace cheerleaders of the 1990s, who predicted the demise of the city. Where previously the anti-materiality of this post-urban fantasy had looked to the Internet as a kind of utopia of pure space â?? where a virtual world of pure information served to ‘decontaminate’ natural and urban landscapes and annihilate geographical constraints, today’s real-time communications are instead championed as potentially enhancing the behaviours of the city. The concept of the real-time city is only one of the many ways in which ‘the city’ is being re-visioned using contemporary network technologies. It’s associated primarily with the work of practitioners of urban informatics, a discipline championed by researchers such as Marcus Foth, Anthony Townsend, and Howard Rheingold, along with industry practitioners like Carlo Ratti, head of the SENSEable City Lab at the Massachusetts Institute of Technology (MIT), and Dan Hill, Senior Consultant at Arup and creator of cityofsound.com. In my thesis, I approach the concept of the real-time city a bit more broadly than it is usually understood within fields like urban informatics, because I’m interested in it not as a functional term but as an aspirational term. The real-time city, I argue, serves to project a particular vision of the city, one whose performance rests on the capacity for distributed computing to ‘enhance’ representations of cities as complex urban systems, often using data visualization techniques to capture otherwise ‘hidden’ data flows between distributed computing devices, including mobile phones. My central concern with this vision is its reliance on technologies of visualisation, which are used to offer better representations of urban complexity. Despite the emphasis on urban complexity, my contention is that this vision nevertheless progresses particular, and in fact quite restrictive, notions of the urban. I’ve found that many of the claims of digital urbanists tend to pivot around the revelatory capacity of real-time networks to ‘make the invisible visible’. In its approach to the city, this entrenches an intensely visual agenda which is evident across much of urban studies, setting certain parameters around what can be ‘seen’ and what remains ‘unseen’ in the life of the real-time city. I treat the emphasis on visual abstraction as a concern, not only for its tendency to privilege the visual over other sensory modes of urban experience, but also for its privileging of a formalistic, design-led approach, which tends to engage with systems design at the expense of social process. Such tendencies have not gone unnoticed; the architect Peter Eisenmann recently decried practices associated with digital urbanism as a ‘new, virulent breed of formalism, more virulent because it [is] posed under the banner of a neo-avant guard technological determinism’ (cited in Anthony Vidler’s Histories of the Immediate Present, 2008). So that’s where Jane Jacobs comes in, with her seminal text The Death and Life of Great American Cities (1965). Urban planners during the 1960s were enchanted by the potential to introduce greater order into the city – think of Le Corbusier’s Radiant City – and put forward models of ‘urban renewal’ which could be easily replicated across other cities. Death and Life was essentially a tirade against these practices of post-war American planning, mourning the way American cities were being transformed into forests of high-rise buildings, leaving their citizens ostracized and isolated, and subsequently undermining the vitality of American public culture. Jane Jacobs on her bicycle, New York 1960s. Aghast at the impersonalized urban landscapes transforming modern American cities, Jacobs urged that greater attention be paid to the values of locatedness and connectedness to place. In a strong but gentle polemical style, Jacobs argued that urban spaces worked best when strangers could easily encounter each other, when children played on the street, and when planning decisions could be made at a local level, rather than through centralized planning bureaucracies and the imposition of abstracted ideas about cities. The challenge Jacobs presented to modern urban planning was therefore not just about the particular technique of urban renewal being promulgated by the American planning profession at that time. It also concerned, more fundamentally, its claim to be reviving urban spaces through new approaches to urban development, which relied heavily on techniques of urban abstraction. To Jacobs, such techniques famously represented ‘the dishonest mask of pretended order, achieved by ignoring or suppressing the real order that is struggling to exist and to be served’ (1965: 25). Rather than resorting to a plan, a grid, or a highway network, Jacobs reconceived cities as disorganised collections of haphazard incidents and accidental encounters between strangers. Robert Moses’ plan for the Lower Manhattan Expressway Across contemporary urban planning and architecture today, Jacob’s target of post-war modernist planning tends to be framed for its tragic failures, a product of the over reliance on the urban spatial form as a basis from which to alleviate social ills, seeking to reform or renew built environments while leaving social relationships intact. Jacobs’ polemic is required reading for today’s students, who are taught of the failures wrought by these modernist regimes, and the geographies of single-use enclaves and far-flung highways they spawned. Indeed, the criticisms she waged against the profession might today be considered planning orthodoxy: in particular, the need to avoid widely-replicable, abstract urban schemas, and to instead take into account the local conditions that give rise to productive diversity. In recalling its title, my thesis is not so much interested in what Death and Life had to say about the ideal conditions of urban form, the length of city blocks, the presence of mixed industry, etcetera, as its symbolic and now historic project of re-imagining ‘the city’. In challenging the conventional wisdom about how to understand cities, part of the radicalism of Death and Life was its steady insistence that the trickiness of cities can be as evident in everyday interactions on downtown sidewalks as it is in the abstracted representations and codifications of specialised disciplines. So the title of my thesis draws from Jacobs to affirm the continuing importance of this central challenge as it applies to the emergent fields of digital urbanism today. Somewhat working against the grain of conventional approaches (if you can use a term like ‘conventional’ in relation to a relatively nascent field of practice!), my PhD has gone on to retrieve some different practices and perspectives, drawn from the fields of critical spatial theory, cultural geography and sound studies, to re-imagine a ‘real-time’ experience of the urban terrain. Through a practice-led response, I’ve re-imagined the digital terrain as a historical topology that enfolds within it different time-spaces – what I’ve cheekily called the ‘real times of space‘. This practice has made tactical use of the mobile device as a listening platform, capable of retrieving the substrata of today’s digital terrain through its archival audio traces. Working in Sydney, Australia, I’ve retrieved the ambient resonances of particular moments in the life of the city in the way one might navigate a memori topi, using archival sound traces to facilitate experiential audio-visual interactions with the past-presences of an urban space. This practice has tried to figure out a way of navigating the digital-urban terrain not as a networked space of contemporary connectivity – the perpetual present of real-time interaction – but also as a way of experiencing what Doreen Massey has called a ‘simultaneity of stories so far’ (for space, 2003, p.109). Massey has been influential for me here – in an exhibition catalogue for Olaf Eliasson’s Weather Project at the Tate Museum in 2003 Massey writes of the times of space, , which is not quite totally spatial in its privileging of the present, but open to loose ends, to connections yet to be made. If we shift the concept of ‘real- time’ away from that of the networked connectivity of the present, to the ‘loose ends’ of space’s real-times, what practices might that lead to? Here I’ve turned to sound, and specifically ambient sound archives of city spaces, as a way of listening in to the resonant traces of past moments. By doing so, I’ve hoped to enrich the spatial imaginary of the real-time city and its digital practices; to not only illuminate the contours of its networked connectivity, but to also listen, and learn, from what we might retrieve when we return to its forgotten spaces. Ultimately, I’m totally fascinated with the rise of urban computing, and the potential for spatial technologies to re-shape not only the way we use cities, but also the way we imagine them. Nevertheless, I believe it’s time for more critical debate about the extent to which technologies of urban computing can themselves reform the deeper institutional and political practices that underpin the production of contemporary cities. From Web 2.0 to City 2.0 – how might that take shape within institutions of urban governance? Listening in to the city’s recorded geography might help to answer that question. When we do listen, we hear that the agitations of urban crisis are not so new, we can listen to the mistakes of urban modernism, and can perhaps begin to recall the dangers of believing reform is something to be designed by only a few. Through ABC Pool, I’ve been working to publish a number of the archival recordings featured on Sydney Sidetracks through an open access Creative Commons licence. That means they are now available for re-use and remix. The project is starting with the Sydney collection, but will be expanding to include other cities very soon. The project has featured on the ABC’s social media website Pool. It launched on January 2011 and has since seen the release of a number of additional ABC TV & Radio Archives items into the public domain. An example of some of the items I have cleared through this project include: VP Day 1945 Voices Through this project I cleared a number of voice recordings of infamous Sydney-siders, including the gunman Chow Hayes, the activist Juanita Nielsen and the colourful lady-about-town Bea Miles. Living on the Fringe As part of this ABC Pool project I conducted an interview with the director, Gian Carlo Manara, and undertook further research into the ABC’s document archives to uncover some of the unwanted press associated with the release of this once controversial documentary. Q&A With GianCarlo Manara, Director of Living on the Fringe Creative Commons License: Attribution Non-commercial No Derivatives GianCarlo Manara, director of the ABC’s 1963 documentary Living on the Fringe, shares some of his memories about the film with Sarah Barns. SB: What opportunities were there for documentary makers working in Australia at this time? How important was the ABC in supporting documentary production? GM: At the time we made Living on the Fringe, there weren’t so many opportunities for the few people with sufficient professional skill to make documentaries. The ABC was one of the first institutions to offer that chance, through programs like Big Country. SB: Was this a difficult film to make within the ABC at this time? GM: Documentaries like this weren’t very common. It was Allan Ashbolt in the Talks Dept who wanted to use television to make more political documentaries like this one. We worked together on Four Corners – our association grew from there. SB: What inspiration did you draw from when making this film? (for example, Italian neo-realist films etc). GM: I graduated in Film Direction and Scriptwriting in Italy in 1955. We all in the school were the products of Italian neo-realism. I personally have been also influenced by other filmmakers such as Grierson, Rota, and Cavalanti. SB: Did your own migrant story influence this film in any way? GM: No, I was not influenced by my migrant experience, but by the stark reality of the life of the neglected and the poor. The the media at the time always preferred to ignore this. SB: How did people on the streets of Sydney react to your filming of them? GM: Filming in the streets at that time was still a novelty. I often used a “candid camera” approach to catch reality. An exception was when I asked my sexy friend Diana Roberts, now the well know writer Di Morrisey, to walk around some streets in East Sydney. At this time many Italians and Maltese migrants used to hang around on Sunday morning. Migrants at the time were very lonely â?? no social life and above all no women! The “Latin Lover” was not yet a trendy image! SB: What did you hope audiences would learn from Living on the Fringe? GM: My hope was for the average viewer to understand that Australia was not just the land of milk and honey – that here, just like other part of the world, there were people in need. SB: Do you think Sydney is a better city today than it was when Living on the Film was made? GM: Is Sydney a better place today? It is a big question. It is certainly different – there is more social awareness in the area of welfare and help. Of course lifestyles are also very different. Is it better? If I look back at the Sydney of this time I see a child, and today I see an adult. But is the adult of today better than the child of yesterday? It is a big question… I often think about it, about the old beach carnival when the Life Savers were marching like soldiers, when the girls were wearing petticoats and Saturday night was the night of dance at the Trocadero! All gone! However the girls are still beautiful, and the Life Savers are still so important and so Australian! But one thing is for sure: the “greed” that today is often rampant was not so much at the time, even if everyone of course attempted to make some â??quidsâ??! The back of the Theatre Royal in Sydney - near Rowe Lane, site of the demolished Rowe St. resonant traces of the city: an archaeology of recorded action A component of my PhD was the production of a number of sound pieces which I’ve labelled ‘sound marks’. These pieces are intended to take the listener back to historical moments and events in the life of Sydney. Todayâ??s listener might chart a course through central Sydney, â??visitingâ?? these moments in much the same way that one might visit a monument or landmark. Theyâ??re not, in the main, attached to visible landmarks. It was 9am Sydney time on August 15 1945 when British Prime Minister Clement Atlee announced that Japan had surrendered unconditionally to the Allies. ‘The last of our enemies is laid low’ he said. PEACE! roared The Sun. In downtown Martin Place, massive crowds spontaneously gathered, to dance and make whoopie in celebration of the end of the War. The Australian Broadcasting Corporation (ABC)’s Talbot Duckmanton was there that day to record the scenes, describing to his audience some of the finer details of the setting: a Hitler effigy being hung from the windows of one of the banks, circles of dancing women before him (‘fine looking ladies, too!’), the din of a mosquito zooming around maniacally over head. Duckmanton’s recording captures the emerging style of documentary radio reportage adopted by the ABC’s radio correspondents after the war, as they took advantage of new, more versatile recording technologies to head out of the studio and into the streets and backwaters of Australia (Inglis 1983: 164; Thomas 2007). Standing in Martin Place today, listening in, through headphones, to the sounds captured by the ABC’s recording of these ebullient scenes some sixty-five years ago, one feels a giddy sense of time travel, being transported to that celebrated moment as it had been experienced right here. That sense of immediacy Duckmanton had worked to establish for his radio listeners back in 1945 draws today’s listener back in, to participate with his audience of the day in imagining the scenes at Martin Place. ‘There’s no policeman directing traffic on Pitt St today’ he tells us. No, indeed there is not. Today Martin Place is unusually quiet. It’s Saturday and the office workers who normally mill about here are nowhere to be seen. Weekend shoppers and tourists are perhaps avoiding the tunnel of wind that blows constantly up through the pedestrian promenade, making the place feel somewhat chilly even on hot summer afternoons. Duckmanton’s narration continues: Over on my right, on one of the buildings at the back, somebody has hung out a big dummy of Adolf Hitler with a great swastiker on the front of it, and to the cheers of the crowd he was lowered down from the top of the building and – duly hung! Today’s solitary listener might look up, wondering on which of these buildings here the spectacle occurred. Listening to the sounds of this old radio recording through personal headphones, we join with Duckmanton’s audience of the day in imagining the scenes being described. But we’re not listening to the wireless, whether from home or work, we’re in Martin Place, separated through time, not by distance, to the sounds of this euphoria en masse of the manic joy of wives soon to be reunited with husbands, of a city jubilant with the prospect of an immanent end to war-time rations. As we ‘return’ to this moment as it was documented here, in-situ, we are also just another person in the crowd with headphones on, enclosed, as Bull (2007) would have it, in a ‘pleasurable and privatized sound bubble’ of own own choosing. We might consider the peculiar sound bubble of this listening experience to be hallucinatory in its effects, in eliciting ‘visions’ of that which can no longer be seen. The experience is reminiscent of a movie soundtrack, transforming what is seen into a kind of cinematic-like visual feast. While this experience is all too familiar to headphone wearers everywhere, this particular piece of audio, an old, scratchy recording of a public event that took place right here some time ago, brings back a sense of the collective memory of an invisible past. So this audio recording facilitates a slightly different kind of audio-visual interactivity to that which might ordinarily be experienced with headphones, as the displacement affected by the auditory frame is also something of a ‘return’; an intimate commemoration with that previous, broadcast present. Today’s listener might ‘visit’ a number of these archival recordings as one would visit a monument, or some kind of a physical artefact that describes a historical event. Further up the street at Chifley Square, our listener can hear the chants of a student demonstration. It’s 1968 and Australia’s involvement in the war in Vietnam is under fire. The protesters have gathered outside the Commonwealth Centre, a towering 1960s office block demolished in 1988 to make way for the Chifley Tower. She hears a voice projected through a loudspeaker proclaiming the rights of conscientious objectors to a trial by jury, muffled cries calling for Mr. Robert Kennedy’s resignation, boos and hisses, muffled and dispersed at first and then becoming louder. The listener hears these sounds through her headphones, while the ambient noises of Chifley Square bleed into her densely, scratchily archival audio space. Further down at Circular Quay, she can ‘visit’ the voice of Paul Robeson singing Old Man River to the construction workers of the Sydney Opera House in 1963. If she heads over to the Rocks, she’ll also hear the sounds of Green Ban protesters fighting against the prospect of further high-rise construction, clashing with police in 1973; a bird sings in the background as a reporter details the scene. As she visits these recordings, the listener’s experience of these events yields a city of discrete, temporally-discontinous moments in time: a topography of events, as captured by recording technologies of the day. Today’s s listener could chart a course through central Sydney visiting these ‘soundmarks’ as one might visit different places of historical interest. Her experience of these sounds in-situ amplifies a different historical geography to that of the ‘sculptured narrative’ (ref) of monuments and memorials. When she stands in Martin Place listening to the sounds of VP Day, she’s looking at the Victorian sandstone buildings wondering on which one the Hitler effigy hung, and may only take a passing interest in their architectural features. Down at Circular Quay, she’s imagining the Sydney Opera House as a mess of scaffolding. When the listener returns to these moments, she revisits the past as originally experienced, and documented, as the ‘present’. In these recordings, she hears journalists detailing a contemporary (now past) scene, not recollections as described by someone from a future vantage point in time. The sense of immediacy yielded by these ambient street recordings, as it retrieves an experience of ‘being there’, is in this respect quite different to a studio-based oral history