text
stringlengths 173
4.38k
| subset
stringclasses 13
values |
|---|---|
Modernization programs
The following acquisition programs is in-line with the ongoing AFP modernization program.
Philippine Air Force
The Department of National Defense is working for the immediate delivery of at least 4 of the total 12 FA-50 fighter jets plans to purchase from South Korea. The Department of National Defense has begun negotiations with the Korean Aerospace Industries (KAI) while it is waiting for Malacañang's final approval of the sales agreement. It will be a government-to-government procurement that requires multi-year obligational authority from the Department of Budget and Management. After the confirmation of the sales agreement and the multi-year obligational authority from DBM, the formal negotiations can start and schedule the delivery of at least 4 fighter jets. The government is moving closer to acquiring 12 FA-50 fighter jets for the air force after the defense department's Bids and Awards Committee (BAC) approved the terms of reference for the project. Once the terms of reference are approved with finality, the defense department could begin negotiations with the aircraft supplier, the state-run Korean Aerospace Industries (KAI). The negotiations are hoped to be finished by August. The negotiations were completed on Feb. 21, 2014. The Department of National Defense Special Bids and Awards Committee approved the offer of Korea Aerospace Industries (KAI) in a meeting that was held in Camp Aguinaldo. On Mar. 28, 2014, it was announced by the state arms procurement agency of South Korea that South Korea signed a US$420 million contract Friday to export 12 FA-50 fighter jets built by Korea Aerospace Industries (KAI) to the Philippines under a government-to-government deal.
The Philippine Air Force has signed a contract for eight AW109 Power light twin helicopters. These aircraft will be used to perform a range of duties including homeland security, armed reconnaissance and close support. Deliveries will start in 2014. The contract also includes initial logistics support and training for aircrew and maintenance personnel. The Department of National Defense (Philippines) stated that the project involved the purchase of eight helicopters with full night operation capability, complete weapons system and integrated logistics support package. Two companies expressed their interest in the bidding process of the eight attack helicopters. Representatives of AgustaWestland and Eurocopter attended the pre-bid conference for the purchase of eight attack helicopters. Other companies including Bell Helicopter, FN Herstal, Elbit Systems and Boeing Company also sent representatives.
The Department
|
wikipedia_en
|
T. Hellmut, H. Walther, A. G. Zajonc, and W. Schleich, Phys. Rev. A **35**, 2532 (1987).
J. Baldzuhn, E. Mohler, and W. Martienssen, Z. Phys. B **77**, 347 (1989).
B. J. Lawson Daku *et al.*, Phys. Rev. A **54**, 5042 (1996).
V. Jacques *et al.*, Science [**315**]{}, 966 (2007).
W. K. Wootters and W. H. Zurek, Phys. Rev. D **19**, 473 (1979).
D. M. Greenberger and A. Yasin, Physics Letters A [**128**]{}, 391 (1988).
G. Jaeger, A. Shimony and L. Vaidman, Phys. Rev. A **51**, 54-67 (1995).
B.-G. Englert, Phys. Rev. Lett. [**77**]{}, 2154 (1996).
A similar inequality is found in P. Grangier, Thèse d’état (1986), Institut d’Optique et Université Paris 11; available online at http://tel.ccsd.cnrs.fr/tel-00009436.
S. Durr, T. Nonn, and G. Rempe, Phys. Rev. Lett. **81**, 5705 (1998).
X. Peng *et al.*, J. Phys. A **36**, 2555 (2003).
P. Mittelstaedt, A. Prieur, and R. Schieder, Found. Phys. **17**, 891 (1987). P. D. Schwindt, P. G. Kwiat, and B.-G. Englert, Phys. Rev. A **60**, 4285 (1999). As stressed in [@Rempe], these experiments can actually be fully interpreted in the framework of classical electrodynamics since they do not correspond to the case of true single-photon pulses (see Ref. [@Grangier]).
M. O. Scully, B. G. Englert, and H. Walther, Nature **351**, 111 (1991). .
A. Beveratos *et al.*, Eur. Phys. J. D **18**, 191 (2002).
The
|
arxiv
|
instance ExplGet m s => ExplGet m (Identity s) where
{-# INLINE explGet #-}
explGet (Identity s) e = Identity <$> explGet s e
{-# INLINE explExists #-}
explExists (Identity s) = explExists s
instance ExplSet m s => ExplSet m (Identity s) where
{-# INLINE explSet #-}
explSet (Identity s) e (Identity x) = explSet s e x
instance ExplMembers m s => ExplMembers m (Identity s) where
{-# INLINE explMembers #-}
explMembers (Identity s) = explMembers s
instance ExplDestroy m s => ExplDestroy m (Identity s) where
{-# INLINE explDestroy #-}
explDestroy (Identity s) = explDestroy s
T.makeInstances [2..8]
-- | Pseudocomponent indicating the absence of @a@.
-- Mainly used as e.g. @cmap $ \(a, Not b) -> c@ to iterate over entities with an @a@ but no @b@.
-- Can also be used to delete components, like @cmap $ \a -> (Not :: Not a)@ to delete every @a@ component.
data Not a = Not
-- | Pseudostore used to produce values of type @Not a@, inverts @explExists@, and destroys instead of @explSet@.
newtype NotStore s = NotStore s
instance Component c => Component (Not c) where
type Storage (Not c) = NotStore (Storage c)
instance (Has w m c) => Has w m (Not c) where
{-# INLINE getStore #-}
getStore = NotStore <$> getStore
type instance Elem (NotStore s) = Not (Elem s)
instance ExplGet m s => ExplGet m (NotStore s) where
{-# INLINE explGet #-}
explGet _ _ = return Not
{-# INLINE explExists #-}
explExists (NotStore sa) ety = not <$> explExists sa ety
instance ExplDestroy m s => ExplSet m (NotStore s) where
|
github
|
Alan Bishop, principal associate director for science, technology and engineering at LANL, introduces two new exhibits at the Bradbury Science Museum during Friday's grand opening event. Photo by Kirsten Laskey
By KIRSTEN LASKEY
Friday night may have featured overcast skies and rain showers but the gloomy weather did not dampen the atmosphere at the Bradbury Science Museum, which was set aglow by two new, innovative exhibits.
The displays touch on hot topics in the science world: alternative energy and nanotechnology. Therefore, the museum extended its hours Friday and invited the public to the grand opening of these exhibits.
Attendees were first introduced to the exhibit, “Algae to Biofuels: Squeezing Power from Pond Scum,” which highlights the work being done at Los Alamos National Laboratory (LANL), New Mexico Consortium (NMC), the University of New Mexico and New Mexico State University.
Dr. Jose Olivares. Photo by Kirsten Laskey
Dr. Jose Olivares, division leader of LANL’s bioscience division, along with Dr. Richard Sayre of LANL and NMC, conceived the algae biofuel exhibit. Olivares explained that there is a real need to find alternative energy sources. He added, “Bio-energy from bio-mass can be ones of those sources.”
Algae, according to a press release, is set to eclipse all other biofuel energy sources because it is the cheapest, easiest and most environmentally-friendly way to produce liquid fuel.
“Nanotechnology-The Science of the Small” was also presented to attendees. It focuses on the work by LANL’s Center for Integrated Nanotechnologies (CINT).
David Morris. Photo by Kirsten Laskey
David Morris, director of CINT, said nanotechnology is fairly new, adding that “nanoscience and nanotechnology is incredibly broad. Everyone from chemists to engineers contributes to nanoscience."
The exhibit touches on “some of the very specific challenges working at a nano scale. It takes specific tools to handle these things; it take specific techniques to work with these things,” Morris said.
Excitement for this science is also visible in the exhibit. “It’s a very exciting time,” he said.
The enthusiasm was contagious; several members of public commented on the new exhibits.“I’m a biologist so I’
|
pile-cc
|
-3.8
Let m = -0.30544 - -0.3. Let p = 307 - 307.007. Let y = p - m. Round y to four decimal places.
-0.0016
Let f = 89.79 - 89.7852141. What is f rounded to 4 decimal places?
0.0048
Let q = 917 + -922. Let a be -50*(q/(-1) - (-8479)/(-1)). What is a rounded to the nearest 10000?
420000
Suppose 0 = -9*l + 4*l - 4*n + 26, 5*n = 4*l + 12. Let s be (-2150)/(-3)*6/l. Suppose -d - 11850 = s. What is d rounded to the nearest 10000?
-10000
Let b = 57 - 56.954. Let g = -0.0316 + b. What is g rounded to two decimal places?
0.01
Let z = -12177397 + 5642297. Round z to the nearest 10000.
-6540000
Suppose -3*x + 15420531 = 4*x. Suppose -23*w + x = -20*w. Let v = w - 2474311. What is v rounded to the nearest 100000?
-1700000
Let j = -210 + 266. Let w = j + -55.96. What is w rounded to two decimal places?
0.04
Let x = 36 + -21. Let p = 58.792 - 43.91. Let o = x - p. Round o to 2 decimal places.
0.12
Let u be -4 - ((-20)/3 - 4/12). Suppose -u*r + 3*h - 20100012 = 0, -r - 4478362 - 2221654 = -4*h. What is r rounded to the nearest 1000000?
-7000000
Let y(b) = -b**3 - 2*b**2 + b + 32. Let h be y(0). Suppose 0 = 29*u - h*u + 93513. Suppose 5*a - 2*i + 8675 = u, -i = 4*a - 18002. Round a to the nearest 1000.
5000
Suppose 0 = 2*j - a - 5250473, 0*a +
|
dm_mathematics
|
From: Milnthorp, Rob
Sent: Tuesday, February 05, 2002 10:07 AM
To: Oxley, David
Cc: Kitchen, Louise
Subject: ECC New Grads
David, we made offers to 4 new grads a few months ago to work for Enron Canada Corp. ECC is obviously going to renege on these offers. Is there any opportunity to have these offers assigned to UBS War
|
enron_emails
|
In re Carl JOHNSON a/k/a Carl W. Johnson, Debtor.
Bankruptcy No. 81-00592.
United States Bankruptcy Court, District of Columbia.
June 24, 1982.
Michael E. Brand, Miller, Loewinger & Associates, Washington, D.C., for debtor.
MEMORANDUM OPINION
(Motion to Amend Order Appointing Counsel and for Interim Compensation)
ROGER M. WHELAN, Bankruptcy Judge.
The pending Motion to Amend Order Appointing Counsel and for Interim Compensation *218 was filed by the law firm of Miller, Loewinger and Associates, Chartered, as counsel for the debtor in possession and by such motion they seek to correct a prior order of this Court entered on May 27, 1982, authorizing their retention as attorneys for the debtor in possession in this Chapter 11 case. However, the original Chapter 11 case was initiated by the filing of a petition on October 21, 1981, and the attorneys now seek to have the order of May 27, 1982 entered on a nunc pro tunc basis in order to provide for attorneys' services rendered from the initiation of the case in October 1981. A review of the motion essentially sets forth as a factual predicate for the granting of relief, nunc pro tunc, their "mistaken impression that specific appointment of counsel need not be obtained substantially in advance of the filing of a petition for interim compensation." The record before this Court clearly reflects that no order authorizing retention of counsel was ever signed until May 27, 1982, when attorneys for the debtor in possession then filed their application for retention pursuant to the requirements of Section 327 of the Code.
The facts as presented reflect, with reference to the filed application for interim compensation, that counsel rendered substantial services in the pending Chapter 11 case and yet no steps were admittedly taken to secure court approval for retention of counsel. This is certainly a regrettable situation but the mandate of the Bankruptcy Code is clear in requiring court approval for retention of all "professional persons." 11 U.S.C. § 327 specifically mandates that employment of all professional persons be with "court approval." With reference to the filing of a Chapter 11 case, it is important to bear in mind that a new entity, the debtor in possession, emerges upon the filing of the petition and accordingly retention of attorneys for the debtor in possession is mandated in view of the fact that Section 327 is clearly applicable. See 11 U.S.C. § 1107(a)
|
freelaw
|
------
scottyallen
This would be really useful for programming, particularly refactoring. Imagine
being able to quickly apply a relatively mechanical refactoring that still
required human judgement (pretty common), and have other programmers do it for
you.
I imagine it would work something like this:
\- Select the files/directories/blocks of code that you want the refactoring
applied to.
\- Describe (in english) what the refactoring work should be, and do an
example on one piece of the code.
\- The work gets split (by file?) and distributed via a mechanical turk-like
interface (extra points if it opens tasks in your favorite editor with syntax
highlighting). As workers submit their work, the code is automatically built
and tests are run (could be a callback to your local development environment,
so you don't have to worry about shipping all your code up to the cloud and
figuring out how to build it there).
Could be pretty awesome, particularly if you could enlist an army of freshman
CS majors, bored programmers, and eager overseas engineers. I wonder if
intellectual property concerns would be too high for people to actually use it
though.
EDIT: If I still worked at Google, this would be a fun project to try
internally as 20% project. There are lots of mechanical refactoring tasks that
need to be done across large portions of the codebase, good build/test
infrastructure to easily verify success/failure for a given task, and lots of
bored/eager engineers that feed off of reward-based systems:)
------
RK
Here's my human macro for all you high school/college students:
"Expand these bullet points into a 5 page paper"
Even though it mentions things that are along the lines of correction, this
could pretty easily be moved into the realm of crowd-sourced cheating.
------
wtracy
I guess you need to be careful not to use this on any confidential documents.
------
aberkowitz
I wonder if shortn could be used to turn regular Wikipedia articles into those
fitting of simple Wikipedia[1].
[1] <http://simple.wikipedia.org>
------
Groxx
Mechanical Turk has been the brute-force behind a lot of unique concepts, it
seems
|
hackernews
|
An object of this study is to understand those mechanisms which are responsible for the mediation of oxygen binding to the hemoproteins, hemoglobin, myoglobin and cytochrome P-450. Our approach involves the nuclear modulation effect in EPR as a means of discerning the interaction of unpaired spin of paramagnetic hemoproteins with remote nitrogen nuclei of imidazole ligands which are believed to electronically control electron density at the heme iron. This technique will be developed to study nuclear interactions that cannot be seen using conventional EPR techniques.
|
nih_exporter
|
Hypersensitivity reactions in two women with pulmonary lesions, autoimmune reactions with positive antinuclear factor and liver damage following long-term nitrofurantoin treatment are discussed. One patient had taken nitrofurantoin for more than 1 year and the other for more than 2 when their symptoms appeared. They were in a very poor condition, but recovered when the drug was withdrawn. Lymphocyte transformation test in vitro showed significant blast-transformation, indicating the involvement of immunological mechanisms. Treatment with corticosteroids had not
|
pubmed_abstracts
|
*G.v*. 594 (ATCC 14018) 24 5 0/5 0/5 *G.v*. positive; no clinical signs (as above)
12 9 5/9 5/9 *G.v*. positive & clinical signs (as above)
Johnson et al., [@B82] Pig-tailed macaque *G.v*. 584, 614 Peptone-starch-dextrose broth + 10% horse serum NR 24 5 × 10^6^- 1 × 10^7^ Intravaginal (catheter or pipette) 10 10/10 0/10 had clue cells; increased pH; non-volatile fatty acids
Tamarin *G.v*. 584 3 × 10^6^ 4 0/4 0/4 had increased pH
Chimpanzee *G.v*. 812 and 958 Bordet-Gengou agar NR 48 5 × 10^7^- 1 × 10^8^ 3 0/3 0/3 had clue cells; increased pH
Mårdh and Møller, [@B97] Grivet monkeys *G.v*. L824\ NR Anaerobic or 10% CO2 48 2 × 10^9^ Intravaginal (swab) 8 2/8 Profuse, thin gray discharge observed in 2/2 animals infected with *G.v*. + LCR, 0/3 mono-infected animals. *G.v*. recovered only from *G.v*. + LCR infected animals. No clue cells, increased odor, or elevated vaginal pH observed in any animals
LCR L100\
(long curved rod)\
SCR L1599\
(short curved rod)
-----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
A second experiment was performed with 15 healthy female volunteers, but the women were inoculated directly
|
pubmed_central
|
I want to remove CFG from the file if any of the lines matchs a string, which could be 'cfg', 'Cfg', or other case insensitive variations.
If I read the file into a Set, how can I achieve this? It seems more feasible to do this by reading the file into a List.
A:
The following is a "lambda version" of the required code. Thanks to @Sam for the important point about re-raising any suppressed PrintWriter IOException.
Path in_file = Paths.get("infile");
Path out_file = Paths.get("outfile");
try (PrintWriter pw = new PrintWriter(out_file.toFile())) {
Files.lines(in_file)
.filter(line -> !line.equalsIgnoreCase("cfg"))
.forEach(pw::println);
if (pw.checkError()) {
throw new IOException("Exception(s) occurred in PrintWriter");
}
}
If you need to modify the file in place, then writing to it while reading from it is somewhat more difficult. You could read it all into memory first.
Path path = new Path("filename");
List<String> lines = Files.lines(path)
.filter(line -> !line.equalsIgnoreCase("cfg"))
.collect(Collectors.toList());
try(PrintWriter pw = new PrintWriter(path.toFile())) {
lines.forEach(pw::println);
if (pw.checkError()) {
throw new IOException("Exception(s) occurred in PrintWriter");
}
}
And finally, just in case, a non-lambda solution for compatibility with Java 7:
Path in_file = Paths.get("infile");
Path out_file = Paths.get("outfile");
try (BufferReader reader = Files.newBufferedReader(in_file);
PrintWriter pw = new PrintWriter(out_file.toFile())) {
String line;
while((line = reader.readline()) != null) {
if (!line.equalsIgnoreCase("cfg")) {
pw.println(line);
}
}
if (pw.checkError()) {
throw new IOException("Exception(s
|
stackexchange
|
Many of us have seen films containing remarkably realistic dinosaurs, aliens, animated toys and other fanciful creatures. Such animations are made possible by computer graphics. Using such techniques, a computer graphics artist can specify how each object should look and how it should change in appearance over time, and a computer then models the objects and displays them on a display such as your television or a computer screen. The computer takes care of performing the many tasks required to make sure that each part of the displayed image is colored and shaped just right based on the position and orientation of each object in a scene, the direction in which light seems to strike each object, the surface texture of each object, and other factors.
Because computer graphics generation is complex, computer-generated three-dimensional graphics just a few years ago were mostly limited to expensive specialized flight simulators, high-end graphics workstations and supercomputers. The public saw some of the images generated by these computer systems in movies and expensive television advertisements, but most of us couldn""t actually interact with the computers doing the graphics generation. All this has changed with the availability of relatively inexpensive 3D graphics platforms such as, for example, the Nintendo 64(copyright) and various 3D graphics cards now available for personal computers. It is now possible to interact with exciting 3D animations and simulations on relatively inexpensive computer graphics systems in your home or office.
