text
stringlengths
0
1.59M
meta
dict
Q: Identifying from which method it is coming I have two methods both returning the view: public function method1() { return ('view1'); } and public function method2() { return ('view1'); } In the view i want to edit some changes regarding from which method it is coming: Something like this in view1: @if(coming form method1) { This is coming from method1, } @endif How can this be acheived? Currently i'm just making two separate views for so minor change. A: Why not add a flag in method public function method1() { $flag = 'method1'; return ('view1', compact('flag')); } public function method2() { $flag = 'method2'; return ('view1', compact('flag')); } and in the view check for the flag @if ($flag == 'method1') This is coming from method1 @elseif ($flag == 'method2') This is coming from method2 @endif
{ "pile_set_name": "StackExchange" }
Macrocnemum jamaicense Macrocnemum jamaicense is a species of plant in the family Rubiaceae. It is endemic to Jamaica. Sources Category:Flora of Jamaica Category:Macrocnemum Category:Near threatened plants Category:Endemic flora of Jamaica Category:Taxonomy articles created by Polbot
{ "pile_set_name": "Wikipedia (en)" }
Morocco Replaces Turkey as New Co-chair of GCTF | MAP Morocco, already a global leader in the fight against violent extremism, is taking over the co-presidency of the Global Counter Terrorism Forum (GCTF): The transfer of the co-presidency of the Global Counter Terrorism Forum (GCTF) from Turkey to Morocco took place here on Wednesday on the occasion of the 9th meeting of the GCTF’s coordination committee. Morocco and Netherlands will co-chair the GCTF replacing Turkey and the US. Speaking on this occasion, Minister Delegate to the Minister of Foreign Affairs and Cooperation Nasser Bourita said that the Moroccan-Dutch co-presidency is the culmination of a fruitful collaboration through the Working Group on foreign terrorist fighters. ”Assuming this responsibility shows the clear, determined and constructive involvement of Morocco in the fight against terrorism,” he added, noting that the Kingdom is set to strengthen the values of openness, dialogue, cooperation and sharing of experiences and good practices. Bourita highlighted efforts made by Morocco at the working group on foreign terrorist fighters and within the joint initiative with the US on border security. The Dutch foreign minister, Bert Koenders, said that the recent terror attacks, including the ones targeting Ankara, Istanbul, Lahore and Brussels, require the strengthening of counter-terrorism efforts. Koenders stressed, in this context, the importance of strengthening the exchange of information in the prospect of establishing a long-term approach including prevention of radicalization. The GCTF is an international partnership which is committed to improving worldwide cooperation on counterterrorism. The Forum is chiefly concerned with issues like de-radicalisation and strengthening the rule of law and the justice system in the fight against terrorism…[ORIGINAL STORY, SUBSCRIPTION REQUIRED]
{ "pile_set_name": "Pile-CC" }
Q: Why is there no "encoding" attribute in a string got by "IXMLDocument.SaveToXML" method? I use NewXMLDocument() to produce an XML document of my data. There is a SaveToXML() method to save the document to an XML-formatted string variable. The problem is that the XML string does not contain an "encoding" attribute in the head tag. But, if we save the XML document to a file with the SaveToFile() method, the "encoding" attribute will exist in it. Here is my code: var XML: IXMLDocument; RootNode, CurNode: IXMLNode; XmlString: string; begin XML := NewXMLDocument; XML.Encoding := 'utf-8'; XML.Options := [doNodeAutoIndent]; RootNode := XML.AddChild('XML'); CurNode := RootNode.AddChild('List'); CurNode := CertList.AddChild('Item'); CurNode.Text := 'bla-bla-bla'; ... XMl.SaveToXML(XmlString); // <<--- no "encoding" attribute here XMl.SaveToFile('my-list.xml'); XMl := nil; end; Is there a way to make the SaveToXML() method add the "encoding" attribute? A: You need to use the overload method IXMLDocument.SaveToXML(var XML: UTF8String). That will encode the xml to UTF-8 and add the encoding attribute in the xml header. Declare your XmlString as UTF8String to get the desired result. When you declare XmlString as string like you did, which is UTF-16 (Unicode) in Delphi 2009+, you actually call SaveToXML(var XML: DOMString). The DOMString is defined as UnicodeString. By default, variables declared as type string are UnicodeString. The output xml is UTF-16 and the encoding attribute is omitted.
{ "pile_set_name": "StackExchange" }
$ brew update $ brew install opam
{ "pile_set_name": "Github" }
Reference ranges for muscle carnitine concentration in children. We investigated muscle and plasma carnitine concentrations in children to establish reference intervals for use following biopsy of skeletal muscle. The study comprised 50 children from newborns up to 14 years of age, all undergoing elective surgery. They were divided into six age groups, the youngest 0-2 days and the oldest 11-14 years. The samples were taken at the beginning of surgery. Gestational age was a major determinant of the total muscle carnitine concentration in newborns (Spearman's r(s) = 0.692, P < 0.01). This concentration was low during the first year, but subsequently did not differ between age groups. In neonates the median value (range) for total carnitine concentration in skeletal muscle was 5.9 (2.2-15.9) micro mol/g dry weight and the free to total carnitine ratio was 62 (31-81)%. In children 1-12 months old the corresponding figures were 6.0 (3.5-7.9) micro mol/g dry weight and 51 (28-71)% and in those 1-14 years they were 12.1 (6.6-17.4) micro mol/g dry weight and 76 (42-92)%. This study shows that muscle carnitine concentrations in newborns are dependent on gestational age. The data suggest that there is an accretion of carnitine in skeletal muscle during the first year of life. Reference intervals are given.
{ "pile_set_name": "PubMed Abstracts" }
Q: Why use geometric algebra and not differential forms? This is somewhat similar to Are Clifford algebras and differential forms equivalent frameworks for differential geometry?, but I want to restrict discussion to $\mathbb{R}^n$, not arbitrary manifolds. Moreover, I am interested specifically in whether $$(\text{differential forms on }\mathbb{R}^n\text{ + a notion of inner product defined on them}) \simeq \text{geometric algebra over }\mathbb{R}^n$$ where the isomorphism is as Clifford algebras. (I.e., is geometric algebra just the description of the algebraic properties of differential forms when endowed with a suitable notion of inner product?) 1. Is any geometric algebra over $\mathbb{R}^n$ isomorphic to the exterior algebra over $\mathbb{R}^n$ in the following senses: as a vector space? (Should be yes.) as an exterior algebra? (Obviously they are not isomorphic as Clifford algebras unless our quadratic form is the zero quadratic form.) Since the basis of the geometric algebra (as a vector space) is the same (or at least isomorphic to) the basis of the exterior algebra over $\mathbb{R}^n$, the answer seems to be yes. Also because the standard embedding of any geometric algebra over $\mathbb{R}^n$ into the tensor algebra over $\mathbb{R}^n$ always "piggybacks" on the embedding of the exterior algebra over $\mathbb{R}^n$, see this MathOverflow question. 2. Are differential forms the standard construction of an object satisfying the algebraic properties of the exterior algebra over $\mathbb{R}^n$? 3. Does the answers to 1. and 2. being yes imply that the part in yellow is true? EDIT: It seems like the only problem might be that differential forms are covariant tensors, whereas I imagine that multivectors are generally assumed to be contravariant. However, distinguishing between co- and contravariant tensors is a standard issue in tensor analysis, so this doesn't really seem like an important issue to me. Assuming that I am reading this correctly, it seems like the elementary construction of the geometric algebra with respect to the standard inner product over $\mathbb{R}^n$ given by Alan MacDonald here is exactly just the exterior algebra over $\mathbb{R}^n$ with inner product. David Hestenes seems to try and explain some of this somewhat here and here, although I don't quite understand what he is getting at. (Also his claim in the first document that matrix algebra is subsumed by geometric algebra seems completely false, since he only addresses those aspects which relate to alternating tensors.) A: This seems to be best answered by Lounesto's paper "Marcel Riesz's Work on Clifford Algebras" (see here or here). In what follows: $\bigwedge V=$ the exterior algebra over $V$ $C\ell(Q)=$ the Clifford (geometric) algebra over $V$ w.r.t. the quadratic form $Q$ Note in particular that we always have $C\ell(0)=\bigwedge V$, $0$ being the degenerate quadratic form. On p. 221, Professor Lounesto discusses, given a non-degenerate quadratic form $Q$, how to define an "inner product" (contraction $\rfloor$) on the exterior algebra $\bigwedge V$. On p. 223, Professor Lounesto discusses how to extend the inner product (by combining it with the wedge product of the exterior algebra) to produce a Clifford/geometric product on $\bigwedge V$, which makes $\bigwedge V$ isomorphic to $C\ell(Q)$ (the Clifford algebra w.r.t. the quadratic form $Q$). One can also go the other way around, as M. Riesz originally did in 1958 (see section 1.3, beginning on p. 230, "Riesz's Introduction of an Exterior Product in $C\ell(Q)$ "), and use the Clifford product to define a notion of exterior product which makes $C\ell(Q)$ isomorphic to $\bigwedge V$. In other words, we do indeed have: (exterior algebra over $\mathbb{R}^n +$ inner product) $\simeq$ geometric algebra over $\mathbb{R}^n$ One should note that $\bigwedge \mathbb{R}^n$, the exterior algebra over $\mathbb{R}^n$, consists of alternating contravariant tensors of rank $k$ over $\mathbb{R}^n$. However, differential forms are alternating covariant tensors of rank $k$ over $\mathbb{R}^n$. So in general they behave differently. Nevertheless, an inner product on $V$ gives a linear isomorphism between any vector space $V$ and its dual $V^*$ to argue that covariant tensors of rank $k$ and contravariant tensors of rank $k$ are "similar". (Mixed variance tensors complicate things somewhat further, but are not relevant to this question.) Thus, differential forms are "similar" to $\bigwedge \mathbb{R}^n$ (since they are essentially $\bigwedge (\mathbb{R}^n)^*$). Also, we can just as easily construct a Clifford algebra from $\bigwedge V$ as from $\bigwedge V^*$, so we can extend differential forms to "covariant geometric algebras" by introducing an inner product based on a quadratic form $Q$. So, perhaps less convincingly, we also do have (at least in an algebraic sense): (differential forms + inner product) $\simeq$ "covariant geometric algebra" over $\mathbb{R}^n$ It is also worth noting that, according to Professor Lounesto on p. 218, Elie Cartan also studied Clifford algebras, in addition to introducing the modern notions of differential form and exterior derivative. So it is not all too surprising that they should actually be related to one another. In fact, thinking about (covariant) geometric algebra in terms of "differential forms + inner product", while using the geometric intuition afforded by geometric algebra, actually makes the ideas behind differential forms much more clear. See for example here. I'm only beginning to process all of the implications, but as an example, a $k-$blade represents a $k-$dimensional subspace, and its Hodge dual is the differential form of rank $n-k$ which represents its orthogonal complement. The reason why orthogonal complements are represented in the dual space is because the inner product between two vectors can also be defined as the product of a vector and a covector (w.r.t. our choice of non-degenerate quadratic form $Q$). All of this should be generalizable from $\mathbb{R}^n$ to the tangent and cotangent spaces of arbitrary smooth manifolds, unless I am missing something. This is especially the case for Riemannian manifolds, where we also get a non-degenerate quadratic form for each (co)tangent space for free. (Which raises the question of why David Hestenes wants us to throw out smooth manifolds in favor of vector manifolds, a topic for future research.) As to the answer to "why use geometric algebra and not differential forms", for now my answer is: Use the tensor algebras over $\mathbb{R}^n$ and $(\mathbb{R}^n)^*$, while appreciating the special properties of their exterior sub-algebras and remembering that, given our favorite quadratic form $Q$, we can always introduce an additional notion of "contraction" or "inner product" to make them into Clifford (geometric) algebras. Hyping geometric algebra alone misses the importance of linear duals and arbitrary tensors. Likewise, focusing on differential forms alone seems like a good way to do differential geometry without geometric intuition (i.e. with a mathematical lobotomy). Sensible minds may disagree. Note: There are a lot of differences in the theory in the case that the base field is $\mathbb{F}_2$. To some extent we should expect this, since in that case we don't even have "alternating = anti-symmetric". In particular, we don't have bivectors for fields of characteristic two, and defining/identifying a grading of the Clifford algebra via an isomorphism with the exterior algebra is impossible (at least if I am interpreting Professor Lounesto's paper correctly). In any case, when I say "geometric algebra", I essentially mean "Clifford algebras of vector spaces with base field the real numbers", so the exceptions thrown up in the case that the characteristic equals 2 don't really matter for the purposes of this question; we are dealing exclusively with characteristic 0, although generalizations are possible. A: I just want to point out that GA can be used to make covariant multivectors (or differential forms) on $\mathbb R^n$ without forcing a metric onto it. In other words, the distinction between vectors and covectors (or between $\mathbb R^n$ and its dual) can be maintained. This is done with a pseudo-Euclidean space $\mathbb R^{n,n}$. Take an orthonormal set of spacelike vectors $\{\sigma_i\}$ (which square to ${^+}1$) and timelike vectors $\{\tau_i\}$ (which square to ${^-}1$). Define null vectors $$\Big\{\nu_i=\frac{\sigma_i+\tau_i}{\sqrt2}\Big\}$$ $$\Big\{\mu_i=\frac{\sigma_i-\tau_i}{\sqrt2}\Big\};$$ they're null because $${\nu_i}^2=\frac{{\sigma_i}^2+2\sigma_i\cdot\tau_i+{\tau_i}^2}{2}=\frac{(1)+2(0)+({^-}1)}{2}=0$$ $${\mu_i}^2=\frac{{\sigma_i}^2-2\sigma_i\cdot\tau_i+{\tau_i}^2}{2}=\frac{(1)-2(0)+({^-}1)}{2}=0.$$ More generally, $$\nu_i\cdot\nu_j=\frac{\sigma_i\cdot\sigma_j+\sigma_i\cdot\tau_j+\tau_i\cdot\sigma_j+\tau_i\cdot\tau_j}{2}=\frac{(\delta_{i,j})+0+0+({^-}\delta_{i,j})}{2}=0$$ and $$\mu_i\cdot\mu_j=0.$$ So the spaces spanned by $\{\nu_i\}$ or $\{\mu_i\}$ each have degenerate quadratic forms. But the dot product between them is non-degenerate: $$\nu_i\cdot\mu_i=\frac{\sigma_i\cdot\sigma_i-\sigma_i\cdot\tau_i+\tau_i\cdot\sigma_i-\tau_i\cdot\tau_i}{2}=\frac{(1)-0+0-({^-}1)}{2}=1$$ $$\nu_i\cdot\mu_j=\frac{\sigma_i\cdot\sigma_j-\sigma_i\cdot\tau_j+\tau_i\cdot\sigma_j-\tau_i\cdot\tau_j}{2}=\frac{(\delta_{i,j})-0+0-({^-}\delta_{i,j})}{2}=\delta_{i,j}$$ Of course, we could have just started with the definition that $\mu_i\cdot\nu_j=\delta_{i,j}=\nu_i\cdot\mu_j$, and $\nu_i\cdot\nu_j=0=\mu_i\cdot\mu_j$, instead of going through "spacetime". The space $V$ will be generated by $\{\nu_i\}$, and its dual $V^*$ by $\{\mu_i=\nu^i\}$. You can take the dot product of something in $V^*$ with something in $V$, which will be a differential 1-form. You can make contravariant multivectors from wedge products of things in $V$, and covariant multivectors from wedge products of things in $V^*$. You can also take the wedge product of something in $V^*$ with something in $V$. $$\mu_i\wedge\nu_i=\frac{\sigma_i\wedge\sigma_i+\sigma_i\wedge\tau_i-\tau_i\wedge\sigma_i-\tau_i\wedge\tau_i}{2}=\frac{0+\sigma_i\tau_i-\tau_i\sigma_i-0}{2}=\sigma_i\wedge\tau_i$$ $$\mu_i\wedge\nu_j=\frac{\sigma_i\sigma_j+\sigma_i\tau_j-\tau_i\sigma_j-\tau_i\tau_j}{2},\quad i\neq j$$ What does this mean? ...I suppose it could be a matrix (a mixed variance tensor)! A matrix can be defined as a bivector: $$M = \sum_{i,j} M^i\!_j\;\nu_i\wedge\mu_j = \sum_{i,j} M^i\!_j\;\nu_i\wedge\nu^j$$ where each $M^i_j$ is a scalar. Note that $(\nu_i\wedge\mu_j)\neq{^-}(\nu_j\wedge\mu_i)$, so $M$ is not necessarily antisymmetric. The corresponding linear function $f:V\to V$ is (with $\cdot$ the "fat dot product") $$f(x) = M\cdot x = \frac{Mx-xM}{2}$$ $$= \sum_{i,j} M^i_j(\nu_i\wedge\mu_j)\cdot\sum_k x^k\nu_k$$ $$= \sum_{i,j,k} M^i_jx^k\frac{\nu_i\mu_j-\mu_j\nu_i}{2}\cdot\nu_k$$ $$= \sum_{i,j,k} M^i_jx^k\frac{(\nu_i\mu_j)\nu_k-\nu_k(\nu_i\mu_j)-(\mu_j\nu_i)\nu_k+\nu_k(\mu_j\nu_i)}{4}$$ (the $\nu$'s anticommute because their dot product is zero:) $$= \sum_{i,j,k} M^i_jx^k\frac{\nu_i\mu_j\nu_k+\nu_i\nu_k\mu_j+\mu_j\nu_k\nu_i+\nu_k\mu_j\nu_i}{4}$$ $$= \sum_{i,j,k} M^i_jx^k\frac{\nu_i(\mu_j\nu_k+\nu_k\mu_j)+(\mu_j\nu_k+\nu_k\mu_j)\nu_i}{4}$$ $$= \sum_{i,j,k} M^i_jx^k\frac{\nu_i(\mu_j\cdot\nu_k)+(\mu_j\cdot\nu_k)\nu_i}{2}$$ $$= \sum_{i,j,k} M^i_jx^k\frac{\nu_i(\delta_{j,k})+(\delta_{j,k})\nu_i}{2}$$ $$= \sum_{i,j,k} M^i_jx^k\big(\delta_{j,k}\nu_i\big)$$ $$= \sum_{i,j} M^i_jx^j\nu_i$$ This agrees with the conventional definition of matrix multiplication. In fact, it even works for non-square matrices; the above calculations work the same if the $\nu_i$'s on the left in $M$ are basis vectors for a different space. A bonus is that it also works for a non-degenerate quadratic form; the calculations don't rely on ${\mu_i}^2=0$, nor ${\nu_i}^2=0$, but only on $\nu_i$ being orthogonal to $\nu_k$, and $\mu_j$ being reciprocal to $\nu_k$. So you could instead have $\mu_j$ (the right factors in $M$) be in the same space as $\nu_k$ (the generators of $x$), and $\nu_i$ (the left factors in $M$) in a different space. A downside is that it won't map a non-degenerate space to itself. I admit that this is worse than the standard matrix algebra; the dot product is not invertible, nor associative. Still, it's good to have this connection between the different algebras. And it's interesting to think of a matrix as a bivector that "rotates" a vector through the dual space and back to a different point in the original space (or a new space). Speaking of matrix transformations, I should discuss the underlying principle for "contra/co variance": that the basis vectors may vary. We want to be able to take any (invertible) linear transformation of the null space $V$, and expect that the opposite transformation applies to $V^*$. Arbitrary linear transformations of the external $\mathbb R^{n,n}$ will not preserve $V$; the transformed $\nu_i$ may not be null. It suffices to consider transformations that preserve the dot product on $\mathbb R^{n,n}$. One obvious type is the hyperbolic rotation $$\sigma_1\mapsto\sigma_1\cosh\phi+\tau_1\sinh\phi={\sigma_1}'$$ $$\tau_1\mapsto\sigma_1\sinh\phi+\tau_1\cosh\phi={\tau_1}'$$ $$\sigma_2={\sigma_2}',\quad\sigma_3={\sigma_3}',\quad\cdots$$ $$\tau_2={\tau_2}',\quad\tau_3={\tau_3}',\quad\cdots$$ (or, more compactly, $x\mapsto\exp(-\sigma_1\tau_1\phi/2)x\exp(\sigma_1\tau_1\phi/2)$ ). The induced transformation of the null vectors is $${\nu_1}'=\frac{{\sigma_1}'+{\tau_1}'}{\sqrt2}=\exp(\phi)\nu_1$$ $${\mu_1}'=\frac{{\sigma_1}'-{\tau_1}'}{\sqrt2}=\exp(-\phi)\mu_1$$ $${\nu_2}'=\nu_2,\quad{\nu_3}'=\nu_3,\quad\cdots$$ $${\mu_2}'=\mu_2,\quad{\mu_3}'=\mu_3,\quad\cdots$$ The vector $\nu_1$ is multiplied by some positive number $e^\phi$, and the covector $\mu_1$ is divided by the same number. The dot product is still ${\mu_1}'\cdot{\nu_1}'=1$. You can get a negative multiplier for $\nu_1$ simply by the inversion $\sigma_1\mapsto{^-}\sigma_1,\quad\tau_1\mapsto{^-}\tau_1$; this will also negate $\mu_1$. The result is that you can multiply $\nu_1$ by any non-zero Real number, and $\mu_1$ will be divided by the same number. Of course, this only varies one basis vector in one direction. You could try to rotate the vectors, but a simple rotation in a $\sigma_i\sigma_j$ plane will mix $V$ and $V^*$ together. This problem is solved by an isoclinic rotation in $\sigma_i\sigma_j$ and $\tau_i\tau_j$, which causes the same rotation in $\nu_i\nu_j$ and $\mu_i\mu_j$ (while keeping them separate). Combine these stretches, reflections, and rotations, and you can generate any invertible linear transformation on $V$, all while maintaining the degeneracy ${\nu_i}^2=0$ and the duality $\mu_i\cdot\nu_j=\delta_{i,j}$. This shows that $V$ and $V^*$ do have the correct "variance". See also Hestenes' Tutorial, page 5 ("Quadratic forms vs contractions").
{ "pile_set_name": "StackExchange" }
/dts-v1/; #include "bcm6348.dtsi" #include <dt-bindings/input/input.h> / { model = "Sagem F@st 2404"; compatible = "sagem,fast-2404", "brcm,bcm6348"; chosen { bootargs = "rootfstype=squashfs,jffs2 noinitrd console=ttyS0,115200"; stdout-path = "serial0:115200n8"; }; }; &pflash { status = "okay"; partitions { compatible = "fixed-partitions"; #address-cells = <1>; #size-cells = <1>; cfe@0 { label = "CFE"; reg = <0x000000 0x010000>; read-only; }; linux@10000 { label = "linux"; reg = <0x010000 0x3e0000>; compatible = "brcm,bcm963xx-imagetag"; }; nvram@3f0000 { label = "nvram"; reg = <0x3f0000 0x010000>; }; }; }; &pinctrl { pinctrl-names = "default"; pinctrl-0 = <&pinctrl_pci &pinctrl_ext_mii &pinctrl_mii_pccard>; }; &uart0 { status = "okay"; };
{ "pile_set_name": "Github" }
Q: How to add set elements to a string in python how would I add set elements to a string in python? I tried: sett = set(['1', '0']) elements = '' for i in sett: elements.join(i) but no dice. when I print elements the string is empty. help A: I believe you want this: s = set(['1', '2']) asString = ''.join(s) Be aware that sets are not ordered like lists are. They'll be in the order added typically until something is removed, but the order could be different than the order you added them.
{ "pile_set_name": "StackExchange" }
Monday, 29 August 2011 Anthropogenic habitat modifications don't scare off marsh harriers Over the past several decades, a growing number of studies have linked declines in biodiversity and abundance--especially of birds--with intensification of agricultural practices. Replacement of uncultivated areas with farm fields, use of pesticides, increases in monocultures, and earlier harvesting dates have all been associated with reductions in the quality of hunting/nesting habitats, reproductive failure, mortality of individual birds, and increased heterogeneity of bird communities. However, as has been discussed in previous posts, not all animals respond to anthropogenic disturbance in the same way. Thus, it is likely that some species might not be negatively impacted by agricultural practices--in fact, they might benefit from them. For instance, species that depend on wetlands might thrive in agricultural areas where the use of irrigation has created artificial ponds and wetlands that either generate new habitats or replace those that were previously lost to agricultural expansion. (Hunting marsh harrier, Circus aeruginosus) This appears to be the case among marsh harriers (Circus aeruginosus) in the Catalan Ebro basin, an agricultural area in the Iberian Peninsula. The harriers declined in Europe between 1960 and 1980 because of pesticide contamination, hunting, and heavy drainage of the wetlands where they breed. Harrier populations have been recovering in recent decades, to the point where they are actually increasing their geographic range in some locations. These improvements appear to be linked with the birds' use of artificial ponds/reservoirs created by local farmers. (Map outlining the Ebro Basin area of the Iberian Peninsula. Traditionally, agriculture here included extensive cultivation of cereal crops separated by field margins; fallow grounds were allowed to rest for one or more years, during which time they were used for grazing of livestock. During the 20th century, however, farming practices changed: A variety of alternative crops became popular, irrigation systems were established, and both the fallow system and field margins were eliminated. Currently, the region is an "agricultural mosaic" composed of arable, non-irrigated cereal crops, irrigated fields, dry fruit trees, and irrigated fruit trees.) To investigate this hypothesis, researchers from the Universitat de Barcelona, the Estación Biológica de Doñana, and the Universidad Pablo de Olavide monitored breeding marsh harriers from 1997-2008 and measured habitat variables within and around wetlands where the birds were found nesting. Parameters of interest included type of habitat (e.g., artificial pond vs. reservoir vs. river, etc.), amount of vegetation in the wetland, shape of the wetland, amount of open water, type of agriculture associated with the wetland, and proximity to anthropogenic structures such as villages and roads. Of the 617 total wetlands in the study area, only 51 had the minimum requirements that made them suitable for marsh harrier breeding. Of these, 68% were artificial water bodies associated with agricultural irrigation. Approximately 69% of these wetlands were occupied at least once during the study. (Marsh harrier in flight) Features of both the immediate (within-wetland) and extended (within a 3-km radius of the wetland) environment were associated with chosen breeding territories: Marsh harriers seemed to strongly prefer habitats with higher areas of aquatic vegetation; they were also drawn to wetlands near agricultural fields with highly irrigated herbaceous crops. The importance of these two levels of habitat features--both near to, and far from, the nesting site--suggests that the birds are satisfied not only with the apparent safety of the breeding ground, but also with the likelihood that they will find sufficient prey in the nearby fields. The fact that they are particularly drawn towards heavily managed cropland indicates that the birds are not being scared off by anthropogenic activities. Even better, the researchers did not find any relationship between habitat attributes and productivity. In other words, harriers in agricultural areas are not suffering reduced breeding success because of their fondness for artificial wetlands. The scientists suggest that one of the reasons harriers may thrive in anthropogenic areas is the constant wetness due to influx of water from irrigation; in natural environments, wetlands often dry out during spring and summer because they are not continually supplied with fresh water. The authors also point out how the current results support previous findings suggesting that marsh harriers are able to find an abundance of prey in "agriculturally intense" habitats. However, neither study was able to document specifics related to harrier hunting practices, so more data will need to be collected--how far the birds fly, which areas of the habitat they use, what species they are eating--in order to explain the mechanisms behind their apparent success in anthropogenic areas. Raptors such as the marsh harrier are often used as bioindicators--species whose population trends reflect the health of an ecosystem--because they are at the top of the food chain. This study shows that at least some raptors can adapt to the presence of humans; thus, this group of animals may not uniformly be good at providing early warnings of habitat degradation. However, the researchers point out that "finer cues" such as individual health and survival might indicate forms of ecosystem degradation that were not studied here--including water pollution and pesticide use. This is another possibility that will require attention in future studies. Who is the "Anthrophysist"? I am a biologist who studies the ways in which anthropogenic disturbance impacts animals (especially birds). I hope that the results of my work, and the work of other researchers like me, can help humans learn how to coexist more peacefully with wildlife. I am also interested in the role that nature has played in shaping human cultures around the world and over the centuries. Although this blog will predominantly focus on scientific research, I hope to occasionally profile some anthropological work as well, in order to better highlight the interconnectedness of humans ("anthro") and nature ("physis").
{ "pile_set_name": "Pile-CC" }
Canton of Saint-Affrique The canton of Saint-Affrique is an administrative division of the Aveyron department, southern France. Its borders were not modified at the French canton reorganisation which came into effect in March 2015. Its seat is in Saint-Affrique. It consists of the following communes: La Bastide-Pradines Calmels-et-le-Viala Roquefort-sur-Soulzon Saint-Affrique Saint-Félix-de-Sorgues Saint-Izaire Saint-Jean-d'Alcapiès Saint-Rome-de-Cernon Tournemire Vabres-l'Abbaye Versols-et-Lapeyre References Category:Cantons of Aveyron
{ "pile_set_name": "Wikipedia (en)" }
In-program video advertising is the new black. Our customers can maximize revenue for a show, day-part, audience segment or specific scene of a program. From DoubleClick for Publishers to Watchwith native ad units targeted using an advertiser's DMP, Watchwith is a data driven in-program video ad solution for an increasingly data driven world.