recording, which looks backwards from a contemporary vantage point. These pieces are not intended to structure the listener’s physical navigation of an environment, but simply to ‘mark’ a space-time, or series of space-times. They don’t offer the listener a structured navigation through a given locale. When you listen, you’ll hear no instructions as to which way you should walk; which way you should look. Each piece simply seeks to triangulate, like Calvino’s invisible cities, the measurements of space with the events of its past. Each of these sound pieces experiments with different approaches to working with sound archives for a site-specific listening experience. All are relatively short – the longest is 14 minutes. All were produced using the ABC’s archives, with the exception of one piece I produced using materials identified from the National Film and Sound Archive. Some simply present a single archival recording; others are more complex edited compositions that integrate a number of different sound sources. Some are narrated; others are not. Many of these pieces relate to what I have called ‘resonant spaces’ in Sydney; spaces whose amplification through the documentary record illuminates sites of conflict and contestation which otherwise remain hidden from view. Listening to these recordings in-situ intends to amplify a different historical geography to that of the sculptured narrative of official monuments and memorials. Such resonant spaces amplify the contested nature of a site’s contemporary spatiality. But other pieces are not about urban conflict at all: they simply ‘return’ to particular moments in the life of the city, yielding a topology of events and moments, as captured by different recording technologies of the day. I find some of these recorded moments particularly compelling as they enable the listener to revisit the past as originally experienced, and documented, as the ‘present’ specifically for the purpose of contemporary documentary reportage. As compositions, these sound marks are not intended to demonstrate new methods of sound composition, or examples of context-aware media technology. They are simply intended to demonstrate what different kinds of auditory remnants might be retrieved when we listen in to the real times of space. Wherever possible, I have made these recordings available for re-use by others interested in working with street’s acoustical historical geography. I make no claims over ownership of the final compositions, but only gesture towards their possible incorporation into contemporary practice. Sydney has long been a city well-known for poor planning decisions, reflecting a historically laissez-faire approach to urban design. Planning advocate J.D. Fitzgerald lamented in 1917 that Sydney was “a city without a plan, save whatever planning was due to the errant goat”. “Wherever this animal made a track through the bush”, he observed, “there are the streets of today”. Sydney historian Paul Ashton has subsequently called Sydney an “accidental city”, because its planning history has been shaped by, at best, opportunistic development and disjointed or abortive attempts at holistic planning. As declared by one frustrated onlooker: “There is no such thing as planning [in the city of Sydney] – [ it is] all opportunism on the part of every agency.” That can make for some fairly unruly spaces at times, as local residents and activists have intervened to protect their homes from speculative property development, then and now. A particularly notable period for citizen activism in Sydney was the 1960s and 1970s, when a colossal development boom utterly transformed the city. When developers capitalised on relaxed building height restrictions and relatively low interest rates, much of Sydney’s Victorian-era buildings within the CBD were demolished, replaced by commercial high-rise. Residents, activists and builders’ labourers joined forces at this time demanding the right for greater consultation in planning decisions. In their heyday the BLF Green Bans were successful in holding up more than $300m worth of development across Sydney. They saved many buildings – most notably the Rocks, a tourist mecca today – but not all. They also encouraged the development of stronger participatory planning processes in Australia. But when residents dared to speak out against the loss of their homes, they encountered the darker side of Sydney’s criminal underbelly… There are a number of sound recordings here clustered around Victoria St, dealing with the tumultuous period between 1973-4 when resident action forced delays to the construction of the Victoria Heights towers overlooking the city. It was 9am Sydney time on August 15 1945 when British Prime Minister Clement Atlee announced that Japan had surrendered unconditionally to the Allies. ‘The last of our enemies is laid low’ he said. PEACE! roared The Sun. In downtown Martin Place, massive crowds spontaneously gathered, to dance and make whoopie in celebration of the end of the War. The Australian Broadcasting Corporation (ABC)’s Talbot Duckmanton was there that day to record the scenes, describing to his audience some of the finer details of the setting: a Hitler effigy being hung from the windows of one of the banks, circles of dancing women before him (‘fine looking ladies, too!’), the din of a mosquito zooming around maniacally over head. Duckmanton’s recording captures the emerging style of documentary radio reportage adopted by the ABC’s radio correspondents after the war, as they took advantage of new, more versatile recording technologies to head out of the studio and into the streets and backwaters of Australia (Inglis 1983: 164; Thomas 2007). Standing in Martin Place today, listening in, through headphones, to the sounds captured by the ABC’s recording of these ebullient scenes some sixty-five years ago, one feels a giddy sense of time travel, being transported to that celebrated moment as it had been experienced right here. That sense of immediacy Duckmanton had worked to establish for his radio listeners back in 1945 draws today’s listener back in, to participate with his audience of the day in imagining the scenes at Martin Place. ‘There’s no policeman directing traffic on Pitt St today’ he tells us. No, indeed there is not. Today Martin Place is unusually quiet. It’s Saturday and the office workers who normally mill about here are nowhere to be seen. Weekend shoppers and tourists are perhaps avoiding the tunnel of wind that blows constantly up through the pedestrian promenade, making the place feel somewhat chilly even on hot summer afternoons. Duckmanton’s narration continues: Over on my right, on one of the buildings at the back, somebody has hung out a big dummy of Adolf Hitler with a great swastiker on the front of it, and to the cheers of the crowd he was lowered down from the top of the building and – duly hung! Today’s solitary listener might look up, wondering on which of these buildings here the spectacle occurred. Listening to the sounds of this old radio recording through personal headphones, we join with Duckmanton’s audience of the day in imagining the scenes being described. But we’re not listening to the wireless, whether from home or work, we’re in Martin Place, separated through time, not by distance, to the sounds of this euphoria en masse of the manic joy of wives soon to be reunited with husbands, of a city jubilant with the prospect of an immanent end to war-time rations. As we ‘return’ to this moment as it was documented here, in-situ, we are also just another person in the crowd with headphones on, enclosed, as Bull (2007) would have it, in a ‘pleasurable and privatized sound bubble’ of own own choosing. We might consider the peculiar sound bubble of this listening experience to be hallucinatory in its effects, in eliciting ‘visions’ of that which can no longer be seen. The experience is reminiscent of a movie soundtrack, transforming what is seen into a kind of cinematic-like visual feast. While this experience is all too familiar to headphone wearers everywhere, this particular piece of audio, an old, scratchy recording of a public event that took place right here some time ago, brings back a sense of the collective memory of an invisible past. So this audio recording facilitates a slightly different kind of audio-visual interactivity to that which might ordinarily be experienced with headphones, as the displacement affected by the auditory frame is also something of a ‘return’; an intimate commemoration with that previous, broadcast present. Today’s listener might ‘visit’ a number of these archival recordings as one would visit a monument, or some kind of a physical artefact that describes a historical event. Further up the street at Chifley Square, our listener can hear the chants of a student demonstration. It’s 1968 and Australia’s involvement in the war in Vietnam is under fire. The protesters have gathered outside the Commonwealth Centre, a towering 1960s office block demolished in 1988 to make way for the Chifley Tower. She hears a voice projected through a loudspeaker proclaiming the rights of conscientious objectors to a trial by jury, muffled cries calling for Mr. Robert Kennedy’s resignation, boos and hisses, muffled and dispersed at first and then becoming louder. The listener hears these sounds through her headphones, while the ambient noises of Chifley Square bleed into her densely, scratchily archival audio space. Further down at Circular Quay, she can ‘visit’ the voice of Paul Robeson singing Old Man River to the construction workers of the Sydney Opera House in 1963. If she heads over to the Rocks, she’ll also hear the sounds of Green Ban protesters fighting against the prospect of further high-rise construction, clashing with police in 1973; a bird sings in the background as a reporter details the scene. As she visits these recordings, the listener’s experience of these events yields a city of discrete, temporally-discontinous moments in time: a topography of events, as captured by recording technologies of the day. Today’s s listener could chart a course through central Sydney visiting these ‘soundmarks’ as one might visit different places of historical interest. Her experience of these sounds in-situ amplifies a different historical geography to that of the ‘sculptured narrative’ (ref) of monuments and memorials. When she stands in Martin Place listening to the sounds of VP Day, she’s looking at the Victorian sandstone buildings wondering on which one the Hitler effigy hung, and may only take a passing interest in their architectural features. Down at Circular Quay, she’s imagining the Sydney Opera House as a mess of scaffolding. When the listener returns to these moments, she revisits the past as originally experienced, and documented, as the ‘present’. In these recordings, she hears journalists detailing a contemporary (now past) scene, not recollections as described by someone from a future vantage point in time. The sense of immediacy yielded by these ambient street recordings, as it retrieves an experience of ‘being there’, is in this respect quite different to a studio-based oral history recording, which looks backwards from a contemporary vantage point. These pieces are not intended to structure the listener’s physical navigation of an environment, but simply to ‘mark’ a space-time, or series of space-times. They don’t offer the listener a structured navigation through a given locale. When you listen, you’ll hear no instructions as to which way you should walk; which way you should look. Each piece simply seeks to triangulate, like Calvino’s invisible cities, the measurements of space with the events of its past. Each of these sound pieces experiments with different approaches to working with sound archives for a site-specific listening experience. All are relatively short – the longest is 14 minutes. All were produced using the ABC’s archives, with the exception of one piece I produced using materials identified from the National Film and Sound Archive. Some simply present a single archival recording; others are more complex edited compositions that integrate a number of different sound sources. Some are narrated; others are not. Many of these pieces relate to what I have called ‘resonant spaces’ in Sydney; spaces whose amplification through the documentary record illuminates sites of conflict and contestation which otherwise remain hidden from view. Listening to these recordings in-situ intends to amplify a different historical geography to that of the sculptured narrative of official monuments and memorials. Such resonant spaces amplify the contested nature of a site’s contemporary spatiality. But other pieces are not about urban conflict at all: they simply ‘return’ to particular moments in the life of the city, yielding a topology of events and moments, as captured by different recording technologies of the day. I find some of these recorded moments particularly compelling as they enable the listener to revisit the past as originally experienced, and documented, as the ‘present’ specifically for the purpose of contemporary documentary reportage. As compositions, these sound marks are not intended to demonstrate new methods of sound composition, or examples of context-aware media technology. They are simply intended to demonstrate what different kinds of auditory remnants might be retrieved when we listen in to the real times of space. Wherever possible, I have made these recordings available for re-use by others interested in working with street’s acoustical historical geography. I make no claims over ownership of the final compositions, but only gesture towards their possible incorporation into contemporary practice.
{ "pile_set_name": "Pile-CC" }
Q: How to find database name of \data\base postgres folders? I have a large folder of 70 GB in my postgres installation under: D:\Program Files\PostgreSQL\9.5\data\base\130205 Question: how could I find out which database is based on that folder? I have like 10 databases running on the same server, and most of them having a tablespace on a different drive. But probably I'm missing a mapping somewhere, maybe a large index or kind of. How can I find out the "causing" database of these amounts of data? A: Thanks to the hint of @a_horse, the following statement shows the oid and table names: SELECT oid,* from pg_database
{ "pile_set_name": "StackExchange" }
// // Generated by class-dump 3.5 (64 bit) (Debug version compiled Oct 15 2018 10:31:50). // // class-dump is Copyright (C) 1997-1998, 2000-2001, 2004-2015 by Steve Nygard. // #import <UIFoundation/NSCollectionViewLayout.h> @interface NSCollectionViewLayout (NSPrivateItemSequence) + (BOOL)itemLayoutIsSequential; @end
{ "pile_set_name": "Github" }
O Vasco tem um novo técnico: Abel Braga. Depois de não se acertar com Vanderlei Luxemburgo, o Cruz-Maltino chegou a um acordo com o ex-comandante do Cruzeiro em longa reunião na tarde desta segunda-feira, no Rio de Janeiro. Desde a saída de Luxemburgo, na última sexta, Abel Braga era o nome preferido do presidente Alexandre Campello para assumir o Vasco, mas questões financeiras precisaram ser negociadas por causa das dificuldades do clube. 1 de 1 Abel Braga é o novo técnico do Vasco — Foto: Vinnicius Silva/Cruzeiro Abel Braga é o novo técnico do Vasco — Foto: Vinnicius Silva/Cruzeiro A primeira missão de Abel no Vasco será auxiliar a diretoria no mercado de transferências. O clube estabeleceu três prioridades para reforçar a equipe em 2020: um lateral-esquerdo, um meia e um centroavante. Entre os jogadores que terminaram 2019 no time titular, quatro estão em fim de contrato e podem deixar São Januário: o zagueiro Henríquez, os meio-campistas Richard e Guarín e o atacante Rossi. O último trabalho de Abel Braga foi no Cruzeiro. Ele comandou a equipe, que acabou rebaixada no Campeonato Brasileiro depois de sua saída, em 14 partidas, nas quais conquistou apenas três vitórias. Antes, havia passado pelo Flamengo, mas deixou o clube pouco antes da parada para a Copa América quando soube que a diretoria negociava com Jorge Jesus. No último trabalho de Abel Braga no Vasco, ele chegou ao clube em março de 2000 após a vitoriosa passagem de Antônio Lopes, que durou quatro anos. Com proposta do Olympique de Marselha, Abel ficou apenas três meses em São Januário. No jogo mais marcante daquele período, o Vasco derrotou o Flamengo por 5 a 1, no domingo de Páscoa. Na última partida do treinador, o time foi eliminado da Copa do Brasil pelo Fluminense.
{ "pile_set_name": "OpenWebText2" }
Order Michigan Supreme Court Lansing, Michigan September 12, 2017 Stephen J. Markman, Chief Justice Brian K. Zahra Bridget M. McCormack 154678(26)(27) David F. Viviano Richard H. Bernstein Joan L. Larsen Kurtis T. Wilder, PEOPLE OF THE STATE OF MICHIGAN, Justices Plaintiff-Appellee, v SC: 154678 COA: 333751 Kent CC: 11-002153-FH 11-002154-FH 11-002222-FH 11-002223-FH 11-002224-FH JOSEPH MICHAEL McINTYRE, Defendant-Appellant. _________________________________________/ On order of the Court, the motion for reconsideration of this Court’s June 27, 2017 order is considered, and it is DENIED, because it does not appear that the order was entered erroneously. The motion to stay is DENIED. I, Larry S. Royster, Clerk of the Michigan Supreme Court, certify that the foregoing is a true and complete copy of the order entered at the direction of the Court. September 12, 2017 a0906 Clerk
{ "pile_set_name": "FreeLaw" }
Brabançon Historically, the adjective Brabançon refers to a native of the Duchy of Brabant. It can also refer to: Brabançon horse, see Belgian (horse) Petit Brabançon, a type of toy dog A group of mercenaries active in France in the second half of the 12th century, see Lobar the Wolf La Brabançonne, the national anthem of Belgium
{ "pile_set_name": "Wikipedia (en)" }
1. Field of the Invention This invention relates to a helicopter rotor of the bearingless type, having an airfoil shaped blade attached to a flexible spar, specifically designed and fabricated to accommodate the torsion deflections of pitch change, and the bending requirements due to lead/lag and flap/droop blade excursions. This invention is specifically directed to the group of bearingless rotors wherein the flexible spar is rotatably driven by suitable attachment to the rotor hub and rotor drive shaft. The specific geometric shape of the spar is not important to this invention, and is shown in the accompanying figures as rectangular. Likewise, it is not important whether the spar be continuous across the rotor axis to attach to opposed blades, or whether each spar be unitary and joined only to one blade. For the latter configuration there may be an odd number of blades. 2. Description of the Prior Art Prior art patents familiar to the inventors and pertaining to hingeless rotor blade attachments and controls have generally been directed to tail rotor applications where pitch, lead/lag and flapping motions are less than those of main rotors. In attempting to transfer rotor technology developed for tail rotors to a main rotor application, concern had to be addressed to the adverse influence of these larger excursions, and especially to the pitch coupling effect due to inplane or lead/lag blade motions. The longer, wider, and heavier main rotor blade undergoes significant bending in first advancing into the direction of flight and then retreating from it as it completes it cycle of rotation at a constant driven rotor speed and undergoing commanded cyclic pitch changes as well as being impinged upon by wind gusts at any point on the azimuth. Starting and stopping produces still further inplane bending. The concept of using blade motions to introduce a proportional blade pitch change in a direction to stabilize the blade is known, as well as the concept of elimination or prevention of such pitch coupling. A specific rotor configuration to which our invention may be applied is shown in U.S. Pat. No. 4,008,980 to Noehren et al, which is used in the UH-60A helicopter. The specific "snubber bearing" of that rotor head is depicted as FIG. 5 in U.S. Pat. No. 4,087,203 to Ferris. The main objective of the teaching of this latter patent is similar to that of our invention; namely to provide structure that accommodates pitch change relative motion (torsion) between the flexible spar and rigid torque tube, minimizes the pitch coupling effect of the blade flapping wherein relative bending takes place between the spar and torque tube, and prevents pitch change motions due to lead or lag excursions when blade spar inplane motion occurs relative to the torque tube. In an embodiment wherein blade pitch change is introduced by means of a torque tube enveloping a flexible spar, and wherein the attachment to the rotor hub follows the teaching of the U.S. Pat. No. 3,874,815 to Baskin, use of this invention also appears beneficial, provided the linkage is suitably mounted at the virtual hinge axis of the blade spar such that the root end of the torque tube can be restrained from vertical motion.