Shadows are important for creating realistic images and providing the viewer with visual cues about where objects appear relative to one another. Many different shadowing techniques are known. See, for example, Woo et al., xe2x80x9cA Survey of Shadow Algorithms,xe2x80x9d IEEE Computer Graphics and Applications, Volume 10, Number 6, pages 13-32 (November 1990).
A problem graphics system designers confronted in the past was how to draw shadows using low cost graphics systems. One known technique for accomplishing this is called shadow mapping. This technique allows a common z-buffer-based renderer to be used to generate shadows quickly on arbitrary objects. See Williams xe2x80x9cCasting Curved Shadows on Curved Surfaces,xe2x80x9d Computer Graphics (SIGGRAPH ""78 Proceedings), Volume 12, Number 3, pages 270-274 (August 1978). Using this technique, the graphics system renders the scene using the z-buffer algorithm with respect to the position and direction of the light source. For each pixel in the z buffer, the resulting rendered z depth
|
uspto_backgrounds
|
Shaochilong (meaning "shark toothed dragon") is a genus of carcharodontosaurid dinosaur from the mid Cretaceous (Turonian stage) Ulansuhai Formation of China (about 92 million years ago). The type species, S. maortuensis, was originally named Chilantaisaurus maortuensis, but was re-described and reclassified in 2009.
Description
The individual which IVPP V2885.1 belonged to was probably adult or nearly adult individual, due to the fusion of many elements of the braincase. Shaochilong's length – based on the length of the maxillary tooth row – is estimated at . Estimated length of the femur is 61.5 cm which suggests the whole animal weighted approximately . This made Shaochilong an uncharacteristically small carcharodontosaurid, in contrast with other members of the family, which were among the largest carnivorous animals on earth. Nevertheless, as an unambiguous example of a fairly large carnosaur in middle Cretaceous Asia, it provides information on the ecosystem of this setting and is evidence that carcharodontosaurids persisted through the middle cretaceous and that large tyrannosaurids (such as Tyrannosaurus) did not dominate Laurasia until the very end of the Cretaceous.
According to the proportions of its maxilla, Shaochilong was a relatively short-faced carcharodontosaur. In combination with its comparatively small size, it could have had a unique ecological role in comparison to other members of the family.
Shaochilong can be distinguished from other carcharodontosaurids due to having the following autapomorphies:
A reduced and nearly absent maxillary antorbital fossa.
No paradental groove on the medial surface of the maxilla.
Deep vertical grooves located dorsally on the maxillary interdental plates.
A pneumatic recess which penetrates to the posterior end of the nasal.
A deep sagittal crest on the frontal.
A large pneumatic foramen in the anterodorsal corner of the prootic's dorsal tympanic recess.
History
The material referred to Shaochilong, IVPP V.2885.1-7, consisting of skull fragments (a braincase, partial skull roof, quadrates, and a right maxilla), axis and six caudal vertebrae. A fragmentary left maxilla
|
wikipedia_en
|
We illustrate several of the matches given in Table \[tab3\] in Fig. \[fig1\] and Fig. \[fig2\]. The ratios $\alpha(\lambda)/m$ of frequency-dependent polarizabilities to the atomic weights for Li and Na in the wavelength range 500-800 nm are plotted in Fig. \[fig1\]. The corresponding matches are shown by the arrows and the corresponding wavelengths are given on the plot. The values $\frac{\alpha}{m}$ for $^6$Li and $^{23}$Na match at three wavelengths in the wavelength range plotted on Fig. \[fig1\]. Two of the matches, at 589.397 nm and 670.79 nm, are very close to the resonances and, therefore, are not listed in Table \[tab3\] as discussed before. The match areas for those cases are extremely narrow and the polarizability of the corresponding alkali is very sensitive to very small changes in the wavelength. Fig. \[fig2\] shows similar plot to illustrate the wavelengths at which $^{40}$K and $^{87}$Rb have the same frequencies of oscillation in a common optical trap in the range 740-820 nm.
Conclusions
===========
In summary, we conducted a systematic study of the ground state frequency-dependent polarizabilities of the alkali atoms from ultraviolet through infrared spectral regions. The values of the ac polarizabilities and their uncertainties are calculated for a number of wavelengths, including the wavelengths of common infrared lasers. A combination of high-precision measurements of the ratios of frequency-dependent polarizabilities of different species could provide excellent tests of the current experimental and theoretical values of the electric-dipole matrix elements in alkali-metal atoms. We provide formulas and the necessary parameters for the accurate calculation of the ac polarizabilities for all alkali-metal atoms at wavelengths above 800 nm. Finally, we list selected wavelengths at which two species of alkali atoms would have the same oscillation frequencies in a common optical trap.\
This work was performed under the sponsorship of the U.S. Department of Commerce, National Institute of Standards and Technology.
[20]{} natexlab\#1[\#1]{}bibnamefont \#1[\#1]{}bibfnamefont \#1[\#1]{}citenamefont \#1[\#1]{}url \#1[`#1`]{}urlprefix\[2\][\#2]{} \[2\]\[\][[\#2](#2)]{}
, , , , , , , , , ****, ().
|
arxiv
|
it("detects changes in 'renamingItem'", () => {
nextState.renamingItem = true;
expect(directoryListModel.stateChanged(prevState, nextState))
.to.be.true;
});
it("detects changes in 'selectedIndex'", () => {
nextState.selectedIndex = 1;
expect(directoryListModel.stateChanged(prevState, nextState))
.to.be.true;
});
it("detects changes in 'showHiddenItems'", () => {
nextState.showHiddenItems = true;
expect(directoryListModel.stateChanged(prevState, nextState))
.to.be.true;
});
it("detects changes in 'isGotoOpen'", () => {
nextState.isGotoOpen = true;
expect(directoryListModel.stateChanged(prevState, nextState))
.to.be.true;
});
});
describe("propsChanged method", () => {
let prevProps: IDirectoryListProps;
let nextProps: IDirectoryListProps;
let directoryManager: IMock<IDirectoryManager>;
const statusNotifier = {} as IStatusNotifier;
beforeEach(() => {
directoryManager = Mock.ofType<IDirectoryManager>();
const commonProps: IDirectoryListProps = {
columnSizes: {
createdOn: 0,
lastModified: 25,
name: 50,
size: 25
},
directoryManager: directoryManager.object,
id: "left",
isSelectedPane: false,
path: "/path/to/directory",
sendPathUp: (path: string) => { },
sendSelectedPaneUp: (paneToSelect: DirectoryPaneSide) => { },
settingsManager: settingsManager.object,
statusNotifier,
theme: applicationTheme
};
prevProps = JSON.parse(JSON.stringify(commonProps));
nextProps = JSON.parse(JSON.stringify(commonProps));
});
it("returns false when nothing has changed", () => {
const result = directoryListModel.props
|
github
|
So is this to say that open source software is bad? Not at all. Its usage just requires that the enterprise architect and the systems manager understand the risks, the resources, and the timelines required to fix security problems before they result in a breach. It requires steadfast management of your technology stack. It really requires complete understanding of the software comprising the systems you run.
I was flipping through my social media accounts this morning and the theme of the day appears to be “innovation” and “transformation”. They were used in articles in contrast like maybe they were similar but different. I looked up the definitions of both terms in the dictionary.
Innovation (noun) – something newly introduced; such as a method or device.
Transformation (noun) – a marked change, as in appearance or character, usually for the better:
Granted, I picked the definitions but I used those that didn’t describe either term recursively. Here’s what I get: an Innovation is a new thing and a Transformation is a changed thing. So I guess they’re not really similar but they certainly are different. But they still might be related.
So what’s this got to do with Enterprise Architecture? I think it’s this…
Your future state is your innovation. You aim to create something new. Most enterprise architects are satisfied with this and set out to build this new thing.
Unfortunately, if you have an existing business, your starting point is not your blank canvass or empty project file. You need to start with where you are now. That’s your current state. The plan that gets you from your starting point to your end point or from the current state to the future state is that which generates that marked change. It’s a transformation.
You must completely understand your current state in order to build that transformational plan. That’s business-driven enterprise architecture. That’s complete understanding.
Back in December 2013, I started a series of posts that describe processes and how to manage them. You can read them here, here, here, here, and here. Go ahead, we’ll wait.
OK, you’re back!
I have had some time to ruminate and use this processing model. It seems to breed some confusion in my business partners when I discuss it with them. The problem is my use of “Factory” to describe a core process. It
|
pile-cc
|
k**3 - 4*k**2 + 11772*k + 24
What is the d'th term of 107952, 107950, 107948, 107946?
-2*d + 107954
What is the g'th term of -14930, -59743, -134438, -239021, -373498, -537875?
-g**3 - 14935*g**2 - g + 7
What is the u'th term of -346, -1485, -3410, -6115, -9594, -13841, -18850, -24615?
u**3 - 399*u**2 + 51*u + 1
What is the m'th term of 206, 406, 606, 806, 1006?
200*m + 6
What is the k'th term of -217, -204, -191, -178, -165, -152?
13*k - 230
What is the o'th term of -4408, -4236, -4064, -3892?
172*o - 4580
What is the c'th term of -547, -509, -445, -355, -239?
13*c**2 - c - 559
What is the v'th term of -59718, -119429, -179144, -238863, -298586, -358313?
-2*v**2 - 59705*v - 11
What is the o'th term of -60679, -60685, -60691?
-6*o - 60673
What is the q'th term of 596, 2377, 5348, 9521, 14908, 21521?
2*q**3 + 583*q**2 + 18*q - 7
What is the q'th term of -357, -382, -445, -558, -733?
-2*q**3 - 7*q**2 + 10*q - 358
What is the u'th term of 247, -33, -313, -593, -873, -1153?
-280*u + 527
What is the c'th term of 609, 1009, 999, 375, -1067, -3531
|
dm_mathematics
|
Thank you for your participation in this important process.
?
The following is a CUMULATIVE list of employee feedback requests with a
status of "OPEN." Once you have submitted or declined an employee's request
for feedback, their name will no longer appear on this list. NOTE: YOU WILL
RECEIVE THIS MESSAGE EACH TIME YOU ARE SELECTED AS A REVIEWER.
?
Employee Name:
BIKE
|
enron_emails
|
V.
Plaintiffs also argue that their claim for equitable relief under 29 U.S.C. 1132(a)(3) is not barred on the substantive grounds asserted by Defendants. This Court concludes, however, that a recent Sixth Circuit decision bars all Plaintiffs' *600 claims under this section. See West v. A.K. Steel Corp., 484 F.3d 395 (6th Cir.2007). These Plaintiffs have already received their benefits and are not in a position to claim injunctive relief, a remedy available only to others who have not "`cashed out' of their participation in the Plan." Id. at 403.
The parties have spent only a few pages arguing `the merits of Plaintiffs' anti-cut-back claims, and as a result the Court concludes that it is not well enough informed on this issue to rule at this time. The pending motions as to that issue are remanded for reconsideration at a later date.
The Court will enter an order consistent with this Memorandum Opinion.
ORDER
Defendants have moved to dismiss all Plaintiffs' claims in their entirety based on the statute of limitations, and to dismiss all Plaintiffs' claims (A) arising under 29 U.S.C. § 1132(a)(3) and/or (B) alleging reduction of their accrued benefits by amendments to the Plan, for failure to state a claim upon which relief may be granted.
Having considered all arguments in the accompanying memorandum opinion and being otherwise sufficiently advised,
IT IS HEREBY ORDERED that Defendants' motions for summary judgment are SUSTAINED IN PART:
(1) All claims of Plaintiffs Robert H. Fallin, Charles Johnson, Claudette Logsdon, Joseph G. Russelburg, Clarence E. Simon, Jr., William M. Gilmore, Eric Clark, and Steve J. Smith are DISMISSED WITH PREJUDICE.
(2) The claims of Plaintiff Donald W. Corley arising under 29 U.S.C. § 1132(a)(3) are DISMISSED WITH PREJUDICE.
IT IS FURTHER ORDERED that Defendants' motion for summary judgment is DENIED IN PART and Plaintiff Donald W. Corley's claims under 29 U.S.C. § 1132(a)(1)(B) REMAIN.
All other motions are REMANDED at this time. This is NOT a final order.
NOTES
[1] ERISA imposes a statute of limitations (the earliest of six years
|
freelaw
|
I think the critical point from your reply is that instead of there being a
summary of what the essay is about, there should instead be a summary of what
the essay is saying -- to basically relate the authors points quickly and
succinctly as a teaser. We need to work on that.
Thanks!
------
petervandijck
\- The papers in PDF is an interaction killer (you are increasing friction)
\- You have basically no content right now: 5 PDFs and the discussion is low
quality.
Fix those two problems and you might get something. If the place feels empty
(as it does now), people will never come back. There is no reason whatsoever
for people to create an account right now.
~~~
x03
Okay, there generally seems to be a feeling of anti-PDF sentiment so I'll look
into providing just a standard HTML+CSS page as an alternative. (To note
though, almost every academic article is provided as a PDF directly by
Journals or through repositories like JSTOR).
It's kind of the chicken and egg problem: there's no content because they're
no users, and they're no users because there's no content. I'll try and
"force" a few friends on to drum up everything up a little and increase the
excitement of the site.
Also, thanks for the link!
Cheers, \--x03.
------
michael_dorfman
It seems to me that the problem is one of focus, and branding.
To put it bluntly: who in their right mind would want to read essays by
undergrads? Even when I was an undergrad, that's not where my interest was. I
wanted to read insightful, thought-provoking, well-researched articles. If
those happened to be written by undergrads, well, that was incidental.
So, my suggestion: rename the Journal as "The New England Journal of
International Relations" (or some such), and kill the "undergraduate" angle.
~~~
x03
That's a fair point: the idea of it being a "Journal" isn't so much that it's
Nature or Foreign Affairs or anything carrying such weight, more that it's a
collection of well-written essays that cover topics that undergraduate
students of IR typically cover so
|
hackernews
|
The overall goal of our research program is to determine the effects of environmental estrogenic chemicals on patterns and gender specificity of DNA methylation signatures in primordial germ cells (PGCs) that pass to subsequent generations and whether changes are associated with specific phenotypic abnormalities. All PGCs undergo epigenetic reprogramming at the time of sex determination. Following global erasure of DNA methylation patterns, a de novo methylation starts allowing a controlled gene expression pattern in germ cells in a gender specific manner. This window of germ cell reprogramming has
|
nih_exporter
|
The energy storage by redox intercalation reactions is, nowadays, the most effective rechargeable ion battery. When lithium is used as intercalating agents, the high energy density is achieved at an expense of non-sustainability. The replacement of Li+ with cheaper monovalent ions enables to make greener battery alternatives. The utilization of polyvalent ions instead of Li+ permits to multiplying the battery capacity. Contrary to Li+ , the realization of quick and reversible intercalation of bigger
|
pubmed_abstracts
|
######
**Regions of significant activation differences and relative cluster extent**.
**ROI** **DELTA** **THETA** **ALPHA** **BETA1** **BETA2** **GAMMA**
------------------- --------- ----------- ----------- ----------- ----------- ----------- ----------- ----- ---- ----- ----- ----- -----
T0 CLI vs. CTR AFC 84
OFC 60
T0 CTR vs. T0 CLI OFC 56
LTL 81 55
FLC 61
T0 RM vs. CTR AFC 93
OFC 94
T1 SGP vs. CTR PHG 58 57 65 51 57
T0 RM vs. T0 SGP AFC 81 87 82
OFC 75 131 97
T1 RM vs. T1 SGP PHG 63 55 81 82 60 75 66
LTL 77 101
PCC 58 112 53 89
T1 SGP vs. T1 RM SFC 115 142
AFC 59 119
T1 CLI vs. T0 CLI PHG 63 73 74
FLC 68
IPL 69
T0 CLI vs. T1 CLI PVC 84 144 102
SPL 97 78
T1 RM vs. T0 RM FLC 107 100 116
T0 RM vs. T1 RM AFC 69
Values indicate the number of voxels with a p \< 0.01 and a F-value over two z-score in clusters containing more than 50 voxels for a single region of interest. Regions of interest (ROI) with statistically significant differences pre-treatment (T0) and post-treatment (T
|
pubmed_central
|
f = fopen(name, "w");
fprintf(f, "asdas\n");
fprintf(f, "asdas\n");
while(1){}
return 0;
}
If I terminate this program using CTRL+C, I get an empty file named filename.
However, using
Example 2:
int main(){
FILE *f;
char buf[512];
char name[128] = {"wpa_supplicant.conf"};
f = fopen(name,"w");
while(1){
fprintf(f, "asdas\n");
}
return 0;
}
If I terminate this program using CTRL+C, I get file named filename, and it contains many lines with the string asdas.
Why are the strings not written to the file in the first example, but they are written to the file in the second example?
A:
In the second case, there are enough fprintf calls for the internal buffers to be flushed to disk.
With the first program, if you put a fflush(f) before the while loop, the strings will be written to the file.
#include <stdio.h>
int main(void) {
FILE *f = fopen("filename", "w");
if (!f) {
perror("Failed to open 'filename' for writing");
exit(EXIT_FAILURE);
}
fprintf(f, "asdas\n");
fprintf(f, "asdas\n");
if ( fflush(f) != 0 ) {
perror("Flushing output failed");
exit(EXIT_FAILURE);
}
while(1){}
return 0;
}
Output:
C:\...\Temp> cl file.c
Microsoft (R) C/C++ Optimizing Compiler Version 18.00.31101 for x64
...
/out:file.exe
C:\...\Temp> file
^C
C:\...\Temp> type filename
asdas
asdas
Keep in mind:
Upon successful completion, fflush() shall return 0; otherwise, it
|
stackexchange
|
The present invention generally relates to substrates, connecting structures and electronic equipments, and more particularly to a substrate which uses an electrical connecting body such as a flexible printed circuit (FPC), a connecting structure which uses an electrical connecting body such as the FPC and is suited for connecting a main body and a lid which opens and closes with respect to the main body, and an electronic equipment having such a substrate or connecting structure.
In this specification, the electronic equipment refers to information processing apparatuses such as a lap-top personal computer, portable telephones and the like which are made up of a main body and a lid which opens and closes with respect to the main body.
2. Description of the Related Art
For example, the lap-top personal computer is made up of the main body and the lid which opens and closes with respect to the main body. A substrate mounted with various parts such as integrated circuit devices (IC chips) is provided within the main body, and a display section made up of a liquid crystal display (LCD) or the like is provided within the lid. Because the lid opens and closes with respect to the main body, the display section and the substrate are electrically connected via the FPC. One end of the FPC is connected to the display section, and the other end of the FPC is connected to a connecting part which is provided at an end portion on the substrate. The connecting part is connected to the electronic parts such as the IC chips on the substrate via a printed wiring formed on the substrate.
