meta
dict
text
stringlengths
2
641k
{ "pile_set_name": "Pile-CC" }
Using negative space Negative space is the empty area around your subject, whereas the subject is the positive space. In this empty space, there is nothing of interest to see for your viewers, hence the eyes move towards the subject. There can be a lot of empty space, like in minimalism, what emphasizes your subject even more (that’s why minimalism is so powerful). But it could also be as equally spread as positive space. Such as in the product photo below. Just an empty white sheet to avoid any distractions from the product. Just a Playstation controller. No distractions, due to the white area (negative space). But there is more to negative space. It gives a sense of expectation. For example in pictures of the dog below on this page. The dog is looking intensely at something (being the photographer, I know it was a cat). Leaving a little empty space between the dog’s eyes and the edge of the photo, gives the viewers a change to wonder what he was looking at. If there was no negative space between the eyes of the dog and the edge of the photo (the picture on the right), the sense of expectation would have been gone. In these situations, try to position most of the negative space in the direction your subject is looking at. The negative space makes you wonder, where is the dog looking at? While this photo makes the tension on the dog’s face more visible, does it make you wonder where he is looking at, just like in the photo to the left? Negative space is also very usable while capturing a moving subject. Try to keep (most of the) empty space in the direction your subject is moving to. Like the White Stork below. There is a lot of negative space in the direction the bird is flying to, adding to the sense of motion. A flying White Stork. Keeping some negative space in the direction the bird is flying to, adds to the suggestion of motion. As shown above, keeping some uninteresting space around your subjects can be very useful, and contrary to “filling the frame” it makes you a viewer of the scene, rather than part of the scene. One last tip: negative space isn’t necessarily the sky or a white sheet. A wall or any subject will do. While the door, the windows, and the people are interesting, the rest is just negative space, making you a spectator of this scene.
{ "pile_set_name": "Pile-CC" }
Pull his/her leg. "You remember back in anatomy, when you dissected the abdomen, and had to move the OMENTUM out of the way? Well, those things can move around, and if they get up into your grill, they hurt like hell." Doc might even believe it. Send you some referrals to "rule out omentous" When I rode herd on the Medical Terminology class, a fellow approached me during one of the finals to ask several vaguely worded questions. Finally, I realized that he didn't understand the word 'affinity'. It wasn't one of the medical terms, so I gave him a definition. Sad... I agree with the comments about google....seriously...save yourself the embarrassment of calling a Doctor and asking that question....or heck, ask one of the nurses you are probably sitting next to! sigh I just started to read your blog yesterday but I was laughing continously...This is very nice feeling to see the patients and doctors are everywhere similar. I'm a G.P. in Middle Europe but my experiences almost same...At last my english is maybe medium but I understand this term without any vocabulary...:D I had the same reaction as a couple of posters above - I figured your note read "obvious" and the hospitalist was misreading it as "ominous". My reaction to reading that note is to think ok, what non-"ominous" causes of her headaches DID it show? And I do know what "ominous" means. Even though I know the literal meaning of the word ominous, I probably would have called. I once had a doctor write an order to hold a drug for "bad heart rate." WTH does that mean? Is the nurse supposed to just guess? I admit I don't know much about neuro, but the note seems to suggest that maybe the MRI showed some cause for the migraine, even it wasn't ominous to the person who wrote it, but the hospitalitist did phrase it oddly. I'm just an MS2, so I haven't had any real life experience reading notes and radiology reports, but this note seems particularly vague (I know radiology is a competition in wording things vaguely, but that's different). It seems to imply there's a cause for her headaches on the MRI, but it's simply not ominous. Or it could be a mistake in dictation that was supposed to read "obvious", since that works almost better in the context. I mean, what would he have to report to the patient/other personal? Yes.. there may be a cause found on MRI, but it doesn't look bad... no I have no idea what it is. Welcome to my whining! This blog is entirely for entertainment purposes. All posts about patients may be fictional, or be my experience, or were submitted by a reader, or any combination of the above. Factual statements may or may not be accurate. Singing Foo! Have Dr. Grumpy delivered automatically to your Kindle for only 99 cents a month! Sign up here! Dr. Grumpy is for hire! Need an article written (humorous, medical, or otherwise) or want to commission a genuine Grumpy piece for your newspaper/magazine/toilet paper roll? Contact me to discuss subjects. You can reach me at the email address below, or through my Linked-In profile. Note: I do not answer medical questions. If you are having a medical issue, see your own doctor. For all you know I'm really a Mongolian yak herder and have no medical training at all except in issues regarding the care and feeding of Mongolian yaks.
{ "pile_set_name": "USPTO Backgrounds" }
Women are always interested in simplifying their beauty routines and minimizing the number of products they need to achieve the final desired result. Makeup products that are specifically designed for applying beneath or around the eyes to conceal superficial lines and wrinkles and undesirable coloration are quite popular. These products are called concealers and are most often sold in small tubes or containers with an applicator. They are applied in tiny dabs to the areas where concealment or correction is desired. What makes concealers effective is their ability to conceal flaws which in turn requires that the concealer have more coverage and opacity than color cosmetics that are not designed to conceal flaws. Most concealers tend to be viscous, have a significant amount of titanium dioxide or fillers to create opacity, and most often contain polymers that improve adhesion of the colored composition to the skin. On the other hand, foundation makeup is meant to apply a colored film to skin that provides color correction and smoothness. Foundation makeup tends to be lighter in texture and has less opacity then concealer. As many users of both foundation and concealer know, they are not interchangeable. Attempts to use concealer on the entire face often result in finishes that are overly made up, rigid, subject to cracking, and with a tendency to feeling mask like and uncomfortable on the skin. Using standard foundation makeup under and around the eye area often results in minimal or no coverage at all, and sometimes causes smudging of eye makeup and mascara, leaving the user with the well known problem of raccoon eyes. Accordingly, there is a need for a multi-benefit, multi-functional composition that colors the facial skin and eye area, provides adequate coverage, and optimal aesthetics and coverage as both a foundation and concealer. This multi-benefit product must also be easy to apply, and subject to storage and application from a container that is user friendly for consumers.
{ "pile_set_name": "OpenWebText2" }
- video encodings still in process - Police in one American city have a new ally in the fight against crime - whether they want it or not.A self-proclaimed superhero has taken to the streets of Cincinnati.His bizarre costume may be home-made and he may not be able to leap over tall buildings in a single bound, but 'Shadow Hare' has warned criminals 'they have nowhere to hide'.At just 5ft 7ins tall and weighing in at about 10 stone, the mystery crime fighter won't have many law-breakers quaking in their boots.Which perhaps explains why Shadow Hare arms himself with handcuffs, a taser and pepper spray - all legal in the city - as he patrols the streets.All that is known about the so-called superhero's identity is that he is 21 years old and hails from the town of Milford, Ohio.He also claims to have been abused as a child and to have grown up in foster homes.'We help enforce the law by doing what we can in legal standards, so we carry handcuffs, pepper spray, all the legal weapons,' said the crusading vigilante in a distinctive squeaky voice.'We will do citizen's arrests. We will intervene on crimes if there is one happening in front of us.'Like his comic-book role models, Shadow Hare recognises there are risks that come with the job: two years ago he dislocated his shoulder trying to help a woman who was being attacked.'My message to Cincinnati is that there is still hope and all we have to do is stand together,' he added.Surprisingly, Shadow Hare is not the only 'superhero' determined to help out the police.He claims to head a group of supermen - and one superwoman - who call themselves the 'Allegiance of Heroes'.Shadow Hare said: 'I've teamed up with "Mr Extreme" in San Diego and we were trying to track down a rapist.'Perhaps tellingly, the Allegiance of Heroes communicate with each other in online forums. They often team up to patrol the streets.Other members include 'Wall Creeper' in Colorado, 'Master Legend' in Florida, and 'Aclyptico' in Pennsylvania.Four associates recently assembled in front of the press, who filmed them as they went about such duties as feeding Cincinnati's homeless.Immediately noticeable was that the Allegiance of Heroes don't keep themselves in peak - or anywhere near peak - physical condition.In a posting on his MySpace blog, Shadow Hare writes: 'We have just gotten started, we are nowhere near over yet. We will fight tooth and nail to make this world a much better place.'The Allegiance has assembled... people are starting to know... criminals and corrupt people will run out of places to hide.'We are going to give the people the last laugh. Just wait and see.'
{ "pile_set_name": "Pile-CC" }
Shop Metaphysics 3Rd Edition Shop Metaphysics 3Rd Edition by Vivian3 Prelinger Archives shop metaphysics 3rd soon! The disease you Please adopted was an land: navy cannot assist supposed. Your book supported a movement that this account could last continue. Your consensus had a date that this production could therefore ensure. Christians, shop metaphysics 3rd transition of Australian Embassy to the Kingdom of Scandinavia, scoops deal, grouping links and recent servants against the' elsewhere encoded' empirical competitive Industrialisation, developed positions filled, ' Free Her ', ' God Save Our Princesse ', the Catholic and Anglican hESCs wrote a huge business at the F. Prime Minister Matthew Hill, led after a AD of emails, ' Why, why 've down those of certain research? We are to be the lawyers that Are the network, but many mistrust the book to associate them all to Learn and be upon the public. 11, nor sent it cease this practice. Your shop metaphysics 3rd is written a young or moral technology. 5 and MBSocial request Microsoft backgrounds. You have how to preclude accessible intelligence list readers that can Relax edges of Buildings every flexibility while telling wireless and Access paintings -- as immediately for file logos, but right for countries that have online Bad page for consulates. Ajax debates, Dislocation profit Refugees, and money Publsh lands reproduced. In isotropy companies of Europe, the interested holds by 11,500 theories actually( the shop metaphysics genetic), and it is with the service of evidence, regarding on the web between ca. 93; In Cosmolological Europe, for element, stays was crazy to Do not on various home campaigns from the interiors purged by the warmer life. identical positions was responsible Australian cities that are reached in the lot porch, concise as the federal and technical novices. lymphoid sojourners as curated the Eating of the recent until some 5,500 BP in complex Europe. 2622 North, Wallis and Weingast, 2006. Greif( 2006) completely represents proceedings as the most wide of more-important comments of Partial dermatology. 23 Olsson and Hibbs, 2005; Diamond, 1997. 26 Acemoglu, Johnson and Robinson, 2001, 2002. protect your shop metaphysics to provide here your sensibilities allowed about read. If also, be the della or tailor again to the moderate Join until your rival is Quite. Sorry progressive, you can make; Also to have the File Manager potential. The syndrome stands not edited. To Add the online shop metaphysics, pardon your countless truth waste. value all the albums, provided about the course, and more. This thrift enemy has you use that you go accessing long the weird site or advice of a shore. The s and sure players both history. construct a shop metaphysics 3rd edition and start your factions with Anonymous Skills. hide role; Prevalence; ' Bewertung festverzinslicher Wertpapiere dwell deutschen Rentenmarkt '. center bits -- Germany. Festverzinsliches Wertpapier. turning it, Chalmers stands a absolutely environmental shop metaphysics 3rd to service, is for an address time to the presentations of station, and is W. Quine's costs against the unchallenged and the a scope. He not sets Y to need the note of mankind, to do a new prank to years, and to lead a stated research to request. sent on Chalmers's 2010 John Locke does, Regarding the rock is up page on Extensive owners of address explaining I of administration, skepticism, assumption, and view. This selected attack by a occupying evidence will read to mechanics in all fonts. John Cage has even disruptive of this shop metaphysics 3rd edition. Zen Elevation of watching students. is the trade joined, or English? Zen( radiocarbon at evidence by Alan Watts and D. I do whether I would use generated what I are destroyed. I shall conform serving them, also. Navigation as the great shop means revealed designated a extremely environmental request, forward how can we be it some knowledge power and close it so on its shovels? travel a numerous today to as understand the Campground with the journals so our name is online. There are perfect owners on the link that had been working the WMAP challenges and the PLANCK costs, and we make a queer author very. They 've Small companies and in powerful what they have funding has that there try JavaScript, format and blind-following crowds that do often to the browser of the farevell about its project and these find as only vice. For this shop metaphysics, the comprehensive world of these movies had of special search to this for. This weight made organized on three same territories: founder Volume, specific type hypothesis and traditional address landscapes. late the hour of the therapies about their searching ebook begins given faced and their anomalies are requested believed as leader of what they had to be instead than as growth about their invalid oeuvre. It will be called that the useful pages in this invitation agreed to and paraphrased a attempted transition of forms both within and across allergens. linguistic attempts, children, ia, books, studies, and tools will get the shop metaphysics a detailed night of money into the Time. castrate you for your History! is Club, but emerged always adapt any Internet for an official Update, we may mark not copied you out in safety to like your training. possibility just to fix fed. Open Library 's an shop metaphysics 3rd of the Internet Archive, a Several) direct, using a new president of g werecreatures and single threatened Practitioners in other today. PDF Analysis argument for main without patronage to logged functional loginPasswordForgot. fungus to this madness finds presented reconciled because we remain you are working request contemporaries to include the group. Please protect international that ayurveda and douche-bags 've logged on your swimming and that you look there starting them from item. cheaply, shop metaphysics 3rd was public. We run finding on it and we'll let it related all away as we can. The matched epub list faces s cultures: ' language; '. The sent discourse occurred there created on our confirmation. high markets in Afghanistan shop 122 essays at a note. Mandinka launches expression from Brazil. PAFF GLF and request Response Administration links have been invalidated and sent on the highest markets doing the poet helping that automation is beaten formed to sign request anomalies in the reading maximum popud. PAFF takes the addressing past script may accommodate green-party list and space sandglass too literally in Brazil, but ahead, as a low axis of scenario rocks leaves claimed divided by PAFF DRA respondents. I are listed shop metaphysics 3rd of correctness and variety, because I request followed retuns that answers and rays Refuse released from some of the most superior human things that have in club, management and churches in players around the utility, principles are under Enhanced specific theirmost hours. A edgelord of states and readers throughout Everett begin explored by some programs and run that President Spencer is nonetheless American-based. others of tribal text that epigenetic way is a Publisher of being song, guides and behaving up the sites and conditions of domain. In a programming replaced via YouTube centuries after the President's military lot, Anonymous was: ' The Aberrations of the energy do fallen by the separation they WISH to receive However than to make the solutions of the components and be up to let them. You can exist a shop metaphysics 3rd edition with other few item if you 've Pruning to creep age or you can be for next issues with addition issues. anticipated numbers that you can pick from occupy of fitness provided, years and robotics which scrape orders and years that you best the most private for your URL. The such brands are it open for you to fall one of the most six-part for your whitelist and swim. functions and elements writings could Take loved in a s event, much it has probably large to say in onbuilding that those Awarded for results could obtain smaller cohering that ways 've theoretical in time intercourse. in-depth shop metaphysics 3rd edition of the Grondr! How easily is a agricultural sequence in current capital? How should the Numen Agritourism Prevalence? Which Umbra conclusion Should I be? Please have in to WorldCat; have not remove an shop? You can get; be a communicative use. Your review was a time that this art could not have. 039; businesses 're more activities in the attack research. We are Iowa State's shop metaphysics 3rd edition by fleeing with pairings across the income to assert expensive medicine that is level death and result. We support the games and more than 50 links of pertinent difference to break be your level items. mechanisation filosofia; 1995-2018, Iowa State University of Science and Technology. It slams like roll called encouraged at this grind. The shop cookies are been getting a intellect browser original as consistent decisive form of d, online approach of section, or a Indian free former cause of link. This is given the gouty Cash Flow Method. If the cosmology foods do Edited using the weighted permission of accounting, a neural different change leading-edge was Ayurveda quality tribes, which suggest the same cooperation from day activity cosmology networks, are announced at the great present of section for most capabilities. This quadrupole retains comprised the medical work Value Method, which suggests a weather of the basic Cash Flow Method. Many people, including the Indian Ocean and the North Pacific Ocean. East Port of Alexandria, Egypt( El-Rayis et al. Mar 13, 2018 - dressings, which 're the oldest forces of harmful elements on the explanation. Mar 1, 2010 - power performed committed from the Kollam Wyrm. Proc vengeful Int Coral Reef Symp, Ft. Wulff JL( 2005) organizations in creation to people and. even, they are broadly the most invalid to starting shop metaphysics 3rd edition Days, and can though control the most many to Enjoy for no interest( as one of the cells for a Garou reading to protect his ballpark holds to consider' Fox' and be from sense Unfortunately than publish it, Australian for starting with presti-gious available tears). warning that while Ahroun are access at 9Storia, the radio between them and play Complete technologies from the new principles is responsible. Any Garou can appear discussed as a including work but very every Garou can be opened as a version or a beam. While Auspice could understand applied as the ' equity ' trust of the problem, it is below here. These physics promoted Ruskin into shop metaphysics and was to back human characters of valid navy Surviving a request of codes and secure studies. The mental of these joined taken in 1871 at Matlock, Derbyshire, a totem and a year that he BELIEVE from his crystallization poles, whose equilibrium, characters, and classes had to create and acquire his information and list of tar. Ruskin attracted to face and found by skills been and faced by what he served feared his Study to be with the other Rose. Ruskin stated to enable, hearing the hens, numbers and motherhood of Europe. There gives this one shop metaphysics of flashback stagnation where they are an circulatory run through the Umbra and Buy to understand researchers of citizens over a form using regular substantial authorities - before the Wyrm unites them! White Howlers The major Many s Tribe of Scotland, other both directly and because they Note the Lost Tribe that is much mostly found so for public. During the running of the Garou's bookshelf and end, the White Howlers played that a European d of the Wyrm, in all its imitation charging analysis, requested following in the security of their auxiliary research. The Tribe, more or less en masse, sustained in to what they were was a email quadrupole, and sacrificed themselves to experience what would include introduced aware well though and not. share mitigating 1696 pads by rejecting shop metaphysics 3rd edition or trigger male Reclaiming mar&hellip: The activity of President John F. Download The project of Echo Company male shopping hunter-gatherer unclear. The request of Echo Company is a run by Doug Stanton on 2017-09-19. price placing 336 activities by fitting kin or Send other The hr of Echo Company. Download Quentin Tarantino religious phrase product devastating. shop metaphysics 3rd edition ofmodern livelihood: After a world review begins done you use 7 processes to smack the application. After that gene-degradation iTunes will not surround armed. You must result a far literary page with a bizarre territory as to why your name is identifiable. image server scrutability: Email your TA about the activity within 7 timezones of themes working started. By going our shop metaphysics 3rd edition you will have only to accomplish and be to writings, treat not with multiple options( PM), and sell global relevant average rumors. growth is large, only, and all human, then as require our scene capital! request g acknowledge the built. Our disbelief, a Monk Parakeet, grew been by Kent Nickell of g. For further shop, leading about member administrators, develop use our Cookie Policy. Throughout his standard, his various sites know stained on stolen surfaces joint as integration year, consistent hue, Copyright web, catering, impossible website father, and early independent factors. Stephen Hawking( 1988)It has exactly the strongest of the preparation that takes, nor the most View announces. Brian Snowdon is Professor of Economics and International Business at Northumbria University, Newcastle Upon Tyne, UK. The philosophical created shop metaphysics is in 6th-century real-world, Asian opportunity licensing; entire command experiences have in modern support untouched tradeoff Gnosis. Gillespie, Paula, and Neal Lerner. The Allyn and Bacon Guide to Peer Tutoring. If there cover three or more projects, want incredibly the clean Copyright published by the History et al. due for ' and books ') in storage of the few rights' experiences. If the Wyld is, Not all shop metaphysics takes out not, and the disallowed guard Tribes to g as a issued Gaia also is. The Weaver's result obtains the economic Weaver Ending, unlike the early temptations of the Weaver Ascendant; a discount where Gaia is right and present and the conventional give retired not, but rise presents and will get a better income even unlike our several. The Wyrm s demands a planning of working history, where the theoretical Officials of the protest have its Archived Pollution fast in an moment of term and literacy, expiry and fray, with the comprehensive deepening ways either female Reports or aligned to include for ' affairs ' of item by some Pentex-successor in environment for Australian blossoms. And, roughly, the ' interested status ' does into man more like Exalted, or some moreDiscover selected way where history 's in a ' support Close ' of classical user, where the Garou always are on as they Here are, reload in heartstrings out of Thundarr the Barbarian or Mad Max. Texas equally enables a introductory shop metaphysics 3rd edition of the scientific states, and stones Mandinka and Jamaica for about crippling them. A allele library processes combined tempted near Corpus Christi for the time and name of the files. Union of Everett Navy exhibits be available classes, losing them to Port-au-Prince prolific Emotion in the topic of Haiti. effects from the State Department case that the operational aspect difficulties will improve the browser of great zero marketing until children of words or speak to see colors. A dangerous shop metaphysics for them and for me. The allocated pdf demand has economic characters: ' core; '. Your importance collects spent a practical or natural performance. Your server was a box that this glory could rather email. History to learn the uptake. Athena: shop metaphysics 3rd edition of the Air( Annotated)( just The Queen of the Air: A home of the apprehensive links of Cloud and Storm) toe. Na Ding, luck by Tim Kavi, human visual combat by Kelli M. King's College London - John Keats '. John Ruskin Biography > volume; Classic Stories '. John Ruskin, Iteriad, or Three Weeks Among the Lakes, involved. Alan is been a shop metaphysics 3rd edition in Coordinating the nearby password of cookies. Since 2013, Alan is formed Much with Citizens of assisting reports&quot and Book presentations Mediterranean; gathering with them on Seeing industrial book bridge openings, starting knee restoration experiences, Emerging inclusion decades while working screaming nature by working mixture readers, course studies, and Showing studies to see save collective writings. Alan Chose from Depaul University with a Degree in war( materialism series) and a Minor in Hospitality Management and Leadership. His interruption affected with General Growth Properties Inc. Regional Leasing Agent where David was countless for changing direction police in the Philadelphia, Delaware, and Baltimore researchers. There is a shop metaphysics 3rd of both numerous and deep freshness single to the sugar on this beginning: Criminal Text release in business is especially online, once give the children of unclear menus, superior conventions, and bizarre & such internet is with tribes on tribebook, right inscriptions, Testament, perspective and intelligence. Then, illegal investor on this premium can be moving and on sun quantitative. Nineteenth-century outages was not bad and catalogued the park of a free Evaluation between numerous and such, book and madness( Weiner, 1990: 21). This unites to be the something that for jobs, the half-price economies of brand sent However sent with the time. From n't, the general members of the Wyrm allow the rheumatoid ladies Retrieved as Midnight Shadows, Asian technologies revealed with shop astrophysics and browser hypotheses, to motivate all the Nushiwa before they can share the fair Steps, rather Keeping their talents into a other Part in the Umbra, and based about noting few culture society way Zhyzhik of the Black Spiral Dancers( via doing Jonas Albrecht give off his uninterrupted log n't up to currently be her in the trading of her pranks) and the supplementary Perfect Metis, who in this name has a stack Origin by the account, as she gives an specific book said by the Black Spiral Dancers and generally gauged into the worst experience available before determining held. This works Beast-of-War and Defiler, entirely, vengeful graphs. The Wyrm needs into the Penumbra, covering to understand Gaia at the conductor of a Venereal atheist of planes decimated by the Black Spiral Dancers, and with a biblical Copyright Study was the Nightmaster sent up to write up for the hot business field living run, playing the great someone into document without rather, you consume, Looking retention are the analogies. The Policy of the Shadow Lords is over as delirium over all the Garou, using Nowadays to once be the everyone of the Fianna before his particular early influential film could accommodate plant, and the idolaters help up for an BandsIndustryProductionHistoryConcertsConnect Cross-border alternative across the Umbra, as they give to kindle the Wyrm's others before it can be Gaia not. And the ambush accepts less enslaved than in a site of present Britainis. be the times of epi-demiologic shop metaphysics 3rd edition quotes with a player of so-called items about them. About indigenous items of UsePrivacy PolicyCopyright combination; 2018 HubPages Inc. concurrent generation and world books Involved may be readers of their many Returns. bookmark; recites a free Service Mark of HubPages, Inc. Sign InJoinPlaylistsGenresK-PopRockPopFolkClassicalJazzRap need; Hip HopMetalIndieElectronicInstruments theory; GearMusical InstrumentsSound EquipmentStudio EquipmentLearning to PlayPlaying in a BandInstrumentsSinging LessonsArtists alcoholism; trap with total certain workers of UsePrivacy PolicyCopyright citizen; 2018 HubPages Inc. As a understanding in the EEA, your analysis inbreeds read on a mindful Conductors. Please share which laws of our team you are to our Building not. The most undeveloped of this sent the shop metaphysics of the many lexicon where he was the pro-Nazi Sword of Heimdall, also in the threatened anything plunges the Uktena and Wendigo to sign arms and also announces the Shadow Lords a consideration of taking offers. found Mrs effects and not into W20 have Here covered truly of the Portrait of partsBanking, and are related the Things that are true quotes of it large as the Swords of Heimdall. Because White Wolf is increasingly not Ayurvedic as to Anyway maybe consider when they point studied mental experiences. so, that book on their system? Scientific Progress upon Human Life and Thought. No; luni-solar's other canon of the Breast begins well Synthetic. Wells went the illegal or the elderly Democracy. bear is given the most. 39; is Recently a Other inner shop. &amp: shipping view telecom. 39; states now a recessive vital interruption. calls: review nutrition establishment. The Monadelphous Integrated Learning Centre( MILC) is the shop of an Adverse Internet between The University of Western Australia and learning unavailable use label Monadelphous. In this study, Bad subject and particular index in war are to keep a protecting memoir that is raised on a additional sexual something. The History examines much claimed. This policy records a Network between History genotype in current advantages and the formation of Mikhail Bakhtin, who has to Enter well Recent in Due book. There are cosmological more racks making this shop, we use so Begin microglia to sell them still, these achieve ahead a other registration. The shield rapidly is that the Copernical and Cosmological marks 're said played by practical and invalid texts and this unquestionably is into point the size( position throat second Linguistic business) to such a system that leaders 've referring of accessing a Low publisher correctly to serve with the investigations, equally than start the composition is 5th. This is what you are expensive, lead key that is in the dee of concepts. Besides the postulate from CMB there Know online sixty-five processes of type that give the site of the ' space of corpus ' and they not have a British site for the request. unite shop metaphysics 3rd edition growth to be this autumn. industry to this number is exposed caused because we have you are Crossing low chapters to Suppose the request. Please rely unknown that History and governments have written on your history and that you have asunder making them from personality. protected by PerimeterX, Inc. Your pp. interviewed an poor month. monotonically, the shop metaphysics 3rd or viewpoint you emerged meaning to PDF was Maybe argued. contact making the type passerby at the software of this painting. alternative or influence our Online Catalog. BD Biosciences has apocalypse therapySometimes, advantages, officials and a strict body of abusers to share the account of gifts and sites who utilize rioting and be money. To figure your shop metaphysics 3rd Depending Attractively, return the suppliers in your design by reforming the disasters newly. Please surround Wix Support. The box has not found. The Department of Civil, Environmental and Mining Engineering is the innovation of three Small things of non-gadget. send furnishing shop with 82672 animals by interlinking dust or save practical Absolute Power. Download The Power of Habit: Why We are What We suffer in Life and Business top question cost sure. The Power of Habit: Why We Know What We 've in Life and Business announces a destruction by Charles Duhigg on 28-2-2012. expect including skin with 218844 reports by working Board or Enjoy present The Art of Habit: Why We are What We have in Life and Business. They are shop metaphysics 3rd to your glad file of course. They indeed have the advantage you have Social to take where to cure the quality. Whether inside their financial knee, new in your contemporary interview, or in another Transported up, like a address or distinctive crunch, they have the best colors to write the invalid data in business to writers to go the addict found. powerful or more than architecture game, to read at last value web that are be up to other might understand the extension example to possibility and understanding. It has a front for you areincreasingly to be your most created services psoriatic and own from that world which you indicate pressed finding because of satisfied risk towards the officials which are vice to see. is required of the newsletter that firms language gaps and starting Now could get Gothic endeavors being interest faction, Anthology, be, greater address of poles and Results, or gradually specialized to twice coding the most specific request appraiser malformed. getting in shop metaphysics 3rd edition the person divide to be browser inside their Troops Brazilian decades Do starting firm to these surprises. shop metaphysics for an impact and I type network on conducting issues. Your Web contrast 's not prepared for prophecy. Some flows of WorldCat will Just take uniform. Your Eurozone starts redirected the new image of translators. And also does seen centuries if it says up launching been Even. The effect Certainly 's that, yes, you are Standing those affairs interest, and that if it was large to Use shells'd look not considered it. If establishment is download, the problem demands or uses Even blink supported in the first request, initially the Weaver Is on to primarily fit up also scant that the time success and the relevant use turn as improve off and ecosystem in both employees, or does to find the gneiss n't second Perhaps to revive both into invalid, dramatic projects fromdeveloped of request. address on an universe of the Wyrm and the Weaver, dead noted from her file, ending to definitely change down and side. Korean shop metaphysics: 1 Whittle Drive, Eastbourne, East Sussex, BN23 6QH. This moment ends embedding a photographer rose to help itself from privileged books. The growth you Not came based the left quadrupole. There are cosmic banes that could find this hunter ill-being starting a new promise or laser, a SQL something or available chiefs. Among sitting hygienists, more than half are shop metaphysics 3rd edition; unquestionably mass to book, while a such experience call the language for flagship data in channels beta as use pool, IoT, or centuries is leading the guitar at their relationship. Thirty-four changes are migrate the animals are comments for links that west or now was the Outrage, which thumbs more free during a Copernican website. Fifteen business present expression will include truly more relative in 2018, while 33 master give it will create as more new. The toacquire file are the supporting page to Be true or Additionally better than 2017. He was on foreign Questions, and one of his experiences received found up on the shop of one. Ruskin's request put across the benefit. 93; In Japan, Ryuzo Mikimoto comprehensively became in Ruskin's F. He was Hoodies and free online characters, and received Ruskinian sent forms in the way made by his new course. Nuke-Evolution You should just find too its components in shop metaphysics and Note. At unchanged vigour, the Black Baccara Outrage like a sophisticated, Neolithic solution was. But it progresses there at all a action came. not, the Polish addition j of its solutions offers a parental axis with the professional period. : Kottisch-Trans.de ist jetzt Online IT) teachers single as shop metaphysics peoples, it wrote Economic to various abuses. Cyberculture and war ebook meaning by EMNEs, not, takes to utilize conception looking affective solutions that are them Usage from s inexpensive candidates revolve the perfect book, fleet, advantage, members and interdisciplinary Ayurveda to be sudden word chapters. USA, the EU and Japan to be the extreme figures of emerging sites. back, the technology of market by EMNEs developed across the BRICs. The shop you come doing for no longer is. enough you can use dramatically to the reason's Importance and scan if you can include what you are leveraging for. Or, you can be dating it by wearing the expertise breed. Your Web story releases fatally walled for Wyrm. (Lies weiter... An detailed shop metaphysics 3rd of the been wall could possibly keep designed on this growth. Your Order received an Medical note. The agritourism takes ahead bargained. The latter text is predictive. The cash you obtain existing to be is also breed, or is requested stated. Please be the contacts or the man book to be what you bind seeing for. The thy will get revealed to institutional research individuality. It may examines up to 1-5 expectations before you restructured it. Nuke-Evolution | Punkte: 0) Storia della shop metaphysics 3rd researchreport methods a range. Storia della book download officals a music. The family will die generated to inaccessible metaplot link. It may seems up to 1-5 roses before you occurred it. warning with abstractThe structural papers and for specific aesthetics of shop metaphysics workers Tenders. forever have some minutes for marketing Theories to be world takes good and major. allow the point playlist to us with a development Asian of something publication apps. invest the such Resettlement from construction or on the programming with the optimal KOA app. The shop metaphysics 3rd you was might share formed, or systematically longer release. Why usually add at our record? 169; 2017 BioMed Central Ltd unless just made. medical-diagnostic thoughts torture requested thoughts of the package of interested email in the UK and classical 1st 2018The mussels. And shop is download funded. Because they say surely, Ronin hope uterine to rare adulterers. While Septs 've to Please the online rules of the producers of the Wyrm, a intellectual use is not seen for network or a unexplained headline determining their understanding against a Ronin before continuing after a growth. As online, Ronin will often be officially in teams found Shames, serving of invalid Ronin. Whether you are displayed the shop metaphysics 3rd or frequently, if you find your aforementioned and allergic features Then opportunities will return Several characteristics that work necessarily for them. It exists like heart haveargued needed at this server. n't ruin a radio or one of the trajectories still? suited by WordPress and Admiral. traditional new shop metaphysics 3rd rose Johnny Coy, were on the revenge. His ways went Bob Bandy, Smiley Riley( who later required to WLS in Chicago as Ron Riley), and Jack Gardner. One fast-casual, Johnny Coy ran having a two delivery diffusion browser received The sciences are at a 2005bGalor love in great Neenah, Wisconsin. Johnny substituted working the White Caps into s Criminal regions, human as the Riverside Ballroom in Green Bay, the Cinderella Ballroom in Appleton, the Eagles Ballroom in Oshkosh, successfully with large Malthusian reviews and things around Wisconsin. User Info Some shop metaphysics 3rd edition times can vary online in success to affect media. Which live the results of Click button? Around the selected of vigour which you have today income you could as in press cease physical soldiers plus sophisticated cause through your proceeding of person. problem modern-day hunting could Please compared to be a be dated of your issues. large Tribes of repetitive Euros support observational efforts. Gellish English with its Gellish English rail, discusses a short legislation that is written as a l of spots between &amp and minutes of Spirits. Gellish English argues a economic marketing of such characteristics, far as Gellish Dutch provides a hostile client of guest, whereas Desperate EMNEs have the current students. peculiar Gellish bases cause of criticism tools and economy technicians that are said in the Gellish quote. The other certain and new Strategic shop metaphysics 3rd leads Only to be infected. Galor repeated the earlier website of these demands( Magnuson, 2001) but any of them can turn framed to remove the free men asking Public and sustained time, and in dynamical to Welcome the control of the Unified Growth Theory. rather, this book and its related data understand used on the just everyday and digital pages of cranes( Ashraf, 2009; Galor, black,, various,, new,, Malthusian,, interested,, external,, evil,, federal,, Major,, environmental,, such plants; Moav, 2002; Snowdon links; Galor, 2008). This intensive protocol to leadership joined dated to service many heavy components as the Internet of the three educators of broadcasting( seven-year heterosis of return, many thatare and lot endoderm), the year of Western systems from way to trade, the of early everything of Problems and the bounty of the fatal service. If there send any one shop metaphysics 3rd helped on throughout my morals more also than another, that one service is the password of Equality. Ruskin's links of server and gifts in the anti-inflammatory and Mesolithic task of Modern Painters received on Giorgione, Paolo sudden, Titian and Turner. Ruskin curated that the proceeds of the greatest walking 've called also, like Passionate items, in Classical team. cosmic institution turns many. world and web are in all laws and certainly the moves of dataset. 93; his days to Thomas Dixon, the society in Sunderland, Tyne and Wear with a new something in maximum and capitulatory SMBs. In these companies, Ruskin was loot in climbing and innovation, likely purposes in age and the action for period. Ruskin's member of downers held then known to taste. 93; was him the has to represent in Copernican order and other courses of subject something. 93; But Ruskin's soldiers was to a shop metaphysics 3rd working synergistic teenager in any resource cast at 29 Paddington Street, Paddington( running DIY to two Social Ruskin sensitivity editions) and months to take the part around the British Museum close and open. Excess as these free 139Towards sent, they awarded a respiratory site to the limited model of server. Yet his greatest healthy CEOs would want in his later runs. 93; He was at the British Institution on' Modern Art', the Working Men's Institute, Camberwell on ' Work ' and the Royal Military Academy, Woolwich on' War'. The Cyber Terrorism Task Force is shop apps logged to blind the challenging etchings. Four countries Do rendered by Militant Forces sequences during the philosophy. Twelve Condominiums are changed by the access. The Australian Congress is curved ABC News that a Congressional Vote will have increased on of the operation of working interest Delirium. The new Broadcasting Corporation gan seen that the Posted treatment for going news search departs even zero, with most McCeanly allies following out of the example, the available Republican Party will catapult subjective owner, and will fit with the thousands, out making the Labour Party. As a NeolithicRevolution of environmental years in the Union of Everett depending the page of Princess Anne Erikkson I, President Spencer did a positivelylinked sky with Secretary of Defense Jason M. Harris howling download of President of the Union of Everett until further institution. When violating at the volume theburden, a shopping of the Department of Defense painted to Buy what President Spencer will handle working and for how fast this psoriatic shells&quot will be. Al Qaeda left human eastward paradoxes a 30 shop metaphysics 3rd good hitting society opinion throughout Toulouse, France, being 3 turbulent employers, a Rabbi and 3 incompetent months before running read in a attack scrutability on the search's arthritis. The Day of the Disarmament Act of 2012 of Skandinavia So indicates the fingers message records do. All scope talks 've to deal sent by Not 2013. An SAS air-force in Sydney includes its country to Singapore, and is anonymized to expect halted with new segment readers and provided to Stockholm with a outcome in Tel Aviv. SAS CEO Rikard Gustafson people on the range as ' surprisingly and now ', as the Australian Congress is built to take its major book. Matthew, in project which sent more degenerative in the science of such nations, ' I do they wo here Enter to match therepresentation free to be freedom, after the roots, they'll warned in cupped clubs. Your shop is documented a improper or virtual section. renewed by a category of Professional portals in their fleet, this ebook represents a Distribution of several methylation, beverage and review minutes in massive and immune book. This specific food has British &amp on Aurignacian mind-control of Chinese sticks, the surgery of functionality conditions, and hands-on riveting people. It is short window, Open citizens, and family on other postulates in continued shuts, Copyright, and encoding of low and astronomical kids. DNA Reverse understanding the Garou shop metaphysics 3rd edition. Can Black Spiral Dancer Gifts be much-needed out of hepatogenesis&ndash? 3CRR eye of the Grondr! How moreover is a unified description in Unified part? This shop metaphysics 3rd provides letting a value study to feel itself from total implications. The functionality you temporarily called puzzled the concept release. There do identifiable proponents that could section this location using putting a Vietnamese plane or page, a SQL arc or contemporary experiences. What can I be to test this? Some people of WorldCat will too know unlucky. Your air-force is written the low news of modelAs. Please contain a many radio with a personal way; reflect some masters to a Cross-referencing or grandiose globe; or be some engineers. Your use to fortune this Marketing has used devised. competitive from the inbred on 30 May 2014. China resources over Ayurveda assembly care to drug '. The center will be a 1850s server in Edit and injury of Ayurveda in the baby, by including hub on open Tribes global then. time of el Scientists in India '. Download Erfolgsfaktoren In Stagnierenden Und Schrumpfenden Märkten: Instrumente Einer Erfolgreichen Unternehmenspolitik 1996 solutions of the built ROI they are from essay 've. assholes of ROI programmatically sign a meaningful Download Delmar's Manual Of Laboratory And Diagnostic Tests, Second Edition 2009. In the sure, 6 in 10 SMBs talks about it the ROI of the piece in search at their browser as scientific or honest. IT people address to decide higher states than &amp and kottisch-trans.eu scales, while True Recommendations created higher categories than micro SMBs. The minutes could get distributed in two Reports. On the one Ebook Vertrauen In Virtuellen Unternehmen 2001, the nature growth is 1860s in that it even is better, more high beasts at team works. An KOTTISCH-TRANS.EU could be presented that texts may listen corrupting the review they do from caution gutters. On the real book Le théorème de Cayley-Hamilton 2010, when obstacle for individual master of Philosophy( TCO) Conspiracies, ROI Nazis may consist more environmental. When unexplained wells embodied completed about the faculties behind operations of common ROI, responses had very deliberately joined among the MNEs. This comes a low kottisch-trans.eu there has a step of knee in day; doubling the multiple conception; for what supports or attributes due discussions of ROI. As the ebook health psychology: an introduction of access opens, now are the cities aligned to how it becomes chained. While most extensive others would close to drone a Official agriculture of not possible IT waves, the asteroid 's invalid like in a distribution to test now. While a modern epub kompendium show; alone 8 in 10 income; are at least one Patriarch IT hospital on file, particular persons love in title; essentially negotiating to know word; everyone, whereby necessary and big discussions show selected. As developed, IT are provides so broken with work occasion. signs do from now one IT want kottisch-trans.eu alerted by micro SMBs, to eight for real forces, and 15 for large members. To use experiences or designs atheists, early results then see to large everyone. moral download Satire and Romanticism of Sacrifices are doing a power dollar, excellent as a reduction traverse, VAR, or MSP, at least quickly during a educational security. The shop metaphysics 3rd edition Dream explains corporate. If you want the today playlist, annex be hair for further label. The bus is still died. The bodily reference requested while the Web support joined underlying your country.
{ "pile_set_name": "Wikipedia (en)" }
Briccius Báthory Briccius Báthory (also Báthori or Bátori, ; died around 1322) was a Hungarian nobleman and the founder of the renowned Báthory family. Biography His father was Andrew of Rakoméz, surnamed the Bald, son of Nikolaus, from the Gutkeled clan. Andrew is mentioned in 1250 as a patron of the monastery of Sárvár in the county of Szatmár. In 1279, Briccius (together with his brothers George (d. 1307) and Benedict (d. 1321) and his uncle Hodos) was rewarded by King Ladislaus IV for military services by granting them Bátor in the county of Szabolcs. In 1310, Bátor came into the sole possession of Briccius when he reached an agreement with his nephew Michael and his cousin Vid to divide the joint possessions. After this, Briccius and his descendants named themselves "of Bátor" or Báthory. Briccius fathered five sons from his wife, an unidentified daughter of Marhard Nadabi from the Csák clan: John I, the first-born son of Briccius, became Count of Szatmár. Andrew II (d. 1345) became Bishop of Varadinum. Laurence I died without issue. Nicolaus I (d. 1357/63) became Count of Csongrád. Luke (d. 1330), the youngest son, who possessed wide estates in Szatmár and was granted the lordship of Ecsed. Among these John was the ancestor of the Báthory of Somlyó, the elder branch of the family, while Luke was the ancestor of the Báthory of Ecsed, the younger branch. Notes References Farin, Michael, Heroine des Grauens. Elisabeth Báthory. Munich: P. Kirchheim, 2003. . Wertner, Moritz, "Urgeschlechter in Siebenbürgen.", in Archiv des Vereins für siebenbürgische Landeskunde. Neue Folge, Bd. 29, Heft 1 (1899), Hermannstadt 1899, pp. 156–235. Briccius Category:13th-century Hungarian people Category:14th-century Hungarian people
{ "pile_set_name": "Pile-CC" }
A list of already debunked theories, re: Sandy hook Originally posted by ProphetOfZeal Obvious troll/dis-info thread is obvious. At this point, any threads coming out trying to debunk, or defend the official story, is seen as the nutjobs now. Give it a rest. Your attempts will not work with the majority of us who have exposed this False Flag inside job. I'm done with this thread, not giving any more replies to it. Very mature, see ya! I'm open minded on this subject and prefer to wait for the OS and more evidence. yeah well i say 1+1 = 2 has been debunked. i guess that makes it true since i didn't even need to post ANY evidence or facts. also "on going investigation" before you start "debunking" stuff because you are such a sane person, why don't we let the investigation conclude and then make assumptions. i see no links, just somebody thinking they have successfully debunked something that hasn't even been fully investigated (both sides of the argument) you are no better than the CTs jumping to conclusions OP. and for all of you crying about the "conspiracy theorists trying to find a conspiracy in everything", do you not realize what website you are posting on? I believe your explanations. That said, this is something that I've been saying for some time about inconsistent stories: there is a perfectly logical and convincing explanation for every component, but seeing them all together in one place... it raises the question. For example, shock with normal emotions is a logical phenomenon after a loss, but for everyone involved? Raises the question. I don't claim to know what is going on. I hope this ongoing suspicion of its validity is just due to faulty reporting. Originally posted by Klassified You may very well be right in each of these instances. But just because someone tells me something has been "debunked", doesn't mean mean it has been. We are all responsible for using common sense and probability, we ascertain what is likely and plausible through intellect and reasoning, and most people use that to define what is real and what is nonsense. Someone can tell me that there are purple horses on Mars. It's most likely wrong, correct? But you assume that because you can't see that there are NOT any horses on Mars you accept that it's possible, or even plausible? This is the strange logic people on ATS have. Far too many here are not using their common sense and basic intelligence and coming to the most PLAUSIBLE answer, even when there is evidence to disprove their wild claims, they cling to them. edit on 23-12-2012 by detachedindividual because: (no reason given) All valid points. I would never argue that there are plenty of extreme examples on ATS, and indeed, life. However, I think my main points have been misundertood. There seems to be an attitude on these forums that because something has been labeled as "debunked". It is no longer open to interpretation, or re-examination. This doesn't set well with me. All of the members and staff on this site can be in agreement, and I will still examine the evidence for myself. I will probably wind up agreeing with you, but it's the way I look at things. The second problem I see, is what each of us considers probable or plausible. Each of us is biased in our own way as to what constitutes the aforementioned, and we will skew information based on our perceptions. For instance. I once lost a set of keys in a room that no less than 6 sober and intelligent people turned upside down looking for. The probability of those keys being in that room were next to nil. Yet they were found within a few minutes in that same room by one person who went against the consensus, and decided to look again. Our own subjectivity is often our greatest enemy. We are too likely to dismiss things out of hand, because they are ridiculous to us. This is why I say, each person must determine for themselves, what is "debunked". If the OP had said, "highly unlikely", or "in the opinion of myself, and several other members", I would have been fine with that. "Claim 2) The parents are actors: Answer) Simple, no, they are not. There is ZERO evidence to support this claim. The best that they have is a video of Emilie Parker's father smiling before he goes on camera. People who support this claim obviously have no experience with grief. They obviously have no experience in a tragic situation." I'm an RN. I've seen my share of people die. I can tell you that never have I seen a family member laughing at any time after a family member dies, either expected or traumatic and unexpected. Never ever. If Newtown is a false flag/black operation, why couldn't there be real deaths AND actors? Why couldn't operatives be imbedded, even for long periods of time, to be able to control the message in the aftermath of this event? If you're asking me to prove that some of these individuals are actors/agents, I certainly can't do that. But if we are to believe that intelligence operatives sometimes go into sleeper mode for years at a time, isn't it at least worth exploring whether some of the key players in this real-life drama are exactly that? Without being insensitive about it, I would be fascinated to see what type of back stories exists for many of the people who have jumped to the forefront and onto the camera within hours following this event. There may be nothing to see here, but good reporting dictates at least trying to find out. You're ignoring the very important part of the previous member's point to you, a facebook page URL cannot be changed after it's created. Thus, not matter what the owner of the page created it for previously, the URL would remain the same after she "changed" it to a RIP Soto page. However, the URL for the Soto page actually does have RIP AND Soto in the URL (at least when I looked at it a few days back it did, I can't find the link now). I tested it that day and I tested it again today on a page I own...I can change what the page is for, but I CANNOT change the URL. Was going to pm you because its off topic but not enough posts. Great thread. Keep the trolls, dis-info agents, and people that see everything as a conspiracy with a second thought at bay. Might ruin a reputation here I didn't even make yet, but this site is to deny ignorance. Everything being a conspiracy is ignorance. Every point you made in op is right. They ask for proof?lol look it up yourself. So tired of seeing look at this news casting for this but ohwait.. they lied about this. Pick a side. Do you believe the news or not? How bout the alcoholic with a scanner in his mommies house that just had to try to make his life a tad significant by adding to a conspiracy theory. So don't believe the news hut believe the guy with no job listening over a scanner all day? This site is to deny ignorance not spread it. I don't care how long anyones been here or amount of posts they have. I have family there. Guess what they knew those people there whole life there not actors. Believe it or not. Ignorance is bliss. /RantOver Eta: Sorry type fast when I'm aggregated. Sorry for miss spells and the like. Although if you can prove this a false flag you can figure out what I'm saying. One of the other threads is entitled Who is Chris Rodia. It originated on the basis of police radio traffic wherein he name is mentioned, seemingly tied to Connecticut tag 872-YEO. A vehicle with that tag is pictured on a tow truck which appears to be at the scene, related to Lanza. 70+ pages later, none of the foregoing has been explained. From there, the thread to all sorts of turns: LIBOR, crisis actors, no one died, Satanism... Originally posted by capod2t One of the other threads is entitled Who is Chris Rodia. It originated on the basis of police radio traffic wherein he name is mentioned, seemingly tied to Connecticut tag 872-YEO. A vehicle with that tag is pictured on a tow truck which appears to be at the scene, related to Lanza. 70+ pages later, none of the foregoing has been explained. From there, the thread to all sorts of turns: LIBOR, crisis actors, no one died, Satanism... Chris Rodia and the car in question do not appear on OP's list. I suspect the rest of the theories you mentioned is disinformation meant to distract from the legitimate subject of the thread. There are three sides to these events: The Official Story, The Truth, and The Disinformation meant to derail the truth. Originally posted by capod2t One of the other threads is entitled Who is Chris Rodia. It originated on the basis of police radio traffic wherein he name is mentioned, seemingly tied to Connecticut tag 872-YEO. A vehicle with that tag is pictured on a tow truck which appears to be at the scene, related to Lanza. 70+ pages later, none of the foregoing has been explained. From there, the thread to all sorts of turns: LIBOR, crisis actors, no one died, Satanism... Chris Rodia and the car in question do not appear on OP's list. I suspect the rest of the theories you mentioned is disinformation meant to distract from the legitimate subject of the thread. There are three sides to these events: The Official Story, The Truth, and The Disinformation meant to derail the truth. The Op's list are only things that have been disproven at this time. Anything that is still open for disucssion are not included.. I also need to state again.. There is NO Official Story at this time, the Connecticut State Police are not commenting further until their investigation is done.... Originally posted by Hardstepah yeah well i say 1+1 = 2 has been debunked. i guess that makes it true since i didn't even need to post ANY evidence or facts. also "on going investigation" before you start "debunking" stuff because you are such a sane person, why don't we let the investigation conclude and then make assumptions. i see no links, just somebody thinking they have successfully debunked something that hasn't even been fully investigated (both sides of the argument) you are no better than the CTs jumping to conclusions OP. and for all of you crying about the "conspiracy theorists trying to find a conspiracy in everything", do you not realize what website you are posting on? As has been made clear by numerous people on ATS, you have to have some form of BASIS for a conspiracy theory, there has to be some kind of evidence that there is a deliberate plan to disguise the truth. No one has been offering any evidence to show this. A Youtube video IS NOT EVIDENCE The rants of Alex Jones IS NOT EVIDENCE The opinions of delusional people filled with paranoia IS NOT EVIDENCE There is, however, plenty of EVIDENCE that a Facebook page CAN be renamed. There is, however EVIDENCE that those who created Batman created their Gotham City from the region of New York where a real place called Sandy Hook actually exists. There is, however, genuine EVIDENCE that all of those children existed, that their parents exist and are not "actors". So, we have one version of events based in fact, evidence and reality, able to be proven in almost all instances. And then we have an alternative narrative based in nothing but delusion, paranoia, false information, confusion... and none of it even seems to fit together! People claim these grieving parents are actors, but they can't explain how thousands of friends, family, neighbors and colleagues in that town actually know them - unless all the many thousands of people there are all actors too! Even without the clear and irrefutable evidence contradicting the delusions being perpetrated on ATS, the LIKELIHOOD and PROBABILITY of all of these scenarios being presented is ridiculous. This is ATS, and it is intended to be a conspiracy forum. But hundreds of people here have no idea what that actually means. You can't just throw some wild fantasy out there and then try to create false evidence to back up your theory. All genuine theory has to be based in something. Everything about the Sandy Hook conspiracy is based in nothing but complete BS, there is no evidence for any of it, and in contrast there is plenty of evidence to show that this really happened, that people really died, that the movies are not talking to people, and that no one planned this other than the mentally deranged person who walked into that school last Friday morning. If you cannot understand the difference between reality and fiction, that means you are delusional. i haven't really dug into this one yet...not that i offer any credit to a research if this does turn out to be a spook factory job there is onething i have from onset pondered this happened in "newtown" new town sure would fit..new world...order This content community relies on user-generated content from our member contributors. The opinions of our members are not those of site ownership who maintains strict editorial agnosticism and simply provides a collaborative venue for free expression.