{ "pile_set_name": "USPTO Backgrounds" }
# @generated by autocargo from //hphp/hack/src/hhbc:emit_fatal_rust [package] name = "emit_fatal_rust" edition = "2018" version = "0.0.0" include = ["../../emit_fatal.rs"] [lib] path = "../../emit_fatal.rs" [dependencies] emit_pos_rust = { path = "../emit_pos" } hhbc_ast_rust = { path = "../hhbc_ast" } instruction_sequence_rust = { path = "../instruction_sequence" } oxidized = { path = "../../../oxidized" }
{ "pile_set_name": "Github" }
Q: Can't link known file extensions to custom editor classifier I am working on an editor classifier extension for classic Visual Basic source files (module- and class files). The project has been created using the editor classifier project template from the Visual Studio 2012 SDK. The wizard created three code files: one for the classifier, one for the classifier-format and -provider and another one containing classification definitions. I made the following changes to the last one in order to link *.bas and *.cls files to my custom classifier... using System.ComponentModel.Composition; using Microsoft.VisualStudio.Text.Classification; using Microsoft.VisualStudio.Utilities; internal static class MyEditorClassifierClassificationDefinition { [Export(typeof(ClassificationTypeDefinition))] [Name("MyEditorClassifier")] internal static ClassificationTypeDefinition MyEditorClassifierType = null; [Export] [Name("custom")] [BaseDefinition("code")] internal static ContentTypeDefinition MyContentDefinition = null; [Export] [FileExtension(".bas")] [ContentType("custom")] internal static FileExtensionToContentTypeDefinition MyModuleFileExtensionDefinition = null; [Export] [FileExtension(".cls")] [ContentType("custom")] internal static FileExtensionToContentTypeDefinition MyClassFileExtensionDefinition = null; } The problem is, that Visual Studio does not invoke my classifier for files having *.bas, or *.cls extensions, instead the built-in editor for Visual Basic is used. I already tested my editor classifier using a custom file extension; in that case the classifier works as expected. I would like to know, if it's possible to change the classifier for known file extensions. A: I found an intresting solution for classifying keywors are already classifyed by a language service. It's description says it uses a Tagger to enhance code highlighting. Maybe it can help you: KeywordClassifier Older version of the linked project used a classifier mentioned in the description. You can get the name of the loaded document, also the extension with ITextDocumentFactoryService or maybe there is a way to bind the tagger also to extensions not only to the content type of Basic (instead of code). FileExtensionAttribute may help.
{ "pile_set_name": "StackExchange" }
--- author: - 'A. Gallenne' - 'A. Mérand' - 'P. Kervella' - 'O. Chesneau' - 'J. Breitfelder' - 'W. Gieren' bibliography: - './bibliographie.bib' date: 'Received July 11, 2013; accepted August 30, 2013' subtitle: 'IV. T Monocerotis and X Sagittarii from mid-infrared interferometry with VLTI/MIDI[^1]' title: Extended envelopes around Galactic Cepheids --- [We study the close environment of nearby Cepheids using high spatial resolution observations in the mid-infrared with the VLTI/MIDI instrument, a two-beam interferometric recombiner.]{} [We obtained spectra and visibilities for the classical Cepheids X Sgr and T Mon. We fitted the MIDI measurements, supplemented by $B, V, J, H, K$ literature photometry, with the numerical transfer code `DUSTY` to determine the dust shell parameters. We used a typical dust composition for circumstellar environments.]{} [We detect an extended dusty environment in the spectra and visibilities for both stars, although T Mon might suffer from thermal background contamination. We attribute this to the presence of a circumstellar envelope (CSE) surrounding the Cepheids. This is optically thin for X Sgr ($\tau_\mathrm{0.55\mathrm{\mu m}} = 0.008$), while it appears to be thicker for T Mon ($\tau_\mathrm{0.55\mathrm{\mu m}} = 0.15$). They are located at about 15–20 stellar radii. Following our previous work, we derived a likely period-excess relation in the VISIR PAH1 filter, $ f_\mathrm{8.6\,\mu m}$\[%\]$ = 0.81(\pm0.04)P$\[day\]. We argue that the impact of CSEs on the mid-IR period–luminosity (P–L) relation cannot be negligible because they can bias the Cepheid brightness by up to about 30%. For the $K$-band P–L relation, the CSE contribution seems to be lower ($< 5$%), but the sample needs to be enlarged to firmly conclude that the impact of the CSEs is negligible in this band.]{} Introduction ============ A significant fraction of classical Cepheids exhibits an infrared excess, that is probably caused by a circumstellar envelope (CSE). The discovery of the first CSE around the Cepheid $\ell$ Car made use of near- and mid-infrared interferometric observations [@Kervella_2006_03_0]. Similar detections were subsequently reported for other Cepheids [@Merand_2007_08_0; @Merand_2006_07_0; @Barmby_2011_11_0; @Gallenne_2011_11_0], leading to the hypothesis that maybe all Cepheids are surrounded by a CSE. These envelopes are interesting from several aspects. Firstly, they might be related to past or ongoing stellar mass loss and might be used to trace the Cepheid evolution history. Secondly, their presence might induce a bias to distance determinations made with Baade-Wesselink methods and bias the calibration of the IR period–luminosity (P–L) relation. Our previous works [@Gallenne_2011_11_0; @Merand_2007_08_0; @Merand_2006_07_0; @Kervella_2006_03_0] showed that these CSEs have an angular size of a few stellar radii and a flux contribution to the photosphere ranging from a few percent to several tens of percent. While in the near-IR the CSE flux emission might be negligible compared with the photospheric continuum, this is not the case in the mid- and far-IR, where the CSE emission dominates [@Gallenne_2011_11_0; @Kervella_2009_05_0]. Interestingly, a correlation starts to appear between the pulsation period and the CSE brightness in the near- and mid-IR bands: long-period Cepheids seem to show relatively brighter CSEs than short-period Cepheids, indicating that the mass-loss mechanism could be linked to stellar pulsation [@Gallenne_2011_11_0; @Merand_2007_08_0]. Cepheids with long periods have higher masses and larger radii, therefore if we assume that the CSE IR brightness is an indicator of the mass-loss rate, this would mean that heavier stars experience higher mass-loss rates. This behavior could be explained by the stronger velocity fields in longer-period Cepheids and shock waves at certain pulsation phases [@Nardetto_2008_10_0; @Nardetto_2006_07_0]. Studying this correlation between the pulsation period and the IR excess is vital for calibrating relations between the Cepheid’ fundamental parameters with respect to their pulsation periods. If CSEs substantially influence the observational estimation of these fundamental parameters (luminosity, mass, radius, etc.), this a correlation will lead to a biased calibration. It is therefore essential to continue studying and characterizing these CSEs and to increase the statistical sample to confirm their properties. We present new spatially resolved VLTI/MIDI interferometric observations of the classical Cepheids (HD 161592, $P = 7.01$days) and (HD 44990, $P = 27.02$days). The paper is organized as follows. Observations and data reduction procedures are presented in Sect. \[section\_\_observation\]. The data modeling and results are reported in Sect. \[section\_\_cse\_modeling\]. In Sect. \[section\_\_period\_excess\_relation\] we address the possible relation between the pulsation period and the IR excess. We then discuss our results in Sect. \[section\_\_discussion\] and conclude in Sect. \[section\_\_conclusion\]. VLTI/MIDI observations {#section__observation} ====================== Observations ------------ The observations were carried out in 2008 and 2009 with the VLT Unit Telescopes and the MIDI instrument [@Leinert_2003__0]. MIDI combines the coherent light coming from two telescopes in the $N$ band ($\lambda = 8-13\,\mu$m) and provides the spectrum and spectrally dispersed fringes with two possible spectral resolutions ($R = \Delta \lambda / \lambda = 30, 230$). For the observations presented here, we used the prism that provides the lowest spectral resolution. During the observations, the secondary mirrors of the two Unit Telescopes (UT1-UT4) were chopped with a frequency of 2 Hz to properly sample the sky background. MIDI has two photometric calibration modes: HIGH\_SENS, in which the flux is measured separately after the interferometric observations, and SCI\_PHOT, in which the photometry is measured simultaneously with the interferences fringes. These reported observations were obtained in HIGH\_SENS mode because of a relatively low thermal IR brightness of our Cepheids. To remove the instrumental and atmospheric signatures, calibrators of known intrinsic visibility were observed immediately before or after the Cepheid. They were chosen from the @Cohen_1999_04_0 catalog, and are almost unresolved at our projected baselines ($V > 95$%, except for HD 169916, for which $V = 87$%). The systematic uncertainty associated with their a priori angular diameter error bars is negligible compared with the typical precision of the MIDI visibilities (10–15%). The uniform-disk angular diameters for the calibrators as well as the corresponding IRAS 12$\mu$m flux and the spectral type are given in Table \[table\_\_calibrators\]. The log of the MIDI observations is given in Table \[table\_\_journal\]. Observations \#1, \#2, and \#5–\#10 were not used because of low interferometric or/and photometric flux, possibly due to a temporary burst of very bad seeing or thin cirrus clouds. -------- ---------------------- ----------------- -------------------- ---------- HD $\theta_\mathrm{UD}$ $f_\mathrm{W3}$ $f_\mathrm{Cohen}$ Sp. Type (mas) (Jy) (Jy) 49293 $1.91 \pm 0.02$ $4.3 \pm 0.1$ $4.7 \pm 0.1$ K0IIIa 48433 $2.07 \pm 0.03$ $6.5 \pm 0.1$ $5.5 \pm 0.1$ K0.5III 168592 $2.66 \pm 0.05$ $8.3 \pm 0.1$ $7.4 \pm 0.1$ K4-5III 169916 $4.24 \pm 0.05$ $25.9 \pm 0.4$ $21.1 \pm 0.1$ K1IIIb -------- ---------------------- ----------------- -------------------- ---------- : Properties of our calibrator stars. \[table\_\_calibrators\] ---- ----------- -------- ---------- ---------------- ----------- ------ \# MJD $\phi$ Target $B_\mathrm{p}$ PA AM (m) ($\degr$) 1 54 813.26 0.12 T Mon 129.6 63.7 1.20 2 54 813.27 0.12 T Mon 130.0 63.5 1.21 3 54 813.27 130.0 63.4 1.15 4 54 813.29 0.12 T Mon 130.0 62.6 1.26 5 54 813.30 0.12 T Mon 129.6 62.2 1.29 6 54 813.31 130.0 61.6 1.40 7 54 842.10 0.18 T Mon 108.7 62.6 1.26 8 54 842.11 HD 49293 110.1 59.7 1.21 9 54 842.13 0.18 T Mon 118.8 64.4 1.19 10 54 842.14 HD 49293 120.8 62.1 1.14 11 54 900.07 0.33 T Mon 128.5 61.4 1.33 12 54 900.09 HD 48433 128.8 59.9 1.49 13 54 905.39 126.6 39.3 1.18 14 54 905.40 0.76 X Sgr 126.4 49.2 1.06 15 54 905.41 122.6 45.7 1.11 16 54 905.43 0.76 X Sgr 129.4 55.3 1.02 ---- ----------- -------- ---------- ---------------- ----------- ------ : Log of the observations. \[table\_\_journal\] Data reduction -------------- To reduce these data we used two different reduction packages, MIA and EWS[^2]. MIA, developed at the Max-Planck-Institut f$\mathrm{\ddot{u}}$r Astronomie, implements an incoherent method where the power spectral density function of each scan is integrated to obtain the squared visibility amplitudes, which are then integrated over time. EWS, developed at the Leiden Observatory, is a coherent analysis that first aligns the interferograms before co-adding them, which result in a better signal-to-noise ratio of the visibility amplitudes. The data reduction results obtained with the MIA and EWS packages agree well within the uncertainties. The choice of the detector mask for extracting the source spectrum and estimating the background can be critical for the data quality. The latest version of the software uses adaptive masks, where shifts in positions and the width of the mask can be adjusted by fitting the mask for each target. To achieve the best data quality, we first used MIA to fit a specific mask for each target (also allowing a visual check of the data and the mask), and then applied it in the EWS reduction. Photometric templates from @Cohen_1999_04_0 were employed to perform an absolute calibration of the flux density. We finally averaged the data for a given target. This is justified because the MIDI uncertainties are on the order of 7-15% [@Chesneau_2007_10_0], and the projected baseline and PA are not significantly different for separate observing dates. The uncertainties of the visibilities are mainly dominated by the photometric calibration errors, which are common to all spectral channels ; we accordingly chose the standard deviation over a $1\,\mu$m range as error bars. Flux and visibility fluctuations between datasets {#subsection__flux_and_visibility_fluctuations_between_datasets} ------------------------------------------------- MIDI is strongly sensitive to the atmospheric conditions and can provide mis-estimates of the thermal flux density and visibility. This can be even worse for datasets combined from different observing nights, for instance for T Mon in our case. Another source of variance between different datasets can appear from the calibration process, that is, from a poor absolute flux and visibility calibration. In our case, each Cepheid observation was calibrated with a different calibrator (i.e., \#3-4 and \#11-12 for T Mon and \#13-14 and \#15-16 for X Sgr), which enabled us to check the calibrated data. To quantify the fluctuations, we estimated the spectral relative variation for the flux density and visibility, that is, the ratio of the standard deviation to the mean value for each wavelength between two different calibrated observations. For X Sgr, the average variation (over all $\lambda$) is lower than 5% on the spectral flux and lower than 1.5% on the visibility. This is a sightly higher for T Mon because the data were acquired on separate nights ; we measured an average variation lower than 8% on the spectral flux and lower than 4% on the visibility. Circumstellar envelope modeling {#section__cse_modeling} =============================== Visibility and spectral energy distribution {#subsection__visibility_and_sed} ------------------------------------------- The averaged calibrated visibility and spectral energy distribution (SED) are shown with blue dots in Figs. \[graph\_\_visibility\_xsgr\] and \[graph\_\_visibility\_tmon\]. The quality of the data in the window $9.4 < \lambda < 10\,\mu$m deteriorates significantly because of the water and ozone absorption in the Earth’s atmosphere. Wavelengths longer than $12\,\mathrm{\mu m}$ were not used because of low sensitivity. We therefore only used the spectra outside these wavelengths. The photosphere of the stars is considered to be unresolved by the interferometer ($V > 98\,\%$), therefore the visibility profile is expected to be equal to unity for all wavelengths. However, we noticed a decreasing profile for both stars. This behavior is typical of emission from a circumstellar envelope (or disk), where the size of the emitting region grows with wavelength. This effect can be interpreted as emission at longer wavelengths coming from cooler material that is located at larger distances from the Cepheid than the warmer material emitted at shorter wavelengths. @Kervella_2009_05_0 previously observed the same trend for $\ell$ Car and RS Pup. Assuming that the CSE is resolved by MIDI, the flux contribution of the dust shell is estimated to be about 50% at $10.5\,\mathrm{\mu m}$ for T Mon and 7% for X Sgr. It is worth mentioning that the excess is significantly higher for the longer-period Cepheid, T Mon, adding additional evidence about the correlation between the pulsation period and the CSE brightness suspected previously [@Gallenne_2011_11_0; @Merand_2007_08_0]. The CSE is also detected in the SED, with a contribution progressively increasing with wavelength. Compared with Kurucz atmosphere models [@Castelli_2003__0 solid black curve in Fig. \[graph\_\_visibility\_xsgr\] and \[graph\_\_visibility\_tmon\]], we notice that the CSE contribution becomes significant around $8\,\mathrm{\mu m}$ for X Sgr, while for T Mon it seems to start at shorter wavelengths. The Kurucz models were interpolated at $T_\mathrm{eff} = 5900$K , $\log g = 2$ and $V_\mathrm{t} = 4\,\mathrm{km~s^{-1}}$ for X Sgr [@Usenko_2012__0]. For T Mon observed at two different pulsation phases, the stellar temperature only varies from $\sim 5050$K ($\phi = 0.33$) to $\sim 5450$K ($\phi = 0.12$), we therefore chose the stellar parameters $T_\mathrm{eff} = 5200$K , $\log g = 1$, and $V_\mathrm{t} = 4\,\mathrm{km~s^{-1}}$ [@Kovtyukh_2005_01_0] for an average phase of 0.22. This has an effect of a few percent in the following fitted parameters (see Sect. \[subsubsection\_\_tmon\]). Given the limited amount of data and the lack of feature that could be easily identified (apart from the alumina shoulder, see below), the investigation of the dust content and the dust grains geometrical properties is therefore limited by the high level of degeneracy. We restricted ourself to the range of dust compound to the refractory ones or the most frequently encountered around evolved stars. The wind launched by Cepheids is not supposed to be enriched compared with the native composition of the star. Therefore, the formation of carbon grains in the vicinity of these stars is highly unprobable. The polycyclic aromatic hydrocarbons (PAHs) detected around some Cepheids by Spitzer/IRAC and MIPS have an interstellar origin and result from a density enhancement at the interface between the wind and the interstellar medium that leads to a bow shock [@Marengo_2010_12_0]. It is noteworthy that no signature of PAHs is observed in the MIDI spectrum or the MIDI visibilities (see Fig. \[graph\_\_visibility\_xsgr\] and \[graph\_\_visibility\_tmon\]). The sublimation temperature of iron is higher than that of alumina and rapidly increases with density. Hence, iron is the most likely dust species expected to form in dense (shocked) regions with temperatures higher 1500 K [@Pollack_1994_02_0]. Moreover, alumina has a high sublimation temperature in the range of 1200-2000K (depending of the local density), and its presence is generally inferred by a shoulder of emission between 10 and $15\,\mathrm{\mu m}$ [@Chesneau_2005_06_0; @Verhoelst_2009_04_0]. Such a shoulder is identified in the spectrum and visibility of X Sgr, suggesting that this compound is definitely present. Yet, it must be kept in mind that the low aluminum abundance at solar metallicity prevents the formation of a large amount of this type of dust. No marked shoulder