The printed wiring on the substrate may be provided on both top and bottom surfaces of the substrate, but the printed wiring must be arranged avoiding positions where the various parts are mounted on the substrate and positions where holes and cutouts are formed in the substrate. Signals supplied to the display section employ the LVDS system or the like, and are high-speed and small-amplitude signals. Hence, the substrate must satisfy various layout and wiring conditions, such as limited wiring length and wiring layout for preventing mixture of external noise. Accordingly, depending on the layout and wiring conditions, it is necessary to take measures such as arranging the IC chip for driving the display section in a vicinity of the connecting part on the substrate, and arranging the printed wiring on the substrate at a position separated from other printed wiring for the high-speed signals.
Recently, due to increased operation speeds of internal circuits of the CPU or the like, heat generated from the IC chips mounted on the substrate has become large. For this
|
uspto_backgrounds
|
The Globe Museum () is a museum in the Palais Mollard, Vienna, Austria, part of the Austrian National Library. It was opened in 1956, and is the only public museum in the world devoted to globes, being three-dimensional models of Earth or other celestial bodies, or spherical representations of the celestial sphere.
History
As early as the 19th century, there was a globe collection within the Vienna Imperial Library, the forerunner to the Austrian National Library. The globes in this collection were acquired either as purchases or as gifts (for example, Vincenzo Coronelli created two globes especially for Leopold I, Holy Roman Emperor from 1658 to 1705, with each globe having an engraved portrait of the Emperor and an inscription).
In 1921, the geographer, Eugen Oberhummer, conducted an inventory of the collection and found eight globes of various sizes (both terrestrial and celestial), and two armillary spheres. In 1922, these globes were transferred to the National Library's map collection where, by 1948, there were already 28 globes. In the annual report of the director of the collection in 1948, it was noted that the globes were among the collection's most rarely used items.
In 1956, the National Library opened the Globe Museum with a total of 63 exhibits. Its foundation collection was a combination of the imperial collection and the collections of The International Coronelli Society for the Study of Globes, and the cartographer Robert Haardt, who had been instrumental in the museum's establishment.
The museum was originally housed in the Augustinian tract of the Hofburg in Josefsplatz, Vienna, as part of the National Library's map collection. In 1970 and 1986, the museum was allocated new rooms within the same tract.
During the museum's first 30 years, its collection grew to 145 items by purchase, gift and exchange with other museums. By 1996, the museum had 260 exhibits. Since the end of 2005 the museum has been accommodated at the Palais Mollard in the Herrengasse.
Collection
There are now approximately 600 terrestrial and celestial globes in the collection, and around 200 of them are constantly on display. The majority of them date from before 1850.
The oldest item in the collection is the terrestrial globe of Gemma Frisius (circa 1536). Highlights are the globes of Vincenzo Coronelli ( diameter) and
|
wikipedia_en
|
The description of collective bound states can be facilitated if we introduce, as it was discussed above, the set of bosonic variables and pass to the semi-bosonized effective meson action which is responsible for the $\tau \to f_1\, \pi^{-} \nu_{\tau}$ decay, namely, the part which describes both the interactions of the ground pseudoscalar $\pi^{\pm}$, axial-vector $a_1^{\pm}(1260)$, $f_1(1285)$ mesons and their first radially excited states with light constituent quarks. In momentum representation the action takes the form $$\begin{aligned}
\label{Lagrangiane}
S &=&\!\int\!\frac{d^4p}{(2\pi )^4}\bar q(p) \left(\hat p-m \right)q(p)+ \Delta S_{mass}+ \Delta S_{int}, \nonumber \\
\Delta S_{int} &=&\! \int\!\frac{d^4p}{(2\pi )^4}\!\int\!\frac{d^4k}{(2\pi )^4}\, \bar{q}\left(k+\frac{p}{2}\right) \nonumber \\
&\times& \left[ \frac{1}{2} \gamma^{\mu}\gamma^{5}\left(A_{f_{1}}f_{1\mu}(p) + B_{f_{1}}f^{'}_{1\mu}(p)\right) \right.\nonumber \\
&+& \frac{1}{2} \gamma^{\mu}\gamma^{5} \vec\tau \left(A_{a_{1}}\vec a_{1\mu}(p) + B_{a_{1}}\vec a'_{1\mu}(p)\right) \nonumber \\
&+& \left. \gamma^{5} \vec\tau \left(A_{\pi}\vec \pi (p) + B_{\pi}\vec \pi'\right)\right]q\left(k-\frac{p}{2}\right) .\end{aligned}$$ We shall not discuss here the mass part of the action $\Delta S_{mass}$ (see, for instance, [@Volkov17] or references therein). Our notations are as follows: $f_{1\mu}$, $\vec a_{1\mu}$ and $\vec \pi $ are the fields corresponding to the axial-vector and pseudoscal
|
arxiv
|
report.properties.chart.dataColumns = yKeys;
var customObjectData = xKeys[0];
report.properties.chart.dataAxis = {elementName:customObjectData.elementName,
queryName:'query1',
elementLabel:customObjectData.objectLabel,
id:customObjectData.id,
type:'bar',
color:'#000000'}
repaintReport(report,mode);
}
}
if ( report.reportType == 'indicator')
{
//reportModel.prepareReport(report,'reportLayout',$scope.mode);
repaintReport(report,mode);
}
}
}
this.getReportDataNextPage = function(report,page)
{
getReportDataNextPage(report,page);
}
function getReportDataNextPage(report,page)
{
queryModel.getQueryDataNextPage(report.query,page, function(data,sql,query, fromCache, executionTime){
report.query.data.push.apply(report.query.data, data);
report.query.fromCache = (fromCache);
report.query.executionTime = (executionTime) ? executionTime : 0;
});
}
this.repaintReport = function(report,mode)
{
this.report = report;
repaintReport(report,mode);
}
function repaintReport(report,mode)
{
var data = report.query.data;
if (data.length != 0)
{
switch(report.reportType)
{
case "grid":
{
//generateGrid(report,mode);
if (report.properties.grid && report.properties.grid.refresh)
report.properties.grid.refresh();
}
break;
case "vertical-grid":
{
if (report.properties.verticalGrid && report.properties.verticalGrid.refresh)
report.properties.verticalGrid.refresh();
}
break;
case 'chart-line':
case 'chart-donut':
case
|
github
|
When the power of Love overcomes the Love of power, the world will know peace... Jimi Hendrix
-------------------------------------------------------------
I dream of giving birth to a child who will ask...... what was war?
I dunno if this is helpful, but have you tried rebuilding your desktop?
Its relatively easy to rebuild you OS 9 desktop in OS X, by going to the classic control panel and in advanced or something there is a button to push to do it. Or, if you have Mac Army Knife, or another one of those do-everything-tools, you could rebuild it while in OS 9...
when the desktop gets corupted strange stuff happens.
Donal
The owl of Minerva spreads its wings only with the falling of dusk. -Hegel
Rebuilding your desktop is an OS 9 trick... I thought that you were having problems in 9, and not X...
You should check to make sure that someone hasn't stuck an amusing little Apple script in your start-up folder. Apple scripts are an easy way to make someones life miserable...
If the trojan had infected OS 9, you had bset make sure that everything in X is the way ou left it, anyone that has access to MacOS 9 can do what ever they want to the disk, as there isn't permissions. So with a text editor someone could do a lot of damage. Just look through the Library/ folders in you Home directory, the root directory, and in the system directory to make sure that there isn't something that looks funny...
Oh and an easier thing to check is to go into the Login Items Control Panel and make sure nothing funky has appeared.
Just be carefull, things don't exactly like to be played with in there...
You could check to make sure that no new users have been added, but it is difficult to create a new user for X from 9, I mean, it has to be possible, but I wouldn't know how to do it, places to look are in the /etc and NetInfo, but again, these aren't safe places to go randomly deleting stuff.
Investing in a Virus Scanner for OS X would be a good move to make, you'll probably end up regretting not having one eventually..., I'm starting to get nervous since I haven't had the money to purchase one yet, either. But, I am planning on burning my home folder to disk
|
pile-cc
|
Let l be 6/15 - 86/(-10). Suppose 272*m + 19 = 3*o + 270*m, -2*m = 4. Solve -16 = o*f + l for f.
-5
Let j be (20/(-40))/(1/(-26)). Solve -j = 17*t + 4 for t.
-1
Let p = 1161 + -1153. Solve -p - 5 = 13*g for g.
-1
Let j = -25 - -28. Let p(g) = 0*g**3 + 2*g - g**3 + 12*g**2 - 9*g**2 - 4. Let x be p(j). Solve 10 + x = 3*r for r.
4
Let i be 4 + (-1 - -3)*-2 - -2. Solve -i*t = 44 - 38 for t.
-3
Let k = -21 + 17. Let p be (0 - k) + (-2 - 0). Let m = 11 - 4. Solve 5 = p*l - m*l for l.
-1
Let h be (-2 - 3)/(1*(-3 - -2)). Solve h*d = -11 - 14 for d.
-5
Let j(n) be the third derivative of n**4/24 - 2*n**3/3 - n**2. Let y be j(-7). Let d = y + 13. Solve d*g = -4 - 2 for g.
-3
Let c be (0 - -3 - 0)/(3/2). Suppose -5*g + c*g + 20 = -n, 12 = 4*g - 5*n. Solve -2 = -5*d + g for d.
2
Suppose -19*m + 971 = 876. Let v(u) = u**3 + 6*u**2 + 3*u - 6. Let q be v(-5). Suppose -q = -t - t. Solve 3 = -t*x + m for x.
1
Let l(g) = -g**3 + 21*g**2 + 2*g - 20. Let i be l(21). Solve 10 - i = -3*o for o.
4
Let p = -88 - -102. Suppose -13
|
dm_mathematics
|
----- Forwarded by Tana Jones/HOU/ECT on 05/17/2001 04:22 PM -----
Wendi Lebrocq/ENRON@enronXgate
05/17/2001 04:15 PM
To: Karen Lambert/ENRON@enronXgate, Tana Jones/HOU/ECT@ECT, Samuel
Schott/ENRON@enronXgate, Mark Taylor/HOU/ECT@ECT, Brant
Reves/ENRON@
|
enron_emails
|
72
684 F.2d 130 (D.C.Cir.1982)
73
Id. at 134
74
See Homan & Crimen, Inc. v. Harris, 626 F.2d 1201, 1210-12 (5th Cir.1980), cert. denied, 450 U.S. 975, 101 S.Ct. 1506, 67 L.Ed.2d 809 (1981); AMI, 466 F.Supp. at 621-24
75
Section 405.415(f) reads in part:
(1) General. Depreciable assets may be disposed of through sale, scrapping, trade-in, exchange, demolition, abandonment, condemnation, fire, theft, or other casualty. If disposal of a depreciable asset results in a gain or loss, an adjustment is necessary in the provider's allowable cost. The amount of a gain included in the determination of allowable cost shall be limited to the amount of depreciation previously included in Medicare allowable costs. The amount of a loss to be included shall be limited to the undepreciated basis of the asset permitted under the program. The treatment of the gain or loss depends upon the manner of disposition of the asset as specified in paragraphs (f)(2) through (f)(6) of this section.
(2) Bona fide sale or scrapping. (i) Except as specified in paragraph (f)(3) of this section, gains and losses realized from the bona fide sale or scrapping of depreciable assets are included in the determination of allowable cost only if the sale or scrapping occurs while the provider is participating in Medicare. The extent to which such gains and losses are included is calculated by prorating the basis for depreciation of the asset in accordance with the proportion of the assets [sic ] useful life for which the provider participated in Medicare....
....
(3) Sale within 1 year after termination. Gains and losses realized from a bona fide sale of depreciable assets within 1 year immediately following the date on which the provider terminates participation in the Medicare program are also included in the determination of allowable cost, in accordance with the procedure specified in paragraph (f)(2) of this section....
76
684 F.2d at 135
77
42 C.F.R. Sec. 405.415(f)(1)
|
freelaw
|
~~~
jacques_chester
> I don't get the idea that some people seem to have that performance doesn't
> matter for distributed systems, when the truth is the exact opposite.
I think that investment in performance follows a curve.
A bowl, actually. And that this interest is based on the cost of optimisation
vs the payoff.
- -
-- --
--- ---
---- ----
------ ------
--------- ---------
--------------- ----------------
------------------------------------------------
<-- embedded ... SME web/desktop ... data-centre -->
Assume that an optimisation costs $X of programmer time and pays back $Y
dollars.
When your cost of production is very large, $Y > $X. That's what you see for
embedded systems with millions of units shipped and for data-centre computing
with tens of thousands of units installed. The cost of one programmer
optimising is well worth it.
But for the sunny plain of mediocrity in the middle, the cost of extra
hardware ($Y) will be less than the cost of the programmer time $X.
Here endeth the extemporising.
------
pumpmylemma
See wealth of background material: <http://boom.cs.berkeley.edu/papers.html>
------
gwern
FYI: the name seems to stem from the BOOM project, and have nothing to do with
'Bloom filters'.
~~~
joe_hellerstein
Leopold Bloom, not Burton Bloom.
------
mx2323
i feel like this is an interesting step in the right direction
but... what happens if i want to read, process and write a log message....?
thats three different bloom blocks that require 2 partial orderings.
instead of totally unordering everything, id rather have the ability to
declaratively order functions for a request, where a function is a typical
sequenced set of operations.
their examples arent particularly helpful, looks like most of these bloom
blocks are single lines...
~~~
joe_hellerstein
See the sandbox at <https://github.com/bloom-lang/bud-sandbox/> Some involved
examples there (
|
hackernews
|
Our studies of the ubiquitin-ligase E3, called gp78, are being conducted in collaboration with Drs. Allan Weissman and Xinhua Ji, CCR. The gp78 protein has a role in sarcoma metastasis, and it is an excellent target for a combined structural and molecular biological investigation of mechanism and intervention. We have reported our first major findings from this project, which was an interdisciplinary effort involving molecular biology in the Weissman lab, NMR structural biology and biophysics in the By
|
nih_exporter
|
[Gait analysis in patients with total hip endoprostheses. Part I: Gait analysis--the electroichnograph--(EKIG-3) Riga].
The pace analysis of patients with a total hip replacement has been carried out by means of the electroichnograph EKIG-3 of the Riga Institute of Orthopaedics and Traumatology. It comprises foot analysis (heel torsion, sole exercise, ball torsion, contact ability by using special
|
pubmed_abstracts
|
6. 1.1 mM L-tyrosine Standard stock solution. Prepared using 0.2 mg/ml L-tyrosine in purified water and heated gently until the tyrosine dissolves. As with the casein, do not boil this solution. Allow the L-tyrosine standard to cool to room temperature. This solution will be diluted further to make our standard curve.
7. Protease solution. Immediately before use, dissolve protease in enzyme diluent solution prepared in step 6.
If necessary, use a solid protease sample of predetermined activity, which is dissolved using enzyme diluent to 0.1-0.2 units/ml. This solution serves as a positive control for the quality control assay and as validation for the calculations we will perform to determine enzyme activity.
Setting up the Protease Assay and Standard Curves
-------------------------------------------------
1. To begin this assay, find suitable vials that will hold about 15 mls. For each enzyme that will be tested, 4 vials are needed. One vial will be used as a blank, and three others will be used to assay activity of three dilutions of the protease. Three dilutions are useful when checking final calculations against each other. To each set of four vials, add 5mls of our 0.65% casein solution. Let them equilibrate in a water bath at 37°C for about 5 minutes.Add varying volumes of enzyme solution that will be tested to three of the test sample vials, but not the blank. Mix by swirling and incubate for 37°C for exactly ten minutes. The protease activity and consequential liberation of tyrosine during this incubation time is what will be measured and compared between test samples.
2. After this 10 minute incubation, add the 5 mls of the TCA reagent to each tube to stop the reaction. Then, add an appropriate volume of enzyme solution to each tube, even the blank, so that the final volume of enzyme solution in each tube is 1 ml. This is done to account for the absorbance value of the enzyme itself and to ensure that the final volume in each tube is equal. Incubate the solutions at 37°C for 30 minutes.During this 30 minute incubation, you may want to set up your tyrosine standard dilutions. Use 6 dram vials (dram vials can be substituted with polypropylene tubes) that can easily hold 8 mls. To the six vials, add the 1.1 mM
|
pubmed_central
|
Cancel gwt rpc call
In this example there is a pretty description of how to make a timeout logic using a Timer#schedule. But there is a pitfall there. We have 2 rpc requests: first makes a lot of computation on server(or maybe retrieving a large amount of data from database) and second a tiny request that returns results immediately. If we make first request, we will not recieve results immediately, instead we will have a timeout and after timeout we make the second tiny request and then abortFlag from example will be true, so we can retrieve the results of second request, but also we can retrieve the results of first request that was timed out before(because the AsyncCallback object of first call was not destroyed).
So we need some kind of cancelling the first rpc call after timeout occurs. how can I do this?
A:
Let me give you an analogy.
You, the boss, made a call to a supplier, to get some product info. Supplier say they need to call you back because the info would take some time to be gathered. So, you gave them the contact of your foreman.
Your foreman waits for the call. Then you told your foreman to cancel the info request if it takes more than 30 minutes.
Your foreman thinks you are bonkers because he cannot cancel the request, because he does not have an account that gives him privilege to access the supplier's ordering system.
So, your foreman simply ignores any response from the supplier after 30 minutes. Your ingenious foreman sets up a timer in his phone that ignores the call from the supplier after 30 minutes. Even if you killed your foreman, cut off all communication links, the vendor would still be busy servicing your request.
There is nothing on the GWT client-side to cancel. The callback is merely a javascript object waiting to be invoked.
To cancel the call, you need to tell the server-side to stop wasting cpu resources (if that is your concern). Your server-side must be programmed to provide a service API which when invoked would cancel the job and return immediately to trigger your GWT callback.