{ "pile_set_name": "Pile-CC" }
Q: How to flatten tables using LINQ I've this query: var usersByBranch = (from u in _db.VRT_User join urb in _db.VRT_UserRoleBranch on u.UserId equals urb.UserId join r in _db.VRT_Role on urb.RoleId equals r.RoleId where branches.Contains(urb.BranchId) select new UserRoleBranchModel { UserId = u.UserId, BranchId = urb.BranchId, RoleId = urb.RoleId, RoleName = r.RoleName }); In this query, for the same userId, the roleId (1-4) and RoleName with the same BranchId are returned separately. I'd like to flatten the rows, so that a row with the same userId contains all the RoleId and RoleName within the same BranchId. Your help is greatly appreciated. A: Not sure what you mean by contains, but you can't use the same UserRoleBranchModel to hold multiple roles, so an anonymous object will do the job: var usersByBranch = (from u in _db.VRT_User join urb in _db.VRT_UserRoleBranch on u.UserId equals urb.UserId join r in _db.VRT_Role on urb.RoleId equals r.RoleId where branches.Contains(urb.BranchId) group r by new { urb.UserId, urb.BranchId } into rg select new { UserId = rg.Key.UserId, BranchId = rg.Key.BranchId, Roles = rg.Select(r => r) });
{ "pile_set_name": "StackExchange" }
A meeting place to exchange views, no matter how different or diverse these may be. Keeping these civil and courteous would be appreciated Wednesday, March 30, 2016 Malaysian Mandate of Heaven Currently Ku Li is in a bit of an embarrassing strife because of an unsigned Stat Dec, but it won't matter much because I suspect Najib really doesn't give two figs about Ku Li being mentioned or involved in a document as an alternative PM, as he only wanted Ku Li's public declaration of support for him (a gimmickry as it has been) to show the Heartland that other than an unhappy unpleasant and unreasonable old man, everyone in UMNO supports his PM-ship. In UMNO there's always all kinds of Machiavellian manoeuvres, all of which we can indeed assume to be surely Machiavellian wakakaka, and where the only difference is only in each's degree of intensity (the Machiavellian nature, that is), wakakaka again. Ku Li had once tried to move democratically against UMNO Baru on a Semangat 46 platform but alas, he found out that fighting from outside against UMNO was near impossible. UMNO had/has the resources (very very deep pockets), the political infrastructure and network, control of the so-called apolitical (but very political) government institutions, and control of the media - it's only in recent times some media outlets have broken free of UMNO's control but this phenomenon may be short-lived. Thus, more so for an UMNO man, erstwhile, former or ex, he or she must get back into UMNO to be able to ascend to where he wants to be, particularly if he/she aspires to be PM. Would Mahathir have become PM if Razak (Najib's dad) didn't invite and accept him back? Would AAB (previously aligned with Ku Li) have become PM if he didn't kuai kuai kowtow to Mahathir and return to the Mothership? Thus Ku Li returns to UMNO, to wait and wait and wait for his chance to become PM. But he was both too cautious to take opportunistic chances and also too much of a proud aristocrat to kowtow kuai kuai to the demands and conditions of a commoner like Mahathir. Yes, poor Ku Li was not as sly and as quietly kuai-laan as AAB and Najib who both acted as if they would 'tremblingly hear and obey' but gave Mahathir the two fingers once they become PM, wakakaka. Alas, but it has to be said that AAB didn't fare too well in this regard though Najib seems to be resisting Mahathir's multiple attempts to dislodge him, wakakaka. Anyway, there is no denying Ku Li has always wanted to be PM, which explains the SD the DAP has shown in an attempt to chip away and undermine the perceived support Ku Li has declared for Ah Jib Gor - see MM Online's Zahid can corroborate Ku Li’s role in SD, says DAP man. However, this time I suspect Ku Li might have finally abandoned his 35 years' dream - one which sadly for him couldn't be realized only because he had foolishly given way to Mahathir as Hussein Onn's deputy because he had wanted to first sort out UMNO's financial business (Ku Li had the highest support compared to the other 2 UMNO VPs), and eventually as Malaysia's 4th PM, and only because he also foolishly believed Mahathir would keep his word to have him as DPM. Sigh, he doesn't have the Mandate of Heaven, wakakaka. Mandate of Heaven In this regard, yes, we could say Mahathir had been treacherous to Ku Li in not keeping his words, an agreement to make the latter as his DPM as Ku Li had willingly given way to him to be deputy president UMNO and of course the PM, but then what do you expect when that's UMNO, a veritable nest of vipers. Nonetheless, why has he (Mahathir) complained about AAB and Najib not keeping their word to him? Didn't he set the example vis-a-vis Ku Li for them to follow?Ain't karma such a bitch? Wakakaka. But wait, I apologise for boring you with this sense of outrage at the blatant double standards because I kept forgetting that's UMNO, wakakaka. And that's why, to reiterate, UMNO is a nest of vipers with mucho Machiavellian activities and schemes, wakakaka, which BTW should also include Anwar's attempted move against Mahathir back in 1998. And to show my argument is true that UMNO blokes like Ku Li and Anwar (and indeed even Mahathir himself) prefer to be within UMNO than outside, let's see what Anwar did after he was out-manoeuvred by Mahathir following the failed attempt to oust the Old Man in June 1998. OK, let's hear what he said just a mere two months later, on 12 August 1998, during the opening of the then-new Penang UMNO building. That was when the UMNO jungle drums were already beating away that Anwar was going for broke for the presidency of UMNO because of the virtually irreparable rift between the two UMNO top leaders, wakakaka. Anwar said:"I have said this many times, but it has all been for nought, but right here in front of my Penang friends, I want to announce my full support and loyalty to Datuk Seri Dr. Mahathir Mohamed for him to remain as party president." "Dr. Mahathir is not a new leader. He has vast experience in all matters. If you compare me to him, I am just a student. I can never go against my mentor, much less my father. We may have some differences but it is impossible to believe that these petty differences will split us up. When it comes to important matters, including economic issues, we stand united." Well, … mentor-student, vast experience in all matters and father-son ... what do we make of those sweet endearing words? Hmmm, Anwar had said this of Mahathir during AAB's time when the latter was encountering mucho problemo with His Imperial Maharaja, wakakaka, that Mahathir was suffering from delusion about his stewardship of the country: “He is surrounded by tok ampu (apple polishers) who never tell him the real picture. That is why he never gets the real truth. In that sense, I pity the man.” Now, when Anwar lavished those sweet syrupy words of … mentor-student, vast experience in all matters and father-son ... for Mahathir on 12 August 1998, wasn't he also one of those tok ampu he complained surrounded Mahathir? Wakakaka. And we all knew his tok ampu-ness' sweet honey-laced words cut no ice with an already furious fuming Mahathir. Yes, Anwar knew the near insurmountable difficulties of becoming PM when outside UMNO, which was why he fought tooth and nail to get back into the Mothership, even unto suing Mahathir and the government in 1998 for unconstitutional dismissal of him from his DPM and Finance Minister's positions - my late Bhai was his lawyer. Utusan reported: He also sought a declaration that his dismissal as from 5.30pm on Sept 2 1998 is null and void, inconsequential and of no effect. Anwar, who is also seeking a declaration that he is still a minister in the cabinet, is also asking for cost and any further or other relief deemed fit and proper by the court. But as I mentioned it's not easy to fight 'city hall' from outside for reasons listed above - naturally he lost and Mahathir triumphed over him once more in that court case. But he still didn't give up because when he was released by AAB in 2006, we were told by a Malaysiakini news report on 10 August 2006 that he sought out Ku Li for advice on his political future. This was what I had blogged a day after the Malaysiakini report: Tengku Razaleigh (Ku Li) has confirmed what I have been averring all along – that Anwar Ibrahim yearns and plans to return to UMNO. I had stated that once a person has experienced power at the very top, as Anwar Ibrahim had before he was ousted on the eve of his prime ministership, that person would find it extremely difficult to accept being at a lower political position, like say, a mere opposition leader. And in Malaysia, there is only one avenue to the top of the political hierarchy, via UMNO, full stop! After Anwar was released from prison, he went to see Ku Li. Ku Li advised him that there were only two parties for Anwar to reach the top, rejoin UMNO or join PAS to become its head and transform the Islamist party into a modern attractive and powerful alternative party. If he was able to achieve the latter he could even be the first PAS PM. Ku Li also advised him to stop mucking around with loser PKR. But obviously UMNO is the easier path of the two. Ku Li said: “I advised him if you want to get back to mainstream politics, or want to be prime minister, you should go back to UMNO. How? He has to work it out. I am not to advise him [on that]." Ku Li told Anwar: "Your wife (Dr Wan Azizah Wan Ismail) only won because it was your (previous) seat in Permatang Pauh".[recall in the 2004 GE how Wan Azizah scrapped through after a couple of recounts (losing in the first two counts), winning with 21,737 votes to UMNO Pirdaus Ismail's 21,147, a scary majority of only 590 votes which in practical terms translated into a win by only 296 votes - and that was what must have influenced Ku Li's words] However, Ku Li told Malaysiakini he doubt whether Anwar will win if he (Anwar) were to stand again in Permatang Pauh - unless he stands on either PAS or UMNO ticket. According to Ku Li, Anwar agreed to his advice. But alas for him, he couldn't batter down the shut-very-tight UMNO gates, wakakaka, despite his attempts to charm AAB, on which I have a couple of posts, wakakaka. Hmmm again, I wonder whether it was a coincidence that GAN (Gerakan Anti Najib) or as it's known today by its English acronym ANC, started around that time in which a poor and already dead Shaariibuu Altantuyaa was repetitively 'murdered' by Malaysian politics (extracts): By sheer speed of their computation of advantage What to extract, exploit, extricate from my name Squeezing the very last speck of desiccated blood From my hyper cold shattered fragments of bones Eager hands raided the ossuary for me to be laid As stepping stones for the progress of a demigod On Ardha-Matanga, 4 tasks & seven white trunks Saluting Brahma, walking to Amarawati by a lake As the pseudo-pious pirouetting pachyderm crushesWhat little good left of my name, what trust existsIn my family’s hope for requital of my cruel murderI realize those raucous battle cries were not for me Oh, what filial piety PKR had shown to Altantuyaa Even in 2008 when Pakatan Rakyat was riding a political tsunami and performed its best, it was still short of 30 seats for a majority, testifying to the difficulties in (not impossibility of) dislodging a 50-year old established 'city hall'. The BN's majority of 58 seats in 2008 (140 vs PR's 82) meant that Pakatan was short of 30 seats, a charming round figure, to depose BN from majority rule, but alas Anwar didn't couldn't wait until GE-13. His impatience led to the shameful 916, a sickening best-forgotten attempt to subvert the supremacy of the ballot box, and an event which saw ONLY my Bhai speaking out angrily against the sleazy slimy sickening frog-ology-to-majority-rule, a trademark of tadpoles hatched in the cesspool. But I wonder whether the new charming 'de facto' (wakakaka) PKR leader, will play the game that AAB and Ahmad Zahid Hamidi had played quite successfully? 1 comment: Ku Li whatever his intentions were,have to be careful of whom he shared his bed with.Whether it is Mahathir's gang or the shameless,headless and good for nothing opposition.Now all their pillow talk and bedroom roams are thrown out in the open,including the kitchen sink and toilets.Ku Li should have known by now,how dangerous women scorned can be. About Me Just a bloke interested in the socio-political whatnots around the world, particularly those in Malaysia. Loves a laugh or/and story or two, or more, but loves civility and courtesy much more, especially in politics
{ "pile_set_name": "Pile-CC" }
A TV icon, Mr Body Language and a police officer walked into a conference... A TV icon, Mr Body Language and a police officer walked into a conference... 05 January 2017 We had the pleasure of participating in the FBAA National Industry conference in the last week of November. As always it’s an outstanding event bringing together an 800 strong mix of brokers, celebrities, gurus and experts. Here are our highlights. Speakers While we work in the finance industry there’s much we can learn from other industries and take back to our day jobs. Hearing from Allan Pease on the art of body language was an eye opener, Graeme Edwards from the Queensland Police showed us the importance of cyber security for while Adam Franklin showcased his guru credentials with a masterclass on social media marketing - a must for any broker looking to build their business. The headline act was Mr Mark Bouris of Yellow Brick Road and Apprentice Australia fame and he didn’t disappoint delivering his keynote in typical charismatic and confident style. Race to the finish At our very own stand we hosted delegates who lined up against each other on our racing simulator. Things were competitive through the day but our clear winner (if not of an actual race) was Peter White of the FBAA! Gala dinner and awards Festivities at Movie World are always fun and the 2016 edition didn’t disappoint. Capping off a great evening, big congratulations to the winners of the 2016 FBAA awards: Thanks to the FBAA for putting on a brilliant event, we had a great time at the event and look forward to participating again next year. If you would like to discuss how we can help your clients grow their business we’re back on deck after a short break so contact us now. Requiring Finance? If you require a business loan from $5,000 to $500,000 with no upfront fees then apply now! We'll have one of our loan consultants call you as soon as possible.
{ "pile_set_name": "Pile-CC" }
; ; Definition file of CRYPTCATSVC.dll ; Automatic generated by gendef ; written by Kai Tietz 2008-2014 ; LIBRARY "CRYPTCATSVC.dll" EXPORTS CryptsvcDllCtrl
{ "pile_set_name": "Github" }
Single Moms Are Like Real-Life Wonder Women “The number one thing moms never discuss are the days that are really hard.” Let’s be honest; being a single mother is hard. Going through the ups (and many downs) of pregnancy, painfully pushing through childbirth, and then putting everything you have into raising a child is no easy feat, and when you have to face all of it alone without a partner to battle along with you, life can be even more difficult. To help cope with the flood of emotions and new life experiences being thrown at her, she started The Single Mum Diaries, a blog which would allow her to write about all of the things she was learning, and as a support network for other women who might find themselves pregnant, alone, and without a clue what to do next. Stead is honest, taking a no-holds-barred approach to single-motherhood on her blog and in life, and isn’t afraid to give her real thoughts on being a stand-alone parent, not needing a man in her life to ‘save the day’, and feeling like Wonder Woman at the end of a long day of parenting and doing it all on her own. I spoke to Stead about what she’d learned being a single mom, and why it’s empowering as hell for her… When you found out you were pregnant, what things went through your head? “When I found out I was pregnant I was really excited, but it was definitely unplanned. I was more of a ‘career’ type of person and my partner at the time had actually suggested having a baby and I told him it was not really something I wanted to do at that point in time. It was only a couple of days later that I thought “Oh, my period hasn’t come…” so the whole pregnancy was really quite a shock to me. Obviously, life had other plans for me and decided to send me down a completely different path” What is some advice you give to women who have been left while pregnant? “It’s such a difficult and emotional time. I think the main thing for me, whether it’s being left pregnant or an emotional relationship that’s fallen apart, is you’ve really got to get to a place in your mental state where you can start to use your pain as your power to move forward. That’s one of the mantras that I’m always telling women in these situations; use your pain as your power and go from looking at him as an ex-partner to looking at him as the father of your child, and try really hard to differentiate the two. Which, honestly, hasn’t gone too well for me but I’ve definitely done everything in my power to keep thinking about it that way. I think that’s definitely my biggest piece of advice is to try to change your mindset about the situation, as hard as it can be. Because while you might want to just mope around and be really upset, I think when you’re pregnant, you’ve got that other person that you’re starting to think about as well so it isn’t as hard as a regular breakup, in my opinion, because you’ve got that force behind you. So many of the women who I speak to that have been left pregnant are married, which shocks me because I just didn’t think that would be so common. I remember when I first fell pregnant and he left, I thought “We should have got married first and we could have worked through this situation,” but then I met all of these women saying their husbands just couldn’t handle the responsibility and left. And now these women have gone on to buy homes or start businesses and I look at them and I think they’re amazing.” What are some things you’ve experienced as a single mom which have surprised you the most? “Obviously, there are single moms out there who have the financial support of having an ex-partner who actually contributes, but then you’ve got people like me who are doing it all on their own. And we’re actually not as rare as I first I thought at the start. I thought to be a single mom was a really embarrassing thing but it actually happens to people every day. But the financial side of it was quite a shock to me. That, and I think the other most surprising thing is the level of guts that it really takes every day to be everything that you need to be for two people. You really have to dig deep inside yourself to give yourself to your child when you’re going through something so big and don’t think you have the energy to get up and be a mother. You’ve really got to try hard to make sure you can get through every day and I think that’s been one of the most surprising things is just seeing myself get to a point where I’m so exhausted but then I get that second wave of energy where I realize I have to be a mom and I get up and do it.” What’s the highest point of motherhood for you? “Just seeing this little person grow up into someone that you’re proud of. That’s definitely the highest point for me. I just love seeing their little mannerisms come out and noticing the ways that they’re so kind. Ever is very much a caring little person who’s always hugging other kids at daycare and kissing people. She’s very caring towards them. So I think seeing their little personalities grow as they start to form into a person is definitely the highlight.” What are some of the ‘unspoken’ negatives of being a single parent? “I think the number one thing that moms never discuss are the days that are just really hard, and the days where you’re really struggling. I think they feel that if they share these bad feelings they’re going to be frowned upon. Privately, among mothers, we definitely talk about “Oh my god, I said this horrible thing today,” or, “I screamed at her,” or “I shouted at him,” and things like that which you’d never openly discuss. I try and do as much as I can of that on the blog without opening myself up to unnecessary negativity and be as honest as possible. I definitely think you need to be open about the days where you’re having a really tough time and not try to make it a joke. I think some moms try and sugar-coat the bad times as if they’re funny, and I think that can make other mothers feel a bit worse. And the amount of mother-shaming you experience is such a crappy surprise as well. Online, yes, but even in public people will shame you because you’re not parenting the way that they would have. That’s a really big shock too. You’ve just entered motherhood and doing the best you can and strangers start saying to you “I’d have a sweater on that child,” or “Have you wrapped that baby up enough?” when they’re a newborn and the baby has 4 layers on and looks like it could be in the Antartic and you’re just thinking “yeah, I’m pretty sure it’s wrapped enough…”.” How does being a single mom make you feel empowered? “I think being a single mom is empowering because of the fact that you’re doing the roles of two people when most people have that other person. So I think you do sort of get an air about yourself like, “I can do anything because it normally takes two people to do this but I can do it all on my own.” That’s definitely something that I take a lot of pride in. A lot of people write to me and say, “Oh my god I don’t know how you do it as a single mom. I have a husband or serious partner and I couldn’t imagine doing what you do.” When those comments come in I feel really proud of myself. Because I’m so knee-deep in single parent life I sometimes forget not everyone has to do it all on their own. I don’t really have anything to compare it to because Ever’s father was never in the picture. For me, I think you just need to give yourself a pat on the back and know that you are doing a great job and generally it takes two people, plus a whole entire tribe, so it’s pretty good to be coping on your own. Everyone has their own path, that’s what I always say to people. Not many people are picked to travel such a hard road and I think people forget that. I think these kinds of things are not a coincidence; you were picked for this and the lessons that come from it, you were chosen to learn those. That’s what I believe anyway. Whether it’s starting something like the ‘Single Mum Diaries‘ and helping people all over the world, or buying your own house, or discovering how to be strong on your own, you’ll eventually learn why this has happened to you and it will all become clear to you.” Leila Stead partnered with Warner Bros. Consumer Products as an ambassador for the Wonder Woman Mother’s Day range available in store and online at Big W. Pictures supplied by Single Mum Diaries, taken by Amylu Photography. Comment: What are some of the most empowering things about being a mother to you? Want More? Have our best reads delivered straight to your inbox every week by subscribing to our newsletter.
{ "pile_set_name": "Pile-CC" }
Finger Point (Victoria Land) Finger Point () is a narrow rocky point forming the eastern extremity of The Flatiron, in Granite Harbour, Victoria Land. It was mapped and descriptively named by the British Antarctic Expedition, 1910–13, under Robert Falcon Scott. References Category:Headlands of Victoria Land Category:Scott Coast
{ "pile_set_name": "Wikipedia (en)" }
“The Six Million Dollar Man” was one of the most memorable episodic TV action dramas of its day back in the early- to mid-1970s; but, strangely, it has rarely been seen since the long-running series was suddenly cancelled in 1978 after a successful run of five seasons and four TV movies. The show detailed the exploits of ex NASA test pilot turned secret agent, Steve Austin (Universal contract player Lee Majors), who worked for the Office of Scientific Investigation (OSI) under the ever-watchful eye of his best friend, Oscar Goldman (Richard Anderson) -- the Washington-based Governmental agent who sent him on his varied missions every week, involving everything from robotic replacements to Cold War telepathic spies and crime magnates, not to mention the odd towering, alien-created Bigfoot cyborg. Austin stood out as an ordinary guy made especially unique by science through having had his right arm, both his legs and his left eye replaced in pioneering work developed by Dr Rudy Wells (played by several actors across the run, but made iconic by Martin E. Brooks from series three onwards), after an near fatal plane crash left him nothing more than ‘a man barely alive’. At Wells’ secret Government funded Colorado research facility, Steve Austin was brought back from the brink, sporting new artificial limbs with ‘bionic’ components that gave him superhuman strength and enhanced 20:1 vision, to make him ‘better than he was before’. Lee Majors quickly became a handsome 1970s sex symbol in polyester thanks to this show, which turned into a showcase for his trend-setting side-parting and his relaxed approach to the art of ‘raised eyebrow acting’, rivalling even the great Roger Moore for effortless charm. The actor was a true American hunk and as the show went on to become more and more popular, all those dynamic running poses with bell bottoms flapping, and the gigantic bionic leaps that so entranced impressionable viewing youngsters in 1970s playgrounds, were joined by an increasing awareness of Majors’ sex symbol status for young women -- with the actor often seen sporting unbuttoned shirts that exposed his copious chest hair at every opportunity from season four onwards; although the moustache he grew that year was always to be viewed as a big mistake by anyone with even a modicum of taste! Majors’ impossibly model-beautiful wife of the time, Farrah-Fawcett Majors, appeared frequently as a guest star on the show in a manner that flagrantly courted the couple’s celebrity star status without shame before she became equally famous in her own right on “Charlie’s Angels”; and when the fresh-faced Jaime Sommers (Lindsay Wagner), the bionic woman, was introduced in a captivating two-part love story near the end of Season Two, bringing family atmosphere to the fore like never before, the series really caught the imagination: for this was suddenly an action show for all the family, one that also boasted a warm, folksy humanity in the midst of its otherwise way-out tales of Mabuse-like criminal masterminds with off-the-wall adventure plotting. The producers very cleverly were able to weave the series’ progressive can-do attitude regarding the potential achievements of technology and progress, into stories that also functioned as traditional homilies promoting an ethic of home-grown fortitude and fairness, and above all, humanity. To catch up with the show again after well over thirty years, thanks to this comprehensive boxed set ,which contains every single episode and TV movie ever made, including the reunion films of the 1980s and mid’90s and all the cross-over episodes of “The Bionic Woman”, soon proves to be something of a spur to some serious Proustian-style involuntary recall for those of us of a certain age, a flood of childhood experiences and feelings, tastes and sounds rushing back at the first sight of the cybernetically enhanced astronaut and all-round handsome hunk that was Steve Austin back then, in all his full-blown, slow motion, action posed prime, accompanied as always by Oliver Nelson’s brilliant swelling theme music sting and the unmistakable metallic-twang that constituted Austin’s famous ‘bionic’ audio sound effects. The word bionic became entrenched in the modern vernacular as a result of this series and remains so today, and even despite the fact that watching back now what at the time always appeared to be a super-slick piece of high quality action drama, in hindsight often reveals a show that was clearly suffering from its impossibly tight six day shooting schedule and struggling to hold itself together coherently as a result with the help of Universal’s stock footage library and the studio’s standing sets, the show still works more often than not. Though it sometimes has to make do with relying on rudimentary, get-the-job-done, point-and-shoot camera work and rushed and awkward-sounding dialogue, nevertheless many of these episodes cause a tingle down the spine and produce a thrill of recognition to this day. The show still sports one of the great title sequences of all time, unbeaten for setting the scene and evoking the required atmosphere. Majors, Wagner and Anderson were perfectly cast to play enhanced versions of their own natural personas, developing a rapport that made every clumsy line and daft storyline resonate despite the silliness and cost-cutting fast production. These mono audio episodes vary in the quality of their surviving prints, generally getting better as the years pass, although all are perfectly acceptable. The episodes of “The Bionic Woman” included here for some reason look the most vibrant. The collection comes utterly jam-packed with extras in the form of a multitude of featurettes which can be found on special supplementary discs dotted throughout the forty disc set. Each series has its own dedicated disc of extras, the centrepiece of which is an in-depth interview with one of the cast or crew, titled “OSI Debriefing”. The first one up is a one-hour-and-seventeen minute interview with executive producer Harve Bennett. Bennett tells how he was charged with turning the original premise, as featured in Richard Irving’s movie of the week (which had been adapted from a novel by Martin Caidin called Cyborg), into an initial series of thirteen episodes, with only six weeks’ notice from Universal; and he relates the pressures of shooting each of the episodes in just six days: a full one day less than was normal for most drama series at the time. He talks about how he went about portraying the character of Steve Austin differently from the way he had been envisioned in the previous two movies, playing more on Lee Majors’ ‘cowboy’ persona rather than the tuxedo-clad Bond figure he was being moulded into. And he lays emphasis on how the series focused on the character’s humanity in contrast to his superhuman capabilities. Bennett talks about the creation of the famous title sequence, the bionic sound effect created by Jim Troutman, and how Steven Bochco (who ghost wrote the pilot movie) played a key role in finding writers for the series -- many of whom created some of its most famous episodes. Bennett then talks at length about the campier elements of the show in later years, which started to appear as the way-out sci-fi themes began to play more of a part in the stories, particularly when concerning the frequent appearances of the ‘Bigfoot’ character. There’s also discussion of the spin-off series “The Bionic Woman” and the casting of Lindsay Wagner, plus the many crossover episodes, which were designed to carry over the audience from one show to the other. Bennett also talks about the relationship between Lee Majors and Farah Fawcett. After Kenneth Johnson wrote the two-part episode “The Bionic Woman” for season two, Harve Bennett employed him as a producer-director on the following season, which included a Bionic Woman sequel which led to a spin-off series, and which he ended up producing at the same time as working on “The Six Million Dollar Man”. The extras disc for season three includes a 90 minute interview with Johnson which covers in great detail his entire career and includes a great many anecdotes concerning his development of and involvement with “The Incredible Hulk” TV series, as well as his work on the two bionic shows. This is a fascinating talk, covering just about every imaginable aspect of the show, made all the more compelling from the fact that Johnson has a good memory and a lively mind, and is able to talk non-stop without hesitation about a variety of related subjects, from his determination to inject some humour into the show (which he felt could sometimes come over as being a little over-earnest in its first season) to the sexism inherent in the Bionic Woman doll which was marketed, against his own wishes, with an emphasis on make-up and fashion. As well as recounting in much detail the making of his most famous stories, such as all the ones involving Jaime Sommers (a character he created from scratch) and the two-parter called “The Secret of Bigfoot”. Johnson talks about the particular type of realism-based escapist fantasy which marked out 1970s TV drama, and he even gives his own opinion on why the attempted re-boot of “The Bionic Woman” didn’t take off despite the continuing affection many people have for the original series. One really gets a great sense from this extensive interview of what it was like to produce episodic TV drama under high pressure conditions in the 1970s, and of the kinds of short cuts that so frequently were required just to get the show on the air in the time allowed. Amusingly, while commenting on the unusually close relationship between Oscar and Steve, Johnson reveals that he and writer James D. Parriott used to imagine that the two might be lovers and even (for their own amusement) often wrote scenes for them that ended with the two kissing! Oscar Goldman, aka Richard Anderson, appears in a fifty-five minute interview in which he talks about the series in general, starting with how he first learned he’d got the role on the night before shooting began on the second TV movie. After staying up all night to get up to speed on the script, Anderson decided to wear shaded glasses for his first scene, to hide the inevitable bags under his eyes from the late night. Subsequently he developed a bit of business which became quite famous among fans, which was inspired by his hero Gary Cooper, in which he removed his glasses whenever he needed to underline a dramatic pause in the script. The veteran actor talks about the importance of the chemistry between himself and Lee Majors and how it gradually developed more and more the longer they worked together. Since his role in the series was mainly to provide set-up and exposition for whatever mission Steve Austin had been given on any particular week, it was important that the relationship between the two be believable. Anderson also talks about how the heroism evoked by the series had a great impact on audiences watching during difficult times in the 1970s. He mentions how different in tone “The Six Million Dollar Man” became from “The Bionic Woman”, with the former becoming more and more macho as it went along, while Lindsay Wagner’s influence militated more towards finding ways of avoiding overt violence to solve problems on her programme. He explains his famous tan as being a way of avoiding having to go into make-up, which he loathed; and he remembers the Oscar Goldman action figure, which came with its own toy office set! The soft-spoken actor is still an enthusiastic advocate for the programme, and he explains how it was he who got the reunion movies off the ground in the 1980s. Martin E. Brooks takes part in a 63 minute interview about his three years on the show, recalling how he took over the role previously played by Martin Balsam and Alan Oppenheimer, of Dr Rudy Wells, after his long-time tennis partner Harve Bennett offered him the role as a ‘one shot’ job at the beginning of season three. In fact it turns out that both the actors who played the role before him were close friends of Brooks’. After starting out in the role by trying to grey his hair and make himself look