is observed in the spectrum and visibilities from T Mon, which is indicative of a lower content. The silicates are easily identified owing to their signature at $10\,\mathrm{\mu m}$. This signature is not clearly detected in the MIDI data. Radiative transfer code: `DUSTY` -------------------------------- To model the thermal-IR SED and visibility, we performed radiative transfer calculations for a spherical dust shell. We used the public-domain simulation code `DUSTY` [@Ivezic_1997_06_0; @Ivezic_1999_11_0], which solves the radiative transfer problem in a circumstellar dusty environment by analytically integrating the radiative-transfer equation in planar or spherical geometries. The method is based on a self-consistent equation for the spectral energy density, including dust scattering, absorption, and emission. To solve the radiative transfer problem, the following parameters for the central source and the dusty region are required: - the spectral shape of the central source’s radiation, - the dust grain properties: chemical composition, grain size distribution, and dust temperature at the inner radius, - the density distribution of the dust and the relative thickness, and - the radial optical depth at a reference wavelength. `DUSTY` then provides the SED, the surface brightness at specified wavelengths, the radial profiles of density, optical depth and dust temperature, and the visibility profile as a function of the spatial frequency for the specified wavelengths. Single dust shell model {#subsection__single_dust_shell_model} ----------------------- We performed a simultaneous fit of the MIDI spectrum and visibilities with various `DUSTY` models to check the consistency with our data. The central source was represented with Kurucz atmosphere models [@Castelli_2003__0] with the stellar parameters listed in Sect. \[subsection\_\_visibility\_and\_sed\]. In the absence of strong dust features, we focused on typical dust species encountered in circumstellar envelopes and according to the typical abundances of Cepheid atmospheres, that is, amorphous alumina [Al$_2$O$_3$ compact, @Begemann_1997_02_0], iron [Fe, @Henning_1995_07_0], warm silicate [W-S, @Ossenkopf_1994_11_0], olivine [MgFeSiO$_4$, @Dorschner_1995_08_0], and forsterite [Mg$_2$SiO$_4$, @Jager_2003_09_0]. We present in Fig. \[graph\_\_dust\_efficiency\] the optical efficiency of these species for the MIDI wavelength region. We see in this plot for instance that the amorphous alumina is optically more efficient around $11\,\mathrm{\mu m}$. We also notice that forsterite, olivine, and warm silicate have a similar optical efficiency, but as we cannot differentiate these dust species with our data, we decided to use warm silicates only. We used a grain size distribution following a standard Mathis-Rumpl-Nordsieck (MRN) relation [@Mathis_1977_10_0], that is, $n(a) \propto a^{3.5}$ for $0.005 \leqslant a \leqslant 0.25\,\mathrm{\mu m}$. We chose a spherical density distribution in the shell following a radiatively driven wind, because Cepheids are giant stars and might lose mass via stellar winds [@Neilson_2008_09_0]. In this case, `DUSTY` computes the density structure by solving the hydrodynamics equations, coupled to the radiative transfer equations. The shell thickness is the only input parameter required. It is worth mentioning that we do not know the dust density profile in the Cepheid outflow, and we chose the hydrodynamic calculation in DUSTY as a good assumption. For both stars, we also added $B, V, J, H$ and $K$ photometric light curves from the literature to our mid-IR data to better constrain the stellar parameters (@Moffett_1984_07_0 [@Berdnikov_2008_04_0; @Feast_2008_06_0] for X Sgr, @Moffett_1984_07_0 [@Coulson_1985__0; @Berdnikov_2008_04_0; @Laney_1992_04_0] for T Mon). To avoid phase mismatch, the curves were fitted with a cubic spline function and were interpolated at our pulsation phase. We then used these values in the fitting process. The conversion from magnitude to flux takes into account the photometric system and the filter bandpass. During the fitting procedure, all flux densities $< 3\,\mathrm{\mu m}$ were corrected for interstellar extinction $A_\lambda = R_\lambda E(B - V)$ using the total-to-selective absorption ratios $R_\lambda$ from @Fouque_2003__0 and @Hindsley_1989_06_0. The mid-IR data were not corrected for the interstellar extinction, which we assumed to be negligible. The free parameters are the stellar luminosity ($L_\star$), the dust temperature at the inner radius ($T_\mathrm{in}$), the optical depth at $0.55\,\mathrm{\mu m}$ ($\tau_\mathrm{0.55\mu m}$), and the color excess $E(B - V)$. Then we extracted from the output files of the best-fitted `DUSTY` model the shell internal diameter ($\theta_\mathrm{in}$), the stellar diameter ($\theta_\mathrm{LD}$), and the mass-loss rate $\dot{M}$. The stellar temperature of the Kurucz model ($T_\mathrm{eff}$), the shell’s relative thickness and the dust abundances were fixed during the fit. We chose $R_\mathrm{out}/R_\mathrm{in} = 500$ for the relative thickness as it is not constrained with our mid-IR data. The distance of the star was also fixed to 333.3pc for X Sgr [@Benedict_2007_04_0] and 1309.2pc for T Mon [@Storm_2011_10_0]. Results ------- ### X Sgr The increase of the SED around $11\,\mathrm{\mu m}$ made us investigate in the direction of a CSE composed of Al$_2$O$_3$ material, which is optically efficient at this wavelength. After trying several dust species, we finally found a good agreement with a CSE composed of 100% amorphous alumina (model \#1 in Table \[table\_\_fit\_result\]). The fitted parameters are listed in Table \[table\_\_fit\_result\] and are plotted in Fig. \[graph\_\_visibility\_xsgr\]. However, a dust composed of 70% Al$_2$O$_3$ + 30% W-S (model \#4), or dust including some iron (model \#5), are also statistically consistent with our observations. Consequently, we chose to take as final parameters and uncertainties the average values and standard deviations (including their own statistical errors added quadratically) between models \#1, \#4, and \#5. The final adopted parameters are listed in Table \[table\_\_fit\_results\_final\]. It is worth mentioning that for these models all parameters have the same order of magnitude. The error on the stellar angular diameter was estimated from the luminosity and distance uncertainties. The CSE of X Sgr is optically thin ($\tau_\mathrm{0.55\mu m} = 0.0079 \pm 0.0021$) and has an internal shell diameter of $\theta_\mathrm{in} = 15.6 \pm 2.9$mas. The condensation temperature we found is in the range of what is expected for this dust composition (1200-1900K). The stellar angular diameter (and in turn the luminosity) is also consistent with the value estimated from the surface-brightness method at that pulsation phase [@Storm_2011_10_0 $1.34 \pm 0.03$mas] and agrees with the average diameter measured by @Kervella_2004_03_0 [$1.47 \pm 0.03\,\mathrm{\mu m}$]. The relative CSE excess in the VISIR PAH1 filter of $13.3 \pm 0.5$% also agrees with the one estimated by @Gallenne_2011_11_0 [$11.7 \pm 4.7\,\%$]. Our derived color excess $E(B-V)$ is within $1\sigma$ of the average value $0.227 \pm 0.013$ estimated from photometric, spectroscopic, and space reddenings [@Fouque_2007_12_0; @Benedict_2007_04_0; @Kovtyukh_2008_09_0]. ### T Mon {#subsubsection__tmon} The CSE around this Cepheid has a stronger contribution than X Sgr. The large excess around $8\,\mathrm{\mu m}$ enables us to exclude a CSE composed of 100% Al$_2$O$_3$, because of its low efficiency in this wavelength range. We first considered dust composed of iron. However, other species probably contribute to the opacity enhancement. As showed in Fig. \[graph\_\_visibility\_tmon\], a 100% Fe dust composition is not consistent with our observations. We therefore used a mixture of W-S, Al$_2$O$_3$ and Fe to take into account the optical efficiency at all wavelengths. The best model that agrees with the visibility profile and the SED is model \#5, including 90% Fe + 5% Al$_2$O$_3$ + 5% W-S. The fitted parameters are listed in Table \[table\_\_fit\_result\] and are plotted in Fig. \[graph\_\_visibility\_tmon\]. However, because no specific dust features are present to constrain the models, other dust compositions are also consistent with the observations. Therefore we have chosen the average values and standard deviations (including their own statistical errors added quadratically) between models \#2, \#4 and \#5 as final parameters and uncertainties. The final adopted parameters are listed in Table \[table\_\_fit\_results\_final\]. The choice of a stellar temperature at $\phi = 0.33$ or 0.12 in the fitting procedure (instead of an average pulsation phase as cited in Sect. \[subsection\_\_visibility\_and\_sed\]) changes the derived parameters by at most 10% (the variation of the temperature is lower in the mid-IR). To be conservative, we added quadratically this relative error to all parameters of Table \[table\_\_fit\_results\_final\]. The CSE of T Mon appears to be thicker than that of X Sgr, with ($\tau_\mathrm{0.55\mu m} = 0.151 \pm 0.042$), and an internal shell diameter of $\theta_\mathrm{in} = 15.9 \pm 1.7$mas. The derived stellar diameter agrees well with the $1.01 \pm 0.03$mas estimated by @Storm_2011_10_0 [at $\phi = 0.22$]. The deduced color excess $E(B-V)$ agrees within $1\sigma$ with the average value $0.181 \pm 0.010$ estimated from photometric, spectroscopic and space reddenings [@Fouque_2007_12_0; @Benedict_2007_04_0; @Kovtyukh_2008_09_0]. We derived a particularly high IR excess in the VISIR PAH1 filter of $87.8 \pm 9.9$%, which might make this Cepheid a special case. It is worth mentioning that we were at the sensitivity limit of MIDI for this Cepheid, and the flux might be biased by a poor subtraction of the thermal sky background. However, the clear decreasing trend in the visibility profile as a function of wavelength cannot be attributed to a background emission, and we argue that this is the signature of a CSE. In Sect.  \[section\_\_discussion\] we make a comparative study to remove the thermal sky background and qualitatively estimate the unbiased IR excess. ------------------------------------ ------------------ ------------------ ---------------------- ------------------- ----------------- ---------------------- --------------------------- ---------------------- ---------- --------------------- ---- -- Model $L_\star$ $T_\mathrm{eff}$ $\theta_\mathrm{LD}$ $E(B - V)$ $T_\mathrm{in}$ $\theta_\mathrm{in}$ $\tau_\mathrm{0.55\mu m}$ $\dot{M}$ $\alpha$ $\chi^2_\mathrm{r}$ \# $(L_\odot)$ (K) (mas) (K) (mas) ($\times10^{-3}$) ($M_\odot\,yr^{-1}$) (%) Al$_2$O$_3$ $2151 \pm 34$ 5900 $1.24 \pm 0.08$ $0.199 \pm 0.009$ $1732 \pm 152$ 13.2 $6.5 \pm 0.8$ $5.1\times10^{-8}$ 13.0 0.78 1 W-S $2155 \pm 40$ 5900 $1.24 \pm 0.08$ $0.200 \pm 0.011$ $1831 \pm 141$ 14.7 $11.8 \pm 0.2$ $6.4\times10^{-8}$ 15.0 1.53 2 Fe $2306 \pm 154$ 5900 $1.28 \pm 0.09$ $0.230 \pm 0.031$ $1456 \pm 605$ 29.3 $8.9 \pm 4.4$ $6.2\times10^{-8}$ 9.5 4.30 3 70% Al$_2$O$_3$ + 30% W-S $2153 \pm 31$ 5900 $1.24 \pm 0.08$ $0.200 \pm 0.009$ $1519 \pm 117$ 19.6 $6.6 \pm 0.7$ $5.6\times10^{-8}$ 13\. 7 0.58 4 60% Al$_2$O$_3$ + 20% W-S + 20% Fe $2160 \pm 35$ 5900 $1.24 \pm 0.08$ $0.201 \pm 0.009$ $1802 \pm 130$ 13.9 $10.6 \pm 1.2$ $6.1\times10^{-8}$ 13.3 0.68 5 Fe $12~453 \pm 775$ 5200 $0.98 \pm 0.03$ $0.183 \pm 0.049$ $1190 \pm 59$ 29.4 $113 \pm 21$ $5.0\times10^{-7}$ 99.5 5.36 1 80% Fe + 10% W-S + 10% Al$_2$O$_3$ $11~606 \pm 434$ 5200 $0.94 \pm 0.03$ $0.144 \pm 0.028$ $1418 \pm 42$ 16.6 $126 \pm 13$ $4.4\times10^{-7}$ 82.2 1.52 2 90% Fe + 10% W-S $11~696 \pm 667$ 5200 $0.95 \pm 0.03$ $0.149 \pm 0.044$ $1389 \pm 54$ 18.0 $147 \pm 23$ $5.0\times10^{-7}$ 94.6 3.04 3 90% Fe + 10% Al$_2$O$_3$ $11~455 \pm 580$ 5200 $0.94 \pm 0.03$ $0.137 \pm 0.040$ $1439 \pm 49$ 15.9 $158 \pm 21$ $5.0\times10^{-7}$ 87.5 2.21 4 90% Fe + 5% Al$_2$O$_3$ + 5% W-S $11~278 \pm 597$ 5200 $0.93 \pm 0.04$ $0.125 \pm 0.042$ $1458 \pm 48$ 15.3 $170 \pm 23$ $5.2\times10^{-7}$ 93.6 2.22 5 ------------------------------------ ------------------ ------------------ ---------------------- ------------------- ----------------- ---------------------- --------------------------- ---------------------- ---------- --------------------- ---- -- \[table\_\_fit\_result\] X Sgr T Mon ---------------------------------------------- ------------------- ------------------- -- -- -- -- -- -- $L_\star$ $(L_\odot)$ $2155 \pm 58$ $11~446 \pm 1486$ $T_\mathrm{eff}$ (K) 5900 5200 $\theta_\mathrm{LD}$ (mas) $1.24 \pm 0.14$ $0.94 \pm 0.11$ $E(B - V)$ $0.200 \pm 0.032$ $0.135 \pm 0.066$ $T_\mathrm{in}$ (K) $1684 \pm 225$ $1438 \pm 166$ $\theta_\mathrm{in}$ (mas) $15.6 \pm 2.9$ $15.9 \pm 1.7$ $\tau_\mathrm{0.55\mu m}$ ($\times10^{-3}$) $7.9 \pm 2.1$ $151 \pm 42$ $\dot{M}$ ($\times10^{-8} M_\odot\,yr^{-1}$) $5.6 \pm 0.6$ $48.7 \pm 5.9$ $\alpha$ (%) $13.3 \pm 0.7$ $87.8 \pm 9.9$ : Final adopted parameters. \[table\_\_fit\_results\_final\] Period-excess relation {#section__period_excess_relation} ====================== @Gallenne_2011_11_0 presented a probable correlation between the pulsation period and the CSE relative excess in the VISIR PAH1 filter. From our fitted `DUSTY` model, we estimated the CSE relative excess by integrating over the PAH1 filter profile. This allowed us another point of view on the trend of this correlation. X Sgr was part of the sample of @Gallenne_2011_11_0 and can be directly compared with our result, while T Mon is a new case. This correlation is plotted in Fig. \[graph\_\_excess\], with the measurements of this work as red triangles. The IR excess for X Sgr agrees very well with our previous measurements [@Gallenne_2011_11_0]. The excess for T Mon is extremely high, and does not seem to follow the suspected linear correlation. Fig. \[graph\_\_excess\] shows that longer-period Cepheids have higher IR excesses. This excess is probably linked to past or ongoing mass-loss phenomena. Consequently, this correlation shows that long-period Cepheids have a larger mass-loss than shorter-period, less massive stars. This behavior might be explained by the stronger velocity fields in longer-period Cepheids, and the presence of shock waves at certain pulsation phases [@Nardetto_2006_07_0; @Nardetto_2008_10_0]. This scenario is consistent with the theoretically predicted range, $10^{-10}$–$10^{-7} M_\odot\,yr^{-1}$, of @Neilson_2008_09_0, based on a pulsation-driven mass-loss model. @Neilson_2011_05_0 also found that a pulsation-driven mass-loss model combined with moderate convective-core overshooting provides an explanation for the Cepheid mass discrepancy, where stellar evolution masses differ by 10-20% from stellar pulsation calculations. We fitted the measured mi-IR excess with a linear function of the form $$f_\mathrm{8.6\,\mu m} = \alpha_\mathrm{8.6\,\mu m}P,$$ with $f$ in % and $P$ in day. We used a general weighted least-squares minimization, using errors on each measurements as weights . We found a slope $\alpha_\mathrm{8.6\,\mu m} = 0.83 \pm 0.04\,\mathrm{\%.d^{-1}}$, including T Mon, and $\alpha_\mathrm{8.6\,\mu m} = 0.81 \pm 0.04\,\mathrm{\%.d^{-1}}$ without. The linear relation is plotted in Fig. \[graph\_\_excess\]. Discussion {#section__discussion} ========== Since the first detection around $\ell$ Car [@Kervella_2006_03_0], CSEs have been detected around many other Cepheids [@Gallenne_2011_11_0; @Merand_2007_08_0; @Merand_2006_07_0]. Our works, using IR and mid-IR high angular resolution techniques, lead to the hypothesis that all Cepheids might be surrounded by a CSE. The mechanism for their formation is still unknown, but it is very likely a consequence of mass loss during the pre-Cepheid evolution stage or during the multiple crossings of the instability strip. The period–excess relation favors the last scenario, because long-period Cepheids have higher masses and cross the instability strip up to three times. Other mid- and far-IR extended emissions have also been reported by @Barmby_2011_11_0 around a significant fraction of their sample (29 Cepheids), based on Spitzer telescope observations. The case of $\delta$ Cep was extensively discussed in @Marengo_2010_12_0. From IRAS observations, @Deasy_1988_04_0 also detected IR excesses and estimated mass-loss rate ranging from $10^{-10}$ to $10^{-6}M_\odot\,yr^{-1}$. The values given by our `DUSTY` models agree. They are also consistent with the predicted mass-loss rate from @Neilson_2008_09_0, ranging from $10^{-10}$ to $10^{-7}M_\odot\,yr^{-1}$. These CSEs might have an impact on the Cepheid distance scale through the photometric contribution of the envelopes. While at visible and near-IR wavelengths the CSE flux contribution might be negligible ($< 5$%), this is not the case in the mid-IR domain [see @Kervella_2013_02_0 for a more detailed discussion]. This is particularly critical because near- and mid-IR P-L relation are preferred due to the diminished impact of dust extinction. Recently, @Majaess_2013_08_0 re-examined the 3.6 and 4.5$\mathrm{\mu m}$ Spitzer observations and observed a nonlinear trend on the period-magnitude diagrams for LMC and SMC Cepheids. They found that longer-period Cepheids are slightly brighter than short-period ones. This trend is compatible with our period-excess relation observed for Galactic Cepheids. @Monson_2012_11_0 derived Galactic P–L relations at 3.6 and 4.5$\mathrm{\mu m}$ and found a strong color variation for Cepheids with $P > 10$days, but they attributed this to enhanced CO absorption at $4.5\,\mathrm{\mu m}$. From their light curves, we estimated the magnitudes expected at our observation phase for X Sgr and T Mon [using the ephemeris from @Samus_2009_01_0] to check the consistency with the values given by our `DUSTY` models (integrated over the filter bandpass). For X Sgr, our models give averaged magnitudes $m_\mathrm{3.6\,\mathrm{\mu m}} = 2.55 \pm 0.06$ and $m_\mathrm{4.5\,\mathrm{\mu m}} = 2.58 \pm 0.05$ (taking into account the 5% flux variations of Sect. \[subsection\_\_flux\_and\_visibility\_fluctuations\_between\_datasets\]), to be compared with $2.54 \pm 0.02$ and $2.52 \pm 0.02$ from @Monson_2012_11_0. For T Mon, we have $m_\mathrm{3.6\,\mathrm{\mu m}} = 2.94 \pm 0.14$ and $m_\mathrm{4.5\,\mathrm{\mu m}} = 2.94 \pm 0.14$ from the models (taking into account the 8% flux variations of Sect. \[subsection\_\_flux\_and\_visibility\_fluctuations\_between\_datasets\] and a 10% flux error for the phase mismatch), to be compared with $3.29 \pm 0.08$ and $3.28 \pm 0.05$ (with the rms between phase 0.12 and 0.33 as uncertainty). Our estimated magnitudes are consistent for X Sgr, while we differ by about $2\sigma$ for T Mon. As we describe below, we suspect a sky background contamination in the MIDI data. The estimated excesses from the model at 3.6 and $4.5\,\mathrm{\mu m}$ are $6.0 \pm 