You can refresh the page, and that would discard the page request and close the socket, but the server side would still be running. And when the server side completes its tasks and tries to perform a http response, it would fail, saying in the server logs that it had lost the client
|
stackexchange
|
Involvement of PI3 kinases in controlling inflammation has been confirmed in several models using pan-PI3 kinase inhibitors, such as LY-294002 and wortmannin (Ito, K. et al., J Pharmacol. Exp. Ther., 2007, 321:1-8). Recent studies have been conducted using either selective PI3 kinase inhibitors or in knock-out mice lacking a specific enzyme isoform. These studies have demonstrated the role of the pathways controlled by PI3 kinase enzymes in inflammation. The PI3 kinase δ selective inhibitor IC-87114 was found to inhibit airway hyper-responsiveness, IgE release, pro-inflammatory cytokine expression, inflammatory cell accumulation into the lung and vascular permeability in ovalbumin-sensitized, ovalbumin-challenged mice [Lee, K. S. et al., J. Allergy Clin. Immunol., 2006, 118:403-409 and Lee, K. S. et al., FASEB J., 2006, 20:455-65]. In addition, IC-87114 lowered neutrophil accumulation in the lungs of mice and neutrophil function, stimulated by TNFα [Sadhu, C. et al., Biochem. Biophys. Res. Commun., 2003, 308:764-9]. The PI3 kinase δ isoform is activated by insulin and other growth factors, as well as G-protein coupled protein signaling and inflammatory cytokines. Recently the PI3 kinase dual δ/γ inhibitor TG100-115 was reported to inhibit pulmonary eosinophilia, interleukin-13 as well as mucin accumulation and airways hyperesponsiveness in a murine model, when administered by aerosolisation. The same authors also reported that the compound was able to inhibit pulmonary neutrophilia elicited by either LPS or cigarette smoke [Doukas, J. et al., J. Pharmacol. Exp. Ther., 2009, 328:758-765]
Since it is also activated by oxidative stress, the PI3 kinase δ isoform is likely to be relevant as a target for therapeutic intervention in those diseases where a high level of oxidative stress is implicated. Downstream mediators of the PI3 kinase signal transduction pathway include Akt (a serine/threonine protein kinase) and the mammalian target of rapamycin, the enzyme mTOR. Recent work has suggested that activation of PI3 kinase δ, leading to phosphorylation of Akt, is able to induce a state of corticosteroid resistance in otherwise corticosteroid-sensitive cells [To, Y. et al., Am. J. Respir. Crit. Care Med
|
uspto_backgrounds
|
But his recommendations apparently did not consider the particular circumstances of the Polish socioeconomic environment, which his report would have helped show. A mechanism for "automatic budgeting stability, restraint, and control", previously implanted in Colombia, Chile and Ecuador, was the same as the one that was to be implemented in Poland, a country that even with Pilsudski at the helm, was famous for its political instability.
In the end it all came down to the prestige brought by the advisor and the ceremony of the apparent implementation of his plan by the country that invited him, as Kemmerer himself admitted: "A country that appoints American financial advisers and follows their advice in reorganizing its finances, along what American investors consider to be the most successful modern lines, increases its chances of appealing to the American investor and of obtaining from him capital on favorable terms."
Though Kemmerer suggested that the Poles take out only a $15 million loan for stabilization of the national currency, they negotiated a private one with the American banks B.A. Tompkins and Bankers Trust for $61 million, of which $15 million were for development – leaving 45 million dollars for the stabilization of the zloty, or nearly four times what Kemmerer had recommended.
Though the loan was meant to lead to further ones that would strengthen Poland's financial system and promote its economic development, in mid-1928 foreign lending from Wall Street dried up as the Fed raised interest rates and a domestic speculative boom got underway. Kemmerer, and the US's attempts to stabilize the Polish economy failed as the country sank further into political instability.
Publications
"Economic Advisory Work for Governments," in American Economic Review 17, no. 1 (March 1927), 1-12.
Gold and The Gold Standard: The Story of Gold Money Past, Present, and Future published in 1944.
Further reading
Drake, Paul W. The Money Doctor in the Andes: The Kemmerer Missions, 1923-1933. (1989)
Seidel, Robert N. "American Reformers Abroad: The Kemmerer Missions in South America," in Journal of Economic History 32, no. 2 (June 1972): 520-545.
References
External links
Edwin Kemmerer Papers at the Seeley G. Mudd Manuscript Library, Princeton University
Category:1875 births
Category:1945 deaths
Category:Cornell University alumni
Category
|
wikipedia_en
|
{width="5in"}
In the TR scenario, when the FAT is smaller than the response time $t_0$, the probability density of FAT is still $P(t)$; however, when the FAT is larger than $t_0$, this probability density becomes $P_{\alpha}(t)=\big{(}1-(1-(1-\alpha)\omega)^{I_{x}(t)}\big{)}\prod_{0<t_{i}<t_{0}}(1-\omega)^{I_{x}(t_{i})}\prod_{t_{0}\le t_{j}<t}\big{(}1-(1-\alpha)\omega)^{I_{x}(t_{j})}\simeq(1-\alpha)\omega\exp[\lambda t-(1-\alpha)\omega\exp(\lambda t)/\lambda
-\alpha\omega\exp(\lambda t_{0})/\lambda]$. We numerically calculate the average FAT through $<\!t_{\alpha}^{F}\!>=\!\int_0^{t_0}\tau P(\tau)d\tau+\int_{t_{0}}^{\infty}\tau P_\alpha(\tau)d\tau$, and get the delay of FAT, $\Delta t(\alpha)$, by solving $$\Delta t(\alpha)=<\!t^{F}_{\alpha}\!>-<\!t^{F}\!>.\label{eq.2}$$ If the response time $t_0$ is negligible ($t_0\!=\!0$), Eq.(\[eq.2\]) is simplified as $$\Delta t(\alpha)|_{t_{0}=0}\!=\!-\ln(1-\alpha)/\lambda,\label{eq.3}$$ which recovers the results obtained by the cumulative probability $P(t^{y}\leq t)$ in Refs. [@PLoSONE6e16591; @MB21470]. Note that Eq (\[eq.3\]) is independent from the values of $\omega,N$. With $\lambda$=0.25, unless the intensity $\alpha$ is increased to an unpractically high level ($\alpha>0.97$), $\Delta t(\alpha)$ cannot be longer than 2 weeks.
To study the PI scenario, we first consider the case where the FAT is larger than $t_0$. At this early stage, we still have the approximation $I_x(t_{i})\!\simeq\!\exp(\lambda t_{i})$ when time $t_i\!\le\!t_0
|
arxiv
|
var SetCache = require('./_SetCache'),
arrayIncludes = require('./_arrayIncludes'),
arrayIncludesWith = require('./_arrayIncludesWith'),
arrayMap = require('./_arrayMap'),
baseUnary = require('./_baseUnary'),
cacheHas = require('./_cacheHas');
/** Used as the size to enable large array optimizations. */
var LARGE_ARRAY_SIZE = 200;
/**
* The base implementation of methods like `_.difference` without support
* for excluding multiple arrays or iteratee shorthands.
*
* @private
* @param {Array} array The array to inspect.
* @param {Array} values The values to exclude.
* @param {Function} [iteratee] The iteratee invoked per element.
* @param {Function} [comparator] The comparator invoked per element.
* @returns {Array} Returns the new array of filtered values.
*/
function baseDifference(array, values, iteratee, comparator) {
var index = -1,
includes = arrayIncludes,
isCommon = true,
length = array.length,
result = [],
valuesLength = values.length;
if (!length) {
return result;
}
if (iteratee) {
values = arrayMap(values, baseUnary(iteratee));
}
if (comparator) {
includes = arrayIncludesWith;
isCommon = false;
}
else if (values.length >= LARGE_ARRAY_SIZE) {
includes = cacheHas;
isCommon = false;
values = new SetCache(values);
}
outer:
while (++index < length) {
var value = array[index],
computed = iteratee == null ? value : iteratee(value);
value = (comparator || value !== 0) ? value : 0;
if (isCommon && computed === computed) {
var valuesIndex = valuesLength;
while (valuesIndex--) {
if (values[valuesIndex] === computed) {
continue outer;
}
}
result.push(value);
|
github
|
Council Passes Bill To Increase City Contracts For Minority Businesses
NEW YORK — Londel Davis' Harlem-based company has contracts to service fire extinguishers with some of the city's largest agencies, including the Department of Education.
But in spite of his success, Davis, who is black, says it's far more common for him and other minority business owners to get rejected when they bid for city contracts. And he says he doesn't really know why that is.
"It might have been our bid was too low," he said. "We might not have had a piece of a document."
The City Council approved a bill yesterday that would revise Local Law 129, passed in 2005, which was supposed to increase opportunities for minority and women-owned businesses to get contracts from the city. Among other enhancements, the new bill would add a greater level of accountability and eliminate a $1 million contract cap.
Local Law 129 had set targets for city agencies to contract minority and women-owned businesses for certain sectors, including construction, architectural and engineering, as well as services and goods.
But the law had been criticized for failing to do its job because of its lack of enforcement and effectiveness. There were also complaints that, because of the $1 million cap, only 15 percent of the billions of dollars worth of city contracts had been subject to the law.
An analysis of the program under Local Law 129 by the mayor's Office of Contract Services this year found that "disparities still exist" between the number of minority and women-owned business enterprises and "the extent to which they are performing city contracting work."
In announcing yesterday that the Council would pass Intro 911, the update to Local Law 129, Speaker Christine Quinn said in remarks to the press: "It really became clear, crystal clear, that we needed to do more to ensure that [minority and women-owned business enterprises] got their fair share in the city procurement process."
Michael Bloomberg praised the decision by the Council, strongly suggesting he would sign it into law. "These measures are an important part of diversifying our economy," he said.
Not everyone has been enthusiastic about Intro 911. Some Hispanic business groups were disappointed that it lowers procurement goals for Hispanic-owned construction companies from 9 percent to 4 percent, the Village Voice has reported.
"We're very disappointed with this decision," Frank Garcia, chairman of the New York State Coalition of Hispanic Chambers
|
pile-cc
|
2
Suppose 0 = 60*d - 63767 - 251473. What is the tens digit of d?
5
Suppose 4 = 4*q, 5*q + 0*q = -v + 20. What is the tens digit of 2297/v - 10/75?
5
Suppose -67*y = -87*y + 25480. What is the tens digit of y?
7
Let u be (-3)/(-2)*30/9. Suppose -4*h + u*w + 17 = 0, 7*h - 4*h - 4*w - 12 = 0. Let i = h + 0. What is the units digit of i?
8
Let u(h) = h**3 + 5*h**2 + 4*h - 1. Let t be u(-3). Let b be (-21)/(t/(60/(-9))). Suppose -5*i + b = -3*i. What is the tens digit of i?
1
Let q = 325 + -136. Suppose -3*g + 574 = h, -h + q = g - 3*h. What is the units digit of g?
1
Let c be (1 + 177/(-12))/((-3)/12). Suppose 24 = j - 4*o - 10, -c = -2*j - 5*o. What is the units digit of j?
0
Let w be 2/6*(33 + -9). Suppose -w + 4 = 2*v. What is the units digit of 6/12 + (-7)/v?
4
Let c(s) = -s + 3. Let i be c(4). Let d be -153 - 0/5*i. Let u = d + 217. What is the units digit of u?
4
Let u be ((-2)/(-3))/((-160)/84 - -2). Suppose u*z = -2*z + 342. What is the tens digit of z?
3
Let j = 11 + -6. Suppose -5*g + i + 15 = 0, -j*g - 2*i + 5 = -i. What is the units digit of 1*(g - (-32 + -1))?
5
Let k = 71 + 39. Suppose a - 6*a + 275 = -5*n, 0 = -2*a + n
|
dm_mathematics
|
We look forward to seeing you next week! Please call Kathy Mayfield at ext.3-3264 if you have any questions.
Directions to The Center for the Retarded, 3550 W. Dallas, between Waugh Dr. and Shepherd:
From the Enron Building
? Take W. Dallas and turn RIGHT on Marston St.
? Follow the signs to parking
or you can?
? Take Allen Parkway from Downtown
? Turn
|
enron_emails
|
ability to purchase credited service through the Program, we look to the
history of the Pension Clause and the statutory scheme in existence when
the voters passed Proposition 100. See id. at ¶ 21-24.
1. “Public Retirement System Benefit”
¶15 The eleven-year history of the Program prior to the 1998
passage of Proposition 100 confirms that the ability to purchase credited
service through the Program is a public retirement system benefit. The
legislature initially established the Program in 1987 for teachers and
school administrators. 1987 Ariz. Sess. Laws, ch. 182, § 1 (1st Reg. Sess.). 3
In 1994, a legislative amendment to A.R.S. § 38-743 extended eligibility for
the Program to professors and instructors at public universities and
community colleges. See 1994 Ariz. Sess. Laws, ch. 356, § 18 (2d Reg.
Sess.). 4 In 1996, the legislature further expanded the scope of the program
3 Pursuant to the original program,
A. At the time of retirement a teacher or administrator of a
school district who is an active member of the plan or system
and who previously was a member of a public employee
retirement system in another state while employed as a
teacher or school administrator and is not receiving
retirement benefits as a result of that employment may
receive up to five years of service credit for this prior
employment if the teacher or administrator pays into the
system the amount prescribed in subsection B.
B. A teacher or administrator electing to receive credit for
service outside this state shall pay to the system the amount
equal to the increase in the actuarial present value of benefits
computed at the time of retirement which results from
adding the number of years or partial years of credited
service received under subsection A.
1987 Ariz. Sess. Laws, ch. 182, § 1 (1st Reg. Sess.).
4 The 1994 legislation did not affect the five-year cap on prior public
service credit eligible for purchase or the payment at retirement based on
actuarial present value. In 1995, amendments to A.R.S. § 38-743 removed
the requirement that a member’s payment into the program be computed
at the time of retirement and added subsection C to clarify
|
freelaw
|
~~~
adamnemecek
Does he still own stock?
~~~
loceng
How would that make the original comment more or less valid?
~~~
loceng
Someone's downvoted me for asking a question for clarification? I'm regularly
reminded how garbage downvotes are.
------
OscarCunningham
It might not be a good idea, but I don't think it's fair to call it a "scam".
I don't think Satoshi created it with the anticipation that it would fail.
------
admyral
What's so righteous about the status quo that makes skeptics feel so compelled
to defend it so vehemently by degrading Bitcoin?
But it seems we should be far beyond Denial and Anger stage and well into
Bargaining and Guilt at this point. Don't worry, he'll join the chorus of
"blockchain is good, Bitcoin is bad" rhetoric soon enough.
~~~
aitrean
What's so righteous about the status quo? I'll put it to you as succinctly as
possible:
I can hold money in a checking account and have the same amount of money next
week, or next month
Inflation is largely predictable, and pretty much non-existant compared to
crypto volatility
Fraud, phishing, and hacking will not cause me to lose my life savings. My
mother is not technologically savvy at all. I would be terrified to let her
keep any significant portion of her savings in a system where a hash with a
typo will cost you you everything.
For as much as cryptocurrency supporters will harp about the evils of Wall
Street; the explicit scams, pump and dumps, and market manipulation by 0.001%
of crypto holders make Goldman Sachs look like a company of boy scouts. 2008
Financial recession? Ha, wait until you see what happens when Chinese mining
pools decide it's time to weed out the small fish (ie, every other month or
so). Sure, lecture me all you want about how the Federal Reserve is evil - but
at least they don't prey on investors with explicit pump and dumps, useless
ICOs, or that shit circus Tether.
Although there are certainly smart people working in the blockchain space -
most cryptocurrency/blockchain supporters are needlessly confrontational,
|
hackernews
|
Elevation in systolic blood pressure (SBP) is the leading risk factor for cardiovascular morbidity and mortality.1 Accordingly, prevention of the progression from prehypertension to sustained arterial hypertension is of critical importance.2 Microvascular rarefaction (reduced number of arterioles and capillaries) is considered one of the earliest forms of target organ damage (TOD) in hypertension, and may contribute to the development of chronic, sustained blood pressure elevation.3 4 Indeed, data from our laboratory demonstrate that
|
nih_exporter
|
The aim of the study was to analyze the relationship between lymph nodal involvement and regional and/or distant recurrences in locally advanced squamous cervical carcinomas, and also evaluate tumor 72-kDa metalloproteinase, as a biologic parameter useful for understanding the mechanisms of disease relapse and prognosis. In particular, 72-kDa metalloproteinase is an enzyme that specifically cleaves type IV collagen and seems to play a critical role in tumor invasion and metastatic dissemination. The medical records of 62 patients with FIGO (International
|
pubmed_abstracts
|
The use of e-nose based on ultra-fast gas chromatography equipped with unsupervised and supervised chemometric methods is an effective tool for authentication fruit juice samples. This technique allows to omit sample preparation step and provides a low time-consuming single analysis. Based on the obtained results, it can be concluded that using HCA methods allowed to classify orange juice samples for unadulterated and adulterated with apple juice. Unfortunately, samples of orange juice containing 1.0% of apple juice were assigned to the group of unadulterated samples. More reliable results were achieved through the use of supervised statistical methods. The combination of e-nose measurements with Random Forest classifier made it possible to distinguish between particular orange juice samples based on the added volume of apple juice. The obtained results are the basis for further investigations. In the near future, the focus should be placed on the developed methodology, in which samples of fruit nectars and juices from concentrate will be considered. They are one of the most falsified ones.
Experimental {#Sec4}
============
Sample preparation {#Sec5}
------------------
Fruit juices were obtained at local distribution centres in Gdansk. Samples were NFC juices, i.e., orange juice, apple juice, and mixtures of orange and apple juice (1/3/5/10/30/50% v/v addition of apple juice). The juice mixtures were prepared immediately after their purchase. A sample of 5.0 ± 0.1 g of each fruit juice was poured into 20 cm^3^ glass vials that were then sealed with a cap with a silicone--PTFE membrane. Samples were stored for 24 h at 4 °C. For each type of samples, the analyses were performed in ten replicates.
Instrumentation {#Sec6}
---------------
The measurements were performed using an ultra-fast gas chromatograph Heracles II (Alpha MOS, Toulouse, France) equipped with a split/splitless injector and two flame ionization detectors (μFIDs). The two parallel linked capillary chromatographic columns used for separation were non-polar MXT-5 (diphenyl dimethylpolysiloxane, 10 m × 0.18 mm × 0.40 μm) and medium-polar MXT-1701 (cyanopropylphenyl polysiloxane, 10 m × 0.18 mm × 0.40 μm). Before
|
pubmed_central
|
Spring-boot @Value properties not overridden by command line arguments
I have a Maven/SpringBootApplication that takes its properties from a Spring config Server. I need to override the values of these properties using command line arguments. unfortunately, the properties keep the values provided by the config server and are not overridden by the command line arguments.
I have confirmed that the parameters are properly passed to the App as I can see being passed to SpringApplication.run.
I can see in the function ConfigurableApplicationContext of Spring Framework the environment carrying the arguments in environment.propertysources.propertySourceList.SimpleCommandLinePropertySource.source.optionArgs
If I try to set a Spring-defined value (e.g. --logging.level.org.springframework.web=TRACE) it works, meaning Spring logs traces
I read all possible threads on the subject but none seem to apply to my problem.