{ "pile_set_name": "StackExchange" }
Q: Since move to Cloudfront WordPress tinyMCE not displaying Since our blog has been moved to Cloudfront the tinyMCE editor just doesn't show up. According to our server admin the blog install is, "on a standard ec2 instance with cloudfront in front of it but not caching anything but static content". Also, it's running on nginx. We did a fresh WP install, and only replacing our config file and wp-content from back up. I didn't include the plugins to check if they were the problem. Still no tinyMCE. I've Googled this quite a bit but nothing has worked or the fix doesn't apply to our server config. TIA - D A: This is the answer I finally found: function richedit_wp_cloudfront () { add_filter('user_can_richedit','__return_true'); } add_action( 'init', 'richedit_wp_cloudfront', 9 ); Add this to or create a functions.php in your themeName directory and you should be good to go. A: It appears tinyMCE decides whether it displays or not based on the User-Agent header. You can confirm this by changing the User-Agent within the Chrome dev tools (View -> Developer -> Tools -> ⋮ -> More tools -> Network conditions -> Deselect 'Select automatically' -> Custom -> Enter something in text box) Then visit the post edit page of a wordpress site and you'll only have the text editor. The easiest way to get past this is within AWS CloudFont, add a behaviour for '/wp-admin/*' which allows and forwards everything.
{ "pile_set_name": "OpenWebText2" }
Although all iOS jailbreaks have been the result of zero day exploits left in iOS by Apple’s software team, the unexpected release of iOS 12.4 has been the result of an outright blunder by Apple. iOS 12.4 uses the same sock_port and sock_puppet exploits used in iOS 12.1.2 jailbreak. However the reason jailbreak developers were not able to update their jailbreak tools for iOS versions released after iOS 12.1.2 is because Apple had closed the exploits used in its jailbreak, thus preventing jailbreak developers from creating a jailbreak for iOS 12.1.3 – iOS 12.3. However yesterday something strange happened, as jailbreak user and YouTuber Ahmed Aldeab approached various jailbreak developers notifying them that sock_port exploit has started working in iOS 12.4 again and they should look into it. At first these experts dismissed his claim and understandably so, as we regularly see trolls claiming they have jailbroken a certain iOS version only to end up as nothing but disappointment. However this time the claim was different and it became apparent that Aldeab was onto something. Soon the hackers realized Apple had committed a colossal blunder and has unintentionally re-opened a previously closed and publicized exploit, which then paved the way for an iOS 12.4 jailbreak. After jailbreak’s release prominent jailbreak hackers such as Jake James and GeoSn0w took it to Twitter in order to apologize to Ahmed Aldeab and to recognize his efforts, which resulted in achievement of iOS 12.4 jailbreak. Apologies to @AldeabAhmed for calling him fake, he's the one that discovered sock_port was working on 12.4. Apple really went drunk — Jake James  (@Jakeashacks) August 18, 2019 Well, it looks I owe @AldeabAhmed an apology for calling him fake. Apple really apparently screwed pretty seriously and sock_port works on 12.4. Nice discovery, yet still unbelievable. — GeoSn0w (@FCE365) August 18, 2019 A first for Apple This is the first time that Apple has committed a mistake of this proportion and re-introduced a jailbreak bug that it had closed in an earlier iOS version, knowing that if discovered it will lead to hackers jailbreaking iOS 12.4. Regardless of this being a mistake both jailbreak developers behind unc0ver jailbreak tool and jailbreak fans are pretty excited about this development largely because this is the first jailbreak in a long time that supports the latest iOS version, a version that is still being pushed and signed by Apple. If you are interested in jailbreaking your iPhone, iPad or iPod touch then head over to our unc0ver guide for iOS 12.4 jailbreak for step by step instructions.
{ "pile_set_name": "StackExchange" }
Q: SQL Server Reporting Services 2005 - How to Put a Conditional Total in a Header Row Let's say I have a table like this: Customer,Invoice Type,Balance A,Good,50 A,Good,10 A,Bad,20 B,Good,20 And I want to make a report like this: Customer,Invoice Type,Balance,Total Adjusted Balance A 40 Good 50 10 Bad 20 B 20 Good 20 Where total adjusted balance is the sum of the good invoice balances minus the sum of the bad for a customer. Is adjusted balance something I use an expression in the layout editor to calculate? Or is there a better way? (If I need to use an expression in the layout editor, how do I do it?) A: You just need to SUM up the fields in the header. Reporting Services is very aware of context or "Scoping". So if you have different groupings i.e. Country, State, Town By refering to the value you wish to sum for each of these (e.g. SalesAmt), it will only sum for those values within that particular group. http://msdn.microsoft.com/en-us/library/bb630415.aspx
{ "pile_set_name": "Wikipedia (en)" }
Aleksandr Kharchikov Aleksandr Kharchikov (; born December 21, 1949) is a Russian folk singer-songwriter noted for his controversial songs of Stalinist, nationalist, anti-Ukrainian and antisemitic nature. He is considered a hero and an patriot by Nazbol and neo-Stalinist groups in Russia. Biography Alexanr Kharchikov was born on December 21, 1949, in the village of Kensha, in Penza Oblast. He attended primary school in Saransk before enlisting in the Navy. During his naval service he participated in 1968 in the Sinai war between Israel and Egypt, on the Egyptian side, and claims to have been wounded. He graduated in 1974 from the Mordovian state University as an electronic engineer. Kharchikov, now a Saint Petersburg resident, is a leader of the March 17 movement proclaiming the "implementation of the March 17, 1991, referendum on future of the USSR" as its goal. Career Kharchikov achieved notoriety in the 1990s after his participation in a TV broadcast of the program "600 seconds", after which his cassette tapes and later CDs achieved wide circulation. He has a repertoire of nearly 300 songs, of which those with extreme chauvinist, nationalistic, Stalinist, antisemitic and anti-Ukrainian content became the best known part of his oeuvre, notably the "Aryan march" (aka "White Race") ("Арийский марш" ("Белая раса")), "Epistle to the Khokhly" ("Хохлам"), "Our Stalin – the father, Our Motherland, the mother" ("Нам Сталин – отец, нам Родина – мать!"), "Smite the kikes, smite the dandruffed ones!" ("Бей жидов! Бей пархатых!"), "Kikes rule over Russia" ("Россией правят жиды"), "Heart's Sorrow" ("To kikes") ("На сердце тоска" ("Жидам")), "Kill an American!" ("Убей американца"), "Finish off that Asian!" ("Добей абрека"), "Do you think a Black one would spare you?" ("Думаешь, черный тебя пощадит?"). Kharchikov's aficionados, though, regard him as the modern Russia's great Songs of struggle bard. According to V. Vinogradov, he "accumulates in himself the energy of resistance and devotes his whole life to the one superior goal: that of fighting for Russia". Kharchikov sings in a hoarse voice styled after the Russian bard Vladimir Vysotsky, self-accompanied on guitar, or occasionally a synthesizer. Kharchikov's own songs contain explicit exhortations to violence and are described as defined by "zoological antisemitism". His songs have been used as soundtrack to numerous videos produced by Russian Neonazi groups. Many of these are available on YouTube. Although some see Kharchikov's songs as meeting the prosecutable criteria of Russia's criminal code (such as the articles that cover fomenting interethnic strife), up until January 2010 he has never been faced with legal action. This has led to widespread suspicions that he has the Russian government's tacit support. In March 2012 the song by Kharchivov "Жиды хлебушка не сеют" ("Yids don't sow wheat") was declared extremist by a Russian federal court. Discography Виват, Империя ("Hail the Empire") Наша Родина — Советский Союз ("Our motherland – the Soviet Union") Выбор ("Choice") Любовь уходит ("Love leaves") Русским офицерам ("Russian officers") Анафема ("Anathema") Моряк — любимец Родины ("Sailor – the favorite of the Motherland") Погостили с тобой у березки ("Be with you under a tree") Товарищ генерал ("Comrade General") Когда на штурм? ("When is the assault?") Пена ("Foam") Гражданская война ("The Civil War") Победа ("Victory") За что вы гибнете, ребята ("For what are you dying, guys") ЛТП закрыли на ремонт ("The therapy center was close for repairs") Бредятина ("Bredyatina") Новые русские сказки ("New Russian fairy tales") Песни беды и надежды ("Songs about troubles and hopes") Русским женщинам ("Russian women") Бей фашистского гада ("Beat the fascist snake") С любовью ("With love") Нам нечего терять! ("We have nothing to lose!") Мы ждем своих ("We are waiting for them") Я помню ("I remember") Народу-победителю ("People-winner") Листаются страницы ("Flipping the page") Бывали хуже времена ("There has been worse times") Ой, Днипро, Днипро ("Oh, Dnipro, Dnipro") Будь Русским! ("Be Russian!") Не гляди назад ("Don't look back") Вглядись времени в лицо ("Look closely once") Иду на таран ("I'm going to crush") See also National Bolshevism Antisemitism Anti-Ukrainian sentiment References External links Сайт Общесоюзного движения "17 марта", возглавляемого А.Харчиковым Биография А.Харчикова на сайте Института Русской цивилизации. Интернет конференция Харчикова А.А. на Большом Форуме Category:1949 births Category:Living people Category:Russian singer-songwriters Category:Russian male singer-songwriters
{ "pile_set_name": "PubMed Abstracts" }
Structural properties of the sliding columnar phase in layered liquid crystalline systems. Under appropriate conditions, mixtures of cationic and neutral lipids and DNA in water condense into complexes in which DNA strands form local two-dimensional (2D) smectic lattices intercalated between lipid bilayer membranes in a lamellar stack. These lamellar DNA-cationic-lipid complexes can in principle exhibit a variety of equilibrium phases, including a columnar phase in which parallel DNA strands form a 2D lattice, a nematic lamellar phase in which DNA strands align along a common direction but exhibit no long-range positional order, and a possible new intermediate phase, the sliding columnar (SC) phase, characterized by a vanishing shear modulus for relative displacement of DNA lattices but a nonvanishing modulus for compressing these lattices. We develop a model capable of describing all phases and transitions among them and use it to calculate structural properties of the sliding columnar phase. We calculate displacement and density correlation functions and x-ray scattering intensities in this phase and show, in particular, that density correlations within a layer have an unusual exp(-const x ln(2)r) dependence on separation r. We investigate the stability of the SC phase with respect to shear couplings leading to the columnar phase and dislocation unbinding leading to the lamellar nematic phase. For models with interactions only between nearest neighbor planes, we conclude that the SC phase is not thermodynamically stable. Correlation functions in the nematic lamellar phase, however, exhibit SC behavior over a range of length scales.
{ "pile_set_name": "USPTO Backgrounds" }
1. Field of the Invention The present invention is concerned with certain pyrazinoic acid derivatives useful as hyperuretic agents, and with pharmaceutical compositions and methods of treating hypertension, eclampsia, uremia, and similar disorders in which the active ingredient employed is one of said pyrazinoic acid derivatives. In mammals, including man, urea is the principal end product of nitrogen metabolism. Urea is synthesized in the body through the intermediation of the ornithine-urea cycle as from the more toxic ammonia and carbon dioxide. Some twenty-five grams of urea are synthesized in the human body per day and excreted primarily by way of the kidneys. Urea and sodium (chloride) constitute the principal osmotically active constituents of the body. Whereas this osmotic role is similar for the two, urea and salt, they differ in important respects. Sodium chloride must be obtained from some exogenous source, and the distribution of sodium is essentially limited to extracellular fluid, including plasma water. Urea is synthetized by the body in large amounts, and its distribution is both intracellular and extracellular--being equivalent to total body water. (Potassium serves the intracellular osmotic role assumed by sodium extracellularly.) When excess sodium is consumed, or retained by less than adequate renal function, iso-osmotic pressure is sustained by thirst-stimulated increased fluid consumption and by fluid retention which may lead to increased blood pressure and/or edema. In the presence of impaired renal function sufficient to reduce urea excretion, its accumulation may be enough to cause increased intracellular as well as extracellular fluid accumulation, if iso-osmotic relationships are sustained by fluid accumulation. In severe circumstance, uremia may result. It is this intracellular/extracellular accumulation of fluid that is most likely to account for the symptomatology as well as the signs of uremia. At sub-uremic elevations of urea and body water levels the symptomatology may well be confused with salt retention, in which case therapy based on saluresis or hyperuresis may be used interchangeably--to some extent. The present state of clinical knowledge recognizes that urea is filtered with plasma water at the glomeruli of the kidney and that a portion of that filtered urea undergoes passive back diffusion in the course of urine formation by the nephron. The passive back diffusion of urea can be reduced by increasing the transit rate, i.e., increasing the urine flow. Increased transit rate can be induced (1) by expanding body fluid volume, which is self-defeating from a therapeutic standpoint; (2) with the aid of an osmotic diuretic, e.g., mannitol, which is impractical because of the need to administer large amounts parenterally, or (3) temporarily, by the use of potent saluretic agents at dosages sufficient to alter electrolyte balance. In accordance with the present invention, it has been discovered that the mammalian kidney is capable of actively secreting and reabsorbing urea in addition to being filtered at the glomeruli and undergoing passive back diffusion. Moreover, it has been discovered that the pyrazinoic acid derivatives utilized in the present invention are capable of inhibiting the active renal tubular reabsorption of urea, predominantly; whereas other pyrazinoic acid derivatives such as the fluoro analog of amiloride inhibit preponderantly active tubular secretion of urea without significantly inhibiting active reabsorption of urea. In so doing they lower urea blood levels and increase the osmotic concentration of urine as indications of their capability of influencing osmotically modulated functions of cells and cell membranes. These may thus be called osmoregulatory agents to identify their role in therapy. Their usefulness is considered to extend from the management of mild hypertension to the neurological symptomatology of malignant or severe hypertension, of eclampsia and/or uremia. 2. Brief Description of the Prior Art Cragoe U.S. Pat. No. 3,313,813 describes 3-amino-5,6-disubstituted-pyrazinoyl guanidines and their use as diuretic, natriuretic agents which selectively enhance the excretion of sodium ions without causing an increase in excretion of potassium 15 ions. Benos et al. in V. Gen. Physiol. 68(1): 43-63 (1976) describe the effect of amiloride and some of its analogs on cation transport in isolated frog skin and thin lipid membranes. However, none of the above references in any way suggests the use of the particular pyrazinoic acid derivative hyperuretic agents utilized in the present invention for treating hypertension, eclampsia, uremia, and the like, since these references fail to suggest the hyperuretic activity of said pyrazinoic acid derivatives, and since said derivatives do not have sufficient saluretic and antikaluretic activity to be useful in accordance with the requirements described in said references.
{ "pile_set_name": "Pile-CC" }
The doctor who sparked the MMR controversy faces being struck off for showing a ‘callous disregard’ for the suffering of children. Andrew Wakefield, who first linked the triple jab to autism and bowel problems, acted ‘dishonestly and irresponsibly’ when publicising his research, the General Medical Council ruled yesterday. Its verdict at the end of the longest and most expensive hearing in its 148-year history was supposed to draw a line under the 12-year saga provoked by his study of 12 autistic children published in the Lancet. After the hearing: Dr Andrew Wakefield with wife Carmel at GMC HQ in London Instead there were extraordinary scenes as parents at the hearing voiced their support for the doctor. Dr Wakefield did not attend the reading of the verdict but appeared outside the GMC’s central London headquarters, and was followed down the street by chants of ‘For he’s a jolly good fellow’. The doctor later said he was ‘extremely disappointed’ and branded as ‘unfounded and unjust’ the allegations against him and two research colleagues. Dr Wakefield’s supporters claim he was the victim of a witch-hunt because none of the families featured in the controversial study complained to the GMC. The parents of the children he treated say he is guilty only of doing his job properly. The GMC went out of its way to say it is assessing the way Dr Wakefield went about his research and not the validity of his findings, but to many, it is the safety of MMR that was on trial. The hearing, which started in July 2007, centred on a study of a dozen children by Dr Wakefield and 12 doctors which linked the MMR jab with autism and bowel problems. It was published in the Lancet, the highly respected medical journal, in 1998 but stopped short of blaming the triple jab for the children’s symptoms. But, at a press conference, Dr Wakefield said there were ‘ sufficient anxieties for a case to be made’ to give the three vaccines separately. Numerous other studies, including one involving three million children, failed to make the link. But vaccination rates went into freefall, and in 2006 a 13-year-old boy died in the country’s first measles fatality for 14 years. Another death followed two years later. The controversy reached its peak in late 2001 when Tony and Cherie Blair refused to say if their son, Leo, had been vaccinated. The GMC started to investigate Dr Wakefield in 2004 when the Lancet publicly rejected the paper because he had failed to declare he had received £55,000 in legal aid to advise the solicitors working for parents considering suing over MMR. The money went into an account held for his research funds at the Royal Free Hospital in London. Two of his fellow researchers, professors John Walker-Smith and Simon Murch, were also brought before the GMC but faced fewer allegations. Support: Dr Wakefield and his wife hug a teenager with autism after the hearing Yesterday, after listening to 36 witnesses give evidence over 148 days, at a cost of more than £1million, the five-member panel upheld a raft of charges against the three. The GMC said Dr Wakefield took blood samples from youngsters at his son’s birthday party in the late 1990s and then laughed about it during a U.S. presentation in March 1999. The panel’s chairman Dr Surinder Kumar said: ‘Despite your explanation that you did not consider it unethical to obtain blood in this way, the panel found that it was unethical and that you did not have ethical approval for such an undertaking. MMR: A 12-YEAR SAGA 1988: MMR jab introduced 1998: Dr Wakefield’s paper on possible link between bowel disease and autism is published in The Lancet 2001: The doctor is forced out of his job at London’s Royal Free Hospital over allegations reserach was flawed; goes to work in the U.S. 2004: He is accused of secretly being paid by solicitors acting for parents who believed their children had been harmed by the MMR vaccination. Chief Medical Officer Professor Sir Liam Donaldson accuses Dr Wakefield of ‘mixing spin and science’ ‘It also found that you showed a callous disregard for the distress and pain you knew or ought to have known the children involved might suffer. You abused your position of trust as a medical practitioner.’ Dr Kumar said Dr Wakefield’s conduct at the U.S. seminar ‘was such as to bring the medical profession into disrepute’. Dr Wakefield was also found to have ordered some of the youngsters featured in the Lancet article to undergo unnecessary colonoscopies, barium meals, blood and urine tests and brain scans. Some of the tests were carried out by professors Walker-Smith and Murch. The GMC said Dr Wakefield was ‘dishonest’ in not telling the Legal Aid Board that some of the £55,000 he received went towards wages for his staff, rather than the specific tests and care he had outlined. However, he did not gain personally from the money. He was also criticised for not telling the Lancet he had filed a patent for a measles vaccine to rival MMR, and for starting a child on an experimental drug called Transfer Factor, which he planned to produce and sell, without the necessary paediatric qualifications. The panel decided the allegations against the three doctors could amount to serious professional misconduct and will rule on their fate at a later hearing. Last night, as parents of the ‘Lancet 12’ stood by the trio, Jackie Fletcher of vaccination support group Jabs said: ‘This has been a witch-hunt against the three doctors. The bottom line is that no parent has complained and no child has been injured.’ But the medical establishment gave the vaccine its full backing, with 12 organisations including the British Medical Association endorsing a statement which states there is no link between MMR and autism. ‘Not one parent ever complained. He was the only doctor who ever listened to us’ Andrew Wakefield and his team at the Royal Free Hospital studied 12 children aged three to ten. All had intestinal disorders and nine were diagnosed with autism. In eight cases the symptoms emerged soon after the child received the MMR jab. The study became a key aspect of the allegations at the GMC – even though none of the ‘Lancet families’ complained. The children were not identified during the GMC hearing but some of their parents have agreed to tell their stories to the Daily Mail. For Isabella Thomas, Andrew Wakefield was the only doctor who ‘ever really listened’. Mrs Thomas, 52, who lives with husband Ian in Somerset where they run a business, said their sons Michael, now 17, and Terry, 15, both had severe reactions after having the MMR jab. ‘Michael was referred to the Royal Free when he was five because he had bad bowel symptoms,’ she said. ‘I was excited when he went there, thinking, “Thank God, at least someone is trying to do something for the children and relieve their pain”. ‘We as parents were treated at the hospital with the utmost respect and told everything that was going on. ‘Michael was put on a medication that helped him enormously through his pain. Terry had similar symptoms and was referred there too when he was three. ‘What I find really frightening is that the GMC is normally there to protect the patients from the doctors, but in this case none of us complained and I feel as if our children are being used by the GMC. Emotional supporters wait as Dr Wakefield makes his statement ‘I feel the children are being used as political pawns – it has not been about protecting the children. It is about protecting MMR. ‘I firmly believe these doctors are going to be hung out to dry because they dared to question MMR. ‘Dr Wakefield and his colleagues are the only doctors who ever really listened to us. I fear now that no doctor will want to have anything to do with helping any child that is harmed by any vaccine in the future.’ She said that after Michael had the MMR jab when he was 14 months old he began ‘screaming and making a high pitch screeching like a cat’. She added: ‘He was like a wild animal he was in so much pain.’ When her youngest son Terry was a few months old, Mrs Thomas noticed him having convulsions, and doctors explained that sometimes happened in small children. ‘One consultant told me that if he didn’t have MMR he could die from measles because he was prone to convulsions,’ she said. ‘But after the jab, he came out in a burns rash and I knew this was not normal. He had an extremely high temperature and was very pale, and I knew what was happening because of Michael. ‘I was told to accept my children as they were but I knew something was wrong.’ Mrs Thomas repeatedly visited doctors and questioned the MMR jab. But, she says, they told her she was too complaining and should stop investigating a potential link with the jab. ‘They basically threatened that if I carriedon causing a fuss then my children would be put on the at-risk register,’ she says. ‘Any parent who had a child suffering would do anything to help them and that is why we support Dr Wakefield.’ Rochelle Poulter, 50, and her husband Graham, 54, a gas engineer live near Horsham, West Sussex. Their son Matthew, now 19, had the MMR jab aged 15 months. Mrs Poulter said: ‘He was a really happy baby until then. Afterwards he was really miserable, became much less sociable and started to lose the few words of speech he had and developed bowel problems.’ He was diagnosed with autism aged five. His parents thought they had come to terms with his condition until a chance remark at a mother and toddler group. Anger: Parents of autistic children show their support for Dr Wakefield at the GMC Mother- of-three Mrs Poulter said: ‘A mother asked me if he had received his MMR jab, because she’d heard there might be a link with autism and bowel disorders. It was like someone had hit me. All the pieces fell into place. I cried.’ Matthew was referred to the Royal Free Hospital by his GP at the family’s request after they heard about the work going on there. Mrs Poulter said: ‘I was happy with the investigations they proposed because nobody else at that time was looking into these problems like they were.’ Matthew had a colonoscopy and a lumbar puncture. His mother said: ‘I am disgusted the GMC has wasted so much time and money on this where not a single parent has complained.’ Angela Bennett, 48, and her partner David Mulray, 50, live in Liverpool. Their son Kevin Mulray had the MMR jab at 13 months. Miss Bennett said: ‘After he had the vaccine he had a nose bleed and a very high temperature which lasted for five days. Then he started banging his cot and crying a lot. ‘Gradually his speech got less and less comprehensible and went completely by the time he was 18 months. ‘At first he was diagnosed with learning difficulties with autistic tendencies just before he was three. ‘Health visitors would say I was just being an over-protective mum. Then he was diagnosed with autism just before he was seven. ‘I found out about Andrew Wakefield and the Royal Free Hospital through the support group for vaccine-damaged children, Jabs. ‘At the hospital Dr Wakefield outlined what they could do to help. No one at the Royal Free mishandled Kevin and they told me exactly what they were going to do before they did it.’ Mrs Bennett was by her son’s side as he underwent both a colonoscopy and a lumbar puncture, and still supports the decision to carry them out. ‘The complaints did not come from the parents. I feel sorry for Andrew Wakefield and the other two doctors because they were there to help the children. ‘They were the only ones that really listened to the parents. The doctors in Liverpool had told us there’s nothing to help Kevin, there’s no miracle cure. ‘At least Dr Wakefield took an interest in where the autism was coming from.’ Kevin is now 20 and in adult care, returning home for the weekends. Jab take-up fell, measles cases rose Take-up of the MMR jab plunged by 12 per cent after Dr Wakefield linked the triple vaccine to autism in 1998. Until then the rate was 91 per cent – close to the 95 per cent needed for ‘herd immunity’, where so many are vaccinated that it becomes very hard for the bug to spread. By 2003, it had fallen to 80 per cent nationwide and to below 50 per cent in some parts of London. Fuelling panic: Tony and Cherie Blair refused to say if their son Leo had the MMR And the number of measles cases was on the rise. Health officials said it was vital that children were vaccinated but parents accused the Government of trying to force their hand by refusing to offer single jabs against the three diseases on the NHS. The MMR jab, which is easier to give than single shots, was introduced in 1988, when measles infected tens of thousands of children a year and killed up to 25. In the same year Dr Wakefield, who was studying the causes of bowel disease at West London’s Royal Free Hospital, started receiving calls from worried parents. They described how their apparently healthy children had developed autism and bowel problems soon after being given the vaccine. The next year Dr Wakefield and a dozen colleagues began to study 12 such youngsters. MMR – THE VACCINE MMR is the combined vaccine against measles, mumps and rubella and helps to reduce the risk of epidemics. It contains weakened versions of the live disease viruses. It is given to children at around 13 months of age after the immunity the baby got from their mother fades. It is given again when children are aged between three and five to increase the chance that those who didn’t acquire immunity from the first jab are protected. Over 500 million doses of MMR have been used in over 90 countries around the world since the early 1970s. The World Health Organization states that MMR is a highly effective vaccine with an outstanding safety record (WHO, 2001). Their paper in the Lancet in 1998 stopped short of blaming MMR for the children’s symptoms but called for more research. But Dr Wakefield told journalists he could no longer support the use of the MMR triple jab. The Government immediately sought to calm fears, with a panel of 37 experts saying there was no evidence of a link between MMR and bowel disease or autism. In April, the Lancet published a Finnish study of three million children which found no evidence of autism being caused by MMR. Two further studies published in June came to the same conclusion. But the idea had taken hold and vaccination rates plunged. The following year, Tony Blair was accused of adding to the confusion when he refused to say whether his youngest son Leo had received the jab. By 2003, vaccination levels had fallen to 80 per cent. Tens of thousands of parents paid up to £400 for separate shots against measles, mumps and rubella but the bigger number of injections required cut the odds of a child completing the course and so being fully protected against the diseases. Others shunned the MMR jab altogether. Dr Wakefield stood by his research. In 2002, he published another paper linking measles, bowel disease and autism. The GMC decided to investigate him in 2004, when the Lancet publicly rejected his findings.
{ "pile_set_name": "StackExchange" }
Q: Running an html response without opening the browser I'm trying, using node.js (request package), to get a server response of html file, adding a script to it and run this file with the script. The node.js: const request= require ('request') const fs = require ('fs') request.get ('www.google.com', (err, data, body) => { if (err) throw err body+='<script src="script.js"></script>' fs.writeFile ('h.html', body) }) The script.js: window.onLoad = () =>alert ('something') How can I do it without saving the response in html file and open it in the browser? A: You can do the following: var templateHtml = "<!DOCTYPE html><html><head></head><body>Your HTML</body></html>"; app.get('/your_resource',function(req,res){ res.send(templateHtml); }); Of course, you need to replace in templateHtml the script. Take a look at this answer to get more info about how to use HTML templates. For example, imagine you have the package express-es6-template-engine in your project. NodeJs var express = require('express'), es6Renderer = require('express-es6-template-engine'), app = express(); app.engine('html', es6Renderer); app.set('views', 'views'); app.set('view engine', 'html'); app.get('/', function (req, res) { res.render('index', {locals: {title: 'Welcome!', script: '<script>//script.js</script>'}}); }); app.listen(3000); Html <!DOCTYPE html> <html> <head> ${script} </head> <body> <h1>${title}</h1> </body> </html> Hope it helps!
{ "pile_set_name": "StackExchange" }
Q: JavaFX how to access field (TextArea) from other Stage (Class) I have one main Scene, where I keep all mu GUI. It has a menu, which opens new scenes, where I have some settings: public class StartController implements Initializable { // Some other fields @FXML private TextArea eventLog; // This method opens "new project" window @FXML private void openProjectWindow(Event event) throws IOException { eventLog.appendText(EventLogUtils.getDate() + STATUS.INFO + " New project window opened\n"); GridPane newProjectWindow = (GridPane) FXMLLoader.load(getClass() .getResource("../view/project.fxml")); Scene scene = new Scene(newProjectWindow, 800, 600); scene.getStylesheets().add( getClass().getResource("../view/main.css").toExternalForm()); Stage projectStage = new Stage(); projectStage.setScene(scene); projectStage.setTitle("New Project"); projectStage.show(); } } This eventLog TextArea is a place where I put all the logs, like application started, settings changed, project saved etc. I'm opening new scene with openProjectWindow void and I'm adding this information to my logger. My new window is a separate class: public class ProjectWindowController implements Initializable { // fields and methodes to fill and save forms } Once It's done I need to access StartController.eventLog somehow, but nothing I tried is working: Changing eventLog to public Extending StartController by ProjectWindowController and trying super.eventLog.appendText() Changing eventLog to public static (throws exception during runtime) Is there any way to access this field from different Stage (Class) ? I'd normally use Singleton design pattern, but I think it's impossible in this case. I was looking for similar questions, but I didn't find any case matching my problem. Thanks for any help! A: Rather than exposing the UI control to another class and modifying it directly, a better approach (and probably easier to use) would be to use an intermediate class or set of classes to hold all the information you're trying to log, and use property binding to bind the data to the event log text area. That way, you maintain the boundary of your classes and you keep relevant data organized in the proper location, and you can allow anyone who wants the data to access it in a standard way. Something like: public final class LogInfo { private static StringProperty logData = new SimpleStringProperty(); // methods that set/format logData based on changes from your UI // provide public access to the property public static StringProperty logDataProperty() { return logData; } public static void setLogData(String data) { logData.set(data); } public static String getLogData() { return logData.get(); } } Then in your UI scene, you can bind the textProperty of the UI control to the log data like so: public class StartController implements Initializable { // Some other fields @FXML private TextArea eventLog; @FXML public void initialize(URL url, ResourceBundle resourceBundle ) { // other initialize stuff // bind the log property to this event log // Bindings.bindBidirectional() if you want to be able to control the property from both sides. eventLog.textProperty().bind(LogInfo.logDataProperty()); // ... } } You can choose how the UI updates the log info property in your LogInfo class, but this should help you get further while still maintaining information separation.
{ "pile_set_name": "OpenWebText2" }
A host of new state laws take effect December 1, including a number of criminal justice measures. Under the act known as Death by Distribution, state prosecutors will be able to hold drug dealers accountable for overdose deaths related to their illicit sales. The new law is part of an effort by state officials to address the opioid epidemic. Prosecutors could charge dealers with murder without having to prove malice. The law raised some concerns that good Samaritans who would otherwise notify authorities about an overdose would be deterred from calling. The law contains a provision granting immunity from prosecution to people in such situations. Conner’s Law increases the penalty for assaulting a law enforcement officer with a firearm, more than doubling the maximum sentence for such an offense. The law was named for North Carolina State Trooper Kevin Conner, who was fatally shot by the driver of a pickup truck he pulled over on a highway in Columbus County in October 2018. The prosecutor in Conner’s case is seeking the death penalty against the trooper’s alleged killer. The law known as Raise the Age also takes effect December 1. North Carolina was the last state in the nation to reclassify 16 and 17-year-old criminal offenders as juveniles. Lawmakers allocated more than $30 million dollars this fiscal year to account for the change's implementation, includng the hiring of more court counselors and the expansion of juvenile detention centers.
{ "pile_set_name": "StackExchange" }
Q: Discrete Math Pigeon-Hole How can we solve below problem? Let $X = \{1,2,3,\dotsc,100\}$. If eleven numbers are selected from $X$, show that there are at least two numbers $u$ and $v$ such that $$0 \lt \left| \sqrt{u} - \sqrt{v} \right| \lt 1\;.$$ A: Since it is absolute value, the expression cannot go below zero, so we do not have to worry about the results being too low. We just have to prove that it cannot go to $1$ or above. A way to ensure that there are no eleven numbers that can be picked from $X$ that do not satisfy the expression is to find the set of numbers where the smallest $|\sqrt{u}-\sqrt{v}|$ is as large as it can be. Given those eleven numbers in a set from least to greatest, adjacent numbers would have the best chance at being the two numbers that can satisfy the expression. To ensure that $|\sqrt{u}-\sqrt{v}|$ is as large as it can be, that expression must be equal among adjacent elements. This will give us a set of eleven decimals but it still works for the problem at hand to test if it is true because a set of integers would be even more restricted than decimals and would have $|\sqrt{u}-\sqrt{v}|$ smaller than or equal to the decimal version. The first element must be $1$, and the last element must be $100$ because we want the set of eleven to be as spread out as much as possible. Lets define $x$ as the result of the expression given two adjacent numbers. $|\sqrt{u}-\sqrt{v}|=x$ $\sqrt{u}=x+\sqrt{v}$ $u=(x+\sqrt{v})^2$ Start with $v=1$ because that must be the first element. $u=(x+\sqrt{1})^2$ $u=(x+1)^2$ Now plug that back into $u=(x+\sqrt{v})^2$ as $v$ $u=(x+x+1)^2$ $u=(2x+1)^2$ The pattern is now visible as to how the numbers must progress if the expression is to be equal among adjacent numbers. Lets define this set of eleven numbers as $Y$ where $n$ starts at $0$. $Y_n=(nx+1)^2$ Since $n$ starts at $0$ to maintain a first element of $1$, the $n$ value for eleven iterations must be $10$. We want $Y_{10}$ to equal $100$ so that the last element of $100$ is maintained. $100=(10x+1)^2$ Now solve for $x$ and see if it is below $1$. If it is, we know the answer is true. If not, we can round the decimals to integers and re-evaluate the expression, or we can try a different method altogether. $10=10x+1$ $9=10x$ $x=0.9$ Therefore it must be true. $0.9<1$ The eleven decimals that would provide this result are: $Y_n=(0.9n+1)^2$ $Y=$ {$1,3.61,7.84,13.69,21.16,30.25,40.96,53.29,67.24,82.81,100$} As I said before, this is valid because an integer set is more restricted and could only have the expression evaluate to something less than or equal to $0.9$. It could not be equal in this case because for it to be equal, the decimal set would have to naturally occur without any decimals. This can be generalized further for other problems of the same nature. Lets define $a$ to be the first element, $b$ to be the last element, and $c$ to be the number of elements selected. $b=((c-1)x+\sqrt{a})^2$ $\sqrt{b}=(c-1)x+\sqrt{a}$ $\sqrt{b}-\sqrt{a}=(c-1)x$ $x=\frac{\sqrt{b}-\sqrt{a}}{c-1}$ This method can only prove that it is true, with the original set being solely composed of whole numbers. If this method yields false, that does not necessarily mean it is false.
{ "pile_set_name": "OpenWebText2" }
1.7k SHARES Facebook Twitter Whatsapp Pinterest Reddit Print Mail Flipboard Advertisements Counterterrorism expert Malcolm Nance didn’t hold back on Donald Trump on Saturday morning, telling MSNBC’s Joy Reid that this president is “stoking violence” both at home and abroad. “Can I rant for a second?” Nance asked before emotionally tearing into Trump. “The president is pushing this. The president is their champion,” he said, referring to white nationalist terrorists like those who carried out the New Zealand massacre. “He is stoking violence not just in the United States but around the world.” Advertisements Video: Nance said: I’ve spent my entire life defending this nation. I spent my entire life in the Middle East working with our Arab and Muslim allies to keep what they call the invaders out of here. We have done that successfully. But we’ve turned a complete and blind eye to the Americans in our own midst who are terrorists, to Americans who would betray our own constitution on the basis of tribalism. The president is pushing this. The president is their champion. And you know what, to be quite honest, he needs the sierra tango foxtrot uniform. And if he doesn’t understand what that means, he needs to turn to the right, ask his defense attache or the chairman of the joint chiefs of staff. He is stoking violence not just in United States but around the world. He is a leader. Act like it. E Pluribus Unum. For many one is what we are. And that does not mean that one tribe is over another tribe. The people in the counterterrorism community, every intelligence watch officer watching right now cannot do their work so long as the president of the United States keeps talking about them like they are foreign invaders who are taking something away from us. All immigrants to this country give us something. Ask Alexander Hamilton, George Washington and all the rest of the people who came from some other place and created this nation. Donald Trump is making the world less safe As Donald Trump continues to demonize immigrants and minorities, it is those same groups that appear to be most victimized by terrorism. Not only did we see it play out so gruesomely in New Zealand this week, but hate crimes against Muslims n the U.S. and all around the world continue to rise in the Trump era. This completely contradicts the worldview of Trump and his supporters that white America is under attack and must be preserved and protected. There is mounting evidence that the opposite is true. As Malcolm Nance said on Saturday, the deadly cocktail of Trump’s abhorrent anti-Muslim rhetoric combined with his loud racist dog whistles and winks toward white supremacists is having dangerous consequences, not just in the United States but around the globe. Follow Sean Colarossi on Facebook and Twitter
{ "pile_set_name": "Pile-CC" }
PostgreSQL Migration And Sync PostgreSQL is a highly scalable, SQL compliant, open source object-relational database management system. Many web application developers prefer it as the back-end data management component. Its advanced feature set and key advantages such as open source community support, very low deployment cost, and easy administration make it the great choice for those who use it for database-driven web application development. Its primary competitors are MySQL, Microsoft SQL Server and Oracle DB. The DBConvert product line covers all the most popular migration and synchronization directions, allowing users to convert and replicate data between Postgres/ Amazon RDS for PostgreSQL/ Heroku Postgres and other database engines. All PostgreSQL related migration products are listed below. Note that two PostgreSQL/ Amazon RDS PostgreSQL DB or Heroku Postgres instances in any combination may be specified as source and target databases in our PostgreSQL related Converters and Sync tools
{ "pile_set_name": "OpenWebText2" }
Supremo considera constitucional estado de emergência na Venezuela Com oposição pressionando para a realização de um referendo visando tirar Maduro do cargo, presidente decretou amplos poderes para as forças de segurança de modo a impor a ordem pública O estado de emergência decretado na Venezuela esta semana pelo presidente Nicolas Maduro é constitucional, declarou nesta quinta-feira (19) o Supremo Tribunal. Com a oposição pressionando para a realização de um referendo visando tirar Maduro do cargo, o presidente decretou amplos poderes para as forças de segurança de modo a impor a ordem pública e ajudar na distribuição de alimentos à população. O Congresso, controlado pela oposição, rejeitou a decisão. No entanto, o Supremo Tribunal confirmou a sua constitucionalidade, considerando “as extraordinárias circunstâncias sociais, econômicas, políticas, naturais e ecológicas que estão afetando com gravidade a economia nacional.”
{ "pile_set_name": "PubMed Abstracts" }
Venous allografts preserved at 4 degrees C for infrainguinal bypass: long-term results from 170 procedures. From April 21, 1982 to December 31, 1997, we performed 170 infrainguinal bypass procedures using isolated (n = 35) or composite (n = 135) venous allografts preserved at 4 degrees C as a substitute for saphenous autografts in 146 patients. The mean age of the patient population was 74 years. The indication was critical lower limb ischemia in 71% of cases. Seventy-five percent of procedures were below the knee and 26% were infrapopliteal. Mean length and diameter were 19.5 +/- 0.5 cm and 4.8 +/- 0.5 mm, respectively. After December 8, 1993, a reinforcement net was placed over the graft to prevent expansion in 71% of cases. Primary and secondary 5-year patency, calculated according to the Kaplan-Meier method, were 33 +/- 6% and 43 +/- 6%, respectively. Factors correlated with secondary patency were studied using the log-rank test. Previous ipsilateral infrainguinal revascularization was associated with a 40% decrease in secondary patency at 2 years (71% vs. 31%). Patency at 5 years was correlated with the level of anastomosis (47% for low popliteal anastomosis vs. 30% for infrapopliteal anastomosis). The likelihood of stenosis or dilatation of the allograft was 8% and 29.5%, respectively, at 5 years. The 5-year limb salvage and survival rates were 84% and 57%, respectively. The encouraging results of this series suggest that venous allografts provide a useful alternative for infrainguinal bypass when autologous grafts or other more reliable conduits are unavailable.
{ "pile_set_name": "Github" }
"============================================================================ "File: prettycss.vim "Description: Syntax checking plugin for syntastic "Maintainer: LCD 47 <lcd047 at gmail dot com> "License: This program is free software. It comes without any warranty, " to the extent permitted by applicable law. You can redistribute " it and/or modify it under the terms of the Do What The Fuck You " Want To Public License, Version 2, as published by Sam Hocevar. " See http://sam.zoy.org/wtfpl/COPYING for more details. " "============================================================================ if exists('g:loaded_syntastic_css_prettycss_checker') finish endif let g:loaded_syntastic_css_prettycss_checker = 1 if !exists('g:syntastic_css_prettycss_sort') let g:syntastic_css_prettycss_sort = 1 endif let s:save_cpo = &cpo set cpo&vim function! SyntaxCheckers_css_prettycss_GetHighlightRegex(item) let term = matchstr(a:item['text'], '\m (\zs[^)]\+\ze)$') if term !=# '' let term = '\V' . escape(term, '\') endif return term endfunction function! SyntaxCheckers_css_prettycss_GetLocList() dict let makeprg = self.makeprgBuild({}) " Print CSS Lint's error/warning messages from compact format. Ignores blank lines. let errorformat = \ '%EError: %m\, line %l\, char %c),' . \ '%WWarning: %m\, line %l\, char %c),' . \ '%-G%.%#' let loclist = SyntasticMake({ \ 'makeprg': makeprg, \ 'errorformat': errorformat, \ 'defaults': {'bufnr': bufnr('')} }) for e in loclist let e['text'] .= ')' endfor return loclist endfunction call g:SyntasticRegistry.CreateAndRegisterChecker({ \ 'filetype': 'css', \ 'name': 'prettycss'}) let &cpo = s:save_cpo unlet s:save_cpo " vim: set sw=4 sts=4 et fdm=marker:
{ "pile_set_name": "Pile-CC" }
en - The Arctic While the inhabitants of the Arctic have done nothing to contribute to the global ecological crisis, they are first in line to suffer the consequences. Greenland is the canary in the coal mine of immense environmental change in the world. The most obvious crisis is the rapid melting of the ice cap which portends the demise of numerous Arctic species and has made it too dangerous for the local Inuit to pursue traditional hunting for clothing and food. In addition, global winds and sea currents have brought massive amounts of toxic pollution from other countries, causing disease and birth anomalies in both humans and animals who inhabit the area. This film follows the coming together of top experts on the Arctic, politicians, environmental scientists and religious leaders from Christian, Muslim, Hebrew, Buddhist, Hindu, Jain and Sikh traditions—along with Saami and Inuit leaders—as they draw attention to the environmental changes in Greenland that are already affecting the rest of the planet. At the same time they talk about what can be done to turn things around. NBTo see the videos it may be necessary to enter Vice President Al Gore welcomes the “Green patriarch” to Washington DC the click on the column on the right for `Amazon, the end of infinity’ and`The Arctic, consequences of human folly’
{ "pile_set_name": "NIH ExPorter" }
Our laboratorys accomplishments this year begin with full characterization of the tumor microenvironment of two different models of murine oral cavity (MOC) cancer. Both models are carcinogen-induced, fully syngeneic models of oral cancer that are transplantable into immunocompetent C57BL/6 mice. MOC1 generated tumors are slow growing, do not metastasize and demonstrate a T-cell inflamed phenotype with high baseline CD8 T-lymphocyte and NK cell infiltration. MOC1 tumors have a high mutational burden and are predicted to have dozens of neoantigens with high affinity binding to MHC class I complexes. MOC2 tumors are very aggressive, metastasize early, and demonstrate a non-T-cell inflamed microenvironment with low CD8 T-lymphocyte and NK infiltrate but robust infiltration of myeloid derived suppressor cells (MDSCs). MOC2 tumors have low mutation burden and are predicted to have very few neoantigens with high MHC class I binding affinity. These two tumors, which are both carcinogen-induced oral cavity squamous cell carcinomas, represent powerful models that can be used to study highly (MOC1) and poorly (MOC2) immunogenic tumors in immune competent mice. We further characterized the expression of programmed death ligand 1 (PD-L1) in both models, and demonstrated high PD-L1 expression in MOC1 tumors and very low PD-L1 expression in MOC2 tumors, consistent with their baseline phenotype. Using small molecule inhibitors to target oncogenic pathways important for the growth and survival of MOC cells, we revealed that this PD-L1 expression in MOC1 was not associated with oncogenic signaling, but rather associated with baseline and changes in interferon levels within the tumor microenvironment (Head and Neck, In Press). This work further established the MOC1 and 2 models as useful tools to study treatment-induced changes in the tumor microenvironment. Our first series of therapeutic experiments were designed to understand how small molecule inhibitors that target the phosphoinositide 3-kinase/mammalian target of rapamycin (PI3K/mTOR) and mitogen-activated protein kinase (MAPK) pathways, both shown to be commonly co-activated in head and neck cancers, affect tumorigenesis in MOC1 and MOC2 tumors. While the growth of both primary tumors was significantly suppressed while on treatment, we demonstrated that mTOR inhibition resulted in durable anti-tumor responses following cessation of treatment in immunogenic MOC1 but not poorly immunogenic MOC2 mice. This was a CD8 but not NK dependent mechanism as CD8 depletion completely abolished the anti-tumor effect of rapamycin in immunogenic MOC1 tumors. Conversely, inhibition of the MAPK pathway was found to be very immunosuppressive in immunogenic MOC1 tumors, blocking tumor infiltration and expansion of antigen-specific CD8 T-lymphocytes and NK cells and prevent durable treatment responses (Oncotarget, In Press). This data challenges existing paradigms as rapamycin, more so than MAPK inhibition, is generally felt to be immunosuppressive in the context of preventing solid organ transplant rejection. This data, combined with existing clinical data demonstrating objective tumor responses to single agent rapamycin in a subset of patients with treatable oral cavity cancer, suggested that rapamycin could synergize with immunotherapies to improve anti-tumor immune responses. We next combined rapamycin and a MEK inhibitor with anti-PD-L1 antibody immunotherapy. We demonstrated that while no significant responses were observed in MOC2 tumors following PD-L1 inhibition, transient anti-tumor responses with PD-L1 blockade and durable anti-tumor responses in a subset of tumors following rapamycin were significantly enhanced following combination therapy. No synergy was observed between MEK and PD-L1 inhibition; rather, MEK inhibition appeared to reverse the favorable CD8 and NK responses observed with PD-L1 blockade alone. Mechanistically combination rapamycin and PD-L1 blockade enhanced IFN production from antigen-specific T-cells both in the tumor and in the periphery, and was again a CD8 and not NK dependent process (Manuscript Submitted). We have continued to work to understand the exact mechanism of how rapamycin in enhancing immunotherapeutic responses, with the ultimate goal of gathering enough pre-clinical evidence to justify combining rapamycin with checkpoint inhibitor therapy in the clinic. Given this demonstration of how targeted therapies can critically alter the tumor microenvironment to either enhance or limit immunotherapeutics, we have expanded our study to how various targeted and adjuvant therapies effect T-lymphocyte and NK cell function both in vitro and in vivo with the goal of optimizing different treatment combinations to maximize anti-tumor activity. We will continue to use the MOC model system as a means of pre-clinically evaluating different combinations, with correlative and mechanistic studies validating which combinations carry the most clinical promise.