more physically like Oppenheimer, Brooks eventually started playing the role ‘as himself’, after he was cast full time in the role. Brooks remembers the set as being full of good-natured male bonding based on practical jokes and humour, thanks largely to the influence of Lee Majors. He remembers Lee as being very athletically inclined and always eager to perform as many of the show’s stunts as he possibly could himself. Richard Anderson he remembers as someone who was obsessed about topping up his tan between takes, but he’s impressed about how Anderson developed the relatively thankless role of Oscar Goldman and made him into such an iconic part of the show. He talks about coordinating his role as Rudy Wells in both “The Six Million Dollar Man” and “The Bionic Woman”, and sometimes getting confused about which lines he was meant to be delivering, since he would sometimes be moving from set to set in the same day. He sees it as being a mistake to end the show after five seasons and is mystified as to why there were so few reruns once it was cancelled. Brooks looks back at some of the many guest stars who appeared, including a young Sandra Bullock, and recalls his favourite episodes of the show during his three year stint. Finally, Lee Majors talks for 83 minutes on his career and his time on the show, recalling the changes made to the character between the TV films and the series to make it more child-friendly, especially since there was an emphasis on making Steve Austin more of an approachable, human character and on not having him constantly killing the baddies at the end of every story. He mentions working with Lindsay Wagner and Richard Anderson and particularly recalls the episodes involving Andre the Giant. He remembers the huge amount of running he had to do on the show (not always easy when wearing flared bell bottoms!) and his love of on-set practical jokes (which didn’t go down well with executive producer Harve Bennett), and recalls his insistence on doing as many of his own stunts as possible. His favourite episode is the football-themed one (which he also directed himself) and he mentions the dreadful song he wrote and sang for the Bionic Woman episode as well! The fight scene involving John Saxon in season 1 is a favourite memory, and we find out here that the moustache of season 4 was really a rebellious form of practical joke aimed at the executives who tried to enforce a certain look on him in order that episodes from different seasons might be mixed and still be screenable in any order. The executives in what Majors calls ‘the black tower’ only saw the moustache in dallies, by which time it was too late to do anything about it. Much of the above extensive interview footage crops up again edited into other featurettes throughout the set, such as one that provides a fascinating look at the science of “Real Bionics” (11 minutes). Here, writers and producers on the show talk about how, at the time it was going out, they frequently received letters from real amputees, wanting to know where they could go to get bionic limbs fitted for them-selves. This could be particularly heartbreaking when the letters were from children; writer and producer Kenneth Johnson tells how he often had to try and gently break the news in his replies that no such bionic limbs existed in reality at that time. But in that curious way in which life so often imitates art, many of the technical experts who work in the field of bionics today (interesting that they actually do use that word as well!) were originally inspired to get into it by the series, and this featurette also demonstrates the cutting edge of the current technology being created for some of the veterans of the conflicts in Iraq and Afghanistan -- including the latest high-tech artificial leg that can match its gait with that of the person it’s attached to after being hooked up to a laptop that runs special software which helps the limb reprogram itself. Meet The Cast featurettes: again, mostly composed of clips from the full-length interviews, these profile pieces for Lee Majors, Lindsay Wagner, Richard Anderson and Rudy Wells feature the actors, and various producers and directors discussing how each actor got the role originally, and what made them so special in the parts as they developed their characters across the seasons. Each one runs for between 10 and 15 minutes. “An iconic Opening” (18 minutes) looks in detail at the thinking behind and the actual craft that went into the creation of the iconic title sequence. Jack Cole was an experienced director of title sequences for US TV drama in the 1970s and he and Harve Bennett talk about how they took footage from the original pilot movie and remoulded it to make the dramatic intro which became world famous. Looking at how they selected and combined images, the layering of sound and the way in which the title sequence created a particular visual quality and set up the texture and tone of the show for the episode that came after it, this is a really enlightening documentary on an important aspect of the creation of a TV series that is so often overlooked, even though it quite often ends up being the one thing fans remember the most vividly. “Season VIPs: The Six Million Dollar Man Guest Stars” is, naturally enough, a light-hearted look at the careers of some of the actors who have appeared as guest stars, which examines the characters they played with the help of various fans and classic TV experts who feature as talking heads. Each season comes with its own featurette in which the guest stars for that particular collection of episodes are noted and their performances commented upon. These come dotted throughout the collection and run for around 10 minutes each. “Bionic Breakdown” is really just a collection of clips from across the entire five series run, which demonstrate the capabilities and the uses to which Steve Austin puts his bionic limbs during the series’ five year history. The writers would quite often add new bionic features on a whim for that week’s specific episode it seems, so if you thought it was all about the exercising of terrific strength etc., think again: the eye can be anything from a heat wave detector one week to an infra-red sensor the next, as well as the 20:1 magnifier it’s mostly used for; and when he’s not using it to bend iron bars and snap locks, the arm also doubles as a radiation detector and even a power supply unit. “Bionic Sound Effects” relates how the distinctive synthesised clanging noise, christened ‘the singing sword’, which became so associated with the use of Steve Austin’s bionic powers along with the slow motion effect, was gradually introduced into the series. In fact, all of the famous sound effects were not fully and consistently in place until well into season three of the series. “The Six Million Dollar Man Fans: So Loyal, So Bionic!” is a light-hearted 13 minute featurette in which fans recount their memories of watching the show when growing up, and tell what it meant to them at the time. Also various directors and crew members, as well as Lindsay Wagner, talk about their impression of the fans and their dedication to the show. “The Six Million Dollar Man’s Best Villains and Fights” is another light piece in which fans and production members list some of the most memorable episodes in terms of providing formidable foes for the bionic man to battle against. John Saxon’s robot Major Sloan, Monte Markham’s the Seven Million Dollar Man and the unstoppable death probe machine are some of the main contenders, along with various aliens, the Fembots and, of course, the ever-popular Bigfoot. This lasts for 17 minutes. “TV Goes Bionic: The Origins of the Six Million Dollar Man” is a featurette in which fans, producers and actors talk about how the series got going initially as a TV movie based on a series of novels by lecturer, teacher and pilot-turned sci-fi novelist Martin Caidin, and how it took something of a wrong turn when ABC tried to mould the character of Steve Austin as a James Bond hero in the follow-up movies. “The Bionic Age of TV: The Success of the Six Million Dollar Man” takes up the story again when Harve Bennett takes over control of the TV series for its first season and collaborates with Lee Majors to emphasis the humanity of the character. The show’s success was consolidated when Bennett brought in new writers such as James Perriott and Kenneth Johnson who then created Jaime Sommers, leading to a spin-off show and many cross-over episodes. The featurette goes on to track the main highlights of all five seasons, including the Bigfoot episodes and the introduction of the campy Fembots. Kenneth Johnson talks about how the production was constantly under the Universal cosh, with the emphasis always being on churning the episodes out on time and without overspending. “Top Secret: OSI, NASA and Bionics” is a short featurette looking at how the show dealt with technology, secret services, and how NASA often gave the show the opportunity to film at some of their rocket facilities, such as Cape Canaveral. “The Reunion Movies: Life after the Series” talks to the producers, writers and directors behind the three reunion TV movies shot for NBC and CBS in the ‘80s and ‘90s. The projects got rolling at the insistence of Richard Anderson and after initial reluctance by Majors and Wagner to get involved, the resultant films did at least bring the relationship between a now much chunkier and wrinklier Steve Austin, and a more mature Jaime Sommers, to its inevitable slushy and romantic conclusion. “The Pop Culture Effect” looks at the elements which came together to make the show iconic in a TV landscape of medical dramas and cop shows: the memorable music, the use of slow motion, the bionic sound effects. In later years these helped provide the substance of a great many references and parodies in other films, from “The 40-Year-Old Virgin” to “Family Guy”. (12 minutes) “Bionic Action … Figures!!” An enjoyable 30 minute documentary about all those toys and action figures and the other merchandising such as lunch boxes and puzzles the show spawned. Everyone remembers the Steve Austin action figure with its detachable bionic arm, complete with roll-up skin so that you could see his bionic components; but the series also gave rise to a host of other figures and appliances: from Steve’s rocket/revival capsule to Oscar Goldman’s exploding briefcase; from Bigfoot to Maskatron, the ultimate robot foe -- this film looks at them all again with the help of the cast themselves (Lindsay Wagner ruefully recalls her excitement at getting to see her doll for the first time, only to realise that it looked more like Farrah-Fawcett Majors!) and dedicated fans of the show. “The Stunts of the Bionic Age: Pushing the Envelope” is a 28 minute documentary in which Lee Majors and his stunt double Vince Deadrick recall perfecting the backwards jump and talk about the most dangerous stunts in the shows history, including one in which the stunt coordinator almost died and another in which Majors found himself teetering, suspended two-hundred feet from the ground on greasy cable car wires, because the stunt double was too ill to take his place. Rita Egleston also talks about doubling for Lindsay Wagner on “The Bionic Woman” and having to have her skirt weighed down at the hem in order to stop it ruining the backwards jumping effects by flairing upward! The two-part episode “The Bionic Woman” is the first in the set to get a commentary, and it’s a typically well-prepared one from the episodes’ writer (and later producer of both “The Six Million Dollar Man and its spin-off “The Bionic Woman”) Kenneth Johnson, as he goes into lots of detail about the development of the original idea and the storyline, and also how Universal wanted a romantic episode with a death at the end to cash in on the success at the time of the movie “Love Story”. The episodes mark a distinct change in tone for the series, but such was the popularity of the character of Jaime Sommers and her rekindled romance with childhood sweetheart Steve Austin that the producers were soon working on a way to bring her back. Johnson makes clear the constraints these episodes were made under, and although his idea of a low budget would’ve seemed like spectacular luxury to many British TV producers at the time, the crew were still attempting to shoot an hour-long film in just six days when a movie would take six times that much time under normal circumstances. Johnson remarks on the perfunctory, flat TV lighting style and the unadventurous point-and-shoot directing aesthetic so common in TV at the time, and emphasises just how much of the popularity of the show came down to the chemistry and performances of the actors who often had to sell some pretty hastily written material through charisma alone. Johnson also provides a commentary on season three’s pinnacle and probably one of the most memorable stories from the entire series, the two-part “The Secret of Bigfoot”. Once again, the producer/writer has done his homework and is able to provide extensive filmographies and biographical information about every guest player seen here, including of course the striking performer who played Bigfoot himself, Andre the Giant: a former wrester who spoke only French and who stood 7 foot six inches tall. We learn some unlikely facts about Andre’s life, including that he lived next door to Samuel Beckett as a child and that the great playwright used to drive him to school! Johnson reveals how the story was written to take advantage of the Universal tour’s ice tunnel ride, but is quick to point out the dated aspects of the production caused by the need to shoot quickly and also because each episode ran at least five minutes short, which forced him to pad them out with lots of stock footage from the Universal archives. He also reveals how the striking white contact lenses used by Andre as part of his Bigfoot makeup gave Johnson the idea to use the same makeup effect when he came to make “The Incredible Hulk” TV pilot movie. Johnson talks about the importance of finding writers who could work quickly and come up with usable ideas, and how the executive producer credit was often used as a means simply of keeping good writers on-board, since once you found someone who could supply what you needed to keep the show on the air, you did anything you could to hang onto them! Johnson is clearly frustrated by some of the limitations he had to work under and is quick to point out the kinds of flaws in episodes that make them ripe these days for Mystery Science Theatre treatment; but despite Kenneth Johnson being strongly associated with the more science fiction elements on the show, especially after his subsequent involvement with shows such as “The Incredible Hulk”, the original “V” and “Alien Nation”, it becomes clear that it is the human element which is indicative of many of his best episodes on the series, especially the ones involving Steve’s relationship with Jaime Sommers, and which makes them continue to endure in fans’ affections. Director Cliff Bole is remembered for his work on “Star Trek: The Next Generation” and “The X Files”, but he started as an assistant director on “The Bionic Woman”, and while working as such on an episode of “The Six Million Dollar Man” entitled “The Blue Flash” found himself promoted after the original director quit the project over objections to the script, three days into a six day prep. In the commentary for the episode, Bole, like Kenneth Johnson, emphasises the pressures and time constraints involved in making the show back in the ‘70s, and points out how some warehouse scenes were varied by simply moving some boxes around and leaving the camera in the same spot to try and make it look like they were shooting in a different part of the set! He also talks about how the zoom lens had recently come into vogue and that everyone was using it way too much, something especially noticeable when you re-watch these episodes today. He talks about the professionalism of Lee Majors and also how he liked to play practical jokes on the crew. He was also good with children apparently -- a much needed skill in this episode, which featured child star Rodney Allen Rippy, then known in the US for some now-forgotten TV commercials, but who didn’t otherwise have much experience of acting and would tend to lose concentration under the hot lights. On his commentary for the episode “Vulture of the Andes”, Bole reveals that to save money sometimes entire storylines were written around stock footage. In this case the production had fifteen minutes of documentary footage of gliders in the air, which they matched up with similar looking planes for the ground scenes. There was no second unit on the show; the whole thing had to be shot in six days. Bole compares the schedule to a later show like “The X-Files”, where he had fifteen days to finish an episode and a second unit as well! He also reveals that the reason Lee Majors disappears from the episode for about fifteen minutes of screen time, Steve’s place taken by another OSI agent while he recovers from a mishap with his bionic arm, was because Majors had to make a personal appearance elsewhere for the network in the middle of the shoot, a fairly common occurrence when the series was at the peak of its popularity. By this time, all Majors’ costumes were being designed so that his shirts were unbuttoned to mid-chest, since the actor was ‘popular with the ladies’ and by season four, his sex appeal was being spotlighted in a way it hadn’t been since the early TV movies which had tried to pitch the character as a kind of superhero James Bond. Bole looks back on the show with fond memories and recalls a level of camaraderie he’s not experienced again since on any other show, and he was surprised but gratified to learn that the series still retains a large fan base. The set also features the padded out two-part versions of all three TV movies and, finally, each series comes with a photo gallery of production stills from the episodes making up that particular season. With all the TV movies (including the attempted pilot “The Bionic Boy”), spin-off episodes, reunion movies and five-years-worth of episodes the viewer will be detained for quite some time by this diverting trip down memory lane, and that’s before we even consider the hours and hours of documentary and featurette material also included across forty discs. Without doubt, this is worth saving up for if you’ve ever had any interest in classic action adventure TV. Highly recommended.
{ "pile_set_name": "Pile-CC" }
Welcome Friday, December 21, 2018 How Video Games Made Me A Better Person First, a disclaimer: I have a lot of privilege. I code as white (ethnically I'm from a group that has had its whiteness revoked and been the target of genocides, but most people don't know that unless I tell them). I'm a guy (kinda). I'm not straight but I have spent most of my life under the umbrella of straight privilege. Raised middle class, although I'm now poor on paper. Able-bodied except for some neurodivergence. Those marginalized statuses I have, you probably couldn't tell by looking at me, so I pass, out in the world. These experiences are from my point of view, and they may be somewhat sophistic to people who experience marginalization and systematic oppression every day. I tend to be a bit outspoken when it comes to social justice issues. When I say "tend to" and "a bit," you understand that I mean most of my friends (even those who agree with me) have gone through at least one or two moments on Facebook where they said, "Chris, please shut up. Please for the love of God, just stop posting. Just for a few minutes. Just this once. Please!" From time to time, however, someone manages to pin me down for a lunch date or corners me at a party where I'm being reserved, shy, and not at all like my online persona, and they often end up wondering about how I came to care so much about the issues I talk so much about. Formative experiences about speaking out against injustice involve my mom, and no small amount of my bravery can be attributed to my idolization of Luke Skywalker. But those experiences set a tone. They laid the foundation for wanting to be morally good. They don't themselves help me parse the thicket of discourse to determine what the right thing is. That comes from video games. When I was young, video games were pretty simple. The first game I ever played involved a square picking up an arrow to go look for a chalice, and my favorite game required you to run to the right until you died three times. (You could run to the left, but the crocodiles were easier to jump going right.) And of course there was an inexplicable hostility that a certain airplane had for the river it was raiding. Boss fight. Circa 1979. Shit just got real, yo. As I grew up, video games got better and their objectives improved. There was plenty of rescuing princesses, of course, and stopping alien brains, and terrorist organizations who apparently had the money to build giant fighting mecha but didn't think to put some motion detectors outside their death fortresses, but we also started to see more complex machinations. Villains didn't always just twirl their mustaches or go by names like Sinistar–some of them even thought they were the good guy. As we reached the turn of the century, and video games began to come into their own as a complex and nuanced art form, we gamers began to take on the avatar mantle of heroes in much more complicated dramas. Sometimes we were on the wrong side when we started out. Sometimes the villains lied. Sometimes complicated political dramas were unfolding with no moral protagonist. Of course, these days, in video games, we can even choose to be complete epic seepage dripping assholes, adding a whole new layer of choice and complexity to the journey of the gamer. Like COMPLETE seepage dripping assholes. And as weird as it might sound, all this nuance and flexibility has helped me to be a better person. We can all figure out how to be a good guy when evil aliens show up to destroy Earth. We can all make the "right" choice when some eight-foot-tall fucking BDSM turtle kidnaps a woman who's begging for help. But as things get more complicated, and everyone is just looking out for their own interests, it becomes a little tougher to figure out whose side of the story to listen to. That's where video games come in. Imagine you fired up a video game and entered in the starting city of a modern (yet steampunk because steampunk is awesome) town. You're probably going to talk to a bunch of people and find out what's going on because you've played enough video games to know that's what you do. And unless you're very impatient, you will probably start by talking to everyone. You won't skip the "Falcons" group and only ever talk to the "Razorbacks." They've all got stories. You won't ignore someone who lives in the bad part of town. You know (as any good gamer knows) that there may be vital information in the hands of basically anyone. You don't value any stories more than any others. Now imagine the first people you talk to are kind of bitter and mean. They treat you with some hostility. They don't trust you. They don't like you. But they do talk to you, and when they do, they tell you of terrible things happening to them from the government. Every single one of them has a story about how their experience isn't fair. They don't get enough steam for their punks in their part of town. They are powerless. Poor. If any of them protest their unfair conditions, they are often the subjects of violence. This isn't just a coincidence either. They aren't randomly the poor people. They are HELD DOWN because of some immutable factor of their birth. They may even ask you to help them. They have definite perceptions about the injustice in which they exist. They say it is all around and permeates their lives. Their ancestors were very badly treated, and even though things are better, they still aren't equal. As you move on, you discover a second group. They are much nicer and friendlier. They like you. They treat you well. They flirt with you (unlocking romance options far more easily). This group lives in a better part of town. They are, by and large, richer and much more powerful. They have all the steam they need and their punks are well stocked. Almost everyone on the TV shows is from the second group and they control the voice that comes over the city-wide PA system telling everyone what a fine equality-loving society they all live in. Almost everyone in political power is from the second group. Almost every notable person in this city's history seems to be from the second group. Group Two will tell you at length about how the first group is making things up. Sure, they were an unfair society long ago in the before time, but that's all ancient history (the ancient history of one generation ago). Now it's laughable that things aren't totally equitable. Certainly there aren't any deep-seated inequalities to overcome. They tell you that the first group just wants to put them down. The first group is lazy. The first group won't work to pull themselves up. They say the first group is simply playing the victim because of the benefits they hope to get from pity. In some cases they acknowledge that some *VERY MINOR* injustice still exists, in a detached and intellectual way, but they insist that it is self correcting, often dismiss specific claims of Group One, and firmly believe that any attempts by the first group to right the injustice are "far far worse than the inequity itself." They really discourage you from listening to the first group's stories. Not overtly, of course––at least not at first––but by explaining that they are better able to see injustice than group one, and there isn't any. Of course, if you keep talking to group one, they'll stop being so nice, stop flirting with you. Stop treating you so well... Laws exist that make it extremely difficult for the people in Group One to advance themselves into the worlds of Group Two (though technically it is possible and a few have done it to much fanfare and are often touted as evidence that everything is better now). Further, a few people in Group Two are quite overt about how they are superior and should be in a better position. They blame most of the Group One's troubles on the actions, culture, behaviors of Group One, often suggesting that if they would just be less hostile, work harder, and accept their lot, they would probably be in a better situation. There are many theories about why the first group is disadvantaged and they are all discussed by the second group with a sort of intellectual detachedness. Many in Group Two talk at length about what they would do to have better lives if they were in Group One. It is considered uncouth to voice the opinion openly and directly that Group One is inferior, but when it happens (and it seems to strangely often), such opinions are merely considered impolite and part of living in a free society where people can say what they want. They are not immediately censured and aggressively repudiated in the same way as Group One's cries of injustice are....always. Still, it seems that in whispers and through double speak, Group Two is really allowed to speak as horribly as they want about Group One. Group Two has nothing to gain and everything to lose from even the acknowledgement of the injustice. Group Two's elite enjoy a vast and inexhaustible supply of cheap labor from Group One. And you even discover that there are actual laws and regulations (on top of social consequence and effect) that make it much much harder for anyone from Group One to rise up. Plus Group One is secretly treated worse in virtually every situation––financing, employment, payment...you name it. And Group Two is blaming them for bad things that have begun to happen and looking to make life even worse for them. Now here is my question to you as a gamer. Would you, playing this game, have even the SLIGHTEST difficulty realizing what was going on in this scenario? Would anyone not know which group to support to get the "good" ending and which would get the "evil" ending? Video games helped me to realize that most people look around our world from the inside. We've been here our whole lives. We're used to it. We're desensitized. WE ARE THE NPC's! We are the status quo. But as soon as we look at our world from the perspective of someone who just turned the game on five minutes ago, it becomes shockingly, absurdly, spectacularly easy to realize what is really going on. When we take the time to listen to the stories of different people, as we would if we were walking around a game world trying to figure out what was going on (and instead of listening to who was in power), we immediately get a sense that our world is not just haphazardly and randomly unfair, but is systematically oppressive. Instead of letting the group in charge tell us that it's fair or as fair as it can be or any unfairness is probably the fault of those suffering, we can go and get the stories from the people themselves and listen to them. The minute we listen to everyone as if they have something vital and important to tell us (and they do) about this world, the truth is laid bare. When we value all the stories around us as equal instead of letting those in power explain away inequality it is almost comical how apparent the injustices are. In my world (as distressingly unsteampunk as it is) I have a choice to listen to one group–the group in power (a largely male, white, heterosexual, able-bodied, cis group)–who insists that nothing is really wrong that couldn't be fixed if people would just try harder instead of complaining. Or I can seek out other voices and other narratives and let the people best equipped to describe their own situations describe it for themselves. Women who've experienced harassment and sexism. People of color who've experienced racism and xenophobia. Disabled people who've found difficulty accessing the same services as the able-bodied. Gender-variant folks who have a world of difficulties that cis folks do not. I can find those folks and I can listen to their stories and see that they paint a very VERY different picture than those overwhelming the mainstream. And once I have bothered to listen to the stories of those who are not in control of the narrative–and treated those stories as equal to the ones who are–it's only a matter of deciding whether I want to be Luke Skywalker or a seeping asshole. About the Author Chris Brecheen is just this guy who loves to write. He's been doing it for thirty years, and even got a degree in Creative Writing that now covers a hole in his drywall. These days he focuses his pretentious, hackneyed tripe on this blog, which is two teaspoons magical journey, one cup of advice given as satire, a dash of talking cat, a splash of personified ideals, a (very) healthy dollop of pervy candor, eight heaping tablespoons of toeing the knife-edge line between irreverence and blasphemy, diced guest bloggers who live inside his head (and a couple who don't), a sprinkle of words used pretty much with the express intention of keeping prudes offended in perpetuity, regular Star Wars, Star Trek, Firefly references, at least one doomsday plot per season, and a slice of pressed milk curd provided by the weird guy who lives on the third floor. Add three or four sprigs of social justice and simmer. Support Writing About Writing Become a Patron!I NEED YOUR HELP! Do you enjoy this blog? Do you think it's worth 3 cents a day? Do you want to see more and better articles? Are you getting hours of entertainment a month and want to know how to support the creator? Want to help me not need fifteen side gigs to make ends meet? Want to keep this space ad free? As little as a SINGLE dollar a month will get you votes in patron-only polls, backchannel chats with other patrons, and my ear when it comes to future projects. And of course will support my ongoing writing efforts. Become a Patron!
{ "pile_set_name": "Pile-CC" }
Sardar Kamal Khan Sardar Kamal Khan Chang (; born 12 March 1972) is a Pakistani politician who had been a member of the National Assembly of Pakistan, from June 2013 to May 2018. Early life He was born on 12 March 1972. Political career He served as district nazim of Badin. He was elected to the National Assembly of Pakistan as a candidate of Pakistan Peoples Party (PPP) from Constituency NA-224 (Badin-cum-Tando Muhammad Khan-I) in 2013 Pakistani general election. He received 128,723 votes and defeated Ali Asghar Halepoto, a candidate of Pakistan Muslim League (F) (PML-F). References Category:Living people Category:Pakistan Peoples Party politicians Category:Sindhi people Category:Pakistani MNAs 2013–2018 Category:People from Sindh Category:1972 births
{ "pile_set_name": "Wikipedia (en)" }
Wednesday, December 12, 2018 Opinion by Barbara: Have them cross the border to receive payment then charge them with Extortion (also called shakedown, out wrestling and exaction) is a criminal offense of obtaining money, property, or services from an individual or institution, through coercion. Throw their asses in jail and deport them to their country of origin. be Migrant group demands Trump either let them in or pay them each $50K to turn around: Two groups of Central American migrants marched to the U.S. Consulate in Tijuana on Tuesday with a list of demands, with one group delivering an ultimatum to the Trump administration: either let them in the U.S. or pay them $50,000 each to go home, a report said. CONTRIBUTORS Blog Archive AMERICA'S DEBT CLOCK Our forefathers pledged their lives, their fortunes and their scared honor to give us a Republic with Liberty and Freedom and Benjamin Franklin upon leaving the signing of the Constitution said "we have given you a Republic, if you can keep it." Can we keep it? Are we going to stand by and let the government we elected take away our Freedom and Liberties? FREEDOM MUST BE DEFENDED, NOW IS THE TIME and WE ARE THAT GENERATION!!! Semper Fi AMERICAN FREEDOM BY BARBARA IS A NON-PARTISAN WEB SITE. CONTENT ON THIS WEB SITE IS EXPRESSLY THAT OF THE CONTRIBUTING AUTHOR. OPINIONS EXPRESSED BY CONTRIBUTING WRITERS ARE EXPRESSLY THEIR OWN AND MAY OR MAY NOT REPRESENT THE OPINIONS OF AMERICAN FREEDOM BY BARBARA. AMERICAN FREEDOM BY BARBARA IS NOT AFFILIATED WITH ANY MAINSTREAM MEDIA ORGANIZATIONS. AMERICAN FREEDOM BY BARBARA IS NOT SUPPORTED BY ANY POLITICAL ORGANIZATION OR CANDIDATES. RESPONSIBILITY FOR THE ACCURACY OF CITED CONTENT IS EXPRESSLY THAT OF THE CONTRIBUTING AUTHOR. AS A PRIVATELY OWNED WEB SITE, WE RESERVE THE RIGHT TO EDIT OR REMOVE COMMENTS THAT CONTAIN SPAM, ADVERTISING, VULGARITY, THREATS OF VIOLENCE, RACISM, ANTI-SEMITISM, OR PERSONAL/ABUSIVE ATTACKS ON OTHER USERS.
{ "pile_set_name": "Pile-CC" }
The effect of oxygen concentration on arterial blood partial pressure of oxygen in dogs under general anesthesia. Oxygen is used for medical treatment and general anesthesia. However, high concentrations of oxygen can have toxic effects on cells. In veterinary medicine, 100% oxygen is usually used during general anesthesia and it can be toxic to animals. However, there is little concern about its harmful effects in humans. The objective of this study was to demonstrate that using a high con- centration of oxygen increases the partial pressure of oxygen in arterial blood (PaO2) more so than a lower concentration, by comparing PaO2 at three different oxygen concentrations (100%, 60%, and 40%) in six dogs under general anesthesia for 3 hours. The mean PaO2 and standard error values at the 100%, 60%, and 40% oxygen concentrations were 535.8 ± 24.01, 374 ± 17.19, and 239 ± 8.78 mmHg, respectively (p⟨0.05). These results show that 100% and 60% oxygen concentrations could increase oxidative stress. Further studies are needed to examine the oxygen concentration that causes toxicity.