0.5$% and $6.3 \pm 0.5$% for X Sgr, and $46 \pm 5$% and $58 \pm 6$% for T Mon (errors estimated from the standard deviation of each model). This substantial photometric contribution probably affects the Spitzer/IRAC P–L relation derived by @Monson_2012_11_0 and the calibration of the Hubble constant by @Freedman_2012_10_0. We also compared our models with the Spitzer 5.8 and 8.0$\mathrm{\mu m}$ magnitudes of @Marengo_2010_01_0 which are only available for T Mon. However, their measurements correspond to the pulsation phase 0.65, so we have to take a phase mismatch into account. According to the light curves of @Monson_2012_11_0, the maximum amplitude at 3.6 and 4.5$\mathrm{\mu m}$ is decreasing from 0.42 to 0.40mag, respectively. As the light curve amplitude is decreasing with wavelength, we can safely assume a maximum amplitude at 5.8 and 8.0$\mathrm{\mu m}$ of 0.25mag. We take this value as the highest uncertainty, which we added quadratically to the measurements of @Marengo_2010_01_0, which leads to $m_\mathrm{5.8\,\mathrm{\mu m}} = 3.43 \pm 0.25$ and $m_\mathrm{8.0\,\mathrm{\mu m}} = 3.32 \pm 0.25$. Integrating our models on the Spitzer filter profiles, we obtained $m_\mathrm{5.8\,\mathrm{\mu m}} = 2.85 \pm 0.14$ and $m_\mathrm{8.0\,\mathrm{\mu m}} = 2.67 \pm 0.14$, which differ by about $2\sigma = 0.5\,$mag from the empirical values at $8\,\mathrm{\mu m}$. A possible explanation of this discrepancy would be a background contamination in our MIDI measurements. Indeed, due to its faintness, T Mon is at the sensitivity limit of the instrument, and the sky background can contribute to the measured IR flux (only contributes to the incoherent flux). Assuming that this $2\sigma$ discrepancy is due to the sky background emission, we can estimate the contribution of the CSE with the following approach. The flux measured by @Marengo_2010_01_0 corresponds to $f_\star + f_\mathrm{env}$, that is, the contribution of the star and the CSE, while MIDI measured an additional term corresponding to the background emission, $f_\star + f_\mathrm{env} + f_\mathrm{sky}$. From our derived `DUSTY` flux ratio (Table \[table\_\_fit\_results\_final\]) and the magnitude difference between MIDI and Spitzer, we have the following equations: $$\label{eq__1} \dfrac{f_\mathrm{env} + f_\mathrm{sky}}{f_\star} = \alpha,\ \mathrm{and}$$ $$\label{eq__2} 2\sigma = -2.5\,\log \left( \dfrac{f_\star + f_\mathrm{env}}{f_\star + f_\mathrm{env} + f_\mathrm{sky}} \right),$$ where $2\sigma$ is the magnitude difference between the Spitzer and MIDI observations. Combining Eqs. \[eq\_\_1\] and \[eq\_\_2\], we estimate the real flux ratio to be $f_\mathrm{env}/f_\star \sim 19\,$%. Interestingly, this is also more consistent with the expected period-excess relation plotted in Fig. \[graph\_\_excess\], although in a different filter. We also derived the IR excess in the $K$ band to check the possible impact on the usual P–L relation for those two stars. Our models gives a relative excess of $\sim 24.3 \pm 2.7$% for T Mon, and for X Sgr we found $4.3 \pm 0.3$%. However, caution is required with the excess of T Mon since it might suffer from sky-background contamination. Therefore, we conclude that the bias on the $K$-band P–L relation might be negligible compared with the intrinsic dispersion of the P–L relation itself. Conclusion {#section__conclusion} ========== Based on mid-IR observations with the MIDI instrument of the VLTI, we have detected the circumstellar envelope around the Cepheids X Sgr and T Mon. We used the numerical radiative transfer code `DUSTY` to simultaneously fit the SED and visibility profile to determine physical parameters related to the stars and their dust shells. We confirm the previous IR emission detected by @Gallenne_2011_11_0 for X Sgr with an excess of 13.3%, and we estimate a $\sim 19\,$% excess for T Mon at $8\,\mathrm{\mu m}$. As the investigation of the dust content and the dust grains geometrical properties are limited by a high level of degeneracy, we restricted ourselves to typical dust composition for circumstellar environment. We found optically thin envelopes with an internal dust shell radius in the range 15-20mas. The relative CSE excess seems to be significant from $8\,\mathrm{\mu m}$ ($> 10$%), depending on the pulsation period, while for shorter wavelengths, the photometric contribution might be negligible. Therefore, the impact on the $K$-band P–L relation is low ($\lesssim 5$%), but it is considerable for the mid-IR P–L relation [@Ngeow_2012_09_0; @Monson_2012_11_0], where the bias due to the presence of a CSE can reach more than 30%. Although still not statistically significant, we derived a linear period-excess relation, showing that longer-period Cepheids exhibit a higher IR excess than shorter-period Cepheids. It is now necessary to increase the statistical sample and investigate whether CSEs are a global phenomena for Cepheids. Interferometric imaging with the second-generation instrument VLTI/MATISSE [@Lopez_2006_07_0] will also be useful for imaging and probing possible asymmetry of these CSEs. The authors thank the ESO-Paranal VLTI team for supporting the MIDI observations. We also thank the referee for the comments that helped to improve the quality of this paper. A.G. acknowledges support from FONDECYT grant 3130361. W.G. gratefully acknowledge financial support for this work from the BASAL Centro de Astrofísica y Tecnologías Afines (CATA) PFB-06/2007. This research received the support of PHASE, the high angular resolution partnership between ONERA, Observatoire de Paris, CNRS, and University Denis Diderot Paris 7. This work made use of the SIMBAD and VIZIER astrophysical database from CDS, Strasbourg, France and the bibliographic informations from the NASA Astrophysics Data System. [^1]: Based on observations made with ESO telescopes at Paranal observatory under program ID 082.D-0066 [^2]: The MIA+EWS software package is available at http://www.strw.leidenuniv.nl/$\sim$nevec/MIDI/index.html.
{ "pile_set_name": "ArXiv" }
Bodily communication and personality. Fifteen measures of non-verbal communication were coded from videotaped interactions between a female confederate and 18-21 year old female subjects (n = 46). Three measures of extraversion and neuroticism had previously been taken from the subjects, as was a measure of IQ. Correlation and factor analysis revealed significant relationships between certain of the variables. Extraversion was strongly associated with speaking more; a teacher's rating of neuroticism was associated with touching the self, pausing during conversation, and an absence of expressive gesture; lower IQ was associated with smiling while listening; and self-report personality questionnaire neuroticism was associated with gaze aversion.
{ "pile_set_name": "PubMed Abstracts" }
St. Augustine Lighthouse, Florida, USA Posters St. Augustine Lighthouse, Florida, USA Posters is immoderately glorious and makes a valuable wall decoration, this poster dimension is 24 x 18 inch and the price is $32.99. If you're trying to find top recommended St. Augustine Lighthouse, Florida, USA Posters with reasonable price, the one is the fabulous deals for you. St. Augustine Lighthouse, Florida, USA Posters is amazing sumptuous sizeeasy to find a frame for superb image plus you see the thoroughgoing family. There is a numerous online following with multitudinous resources to support this poster and the practices. The product comes in fantastic condition and is here on time. This produce could of picked a better photograph next to the rules but it's conspicuous and sunny. St. Augustine Lighthouse, Florida, USA Posters has drama, twists, and is not so far out there that it is unrelatable. The poster is fantastic alternative of the current striking actors and those that made a significant position in the film and television. This unit is black and white photo, usually with a twinkling finish, used for lobby display and press promotion. There are a great amount of visitors have shown interest in purchasing posters featured the item. The price for any particular it will vary depending on a great deal of factors. St. Augustine Lighthouse, Florida, USA Posters is a full sized poster, printed on admirable paper, with twinkling color and sparkling finish.
{ "pile_set_name": "Pile-CC" }
About the Song “Rhiannon” is the second U.S. single from Fleetwood Mac’s 10th studio album, the eponymously titled Fleetwood Mac (1975). Issued as a radio remix, the single reached #11 on the Billboard Pop Singles chart in June 1976 and #46 on the UK single charts in February 1978 (upon reissue). The remix appears on The Very Best of Fleetwood Mac (2002) and Fleetwood Mac reissue (2004). Rhiannon is a character in the 1973 science fiction novel Triad by Mary Leader. Enamored by the name, Stevie wrote the song that became the classic “Rhiannon.” Years later, Stevie learned that Rhiannon was the Welsh horse goddess in Celtic mythology. The striking similarities between the song “Rhiannon” and Rhiannon of the Welsh stories inspired Stevie to write other songs about Rhiannon, many of which are still unreleased. When Stevie Nicks and Lindsey Buckingham joined Fleetwood Mac in 1974, many of the songs they had written for a proposed second Buckingham Nicks album (“Monday Morning,” “Rhiannon,” “Landslide,” and “I’m So Afraid”) were used for Fleetwood Mac instead.
{ "pile_set_name": "Pile-CC" }
Birna Brjánsdóttir was your average Icelandic girl, out partying with her friends. She never returned home. Photo/ Iceland Monitor Iceland is united in grief today. A body of a young woman, Birna Brjánsdóttir, was discovered on a desolate beach on Sunday after she had been missing for over a week. Such murder cases are rare in a country with one of the world's lowest crime rates and a population of 330 thousand people. The sinister unfolding of events this past week have an uncanny resemblence to Nordic Noir fiction. Not one person that I have spoken to in recent days has been untouched by the case and the events that unfolded from such an every day event as a young woman walking home from a night out partying, up a crowded, well-lit street. Laugavegur is one of the main streets in the city centre. Mbl.is/ Eggert Jóhannesson Both myself and almost every one of my female friends have walked up that very same street from that very same bar, at that hour of night, and we have always felt safe. Speaking to girlfriends over the weekend- I gathered that most of them have at some point even caught a lift from strangers for short distances. Some of them also use an underground "Uber" like services called "Skutlarar"- a Facebook group where people offer or ask for lifts from strangers driving around town- for a lower price than official taxis. That's not to say that the city centre of Reykjavik is entirely safe. Icelanders drink heavily on weekends, there are often fights or attacks downtown, and rapes are reported. But this - a girl just heading home and disappearing off the face of the earth - everyone felt there was something really odd about that. The story of Birna, an average young Icelandic woman, who walked up Laugavegur after a beer too many is the story of a young woman doing something most young women do. And have felt relatively safe doing. That's probably one of the reasons Birna's story touches us all. Saturday January 14th: Birna goes missing The story begins as Birna Brjánsdóttir, a twenty-year old girl is reported missing on Saturday, January 14th by her mother. Birna had gone partying at Húrra, a popular music venue and pub right at the heart of the city. Earlier that night, local paper The Reykjavik Grapevine had hosted their annual music awards at the venue, a popular event where some of Iceland's best indie bands perform. Birna left Húrra alone, she'd become separated from her friends, and was not seen again. Photos of Birna started circulating on Icelandic social media eight days ago. Photo/ Facebook A missing person is not that uncommon in Reykjavik, sometimes young women go missing for a couple of days, especially if they are involved with drugs or simply decided to bail out from their parents home. Her mother appealed again to the public on the weekend of her disappearance, and to the Reykjavik Metropolitan Police to begin searching. The whole thing was completely out of character for Birna, she said. Birna was not involved with drugs. Birna is a healthy, happy girl and has plenty of friends. She is always online, and always lets people know where she is. And this time, Birna had just disappeared, her phone was switched off, she was offline on Facebook. She hadn't turned up to work on the weekend, unusual for a conscientious girl. All of this didn't add up at all. That same weekend, Birna's photograph starts circulating on Icelandic social media . MISSING. Where is Birna? her mother pleads. Birna gazes at us from the photo. She's a pretty, smiling, auburn haired girl. The search begins And so, police began piecing together the puzzle that is her disappearance. There are security cameras in various places around the city centre. Footage showed Birna walking up Laugavegur, the main shopping street in Reykjavik, where plenty of bars and restaurants are also situated. She's obviously in an inebriated state, her steps are unsteady, but she seems to know where she's going. She's eating something, later revealed to be a kebab bought at Ali Baba in the city centre. The red Kia Rio rental car spotted on surveillance camera footage. Photo/ Reykjavik Metropolitan Police A red car, a Kia Rio was seen stopping at Laugavegur 31, which is also the last place where Birna is seen on security cameras. She wasn't seen getting into the car, but police published photos of the car asking for information or the driver to come forward. The persons in the car may be the last ones to give clues as to where she went. Her cellphone is traced all the way to Hafnarfjörður, a small town adjacent to Reykjavik. It has seemingly been switched off manually. Had her phone been stolen, or did she herself go all the way to Hafnarfjörður? Her father speaks to Icelandic media. Birna lives with him, he says, in Breiðholt, a suburb of Reykjavik. It's just the two of them living together, with their cat. She's a grown woman and often goes out, he says, she has plenty of friends, but she always gets home, and always lets him know where she is. Shoes found near Hafnarfjörður harbour The Reykjavik Metropolitan Police host a press conference . This is fairly unusual. The police are usually a surly bunch, not really forthcoming with information to the media. This time, they are open, honest, compassionate, clear, concise. Heading the investigation is police officer Grímur Grímsson who starts reminding locals of the protagonist in the crime novels of Arnaldur Indriðason, Detective Erlendur. Police officer Grímur Grímsson who heads the investigation. Mbl.is/ Árni Sæberg Birna's mother also appears at the press conference. She pleads to the public for any information. This is also unusual. Icelanders somehow feel that this reminds them of something that only happens abroad. Not in Iceland. After police launch an extensive search, Birna's shoes, a pair of Doc Martens are found snowed up near the harbour of Hafnarfjörður . A continuing search of the area reveals nothing. Were the shoes planted there, or what on earth happened? The crucial evidence appears. A red Kia Rio is spotted on video surveillance cameras of Hafnarfjörður harbour. It's parked near a Greenlandic fishing trawler called the Polar Nanoq. It's shown parked there at 06.30 am and is identical to the car last spotted on Laugavegur at the time of Birna's disappearance. It was revealed that it had been hired by crew of a Greenlandic trawler, a vessel called the Polar Nanoq which lifted anchor a few hours after Birna went missing. The Polar Nanoq. Mbl.is/ Eggert Jóhannesson Suspects aboard a Greenlandic trawler The Polar Nanoq responded to requests by the Icelandic Coastguard to turn around to Iceland as crew members need to be interrogated by Icelandic police. Furthermore, a Danish coastguard vessel called Triton was sent towards the Polar Nanoq. Members of the special force unit at the Icelandic police boarded a National Coastguard Helicopter and flew towards the Polar Nanoq , overtaking control of the ship and arresting three crew members. A substantial amount of hash was also found on the vessel. The ship returned to Reykjavik and the suspects were taken into custody, two on suspicion of being involved in the disappearance of Birna, the third in connection with the drugs. Traces of Birna's blood were later found in the red car, traces which someone had tried to eradicate. The two men were interrogated and both denied charges. Police still have no clue as to what happened to Birna and where she is. SAR teams looking for Birna in the lavafields near Hafnarfjörður. Mbl.is/ Eggert Jóhannesson Over 500 people take part in Iceland's largest search and rescue On January 20th police reveal that the men are in custody on suspicion of a heinous crime. The following day, Saturday January 21st, the most extensive search in the history of Iceland takes place for a missing person. Over 500 SAR team members take part in the search for Birna, to no avail. Divers looking for Birna in Hafnarfjörður harbour. Mbl.is/ Eggert Jóhannesson On Sunday, police receive the results of forensic evidence placing Birna inside the red Kia Rio . And at noon on Sunday, in the midst of a second day of an extensive search, the National Coastguard Helicopter spots a body on the beach, near Selvogsviti lighthouse, south of Reykjavik. The Reykjavik Metropolitan Police host a press conference yesterday announcing the find of the body of Birna. Mbl.is/ Eggert Jóhannesson At 5 pm on Sunday this information is revealed at a press conference held by the Reykjavik Metropolitan Police. Birna Brjánsdóttir has been found dead. Her body was either placed on the beach or it washed ashore. Police believe she was murdered. Selvogsviti lighthouse, near the beach where Birna's body was found. Mbl.is/ Sigurður Bogi Sævarsson On Sunday night, social media in Iceland is flooded with messages of love, grief and support for Birna's family and friends. Every single person is sad, shaken, shocked. And in Greenland, locals light candles for Birna. Her case has touched the hearts of two neighbouring countries. Police are still interrogating the two suspects and continue their investigation of the case and what actually happened on that fateful morning of Saturday, January 14th when a typical young Icelandic woman was just simply heading up a busy street after a night on the town. Iceland has a registered average of 1.8 murders per year over the past 16 years and the macabre turn of events in Birna's case has truly touched the nation.