This is my Spring boot app (args are beeing passed to the SpringApplication)
@SpringBootApplication
@ComponentScan("com.mycompany")
public class App {
public static void main(String[] args) {
SpringApplication.run(App.class, args);
}
}
Here is the component and the property
@Component
public class TaskProcessor implements com.mycompnay.fwk.task.engine.TaskProcessor {
private RestTemplate restTemplate = new RestTemplate();
@Value("${mycompany.converter.converter-uri.office}")
private String converterUriOffice;
}
The parameter being passed is received by the app (extracted from debugger):
0:"--debug=true"
1:"--logging.level.org.springframework.web=TRACE"
2:"--mycompany.converter.converter-uri.office=foo"
hash:0
value:char[44]@25
I expect the property converterUriOffice to have the value foo
Instead it gets its value from the config server (http://localhost:3000/convert/office)
A:
found following in the documentation https://cloud.spring.io/spring-cloud-static/Edgware.SR2/single/spring-cloud.html#overriding-bootstrap-properties
Overriding the Values of Remote Properties The property sources that
are added to
|
stackexchange
|
The Digital Signature Algorithm (DSA) and the Elliptic Curve Digital Signature Algorithm (ECDSA) are described in the standards FIPS PUB 186-3 (U.S. Department of Commerce) and ANS X9.62-2005 (American National Standard for Financial Services), both of which are herein incorporated by reference in their entirety. These signature algorithms use public-key cryptography to enable the creation and verification of digital signatures on digital messages. Signatories in DSA and ECDSA possess a private key and a public key; the private key is used to generate a digital signature (i.e., to sign a message) and the public key is used by third parties to validate that signature.
DSA and ECDSA are widely deployed (e.g., in ssh, SSL/TLS, Canada Post digital postmarks, DTCP, AACS, MS-DRM) and can be used to provide data origin authentication, data integrity, and non-repudiation. However, any assurances that DSA and ECDSA signatures might provide are always subject to the assumption that a signatory's private key remains private (i.e., the private key does not leak to an attacker).
The following references provide additional background information, and are each incorporated by reference in their entirety: [1] American National Standard for Financial Services, ANS X9.62-2005, Public Key Cryptography for the Financial Services Industry, The Elliptic Curve Digital Signature Algorithm (ECDSA), 16 Nov. 2005. [2] D. Hankerson, A. Menezes, S. Vanstone, Guide to Elliptic Curve Cryptography, 2003. [3] Information Technology Laboratory, National Institute of Standards and Technology, FIPS PUB 186-3, Digital Signature Standard (DSS), June 2009. [4] Standards for Efficient Cryptography, SEC 1: Elliptic Curve Cryptography, Version 2.0, 21 May 2009. [5] National Security Agency, NSA Suite B Cryptography, available from http://www.nsa.gov/ia/programs/suiteb_cryptography/ [6] Digital Transmission Content Protection Specification, Volume 1 (Informational Version), Revision 1.51, 1 Oct. 2007.
The signature generation operation of ECDSA and DSA is typically implemented in computer software, which is then run on a particular computing device (e.g.,
|
uspto_backgrounds
|
Andrew Brace
Andrew Brace is a former rugby union player and current rugby union referee who represents the Irish Rugby Football Union. Brace has refereed matches in the Pro14, the European Rugby Challenge Cup and the European Rugby Champions Cup. Brace refereed the 2014–15 British and Irish Cup final and the 2015–16 All-Ireland League final. In 2017 he began refereeing test matches.
Early life
Brace was born in Cardiff, Wales to Irish parents. He started playing rugby union in Cardiff when he was 12. In his youth Brace also played the violin. He is a grade eight violinist. His violin teacher was the mother of Gethin Jones. Between 2006 and 2009 Brace attended the University of St Mark & St John where he gained a BA in sports science and coaching. Between 2010 and 2017 Brace worked as a community rugby officer for Munster Rugby. He previously worked as a community development officer for Cardiff Blues. Brace continued working as a community rugby officer until 2017 when, together with George Clancy, John Lacey and Joy Neville he was one of seven referees offered professional contracts by the IRFU.
Playing career
Clubs
While working as a community rugby officer for Munster Rugby, Brace also played both rugby union for Old Crescent.
Belgium international
While playing for Old Crescent, Brace was contacted by an agent to play for the Belgium national rugby union team. Brace qualified to represent Belgium through his father's family. He subsequently helped Belgium win the 2012 Emirates Cup of Nations. He also played for Belgium in the 2012–14 European Nations Cup First Division. However his international career ended after he suffered a run of injuries. Brace also played for the Belgium national rugby sevens team.
Refereeing career
Early years
While still working as a community rugby officer for Munster Rugby, Brace attended a schools tournament and was asked to referee a match because they were short of an official. The match was between Abbey CBS and St Mary's Town School. He was encouraged to take up refereeing by John Lacey. Brace subsequently took charge of matches in both the British and Irish Cup and All-Ireland League. On 3 April 2015 he refereed the 2014–15 British and Irish Cup final between Worcester Warriors and Doncaster Knights. On 7 May 2016 he refereed the 2015–16 All-Ireland League final between Clont
|
wikipedia_en
|
To a Riemann surface with boundary $(X,\d X)$, we can canonically construct the double via the Schwartz reflection through the boundary. The double $D(X,\d X)$ of $(X,\d X)$ is a compact Riemann surface. The doubled genus of $(X,\d X)$ is defined to be the usual genus of $D(X,\d X)$.
On a Riemann surface with boundary $(X,\d X)$, we consider two types of marked points. The markings of interior type are points of $X\backslash\d X$. The markings of boundary type are points of $\d X$. Let ${\mathcal M}_{g,k,l}$ denote the moduli space of Riemann surfaces with boundary of doubled genus $g$ with $k$ distinct boundary markings and $l$ distinct interior markings. The moduli space ${\mathcal M}_{g,k,l}$ is defined to be empty unless the stability condition $$2g-2+k+2l>0$$ is satisfied. The moduli space ${\mathcal M}_{g,k,l}$ is a real orbifold of real dimension $3g-3+k+2l$.
The cotangent line classes $\psi_i\in H^2({\mathcal M}_{g,k,l};{\mathbb C})$ are defined (as before) as the first Chern classes of the cotangent line bundles associated to the interior markings. In [@PST14], cotangent lines at the boundary points are not considered. Open intersection numbers are defined by $$\begin{gathered}
\label{eq: open intersections}
\left<\tau_{a_1}\tau_{a_2}\ldots\tau_{a_l}\sigma^k\right>^o_g:=\int_{{\overline{\mathcal M}}_{g,k,l}}\psi_1^{a_1}\psi_2^{a_2}\ldots\psi_l^{a_l}.\end{gathered}$$ To rigorously define the right-hand side of , at least three significant steps must be taken:
- A natural compactification ${\mathcal M}_{g,k,l}\subset{\overline{\mathcal M}}_{g,k,l}$ must be constructed. Candidates for ${\overline{\mathcal M}}_{g,k,l}$ are themselves real orbifolds with boundary $\d{\overline{\mathcal M}}_{g,k,l}$;
- For integration over
|
arxiv
|
The difference between this and the standard 'many' construct is that this one
returns any errors reported by the item parser.
-}
manyUntilChar :: Char -- ^ The end character
-> Parser a -- ^ The item parser
-> Parser [a]
manyUntilChar endChar itemParser = do
mc <- peekChar
if mc == Just endChar
then return []
else (:) <$> itemParser <*> manyUntilChar endChar itemParser
{-|'skipCharParser' skips the given character, using the provided parser to
consume whatever is after the character.
-}
skipCharParser :: Parser () -> Char -> Parser ()
skipCharParser skipWhitespace c = do
void(Parser.char c)
skipWhitespace
{-|'sepByCharWithDelimitingChars' parses a list of 0 or more 'a' items.
The list must start with the start character and end with the end character.
The separator character should occur between items. The parser uses
the skipping parser to consume input after these.
The difference between this and the standard 'sepBy' construct is that this one
returns any errors reported by 'itemParser'
-}
sepByCharWithDelimitingChars
:: Parser() -- ^ Skipping parser
-> Char -- ^ The start character
-> Char -- ^ The end character
-> Char -- ^ The separator character
-> Parser a -- ^ The item perser
-> Parser [a]
sepByCharWithDelimitingChars
skipWhitespace firstChar endChar delimiter itemParser = do
skipCharParser skipWhitespace firstChar
mc <- peekChar
case mc of
Nothing -> fail "Unexpected end of input."
Just c
| c == endChar ->
skipCharParser skipWhitespace endChar $> []
| otherwise ->
(:) <$> itemParser <*> sepByCharWithDelimitingChars'
where
sepByCharWithDelimitingChars' = do
mc <- peekChar
case mc of
Nothing -> fail "Unexpected end of input."
Just c
| c == endChar ->
|
github
|
Cardiff v Huddersfield Prediction & Betting Tips, 21st August 2019
Cardiff v Huddersfield Championship Preview, 21st August 7.45pm
With two losses in three games of the Championship down, Cardiff are having their struggles adapting to life back in the second tier. Can they secure three points at home against the Terriers, who were up in the Premier League with them last season? Huddersfield so far, have fared even worse than the Bluebirds have following relegation. Read our Cardiff v Huddersfield betting tips for more.
Cardiff v Huddersfield Betting Odds*
Cardiff 21/20
Draw 23/10
Huddersfield 11/4
* (Betting Odds were taken from bet365 on August 19th, 2019 at 5:22 p.m.)
Cardiff News and Form
There have been plenty of goals flying around in Cardiff’s games so far this season. They are W1 L2 for the season with the two defeats happening out on the road at Wigan and Reading, conceding exactly three goals in both of those losses. Cardiff did win their only home game played so far, taking a 2-1 success over Luton, who won the League One title last season. So it’s not been plain sailing for Neil Warnock’s men. With all of their league games having gone over 2.5 goals so far, that’s worth a look for this one. That is a worrying amount of goals that they have conceded so far.
Cardiff v Huddersfield Head to Head
Cardiff and Huddersfield played out two 0-0 draws in the EPL last season
The Bluebirds are unbeaten in 11 games in all competitions against the Terriers
Both teams have scored in two of the last seven meetings
Huddersfield are winless in seven visits to Cardiff
Huddersfield News and Form
The Terriers have only managed one point from their three games back in the Championship. They sacked Jan Siewert over the weekend following a loss at home against Fulham. He won one of his 19 games in charge of the Terriers. Their only point of the campaign happened in a 1-1 draw at QPR, which at least may give them some optimism here.
Like Cardiff, they have not
|
pile-cc
|
True
Suppose -10*o + 5*o - 20 = 0. Suppose 7 = 3*d - 2*d + 2*j, 0 = 3*d + 2*j - 9. Let v be (2*-2 + 0)*d. Is o greater than v?
False
Suppose -2*k = -p + 3*k + 10, -5*p - 4*k + 50 = 0. Are p and 11 unequal?
True
Suppose 0 = -d + z - 21, 2*z - 140 = 5*d - 44. Is -20 at most as big as d?
True
Let y = 12 + -13.1. Let h = 1 + y. Is h >= -3?
True
Suppose 0 = -2*a + 8 - 2. Is a at most as big as 3?
True
Let f(w) = -w**2 - 10*w + 5. Let j be f(-10). Is j at least as big as 5/4?
True
Let m be (2 + 238/(-77))*2/4. Which is greater: 0.2 or m?
0.2
Let l = -6.8 + -1.2. Let n = l - -8. Let o(a) = a**2 - 4*a - 5. Let s be o(5). Is s != n?
False
Let v be (6/(-4) + 1)*2. Let m = -3386/11 + 308. Is m at most v?
False
Suppose -r - 40 = -6*r. Which is smaller: r or 7?
7
Let k = -9 - -12. Suppose 18 = -k*g - 5*q, 4*q = -g - 0*q - 13. Let i = 197/11 + -18. Is i <= g?
False
Let w be 20/(-40) - -1*2/4. Is w > 0?
False
Suppose 13 = 3*j + 1. Let p = -1.99 - 0.01. Let n = p - -3. Are n and j equal?
False
Let f = -158/45 - -28/9. Let a = -11 + 18. Let t = a - 6.8. Which is smaller: f or t?
|
dm_mathematics
|
Tuesday, April 24, 2001, Pacific Gas & Electric Company filed Advice
Letter 2106-E with the CPUC.
Electric Interruptible Load Programs
<<2106-E AL.doc>> <<2106-E TS.doc>>
Advice 2106-E is being sent electroniclly to parties to R. 01-10-002.
Thank You,
Nel Avendano (nco1@pge.
|
enron_emails
|
another trial judge could have found, on the basis of this evidence, Bailey did not have apparent
authority to enter into the contract. However, the trial court’s finding to the contrary in the instant
case is not erroneous. Because the trial court’s judgment can be upheld on the basis of apparent
authority, the judgment must be affirmed. Rosemond, 331 S.W.3d at 767. Norco’s sole issue is
overruled.
Protect’s Appeal
In its sole issue, Protect asserts the trial court abused its discretion by awarding attorney’s
fees of $3,500 where the evidence presented indicates Protect incurred attorney’s fees and
13
expenses of $8,924.82, and thus the trial court’s decision lacked factual sufficiency.
Generally, the amount of money awarded as attorney’s fees rests within the sound
discretion of the court. Ragsdale v. Progressive Voters League, 801 S.W.2d 880, 881 (Tex.
1990). Regarding attorney’s fees, the analysis of whether or not a court abuses its discretion, is
determined by a two-step inquiry: (1) did the trial court have sufficient information upon which
to exercise its discretion; and (2) if so, did the trial court err in exercising that discretion. Alford,
224 S.W.3d at 298. A court abuses its discretion when it acts without reference to guiding rules
and principles, i.e., when it acts in an arbitrary and unreasonable manner. F–Star Socorro, L.P. v.
City of El Paso, 281 S.W.3d 103, 106 (Tex.App.--El Paso 2008, no pet.).
Protect presented uncontroverted testimony from their counsel, along with supporting
exhibits, reasonable attorney’s fees and expenses incurred by Protect were $8,924.82 and it was
anticipated additional fees of $2,500 for each level of appeal. According to the invoice presented,
the cost of the clean-up was $11,616.34.
In general, an interested witness’s testimony, though uncontradicted, does no more than
raise a fact issue to be determined by the fact finder. Elias v.
|
freelaw
|
~~~
z92
Can I include a C source file in RubyMotion project, compile it, and call the
C functions directly from Ruby? That can be done easily with Obj-C.
I was looking for its answer for some time now. Our projects include a lot of
C code.
~~~
lrz
Yes, you can vendor pure C libraries and use their APIs in a RubyMotion
project (assuming the C interface is simple enough). Here is an example that
uses the OpenGL C APIs:
[https://github.com/HipByte/RubyMotionSamples/tree/master/Hel...](https://github.com/HipByte/RubyMotionSamples/tree/master/HelloGL)
------
anuraj
I can understand PhoneGap will be handy when requiring cross platform
compatibility and you are not a multi platform expert. The experience is
always going to be underwhelming. RubyMotion is much more ambiguous, on one
hand we have beautiful XCode and Objective-C environment which is a pleasure
to use, and then this command line monstrosity! And it do not save you from
learning cocoa libraries - So if you want to develop for iOS, try to use Apple
tools - period.
~~~
lrz
Well, there are folks who don't find Xcode or Objective-C beautiful and prefer
using the command-line. A lot of folks, actually. :)
~~~
anuraj
Well - try developing a pixel perfect app on command line and see! And by the
way Objective-C is the fastest growing language out there.
~~~
jballanc
In my experience, the text-editor/command-line path is the _only_ way to be
truly "pixel perfect". Visual tools can get you most of the way there, but it
seems you always inevitably have to touch the drawing code if you want true
accuracy.
Oh, and as for Objective-C being a fast growing language? The rise of
Objective-C is _directly_ tied to the rise of the iOS platform. If iOS had
been written in any other language, Objective-C would still be a mostly
forgotten language today.
------
programminggeek
Having just spent the weekend doing an iOS app in PhoneGap and jQuery Mobile,
I can say that PhoneGap
|
hackernews
|
Surface antigens of human glial brain tumor cells and VM murine spontaneous anaplastic astrocytoma cells were investigated by binding (indirect membrane immunofluorescence) and complement-dependent cytotoxic antibody (14C-nicotinamide release and dye-exclusion) assays. Antisera from nonhuman primates immunized with glioblastoma multiforme tissue or cells from permanent human glial brain tumor cell lines have been extensively absorbed to analyze which human glioma cell surface antigens may be species-, tissue-, or glial tumor-specific;
|
nih_exporter
|
Modern medicine requires tight multidisciplinary collaboration and communication among several technical disciplines. Nevertheless, multidisciplinary medical courses are rare and even less often scientifically evaluated. The aim was to evaluate an innovative neuro-oncology course for medical students (MED) and students of science, technology, engineering, and mathematics (STEM) so that they learn and practice mutual understanding, communication and cooperation. 10 MED and 9 STEM were trained together during a one-week-course on the topic of "brain tumor" in imaging, surgical planning
|
pubmed_abstracts
|
The histologic spectrum encountered in acute lung injury is broad. Very early cases may look nearly normal with only mild interstitial and alveolar edema. Other more advanced cases are clearly abnormal with fibrin, inflammation, and organization. The basic elements of the acute injury pattern include interstitial edema, alveolar edema, fibrin, hyaline membranes, reactive pneumocytes, and organization (see [Box 6.2](#b0015){ref-type="boxed-text"}). Acute lung injury is a pathologic pattern and by itself is a nonspecific finding. From a practical perspective, after an acute lung injury pattern is identified, careful search for the following additional features often help to narrow the list of possible causes (summarized in [Table 6.1](#t0010){ref-type="table"} ).*Presence of hyaline membranes*. The most commonly encountered potential etiologic disorders include infection, connective tissue disease, drug toxicity, and an idiopathic form of diffuse alveolar damage (i.e., acute interstitial pneumonia).[@bib2], [@bib5]*Presence of neutrophils*. The presence of neutrophils in lung alveolar spaces should always raise the possibility of infection.[@bib121], [@bib134] For example, legionnaires\' disease characteristically is associated with acute bronchopneumonia with DAD.[@bib51]*Presence of frothy exudates*. The presence of frothy exudates in alveolar spaces is a classic feature of pneumocystis pneumonia. However, this feature is not always present. In some cases, especially in mildly immunocompromised patients, DAD may be the only finding.[@bib46]*Presence of necrosis*. Among the infectious causes of DAD, viral infection figures prominently. Influenzavirus, herpes simplex virus, varicella-zoster virus, and adenovirus infections are well known to produce DAD,[@bib29], [@bib31], [@bib34], [@bib35], [@bib36] and all of these viral infections typically are accompanied by necrosis. *Legionella* and *Pneumocystis* infections also can produce acute lung injury with necrosis.[@bib44], [@bib46], [@bib51]*Presence of eosinophils*. Acute and organizing DAD with prominent interstitial and alveolar eosinophils is characteristic of acute eosinophilic pneumonia.[@bib104] However, if the patient has been treated with steroid before biopsy, very few eosinophils may remain, and the diagnosis may be difficult or impossible.*Presence of siderophages and capillaritis*. Hemosiderin-laden macrophages with
|
pubmed_central
|
Hello I have a 1:M relationship between Customer_Status and Customer. Customer_Status applies to many Customers. I put the associations in the corresponding models.