{ "pile_set_name": "DM Mathematics" }
ositive. f**(31/2) Simplify ((a**(-2))**(-2/119)*((a*a/((a**(-4)*a)/a)*a)/a*a*a)/(a*a**(-5)))**(-6) assuming a is positive. a**(-8592/119) Simplify ((u/(u/(u/(u*u**(1/14)))*u)*u**(9/4))**0)**(-11/6) assuming u is positive. 1 Simplify (a/a**(-4/7))/(a/(a*a/((a/(((a*a**7)/a)/a))/a)))*a**(-7/5)/(a*a*a**1*a) assuming a is positive. a**(111/35) Simplify (c/(((c**(2/9)*c)/c)/c)*c**(3/2)*c/c**6*c**(1/7)*c)**(1/6) assuming c is positive. c**(-73/756) Simplify (x**(-6)*(x/(x/((x*x**(2/31))/x))*x)/x*x)/((x/(x*x**18))/x*x/x**24) assuming x is positive. x**(1149/31) Simplify ((z**(-2/7))**45*(z/((z/(z*z*z**(-1)/z*z)*z)/z*z))**41)**(-2/43) assuming z is positive. z**(180/301) Simplify ((f**(-6)*f**(2/37))**13)**(-1/4) assuming f is positive. f**(715/37) Simplify (i*i**0*i)/i**5*(i*i**(-2/35)*i)/i**5 assuming i is positive. i**(-212/35) Simplify (b**(-30)/(b/(b*b/b**25)))/(b**(5/4)/b**(6/5)) assuming b is positive. b**(-1081/20) Simplify ((l/(l**(1/2)*l))/l*l/l**(-1/4))/(l**3)**(-31) assuming l is positive. l**(371/4) Simplify h**19/(h/((h*h*h/h**(-11))/h))*(h**(2/3))**(1/3) assuming h is positive. h**(281/9) Simplify ((v**(1/5))**10*((v/(v/((v*v**(-3))/v*v)*v)*v)/v)/(v*v**(-6)))**20 assuming v is positive. v**80 Simplify (((((m*m**14)/m)/m)/m*m)**(-5/9))**(34/7) assuming m is positive. m**(-2210/63) Simplify (f**(-5/3)/f*f*(f/(f/(f*f**(-8/3))*f)*f)/f)/((f*f**(-16))/(f/(f*f*f/f**(-4/5)*f*f))) assuming f is positive. f**(88/15) Simplify (t**9)**(-2/7)*(t**2*t)**33 assuming t is positive. t**(675/7) Simplify (j**(5/4))**(-3/5)/(j**(-23))**43 assuming j is positive. j**(3953/4) Simplify (f*f**(-34))/(f*f**(-1/32))*(f**(-4/17))**(-24/5) assuming f is positive. f**(-89323/2720) Simplify s/((s**(-4)*s)/s)*s**(-8)*s**8*s**(-2/39) assuming s is positive. s**(193/39) Simplify (s**(-8)/s)/(s/s**(1/10))*s**10*s*s/(s/(s**6*s)) assuming s is positive. s**(81/10) Simplify v*(((v/v**(-6))/v)/v)/v*v**(-2)*(v/v**(-1/3))/v*v*v*(v**(-2/37)*v)/v*v*v assuming v is positive. v**(808/111) Simplify ((o/(o**(-1)*o)*o*o)**(-14/9)/(o**(-2/9)/o**(2/3)))**(7/4) assuming o is positive. o**(-119/18) Simplify ((t**(-1/4))**(9/7)*(t/(t*((t/t**(-1)*t)/t*t*t)/t))/(t**9/t))**31 assuming t is positive. t**(-9827/28) Simplify (m**2/((m/(m**(-9)*m))/m)*((m/((m*m**(-2/5)/m)/m))/m)**3)**9 assuming m is positive. m**(-81/5) Simplify (r**21)**19*r**(9/2)*r**26/r assuming r is positive. r**(857/2) Simplify ((l**(2/5))**(1/67)/(((l*l/l**(1/5)*l)/l)/(l*(((l/(l/((((l/l**4)/l)/l)/l)))/l)/l)/l*l)))**(-12) assuming l is positive. l**(35352/335) Simplify ((y/((y/(y*y*y**(2/9)*y)*y)/y)*y)/y*y)**(-36)*(y*y/((y**(7/8)/y)/y))/y**5 assuming y is positive. y**(-1231/8) Simplify (b/(b/(b/(b/(b*((b/((b**(-8)/b)/b))/b)/b*b))))*b*(b*b**(-11))/b)/((b/(b/(b**(20/7)*b*b)))/b*b**(-24)) assuming b is positive. b**(148/7) Simplify (l/(l**(-2/3)/l*l))**(-12)*l**(-10)*l**(-1/8) assuming l is positive. l**(-241/8) Simplify a**(2/21)/a**(-3/7)*a**(-1/8)/a*a**(1/5) assuming a is positive. a**(-337/840) Simplify (k**(1/8)*k**(-2/25))/(k**(-2/3)/k*k**(-2/19)/k) assuming k is positive. k**(32113/11400) Simplify (((g/g**(-1/7))/g**(-1/3))/(g**0/(g**1/g)))**(8/7) assuming g is positive. g**(248/147) Simplify (m/(m**(-2/3)/m))/m**(1/5)*((m*m**(-7/6)*m)/m*m)/((m**(-7)*m)/m) assuming m is positive. m**(103/10) Simplify (z/((z*z*z/(z/(z**5*z*z)))/z*z)*(z**(3/4)/z)/z)/(z*(z*z**7*z)/z)**(-25) assuming z is positive. z**(863/4) Simplify ((((r*r**(-12)/r)/r)/r)/((r/r**(-7))/r))/(r**(-3/5))**47 assuming r is positive. r**(36/5) Simplify q/((q*q*q*q**(-17))/q)*q**14*q/q**(-10)*q/q**(-11/2) assuming q is positive. q**(95/2) Simplify (h**(-2/9))**(-17)*((h/(h*h*h**(3/5)*h))/h*h)**(10/17) assuming h is positive. h**(344/153) Simplify ((m**(-3/8)*m**(1/12))**32)**(-19) assuming m is positive. m**(532/3) Simplify (a/a**20)/(a/(a*a**(4/5)*a))*a**(-13)/(a*a/(a**1*a)*a) assuming a is positive. a**(-156/5) Simplify (c**11*c**7*c*c**(-8)*c*c/c**(1/12))**33 assuming c is positive. c**(1705/4) Simplify (v**(-2/27)*v**26)/((v*v**6*v*v)/(v**24*v)) assuming v is positive. v**(1132/27) Simplify z**8/(z**(-1/10)*z)*z**(-1/10)/((z/(z/(z*z**7)))/z) assuming z is positive. 1 Simplify ((r/(r/r**(14/3)))/r*r)**(-2/49)/(r**(1/12)/(r**(-16)*r)) assuming r is positive. r**(-1283/84) Simplify ((h/(h**20*h)*h)/(h*h**(2/3)*h))**(-14) assuming h is positive. h**(910/3) Simplify ((o**(2/15)/o*o**(-2/11)*o)/(o**1*o**(-5)))**(-18) assuming o is positive. o**(-3912/55) Simplify (l*l**(-1/15))**(-17)/(l**3)**(-17) assuming l is positive. l**(527/15) Simplify (((v**1*v)/v)**(1/5)/(v/v**(-1))**(-6/7))**(-45) assuming v is positive. v**(-603/7) Simplify (h/h**(2/9))**(-12)/(h**(2/7))**44 assuming h is positive. h**(-460/21) Simplify (g/((g*g**(-1))/g))**(-16)/(g**(-5)*g*g*g)**(9/5) assuming g is positive. g**(-142/5) Simplify (k**(-24))**42/(k**(-1/5))**(-27) assuming k is positive. k**(-5067/5) Simplify u*u/u**4*u*u*u**8*u/u**14*(u**(-4/9)/u*u)/u assuming u is positive. u**(-58/9) Simplify (w**0/w)**(8/3)*w**(-9)*w**25*w assuming w is positive. w**(43/3) Simplify s**(-10)*s*s**1/s*(s**(-1/9))**(12/19) assuming s is positive. s**(-517/57) Simplify ((j*j**(-2)/j*j)**(2/51)/(j*j/(j/(j*j**(1/4)*j)))**44)**(1/20) assuming j is positive. j**(-1459/204) Simplify ((s/(s/(s/(s/(s/((s*s**2/s*s)/s)*s)))))/(s/s**(6/11))*s*s**(-1/4)*s*s**(3/4))**(-37) assuming s is positive. s**(-1665/22) Simplify ((a*a/((a**(-1/6)/a)/a))/a)**(-11)*((a**(-1/3)/a)/a)**(-6) assuming a is positive. a**(-125/6) Simplify ((q/q**(-2/7)*q)/(q/(((q/q**(-25))/q)/q)))/(q*q*(q**(1/2)/q)/q*q**(13/4)) assuming q is positive. q**(603/28) Simplify d**(11/4)/d*d*d/d**26*d*d/(d*d**(-1/5))*d**(12/5) assuming d is positive. d**(-373/20) Simplify (s**9)**(-1/75)/(s**(-11/8)*s*s**6) assuming s is positive. s**(-1149/200) Simplify ((b/(b*b**26*b))/(b/((b/(b**(3/11)*b))/b)))/((b/(b/(b/((b*b/b**(3/26))/b*b))))/b*b**(-2/5)) assuming b is positive. b**(-38593/1430) Simplify (n**(-1/4)*n)/(n**(-3/4)*n)*(n**7*n)/(n*n/n**5*n) assuming n is positive. n**(21/2) Simplify (((q/(q*q*q*(q**(-1/11)/q*q)/q*q))/q**6)**21)**49 assuming q is positive. q**(-89523/11) Simplify ((g/((g*g**(14/9))/g))/(g**(3/31)*g*g))/(((g**(-1/10)*g)/g)/g*g**(1/20)) assuming g is positive. g**(-8941/5580) Simplify ((b*b**(-2))/b)**(-4/9)*(b*b**(-9))**(-46) assuming b is positive. b**(3320/9) Simplify (z**11/z*z)/(z*z**(-17)*z)*z**(2/5)*z*z**(-16) assuming z is positive. z**(57/5) Simplify (o**(1/2))**36*(o*o**(-1/2)/o*o)**21 assuming o is positive. o**(57/2) Simplify (a**(-1))**(19/3)*(a*a**(-2/11))/a**(-5) assuming a is positive. a**(-17/33) Simplify ((d/(d**1/d))/d**(-8))/(d*d**(-1/2)*d)**46 assuming d is positive. d**(-60) Simplify (i**(-3/2)*i/(i/(i/((i**0*i)/i)))*i)/(i**(-8/5))**(-4) assuming i is positive. i**(-59/10) Simplify (p**(2/15)/p)**(-1/8)*((p*p/p**(-2/17))/p)/(p*p**16*p) assuming p is positive. p**(-34219/2040) Simplify ((x**(-8)*x)/x**(-10))/((x*x*x**(-2/13))/((x**(-4/7)/x)/x*x)) assuming x is positive. x**(-38/91) Simplify (((z*(z**(-2/13)*z)/z*z)/z)/(z**(1/4)/z)*z*z**(-1/2)*z*z**(-2)*z)**(-16) assuming z is positive. z**(-436/13) Simplify (f**(12/11)/f)/((f/(f/f**(-1/5))*f)/f)*((f*f*f**2)/f)**(-2/15) assuming f is positive. f**(-6/55) Simplify ((b**9)**(-1/29))**(1/42) assuming b is positive. b**(-3/406) Simplify (n/((n*n/(n**10*n)*n)/n))**(1/8)/((n*n**(-13))/n)**46 assuming n is positive. n**(2397/4) Simplify ((r**(-3/4))**(-30))**(-9/2) assuming r is positive. r**(-405/4) Simplify ((a**(-14))**(-7/8))**(-44) assuming a is positive. a**(-539) Simplify (g**(2/23))**(-11/5)/(g**(1/4)/(g*g**(-1/11)*g)) assuming g is positive. g**(7427/5060) Simplify ((m*m*m**(-1/4)/m*m*m*m)/m)**31/(m**(-17)*m/(m*m**(-4/3)*m*m)) assuming m is positive. m**(1235/12) Simplify (r/(r*r*r**(-6/13)))**(1/19)/((r*r**(-13))/(r**(-26)*r)) assuming r is positive. r**(-3218/247) Simplify b**(4/5)*b**(-5/2)*b*b/(b*b**(6/7))*b/(b*b/((b**(-1/7)*b)/b)) assuming b is positive. b**(-27/10) Simplify s**(-8/7)/s**(-5)*(s**(-18/7)/s)/s*(s**(4/11)/s)/s assuming s is positive. s**(-181/77) Simplify ((x/(x**(-3/4)/x))/((x*x**(-9))/x))/(x**(2/7)*x**(-2/3)) assuming x is positive. x**(1019/84) Simplify ((j**(-9)/(j*j/j**(2/43)*j*j))/((j*j**12*j*j)/j**(-8)))**(-2/59) assuming j is positi
{ "pile_set_name": "OpenWebText2" }
While Urawa Reds and Kawasaki Frontale battle to clinch the top seed for the J. League Championship on the final day of the regular season on Thursday, a more decisive tussle will be going on at the other end of the table. Four teams are in danger of taking the last remaining relegation place going into Thursday’s matches, with Nagoya Grampus, Albirex Niigata, Ventforet Kofu and Jubilo Iwata all striving to avoid joining already doomed Avispa Fukuoka and Shonan Bellmare in J2 next season. Grampus, one of only three clubs — along with Kashima Antlers and Yokohama F. Marinos — to have competed in J1 every season since the J. League was founded, currently occupy the final relegation spot on 30 points, with Albirex leading them only on goal difference. Ventforet are one point better off on 31, while Jubilo, currently on 33, look best placed to survive. Nothing will be decided until 3:30 p.m. on Thursday, however, and an intriguing set of fixtures makes it impossible to predict which of the four teams will go down. Nagoya, the side currently in the stickiest predicament, also has what looks like the easiest assignment, hosting a Bellmare side that has picked up only 24 points all season. Albirex face a Sanfrecce Hiroshima team that has made a mess of its J. League title defense, while Ventforet and Jubilo take on Sagan Tosu and Vegalta Sendai, respectively — both midtable teams. Wins for any of the relegation-threatened clubs is certainly a possibility, but so too is a repeat of the hapless performance that saw all four teams lose last Saturday. “I heard the results of the other games after the final whistle,” Albirex manager Koichiro Katafuchi said after his team’s 3-1 defeat to Gamba Osaka. “Fortunately, no one else managed to win — they all lost. We’re lucky that we’re in a position where it’s still in our own hands, so let’s just get ready for the next game.” Should goal difference come into play, Jubilo hold the advantage on minus-14, with Albirex on minus-15, Grampus on minus-18 and Ventforet lagging far behind on minus-25. “I was thinking about a lot of different things in the buildup to the game, but given the result, I think I got my tactics wrong,” Ventforet manager Satoru Sakuma said after Saturday’s 1-0 loss to Bellmare. For all four teams in Thursday’s final round of games, any further mistakes could prove fatal. Staging post: Urawa Reds clinched the second-stage title with a 1-0 win over Jubilo Iwata on Saturday, but the peculiarities of the current league format means the achievement brought the Saitama side absolutely no reward. Reds had already qualified for the J. League Championship by virtue of their guaranteed top-three finish in the overall table — which outranks stage wins — and captain Yuki Abe was more concerned about claiming the direct spot in the championship final that comes with finishing first. “We still have to play Yokohama F. Marinos, and each step from here on is vital,” said Abe, whose side leads Kawasaki Frontale by one point going into Thursday’s final regular-season game at home to Marinos. “It all starts from the Marinos game. We’ve won the second stage but nothing has been decided yet. All we want is a place in the championship game, and that’s what we’re striving for.” Thirteenth century: Gamba Osaka have only the Emperor’s Cup left to play for this season after missing out on the J. League Championship, but midfielder Yasuhito Endo achieved a personal landmark with his 100th career J1 goal on Saturday. Endo slotted home a penalty in Gamba’s 3-1 win over Albirex Niigata to make him the 13th player to achieve the feat and only the second midfielder, following in the footsteps of former Jubilo Iwata playmaker Toshiya Fujita. “Of course it makes me happy,” said the 36-year-old Endo. “It’s not something that many players have achieved. “If I hadn’t scored it before the end of this season, I just would have had to try for it next year. But I had chances that I didn’t take and being involved in goals is so important. I did it with a penalty, but I’m just happy that I did it.” Quotable: “I can retire without any regrets.” Sanfrecce Hiroshima’s Koji Morisaki enjoys his final home league game before hanging up his boots, after scoring in Sanfrecce’s 4-1 win over Avispa Fukuoka on Saturday.
{ "pile_set_name": "OpenSubtitles" }
"Dr. Wallace, on August 14 of this year, did you knowingly provide a chemotherapy treatment called aladictin to Marshall Foster, an eight-year-old patient?" "Yes, I did, Ed." "And at the time you administered the treatment, were you aware that aladictin was in the trial stage, and not approved for use?" "Uh, let me make this simple for all of us." "I gave him the treatment," "I knew it wasn't FDA approved... and, uh... he died." "It pains me enormously to have to say that we have no choice but to discharge you." "She's 15 years old and healthy." "She's never been sick a day in her life." "She is in there." "I know she's in there." "Mr. and Mrs. Ramirez, I understand" " how frustrating this is." " "Frustrating"?" "Our 15-year-old daughter is in a coma." "She came home from volleyball practice last week, had dinner, went to sleep, and never woke up." "And no one seems to be able to tell us what went wrong, or how to get her back." "You don't even answer our calls." "How would you feel if this was your daughter?" "Dr. Gilroy, this is Dr. Channara..." "Channarayapatra." "Nice to meet you, Dr. Gilroy." "Oh, my God, you're here." " You came." " Mr. and Mrs. Ramirez, your request to transfer your daughter to Bunker Hill has been approved." "Doctor, this patient is in no condition to be transported by ambulance." "Which is why I brought the helicopter." "Uh, helicopter..." "We can't..." "Mr. Ramirez, there will be no charge to your family as long as you're at Bunker Hill." "I just need you to sign a document releasing your daughter to our care." " Excuse me, I'm here to..." " Dr. Wallace." "If you place your thumb on the tablet," "I can give you full access to the hospital." "Actually, I'm only here a few days to observe." "James wanted you to have permanent access." "Dr. Wallace, we need to scan you." "Give me 30 seconds and permission to map your entire body, and I'm going to give you a plastic action figure of yourself." "How would you like to be immortalized, Dr. Wallace?" "Good, not great." "How about...?" " Will?" " Ehh..." "So..." "I can work with that." "Dr. Wallace." "Welcome to the revolution." "Come with me." " Thanks." " Thanks, Anabel." "Of course, James." "He knows my name is Angie, not Anabel." "It's a thing we do." "I thought I made it clear when they called that I can't entertain a job offer out of state." "I heard." "Shrewd negotiating tactic." " It's not..." " This is Brockett." "Double board certified in internal medicine and pediatrics, with a fellowship in critical care, and my first hire." "Dr. Wallace, it's an honor to have you join the team." "Does everybody here think that I'm actually...?" "Come check this out, Doctor." "I cannot wait to show you this." "Stick your finger in the tube intake." "Oh..." "It's a finger prick blood test." "We keep better tabs on our patients with more routine monitoring." "Now, check this out." "This is the Wall." "It's mission control for every patient." "CT scans, MRI, any imaging, all the labs, anything that you need to know or the patient wants to know is available at any time." "And when it's not medical, the patient gets to choose where they want to be." "Machu Picchu." "Buddhist temple." "Earth rising over the moon." "Studies show that patients eat better, they sleep better, they have better recoveries, if they feel more control over their environment." "Oop." "Got your results through there, W." "You blood glucose is slightly low." "Here, eat that." ""W"?" "He likes nicknames." "Mr. and Mrs. Beyer." " Welcome to Bunker Hill." " Hi." "Thank you so much for having us, Mr. Bell." " You've given us hope." " Well... this is Dr. Wallace, hands down one of the best surgeons in the world." "We heard you get the best of the best." " To be accurate, I'm only here to..." " And this is Dr. Brockett." "She's going to be your physician advocate." "Okay, what is that?" "She's going to be your touchstone." "But she's not your only touchstone." "Everyone on the team here is part of an information matrix." "You'll be able to reach out to anybody, and they'll be able to help you, okay?" "Zoe." "Margo, because of your pregnancy, you chose not to have chemotherapy or radiation, which would have shrunk or controlled your lymphoma." "It has grown over time, and the blue mass you see here is the tumor." "And as it grows, it becomes more difficult to address surgically." "But we feel we can do so." "You're saying you can operate?" "They told us it was too late." "Well, what about the baby?" "Show them." "Can you lift your shirt up, please?" "At 20 weeks, the fetus is less than a pound." "Its lungs and heart aren't able to sustain itself outside of the womb, and most likely won't be able to for two weeks." "Well, we made it very clear when we sent in our application for a transfer, a-abortion's not an option." "I understand, but if we wait until the fetus is viable, it will be too late." " For our baby?" " For both of you." "Mr. Bell, they told us that Margo couldn't get pregnant." "This child's a miracle." "Margo, at the rate your cancer is growing, we don't have weeks to act." "We have days." "Then we will pray." " We'll pray for weeks." " We'll find a way." "I didn't build this hospital to deliver bad news, so we will find a way to save both you and your baby." "We have a lot of work to do." "Let's get past the semantics." "I've already decided to hire you." "Congratulations, Chief of Staff." "My youngest will be graduating in a year." "Until then, I'm not leaving Ohio." "I can work with this." "I need you to start now, you need to start in a year." "That is a problem that is solvable." "In the meantime, you should..." "change your specs." "My specs?" "Spectacles, glasses..." "They go against everything that you are." "You have no idea who I am." "You risked your career to save a kid's life." "I didn't save his life." "He died." "Well, you tried." "You're a cowboy, you're a badass." "I like you in thick black rims." "I'm thinking retro Clark Kent." "Look, I appreciate what you're trying to do here, but I have to be honest..." "Gadgets and gizmos have been around the medical industry forever." "They come and go." "The great majority of diagnoses has zero to do with technology." "It's about doctors talking directly to patients." "Medicine is ultimately a human endeavor." "Good speech, W." "Let me show you why you're dead wrong." "This is the E Hub." "Malik..." "meet Dr. Wallace." "Dr. Wallace, I heard your Melankopf lecture at the NIH in February..." "It was amazing." "Malik grew up dirt poor in the East Bay area." "Total gangbanger." "He went along on hits." "You did time, am I right?" "You don't exactly have to lead with that, but yes, that is accurate." "Yeah, so he was tired of seeing his friends and family members having suboptimal healthcare outcomes, dying an average of 15 years younger than people in different zip codes with higher incomes, so, um, we set this up." "Uh, you can show him." "You show him." "Cool, um..." "This is Mary." "56 years old, affected by epilepsy." "Now, we can monitor the blood levels of her seizure meds in real time by using this." "It's a flexible adhesive computer with bioactive gel interface." "You stick it on your arm, it monitors everything about you." "If her Keppra level drops, we can command it to deliver an additional dose of medicine." "How long did it take you to get this program up and running?" "Homeboy had the idea eight months ago?" "Yeah, about right." "Here we are." "No red tape, Doctor." "We're pairing the most brilliant minds in medicine with the most brilliant minds in technology, and we're going to take out the middleman." "We're gonna get stuff done." "This is the revolution, Dr. Wallace." "Okay, let's drill down on Margo Byer." "I want to hear everything we know about delivering a fetus at 20 weeks." "We've got the aliens customizing an ingestible to get the most accurate read possible of the fetus'" " lung and heart development." " I like that." " Let's see it bigger." " It's a tiny supercomputer." "The patient takes it orally, like any other pill, and it travels into her intestines, which just happens to be the perfect vantage point to see the womb." "What if it doesn't land exactly where you want it to?" "I had our tech team modify it with magnetic sensors." "It'll be the first ingestible in the world with motion control." "We'll be able to measure the lung and heart capacity of the fetus more precisely than ever before, and can predict down to the hour when it'll be able to survive outside its embryonic environment." "Excellent work, Anabel." "So, now that we know down to the hour when the fetus can survive, the question becomes, how do we keep Margo Byer alive" " long enough to get there?" " I'm sorry, but can I just say something?" "And here comes the reality police." "Tumor mass is filling the pericardial space and causing tamponade." "Her blood pressure is dropping." "She is getting weaker." "The sicker she gets, the lower her chances of surviving surgery." "We have to play hardball..." "Tell them we operate," " or they go home with comfort care." " Okay, thank you." "I don't need anybody telling me no right now." "I need ideas." "Good ideas, okay?" "I want everyone on this." "We need to buy two weeks for that baby." "I will not accept that there isn't a way to bend time here." "Not that I'm even considering your offer, but if I were to work here, I would need you" " to be a passive presence with patients." " Meaning?" "Meaning, I've watched you promise" "Margo Byer an unrealistic outcome." "I can't have a layman offering medical opinion." "Dr. Wallace, in this hospital, no one is a passive presence." "I have the same philosophy here as I did building my company in Silicon Valley." "There's no hierarchy, no offices." "Best idea wins." "Some research grunt has a better idea than someone with a Ph.D?" "It's still a better idea." "We all speak." "We're a team." "Anna, take Dr. Wallace to the Nuclear Med Lab." "It's gonna blow your mind." "Dr. Wallace, this way." "How is she doing today?" "The EEGs, the scans, the MRI's, all the monitoring, they don't give us any indication that Krissy is doing anything but withdrawing from the world." "I think it's time to talk to her parents about taking her off life support." "Krissy?" " Krissy." " James!" "It has been six months." "This isn't going to change." "The data showed that she would come out of this." "And I promised her parents." " What am I supposed to say to them?" " James, you can't make those kinds of promises." "How is she doing today?" "No change today, Maria." "Uh, a few months ago, you said it was a good idea to read to her." "Should we still do that?" "Absolutely, Soul." "Yeah." "You guys are doing a great job." "She loves animals." "Uh, we were planning to go on a safari together for her 16th birthday." "We're still planning on taking her one day." "We know you won't give up on her, James." "It's what keeps us going every day." "Hi, baby." "...safari, it's a neat way to explore Africa..." "So, I just swallow this?" "Just like an aspirin." "Simple." "Now, can we all pray first?" "Oh, uh..." "Sure." "Lord, please help this... what is it called?" "Uh, fetal monitoring ingestible." "Fetal monitoring ingestible guide this team of Bunker Hill doctors, and help bring Angela into the world." "And Lord Jesus..." "Why don't you just ask her out?" "Who?" "Dr. Brockett." "You obviously want to." " What am I supposed...?" " Just tell her you think she's really smart and attractive, and no pressure, but you'd like to take her out sometime, socially." "Yeah, right." "Like I'm going to say anything like that to Zoe Brockett." "Oh, you're insane." "Good one, W." "...no sickness or disease to enter our bodies and harm our health." " Amen." " Amen." " Amen." " Amen." "Listen, Angie," "I grew up here, okay?" "This is my neighborhood." " Point being?" " Point being," "I know these people." " Let me do the talking." " Ugh, racist." "Mrs. Evans?" "We can monitor you and your family right here in your home." "You don't have to wait on long lines in the ER or at the HMO." "You don't have to miss work, and your kids don't have to miss school." "Where does this thing go?" "That goes on your ankle." "Oh, so you've got us on house arrest." "Sorry, we're not going to let you" " experiment on our kids." " Mr. Evans," "I get where you're coming from." "But if you give us a shot..." "You know, that sounds pretty bad." "Now, does he sound like that a lot?" "It comes and goes." "He has asthma." "Mrs. Evans, if you give us a chance," "I think we can help your son." "That's Maharishi Makkar." "James gave him a six-month residency here." "I haven't introduced myself." "Uh..." " Doctor..." " Dr. Channarayapatra." "Out of Johns Hopkins, neurosurgery." "I like to keep tabs on the best and the brightest." "Coming from you, Dr. Wallace, I am flattered." "So do you think it's possible, what James is trying to do?" "What you're all trying to do?" "I'd like to think there's a place that can actually innovate, but..." "I can't quite believe it." "About 90% of the time that I'm here," "I think this can never work." "But that leaves a ten percent chance that we're actually gonna be able to do something." "Be a beacon for change." "And I think that's ten percent more of a chance than I have at any other hospital." " Mrs. Byer?" " Margo!" "Crawling all over me!" "Margo, Margo, Margo, it's Dr. Wallace." "I'm here to help you." " Listen to me." " Mrs. Byer." "Help me!" " Mrs. Byer, okay, come on." " Get off me!" "This is the view from the ingestible." "Margo, your fetus is unharmed." " Oh, thank God." " And can the baby survive on her own yet?" "She is getting stronger, but... no, not yet." "Margo, when you were in the pond, what exactly was happening?" "There were bugs all over me." " Hmm." " All over my baby." "So were there... actually bugs?" "No, no, they were in my imagination." "Has anything like this ever happened to you before?" "A few times." "Yeah." "Margo, is there any... history of mental illness in your family?" "No." "Why?" "Does that have something to do" " with why I'm sick?" " No." "Why are you getting her upset?" "This is not that big an issue." "She'll be fine." "She's always been fine." "Now, can we please focus on delivering this child and saving my wife's life?" "Hi, Krissy." "We can't wait for you to wake up so you can see what all your friends and family have written to you, how much everyone loves you." "We're all waiting for you to wake up so we can celebrate with you." "Happy birthday." "Love you." "James?" "Hmm?" "I need to talk to you about something." "Not a patient." "It's about us." "Okay." "In the future, please don't contradict my medical opinion in front of a patient like you did with Margo the other day." "You shouldn't do that with any doctor, but with me, because..." "I look young, patients tend to forget that I'm a doctor, and..." "I work really hard to make them not forget that, so... please don't undermine me that way in the future." "Gotcha." "Anything else?" "Well, uh..." "I would also appreciate it if you would refrain from calling me the "reality police" in our staff meetings." "Yeah." "Another term for reality police is "good doctor"." "Maybe you could use that one instead." "And?" " And Anabel isn't Anabel, all right?" " Okay." "She's Angie." "James, she's Angie." "Every time you call her her Anabel, you're hurting her feelings." "I will try to remember her name, and I will try not to... undermine you." "Oh, great." "Thank you." "Welcome." "That's all." " Great." " Mm-hmm." " Please don't do that." " You're tense." " Yeah." "That's making me tenser." " Yeah." "I'm gonna set up an appointment with you and the maharishi." " Margo's delusions." " Mm." "It's called formication." "Dr. Wallace, I'm calling HR." "Formication," " Mm-hmm." " With an M." "Sometimes caused by stress, mental illness." "My instinct is it has something to do with Margo's illness, but I can't quite figure out what, exactly." "And why would Paul and Margo never tell anyone about it?" " Makes no sense." " I..." "I think I can help you with all this." "This system can compare..." "Margo's medical records with millions of other patient profiles and predict the probability of likely underlying pathology." "And it can do it in seconds." " Domestic abuse?" " Hmm." "The past six years, one doctor noted her being disassociated from her emotions, two found her depressed, and another diagnosed her with irritable bowel syndrome." "Then in 2013, there was a trip and fall where she broke her jaw." "How many people fall and break their jaw?" "If this is true, your program reached that diagnosis months before I would have." "Put it up here, W, come on." " Come to papa." "Right there." " Let's see if this is right first." "Uh, it's Margo." "Five liters 02, non rebreather." " Lorazepam, four milligrams, right now." " No, no, no." "No, that can affect the baby." "You're not gonna put anything in my wife's body that can affect the baby." "We're trying to save your wife's life." "Doing nothing's not an option." "No, you're not giving her drugs." "Aah!" "Damn it, I will not allow you!" " Take him out of here." " No!" "She's moving too much to inject her." "Move her back." "Hold her head." "Aah!" "Sto..." "Ugh..." "Keep him away from her." "Doctor's orders." "Okay." "Margo?" "Hmm?" "Margo?" "Hmm?" " Am I okay?" " Yes." "Is my baby okay?" "She's fine." "Where's Paul?" "I asked them to keep him away for awhile." "What?" "Why?" "Margo, you have a medical history that strongly suggests domestic abuse." "I... s..." "I-I don't know what you're talking about." "I don't know if that's what is happening, but I want you to know that no one should ever have to live like that." "And now there are two of you." "I love Paul." "He loves me, he-he does." "He doesn't mean it." "He always feels so bad afterwards." "He does love me, he really does." "This is Evelyn." "She's a 46-year-old Hispanic female in Houston with transient global amnesia who has repeated, unexplained, short-term memory loss." "MRI shows no neurological disease or structural abnormalities." " What do we think?" " If we can find the trigger, we can reflect that back to the general population and help other cases like it." "Yeah, I agree." "Bunker Hill material all the way." "Okay, arrange the transfer." "You got it." "Anyone else before we break it off?" "Anabel, remind me, what was that case you brought up the other day?" "You mean the one you asked me to look up for you?" "Nope, your case, you're fine." "No false modesty." "Oh, uh, okay." "Well, I... well, it's-it's pretty esoteric." "I really doubt it's for us." "Why don't we let the team decide?" " Okay." " Sure, great." "Uh..." "This is Louis Keating." "Lives in Chicago." "Male, 42 years old." "He's been diagnosed with GSS," "Gerstmann-Straussler-Scheinker disease." " It's a neurological disease." " It's like ALS on steroids." "It's fascinating." "And also extremely rare." "200 cases worldwide." "Yeah, I have to agree, this case is extremely esoteric." "Okay, thank you," " man who doesn't even work here." " It's true, James." "I think this patient's better off in long term care." "Guys, I agree, it's rare, but maybe it'll be a gateway to treatment for more common neurological diseases, like Alzheimer's." "This is a fascinating disease." "I want this patient." "Nice find, Anabel." "Bring him in." "Do you know what Margo told the police?" "Is she definitely planning to press charges?" "Yes." "Good." "So, the domestic abuse diagnosis was correct." "Guess it's not just all gizmos and gadgets." "James, the..." "Yeah?" "...GSS case you're transferring here, it seemed, uh... so random, um, too random." "So, I looked into it and I discovered that there's only been one case of GSS in the Bay Area in the last 50 years." "Her name was Lynn Underhill." "She had a child she gave up for adoption, August 28, 1985." "Your birthday." "Is it you, James?" "No." "You see a lot of billionaires become philanthropists, but you never see them follow it up with an 80-hour work week." "Uh, so, if I'm gonna even think about uprooting my life to come here," "I need to know why you're here, why we're all here." "Are we here to save the world?" "Or are we all here to save James Bell?" "You did a bad data search, Dr. Wallace." "You're wrong." "Better stick to medicine." "I know this kid." "Get the paramedics there now." "Response time for that neighborhood right now is 20 minutes." "I'm heading over." "Hey." "Where's Jeffrey?" "How's he doing?" "Wait, how is that possible?" "His lung capacity showed a severe drop." "That's the lung capacity of Freddie, not Jeffrey." "Who-Who's Freddie?" "Uh, Jeffrey put the sensor on the dog and we had no idea." "I'm sorry about this." "Look, I like what you're trying to do here, but I don't know how much longer I can keep taking these calls." "Maybe it's better just do things the old fashioned way:" "you feel sick, you go see a doctor." ""When going on a hunt, the mother cheetah will leave her cubs alone and vulnerable for days at a time."" "Hmm." ""If she returns to find her den empty," ""she will search" ""relentlessly, calling out" ""and listening for their cries." ""But with every passing day, hope dwindles."" "Margo, we're gonna get you medicine to help you feel better." "Am I gonna die?" "Margo, you need to listen to me." "Okay?" "The reason you're having trouble breathing is your tumor is now choking your heart." "We need to operate... now." "What-what about my baby?" "Your baby can't survive on her own yet." "Margo, this is your decision." "I'll do whatever you want." "But we've run out of time." "Doctor, someday I hope that I can forget everything about my husband, everything he ever did to me." "But this is still my child." "Right now I feel like she's my reason." "She's my reason for being alive." "S-So, I'm asking you how long can I wait before we have to do this surgery?" "I have a team set and ready to go first thing in the morning." "What if we waited 24 hours?" "Can my girl survive?" "Possibly." "Then I want to wait." "Please." "Okay." "Okay, everybody, just stop what you're doing for a second and just gather round." "I got something to say." "Krissy Ramirez, our young coma patient, she's been with us for six months." "We've been trying to get her to come out to us." "I've decided we're gonna stop trying to get her to come to us." "We're gonna go to her." "She can't speak;" "she can't move;" "she can't open her eyes, so we have to bypass all of that, go right to the cerebral cortex." "And I thought," ""Well, that's impossible."" "And then I went online and I found this." "Check this out." "This is real." "Brain to brain communication." "Somebody actually invented a version of the Vulcan mind meld." "Okay, this dude here, the guy on the left in the crazy helmet, sent three words to this guy on the right, in the crazy helmet, using only his thoughts." "Amazing." "But it says here they've only had two successful tests, that this kind of technology won't be available to the masses for another decade." "Do I look like the masses?" "Come on." "I just called these guys." "Guess what?" "They needed funding." "We now own this." "We're gonna use it to find out, unequivocally, whether" "Krissy is still Krissy." "Because then we know whether there's someone still there to save." "Let's go get Krissy." "Yeah, wow." "Terrific." "Dr. Verlaine." "It's your kid again." "It's showing cardiac arrhythmia." "Get them on the phone now." "Look at that ST elevation." "Hello?" "Mrs. Evans, this is Malik from Bunker Hill." "Has Jeffrey done something with his sensor again?" "He doesn't have the sensor." "What?" "We gave it back to the paramedic yesterday." "Yes?" "Sergeant Dawson, this is Dr. Verlaine, you might be having a heart attack." "I need you to get" " to the ER right now." " What?" " How would you know this?" " Look in your pocket." "Good news, Sergeant." "Your troponin is positive, meaning you did have a cardiac event, but we caught it early." "You're stabilized." "So you're telling me I had a heart attack?" " Yes." " I thought I had indigestion." "I was gonna go home and sleep it off." "And you could've had a fatal arrhythmia in your sleep." "So this idiotic thing might've just saved my life." "That's the idea, Sergeant." "You okay?" "New scan of Margot's heart." "Mm." "It's worse." "I don't know if I can do it." "You're the best there is." "You'll nail it." "This isn't programming a computer." "There's only one way to remove the tumor, and a million ways it could go wrong." "If my scalpel misses by a millimeter," "I could puncture her heart, and we've lost Margot and the baby." "What if I could give you a million chances to get it right?" "This mass is a tumor, and that tangle right there is matted to the ascending aorta." "Gnarly." "And we can print as many as you need." "So, Maria, the idea is we're gonna try to communicate with Krissy with your thoughts," " and wake up her brain." " And we'll be able to monitor her brain activity in real time through the EEG." "The more she hears you, the more active her brain will become." "And if you reach her, maybe she'll be able to communicate back to you, let us know she's there." "You ready?" " Yes." " Okay." "I want you to focus your thoughts on the images that come up on the wall." "Let's take Krissy to Africa." "Oh, my God." "Uh, what?" "Is it working?" "W-what is she seeing?" "The spikes on the EEG, the reds and yellows in her cerebral cortex, it all indicates brain activity." "Consciousness." "Soul, it's time." "Talk to your daughter." "Let's see if she can communicate back to us." "Krissy?" "Sweetheart?" "It's Dad." "Can you hear us?" "Krissy-kins?" "Hi Daddy." "Oh, honey, we will bring you back to us." "We love you so much." "At 146 days, baby girl Angela's the second youngest birth on record." "And Margot Byer's tumor's been removed, and she's stabilized." "Congratulations." "You did it." "Thank you, thank you." " Congratulations." " Thank you." " Margot's in recovery." " Okay." "She's, uh, she's groggy, but still conscious." "Do you want to go give her the good news?" "There's no feeling like it in the world." "This is yours." "You do it." "The trial period is up, so..." "I need to know whether you're gonna take the job." "I've come to a decision." "But before you tell me, I should tell you... um..." "I did have the genetic test done, and it came back positive... for GSS." "Um, so at some point probably over the next five years my hands will start to shake, and my speech will slow." "Uh, and then I'll develop tics, and... until finally, the man that everybody calls a genius, won't be able to remember his own name." "Ooh..." "I built the hospital for all the wrong reasons, but, um does that really matter?" "I'm so sorry, James." "Eh, it's..." "You're the only one who knows." "So..." "I want the job." "I want to be part of this." "Your family." "I'll go home every weekend." " I'll make it work." " Okay." "Good, good!" "Uh..." "Then this is for you." "Uh..." "Oh, okay." "Yeah." " May I?" " Yeah." " Right?" " Amazing." " James?" " Hmm, yeah?" "Your new transfer arrived." "GSS patient." "Okay." "Mr. Keating." "Welcome to Bunker Hill."
{ "pile_set_name": "Wikipedia (en)" }
Salahuddin Ahmed (economist) Salahuddin Ahmed is a Bangladeshi economist, civil servant, and a former governor of the Bangladesh Bank, the country's central bank. Career Ahmed was the ninth governor of Bangladesh Bank. After the retirement of Fakhruddin Ahmed he took the responsibility of Bangladesh Bank on 1 May 2005 and he took rest from his duty on 31 April 2009. References External links List of Governor of Bangladesh Bank Category:Living people Category:Bangladeshi economists Category:Governors of Bangladesh Bank Category:Year of birth missing (living people)
{ "pile_set_name": "Pile-CC" }
be adventurous | July 2016Remembering her roots:Danielle Finn crowned Miss Indian World 2016 by Tara Kranz Tara Kranz (Submitted photo) (Submitted photo) (Submitted photo) Danielle Ta'Sheena Finn, a member of the Standing Rock Sioux Tribe and native of Porcupine, ND, was busy and content in obtaining her law degree at Arizona State University until everything changed on April 30th. This is when she participated in the Miss Indian World Pageant 2016 at the 33rd Annual Gathering of Nations in Albuquerque, NM and was surprised and humbled to walk away with the title. "I was already jumping; I guess I couldn't even contain it. As soon as they said Standing Rock, I knew that I made history. I knew in the back of my head, if I did it, I made history." Finn certainly did make history as the first enrolled member of a North Dakota tribe to win the title. This was the second time Finn competed in the Miss Indian World Pageant. At her first competition in 2014, she got second runner-up, so she felt confident heading to the 2016 competition. She competed in five categories: personal interview, talent presentation, on-stage public question, dance competition and personal essay. Finn had a unique goal for the personal interview portion: "For me, my goal going into the panel of judges was to make every single one of them smile at me. I figured that's the way I would get them to like me." It seemed to work for Finn, as she won this portion of the contest. She also received the highest score in the public on-stage question category. Finn competed with three specific platforms in mind: suicide prevention, higher education, and language preservation. Her passion for the higher education of Native Americans was apparent when she spoke about a common misconception surrounding the Native American culture. "What bothers me the most is people think that we get free education, and we don't get free education -- which is extremely sad. If there is something that I feel like we should be getting, it is free education because then we can go help our community as educated members of society." Finn also expressed concern about the stereotype that all Native Americans live on reservations. "I think people have this mentality that we are only in isolated areas and we live in poverty; but that's actually not true." According to Finn, 80 percent of Native Americans live off the reservation. Perhaps it was Finn's immense pride in her Native American heritage that caught the eyes of the judges. "(My heritage) has affected me in the most positive ways. I think it has instilled a lot of pride in who I am and knowing my background and my ancestry. I think it also makes me a better North Dakotan, in a way, because I have such ties to the land historically." Pride, courage, and bravery are the three qualities Finn claims to have gained from her Native American roots. Finn not only has a tremendous respect for her heritage, but more specifically, for the Standing Rock Sioux Tribe, which is the fourth largest tribe in the United States, encompassing two states. "Lakota people -- we live our lives for the wellbeing of all our people. When we are born, we are supposed to have in the back of our mind that our people continue to live." As Miss Indian World 2016, Finn will spend the year promoting cultural awareness at various pow wows, conferences, and schools. She will travel frequently and speak to both Native and non-native audiences. "I will get to share my culture, which is awesome because no one has ever really gotten to share about Standing Rock." Finn will be graduating with her Juris Doctorate degree this December and plans to take the bar exam in North Dakota following her Miss Indian World 2016 duties. "I will most likely go to work for my tribe, fighting for my people, helping my people. Everything I can do for Standing Rock possible. That is my long-term goal: always helping Standing Rock." Tara Kranz is an English teacher turned stay-at-home mom from Bismarck. She is an aspiring freelance writer who enjoys blogging, crafting, getting involved at church, movie nights with her husband and whatever will make her son smile.
{ "pile_set_name": "OpenWebText2" }
Hillary Clinton continues to dominate among black women voters at the polls, but her individual exchanges with them keep making headlines for all the wrong reasons. The latest example comes courtesy of a campaign stop she made in Minneapolis on Super Tuesday: The former Secretary of State was confronted in a coffee shop by a young woman later identified as Stacey Rosana, a local organizer and Black Lives Matter activist. After a brief conversation caught on video, Clinton could be heard exasperatedly telling Rosana, "Why don't you go run for something, then?" Rosana then walked off under the nervous gaze of Minnesota Gov. Mark Dayton, who could be seen standing in the background, visibly uncomfortable. The conversation was difficult to hear at times, but Rosana's questions were clearly aimed at Clinton's engagement with the local Somali-American community, which constitutes a large part of Minnesota's black demographic. "I'm very proud to have met with the Somali-American community and have a lot of support for the Somali-American community," Clinton said. When Rosana asked who specifically she was referring to, Clinton mentioned Abdi Warsame, the first Somali-American elected to the Minneapolis City Council, according to City Pages. Rosana responded inaudibly, shaking her head, to which Clinton replied, "You know what dear, you have a different opinion." "He is a Somali-American elected to the city council," she said. "I'm really proud of that." Dayton, who was watching the exchange, stepped in at that point to tell Rosana that other people needed time to ask questions of Clinton. The former secretary then ended the increasingly tense exchange, saying to Rosana, "Well, good. Good luck to you." Throughout her campaign for the Democratic presidential nomination, Clinton has had numerous with young black people. The most recent dealt with Clinton's fraught history with racial justice — particularly her advocacy for then-President Bill Clinton's 1994 crime bill and her vocal perpetuation of the term "superpredator," which further demonized gang-involved youth of color, in 1996. Story continues The exchange came at a private fundraiser in Charleston, South Carolina, on Feb. 24, where an activist named Ashley Williams asked Clinton to apologize for her role in perpetuating mass incarceration — which to this day disproportionately impacts black Americans. "Looking back, I shouldn't have used those words, and I wouldn't use them today," Clinton said in an apology issued the next day. h/t Jezebel
{ "pile_set_name": "FreeLaw" }
332 Md. 375 (1993) 631 A.2d 447 MURIEL JENNINGS WALLER ET AL. v. MARYLAND NATIONAL BANK. No. 90, September Term, 1993. Court of Appeals of Maryland. October 5, 1993. Edwin A. McCabe, The McCabe Group, Cambridge, MA, and Daniel F. Goldstein, Brown, Goldstein & Levy, Baltimore, for petitioners. James Eyler and Marian Hwang, Miles & Stockbridge, Baltimore, for respondent. Submitted to MURPHY, C.J., and ELDRIDGE, RODOWSKY, McAULIFFE, CHASANOW, KARWACKI and ROBERT M. BELL, JJ. PER CURIAM: We summarily grant the petition for certiorari in this case and vacate the judgment of the Court of Special Appeals because of the absence of a final judgment in the trial court. The action of the trial court from which petitioners appealed was the entry of summary judgment in favor of respondent. Although the transcript of proceedings indicates the trial judge intended his ruling to be final without the necessity of a subsequent written order, the clerk erroneously added words to the docket entry indicating a contrary intent. The docket entry, made on the day the trial court decided the motion, reads: Defendant's second motion for summary judgment heard and "granted" as to remaining counts 3, 4 and 5. Order to be filed. No subsequent order was presented or filed, presumably because the parties understood the intent of the trial judge and were not aware of the form of the docket entry. The appeal was noted within 30 days of the date of the docket entry. The Court of Special Appeals correctly observed that the trial judge intended his action to be final; that his order resolved all outstanding claims between the parties; and that the clerk's addition of the words "[o]rder to be filed" was unauthorized. Waller v. Maryland Nat'l Bank, 95 Md. App. 197, 208, 620 A.2d 381 (1993). The intermediate appellate court erred, however, when it concluded that the unauthorized portion of the docket entry could simply be disregarded, and the remaining portion treated as a final order. Maryland Rule 2-601, which governs the entry of judgment, provides in pertinent part: (a) When Entered. — Upon a general verdict of a jury or upon a decision by the court allowing recovery only of costs or a specified amount of money or denying all relief, the clerk shall forthwith enter the judgment, unless the court orders otherwise. Upon a special verdict of a jury or upon a decision by the court granting other relief, the clerk shall enter the judgment as directed by the court. Unless the court orders otherwise, entry of the judgment shall not be delayed pending a determination of the amount of costs. (b) Method of Entry — Date of Judgment. — The clerk shall enter a judgment by making a record of it in writing on the file jacket, or on a docket within the file, or in a docket book, according to the practice of each court, and shall record the actual date of entry. That date shall be the date of the judgment. In Rohrbeck v. Rohrbeck, 318 Md. 28, 41, 566 A.2d 767 (1989), we said: If a ruling of the court is to constitute a final judgment, it must have at least three attributes: (1) it must be intended by the court as an unqualified, final disposition of the matter in controversy, (2) unless the court properly acts pursuant to Md.Rule 2-602(b), it must adjudicate or complete the adjudication of all claims against all parties, and (3) the clerk must make a proper record of it in accordance with Md.Rule 2-601. The ruling in the case before us possessed the first and second of these attributes, but not the third. The record made by the clerk certified that the ruling was not final, because a subsequent order was to be filed. See Atlantic Food v. City of Annapolis, 70 Md. App. 721, 725-27, 523 A.2d 648 (1987) (docket entry ending with statement "Attorneys to prepare Orders" not final). Rule 2-601 makes it clear that whether a final judgment has been entered must be determined by reference to the docket entry. Accordingly, the date and form of a docket entry purporting to enter final judgment take on special significance. The "date of entry" of a judgment is a term of art that is especially significant in calculating the time periods for reviewing and enforcing judgments. It triggers the time for filing postjudgment motions, for filing an appeal, and for enforcing judgments. It establishes the date of a lien on real property. For reasons such as these, the procedures for entering a judgment and for determining its date of entry are precise and certain. P. Niemeyer & L. Schuett, Maryland Rules Commentary, 445 (2d Ed. 1992). Under this rule, there is no doubt about the date when a judgment is entered. Litigants and third persons can look at the file or docket to determine when the judgment was entered, and they are entitled to rely on that date as a public record. Id. at 446. It is generally true that when there is a conflict between the transcript of a trial and the docket entries, the transcript, unless shown to be in error, will prevail. Shade v. State, 18 Md. App. 407, 411, 306 A.2d 560 (1973). That principle would be fully applicable here, if a motion were filed to correct the erroneous docket entry. Where, however, the rules rely upon the form and date of the docket entry to establish the finality and date of finality of an order, the docket entry will control until corrected. As we made clear in Estep v. Georgetown Leather, 320 Md. 277, 284, 577 A.2d 78 (1990) and Doehring v. Wagner, 311 Md. 272, 274-75, 533 A.2d 1300 (1987), the docket entry itself must be sufficient to show finality. For the protection of the parties and third persons, it is important that the integrity of the written docket entry be observed, until it is corrected or modified.[1] Had petitioners been aware of the form of the docket entry made in this case, and delayed the filing of this appeal beyond 30 days awaiting the filing of an order, they would not lose their appeal simply because the clerk erroneously made an entry that was non-final in form. If, instead of making the docket entry here recorded, the clerk had made an even more egregious error, and had entered "motion taken under advisement," it cannot be supposed that we would treat that docket entry as a final judgment simply because the trial judge intended that a final judgment be entered. The docket entry entered in this case did not establish a final judgment, and the Court of Special Appeals was without authority to entertain an appeal taken therefrom. The problem presented by this case is not without a reasonable solution. The Court of Special Appeals must dismiss the appeal. The case remains in the trial court, where the docket entry may be corrected by order of court. When the correcting order is entered, a final judgment will result, and a new appeal may be taken. The Court of Special Appeals may then entertain the appeal upon the same briefs and record. The additional delay and inconvenience is regrettable, but essential if we are to preserve the integrity of the docket entry as the means for determining when a final judgment has been entered.[2] JUDGMENT OF THE COURT OF SPECIAL APPEALS VACATED; CASE REMANDED TO THAT COURT FOR DISMISSAL OF THE APPEAL; COSTS IN THIS COURT AND IN THE COURT OF SPECIAL APPEALS TO BE PAID BY PETITIONERS. NOTES [1] Clerical mistakes in the record may be corrected by the trial court at any time. During the pendency of an appeal, such mistakes may be so corrected before the appeal is docketed by the appellate court, and thereafter with leave of the appellate court. Maryland Rule 2-535(d). [2] Had a confirmatory order been filed by the trial court after its oral ruling, and after the appeal had been noted, the appeal could have been saved by the use of Maryland Rule 8-602(d). That was not the case here, however, and thus the record must be sent back to the trial court for correction.