{ "pile_set_name": "PubMed Abstracts" }
Womens Arcopedico Liana Knee High Boots £288.3 £130.6 Model: SKU 3768 Please Choose: Size UK 2=US 5=EU 35 UK 3=US 5.5=EU 36 UK 4=US 6.5=EU 37 UK 5=US 7.5=EU 38 UK 6=US 8=EU 39 UK 7=US 8.5=EU 40 UK 7.5=US 9=EU 41 UK 8=US 9.5=EU 42 UK 9=US 10.5=EU 43 Add to Cart: The Liana boot by Arcopedico® - stylish tall boots with a secret all their own.These boots appear to be leather but are actually Lytech® - a proprietary blend of Lycra® and polyurethane that is water resistant, light and breathable.Lytech material also stretches and gently forms to the foot, making it ideal for problem feet, and is vegan-friendly.No need to worry about getting them dirty; toss them in the washing machine and let them air dry.Distress-textured Lytech® upper has a full-length zipper for ease of entry and a comfortable fit.Lining contains the Sansmell™ deodorizing system which is anti-microbial to help feet stay fresher, longer.Soft textile insole provides just the right amount of cushioning for lasting, fatigue-free wear.Utilizes Arcopedico's patented twin arch system which supports the arch of the foot for the life of the shoe.Durable synthetic outer sole absorbs impact and provides grip for a confident stride.All of the 'L' shoes from Arcopedico® are very flexible and lightweight which make them ideal for travel.
{ "pile_set_name": "Pile-CC" }
Saturday, February 19, 2011 my FNSI results Here is what i made last night for FNSI. A purdy spring bag made from the Shoulder Tote pattern by Quilts Illustrated. i made a few different adjustments, but its always been one of my favorite "easy" bags to make. have you all tried the patterns from quilts illustrated? This bag was 16x16 before sewing. its a great daily bag to use for work etc. A friend of mine had asked me awhile ago for a pinks and greens bag. After digging through my stash, the best fabs i could come up with were Woodland Bloom. See my quilt hanging next to it using the same line? I still love woodland bloom. I had to get creative and move around the house to get a decent photo. Ive been on the go and forgot to take daytime photos!!! grrrrrr. last night i locked myself in my MOM CAVE and sewed away. I drank iced tea, ate pretzels and cheese, listened to some nice mellow music.....it was a perfect night for FNSI. These fabrics are so cheery..... Because the outside was so busy, i made the inside very simple with linen and some fab pockets. Remember to check HEIDIS blog tomorrow for the FNSI winner. im going to spend my night surfing at all of your projects. (oh how times have changed.....my saturday nights are so boring now--LOL) I always get some cute ideas from you gals. I've seen some cute quilted bags recently - here on your blog and all around my town - I think this would be a great idea for next month's FNSI! I'll have one month to pick out fabric and a pattern :-) Thanks for the great idea! Mary Ann at www.rocknquilts.blogspot.com Love the bag! So cute. I kind of double booked my Friday night. I signed up with good intentions and then realized that a wedding I was helping with was the next day. I had a lot to do. But because of you and Hiedi's motivation, I did keep in mind to do something this week. So I crocheted 5 red dishcloths!!!!
{ "pile_set_name": "Pile-CC" }
Nick Meyer plans a full sales launch in 2018 on the noir adaptation, styled as a backwoods version of Fight Club meets No Country For Old Men about a down-at-heel family man who enters a bare-knuckle brawl with a $100,000 purse. Margaret Qualley and James Badge Dale also star. Rumble Films chief David Lancaster reunites with Meyer after they worked together on Drive, Nightcrawler and Whiplash while Lancaster was at Bold Films. Principal photography is currently underway in Cincinnati on the project, which is fully financed by Paris-based Backup Media. UTA Independent Film Group represents US rights. “We are delighted to be working with David again,” Sierra/Affinity CEO Meyer said. “Donnybrook is right in his producing wheelhouse of delivering high quality elevated genre films and we can’t wait to bring Tim’s vision of this muscular and gritty world to a global audience.”
{ "pile_set_name": "Pile-CC" }
Q: LoadImage() with variable path? How do I get LoadImage(); to work with a variable file path? I have the desired file path in the variable bg, and I'm calling the function like so: bmp = LoadImage(hInst,bg,IMAGE_BITMAP,640,480,LR_LOADFROMFILE); Yet bmp does not render any image when used with: BitBlt(hDC,0,0,640,480,memDC,0,0,SRCCOPY); If I can't use LoadImage();, what equivalent is there that can handle non-constant file names? [EDIT] Apparently, the error was caused by another bit of code, and not the LoadImage() function. Disragerd. A: It seems to be the timer. The documentation about the SetTimer function says that the second parameter (nIDEvent) must be a nonzero value. So, I imagine your timer is never firing, the execmain() function is never called, and so your bg string is never set. When you replace bg by a string literal, it works, because the WM_PAINT message does not depend on the timer, it is always called at least once when the window is created.
{ "pile_set_name": "StackExchange" }
// // TAPIResponse.m // TwitterNetworkLayer // // Created on 10/17/14. // Copyright © 2020 Twitter. All rights reserved. // #import "TAPIError.h" #import "TAPIResponse.h" #import "TNL_Project.h" NS_INLINE BOOL _DataBeginsWithHTMLDocType(NSData *data) { static const char sDocType[] = "<!DOCTYPE html"; static const size_t sDocTypeLength = (sizeof(sDocType) / sizeof(sDocType[0])) - 1; // minus 1 to ignore the NULL terminator return data.length >= sDocTypeLength && 0 == strncmp(data.bytes, sDocType, sDocTypeLength); } static id _ParseAPIResponse(TNLResponseInfo *info, NSError ** parseErrorOut, NSError ** apiErrorOut); static NSArray *_ExtractAPIErrors(id parsedObject); @implementation TAPIResponse @synthesize apiError = _apiError; @synthesize parseError = _parseError; @synthesize parsedObject = _parsedObject; - (void)prepare { [super prepare]; if (!_operationError) { NSError *apiError; NSError *parseError; _parsedObject = _ParseAPIResponse(_info, &parseError, &apiError); _parseError = parseError; _apiError = apiError; TNLAttemptMetrics *metrics = _metrics.attemptMetrics.lastObject; metrics.responseBodyParseError = parseError; if (apiError) { metrics.APIErrors = @[apiError]; } } } - (instancetype)initWithCoder:(NSCoder *)coder { self = [super initWithCoder:coder]; if (self) { _parsedObject = [coder decodeObjectOfClasses:[NSSet setWithObjects:[NSString class], [NSNumber class], [NSArray class], [NSDictionary class], nil] forKey:@"parsedObject"]; _parseError = [coder decodeObjectOfClass:[NSError class] forKey:@"parseError"]; _apiError = [coder decodeObjectOfClass:[NSError class] forKey:@"apiError"]; } return self; } - (void)encodeWithCoder:(NSCoder *)aCoder { [super encodeWithCoder:aCoder]; [aCoder encodeObject:TNLErrorToSecureCodingError(_parsedObject) forKey:@"parsedObject"]; [aCoder encodeObject:TNLErrorToSecureCodingError(_apiError) forKey:@"apiError"]; [aCoder encodeObject:TNLErrorToSecureCodingError(_parseError) forKey:@"parseError"]; } - (NSError *)anyError { return self.operationError ?: self.parseError ?: self.apiError; } @end static id _ParseAPIResponse(TNLResponseInfo *info, NSError ** errorOut, NSError ** apiErrorOut) { id json = nil; NSError *parseError = nil; __block NSError *apiError = TNLHTTPStatusCodeIsSuccess(info.statusCode) ? nil : [NSError errorWithDomain:TAPIErrorDomain code:0 userInfo:nil]; NSInteger statusCode = info.statusCode; NSData *data = info.data; TNLAssert(statusCode > 0); BOOL hasDocTypePrefix = _DataBeginsWithHTMLDocType(data); if (hasDocTypePrefix) { parseError = [NSError errorWithDomain:TAPIOperationErrorDomain code:TAPIOperationErrorCodeServiceEncounteredTechnicalError userInfo:nil]; } else { json = [NSJSONSerialization JSONObjectWithData:data options:0 error:&parseError]; if (json) { NSArray *apiErrors = _ExtractAPIErrors(json); // Underlying behavior in some 4XX errors if (TNLHTTPStatusCodeIsClientError(statusCode)) { [apiErrors enumerateObjectsUsingBlock:^(id obj, NSUInteger idx, BOOL *stop) { NSError *currentError = obj; if ([currentError.domain isEqualToString:TAPIErrorDomain]) { apiError = currentError; *stop = YES; } }]; } } else { parseError = [NSError errorWithDomain:TAPIParseErrorDomain code:TAPIParseErrorCodeCannotParseResponse userInfo:(parseError) ? @{ NSUnderlyingErrorKey : parseError } : nil]; } } if (errorOut) { *errorOut = parseError; } if (apiErrorOut) { *apiErrorOut = apiError; } return json; } static NSArray *_ExtractAPIErrors(id parsedObject) { TNLAssert(parsedObject != nil); NSMutableArray *errorItems = [[NSMutableArray alloc] init]; if ([parsedObject isKindOfClass:[NSDictionary class]]) { id errors = [parsedObject objectForKey:@"errors"]; if ([errors isKindOfClass:[NSArray class]]) { [errors enumerateObjectsUsingBlock:^(id obj, NSUInteger idx, BOOL *stop) { BOOL successfullyParsedError = NO; if ([obj isKindOfClass:[NSDictionary class]]) { id codeObject = [obj objectForKey:@"code"]; id messageObject = [obj objectForKey:@"message"]; if (codeObject && messageObject) { NSMutableDictionary *userInfo = [NSMutableDictionary dictionary]; if (messageObject) { userInfo[NSLocalizedDescriptionKey] = messageObject; } NSInteger code = [codeObject integerValue]; id timestamp = [obj objectForKey:@"timestamp"]; if (timestamp) { userInfo[@"timestamp"] = timestamp; } [errorItems addObject:[NSError errorWithDomain:TAPIErrorDomain code:code userInfo:userInfo]]; successfullyParsedError = YES; } } if (!successfullyParsedError) { NSLog(@"Failed to parse server error:[%@]", obj); } }]; } } return errorItems; }
{ "pile_set_name": "Github" }
BLM Wild Horse Roundup Set for Oct. 15 The Bureau of Land Management has announced that operations will begin Saturday, Oct. 15, to round up excess wild horses from public lands in northwest Nevada, about 40 miles east of Cedarville, Calif. The BLM said about 1,300 wild horses will be gathered and about 1,090 removed from the range to bring populations to within the appropriate management level range of 258 to 451 animals. Wild horses removed from the range will be taken to the BLM's short term Litchfield Corrals near Susanville and the Palomino Valley National Wild Horse and Burro Center north of Reno. They will be made available for public adoption after receiving vaccinations or other needed veterinary care. Horses that are not adopted will be held in large Midwestern pastures to live out their lives. “Our goal is to manage healthy wild horse herds on healthy rangelands in balance with other authorized users of the public range,” said Nancy Haug, manager of the BLM’s Northern California District, which oversees these wild horse herd management areas. “To keep the herds and the land healthy, we need to keep populations at levels the range can sustain, while meeting needs of users such as wildlife and livestock.” In addition to removing excess animals from five herd management areas collectively referenced as the High Rock Complex, the 1,090 horses removed will include nearly 400 horses that are living outside of herd management areas. These removals are required by the federal Wild Free Roaming Horses and Burros Act. Members of the public are welcome to observe gather operations from vantage points at each capture site. Anyone interested can meet with the BLM staff at 5:30 a.m. daily, at the BLM Surprise Field Office, 602 Cressler St., Cedarville, Calif. They are responsible for their own transportation in a high clearance four wheel drive vehicle, beverages and food for the day. The BLM will maintain an informational telephone line at (530)279-2816 to provide daily updates on observation opportunities. Details about the upcoming roundup are available in several environmental documents posted online at www.blm.gov/ca/surprise. Wild horses and burros are protected by the Wild Free Roaming Horses and Burros Act which requires the BLM to manage wild herds as part of a “thriving natural ecological balance on the range.” The law mandates the removal of excess animals when populations exceed established levels.
{ "pile_set_name": "Pile-CC" }
IMO ... We need to knock the repuplicans and democrats around at LEAST one year and vote for a third party ... Found this guy after 60 seconds of searching, and already seems like a better candidate than either Obama or Romney. Maybe then, we'll have some actual decent competitors that know what the hell is going on in our country. Not the 1% that doesn't know about the other 99%, or the black guy that was going to "change the world" but has barely changed his own smirk in 4 years. Oh, and my Facebook response to my old co-worker that posted it and turned it into a debate. I was being sarcastic btw... I feel he would just take the tax breaks and use the money to finish his house and continue his lavish lifestyle instead of growing his business and create more jobs. Rich hoard; while it can be argued that the things bought and his house being built in and of itself stimulate the economy and create jobs, I can't but help feel more New business and jobs would be created if the money was put in the hands of the middle class; the middle class is on a mission to survive not be complacent with content like a wealthy person. If you're wealthy why would you work harder for your next bill, but if your poor or middle class wouldn't you ramp up production to meet the demand of a outstanding bill ? I feel he would just take the tax breaks and use the money to finish his house and continue his lavish lifestyle instead of growing his business and create more jobs. This is what history tells us always happens when you put more money in the hands of the wealthy and jack up corporate profits. And why would it do anything else? There's no market pressure to increase wages or hire. Just look at our last corporate profit repatriation holiday, for instance. It was all hyped up as going to create jobs, increase wages, etc. What did it actually do? CEO bonuses. Why do people continuously fall for this supply side bull****? Wages go up and businesses hire when they're forced to by competition for workers (And collective bargaining), increased demand (Ultimately from consumers), and similar pressures in the job market. Nothing else. I feel he would just take the tax breaks and use the money to finish his house and continue his lavish lifestyle instead of growing his business and create more jobs. Rich hoard; while it can be argued that the things bought and his house being built in and of itself stimulate the economy and create jobs, I can't but help feel more New business and jobs would be created if the money was put in the hands of the middle class; the middle class is on a mission to survive not be complacent with content like a wealthy person. If you're wealthy why would you work harder for your next bill, but if your poor or middle class wouldn't you ramp up production to meet the demand of a outstanding bill ? He did. When he started this house he fired 22 people in one day. Then 10 the next, 15 the next so on and so forth. I think the employers call is clear. His taxes go up he will take peoples job to maintain his lavish lifestyle. It may be selfish but its legal and fair. On the other hand if he were getting a tax incentive for hiring more people, he'd do that and everybody would win. Exactly, the guy doesn't know squat about macro economics. Haha, nice. Make it about his lifestyle and not his business. He is clearly evil because he cares about himself more than his employees, right? Why does anyone start their own business? If you say anything but "to make money" you are wrong. Companies started for any other reason do not succeed. Tax incentives wouldn't do anything. There is no way to create a tax incentive for hiring people unless you do away with medicare/caid, payroll tax, Unempl. ins tax, etc that are direcrly related to hiring. The only way to increase hiring activity in any business is to allow the business to keep more of their revenue, period. This means lowering the marginal tax rates as well as the employment taxes to incentivitze growing the business. Business owners will not hire more people if it doesn't make monetary sense for their business.
{ "pile_set_name": "Pile-CC" }
Contents Plot Today is the day a princess gets chosen to host the Royal Prep Tea Party. Sofia tells everyone that before she was a princess, she and her friends would spread blankets on the ground and borrow tea cups from their mothers. But Amber, Hildegard, and Clio tell her that the Tea Party is a big deal because the whole class goes including the Fairies, and they hosted bigger parties. When Sofia is chosen to host the next Royal Prep Tea Party, Hildegard and Clio tell her that she needs to do better than borrowed tea cups. At the castle, Sofia shows Amber and James that she wants to host one of the tea parties she used to have with Ruby and Jade, only this time, they get to use the castle tea cups and get to paint them. While James likes this idea, Amber doesn't because she thinks it's too small. She tells Sofia that she's her secret weapon for throwing a fabulous party, and she convinces her that bigger is better. Baileywick gives Sofia a planer to plan her party. Sofia decides on a swan themed tea party with swan shaped cookies and cakes. Ruby and Jade come over to have tea with her. She takes them to her hideaway: a secret garden. While the three of them have tea and biscuits, Sofia tells Ruby and Jade about the tea party for Royal Prep and wishing she could throw a party like the one she's having with them but feels she has to be considerate of her guests and Amber says her guests want a big and fancy party. Sofia is selecting the plates and wants the plain white plates but Amber takes over and picks the shiny gold ones. When Sofia is picking the goblets, Amber takes over again and picks the biggest ones. Sofia is starting to feel overwhelmed and says this is starting to look more like a feast instead of a tea party but Amber says you can never have too much of a good thing. When Amber finds out the size of the cookie samples after James ate them all, she insists that they be as big as possible which Sofia, out of consideration of her guests, reluctantly agrees to despite James's protests. Cedric agrees to make the tables float. Sofia asks the swans to help with her party and they agree. Amber decides to add a ice swan to the mix. Sofia is dismayed by how big Amber made her plan her party and James is annoyed that Amber didn't let Sofia make her own decisions. Sofia finishes by getting a new dress prepared for the party. The next day, Miranda comes out to see the party and notices how overwhelmed Sofia is. Suddenly, disaster strikes: The ice swan is accidentally sent into the swans pond. The spooked swans crash into Cedric, causing him to lose control of the floating tables, causing a mess and making them fly away. Sofia is upset because the party is ruined and she doesn't have time to plan another big party. Miranda asks her if she even wanted to throw a big party and Sofia says she didn't but only did so because she wanted to be considerate of her guests. Miranda tells Sofia that she's the host and it's what she wants that matters. Sofia decides to throw the party she wants in her hideaway and the guests declare it the best tea party they ever attended. Home Video Release Songs Trivia Goofs At the end of the episode Hildegard and Clio can be seen sitting on the picnic blankets with everyone else but seconds before the episode closes their legs are visible in a standing up position even though they are still sitting. At the end of the song, Bigger is Better, the rear castle guard's right hand is out of place while carrying the pallet Amber is standing on. Cedric calls his Erlenmeyer flask a beaker. While Sofia meets and greets Ralph and the swans after asking Cedric for the floating tables, the shiny effects from her tiara were out of place. At the end, Sofia states that everyone gets to paint their own teacups. However the cups they are painting have two handles, indicating that they are sugar bowls.
{ "pile_set_name": "Pile-CC" }
                                                                  No. 2--95--0698 _________________________________________________________________                                  IN THE                        APPELLATE COURT OF ILLINOIS                              SECOND DISTRICT _________________________________________________________________ THE PEOPLE OF THE STATE       )  Appeal from the Circuit Court OF ILLINOIS,                  )  of Stephenson County.                              )     Plaintiff-Appellant,     )  No. 93--CF--422                              ) v.                            )                              ) JOHN A. GOEBEL,               )  Honorable                              )  Richard E. DeMoss,     Defendant-Appellee.      )  Judge, Presiding. _________________________________________________________________     JUSTICE HUTCHINSON delivered the opinion of the court:     The State appeals from the order of the circuit court of Stephenson County granting the motion of the defendant, John A. Goebel, to dismiss an amended information filed against him on January 9, 1995.  The State's motion to reconsider was denied, and this timely appeal was filed.  We reverse and remand.       The State petitioned this court for leave to supply us with additional authority; we granted the State's petition.  On appeal to this court, the State raises one issue:  whether reversal of the trial court's dismissal order is required, based on the authority of People v. DiLorenzo, 169 Ill. 2d 318 (1996).  The State contends that the allegations in the amended information were sufficient to state the offense of aggravated criminal sexual abuse.  We agree with the State.     Defendant was charged by information with the offense of criminal sexual assault.  The information was later amended to charge defendant with committing the offense of aggravated criminal sexual abuse.  The amended information alleged:          "[Defendant], on or about the 10th day of November 1992     at and within Stephenson County, Illinois did commit the     offense of AGGRAVATED CRIMINAL SEXUAL ABUSE in violation of     Chapter 38, Illinois Revised Statutes *** Section 12--16(b) in     that said defendant, [a family member] of [D.R.], knowingly     committed an act of sexual conduct with [D.R.], who was under     18 years of age when the act was committed, in that said     defendant rubbed his penis against the buttocks of [D.R.]."     (Emphasis in original.)     Section 12--16(b) of the Criminal Code of 1961 reads in pertinent part:          "The accused commits aggravated criminal sexual abuse if     he or she commits an act of sexual conduct with a victim who     was under 18 years of age when the act was committed and the     accused was a family member."  720 ILCS Ann. 5/12--16(b)     (Smith-Hurd Supp. 1996).       The Criminal Code of 1961 defines "sexual conduct" in pertinent part as "any intentional or knowing touching or fondling by *** the accused *** of the sex organs *** of the victim *** for the purpose of sexual gratification or arousal of the victim or the accused."  720 ILCS Ann. 5/12--12(e) (Smith-Hurd Supp. 1996).     Defendant was tried before a jury on January 10-12, 1995.  The State's first witness was the victim, D.R.  D.R. testified to the events occurring on or about November 8 and 9, 1992, in which she, defendant, and her sister, Tonya, were at the residence of defendant and his wife, Darcy.  D.R. testified that the three of them, D.R., Tonya, and defendant, were painting the kitchen, and, by the end of the evening, D.R. had paint in her hair and clothes. She testified that she went upstairs to take a bath, but, because the paint was still in her hair, she called to her sister for assistance.  Defendant, instead, went upstairs into the bathroom and suggested she go to the basement and shower the paint out of her hair.  D.R. testified that, upon exiting from the shower in the basement, defendant had come down the stairs, led her towards a workout bench, and, with her back facing him, exposed his penis to her.  He then "started rubbing his penis up and down on [her] butt."  D.R. also testified that defendant told her that she was too beautiful for her own good.       D.R. testified that another incident occurred at defendant's residence after a funeral sometime at the end of June 1992.   She testified that she and defendant went downstairs to talk, but that defendant started rubbing her back and put his hand down her pants. She testified that defendant took off D.R.'s pants, kissed her breasts, put his finger in her vagina, and then put his mouth on her vagina.  Defendant then exposed his penis to her, ejaculated, and instructed D.R. to taste the semen.       According to D.R.'s testimony, another incident took place at defendant's residence around October 1992.  D.R. testified that she and defendant were in the living room and she had been getting him beers from the refrigerator when he told her to go upstairs "so Darcy won't get suspicious."  She testified that they went upstairs and defendant turned on the television.  Defendant then proceeded to pull down D.R.'s pants, kiss her breasts and vagina, and put his finger in her vagina.       D.R. next testified to an incident occurring in mid to late June 1993 at defendant's newly purchased residence.  D.R., among others, was helping defendant renovate the residence prior to defendant and his family moving in.  D.R. testified that, on this occasion, she had just finished going to the bathroom, but, before she could pull up her underwear and pants, defendant came in and put his fingers on her vagina and talked about his sex drive.  D.R. testified that defendant then stopped, apologized, and said he could not help himself.  She testified they then took a tour of the house, and, while they were upstairs, defendant laid D.R. down, took her pants down, and lifted her shirt and bra, exposing her breasts.  D.R. testified that defendant then put his fingers in her vagina, kissed her breasts and vagina, and then attempted, but failed, to put his penis in her vagina.  Defendant then instructed her to put her mouth on his penis, but then stopped and told her to get a cup.  D.R. testified she went downstairs, got the cup, went back upstairs, and defendant again told her to put her mouth on his penis.  D.R. said defendant then ejaculated in her mouth. Defendant then performed oral sex on D.R.  D.R. testified that, during the ensuing conversation, defendant stated that "he didn't know if most [family members] did this but he thought they should because he was trying to teach [her]" about sex.       On cross-examination, counsel for defendant attempted to elicit from D.R. specific dates, times, and places of the incidents, and whether any witnesses were present.       Tonya, sister of D.R., testified next, and she recalled the events surrounding the November 8 and 9, 1992, incident.  Tonya testified that D.R. had taken a bath upstairs after painting that evening and had called for Tonya, but that defendant went upstairs instead.  She then testified that D.R. went to the basement to take a shower, and minutes later, while D.R. was still in the basement, defendant went downstairs.  On cross-examination, Tonya  testified as to her employment history, her knowledge of the June 1992 funeral, her recollection that defendant was in the basement with D.R. in November 1992, and the terms of her visitation with defendant.       The State's last witness was Officer Richard Roodhouse.  He testified about the investigation of the allegations against defendant.  Roodhouse testified that defendant acknowledged his hand "fell against her breast" on one occasion and, on another occasion, D.R. was getting up from a couch and she put her hand on defendant's groin or penis.  Roodhouse testified that defendant said he "didn't remove [either his hand from her breast or her hand from his groin or penis] right away because he had taken some psychology courses, and the *** courses had taught him not to do so because it would make that gesture appear dirty."  He also testified that defendant acknowledged taking the girls for rides in the country and talking about sex "because he didn't want [them] to be naive about sex."  Defendant also told Roodhouse that D.R. had the dates all wrong.       Defendant's brother, James, testified for the defendant. James  testified about the events surrounding the June 1992 funeral and his work schedule.       Defendant's brother, Bill, testified next about the events of the June 1992 funeral.     Six other witnesses testified that they helped remodel or observed the remodeling of defendant's new home.       Darcy, defendant's wife, testified next.  She testified as to the events surrounding the June 1992 funeral, the routine she typically followed, and observations she made during the remodeling of her and defendant's new home.       Defendant testified next.  Defendant categorically denied all incidents of sexual abuse.  Regarding the November 8 and 9, 1992, incident, defendant testified that both Tonya and D.R. were in the bathroom upstairs trying to get paint out of D.R.'s hair. Defendant testified that he told D.R., through the bathroom door, to go to the basement and let the shower water "beat [the paint] out" of her hair.  Defendant testified that Tonya stayed in the bathroom upstairs while D.R. went down to the basement and took a shower.  He testified that he stayed in the kitchen and did not go into the basement until D.R. had already gone back upstairs into the bathroom where Tonya was.  After that, he testified, he went to the basement and stoked the wood-burning furnace and was only in the basement for approximately five minutes.     Defendant acknowledged his conversations with Roodhouse regarding defendant touching D.R.'s breast and her touching his groin.  On cross-examination, defendant also testified to only two occasions, occurring years apart, when he was driving in the country that he talked with his daughters about sex.  Defendant testified regarding the psychology course that he took, but never finished, where he learned not to take his hand away from D.R.'s breast too quickly or remove D.R.'s hand from his groin or penis because it would make the gesture appear dirty.  Defendant also testified that on November 9, 1992, the only people painting and remodeling in his new house were himself, Tonya, and D.R.     Before the case was given to the jury for decision, defendant moved to have the charge dismissed.  Defendant argued that the charge did not state an offense and asserted that the evidence did not support a conviction.     After hearing the arguments of counsel, the trial court first denied the motion for a directed finding, stating that "the evidence is sufficient that a jury can reasonably find the defendant guilty of the charge."  The trial court then discussed defendant's motion to dismiss and determined that dismissal should be granted because the charge failed to state an offense.     In granting the motion, the trial court explained that an allegation regarding the child victim's buttocks did not charge the offense of aggravated criminal sexual abuse, relying on People v. Nibbio, 180 Ill. App. 3d 513 (1989).  However, after the parties filed post-judgment motions, the trial court reconsidered its reasoning.  On reconsideration, the trial court agreed with the State that sexual conduct includes the knowing touching of the victim's body by the penis of the accused.  However, to prosecute such a charge, the State must allege and prove that the touching was done "for the purpose of sexual gratification or arousal of the victim or of the accused."  720 ILCS Ann. 5/12--12(e) (Smith-Hurd Supp. 1996).  Relying on People v. Edwards, 195 Ill. App. 3d 454 (1990), the trial court,  stated that that element was not alleged in the amended information and the order dismissing the charge would stand.     Before addressing the State's argument, we note that defendant failed to file a brief in this appeal.  However, because we find the issue presented relatively straightforward, we may decide this case without an appellee's brief in accordance with First Capitol Mortgage Corp. v. Talandis Construction Corp., 63 Ill. 2d 128, 133 (1976) (holding that a reviewing court should decide the merits of an appeal where the record is simple and the claimed error is such that a decision can be made easily without the aid of an appellee's brief); see also Exline v. Exline, 277 Ill. App. 3d 10, 13 (1995).     The State argues that reversal of the trial court's dismissal order is required, relying on the authority of People v. DiLorenzo, 169 Ill. 2d 318 (1996).  The State contends that, based on DiLorenzo, the allegations in the amended information were sufficient to state the offense of aggravated criminal sexual abuse.       We are obliged to follow the precedents of our supreme court. A settled rule of law that contravenes no statute or constitutional principles should be followed under the doctrine of stare decisis unless it can be shown that serious detriment prejudicial to the public interest is likely to result.  Pasquale v. Speed Products Engineering, 166 Ill. 2d 337, 349 (1995).  Stare decisis is a policy of the courts to stand by precedent and leave settled points of law undisturbed.  Charles v. Seigfried, 165 Ill. 2d 482, 492 (1995).  Additionally, our appellate court lacks the authority to overrule or modify decisions of our supreme court.  People v. Woodard, 276 Ill. App. 3d 242, 245 (1995); Vonholdt v. Barba & Barba Construction, Inc., 276 Ill. App. 3d 325, 329 (1995).  Thus, it is our duty to examine the DiLorenzo decision and determine whether the material facts found by the Illinois Supreme Court in DiLorenzo are similar to or different from those facts in the present case.         In DiLorenzo, the defendant was charged with, inter alia, aggravated criminal sexual abuse (Ill. Rev. Stat. 1991, ch. 38, par. 12--16(c)(1)(i) (now 720 ILCS Ann. 5/12--16(c)(1)(i) (Smith- Hurd Supp. 1996))).  The indictment was in writing, specifically named the alleged committed offenses, and provided citation to the relevant statutory provisions, date of the offense, county of its occurrence, and the defendant's name.  Further, the indictment, in the words of the statute, stated that the defendant committed the offense of aggravated criminal sexual abuse in that     "he, who was 17 years of age or older, knowingly committed an     act of sexual conduct with [C.R.] who was under 13 years of     age when the act was committed."     Following a bench trial, the defendant was found guilty of aggravated criminal sexual abuse and was sentenced; the appellate court affirmed.  The defendant appealed, asserting that the indictment was fatally defective in that the aggravated criminal sexual abuse charge failed to explicitly state that the alleged "sexual conduct" with C.R. was "for the purpose of sexual gratification or arousal of the victim or the accused" and also that the indictment failed to set forth with particularity the allegedly wrongful acts that constituted "sexual conduct."     The DiLorenzo defendant, like defendant in the present case, failed to challenge the sufficiency of the charging instrument in a pretrial motion.  Therefore, the supreme court declined to discuss the sufficiency of the charging instrument when attacked in a pretrial motion.    Because defendant in the present case also waited until the conclusion of the trial to attack the information's sufficiency, we too decline to address the issue of a pretrial attack of the charging instrument.       Instead, the DiLorenzo court stated that, when the sufficiency of a charging instrument is attacked for the first time on appeal, the standard of review is whether the charging instrument apprised the defendant of the precise offense charged with enough specificity to (1) allow preparation of her or his defense and (2) allow pleading a resulting conviction as a bar to future prosecution arising out of the same conduct.  DiLorenzo, 169 Ill. 2d  at 321-22, citing People v. Thingvold, 145 Ill. 2d 441, 448 (1991).       The DiLorenzo court determined that the phrase "for the purpose of sexual gratification" or the definition of "sexual conduct" were unnecessary to its disposition and declined to distinguish our rationale in People v. Edwards, 195 Ill. App. 3d 454 (1990).  In Edwards, the defendant appealed two of his convictions of aggravated criminal sexual abuse on the grounds that the convictions were improperly charged.  The defendant argued that, because the charges were based upon the defendant's "sexual conduct" with the victim, the charging instrument should have included the relevant provision of the statute, "for the purpose of sexual gratification or arousal of the victim or the accused."  720 ILCS Ann. 5/12--12(e) (Smith-Hurd Supp. 1996).     This court reversed those convictions, stating that reference to the definition of "sexual conduct" was essential to the offense of aggravated criminal sexual abuse.  Edwards, 195 Ill. App. 3d at 457.  In interpreting clauses and definitions in statutes, courts should construe those words in accordance with the statutory definition.  DeBois v. Department of Employment Security, 274 Ill. App. 3d 660, 664 (1995).  Because the charges in Edwards were, for the most part, expressed in the language of the "sexual conduct" definition and because the charges omitted the element that the relevant conduct was committed "for the purpose of sexual arousal or gratification," we held that the charges failed both to set forth fully the nature and elements of the offense and to be as fully descriptive as the language of the statute.  Edwards, 195 Ill. App. 3d at 457.     In disregarding the Edwards rationale, the DiLorenzo court theorized that, should the defendant have needed to know "some of the details" of the charge, the defendant could have filed a request for a bill of particulars.  Our supreme court concluded that the defendant was aware of the nature of the charges against him and that no impediment existed in the preparation of his defense as a result of the manner in which the indictment charged the offenses.  DiLorenzo, 169 Ill. 2d at 324-25.     We determine that the material facts in the case at bar are sufficiently analogous to the material facts of the DiLorenzo case. The amended information apprised defendant of the precise offense charged with enough specificity to allow preparation of his defense and to allow pleading a resulting conviction as a bar to future prosecution arising out of the same conduct.  Our own review of the record indicates that defendant was fully cognizant of the nature of the charges against him, that he was being tried for "an act of sexual conduct with [D.R.]."  Defendant called 10 witnesses, including himself, to refute the specifically charged offense occurring on or about November 10, 1992, as well as the allegations surrounding the June 1992 incident taking place after the relative's funeral.  Though defendant did not specifically defend against each of the incidents to which D.R. testified, on at least two occasions in the report of proceedings defendant did offer a blanket denial of all allegations concerning sexual abuse of D.R. Counsel for defendant cross-examined D.R. in depth, attempting to elicit specific dates, places, times, and witnesses present. Furthermore, defendant even secured broadcast schedules from an area television station to defend against the alleged October 1992 incident.     Pursuant to the doctrine of stare decisis, we adhere to the decision of our supreme court in DiLorenzo and reverse the trial court's order dismissing the amended information charge against defendant.  To the extent our holding in Edwards is inconsistent with this result, Edwards is overruled.     Finally, we compare the date of the disposition of DiLorenzo with the pendency of the present case.  DiLorenzo was disposed of on February 15, 1996, while the instant case was dismissed by the trial court on May 3, 1995.  The State timely filed its appeal, thus effecting a continuation in the proceedings.  See 134 Ill. 2d R. 606.  In reversing the trial court's dismissal of the charging instrument, we recognize that our supreme court has the inherent power to give its decisions prospective or retrospective application.  See Berryman Equipment v. Industrial Comm'n, 276 Ill. App. 3d 76, 79 (1995).  Generally, a supreme court decision applies retroactively to cases pending at the time the decision is announced.  People v. Granados, 172 Ill. 2d 358, 365 (1996).  A decision will be applied retroactively unless the court expressly declares that its decision is a clear break with the past, such as when it explicitly overrules its own past precedent, disapproves a previously approved practice, or overturns a well-established body of lower court authority.  People v. Phillips, 219 Ill. App. 3d 877, 879 (1991).  Because the DiLorenzo decision offers no such declarations warranting only prospective application, its holding will be applied retroactively, and, thus, DiLorenzo is controlling in the appeal before us.     For the foregoing reasons, the judgment of the circuit court of Stephenson County is reversed, and the cause is remanded for further proceedings.     Reversed and remanded.     GEIGER and RATHJE, JJ., concur.