{ "pile_set_name": "OpenWebText2" }
HOMOSEXUAL (SAME-SEX) MARRIAGES IN CANADA Province of Nova Scotia Sponsored link. Overview: The Province of Nova Scotia in Canada is located generally south east of New Brunswick and to the east of the state of Maine. 1Statistics Canada estimates that the 2003 population of the province is 936,000 persons. 2 On 2004-SEP-24, it became the sixth political jurisdiction in Canada to expand marriage to include same-sex couples. The province did not do this willingly; it was ordered to do so by the courts. With that development, plus similar court orders across Canada, over 90% of same-sex couples in Canada were then able marry without leaving their province. The events leading up to legalization of same-sex marriage in Nova Scotia: 1999: Nova Scotia was one of the first provinces in Canada to partially recognize and accommodate same-sex couples. The government created a domestic partner registry that gave such couples the same legal status as opposite-sex couples in areas of pension, wills, etc. Some same-sex couples decided to not join the registry. They were holding out for marriage and felt that a domestic partnership would make them feel like second-class citizens. 2004-JUL-15: Sean Foreman, chairperson of the Nova Scotia Rainbow Action Project (NSRAP), issued a news release. Referring to the Yukon decision, he stated: "We are now considering a change in strategy, to proceed with a similar application in Nova Scotia in the near future, rather than wait for the Reference." He said that the court challenge is likely to go ahead unless Nova Scotia judges "do the honorable thing," He sent a letter to the Nova Scotia and federal Attorneys General, asking "...that the Province of Nova Scotia immediately begin issuing marriage licenses to same-sex couples." It was not successful. 3 2004-AUG-13: Three same-sex couples, with the support NSRAP, launched a lawsuit against the province to seek the right to marry. They were Brian Mombourquette & Ross Boutilier; Kim Vance & Samantha Meehan; and Ron & Brian Garnett-Doucette. Nova Scotia Premier John Hamm announced that "Nova Scotia has refused to proactively begin issuing [marriage] licenses." But he announced that the province would not oppose the lawsuit. Brian stated: "Both of us have constantly and consistently stood up and said that we are a couple and we want to have what we deserve as a couple. Our colleagues have respected us, and our friends have come to love and care for us as we are, and our family is just so accepting, and our church is where we draw our strength."4 The Garnett-Douchettes attend the Safe Harbour Metropolitan Community Church. 2004-SEP-18: Two days after the Manitoba court decision which legalized same-sex marriage (SSM) in that province, and six days before it was legalized in Nova Scotia, the Toronto Star newspaper published an editorial stating that: "Gays and lesbians have had to turn repeatedly to the courts to eke out equality rights because politicians have not had the courage to address them ... But forcing a same-sex couple to ask a court to strike down a law the government has already agreed is unconstitutional shows just how unwilling many politicians are to fight for their gay and lesbian constituents. Like many previous cases on gay and lesbian rights, it also placed onerous costs and unnecessary emotional strain on the couple and is an affront to their human dignity ... legislators must take greater responsibility for the rights and well-being of all their constituents, no matter who they are. Just like other Canadians, gays and lesbians hold jobs, own property, raise children, get old, love, and are loved. Their rights are a matter of fundamental human dignity and politicians must do better." 5 2004-SEP-24: Nova Scotia Supreme Court Justice Heather Robertson handed down her decision in the morning of SEP-24. She upheld the marriage of the lesbian couple, Kim Vance and Samantha Meehan. They had previously registered their relationship in Nova Scotia. They went to Ontario to marry, and returned to continue living in Nova Scotia. Justice Robertson declared that "civil marriage between two persons of the same sex is therefore lawful and valid." The couples were supported by many friends, including lawyer Sean Foreman, the Nova Scotia Rainbow Action Project, and Safe Harbour Metropolitan Community Church. 3 Ron and Bryan Garnett-Doucette, became the first same-sex couple to obtain a marriage license in the province. Just hours after the court decision was handed down, they went to purchase a marriage license application in a storefront office in Halifax, "under the glare of TV cameras and cheers of encouragement from a gaggle of friends, gay activists and lawyers." 6 Ron said: "We feel really, really good. It's a great day to be a Nova Scotian." Both spouses had grown up in Nova Scotia. Ron was 21 when he first met Bryan. He later told the court that it was "love at first sight." They moved in together a few months later, and have been together since. A clerk explained to the engaged couple that marriage licenses cannot be executed on the same day, "in case you change your mind." Bryan chuckled: "I don't think that's going to happen. Not after twenty years." 6 Some reactions: Halifax advocate Jay Thordarson said: "Nova Scotia has always been known for its conservative rant amongst the rest of the country. After all, the province still does not have Sunday shopping and continues to battle politically about this issue. However, this is a clear indication that human rights take priority within this province." Darrell Dexter, a New Democratic Party (Socialist) party head and Leader of the Opposition in the Nova Scotia legislature issued a statement saying, in part: "The law in Nova Scotia is now clear on this aspect of human rights... every individual should have equal treatment and equal access to marriage." Most Rev. Terrence Prendergast, Roman Catholic Archbishop of Halifax and Apostolic Administrator of the Diocese of Yarmouth stated in a news release that marriage is a natural institution that precedes all social, legal and religious systems: "We must recognize this decision as the end of state support for marriage as we have always known it. The civil institution of marriage is now a registered domestic partnership system for adults in a co-dependent relationships....Today we recognize that the full burden for the social and cultural support of marriage in Canadian society must be accepted by religious communities." 7 The impact of this decision on same-sex marriage in Canada: As of the end of 2004-SEP, same-sex couples are free to marry in Yukon Territory, and half of the provinces of Canada -- British Columbia, Ontario, Manitoba, Nova Scotia, and Quebec. That leaves two territories and five provinces where same-sex marriage was not yet permitted. Same-sex couples in the Northwest Territory, Nunavut Territory, and the Provinces of Alberta, Saskatchewan, New Brunswick, Prince Edward Island and Newfoundland/Labrador are in a legal limbo. The courts have decided that the couples can marry, but they cannot obtain marriage licenses without initiating a lawsuit. Assuming that same-sex couples are evenly distributed across Canada, 82.3% of them could marry after 2004-SEP-24 without having to leave their province or territory of residence. In fact, many gays and lesbians gravitate towards the larger cities like Halifax, Montreal, Toronto, Winnipeg and Vancouver where same-sex marriage is already allowed. So the actual percentage of gays, lesbians, and bisexuals in committed same-sex relationships who were then able to marry in their own province or territory is probably somewhat higher. 1 About ten months later, on 2005-JUL-20, federal bill C-38 was proclaimed, making SSM available across Canada.
{ "pile_set_name": "Pile-CC" }
1. Field of the Invention This invention relates generally to a portable power tool of the impulse type and more particularly to an impulse device designed to deliver a controllable torque to a threaded fastener. 2. Description of the Prior Art In many industrial applications it is desirable to tighten threaded fasteners to a predetermined torque automatically and rapidly. Such applications include internal combustion engine head bolts and connecting rod bearings and wheel nuts or studs. Many applications also exist, particularly in the maintenance area, where it is necessary to loosen threaded fasteners in order to disassemble a machine. While it is desirable that the tool develop a predetermined torque, it is also important to be able to adJust the predetermined torque and to use the same tool for tighlening and loosening threaded fasteners. A number of devices have been developed utilizing either an electric motor or an air motor as the powering mechanism. Generally, an hydraulic or mechanical mechanism is attached to the output shaft of the air or electric motor which is adapted to convert the rotary motion into torque impacts. The production of torque impacts within the torque conversion mechanism often leads to high impact stresses and consequent wear of the working parts of the mechanism. Where a series of impacts or hammer blows is entailed, the predetermined torque may be exceeded. It is an object of the present invention to develop a controllable predetermined torque through cyclical impulses which do not constitute a series of impacts. It is also an object of the invention to reduce the noise associated with the prior art torque devices of the impact type.
{ "pile_set_name": "USPTO Backgrounds" }
A geologist was listed in satisfactory condition Thursday after falling thigh-deep into lava at Kilauea Volcano while dressed in a heat-resistant suit, authorities said. George Ulrich was taking samples at a vent site Wednesday afternoon when congealed lava crust broke beneath him, plunging him into 2,000-degree molten rock, said Reggie Okamura, acting scientist in charge of the U.S. Geological Survey’s Hawaiian Volcano Observatory. Ulrich is a staff geologist at the observatory. “There was another guy there, and he pulled him out in a matter of about five seconds,” Okamura said. “We were fortunate. A helicopter was just landing, and they were able to get him out fast.” He was taken to Hilo Hospital, where he was treated for first-, second- and third-degree burns. Kilauea Volcano has been erupting sporadically since January, 1983. Scientists went to the vent site after lava was seen gurgling in the vent and slightly spilling over, Okamura said. Scientists were unsure whether the low-level activity would escalate. The zone where Ulrich was working is in a remote, roadless area about 12 miles from Kilauea’s summit. Ulrich, 51, was pulled from the lava by Dario Tedesco, a visiting Italian geochemist.
{ "pile_set_name": "OpenWebText2" }
Continuous integration is an automatic re-building of project code base that is triggered by new changes to ensure that new changes integrate well into the existing code base. Continuous integration gains popularity among software organizations for its ability to provide quick feedback on quality of new changes. This feedback is used to deliver timely fixes if the changes don’t integrate well and break the project code base. While failures of continuous integration builds are generally inevitable, there are a number of causes of repeatable build failures, or patterns. It is important to understand that once recognized, software build breakage patterns can be avoided. Reduced build breakage means decreased risk of the project falling behind schedule and more enjoying software development. "Five O'clock Check-In" PatternOur analysis shows that vast majority of the build failures falls on the end of the day, with factual build breakage time ranging from 5PM to 8PM, depending on the duration of the build. We call this pattern "Five O'clock Check-In." As the name implies, builds get broken because of check-ins made after five o'clock. Below you can see a histogram that is provided by one of our customers that shows distribution of build failures by hour (this and other statistics is available to Parabuild users). While numbers vary from company to company, this histogram is very characteristic. You can see a clear spike in build breakage at 6PM. "Five O'clock Check-In" pattern has even more dramatic effect on software organizations distributed in multiple time zones. The following histogram shows distribution of build failures in a software company that has two R&D facilities, at PST and at GMT+13: There is a known tendency to check in changes in the end of the day. At that time engineer's ability to critically assert actions is at its lowest level. This, combined with readiness to go home, produces the main excuse not to run clean build and tests before checking in changes (see "It Is a Small Change" pattern below). This pattern can be (and is) avoided by establishing a simple, easy to follow policy: No check-ins should be made after 5PM (or whatever your de-facto end of the day is). This alone may reduce build breakage, typically by 20% to 50%. "Spoiled Fruit" PatternModern software projects increasingly use code generation. Often to simplify build scripts code is generated directly into code base directory structures. This approach may save few lines in a build script, but it causes build failures when generated code becomes orphaned and goes out of sync with the current state of the code base. That is why we call this pattern "Spoiled Fruit." After such breakage occurred, the only way to get a clean build is doing a clean check out. With code bases growing in size, a clean check out may take tens of minutes, and even hours, significantly increasing feedback time from a continuous integration server. "Spoiled Fruit" pattern can be avoided by generating code and storing other build-time artifacts under a single temporarily build directory. The build script should automatically empty this directory at the beginning of a build cycle, usually as a part of "clean" target. Below is an example of a pseudo-code that uses this approach: "It Is a Small Change" PatternRepeatedly the size of change serves as an excuse not to run build and tests cleanly before checkin in new changes. "It is just a comment," "It won’t break anything," "I only removed an empty line." Yet, even a small change moves code base into a new, often broken, state. We call this build breakage pattern "It Is a Small Change." To avoid build failures caused by "It Is a Small Change" pattern, it should be made mandatory that build and tests are run cleanly before checking in any changes into a version control system, to ensure that the changes, to one’s best knowledge, don’t break the build. Conclusion It is possible to reduce software build failures by avoiding common build breakage patterns thus decreasing risk of the project failures and making software development more efficient and enjoying. Slava Imeshev is president of Viewtier Systems, Inc. http://www.viewtier.com, makers of software build management server Parabuild. Slava has been developing software for 16 years. You can reach Slava at vimeshev@viewtier.com About the author TechWell Contributor The opinions and positions expressed within these guest posts are those of the author alone and do not represent those of the TechWell Community Sites. Guest authors represent that they have the right to distribute this content and that such content is not violating the legal rights of others. If you would like to contribute content to a TechWell Community Site, email editors@techwell.com.
{ "pile_set_name": "Pile-CC" }
As computer systems grow ever more powerful and complex, so do computer testing and task management utilities grow ever more sophisticated. For example, today's average commercial application developer requires highly flexible and comprehensive testing mechanisms to ensure that his or her product will function properly on the wide variety of presently available computing platforms. As a result, much effort has been directed toward the development of computer testing and task management tools. For example, Apple Computer, Inc. of Cupertino, Calif. has developed several computer testing tools, including VU® (Virtual User) and MATT® (MacIntosh® Application Program Interface Test Tool). These and other testing tools allow an application developer to evaluate a work in progress without having to expend undue energy in creating the test routines themselves. Using VU, for example, an application developer can write test scripts to simulate an end user's interaction with an evolving product. Alternatively, MATT enables a developer to build custom testing sequences using predefined testing modules. A detailed description of VU is provided, for example, with Apple Computer Inc.'s Developer CD Series (November 1997 or later). Though known testing tools are quite powerful, each providing a unique blend of features and advantages, the great diversity between available testing tools can, ironically, lead to inefficiencies in overall application development for an organization. In other words, since each available tool utilizes a different protocol and provides a different user interface, significant time and money must be expended merely in training application developers and testers as to how to interact with the various tools. Each time an individual is introduced to a new testing tool, he or she must first master operation of the tool itself before true test development and application evaluation can proceed. Furthermore, the creators of the various test tools must expend energy in developing the protocols and user interfaces in the first instance. Given the complexity of today's testing tools, these learning curves and programming expenditures can be considerable. Consequently, there is a very real need for improved methods and apparatus for creating, managing and executing computer tests and other tasks.
{ "pile_set_name": "USPTO Backgrounds" }
Made in USA (sculpture) Made in USA is a 2005 sculpture by American artist Michael Davis, installed at the SODO light rail station in Seattle, in the U.S. state of Washington. It consists of a by steel archway as well as a plaza with seating areas. The archway is composed of oversized tools, including a try square, spirit level, and carpenter pencil. The seating area includes benches shaped into I-beams and a cog, with cast bronze replicas of workbench tools soldered onto the granite tops. Both elements honor the industrial legacy of Seattle's SoDo neighborhood by using "tools of the trade". The archway element of the piece was installed in August 2005 as the first piece of public art on the Central Link line. References Category:2005 establishments in Washington (state) Category:2005 sculptures Category:Bronze sculptures in Washington (state) Category:Outdoor sculptures in Seattle Category:SoDo, Seattle Category:Steel sculptures in Washington (state)
{ "pile_set_name": "Wikipedia (en)" }
Refund Policy Friends Who Are Going Friends Attending Friends Attending Friends Attending Description Fresh Good provides a different outlook on your favorite cocktails. Every Thursday morning fresh drink ingriendients will be handcrafted providing you with the freshest allotment of juices, mixers & puree to spice up your favorite beverages. Fresh Fruits will be available to accompany your drink or to simply satisfy your tastebuds. Positive energy & vibes welcome :) Please RSVP below your reservation gives us a good forecast on how much fruit to prepare. Discounted drink prices will be available 6-8PM weekly.