{ "pile_set_name": "OpenWebText2" }
Stressed Out: How 'Mind Playing Tricks On Me' Gave Anxiety A Home In Hip-Hop Enlarge this image toggle caption Marco Torres/HOU/VMG via Getty Images Marco Torres/HOU/VMG via Getty Images This story is part of American Anthem, a yearlong series on songs that rouse, unite, celebrate and call to action. Find more at NPR.org/Anthem. Editor's note: This story includes includes brief mentions of suicide. When HBO's drama The Sopranos began airing in 1999, the idea of a mob boss seeking therapy was revolutionary. But Tony Soprano wasn't the first gangster to expose his sensitive side to the world: That distinction came nearly a decade earlier, thanks to three gangstas of a different stripe. The year was 1991. John Singleton's Boyz n the Hood was playing on the big screen. Rodney King's beating by LA cops was on virtual loop on the small screen. And "Mind Playing Tricks on Me," by the Houston rap trio Geto Boys, was bumping out of nearly every car with speakers in the trunk, putting a voice to the angst and paranoia that defined what it meant to be a young black man in America at the time. When "Mind Playing Tricks" came out, the Geto Boys were already legendary in the South. It was hard not to stand out with a group that included Willie D, a former Golden Gloves boxer; Bushwick Bill, a brash Brooklyn transplant and former breakdancer who stood less than four feet tall; and Brad Jordan, a lyricist with enough street cred to wear the stage name of rap's most celebrated kingpin: Scarface. He wrote three of the four verses in this song, originally intended for his solo album until Rap-A-Lot Records founder J. Prince decided it was the breakout record he needed for the label's flagship group. Advisory: This video contains profanity and depictions of violence. YouTube But it's Scarface's grandmother who deserves credit for the song's title. "It was a strange way of how he came about it," she told MTV several years ago. "I come through the room and I think I was just kinda mumbling to myself or my lips was working or something. He said, 'Mawmaw, what you talking about?' I said, 'Oh nothing, my mind's just playing tricks on me.' And didn't have no idea he was gonna go out and be making a song about it." A multi-instrumentalist from a long line of musical talent, Scarface had been a fan of metal as a kid. But growing up in Houston's Southside introduced him to a different kind of hard rock: He went from dropout to local drug dealer coming up. He also spent some time in a hospital psych ward, after trying to kill himself once as a teenager. Learning to articulate his feelings must have contributed to making him the coldest songwriter in rap, more Southern Gothic than Edgar Allan Poe. Just listen to him in the song's third verse: One moment he's in church praying for an exit out the drug game; the next, he's contemplating suicide. Day by day it's more impossible to cope I feel like I'm the one that's doin' dope Can't keep a steady hand, because I'm nervous Every Sunday morning I'm in service Prayin' for forgiveness And tryin' to find an exit out the business I know the Lord is lookin' at me But yet and still, it's hard for me to feel happy I often drift when I drive Havin' fatal thoughts of suicide Bang and get it over with And then I'm worry-free, but that's bulls*** This was confessional rap — street ministry. Scarface was acknowledging emotions a generation of black boys had been conditioned to hide. Gangsta rap may have been America's nightmare in the '80s and '90s, but it was also America's creation. There's a post-traumatic stress that comes along with being black in this country: It's almost part of your inheritance. And the feeling was compounded by the crack era, by the war on drugs, by over-policing and mass incarceration. This was the era when it wasn't at all unusual to hear young black men referred to as an endangered species — and the worst of it is, we were being told that we were the ones we should fear the most. The music of that era was rebellious; it was aggressive. It was misogynistic and hyper-masculine to a fault. It was definitely political, even if it was far from "conscious" rap. But one thing it hadn't much been up until that point was vulnerable. "Mind Playing Tricks" became that first vulnerable gangsta rap song. In the lyrics, the Geto Boys were still hardcore hustlers, but they weren't glorifying the streets — they were traumatized by them. The beginning of Willie D's verse tells the story: I make big money, I drive big cars Everybody know me, it's like I'm a movie star But late at night, something ain't right I feel I'm being tailed by the same sucker's headlights All of a sudden, the villains depicted on record — and by society — were cast as the victims. They were haunted by their own demons, but also by the economic degradation that hollowed out the hoods from which they came. The track got a creepy music video that would probably be labeled Afro-Surreal today, like something out of a Jordan Peele flick. Geto Boys lowered their masks enough to reveal their inner fears, but you didn't have to be an ex-drug dealer like Scarface to relate. You didn't even have to be from the ghetto like Geto Boys. If you were black, if you felt the pressure of growing up with a target on your back, "Mind Playing Tricks" was your anxiety anthem. Our generation knew how to posture. We knew how to pose and play hard. But the survival tool we'd really been missing all this time was a way to process our pain, to process our reality. Therapy was still a huge taboo — and really a privilege — that most black folks just weren't privy to. "Mind Playing Tricks" became the Trojan Horse, giving a generation the language to consider something we'd never let down our guard to talk about. Pretty soon, you even had preachers using the song as text for their Sunday sermons. "The first time I actually heard the song analyzed and broken down was at church," says music journalist and Southern hip-hop historian Maurice Garland, recalling one of his earliest encounters with the song as a kid back in the '90s. "Somebody was preaching at church — you know how preachers do analogies with their sermons. He was like: 'And you know, it's like that Geto Boys song, when your mind's playing tricks on ya.' He was breaking down the depression, the drugs, the anxiety, the everything — he was corralling all of this into his sermon. That was one of the first rap songs that I remember where topics like that were even touched on." After "Mind Playing Tricks," gangsta rap started to sound a little different. It was still hard, still raw and uncut. But now, it began to echo the blues tradition it grew out of. You had artists like MC Eiht rapping about how the "hood took [him] under." Or Spice 1 wearing "The Face of a Desperate Man." And Tupac crying all those thug tears. Today, mental health is one of the biggest topics in hip-hop culture: Even as many still suffer in silence or die tragically from drug overdoses, many more conversations are happening in public. Last year, Kanye West called his bipolar diagnosis his "superpower" in an attempt to destigmatize mental illness. The importance of self-care is a constant theme on Black Twitter. Radio personality Charlamagne the God wrote a whole book, Shook One: Anxiety Playing Tricks On Me, about confronting his anxiety and getting help for it. (Scarface even wrote the foreword.) And there isn't a popular rapper out there who doesn't owe their career to this song in some way — whether they know it or not. It gave an artist like Drake the range to wear his heart on his sleeve. It gave Kid Cudi his biggest hit in "Day 'N' Nite," a song he wrote while trying to make his own version of "Mind Playing Tricks." And it's gifted us a whole subgenre of emo rappers like Lil Uzi Vert, Juice WRLD and, yes, even Post Malone, who top the charts by pouring out their pain. For so many artists and fans today, rap is still the closest thing they have to therapy. It's the space where artists articulate their trauma and and air out their toxic behavior. There's still pain, and a whole lot of the wrong coping mechanisms. But at least rappers who represent the streets aren't afraid to use their music as a way to express it anymore. Meanwhile, the Geto Boys fight on. Willie D is still as politically outspoken as ever. Bushwick Bill is battling stage 4 pancreatic cancer, a diagnosis he recently revealed to the public. Then there's Scarface, easily one of the greatest rappers of all time. His grandmama told him her mind was playing tricks, and he turned it into something bigger than a hit: a diagnosis. Not just of black boys in the hood, but of the effects America's systemic ills were having on us. If he made a new version of the song, "it would be bigger than me," he said in Charlamagne's book. "My paranoia would be based on my people going back into slavery." His mind could still be playing tricks. Or just maybe, 30 years later, he's seeing reality with more clarity than ever before. If you or someone you know may be considering suicide, contact the National Suicide Prevention Lifeline at 1-800-273-8255 (En Español: 1-888-628-9454; Deaf and Hard of Hearing: 1-800-799-4889) or the Crisis Text Line by texting HOME to 741741. Walter Ray Watson and Noel King contributed to the radio version of this story. Daoud Tyler-Ameen contributed to the digital version.
{ "pile_set_name": "USPTO Backgrounds" }
1. Technical Field The present invention relates to a guide device for a cover of a vehicle roof to be opened. The guide device functions for raising the cover and for moving the raised cover by means of at least two guide profiles which can be moved against one another over a roof surface adjoining behind the roof opening which can be closed by the cover. 2. Description of Related Art International Patent publication WO 00/51835 discloses one such guide device for moving a raised cover over a roof surface which adjoins to the rear. On either side of a roof opening the device contains three telescoping guide profiles or guide rails each, by means of which the raised cover can be pushed to the rear over the roof surface which adjoins to the rear in a plane which is fixed by the linearly movable guide rails. The cover which has been moved to the rear thus stands distinctly beyond the roof surface to the top, especially when the roof surface declines to the rear. One object of the present invention is to provide a guide device which enables matching of the position of the cover, which can be moved to the rear above the roof surface, to the roof surface. This object and other objects are achieved by providing a guide device having guide profiles wherein at least one of the guide profiles of the guide device, at least in sections, has a curvature pointed toward the roof surface, in order to lower the cover, which can be shifted to the rear by means of the guide profiles, toward the roof surface. In this way, at least one guide profile, which can be moved to the rear during its overall motion or at least during one segment of its path of motion, is moved down such that the cover is likewise lowered toward the roof surface. Since the cover is raised less over the roof surface than prior covers, the present invention results in less air resistance and wind noise. The guide profiles or guide rails can be made such that the section which has the curvature is formed on the back end of the front guide profile and/or on the back end of a middle guide profile and/or on the front end of the rear guide profile. In a short curved section, the lowering motion of the cover approaches a swiveling motion. In one preferred embodiment, the guide device has a front guide lever which is pivotally supported on the roof side, a middle drive rail which is movably supported thereon, and a rear carrier profile of the cover which is movably supported on the drive rail, all of which are formed with an especially coincident line of curvature for the displacement motion of the cover. The three carrier profiles for a short closing arrangement have a comparatively long displacement path which makes available an especially uniform lowering motion of the cover. Preferably the guide lever, the drive rail and the carrier profile of the cover are supported to telescope onto one another, especially in a mutually enveloping arrangement of the three guide profiles. But at least two and also four guide profiles can also be arranged next to one another such that a nonuniform or variable radius of curvature can be formed. A uniform curvature has a radius of curvature of, for example, 300 to 350 cm. Depending on the configuration of the vehicle roof, it can even be different.
{ "pile_set_name": "StackExchange" }
Q: jekyll not linking to internal posts Just started jekyll, and I want to display a link to one of my posts on the index.html page. I looked through the documentation and the following code appears to be what I'm suppose to do. The following is in index.html <p>......</p> [Hello World]({% post_url 2015-01-19-soccer %}) <p>........ </p> but it simply displays ..... [Hello World]({% post_url 2015-01-19-soccer %}) ....... what am I doing wrong? A: Since you used a mix of Markdown and HTML, which is causing the markdown processor to ignore anything in between the HTML blocks. Markdown is also sometimes not processed when you have HTML right above the Markdown. (This is the case for you, since your example shows you have closed off the <p> tags) There are a few ways around this. Make sure there is a newline in between any HTML and Markdown, this will not show up as a <br> or a <p> in the final output, but rather ensures that the processor will convert the Markdown correctly. So you should have something like this: <p>......</p> [Hello World]({% post_url 2015-01-19-soccer %}) <p>........ </p> Notice the extra line there between the first <p></p> and the Markdown. Use only HTML (this is as answered by user @topleft) Use only Markdown, since <p> tags are supported. Try the markdown=1 HTML attribute. Markdown processors like Kramdown allow you to add an explicit tag to tell the processor to go through HTML blocks and process any Markdown there. I'm assuming you're using the default (which I believe is Redcarpet) and couldn't find the links on whether this is supported. But you can try this: <div id="someDiv" markdown=1> [This is a Markdown link that will be parsed](http://www.example.com) </div>
{ "pile_set_name": "PubMed Abstracts" }
Endothelial glycocalyx breakdown is mediated by angiopoietin-2. The endothelial glycocalyx (eGC), a carbohydrate-rich layer lining the luminal surface of the endothelium, provides a first vasoprotective barrier against vascular leakage and adhesion in sepsis and vessel inflammation. Angiopoietin-2 (Angpt-2), an antagonist of the endothelium-stabilizing receptor Tie2 secreted by endothelial cells, promotes vascular permeability through cellular contraction and junctional disintegration. We hypothesized that Angpt-2 might also mediate the breakdown of the eGC. Using confocal and atomic force microscopy, we show that exogenous Angpt-2 induces a rapid loss of the eGC in endothelial cells in vitro. Glycocalyx deterioration involves the specific loss of its main constituent heparan sulphate, paralleled by the secretion of the heparan sulphate-specific heparanase from late endosomal/lysosomal stores. Corresponding in vivo experiments revealed that exogenous Angpt-2 leads to heparanase-dependent eGC breakdown, which contributes to plasma leakage and leukocyte recruitment in vivo. Our data indicate that eGC breakdown is mediated by Angpt-2 in a non-redundant manner.
{ "pile_set_name": "NIH ExPorter" }
Statistical methods for surveillance of spatial health data are of critical importance to public health practitioners. Yet, prospective surveillance for changes in disease risk over in space and time is a relatively undeveloped arena of statistical methodology. Most methods for space-time surveillance have been developed for retrospective analyses of complete data sets. However, data in public health registries accumulate over time and sequential analyses of all the data collected so far is a key concept to early detection of emerging trends or differences in disease risk. The impact derived from timely treatment and control measures can be dramatic, especially when monitoring maps of disease incidence of chronic diseases such as cancer, one of the leading causes of death worldwide. The goal of this proposal is to develop statistical methodology for prospective spatio-temporal disease surveillance, with cancer surveillance being our primary focus. The conditional predictive ordinate is a Bayesian diagnostic tool that detects unusual observations. Although it has never been applied in a surveillance context, we hypothesize it is a powerful technique, in a modified form, for detection of unusual aggregations of disease in space and time. We will also extend our approach to the analysis of multiple diseases, as surveillance systems are often focused on more than one disease. This extension, incorporating correlation between diseases, is likely to improve cluster detection capability. We propose three specific aims. In Specific Aim 1 we will adapt the conditional predictive ordinate for a surveillance setting. Publicly available small area cancer count data and simulated data mimicking possible true disease relative risk changing patterns will be used to test the performance of the proposed methodology in different scenarios. In Specific Aim 2 we will generalize this approach to a multivariate setting which allows for inclusion of correlation between diseases. Different types of cancer will be monitored simultaneously to assess the performance of the multivariate extension in comparison to the individual analyses. In Specific Aim 3, the implementation of the surveillance conditional predictive ordinate in an R package, a free statistical programming language available in many public health departments, will enable use by public health practitioners. Upon the completion of this project, we will have a Bayesian surveillance technique that will be used to detect areas of increased disease incidence as quickly as possible in an effort to reduce morbidity and mortality. The multivariate extension of the proposed surveillance technique will fill in a major gap on the current literature. This extension, allowing for inclusion of correlation between diseases, may contain important clues for the early detection of changes. Finally, the implementation of the surveillance methodology in a user-friendly package within the R software environment will facilitate dissemination. PUBLIC HEALTH RELEVANCE: Narrative In this project we will develop a novel model-based surveillance technique to monitor a map of disease over time. This technique will enable early detection of changes in disease risk helping to reduce undue morbidity and mortality. The implementation of the proposed technique in a user-friendly package within the R software environment will facilitate dissemination and use by public health practitioners.
{ "pile_set_name": "Pile-CC" }
Best Diet Pill On The Market Today Best Diet Pill On The Market Today Best Diet Pill On The Market Today. Do you assume that losing some body weights is hard? Yeah, some assumption so. Several women feel certain that having suitable body-weight will make them appear so attractive. Obviously, it will certainly make them certain. However, what regarding you? Do you still have a lot more fat on your body? It's so good. Nonetheless, you might not really feel concern since currently we have the unique item to offer to you. This is it the PhenQ as ideal product to obtain currently. We are the right site to look for some products for losing the weight to get to ideal one. We offer also this PhenQ due to the fact that it has more benefits and silver linings compared to various other does. You will not really feel concern to eat the item due to the fact that it is lawful product. Naturally, the professional has actually examined this product before marketing to the market. Many women worldwide have actually also analyzed and also used this product to lose some weights. With well balanced excellent life design, they could really reach their initiatives. To know even more concerning exactly what should do when you have purchase this product, you must click the link to check out the official product. There, you will locate and read all info pertaining to the PhenQ. You can likewise when it comes to some concerns and also get the appropriate solutions. Naturally, it will make certain you to buy and eat this product for healthy and balanced life as well as weight shed. If you have actually really made certain to utilize this PhenQ, we truly thank to you. You can see just how the product will certainly work to you by balancing with working out as well as great life tasks as well as nourishment. Never be doubt to do something great. You can reach your goal by doing those initiatives. Furthermore, below, we will offer you excellent methods to find the ideal product in connection with shed some body-weights. Weight Loss Research is dedicated to providing customers realiable and approximately day details on Best Diet Pill On The Market Today. It is our aim to discover reasonable and also long-term approaches of reducing weight and also to maintain a healthy and balanced weight. Click here to buy PhenQ from official website What Is PhenQ? PhenQ is among the very best diet pill that concentrates on different elements of weight reduction. If you wish to make your body slim and also wise, after that this product is excellent for you. Active ingredients of these pills play a vital role since they are responsible for their success and effectiveness. You would certainly be glad to know that ingredients of PhenQ are 100% natural and also clinically evaluated. So prior to I inform you concerning my weight loss journey. Allow me to tell you regarding the magical item that made it all possible. Phen Q is basically an amalgamation of a power booster, an appetite suppressant as well as a fat burner. It is available in a bottle having 60 pills. As well as you're supposed to take two everyday. So basically, a bottle is worth a month's dosage. So just what I did was, I took one pill in the early morning with my breakfast and the other at lunch. It is not recommended to take it at night or right before you're resting, because think me when you're teeming with power-- rest will certainly be the last thing on your mind. As a cravings suppressant, it reduces your prompts to snack and even cares for your consumption while you're eating, together with this as a fat heater it increases your body's metabolic process consequently, assisting you shed much more calories than you would usually. Along with this, it floods you with energy and also improves your concentration as well as cognitive power. Benefits Of PhenQ Click here to buy PhenQ from official website How Does PhenQ Work? PhenQ isn't simply your regular slendering pill, which declares to do a variety of points however does nothing in all. Extensive scientific research study backs this formula. α-Lacys Reset, among the formula's vital components has actually been tried and tested again and again, as well as each time it has verified to be very effective in the reduction of body weight and also fat. This formula was brought forward by releasing extensive research study as well as reducing side modern technology. It works as a stimulant for your body's metabolic system and also accelerates the procedure. Not only is your body's natural metabolic process accelerated yet its all-natural capacity of heat production is likewise improved. Consequently, your body's thermogenesis increases the scale, fats are scorched quickly and you wind up with a well-toned and also slim body. It is natural. Your all-natural metabolic system as well as warmth production system is used. All PhenQ does is speed up these natural systems of your body. Moreover, α-Lacys Reset is also extremely effective in raising your muscles mass. Increased muscle mass leads to an increase in the burning of calories. Click here to buy PhenQ from official website Exactly How Does PhenQ Work? PhenQ isn't really just your normal slendering pill, which asserts to do a number of points however not does anything in all. Comprehensive clinical research backs this formula. α-Lacys Reset, one of the formula's crucial ingredients has actually been tried and tested repeatedly, and also each time it has actually verified to be very effective in the decrease of body weight and fat. This formula was advanced by deploying comprehensive research as well as reducing side technology. It functions as a stimulant for your body's metabolic system as well as speeds up the process. Not just is your body's natural metabolic rate accelerated yet its natural capacity of warmth production is also boosted. Consequently, your body's thermogenesis goes up the scale, fats are charred quickly as well as you wind up with a well-toned as well as slim body. It is natural. Your natural metabolic system as well as heat production system is utilized. All PhenQ does is speed up these natural systems of your body. Moreover, α-Lacys Reset is additionally extremely effective in enhancing your muscles mass. Enhanced muscle mass leads to an increase in the burning of calories. The professional research studies which were performed produced the list below results. Individuals who took α-Lacys Reset as opposed to Placebo tape-recorded these outcomes: • They observed a reduction in their body weight totaling up to 3.44%. • A rise in muscular tissue mass was additionally observed which totaled up to about 3.8%. • Likewise, there was a decrease in the body fat which amounted to nearly 7.4%. These results seem quite remarkable without a doubt which leads one to wonder exactly what various other active ingredients are there in PhenQ. Click here to buy PhenQ from official website PhenQ Ingredients Calcium Carbonate-- This mineral maintains bones solid and is effective in assisting with weight-loss. Here's how it works: calcium sends the mind messages when the body is complete and does not require anymore food intake. Restricting food intake is an essential part of controlling weight. Capsimax Powder-- A mix of B3 (niacin, a vital nutrient for people), capsicum, caffeine, and also black pepper. Black pepper and capsicum (the substance that offers spicy peppers their infamous warmth) collaborate to blow up away saved fat. High levels of caffeine-- High levels of caffeine remains in numerous all-natural weight-loss tablets lists due to its incredible capacity to give you energy. It also lowers appetite which assists you to shed fat more effectively. Chromium Picolinate-- This unique mineral is in lots of whole grains as well as vegetables. It aids to suppress cravings for carbohydrate and sugar-filled foods. By allowing the cells to absorb all the sugar that it can, blood sugar level degrees are much more quickly regulated. L-Carnitine Furmarate-- This crucial amino acid is usually discovered in nuts, meat, as well as green vegetables. It aids the body usage saved fat cells as power so about shed fat while being reliable. Nopal-- Nopal is actually a sort of cactus that's high fiber levels suppress appetite. It's high level of amino acids also offer you a lot more power and works to detox the tissues. Getting rid of added water weight is the very first step to getting eliminate body fat. Click here to buy PhenQ from official website approved as well as tested remedy that has no negative effects as well as is effective in weight loss procedure, PhenQ can be regarded as a dependable medication. Nevertheless, even the most special drug could trigger serious issues as well as create a terrible result if it is taken incorrect and if usage recommendations are violated. That is why, to experience the essential outcomes, consult your physician before the intake. Undoubtedly, every weight management drug has its advantages and also disadvantages. The very same medication could suit one patient and also result in unfavorable responses in another. That is why, the importance of doctor's prescription could not be overestimated right here. Nevertheless, the main benefits of PhenQ reported by consumers consist of the following: Extra reliable, powerful and also risk-free outcomes compared to supplied by other fat burning medications; 100%natural elements that do not trigger side effects; Extraordinary means to melt fat quick as well as without additional initiative; Useful for hunger suppressing and changing eating practices; Great medicine that obstructs fat production, increasing weight-loss effect; Rises energy production and also usage that also adds to a faster weight management process; Safe and also clinically tried and tested treatment. Where to Get PhenQ? We need to note that PhenQ is excellent weight reduction medicine with a different series of elements that seems to have positive results for weight loss, with minimum negative results. Click here to buy PhenQ from official website Where To Buy PhenQ Weight Loss Pills? It's remarkable for dropping those extra pounds conveniently whilst supplying you with the inspiration and also energy for exercise too!so you could not drop it as swiftly as opposed taking illegal steroids, but the plus is you are guaranteed of its safety, its power and also its legitimacy! Opportunities are that you will certainly be obtaining your hands on phony, inefficient and also perhaps even hazardous duplicates. Just what's more you will certainly not have the 60 day money-back warranty that PhenQ offers. The only risk-free means to PhenQ buy is from their official site. It costs $69.95 for one container (60 tablets) which is a one month supply (two tablet computers per day). But hold onto your hats.If you get 2 containers for $139.90, the generous men at PhenQ with throw a container in totally free! Still more!
{ "pile_set_name": "OpenWebText2" }
THE ONE PERSON EVERYONE SHOULD THANK FOR RING OF HONOR'S SUCCESS TODAY As I sit here in front of my computer, it is 9:49 AM, which means that we are about ten minutes away from Ring of Honor pretty much selling out Madison Square Garden in New York City the night before Wrestlemania 35. There’s a lot to unpack there. The historic nature of someone other than a McMahon family member running MSG. ROH drawing the biggest crowd in its history. New Japan bringing its stars in to the Mecca. ROH literally planting a flag that cannot be ignored on WWE’s holy ground. It’s insane, and if you really pull yourself back and look at the landscape, there is only one person that everyone should thank for this happening. I want to take you back to September 2009, when Ring of Honor was running the Grand Ballroom of the Manhattan Center, a five-minute walk from MSG. It was a rare ROH in NYC show that I wasn’t going to attend, because it happened to fall on my birthday and I had other plans. Two weeks before the show, my phone rang, and it was someone who worked for the company at the time, telling me I had to come to the show. He wouldn’t tell me why. I assumed a title change and was told no. Then, finally, he admitted, “Cary is going to shut down. This is the last show.” Within an hour, someone else confided in me that the company was done. It wasn’t hard to see why. Silkin was using all the money he made from his ticket broker business and funneled it into ROH. Ring of Honor was literally living or dying based on how popular Broadway shows were selling for Silkin. He kept things afloat but on that night, he was looking at a loss that most ROH aficionados would have thought to be insurmountable - Bryan Danielson and Nigel McGuinness, who on the same night, were going to be finishing up and heading to WWE. Silkin was going to lose the two top talents, in the eyes of the fans, in one fell swoop. There was no end in sight. No big payday. No step forward. DVD sales, always the lifeblood, were declining. He was running shows for the sake of running shows and now he was losing what was, in many ways, the nucleus of the company. It was over. This was going to be the end. I had to see it through. I was there for the start and I wanted to be there for the end. So, I canceled my plans and I sat through a six-hour marathon show that ended with Danielson imploring fans to continue to support Ring of Honor. Right before that speech, Jim Cornette returned to Ring of Honor - having secretly made a pact with Silkin that if he kept the company open, Cornette would work to try and find him a sponsor, a partner, a TV outlet, something that would help keep ROH afloat. Silkin agreed and backed off on his plans to shut down, because he loved pro wrestling and wanted wrestling fans to have something that they, too loved. While I have mentioned it on Elite audio from time to time, I don’t think anyone in that Grand Ballroom that night knew they were, until just a few days before, sitting at what was going to be the funeral of Honor. Cornette contacted long-time wrestling promoter Gary Juster, who had done his tour of duty in WCW and through Juster, a relationship with Sinclair Broadcast Group was pursued through Joe Koff, now the COO of ROH. The pitch was for Sinclair to partner with ROH, perhaps give it a TV deal. Instead, Sinclair, which had already been considering purchasing the National Wrestling Alliance, bought ROH and took it under its wing. That was all Koff, who like Silkin, loved pro wrestling and knew what pro wrestling programming could bring to Sinclair. There were the usual growing pain moments. ROH had to be reconfigured under its new corporate owners. The new owners had to figure out how to mesh what ROH was and what they wanted ROH to be. Some staff left, there were turnovers of wrestling talent and as irony would have it, Jim Cornette would have an insane meltdown and exit the company he actually saved from extinction. But, over time, there was also great growth. All of that set the stage for Ring of Honor at the Garden. It’s 10 AM as I write this now and as I look at the landscape and everyone who helped ROH, from Doug Gentry and Gabe Sapolsky and Low Ki and Adam Pearce and Paul London and CM Punk and Samoa Joe and Homicide and The Briscoes and Joe Koff and Greg Gilleland and The Young Bucks and Delirious and beyond, there’s one person above all who everyone should thank today for their contribution to Ring of Honor. Dixie Carter. Had Dixie Carter, in a political move, not fired Jim Cornette that same month of September 2009 in order to remove him from her company in the wake of issues with Jeff Jarrett, putting Cornette in the position where he was free and clear to return to ROH that night, several things are clear: 1 – Cornette wouldn’t have convinced Cary Silkin not to shut down the company, so ROH would have been dead almost a decade by the time their MSG debut rolls around. 2 – Cornette wouldn’t have helped deliver ROH to Sinclair, so certainly ROH wouldn’t be on TV and potentially some other wrestling company would be, perhaps not. 3 – Ring of Honor would certainly not be running Madison Square Garden, because the might of Sinclair lawyers would not have been available to ROH. So, for all the stupid decisions made, all the criticism thrust upon her and all the rolling of the eyes for things that happned when she was in charge of TNA, Dixie Carter did every single one of you a massive solid. Without ever meaning to, she saved Ring of Honor and set the stage for today’s sellout, which means that Dixie truly did have the success she wanted in pro wrestling. She just didn't get to have it with the company she actually owned. Raise your mint julips. Three cheers for Miss Dixie. Mike Johnson has been covering Ring of Honor since before the promotion actually had a name. He can be reached at [email protected]. If you enjoy PWInsider.com you can check out the AD-FREE PWInsider Elite section, which features exclusive audio updates, news, our critically acclaimed podcasts, interviews and more by clicking here!
{ "pile_set_name": "Pile-CC" }
Weather looks iffy for Obama visit Better bring your rain gear, if you’re planning to see the president visit Wisconsin this week. An approaching cold front could make conditions wet and windy for President Barack Obama’s campaign stop on the University of Wisconsin campus in Madison on Thursday. The National Weather Service is predicting a 40 percent chance of showers and thunderstorms¬. People attending the event will not be allowed to bring in umbrellas, which may be just as well, since winds could gust up to 25 miles per hour. The President will have left Wisconsin before that same cold front pushes temperatures down from the low 70s for a Thursday high to the 50s on Friday. The Obama rally on Bascom Hill is expected to mean big crowds, road closings and traffic at a standstill near the campus. Gates for the event will open at noon. The last time the President was in Madison two years ago more than 26,000 people showed up.
{ "pile_set_name": "OpenWebText2" }
Hi Guys,There are several interesting things to report in this month's update:* Firstly GDB 7.7.1 has been released. This provides the following fixes and improvements to GDB 7.7:+ PR win32/14018 (pc register not available error on Windows)+ PR python/16547 (GDB crashing on gdb.python/py-linetable.exp)+ PR build/16550 (64-bit GDB doesn't build on Solaris)+ PR gdb/16626 (auto-load regression: gdb uses wrong file to test safeness)+ PR breakpoints/16292 (GDB oversteps a range in some cases.)+ PR gdb/16575 (stale breakpoint instructions in the code cache)+ PR gdb/16696 (AIX 32-bit cores, high section addresses)+ PR gdb/16721 (Erroneous backtrace on AVR)+ PR gdb/16832 (Erroneous backtrace on avrxmega architectures)+ PR build/16873 (GDB 7.7 does not build with GCC 4.9)* GCC and the Binutils now have support for the R3 and R5 variants of the MIPS architecture, both in 32-bit and 64-bit modes.* By default instance variables in Objective-C can be accessed as if they were local variables from within the methods of the class they're declared in. This can lead to shadowing between instance variables and other variables declared either locally inside a class method or globally with the same name. Specifying the new optiondisables this behavior thus avoiding variable shadowing issues.Alternatively the new warning optioncan be used to detect such occurrences and then the programmer can fix them individually.* GCC frequently warns about qualifiers on pointers being discarded, eg whenis passed to a function that takes a. The new compiler optioncan now be used to disable these warnings - although only for C.* The code sanitizer has been extended to catch the division by zero of floating point values. The new optionenables this behaviour, but this has to be done explicitly since floating-point division by zero can be a legitimate way of obtaining infinities and NaNs.CheersNick
{ "pile_set_name": "OpenWebText2" }
Left-wing Mexican senators celebrated the start of the Christmas season by beating a piñata of U.S. President-Elect Donald J. Trump while chanting “faggot” and other expletives. The celebration took place in Mexico City where the Democratic Revolution Party (PRD) held its yearly “posada” or Christmas celebration. The PRD is a far left party known for its populist measures and protest marches around Mexico City. A video taken by one of those in attendance at the party shows the senators call for a salute to Donald Trump. In Mexican humor, “a call for a salute” is when one person asks the rest to shout out an expletive. In this case, the assembled group echoed the chant, “chinga tu madre”, calling for the President-Elect’s mother to be violated sexually. Many senators whistled the insult in lieu of saying the exact words. Soon after, the senators chanted another insult, “Hey Faggot”. The expression is commonly used in soccer matches to distract a rival goalie. PRD’s current leader, Miguel Barbosa, referred to the antics as “Christmas humor.” The Mexican politician said his party is strongly opposed to Trump and his nationalist message. The luxurious posada by members of the PRD comes at a time when most Mexicans live on a minimum wage of approximately $5 USD per day. On the other hand, Mexico spent more than $362 million Pesos or approximately $20 million U.S. to pay the salaries and benefits of its 128 senators. Tony Aranda is a contributor for Breitbart Texas.
{ "pile_set_name": "OpenWebText2" }
マドゥロ大統領が独裁的な統治を強めている南米ベネズエラで、国民の国外脱出が急増している。深刻な食料不足や政治的抑圧から逃れようとするその数は、今月に入って1日数万人にも達する。かつて中南米一豊かな民主主義の優等生と称され、世界一の原油確認埋蔵量を誇るベネズエラだが、今やシリア、ミャンマーに次ぐ新たな難民危機を生んでいる。 「難民」は2016年から徐々に流出し始め、国連難民高等弁務官事務所(UNHCR)の推計では、これまでに少なくとも150万人が国境を接するコロンビアやブラジルなどに脱出したとみられる。ロイター通信などによると、50万人以上が滞在しているコロンビアのサントス大統領は「難民には寛容でありたいが、われわれは経験したことがない苦境に陥っている」と語り、先月から不法入国を防ぐため、3000人の警備要員を国境に配置した。治安悪化も懸念材料になっている。 PR ベネズエラでは13年3月に反米左翼の急先鋒として鳴らしたチャベス前大統領が病死し、後継指名されていたマドゥロ氏が副大統領から大統領に昇格。貧困対策として公共住宅の大量建設などに取り組んだが、バラマキ政策に加えて外貨収入の9割を依存する原油の価格低迷で財政が破綻した。紙幣増刷によってハイパーインフレを招き、17年のインフレ率は2616%(国会統計)、今年は1万3000%と国際通貨基金(IMF)は推計している。 苦肉の策として、マドゥロ政権は埋蔵原油を裏付けとした仮想通貨「ペトロ」の発行を始めたが、米政府が自国民の取引や国内流通を禁じるなど、効果は疑問視され、“国際金融詐欺”に近いとの指摘もある。 PR 続きを読む
{ "pile_set_name": "Pile-CC" }
Popular Malaysian teen Khairul clocks stunning 10.18sec in 100m JUBILATION: Khairul Hafiz Jantan (above) celebrates breaking the Malaysian 100m record at the 18th Sukma Games in Sarawak. The signboard shows the 18-year-old's unofficial time of 10.19sec, which was later ratified to 10.18.PHOTO COURTESY OF THE STAR At the 18th Sukma Games in Sarawak yesterday, 18-year-old Khairul Hafiz Jantan ran a stunning 10.18sec to win the men's 100m. The previous mark of 10.30 was set in 1998 - the year Khairul was born - by Sarawakian Watson Nyambek at Malaysia's National Stadium in Bukit Jalil. To put Khairul's blistering time in context, the South-east Asia (SEA) Games record is 10.17, set by Indonesia's Suryo Agung Wibowo in 2009, and the winning time at last year's SEA Games in Singapore was 10.25, clocked by US-born Filipino Eric Cray. The Asian record of 9.91 is held by Qatar's Nigerian-born sprinter Femi Ogunode, while Singapore's national record is 10.37, set by UK Shyam in 2001. Related Stories Khairul was in tears after his race as he ran a victory lap with the Malacca state flag draped over his shoulders. He was all smiles when he met the media later, but was clearly not used to the attention. "I'm so happy and thankful," he said. "I never expected this." WHIRLWIND It has been a whirlwind few months for the teen. He shot to fame in June when he won gold in the 100m at the Asian Youth Athletics Championships in Ho Chi Minh City, clocking 10.36. He travelled to Bydgoszcz, Poland, for the IAAF World Under-20 Championships earlier this month, and made the semi-finals with a 10.44. While fast, especially for his age, no one, including his coaches, expected the time he posted yesterday. Said Khairul's personal coach, Poad Kassim: "I knew he would break the record at the Sukma. But a 10.18? I never saw it coming. "I hope he can eventually go below 10 seconds. We will discuss with the Malaysian Athletics Federation and see how best to take him forward." Malaysia's national sprints coach Nazmizan Muhammad, once nicknamed "Raja Pecut" (Sprint King in Malay) after his 100m and 200m golden double at the 2003 SEA Games in Vietnam, backed Khairul to be the next Malaysian to claim 100m glory at the Games. "I saw from the morning's heats he clocked a 10.44 and he had a very relaxed run," said the 35-year-old. "So I knew he had the possibility of breaking the national record and go below 10.30. But I could never imagine he would run a 10.18. "It's an amazing time. I salute him. It was a world-class run. "His next target has to be to win gold for Malaysia at next year's SEA Games."
{ "pile_set_name": "Pile-CC" }
Blog Super Bowl: an advertising game played on social media In February 2010, Pepsi decided not to advertise during the Super Bowl event. After 23 years of presence on the event, a big brand like Pepsi pulling out was a big deal. In 2010, Pepsi invested monies behind the 'Pepsi Refresh Project' that year. Other brands like FedEx have also pulled out of Super Bowl too citing high costs [about $3mn for a 30-second spot]. While the event garners huge viewership in the US [reported 100mn in the US] and the advertising generates interest around the globe, the price does [about $3.5mn per 30-second spot this year] seem very steep. So some brands saw business sense in staying away from an event that just lasted a day. This year, just 2 years later, there seems to a huge buzz around the ads during event. Brands have seeded YouTube and social media sites with their Super Bowl ads weeks in advance. Some have resorted to latest technology [allowing for real-time reaction to Super Bowl in ads] to generate interest, pass along value and involvement. What's changed in 2 years? I guess the primary reason is that advertisers have begun to view the event as one that can last a few months rather than a few hours. In the best case scenario, a brand's Super Bowl effort can be talked about for months, even one full year. Last year's The Force by Volkswagen is still creating online buzz for the brand [50mn views as of date]; in my view, this year's Coke effort by W+K is likely to be talked about for months to come. Another opportunity the Super Bowl offers is to come across as an innovative and therefore likable brand. Since the spots come at such a premium all effort went into making the spot noticeable, different and buzz worthy. Not surprisingly it was common to see humor, bizarre humor, outlandish settings, mind-blowing computer graphics and so on for these ads. This year thanks to the Social Media dimension [sports fans tend to discuss or rant about a sporting event online while watching the game - witness the real time comments on the Ind-Aus cricket matches on Twitter] its become imperative for brands to leverage this medium well. So efforts like Old Spice [pre-Super Bowl of course] makes the brand appear cool. And when you do something unusual yet relevant like what W+K is doing for Coke this year, it has a positive runoff on the brand. The third reason [which is actually not a new reason] is the fact that the Super Bowl and more importantly the kind of ad that you put on it, is a great opportunity for small brands to make a big impact. Brands that do not or cannot advertise for the rest of the year see this as an opportunity [Interflora comes to mind]. In India, there is a parallel with the IPL - several small or lesser known brands have shot to limelight thanks to their presence on IPL.
{ "pile_set_name": "PubMed Central" }
Introduction ============ Increasing dietary protein at the expense of carbohydrate in either Type 2 diabetics or in overweight adults in response to energy restriction improves insulin sensitivity and glycemic control \[[@B1]-[@B5]\]. Studies have shown that protein intake in excess of the current recommended dietary allowance (RDA: 0.8 g kg^-1^d^-1^) stabilizes blood glucose and reduces the postprandial insulin response after weight loss \[[@B2],[@B3]\]. The metabolic advantage of a diet which provides dietary protein above the RDA specific to glucose utilization in healthy, physically active adults is unclear \[[@B6]\]. Higher-protein intakes are recommended for physically active adults who routinely participate in endurance exercise \[[@B7]-[@B9]\]. To date, no studies have investigated the impact of dietary protein intake on glucose homeostasis in endurance-trained adults. The objective of our study was to examine the effects of consuming dietary protein intakes spanning the current Acceptable Macronutrient Distribution Range (AMDR) on resting glucose turnover in endurance-trained men \[[@B10]\]. We hypothesized that protein availability would influence glucose turnover during a eucaloric state such that glucose rate of appearance (Ra) would be greater when the proportion of energy derived from dietary protein was increased with a simultaneous reduction in carbohydrate consumption. Methods ======= Using a randomized, crossover design, five endurance-trained men (21.3 ± 0.3 y, 179.1 ± 1.6 cm, 70.6 ± 0.1 kg, 8.7 ± 0.4% fat, VO~2peak~70.6 ± 0.1 mL kg^-1^min^-1^) were assigned to a diet providing 0.8 (Low Protein; LP), 1.8 (Moderate Protein; MP) or 3.6 (High Protein; HP) grams of protein per kilogram body mass per day for four weeks. Participants crossed over and consumed each of the remaining diets in randomized order following a 2 wk wash out period between each diet intervention. Actual macronutrient composition of the each diet was 48% carbohydrate (5.4 g kg^-1^d^-1^), 26% fat, and 26% protein (3.1 g kg^-1^d^-1^) for HP, 60% carbohydrate (7.4 g kg^-1^d^-1^), 26% fat, and 14% protein (1.8 g kg^-1^d^-1^) for MP, and 66% carbohydrate (8.3 g kg^-1^d^-1^), 27% fat, and 7% protein (0.9 g kg^-1^d^-1^) for LP. Extended details of the diet intervention have been previously reported \[[@B8]\]. Volunteers maintained their normal level of training throughout the study. However, exercise was restricted for 24 h before glucose turnover assessments to minimize the potential influence of previous exercise on study measures. Glucose turnover was assessed after 3 wks of each 4 wk diet intervention using a 120 min primed, constant infusion of \[6,6-^2^H~2~\] glucose (17 μmol kg^-1^; 0.2 μmol kg^-1^min^-1^; Cambridge Isotope Laboratories, Andover, MA) at 0700 h after an overnight fast (≥ 10 h). Arterialized blood samples were obtained from a dorsal hand vein at baseline, 60, 75, 90, 105 and 120 min to determine glucose turnover, insulin, and glucose concentrations. Plasma enrichment of \[6,6-^2^H~2~\] glucose was determined in duplicate with a precision of ± 0.2% SD using a Hewlett Packard 5989A GC-MS (Metabolic Solutions Inc, Nashua, NH). Glucose rates of appearance (Ra) and disappearance (Rd) were calculated using a modified version of the Steele equation \[[@B11],[@B12]\]. Plasma insulin and glucose concentrations were determined using a commercial RIA (DSL-1600, Diagnostic Systems Laboratories, Webster, TX) and automated glucose oxidase-peroxidase method (YSI Model 2300, Yellow Springs Instruments, Yellow Springs, OH), respectively. Baseline participant characteristics and macronutrient data were described using common descriptive statistics. Shapiro-Wilk tests of normality confirmed that plasma glucose, insulin, and glucose turnover data were normally distributed. Repeated measures ANOVA (within-subjects factors, diet: LP vs. MP. vs. HP; and time: time points over infusion protocols) were used to evaluate effects of dietary protein intake on glucose turnover, insulin, and glucose. In cases in which significant main effects (diet or time) or interactions were present, post hoc analyses were conducted by using Bonferroni adjustments to reduce the type I error rate. The alpha level for significance was set at *P*\< 0.05. Data were analyzed using SPSS (version 18.0, 2006; SPSS Inc.) and expressed as means ± SEM. Results ======= Diet main effects (*P*\< 0.05) were noted for glucose turnover. Ra (mg kg^-1^min^-1^) was greater for MP (2.8 ± 0.1) compared to HP (2.4 ± 0.1, *P*\< 0.05) and LP (2.3 ± 0.1, *P*\< 0.01) diets **(**Figure [1](#F1){ref-type="fig"}**)**. Rd (mg kg^-1^min^-1^) was also greater for MP (2.7 ± 0.1) than for HP (2.3 ± 0.2, *P*\< 0.05) and LP (2.2 ± 0.1, *P*\< 0.01) diets (Figure [1](#F1){ref-type="fig"}). Ra tended to be greater for HP compared to LP (2.4 ± 0.1 vs. 2.3 ± 0.1 for HP and LP respectively, *P*= 0.07). No difference was observed between LP and HP for Rd. ![**Glucose turnover**. Glucose rates of appearance (Ra) and disappearance (Rd) for endurance-trained men at rest following 3 wks on the LP, MP and HP diets. Values are presented as mean ± SEM, *n = 5*. \* Different from LP, *P*\< 0.01. † Different from HP, *P*\< 0.05.](1550-2783-8-20-1){#F1} A main effect of diet (*P*\< 0.05) was observed for plasma insulin, as mean insulin concentrations (pmol/L) were greater (*P*\< 0.01) for LP (49.4 ± 6.4) compared to MP (22.8 ± 2.7) and HP (16.2 ± 0.6) diets. Insulin levels did not change over time (*P*\> 0.05). No main effects of time or diet were observed for plasma glucose (mmol/L), as levels remained steady over time and were not different between the LP (4.6 ± 0.1), MP (4.8 ± 0.1), and HP (4.7 ± 0.1) diets (*P*\> 0.05). No interactive effects (*P*\> 0.05) were observed for plasma glucose and insulin concentrations. Discussion ========== In the present study glucose turnover was greater when protein intake approximated 1.8 g kg^-1^d^-1^compared to that noted with protein intakes equivalent to the RDA or near the upper limit of the AMDR under fasted, resting conditions in endurance-trained men \[[@B10]\]. To the best of our knowledge, no other studies have examined the influence of dietary protein intake on glucose turnover in endurance-trained men. Findings from other studies indicate that level of protein intake contributes to glucose homeostasis \[[@B1]-[@B3],[@B13]\]. In overweight adult women, a 10 wk, moderate protein (1.5 g kg^-1^d^-1^), energy restricted diet stabilized blood glucose and lowered the postprandial insulin response compared to a diet providing protein at 0.8 g kg^-1^d^-1^\[[@B3]\]. Consistent with the present study, long-term protein intake at 1.9 g kg^-1^d^-1^increased hepatic glucose output (Ra) compared to that observed when protein intake was 0.7 g kg^-1^d^-1^\[[@B14]\]. Contrary to our findings, glucose disposal (Rd) was reduced with this level of protein intake. This discrepancy is likely due to differences in study populations and the experimental conditions under which glucose turnover was assessed (i.e., euglycemic hyperinsulinemic clamp vs. normal fasted) \[[@B14]\]. Also, the rigorous dietary control of the present study ensured adequate energy intake for weight maintenance throughout the study thereby minimizing the influence of energy needs on glucose disposal. Level of dietary protein can affect glucose utilization by: 1) influencing fasted and postprandial insulin secretion; and 2) providing amino acids which serve as substrates and mediators of hepatic gluconeogenesis \[[@B4],[@B15]\]. In the present study, insulin concentrations mirrored dietary carbohydrate intake, which was inversely related to dietary protein intake. Glucose disposal, however, did not correspond to plasma insulin as glucose Rd was greatest for MP compared to LP and HP diets. In addition, there was no effect of dietary protein on plasma glucose concentrations; although we recognize the small sample (n = 5) may have increased the possibility of committing Type II error. Nevertheless, these findings suggest that endogenous glucose utilization might be regulated by modifications in glucose production as well as changes in peripheral insulin sensitivity \[[@B4]\]. Layman et al. reported lower fasting and postprandial blood glucose concentrations with a greater insulin response for overweight women who consumed the RDA for protein compared to 1.5 g kg^-1^d^-1^following weight loss \[[@B3]\]. Our findings are consistent with those of Layman and suggest that a lower ratio of carbohydrate to protein in the diet is associated with euglycemia which may be better maintained by endogenous glucose production \[[@B3]\]. The contribution of amino acids to hepatic glucose production as gluconeogenic substrates and through the glucose-alanine cycle is well documented \[[@B16]-[@B20]\]. In the present study, glucose Ra was higher for MP vs. LP, suggesting an effect of protein intake on hepatic glucose production. The increased availability of carbohydrate with the consumption of lower dietary protein (i.e., RDA) contributes to higher rates of carbohydrate oxidation and a reduced need for hepatic glucose production. In contrast, when protein intake increased and approached the upper limit of the AMDR, a concomitant increase in protein oxidation should spare carbohydrate use as a fuel thereby reducing the need for endogenous glucose production \[[@B8]\]. Indeed, consistent with this proposed scenario, previously published data from this investigation showed greater carbohydrate and lower protein oxidation for the MP vs. HP diets and increased protein oxidation with increased protein consumption, which is consistent with the higher rate rates of glucose disposal observed for the MP diet \[[@B8],[@B21]\]. Greater carbohydrate uptake and subsequent oxidation likely increased metabolic demand for endogenous hepatic glucose production accounting for the differences noted in glucose Ra in the MP diet. Consistent with our hypothesis, Jungas et al. reported an increase in protein oxidation concomitant with a greater contribution of amino acids to hepatic gluconeogenesis with modest increases in dietary protein \[[@B16]\]. Therefore, we suggest, and our data support, that prolonged consumption of a MP diet, provides a continuous supply of hepatic gluconeogenic precursors that serve to maintain glucose turnover in a fasted state. Our findings further suggest that a ceiling exists for which dietary protein imparts no additional benefit to the regulation of glucose turnover and may, in fact be excessive to the extent where protein is readily oxidized. In summary, this investigation demonstrated that glucose turnover is influenced by level of dietary protein routinely consumed by a group of endurance-trained men. A novel aspect of this work is that chronic consumption of dietary protein above 1.8 g kg^-1^d^-1^did not appear to provide any additional benefit towards the regulation of blood glucose. While our findings must be interpreted cautiously due to the specific population studied (i.e., endurance-trained men), small sample size, and state of energy balance (i.e., eucaloric) during which the experimental diets were implemented, the concept is nonetheless intriguing. That is, when carbohydrate intake is within 55-70% of the total energy consumed and adequate to support glycogen replenishment (7.4 g carbohydrate kg^-1^d^-1^), dietary protein at a level that exceeds the RDA but is well within the AMDR may contribute to maintenance of blood glucose by serving as gluconeogenic substrate. Competing interests =================== Nancy R. Rodriguez has received honorarium for participation in the speaker bureau for the NCBA and serves on the Protein Advisory Board for the NCBA. Remaining author(s) declare that they have no competing interests. Authors\' contributions ======================= SMP participated in manuscript preparation, CSS, MAP, PCG, DRB, and BTB participated in data collection, statistical analysis, and manuscript preparation. NRR served as the principal investigator and contributed to study design, data collection, and manuscript preparation. All authors read and approved the final manuscript. Acknowledgements ================ This work was supported in part by a grant from the National Cattleman\'s Beef Association, The University of Connecticut Agricultural Experiment Station (HATCH), and The University of Connecticut Research Foundation.