{ "pile_set_name": "FreeLaw" }
The Teacher's Magazine N° 218 Noviembre 2018 This month, The Teacher’s Magazine presents the first part of a crazy ABC, with poems to read to children and to use as decoration for the classroom. You will also find activities to work with pirates for different ages and levels. In our Phonics for Kids section, a new sound is introduced with a story called Brook the Woodpecker. The school year is coming to an end, and you will find a Student Self-reflection Sheet, for learners to reflect on their learning process. Gamification in the EFL Classroom presents different apps with which students can revise concepts in a fun way. There is the life of Julieta Lanteri, the first woman to vote in Argentina, to use not only as a comprehension and writing activity, but also as a starting point for a debate on women’s rights and discrimination. The Teacher's Magazine is a monthly issue specially designed for teachers of English as Foreign or Second Language. It provides creative ready-to-go materials to make their classes more active and appealing to students. The ideal magazine for English teachers that choose to work effectively with students of all levels and ages and an asset at the moment of developing contents.
{ "pile_set_name": "Pile-CC" }
Q: Satz mit den meisten aufeinanderfolgenden Verben Es geht um Sätze mit aufeinanderfolgenden Verben ohne andere Wortarten oder Satzzeichen dazwischen. Beispiele (Länge der längsten Verbfolge in Klammern): Ich schreibe einen Brief (1) Ich habe einen Brief schreiben müssen (2) Der Brief muss geschrieben werden (3) Der Brief hätte geschrieben werden müssen (4) Ein Bekannter meinte, dass es nicht möglich sei, einen korrekten Satz mit mehr als vier aufeinanderfolgenden Verben zu formulieren, aber nach einiger Zeit ist mir ein Satz mit fünf eingefallen: Er war nicht so blöd, wie man hätte geneigt sein können anzunehmen. Ist das auch mit mehr als fünf Verben möglich? Ich habe jetzt eine Weile darüber nachgedacht, aber mir ist kein anderer Satz mit fünf oder mehr aufeinanderfolgenden Verben eingefallen. A: Man kann im Grunde alle verfügbaren Modalverben aneinanderreihen, auch wenn pro hinzugefügten Modalverb es immer aufwendiger wird, einen Sitz im Leben für einen solchen Satz zu finden. Aber unmöglich ist es nicht. Ich hätte das Honigglas nicht auslecken dürfen. Ich hätte das Honigglas nicht auslecken wollen sollen. [...] Ich hätte das Honigglas nicht auslecken wollen sollen können dürfen müssen mögen. Nun kann man aber auch die Modalverben mehrfach einsetzen: Ich hätte das Honigglas nicht auslecken dürfen dürfen. Sprich: Es wäre besser gewesen, Autoritätsperson 1 hätte es Autoritätsperson 2 nicht gestattet, mir zu gestatten, das Honigglas auszulecken. A: Ohne Partizipien (also nur finite und infinite Verbformen) können Konstruktionen mit Verben der Wahrnehmung (zB sehen, hören) manchmal viele aufeinanderfolgenden Infinitivformen enthalten. Ein Zitat aus "Der Prozess" von Franz Kafka: Als ich mich ein Weilchen wieder so ruhig verhalten hatte, dass man die Fliegen an der Wand hätte können gehen hören, vernahm ich, dass... Ich bin aber eher der Meinung, dass die Reihenfolge in diesem Fall eher unidiomatisch ist. Hätte gehen hören können fände ich besser. Man kann sich auch locker eine realistische Situation vorstellen, wo noch ein Modalverb dazu kommt, ohne dass es zu schräg klingt, und noch verständlich wäre, bspw.: Es war im Raum so leise, dass man ihn eigentlich hätte atmen hören können sollen. A: Man kann deinen Beispielsatz einfach erweitern: Er war nicht so blöd, wie man hätte geneigt gewesen sein können anzunehmen.
{ "pile_set_name": "StackExchange" }
Chinese party cadre jailed for taking bribes BEIJING (AP) — A court in southern China sentenced a former Communist Party cadre who gained notoriety last year for amassing a large number of properties to 11 years and 6 months in prison on Thursday. Cai Bin, formerly a party official at a local urban management bureau, was convicted of taking 2.75 million yuan ($450,000) in bribes, and the illegal gains were turned over to the state treasury, the party-run People’s Daily said on its news site. Investigations against Cai began after online reports alleged Cai and his family owned 22 properties and questioned how a government official could afford them in a country where a working family struggles to buy one apartment in major cities such as Beijing, Shanghai and Guangzhou. China’s web users gave Cai the nickname “Uncle House,” and a following online movement exposed several more government officials with excessive real estate holdings, including a bank official who had 41 properties in Beijing. Members of the Chinese public have resorted to the Internet, especially social media, to expose corruption, but Chinese authorities are wary of having to respond to public demands.
{ "pile_set_name": "Pile-CC" }
/* * Copyright (C) 2014 Saravan Pantham * * Licensed under the Apache License, Version 2.0 (the "License"); * you may not use this file except in compliance with the License. * You may obtain a copy of the License at * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, software * distributed under the License is distributed on an "AS IS" BASIS, * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. * See the License for the specific language governing permissions and * limitations under the License. */ package com.psaravan.filebrowserview.lib.AsyncTasks; import android.app.ProgressDialog; import android.content.Context; import android.content.DialogInterface; import android.content.DialogInterface.OnClickListener; import android.os.AsyncTask; import android.widget.Toast; import com.psaravan.filebrowserview.lib.Interfaces.MoveInterface; import com.psaravan.filebrowserview.lib.R; import org.apache.commons.io.FileUtils; import java.io.File; /** * AsyncTask that moves the specified file/folder recursively to a new location. * * @author Saravan Pantham */ public class AsyncMoveTask extends AsyncTask<String, Void, Boolean> { private Context mContext; private ProgressDialog pd; private File mSourceFile; private File mDestDirFile; private boolean mShowProgress = true; private MoveInterface mMoveInterface; public AsyncMoveTask(Context context, File source, File destDir, boolean showProgress) { mContext = context; mSourceFile = source; mShowProgress = showProgress; mDestDirFile = destDir; } @Override protected void onPreExecute() { if (mSourceFile==null) return; //Skip the rest of this method if the user doesn't want a progress dialog. if (!mShowProgress) return; pd = new ProgressDialog(mContext); pd.setCancelable(false); pd.setIndeterminate(false); pd.setTitle(R.string.move); pd.setMessage(mContext.getResources().getString(R.string.moving) + " " + mSourceFile.getName()); pd.setButton(DialogInterface.BUTTON_NEUTRAL, mContext.getResources() .getString(R.string.run_in_background), new OnClickListener() { @Override public void onClick(DialogInterface arg0, int arg1) { pd.dismiss(); } }); pd.show(); if (mMoveInterface!=null) mMoveInterface.preMoveStartSync(); } @Override protected Boolean doInBackground(String... params) { if (mMoveInterface!=null) mMoveInterface.preMoveStartAsync(); if (mSourceFile==null || mDestDirFile==null) { if (mMoveInterface!=null) mMoveInterface.onMoveCompleteAsync(false); return false; } if (mSourceFile.isDirectory()) { try { FileUtils.moveDirectory(mSourceFile, mDestDirFile); } catch (Exception e) { if (mMoveInterface!=null) mMoveInterface.onMoveCompleteAsync(false); return false; } } else { try { FileUtils.moveFile(mSourceFile, mDestDirFile); } catch (Exception e) { if (mMoveInterface!=null) mMoveInterface.onMoveCompleteAsync(false); return false; } } if (mMoveInterface!=null) mMoveInterface.onMoveCompleteAsync(true); return true; } @Override protected void onPostExecute(Boolean result) { super.onPostExecute(result); if (mMoveInterface!=null) mMoveInterface.onMoveCompleteSync(result); if (pd!=null) pd.dismiss(); if (result==true) { String message = mSourceFile.getName() + " " + mContext.getResources().getString(R.string.moved); Toast.makeText(mContext, message, Toast.LENGTH_SHORT).show(); } else { String message = mSourceFile.getName() + " " + mContext.getResources().getString(R.string.could_not_be_moved); Toast.makeText(mContext, message, Toast.LENGTH_SHORT).show(); } } /** * @param moveInterface The move interface instance to attach to this * AsyncTask. */ public void setMoveInterface(MoveInterface moveInterface) { mMoveInterface = moveInterface; } }
{ "pile_set_name": "Github" }
The Dark at the Top of the Stairs (film) The Dark at the Top of the Stairs is a 1960 American drama film. Academy Award winner Delbert Mann directed the work of Robert Preston and Dorothy McGuire in the production. Shirley Knight garnered an Oscar nomination for Best Supporting Actress, and Lee Kinsolving was nominated for a Golden Globe Award as Best Supporting Actor. Knight was also nominated for two Golden Globes. Mann's direction was nominated for a Directors Guild of America Award for Outstanding Directing in a Feature Film. It was based on the Tony Award-nominated play of the same name by William Inge. Plot During Prohibition in Oklahoma, Rubin Flood is a successful harness and saddle salesman. However, with the advent of the automobile, his job is becoming more difficult. He is married to Cora, someone he considers a demanding wife and over-protective mother. When he learns his company is closing, he is unable to face his wife, and stops at a pharmacy to partake of "medicinal" alcohol. Cora is out with her daughter Reenie, buying a dress for a birthday party of one of her classmates. Rubin cannot bring himself to tell Cora he has lost his job, arguing about how much Cora has spent on Reenie's dress, with Cora's lamenting that she always has to watch every penny. The couple's younger son Sonny is being bullied at school. Sonny has a fear of the dark. Determined to get him to stand up for himself, Rubin attempts to teach him to box. While sparring, he inadvertently strikes the boy too hard. Cora, now incensed, tears into Rubin, eventually accusing him of having an affair with Mavis Pruitt, a local widow. A livid Rubin slaps Cora, then storms out of the house. Reenie witnesses her parents' dispute. She runs into the street, causing a motorist to swerve and strike a tree. The driver, Sammy Golden, is relatively unhurt, and he and Reenie become attracted to one another. Cora calls her older sister Lottie to tell her that Rubin hit her. Rubin, still slightly intoxicated, shows up at Mavis' beauty salon, which also is where she lives. He is seen going in by two town gossips. Rubin tells her Cora has ignored him for years, and while he has remained faithful, he desires Mavis. When she doesn't accept his halfhearted advances, Rubin falls asleep on her parlor sofa. Days later, Lottie and her husband are there for dinner. Cora asks Lottie if she and the kids can come stay with her. Just as she asks, Rubin returns home to apologize. The two gossips call Cora to tell her, which re-ignites the argument. He accuses Cora of rejecting him sexually, and she argues that she can't be in the mood when she spends her days worrying about money. Reenie's friend Flirt and her boyfriend arrive, with a date for Reenie, Sammy. Lottie's bigotry is revealed when she suggests that Cora and Rubin might not want to allow Reenie to accompany a Jew to the party. Sammy and Reenie kiss at the party, but Harry Ralston and his wife walk in on them, berating her for bringing a Jew to the country club, where they are not allowed. Embarrassed, Sammy and Reenie leave. Sammy bemoans the bigotry in the world, and drops Reenie at home, where she finds Rubin on the sofa. He confesses that he has lost his job and doesn't know how to tell Cora. The following morning, they learn Sammy has attempted suicide. Reenie rushes to the hospital, telling him that she doesn't care what people think. Cora promises Sonny to stop being so over-protective so he can grow into a responsible adult, then receives a call letting her know that Sammy has died. Cora heads over to Mavis's salon. She pretends to be a customer, before revealing she is Rubin's wife. Mavis confesses that she has been in love with Rubin for years, but that Rubin has always been faithful to Cora. She also reveals that Rubin has lost his job. Rubin has found a new job as a salesman at an oil drilling equipment company. He returns home to find Cora waiting for him. She has sent Reenie to Lottie's for a few days to help her come to grips with Sammy's death. Cora and Rubin declare their love for one another and a commitment to paying more attention to each other's needs. As they embrace, Sonny returns home with a friend, one of his former tormentors from school. Rubin pays for the two boys to go see a movie, After they leave, he follows his wife up to the bedroom. Cast Robert Preston as Rubin Flood Dorothy McGuire as Cora Flood Eve Arden as Lottie Lacey Angela Lansbury as Mavis Pruitt Shirley Knight as Reenie Flood Lee Kinsolving as Sammy Golden Frank Overton as Morris Lacey Robert Eyer as Sonny Flood Penney Parker as Flirt Conroy Ken Lynch as Harry Ralston Paul Birch as Jonah Mills (uncredited) Peg LaCentra as Edna Harper (uncredited) Nelson Leigh as Ed Peabody (uncredited) Charles Seel as Percy Weems (uncredited) Mary Patton as Mrs Ralston (uncredited) Production Warner Brothers announced in January 1960 that it would be producing a film version of Inge's play, directed by Delbert Mann, and starring Robert Preston and Dorothy McGuire. During rehearsals for the production, Mann used the same process he had used since his first film, Marty, in 1955. First, the cast read through the entire script, then they rehearsed the entire screenplay on set prior to the commencement of filming. The film went into production in late January. By the beginning of March an actor's strike was looming, scheduled for March 7. Warner Brothers began going to seven days a week production schedules, in order to complete filming before the strike. In mid-July, it was announced that The Dark at the Top of the Stairs would headline the launch of the fall season, opening at Radio City Music Hall after Labor Day. The film opened on September 22, 1960 at Radio City Music Hall in New York. Reception Variety gave the film a favorable review, noting that it was "well cast and persuasively acted". However, Bosley Crowther of The New York Times did not give the film a favorable review, calling it a "flawed adaptation of the original stage play". The Film Bulletin gave the film a good review, if they did find it uneven, calling it a "rather absorbing drama, with goodly shares of humor, warmth, and tragedy". They felt that Preston's performance was fine, but would have been better if he had brought more "humility and tenderness" to the role. They found McGuire's performance "splendid", and thought Mann's direction was professional, but that he focused on "certain scenes singularly, rather than integrating them into the whole". Motion Picture Daily gave the film another good review, although they were not kind to Mann's direction, finding it to be the weakness in the picture, saying that he "failed to draw out some of the most vital scenes all the urgency and pathos that Inge had wrote into them". They praised the work of Harriett Frank and Irving Ravetch in their adaptation of Inge's play to the screen, and felt the acting was exceptional. They called Preston's work "excellent", and McGuire "warm and appealing"; they felt the rest of the cast was well-done, and singled out Lansbury's performance as outstanding. The one sour note in the acting corps, the felt, was Arden's performance as the aunt, which they felt worked during the comedic sections, but was "out of key" during the dramatic moments. Shirley Knight earned an Oscar nomination for Best Supporting Actress for her role as Reenie Flood. Knight also received two Golden Globe nominations for her performance: for Golden Globe Award for Best Supporting Actress – Motion Picture and New Star Of The Year - Actress. Lee Kinsolving also received a Golden Globe nomination for Best Supporting Actor for his role as "Sammy Goldenbaum". Mann's direction was nominated for a Directors Guild of America Award for "outstanding directorial achievement". The film was voted one of the ten best of the year in 1960 by the National Board of Review. Eve Arden's performance rated among the five best of the year by supporting actresses, according to The Film Daily's poll of over 1800 critics. References Category:1960 films Category:1960s drama films Category:American films Category:American films based on plays Category:American drama films Category:English-language films Category:Films about antisemitism Category:Films about dysfunctional families Category:Films directed by Delbert Mann Category:Films scored by Max Steiner Category:Films set in Oklahoma Category:Films set in the 1920s Category:Suicide in film Category:Warner Bros. films
{ "pile_set_name": "Wikipedia (en)" }
<?php /* * This file is part of the Monolog package. * * (c) Jordi Boggiano <[email protected]> * * For the full copyright and license information, please view the LICENSE * file that was distributed with this source code. */ namespace Monolog\Handler; use Monolog\TestCase; use Monolog\Logger; class BufferHandlerTest extends TestCase { private $shutdownCheckHandler; /** * @covers Monolog\Handler\BufferHandler::__construct * @covers Monolog\Handler\BufferHandler::handle * @covers Monolog\Handler\BufferHandler::close */ public function testHandleBuffers() { $test = new TestHandler(); $handler = new BufferHandler($test); $handler->handle($this->getRecord(Logger::DEBUG)); $handler->handle($this->getRecord(Logger::INFO)); $this->assertFalse($test->hasDebugRecords()); $this->assertFalse($test->hasInfoRecords()); $handler->close(); $this->assertTrue($test->hasInfoRecords()); $this->assertTrue(count($test->getRecords()) === 2); } /** * @covers Monolog\Handler\BufferHandler::close * @covers Monolog\Handler\BufferHandler::flush */ public function testPropagatesRecordsAtEndOfRequest() { $test = new TestHandler(); $handler = new BufferHandler($test); $handler->handle($this->getRecord(Logger::WARNING)); $handler->handle($this->getRecord(Logger::DEBUG)); $this->shutdownCheckHandler = $test; register_shutdown_function(array($this, 'checkPropagation')); } public function checkPropagation() { if (!$this->shutdownCheckHandler->hasWarningRecords() || !$this->shutdownCheckHandler->hasDebugRecords()) { echo '!!! BufferHandlerTest::testPropagatesRecordsAtEndOfRequest failed to verify that the messages have been propagated' . PHP_EOL; exit(1); } } /** * @covers Monolog\Handler\BufferHandler::handle */ public function testHandleBufferLimit() { $test = new TestHandler(); $handler = new BufferHandler($test, 2); $handler->handle($this->getRecord(Logger::DEBUG)); $handler->handle($this->getRecord(Logger::DEBUG)); $handler->handle($this->getRecord(Logger::INFO)); $handler->handle($this->getRecord(Logger::WARNING)); $handler->close(); $this->assertTrue($test->hasWarningRecords()); $this->assertTrue($test->hasInfoRecords()); $this->assertFalse($test->hasDebugRecords()); } /** * @covers Monolog\Handler\BufferHandler::handle */ public function testHandleBufferLimitWithFlushOnOverflow() { $test = new TestHandler(); $handler = new BufferHandler($test, 3, Logger::DEBUG, true, true); // send two records $handler->handle($this->getRecord(Logger::DEBUG)); $handler->handle($this->getRecord(Logger::DEBUG)); $handler->handle($this->getRecord(Logger::DEBUG)); $this->assertFalse($test->hasDebugRecords()); $this->assertCount(0, $test->getRecords()); // overflow $handler->handle($this->getRecord(Logger::INFO)); $this->assertTrue($test->hasDebugRecords()); $this->assertCount(3, $test->getRecords()); // should buffer again $handler->handle($this->getRecord(Logger::WARNING)); $this->assertCount(3, $test->getRecords()); $handler->close(); $this->assertCount(5, $test->getRecords()); $this->assertTrue($test->hasWarningRecords()); $this->assertTrue($test->hasInfoRecords()); } /** * @covers Monolog\Handler\BufferHandler::handle */ public function testHandleLevel() { $test = new TestHandler(); $handler = new BufferHandler($test, 0, Logger::INFO); $handler->handle($this->getRecord(Logger::DEBUG)); $handler->handle($this->getRecord(Logger::INFO)); $handler->handle($this->getRecord(Logger::WARNING)); $handler->handle($this->getRecord(Logger::DEBUG)); $handler->close(); $this->assertTrue($test->hasWarningRecords()); $this->assertTrue($test->hasInfoRecords()); $this->assertFalse($test->hasDebugRecords()); } /** * @covers Monolog\Handler\BufferHandler::flush */ public function testFlush() { $test = new TestHandler(); $handler = new BufferHandler($test, 0); $handler->handle($this->getRecord(Logger::DEBUG)); $handler->handle($this->getRecord(Logger::INFO)); $handler->flush(); $this->assertTrue($test->hasInfoRecords()); $this->assertTrue($test->hasDebugRecords()); $this->assertFalse($test->hasWarningRecords()); } /** * @covers Monolog\Handler\BufferHandler::handle */ public function testHandleUsesProcessors() { $test = new TestHandler(); $handler = new BufferHandler($test); $handler->pushProcessor(function ($record) { $record['extra']['foo'] = true; return $record; }); $handler->handle($this->getRecord(Logger::WARNING)); $handler->flush(); $this->assertTrue($test->hasWarningRecords()); $records = $test->getRecords(); $this->assertTrue($records[0]['extra']['foo']); } }
{ "pile_set_name": "Github" }
Question No: 51 You are developing a test case that must be run multiple times with different input values for a specific field each time. You have a list of values that will be used for the input. You need to modify the test to enter each value into the field. What should you do? Insert a parameter into the Action column of the test step and enter the input values into the Parameter Values pane. Insert a parameter into the Expected Results column of the test step and enter the input values into Parameter values pane. Insert a parameter into the Action column of the test step. Create test steps for each input value in the Action column. Answer: A Explanation: Add parameters to a test case Create a parameter by typing a name preceded by quot;@quot; in the actions and expected results of your test steps. Note: When you write a manual test, you often want to specify that the test should be repeated several times with different test data. For example, if your users can add different quantities of a product to a shopping cart, then you want to check that a quantity of 200 works just as well as a quantity of 1. To do this, you insert parameters in your test steps. Along with the test steps, you provide a table of parameter values. Reference: Repeat a test with different data Question No: 52 You are using Microsoft Test Manager (MTM) to manage test cases. You want to review all test cases with shared steps. You need to build a direct links query that will generate a list of all test cases in the team project that use a shared step. Which three actions should you perform? (Each correct answer presents part of the solution. Choose three.) Set the linked work items filter to Work item type = Shared Steps. Set the main query to Team Project = @Project AND Work Item Type = Test Case. Return all top-level work items. Return only items that have the specified links. Return only items that do not have the specified links. Answer: A,B,D Explanation: Q: How do I link test cases, shared steps, and test results? A: The link types, Tested and Tested By are used to link test cases to work items, and Test Case and Shared Steps are used to link Shared steps to test cases. Using Microsoft Test Manager, you can create test cases and test plans which define and manage these associations. Also, Test Manager creates and manages the associations of test results to test cases and test plans. Question No: 53 You are managing test cases by using Microsoft Test Manager (MTM). You plan to test a part of your product on a specific configuration you create. You need to ensure that new test cases in a specific test suite default to use this configuration without impacting other test suites. What should you do? Create a new test plan for testing with the specific configuration. Select all test cases in the test suite and select the specific configuration. Select the specific configuration as the default configuration for the test plan. Select the specific configuration as the default configuration for the test suite. Answer: D Explanation: At any time when you are planning what to test, you can add test configurations and set them as the default configurations for your test plan. When you next add test cases to the test plan, a pairing of each default configuration with the test case is added to the test plan. When you run the tests from the test plan, these pairings called test points are shown and each can be run individually. Test results are saved for each test point. You can also override the default test configurations for the plan and set different default configurations for a specific test suite. When test cases are added to these test suites, a pairing of each default configuration for the test suite with the test case is added to the test plan as shown in the following illustration. Reference: How to: Select Different Test Configurations For a Test Plan or a Test Suite Question No: 54 You are using Microsoft Test Manager (MTM). You plan to reduce the maintenance of test suites. You need to create test suites for which the test cases are automatically added. What are two possible types of test suites that achieve this goal? (Each correct answer presents a complete solution. Choose two.) Exploratory-based Static Query-based Requirements-based Answer: C,D Explanation: C: Query-based suites show the results of a query that you define. For example, you could select all the test cases that have Priority = 1. D: Requirements-based suites are derived from Product Backlog Items, User Stories, or other requirements. The suite contains all the test cases that are linked to its requirement. This type helps you track how well each requirement has been tested. Question No: 55 You are using Microsoft Test Manager (MTM) to perform exploratory testing. You need to ensure that any bugs or test cases created during an exploratory test session are associated with a specific requirement for the purposes of traceability. What should you do? From the Test activity, select View Exploratory Test Sessions. Open a session and click the Copy Link button. From the Run Tests activity, select a test case that is a part of a requirement suite and select Run. Create a requirement suite in the test plan, right-click on the suite, and select Explore Requirement. From the Do Exploratory Testing activity, select Explore. Answer: C Explanation: Add a Requirement to your Test Plan Once your Requirement is in your Test Plan, right mouse click and select Explore requirement ->Perform the steps of the test case and mark each step with a result. ->When you reach the shared steps, choose the down-arrow next to the shared steps icon and select Start and record. Etc D (not C): Creating an Action Recording for Shared Steps in Microsoft Test Manager You can create an action recording for a shared step in Microsoft Test Manager that will automatically run when the shared step is included in test cases. To create an action recording for shared steps in Microsoft Test Manager ->Open Microsoft Test Manager. ->On the center group switcher, choose the down-arrow and then choose Testing Center. ->On the center group menu bar, choose Organize. ->On the menu, choose Shared Steps Manager. ->In the list of shared step, choose the row for the shared step for which you want to create an action recording. Question No: 59 You are using Microsoft Test Manager (MTM). A test case is already in production. You need to modify the test case to indicate it is being reworked. What should you do? Change the test case state to Design. Change the test case to Blocked. Change the test case state to Closed. Change the test plan state to Inactive. Answer: A Explanation: No test cases are ready to be run. When all test cases remain in a design state for a long time, some issue is blocking progress. You might want to investigate the cause of the blockage. Note: Update the state of each test case as it progresses from Design to Ready to Closed. Question No: 60 You are using Microsoft Test Manager (MTM). You plan to design a shared steps work item with the possibility that it will be used with multiple rows of test data. You need to create a test case that contains the shared steps in multiple iterations. You also need to provide different test data for each iteration. What should you do? Create a copy of the shared steps work item and provide different values for the parameters in the original shared steps work item and its copy. Use the different shared steps work items in the test cases to get different test data. Create an action recording of the shared steps work item and specify multiple parameter values while recording. Provide default parameter values in the shared steps work item and provide different data in the test case for multiple iterations.