{ "pile_set_name": "Pile-CC" }
JP/Kadin says FTAs need `guidelines' The Indonesian Chamber of Commerce and Industry (Kadin) has requested inclusion of guidelines for bilateral and multilateral trade agreements in the coming trade law in a bid to create a better fit between trade and industrial policies. "Liberalization should also have rules," said Benny Soetrisno, Kadin's deputy chairman on trade and distribution. Kadin's request was driven by the concern of local business players over potential negative impacts from FTAs, particularly with China, Australia and New Zealand. The FTA with China, part of the ASEAN-China FTA, beginning with an early batch of tariff cuts in 2005, will see full eradication of tariffs on most goods starting next year. Indonesia textile, nail and wire manufacturers are among those suffering the most from tariff cuts in the past four years. The Indonesian Textile Producer Association (API) estimates that 70 percent of textile products distributed in Indonesia are imported from China. These imports have forced Indonesian producers to focus on upper scale goods, mainly for exports, as they can't compete with *underpriced' Chinese products. The nail and wire producers suffered a more rapid deterioration with their production level plunging to 30 percent of capacity in 2007 from 80 percent just a year before. The dire condition of the industry has forced the government to impose safeguard measures on nail and wire imports from China. The FTA with Australia and New Zealand, which was signed this year, is feared may hurt domestic meat and milk producers. Kadin's concerns were welcomed by members of House Commission VI. Commission member Mukhamad Misbakhun said the upcoming trade law - currently being drafted by the trade ministry - must protect the interest of both the domestic market and industry players. A trade law must serve as a guideline to regulate "how wide Indonesia, as a market to imported goods, is opened", he said. He also said the government "must" review FTAs that were already implemented and "delay" the implementation of unfinished FTAs until a trade law was issued. The Commission said it will summon trade ministry representatives to discuss the inclusion of extra provisions in the draft to guide FTAs. The completion of the draft is part of the ministry's 100-day program.
{ "pile_set_name": "Pile-CC" }
Introduction {#s1} ============ Working memory enables us to remember, manipulate, and reorganize information for short periods of time (Salthouse et al., [@B46]; Baddeley, [@B2], [@B3]). This executive memory process is fundamental for everyday life and is known to decline with advanced age (Li et al., [@B27]; Gazzaley et al., [@B16]). Age-related decline in working memory significantly contributes to loss of independence and decreased quality of life (Mograbi et al., [@B33]). However, there is currently a paucity of effective interventions for remediating working memory decline in older adults. Transcranial direct current stimulation (tDCS) demonstrates promise as a potential intervention in this domain, but knowledge of the mechanisms underlying tDCS effects on working memory function in older adults remains unexplored. Non-human primate studies have indicated the importance of the frontal lobes, particularly the dorsolateral prefrontal cortex (DLPFC), in working memory function (Goldman-Rakic, [@B19], [@B18]; Wang et al., [@B48]). In humans, structural and functional neuroimaging studies support the integral importance of frontal structures in working memory (Boisgueheneuc et al., [@B11]; Barbey et al., [@B4]). Reduced structural surface area of right frontal lobe regions in older adults is associated with lower working memory performance (Nissim et al., [@B35]). In addition, low performing older adults demonstrate significantly increased right lateralized blood oxygenation level dependent (BOLD) response compared to high performing older adults who demonstrate bilateral recruitment of frontal structures (i.e., neural compensation hypothesis; Cabeza et al., [@B12]). Moreover, functional connectivity of the working memory network decreases with older age (Hampson et al., [@B21]; Andrews-Hanna et al., [@B1]; Hampson et al., [@B22]; Keller et al., [@B24]). While there is growing evidence supporting the role of frontal structural and functional decline in age-related working memory performance, there is a lack of effective interventions aimed at treating this decline. Such interventions will be necessary for addressing public health concerns related to the increasing age of the world population and the increased prevalence of age-related cognitive decline in the population at large. Non-invasive brain stimulation techniques have the potential to impact cognitive processes and modify behavior by inducing changes in brain function (Gomes-Osman et al., [@B20]). tDCS is a safe and painless form of non-invasive brain stimulation that modulates the neuroplastic response of brain tissue and can impact behavior both during and after periods of stimulation through sub-threshold alteration of resting membrane potentials (Nitsche and Paulus, [@B36]; Monte-Silva et al., [@B34]; Pelletier and Cicchetti, [@B41]; Bikson et al., [@B8]; Woods et al., [@B52]; Bikson et al., [@B7]; Knotkova et al., [@B26]). Prior studies have demonstrated that tDCS can impact and enhance working memory in older adults (Jones et al., [@B23]; Woods et al., [@B53]). For example, Stephens and Berryhill ([@B47]) demonstrated that older adults who received active tDCS over sham (anode-F4, cathode-contralateral cheek) during a working memory training protocol experienced greater benefits on untrained tasks at post-training assessment (Stephens and Berryhill, [@B47]). Effects of tDCS combined with working memory training have shown to extend and increase training gains (Richmond et al., [@B45], [@B44]; Jones et al., [@B23]; Stephens and Berryhill, [@B47]). Recent research also suggests that the efficacy and transfer of tDCS paired with working memory training may be state dependent, with greater transfer occurring when training tasks are more difficult (Gill et al., [@B17]). These studies demonstrate the promise of tDCS as a potential intervention for age-related working memory decline. However, there is a gap in knowledge on the mechanism(s) of action of tDCS-based enhancement of working memory in the brain. No study to date has directly investigated the impact of tDCS on functional connectivity of the working memory network. Better understanding of the mechanism(s) of action for tDCS-based working memory enhancement is essential to harness and optimize tDCS as a treatment approach for cognitive decline in older adults. To address this gap in knowledge, we performed a mechanistic study designed to evaluate the acute and after-effects of tDCS on functional connectivity of working memory networks in older adults during N-Back performance (2- vs. 0-back). This study specifically aimed to query the direct impact of tDCS vs. sham on the working memory network, taking steps to stabilize test-retest behavioral and network change across N-back sessions and between conditions (active vs. sham) to focus our inquiry on direct mechanistic effects of an acute tDCS dose on the network. We hypothesized that active stimulation vs. sham would result in increased frontal connectivity during working memory performance in older adults. In addition, we hypothesized that changes in functional connectivity from active tDCS would be greater in the high-effort 2-Back vs. 0-Back conditions. Materials and Methods {#s2} ===================== We conducted a randomized double-blinded crossover within-subject study examining the acute effects of bilateral frontal tDCS (2 mA for 12 min; F3/F4) during an functional magnetic resonance imaging (fMRI) BOLD scan. For each stimulation condition (active vs. sham), participants performed three runs (baseline-active/sham, during-active/sham, post-active/sham) of an N-Back working memory task. Participants received each stimulation condition (active and sham) at two separate visits (randomized and counterbalanced), and thus, served as their own controls. [Figure 1](#F1){ref-type="fig"} illustrates the overall experimental design used in this study. ![Experimental design for the functional magnetic resonance imaging (fMRI) N-Back task. Participants underwent an N-Back task before (Baseline), during active or sham stimulation (During), and after stimulation was stopped (Post). Anode = red; Cathode = blue. A, anterior; P, posterior; L, left; R, right.](fnagi-11-00051-g0001){#F1} Participants {#s2-1} ------------ Sixteen older adults between the ages of 61--82 years old participated in this study \[n female = 6; mean age (SD) = 71.75 (7.29); mean education = 16.8 (1.92)\]. All participants completed a medical history questionnaire and cognitive assessments to meet study eligibility criteria. The Montreal Cognitive Assessment (MoCA) was used to screen for significant global cognitive deficits. Participants were enrolled in the study if they were MRI-compatible, able to receive electrical stimulation on the head, scored at least 20 or more on the MoCA (mean = 26.56 SD = 2.94), were right-hand dominant, and not taking certain medications potentially blocking tDCS excitability effects (i.e., GABAergic, glutamatergic, or sodium channel blockers; McLaren et al., [@B32]). Participants with a history of neurological disorders, seizures, psychiatric disorders, in active treatment for cancer, previous traumatic brain injury with loss of consciousness greater than 20 min, or any neurodegenerative disease were excluded from the study. The washout period between stimulation visits for each participant was 8.5 days on average (range = 6--16 days). The study protocol was in accordance with the Declaration of Helsinki and approved by University of Florida's Institutional Review Board. Participants provided written informed consent prior to any study procedures. Structural MRI Acquisition {#s2-2} -------------------------- T1-weighted MPRAGE structural MRI scans were obtained prior to BOLD fMRI using a 32-channel head coil (3T Philips MRI). Scan parameters included: repetition time (TR) = 7.0 ms; echo time (TE = 3.2 ms); flip angle = 8°; field of view (FOV) = 240 × 240 × 170 mm; voxel size = 1 mm^3^. fMRI Data Acquisition {#s2-3} --------------------- fMRI scans were acquired on a 3 Tesla Philips MRI scanner using a 32-channel head coil. Task-based fMRI data were collected using a single-shot EPI sequence (36 slices, no gap, TR = 2,000 ms, TE = 30 ms, flip angle = 80°, FOV = 224 × 224 × 126, voxel size = 3.5 mm^3^). Task stimuli were presented on a screen and reflected onto a mirror visible to participants. Participants were trained on the task prior to the MRI session. tDCS Parameters and Application {#s2-4} ------------------------------- Bilateral frontal tDCS was delivered inside the scanner at 2 mA for 12 min (30 s ramp up/down) during the active condition using an MRI-compatible tDCS device (neuroConn DC-Stimulator MR). The sham condition was identical except that the stimulation period lasted only 30 s. Prior studies that examined 1 mA intensity consistently report increased excitation under the anode and decreased excitation under the cathode electrode in the context of motor-evoked potential TMS paradigms in the motor cortex (Nitsche and Paulus, [@B36]; Nitsche et al., [@B37],[@B39], [@B38]). In contrast, increasing the intensity to 2 mA has been shown to produce net excitation under both anode and cathode electrodes (Batsikadze et al., [@B5]; Reato et al., [@B43]). Our montage (F3/F4) and parameter selection of 2 mA was chosen to broadly target bilateral frontal brain regions involved in working memory with the intent of producing net excitation under the anode and cathode during active stimulation. Head measurements were performed using the 10--20 International EEG System to identify F3 (cathode) and F4 (anode) locations over left and right DLPFC, respectively. A 5 mm thick electrical conductive paste (Ten20 paste) was applied directly on two 5 × 7 cm^2^ rubber electrodes prior to placing the electrodes onto the scalp before the scan (Khadka et al., [@B25]; Woods et al., [@B54]). A thin layer of paste was also applied to the scalp at the F3/F4 locations for at least 30 min before the scan to allow paste to saturate the skin/scalp and achieve target impedance levels (\<2 kOhms). The electrodes were held in place with a rubber Soterix Easy-Head strap. The device was turned on before the start of the second run of the N-Back to allow ramp time to complete prior to start of the fMRI scan. A blinded six-digit code was entered into the device to initiate the randomized stimulation condition for the session. No adverse events were reported during the study. N-Back Task {#s2-5} ----------- During the task period (36 min; 12 min per run), participants performed three runs of the N-Back task (baseline, during, post) for each stimulation condition (active and sham). The task paradigm for each run consisted of four blocks of 2-Back and four blocks of 0-Back presented in a randomized order. In total, 12 blocks of both 2-Back and 0-Back were performed at each visit. During the 2-Back task, participants viewed stimuli of uppercase letters one at a time on the screen with a crosshair (+) as an inter-stimulus interval between stimuli (see [Figure 2](#F2){ref-type="fig"} for example). The stimulus appeared for 1 s, and the cross hair for 3 s, providing a 4 s window to make a response. Participants were instructed to press a button with their right index finger when the current letter matched the letter that appeared two trials back, and press a different button with their right middle finger when stimuli did not match the 2-Back pattern. The 0-Back was identical to the 2-Back task; however, it lacked the 2-Back pattern component and was used as an attention-control task. For 0-Back, participants were instructed to press a button with their index finger only for the letter "X" and press a different button with their middle finger for any other letter. As this study aimed to mechanistically evaluate the acute impact of tDCS on working memory networks, participants were trained thoroughly on the N-Back task (2- and 0-Back) outside of the scanner to facilitate stabilization of test-retest reliability and comprehension of the task. The intent of this procedure was to facilitate stability of the activation pattern in the working memory network across subsequent runs and between MRI sessions, and isolate detected change in connectivity due to influences from tDCS alone, rather than from the combination of tDCS and test-retest learning. The training consisted of separate 0-Back and 2-Back practice sessions with immediate performance feedback. Afterwards, participants performed an identical version of the task as it appeared in scanner without any feedback. The training took approximately 20 min and was performed before the MRI scan at both active and sham visits. Participants were reminded of instructions while inside the scanner prior to starting the task. N-Back accuracy was analyzed as a percent accuracy score on the 2-Back and 0-Back task. Reaction time was first log-transformed to achieve a normal distribution and the average was taken for each task. Performance (accuracy and reaction time) was evaluated using repeated measures analysis of variance (ANOVA) with stimulation condition (active vs. sham) and time (baseline, during, post) as factors in the model. ![Example of a 2-Back version of N-Back.](fnagi-11-00051-g0002){#F2} Neuroimaging Pre-processing {#s2-6} --------------------------- Spatial and functional pre-processing was performed using the CONN Toolbox v.2017.f[^1^](#fn0001){ref-type="fn"} and SPM12[^2^](#fn0002){ref-type="fn"} running in MATLAB 2015b (The Mathworks Inc, Natick, MA, USA). Pre-processing steps were used to segment high-resolution T1-weighted anatomical volumes for each participant into gray matter, white matter, and cerebrospinal fluid, and normalize to Montreal Neurological Institute (MNI) space. Functional volumes underwent realignment, slice-timing correction, and normalization to MNI space using the normalized EPI template image in CONN and a spatial Gaussian smoothing kernel of 8 mm. The artifact detection toolbox (ART) was applied to detect any motion artifacts. Motion parameters from the realignment process were evaluated after pre-processing to identify outliers. Any volumes exceeded a threshold of \>3 mm (translation) and \>1° rotation were removed from the analysis. Participants included in the analysis did not exceed thresholds for movement. BOLD data was filtered at a bandpass of 0.008-Inf Hz to reduce low-frequency drift and noise effects. Noise correction was performed using the anatomical component-based noise correction (aCompCor) method (Behzadi et al., [@B6]) implemented in the CONN Toolbox and SPM12. This method extracted principal components from white matter and CSF time series, which were then added as confounds in the denoising step within the CONN Toolbox (Behzadi et al., [@B6]; Whitfield-Gabrieli and Nieto-Castanon, [@B51]; Demirakca et al., [@B14]). This step was used to reduce any physiological and subject movement effects from the time series of interest, and enhance sensitivity, specificity, and validity for subsequent functional connectivity analyses (Behzadi et al., [@B6]; Whitfield-Gabrieli and Nieto-Castanon, [@B51]; Demirakca et al., [@B14]; Fallon et al., [@B15]). Seed-to-Target Regions of Interest (ROIs) Analyses {#s2-7} -------------------------------------------------- Using the BOLD signal, we implemented the CONN Toolbox to estimate measures of functional connectivity (Whitfield-Gabrieli et al., [@B50]; Wei et al., [@B49]). Previously, the Owen et al. ([@B40]) meta-analysis identified significant activated brain regions during the fMRI N-Back task. We selected the 15 seed regions of interest from this article (Owen et al., [@B40]) *a priori* to represent the working memory network in our analyses. Spherical regions of interest (ROIs) were created using the WFU PickAtlas GUI in SPM12 (Maldjian et al., [@B29], [@B28]) and the MNI-coordinates from Owen et [@B40] ([@B40]; [Table 1](#T1){ref-type="table"}); each ROI was created using the volume (mm^3^) reported in the meta-analysis. The default setting of 10 mm radius was used if no volume was reported. It should be noted that the Owen et al. ([@B40]) meta-analyses contained overlap between a subset of ROIs. In each case, radius size varied between identified ROIs. While selecting a single representative ROI would reduce the number of multiple comparisons, potentially increasing the number of significant findings in the current study, we chose a conservative approach aimed at maintaining consistency with the Owen et al. ([@B40]) meta-analysis ROIs. In the case of overlap between left frontal pole and one of the two left dorsolateral prefrontal ROIs, the inclusion of these two overlapping ROIs also provides a degree of ability to examine whether tDCS effects within the frontal pole are related to the portion of the frontal pole consistent with DLPFC or the larger extent of the frontal pole ROI. After pre-processing, denoising, and first level analysis (generalized psychophysiological interaction---gPPI; bivariate regression), second level models for the 2-Back task were analyzed for each of the 15 ROIs with combinations of stimulation session (active or sham) and time (baseline, during, post) as conditions in each model. Target regions only included the spherical ROIs to reduce the number of comparisons and focus on nodes within the working memory network. Model contrasts were created within a single stimulation session (e.g., during-active \> baseline-active) for each seed to all targets. Contrasts with significant connectivity changes (FDR \< 0.05) were further analyzed between active vs. sham sessions via a *post hoc* paired sample *t*-test to quantify the differences between sessions (e.g., during-active \> baseline-active vs. during-sham \> baseline-sham).