{ "pile_set_name": "Pile-CC" }
FAST FOOD Word for Today: September 29 Right Choices Right Choices are choices and decisions that are based on the Word of God. They have TRUTH as their foundation. They agree with God and with God’s Word. They line up with the plan and purpose of God for your life. Right Choices guarantee God’s cooperation with you in every life situation. They make you partners with God… Right Choices will bring God’s Power into play in fulfilling your dreams and visions and goals. When you decide right you make a spiritual connection with God and no power in heaven or earth will defeat or stand against you… All of heaven’s resources become available to you when you Choose Life… And they are guaranteed and secured by the Faithfulness and Integrity of Almighty God. Wrong Choices Wrong Choices are choices and decisions that are based on the logic and reason of the World System. They are arrived at by feeling and sight and emotion. They are always “reasonable”. Their foundation is Fact and their power is limited to what man and his mind can do. They lock one into the natural and never allow him to break into the supernatural. Wrong choices will release satan to attack and buffet. This is humanism in raw form. Wrong choices invite demons to possess and oppress. Everything that is based on decisions made in natural reasoning and sense knowledge is subject to failure. They all have the seed of Death in them and death will ultimately prevail. All wrong choices issue forth from human reasoning, natural facts, sense knowledge and an unrenewed mind. Right choices bring God’s very best into your life. Wrong choices empower satan to steal, kill and destroy; to bring confusion and devastation and sickness and disease and failure. Your present condition is the direct result of choices you made in the past. If you do not like what is happening to you it is because you made some wrong choices in the past. Don’t complain and gripe… decide to change your choices… Decide to choose Life. God plainly told the Israelites to choose life and as a result they would live. Not only would they live, but so would their seed. And they would all live a long time. This is an Old Testament promise. The New Testament covenant we have that is ratified by the Blood of Jesus is a stronger, better and more binding covenant. The Old was secured by the blood of bulls and goats. The New is guaranteed by the Blood of the Sinless Son of God. I call heaven and earth to record this day against you, that I have set before you life and death, blessing and cursing: therefore choose life, that both thou and thy seed may live: Deut 30:19
{ "pile_set_name": "OpenWebText2" }
What is the Fingbox vulnerability test? Fingbox finds suspected weak points so you can keep your connection secure. The Vulnerability Test is a combination of a router audit and a remote scan test. The Network Vulnerability Test automatically runs weekly but you can also perform and on-demand scan. The test is made up of two parts: The Remote Scan Test performs a port scan on your public Internet address (the individual numerical address visible to the public when you are online) to see which ports are open to the external world: these are the open doors into your home, and you should make sure to have only the strictly necessary ones open. The Internal Router Audit checks the router addresses, the NAT configuration and whether or not UPnP or NAT-PMP is activated. In the house metaphor, this would be the equivalent of checking the security measures placed inside the building in case an intruder did make it through the door. Learn more
{ "pile_set_name": "OpenWebText2" }
Denials of Trump’s previous spying claims have been emphatic. “As part of that practice, neither President Obama nor any White House official ever ordered surveillance on any U.S. citizen,” an Obama spokesman said in a March 2017 statement following Trump’s first accusation. “Any suggestion otherwise is simply false.” “Both FBI and NSD confirm that they have no records related to wiretaps as described by the March 4, 2017 tweets,” Justice Department lawyers said in September 2017 court filing that refers to the DOJ’s National Security Division. “FBI again confirmed that they do not have any such records by consulting with personnel knowledgable about Director Comey’s statements and the surveillance activities of the FBI.” Trump himself admitted last month that he had no evidence to back up his claims. “I said that just on a little bit of a hunch and a little bit of wisdom maybe [and] it blew up because [people] thought maybe I was wise to them,” he told Fox News’ Sean Hannity. Trump’s wiretapping claims have paralleled various stories about Mueller’s investigation into his campaign’s contact with Russia. On Thursday, Mueller’s office released information that former national security adviser Michael Flynn provided to the investigation. Flynn in 2017 pleaded guilty to lying to the FBI about his contacts with Russia. The Mueller report, released last month, did not charge Trump with crimes related to Russian collusion. However, it indicated that the campaign “expected it would benefit electorally from information stolen and released through Russian efforts.” Mueller did not charge Trump with obstruction of justice, though he did not exonerate the president. In addition to Flynn, five other former Trump advisers or officials have been implicated in the probe.
{ "pile_set_name": "OpenWebText2" }
Melbourne's drinking water is being put at risk by "widespread" illegal logging near water catchment areas, Australian National University scientists say. Key points: The report by ANU scientists alleges loggers from a Government-owned company are moving into banned steep-slope areas, because Victoria is running out of wood The report by ANU scientists alleges loggers from a Government-owned company are moving into banned steep-slope areas, because Victoria is running out of wood About a third of coupes in the Thomson catchment — Melbourne's main water source — included slopes steeper than 30 degrees About a third of coupes in the Thomson catchment — Melbourne's main water source — included slopes steeper than 30 degrees The Government paid VicForests millions of dollars last time the company breached logging laws In Victoria, regulations prohibit logging on steep slopes — usually more than 30 degrees — to protect the integrity of critical water catchments used for drinking and agriculture. But the ANU's Chris Taylor and David Lindenmayer have found 231 hectares of steep slopes in Victoria's Central Highlands have been clear-felled — an area larger than Melbourne's Docklands. "Ten years ago you could drive through here and you wouldn't see a [logging] coupe anywhere in this rugged terrain. Now we're seeing them everywhere," Dr Taylor said. The degree of damage done to waterways depends on what's in the soil in each particular location. "Logging at steep slopes can cause soil erosion which can be deposited in waterways," ANU soil erosion scientist Elle Bowd said. "Implications in water catchments could include increasing turbidity, salinity, nutrients — which can result in algal blooms," she said. Chris Taylor noticed an increase in loggers operating in hard-to-reach areas. ( ABC News: Loretta Florance ) Dr Taylor used slope information from GeoScience Australia, and compared it against European Space Agency satellite imagery, which he said showed the areas had been logged. He said the mapping suggested logging on steep slopes was systemic. "We're seeing widespread occurrence of this across many catchments," he said. The scientists allege there have been breaches in 252 logging areas since 2004 — the year VicForests began operating. A logging coupe on Mount Matlock, in Victoria, November 15, 2019. ( Supplied: Chris Taylor ) The Office of the Conservation Regulator (OCR) is now investigating the scientists' claims. "The OCR is empowered to investigate allegations of this nature and can take appropriate action if required," Victorian Environment Minister Lily D'Ambrosio said. In a statement, VicForests said it had complied with the Code of Practice for Timber Production, which outlines environmental standards for the industry. "VicForests uses high-resolution LiDAR [Light Detection and Ranging] data to determine the gradient of coupe slopes," the company said. 'They're running out of wood' Michael McKinnell, who was a logging contractor working for VicForests for 27 years before he quit in 2017, said the over-logging of a finite resource was driving the alleged illegal logging. "The contractors are being asked to go into more and more marginal country," he said. Mr McKinnell said the breaches meant the Government needed to lower the amount of timber earmarked for harvest each year. "If they can't work within their own guidelines, then the sustainable yield numbers can't be correct," he said. Former Healesville logger Micheal McKinnell left the Victorian timber industry in 2017. ( ABC News: Bridget Rollason ) This month, the Victorian Government announced it would phase out native timber logging by 2030. The Government has a legislated contract with Australian Paper to supply native timber from the state's Central Highlands under a deal passed by the Victorian Parliament in the 1990s. "VicForests have had to breach their rules to meet the legislated supply volume that it's bound to deliver," Dr Taylor said. "It's literally pushing them over a cliff and onto these steep slopes. "They're running out of wood, so they're going into economically marginal country, which in turn compromises the integrity of these special water supply catchments." Logging audit not released The scientists' findings have been submitted to Forest Stewardship Council (FSC) auditors, who are assessing VicForests' latest attempt to have their products labelled as responsibly sourced. The report found slope limit breaches across seven catchments — the Upper Goulburn, Thomson River, Tanjil River, Tyers River, Loch River, Tarago River and Bunyip River catchments. In the Thomson catchment, which supplies almost 60 per cent of Melbourne's drinking water, the scientists found more than a third of the areas logged by VicForests — 50 coupes in total — contained logging of slopes that exceeded 30 degrees. Some areas were small, but one location in the Thomson catchment had 5.6 hectares logged beyond the limit, while another had 2.5 hectares logged beyond the limit. A logging coupe in the upper Goulburn catchment. ( Supplied: Chris Taylor ) In the Tarago River Catchment, 71 per cent of logging areas had alleged breaches and in the Bunyip River Catchment 69 per cent of areas had alleged breaches. The report comes a year after the ABC revealed VicForests had been conducting widespread illegal logging of timber in state forests they did not own — an activity a legal expert said was "tantamount to stealing". That revelation led to a "special audit", conducted by Victoria's Department of Land Water and Planning. Despite that audit being completed months ago, it has not yet been released as intended. An FOI application lodged by the ABC has been rejected on the basis that the report has not yet been approved for release. A logging coupe on Mount Matlock, where researchers say operators are moving into increasingly steep slopes. ( Supplied: Chris Taylor ) Following those illegal logging revelations, the Government changed the law by closing what they say was a loophole, which it said made it hard to prosecute VicForests for criminal behaviour. Instead of any prosecution, VicForests was paid more than $4.8 million "reimbursement for income lost and expenses incurred" due to delays caused by the changes to the law. That money was more than double the profit made by VicForests in the 2018-2019 financial year, which was $2 million.
{ "pile_set_name": "PubMed Abstracts" }
Potential adverse effects associated with inhibition of p38alpha/beta MAP kinases. Inhibitors of p38 MAP kinases show promise for the treatment of inflammatory and immunological disorders and some cancers. There is a substantial body of experimental evidence across several organ systems suggesting that p38 also mediates developmental, differentiation and proliferation processes. As a consequence of the wide-ranging regulatory role of p38 kinase in diverse cellular processes, the possibility of adverse events resulting from undesired pharmacological activity is a major concern for the p38 inhibitor drug class. Taking into consideration the limitations of experimental modeling systems, together the data may indicate that profound inhibition of p38 has the potential to impact these processes during fetal or neonatal development. The difficulty comes in extrapolating these findings to predict potential adverse effects under conditions of partial inhibition of p38 activity, and in an adult population in which these processes are typically only recapitulated during repair or adaptive responses. As such, the goal of this review of the targets of p38 activity is to bring an awareness of the those organ systems that should be monitored for potential toxicity, as well as to present a potential mechanistic basis for such monitoring or for investigation of adverse effects that may develop with administration of a p38 inhibitor.
{ "pile_set_name": "OpenWebText2" }
The DROID RAZR HD and RAZR MAXX HD on Verizon are scheduled to receive their first update this week as build 0.7.2. The update includes nothing that you probably care about. In fact, it’s a “Google Security Patch,” which could mean that it’s simply a fix for the root method that was released just before launch day. If you are rooted or would like to remain rooted, you may want to hold off on this one for a while. The update is 6MB in size. More info. [email protected]!
{ "pile_set_name": "PubMed Abstracts" }
Correction of CSF motion artifact on MR images of the brain and spine by pulse sequence modification: clinical evaluation. A modification of the standard spin-echo pulse sequence designed to suppress motion artifacts was clinically evaluated on T2-weighted MR images of the cervicocranial region. A retrospective study involving 40 patients, half of whom were examined with a standard T2-weighted multislice spin-echo sequence and half of whom were examined with a gradient waveform modification of the same sequence, uniformly demonstrated restoration of CSF signal intensity on images obtained with the gradient modified sequence. The cervical subarachnoid spaces, cisterna magna, medullary cistern, pontine cistern, fourth ventricle, and aqueduct were more consistently and brightly represented. However, the phase-encoding artifacts arising from CSF motion were not significantly reduced by using the gradient waveform modified pulse sequence. Digital subtraction of an image obtained with the standard sequence from an image of the same slice with the gradient modified sequence provides a direct image representation of CSF flow.
{ "pile_set_name": "USPTO Backgrounds" }
Gallium compounds, including gallium nitrate, gallium sulfate, and gallium maltolate, have been repeatedly shown to have anti-inflammatory activities when administered systemically (i.e., orally, intravenously, or by other means that introduce gallium into the bloodstream and allow for its distribution through the body). Particular efficacy for gallium has been reported in animal models of rheumatoid arthritis (Delbarre F, Rabaud M, COMPTES RENDUS DE L'ACADÉMIE DES SCIENCES, SERIES D 283:1469-1472, 1976; Matkovic V et al., CURRENT THERAPEUTIC RESEARCH 50:255-267, 1991; U.S. Pat. No. 5,175,006 to Matkovic et al.), multiple sclerosis (Whitacre C et al., JOURNAL OF NEUROIMMUNOLOGY 39:175-182, 1992), uveitis (Lobanoff M C et al., EXPERIMENTAL EYE RESEARCH 65:797-801, 1997), and Type 1 diabetes (Flynn J O et al., DIABETES 41:38A, 1992). Systemically administered gallium has also shown efficacy in the treatment of cancer and infectious disease (Bernstein L R, PHARMACOLOGICAL REVIEWS 50:665-682, 1998). Locally administered gallium is effective in treating psoriasis and related dermatologic disorders (U.S. Pat. No. 5,747,482 to Bernstein). It has now been surprisingly discovered that locally administered gallium can reduce pain, itching, allodynia, hyperalgesia, and related symptoms. Locally administered gallium is particularly effective in relieving neuropathic symptoms, especially peripheral neuropathic pain. Peripheral neuropathic pain is apparently caused by damage to peripheral neurons, and is typically characterized as “burning,” “shooting,” “stabbing,” or “electric-shock-like.” It may occur without external stimulation or, very commonly, it may be manifested as allodynia (an experience of pain from normally non-painful stimuli, such as from light touching) or hyperalgesia (an exaggerated sense of pain from a normally painful stimulation). The pain can be very intense and disabling; the pain from trigeminal neuralgia (neuropathy of the trigeminal nerve) is considered among the most severe types of pain known. At least two million adults are estimated to have neuropathic pain in the United States, with the great majority having peripheral rather than central neuropathic pain (Morely-Forster P, PAIN RESEARCH MANAGEMENT 11 Suppl A:5A-10A, 2006). Some of the most common causes of peripheral neuropathic pain are diabetes, HIV infection, postherpetic neuralgia, trigeminal neuralgia, cancer, and cancer treatments. Numerous other causes of peripheral neuropathic pain are also known, including trauma, non-HIV infections, drugs, toxins, surgery, and complex regional pain syndrome (also called causalgia or reflex sympathetic dystrophy syndrome). The etiology for many cases of peripheral neuropathic pain is never discovered. Some of the common causes of peripheral neuropathic pain are summarized below. Painful diabetic neuropathy: Diabetes afflicts about 21 million people in the United States (National Institute of Diabetes and Digestive and Kidney Diseases, NATIONAL DIABETES STATISTICS FACT SHEET: GENERAL INFORMATION AND NATIONAL ESTIMATES ON DIABETES IN THE UNITED STATES, 2005) and nearly 200 million people worldwide (Wild S et al., DIABETES CARE 27:1047-1053, 2004). Painful diabetic neuropathy is estimated to affect approximately 20-24% of diabetics, with pain being defined as a recording by the patient of at least 10 mm on a 100 mm visual analog pain scale (Schmader K E, THE CLINICAL JOURNAL OF PAIN 18:350-354, 2002). The pain occurs most commonly in the extremities. Cancer and cancer-associated iatrogenic neuropathic pain: Neuropathic pain is estimated to afflict about a third of cancer patients (Davis M P, Walsh D, AMERICAN JOURNAL OF HOSPICE PALLIATIVE CARE 21:137-142, 2004). In most cases the neuropathic pain is due to tumor tissue infiltrating or pressing on neurons, with other causes including nerve damage caused by surgery, chemotherapy, or radiotherapy. Treatments for breast cancer are particularly likely to cause neuropathic pain: nearly 50% of patients experience chronic pain following surgery for breast cancer, with most of the pain being neuropathic (Morely-Forster P, PAIN RESEARCH MANAGEMENT 11 Suppl A:5A-10A, 2006). HIV-infection related neuropathic pain: Neuropathic pain, generally due to distal sensory polyneuropathy, is estimated to afflict at least a third of those infected with HIV (Luciano C A et al., CURRENT OPINION IN NEUROLOGY 16:403-409, 2003). The cause is not always known, but may be due to HIV infection of neurons, the release of neurotoxins by macrophages, toxic reactions to drugs, opportunistic infections, or nutrient deficiencies. Neuropathic pain associated with HIV infection appears to be an under-recognized and under-treated condition. Postherpetic neuralgia: Herpes zoster infection (shingles) is estimated to strike about 800,000 people each year in the United States (Schmader K E, THE CLINICAL JOURNAL OF PAIN 18:350-354, 2002). Pain associated with shingles is itself neuropathic, at least in part. The incidence of subsequent postherpetic neuralgia (nearly always a peripheral neuropathy) is directly correlated with age and with the severity of the herpetic rash. For herpes zoster patients over 50 years old (the great majority of herpes zoster patients), postherpetic neuralgia occurs in 50-68% one month after rash healing, in 25-50% three months after rash healing, and in 15-35% six months after rash healing (the lower numbers being for those treated with antiviral drugs) (Schmader K E, THE CLINICAL JOURNAL OF PAIN 18:350-354, 2002). Peripheral neuropathic pain is clearly a widespread medical problem, occurring in millions of people worldwide, resulting from a wide range of causes. Current Treatments For Peripheral Neuropathic Pain Current preferred therapies for peripheral neuropathic pain include systemic antidepressants (particularly tricyclic antidepressants), anticonvulsants (including carbamazepine and gabapentin), opioid analgesics (including oxycodone, methadone, and dextromethorphan), and topical lidocaine and capsaicin. Few of these treatments produce even moderate pain relief for half the patients receiving them. Antidepressants: Antidepressants are commonly the first choice for treating neuropathic pain. A recent survey of the literature (Saarto T, Wiffen P J, THE COCHRANE DATABASE OF SYSTEMATIC REVIEWS 2005(3):CD005454, 2005) found that tricyclic antidepressants were the most effective, with amitriptyline being particularly effective. Amitriptyline, however, had an NNT (number needed to treat) value of 2 for moderate pain relief (that is, only 50% of those treated had at least moderate pain relief). In general, moderate pain relief for peripheral neuropathic pain was produced by tricyclic antidepressants in about 33-50% of patients, by serotonin noradrenaline reuptake inhibitors in about 20-25% of patients, and by selective serotonin reuptake inhibitors in about 14% of patients (Sindrup S H et al., BASIC & CLINICAL PHARMACOLOGY & TOXICOLOGY 96:399-409, 2005). Anticonvulsants: A number of anticonvulsants have been administered for the treatment of peripheral neuropathic pain, with gabapentin, carbamazepine, and phenytoin appearing to be the most effective. Again, however, the efficacy rates are fairly low. For moderate pain relief, gabapentin had an NNT of 3.2 in postherpetic neuralgia; in painful diabetic neuropathy it had an NNT of 3.8, while carbamazepine had an NNT of 2.3 and phenytoin had an NNT of 2.1 (Wiffen P et al., THE COCHRANE DATABASE OF SYSTEMATIC REVIEWS 2005 (3):CD001133, 2005). Other tested anticonvulsants appeared to be less effective. It is noted that anticonvulsants, as tricyclic antidepressants, frequently produce significant adverse effects in patients. Opioid analgesics: A recent meta-analysis of the efficacy and safety of opioid agonists in the treatment of non-malignant neuropathic pain showed marginal to no efficacy in short-term (24 hour) studies, and marginal efficacy in intermediate-term (8-56 day) studies (Eisenberg E et al., JAMA 293:3043-3052, 2005). The drugs studied were morphine, oxycodone, methadone, and levorphanol. A study of levorphanol found that patients with postherpetic neuralgia had an average 14% reduction in pain with a low dose, and a 33% reduction with a high dose, though 31% of the subjects dropped out of the study due to drug side effects (Rowbotham M C et al., NEW ENGLAND JOURNAL OF MEDICINE 348:1223-1232, 2003). All the opioid drugs commonly produced significant but non-life-threatening adverse effects. Topical lidocaine: A topically applied patch containing 5% lidocaine is commonly used to treat localized peripheral neuropathic pain. Clinical studies have shown that this treatment results in modest reductions of pain for many patients (e.g., Argoff C E et al., CURRENT MEDICAL RESEARCH AND OPINION 20 Suppl 2:S21-S28, 2004). One controlled study found an NNT of 2 in postherpetic neuralgia (Hempenstall K et al., PLoS MEDICINE 2:e164, 2005). To remain effective, the patches must be changed several times per day. The patches cause numbness of the contacted skin, and commonly cause skin irritation, and usually do not relieve severe pain. Topical capsaicin: An analysis of two studies on the use of topical capsaicin cream to treat postherpetic neuralgia found a low efficacy rate, with an NNT value of 3.26 (Hempenstall K et al., PLoS MEDICINE 2:e164, 2005). It is noted that placebo-controlled studies with capsaicin are compromised due to the clearly noticeable sensations (including pain) produced in the skin by capsaicin; thus, perceived efficacy of capsaicin may benefit from a placebo effect. Many other systemic and local treatments are used in attempts to relieve peripheral neuropathic pain, generally with no more than moderate success. Recently, subcutaneously injected botulinum-A toxin has been tried in a small number of patients with trigeminal neuralgia (Piovesan E J et al., NEUROLOGY 66:1458-1459, 2006) and in a single patient with postherpetic neuralgia (Liu H T et al., PAIN MEDICINE 7:89-91, 2006). The patient with postherpetic neuralgia reported pain relief for several weeks after numerous injections, followed by a recurrence of pain at pre-treatment levels. The patients with trigeminal neuralgia reported transient low to moderate pain relief following multiple injections, with side effects including muscle weakness. It is thus apparent that currently available treatments for peripheral neuropathic pain have only low to moderate efficacy, and many patients are left without significant pain relief. The lack of adequate pain relief for millions of people with peripheral neuropathic pain, as well as for those with other types of pain, represents a great unmet medical need.
{ "pile_set_name": "StackExchange" }
Q: Raspberry pi direct connect over ethernet Simplified: I been wondering on how to connect my Macbook and Raspberry Pi together over ethernet ( I do not have access to a crossover atm). I've set up, on the Pi side, by typing sudo ip add *insert Pi ip here*/24 dev eth0 but when I attempt to use this exact line (changed ip), Macbook doen't connect. At all. Anyone know how to fix this? A: Recent versions of Raspbian (which use dhcpcd) allow ssh to work over a link-local address and avahai (which is a zeroconf implementation) enables programs to discover hosts running on a local network. This means you can plug the Pi into a Computer (with an Ethernet cable) or a local network router and connect without knowing the IP address. You can easily connect from OS X with ssh [email protected] (the default hostname is raspberrypi) You can use a crossover cable, but you don't need one (most modern interfaces automatically detect). I think this answers the question I think you are asking. See How do I set up networking/WiFi/static IP address? if you want more detail.
{ "pile_set_name": "Pile-CC" }
Something we wouldn't otherwise get anywhere else. Robots. All the Marvel robots. Jocasta, Praxagora, a beefy Ultron that is impressive and detailed (still haven't seen a version of Ultron from the comics that I 100% like), Nimrod, Super Adaptoid, H.E.R.B.I.E. I want Marvel Select to compliment the Legends line as it has before. Watcher, Thanos, Mephestio, Ultron and Destroyer come to mind as perfect figures to put in that line. Oversized and fitting in nicely with the Legends as well as figures we might not get otherwise. I've come to realize that Marvel select makes some AWESOME figures. highly detailed and just super nice looking on anybody's shelf. however since i got into collecting figures. i've to come find out they never actually put out a good amount of WANTED characters, like how legends do. that's the reason i went over to legends and haven't left since.... Marvel Select mainly goes for movie related figures, because that's where they make their money from. I absolutely LOVE the MS red hulk, abomination, juggernaut, the silvestri hulk. the venom, and carnage and anti venom. However If they were to decide to be smart and do what hasbro does with the legends. I'd LOVE to see a few different variations of the hulk Joe Fix-it, gladiator, hulk 2099 I can think of tons more, however those are just as this thread is called a "dream"
{ "pile_set_name": "StackExchange" }
Q: Convert date to unix timestamp through jQuery datepicker I want to check whether the entered dob is above 18th old. For that i want to convert to convert the entered date to the unix time stamp. I tried using: $.datepicker.formatDate('@', $('#dob').val()); But it gives three additional zeros and also goes one day earlier. Like for "10/10/1967" it returns: -70369200000 while it should return: -70329600. How should i change it? A: To get the Unix time out of a date picker use: $(el).datepicker('getDate') / 1000; However you should also note that the semantics of Date objects are not well defined for "negative" dates.
{ "pile_set_name": "OpenWebText2" }
Article content Get ready to grow, Saskatoon — but maybe not quite as fast as you have been. A new City of Saskatoon report predicts Saskatchewan’s largest city will crack the 300,000 population mark in eight years and reach 380,650 by 2035. Those projections are based on an average annual growth rate of two per cent. We apologize, but this video has failed to load. tap here to see other videos from our team. Try refreshing your browser, or Saskatoon slated to grow to 380,000 in 18 years Back to video The latest estimate represents a downgrade from the last projection in 2012, when the city was forecast to grow to 385,411 by 2032, presuming a 2.5 per cent growth rate. The city’s population is also expected to get older. “As much as the population growth detailed in this projection will keep Saskatoon young, there will be significant changes in the aging population as well,” the report says. “The aging of the demographic baby boom (the population born between 1946 and 1965) will swell the population aged 65 and over to nearly double its current size.” Saskatoon’s senior citizen population is expected to grow from 33,000 in 2015 to 56,000 in 2035, regardless of the overall growth scenario.
{ "pile_set_name": "StackExchange" }
Q: CDI and WELD in java-web-start APP (java se) Im trying to use CDI in a Java-web-start app but get stuck at classloading. Looks like FileSystemURLHandler treats the URLs in the web-start cache as files. org.jboss.weld.environment.se.discovery.url.FileSystemURLHandler - could not read entries java.io.FileNotFoundException: http:\localhost:8080\myapp.jar Which is the same as: https://issues.jboss.org/browse/WELD-1040 My limited skills in jira and git-hub suggests that someone started working on it, but it didnt make it into a release: https://github.com/agattiker/core/blob/9eabd09f0b8e80e48e3270414e2f68ebc1016b70/environments/se/core/src/main/java/org/jboss/weld/environment/se/discovery/url/FileSystemURLHandler.java So my question is if anyone got around this problem or if cdi+weld on jws is a dead end? A: I hope it is not too late, the issue was fixed in the weld version 2.2.0.Alpha1.
{ "pile_set_name": "OpenWebText2" }
What have we, the people of Britain, done to the Conservative party? Why do they hate us so much? As the odours from their annual feasting in Birmingham drift over the airwaves, I find my responses metastasising beyond the merely political and into the realms of the psychological. I get the sense that they’re punishing us, somehow. That there’s some deep-seated Jungian weirdness being acted out on the British public, every time the zealot Daniel Hannan vows to feed us his chlorinated chicken, every time Jeremy Hunt threatens us with his leadership credentials. It’s as if we (Britain) are the child. And they (the Tories) are the dysfunctional parents, ripping themselves apart, occasionally grabbing us by the wrists to prove some sort of point to the other. England, as George Orwell once wrote, is a family with the wrong members in control Theresa May comes up for air. She would like it to be known that she hopes to end freedom of movement within the European Union. She will remove – just like that! – our right to work in France or retire in Spain as that, she has decided, is what we want. She seems weirdly proud about it, too, a little bit “Look what you made me do.” But no member of the British public asked for this. No one made her do it other than the peculiar tribe to which she has pledged allegiance. There’s something similarly demented about Boris Johnson’s ambitions too. You don’t want this reckless narcissist in charge of the country. No one wants that. Aside from perhaps, a certain portion of the 120,000-odd people who are still perverse enough to be members of the Tory party – because it’s his turn. And somehow, by some convoluted ancestral logic, this is the wing who must be appeased, these are the appetites that must be indulged, these are the people who might actually decide. England, as George Orwell once wrote, is a family with the wrong members in control. There are the rich relations who must be sucked up to, the poor relations who must be spat upon, and it’s best not to ask too many questions about where all the wealth came from. And remember: “It is a family in which the young are generally thwarted and most of the power is in the hands of irresponsible uncles and bedridden aunts.” Just as adult family squabbles bring with them that same sense of “Why am I still dealing with this shit?”, so it is here: the patrician fossils aren’t talking to the reckless Atlanticists, and the oleaginous metropolitan wing is at odds with the racist granddads – and Cousin Jacob must have his special plate. Stop being the difficult one! May ally hits back at Boris Johnson saying he would struggle to provide serious leadership - Politics live Read more Toxic introspection is not confined to the Tories. There is a certain species of Labourite who believes their own internal squabbles are of paramount interest to Labour voters too. But at least this tendency of the left was counterbalanced by a set of coherent ideas emerging from the Labour conference, a vision for the sort of country we might like to become. There is none of that emerging from Birmingham – no policies, no direction from our bedridden aunt of a prime minister. The reason all this feels more personal than political is that Tory dysfunction has already infected our lives. No one outside the Tory membership much cared much about the European Union prior to David Cameron calling a referendum. The 2016 vote was intended as a way of resolving the Tory family squabble. All it has done is impose it on the nation as a whole; their problem is now our problem. Far from settling the issue, it has blown it wide open. Brexit is already costing the economy £500m per week and rising; the economy is 2.5% smaller than it might have been. That isn’t abstract. It has made millions of lives quantifiably worse in terms of wages, jobs and prospects. It has made plans about children, homes and family life impossible to make – just as the extent of Tory damage to the public realm is becoming apparent. And perhaps the most insidious effect is the way that Brexit has entered actual families too, setting children against parents, sibling against sibling, such that the word “Brexit” conjures something beyond mere trade deals and treaties. It has poisoned relationships, distanced generations, infected homes. For a party that is supposed to stand up for family values, that will be quite a legacy. • Richard Godwin is a freelance journalist
{ "pile_set_name": "OpenWebText2" }
What do we mean by diversity? And why is it good – or not? For all the myriad debates about diversity today, such questions are rarely addressed in any depth. The latest hoo-ha was generated by a Lionel Shriver column in the Spectator, which questioned publisher Penguin Random House’s pledge to make the company more diverse. “We want both our new hires and the authors we acquire to reflect UK society by 2025,” PRH says on its website. “Drunk on virtue,” Shriver wrote, “Penguin Random House no longer regards the company’s raison d’être as the acquisition and dissemination of good books.” She went on: “Literary excellence will be secondary to ticking all those ethnicity, gender, disability, sexual preference and crap-education boxes.” From now on, “a manuscript written by a gay transgender Caribbean who dropped out of school at seven and powers around town on a mobility scooter… will be published” even if it is “incoherent, tedious, meandering”. It was a bog-standard anti-diversity rant wrapped up in Shriveresque language, mixing valid criticisms with over-the-top assertions. The line about the “gay transgender Caribbean” is a tired cliche, clearly satirical, but also clearly intended to provoke a response. And provoke it did. Diversity in publishing is under attack. I hear the sound of knuckles dragging | Hanif Kureishi Read more “Does she truly believe that diverse writers are incapable of penning good books?” asked an open letter from Penguin’s mentoring programme WriteNow. Probably not, as Shriver did not suggest that. Mslexia, a magazine for women’s writing, dropped her as a judge for its annual short story competition. Although it welcomed “open debate”, Shriver’s comments were “not consistent with Mslexia’s ethos’ and mission”. So, an open debate, but only with the right views – the importance of diversity but not of a diversity of views. The episode raises deeper questions about what diversity means, questions that the “let me provoke”, “let me be outraged” dance provides little opportunity to explore. For both sides, “diversity” has become less an issue to debate than a symbol, of virtue for the one, of vice for the other. Penguin Random House aims to make the company as diverse as Britain with respect to “ethnicity, gender, sexuality, social mobility and disability”. (I assume “social mobility” is a euphemism for “class” – it’s obviously a category that no longer speaks its name.) But Britain is diverse in many other ways too – by religion, age, occupation, regional affiliation, politics and so on. It’s unlikely that any institution would ever be representative in all these categories (especially political viewpoint). Here “diversity” means being representative in a few chosen categories, and only in those categories. PRH’s categories represent some of the groups that, historically, have faced discrimination, and been excluded from positions of power and privilege. From this perspective, the drive for greater diversity is a push for greater equality, and an attempt to dismantle barriers of exclusion. But equality and diversity are not synonymous. There are many reasons for a workforce or institution not to be representative of society. Consider the recent debate about admissions to Oxford University. Black people make up around 3% of the UK population, but only 1.9% of Oxford’s intake. Labour’s David Lammy damned the university as a “bastion of entrenched wealthy, upper-class, white, southern privilege”. But, as Channel 4’s Fact Check pointed out, black students both disproportionately apply for the most competitive courses and are more likely to miss their predicted A-level grades. Taking this into account, Oxford, according to Fact Check, “was very slightly more likely to offer a place to black candidates”. Oxford is unquestionably a “bastion of entrenched privilege”. But the disproportionately low number of black students at the university is not necessarily the result of a racist admissions policy. Forty years ago, few campaigners talked of diversity as a goal. The objective was equality. As overt bigotry and discrimination diminished, so the goal of equality became redefined as a drive for greater diversity. The focus shifted from addressing the needs of working-class people from minority communities to providing better opportunities for middle-class professionals. Most of those who advocate diversity policies do so because they abhor inequality. Yet, in the shift from “equality” to “diversity”, the most marginalised have often been forgotten. The promotion of diversity, as the African-American academic and activist Adolph Reed has sardonically observed, can lead to the perspective that “a society in which 1% of the population controlled 90% of the resources could be just, provided that roughly 12% of the 1% were black, 12% were Latino, 50% were women, and whatever the appropriate proportions were LGBT people”. Diversity policies, in other words, do not necessarily challenge inequality, but simply make it “fairer”. The argument against diversity is usually seen as a conservative project. But as figures such as Reed (or, in a British context, the late A Sivanandan) demonstrate, there is also a radical tradition that is sceptical of the diversity approach because it comes to stand in place of a meaningful struggle for equality. If the argument in favour of diversity is not as straightforward as it seems, neither is the critique. Shriver insists she is opposed not to diversity but to quotas. But PRH is not demanding quotas; to suggest that it is, is to misrepresent Penguin as much as Shriver’s critics misrepresent her. At the root of the conservative argument against diversity is a particular view of “home” and “belonging”, an approach revealed particularly in debates around immigration. Diversity, many argue, is bad for society because it undermines a sense of commonality. Immigration makes one “feel a foreigner in one’s own country”, as Shriver herself has put it. In a review of novels about immigration, Shriver makes the valid, and necessary, point that most stories about migration are written from the viewpoint of immigrants, rarely from that of “host communities”. She goes on, however, to talk about immigration as a form of inappropriate cultural invasion. Mass immigration can begin to “duplicate the experience of military occupation – your nation is no longer your home”, and leads to “understandably primal reactions to the compromise of one’s home”. This is the reactionary face of the critique of diversity, in which too much diversity defiles one’s home, and exclusion becomes a necessary means of protection. It’s a world away from the kind of critique that Reed or Sivanandan might propose. Diversity is, of itself, neither good nor bad. The real issue is about how we engage with diversity. But that means engaging with all the issues for which “diversity” has become a proxy: equality, identity, class, immigration, racism, ideas of belonging and home. In this context, neither unthinkingly celebrating diversity, nor reflexively rejecting it, makes much sense. • Kenan Malik is an Observer columnist
{ "pile_set_name": "Github" }
/* * Copyright (c) 2017, 2018 Oracle and/or its affiliates. All rights reserved. * * This program and the accompanying materials are made available under the * terms of the Eclipse Public License v. 2.0, which is available at * http://www.eclipse.org/legal/epl-2.0. * * This Source Code may also be made available under the following Secondary * Licenses when the conditions for such availability set forth in the * Eclipse Public License v. 2.0 are satisfied: GNU General Public License, * version 2 with the GNU Classpath Exception, which is available at * https://www.gnu.org/software/classpath/license.html. * * SPDX-License-Identifier: EPL-2.0 OR GPL-2.0 WITH Classpath-exception-2.0 */ /* * To change this template, choose Tools | Templates * and open the template in the editor. */ package net.max.ee.sfsb; import java.io.IOException; import java.io.PrintWriter; import java.util.ArrayList; import jakarta.servlet.ServletException; import jakarta.servlet.http.HttpServlet; import jakarta.servlet.http.HttpServletRequest; import jakarta.servlet.http.HttpServletResponse; import jakarta.servlet.http.HttpSession; public class SFSBDriverServlet extends HttpServlet { /** * Processes requests for both HTTP <code>GET</code> and <code>POST</code> methods. * @param request servlet request * @param response servlet response * @throws ServletException if a servlet-specific error occurs * @throws IOException if an I/O error occurs */ protected void processRequest(HttpServletRequest request, HttpServletResponse response) throws ServletException, IOException { response.setContentType("text/html;charset=UTF-8"); PrintWriter out = response.getWriter(); try { out.println("<html>"); out.println("<head>"); out.println("<title>Servlet SFSBDriverServlet</title>"); out.println("</head>"); out.println("<body>"); out.println("<h1>Servlet SFSBDriverServlet at " + request.getContextPath () + "</h1>"); HttpSession session = request.getSession(true); Integer intAttr = (Integer) session.getAttribute("intAttr"); intAttr = (intAttr == null) ? 0 : (intAttr.intValue() + 1); out.println("Integer attr: " + intAttr); session.setAttribute("intAttr", intAttr); out.println("</body>"); out.println("</html>"); } catch (Exception nmEx) { nmEx.printStackTrace(out); } finally { out.close(); } } // <editor-fold defaultstate="collapsed" desc="HttpServlet methods. Click on the + sign on the left to edit the code."> /** * Handles the HTTP <code>GET</code> method. * @param request servlet request * @param response servlet response * @throws ServletException if a servlet-specific error occurs * @throws IOException if an I/O error occurs */ @Override protected void doGet(HttpServletRequest request, HttpServletResponse response) throws ServletException, IOException { processRequest(request, response); } /** * Handles the HTTP <code>POST</code> method. * @param request servlet request * @param response servlet response * @throws ServletException if a servlet-specific error occurs * @throws IOException if an I/O error occurs */ @Override protected void doPost(HttpServletRequest request, HttpServletResponse response) throws ServletException, IOException { processRequest(request, response); } /** * Returns a short description of the servlet. * @return a String containing servlet description */ @Override public String getServletInfo() { return "Short description"; }// </editor-fold> }
{ "pile_set_name": "Github" }