{ "pile_set_name": "Pile-CC" }
Self-management, health service use and information seeking for diabetes care among Black Caribbean immigrants in Toronto. The objective of this research was to explore self-management practices and the use of diabetes information and care among Black-Caribbean immigrants with type 2 diabetes. The study population included Black-Caribbean immigrants and Canadian-born participants between the ages of 35 to 64 years with type 2 diabetes. Study participants were recruited from community health centres (CHCs), diabetes education centres, hospital-based diabetes clinics, the Canadian Diabetes Association and immigrant-serving organizations. A structured questionnaire was used to collect demographics and information related to diabetes status, self-management practices and the use of diabetes information and care. Interviews were conducted with 48 Black-Caribbean immigrants and 54 Canadian-born participants with type 2 diabetes. Black-Caribbean immigrants were significantly more likely than the Canadian-born group to engage in recommended diabetes self-management practices (i.e. reduced fat diet, reduced carbohydrate diet, non-smoking and regular physical activity) and receive regular A1C and eye screening by a health professional. Black-Caribbean immigrant participants were significantly more likely to report receiving diabetes information and care through a community health centre (CHC) and nurses and dieticians than their Canadian-born counterparts. CHCs and allied health professionals play an important role in the management of diabetes in the Black-Caribbean immigrant community and may contribute to this group's favourable diabetes self-management profile and access to information and care. Additional research is necessary to confirm whether these findings are generalizable to the Black-Caribbean community in general (i.e. immigrant and non-immigrant) and to determine whether the use of CHCs and/or allied health professionals is associated with favourable outcomes in the Black-Caribbean immigrant community as well as others.
{ "pile_set_name": "PubMed Abstracts" }
Q: How to send C++ console params to C# DLL I need to send two numbers entered as parameters or requested by C++ console to a library in C#. Manually the code is: BSTR thing_to_send = ::SysAllocString(L"10 20"); How can I create a variable of type BSTR using the values of the parameters indicated by the console or by two variables of type integer or string. I need to concatenate the values using a space between them, for example: string Num1 = 30; string Num2 = 40; string dataToSend = Num1 + " " + Num2; or string Num1 = argv[1]; string Num2 = argv[2]; string dataToSend dataToSend += Num1 + " "; dataToSend += Num2; How I can convert dataToSend to BSTR valid variable to send with: HRESULT hResult = obj->GetTheThing(dataToSend, &returned_thing);? What I have tried: In each page that I have reviewed other types of values of origin for the transformation are indicated, with explicit values of chain like being "Cade to convert" but not with the use of variables as it is in this case The code I need to solve is: BSTR thing_to_send = ::SysAllocString(L"10 20"); BSTR returned_thing; BimObjectTest_CSharp::_TheClassPtr obj(__uuidof(BimObjectTest_CSharp::TheClass)); HRESULT hResult = obj->GetTheThing(thing_to_send, &returned_thing); the literal L "10 20" must be replaced by the parameters of the console or by two variables requested via the console, note the space between the values! BSTR thing_to_send should contain, for example, argv[1] + " " + argv[2]! A: Here is a function CombineStrings, that combines two _TSTRINGs to BSTR with space between them. There is also a main function that show how to call it with console arguments. BSTR CombineStrings(_TCHAR* arg1, _TCHAR* arg2) { long len1 = wcsnlen_s(arg1, 100); long len2 = wcsnlen_s(arg2, 100); BSTR result = SysAllocStringLen(NULL, len1 + len2 + 1); memcpy(result, arg1, len1 * sizeof(OLECHAR)); memcpy(result + len1, L" ", 1 * sizeof(OLECHAR)); memcpy(result + len1 + 1, arg2, len2 * sizeof(OLECHAR)); result[len1 + len2 + 1] = NULL; // contains "firstarg<empty>secondarg" return result; } int _tmain(int argc, _TCHAR* argv[]) { if (argc < 3) { // two arguments required. return -1; } BSTR combinedStr = CombineStrings(argv[1], argv[2]); BSTR returned_thing; HRESULT hResult = obj->GetTheThing(combinedStr, &returned_thing); SysFreeString(combinedStr); return 0; }
{ "pile_set_name": "StackExchange" }
Mario Badescu: Get Free 3 Complimentary Samples with Every Order Plus Free Shipping on Orders Over $50 Mario Badescu: Free Standard Shipping on $50+ Mario Badescu: Get free shipping on orders over $50. Mario Badescu: 15% off Orders Mario Badescu: FREE SHIPPING ON ORDERS $50.00 OR MORE!!! Get hold of Your current Mario Badescu Coupon Code & Mario Badescu Coupon Codes Instantly In advance of Getting rid of The Offer Online Mario Badescu Coupon Code usually are actively playing a great function throughout increasing the buying power of the man. These Mario Badescu Coupon Code can also be thought to be the key reason powering an amazing increase in accomplishing online store. Therefore several online information mill made to supply beautiful Mario Badescu Coupon Code in regular basis to stand up to inside online current market amongst it's opposition and to achieve potential clients. In fact these types of Mario Badescu Coupon Code are of fantastic help popular man and it is aiding the theifs to gradually elevate their lifestyle. There are plenty of Mario Badescu Coupon Code then one very sound just one tend to be type Mario Badescu Coupon Code. All of the products and solutions presented under this particular manufacturer are needed inside a household largely to extend luxury. This is the goal and want of every individual to live on within convenience considering the required gadgets within their spending plan. If you're able to obtain these with affordable price, surely you will bounce to post all of them. Mario Badescu Coupon Code tend to be supporting visitors to grab many this sort of accessories without difficulty. A different useful truth is you are interested to acquire products and solutions creating a brand name level. It won't be a possibility to encourage them from some sort of shop for the reason that on the huge price tag. Online marketplace is making opportunity for frequent dude to acquire preferred brand components just like clothes, cosmetics, wrist watches, shoes or simply belts in addition to pocket book through the use of attractive Mario Badescu Coupon Code. It is normal that each Mario Badescu Coupon Code is going to be having a code and this code is going to bear something. The worthiness can have the type area of discount for virtually any distinct item as well as reduction of sum for your products or maybe can also be free postage for your front door steps. So you should be watchful whilst selecting ones Mario Badescu Coupon Code. Occasionally it will have a need to find generally on internet for you to find your genuine jcpenny Mario Badescu Coupon Code using the accurate code you desire. This will bring days or perhaps weeks trouble with privileged you'll receive all of them quickly. It is strongly advised to show some endurance in addition to loose time waiting for few days soon you get the correct code instead of jumping order your accessory inside original amount. This particular in many ways is assisting visitors to spend less lot of money on one side in addition, on other fretting hand it truly is assisting those to help save its valuable time. Mario Badescu Coupon Code consisting of Mario Badescu Coupon Code and promotional codes. You will be acquiring plenty of details about Mario Badescu Coupon Code the possibility to adhere to on top of these individuals immediately simply.
{ "pile_set_name": "Pile-CC" }
tparadox.png tparadox_150.png tparadox_200.png
{ "pile_set_name": "Github" }
I just read the story of a boy falsely accused of rape. The girl later dropped the case. I am a mother of three boys. All teenagers. They are the best things in my life. For this “selfish” reason, stories like this break my my heart. One of my greatest future fears is that they will meet the wrong girl. A girl who is vindictive and who has the ability to accuse them of something they didn’t do. I speak as a mother and I will speak this as it bothers me. Back in the day when I was growing up and abstinence was still a virtue, it was harder for rape accusations to happen. These days, anyone can accuse anyone of rape. Rape accusations has been weaponised and this is scary. When we actually think of it, the weaponization of rape accusations hurts everyone. It hurts the cases of women who actually are raped cos only close friends and die hard women supporters will take the women’s word for it. It hurts the men. Who have to live in fear and not get into relationships because they can’t tell what would happen if a relationship goes sour. This is turn hurts the women who will be looking for the good men who have been scared of from dating. It hurts society cos men and women cannot just meet and be friends without fear. I have told my boys: never be alone in a room with a lady for any reason except she is your wife. You think this is extreme? As I type this I am literally shaking from reading that boy’s story. I can’t imagine what he and his family had to go through. As long as false rape accusations exist, men need to find ways of protecting themselves too. Even when you are dating a girl, better to have a chaperone. If you are going to marry her, you will have as much sex as you want. If you aren’t going to marry her the “hit and run” is not worth the pains or possible jail time. And please please please, don’t be so inebriated as to not even remember what happened. *sigh. Please be careful out there. One of our favourite quotes at Woman.NG is a line from Emeli Sande’s Read All About It; “If you’ve got the heart of a lion, why let your voice be tamed?” This has inspired us to publish Nigerian women’s take on about everything. From conceiving a child to burying an old loved one and every life experience in between them - Nigerian women’s stories, opinions, issues, debates, advice, news etc. Read More >> For Adverts & Enquiries: Contact Us Do you have a question for our editors? Want your personal stories or opinions to be published on woman.ng? Think you have what it takes to work with us? Want to advertise your products or services on woman.ng? Please contact us: [email protected]
{ "pile_set_name": "Pile-CC" }
Random digging… Tonight I attempted to get a one-click install app on Dreamhost running again. To be specific this is an installation of Gallery 2 written in PHP that sometime in 2007-2011 time period was a a great offering. It has been broken for some time. My access to Dreamhost over the last several years has primarily involved digging up my credentials logging in and changing the expiration data and CCV on my billing card to keep the account alive for the ancient things that run there… like this blog, and the old photo gallery, before Amazon Photos, and before Flickr was on my radar, and whatever other latest sites the cool kids use for photo management (I still haven’t found a system I like…) Anyway digging into an app that I configured more than a decade ago on a hosting provider that I haven’t used much in almost that long has proven interesting, it also lead down the rabbits hole of looking at old blog posts. Attempting to run Linux and MIPS and Sparc hardware for fun? Anyway back to trying to figure out Gallery’s db connection issues, if I can’t get it working shortly though, I’ll leave it and come back maybe tomorrow, maybe six months from now…
{ "pile_set_name": "Pile-CC" }
This application relates to the discovery and asexual propagation of a new and distinct variety of plum, Prunus salicina cv. ‘Suplumfiftythree’. The new variety was first originated by hybridization in July 2014 by Terry A. Bacon as breeder number ‘PL1687RB’. The new variety ‘Suplumfiftythree’ is characterized by having large, juicy fruit with black skin and red flesh. The fruit of the new variety ‘Suplumfiftythree’ also has a high Brix:Acid ratio, firm flesh, a mild sweet flavor and a stone that clings to the flesh. The seed parent is ‘PL761RB’ (unpatented breeding selection), and the pollen parent ‘PL674RZ’ (unpatented breeding selection). The parent varieties were first crossed in February 2011, with the date of first sowing being February 2012, and the date of first flowering being February 2014. The new plum variety ‘Suplumfiftythree’ was first asexually propagated by Terry Bacon near Wasco, Kern County, Calif. in February 2015 by dormant grafting. The new variety ‘Suplumfiftythree’ is similar to its pollen parent ‘PL674RZ’ in that the fruit of both varieties has red flesh. The new variety ‘Suplumfiftythree’ differs from ‘PL674RZ’ in that the fruit of the new variety has a black skin compared to red-dapple skin for the fruit of ‘PL674RZ’. Further, the fruit of the new variety ‘Suplumfiftythree’ is larger at 140 g compared to 100 g for ‘PL674RZ’. The new variety ‘Suplumfiftythree’ is similar to its seed parent ‘PL761RB’ in that the fruit of both varieties has red flesh and black skin. The new variety ‘Suplufiftythree’ differs from its seed parent ‘PL6761RB’ in that for the new variety ripening time starts 9 days later than for ‘PL761RB’. Further, the fruit of the new variety ‘Suplumfiftythree’ is larger at 140 g compared to 130 g for ‘PL761RB’. The new variety ‘Suplufiftythree’ also differs from ‘PL761RB’ in that the brix:acid ratio is 34 for the new variety, compared to 21 for ‘PL761RB’. The fruit of the new variety ‘Suplumfiftythree’ has similar black skin and red flesh as ‘Black Splendor’ (unpatented). However, the new variety ‘Suplumfiftythree’ differs from ‘Black Splendor’ in that the new variety starts ripening about 7 days later than ‘Black Splendor’. In addition, the new variety has larger fruit at about 140 g compared 135 g for ‘Black Splendor’. The new variety ‘Suplumfiftythree’ has a brix of 17 degrees, while ‘Black Splendor’ has a brix of 14 degrees. The fruit of the new variety ‘Suplumfiftythree’ has black skin like the fruit of ‘Owen-T’ (unpatented), but the ripening of the new variety ‘Suplumfiftythree’ starts about 18 days later than ‘Owen-T’. Further, the fruit of the new variety ‘Suplumfiftythree’ has red flesh compared to yellow flesh for ‘Owen-T’. The new variety ‘Suplumfiftythree’ has been shown to maintain its distinguishing characteristics through successive asexual propagations by, for example, cuttings and grafting.
{ "pile_set_name": "USPTO Backgrounds" }
New Tales of Gisaeng New Tales of Gisaeng (; also known as New Gisaeng Story) is a 2011 South Korean television series starring Im Soo-hyang, Sung Hoon and Han Hye-rin. Written by Im Sung-han and directed by Son Moon-kwon, it aired on SBS from January 23 to July 17, 2011 on Saturdays and Sundays at 21:45 for 52 episodes. Plot "Gisaeng" was the Korean equivalent of a geisha or courtesan knowledgeable in poetry, dance, music, culture and politics, who entertained noblemen and royalty of the Joseon Dynasty. This series explores the premise that gisaeng still existed in modern-day Korea. Dan Sa-ran (Im Soo-hyang) lost her mother at a young age, and never quite got along with her stepmother and stepsister. Despite her humble background, she carries herself with pride and grace, majoring in classical dance during college. Drawing the attention of Buyonggak's head gisaeng with her dancing talent and classic beauty, Sa-ran enters Korea's sole traditional gisaeng house, an exclusive establishment that serves only VIP guests. Ah Da-mo (Sung Hoon) is a cocky second-generation chaebol with his own set of daddy issues. He can't be bothered to give any woman the time of day... until he meets Sa-ran. Cast Main characters Im Soo-hyang as Dan Sa-ran Sung Hoon as Ah Da-mo Han Hye-rin as Geum Ra-ra Kim Bo-yeon as Oh Hwa-ran Kim Hye-sun as Han Soon-deok Jung Han-bi as young Soon-deok Supporting characters Dan family Baek Ok-dam as Dan Gong-joo Kim Joo-young as Dan Chul-soo Lee Sook as Ji Hwa-ja Geum family Han Jin-hee as Geum Eo-san Park Jin as young Eo-san Seo Woo-rim as Lee Hong-ah Lee Jong-nam as Jang Joo-hee Lee Dong-joon as Geum Kang-san Lee Dae-ro as Geum Shi-jo Lee Sang-mi as Shin Hyo-ri Ah family Im Hyuk as Ah Soo-ra Kim Hye-jung as Cha Ra-ri Ahn Young-joo as Park Ae-ja Buyonggak Lee Mae-ri as Lee Do-hwa Choi Sun-ja as Hwa-ran's mother Park Joon-myun as Noh Eun-ja Seo Dong-soo as Ma Dan-se Song Dae-kwan as Seo Saeng-kang Oh Ki-chan as Oh Bong-yi Kang Cho-hee as Han Song-yi Kim Yul as Baek Soo-jung Seol Yoon as Jang Soo-jin Yoon Ji-eun as Song Hye-eun Kim Eun-sun as Ye-rang Lee Sun-ah as Lee Ji-hyang Oh Ji-yeon as Kim-sshi Ha Na-kyung Extended cast Jeon Ji-hoo as Son-ja Jin Ye-sol as Jin Joo-ah Lee Soo-jin as Sung Ah-mi Park Yoon-jae as Oh Jin-ahm Kim Ho-chang as Yoo Tae-young Michael Blunck as Kyle Shin Goo as Master Joong-bong Jun Sung-hwan as Master Jung-do Lee Hyo-jung as Ma Yi-joon (CEO Joon Entertainment) The Midas Kim Joon-hyung as Do-suk Son Ga-young as Choi Young-mim Won Jong-rye as Young-nim's mother Kim Sun-il as Min-jae Min Joon-hyun as manager Ratings Awards and nominations International broadcast It aired in Japan on cable channel KNTV from September 9, 2012 to March 3, 2013, with reruns on cable channel BS Japan beginning February 20, 2013. In 2015, Hong Kong's HKTV also played this drama. References External links Category:Seoul Broadcasting System television dramas Category:2011 South Korean television series debuts Category:2011 South Korean television series endings Category:Korean-language television programs Category:2010s South Korean television series Category:South Korean romance television series
{ "pile_set_name": "Wikipedia (en)" }
Trauma centrality and PTSD symptom severity in adult survivors of childhood sexual abuse. Theorists have posited that regarding a trauma as central to one's identity leads to greater posttraumatic stress disorder (PTSD) symptom severity. To test this hypothesis, we administered the Centrality of Events Scale (CES) to women reporting a history of childhood sexual abuse (N = 102). The CES scores were correlated with PTSD symptom severity, depression severity, and self-esteem. In addition, we conducted a principal component analysis (PCA) to evaluate factors underlying the CES. The PCA yielded 3 factors reflecting (a) the centrality and integration of the trauma, (b) whether the event is regarded as a turning point in one's life story, and (c) whether the event is a reference point for expectations about the future. Each factor was associated with PTSD symptom severity.
{ "pile_set_name": "PubMed Abstracts" }
{ "type": "minecraft:crafting_shaped", "pattern": [ "X ", "XX ", "XXX" ], "key": { "X": { "item": "tfc:wood/planks/douglas_fir" } }, "result": { "item": "tfc:stairs/wood/douglas_fir", "count": 8 } }
{ "pile_set_name": "Github" }
diff --git a/README b/README index 2f68e14..262822a 100644 --- a/README +++ b/README @@ -1,3 +1,38 @@ +This is an Nginx fork that adds dtrace USDT probes. -Documentation is available at http://nginx.org +Installation: + + ./configure --with-dtrace-probes \ + --with-dtrace=/usr/sbin/dtrace \ + ... + make + make install + +Usage on Linux (with systemtap): + + # make the stap-nginx script visiable in your PATH + export PATH=/usr/local/nginx/sbin:$PATH + + # list all the static probes available in your nginx + stap-nginx -L 'process("nginx").mark("*")' + + # run the test.stp file + stap-nginx test.stp + +Sample test.stp file: + + probe begin + { + print("Tracing. Hit CTRL-C to stop.\n") + } + + probe process("nginx").mark("http-subrequest-start") + { + printf("uri: %s?%s\n", ngx_http_req_uri($arg1), + ngx_http_req_args($arg1)) + } + +For now, only tested on Solaris 11 Express and Fedora Linux 17. + +The original Nginx documentation is available at http://nginx.org diff --git a/auto/install b/auto/install index f7f686c..d6bc457 100644 --- a/auto/install +++ b/auto/install @@ -16,6 +16,20 @@ END fi +case ".$NGX_STAP_NGX_PATH" in + ./*) + ;; + + .) + NGX_STAP_NGX_PATH=$NGX_PREFIX/sbin/stap-nginx + ;; + + *) + NGX_STAP_NGX_PATH=$NGX_PREFIX/$NGX_STAP_NGX_PATH + ;; +esac + + case ".$NGX_SBIN_PATH" in ./*) ;; @@ -49,6 +63,16 @@ case ".$NGX_PID_PATH" in esac +case ".$NGX_TAPSET_PREFIX" in + ./* | .) + ;; + + *) + NGX_TAPSET_PREFIX=$NGX_PREFIX/$NGX_TAPSET_PREFIX + ;; +esac + + case ".$NGX_ERROR_LOG_PATH" in ./* | .) ;; @@ -147,6 +171,36 @@ install: $NGX_OBJS${ngx_dirsep}nginx${ngx_binext} \ || cp -R $NGX_HTML '\$(DESTDIR)$NGX_PREFIX' END +if [ $NGX_DTRACE = YES -a $DTRACE_FROM_SYSTEMTAP = YES ]; then + + ngx_tapset_srcs="$NGX_TAPSET_SRCS" + + cat << END >> $NGX_MAKEFILE + test -d '\$(DESTDIR)$NGX_TAPSET_PREFIX' || \ + mkdir -p '\$(DESTDIR)$NGX_TAPSET_PREFIX' +END + + for ngx_tapset_src in $ngx_tapset_srcs + do + ngx_tapset_file=`basename $ngx_tapset_src` + + cat << END >> $NGX_MAKEFILE + + sed -e "s|NGX_SBIN_PATH|$NGX_SBIN_PATH|g" $ngx_long_cont \ + $ngx_tapset_src > '\$(DESTDIR)$NGX_TAPSET_PREFIX/$ngx_tapset_file' +END + + done + + cat << END >> $NGX_MAKEFILE + + test -d '\$(DESTDIR)`dirname "$NGX_STAP_NGX_PATH"`' || \ + mkdir -p '\$(DESTDIR)`dirname "$NGX_STAP_NGX_PATH"`' + cp $NGX_OBJS/stap-nginx '\$(DESTDIR)$NGX_STAP_NGX_PATH' + chmod 0755 '\$(DESTDIR)$NGX_STAP_NGX_PATH' +END + +fi if test -n "$NGX_ERROR_LOG_PATH"; then cat << END >> $NGX_MAKEFILE @@ -158,6 +212,18 @@ END fi +if [ $NGX_DTRACE = YES ]; then + cat << END >> $NGX_MAKEFILE + +$NGX_OBJS${ngx_dirsep}stap-nginx: src/dtrace/stap-nginx + sed -e "s|NGX_TAPSET_PREFIX|$NGX_TAPSET_PREFIX|g" $ngx_long_cont \ + -e "s|NGX_SBIN_DIR|`dirname $NGX_SBIN_PATH`|g" $ngx_long_cont \ + -e "s|NGX_SBIN_PATH|$NGX_SBIN_PATH|g" $ngx_long_cont \ + src/dtrace/stap-nginx > $NGX_OBJS${ngx_dirsep}stap-nginx +END +fi + + # create Makefile cat << END >> Makefile diff --git a/auto/make b/auto/make index dca011c..57ed99f 100644 --- a/auto/make +++ b/auto/make @@ -27,6 +27,9 @@ LINK = $LINK END +if [ $NGX_DTRACE = YES ]; then + echo DTRACE = $DTRACE >> $NGX_MAKEFILE +fi if test -n "$NGX_PERL_CFLAGS"; then echo NGX_PERL_CFLAGS = $NGX_PERL_CFLAGS >> $NGX_MAKEFILE @@ -204,6 +207,44 @@ ngx_objs=`echo $ngx_all_objs $ngx_modules_obj \ | sed -e "s/ *\([^ ][^ ]*\)/$ngx_long_regex_cont\1/g" \ -e "s/\//$ngx_regex_dirsep/g"` +if [ $NGX_DTRACE = YES ]; then + + ngx_dtrace_obj=$NGX_OBJS${ngx_dirsep}ngx_dtrace_provider.$ngx_objext + + ngx_dtrace_h=$NGX_OBJS${ngx_dirsep}ngx_dtrace_provider.h + + ngx_dtrace_d=$NGX_OBJS${ngx_dirsep}dtrace_providers.d + + ngx_dtrace_providers=`echo $NGX_DTRACE_PROVIDERS \ + | sed -e "s/ *\([^ ][^ ]*\)/$ngx_long_regex_cont\1/g" \ + -e "s/\//$ngx_regex_dirsep/g"` + + cat << END >> $NGX_MAKEFILE + +all: $NGX_OBJS${ngx_dirsep}nginx${ngx_binext} + +$ngx_dtrace_d: $ngx_dtrace_providers + cat $ngx_dtrace_providers > $ngx_dtrace_d + +$ngx_dtrace_h: $ngx_dtrace_d + \$(DTRACE) -h -o $ngx_dtrace_h -s $ngx_dtrace_d +END + + if [ $DTRACE_PROBE_OBJ = YES ]; then + cat << END >> $NGX_MAKEFILE +$ngx_dtrace_obj: $ngx_dtrace_d $ngx_deps$ngx_spacer + \$(DTRACE) -G -o $ngx_dtrace_obj -s $ngx_dtrace_d $ngx_objs +END + + ngx_deps="$ngx_deps$ngx_long_cont$ngx_dtrace_obj" + ngx_objs="$ngx_objs$ngx_long_cont$ngx_dtrace_obj" + + if [ "$DTRACE_FROM_SYSTEMTAP" = YES ]; then + ngx_deps="$ngx_deps$ngx_long_cont$NGX_OBJS${ngx_dirsep}stap-nginx" + fi + fi +fi + if test -n "$NGX_LD_OPT$CORE_LIBS"; then ngx_libs=`echo $NGX_LD_OPT $CORE_LIBS \ | sed -e "s/\//$ngx_regex_dirsep/g" -e "s/^/$ngx_long_regex_cont/"` diff --git a/auto/options b/auto/options index cdf83ca..7f24765 100644 --- a/auto/options +++ b/auto/options @@ -12,6 +12,8 @@ NGX_CONF_PATH= NGX_ERROR_LOG_PATH= NGX_PID_PATH= NGX_LOCK_PATH= +NGX_TAPSET_PREFIX= +NGX_STAP_NGX_PATH= NGX_USER= NGX_GROUP= NGX_BUILD= @@ -21,6 +23,12 @@ CPP= NGX_OBJS=objs NGX_DEBUG=NO +NGX_DTRACE=NO +DTRACE=dtrace + +DTRACE_PROBE_OBJ=YES +DTRACE_FROM_SYSTEMTAP=NO + NGX_CC_OPT= NGX_LD_OPT= CPU=NO @@ -181,6 +189,8 @@ do --error-log-path=*) NGX_ERROR_LOG_PATH="$value";; --pid-path=*) NGX_PID_PATH="$value" ;; --lock-path=*) NGX_LOCK_PATH="$value" ;; + --tapset-prefix=*) NGX_TAPSET_PREFIX="$value" ;; + --stap-nginx-path=*) NGX_STAP_NGX_PATH="$value" ;; --user=*) NGX_USER="$value" ;; --group=*) NGX_GROUP="$value" ;; @@ -305,7 +315,8 @@ use the \"--with-mail_ssl_module\" option instead" --with-ld-opt=*) NGX_LD_OPT="$value" ;; --with-cpu-opt=*) CPU="$value" ;; --with-debug) NGX_DEBUG=YES ;; - + --with-dtrace=*) DTRACE="$value" ;; + --with-dtrace-probes) NGX_DTRACE=YES ;; --without-pcre) USE_PCRE=DISABLED ;; --with-pcre) USE_PCRE=YES ;; --with-pcre=*) PCRE="$value" ;; @@ -359,6 +370,8 @@ cat << END --error-log-path=PATH set error log pathname --pid-path=PATH set nginx.pid pathname --lock-path=PATH set nginx.lock pathname + --tapset-prefix=PATH set systemtap tapset directory prefix + --stap-nginx-path=PATH set stap-nginx pathname --user=USER set non-privileged user for worker processes @@ -506,6 +519,8 @@ cat << END --with-openssl-opt=OPTIONS set additional build options for OpenSSL --with-debug enable debug logging + --with-dtrace-probes enable dtrace USDT probes + --with-dtrace=PATH set dtrace utility pathname END @@ -536,6 +551,7 @@ NGX_CONF_PATH=${NGX_CONF_PATH:-conf/nginx.conf} NGX_CONF_PREFIX=`dirname $NGX_CONF_PATH` NGX_PID_PATH=${NGX_PID_PATH:-logs/nginx.pid} NGX_LOCK_PATH=${NGX_LOCK_PATH:-logs/nginx.lock} +NGX_TAPSET_PREFIX=${NGX_TAPSET_PREFIX:-tapset} if [ ".