Below is my schema
create_table "customer_statuses", force: :cascade do |t|
t.string "customer_status_desc"
t.datetime "created_at", null: false
t.datetime "updated_at", null: false
end
create_table "customers", force: :cascade do |t|
t.integer "customerstatus_id"
t.integer "customertype_id"
t.string "first_name"
t.string "last_name"
t.string "primaryemail"
t.string "secondaryemail"
t.string "billingcity"
t.string "billingstreet"
t.integer "billingzip"
t.integer "primaryphone"
t.integer "secondaryphone"
t.datetime "created_at", null: false
t.datetime "updated_at", null: false
end
In my Customer Index View I am trying to display attribute customer_status_desc from the Customer Status table instead of the customerstatus_id found in the Customers table.
In the Customer Index View I have:
<% @customers.each do |customer| %>
<tr>
<td><%= customer.customer_status.customer_status_desc %></td>
<td><%= customer.customertype_id %></td>
<td><%= customer.first_name %></td>
<td><%= customer.last_name %></td>
</tr>
<% end %>
For the life of me I cannot get the customer_status_desc to display. I get the error undefined method customer_status_desc for nil:NilClass I have tried naming it differently such as customer.customerstatus.customer_status_desc
After some research it appears the naming conventions are out of whack. Is there any way to resolve this without changing all of the names. Can I help rails understand what I am trying to call - or possibly force it through a query?
EDIT:
I am using postgres and rails 4
Customers Controller
def index
|
stackexchange
|
The present invention addresses the practical needs of the tactical network planner and manager by using near-future propagation forecasts for network planning and real-time propagation information for network management, with an emphasis on 24-hour forecasting because many meteorological phenomena have a diurnal (24-hour) cycle. By utilizing updated weather, performance and traffic data received from the network, with the aid of artificial intelligence (AI) techniques, necessary environment-driven changes can be made continuously and on a real-time basis operating on large masses of data which only a computer can effectively handle. Further, this invention utilizes tools such as computer models, algorithms, computer simulations and AI-based tools in a new way along with currently available tactical system/network management technology.
While this invention may be readily used in tactical military communications systems, there are numerous commercial applications in areas such as mobile or cellular telephones, as well as any communications system that can be incapacitated by adverse propagation conditions. A key aspect of the method and apparatus of this invention is the ability to use and automatically update propagation, weather and traffic algorithms so that the communications system can automatically send reconfiguration "change orders" to the network to compensate for the harmful effects of these phenomena.
Examples of propagation forecasting tools may be found in the following references:
"24-Hour Network Performance Management System Technical Paper," Jan. 21, 1993, U.S. Army CECOM Space and Terrestrial Communications Directorate Line-of-Sight Propagation Reliability Working Group; PA0 Michael J. Harrigan, Kenneth H. Brockel, William P. Sudnikovich, Arvids Vigants, William T. Barnett, Stanley Conway-Clough, Richard Wood, Robert Edwards, Joli Toth and Julius Sunshine "24-Hour Network Performance Management System," MILCOM 94 Conference Technical Paper, Fort Monmouth, N.J., Oct. 2-5, 1994; PA0 "Rain Propagation Reliability Forecasting Method Technical Memorandum," May 17, 1993, U.S. Army CECOM Space and Terrestrial Communications Directorate Line-of-Sight Propagation Reliability Working Group; and PA0 Network Management Tool Detailed Operational Concepts Document, Jan. 5, 1994. U.S. Army CECOM Space and Terrestrial Communications Directorate Network Management Automation & Integration Working Group. Further, an example of a propagation reliability model may also be found in U.S. Pat
|
uspto_backgrounds
|
Edward F. "Butch" Songin (May 11, 1924 – May 12, 1976) was a quarterback for the Boston College Eagles, the Hamilton Tiger-Cats of the Canadian Rugby Union, and for the American Football League's Boston Patriots and the New York Titans. He also was an All-American defenseman for the BC Eagles ice hockey team.
College career
From 1947 to 1949, Songin was the starting quarterback for the Boston College Eagles. He completed 192 of 385 passes for 2,534 yards, 30 touchdowns, and 24 interceptions.
Songin was a Hockey All-American for Boston College in 1948. He was a member of the 1948–1949 national championship team. He was captain of the 1949–50 squad and also won All-American. He was a founding member of the Pike's Peak Hockey Club. Today it is Boston College's oldest hockey booster organizations. Songin also played 1 game for the Worcester Warriors of the Eastern Hockey League during the 1954–55 season. His nephew Tom Songin played right wing for the Boston Bruins
Professional career
In 1950 Songin played three games for the Erie Vets of the AFL (formerly the American Association) before being sidelined by an injury, damaging the team's chances of a championship.
From 1953 to 1954, Songin played for the Hamilton Tiger-Cats of the Interprovincial Rugby Football Union, predecessor of the Canadian Football League. He won the Grey Cup in his rookie season in 1953.
In 1960 Songin signed with the Boston Patriots of the newly created American Football League. On September 9, 1960, Songin played in the first ever AFL game, against the Denver Broncos. In his first season with Boston he completed 187 of 392 passes for 2,476 yards, 22 touchdowns, and 15 interceptions. In 1961, he split starting duties with Babe Parilli. He completed 98 of 212 passes for 1,429 yards, 14 touchdowns, and 9 interceptions. In 1962, he was the opening day quarterback for the New York Titans, but was replaced by Lee Grosscup. He played in 7 games, completing 42 of 90 passes for 442 yards, 2 touchdowns, and 7 interceptions.
Death
Songin died of cancer May 12, 1976 at his home in Foxboro, Massachusetts. He was 52 years old. At the time of his death, he was chief probation officer in the Wrentham District Court. He left his widow, Catherine E
|
wikipedia_en
|
[99]{} Humboldt Research Fellow; on leave from China Center of Advanced Science and Technology (CCAST). U. Heinz, in: [*Correlations and Clustering Phenomena in Subatomic Physics*]{}, ed. by M.N. Harakeh, O. Scholtan and J.H. Koch, NATO ASI Series B, (Plenum, New York, 1997), in press (Los Alamos eprint archive nucl-th/9609029) T. Csörgő and B. Lörstad, Phys. Rev. C[**54**]{} (1996) 1396; and Nucl. Phys. A[**590**]{} (1995) 465c. S. Chapman and J.R. Nix, Phys. Rev. C[**54**]{} (1996) 866. S. Schönfelder, (NA49 Coll.), Ph.D. thesis, TU München, 1996. K. Werner, Phys. Rep. [**232**]{} (1993) 87. H. Sorge, H. Stöcker, and W. Greiner, Ann. Phys. (N.Y.) [**192**]{} (1989) 266. Y. Pang, T.J. Schlagel, and S.H. Kahana, Phys. Rev. Lett. [**68**]{} (1992) 2743; T.J. Schlagel, Y. Pang, and S.H. Kahana, Phys. Rev. Lett. [**69**]{} (1992) 3290. J. Aichelin, Nucl. Phys. A (1997), in press (Los Alamos eprint archive nucl-th/9609006). M. Martin, H. Kalechofsky, P. Foka, and U.A. Wiedemann, Los Alamos eprint archive nucl-th/9612023. E. Shuryak, Phys. Lett. B[**44**]{} (1973) 387; Sov. J. Nucl. Phys. [**18**]{} (1974) 667. F. Yano and S. Koonin, Phys. Lett. B[**78**]{} (1978) 556. S. Pratt et al., Nucl. Phys. A[**566**]{} (1994) 103c; and in [*Quark-Gluon Plasma 2*]{}, ed. by R.C. Hwa (World Scientific, Singapore, 1995), p. 700. S. Chapman and U.
|
arxiv
|
InputParameters
CreateProblemDefaultAction::validParams()
{
InputParameters params = Action::validParams();
params.addPrivateParam<bool>("_solve");
return params;
}
CreateProblemDefaultAction::CreateProblemDefaultAction(InputParameters parameters)
: Action(parameters)
{
}
void
CreateProblemDefaultAction::act()
{
if (_current_task == "determine_system_type")
{
// Determine whether the Executioner is derived from EigenExecutionerBase and
// set a flag on MooseApp that can be used during problem construction.
bool use_nonlinear = true;
bool use_eigenvalue = false;
auto p = _awh.getActionByTask<CreateExecutionerAction>("setup_executioner");
if (p)
{
auto & exparams = p->getObjectParams();
use_nonlinear = !(exparams.isParamValid("_eigen") && exparams.get<bool>("_eigen"));
use_eigenvalue =
(exparams.isParamValid("_use_eigen_value") && exparams.get<bool>("_use_eigen_value"));
}
_app.useNonlinear() = use_nonlinear;
_app.useEigenvalue() = use_eigenvalue;
return;
}
// act only if we have mesh
if (_mesh.get() != NULL)
{
// Make sure the problem hasn't already been created elsewhere
if (!_problem)
{
std::string type;
if (_app.useEigenvalue())
type = "EigenProblem";
else
type = "FEProblem";
auto params = _factory.getValidParams(type);
// apply common parameters of the object held by CreateProblemAction to honor user inputs in
// [Problem]
auto p = _awh.getActionByTask<CreateProblemAction>("create_problem");
if (p)
params.applyParameters(p->getObjectParams());
params.set<MooseMesh *>("mesh") = _mesh.
|
github
|
Subsidiary services
In 2015, PJSC Aeroflot's subsidiaries implemented a wide range of measures to improve their customer experience.
Rossiya airline introduced new approaches and techniques to enhance in-flight services and expanded the selection of snacks and drinks available on-board for purchase on domestic flights.
Aurora airline introduced branded on-board blankets in business and economy classes and hot local cuisine dishes on the in-flight menus on-flights to Japan, China, and South Korea. The company also launched an upgraded website.
SkyPriority
Starting from 2013, Aeroflot airline as a member of the SkyTeam Alliance has been leading a SkyPriority initiative offering accelerated completion of departure formalities to frequent flyers who are prioritised during the check-in, luggage drop-off, passport control, and boarding.
In 2015, we continued to roll-out Fast Track/SkyPriority (accelerated passport control and security checks) in SkyTeam alliance hubs.
Aeroflot Bonus
5.1million
loyalty cardholders
Aeroflot Bonus is the largest frequent flyer programme in Russia, CIS and Eastern Europe. In 2015, the number of programme members increased by 13.0% y-o-y to 5.1 million people. Aeroflot Bonus members are essential for building customer loyalty. In 2015, a frequent Aeroflot Bonus flyer averaged 6.5 flights.
Aeroflot Bonus offers its members an opportunity to earn free miles when flying with Aeroflot Group and SkyTeam Alliance, paying with co-branded cards and using partner services around the globe.
Free miles can be used to book premium flights across Aeroflot Group's and SkyTeam Alliance's route network, upgrade the travel class, book a room, rent a car or buy other goods and services offered by our rewards catalogue. Aeroflot Bonus members may also donate miles to charities under the Mercy Miles project.
The programme provides for Basic, Silver, Gold, and Platinum tiers. Elite club members benefit from additional privileges on Aeroflot Group and partner flights.
18 new partners
in Aeroflot Bonus programme
In 2015, we enrolled 18 partners as part of the bonus miles programme, designed and implemented the reward catalogue offering mile redemptions for partner goods and services, and enhanced our mobile apps for Aerof
|
pile-cc
|
Rearrange (5*i - 6*i - 6*i)*(4*i - 2*i + 1 - 4) to l*i**2 + n*i + r and give n.
21
Rearrange -3*n**3 - 24*n + 4*n - 3 + 16*n to the form o*n + t*n**2 + w + a*n**3 and give w.
-3
Rearrange -q**2 + 0*q**2 + 0*q**2 + 2*q**2 - q + q - 4*q**2 + 0*q**2 + 3*q**2 + (-4 - 1 + 4)*(q**2 + q**2 - 5*q**2) to f + l*q**2 + p*q and give l.
3
Rearrange 24*n - 42*n + 30*n to the form m*n + u and give m.
12
Express (-17 + 31 + m - 17)*(-2*m**3 + 0 + 0 + (3*m - 2*m - 3*m)*(5*m**2 - 5*m**2 - 2*m**2)) as o + v*m**3 + h*m**2 + j*m**4 + a*m and give v.
-6
Rearrange -8 + 4 - 1 + 2 + 2*b to the form p + x*b and give x.
2
Rearrange 3*o**2 + 14*o**2 + 4*o**2 - o**2 to the form j*o + f*o**2 + v and give f.
20
Express 2*a + 8 - 8 - 6*a as n + d*a and give d.
-4
Express (16*y - 62*y - 12*y)*((1 - 3 + 4)*(1 - 3 + 3) + (-3 - 1 + 3)*(3 - 4 - 1))*(-y + 4 - 4) as i*y + b + h*y**2 and give h.
232
Rearrange 4*t**2 - 4*t**2 - 2*t**3 + (6*t + t - 5*t)*(-76*t + 76*t + 18*t**2) to m*t**3 + z + y*t**2
|
dm_mathematics
|
Pierre,
I am working with Kristin Gandy on my trip. Hopefully, she will be able to
confirm the
November date in a day or two. Kristin is taking care of all the
arrangements.
Vince
Pierre-Philippe Ste-Marie <ps5@andrew.cmu.edu> on 08/28/2000 09:34:47 AM
To: Vince.J.Kaminski@
|
enron_emails
|
The trial court made, in essence, these material findings: (a) Appellee became the owner of the subject lot two years after the Zoning Code became effective; (b) Appellee's property is located in an area which consists of single and multiple family residences and there are several quiet businesses such as a grocery store etc, which were there before the property was zoned as class R-3, being non-conforming uses; (c) Using appellee's lot for a beauty shop would not devalue the property in the area; (d) But rezoning the property for other types of business (permissible under the C-2 classification) would result in a devaluation of the other property in the area, and; (e) The action of the Planning Commission and the City in refusing to rezone this one *753 lot was arbitrary, unreasonable, and capricious. The court's order was that the lot be rezoned from an R-3 to a C-2 classification, and that the City be enjoined from preventing appellee from using "the property * * * in any manner provided in the C-2 classification". This appeal by City follows.
For a reversal appellant relies on three separate points. One, the court cannot substitute its judgment for that of the Zoning Authorities; Two, there is no proof the City acted arbitrarily, capriciously, or unreasonably, and; Three, there is no proof to justify the trial court in substituting its judgment for that of the City. However, since there is much similarity in the points, we deem it unnecessary to discuss them separately.
The decisive issue before us is whether the testimony justified the trial court in reversing the Zoning Authorities. The fundamental rule by which we must decide this issue has been frequently announced by this Court, and it is clearly stated in the recent case of City of Little Rock v. McKenzie, 239 Ark. 9, 386 S.W.2d 697. In that case the trial court held the City acted arbitrarily in rezoning certain property. In reversing the trial court we used this language:
"In resolving this conflict we cannot substitute our judgment for that of the zoning authorities. We must uphold their decision unless we can say that it is arbitrary and capricious."
Applying the above rule to the testimony in the record here we are unwilling to say the action of the Zoning Authorities was arbitrary or capricious. One definition of the word arbitrary given by Webster is "decisive but unreason
|
freelaw
|
------
krasin
What software should I use to verify their claims? aerodynamics simulators or
how they are called?
------
marvin
This is really cool, and probably a better solution than quadcopters for many
applications. However, what we would _ideally_ want in the end, would be a
tilt-rotor of some sort which incorporates wings. Fixed wings are a lot more
efficient than active lift, and is necessary if you want to squeeze more speed
and range out of your UAV.
~~~
Pxtl
So, like, a remote-controlled Osprey?
------
rplst8
I for one welcome our new...
------
zobzu
That's kinda stupid garage-scienticism to be honest.
\- TFA does not mention the stability issue. Guess why people and drones fly
tri, quads, etc and not regular helis. Yeah. (a simplification: stand on one
leg. Now stand on 2, and use your 2 hands as well. 4 legs. Stable heh?)
\- Yes single large prop is more efficient than many tiny props. But put many
large props and the difference isn't so big. Let's take a $1000 ultra
efficient quad: www.youtube.com/watch?v=t0SR5bzuFq4 yeah thats 100min of
flight time for something smaller than the Align Trex of the video. And it's
cheaper too.. The trex flies 5 to 10minutes (6S 5000mah). At equivalent
batteries, the trex flies 25min (hint: the trex is not made for efficiency,
it's made for 3D). An average camera-less quad flies 10 to 15min (3S 3000mah).
\- TFA compares a $5000 Align Trex 700 with a bunch of expensive upgrades -
the top of the top - with one very good pilot with decades of training... to a
$200 toy.
\- $200 toys made of wood and plastic flown by random people are actually
pretty good at acro. Why? Because being more stable they're much easier to
fly. Ex:
[http://www.youtube.com/watch?v=qzu5eSZqKpY](http://www.youtube.com/watch?v=
|
hackernews
|
One of the earliest histopathological signs of age-related hearing (loss (presbycusis) is the loss of the outer hair cells (OHC) in the cochlea. The vulnerability of the OHCs to the effects of age suggests that distortion product otacoustic emissions (DPOAE), which are believed to be associated with the OHC function, should serve as a useful tool for the assessment of the effects of age on the cochlea. The sensitivity of a DPOAE test of
|
nih_exporter
|
Based on census tract information, cancer incidence rates for three socio-economic strata of the city of Cali, Colombia, were calculated. Strong negative associations with socio-economic status were found for cancers of the cervix and stomach. Colon cancer and endocrine-related cancers were positively associated with socio-economic status, while no such association was found for rectal cancer. Contrary to data from developed countries, all smoking-related cancers were positively associated with socio-economic class. The role of socio-economic gradients
|
pubmed_abstracts
|
Data from six randomized clinical trials in CLL and one with MM patients with hypogammaglobulinemia and history of infections demonstrated that IVIg significantly decreased the rate of bacterial infections and prolonged the time to first infection, with no differences in non-bacterial infections (Table [1](#T1){ref-type="table"}). These trials suggested that the best dosing was 400 mg/kg/3 weeks until steady state is reached, followed by 400 mg/kg/5 weeks (grade A recommendation, level 1b evidence) ([@B4]--[@B6], [@B29]--[@B33]). Although infections are a major cause of morbidity and mortality in CLL, neither survival benefit nor improvement in quality of life could be demonstrated, which is not surprising given the follow-up period of 1 year ([@B4], [@B34]). A recent 14-year retrospective study in a large series of CLL patients confirmed that hypogammaglobulinemia does not appear to impact overall survival ([@B14]). Based on the results of the first controlled trial in a wide range of CLL patients, IVIg was not cost-effective ([@B35]). In patients with MM, IVIg for 6--12 months reduced the risk of severe infectious complications (grade A recommendation, level 1b evidence) ([@B31]). As a result, IVIg is currently reserved for selected CLL patients with hypogammaglobulinemia and recurrent bacterial infections, especially those in whom prophylactic antibiotics have failed, or with severe infections requiring IV antibiotics or hospitalization and serum IgG levels \<400 mg/dL (grade 2B recommendation, level 1A of evidence). Following the original trial, IVIg may be recommended for plateau phase MM patients with hypogammaglobulinemia and recurrent bacterial infections who have failed to respond to pneumococcal immunization ([@B36], [@B37]).