*T*-tests were FDR 0.05 corrected for multiple comparisons. The 0-Back was analyzed in an identical manner. ###### Regions of interest (ROIs), Montreal Neurological Institute (MNI) coordinates, radius for spherical ROIs. Region *x* *y* *z* Radius ------------------------------ -------- -------- -------- -------- LH DLPFC −37.75 50.19 13.6 6.2 −46.26 22.71 18.6 14.3 LH frontal pole −37.75 50.19 13.6 7.5 LH inferior parietal lobule −37.09 −47.7 45.58 10 LH lateral premotor −26.32 6.75 53.46 9 −45.96 3.1 38.47 10 LH ventrolateral PFC −31.36 21.11 0.58 10 Medial cerebellum 3.12 −69.09 −24.69 3 RH DLPFC 44.53 38.76 24.43 12.5 RH inferior Parietal Lobule 44.97 −45.49 41.73 12.46 RH lateral premotor 31.96 11.01 49.8 15.83 31.96 11.01 49.8 10 RH medial posterior parietal 12.77 −63.71 55.28 14.8 RH ventrolateral PFC 35.58 23.26 −3.01 10 Supplementary motor area −0.588 18.57 40.65 10 *LH, left hemisphere; RH, right hemisphere*. Analytical Approach {#s2-8} ------------------- Using the CONN Toolbox, we examined ROI-to-ROI seed-to-target functional connectivity for each seed to all other specified targets in the working memory network via bivariate regression (gPPI) for 2-Back and 0-Back separately. The N-Back blocks in each run were synchronized with the functional data to only capture the task period and not rest or instruction periods. Fisher-transformed bivariate regression coefficients (beta values) between two ROI BOLD time-series were used to identify significant increases or decreases in functional connectivity between the seed-to-target. Results {#s3} ======= Functional Connectivity During 2-Back {#s3-1} ------------------------------------- We examined the effects of active vs. sham stimulation (at two separate visits) across three time points (baseline-active/sham, during-active/sham, and post-active/sham) during the 2-Back working memory task. Seed-to-target analyses demonstrated selective modulation of functional connectivity within the working memory network on the 2-Back task during-active stimulation as shown in [Figures 3](#F3){ref-type="fig"}, [4](#F4){ref-type="fig"} and [Table 2](#T2){ref-type="table"}. ![Functional connectivity beta values in active vs. sham session contrasts (seeding left ventrolateral prefrontal cortex, VLPFC to target left dorsolateral PFC, DLPFC). \*P-FDR \< 0.05.](fnagi-11-00051-g0003){#F3} ![Seed to target locations for significant connectivity findings. See [Table 2](#T2){ref-type="table"} for seed to target location names. Nodes colored in black represent the seed location. Nodes color coded in red or blue indicate the target location. Red signifies significantly increased connectivity (FDR \< 0.05). Blue signifies significantly decreased connectivity (FDR \< 0.05). A, anterior; P, posterior; R, right; L, left.](fnagi-11-00051-g0004){#F4} ###### Significant seed to target connectivity values and test statistics for each contrast. Contrast Condition Seed Target Beta T~(15)~ P-Unc P-FDR Outcome -------------------- ----------- --------------------- --------------------- ------- --------- ------- --------- ------------------------ During \> Baseline Active VLPFC LH DLPFC LH 0.18 3.59 0.002 0.045\* Increased connectivity During \> Baseline Sham Lateral premotor LH Frontal pole LH −0.32 −3.4 0.003 0.042\* Decreased connectivity During \> Baseline Sham Lateral premotor LH DLPFC LH −0.38 −3.28 0.005 0.042\* Decreased connectivity Post \> During Active DLPFC LH VLPFC LH −0.06 −3.55 0.002 0.049\* Decreased connectivity Post \> During Active IPL RH Lateral premotor LH −0.17 −3.84 0.001 0.027\* Decreased connectivity *\*p-FDR \< 0.05*. During \> Baseline {#s3-2} ------------------ ### Active {#s3-2-1} A significant increase in functional connectivity was observed during-active stimulation compared to baseline-active when seeding in the left VLPFC targeting left DLPFC (P-FDR = 0.045). On an individual subject level, we observed that 13/16 (81%) participants evidenced increases in connectivity. ### Sham {#s3-2-2} We found significantly decreased connectivity during-sham stimulation compared to baseline-sham when seeding in the left lateral premotor targeting the left frontal pole (P-FDR = 0.042) and the left DLPFC (P-FDR = 0.042). ### Active vs. Sham {#s3-2-3} Left ventrolateral PFC (VLPFC) to Left DLPFC: *post hoc* analyses comparing during-active \> baseline-active to during-sham \> baseline-sham demonstrated significantly greater connectivity values in the active condition (*t* = 2.65, *df* = 15, *p* = 0.01, P-FDR = 0.018). Left Lateral Premotor to Left Frontal Pole: *post hoc* analyses comparing during-active \> baseline-active to during-sham \> baseline-sham demonstrated significantly lower connectivity values in the sham condition (*t* = 2.77, *df* = 15, *p* = 0.01, P-FDR = 0.047). Left Lateral Premotor to Left DLPFC: *post hoc* analyses comparing during-active \> baseline-active to during-sham \> baseline-sham demonstrated significantly lower connectivity values in the sham condition (*t* = 2.68, *df* = 15, *p* = 0.01, P-FDR = 0.047). Post \> During {#s3-3} -------------- ### Active {#s3-3-1} There was a significant decrease in connectivity between left DLPFC targeting left VLPFC post-active compared to during-active stimulation (P-FDR = 0.049). In addition, connectivity between right inferior parietal lobule (seed) and left lateral premotor (target) was also significantly decreased (P-FDR = 0.027). ### Sham {#s3-3-2} No significant changes in connectivity were found when comparing post-sham to during-sham stimulation (P-FDR \> 0.05). ### Active vs. Sham {#s3-3-3} Left DLPFC to Left VLPFC: *post hoc* analyses comparing post-active \> during-active to post-sham \> during-sham did not demonstrate a significant difference between sham and active conditions (P-FDR \> 0.05). Right IPL to Left lateral premotor: analyses comparing post-active \> during-active to post-sham \> during-sham demonstrated that connectivity values were significantly lower in the active condition (*t* = −2.56, *df* = 15, *p* = 0.021, P-FDR = 0.048). Post \> Baseline {#s3-4} ---------------- ### Active {#s3-4-1} No significant changes in connectivity were found when comparing post-active stimulation to baseline-active stimulation (P-FDR \> 0.05). ### Sham {#s3-4-2} No significant changes in connectivity were found when comparing post-sham stimulation to baseline-sham (P-FDR \> 0.05). Control Contrast: Baseline-Active vs. Baseline-Sham {#s3-5} --------------------------------------------------- No significant changes in connectivity were found between baseline-active vs. baseline-sham stimulation (P-FDR \> 0.05). Functional Connectivity During 0-Back {#s3-6} ------------------------------------- The effects of active vs. sham stimulation were evaluated across the three time points during the 0-Back task in an identical manner as 2-Back. Seed-to-target analyses were performed seeding in each ROI targeting all other ROIs in the network. No significant connectivity changes were identified during 0-Back (P-FDR \> 0.05). In addition, there were no significant connectivity differences between baseline-active vs. baseline-sham (P-FDR \> 0.05). N-Back Behavior {#s3-7} --------------- Percent accuracy and reaction time on the N-Back task did not significantly differ between active and sham stimulation conditions at the various time points (*p* \> 0.05) as reported in [Table 3](#T3){ref-type="table"}. Evaluation of linear and non-linear fits for performance data demonstrated a trend towards faster reaction time for 2-Back targets (tests of within-subject contrast fit with quadratic equation; *F* = 2.146, *df* = 1.15, partial eta squared = 0.125, *p* = 0.16) and improved 2-Back target accuracy (fit with linear equation; *F* = 3.199, *df* = 1.15, partial eta squared = 0.176, *p* = 0.09) during active-stimulation using repeated measures ANOVA within-subject contrast (time × stimulation condition). Nonetheless, performance was not significantly different for accuracy and reaction time. ###### Mean percent task accuracy and standard error on 2-Back and 0-Back for each condition; mean reaction time and standard error in milliseconds for each condition. N-Back performance (mean, std. error) Baseline-Active During-Active Post-Active Baseline-Sham During-Sham Post-Sham --------------------------------------- ----------------- --------------- -------------- --------------- -------------- -------------- 2-Back accuracy 84% (4%) 81% (5%) 82%(6%) 85% (4%) 85% (3%) 79% (4%) 0-Back accuracy 89% (3%) 92% (4%) 84% (6%) 89% (4%) 89% (3%) 88% (3%) 2-Back reaction time 959.3 (57.2) 847.2 (63.6) 868.5 (39.0) 1015.2 (64.5) 955.5 (62.5) 886.6 (51.4) 0-Back reaction time 791.2 (55.1) 738.5 (60.6) 756.5 (55.5) 830.3 (74.6) 760.3 (62.7) 739.6 (56.9) Discussion {#s4} ========== To the best of our knowledge, this is the first study to investigate the mechanistic acute and after-effects of bilateral frontal tDCS on functional connectivity of the working memory network in older adults. Our results demonstrate the ability of in-scanner tDCS paired with an N-Back task to acutely modulate functional connectivity in the working memory network. We found increased functional connectivity within the working memory network (seeding left VLPFC targeting left DLPFC) while participants performed the 2-Back task during active stimulation compared to baseline. Moreover, the *post hoc* between-condition analysis demonstrated significantly greater connectivity values in the active condition (P-FDR = 0.018). In contrast, during sham stimulation compared to baseline, we observed a significant decrease in functional connectivity during the 2-Back task (seeding left lateral premotor to left frontal pole and left DLPFC). Importantly, the changes in functional connectivity that occurred during active stimulation only occurred while performing the more challenging 2-Back task, and not during the less challenging 0-Back task. Additionally, increased left frontal connectivity during active stimulation trended towards decreasing post-stimulation, and may suggest that functional connectivity returned to baseline values after stimulation was stopped. This is also potentially supported by a significant decrease in connectivity that was observed at post-active stimulation compared to during active stimulation when seeding left DLPFC targeting left VLPFC. Collectively, these data suggest the ability of acute bilateral F3/F4 tDCS at 2 mA to selectively modulate frontal functional connectivity of working memory related brain regions in older adults during stimulation. These results provide important insight into: (1) selective effects of tDCS on functional connectivity; (2) state-dependent effects of tDCS; (3) the importance of timing tDCS delivery; and (4) effects of 2 mA stimulation under the cathode electrode. Our results demonstrated an increase in connectivity between two frontal lobe structures (VLPFC and DLPFC) during-active tDCS. Sub-regions of the frontal lobe are essential for manipulation of verbal and spatial knowledge (Barbey et al., [@B4]). Functionally, the VLPFC has exhibited enhanced activity during various cognitive control processes such as selection, maintenance, and retrieval of goal directed information. The DLPFC has shown critical involvements during task delay periods and facilitates the ability to keep task-relevant information active, in addition to manipulating that information to accomplish the task. Together, the DLPFC and VLPFC demonstrate enhanced activity in cognitive control processes such as monitoring, manipulating, or processing goal directed information, all processes vital to working memory (D'Esposito et al., [@B13]; Petrides, [@B42]; Blumenfeld et al., [@B10]). Our finding of functional connectivity increase during-active stimulation on 2-Back, and not 0-Back is consistent with previous investigations of state-dependent effects of tDCS. Gill et al. ([@B17]) provided evidence that cognitive enhancement capacity of tDCS may depend on the nature of the task being performed during stimulation (Gill et al., [@B17]). A challenging and more cognitively demanding 3-Back task produced greater proficiency on a separate working memory task (Paced Auditory Serial Addition Task, PASAT). In contrast, the less cognitively demanding 1-Back task performed during stimulation did not result in an improvement on the PASAT. Our results support prior research that the effects of tDCS are state dependent on more cognitively demanding tasks (2-Back) vs. less demanding tasks (0-Back). Previous studies examining tDCS paired with cognitive training indicate the importance of timing of stimulation. Martin et al. ([@B31], [@B30]) demonstrated that gains from tDCS were significantly greater when stimulation was delivered during an adaptive N-Back cognitive training task vs. stimulation delivered prior to training (Martin et al., [@B31], [@B30]). These data suggest that optimal gains from tDCS may be achieved by "co-stimulating" neural networks through both behavior and electrical stimulation. Our finding of increased functional connectivity during active stimulation, and not at baseline or post stimulation, appears to be consistent with this notion, and further highlights the importance of timing and delivery of tDCS for optimizing brain-based effects. While absence of post-stimulation after effects on functional connectivity do not preclude behavioral effects of tDCS, these data might suggest that there is an optimal window for leveraging brain-based changes of tDCS during the period of stimulation. However, it is important to use caution when interpreting our results in this domain, as our participants only demonstrated trends for improved accuracy and reaction time in the current study. Previous studies in tDCS and the motor cortex have shown that 1 mA vs. 2 mA of intensity can have differing physiological responses under the anode vs. cathode electrodes by measuring changes in motor evoked potentials (MEPs). At 1 mA, an increase in excitability is typically seen under the anode electrode, whereas the cathode electrode demonstrates a decrease in excitability (Bindman et al., [@B9]; Nitsche and Paulus, [@B36]; Nitsche et al., [@B37],[@B39]). Batsikadze et al. ([@B5]) demonstrated that 2 mA tDCS can produce a net increase in excitability under both the anode and cathode electrodes (Batsikadze et al., [@B5]). At present, there are no MEP-like markers within the frontal lobes that indicate physiological change induced via tDCS. However, our finding of increased functional connectivity of left frontal regions during active stimulation may support prior motor cortex findings of increased excitability under the cathode electrode at 2 mA in frontal cortices. If the cathode electrode induced a decrease in excitability in underlying tissue, we might expect to see decreased connectivity, or no change, yet we saw an increase in functional connectivity lateralized to the left hemisphere where the cathode electrode was placed. Therefore, these data appear, at least in part, to support a growing body of research suggesting that 2 mA tDCS may result in increased excitability under the cathode electrode. When interpreting the results, limitations of the study should be considered. Artifacts in the MRI environment could alter imaging data; we took into consideration how introducing current into the MRI may cause artifacts. Our task paradigm randomized and switched between 2- and 0-Back for during-active stimulation. We did not identify any significant changes in functional connectivity while 0-Back was performed in during-active stimulation. The lack of change in during-active vs. during-sham stimulation on the 0-Back task provides further evidence that the observed connectivity increase was not caused by potential artifacts directly induced by current delivery. This suggests the connectivity changes that occurred during active stimulation on the 2-Back were a result of stimulation. This study did not demonstrate statistically significant behavioral improvements in the active vs. sham session, although a trend for significance and medium effect sizes were present. Our study trained participants prior to in-scanner performance to stabilize the behavioral and network performance across multiple runs, to better enable direct evaluation of acute impact of delivered current flow on functional connectivity in working memory networks. As expected, stable and high levels of performance likely minimized our ability to detect large changes in N-back performance. In addition, limited power due to small sample size likely played a role in these results. It is also important to consider the range of cognitive abilities of the selected sample. The current study used a liberal MoCA cutoff of 20, with an average of 26.5. Thus, the older adult sample in the current study included not only participants that could be classified as "normal healthy" older adults, but also some participants that may not be entirely cognitive normal. Nonetheless, participants were excluded for diagnosis of mild cognitive impairment or dementia. There are also nuances to performing fMRI in older adults that must be considered. The process of aging on the brain may uniquely impact adaptive network mechanisms. Thus, effects found in the current study may not extend to younger adults. Future studies replicated the current findings in younger adults would help to expand our understanding of tDCS mechanisms across the lifespan. As the population studied involves older adults, 25% or more of participants may have beta-amyloid present in the brain. As beta-amyloid can impact functional connectivity, this factor may play a role in our overall results and further stresses the need for follow-up studies in young adults and older adults with corresponding beta-amyloid positron emission tomography. Conclusion {#s5} ========== The underlying mechanism(s) of action of tDCS and its effects on brain function are not yet fully understood. Our results demonstrated that acute bilateral frontal tDCS selectively modulates functional brain connectivity in the working memory network of older adults. These data indicate the importance of timing of stimulation and the critical influence that state/cognitive effort may have during the period of stimulation. Further research pairing tDCS with unimodal and multimodal neuroimaging is needed to continue elucidating the mechanism(s) of tDCS brain-based effects on cognition. Data Availability {#s6} ================= The datasets generated for this study are available on request to the corresponding author. Author Contributions {#s7} ==================== NN, AO'S, AI, RT, LR, EP, RC and AW contributed to the manuscript. NN and AW performed data analyses. All authors approved the final version of the manuscript. Conflict of Interest Statement {#s8} ============================== The authors declare that the research was conducted in the absence of any commercial or financial relationships that could be construed as a potential conflict of interest. **Funding.** This work was supported in part by the National Institute of Aging/National Institutes of Health (K01AG050707, R01AG054077), the Evelyn F. McKnight Brain Research Foundation, and the University of Florida Center for Cognitive Aging and Memory. ^1^<https://www.nitrc.org/projects/conn> ^2^<https://www.fil.ion.ucl.ac.uk/spm/> [^1]: Edited by: P. Hemachandra Reddy, Texas Tech University Health Sciences Center, United States [^2]: Reviewed by: Milton Cesar Biagioni, New York University, United States; Rongqiao He, Institute of Biophysics (CAS), China
{ "pile_set_name": "PubMed Central" }