$NGX_ERROR_LOG_PATH" = ".stderr" ]; then NGX_ERROR_LOG_PATH= diff --git a/auto/os/darwin b/auto/os/darwin index 1d3e3d3..cb4ef3a 100644 --- a/auto/os/darwin +++ b/auto/os/darwin @@ -113,3 +113,6 @@ ngx_feature_libs= ngx_feature_test="int32_t lock, n; n = OSAtomicCompareAndSwap32Barrier(0, 1, &lock)" . auto/feature + +DTRACE_PROBE_OBJ=NO + diff --git a/auto/os/freebsd b/auto/os/freebsd index 937ca20..d76b32b 100644 --- a/auto/os/freebsd +++ b/auto/os/freebsd @@ -105,3 +105,8 @@ if [ $version -ge 701000 ]; then echo " + cpuset_setaffinity() found" have=NGX_HAVE_CPUSET_SETAFFINITY . auto/have fi + +if [ $NGX_DTRACE = YES ]; then + NGX_LD_OPT="$NGX_LD_OPT -lelf" +fi + diff --git a/auto/os/linux b/auto/os/linux index c932267..b5114d6 100644 --- a/auto/os/linux +++ b/auto/os/linux @@ -171,3 +171,5 @@ ngx_include="sys/vfs.h"; . auto/include CC_AUX_FLAGS="$cc_aux_flags -D_GNU_SOURCE -D_FILE_OFFSET_BITS=64" + +DTRACE_FROM_SYSTEMTAP=YES diff --git a/auto/sources b/auto/sources index 2abbc60..fa7157d 100644 --- a/auto/sources +++ b/auto/sources @@ -39,10 +39,16 @@ CORE_DEPS="src/core/nginx.h \ src/core/ngx_resolver.h \ src/core/ngx_open_file_cache.h \ src/core/ngx_crypt.h \ + src/core/ngx_core_probe.h \ src/core/ngx_proxy_protocol.h \ src/core/ngx_syslog.h" +if [ $NGX_DTRACE = YES ]; then + CORE_DEPS="$CORE_DEPS objs/ngx_dtrace_provider.h" +fi + + CORE_SRCS="src/core/nginx.c \ src/core/ngx_log.c \ src/core/ngx_palloc.c \ @@ -91,13 +97,14 @@ OPENSSL_SRCS="src/event/ngx_event_openssl.c \ EVENT_MODULES="ngx_events_module ngx_event_core_module" -EVENT_INCS="src/event src/event/modules" +EVENT_INCS="src/event src/event/modules src/http src/http/modules" EVENT_DEPS="src/event/ngx_event.h \ src/event/ngx_event_timer.h \ src/event/ngx_event_posted.h \ src/event/ngx_event_connect.h \ - src/event/ngx_event_pipe.h" + src/event/ngx_event_pipe.h \ + src/event/ngx_event_probe.h" EVENT_SRCS="src/event/ngx_event.c \ src/event/ngx_event_timer.c \ @@ -289,7 +296,8 @@ HTTP_DEPS="src/http/ngx_http.h \ src/http/ngx_http_variables.h \ src/http/ngx_http_script.h \ src/http/ngx_http_upstream.h \ - src/http/ngx_http_upstream_round_robin.h" + src/http/ngx_http_upstream_round_robin.h \ + src/http/ngx_http_probe.h" HTTP_SRCS="src/http/ngx_http.c \ src/http/ngx_http_core_module.c \ @@ -593,3 +601,8 @@ NGX_GOOGLE_PERFTOOLS_MODULE=ngx_google_perftools_module NGX_GOOGLE_PERFTOOLS_SRCS=src/misc/ngx_google_perftools_module.c NGX_CPP_TEST_SRCS=src/misc/ngx_cpp_test_module.cpp + +NGX_DTRACE_PROVIDERS=src/dtrace/nginx_provider.d + +NGX_TAPSET_SRCS=src/dtrace/nginx.stp + diff --git a/auto/summary b/auto/summary index 1be975d..a1b6109 100644 --- a/auto/summary +++ b/auto/summary @@ -71,6 +71,19 @@ else echo " nginx logs errors to stderr" fi +if [ $NGX_DTRACE = YES ]; then + cat << END + nginx dtrace static probes enabled +END + + if [ $DTRACE_FROM_SYSTEMTAP = YES ]; then + cat << END + nginx systemtap tapset prefix: "$NGX_TAPSET_PREFIX" + nginx systemtap wrapper script: "$NGX_STAP_NGX_PATH" +END + fi +fi + cat << END nginx http access log file: "$NGX_HTTP_LOG_PATH" nginx http client request body temporary files: "$NGX_HTTP_CLIENT_TEMP_PATH" diff --git a/configure b/configure index ceff15e..49223f8 100755 --- a/configure +++ b/configure @@ -23,6 +23,9 @@ if [ $NGX_DEBUG = YES ]; then have=NGX_DEBUG . auto/have fi +if [ $NGX_DTRACE = YES ]; then + have=NGX_DTRACE . auto/have +fi if test -z "$NGX_PLATFORM"; then echo "checking for OS" diff --git a/src/core/ngx_core_probe.h b/src/core/ngx_core_probe.h new file mode 100644 index 0000000..91bf91e --- /dev/null +++ b/src/core/ngx_core_probe.h @@ -0,0 +1,25 @@ +#ifndef _NGX_CORE_PROBE_H_INCLUDED_ +#define _NGX_CORE_PROBE_H_INCLUDED_ + + +#include <ngx_config.h> +#include <ngx_core.h> +#include <ngx_event.h> + + +#if (NGX_DTRACE) + +#include <ngx_http.h> +#include <ngx_dtrace_provider.h> + +#define ngx_core_probe_create_pool_done(pool, size) \ + NGINX_CREATE_POOL_DONE(pool, size) + +#else /* !(NGX_DTRACE) */ + +#define ngx_core_probe_create_pool_done(pool, size) + +#endif + + +#endif /* _NGX_CORE_PROBE_H_INCLUDED_ */ diff --git a/src/core/ngx_palloc.c b/src/core/ngx_palloc.c index ef4a647..49bb30b 100644 --- a/src/core/ngx_palloc.c +++ b/src/core/ngx_palloc.c @@ -7,6 +7,7 @@ #include <ngx_config.h> #include <ngx_core.h> +#include <ngx_core_probe.h> static void *ngx_palloc_block(ngx_pool_t *pool, size_t size); @@ -37,6 +38,8 @@ ngx_create_pool(size_t size, ngx_log_t *log) p->cleanup = NULL; p->log = log; + ngx_core_probe_create_pool_done(p, size); + return p; } diff --git a/src/dtrace/nginx.stp b/src/dtrace/nginx.stp new file mode 100644 index 0000000..e824daf --- /dev/null +++ b/src/dtrace/nginx.stp @@ -0,0 +1,299 @@ +/* tapset for nginx */ + + +function ngx_indent(n, delta) +{ + s = "" + for (i = 0; i < n; i++) { + s .= delta + } + + return s +} + + +function ngx_http_subreq_depth(r) +{ + depth = 0 + + for (pr = @cast(r, "ngx_http_request_t", "NGX_SBIN_PATH")->parent; + pr != 0; + pr = @cast(pr, "ngx_http_request_t", "NGX_SBIN_PATH")->parent) + { + depth++ + } + + return depth +} + + +function ngx_http_req_parent(r) +{ + return @cast(r, "ngx_http_request_s", "NGX_SBIN_PATH")->parent +} + + +/* retrieve the request uri string from the ngx_http_request_t pointer */ +function ngx_http_req_uri(r) +{ + len = @cast(r, "ngx_http_request_s", "NGX_SBIN_PATH")->uri->len + + if (len == 0) { + return "" + } + + return user_string_n(@cast(r, "ngx_http_request_s", "NGX_SBIN_PATH")->uri->data, len) +} + + +/* retrieve the request query string from the ngx_http_request_t pointer */ +function ngx_http_req_args(r) +{ + len = @cast(r, "ngx_http_request_s", "NGX_SBIN_PATH")->args->len + + if (len == 0) { + return "" + } + + return user_string_n(@cast(r, "ngx_http_request_s", "NGX_SBIN_PATH")->args->data, len) +} + + +/* retrieve the first command name (or directive name) from + * the ngx_module_t pointer */ +function ngx_http_module_cmd(m) +{ + cmds = @cast(m, "ngx_module_t", "NGX_SBIN_PATH")->commands + if (cmds == 0) { + return "" + } + + len = @cast(cmds, "ngx_command_t", "NGX_SBIN_PATH")->name->len + + if (len == 0) { + return "" + } + + return user_string_n(@cast(cmds, "ngx_command_t", "NGX_SBIN_PATH")->name->data, len) +} + + +function ngx_chain_buf(cl) +{ + return @cast(cl, "ngx_chain_t", "NGX_SBIN_PATH")->buf +} + + +function ngx_chain_next(cl) +{ + return @cast(cl, "ngx_chain_t", "NGX_SBIN_PATH")->next +} + +function ngx_buf_tag(b) +{ + return @cast(b, "ngx_buf_t", "NGX_SBIN_PATH")->tag +} + +function ngx_buf_in_memory(b) +{ + return @cast(b, "ngx_buf_t", "NGX_SBIN_PATH")->temporary + || @cast(b, "ngx_buf_t", "NGX_SBIN_PATH")->memory + || @cast(b, "ngx_buf_t", "NGX_SBIN_PATH")->mmap +} + + +function ngx_buf_pos(b) +{ + return @cast(b, "ngx_buf_t", "NGX_SBIN_PATH")->pos +} + + +function ngx_buf_file_pos(b) +{ + return @cast(b, "ngx_buf_t", "NGX_SBIN_PATH")->file_pos +} + + +function ngx_buf_last(b) +{ + return @cast(b, "ngx_buf_t", "NGX_SBIN_PATH")->last +} + + +function ngx_buf_file_last(b) +{ + return @cast(b, "ngx_buf_t", "NGX_SBIN_PATH")->file_last +} + + +function ngx_buf_end(b) +{ + return @cast(b, "ngx_buf_t", "NGX_SBIN_PATH")->end +} + + +function ngx_buf_in_file(b) +{ + return @cast(b, "ngx_buf_t", "NGX_SBIN_PATH")->in_file +} + + +function ngx_buf_last_buf(b) +{ + return @cast(b, "ngx_buf_t", "/home/agentzh/git/lua-nginx-module/work/nginx/sbin/nginx")->last_buf +} + + +function ngx_buf_last_in_chain(b) +{ + return @cast(b, "ngx_buf_t", "/home/agentzh/git/lua-nginx-module/work/nginx/sbin/nginx")->last_in_chain +} + + +function ngx_buf_sync(b) +{ + return @cast(b, "ngx_buf_t", "/home/agentzh/git/lua-nginx-module/work/nginx/sbin/nginx")->sync +} + + +function ngx_buf_flush(b) +{ + return @cast(b, "ngx_buf_t", "/home/agentzh/git/lua-nginx-module/work/nginx/sbin/nginx")->flush +} + + +function ngx_buf_size(b) +{ + if (ngx_buf_in_memory(b)) { + return ngx_buf_last(b) - ngx_buf_pos(b) + } + + return ngx_buf_file_last(b) - ngx_buf_file_pos(b) +} + + +function ngx_buf_data(b) +{ + return user_string_n(ngx_buf_pos(b), ngx_buf_last(b) - ngx_buf_pos(b)) +} + + +function ngx_chain_writer_ctx_out(ctx) +{ + return @cast(c, "ngx_chain_writer_ctx_t", "NGX_SBIN_PATH")->out +} + + +function ngx_chain_dump:string (input) +{ + if (input == 0) { + return "NULL" + } + + out = "" + cl = input + while (cl) { + buf = ngx_chain_buf(cl) + + if (ngx_buf_in_memory(buf)) { + out .= sprintf("[%s]", text_str(ngx_buf_data(buf))) + + } else { + out .= "\"\"" + } + + if (ngx_buf_in_file(buf)) { + out .= sprintf("<in_file:%d-%d>", ngx_buf_file_pos(buf), + ngx_buf_file_last(buf)) + } + + if (ngx_buf_last_buf(buf)) { + out .= "<last_buf>" + } + + if (ngx_buf_last_in_chain(buf)) { + out .= "<last_in_chain>" + } + + if (ngx_buf_sync(buf)) { + out .= "<sync>" + } + + if (ngx_buf_flush(buf)) { + out .= "<flush>" + } + + tag = ngx_buf_tag(buf) + if (tag) { + out .= sprintf("<tag:%p>", tag) + } + + cl = ngx_chain_next(cl) + if (cl) { + out .= " " + } + } + return out +} + + +function ngx_pool_cleanup_file_name(c) +{ + return user_string(@cast(c, "ngx_pool_cleanup_file_t", "NGX_SBIN_PATH")->name) +} + + +function ngx_http_req_content_length(r) +{ + return @cast(r, "ngx_http_request_t", "NGX_SBIN_PATH")->headers_in->content_length_n +} + + +function ngx_http_req_body_temp_file_name(r) +{ + rb = @cast(r, "ngx_http_request_t", "NGX_SBIN_PATH")->request_body + if (!rb) { + return "" + } + + tf = @cast(rb, "ngx_http_request_body_t", "NGX_SBIN_PATH")->temp_file + if (!tf) { + return "" + } + + len = @cast(tf, "ngx_temp_file_t", "NGX_SBIN_PATH")->file->name->len + + return user_string_n(@cast(tf, "ngx_temp_file_t", "NGX_SBIN_PATH")->file->name->data, len) +} + + +function ngx_table_elt_key(e) +{ + len = @cast(e, "ngx_table_elt_t", "NGX_SBIN_PATH")->key->len + + return user_string_n(@cast(e, "ngx_table_elt_t", "NGX_SBIN_PATH")->key->data, len) +} + + +function ngx_table_elt_value(e) +{ + len = @cast(e, "ngx_table_elt_t", "NGX_SBIN_PATH")->value->len + + return user_string_n(@cast(e, "ngx_table_elt_t", "NGX_SBIN_PATH")->value->data, len) +} + + +function ngx_iovec_dump:string (iov, iovcnt) { + out = "" + for (i = 0; i < iovcnt; i++) { + out .= sprintf("\"%s\"(%p)", text_str(user_string_n( + @cast(iov, "struct iovec")[i]->iov_base, + @cast(iov, "struct iovec")[i]->iov_len) + ), @cast(iov, "struct iovec")[i]->iov_base) + if (i != iovcnt - 1) { + out .= " " + } + } + return out +} + diff --git a/src/dtrace/nginx_provider.d b/src/dtrace/nginx_provider.d new file mode 100644 index 0000000..5887ae7 --- /dev/null +++ b/src/dtrace/nginx_provider.d @@ -0,0 +1,40 @@ +typedef struct { int dummy; } ngx_http_request_t; +typedef struct { int dummy; } ngx_str_t; +typedef int64_t ngx_int_t; +typedef uint64_t ngx_uint_t; +typedef ngx_uint_t ngx_msec_t; +typedef struct { int dummy; } ngx_module_t; +typedef struct { int dummy; } ngx_http_module_t; +typedef struct { int dummy; } ngx_table_elt_t; +typedef struct { int dummy; } ngx_event_t; +typedef struct { int dummy; } ngx_pool_t; +typedef char unsigned u_char; + + +provider nginx { + /* probes for subrequests */ + probe http__subrequest__cycle(ngx_http_request_t *pr, ngx_str_t *uri, ngx_str_t *args); + probe http__subrequest__start(ngx_http_request_t *r); + probe http__subrequest__finalize_writing(ngx_http_request_t *r); + probe http__subrequest__finalize_nonactive(ngx_http_request_t *r); + probe http__subrequest__wake__parent(ngx_http_request_t *r); + probe http__subrequest__done(ngx_http_request_t *r); + probe http__subrequest__post__start(ngx_http_request_t *r, ngx_int_t rc); + probe http__subrequest__post__done(ngx_http_request_t *r, ngx_int_t rc); + probe http__module__post__config(ngx_module_t *m); + probe http__read__body__done(ngx_http_request_t *r); + probe http__read__req__line__done(ngx_http_request_t *r); + probe http__read__req__header__done(ngx_http_request_t *r, ngx_table_elt_t *h); + probe timer__add(ngx_event_t *ev, ngx_msec_t timer); + probe timer__del(ngx_event_t *ev); + probe timer__expire(ngx_event_t *ev); + probe create__pool__done(ngx_pool_t *pool, size_t size); +}; + + +#pragma D attributes Evolving/Evolving/Common provider nginx provider +#pragma D attributes Private/Private/Unknown provider nginx module +#pragma D attributes Private/Private/Unknown provider nginx function +#pragma D attributes Private/Private/Common provider nginx name +#pragma D attributes Evolving/Evolving/Common provider nginx args + diff --git a/src/dtrace/stap-nginx b/src/dtrace/stap-nginx new file mode 100755 index 0000000..1bca4cf --- /dev/null +++ b/src/dtrace/stap-nginx @@ -0,0 +1,6 @@ +#!/bin/sh + +PATH="NGX_SBIN_DIR:$PATH" +export PATH +exec stap -d "NGX_SBIN_PATH" -I "NGX_TAPSET_PREFIX" "$@" + diff --git a/src/event/ngx_event_probe.h b/src/event/ngx_event_probe.h new file mode 100644 index 0000000..5aa0397 --- /dev/null +++ b/src/event/ngx_event_probe.h @@ -0,0 +1,33 @@ +#ifndef _NGX_EVENT_PROBE_H_INCLUDED_ +#define _NGX_EVENT_PROBE_H_INCLUDED_ + + +#include <ngx_config.h> +#include <ngx_core.h> +#include <ngx_event.h> + + +#if (NGX_DTRACE) + +#include <ngx_http.h> +#include <ngx_dtrace_provider.h> + +#define ngx_event_probe_timer_add(ev, timer) \ + NGINX_TIMER_ADD(ev, timer) + +#define ngx_event_probe_timer_del(ev) \ + NGINX_TIMER_DEL(ev) + +#define ngx_event_probe_timer_expire(ev) \ + NGINX_TIMER_EXPIRE(ev) + +#else /* !(NGX_DTRACE) */ + +#define ngx_event_probe_timer_add(ev, timer) +#define ngx_event_probe_timer_del(ev) +#define ngx_event_probe_timer_expire(ev) + +#endif + + +#endif /* _NGX_EVENT_PROBE_H_INCLUDED_ */ diff --git a/src/event/ngx_event_timer.c b/src/event/ngx_event_timer.c index 8f547b2..6e77465 100644 --- a/src/event/ngx_event_timer.c +++ b/src/event/ngx_event_timer.c @@ -8,6 +8,7 @@ #include <ngx_config.h> #include <ngx_core.h> #include <ngx_event.h> +#include <ngx_event_probe.h> ngx_rbtree_t ngx_event_timer_rbtree; @@ -91,6 +92,8 @@ ngx_event_expire_timers(void) ev->timedout = 1; + ngx_event_probe_timer_expire(ev); + ev->handler(ev); } } @@ -136,3 +139,19 @@ ngx_event_cancel_timers(void) ev->handler(ev); } } + + +#if (NGX_DTRACE) +void +ngx_event_probe_timer_add_helper(ngx_event_t *ev, ngx_msec_t timer) +{ + ngx_event_probe_timer_add(ev, timer); +} + + +void +ngx_event_probe_timer_del_helper(ngx_event_t *ev) +{ + ngx_event_probe_timer_del(ev); +} +#endif diff --git a/src/event/ngx_event_timer.h b/src/event/ngx_event_timer.h index 99f8a48..8bc619a 100644 --- a/src/event/ngx_event_timer.h +++ b/src/event/ngx_event_timer.h @@ -25,12 +25,23 @@ void ngx_event_expire_timers(void); void ngx_event_cancel_timers(void); +#if (NGX_DTRACE) +void ngx_event_probe_timer_add_helper(ngx_event_t *ev, + ngx_msec_t timer); +void ngx_event_probe_timer_del_helper(ngx_event_t *ev); +#endif + + extern ngx_rbtree_t ngx_event_timer_rbtree; static ngx_inline void ngx_event_del_timer(ngx_event_t *ev) { +#if (NGX_DTRACE) + ngx_event_probe_timer_del_helper(ev); +#endif + ngx_log_debug2(NGX_LOG_DEBUG_EVENT, ev->log, 0, "event timer del: %d: %M", ngx_event_ident(ev->data), ev->timer.key); @@ -77,6 +88,10 @@ ngx_event_add_timer(ngx_event_t *ev, ngx_msec_t timer) ev->timer.key = key; +#if (NGX_DTRACE) + ngx_event_probe_timer_add_helper(ev, timer); +#endif + ngx_log_debug3(NGX_LOG_DEBUG_EVENT, ev->log, 0, "event timer add: %d: %M:%M", ngx_event_ident(ev->data), timer, ev->timer.key); diff --git a/src/http/ngx_http.c b/src/http/ngx_http.c index d09e3f0..5ae35a7 100644 --- a/src/http/ngx_http.c +++ b/src/http/ngx_http.c @@ -8,6 +8,7 @@ #include <ngx_config.h> #include <ngx_core.h> #include <ngx_http.h> +#include <ngx_http_probe.h> static char *ngx_http_block(ngx_conf_t *cf, ngx_command_t *cmd, void *conf); @@ -312,6 +313,9 @@ ngx_http_block(ngx_conf_t *cf, ngx_command_t *cmd, void *conf) module = ngx_modules[m]->ctx; if (module->postconfiguration) { + + ngx_http_probe_module_post_config(ngx_modules[m]); + if (module->postconfiguration(cf) != NGX_OK) { return NGX_CONF_ERROR; } diff --git a/src/http/ngx_http_core_module.c b/src/http/ngx_http_core_module.c index 49c4560..808d1d8 100644 --- a/src/http/ngx_http_core_module.c +++ b/src/http/ngx_http_core_module.c @@ -8,6 +8,7 @@ #include <ngx_config.h> #include <ngx_core.h> #include <ngx_http.h> +#include <ngx_http_probe.h> typedef struct { @@ -2431,6 +2432,8 @@ ngx_http_subrequest(ngx_http_request_t *r, ngx_http_postponed_request_t *pr, *p; if (r->subrequests == 0) { + ngx_http_probe_subrequest_cycle(r, uri, args); + ngx_log_error(NGX_LOG_ERR, r->connection->log, 0, "subrequests cycle while processing \"%V\"", uri); return NGX_ERROR; @@ -2557,6 +2560,8 @@ ngx_http_subrequest(ngx_http_request_t *r, *psr = sr; + ngx_http_probe_subrequest_start(sr); + return ngx_http_post_request(sr, NULL); } diff --git a/src/http/ngx_http_probe.h b/src/http/ngx_http_probe.h new file mode 100644 index 0000000..d7d2d45 --- /dev/null +++ b/src/http/ngx_http_probe.h @@ -0,0 +1,75 @@ +#ifndef _NGX_HTTP_PROBE_H_INCLUDED_ +#define _NGX_HTTP_PROBE_H_INCLUDED_ + + +#include <ngx_config.h> +#include <ngx_core.h> +#include <ngx_http.h> + + +#if (NGX_DTRACE) + +#include <ngx_dtrace_provider.h> + +#define ngx_http_probe_subrequest_cycle(pr, uri, args) \ + NGINX_HTTP_SUBREQUEST_CYCLE(pr, uri, args) + +#define ngx_http_probe_subrequest_start(r) \ + NGINX_HTTP_SUBREQUEST_START(r) + +#define ngx_http_probe_subrequest_finalize_writing(r) \ + NGINX_HTTP_SUBREQUEST_FINALIZE_WRITING(r) + +#define ngx_http_probe_subrequest_finalize_nonactive(r) \ + NGINX_HTTP_SUBREQUEST_FINALIZE_NONACTIVE(r) + +#define ngx_http_probe_subrequest_finalize_nonactive(r) \ + NGINX_HTTP_SUBREQUEST_FINALIZE_NONACTIVE(r) + +#define ngx_http_probe_subrequest_wake_parent(r) \ + NGINX_HTTP_SUBREQUEST_WAKE_PARENT(r) + +#define ngx_http_probe_subrequest_done(r) \ + NGINX_HTTP_SUBREQUEST_DONE(r) + +#define ngx_http_probe_subrequest_post_start(r, rc) \ + NGINX_HTTP_SUBREQUEST_POST_START(r, rc) + +#define ngx_http_probe_subrequest_post_done(r, rc) \ + NGINX_HTTP_SUBREQUEST_POST_DONE(r, rc) + +#define ngx_http_probe_module_post_config(m) \ + NGINX_HTTP_MODULE_POST_CONFIG(m) + +#define ngx_http_probe_read_body_abort(r, reason) \ + NGINX_HTTP_READ_BODY_ABORT(r, reason) + +#define ngx_http_probe_read_body_done(r) \ + NGINX_HTTP_READ_BODY_DONE(r) + +#define ngx_http_probe_read_req_line_done(r) \ + NGINX_HTTP_READ_REQ_LINE_DONE(r) + +#define ngx_http_probe_read_req_header_done(r, h) \ + NGINX_HTTP_READ_REQ_HEADER_DONE(r, h) + +#else /* !(NGX_DTRACE) */ + +#define ngx_http_probe_subrequest_cycle(pr, uri, args) +#define ngx_http_probe_subrequest_start(r) +#define ngx_http_probe_subrequest_finalize_writing(r) +#define ngx_http_probe_subrequest_finalize_nonactive(r) +#define ngx_http_probe_subrequest_wake_parent(r) +#define ngx_http_probe_subrequest_done(r) +#define ngx_http_probe_subrequest_post_start(r, rc) +#define ngx_http_probe_subrequest_post_done(r, rc) +#define ngx_http_probe_module_post_config(m) +#define ngx_http_probe_read_body_abort(r, reason) +#define ngx_http_probe_read_body_done(r) +#define ngx_http_probe_read_req_line_done(r) +#define ngx_http_probe_read_req_header_done(r, h) + +#endif /* NGX_DTRACE */ + + +#endif /* _NGX_HTTP_PROBE_H_INCLUDED_ */ diff --git a/src/http/ngx_http_request.c b/src/http/ngx_http_request.c index 1bd14e6..92f5a88 100644 --- a/src/http/ngx_http_request.c +++ b/src/http/ngx_http_request.c @@ -8,6 +8,7 @@ #include <ngx_config.h> #include <ngx_core.h> #include <ngx_http.h> +#include <ngx_http_probe.h> static void ngx_http_wait_request_handler(ngx_event_t *ev); @@ -1054,7 +1055,6 @@ ngx_http_process_request_line(ngx_event_t *rev) } } - ngx_int_t ngx_http_process_request_uri(ngx_http_request_t *r) { @@ -1311,6 +1311,8 @@ ngx_http_process_request_headers(ngx_event_t *rev) return; } + ngx_http_probe_read_req_header_done(r, h); + ngx_log_debug2(NGX_LOG_DEBUG_HTTP, r->connection->log, 0, "http header: \"%V: %V\"", &h->key, &h->value); @@ -2281,7 +2283,11 @@ ngx_http_finalize_request(ngx_http_request_t *r, ngx_int_t rc) } if (r != r->main && r->post_subrequest) { + ngx_http_probe_subrequest_post_start(r, rc); + rc = r->post_subrequest->handler(r, r->post_subrequest->data, rc); + + ngx_http_probe_subrequest_post_done(r, rc); } if (rc == NGX_ERROR @@ -2331,6 +2337,8 @@ ngx_http_finalize_request(ngx_http_request_t *r, ngx_int_t rc) if (r->buffered || r->postponed) { + ngx_http_probe_subrequest_finalize_writing(r); + if (ngx_http_set_write_handler(r) != NGX_OK) { ngx_http_terminate_request(r, 0); } @@ -2366,10 +2374,14 @@ ngx_http_finalize_request(ngx_http_request_t *r, ngx_int_t rc) pr->postponed = pr->postponed->next; } + ngx_http_probe_subrequest_done(r); + c->data = pr; } else { + ngx_http_probe_subrequest_finalize_nonactive(r); + ngx_log_debug2(NGX_LOG_DEBUG_HTTP, c->log, 0, "http finalize non-active request: \"%V?%V\"", &r->uri, &r->args); @@ -2381,6 +2393,8 @@ ngx_http_finalize_request(ngx_http_request_t *r, ngx_int_t rc) } } + ngx_http_probe_subrequest_wake_parent(r); + if (ngx_http_post_request(pr, NULL) != NGX_OK) { r->main->count++; ngx_http_terminate_request(r, 0); diff --git a/src/http/ngx_http_request_body.c b/src/http/ngx_http_request_body.c index 77e92e3..5b14369 100644 --- a/src/http/ngx_http_request_body.c +++ b/src/http/ngx_http_request_body.c @@ -8,6 +8,7 @@ #include <ngx_config.h> #include <ngx_core.h> #include <ngx_http.h> +#include <ngx_http_probe.h> static void ngx_http_read_client_request_body_handler(ngx_http_request_t *r); @@ -477,6 +478,8 @@ ngx_http_do_read_client_request_body(ngx_http_request_t *r) rb->post_handler(r); } + ngx_http_probe_read_body_done(r); + return NGX_OK; }
{ "pile_set_name": "Github" }
This invention relates to connecting assemblies and, more particularly, to quick release connecting assemblies provided for connecting a second member at a right angle to a first member, and to such connecting assemblies which permit connection and disconnection by access to a point spaced from the point of connection. Previous connecting assemblies providing for connection of a second member to a first member have required access to the point of connection in order to connect and disconnect the second member from the first member. In one such assembly 200, as illustrated in FIG. 5 of the drawings, a second member 204 was connected to a first member 208 by means of a piece 212 connected to the first member 208. The piece 212 included a recess 216 which received an end 220 of the second member 204, and a screw 224 which was secured in a threaded bore 228 in the piece 212. The screw 224 projected into the recess 216 and was received in an opening 232 in the end 220 of the second member 204. More particularly, the first member 208 was received in a bore 236 in spaced-apart housings 240 and 244. The piece 212 connected to the first member 208 was located outside of the spaced-apart housings 240 and 244, and included a portion 248 extending at a right angle to the first member 208. The portion 248 included the recess 216 which received the end 220 of the second member 204. To connect or disconnect the second member 204 from the first member 208, access to the screw 224 was required to turn the screw 224 in the threaded bore 228 to thereby or withdraw the screw 224 from the opening 232 in the end 220 of the second member 204. The recess 216 was larger than the end 220 of the second member 204 so that the end 220 of the second member 204 could pivot on the screw 224 in the recess 216. The first member 208 was secured in the housings 240 and 244 by the first piece 212 and a cotter pin, washer, and bow washer assembly 260 located on the first member 208 outside of the housings 240 and 244 opposite the first piece 212. Attention is also directed to Conroy U.S. Pat. No. 2,887,083, issued May 19, 1959.