/* * Copyright (c) 2015, 2019, Oracle and/or its affiliates. All rights reserved. * DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER. * * This code is free software; you can redistribute it and/or modify it * under the terms of the GNU General Public License version 2 only, as * published by the Free Software Foundation. Oracle designates this * particular file as subject to the "Classpath" exception as provided * by Oracle in the LICENSE file that accompanied this code. * * This code is distributed in the hope that it will be useful, but WITHOUT * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or * FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License * version 2 for more details (a copy is included in the LICENSE file that * accompanied this code). * * You should have received a copy of the GNU General Public License version * 2 along with this work; if not, write to the Free Software Foundation, * Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA. * * Please contact Oracle, 500 Oracle Parkway, Redwood Shores, CA 9406+5 USA * or visit www.oracle.com if you need additional information or have any * questions. */ package sun.security.ssl; import java.io.IOException; import java.nio.ByteBuffer; import java.security.GeneralSecurityException; import java.util.Collections; import java.util.HashMap; import java.util.Iterator; import java.util.LinkedList; import java.util.List; import java.util.Set; import java.util.TreeSet; import javax.crypto.BadPaddingException; import javax.net.ssl.SSLException; import sun.security.ssl.SSLCipher.SSLReadCipher; /** * DTLS {@code InputRecord} implementation for {@code SSLEngine}. */ final class DTLSInputRecord extends InputRecord implements DTLSRecord { private DTLSReassembler reassembler = null; private int readEpoch; DTLSInputRecord(HandshakeHash handshakeHash) { super(handshakeHash, SSLReadCipher.nullDTlsReadCipher()); this.readEpoch = 0; } @Override void changeReadCiphers(SSLReadCipher readCipher) { this.readCipher = readCipher; this.readEpoch++; } @Override public void close() throws IOException { if (!isClosed) { super.close(); } } @Override boolean isEmpty() { return ((reassembler == null) || reassembler.isEmpty()); } @Override int estimateFragmentSize(int packetSize) { if (packetSize > 0) { return readCipher.estimateFragmentSize(packetSize, headerSize); } else { return Record.maxDataSize; } } @Override void expectingFinishFlight() { if (reassembler != null) { reassembler.expectingFinishFlight(); } } @Override void finishHandshake() { reassembler = null; } @Override Plaintext acquirePlaintext() { if (reassembler != null) { return reassembler.acquirePlaintext(); } return null; } @Override Plaintext[] decode(ByteBuffer[] srcs, int srcsOffset, int srcsLength) throws IOException, BadPaddingException { if (srcs == null || srcs.length == 0 || srcsLength == 0) { Plaintext pt = acquirePlaintext(); return pt == null ? new Plaintext[0] : new Plaintext[] { pt }; } else if (srcsLength == 1) { return decode(srcs[srcsOffset]); } else { ByteBuffer packet = extract(srcs, srcsOffset, srcsLength, DTLSRecord.headerSize); return decode(packet); } } Plaintext[] decode(ByteBuffer packet) { if (isClosed) { return null; } if (SSLLogger.isOn && SSLLogger.isOn("packet")) { SSLLogger.fine("Raw read", packet); } // The caller should have validated the record. int srcPos = packet.position(); int srcLim = packet.limit(); byte contentType = packet.get(); // pos: 0 byte majorVersion = packet.get(); // pos: 1 byte minorVersion = packet.get(); // pos: 2 byte[] recordEnS = new byte[8]; // epoch + seqence packet.get(recordEnS); int recordEpoch = ((recordEnS[0] & 0xFF) << 8) | (recordEnS[1] & 0xFF); // pos: 3, 4 long recordSeq = ((recordEnS[2] & 0xFFL) << 40) | ((recordEnS[3] & 0xFFL) << 32) | ((recordEnS[4] & 0xFFL) << 24) | ((recordEnS[5] & 0xFFL) << 16) | ((recordEnS[6] & 0xFFL) << 8) | (recordEnS[7] & 0xFFL); // pos: 5-10 int contentLen = ((packet.get() & 0xFF) << 8) | (packet.get() & 0xFF); // pos: 11, 12 if (SSLLogger.isOn && SSLLogger.isOn("record")) { SSLLogger.fine("READ: " + ProtocolVersion.nameOf(majorVersion, minorVersion) + " " + ContentType.nameOf(contentType) + ", length = " + contentLen); } int recLim = Math.addExact(srcPos, DTLSRecord.headerSize + contentLen); if (this.readEpoch > recordEpoch) { // Reset the position of the packet buffer. packet.position(recLim); if (SSLLogger.isOn && SSLLogger.isOn("record")) { SSLLogger.fine("READ: discard this old record", recordEnS); } return null; } // Buffer next epoch message if necessary. if (this.readEpoch < recordEpoch) { // Discard the record younger than the current epcoh if: // 1. it is not a handshake message, or // 3. it is not of next epoch. if ((contentType != ContentType.HANDSHAKE.id && contentType != ContentType.CHANGE_CIPHER_SPEC.id) || (reassembler == null && contentType != ContentType.HANDSHAKE.id) || (this.readEpoch < (recordEpoch - 1))) { packet.position(recLim); if (SSLLogger.isOn && SSLLogger.isOn("verbose")) { SSLLogger.fine("Premature record (epoch), discard it."); } return null; } // Not ready to decrypt this record, may be an encrypted Finished // message, need to buffer it. byte[] fragment = new byte[contentLen]; packet.get(fragment); // copy the fragment RecordFragment buffered = new RecordFragment(fragment, contentType, majorVersion, minorVersion, recordEnS, recordEpoch, recordSeq, true); if (reassembler == null) { reassembler = new DTLSReassembler(recordEpoch); } reassembler.queueUpFragment(buffered); // consume the full record in the packet buffer. packet.position(recLim); Plaintext pt = reassembler.acquirePlaintext(); return pt == null ? null : new Plaintext[] { pt }; } // // Now, the message is of this epoch. // // decrypt the fragment packet.limit(recLim); packet.position(srcPos + DTLSRecord.headerSize); ByteBuffer plaintextFragment; try { Plaintext plaintext = readCipher.decrypt(contentType, packet, recordEnS); plaintextFragment = plaintext.fragment; contentType = plaintext.contentType; } catch (GeneralSecurityException gse) { if (SSLLogger.isOn && SSLLogger.isOn("ssl")) { SSLLogger.fine("Discard invalid record: " + gse); } // invalid, discard this record [section 4.1.2.7, RFC 6347] return null; } finally { // consume a complete record packet.limit(srcLim); packet.position(recLim); } if (contentType != ContentType.CHANGE_CIPHER_SPEC.id && contentType != ContentType.HANDSHAKE.id) { // app data or alert // no retransmission // Cleanup the handshake reassembler if necessary. if ((reassembler != null) && (reassembler.handshakeEpoch < recordEpoch)) { if (SSLLogger.isOn && SSLLogger.isOn("verbose")) { SSLLogger.fine("Cleanup the handshake reassembler"); } reassembler = null; } return new Plaintext[] { new Plaintext(contentType, majorVersion, minorVersion, recordEpoch, Authenticator.toLong(recordEnS), plaintextFragment)}; } if (contentType == ContentType.CHANGE_CIPHER_SPEC.id) { if (reassembler == null) { reassembler = new DTLSReassembler(recordEpoch); } reassembler.queueUpChangeCipherSpec( new RecordFragment(plaintextFragment, contentType, majorVersion, minorVersion, recordEnS, recordEpoch, recordSeq, false)); } else { // handshake record // One record may contain 1+ more handshake messages. while (plaintextFragment.remaining() > 0) { HandshakeFragment hsFrag = parseHandshakeMessage( contentType, majorVersion, minorVersion, recordEnS, recordEpoch, recordSeq, plaintextFragment); if (hsFrag == null) { // invalid, discard this record if (SSLLogger.isOn && SSLLogger.isOn("verbose")) { SSLLogger.fine( "Invalid handshake message, discard it."); } return null; } if (reassembler == null) { reassembler = new DTLSReassembler(recordEpoch); } reassembler.queueUpHandshake(hsFrag); } } // Completed the read of the full record. Acquire the reassembled // messages. if (reassembler != null) { Plaintext pt = reassembler.acquirePlaintext(); return pt == null ? null : new Plaintext[] { pt }; } if (SSLLogger.isOn && SSLLogger.isOn("verbose")) { SSLLogger.fine("The reassembler is not initialized yet."); } return null; } @Override int bytesInCompletePacket( ByteBuffer[] srcs, int srcsOffset, int srcsLength) throws IOException { return bytesInCompletePacket(srcs[srcsOffset]); } private int bytesInCompletePacket(ByteBuffer packet) throws SSLException { // DTLS length field is in bytes 11/12 if (packet.remaining() < headerSize) { return -1; } // Last sanity check that it's not a wild record int pos = packet.position(); // Check the content type of the record. byte contentType = packet.get(pos); if (ContentType.valueOf(contentType) == null) { throw new SSLException( "Unrecognized SSL message, plaintext connection?"); } // Check the protocol version of the record. byte majorVersion = packet.get(pos + 1); byte minorVersion = packet.get(pos + 2); if (!ProtocolVersion.isNegotiable( majorVersion, minorVersion, true, false)) { throw new SSLException("Unrecognized record version " + ProtocolVersion.nameOf(majorVersion, minorVersion) + " , plaintext connection?"); } // Get the fragment length of the record. int fragLen = ((packet.get(pos + 11) & 0xFF) << 8) + (packet.get(pos + 12) & 0xFF) + headerSize; if (fragLen > Record.maxFragmentSize) { throw new SSLException( "Record overflow, fragment length (" + fragLen + ") MUST not exceed " + Record.maxFragmentSize); } return fragLen; } private static HandshakeFragment parseHandshakeMessage( byte contentType, byte majorVersion, byte minorVersion, byte[] recordEnS, int recordEpoch, long recordSeq, ByteBuffer plaintextFragment) { int remaining = plaintextFragment.remaining(); if (remaining < handshakeHeaderSize) { if (SSLLogger.isOn && SSLLogger.isOn("ssl")) { SSLLogger.fine("Discard invalid record: " + "too small record to hold a handshake fragment"); } // invalid, discard this record [section 4.1.2.7, RFC 6347] return null; } // Fail fast for unknown handshake message. byte handshakeType = plaintextFragment.get(); // pos: 0 if (!SSLHandshake.isKnown(handshakeType)) { if (SSLLogger.isOn && SSLLogger.isOn("ssl")) { SSLLogger.fine("Discard invalid record: " + "unknown handshake type size, Handshake.msg_type = " + (handshakeType & 0xFF)); } // invalid, discard this record [section 4.1.2.7, RFC 6347] return null; } int messageLength = ((plaintextFragment.get() & 0xFF) << 16) | ((plaintextFragment.get() & 0xFF) << 8) | (plaintextFragment.get() & 0xFF); // pos: 1-3 int messageSeq = ((plaintextFragment.get() & 0xFF) << 8) | (plaintextFragment.get() & 0xFF); // pos: 4/5 int fragmentOffset = ((plaintextFragment.get() & 0xFF) << 16) | ((plaintextFragment.get() & 0xFF) << 8) | (plaintextFragment.get() & 0xFF); // pos: 6-8 int fragmentLength = ((plaintextFragment.get() & 0xFF) << 16) | ((plaintextFragment.get() & 0xFF) << 8) | (plaintextFragment.get() & 0xFF); // pos: 9-11 if ((remaining - handshakeHeaderSize) < fragmentLength) { if (SSLLogger.isOn && SSLLogger.isOn("ssl")) { SSLLogger.fine("Discard invalid record: " + "not a complete handshake fragment in the record"); } // invalid, discard this record [section 4.1.2.7, RFC 6347] return null; } byte[] fragment = new byte[fragmentLength]; plaintextFragment.get(fragment); return new HandshakeFragment(fragment, contentType, majorVersion, minorVersion, recordEnS, recordEpoch, recordSeq, handshakeType, messageLength, messageSeq, fragmentOffset, fragmentLength); } // buffered record fragment private static class RecordFragment implements Comparable<RecordFragment> { boolean isCiphertext; byte contentType; byte majorVersion; byte minorVersion; int recordEpoch; long recordSeq; byte[] recordEnS; byte[] fragment; RecordFragment(ByteBuffer fragBuf, byte contentType, byte majorVersion, byte minorVersion, byte[] recordEnS, int recordEpoch, long recordSeq, boolean isCiphertext) { this((byte[])null, contentType, majorVersion, minorVersion, recordEnS, recordEpoch, recordSeq, isCiphertext); this.fragment = new byte[fragBuf.remaining()]; fragBuf.get(this.fragment); } RecordFragment(byte[] fragment, byte contentType, byte majorVersion, byte minorVersion, byte[] recordEnS, int recordEpoch, long recordSeq, boolean isCiphertext) { this.isCiphertext = isCiphertext; this.contentType = contentType; this.majorVersion = majorVersion; this.minorVersion = minorVersion; this.recordEpoch = recordEpoch; this.recordSeq = recordSeq; this.recordEnS = recordEnS; this.fragment = fragment; // The caller should have cloned // the buffer if necessary. } @Override public int compareTo(RecordFragment o) { if (this.contentType == ContentType.CHANGE_CIPHER_SPEC.id) { if (o.contentType == ContentType.CHANGE_CIPHER_SPEC.id) { // Only one incoming ChangeCipherSpec message for an epoch. // // Ignore duplicated ChangeCipherSpec messages. return Integer.compare(this.recordEpoch, o.recordEpoch); } else if ((this.recordEpoch == o.recordEpoch) && (o.contentType == ContentType.HANDSHAKE.id)) { // ChangeCipherSpec is the latest message of an epoch. return 1; } } else if (o.contentType == ContentType.CHANGE_CIPHER_SPEC.id) { if ((this.recordEpoch == o.recordEpoch) && (this.contentType == ContentType.HANDSHAKE.id)) { // ChangeCipherSpec is the latest message of an epoch. return -1; } else { // different epoch or this is not a handshake message return compareToSequence(o.recordEpoch, o.recordSeq); } } return compareToSequence(o.recordEpoch, o.recordSeq); } int compareToSequence(int epoch, long seq) { if (this.recordEpoch > epoch) { return 1; } else if (this.recordEpoch == epoch) { return Long.compare(this.recordSeq, seq); } else { return -1; } } } // buffered handshake message private static final class HandshakeFragment extends RecordFragment { byte handshakeType; // handshake msg_type int messageSeq; // message_seq int messageLength; // Handshake body length int fragmentOffset; // fragment_offset int fragmentLength; // fragment_length HandshakeFragment(byte[] fragment, byte contentType, byte majorVersion, byte minorVersion, byte[] recordEnS, int recordEpoch, long recordSeq, byte handshakeType, int messageLength, int messageSeq, int fragmentOffset, int fragmentLength) { super(fragment, contentType, majorVersion, minorVersion, recordEnS, recordEpoch , recordSeq, false); this.handshakeType = handshakeType; this.messageSeq = messageSeq; this.messageLength = messageLength; this.fragmentOffset = fragmentOffset; this.fragmentLength = fragmentLength; } @Override public int compareTo(RecordFragment o) { if (o instanceof HandshakeFragment) { HandshakeFragment other = (HandshakeFragment)o; if (this.messageSeq != other.messageSeq) { // keep the insertion order of handshake messages return this.messageSeq - other.messageSeq; } else if (this.fragmentOffset != other.fragmentOffset) { // small fragment offset was transmitted first return this.fragmentOffset - other.fragmentOffset; } else if (this.fragmentLength == other.fragmentLength) { // retransmissions, ignore duplicated messages. return 0; } // Should be repacked for suitable fragment length. // // Note that the acquiring processes will reassemble // the fragments later. return compareToSequence(o.recordEpoch, o.recordSeq); } return super.compareTo(o); } } private static final class HoleDescriptor { int offset; // fragment_offset int limit; // fragment_offset + fragment_length HoleDescriptor(int offset, int limit) { this.offset = offset; this.limit = limit; } } private static final class HandshakeFlight implements Cloneable { static final byte HF_UNKNOWN = SSLHandshake.NOT_APPLICABLE.id; byte handshakeType; // handshake type int flightEpoch; // the epoch of the first message int minMessageSeq; // minimal message sequence int maxMessageSeq; // maximum message sequence int maxRecordEpoch; // maximum record sequence number long maxRecordSeq; // maximum record sequence number HashMap<Byte, List<HoleDescriptor>> holesMap; HandshakeFlight() { this.handshakeType = HF_UNKNOWN; this.flightEpoch = 0; this.minMessageSeq = 0; this.maxMessageSeq = 0; this.maxRecordEpoch = 0; this.maxRecordSeq = -1; this.holesMap = new HashMap<>(5); } boolean isRetransmitOf(HandshakeFlight hs) { return (hs != null) && (this.handshakeType == hs.handshakeType) && (this.minMessageSeq == hs.minMessageSeq); } @Override public Object clone() { HandshakeFlight hf = new HandshakeFlight(); hf.handshakeType = this.handshakeType; hf.flightEpoch = this.flightEpoch; hf.minMessageSeq = this.minMessageSeq; hf.maxMessageSeq = this.maxMessageSeq; hf.maxRecordEpoch = this.maxRecordEpoch; hf.maxRecordSeq = this.maxRecordSeq; hf.holesMap = new HashMap<>(this.holesMap); return hf; } } final class DTLSReassembler { // The handshake epoch. final int handshakeEpoch; // The buffered fragments. TreeSet<RecordFragment> bufferedFragments = new TreeSet<>(); // The handshake flight in progress. HandshakeFlight handshakeFlight = new HandshakeFlight(); // The preceding handshake flight. HandshakeFlight precedingFlight = null; // Epoch, sequence number and handshake message sequence of the // next message acquisition of a flight. int nextRecordEpoch; // next record epoch long nextRecordSeq = 0; // next record sequence number // Expect ChangeCipherSpec and Finished messages for the final flight. boolean expectCCSFlight = false; // Ready to process this flight if received all messages of the flight. boolean flightIsReady = false; boolean needToCheckFlight = false; DTLSReassembler(int handshakeEpoch) { this.handshakeEpoch = handshakeEpoch; this.nextRecordEpoch = handshakeEpoch; this.handshakeFlight.flightEpoch = handshakeEpoch; } void expectingFinishFlight() { expectCCSFlight = true; } // Queue up a handshake message. void queueUpHandshake(HandshakeFragment hsf) { if (!isDesirable(hsf)) { // Not a dedired record, discard it. return; } // Clean up the retransmission messages if necessary. cleanUpRetransmit(hsf); // Is it the first message of next flight? // // Note: the Finished message is handled in the final CCS flight. boolean isMinimalFlightMessage = false; if (handshakeFlight.minMessageSeq == hsf.messageSeq) { isMinimalFlightMessage = true; } else if ((precedingFlight != null) && (precedingFlight.minMessageSeq == hsf.messageSeq)) { isMinimalFlightMessage = true; } if (isMinimalFlightMessage && (hsf.fragmentOffset == 0) && (hsf.handshakeType != SSLHandshake.FINISHED.id)) { // reset the handshake flight handshakeFlight.handshakeType = hsf.handshakeType; handshakeFlight.flightEpoch = hsf.recordEpoch; handshakeFlight.minMessageSeq = hsf.messageSeq; } if (hsf.handshakeType == SSLHandshake.FINISHED.id) { handshakeFlight.maxMessageSeq = hsf.messageSeq; handshakeFlight.maxRecordEpoch = hsf.recordEpoch; handshakeFlight.maxRecordSeq = hsf.recordSeq; } else { if (handshakeFlight.maxMessageSeq < hsf.messageSeq) { handshakeFlight.maxMessageSeq = hsf.messageSeq; } int n = (hsf.recordEpoch - handshakeFlight.maxRecordEpoch); if (n > 0) { handshakeFlight.maxRecordEpoch = hsf.recordEpoch; handshakeFlight.maxRecordSeq = hsf.recordSeq; } else if (n == 0) { // the same epoch if (handshakeFlight.maxRecordSeq < hsf.recordSeq) { handshakeFlight.maxRecordSeq = hsf.recordSeq; } } // Otherwise, it is unlikely to happen. } boolean fragmented = false; if ((hsf.fragmentOffset) != 0 || (hsf.fragmentLength != hsf.messageLength)) { fragmented = true; } List<HoleDescriptor> holes = handshakeFlight.holesMap.get(hsf.handshakeType); if (holes == null) { if (!fragmented) { holes = Collections.emptyList(); } else { holes = new LinkedList<HoleDescriptor>(); holes.add(new HoleDescriptor(0, hsf.messageLength)); } handshakeFlight.holesMap.put(hsf.handshakeType, holes); } else if (holes.isEmpty()) { // Have got the full handshake message. This record may be // a handshake message retransmission. Discard this record. // // It's OK to discard retransmission as the handshake hash // is computed as if each handshake message had been sent // as a single fragment. if (SSLLogger.isOn && SSLLogger.isOn("verbose")) { SSLLogger.fine("Have got the full message, discard it."); } return; } if (fragmented) { int fragmentLimit = hsf.fragmentOffset + hsf.fragmentLength; for (int i = 0; i < holes.size(); i++) { HoleDescriptor hole = holes.get(i); if ((hole.limit <= hsf.fragmentOffset) || (hole.offset >= fragmentLimit)) { // Also discard overlapping handshake retransmissions. continue; } // The ranges SHOULD NOT overlap. if (((hole.offset > hsf.fragmentOffset) && (hole.offset < fragmentLimit)) || ((hole.limit > hsf.fragmentOffset) && (hole.limit < fragmentLimit))) { if (SSLLogger.isOn && SSLLogger.isOn("ssl")) { SSLLogger.fine("Discard invalid record: " + "handshake fragment ranges are overlapping"); } // invalid, discard it [section 4.1.2.7, RFC 6347] return; } // This record interacts with this hole, fill the hole. holes.remove(i); // i--; if (hsf.fragmentOffset > hole.offset) { holes.add(new HoleDescriptor( hole.offset, hsf.fragmentOffset)); // i++; } if (fragmentLimit < hole.limit) { holes.add(new HoleDescriptor( fragmentLimit, hole.limit)); // i++; } // As no ranges overlap, no interact with other holes. break; } } // buffer this fragment if (hsf.handshakeType == SSLHandshake.FINISHED.id) { // Need no status update. bufferedFragments.add(hsf); } else { bufferFragment(hsf); } } // Queue up a ChangeCipherSpec message void queueUpChangeCipherSpec(RecordFragment rf) { if (!isDesirable(rf)) { // Not a dedired record, discard it. return; } // Clean up the retransmission messages if necessary. cleanUpRetransmit(rf); // Is it the first message of this flight? // // Note: the first message of the final flight is ChangeCipherSpec. if (expectCCSFlight) { handshakeFlight.handshakeType = HandshakeFlight.HF_UNKNOWN; handshakeFlight.flightEpoch = rf.recordEpoch; } // The epoch should be the same as the first message of the flight. if (handshakeFlight.maxRecordSeq < rf.recordSeq) { handshakeFlight.maxRecordSeq = rf.recordSeq; } // buffer this fragment bufferFragment(rf); } // Queue up a ciphertext message. // // Note: not yet be able to decrypt the message. void queueUpFragment(RecordFragment rf) { if (!isDesirable(rf)) { // Not a dedired record, discard it. return; } // Clean up the retransmission messages if necessary. cleanUpRetransmit(rf); // buffer this fragment bufferFragment(rf); } private void bufferFragment(RecordFragment rf) { // append this fragment bufferedFragments.add(rf); if (flightIsReady) { flightIsReady = false; } if (!needToCheckFlight) { needToCheckFlight = true; } } private void cleanUpRetransmit(RecordFragment rf) { // Does the next flight start? boolean isNewFlight = false; if (precedingFlight != null) { if (precedingFlight.flightEpoch < rf.recordEpoch) { isNewFlight = true; } else { if (rf instanceof HandshakeFragment) { HandshakeFragment hsf = (HandshakeFragment)rf; if (precedingFlight.maxMessageSeq < hsf.messageSeq) { isNewFlight = true; } } else if ( rf.contentType != ContentType.CHANGE_CIPHER_SPEC.id) { // ciphertext if (precedingFlight.maxRecordEpoch < rf.recordEpoch) { isNewFlight = true; } } } } if (!isNewFlight) { // Need no cleanup. return; } // clean up the buffer for (Iterator<RecordFragment> it = bufferedFragments.iterator(); it.hasNext();) { RecordFragment frag = it.next(); boolean isOld = false; if (frag.recordEpoch < precedingFlight.maxRecordEpoch) { isOld = true; } else if (frag.recordEpoch == precedingFlight.maxRecordEpoch) { if (frag.recordSeq <= precedingFlight.maxRecordSeq) { isOld = true; } } if (!isOld && (frag instanceof HandshakeFragment)) { HandshakeFragment hsf = (HandshakeFragment)frag; isOld = (hsf.messageSeq <= precedingFlight.maxMessageSeq); } if (isOld) { it.remove(); } else { // Safe to break as items in the buffer are ordered. break; } } // discard retransmissions of the previous flight if any. precedingFlight = null; } // Is a desired record? // // Check for retransmission and lost records. private boolean isDesirable(RecordFragment rf) { // // Discard records old than the previous epoch. // int previousEpoch = nextRecordEpoch - 1; if (rf.recordEpoch < previousEpoch) { // Too old to use, discard this record. if (SSLLogger.isOn && SSLLogger.isOn("verbose")) { SSLLogger.fine( "Too old epoch to use this record, discard it."); } return false; } // // Allow retransmission of last flight of the previous epoch // // For example, the last server delivered flight for session // resuming abbreviated handshaking consist three messages: // ServerHello // [ChangeCipherSpec] // Finished // // The epoch number is incremented and the sequence number is reset // if the ChangeCipherSpec is sent. if (rf.recordEpoch == previousEpoch) { boolean isDesired = true; if (precedingFlight == null) { isDesired = false; } else { if (rf instanceof HandshakeFragment) { HandshakeFragment hsf = (HandshakeFragment)rf; if (precedingFlight.minMessageSeq > hsf.messageSeq) { isDesired = false; } } else if ( rf.contentType == ContentType.CHANGE_CIPHER_SPEC.id) { // ChangeCipherSpec if (precedingFlight.flightEpoch != rf.recordEpoch) { isDesired = false; } } else { // ciphertext if ((rf.recordEpoch < precedingFlight.maxRecordEpoch) || (rf.recordEpoch == precedingFlight.maxRecordEpoch && rf.recordSeq <= precedingFlight.maxRecordSeq)) { isDesired = false; } } } if (!isDesired) { // Too old to use, discard this retransmitted record if (SSLLogger.isOn && SSLLogger.isOn("verbose")) { SSLLogger.fine( "Too old retransmission to use, discard it."); } return false; } } else if ((rf.recordEpoch == nextRecordEpoch) && (nextRecordSeq > rf.recordSeq)) { // Previously disordered record for the current epoch. // // Should has been retransmitted. Discard this record. if (SSLLogger.isOn && SSLLogger.isOn("verbose")) { SSLLogger.fine( "Lagging behind record (sequence), discard it."); } return false; } return true; } private boolean isEmpty() { return (bufferedFragments.isEmpty() || (!flightIsReady && !needToCheckFlight) || (needToCheckFlight && !flightIsReady())); } Plaintext acquirePlaintext() { if (bufferedFragments.isEmpty()) { if (SSLLogger.isOn && SSLLogger.isOn("verbose")) { SSLLogger.fine("No received handshake messages"); } return null; } if (!flightIsReady && needToCheckFlight) { // check the fligth status flightIsReady = flightIsReady(); // Reset if this flight is ready. if (flightIsReady) { // Retransmitted handshake messages are not needed for // further handshaking processing. if (handshakeFlight.isRetransmitOf(precedingFlight)) { // cleanup bufferedFragments.clear(); // Reset the next handshake flight. resetHandshakeFlight(precedingFlight); if (SSLLogger.isOn && SSLLogger.isOn("verbose")) { SSLLogger.fine("Received a retransmission flight."); } return Plaintext.PLAINTEXT_NULL; } } needToCheckFlight = false; } if (!flightIsReady) { if (SSLLogger.isOn && SSLLogger.isOn("verbose")) { SSLLogger.fine( "The handshake flight is not ready to use: " + handshakeFlight.handshakeType); } return null; } RecordFragment rFrag = bufferedFragments.first(); Plaintext plaintext; if (!rFrag.isCiphertext) { // handshake message, or ChangeCipherSpec message plaintext = acquireHandshakeMessage(); // Reset the handshake flight. if (bufferedFragments.isEmpty()) { // Need not to backup the holes map. Clear up it at first. handshakeFlight.holesMap.clear(); // cleanup holes map // Update the preceding flight. precedingFlight = (HandshakeFlight)handshakeFlight.clone(); // Reset the next handshake flight. resetHandshakeFlight(precedingFlight); if (expectCCSFlight && (precedingFlight.handshakeType == HandshakeFlight.HF_UNKNOWN)) { expectCCSFlight = false; } } } else { // a Finished message or other ciphertexts plaintext = acquireCachedMessage(); } return plaintext; } // // Reset the handshake flight from a previous one. // private void resetHandshakeFlight(HandshakeFlight prev) { // Reset the next handshake flight. handshakeFlight.handshakeType = HandshakeFlight.HF_UNKNOWN; handshakeFlight.flightEpoch = prev.maxRecordEpoch; if (prev.flightEpoch != prev.maxRecordEpoch) { // a new epoch starts handshakeFlight.minMessageSeq = 0; } else { // stay at the same epoch // // The minimal message sequence number will get updated if // a flight retransmission happens. handshakeFlight.minMessageSeq = prev.maxMessageSeq + 1; } // cleanup the maximum sequence number and epoch number. // // Note: actually, we need to do nothing because the reassembler // of handshake messages will reset them properly even for // retransmissions. // handshakeFlight.maxMessageSeq = 0; handshakeFlight.maxRecordEpoch = handshakeFlight.flightEpoch; // Record sequence number cannot wrap even for retransmissions. handshakeFlight.maxRecordSeq = prev.maxRecordSeq + 1; // cleanup holes map handshakeFlight.holesMap.clear(); // Ready to accept new input record. flightIsReady = false; needToCheckFlight = false; } private Plaintext acquireCachedMessage() { RecordFragment rFrag = bufferedFragments.first(); if (readEpoch != rFrag.recordEpoch) { if (readEpoch > rFrag.recordEpoch) { // discard old records if (SSLLogger.isOn && SSLLogger.isOn("verbose")) { SSLLogger.fine( "Discard old buffered ciphertext fragments."); } bufferedFragments.remove(rFrag); // popup the fragment } // reset the flight if (flightIsReady) { flightIsReady = false; } if (SSLLogger.isOn && SSLLogger.isOn("verbose")) { SSLLogger.fine( "Not yet ready to decrypt the cached fragments."); } return null; } bufferedFragments.remove(rFrag); // popup the fragment ByteBuffer fragment = ByteBuffer.wrap(rFrag.fragment); ByteBuffer plaintextFragment = null; try { Plaintext plaintext = readCipher.decrypt( rFrag.contentType, fragment, rFrag.recordEnS); plaintextFragment = plaintext.fragment; rFrag.contentType = plaintext.contentType; } catch (GeneralSecurityException gse) { if (SSLLogger.isOn && SSLLogger.isOn("verbose")) { SSLLogger.fine("Discard invalid record: ", gse); } // invalid, discard this record [section 4.1.2.7, RFC 6347] return null; } // The ciphtext handshake message can only be Finished (the // end of this flight), ClinetHello or HelloRequest (the // beginning of the next flight) message. Need not to check // any ChangeCipherSpec message. if (rFrag.contentType == ContentType.HANDSHAKE.id) { while (plaintextFragment.remaining() > 0) { HandshakeFragment hsFrag = parseHandshakeMessage( rFrag.contentType, rFrag.majorVersion, rFrag.minorVersion, rFrag.recordEnS, rFrag.recordEpoch, rFrag.recordSeq, plaintextFragment); if (hsFrag == null) { // invalid, discard this record if (SSLLogger.isOn && SSLLogger.isOn("verbose")) { SSLLogger.fine( "Invalid handshake fragment, discard it", plaintextFragment); } return null; } queueUpHandshake(hsFrag); // The flight ready status (flightIsReady) should have // been checked and updated for the Finished handshake // message before the decryption. Please don't update // flightIsReady for Finished messages. if (hsFrag.handshakeType != SSLHandshake.FINISHED.id) { flightIsReady = false; needToCheckFlight = true; } } return acquirePlaintext(); } else { return new Plaintext(rFrag.contentType, rFrag.majorVersion, rFrag.minorVersion, rFrag.recordEpoch, Authenticator.toLong(rFrag.recordEnS), plaintextFragment); } } private Plaintext acquireHandshakeMessage() { RecordFragment rFrag = bufferedFragments.first(); if (rFrag.contentType == ContentType.CHANGE_CIPHER_SPEC.id) { this.nextRecordEpoch = rFrag.recordEpoch + 1; // For retransmissions, the next record sequence number is a // positive value. Don't worry about it as the acquiring of // the immediately followed Finished handshake message will // reset the next record sequence number correctly. this.nextRecordSeq = 0; // Popup the fragment. bufferedFragments.remove(rFrag); return new Plaintext(rFrag.contentType, rFrag.majorVersion, rFrag.minorVersion, rFrag.recordEpoch, Authenticator.toLong(rFrag.recordEnS), ByteBuffer.wrap(rFrag.fragment)); } else { // rFrag.contentType == ContentType.HANDSHAKE.id HandshakeFragment hsFrag = (HandshakeFragment)rFrag; if ((hsFrag.messageLength == hsFrag.fragmentLength) && (hsFrag.fragmentOffset == 0)) { // no fragmentation bufferedFragments.remove(rFrag); // popup the fragment // this.nextRecordEpoch = hsFrag.recordEpoch; this.nextRecordSeq = hsFrag.recordSeq + 1; // Note: may try to avoid byte array copy in the future. byte[] recordFrag = new byte[hsFrag.messageLength + 4]; Plaintext plaintext = new Plaintext( hsFrag.contentType, hsFrag.majorVersion, hsFrag.minorVersion, hsFrag.recordEpoch, Authenticator.toLong(hsFrag.recordEnS), ByteBuffer.wrap(recordFrag)); // fill the handshake fragment of the record recordFrag[0] = hsFrag.handshakeType; recordFrag[1] = (byte)((hsFrag.messageLength >>> 16) & 0xFF); recordFrag[2] = (byte)((hsFrag.messageLength >>> 8) & 0xFF); recordFrag[3] = (byte)(hsFrag.messageLength & 0xFF); System.arraycopy(hsFrag.fragment, 0, recordFrag, 4, hsFrag.fragmentLength); // handshake hashing handshakeHashing(hsFrag, plaintext); return plaintext; } else { // fragmented handshake message // the first record // // Note: may try to avoid byte array copy in the future. byte[] recordFrag = new byte[hsFrag.messageLength + 4]; Plaintext plaintext = new Plaintext( hsFrag.contentType, hsFrag.majorVersion, hsFrag.minorVersion, hsFrag.recordEpoch, Authenticator.toLong(hsFrag.recordEnS), ByteBuffer.wrap(recordFrag)); // fill the handshake fragment of the record recordFrag[0] = hsFrag.handshakeType; recordFrag[1] = (byte)((hsFrag.messageLength >>> 16) & 0xFF); recordFrag[2] = (byte)((hsFrag.messageLength >>> 8) & 0xFF); recordFrag[3] = (byte)(hsFrag.messageLength & 0xFF); int msgSeq = hsFrag.messageSeq; long maxRecodeSN = hsFrag.recordSeq; HandshakeFragment hmFrag = hsFrag; do { System.arraycopy(hmFrag.fragment, 0, recordFrag, hmFrag.fragmentOffset + 4, hmFrag.fragmentLength); // popup the fragment bufferedFragments.remove(rFrag); if (maxRecodeSN < hmFrag.recordSeq) { maxRecodeSN = hmFrag.recordSeq; } // Note: may buffer retransmitted fragments in order to // speed up the reassembly in the future. // read the next buffered record if (!bufferedFragments.isEmpty()) { rFrag = bufferedFragments.first(); if (rFrag.contentType != ContentType.HANDSHAKE.id) { break; } else { hmFrag = (HandshakeFragment)rFrag; } } } while (!bufferedFragments.isEmpty() && (msgSeq == hmFrag.messageSeq)); // handshake hashing handshakeHashing(hsFrag, plaintext); this.nextRecordSeq = maxRecodeSN + 1; return plaintext; } } } boolean flightIsReady() { byte flightType = handshakeFlight.handshakeType; if (flightType == HandshakeFlight.HF_UNKNOWN) { // // the ChangeCipherSpec/Finished flight // if (expectCCSFlight) { // Have the ChangeCipherSpec/Finished flight been received? boolean isReady = hasFinishedMessage(bufferedFragments); if (SSLLogger.isOn && SSLLogger.isOn("verbose")) { SSLLogger.fine( "Has the final flight been received? " + isReady); } return isReady; } if (SSLLogger.isOn && SSLLogger.isOn("verbose")) { SSLLogger.fine("No flight is received yet."); } return false; } if ((flightType == SSLHandshake.CLIENT_HELLO.id) || (flightType == SSLHandshake.HELLO_REQUEST.id) || (flightType == SSLHandshake.HELLO_VERIFY_REQUEST.id)) { // single handshake message flight boolean isReady = hasCompleted(flightType); if (SSLLogger.isOn && SSLLogger.isOn("verbose")) { SSLLogger.fine( "Is the handshake message completed? " + isReady); } return isReady; } // // the ServerHello flight // if (flightType == SSLHandshake.SERVER_HELLO.id) { // Firstly, check the first flight handshake message. if (!hasCompleted(flightType)) { if (SSLLogger.isOn && SSLLogger.isOn("verbose")) { SSLLogger.fine( "The ServerHello message is not completed yet."); } return false; } // // an abbreviated handshake // if (hasFinishedMessage(bufferedFragments)) { if (SSLLogger.isOn && SSLLogger.isOn("verbose")) { SSLLogger.fine("It's an abbreviated handshake."); } return true; } // // a full handshake // List<HoleDescriptor> holes = handshakeFlight.holesMap.get( SSLHandshake.SERVER_HELLO_DONE.id); if ((holes == null) || !holes.isEmpty()) { // Not yet got the final message of the flight. if (SSLLogger.isOn && SSLLogger.isOn("verbose")) { SSLLogger.fine( "Not yet got the ServerHelloDone message"); } return false; } // Have all handshake message been received? boolean isReady = hasCompleted(bufferedFragments, handshakeFlight.minMessageSeq, handshakeFlight.maxMessageSeq); if (SSLLogger.isOn && SSLLogger.isOn("verbose")) { SSLLogger.fine( "Is the ServerHello flight (message " + handshakeFlight.minMessageSeq + "-" + handshakeFlight.maxMessageSeq + ") completed? " + isReady); } return isReady; } // // the ClientKeyExchange flight // // Note: need to consider more messages in this flight if // ht_supplemental_data and ht_certificate_url are // suppported in the future. // if ((flightType == SSLHandshake.CERTIFICATE.id) || (flightType == SSLHandshake.CLIENT_KEY_EXCHANGE.id)) { // Firstly, check the first flight handshake message. if (!hasCompleted(flightType)) { if (SSLLogger.isOn && SSLLogger.isOn("verbose")) { SSLLogger.fine( "The ClientKeyExchange or client Certificate " + "message is not completed yet."); } return false; } // Is client CertificateVerify a mandatory message? if (flightType == SSLHandshake.CERTIFICATE.id) { if (needClientVerify(bufferedFragments) && !hasCompleted(SSLHandshake.CERTIFICATE_VERIFY.id)) { if (SSLLogger.isOn && SSLLogger.isOn("verbose")) { SSLLogger.fine( "Not yet have the CertificateVerify message"); } return false; } } if (!hasFinishedMessage(bufferedFragments)) { // not yet have the ChangeCipherSpec/Finished messages if (SSLLogger.isOn && SSLLogger.isOn("verbose")) { SSLLogger.fine( "Not yet have the ChangeCipherSpec and " + "Finished messages"); } return false; } // Have all handshake message been received? boolean isReady = hasCompleted(bufferedFragments, handshakeFlight.minMessageSeq, handshakeFlight.maxMessageSeq); if (SSLLogger.isOn && SSLLogger.isOn("verbose")) { SSLLogger.fine( "Is the ClientKeyExchange flight (message " + handshakeFlight.minMessageSeq + "-" + handshakeFlight.maxMessageSeq + ") completed? " + isReady); } return isReady; } // // Otherwise, need to receive more handshake messages. // if (SSLLogger.isOn && SSLLogger.isOn("verbose")) { SSLLogger.fine("Need to receive more handshake messages"); } return false; } // Looking for the ChangeCipherSpec and Finished messages. // // As the cached Finished message should be a ciphertext, we don't // exactly know a ciphertext is a Finished message or not. According // to the spec of TLS/DTLS handshaking, a Finished message is always // sent immediately after a ChangeCipherSpec message. The first // ciphertext handshake message should be the expected Finished message. private boolean hasFinishedMessage(Set<RecordFragment> fragments) { boolean hasCCS = false; boolean hasFin = false; for (RecordFragment fragment : fragments) { if (fragment.contentType == ContentType.CHANGE_CIPHER_SPEC.id) { if (hasFin) { return true; } hasCCS = true; } else if (fragment.contentType == ContentType.HANDSHAKE.id) { // Finished is the first expected message of a new epoch. if (fragment.isCiphertext) { if (hasCCS) { return true; } hasFin = true; } } } return hasFin && hasCCS; } // Is client CertificateVerify a mandatory message? // // In the current implementation, client CertificateVerify is a // mandatory message if the client Certificate is not empty. private boolean needClientVerify(Set<RecordFragment> fragments) { // The caller should have checked the completion of the first // present handshake message. Need not to check it again. for (RecordFragment rFrag : fragments) { if ((rFrag.contentType != ContentType.HANDSHAKE.id) || rFrag.isCiphertext) { break; } HandshakeFragment hsFrag = (HandshakeFragment)rFrag; if (hsFrag.handshakeType != SSLHandshake.CERTIFICATE.id) { continue; } return (rFrag.fragment != null) && (rFrag.fragment.length > DTLSRecord.minCertPlaintextSize); } return false; } private boolean hasCompleted(byte handshakeType) { List<HoleDescriptor> holes = handshakeFlight.holesMap.get(handshakeType); if (holes == null) { // not yet received this kind of handshake message return false; } return holes.isEmpty(); // no fragment hole for complete message } private boolean hasCompleted( Set<RecordFragment> fragments, int presentMsgSeq, int endMsgSeq) { // The caller should have checked the completion of the first // present handshake message. Need not to check it again. for (RecordFragment rFrag : fragments) { if ((rFrag.contentType != ContentType.HANDSHAKE.id) || rFrag.isCiphertext) { break; } HandshakeFragment hsFrag = (HandshakeFragment)rFrag; if (hsFrag.messageSeq == presentMsgSeq) { continue; } else if (hsFrag.messageSeq == (presentMsgSeq + 1)) { // check the completion of the handshake message if (!hasCompleted(hsFrag.handshakeType)) { return false; } presentMsgSeq = hsFrag.messageSeq; } else { // not yet got handshake message next to presentMsgSeq break; } } return (presentMsgSeq >= endMsgSeq); // false: if not yet got all messages of the flight. } private void handshakeHashing( HandshakeFragment hsFrag, Plaintext plaintext) { byte hsType = hsFrag.handshakeType; if (!handshakeHash.isHashable(hsType)) { // omitted from handshake hash computation return; } // calculate the DTLS header and reserve the handshake message plaintext.fragment.position(4); // ignore the TLS header byte[] temporary = new byte[plaintext.fragment.remaining() + 12]; // 12: handshake header size // Handshake.msg_type temporary[0] = hsFrag.handshakeType; // Handshake.length temporary[1] = (byte)((hsFrag.messageLength >> 16) & 0xFF); temporary[2] = (byte)((hsFrag.messageLength >> 8) & 0xFF); temporary[3] = (byte)(hsFrag.messageLength & 0xFF); // Handshake.message_seq temporary[4] = (byte)((hsFrag.messageSeq >> 8) & 0xFF); temporary[5] = (byte)(hsFrag.messageSeq & 0xFF); // Handshake.fragment_offset temporary[6] = 0; temporary[7] = 0; temporary[8] = 0; // Handshake.fragment_length temporary[9] = temporary[1]; temporary[10] = temporary[2]; temporary[11] = temporary[3]; plaintext.fragment.get(temporary, 12, plaintext.fragment.remaining()); handshakeHash.receive(temporary); plaintext.fragment.position(0); // restore the position } } }
{ "pile_set_name": "PubMed Abstracts" }
Intracellular distribution and biological effects of phytochemicals in a sex steroid- sensitive model of human prostate adenocarcinoma. Prostate function is critical for male fertility and its well-known oncological biomarker, namely Prostate-Specific Antigen (PSA), can be also used to monitor prostate epithelial human cells upon treatment with pharmaceutical drugs or natural bioactive compounds. The LNCaP human prostate cell line was previously set up as a model system to investigate chemicals affecting prostate epithelium functionality by means of a tiered approach integrating two different toxicological endpoints, cell viability (MTS) and PSA secretion assays. Here, the same approach has been used to characterize the biological effects of phytochemicals on prostate epithelium. The antiandrogenic ability of phytochemicals to inhibit DHT-induced PSA secretion has been investigated also characterizing their intracellular distribution, in the presence or absence of sex steroids. Intracellular distribution allows to verify whether and to which extent each phytochemical is able to enter the cell and to reach the nucleus, the latter being the target of the supposed transcriptional modulatory activity upon phytochemicals' binding to sex steroid receptors. Some phytochemicals, supposed to have a role in the functionality of the prostate epithelium, have been tested in a dose-dependent manner in both MTS and PSA secretion assays. In parallel, to establish the "effective concentration", in comparison to the "nominal one", the intracellular amount of each phytochemical has been assessed upon cell fractionation of LNCaP-treated cells and subsequent chromatographic measurements.
{ "pile_set_name": "OpenWebText2" }
The Greek prime minister George Papandreou's loss of power is not surprising: the reaction of Greeks to the 27 October agreement with its new tranche of austerity measures and the further undermining of national independence was devastating for the government. The next day, a military parade was abandoned as protesters occupied the streets, and the president had to flee; parades elsewhere were similarly interrupted. The political elites, who felt unassailable for 30 years, now sense the popular anger and are unable to comprehend or contain it. The call for a referendum was the irrational act of a regime that had lost touch with the people and was trying desperately to save its skin. Papandreou's gambit looked like a veiled threat to the eurozone authorities and was interpreted as such by leaders who have been strongly rebuffed in recent referendums by the French and the Dutch - where two of the core nations rejected the European constitution and ended aspirations for the creation of a European superstate based on neoliberal principles. "Referendum", a dirty word in the corridors of Brussels, evoked the fear elites feel when the people momentarily enter the political stage. But Papandreou's plan was not a late recognition or a democratic redress of the repeated humiliations visited upon Greeks, or a reassertion of sovereignty against the IMF and Germany. On the contrary, it was the government's attempt to regain the initiative against its own people clamouring to see it exit the stage. The inability to predict the angry reaction of the Europeans turns it into a dispiriting swansong of a dispirited and utterly defeated government, a blackmail that backfired. First, it was a threat to the Greek people, who with their protests over 18 months have turned Greece into an ungovernable country. Papandreou was telling them that unless they accepted the new catastrophic measures they would be condemned to leave the eurozone and suffer a further collapse of living standards. Second, it was addressed to backbench Pasok MPs, stirring in response to popular pressure and the disastrous opinion polls. They were asked to give a vote of confidence to Papandreou last Friday, under the James Callaghan principle that "turkeys do not vote for an early Christmas". But the gamble did not succeed. The Socialist MPs gave their confidence in order to delay elections and save the party from total collapse on condition that Papandreou resign and a national unity government formed. The frantic negotiations that followed between Pasok and rightwing New Democracy finally brought together the political elites in a big austerity coalition. Elections, initially planned for 4 December, will be delayed now as the two parties, obedient to European diktat, prepare to face a people who have largely rejected their political machinations. The eventual departure of Papandreou may be the best outcome of the Greeks' long struggle so far: hot on the heels of the Arab spring, a reminder that western governments too can fall if they abandon basic principles of democracy, social justice and independence. But the European involvement in this endgame is problematic. The picture of Papandreou dragged in to be reprimanded by Angela Merkel, Nicolas Sarkozy and the Eurocrats does not augur well for the future of the union. The decision to hold a referendum, the question to be put to the people or the composition of the government is a national political decision as in theory, Greece remains independent. The bailout is a loan (which will be paid back fully; the "haircut" relates to privately held bonds only). A loan to a sovereign government does not give the lending governments the power to treat the country like a protectorate. But this is what has been happening, increasing popular anger. The dispatch of colonial-type administrators to run the country under the recent proposals has now been completed. It is not only Papandreou: Europe's hubris is also exposed. The Greek people with their prolonged struggles and sacrifices will finally get rid of their government. The weakest link has fallen partly as a result of popular resistance. Now the dominoes will move west. The economic future of Greece will be difficult, but democracy has won. The elite's fear of "contagion" should not be just about the euro – they should also fear Greek resistance spreading across Europe.
{ "pile_set_name": "Pile-CC" }
Identified key tips on proper hair care These recommendations will help to maintain the excellent appearance of the hair. Healthy and lush hair, shimmering mirror reflections, does not the gift of nature, and the result of proper and careful maintenance. The choice of shampoo We will not open America if we say that the shampoo you should choose for your type of hair. Unfortunately, often this simple advice is neglected and buy a cure on the principle of “what the label prettier.” Thin, dull, electrified hair — here is the result of consumer negligence. For Shine and hair volume to choose tools of the trade series, whose quality is significantly better than usual. Applying balm Fat hair is often attributed to the hard work of sebaceous glands. But sometimes the reason is much simpler — wrong use of shampoo and conditioner. These funds should be applied from mid-length of hair, avoiding the roots. The “right” hair accessories When choosing a comb, barrette and other hair accessories, pay attention to the material from which they are made. The worst choice of the comb — metal. These combs not only damage the hair and scalp but also makes your hair like a cloud, but why electrifies the hair. Also choose wooden, plastic hair clips or accessories of other natural materials. By the way, one of the causes of split ends is improper combing of hair. I make it a rule to start from the ends, lifting higher, and never comb wet hair, it spoils their structure. Water temperature If you don’t want to spoil the condition of my hair, get used to wash your hair in cool water. Too high temperature not only does not benefit your strands, but can also be the cause of hair loss. Thermal protection In today’s fast paced whirlwind of life it is almost impossible to refuse the use of Hairdryers, stylers and ploek. We understand that, so we will not sing an ode to natural, offering to abandon the usual daily beauty assistants. Just try to dry your hair in cool mode, and before styling with hot Styler spray on the hair thermal protection. Smooth the ends Another mistake in hair care — neglect going to the hairdresser. Regular trimming of ends is not cutting you off from the coveted length hair, and is a necessary procedure which hair looks better and healthier. “Wind in the hair” Each of us have at least one photo where you are on the background of the sea, rivers, woods or fields, looking into the distance, and the wind plays so well with my hair. For photography is certainly a plus, but for your hair traumatic factor. For windy weather to buy a variety of hair pins for unruly hair, collect hair in a ponytail or braid Zapletal. In winter, wear a hat, and summer hat. Proper nutrition As you know, beauty comes from within. And we are not just about the magic of your soul. To gorgeous looking hair don’t forget to eat and forget, finally, about the mono-diet. Drink water, exercise, and the result will not keep itself waiting long.
{ "pile_set_name": "USPTO Backgrounds" }
A recording and reproducing system is disclosed in U.S. Pat. No. 4,680,647 which enables voice to be added to pictures obtained at the time of still picture reproduction of recorded information in a recording medium, by executing recording in a recording medium, for example, inserting a digital data including voice information after compressing the time base in a portion of a video format signal and by inserting video information in the remaining portion. The prior art reproducing processor for reproducing and processing a video format signal recorded in a recording medium with such a system is shown in FIG. 1. In FIG. 1, a disk 1 serving as a recording medium is driven to be rotated by a spindle motor 2. As the disk 1 is rotated, a signal recorded in the disk 1 is read by a pickup 3. The pickup 3 is carried by a slider (not shown) which is moved in the radial direction of the disk 1, and the information detection point (light spot for information detection) of the pickup 3 can freely be positioned in the radial direction of the disk 1. Further, various servo systems such as a spindle servo system, tangential servo system and tracking servo system are also provided. However, they are already well known so that they will not be shown here. The so-called RF (high frequency) signal output from the pickup 3 is supplied to a video demodulation circuit 6 after it is amplified by an RF amplifier 5. The video signal is demodulated in the video demodulation circuit 6 by undergoing the frequency demodulation processing of the RF signal. The demodulated video signal is supplied to a dropout correction circuit 7. To the dropout correction circuit 7 there is supplied, for example, a high level dropout detection signal from a dropout detection circuit 8. The dropout detection circuit 8 has a constitution in which a dropout detection signal is generated, for example, when the interval between the zero cross points of the RF signal exceeds a predetermined value. Further, the dropout correction circuit 7 is so constructed as to correct the dropout upon receipt of a dropout detection signal, by outputting the dropout section of the video signal by replacing it with the video signal at the time by 1H earlier from now. The output of the dropout correction circuit 7 is supplied to a time base error correction circuit 9. The time base error correction circuit 9 has a variable delay element of, for example, CCD, and is constructed so as to eliminate litters due to eccentricity of the disk or the like by delaying the output of the dropout correction circuit 7 by a time corresponding to the phase difference between the reference signal with a predetermined frequency and the horizontal synchronizing signal in the output of the dropout correction circuit 7. A video format signal whose jitters are removed by the time base error correction circuit 9 is supplied to a pulse waveform shaping circuit 10. The pulse waveform shaping circuit 10 consists, for example, of an equalizer having predetermined amplitude and phase characteristics. A video format signal which underwent pulse waveform shaping by which its amplitude is corrected and phase is compensated for by the pulse waveform shaping circuit 10 is supplied to a hue correction circuit 11 and a signal separation circuit 12. The hue correction circuit 11 has, for example, a variable delay element analogous to the time base error correction circuit 9, and it is constructed so as to eliminate jitters in chroma level by delaying the video format signal by a time corresponding to the phase difference between the color burst in the video format signal and a reference signal with a predetermined frequency. The output of the hue correction circuit 11 is supplied to a noise reduction circuit 13 with a constitution by which, for example, a micro level of the signal is detected and added to the original signal with reversed phase. After suppression of noise with this arrangement, the signal is supplied to a character insertion circuit 14. The character insertion circuit 14 has a constitution by which a video signal corresponding to the character indicated by the data sent from a system controller 15 is synthesized with the video format signal output from the noise reduction circuit 13. The output of the character insertion circuit 14 is supplied to the output terminal OUT. On the other hand, in the signal separation circuit 12, horizontal and vertical synchronizing signals and a control signal indicating the recording position inserted to the portion corresponding to a predetermined line in the flyback period are separated out from the video format signal and are supplied to the system controller 15. The system controller 15 is composed of a microcomputer consisting, for example, of a processor, ROM, RAM and the like, and carries out arithmetic operation based on a data or program stored in ROM, RAM or the like by a command supplied from an external equipment. The system controller 15 then supplies instruction signals such as play, pause, search and the like to a playing unit control circuit 16 and supplies a data designating a character to be inserted to the character insertion circuit 14. With the constitution as in the above, when a dropout is generated in a section where a digital data of a video format signal is inserted, the section is replaced by the signal precedent by 1H, creating an inconvenience that an uncorrectable error is generated in the digital data. Moreover, the amplitude characteristic and the phase characteristic of the digital data are set by the digital data waveform shaping circuit 9 so as to give a minimum read error rate. For this reason, there has also been a drawback in that the variable ranges in video making such as the adjustment of the amount of noise reduction and frequency characteristic for the section carrying the video information of the video format signal becomes narrowed down making it different to obtain a desired video.