######
**Clinical trials to determine effectiveness and dosage of replacement intravenous immunoglobulin in hematological malignancy \[adapted from Dhalla et al. ([@B9])\]**.
Publication Target population Study description Relevant results
------------------------------------------------------------------------ ----------------------------------------------------------------------------------------- ----------------------------------------------------------------------------------------------------------------------------- -------------------------------------------------------------------------------------------------------------------
Cooperative Group ([@B4]) CLL patients (81) with hypogammaglobulinemia or serious infections Multicenter controlled, randomized double-blind, IVIg 400 mg/kg/21 days versus placebo for 12
|
pubmed_central
|
Q:
realloc: invalid checksum for freed object
I have an error using realloc to replace malloc.
This code below runs OK on my computer.
int vector_grow(Vector* vec) {
unsigned long newcap;
int * newarr;
if (0 == vec->cap) {
vec->arr = (int*)malloc(START_CAPACITY * sizeof(*vec->arr));
if (NULL == vec->arr)
return -1;
vec->cap = START_CAPACITY;
return 0;
}
newarr = malloc (newcap * sizeof(*vec->arr));
if (NULL == newarr)
return -1;
memcpy (newarr, vec->arr, vec->len * sizeof(*vec->arr));
free (vec->arr);
vec->arr = newarr;
vec->cap = newcap;
return 0;
}
I want to change the malloc to realloc, but the error occurs.
int vector_grow(Vector* vec) {
unsigned long newcap;
if (0 == vec->cap) {
vec->arr = (int*)malloc(START_CAPACITY * sizeof(*vec->arr));
if (NULL == vec->arr)
return -1;
vec->cap = START_CAPACITY;
return 0;
}
newcap = 2 * vec->cap;
if ((vec->arr = (int*)realloc(vec->arr, newcap * sizeof(int))) == NULL)
return -1;
return 0;
}
It says
malloc: *** error for object 0x7fca64c02598: incorrect checksum for freed object - object was probably modified after being freed.
I don't know any difference between those two snippets of code, if you know what causes the error, please tell me! Thank you very much!
A:
Bug in missing vec->cap = in updated code certainly contribute to various calls to malloc() and calling code's misuse of data.
int vector_grow(Vector* vec) {
unsigned long newcap;
if (0 == vec->cap) {
... // not important to show the
|
stackexchange
|
The invention relates to an expandable table. More particularly, the invention relates to a table with a circular tabletop, which is capable of expanding for the insertion of leaves to thereby provide a larger, circular, even tabletop surface.
Selection of a dining room table is often a tradeoff between maximizing seating capacity and minimizing the floor space that the table occupies when not in use. For this reason, rectangular dining room tables have been made expandable for centuries. Generally, a rectangular dining table will slide apart from its middle, and allow one or more "leaves" to be inserted therein--resulting in a longer table. After use, the leaves are removed and the table is retracted to a smaller, storage size.
Although a circular table is desirable choice by many, it has the limitation in that it is fixed in size. There have been attempts, but no one has produced a way to effectively, neatly, and reliably expand a round table in order to increase its seating capacity. Thus, one must carefully choose a table by first determining whether it should be suited for seating four, six, or eight people.
Some others have conceived of table constructions which attempt to provide round expandable surfaces. Among these are U.S. Pat. Nos. 254,388 to Schultz; 340,176 to Wardwelt Jr.; 351,101 to Fauber; 838,671 to Turner; 1,384,925 to Seiler; 3,683,825 to Sheldon; 4,782,764 to Robinson; and 4,809,619 to Piretti. Many of these tables employ overlapping leaves which "fan" outward like a camera iris, clearly resulting in a uneven table surface. Others provide mechanisms which would be cumbersome to use, impractical or expensive to construct, or would likely fail after just a few uses.
U.S. Pat. No. 5,237,937 to Peltier shows an expansible table which employs a separate radial guide track and arcuate activating means. Because separate means are provided for causing the sectors to move radially outward and to guide the sectors outward in a straight, radial line, the design is limited in reliability, sturdiness, and the ability to be constructed with more than four sectors. Furthermore, the construction of the guide tracks using vertically overlapping pairs of guide members ensures that the tabletop will be, at best, unevenly supported.
While these units may be suitable for the particular purpose employed, or for general use, they would
|
uspto_backgrounds
|
Willem Arnold Alting
Willem Arnold Alting (11 November 1724 – 7 June 1800) was a Dutch colonial administrator who served as Governor-General of the Dutch East Indies from 1780 to 1797.
Born in Groningen, Alting studied in his hometown and graduated in law. He left on 18 October 1750 for the East Indies on board the De Middelburg as an onderkoopman (underbuyer/undermerchant) for the Dutch East India Company (VOC). He spent the rest of his life in the Indies. In 1754 he became koopman (buyer/merchant) and in 1759 First Secretary to the government. In 1763 he became Counsellor-extraordinary (Buitengewoon Raad) and in 1772 full Counsellor (Raad ordinaris). In 1777, he became First Counsellor (Eerste Raad) was named Director-General.
From March 1780 he was acting Governor-General, because of the sickness of his predecessor, Reynier de Klerck. Following the death of De Klerck, on 1 September 1780, he was chosen by the Dutch Council of the Indies as provisional Governor-General. He carried on this function for seventeen years.
De Klerck had wanted to bring the use of Dutch into the educational system, but Alting revoked this in 1786, so that Malay and Portuguese were once again used. Alting's term of office was marked by a steep decline of the Dutch East India Company and its power in the Indies.
Three months after he took up post, the Netherlands went to war with Great Britain (in the 1780–1784 Fourth Anglo-Dutch War) and a great part of the territory of Dutch East India Company was occupied by the British. The government in Batavia (Jakarta) did not, on the whole, offer much resistance. Following the 1784 Peace of Paris, Britain obtained the right to unhindered trade in the East Indies. The Dutch had to cede Negapatam in India to the British. The image of the Dutch in the eyes of the local rulers was thoroughly shattered.
From the Netherlands, three Commissioners-General were sent to work with Alting to reorganise. On the way there, one of them died and Alting managed to get his son-in-law Johannes Siberg to take his place. The Al
|
wikipedia_en
|
What we are going to shortly discuss in the present contribution is set in this last perspective and suggests a semiclassical approach to define WKB quantum states for spherically symmetric shells. This method has already been used in [@bib:ClQuG2002..19..6321A].
Let us then consider a spherical shell (we refer the reader to [@bib:PhReD1991..43..1129I] for very concise/clear background material and for definitions). For our purpose the relevant result is equation (4) in [@bib:PhReD1991..43..1129I], i.e. the junction conditions[^2] $
K ^{-} _{ij} - K ^{+} _{ij} \propto S _{ij} - g _{ij} S / 2
.
$ $K _{ij}$ is the extrinsic curvature of the shell and can have different values on the two sides ($+$ and $-$ spacetime regions) of it. $S _{ij}$ is the stress energy tensor describing the energy/matter content of the shell ($S$ is its trace). For a spherical shell these equations reduce to the single condition $$\epsilon _{-} ( \dot{R} ^{2} + f _{-} (R) ) ^{1/2}
-
\epsilon _{+} ( \dot{R} ^{2} + f _{+} (R) ) ^{1/2}
=
M (R) / R
,
\label{eq:sphjuncon}$$ where $f _{\pm} (r)$ are the metric functions in the static coordinate systems adapted to the spherical symmetry of the $4$-dimensional spacetime regions joined across the shell; $\epsilon _{\pm} = +1, -1$ are signs and $R$ and $M (R)$ are the the radius (a function of the proper time $\tau$ of a co-moving observer[^3]) and the matter content (what remains of $S _{ij}$) of the spherical shell, respectively. As shown for example in [@bib:NuPhB1990.339...417G; @bib:ClQuG1997..14..2727S; @bib:Thes.1994....TriestA] the above equation can be obtained from an effective Lagrangian[^4] $L _{\mathrm{EFF}} (R , \dot{R})$, as a first integral of the second order Euler-Lagrange
|
arxiv
|
<dxl:Properties>
<dxl:Cost StartupCost="0" TotalCost="431.000069" Rows="1.000000" Width="8"/>
</dxl:Properties>
<dxl:ProjList>
<dxl:ProjElem ColId="18" Alias="a">
<dxl:Ident ColId="18" ColName="a" TypeMdid="0.23.1.0"/>
</dxl:ProjElem>
<dxl:ProjElem ColId="19" Alias="b">
<dxl:Ident ColId="19" ColName="b" TypeMdid="0.23.1.0"/>
</dxl:ProjElem>
</dxl:ProjList>
<dxl:PartitionSelector RelationMdid="0.322247.1.1" PartitionLevels="1" ScanId="3">
<dxl:Properties>
<dxl:Cost StartupCost="10" TotalCost="100" Rows="100" Width="4"/>
</dxl:Properties>
<dxl:ProjList/>
<dxl:PartEqFilters>
<dxl:ConstValue TypeMdid="0.16.1.0" Value="true"/>
</dxl:PartEqFilters>
<dxl:PartFilters>
<dxl:Or>
<dxl:Or>
<dxl:ArrayComp OperatorName="=" OperatorMdid="0.96.1.0" OperatorType="Any">
<dxl:ConstValue TypeMdid="0.23.1.0" Value="0"/>
<dxl:PartListValues Level="0" ResultType="0.1007.1.0" ElementType="0.23.1.0"/>
</dxl:ArrayComp>
<dxl:DefaultPart Level="0"/>
</dxl:Or>
<dxl:Or>
<dxl:ArrayComp OperatorName="=" OperatorMdid="0.96.1.0" OperatorType="Any">
<dxl:ConstValue TypeMdid="0.23
|
github
|
I found a few videos on YouTube I felt appropriate for what is going on around us. First is; Should I Stay or Should I Go? Many people struggle with the decision of leaving to preserve benefits taken by the mayor. The second video sums up the feelings of many in this; Health Insurance video. This last video is being played for the mayor by over 100 of our finest officers who are leaving a job they love. I hope the mayor likes Johnny Paycheck; he is going to be hearing a lot of him over the next 50 days.
The satirical humor is getting brutal around Headquarters. There is a group retiring who have begun calling themselves, "Gerry's Unenthusiastic Kid's" ; then there is a group who have taken on, "Kicked to the Curb Club" ; or the group calling themselves, "Gerry's Other Casualties" . There were others but I will stick to my pledge to keep the profanity out of my writings. The numbers are growing daily. I predict when the dust settles and the summer begins in full swing (July 1) the San Diego Police Department will have lost 140 of our most experienced, dedicated, professional; managers, supervisors, investigators, and officers.
I found it interesting today to see one of the City Council members pontificating on about "all those retiring are getting 'bonuses' from the City" when they sell or convert their annual leave upon retirement. I could not control my initial thoughts. This guy is a true idiot!!! Selling back earned annual leave is a "BONUS" to this maroon. My guess is the mayor's minions did not factor in (or did not share with council) the amount of money the city would be required to shell out when the most senior of employees left city service. Think of the numbers for a minute. Let's assume the average person with 30 year's service is holding 500 hours of annual leave. Multiply the 500 by the salary of the employee; let's use a Sergeant's base of $43.00 an hour (I'm picking a number for argument sake); the city is shelling out $21,500 for this ONE employee. Now for the San Diego Police Department we are looking at 140 sworn members leaving and taking an average of this $21,500 for a grand total of $3,010,000. That's right folks, three million dollars.
1 comment:
Retired Captain
said...
Spark
|
pile-cc
|
-54
Rearrange -17*b + 16 - 20*b - 39 - 2*b to n + z*b and give z.
-39
Rearrange -373*n - n**4 + 1205*n + 12*n**2 - 13*n**2 - 1 + 3*n**4 to i*n + m*n**2 + c*n**4 + q*n**3 + w and give i.
832
Express w - 42*w**3 - 2*w**2 + 104*w**3 + w + 1 + 3*w**4 - 70*w**3 in the form f*w**2 + p*w + a + z*w**3 + i*w**4 and give i.
3
Rearrange 0 - 23 - 1 + 23 - 732*j - 401*j to the form w*j + n and give w.
-1133
Rearrange ((-1 - 4 + 6)*(0 + 1 + 1) + 1490 + 4700 - 1685)*(-m**4 - 2*m**4 + 4*m**4) to t*m**3 + r + s*m**4 + i*m + b*m**2 and give s.
4507
Express (-75*c - 19 - 93*c + 213*c - 76*c)*(4 + 3 - 5)*(12 + 22*c - 12) in the form f + g*c + s*c**2 and give s.
-1364
Rearrange -2 - 26*n**4 - 16403*n**2 - 16394*n**2 + 32791*n**2 to l*n**3 + r*n**4 + j*n**2 + g + x*n and give j.
-6
Rearrange (-1 + 1 + m)*(-4993*m - 2318618 + 2318618) to the form a*m**2 + c + t*m and give t.
0
Rearrange (0 - 1 + 0)*(416*f + 330 - 182 - 147) to the form i*f + r and give i.
-416
Rearrange -109 + 81574*d + 81581*d - 148 - 163125*d to q + a*d and give q.
-257
Rearrange -5819*a +
|
dm_mathematics
|
Carolina Waingortin@ENRON
08/07/2000 08:23 AM
Sent by: Carolina Waingortin@ENRON
To: Scott Neal/HOU/ECT@ECT
cc:
Subject: Hi !
Do you remember me? If so, thanks ! !
I am sending you this mail since I will like to ask you something, I need to
contact someone who works on gas schedulling in order to ask for some help
|
enron_emails
|
claimed equitable relief in the form of front pay, see Traxler v. Multnomah Cnty.,
596 F.3d 1007, 1011 (9th Cir. 2010), the FMLA does not provide a remedy for an
injury resulting solely from termination for misconduct. See § 2614(a)(3)(B)
(“Nothing in [the FMLA] shall be construed to entitle any restored employee to . . .
any right, benefit, or position of employment other than any right, benefit, or
2
position to which the employee would have been entitled had the employee not
taken the leave.”); 29 C.F.R. § 825.216(a) (“An employee has no greater right to
reinstatement or to other benefits and conditions of employment than if the
employee had been continuously employed during the FMLA leave period.”). In
the district court, Silver did not dispute that Corinthian terminated her employment
solely due to her misconduct, barring any argument to the contrary on appeal. See
United States v. Kitsap Physicians Serv., 314 F.3d 995, 999 (9th Cir. 2002).
Silver waived any other theories of how Corinthian interfered with her
alleged FMLA rights by failing to raise them in the district court. See Baccei v.
United States, 632 F.3d 1140, 1149 (9th Cir. 2011) (“[W]e will not reframe an
appeal to review what would be in effect a different case than the one decided by
the district court.”).
Silver’s claim for wrongful termination in violation of the public policy
embodied in the FMLA fails, because she did not allege a causal nexus between
her termination and Corinthian’s failure to notify her of her potential FMLA rights.
See Dep’t of Fair Emp’t & Hous. v. Lucent Techs., Inc., 642 F.3d 728, 749 (9th
Cir. 2011) (citing Turner v. Anheuser-Busch, Inc., 876 P.2d 1022, 1034 (Cal.
1994)).
3
Finally, Silver waived her California Labor Code claim by expressly
|
freelaw
|
------
bsanr
>The only difference between the Web of old and the modern Web is that the
wild Web sometimes is harder do find due to the instrumentality of the Google
search engine, for good and bad.
For a brief period of time, every human with an internet connection had access
to a significant portion of the sum total of previously-preserved human
knowledge. Web 2.5 has pushed us backwards. After several years now of being
unable to easily find relevant results using Google, DDG, etc., I had the
crushing realization that, near 30 and for the first time in my life, _less_
truly useful information was available to me, to the average person, than had
been before.
This should scare people. Powers that are obfuscating both their rationale and
the mechanics of their means are making a play for our collective knowledge
base.
~~~
resu_nimda
Can you provide some examples of this? What types of information are you
looking for? Personally I have not found this to be the case, for example I
have effortlessly gained tons of information from instructional videos on
YouTube that would have been much harder to obtain otherwise.
Are you saying that informational resources are being forcefully taken down?
Or that their rankings are artificially lowered in search engines?
~~~
fock
search for some exotic aircrafts on google (e.g. "Polikarpov I-3", "Polikarpov
Il-400") - all you will find is wikipedia, scale-model ads and the odd
pinterest (which isn't usable without an account and often doesn't show what
was advertised on the page). I saved some pics when I was building the scale
model some years ago and I'm unable to find half of them in a google image
search today after scrolling so far that google is putting in non-I-3
polikarpovs for like all pictures... Also I think there was at least one
"book" on the type but I'm unable to find any in the first 10 google search
pages (who does that today...). For the latter I've had "bookmarked" an
altervista-blog full of pictures - it's still ranked high in pictures, but
basically invisible in search.
Duckduckgo is worse, it only has wikipedia
|
hackernews
|
The main objectives of this project are to determine whether the cancerous lesions produced by prenatal DES injections are caused by the chemical form of DES itself or one of its metabolic products; to determine whether DES is metabolized to biologically and hormonally inactive metabolites; to test the hypothesis that certain chemicals are "transplacental toxicants" due to their relative binding to plasma/receptor proteins; to investigate some of the biochemical mechanisms which contribute to results of prenatal exposure of hormonally active environmental chemicals in the
|
nih_exporter
|
The opening lectures, which formerly marked the beginning of a professor's duties in an academic institution, are important documents for science historians. Several opening lectures in chemistry (organic, inorganic, analytical, biological or medicinal chemistry), which were given by French pharmacists in the Ecole or the Faculté de pharmacie de Paris, in the Muséum national d'histoire naturelle in Paris, or in the Collège de France are analyzed. First, these lectures reveal formal aspects, such
|
pubmed_abstracts
|
Various institutional actors differ in terms of their powers to affect an organisation\'s outcome. The Chinese government, for instance, can exert a higher level of control on China-based technology companies. Their responses can be described as a habit -- 'unconscious or blind adherence to preconscious or taken for granted rules or values' (Oliver, 1991: 152).
Western technology companies, however, are required to appease a diverse set of competing institutions. These companies thus are required to decouple their responses.
Different theoretical contributions and various empirical studies have led to the accepted view that the exact nature of decoupling is a function of the perception of relative powers of competing organisational and institutional interests (Pfeffer, 1981a, 1981b; March and Olsen, 1989; Oliver, 1991; Zajac and Westphal, 1995; Westphal and Zajac, 1998, 2001). These studies also provide support for the notion that substantial responses cannot be made to appease actors that diametrically oppose one another. More to the point, the substantive response relates to the threat or opportunity associated with the actor that is perceived to be more powerful and the symbolic response relates to the threat or opportunity associated with the actor perceived to possess less power (George et al., 2006).
In this regard, it is important to note that China\'s online transactions were estimated at US\$125 billion in 2006 (Asia Pulse, 2006a). The Chinese government thus possesses enormous power over these multinationals. To gain access to the huge Chinese e-commerce market, Western organisations appear willing to take actions that are non-isomorphic with respect to their home country institutions.
To substantiate this claim, we began by arguing that the Chinese government has built 'The Great Firewall of China' with the help of foreign companies such as Cisco Systems (Gutmann, 2002; Shie, 2004). Cisco also provided China with hardware specifically designed to assist China\'s cyber police to conduct surveillance of electronic communications (Jasper, 2006). About a quarter of the vendors at the Security China 2000 trade show, many of them foreign firms, were marketing products aimed at enhancing China\'s 'Golden Shield' (Fackler, 2000). In short, many Western technology companies have chosen 'to co-opt the source of the pressure' related to cyber-control (Pfeffer and Salancik, 1978; Burt, 1983; Oliver, 1991: 157).
An important point to bear in mind
|
pubmed_central
|
Given $A\in M_{6} (\mathbb{Q})$ and $f(x)=2x^9+x^8+5x^3+x+a$, for what values of $a$ is $f(A)$ invertible?
Let $A \in \mathbb{Q}^{6 \times 6}$ be the block matrix below:
$$A=\left(\begin{array}{rrrr|rr}
-3 &3 &2 &2 & 0 & 0\\
-1 &0 &1 &1 & 0 & 0\\
-1&0 &0 &1 & 0 & 0\\
-4&6 &4 &3 & 0 & 0\\
\hline
0 & 0 & 0 & 0 & 0 &1 \\
0 & 0 & 0 & 0 & -9 &6
\end{array}\right).$$
I found out that the minimal polynomial of $A$ is $(x-3)^3(x+1)^2$, and now let
$$f(x)=2x^9+x^8+5x^3+x+a$$
a polynomial, $a\in N$. I need to find out for which $a$ the matrix $f(A)$ is invertible.
It has some similarity to to my last question, but I still can't understand and solve it. Thanks again.
A:
Expanding on the comment:
If $A$ has eigenvalue $\lambda$, then $f(A)$ has eigenvalue $f(\lambda)$. So $f(A)$ is not invertible if $f(\lambda)=0$.
A:
Theorem. Let $V$ be a finite $\mathbb{K}$-vector space and let $f \in \mathrm{End}(V)$ an endomorphism with minimal polynomial $m_f(t) \in \mathbb{K}[t]$. If $a(t) \in \mathbb{K}[t]$, then $a(f) \in \mathrm{GL}(V)$ if and only if $\gcd(a,m_f)=1$.
Proof. $\Leftarrow$) Since Bezout's identity, $1 = \lambda m_f + \mu a$ for some polynomials $\lambda, \mu$. So, evaluating in $f$, one has $\mathrm
|
stackexchange
|
The present invention relates to a collapsible lens barrel and an image pickup apparatus.
Some lens barrels incorporated in image pickup apparatuses such as digital still cameras, digital video cameras, etc. have a cam ring with a cam groove defined in an inner circumferential surface thereof and a lens holder frame which is nonrotatably, but axially movably held radially in the cam ring and which holds a lens assembly. The lens holder frame has a cam pin engaging in the cam groove such that the lens holder frame moves axially when the cam ring rotates about its own axis. For details, see Japanese Patent Laid-open No. 2002-267917, for example.
One such lens barrel is illustrated in FIG. 30 of the accompanying drawings. As shown in FIG. 30, the lens barrel has a linear guide ring 3 interposed between the outer circumferential surface of a lens holder frame 1 and the inner circumferential surface of a cam ring 2.
The linear guide ring 3 is nonrotatably mounted on the lens barrel 1 and has axially linear guide grooves 3A defined therein. Cam pins 1A of the lens holder frame 1 extend through the guide grooves 3A and engage in cam grooves 2A defined in the cam ring 2. The lens holder frame 1 is nonrotatably, but axially movably held radially in the cam ring 2.
With the lens barrel in related art, however, since the linear guide ring 3 is interposed between the outer circumferential surface of the lens holder frame 1 and the inner circumferential surface of the cam ring 2, it poses limitations on efforts to reduce the diameter of the lens barrel and hence size of the lens barrel.
If the lens barrel has two lens holder frames 1 (only one lens holder frame 1 is shown in FIG. 30), then the cam grooves 2A in the cam ring 2 which are engaged by the cam pins 1A, 1B of the lens holder frames 1 extend continuously circumferentially at least fully around the cam ring 2, and the cam pins 1A, 1B are guided at different positions in the guide grooves 3A in the linear guide ring 3.
The lens holder frames 1 are assembled into the cam ring 2 with the linear guide ring 3 interposed therebetween, as follows.
First, the linear guide ring 3 is inserted into the cam ring 2, and then turned to align the guide grooves 3A with open ends 2B of the cam grooves 2A in the cam ring 2. Then, the cam pins 1A of one of
|
uspto_backgrounds
|
At times personally conflicted about continuing Mormon Stories, Dehlin stopped and restarted the project a few times. In January 2010 Dehlin resumed the blog and podcast, focusing on faith crises, mental illnesses, and notable guests, beginning with interviews of Joanna Brooks and John C. Hamer. Among numerous other regular hosts who have joined Dehlin in conducting interviews for the podcast were Dan Wotherspoon, former editor of Sunstone magazine, and Natasha Helfer Parker, a licensed clinical marriage and family therapist.
In 2015, Dehlin said Stories episodes had "tens of thousands" of listeners and that the webcast's "goal has always been to alleviate suffering. It’s an act of love." Dehlin was excommunicated for apostasy by the LDS Church in 2015.
In 2016 the Open Stories foundation reported Dehlin's 2017 salary and bonus was $82,500 and $27,000 respectively.
Mormon Stories content focuses on the criticism of LDS Doctrine and Practices and advertises for Dehlin's faith transition workshops and life coaching services.
Criticism
In 2013, a critical review of Mormon Stories by Gregory L. Smith was published in Interpreter: A Journal of Mormon Scripture. In the review, Smith alleges that "Dehlin is frequently uninformed of the often controversial material he discusses with interviewees, and that he promotes views hostile to the foundational beliefs of the Church of Jesus Christ of Latter-day Saints". The pending publication of the piece catalyzed within the Mormon studies community a discussion (referred to by some as the Dehlin affair) about the roles of apologetic and non-faith-based scholarship, respectively, within the academic study of Mormonism by Mormons.
Guests
Featured guests of the podcast include Latter-day Saints considered orthodox, "curious," doubters and heretics. These have included:
Guests have also included an number of "NeverMos" (short for "never-Mormons") who have either backgrounds in "comparative religions/cults" or histories of being associated with the Church of Latter-day Saints without ever becoming members. These include:
See also
Bloggernacle
Blogs about Mormons and Mormonism
Sunstone Magazine
Stay LDS
References
External links
Mormon Stories: A Note
|
wikipedia_en
|
Microscopic considerations
--------------------------
As mentioned in the introduction, the gauge field ${\bf a}$ has no dynamics in the original U(1) microscopic model, as it only serves to enforce a constraint on spinons and holons. The stiffness term (\[fgauge\]) in the effective theory was assumed to arise in the process of integrating out the microscopic degrees of freedom[@sachdev1; @lee3]. While such term is certainly permitted by symmetry, assessing its strength $\sigma$ is a nontrivial issue since even deep in the superconducting phase neither holons nor spinons are truly gapped. Thus, in general, integrating out these degrees of freedom may lead to singular and nonlocal interactions between the condensate and the gauge fields. To our knowledge the procedure has not been explicitly performed for the U(1) model and the precise form or magnitude of the gauge stiffness term is unknown. General considerations[@nayak1] suggest that the gauge stiffness term is negligible in the class of models with exact local U(1) symmetry connecting the phases of holons and spinons.
Consider now an intermediate representation of the problem where only high energy microscopic degrees of freedom have been integrated out. In the presence of a cutoff this is a well defined procedure even for gapless excitations, as explicitly shown by Kwon and Dorsey[@kwon1] for a simple BCS model. The corresponding effective Lagrangian density of the present U(1) model can be written as $$\begin{aligned}
{\cal L}_{\rm eff}&=&
{\kappa_\Delta^\mu\over 2}(\partial_\mu\phi-2a_\mu)^2
+{\kappa_b^\mu\over 2}(\partial_\mu\theta-a_\mu-eA_\mu)^2
-f_{\rm amp} \nonumber \\
&+&(\partial_\mu\phi-2a_\mu)J_{\rm sp}^\mu
+(\partial_\mu\theta-a_\mu-eA_\mu)J_h^\mu \nonumber \\
&+&{\cal L}_{\rm sp}[\psi_{\rm sp},\psi_{\rm sp}^\dagger;\rho_\Delta]
+{\cal L}_h[\psi_h,\psi_h^\dagger;\rho_b] +{\cal L}_{\rm EM}[A_\mu].
\label{leff}\end{aligned}$$ The Greek index $\mu$ runs over time and two spatial dimensions, $\kappa_i^0$ are
|
arxiv
|
{
std::ofstream command_file(command_file_name());
// This marks the command file as UTF-8, which Visual Studio
// understands.
command_file << char(0xef) << char(0xbb) << char(0xbf);
command_file << "/nologo" << '\n';
command_file << "/E" << '\n';
// This option will make CL produce utf-8 output, as
// opposed to 8-bit with some code page.
// It only works on Visual Studio 2015 or newer.
command_file << "/source-charset:utf-8" << '\n';
command_file << "/D__CPROVER__" << "\n";
command_file << "/D__WORDSIZE=" << config.ansi_c.pointer_width << "\n";
if(pointer_diff_type()==signed_long_long_int_type())
{
command_file << "\"/D__PTRDIFF_TYPE__=long long int\"" << "\n";
// yes, both _WIN32 and _WIN64 get defined
command_file << "/D_WIN64" << "\n";
}
else if(config.ansi_c.int_width == 16 && config.ansi_c.pointer_width == 32)
{
// 16-bit LP32 is an artificial architecture we simulate when using --16
DATA_INVARIANT(
pointer_diff_type() == signed_long_int_type(),
"Pointer difference expected to be long int typed");
command_file << "/D__PTRDIFF_TYPE__=long" << '\n';
}
else
{
DATA_INVARIANT(
pointer_diff_type()==signed_int_type(),
"Pointer difference expected to be int typed");
command_file << "/D__PTRDIFF_TYPE__=int" << "\n";
}
if(config.ansi_c.char_is_unsigned)
command_file << "/J" << "\n"; // This causes _CHAR_UNSIGNED to be defined
for(const auto
|
github
|
Next up was the helmet monogram. Equibox has a million different designs and colors, so I was able to select a size, design and color to fit my personal style. Once it arrived, I was thrilled with my choice. It matches the design of all my other monograms, plus I’m pretty particular about the shape of letters and these were perfect. After the initial wonder of how gorgeous the product was wore off, I have to admit, I got a little nervous to put it on. See, I wanted to put it on my IRH, which is velvet (not my plastic Samshield) and I am not crafty at all. So I worried: would it work? Would I struggle? Would it even stay on? So I procrastinated a little bit… but I finally bit the bullet and did it. Equibox Equestrian sent detailed instructions, and I’m so grateful that they did — it took all my anxiety away as I read just how easy it was. Literally all I had to do was peel one side of the backing off, press it on, and peel the other side off.
I held my breath and looked… IT IS PERFECT. Smaller than most, yes, but exactly the understated personal touch I was looking for. And it’s held up for the last month with no issues whatsoever; no peeling, no fading, nothing.
The Recommendation
Equibox Equestrian is the real deal. If you’re looking for high-quality, custom products made by a store that values customer service above all else, this store is for you. Their products are well made, unique and the application (if needed) is foolproof. I honestly cannot say enough to express how truly impressed I am with Equibox. I love my bridle charm, it suits me so perfectly, and the monogram is just my style. And trust me, it’s not always easy to please this hunter princess.
Equibox Equestrian
98.4
Quality
10/10
Durability
10/10
Style
10/10
Value
10/10
Customer Service
10/10
The Good
Beautiful Craftsmanship
Unique Designs
Tons of Custom Options
Amazing Customer Service
The Bad
You also might enjoy:
Fly
|
pile-cc
|
-300000
Let t = 9294452.0000028 - 9294449. Let v = 3 - t. Round v to six decimal places.
-0.000003
Let m = 0.12247 - 0.198. Let d = -0.13402 + m. Let q = d - -0.21. What is q rounded to four dps?
0.0005
Let l = -16 + 16.000056. What is l rounded to 5 decimal places?
0.00006
Let c = -0.4 + -0.6. Let g = -0.6 + c. Let w = 1.60069 + g. What is w rounded to four decimal places?
0.0007
Let z(j) = j - 14*j**2 + 20639*j**2 - 1 + 5. Let p be z(-4). Round p to the nearest one hundred thousand.
300000
Let k = 63.000025 + -63. What is k rounded to 6 dps?
0.000025
Let f = -0.008 - -0.0080046. Round f to six dps.
0.000005
Let q = 0.45 + -0.450084. What is q rounded to 5 dps?
-0.00008
Let h = 17 - 14.2. Let y = -12.2 + h. Let w = -3.6 - y. Round w to zero decimal places.
6
Let q = -11.00011 - -11. Round q to five decimal places.
-0.00011
Let g be (-11)/(11/600)*210. Round g to the nearest ten thousand.
-130000
Let o = -126 - -253. Let m = -124.14 + o. Let b = m - 2.733. Round b to 2 decimal places.
0.13
Let g = 68 + -66.86. What is g rounded to 1 decimal place?
1.1
Let l(t) = 751*t**3 - t**2 - 2*t. Let c be l(2). Round c to the nearest one thousand.
6000
Suppose -5*l - 19181 = -405946. Let p(y) = -444*y**3 + 3*y**2 +
|
dm_mathematics
|
John Pavetto@ENRON
01/17/2001 05:26 PM
To: Tana Jones/HOU/ECT@ECT
cc:
Subject: Re: RUSH HELP NEEDED
Tana,
I have no idea what Octopi is..
From: Tana Jones@ECT on 01/17/2001 05:23 PM
To: John Pavetto/Corp/Enron@Enron, Mary Weatherstone/HOU/ECT
|
enron_emails
|
Q And
what discussion was had with Mr. Duenas about his document?
A I
explained that I would offer to each of them two documents. I turned to Mr.
Duenas and I said, “This document, the first document, is an affidavit that
acknowledges your paternity.” And I, knowing that sometimes legalese is
intimidating for laypersons, I asked, uh — I kind of made sure that they were
aware in common English what that meant. I said, “By signing this document,
you’re admitting that you’re the father of these children.” And there’s some
other reference, statutory information.
Q Okay.
Now, did he say yes, he understood, or no, he didn’t? Or did he acknowledge
anything?
A He
didn’t really acknowledge either way. He just looked at the document.
Q Okay.
Now, with regards to the Affidavit of Relinquishment of his parental rights, did
you explain what that document was?
A I
did.
Q And
did he make any response whatsoever to your explanation?
A Not at
all.
Q Okay.
Was there any discussion amongst the people in the room whether he understood or
whether he should have a translator or anything?
A The
documents that I offered first, the Affidavit of Relinquishment, as we were
going through the form and I was explaining it to him, and I use the same term
each time, “By signing this document, you fully, finally, and forever give up
all parental rights to these children.” As I was going through that, Maria noted
— she was sitting across from Mr. Duenas. She noted that her name was spelled
incorrectly on the document.
Q Okay.
So what happened then?
A Well,
at that point she corrected the spelling of her last name. I went back and
corrected all the documents. And this is after he had signed it, okay.
Q So,
then, he had to resign the documents, is that correct?
A That’s
correct
|
freelaw
|
What Iceland is doing is actually developing an energy source.
~~~
Sharlin
Iceland has also been utilizing its geothermal resources for centuries.
Currently circa 22% of their electricity and 87% of the heating and hot water
needs are met using geothermal energy.
~~~
accountyaccount
The sulfuric smell in the hot water takes a little getting used to, but it's
pretty amazing that it's naturally heated in most places throughout the
country (though, a bit easier in such a tiny country).
~~~
avar
The sulfuric smell in the hot water has nothing to do with the use of
geothermal power. Most tourists think so because they've only been to or near
the capital area.
Reykjavík artificially adds sulfur to its hot water to reduce the corrosion of
their hot water pipes.
I can't find a source for that in English but there's one in Icelandic, it's
the "Vinnslutæknileg vandamál við vinnslu jarðhita" section.
1\.
[http://web.archive.org/web/20160813045634/http://www.samorka...](http://web.archive.org/web/20160813045634/http://www.samorka.is/doc/1368)
~~~
accountyaccount
This seems contrary to most tourism information, and that PDF is pretty much
the only source I can find... interesting. So they intentionally make their
hot water non-potable to prevent corrosion (the bulk of tourism info
recommends not drinking the hot water)?
Seems like Iceland could really use some sort of myth/fact information as they
continue look to grow their tourism.
~~~
baq
You should never drink hot tap water from any source unless you boiled it
yourself using cold tap water in a kettle somehow anyway. There's increased
likelyhood of bacteria and trace heavy metals from whatever heating equipment
was used. Totally not worth it.
~~~
robocat
Probably OK to drink if you use a gas or electric califont (zero hot water
storage).
------
idlewords
Do you want to get firemonsters? Because this is how you get firemonsters.
------
awqrre
It would be cool to 3
|
hackernews
|
A variety of cancer sites and exposures have been explored, with many investigations involving multi-disciplinary approaches to understanding biologic mechanisms of carcinogenesis. Of particular interest has been the relationship of exogenous hormones (menopausal estrogens and oral contraceptives) to risk of both breast and endometrial cancers, with several recent investigations focusing on the effects of the increasingly prescribed estrogen-progestin therapy. In addition, studies have addressed reasons for varying geographic breast cancer rates, including occupational and environmental agents. Taking advantage of recent improvements
|
nih_exporter
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.