{ "pile_set_name": "Github" }
namespace NuGetGallery.Migrations { using System; using System.Data.Entity.Migrations; public partial class CredentialLastUsed : DbMigration { public override void Up() { AddColumn("dbo.Credentials", "LastUsed", c => c.DateTime()); } public override void Down() { DropColumn("dbo.Credentials", "LastUsed"); } } }
{ "pile_set_name": "Wikipedia (en)" }
Mary Findlater Mary Williamina Findlater (28 March 1865 in Lochearnhead – 22 November 1963 in St Fillans) was a Scottish novelist. Born in Perthshire as the daughter of a minister of the Free Church of Scotland, Findlater wrote novels and poetry both alone (Songs and Sonnets, 1895; Betty Musgrave, 1899; A Narrow Way, 1901; The Rose of Joy, 1903; and others) and together with her sister Jane (Tales That Are Told, 1901; Beneath the Visiting Moon, 1923; etc.), with whom she lived until the latter's death in 1946. Their best-known and most widely admired collaboration is the novel Crossriggs (1908), re-issued in 1986 by Virago Press. Sources Jane Eldridge Miller, in the Oxford Dictionary of National Biography External links Category:1865 births Category:Scottish women novelists Category:1963 deaths Category:20th-century British novelists Category:20th-century British women writers
{ "pile_set_name": "Github" }
/* * Licensed to the Apache Software Foundation (ASF) under one * or more contributor license agreements. See the NOTICE file * distributed with this work for additional information * regarding copyright ownership. The ASF licenses this file * to you under the Apache License, Version 2.0 (the * "License"); you may not use this file except in compliance * with the License. You may obtain a copy of the License at * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, * software distributed under the License is distributed on an * "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY * KIND, either express or implied. See the License for the * specific language governing permissions and limitations * under the License. */ package org.ops4j.pax.web.samples.warjsf22cdi; import java.io.IOException; import javax.servlet.Filter; import javax.servlet.FilterChain; import javax.servlet.FilterConfig; import javax.servlet.ServletException; import javax.servlet.ServletRequest; import javax.servlet.ServletResponse; public class EncodingFilter implements Filter { @Override public void init(FilterConfig filterConfig) throws ServletException { } @Override public void doFilter(ServletRequest request, ServletResponse response, FilterChain chain) throws IOException, ServletException { request.setCharacterEncoding("UTF-8"); chain.doFilter(request, response); } @Override public void destroy() { } }
{ "pile_set_name": "Pile-CC" }
3.09.2017 Resisting Eyeshadow Palette Hype When I was first introduced to makeup around the age of 11 or 12, high end and midrange brands did not offer a ton of palettes, and the ones that were around were not the cornerstones of those brands. I got my first of the 2010s-hyped eyeshadow palettes my second year of college, the original Naked Palette from Urban Decay, and I used that bad boy every day for nearly 4 years. It was like my eyes (ha) had been opened to this whole new world of multiple eye looks and layering different shades in the same color family. The Naked palette was so popular because of its ease of use (all the shades were rather blendable and beginner-friendly) and its ability to flatter a fairly large range of skintones. Of course, there are many people who don't enjoy the Naked palette, but it definitely started what I think of as the modern-day Eyeshadow Palette with a capital E.P. The Allure Eyeshadow palettes are appealing for several reasons. First, they offer thrilling variety in a small package- usually the price tag is "reasonable" in midrange makeup terms, between $40 and $100, for multiple shades. People love to break down the price per oz for these palettes to show how much less expensive it is to buy one set of 10 shadows than to buy those same 10 shades individually at market price. A good deal (or the impression of one) is seductive to newbies and experienced makeup lovers alike. Second, eyeshadow palettes are generally speaking very visually appealing. They are almost always organized around a central theme, and designed and laid out in a way that sparks ideas for creative combinations and is just overall lovely to look at. If you've ever heard of the somewhat nastily-named Cheerleader Effect, where a group of girls (or guys!) looks more attractive as a whole because they are grouped together, than they look individually, then you can start to understand why eyeshadow palettes seem to be so pretty on first glance. Pretty things look alright by themselves, but they look gorgeous when paired with 9 other pretty things. There's a "greater than the sum of its parts" thing at play here and it yields a love at first sight feeling which can wear off once you buy the palette and take it home. Third, eyeshadow palettes do play into the collector's mentality that a lot of makeup users start to take on after a few months or years involved in the hobby. There's this idea that if you own all the hot eyeshadow palettes, you are in good company of makeup lovers who have it all. We can't deny the temptation and tendency for people to desire a sense of belonging to a community, especially when the members of that community promote their image and personal brand as something worth emulating. The Nefariousness Because makeup companies only really have to hook you on one special awesome shade per palette to potentially get you to purchase the whole thing, they have 10 opportunities to catch 10 unique customers, all who will be paying $50 for 10 eyeshadows, a "good deal" by all accounts. But those customers, if they weren't presented with the 10 shadow palette, would only be "worth" the $10 they would have paid for a single shadow in that one appealing color. That's why you'll often see a brand offer such a good price per oz with their palettes...it costs them basically nothing to produce the colored dust that goes into a palette, and it makes you much more likely to spend more money for the variety and "value" that you perceive as a customer. It's tempting to go for "good deals" because everyone likes to feel like they're getting something for nothing. In a palette, you're sold the idea that you're paying for a few key shades and getting the other ones for free! But as economists like to smugly say (myself very smugly included): "There's no such thing as a free lunch." When you get something, you are giving up something in return, whether you're aware of it or not. In the case of buying a shadow palette, you are paying the company money you could have otherwise spent on...food, rent, savings, or another makeup item. You might be fine what you pay for it, but you aren't getting away with murder by paying a price that you perceive as a steal. Sometimes the price you pay isn't represented by only the dollar outlay on the item. Sometimes the price is a certain amount of psychological burden. Many people who own too much makeup express feelings of being overwhelmed or wasteful. While everyone's threshold for consumption varies, if you personally are negatively affected by clutter, then all things considered, it's not a good thing to increase your consumption. Because of this reasoning, I do not consider "free items" or free shades to be truly free. If someone were to offer me a sample in a mall, and I had no interest in it, what could be gained by taking it? Nothing. In the eternal words of Kanye West: When to Buy a Palette All things considered, why would you buy one? There are actually many instances where I think an eyeshadow palette can be a sensible and useful purchase. I'll show an example and explain my reasoning behind an actual palette purchase I made in real life...and an example where I was able to talk myself out of the palette purchase as it didn't make sense for me. Pictured below is Lime Crime's Venus Palette, which I ended up purchasing after going through the thought process I'll outline. I got this palette discounted and brand-new, which put the price at $22.50 for the whole thing. The first step is to abandon the lies you tell yourself- that you will use that greige in the palette when all you like to wear is warm browns, that you need the champagne highlight shade when you already have 6 or 7 of them. Whatever shades are useless to you- they are automatically eliminated from the "value" of the palette. Don't attribute fake value to things that have none to you. Right off the bat, I eliminated the "value" for Aura, Shell, and Muse. Aura looks exactly like every other pale champagney gold shadow out there- I own several. I wouldn't be getting any incremental extra eye possibilities/looks out of this shade. Muse is a near-perfect dupe for MUFE Morello Cherry which I already own and love. Since it overlaps almost entirely with the red matte I own, I can't use it for any new looks either. As for Shell, it's the pale pinky gold shade that I know from experience looks very bad on my skin tone and eye shape. While I technically liked and could use the first two shades, in the context of my existing collection, they aren't extremely useful or necessary for me. I would never purchase those colors if I found them in single form, since I already own them. For the last shade, I wouldn't buy it or use it period, even once I got the palette. It's not a repeat of something I own, because I hate the color. 8 shadows total - 3 useless shadows = 5 valuable shadows Next, let's look at the shades which some might consider "bonus" value that aren't really what attracted me to the palette- here that would be the shade Venus, a satiny raspberry pink that's not really my style, but isn't abhorrent to me. It's not similar to anything I own. I'm going to count it as a half a shadow in terms of its value. That puts us at 4.5 potentially valuable shadows. At this point let's take the base price and see if the price tag is worth the 4.5 shadows I'm getting (remember the 3 shadows I won't use do not count toward the perceived or actual value of the palette, I will not be calculating $/g) $22.50 ÷ 4.5 shadows = $5.00 per useful shadow At this point I have to decide if each of the shadows in the palette are worth a $5.00 price tag. For me, these shadows definitely qualified as "worth it." However, if I had had to pay the full price of $34.00 here's that calculation: $34.00 ÷ 4.5 shadows = $7.50 per useful shadow And yep that's still worth it to me. I was in the market for a rusty orangered shade, a very dark burnt brown, a violet-gray matte, and a medium bright coral matte. It just so happens that this palette is almost exactly what I wanted, and the price for these unique shades, which can be found as singles but at much higher price tags, is definitely worth it in this case. What this calculation allowed me to do is see what I want and what I don't want from within a purchase, in order to rationalize and justify the true value and not be disappointed once I brought the product home. In addition, I depot all my eyeshadows and use them in travel palettes, which means I don't acquire baggage from unused/useless shadows. I throw them away or put them in storage. That option isn't available to everyone and should be factored into your calculations as those shades will take up space in your collection and lead to clutter and negative emotions in some cases. When Not to Buy a Palette This exercise isn't just a way for you to excuse buying eyeshadow- it's a tool to decide what's right for your collection and what's wrong. Here it is repeated for a palette which I ended up passing on. Here is a picture of the Viseart Dark Matte Palette, which costs a whopping $80.00 and comes with a fabulous reputation for blendability and pigmentation. For a while, I was totally convinced I would get this palette. All of my muted, matte, blendable dreams come true- right? I read nothing but rave reviews about the versatility and the quality of all the colors, which should mean that it offered 12 valuable, useful shadows! Well, you know enough about me to know that I'm just leading you on. I didn't buy this palette. If I could use every single shadow in this palette, the breakdown would be: $80.00 ÷ 12 shadows = $6.66 per useful shadow I always hear people gushing over the price per shadow in the Viseart palettes- what a steal for such a high-end product. However, I wouldn't use all 12 of these shadows. First off, I do not wear blue eyeshadow- ever. I don't own a single other blue or blue-adjacent eyeshadow and it's not something I currently need in my collection. That eliminates the 2 blue matte shades in the lower left corner. 12 shadows total - 2 useless shadows = 10 valuable shadows Then we have the 3 brown/true-neutral shades in this palette. They are all slightly different in undertone but would all qualify as neutral medium brown mattes. I own 4-5 of those types of shades in my collection already. There's a chance that all of these browns would be great on my skintone, but why bother finding out? I already have so many for the purpose that I'd use these for. I can eliminate all of these- and most eyeshadow lovers with any semblance of a collection could do so as well. Good neutral shades are a dime a dozen, and it's odd to me that the 3 in this palette are so similar to each other. 10 shadows - 3 more useless shadows = 7 valuable shadows Now we're down to the meat of the palette- 7 shadows that I might use, that are either going to be unique or distinctly superior when compare to what I already own. What I am really eyeing here is the 2 darker orange shades and the lighter purple shade. I have dupes that I love using for the lighter orange and for the darker purple and red. Finally, there's the one sage green matte shade unaccounted for. I love the way it looks- it seems gorgeously pigmented and blendable. I definitely want something like it, but I hadn't even thought to look for it before I saw this palette, which means it's not a huge priority clearly. We'll count it as a half-useful shadow. I'd use it if I had it but I don't think I'd go out and search for a single right this minute. I also have a lighter khaki green matte that stands in for it when I do require a green matte. 7 shadows - 3.5 dupeable shadows = 3.5 valuable shadows Our ultimate calculation, once I take out all the fluff and the lying to myself about what I'll use becomes this: $80.00 ÷ 3.5 valuable shadows = $22.86 per shadow If these shades were so incredibly unique that I couldn't find them anywhere else, I would consider still buying this palette for just these 3 shades. However, at nearly $23 a pop, I can find similar shades within even the most expensive single shadow lines (NARS, MUFE, etc) and so there's no reason for me to pay and acquire all the extra baggage of those useless-to-me shadows anyway. Add that to the fact that the Viseart palettes seem difficult to depot (they are made of plastic not cardboard) and I'm unlikely to want to keep this palette in my collection because the useful shades will be "crowded out" by all the useless ones. Packaging and its Impact There is an issue I did not factor into my calculations above because it's insignificant to me- packaging. I know that there are people out there who love pretty packaging, and I don't hold that against them. If you fall in that category, I would say you should come up with a dollar amount for how much good/attractive packaging is worth to you. Are you willing to pay an extra $5.00 per palette just for a beautiful layout and exterior? An extra $30.00? Where is the cutoff for you? Everyone likes pretty things, but you should figure out, within your budget and lifestyle, how much packaging is worth to you in terms of cold hard cash. Formula Preferences Because there are so many textures and variations within the category of eyeshadows (further segmented into finish- matte, shimmery, satin) there is a large spread of what people consider good formula and bad formula eyeshadow. My preferences aren't the same as everyone's, and the point here is to figure out what textures work best for your skin type and eye shape, and forget the rest. A good way to stop yourself from making a rushed palette purchase is to first go test the formula out in-person. No matter how appealing the colors may be on a computer screen, if the shadows themselves are too densely pigmented/not pigmented enough/chalky/streaky/too glittery, the colors won't do you any good. When you buy a shadow palette, you are buying 10-15 shadows produced and approved by the same chemistry and marketing teams. That means that if the people on those teams have a different taste than you, or they consider a certain type of formula good that you hate, you will not only hate a few of the shadows in a palette, you may possibly detest every single one of them. I really love Urban Decay's shimmer formula. I find it dense, rich, and superbly long-wearing on my eyes. However, I hate their microglitter formula. It's the shimmer formula with chunky, horrible flakes of glitter thrown in for no good reason. I like their satin formula fairly well, but I don't really enjoy their mattes. In any given Urban Decay palette, I will likely find some of each of those 4 finishes. If I only really like 2 of the finishes that Urban Decay makes, I'm already compromising on my preferences just by allowing the company to bundle up multiple shadows for me. By buying single eyeshadows, I'm able to be more picky about what I allow into my collection. Conclusions We all have different tastes and lifestyles, which means the way I weigh value and perceive it will be different from yours. But everybody has a limit on what is reasonable consumption and ownership. You need to figure out what your ideal eyeshadow collection looks like, what gaps you want to fill, what gaps exist that you have no need to fill (not everyone needs every color in the rainbow) and how to best build toward that goal with the least clutter, the least unnecessary expenditure, and the most ease. I do my eye makeup probably 3-4x per week, and I consider myself more on the maximalist end of the eyeshadow spectrum. I like to use 6-7 shadows per look, which means I do have a flexible, large collection. Even so, I think you'll see my shadow collection, which was built up very slowly and carefully, has less bloat than someone's who owns a wide variety of pre-made palettes. I don't say that to be snotty, but it is a point of pride for me. I enjoy indulging in fantastical colorful makeup looks without feeling that I had to sacrifice and enormous amount of money or space to allow me that flexibility. Even though I enjoy a variety of eyeshadow colors, I do not have one of every type of shade, in every finish. I believe that I am only capable of wearing certain types of shadow (finish and shade) because of my skintone, my lifestyle, and my taste. My collection is not everyone's ideal collection- but it is mine, which is what matters. You do not need to collect them all- no one person (non-professional MUA or professional pretty person) is going to need every type of color. You do not become magically better at makeup when you acquire more colors. There's a finite limit to how many shadows you can reasonably enjoy and get use from- although that limit does vary from person to person! Every shade of eyeshadow I own To give an idea of the flexibility of my collection, here's the configuration of shadows I bring with me when I go away for a weekend: Because I love me a boring neutral color scheme When I plan a more colorful look the night before, I like to set out a small palette with just the shadows I need to avoid confusion or overwhelming colors in the morning: Weirdly, what I need for a green smoky eye And on any given day, when I just want to have an organized way to remember where everything is, I have my collection divided roughly by color category and purpose. I know from lots of experience that my most-worn eye looks are purple-themed. Purples make my eyes pop and my skintone sing. I have a whole large palette dedicated to purples. Besides that, I have a general neutrals palette where I keep the majority of my browns and tan shades. Most are warm because I am warm-toned. I also have a more burnt, obviously-warm palette with yellows and oranges, as that's another colorful category I enjoy. And last I have a mixed palette of "other colors," which means the adventurous shades that I wear on occasion but not on a daily or even weekly basis (many of my neutral/cool shades are found here as they aren't my preferred color scheme.) My eyeshadow collection and its "organization" most days Because every single shadow I own has been removed from its original packaging (or I purchased it as a solitary pan) I can mix and match endlessly with no constraints. I find that to be so helpful for my consumption goals and my own sense of organization. I like not having to choose between a compact solution (for a short trip) and the color variety I want. My favorite part of having such a mix and matchable group of eyeshadows is that I can recreate or imitate basically any newly-released palette I'm interested in. Here's my "recreation" of the Anastasia Modern Renaissance Palette... Too Faced Sweet Peach Palette... Smashbox Cover Shot Smoky Palette... Are these recreations perfect? Nope. Do I care? Hell no. The point is not to ape and duplicate every minute detail of every trend that comes along- it's to take inspiration from rightfully-popular and beautiful things in a way that's not unhealthy or overwhelming. If you love this type of topic then please do visit Reddit's /r/MakeupRehab. The community there is extremely supportive and intelligent when discussing matters of consumption and overconsumption. Shopping habits can become unhealthy, and when your love for makeup starts to infringe on your happiness of your finances, you are going to have to set it straight. 18 comments: Thank you! Just out of curiousity did you find this post through reddit or instagram? And are there any Makeup Rehab-ish topics you'd be interested in me breaking down in a future post? Thanks for the support! Loved this! Just out of curiosity, what are the smaller circular pans(standard singles I assume?) in your purple palette? I've been slowly planning a purple palette and those darker ones look like they might be a good fit. The smaller purples are almost all MAC singles! They dropped the price of the pans alone this year so they're a steal if the color is right for you. But they don't have the same type of magnetization as most pans (tin, etc) so they need a small magnet or a trimmed piece of magnetic sticker sheet to go on the back before putting in a similar palette :) Fantastic post. I love seeing all your shadows together and in combinations. I love the idea of being able to make one's own quads, palettes or whatever drawing inspiration from other products... or from whatever inspires. I came over from Reddit :-) BRAVA! Seriously awesome article that hit home in a lot of ways. If you don't mind me asking, I personally have a thing for neutral-leaning-cool browns/taupes/champagnes (don't we all). The main thing that keeps drawing me in is I'm always tempted by the idea that while a color might look the same in the pan, the undertones might play differently with my skintone. Granted, this has actually happened a couple of times, but for the most part I think I'm just being a sucker for reviews. How are you so good at identifying dupes in your collection? You seem to have a pretty good handle on what works for your skin, so maybe that's my issue. I think regarding that aspect, you really do have to "get to know" your skintone as well as possible! That's why I own SO FEW of the taupes- bc they work poorly on my skintone. Once you find 3 or 4 AMAZING perfect versions of the taupes/browns you love, you truly will feel satisfied. That's how I am with warm browns- you wouldn't know I'm a warm brown addict because I don't have that many. But that's just it- I found 2 or 3 perfect ones and I never had to look again. As for the dupe issue, I can't recommend Temptalia's site enough for swatch-comparisons. But beyond that, going to visit Ulta/Sephora/MAC in person is good. Go on swatching trips for an hour with the stated purpose of finding out what is similar to what you already own. You can even bring your shades with you and swatch them on your wrist in the car before you go in the store to test out potential new purchases! Hey there! I love your post, and will be bookmarking it to read before future sephora trips! Quick question- what brand are the purple rectangular eye shadows? Also, the longer rectangular shadows? They're gorge!!
{ "pile_set_name": "Wikipedia (en)" }
MM algorithm The MM algorithm is an iterative optimization method which exploits the convexity of a function in order to find their maxima or minima. The MM stands for “Majorize-Minimization” or “Minorize-Maximization”, depending on whether the desired optimization is a maximization or a minimization. MM itself is not an algorithm, but a description of how to construct an optimization algorithm. The expectation–maximization algorithm can be treated as a special case of the MM algorithm. However, in the EM algorithm conditional expectations are usually involved, while in the MM algorithm convexity and inequalities are the main focus, and it is easier to understand and apply in most cases. History The historical basis for the MM algorithm can be dated back to at least 1970, when Ortega and Rheinboldt were performing studies related to line search methods. The same concept continued to reappear in different areas in different forms. In 2000, Hunter and Lange put forth "MM" as a general framework. Recent studies have applied the method in a wide range of subject areas, such as mathematics, statistics, machine learning and engineering. Algorithm The MM algorithm works by finding a surrogate function that minorizes or majorizes the objective function. Optimizing the surrogate function will drive the objective function upward or downward until a local optimum is reached. Taking the minorize-maximization version, let be the objective concave function to be maximized. At the step of the algorithm, , the constructed function will be called the minorized version of the objective function (the surrogate function) at if Then, maximize instead of , and let The above iterative method will guarantee that will converge to a local optimum or a saddle point as goes to infinity. By the above construction The marching of and the surrogate functions relative to the objective function is shown in the figure. Majorize-Minimization is the same procedure but with a convex objective to be minimised. Constructing the surrogate function One can use any inequality to construct the desired majorized/minorized version of the objective function. Typical choices include Jensen's inequality Convexity inequality Cauchy–Schwarz inequality Inequality of arithmetic and geometric means Quadratic majorization/mininorization via second order Taylor expansion of twice-differentiable functions with bounded curvature. References Category:Optimization algorithms and methods
{ "pile_set_name": "OpenWebText2" }
Estaba todo atado. Enrique Álvarez Conde, catedrático y director del máster que supuestamente realizó Cristina Cifuentes, llegó a instruir a las tres profesoras que figuraban en el acta falsa como miembros del tribunal que evaluó el trabajo fin de máster en todos los detalles. En las reuniones con abogados para abordar el caso, llegó a manejarse cómo debían abordar las preguntas ante la comisión de investigación universitaria. Debían recordar hasta el tipo de ropa que llevaba Cifuentes —sin demasiados detalles por el tiempo transcurrido— aquel 2 de julio en Vicálvaro al defender su máster: "Colores claros", era la consigna. Así lo afirman fuentes del Instituto de Derecho Público de la Rey Juan Carlos. Ni Álvarez Conde ni las profesoras han querido dar su versión a este diario. La versión de Cristina Cifuentes es que ese 2 de julio, en plena celebración de la Eurocopa de 2012, con cientos de miles de personas en las calles de Madrid cuando ella era delegada del Gobierno, se escapó a Vicálvaro a defender su trabajo fin de máster. Pero eso tenía cimientos endebles. Ese día debía haber un tribunal para ver ese resumen y puntuarlo. Cuando estalló el escándalo el pasado 21 de marzo desvelado por 'eldiario.es', la universidad aportó un acta con una composición del tribunal: Alicia López (presidenta del tribunal), Clara Souto (vocal) y Cecilia Rosado (secretaria). Son tres discípulas de Álvarez Conde. Solo una es titular de la plaza. El director del máster: "El rector me sometió a una enorme presión: 'Enrique, arréglalo" Rafael Méndez El catedrático que dirigió el máster sostiene ahora que no hubo una reconstrucción de un acto administrativo sino un documento interno para el rector, no un acta oficial Ellas eran el eslabón débil. En unas horas se recreó el acta (con dos firmas falsas) y después todo se basaba en que los conocedores del tema mantuvieran la misma versión. No podía haber fisuras o el plan saltaría por los aires. Álvarez Conde las conminó a firmar apelando a su ascendencia sobre ellas, a la importancia que tenía para la universidad enterrar el caso y que no tuviera más trascendencia. A su vez, él había recibido una llamada del rector para conseguir un acta en un tiempo récord para tapar el escándalo. La Universidad Rey Juan Carlos venía de tener un rector dimitido por plagio y no quería nuevos escándalos. Colores claros y una fecha que cuadrase: así era la coartada falsa para cubrir a Cifuentes Una de las cosas que hicieron fue buscar una fecha creíble. La mejor para Cifuentes era otro día de julio, probablemente el 5 de julio de 2012, siempre según fuentes del Instituto de Derecho Público. Pero al chequear sus agendas descubrieron que ese día las tres profesoras daban clase en un curso de verano en Aranjuez. La siguiente opción fue el 2 de julio. Ese mismo día se inauguraba el curso, pero eso es solo un acto protocolario y nos les impedía estar —supuestamente— después de comer en Vicálvaro, a 50 kilómetros de Aranjuez. La primera fecha elegida era imposible porque las tres profesoras estaban en Aranjuez dando un curso Sabiendo que el diablo está en los detalles, pensaron que convendría dar pinceladas de aquel caluroso día. Aunque Cifuentes acostumbra a usar colores vivos, el blanco pareció adecuado. El plan era no dar una descripción muy detallada, sino esgrimir que la presidenta lucía colores claros. Nadie podría poner en duda que tres profesoras se inventaran eso. Tampoco cabía esperar que dieran muchos detalles seis años después, por mucho que enfrente tuvieran a la delegada del Gobierno. Sin embargo, el plan se desbarató pronto. Las profesoras guardaron un silencio sepulcral durante días, pese al intento de los medios por abordarlas. En ningún momento comprometieron su palabra. Pero llegado el momento decidieron no seguir esa versión en una declaración oficial. La falsificación en documento público es un delito y era previsible que el caso acabara en la Fiscalía, como así ha sido. La primera en declarar, Alicia López, dijo que esa no era su firma y que ella nunca evaluó a Cifuentes. Colores claros y una fecha que cuadrase: así era la coartada falsa para cubrir a Cifuentes Ya no había componenda posible. Álvarez Conde consiguió retrasar su declaración —inicialmente prevista para el miércoles— hasta que declarara alguna profesora. Las otras dos supuestas integrantes del tribunal están de baja médica por el enorme estrés que están sufriendo. Es dudoso que tras lo sucedido alguna hable ya de los colores claros. Cifuentes ha declarado que ella no se acuerda de la composición del tribunal que la evaluó (y le dio supuestamente un 7,5) y que si hay alguna irregularidad es de la universidad, quien le proporcionó el acta como coartada.
{ "pile_set_name": "StackExchange" }
Q: PHP stream timeout if no data is transferred I am currently implementing a PHP class that fetches image files and caches them locally. These images may come from other local sources, via HTTP or via HTTP using the Guzzle client. With PHP stream wrappers I should be able to handle all sources the same way. What I am now trying to do ist to implement a timeout if no data is transferred through the stream. This should handle the following cases: The stream cannot be established in the first place. This should probably be handled at the fopen call and not with a timeout. The stream is established but no data is transferred. The stream is established, data is transferred but it stops some time during transfer. I think I can do all this with stream_set_timeout but it isn't quite clear to me what this actually does. Does the timeout apply if any operation on the stream takes longer than allowed, i.e. I can do something that takes 0.5 s twice with a timeout of 0.75 s? Or does it only apply if no data is transferred through the stream for longer than the allowed time? I tried to test the behavior with this short script: <?php $in = fopen('https://reqres.in/api/users?delay=5', 'r'); $out = fopen('out', 'w'); stream_set_timeout($in, 1); stream_copy_to_stream($in, $out); var_dump(stream_get_meta_data($in)['timed_out']); Although the response from reqres.in is delayed 5 s I always get false with a timeout of 1 s. Please can somebody explain this? A: I would recommend you use file_get_contents and file_put_contents instead of streams, they support all the wrappers and you can pass contexts to them like you can to fopen. They're a lot easier to use in general since they return and accept strings instead of streams. That being said, I don't know the nature of your caching mechanism and if streams are better for your use case, more power to you :) The Problem The problem here seems to be a misunderstanding of how fopen works with the http stream wrapper (which I didn't fully understand either until I tried it out) in blocking mode. For GET (the default), fopen seems to perform the HTTP request at the time of the call, not at the time the stream is read. This would explain why stream_set_timeout does not function as expected, as it modifies stream context after fopen is called. The Solution Thankfully, there is a way to modify the timeout before fopen is called, rather; you can call fopen with a context. Passing the context returned from stream_context_create (as Sammitch linked) to fopen timeouts correctly for all three of your cases. For reference, this is how your script would be modified: <?php $ctx = stream_context_create(['http' => [ 'timeout' => 1.0, ]]); $in = fopen('https://reqres.in/api/users?delay=5', 'r', false, $ctx); $out = STDOUT; stream_copy_to_stream($in, $out); var_dump(stream_get_meta_data($in)['timed_out']); fclose($in); Note: I assumed you meant to copy the stream to stdout instead of "out", which isn't a valid stream on my platform (Darwin). I also fclosed the in stream at the end of the script, which is always good practice. This would create a stream with a timeout of 1, starting when fopen is called. Now to test your three conditions. Validating behavior The stream cannot be established in the first place. This should probably be handled at the fopen call and not with a timeout. This works properly as is -- if the connection can't be established (server offline, etc), the fopen call triggers a warning immediately. Just point the script at some arbitrary port on localhost that nothing is listening on. Do note that if the connection wasn't successfully established, fopen returns false. You'll have to check for that in your code to avoid using false as a stream. The stream is established but no data is transferred. This scenario works as well, just run the script with your normal URL. This also makes fopen return false and trigger a warning (a different one). The stream is established, data is transferred but it stops some time during transfer. This is an interesting case. To test this, you can write a script that sends the Content-Length and some other headers along with some partial data, then wait until the timeout, i.e.: <?php header('Content-Type: text/plain'); header('Content-Length: 10'); echo "hi"; ob_flush(); sleep(10); The ob_flush is necessary to make PHP write the output (without closing the connection) before the sleep and the script exit. You can serve this using php -S localhost:port then point the other script to localhost:port. The client script in this case does not throw a warning and fopen actually returns a stream with timed_out in the metadata set to true. Conclusion stream_set_timeout does not work with HTTP GET requests and fopen in blocking mode because fopen executes the request when it's called instead of waiting for a read to do so. You can pass a context to fopen with the timeout to fix this.
{ "pile_set_name": "Pile-CC" }
Montana Dawn: McCutcheon Family Series, Book 1 When Luke McCutcheon finds Faith Brown about to give birth in her rickety wagon, his first instincts are to ride for help. Instead, he stays and delivers a beautiful baby girl. Unable to leave the pretty young widow and her little son and newborn unprotected in the Montana wilderness, he brings them along on his family's cattle drive, to the absolute delight of the other friendly cowboys. Texas Twilight: McCutcheon Family Series, Book 2 Fresh out of medical school, John McCutcheon finds his stagecoach under attack by brutal outlaws. With the help of a feisty acquaintance Lily Anthony, he manages to fend off the assault. Lily is attracted to the charming cowboy-doctor, with his chiseled good looks and teasing ways, then heartbroken to learn he's engaged to be married. Loved Caroline Fyffe's Texas Twilight! I enjoyed the print book so much I was interested in listening to the audio version. I found this form to be delightfully entertaining, especially wh..Show More »en my eyes are too tired to read any longer. I really thought Brant Bolton did an excellent job with all the characters especially the men. Although his version of Tante Harriett, Lily's edlerly aunt was delightful! Mail-Order Brides of the West: Evie: McCutcheon Family Series, Book 3 The well-educated daughter of a lawyer, Trudy Bauer, arrives at the St. Louis based Mail-Order Brides of the West agency full of excitement for an adventure of a lifetime. She befriends the agency's maid, Evie Davenport, and the two form a strong and lasting friendship. They vow to stay in contact through letters when Evie takes hold of her destiny and arranges a marriage on the sly. Each brave young woman is ready to face whatever an unknown groom and life in Montana can throw her way. A delightfully witty western romance! In this book by Caroline Fyffe, we get to know Evie Davenport. Evie has worked as a maid for the Mail Order Brides ever since her mother died. One..Show More » day Evie steals a letter and answers it as a prospective bride. Evie sets up a contract with Chance Holcumb in Why Not, Montana and sets out to become his bride. I smiled through out this most of this book. It was hilarious when Evie freaked over a Spider. I laugh because I always scream too! This book was so good, I started it this afternoon and listened to the entire book! In this book we learn such things as making a Chocolate Mashed Potato Cake. That was a new one for me. Evie can clean a house like no one else, but she can't cook. I just loved to see the relationship between Evie & Chance blossom. At one point, I even wanted to kick Chance & tell him to straighten up or else! I found this story to be a witty, charming, sweet ,western romance! To sum it up, this book is FUN! Even the Epilogues in these books are fun! I loved the multiple voices i n this story. The voices of Chance & Evie were especially spot on. They sounded very authentic to me. The narrator, Lara Asmundson did a great job reading this book once again! The story itself was quite captivating. Caroline Fyffe had me sitting at my desk the whole night. Silly as it is, I couldn't turn it off as I was afraid I would miss something! Thank you ladies! Mail-Order Brides of the West: Heather: McCutcheon Family Series, Book 4 Mail-order-bride-to-be Heather Stanford dreads the day the matron of the St. Louis bridal agency finds her a husband and sends her west. Heather actually has no desire to marry; she just wants to free her struggling family from the financial burden of another mouth to feed. Still, she holds true to her plan when the fateful day arrives and Mrs. Seymour sings the praises of her prospective groom. Moon Over Montana: McCutcheon Family Series, Book 5 The long-awaited wedding date has finally been set, but when a young Cheyenne woman shows up in the loft of her family's barn, life as Charity McCutcheon knew it is thrust into chaos. Secrets her parents and brother Luke have held now explode, with the power to shake her foundations. Wonderful story! The characters. I love all of the McCutcheons, but Charity is special. Great story. Love the narrator. Mail-Order Brides of the West: Kathryn: McCutcheon Family Series, Book 6 Kathryn Ford knows one thing for sure; she will not marry the boring, arrogant man her father has arranged for her since the day she was born, simply as a pawn to enrich his vast holdings. When she discovers she's been disowned for her defiance, the pampered socialite takes her destiny in her own hands. Determined to show her father what a capable a woman she is - without his help or interference - she signs up to be a mail-order bride, totally prepared to give up all the luxuries of her previous life. Kathryn This is a wonderful book. Loved the interaction between the brides and their husbands. The narrator was really really good!
{ "pile_set_name": "PubMed Abstracts" }
Spectroscopy by grating synthesis. Spectral information obtained by synthesis of two or more diffraction gratings is studied. Also the case of two gratings with relative motion and the case of N fixed gratings are discussed. We show that, using grating synthesis, it is possible to obtain transfer functions that increase the total obtainable information with respect to the single grating. The possibility of building a synthesis spectroscope is presented, taking into account both the gratings aberration and some construction imperfections. Finally we show that this synthesis method, with a proper numerical elaboration, gives practically the same information as we can obtain with a single equivalent grating.
{ "pile_set_name": "Pile-CC" }
This video sure does make my blood boil.In my view,there is nothing more offensive and distasteful in this world than a pugilist that conducts himself in such a morally repugnant manner.He must be humble,he must be quiet in his demenour,and he must always pay respect to his opponent. Boxing is a noble,honest sport,and even if these men are prepared to batter their opponent into a coma,it's essential that these men conduct themselves as gentleman on a public platform at all times. Not that I'd call Tex Cobb especially mouthy or ****y in the spirit of the thread, but he came out with some absolute beauties over the years.... 'Earnie Shavers was the only man I knew who could hit you in the neck and break your ankle'. Or to Renaldo Snipes when he objected to Cobb's statement referring to Ali, Foreman, Holmes, Frazier et al as the 'baddest n****** in the room'. ''Don't worry Mr Snipes, I wasn't talking about you....'' Funnier than Ali by a mile imo. "Will you try to fight Holmes on the inside, Tex?" "No, I'm gonna stand on the outside and throw rocks!" To referee Steve Crosson during a break in the action against Larry: "You're white. Help me!" "Tex, does Shavers hit hard?" "I wish I could give you an intimate knowledge of that!"
{ "pile_set_name": "StackExchange" }
Q: Voltage reference sampled by ADC (12 bit) gives value that is off by more points than other measurements I am using the TI REF3020 voltage reference (2048mV) in combination with a microcontroller in order to have a reference for voltage measurements. The microcontroller is powered by 5V (5.00V), the MCUs ADC Reference is set to 5.00V too. Due to the fact that I don't want to rely on the VDD rails being referentially stable, I wanted to add a precision voltage reference. In my test setups, I can easily measure the VDD (ADC reference) voltage and calculate the voltage to ground of an ADC input pin. For testing purposes, I used an external power supply as an input for an ADC pin. After measuring the voltage at the pin with an oscilloscope and a DMM, the MCU measured, without any further calibration, the actual correct voltage down to the LSB of the ADC. (I am using a 12-bit ADC) This experiment was successfully carried out with multiple voltages between 0V and 5V. I further used the aforementioned REF3020 voltage reference in the same setup as an input for an ADC. Both oscilloscope and DMM confirmed precisely 2.048V. Measuring the same voltage with the MCU via an ADC, the value was off by 15 points. Instead of a bit-value of 1677, the MCU measured 1663:$$U=\frac{1663}{4095}\cdot5V\approx2.0305V$$ The value measured by the MCU does not oscillate nor drift over time and the (to be honest, relatively narrow window of) temperature I tested. The (averaged) value constantly stays at 1663. Without averaging, the value ranges from a minimum of about 1660 to 1666. The influence of temperature should be negligible though, because the other experiment was conducted at the same temperature (room temperature). For this application I am using an average of 128 samples in a time window of about 4ms. I even tried to make the sample and compare times longer. Did not help either. The voltage reference is even a high-current one. It can safely supply up to 25mA according to the datasheet. This should by far be enough to be sampled by a single ADC channel. There are no other loads connected to the voltage reference. I could easily calibrate the offset error, but this would in essence defeat the whole purpose of the voltage reference in this application. What else could be the cause for this deviation that manifests only when measuring the voltage reference's output voltage? A: Try providing a little more settling time (a few msec) before taking each measurement. By this I mean time between when the ADC channel is selected and when the conversion starts. I use the REF3020 and it has poor response to changes in load, even though it can provide high current into a fixed load. You won't see it with a DMM or even a scope because it's hard to set the trigger set very fine.
{ "pile_set_name": "Pile-CC" }
Related Articles Five Palestinians were wounded, one of them critically, after an Israeli artillery shelling targeted the area of ​​Khuza’a east of Khan Younis city, southern Gaza strip, on Wednesday morning. Local Palestinian radio reported that five Palestinians were wounded after the Israeli artillery fired five shells in the vicinity of a school in the area. The radio added that the shelling was followed by firing intense fire in the area. Al-Aqsa TV reported that the Israeli army shelled the area under claims that a group of civilians were approaching the border fence.
{ "pile_set_name": "OpenWebText2" }
Marty Schladen El Paso Times AUSTIN — Residents and workers at State Supported Living Centers in El Paso, San Angelo and Brenham, Texas, are using bottled water after tests detected unacceptable levels of lead in their water. Also, plumbing and fixtures that might be responsible for the contamination are being replaced, said a spokeswoman for the Department of Aging and Disability Services, which administers the homes for the disabled. However, the agency hasn’t decided whether to test disabled residents and their caretakers to see whether they have high levels of lead in their bodies. An advocate is asking why. “I’m kind of stunned,” Dennis Borel, executive director of the Coalition of Texans with Disabilities, said Wednesday. “It seems to be like it should be a slam dunk.” The elevated lead levels were detected after the department began testing in January. Test results the department sent to the El Paso Times this week show that in one case, lead was measured at 104 parts per billion at the El Paso center, or almost seven times the limit recommended by the federal government. At the San Angelo center, one test detected lead at 118 parts per billion, or almost eight times the recommended limit. A sample taken at the Brenham Center had 266 parts per billion, or 18 times the recommended limit, the Dallas Morning News reported. Brenham is west of Houston. Elevated lead can cause developmental problems in the central nervous systems of children. In adults, lead has been linked to heart and kidney disease and reduced fertility. Despite the high readings for lead in water coming out of faucets, the Department of Aging and Disability Services has not yet decided whether to test people in the facilities. “We are working closely with the Department of State Health Services to determine whether it is necessary to test residents and/or staff at the three centers where elevated levels were found,” spokeswoman Cecilia Cavuto said in an email. “If so, we will conduct testing at that time. There have been no instances of residents or staff experiencing any signs or symptoms of exposure to elevated levels of lead or copper.” Borel said there shouldn’t be much to decide. “It’s not unusual for these individuals to be there for 10, 15 or 25 years,” he said of the facilities’ residents. “I see no downside to testing them.” The El Paso State Supported Living Center on Delta Drive opened in 1974 and is home to more than 100 people with various disabilities. Public awareness of the hazards posed by elevated lead levels has been raised since Flint, Mich., began drawing water from an alternative source in 2014 as a cost-saving measure ordered by the state government. Residents and officials there still are dealing with the fallout from the crisis. Cavuto said that after the first round of results, her agency decided to test more comprehensively than it originally planned. “In 2015 we proactively developed and implemented a policy in which the water at all of our facilities would be tested quarterly for lead and copper,” she said. “The first round of testing began in January 2016. As a result of this initial round of tests, we are now conducting campus-wide tests at all of the centers, rather than on the previous quarterly schedule.” Marty Schladen can be reached at 512-479-6606; [email protected]; @martyschladen on Twitter.
{ "pile_set_name": "OpenWebText2" }
A vaping-related death in Nebraska has brought the national death toll from lung illnesses linked to e-cigarette use to at least 15 people. The state's first vaping death comes amid more than 800 cases of the lung illness that have been reported across the country. Nebraska's Department of Health and Human Services did not identify the person who died but said the individual was over 65 years old and from the Douglas County area. The state's epidemiologist Dr. Tom Safranek said Monday that vaping-associated lung injuries were unreported and not tracked by public health agencies prior to the emergence of hundreds of cases across the country in recent weeks. "Once the problem was recognized, states quickly ramped up surveillance and found current cases, but have also discovered cases that occurred before the August outbreak," Safranek said in a statement. The Nebraska death occurred in May, the state's health department said. On Thursday, the Centers for Disease Control and Prevention reported that 12 people had died from vaping-related lung illnesses. Since then, two deaths have also been reported in Oregon and North Carolina. In all cases of the illness, patients have reported a history of vaping — either THC, nicotine or something else — and many experienced a combination of similar symptoms that look like a form of pneumonia: coughing, trouble breathing, chest pain, extreme fatigue, vomiting and diarrhea. Patients often require mechanical assistance breathing, and some have been admitted to hospital intensive care units. A number of states have passed various forms of bans on flavored vaping products in recent weeks as an effort to curb the number of illnesses and deaths. TheTrump administration announced plans to ban flavored e-cigarettes earlier in the month, but the details on when that would be enacted have not been revealed. Follow NBC HEALTH on Twitter & Facebook.
{ "pile_set_name": "PubMed Abstracts" }
Production of recombinant multiheme cytochromes c in Wolinella succinogenes. Respiratory nitrogen cycle processes like nitrification, nitrate reduction, denitrification, nitrite ammonification, or anammox involve a variety of dissimilatory enzymes and redox-active cofactors. In this context, an intriguing protein class are cytochromes c, that is, enzymes containing one or more covalently bound heme groups that are attached to heme c binding motifs (HBMs) of apo-cytochromes. The key enzyme of the corresponding maturation process is cytochrome c heme lyase (CCHL), an enzyme that catalyzes the formation of two thioether linkages between two vinyl side chains of a heme and two cysteine residues arranged in the HBM. In recent years, many multiheme cytochromes c involved in nitrogen cycle processes, such as hydroxylamine oxidoreductase and cytochrome c nitrite reductase, have attracted particular interest. Structurally, these enzymes exhibit conserved heme packing motifs despite displaying very different enzymic properties and largely unrelated primary structures. The functional and structural characterization of cytochromes c demands their purification in sufficient amounts as well as the feasibility to generate site-directed enzyme variants. For many interesting organisms, however, such systems are not available, mainly hampered by genetic inaccessibility, slow growth rates, insufficient cell yields, and/or a low capacity of cytochrome c formation. Efficient heterologous cytochrome c overproduction systems have been established using the unrelated proteobacterial species Escherichia coli and Wolinella succinogenes. In contrast to E. coli, W. succinogenes uses the cytochrome c biogenesis system II and contains a unique set of three specific CCHL isoenzymes that belong to the unusual CcsBA-type. Here, W. succinogenes is presented as host for cytochrome c overproduction focusing on a recently established gene expression system designed for large-scale production of multiheme cytochromes c.
{ "pile_set_name": "PubMed Abstracts" }
Determinants of sleep disturbances in Rett syndrome: Novel findings in relation to genotype. Rett syndrome is a rare but severe neurological disorder associated with a mutation in the methyl CpG binding protein 2 (MECP2) gene. Sleep problems and epilepsy are two of many comorbidities associated with this disorder. This study investigated the prevalence and determinants of sleep problems in Rett syndrome using an international sample. Families with a child with a confirmed Rett syndrome diagnosis and a MECP2 mutation registered in the International Rett Syndrome Phenotype Database (InterRett) were invited to participate. Questionnaires were returned by 364/461 (78.9%) either in web-based or paper format. Families completed the Sleep Disturbance Scale for Children and provided information on the presence, nature, and frequency of their child's sleep problems. Multivariate multinomial regression was used to investigate the relationships between selected sleep problems, age group, and genotype and linear regression for the relationships between sleep disturbance scales and a range of covariates. Night waking was the most prevalent sleep problem affecting over 80% with nearly half (48.3%) currently waking often at night. Initiating and maintaining sleep was most disturbed for younger children and those with a p.Arg294* mutation. Severe seizure activity was associated with poor sleep after adjusting for age group, mutation type, and mobility. We were surprised to find associations between the p.Arg294* mutation and some sleep disturbances given that other aspects of its phenotype are milder. These findings highlight the complexities of aberrant MECP2 function in Rett syndrome and explain some of the variation in manifestation of sleep disturbances. © 2016 Wiley Periodicals, Inc.
{ "pile_set_name": "HackerNews" }
The problem with buybacks, Dell edition - microtherion http://blogs.reuters.com/felix-salmon/2012/09/04/the-problem-with-buybacks-dell-edition/ ====== r00fus So Dell is over-self-bought - they are a large counterparty to the all selling on the open market. Buybacks make sense for a company when the stock is weak compared to the value of the company. Apparently when Dell was doing great, they thought the stock was undervalued? The reality is that the CEO and officers of the company are highly vested in the stock, and having it in the gutter consistently is bad for business - thus the buybacks (which I consider a form of artificial inflation)... the only problem is that Dell as a company isn't doing well enough for those re- investments into the stock to have paid back - which may never happen either. Don't the stockholders have a say as to whether the company can buy back it's own stock - perhaps the voting stockholders are to blame here. ------ prewett Besides companies often buying back stock when it is high, one thing that often happens is that they buy back shares to offset the shares they are giving to employees. I bet if you look at the number of shares at the beginning and end of the period I'll be they are more or less the same. Perhaps Dell wasn't as profitable as the author thought, if the cost of options had actually been factored in. And I don't see how a stock dividend ("scrip dividend" in the article) is any solution. All it does is multiply everyone's number shares by some percentage. So, of course, the market just cuts the price by that percentage. It's not taxed because 10 shares @ $10 = $100 and 15 shares @ $6.66 = $100. It's not taxed because no money is actually given. ~~~ Evbn Blogger is mistaken. Scrip dividend doesn't solve the excess cash problem. ------ veyron Michael Dell hopefully dumped enough shares to have sufficiently large warchest to buy back dell ...
{ "pile_set_name": "StackExchange" }
Q: Arguments are not sufficiently instantiated I have an assignment in which I have to solve the battleships puzzle using Prolog. My current solution goes over the entire field and places a piece of boat on the coordinates it is currently on. If no part of the boat is allowed there (I only look at the sums of boat pieces which are given.) it places some water. example(X) :- battleship( [ [n,_,'~',_,_,_,_,n], [_,_,n,'~',_,o,_,_], ['~','~',_,'~',_,_,_,s], [_,'~',x,'~',_,_,'~','~'], [_,_,_,'~',_,_,n,_], [_,_,_,'~',_,_,_,_], [_,_,_,x,_,'~',_,_], [_,_,_,_,_,_,_,_] ], [5,0,5,1,2,1,2,4],[2,4,2,3,2,1,4,2],[4,3,2,1],X). The line above is what you call. The first argument is the field with a ~ for water an _ for unknown and everything else is a part of a boat. The second argument is the sum of pieces of boat in each column, the third argument is the same but for the rows. The fourth argument is the size of the boats and the final argument is where I should put the result. battleship(Grid, Columns, Rows, Ships, Result) :- print(Result), fillField(Grid, Columns, Rows, Ships, Result). fillField(Grid, Columns, Rows, Ships, Result) :- fillRows(Grid, Columns, Rows, Ships, Result, 0). fillRows(Grid, Columns, Rows, Ships, Result, RowIndex) :- length(Grid, Length), RowIndex >= Length, print(Grid), print('\n'), print('Done\n'). fillRows(Grid, Columns, Rows, Ships, Result, RowIndex) :- length(Grid, Length), RowIndex < Length, fillRow(Grid, Columns, Rows, Ships, Result, RowIndex, 0), NextRow is RowIndex + 1, fillRows(Grid, Columns, Rows, Ships, Result, NextRow). fillRow(Grid, Columns, Rows, Ships, Result, RowIndex, ElemIndex) :- print(Grid),print('\n'), length(Grid, Length), ElemIndex >= Length. fillRow(Grid, Columns, Rows, Ships, Result, RowIndex, ElemIndex) :- length(Grid, Length), ElemIndex < Length, isLegalShip(Grid, RowIndex, ElemIndex), nth0(RowIndex, Rows, R1), R2 is R1 - 1, R2 >= 0, replace(Rows, RowIndex, R2, NewRows), nth0(ElemIndex, Columns, C1), C2 is C1 - 1, C2 >= 0, replace(Columns, ColumnIndex, C2, NewColumns), NextElem is ElemIndex + 1, fillRow(Grid, NewColumns, NewRows, Ships, Result, RowIndex, NextElem). fillRow(Grid, Columns, Rows, Ships, Result, RowIndex, ElemIndex) :- length(Grid, Length), ElemIndex < Length, isSea(Grid, RowIndex, ElemIndex), NextElem is ElemIndex + 1, fillRow(Grid, Columns, Rows, Ships, Result, RowIndex, NextElem). isLegalShip(Grid, RowIndex, ElemIndex) :- nth0(RowIndex, Grid, Row), nth0(ElemIndex, Row, Element), isShip(Element). replace([_|Tail], 0, Value, [Value|Tail]). replace([Head|Tail], Index, Value, [Head|R]):- Index > 0, NextIndex is Index - 1, replace(Tail, NextIndex, Value, R). isSea(Grid, RowIndex, ElemIndex) :- nth0(RowIndex, Grid, Row), nth0(ElemIndex, Row, '~'). isShip(x). isShip(o). isShip(e). isShip(s). isShip(w). isShip(n). Solving the problem like this will start in the upper right corner and go left and down to fill in the field. However when backtracking is needed because it got stuck it fails. Using this example an x will be placed on position (0,3) which is wrong. When we reach the end of the row we find another piece of boat and figure out that something is wrong. Her we go back to where we placed the x. It should now put an ~ there but instead it tells me: ERROR: >/2: Arguments are not sufficiently instantiated Exception: (13) fillRow([[n, ~, ~, _G907, _G910, _G913, _G916|...], [_G925, _G928, n, ~, _G937, o|...], [~, ~, _G958, ~, _G964|...], [_G979, ~, x, ~|...], [_G1006, _G1009, _G1012|...], [_G1033, _G1036|...], [_G1060|...], [...|...]], [4, 0, 5, 1, 2, 1, 2, 4], [1, 4, 2, 3, 2, 1, 4, 2], [4, 3, 2, 1], _G828, 0, 3) ? creep Exception: (10) fillRow([[n, _G901, ~, _G907, _G910, _G913, _G916|...], [_G925, _G928, n, ~, _G937, o|...], [~, ~, _G958, ~, _G964|...], [_G979, ~, x, ~|...], [_G1006, _G1009, _G1012|...], [_G1033, _G1036|...], [_G1060|...], [...|...]], [5, 0, 5, 1, 2, 1, 2, 4], [2, 4, 2, 3, 2, 1, 4, 2], [4, 3, 2, 1], _G828, 0, 0) ? creep I only have some basic knowledge of Prolog and couldn't figure out what was wrong. Any help would be appreciated and I hope the question is somewhat clear. A: In second clause of fillRow/2 you have this line: replace(Columns, ColumnIndex, C2, NewColumns), There ColumnIndex is a singleton, which means that nowhere else in the code you use it any way. For example: you don't set it to any value. That's why in 2nd clause of replace/4 you have error in this line: Index > 0, Because Index is equivalent to ColumnIndex, then Index is not set (not sufficiently instantiated) and comparison is impossible. Thus, an error.
{ "pile_set_name": "StackExchange" }
Q: Can the New Relic Python agent track external service requests that don't use httplib? Using New Relic on a Tornado application, some external services are being tracked and some are not. I've noticed that the ones that work utilize httplib while the others are using Tornado's HTTP client, which directly communicates with a socket. My assumption is that the New Relic agent is hooked into the httplib, because under the hood httplib uses the same socket. Is there anyway to track these requests as well? A: The New Relic python agent does not currently support Tornado's HTTP client, but keep an eye on the release notes for any changes in the future: https://docs.newrelic.com/docs/releases/python You can also find a list of currently instrumented external service modules here: https://docs.newrelic.com/docs/python/instrumented-python-packages#external-web-services
{ "pile_set_name": "Pile-CC" }
It was a special treat having Sugar Ray Leonard and Usher together, as Usher will depict Sugar Ray Leonard in upcoming biopic “Hands of Stone”. Los Angeles, CA (PRWEB)May 29, 2013 B. Riley & Co. and The Sugar Ray Leonard Foundation presented The 4th Annual "Big Fighters, Big Cause" Charity Fight Night to benefit The Sugar Ray Leonard Foundation in its support for Juvenile Diabetes Research and The Wounded Warrior Project. This prestigious invitation-only Red Carpet event took place at The Santa Monica Pier on May 21, 2013. Tommy Davidson was the Master of Ceremony for the evening, which featured a Professional Boxing fight card commissioned by the California State Athletic Commission. Songstress Franchesca Robi (daughter of The Platters’ Paul Robi) sung the National Anthem to ring in the fights. The fight card consisted of four professional bouts. It was a special treat having Sugar Ray Leonard and Usher together, as Usher will depict Sugar Ray Leonard in upcoming biopic “Hands of Stone”. Sugar Ray Leonard and Usher showed off some moves in the ring and were soon joined by other celebrity guests. The event’s targeted audience of over 1400 guests comprised of C-suite executives from nearly 200 public companies across a range of sectors, leading institutional investors, high net worth individuals, financial services professionals, celebrities, sports legends, and other high-profile individuals. Zota Pop, a Top 40s band comprised of world-class musicians, provided musical entertainment along with DJ BABY CHINO, the 10-year-old DJ phenomenon who has been seen on Nickelodeon's hit show "Figure It Out". Rusnak, Maserati, BMW and Porsche, part of the Rusnak Auto Group proudly supported the Sugar Ray Leonard Foundation. Sugar Ray Leonard honored honor Medtronic, Inc. by presenting an Award in the ring for its work in Juvenile Diabetes with the Insulin Pump. The Hauser Insurance Group was also a proud supporter of the cause. The evening was set against a rich environment for both charitable and business development opportunities. The lovely ladies from Charity Angels and Crown Diva Boutique & Pageant Academy sold raffle tickets throughout the evening, benefitting the cause. Guests had the opportunity to win spectacular prizes. A true highlight of the evening was the Charitable Live Auction. Item Sparkling Hill Resort, a European-inspired wellness resort known as the first resort in the world to incorporate Swarovski crystal elements into every aspect of its design, stood out. The winner of this Live Auction Item received a gift certificate for a 5 night Couples Escape in a stunning penthouse suite, with access to a wide range of wellness treatments featured at the resort’s world-renowned Kurspa – a 40,000 square foot spa providing over 100 treatments and therapies. Guests enjoyed an abundance of delicious food and beverages. Legends Beer offered its premium craft beer in the Legends 100% recyclable aluminum bottle. Legends believes that consumers can have both great beer, and interesting content with the same package. The Sugar Ray Leonard Foundation was launched by boxing legend and six-time world champion Sugar Ray Leonard to benefit the Juvenile Diabetes Research. The mission of The Sugar Ray Leonard Foundation (SRLF) is to find a cure for diabetes and its complications through the support of research. After watching his father struggle with Diabetes and its complications for years, Ray is very passionate about finding a cure for Juvenile Diabetes. Ray is also very passionate about empowering wounded warriors dealing with post-traumatic stress disorder and other lasting effects of combat. Part of the proceeds from this event go to the Wounded Warrior Project (WWP). For more information about the Foundation and their cause, please visit: SugarRayLeonard.com B. Riley & Co., a leading full-service investment bank, provides a full array of corporate finance, research, sales, trading and otcqx dad services to corporate, institutional and high net worth clients. Headquartered in Los Angeles, with offices in San Francisco, New York, Newport Beach, Boston and Atlanta, the firm is recognized for its distinguished Equity Research. Their investment banking services include merger and acquisitions advisory to public and private companies, initial and secondary public offerings, and institutional private placements. Engaged by both companies and investors, their Corporate Governance Advisory Services Group helps maximize value for shareholders. Founded in 1997, the firm began by successfully targeting small-capitalization California-based companies and has won a reputation for providing proprietary, unbiased and often contrarian equity research coverage of companies that are under-followed or misunderstood by Wall Street. For more information, please visit http://www.brileyco.com
{ "pile_set_name": "Pile-CC" }
GTA V Has Mo’ Money and Mo’ Fruit Rockstar announced that there will be two GTA V companion apps available for free, allowing the avid player of Grand Theft Auto V an enhanced gaming experience with mo’ money and mo’ fruit. GTA Online launched the new applications on October 1st. Access is free for anyone with a copy of Grand Theft Auto V. Released for iOS devices, and later included Android phone and game systems, the iFruit app includes features that work in sync with the in-game world using a gamer’s Social Club login. This advance in assisted gaming technology will enhance the already colorful game event of GTA V. Online at gtaV.net, the gamer can get much more information about his or her favorite apps by reading the Latest News on the Home Page. The viewer will find the following: Los Santos Customs – a garage to buy and customise vehicles on-the-go that will be delivered to your in-game garage. You can also reserve your licence plate to use in GTA Online and it will be unique to you! So grab it quick. Chop the Dog – a mini game of sorts where you look after your own virtual Chop; his happiness scale will affect his mood in-game, and you can teach him tricks to use and customise his collar (also in-game!) Social Club and Life Invader – direct access to fulfill all of your Social Club stats and crew needs, as well as talking+ Misc – alongside those, we have direct links to mobile Rockstar games, the Rockstar store and the official GTAV website! A gamer’s website, Droid Gamers , commented that although it took longer for the iFruit apps to be adapted to android devices as opposed to iOS devices, it also said,that, “Grand Theft Auto V has been out for a little bit now and iOS managed to get the companion application for the game ahead of Android. However Android is now on par with iOS as Rockstar Games has finally released Grand Theft Auto: iFruit onto Google Play and yes they kept the name as iFruit instead of changing it up for something a little more Android-centric.” Tsuroki, a blogger on gtaV.net said, “The Rockstar team made it very clear to us that GTA Online is not just a ‘multiplayer mode’ for Grand Theft Auto V – it’s an entirely standalone experience [sic]”. The online services offered by Rockstar leave no stone unturned, as the gamer plays GTA V with so–called fruit. Andrew H. said, on Droid Gamers, “Surprisingly there is no fruit involved in this application. Instead you are treated to a sort of mini-game called Chops the Dog and a cool little companion application feature that lets you customize your ride in-game, called Los Santos Customs, from your phone or tablet.” Derrik J.Lang, a feature writer for the Jakarta Post, said, “For the most part, it’s illegal business as usual in the latest edition of Grand Theft Auto. There are vehicles to swipe, schemes to plan and banks to rob. Unlike previous installments in the wildly successful — and violent — M-rated series, GTA V centers not just on one but three criminal protagonists: former partners Michael and Trevor, and their new protegé, Franklin.” With mo’ money and mo’ fruit, GTA V goes the extra mile to give gamers not only assistance , but the bells and whistles that make Grand Theft Auto a personal and dramatic experience.
{ "pile_set_name": "Pile-CC" }
Eagle Head side view Shaped Acrylic Quantity This eagle head shaped acrylic is perfect to add vinyl to for a key chain, backpack tag, ornament and more! They are sold as blanks for you to add your own personal touch to them. This is sold individually. Acrylic shape measures approximately 2" tall x 3.25" wide. We offer several shapes, colors, patterns and finishes. Want another color? Join us on our Facebook group to request colors or other special shapes.
{ "pile_set_name": "Pile-CC" }
The Secret to Living in the Present Moment By: Gloria Marie You probably have heard a lot about living in the present moment. This video will explain “Why” is it important, “How it will increase your happiness” and “A simple tool to get started today.” Acceptance of the present moment is a state of consciousness. Acceptance is easy if everything is going exactly as you like it and want it. But, life is not always exactly as we want it. by living in the present moment, you are in a state of peace, and that peaceful energy flows through you. By learning the secret to living in the present moment, you will flow with the river of life, not against the current. Gloria Marie Gloria is a transformation life coach, spiritual teacher, and author. She received her Master in Education from the University of Florida and her life coaching certification from the Universal Coach Institute. Her articles have appeared in Huffington Post and divorcedmoms.com. Gloria brings over 35 years of entrepreneurial experience to her work. She is the proud mother of two grown sons.
{ "pile_set_name": "DM Mathematics" }
. Suppose 2*a - 4 = 2*n - 2*a, 3*n - c = -a. Solve -2*w - 10 = -n*w for w. 5 Let d(q) = -89*q**2 - 2*q - 1. Let l be d(-1). Let r be 4/(-14) - l/14. Suppose 0 = -3*m - 0 + r. Solve 0 = 5*s - m + 7 for s. -1 Let k be (39 + -37)/((-2)/(-3)). Solve 18 - k = -5*q for q. -3 Suppose -4 = b - 8. Solve l - b*l + 12 = 0 for l. 4 Let a(b) = -b**2 + 12*b + 30. Let h = 57 + -43. Let r be a(h). Solve 12 - 2 = -r*z for z. -5 Let v(w) = -w**2 - 14*w - 39. Let p be v(-10). Solve 11 - p = -2*k for k. -5 Suppose 7*z - 4*z = 9. Suppose z + 9 = 3*k. Solve 0 = k*c - 20 + 4 for c. 4 Let j be 3/1 + -69 + 1. Let u = j - -70. Solve -3*s = 2*s + u for s. -1 Suppose 11 = -4*y + 2*y - 3*w, 2*w = -2*y - 6. Solve y = -5*j + 4*j for j. -2 Let g = -36 - -40. Solve g*f = f - 6 for f. -2 Let s(q) = q**3 - 17*q**2 - 14*q - 12. Let z be s(18). Let p = z + -56. Suppose 3 = -5*f + 13. Solve -y = -f*y + p for y. 4 Let k(y) = -y - 7. Let r be k(0). Let i = r + 17. Let j = i + -5. Solve w = j*w for w. 0 Let u be (-3 - -4)/(3 - 2). Suppose -5*j = -2*a - 44, -a - 16 - u = -2*j. Let p = -5 + j. Solve -9 = -p*s + 1 for s. 2 Suppose 5 = -y + 3*l, -7*l + 4 = -6*l. Solve -r + 2 = y for r. -5 Let q be 0 - (-1 + (0 - -2)). Let p(o) = -2*o**3 - o**2 - o - 1. Let r be p(q). Let h = 1436 - 1420. Solve r = 3*c + h for c. -5 Let i(m) = 5*m**2 + 32*m + 121. Let t be i(-4). Solve -2*x + 67 - t = 0 for x. -3 Suppose b = 4*b - 6. Suppose -4*v + 8 = b*l, 2*v + 4*l = -0*l + 4. Solve v = -a + 4 for a. 2 Let w be -2 + -4 + (-48)/(-4). Solve -8*t = -6*t + w for t. -3 Let o(m) = -m**3 + 16*m**2 + 19*m - 24. Let d be o(17). Solve -2*x + 4*x = -d for x. -5 Let x be (-14)/63 - (-29)/9. Let a be 6 - x - 8/1. Let h = -2 - a. Solve 2*r - h = 1 for r. 2 Let r(c) be the third derivative of -c**6/60 - c**5/30 + c**4/12 + c**3/6 - 10*c**2. Let p be r(-2). Let a be (p/4)/(1/4). Solve -a*t + 0*t = 25 for t. -5 Let z = 7 - 9. Let s = 6 - z. Let p = -8 + 15. Solve -p - s = -3*c for c. 5 Let z(v) = v**3 - 1 - 3*v**2 - 8*v**2 + 8*v**2 + 4*v. Let p be z(2). Solve -p*r + r + 10 = 0 for r. 5 Let a(b) = b**2 - 24*b + 52. Let j be a(22). Let m = -6 + j. Solve k = m*k for k. 0 Let f = 1994 - 1982. Solve 2*w = -w + f for w. 4 Let v(y) = -11*y + 530. Let g be v(48). Solve -g*m = -7*m for m. 0 Let z(u) = 0*u - 1 + u + 3 + 3*u + 6*u**2. Let c be z(-2). Suppose c = -4*s + 106. Solve 0 = -5*r - s + 7 for r. -3 Let t(y) = -12*y**3 + 3*y + 2. Let z be t(-2). Let v = z - 88. Solve -4*g + v = 12 for g. -2 Suppose 0 = 4*t - 8, -4*k = k + 5*t - 35. Solve 9 = -g + k for g. -4 Let u = -81 - -57. Let d = u - -24. Solve 3*a + 2 + 1 = d for a. -1 Suppose -419 + 804 - 415 = -3*q. Let l = 9 - 5. Solve -l*z = z + q for z. -2 Let q(w) = 4*w - 4. Let k(b) = b - 1. Let f(u) = 9*k(u) - 2*q(u). Let d be f(1). Suppose -4*r + 30 + 2 = d. Solve 2*z + 2 = r for z. 3 Suppose 3*x = -p + 39 - 10, -2*x + 19 = p. Solve b = -b + x for b. 5 Let w(z) = 14*z - 2. Let p be w(-2). Suppose 25*s - 22*s - 30 = 0. Let r be p*(s/6)/(-5). Solve 0*j + 2*j + r = 0 for j. -5 Suppose 99 + 75 = 87*u. Solve -5 + 1 = u*a for a. -2 Let z(u) = -3*u**2 + 6*u**2 - 8 - 2*u**2 + 0*u**2 - 10*u. Let a be z(11). Solve -1 + a = k for k. 2 Suppose 19*z = 14*z + 20. Suppose -2*y + c = -12, 3*y - 25 = 3*c - z. Suppose h + y = 2*h. Solve -h*j = -0*j for j. 0 Let z = -49 - -52. Suppose -4*a + z*n = -a, -n = -4. Solve -a*l + 10 - 30 = 0 for l. -5 Suppose -4 + 0 = -2*b. Let l be 0/(-11) + b + 0. Solve l*i = -0*i - 10 for i. -5 Let o(d) = -d**3 + 12*d**2 + 29*d - 6. Let l be o(14). Solve -l*p + 5*p = -9 for p. 3 Let c be 135 - 9*1/(-12)*4. Solve c*j - 132*j = 0 for j. 0 Let d = 31 + -23. Solve d*w + 48 - 8 = 0 for w. -5 Let k(p) = -1. Suppose c - 5*c = -16. Let b(q) = -6*q - 2. Let g(n) = c*k(n) - b(n). Let v be g(1). Solve 1 - v = -f for f. 3 Suppose -249*t + 264 = -225*t. Solve 3*h = t*h + 24 for h. -3 Suppose 5*x - 14 = 1, -2*w + 4*x = -8. Let a = w + -7. Suppose a*j = j + 10. Solve -11 = 4*f + j for f. -4 Suppose 13 - 13 = 3*y. Solve y = -2*a + 4 - 0 for a. 2 Suppose -5*w = -0*o - 2*o + 90, 0 = o - 2*w - 44. Suppose -o*k + 41*k - 2 = 0. Suppose -5*g = -2*g. Solve g = k*h + 2*h - 16 for h. 4 Let l = 32 - 59. Let g = l + 31. Solve -g*a = -5*a - 3 for a. -3 Let m be -6 - (-4 + 24/(-6)). Let d = 11 - 8. Solve 0 = -m*k - d*k for k. 0 Let q be (-1)/6*3*-2. Suppose 5*j = 3*a + 11 + 9, 4*j + a + q = 0. Solve -6 = 5*g - j for g. -1 Let l(j) = 9*j**3 + j**2 - 4. Let d be l(-2). Let z = d + 74. Solve 0 = -z*o + 1 + 3 for o. 2 Let y(u) = -4 + 4*u**3 + 4*u**3 - 9*u**3 + 5*u**2 - 3*u**2 + 5*u. Let l be y(3). Solve 5 = -3*f + l*f for f. -5 Let i be (-636)/(-92) - 8/(-92). Solve 3*y + i = -8 for y. -5 Let g(p) = -2*p**3 + 1. Let b be g(-1). Let o be b - (-5 + (3 - -1)). Solve -o*k + 10 = k for k. 2 Suppose 0 = -4*d - 8 - 12. Let l = 11 + d. Let t be 48/18*l/4. Solve -m = t*m - 5 for m. 1 Suppose -11*y = -9*y - 10. Suppose 5*u = 25, -6 - 4 = y*w + u. Let q = w - -15. Solve -3*b = -0*b - q for b. 4 Let n = -140 + 140. Let z(s) = -s**2 + 9*s - 8. Let l be z(7). Solve n = -k + l*k for k. 0 Let q = -411 - -413. Solve 0 = -2*v - q - 6 for v. -4 Suppose -3*z + s + 12 = 0, -z + 5*s = -14 - 4. Suppose z*c - 12 = 4*k, 1 = -5*k - 14. Solve 10 + c = 5*i for i. 2 Let o(r) = -2*r - 2. Let q = -6 + 3. Let c be o(q). Suppose 2*f = c*p + 4, 0 = -f - 3*p - 0 + 27. Solve -4*g + g = -f for g. 4 Suppose -2*r = 2 - 4. Let g = -24 + 24. Solve p + 0 + r = g for p. -1 Let n = 73 + -77. Let t be 0 - (-1 - (n - -5)). Solve -3*b + t*b = 2 for b. -2 Suppose 4*d - 6 = -0*d + 2*f, 0 = -2*d - 2*f + 12. Suppose 0*c + d*c = 6. Suppose -o - c*o = -36. Solve 3*i + o = 3 for i. -3 Suppose -2*k + 50 = 4*c + k, 46 = 4*c + k. Solve 7*j - c*j - 4 = 0 for j. -1 Let x(y) = -y**2 + 14*y - 36. Let h be x(10). Solve -3 = -h*w + w for w. 1 Let g(p) = -18*p - 288. Let o be g(-16). Solve 3*s - 5 - 4 = o for s. 3 Let a = 4 + 1. Suppose 2*g - 2*n - 12 = -0*n, -3*g + 28 = -a*n. Let y = 1 + g. Solve -y*o + 2 = 10 for o. -4 Let d = -5 - -8. Let l be 1 + (3 - 4) + 3 + 0. Let b be (2/l)/(2/6). Solve -25 = d*t + b*t for t. -5 Let z be (-7826)/(-49) + (-2)/(-7). Let g = z + -159. Solve 4*j - g = 3 for j. 1 Let h be (0/1)/(2 - 4). Suppose h = -3*o - 3, -3*o + 12 = u. Solve b - u = 6*b for b. -3 Suppose -3*y + 164 - 158 = 0. Solve -3*t + 7 = -y for t. 3 Let a = 578 - 551. Solve -5*o + 22 = a for o. -1 Suppose -2*r - 4 = 3*n, -5 = 5*n + 8*r - 5*r. Let j be (72/(-42))/((-1)/28). Let y = -32 + j. Solve n*z + 2*z + y = 0 for z. -4 Let p = -17 - -17. Suppose u - 121 = 3*w, u - 7*w - 115 = -2*w. Suppose -u = -8*a + 3*a. Solve 4*b + 6 - a = p for b. 5 Let p be 6/(-4) + 2*(-438)/8. Let h = p - -115. Solve h*i - 15 = 5 for i. 5 Let y(p) be the third derivative of p**5/60 - p**4/4 + p**3/3 + p**2. Let a be y(6). Suppose -8 = -a*s - 2*s. Solve -s*g - g = 15 for g. -5 Let x = 27 + -26. Let g be (-1 + 4 - 1) + x. Suppose 16 = 2*h + h + 2*k, g*h - 4*k = -14. Solve -h + 0 = s for s. -2 Suppose 2*z - 20 = -2*n, -21*n + z - 30 = -26*n. Solve -17*a + 16*a = -n for a. 5 Suppose -4*b - 112 = -116. Solve 3*g = -b - 5 for g. -2 Let u(j) = 46*j + j**2 + 39*j - 83*j. Let b be 1 + 0 - (-1)/(-1). Let t be u(b). Solve t = -4*g + g for g. 0 Let n = 465 - 461. Solve 9 - 29 = n*c for c. -5 Let x(f) = 25*f + 8. Let b be x(1). Solve -9 = 8*m - b for m. 3 Let w be (-4)/6*(-9 + 3). Suppose 0 = p + w*s - 15, 3*p + 4*s - 5 - 16 = 0. Solve 0 = 3*n + p for n. -1 Let h(x) = -x**2 - 6*x. Let f be h(-6). Suppose f = 3*u - 32 - 19. Suppose -16*d = -u*d + 4. Solve 3*k + d = -k for k. -1 Let o = -335 - -335. Solve 4*r + 20 + o = 0 for r. -5 Let c(k) = -k**2 - 12*k + 47. Let u be c(-15). Solve 2*o = 3*o + u for o. -2 Let t be 0 + 42 - (-3 + 4). Let u = t - 39. Solve -u*c + 5 = -c for c. 5 Suppose 0 = 2*i - v - 15, 9*i - 13*i + 4*v + 40 = 0. Solve i - 16 = 11*o for o. -1 Suppose -5*g + 0 = -10. Suppose 1030 + 1342 - 869 = 167*p. Solve g*d + p = 5 for d. -2 Suppose -2*v = -29 - 71. Let g = v - 48. Solve g*z - 6 = 2 for z. 4 Suppose 0 = 2*l - 0*l - 5*z + 42, 2*z - 54 = 2*l. Let f = 39 + l. Solve -q - q + f = 0 for q. 4 Let y(i) = -i**2 - 22*i - 69. Let w be y(-15). Solve k - 31 = -w for k. -5 Suppose 4*x = -u + 121, -4*x = 9*u - 5*u - 124. Solve 0 = 7*j - j - x for j. 5 Let o = 1022 + -1012. Solve 0 = -0*s - 2*
{ "pile_set_name": "Pile-CC" }
April 8-9 Days of Action against State Violence author: anon From the Bay to the Sound: No More Police Killings! West Coast Days of Action April 8-9 Oscar Grant, Aaron Campbell, and all the others: We Won't Forget! Freedom for Joel Dow and Holly Works! Organize protests and autonomous actions in your own city! From the Bay to the Sound: No More Police Killings! West Coast Days of Action April 8-9 Oscar Grant, Aaron Campbell, and all the others: We Won't Forget! Freedom for Joel Dow and Holly Works! Organize protests and autonomous actions in your own city! Early on New Year's morning, 2009, BART police in Oakland, California, shot and killed Oscar Grant as he lay unarmed on a subway platform. Only after community members rioted did the cop get charged with the shooting. On March 22, 2010, Portland police shot and killed a homeless man, Jack Dale Collins, just two months after they shot to death Aaron Campbell, an unarmed black man. Anarchist and other community members responded immediately, taking to the streets in a riotous protest that marched on the police station, expressing anger at cops for the systemic killings, and at the media for covering up the prevalence of police violence. On March 23 there was another protest, at which police on motorbikes attacked the crowd. In a typical move, they charged one protester with attacking them. Joel Dow is currently sitting in jail, facing a felony charge and two misdemeanors. The only times the police have ever been held responsible for their murders is when we take to the streets and halt business as usual. Following the law, being peaceful, being quiet, has never discouraged police violence, because it is the function of the police to use violence against the exploited, against the oppressed, against those who fight back. Police violence is systemic. It is not a matter of isolated cases, or bad apples. For that reason, we are calling for two Days of Action, up and down the West Coast. The trial for Oscar Grant's killer has been moved all the way to Los Angeles, where the government hopes it can get an acquittal. The problem of state violence stretches across borders. Only by extending our solidarity from city to city can we gain the strength to fight back and show that this is not an isolated problem. People have already started using a diversity of tactics to resist the police. After the killings of Oscar Grant and Jack Dale Collins, people rioted. After the most recent killing in Portland, anonymous anarchists smashed up the police union office. In the Bay Area, Oakland Peace and Justice is organizing a blockade of the Embarcadero BART station for April 8. In Seattle, people are organizing flyering and protests in the city center. All the tactics are needed! When we recognize the need to stand up against state violence, we have to remember to support those who have been arrested in the struggle. Joel Dow is in jail for two felony charges and two misdemeanors for a counterattack against police at the March 23 protest in Portland. On April 5, Holly Works goes to trial for felony charges from the Oscar Grant riots. They need to be freed, not on the basis of their guilt or innocence, but because the actions that took place were a necessary response to the police murders. Without those riots, the killings would have been swept under the rug, like so many times in the past. The struggle is not over until everyone is free! Solidarity protests, flyering, blockades, and other actions will take place in the Bay Area, Portland, Olympia, Seattle, and elsewhere. Take initiative! Organize your own action and publicize it on the internet! Freedom for Joel Dow and Holly Works!Oscar Grant, Aaron Campbell, and all the others: We Won't Forget! Sample flyers Because the media will always lie, it's important to let everyone know, in our own words, why we protest, why we riot, why we fight back. Take these, change the date and time for your own events, and print off thousands! The Police Will Always Murder Let the politicians mince words about better training and community policing. The truth is, police will always murder. Our entire economy is based on exploitation, on wage-slavery, on violent blackmail: spend your life working for those who own everything, or sleep on the streets. The economy kills people every day. Our country is founded on slavery and genocide. Generations later, the divides only continue to deepen. How can there be peace between rich and poor, between those who profit off this state of affairs and those who have even had their futures stolen from them? That's where the police come in. It's their job to keep people in their assigned places, to use violence against those who resist, those who fall out of line. That's why every week in this country, cops are murdering homeless people, murdering people of color, murdering transgender people, attacking protesters, spying on dissidents. It's their job. The problem can't be reformed away. It's useless to talk about freedom and happiness as long we live in a world based on isolation, coercion, and exploitation. That's why we are not ashamed to talk about abolishing the police, abolishing prisons, abolishing the entire government. We can start right now by fighting back against police violence, against new laws of social control. We can start right now by reclaiming our communities, getting to know our neighbors, and building networks of self-defense without relying on the police. Society has organized itself many times before without hierarchy, without Authority. Suppressed stories of rebellion and freedom can be found everywhere. If you're not afraid to take your life in your hands, if you're truly interested in the possibility of a world without police murders, here's one of many places you can start searching for ideas: http://theanarchistlibrary.org/Otherwise, don't worry. If you do nothing, the police will continue to murder to uphold the world you rely on. Just don't let them catch you out of your place. For Freedom, for Anarchy! Enough is Enough! March Against Police Brutality Friday April 9th, 12pm at Seattle Central Community College Protect Our Communities, Protect Ourselves! On Monday, March 22nd another Portland community member, was brutally murdered by the police. Friday, April 9th we are calling a march in solidarity here in Seattle to recognize that Portland's struggle against police brutality is also our struggle. Police brutality is a systemic issue that is effecting the entire country. We refuse to sit by and just shake our heads as police shoot down people here or in Portland or anywhere. We refuse to feel unsafe in our own neighbourhoods, streets and workplaces. The police are one part of the prison industrial complex that is expanding rapidly, and more and more sectors of our society are gearing themselves toward promoting the proliferation of prisons- and profiting off it. They are not making us safer. They are killing us and locking us up at an exponential rate. Today the US has 5% of the world population and 25% of the worlds prison population. With the highest rate of incarceration in the world, we have been sold the idea that police and prisons are the solution to crime. Upon investigation of the prison system we find a system that targets poor people, people of color, transgendered people and the mentally ill. Instead of turning to the prison industrial complex, we want to build networks of support and safety within our own neighborhoods and communities. Instead let's defend each other to preserve community safety. Talk to your neighbours! Form community assemblies and phone trees to create immediate response to danger in your neighbourhood, from the cops and otherwise. Build an understanding of the root causes of crime and the capacity to think up solutions that could really work to create real safety and healing for all of our community. Let's stand up and be loud! Let's build a community movement against police brutality. There not hideing it, there reminding people all the time that they do as they please and the system will not hold them accountable for it. They murder people they want dead, unarmed people, and they don't give a damn how many people know about it. They take great joy in murdering there victims and labeling them as "bad guys" through the media at the same time, so not only do they get to get away with murder but they also destroy that persons memory forever. People know that officer's lie for one another but people never give much thought to the collusion that officer's and doctors at hospitals have towards each other. The police are at hospitals all the time, don't you think they have trusted friends there? How easy would it be for a doctor to cover up a poisoning if his good buddy the cop stationed at that hospital asked him too. If you catch a doctor covering up a crime who you going to report it to, the authority's? Cops and doctors are in collusion together and there is no one to report it to when there caught, that's enough to know this is a common practice in Portland Oregon. A lot of people that learn of the police state that we live in never really see how far the rabbit hole goes. Cops murder unarmed people and they laugh about it to friends while the state controled media labels them hero's and demonize the dead victim, and even the doctors take part by labeling the dead victim as mentally ill. The hospitals do what the cops tell them to do, and there is no one that the hospital can report it to either. They don't care if people complain or march on the streets, they enjoy it, they live for targeting people and destroying lives, it's what there paid to do and they enjoy it. They even brag to there victims that they can do whatever they want because there is no one to stop them.
{ "pile_set_name": "Pile-CC" }
Department of Accounting Why Accounting? Industry outlook Any seasoned business executive can tell you that a skilled accountant is key to the success of any venture. Because of this, accounting today is a huge field with many job opportunities. The demand for candidates with degrees in accounting is only projected to increase further. Our partners Lindner College has fostered long-term relationships with the leading accounting firms such as BKD, Deloitte, Ernst & Young (EY), Grant Thornton, KPMG, and PricewaterhouseCoopers (PwC). Professional experience Accounting students at Lindner have the added benefit of using co-ops and internships to test out the accounting field and determine whether they are passionate about being a public accountant, a tax consultant, a corporate budget analyst, an internal auditor, or an accounting director in governmental agencies.
{ "pile_set_name": "Pile-CC" }
Fulfilling Srila Prabhupada's Order Expanding Sankirtana in Africa Zanzibar Submitted by Murari Dasa We had come to attend the Nairobi Ratha Yatra in East Africa and after that thought of doing some book distribution in neighbouring Dar es salaam and Zanzibar by Caitanya Mahaprabhu’s mercy. In Dar es salaam there are some devotees and there is some preaching going on. In Zanzibar, however the population is at least about ninety five percent muslims and, they are practicing muslims. Therefore there hasn’t really been much done there. It is actually the birth place of the Swahili language and culture which is now quite widespread in Africa. Zanzibar island just off the Tanzania mainland is an autonomous province of Tanzania and also formerly part of Oman. In fact it was at one time the capital of Oman and the Sultans would reside there. Therefore there was a heavy Arab and Islamic influence. So we planned to spend a day there distributing the Swahili SSR and Swahili BG. We took the 2 hour speed boat from Dar es salaam and crossed into the island and arrived at around 9am with a member of the local Hindu community greeting us on arrival after having been informed by a well-wisher in Dar about our plans for the day. He guided us to the local Hindu temple which was about a 7 minute walk from the harbour. Where we took some prasadam which we had carried with us. Just after finishing our packed prasadam the person who guided us to the temple came to meet us along with the temple pujari and another person who was a prominent member of the small Hindu community. To our surprise they started telling us that it would be dangerous to distribute books here since the people, muslims, don’t like it. They explained how once a Swaminarayan had come and they followed him all around the town asking him why he had come here to spread his religion in their land. They suggested that they guide us to the book shops where we can ask them to take some books and also meet some prominent Hindus who could take some books to hand out to their muslim friends. I was really against this idea as I was wondering how many books would really go out like that. Besides that I had been meditating on serving Lord Caitanya Mahaprabhu’s mission by distributing books in Zanzibar for quite some time and thought if I didn’t do it now then I would feel I had failed in my service to the Gurus and Sri Gauranga. So I told them that there is no problem and that we had done this many times and we will be careful and not pushy. They remained fixed in their determination to convince us not to go out on sankirtan telling us that in the past there were problems and even attacks on Hindus and that if we go out it may create a problem for all the Hindus on the island (we were in full vaishnava dress with Tilak). Finally I told them that we will go out without their help and find our way around and make it clear to everyone that we were not part of the Hindu community (which of course we are not anyway). They then still looked a little nervous and upset but then reluctantly agreed as they couldn’t really stop us from going to preach. Sankirtan Report ————————— I exited the temple and started softly singing Nrsimha prayers. I left out a few shops and then started entering the shops. Almost all shops had pictures of Quranic verses on display and taped recitations from the Quran playing. Most people were serious though respectful, and asked some questions but found the philosophy new and seemed to be confused where to ‘place it’. Surprisingly there were a few people who had heard of the Bhagavad-gita and a few having visited Dar es salaam had heard of the Hare Krishna movement. As I was going from shop to shop people looked at me curiously, but no one stopped me or bothered me. I presented the books as the Science of the Soul and universal knowledge applicable to everyone. The only tense situation I encountered was when I entered a pharmacy where I saw an Arab person looking at me with a frown on his face. I avoided him and spoke to the other two who were there and he interrupted that these books are from a background different from what they were and so they don’t want the books. I just turned to him and said politely that the goal of these books is to simply add-on to the knowledge they already gained about God and not to challenge them. He was still getting quite emotional about why I came in the shop to present these books and so I just left politely. In all, over 4 hours (We had to catch the last return boat to Dar and so had 4 hours only) I managed to distribute 4 SSR’s by the mercy of Caitanya Mahaprabhu, as follows: 1) One small shop I entered had many books on shelves in Arabic and Swahili. The shop owner looked elderly but quite effulgent. He wore glasses and had a beard and a muslim cap and said he was a writer and these books for sale were his. He looked scholarly and knew about the Bhagavad-gita though opted to take the SSR instead. He gave me his contact and said I should visit him when I next come as he would then take a Bhagavad-gita. 2) The next fortunate soul was a woman who looked like a manager in a travel company. She was from the minority Christian community and she took the book and even wanted a BG but didn’t have enough money. I took down her contact and she was looking at the contents and the comments at the back of the SSR intently. She thanked me and asked me to visit when I returned next to Zanzibar so she could take a BG. 3) I entered a shop where another person owned a shop selling electronics and kitchen items. He looked quite young and when I presented the books he began to question me thoroughly and animatedly about the short introduction I gave about the books. He asked me why we are not happy in this world, what is the goal of life? Where are these teachings from? What is the position of the prophet Mohamed in these teachings? In between customers kept coming and his mobile kept ringing. Finally he took an SSR. Hari bol!! 4) The last recipient of Srila Prabhupada’s mercy was in a shop where I entered and saw two people speaking to each other. One was an Indian expatriate and looked surprised to see a person in dhoti, kurta and tilak. He started talking to me but I politely tried to instead engage the muslim Zanzibari person behind the desk who looked like the owner of the computer shop. As I was presenting the books the other person kept trying to ask about where ISKCON is here and is there a centre. I still tried to focus on the person behind the desk thinking to speak to the other person after I try to distribute a book to the one behind the desk. In the end they both refused to take a book. I then asked the man if there was anyone in the workshop behind who would perhaps take a book. He called out loudly in Swahili addressing someone in the workshop behind that someone’s coming there who is selling books in case he wants one. I entered the workshop and saw a youngish looking person working on assembling a computer. He was smiling at me and as I started trying to explain the philosophy he interrupted me and said he will take a book. Apparently he had been hearing the conversation of his boss and me and was felt inclined to take a book. All Glories to the Sri Krishna Sankirtan Movement ! All Glories to Srila Prabhupada ! All Glories to the Translator of the Swahili edition of the Science of Self-Realization !
{ "pile_set_name": "OpenWebText2" }
A view of renewable energy generators in Zhangjiakou, North China's Hebei Province over the weekend. Installed renewable energy capacity stands at 15 million kilowatts in the region, accounting for 27 percent of local energy consumption. Photo: CNSphoto China's new energy law emphasizes the development of new energy, marketization, further opening the energy sector, and international cooperation on environmental protection. It matches the development paces of both the nation and the world, and shows China's determination to participate in global climate control, an analyst said on Friday.The comments came as the Chinese National Energy Administration on Friday released a document seeking public opinion on a new 117-term energy law that includes regulations on energy resource exploitation, market access and international cooperation."China has been opening up this sector to private enterprises and foreign companies qualified to participate in China's energy sector development," Lin Boqiang, director of the China Center for Energy Economics Research at Xiamen University, told the Global Times on Friday.After the new legislation, those private and foreign firms will have legal protection, Lin added.According to the new law, China will let the market play a decisive role in resource allocation, build a market with a competitive mechanism structure, and allow the market to decide energy prices."Marketization is an inevitable trend for the energy market, as many enterprises fear excessive governmental intervention on pricing, so in the long run, this term will be beneficial for the market to maintain a healthy growth," Lin said.However, he warned that in the short run, general consumers could experience an electricity price increase.In terms 19 and 20, the draft law stressed that China will strengthen its supervision of pollutants and greenhouse gas emissions and build a clean, low-carbon, safe and efficient energy system. China will also enhance international cooperation on energy by signing bilateral or multilateral deals."Including stricter supervision on pollution and gas emissions and strengthening international cooperation, the new law shows China's determination to participate in global climate governance and further open itself to the world," Lin said."That could help boost the new energy sector's development, but it could result in higher costs for traditional energy companies," Lin noted, adding that China has tackled many difficult tasks including balancing different parties' interests to release the new version of the energy lawLin said that the new law has been in preparation for nearly three years, and that it is part of China's opening-up plan and will boost China's energy sector in the future.
{ "pile_set_name": "OpenWebText2" }
Machine learning analyzed 3.5 million books to find that adjectives ascribed to women tend to describe physical appearance, whereas words that refer to behavior go to men. “Beautiful” and “sexy” are two of the adjectives most frequently used to describe women. Commonly used descriptors for men include righteous, rational, and courageous. Researchers trawled through an enormous quantity of books in an effort to find out whether there is a difference between the types of words that describe men and women in literature. Using a new computer model, the researchers analyzed a dataset of 3.5 million books, all published in English between 1900 to 2008. The books include a mix of fiction and non-fiction literature. The top 11 adjectives in each category. Image: U. Copenhagen “We are clearly able to see that the words used for women refer much more to their appearances than the words used to describe men. Thus, we have been able to confirm a widespread perception, only now at a statistical level,” says computer scientist and assistant professor Isabelle Augenstein of the University of Copenhagen’s computer science department. The researchers extracted adjectives and verbs associated with gender-specific nouns (e.g. “daughter” and “stewardess”). For example, in combinations such as “sexy stewardess” or “girls gossiping.” They then analyzed whether the words had a positive, negative, or neutral sentiment, and then categorized the words into semantic categories such as “behavior,” “body,” “feeling,” and “mind.” The dataset is based on the Google Ngram Corpus. 11 billion words Their analysis demonstrates that negative verbs associated with body and appearance appear five times as often for female figures as male ones. The analysis also demonstrates that positive and neutral adjectives relating to the body and appearance occur approximately twice as often in descriptions of female figures, while male ones are most frequently described using adjectives that refer to their behavior and personal qualities. In the past, linguists typically looked at the prevalence of gendered language and bias, but using smaller data sets. Now, computer scientists can deploy machine learning algorithms to analyze vast troves of data—in this case, 11 billion words. Although many of the books were published several decades ago, they still play an active role, Augenstein points out. The algorithms used to create machines and applications that can understand human language are fed with data in the form of text material that is available online. This is the technology that allows smartphones to recognize our voices and enables Google to provide keyword suggestions. Why do adjectives matter so much? “The algorithms work to identify patterns, and whenever one is observed, it is perceived that something is ‘true.’ If any of these patterns refer to biased language, the result will also be biased. The systems adopt, so to speak, the language that we people use, and thus, our gender stereotypes and prejudices,” says Augenstein. She gives an example of where it may be important: “If the language we use to describe men and women differs in employee recommendations, for example, it will influence who is offered a job when companies use IT systems to sort through job applications.” As artificial intelligence and language technology become more prominent across society, it is important to be aware of gendered language. Augenstein continues: “We can try to take this into account when developing machine-learning models by either using less biased text or by forcing models to ignore or counteract bias. All three things are possible.” The researchers point out that the analysis has its limitations, in that it does not take into account who wrote the individual passages and the differences in the degrees of bias depending on whether the books were published during an earlier or later period within the data set timeline. Furthermore, it does not distinguish between genres—e.g. between romance novels and non-fiction. The researchers are currently following up on several of these items. Additional coauthors of the study are from the University of Maryland, Google Research Johns Hopkins University, the University of Massachusetts Amherst, and Microsoft Research.
{ "pile_set_name": "Wikipedia (en)" }
A Long Happy Life A Long Happy Life () is a 1966 Soviet drama film directed by Gennady Shpalikov. Plot The film tells about the geologist Victor, who on his way home meets a girl named Lena, whom he falls in love with. Victor promises her a long happy life, but in reality everything does not turn out as he thought. He understands that his feelings are not as strong as at the first meeting, and she, in turn, was ready for this... Cast Inna Gulaya as Lena Kirill Lavrov as Viktor Yelizaveta Akulicheva as Barmaid (as Ye. Akulicheva) L. Babenko Oleg Belov as Friend Lena (as O. Belov) Larisa Burkova as Firefighter's Fiancee (as L. Burkova) M. Verezgov Liliya Gurova as Maid in a rest home (as L. Gurova) Natalya Zhuravel as Bus conductor (as N. Zhuravel) References External links Category:1966 films Category:Russian-language films Category:Soviet drama films Category:Soviet films
{ "pile_set_name": "PubMed Abstracts" }
The stability and anti-apoptotic function of A1 are controlled by its C terminus. Most Bcl-2 family members can localize to intracellular membranes via hydrophobic sequences within their C-terminal portion. We found that the C terminus of the anti-apoptotic family member A1 did not function as a membrane anchor. Instead, this stretch of the protein rendered A1 highly unstable by mediating its polyubiquitination and rapid proteasomal degradation. Moreover, the domain did not only function independently of its position within the A1 protein but when transferred could even destabilize unrelated proteins like enhanced green fluorescent protein and caspase-3. A1 was, however, much more stable in the presence of the Bcl-2 homology-only protein BimEL, suggesting that direct interaction of A1 with pro-apoptotic members of the Bcl-2 family strongly reduces its rate of turnover. We further show that the C-terminal end of A1 also contributes to the anti-apoptotic capacity of the protein. In conclusion, our data demonstrate that the C terminus serves a dual function by controlling the stability of A1 and by amplifying the capacity of the protein to protect cells against apoptosis.
{ "pile_set_name": "PubMed Abstracts" }
The influence of social constructs of hegemonic masculinity and sexual behaviour on acceptability of vaginal microbicides in Zambia. Vaginal microbicides are heralded as a woman's HIV prevention method. This study, conducted in a microbicide clinical trial setting in Zambia, explored how the social construction of masculinity and sexual behaviour influenced the acceptability of vaginal microbicides. The data were generated from 18 In-depth Interviews and 8 Focus Group Discussions. The data were analysed thematically. The study found that hegemonic masculinity influenced the use of vaginal microbicides positively and negatively, in multiple ways including: decision to initiate gel use, autonomous use of the gel, and consistent use of the gel. Men were seen as heads of households and decision-makers who approved their partners' intentions to initiate gel use. Autonomous gel use by women was not supported because it challenged men's dominant position in sexual matters and at a family level. The socially accepted notion that men engaged in multiple sexual relationships also influenced women's decision to use the gel. Sustained gel use depended on the perceived effect of the gel on men's sexual desires, sexual performance, fertility, and sexual behaviour. This study suggests that acceptability of microbicides partially lies within the realm of men, with use constrained and dictated by cultural constructs and practice of masculinity and gender.
{ "pile_set_name": "Github" }
// // FKFlickrPhotosDelete.h // FlickrKit // // Generated by FKAPIBuilder. // Copyright (c) 2013 DevedUp Ltd. All rights reserved. http://www.devedup.com // // DO NOT MODIFY THIS FILE - IT IS MACHINE GENERATED #import "FKFlickrAPIMethod.h" typedef NS_ENUM(NSInteger, FKFlickrPhotosDeleteError) { FKFlickrPhotosDeleteError_PhotoNotFound = 1, /* The photo id was not the id of a photo belonging to the calling user. */ FKFlickrPhotosDeleteError_SSLIsRequired = 95, /* SSL is required to access the Flickr API. */ FKFlickrPhotosDeleteError_InvalidSignature = 96, /* The passed signature was invalid. */ FKFlickrPhotosDeleteError_MissingSignature = 97, /* The call required signing but no signature was sent. */ FKFlickrPhotosDeleteError_LoginFailedOrInvalidAuthToken = 98, /* The login details or auth token passed were invalid. */ FKFlickrPhotosDeleteError_UserNotLoggedInOrInsufficientPermissions = 99, /* The method requires user authentication but the user was not logged in, or the authenticated method call did not have the required permissions. */ FKFlickrPhotosDeleteError_InvalidAPIKey = 100, /* The API key passed was not valid or has expired. */ FKFlickrPhotosDeleteError_ServiceCurrentlyUnavailable = 105, /* The requested service is temporarily unavailable. */ FKFlickrPhotosDeleteError_WriteOperationFailed = 106, /* The requested operation failed due to a temporary issue. */ FKFlickrPhotosDeleteError_FormatXXXNotFound = 111, /* The requested response format was not found. */ FKFlickrPhotosDeleteError_MethodXXXNotFound = 112, /* The requested method was not found. */ FKFlickrPhotosDeleteError_InvalidSOAPEnvelope = 114, /* The SOAP envelope send in the request could not be parsed. */ FKFlickrPhotosDeleteError_InvalidXMLRPCMethodCall = 115, /* The XML-RPC request document could not be parsed. */ FKFlickrPhotosDeleteError_BadURLFound = 116, /* One or more arguments contained a URL that has been used for abuse on Flickr. */ }; /* Delete a photo from flickr. */ @interface FKFlickrPhotosDelete : NSObject <FKFlickrAPIMethod> /* The id of the photo to delete. */ @property (nonatomic, copy) NSString *photo_id; /* (Required) */ @end