{ "pile_set_name": "USPTO Backgrounds" }
e h = 4*l + 4*y - 146, 239 = 3*l - y. Is l a prime number? True Let a(c) = 7*c**3 - 16*c**2 - 9*c + 115. Is a(11) composite? True Let j(b) = b**3 - b**2 + 3*b + 1. Let o(y) = -y**2. Let a(l) = j(l) + 2*o(l). Let v be a(5). Suppose -v = -n - n. Is n a composite number? True Suppose -5*d + t + 590312 = 0, -4*t - 115288 = -2*d + 120826. Is d composite? True Let s(b) = b + 1. Let d(k) = 15*k**2 + 2*k + 16. Let a(w) = 5*w**2 + w + 5. Let g(j) = 8*a(j) - 3*d(j). Let o(n) = -g(n) - 2*s(n). Is o(5) a composite number? True Suppose -507 = -5*d + 848. Suppose 4*z - d = 5*x, -247 = -3*z - 2*x - 3*x. Let y = -37 + z. Is y composite? False Let g be 5 + -3 + 0 + (-1)/(-1). Let h(n) = 14*n**3 + n**2 - 4*n + 2. Is h(g) a prime number? False Let o(z) = 3*z + 15. Let p be o(-6). Is 660 - p - (0 - -1) prime? False Let o(k) = 7*k + 1. Let i be o(-5). Is (-8 + -30)*i/4 composite? True Let o = -10 - -13. Suppose -f - 2 = o. Let x(u) = -36*u + 5. Is x(f) a composite number? True Let u = 14593 - 10146. Is u prime? True Let y(i) = -1338*i - 575. Is y(-11) a prime number? True Suppose 4*g + n = -n - 20, -g = 2*n + 5. Let z(f) = 6 + 5 - 169*f**3 - 2*f**2 + 168*f**3 - f - 12 + 0*f. Is z(g) a composite number? False Suppose 7*u - 7 = 266. Suppose 40*z = u*z + 485. Is z prime? False Suppose 2*m - 3*m = 4*z, 5*z = 0. Suppose o = -m*o + 319. Is o prime? False Suppose 4*b - g = -1 - 42, -4*g = 4*b + 68. Let y be 508/b*(-17 + 2). Suppose -p = 4*p - y. Is p a composite number? False Suppose -5*m + 15 = -0*m + 5*l, -m - 5*l + 7 = 0. Let i(s) = 17*s**2 + 4*s + 1. Is i(m) composite? True Suppose -4*q = 3*k - 25, -4*q = -3*k - 0*q + 17. Suppose 0*b = k*b - 1295. Is b prime? False Let o be (-3)/12 - (-37)/4. Let r = -5 + o. Suppose 0 = 2*w + 3*i - 178, -r*w - 4*i + 392 = -7*i. Is w prime? False Suppose -5*q + 2*q + 5*l - 8 = 0, q - l = 0. Is (-111)/(-6) - q/(-8) composite? False Let c = -257 + 470. Suppose 0 = 5*j - 722 - c. Is j a prime number? False Let q(x) = 2*x**2 - 6*x + 11. Suppose -4*f + 34 + 4 = 3*n, 34 = 4*f + n. Is q(f) prime? False Let i(v) = -v**3 - 5*v**2 - 13*v - 7. Let n be (-30)/3*(-1)/(-2). Let o be i(n). Is (2 + -1)/(1/o) prime? False Suppose 68579 = -284*k + 291*k. Is k a prime number? False Let z = -130 - -442. Suppose 0 = -5*h + 4*h + 3*g + 151, 0 = -2*h + g + z. Is h a prime number? True Let c(j) = 31441*j + 172. Is c(3) prime? False Suppose 2*m = -p + 12, -2 = -p - 0. Suppose -m*v + 2077 = -518. Is v composite? True Suppose -2*l = 10 - 6, 0 = 4*c - 2*l - 19760. Is c prime? False Suppose 0 = 3*h - 2736 - 3312. Suppose 3*b - h = -0*b. Suppose -3*j - 3*z = -j - 668, 2*j - b = -5*z. Is j a prime number? True Let f(k) = -2*k**3 + 6*k**2 + 2*k + 14. Let y be f(-7). Suppose 2*h - 3 = 13. Is (-3)/2 + y/h a prime number? False Let z(r) be the second derivative of 403*r**5/20 + r**4/3 - 5*r**3/6 + 5*r**2/2 + 4*r + 4. Is z(2) a composite number? True Suppose 0 = 4*m - 3*m - 3. Suppose 0 = 3*o + m*r - 5925, -4*o + 4*r - 974 + 8858 = 0. Is o prime? True Suppose -3 + 8 = m. Suppose -m*k + 5117 + 2158 = 0. Suppose -5*g + k = -2*v + 4*v, 4*v - 273 = -g. Is g a composite number? False Let x be (-3)/21 + 58/14. Suppose 6*q + 6 = 4*q, -x*z + q + 895 = 0. Is z a prime number? True Suppose 12 = 4*r, 4*f - 4*r = f - 735. Suppose -2*m = -7*m + 2260. Let u = m + f. Is u a composite number? False Suppose -17*d = 8869 - 34556. Is d a prime number? True Let i(y) = 164*y + 849. Is i(8) composite? False Suppose -178*h + 168*h + 16570 = 0. Is h prime? True Let z = -22 - -4. Is 16/72 - (-40)/z - -424 composite? True Suppose 21*t = 4*t + 11917. Is t a composite number? False Suppose 32 = -4*i + 2*k, -3 = 4*i + 3*k + 9. Let m(o) = -5*o + 8. Is m(i) a composite number? True Let t(h) = -h**3 + 4*h**2 + 5*h - 16. Let q be t(4). Suppose 4*i + 8*m - 12644 = q*m, 4*m + 9497 = 3*i. Is i a prime number? True Suppose -4*d - 3*a = -13, 0*a + 2 = 5*d - a. Suppose 5*c - d = -6. Is (-12)/c + (2 - 3) composite? False Let y(n) = 57*n + 4. Let w be y(-7). Suppose 3*x - 5*x = 500. Let c = x - w. Is c a prime number? False Let z(s) = 2*s**2 + s - 6. Let v be z(-3). Is v/(9/(-2)) + 193 composite? False Is (-6)/(24/(-140))*3006/90 composite? True Let y = 9 - -22. Let r = -28 + y. Is 795/2*2/r a composite number? True Let i = 108 + 128. Let a = i + -75. Is a composite? True Let j = 2378 - 1207. Is j composite? False Suppose 5*i = 82428 - 22618. Is i composite? True Let d(k) = k**2 - 4. Let c = -12 + 9. Let r be d(c). Suppose 0*h - 215 = -r*h. Is h prime? True Suppose -5*k = -h - h - 16257, 2*k - 6499 = -3*h. Is k composite? False Suppose -4*h + 3*q + 3731 = -0*q, 2*h - 2*q - 1866 = 0. Let j(b) = -b**3 - 16*b**2 - 7*b - 28. Let w be j(-16). Is h/14 + 36/w composite? False Is (-2)/(((-4)/(-5842))/(-1)) composite? True Suppose -3*u + 5562 = 3*q, 2*q = -3*q - 2*u + 9261. Is q prime? False Let s = -7 - -7. Let a(v) = -50*v**2 - 11 + v + 56 + 49*v**2 + 50. Is a(s) composite? True Let i = -4190 + 11047. Let g = -4404 + i. Is g prime? False Let k = 64 + -62. Suppose -k*w + 1174 = -2628. Is w a composite number? False Let o(y) = y**3 + 12*y**2 - 11*y - 13. Let x be o(-12). Suppose 5*z = 4*z + x. Is z composite? True Is 59 - (3*(-5 - -4) - -5) a composite number? True Suppose 2*c - z + 12 = 0, -12 - 12 = 2*c - 4*z. Let j be (-702)/c*(4 - 2). Suppose -j - 1384 = -5*g. Is g a prime number? True Suppose -53*b + 37*b = -301856. Is b a composite number? True Let g(z) = 4*z**2 + 4*z - 39. Let v = -10 - -26. Is g(v) composite? False Suppose 4*h + 9327 = 5*k - 17831, -4*k = 3*h - 21745. Suppose 7*t - 2*t - 4*c - 6797 = 0, -4*t = -5*c - k. Is t prime? True Let o(s) = -8 - 9*s - 20*s + 0*s - 8. Is o(-15) a prime number? True Let m = -11 + 47. Is 27/m - (-18841)/4 a prime number? False Suppose 3*u - 4264 = -4*q + 4*u, 4*u + 3185 = 3*q. Is q a prime number? False Let m be (-360)/(1/(0 + 1)). Suppose 1657 = -8*k - 3231. Let p = m - k. Is p a composite number? False Let c(d) = -d**2 + 12*d - 8. Suppose 4*y - 6*y + 18 = 0. Is c(y) a prime number? True Suppose -2*g - 161 = -4*m - 3*g, -m + 38 = g. Let u = m + -28. Let r(n) = 20*n - 7. Is r(u) a composite number? True Let q(w) be the second derivative of 2*w**4/3 - w**3/6 + 3*w**2 - 27*w. Let v(l) = -4*l**2 - 1. Let g be v(-1). Is q(g) prime? True Let i(g) = 8*g - 22. Let t be i(4). Suppose t*v + 655 = 15*v. Is v a composite number? False Suppose 13*l - 12*l = 3. Let h be (4/(-6))/((-10)/45). Suppose l*d = -h*n + 261 - 90, 0 = -4*n. Is d prime? False Suppose 0 = 2*y - 4*m - 20, -m = 3*y - 0 - 2. Suppose 6 = d + y. Suppose 0 = j - 4*j - 5*n + 1256, -d*j = 4*n - 1672. Is j prime? False Let b(x) = -x**3 - 7*x**2 + 11*x - 2. Let j = -38 + 25. Let t be b(j). Is (-4)/6 - t/(-3) prime? False Suppose h + h + 3604 = -4*u, -2*h = 3*u + 2705. Let b = -582 - u. Is b composite? False Let k(j) = j + 26. Let c be k(0). Suppose 0 = 3*n - 15, 3*b - c = -n - 9. Suppose -b*x + 4*o = o - 139, 68 = 2*x - 2*o. Is x composite? False Let z(m) = -225*m + 256. Is z(-35) a prime number? False Let k = 7 - 5. Suppose -2*y + 10 = 0, -3*o + k*o + 17 = -y. Suppose 0 = p - 255 + o. Is p a composite number? False Suppose 0 = 2*s - 2*p + 6*p + 10, 14 = 2*s - 2*p. Let f(b) = b**2 - b - 2. Let z be f(s). Suppose z*u - 31 - 5 = 0. Is u composite? True Suppose -28 - 23 = -3*j - 2*o, -5*j + o = -72. Suppose j*l + 5915 = 24800. Is l a prime number? True Suppose 2*o = 10058 + 1616. Is o a prime number? False Let g(x) = 99*x - 88. Is g(5) a composite number? True Let n(c) = 67*c**3 - 7*c**2 - 4*c + 29. Is n(5) a composite number? False Let k(q) = -q**3 - 9*q**2 - 2*q - 16. Let c be k(-9). Suppose 3*o + 5*w - 662 = 0, c*o + 3*w + 214 = 655. Is o prime? False Let w = -3626 + 15875. Is (w/27)/(1/3) prime? True Let d(y) = -27*y**3 - 8*y**2 - 35*y + 1. Is d(-6) a composite number? True Let t(q) = -q**2 - 8*q + 6. Let i be t(-7). Is (99 - i)/((-4)/(-14)) prime? False Suppose 5*s = 2*j + 29185, 10*s + 3*j = 5*s + 29185. Is s a prime number? False Let r = 18525 + -7471. Is r composite? True Let h(i) = -1477*i + 309. Is h(-5) a prime number? False Let h(b) = -3*b + b + b - 5*b - 10. Let j be h(-13). Is j/6 - 7/21 a prime number? True Let w = 91 + -61. Let v(j) = -3 + w*j - 1 + 1 + 21*j. Is v(6) a prime number? False Let j(n) be the fi
{ "pile_set_name": "DM Mathematics" }
Kuala Lumpur Eat and meet Bars & nightlife Kuala Lumpur has a vibrant nightlife, which may be surprising to some as the city is the capital of a Muslim-majority country. But KL offers something to suit all tastes once the sun dips, from low-key neighbourhood pubs through to cutting-edge clubs. Whatever kind of place rocks your boat, a near-universal feature is how relaxed and friendly everything is. It's refreshingly easy in KL for... Read our full review of Nightlife in KL. One of the biggest complaints about Kuala Lumpur, from both visitors and residents alike, is the shocking price of alcohol. It is often more expensive to get a drink in KL than in notoriously expensive cities like London and New York (and er, islands like Bali). Hefty government taxes are partly to blame, but many bars and restaurants contribute to the problem by having extremely high mark-ups.... Read our full review of Happy hours and other ways to get cheap(er) drinks in Kuala Lumpur. As Kuala Lumpur grows ever upwards, one of the benefits is an increasing number of rooftop bars where you can get spectacular views of the city. For the most part these are based in high end hotels, making for a mixed clientele of well-heeled locals, expats and visitors. The dress code tends towards “smart casual”, so no sandals, shorts or vests for... Read our full review of Best rooftop bars in Kuala Lumpur. Cafes With a red and black exterior and a patio occupied to the brim during lunch, Antipodean Cafe on Kuala Lumpur‘s trendy Jalan Telawi is one of Bangsar’s most successful lunch and coffeehouses (though they’re open for dinner too). Drawing inspiration from the taste and lifestyle of the Antipodes to the south, its extensive menu is locally sourced as much as possible and includes classics as... Read our full review of The Antipodean. If anywhere in KL can claim to have a burgeoning cafe culture it is Bangsar, particularly the area centred on Jalan Telawi and on the upper floor of Bangsar Village II is where you'll find Marmalade -- one of KL's most charming eateries. It serves up an imaginative selection of breakfasts, salads, sandwiches and pasta dishes. The kids menu helps cement its popularity amongst local yummy... Read our full review of Marmalade. The cafe serves up light-ish food, such as quiches, pies and salads. The selection may be on the small side, but the portions are generous. Staff can be charming or snotty, depending one side of the bed they go out of. Somewhat difficult to find, it's tucked away in the corner of Peter Hoe Evolution, KL's funkiest shop, on the second floor of the Lee Rubber Building. The closest public... Read our full review of Peter Hoe Cafe. When I first came to Kuala Lumpur, a workmate of mine offered to take me to their favourite Chinese eatery. I readily accepted the offer, but as we entered the place, I began to have second thoughts. Our “restaurant” was a collection of plastic tables and stools, located inside a car park. Once the food arrived though, my doubts evaporated. This was seriously good stuff — Chinese food with... Read our full review of An introduction to Chinese coffee shops in Kuala Lumpur. Malaysia is one of the few places I can think of that has a deeply ingrained culture of both tea and coffee drinking. For the most part, coffee (like tea come to think of it) is served up strong, milky and sweet; an anti-skinny decaff latte if you like. The quality is higher at traditional Malaysian cafes known as kopitiams, which were once common in Kuala Lumpur, but are now an endangered... Read our full review of Where to get a good cup of coffee in Kuala Lumpur. Tea drinking has been part of Malaysian life for hundreds of years, although exactly when the habit started is unclear. The most likely explanation is that it was brought to the country by traders from China. The word for tea in Malay is teh, derived from Hokkien, the dialect spoken in the Chinese province of Fujian, and by many Malaysian Chinese. Confusingly enough, in Kuala Lumpur, the most... Read our full review of Drinking and buying tea in Kuala Lumpur. Forget the decor, this eatery is all about the food, which has kept it popular for half a century. While the language and lack of menu are a bit of a headache, it is well worth making the extra effort to enjoy their stand-out dishes including the crispy sweet and sour fish and belly pork. If in doubt, ask for help from your fellow diners. For character, opt for the older bulding, for air-con,... Read our full review of Sek Yuen. Its intimate, stylish Bangsar branch, serves a selection of decent thin-crust pizzas and Asian favourites, such as mee siam (Thai style fried noodles), and has a commendable wine list, but it's the desserts which set pulses racing. The pavlova and tiramisu are just two of the shockingly good options. Be warned though, such pleasure does not come cheap -- a dessert and a soft drink will set you... Read our full review of Alexis. It's part of the BIG Group launched in 2011 by Benjamin Yong, a man with a seeming Midas touch when it comes to food. When it opened, Plan B focused on breakfasts, light pasta dishes, salads and sandwiches, but has now introduced an evening menu too. Prices are very reasonable, and wine bought from the nearby Ben's General Store does not attract a corkage charge. Bangsar Village is a twenty... Read our full review of Plan B. Coliseum has been serving food and drink for more than 90 years and while the mostly Western-style food may not hit any great heights, and the service is nothing to shout about, the place is soaked in history, and well worth at least one visit. Coliseum is on Jalan Tuanku Abdul Rahman about half way (as the crow flies) between Masjid Jemak and Bandaraya LRTs. If you're walking from Masjid... Read our full review of Coliseum Cafe. Chinese The steamed meat dumplings are delicious, as are many of the more unusual dishes, such as the noodles mixed with sesame and peanut, and pumpkin with salted duck eggs. Din Tai Fung has several clearly-marked vegetarian dishes, and is happy to adapt dishes where posssible. It's best to go with at least one other person, so you can smaple a good range of the flavours and textures on offer.... Read our full review of Din Tai Fung. Worth the visit for its chicken wings alone, it is does superb seafood dishes, like chilli prawns and black pepper crab. The English menu and a willingness to adapt dishes to your taste or dietery needs are other bonuses. Wong Ah Wah's popularity means it has no need to lure in customers with menu-waving waiters, unlike many of its rivals along Jalan Alor. It's open from late afternoon until the... Read our full review of Wong Ah Wah. One of the finest options is Li Yen in the Ritz Carlton. It is renowned for its service, its sumptuous decor and cassic Cantonese cuisine, including top notch dim sum. Stand-out dishes include the golden prawns (deep fried with shredded yam) and deep fried fish with salt and pepper. While the food is not outrageously priced for the quality on offer, alcohol prices are another matter entirely.... Read our full review of Li Yen. This place has a door-stopper size picture menu, most with an English description of the dish. Portions are large, so if you want to sample a a selection of different offerings, best to go in a group. Solo diners are better off opting for good value single plate meals. Set at the far southern end of Chinatown on Jalan Panggong, the closest monorail station to Wan Fo Yuan is... Read our full review of Wan Fo Yuan. Kedai Kopi Lai Foong, near to Sze Wa Taoist temple, is well worth popping into if you are in the neighbourhood. The restaurant feels a little like a mini food market as there are a bunch of stalls around the perimeter, each preparing a specific dish. Prices are clearly displayed and you pay as soon as the food arrives. Kedai Kopi Lai Foong is especially well known for its beef noodle soup and... Read our full review of Kedai Kopi Lai Foong. One of the few proper Chinese coffee shops left in central KL, the decor does not seem to have changed for decades. Or some of the customers for that matter. During the day, you order food from the various stalls, while someone will come to your table to take drinks orders. Favourites here include char siew (Cantonese barbecued pork), and curry mee (noodle) soup. Zhing Hong has a good... Read our full review of Restoran Zhing Kong. Yut Kee is a Kuala Lumpur culinary institution, although sadly not one many visitors will have heard of. It’s been serving up tasty food and drink for 83 years, making it one of the city’s very oldest eateries. In that time, this traditional Chinese coffee shop has survived a world war, several recessions, umpteen floods, the communal violence of 1969, and until now, the relentless march of... Read our full review of Yut Kee Restaurant. Known as century eggs, hundred-year eggs, millennium eggs or pidan, this Chinese delicacy is not as old as its name suggests but might take that long to work up the courage to eat. If you can get over the pungent smell and its odd colour, its a popular dish in Malaysia that you might find yourself... Read our full review of Century eggs. Ming Tien in Taman Megah is one outdoor food court you shouldn’t miss trying out in Kuala Lumpur. Festooned with coloured lights, wooden huts and trees, Ming Tien is an affordable but popular location to taste local dishes once the sun... Read our full review of Ming Tien Food Court. Dim sum is a Cantonese custom that you can enjoy at various locations throughout Kuala Lumpur. Dim Sum, literally translated as “to touch your heart,” originated in the teahouses of China but this charming way of dining has made inroads into most parts of Asia and has become part of the culture in Malaysia and beyond. Although it was originally considered inappropriate to enjoy a cup of tea... Read our full review of Dim sum in Kuala Lumpur. Familiar with Cantonese cuisine? It’s more than just dim sum, with roast duck being an institution all of its own. In London, the Four Seasons’ roast duck restaurant has become famous, particularly in Cantonese circles, for being the best outside of Hong Kong. Now two siblings who worked for eight years in the London Bayswater establishment along with other ex-London based relatives have... Read our full review of Village Roast Duck. With a large Chinese population in Malaysia, it comes as no surprise that many prized dishes from China have become commonplace. Some of them are just too good to miss, like Beijing’s famous duck dish, Peking... Read our full review of Peking duck in Kuala Lumpur. Dragon-i has two main specialities, Shanghainese la mian (pulled noodles), which you can see prepared in the open kitchen area, and xiao long bao (steamed dumplings). But the menu it is filled with tasty treats, none of which is likely to break the bank. The braised pork belly, and salt and pepper bean curd are both recommended. Dragon-i wins bonus points for having several clearly-marked... Read our full review of Dragon-i. Fine dining French chef Nathalie Arbefeuille has taken the KL fine dining scene by storm over the last few years, with her mix of classic Franco-Italian cuisine and more innovative European/Asian fusion dishes. Of her two KL restaurants, the most convenient for visitors is Cuisine Gourmet by Nathalie. Her cooking is deceptively simple, forgoing flashiness, to turn out satisfying dishes like foie gras... Read our full review of Cuisine Gourmet by Nathalie. The weekday three course set lunch costs just 100 ringgit, for some of KL's very best food. Dishes like chicken consomme with black truffle and foie gras terrine; and wagyu beef with roasted eringi (a type of Japanese mushroom), are incredible value for money. The a la carte choices are even more sumptuous. A very nice touch, is that all prices at Sage are quoted nett, so no sneaky plus plus... Read our full review of Sage. Food courts Food is a very important draw at these temples to consumerism, split into two distinct types, stand-alone restaurants, and food courts. Every shopping centre has at least one food court, some of the larger ones have several. They all run on much the same principle though, that you order food from individual outlets, and sit down wherever you can find a free table. This can be somewhat of a... Read our full review of Food courts in KL. Gastropub If you are looking for a proper non-halal fried breakfast, with real bacon and pork sausages, then these outlets take a lot of beating. Other highlights include the bangers and mash (sausage and mashed potatoes), burgers and steaks. The sausages are made in house, and are so highly regarded as to be sold in most of the city's best supermarkets. Although very popular with locals, Jarrod's attracts... Read our full review of Jarrod and Rawlins. Named after the ancient name for Britain, the menu would not be out of place in London, where the two owners (one British, one Malaysian) learnt their trade. Albion KL serves up a mixture of British classics with a twist, such as beer battered fish and chips, as well as more global offerings, like gravadlax (Swedish-style cured salmon). The express lunch deal, offering three courses for... Read our full review of Albion KL. Wild mushroom risotto (slow cooked Italian rice), with oyster mushroom tempura, is just one of the imaginative offerings. But the menu has simpler non-fusion fare too, such as the steak sandwich. As an added bonus, vegetarians are well catered for. Although not cheap, a starter, main course and dessert should still leave change from 100 ringgit. The ground floor has the feel of an upmarket... Read our full review of Twentyone Kitchen and Bar. It has nine different choices of battered fish, including classics like cod, and more unusual options such as parrot fish. The barramundi is a good option. Away from fish & chips, the hearty pies are also recommended, particularly the steak and Guinness. For a true taste of home, assuming you come from the north of England that is, the chips with curry sauce are a must. Prices are moderate to... Read our full review of The Magnificent Fish and Chips Bar. Indian The Indian dining experience does not get much more sumptuous (or over the top) than at Bombay Palace, set in colonial bungalow on the edge of KLCC. It's on the pricey side, especially if you order wine, but the food is reliably good. Stand-out dishes include the butter chicken (creamy chicken curry) and the palak paneer. Bombay Palace is at 215 Jalan Tun Razak, just to the north of the Royal... Read our full review of Bombay Palace. Nagasari is a bit unusual in other ways too. Although it looks like a Mamak shop, and opens nearly as long hours, its menu is a mix of south and north Indian dishes, including banana leaf (12:00-15:00), tandoori chicken and aloo capsicum (potatoes and sweet pepper curry), all done to the same high standards. It also has a stall serving Chinese vegetarian food at lunchtime, and another one,... Read our full review of Nagasari Curry House. If there is one local food experience which should be tried at least once by every visitor to KL, it is the banana leak curry. At its most basic, this meal consists of rice, south Indian curries, salads and chutneys, served on a banana leaf, all for 5-6 ringgit. What sets Devi's apart, is not just the quality of the basic selection, but also the range of curry sauces to slop over your rice... Read our full review of Devi's Corner. Named after nasi kandar, originally a Penang favourite of steamed rice served with a selection of dishes, but now mostly associated with Malaysian Indian Muslims (Mamaks). Other popular offerings include a wide selection of South Indian breads, ketam masala (stewed crab with curry sauce), burung puyuh (fried quail) and ayam kampung goreng (crispy fried chicken). If you're finding mall eating... Read our full review of Nasi Kandar Pelita. One of the undoubted culinary highlights of Kuala Lumpur is south Indian food, done with a distinctive Malaysian twist. The eateries can be divided into two main categories: those run by Hindus, and those run by Indians who have converted to Islam, known as Mamaks. Although many dishes turn up at both types of establishment, distinctive differences do exist between... Read our full review of South Indian food in Kuala Lumpur. A short hop from the Liza De Inn Hotel, you’ll find Kanna Curry House in Section 17, a residential part of Petaling Jaya. With a modest but clean interior and a simple outdoor section with plastic tables and chairs, it may look like any other south Indian joint in Kuala Lumpur. But appearances are not what’s driven this restaurant’s popularity; its banana leaf, on the other hand, has helped... Read our full review of Kanna Curry House. South Indian restaurants are far more the norm in Kuala Lumpur, but flamboyant Sagar in Bangsar, a 15-minute cab ride from the city centre, offers a wide selection of northern Indian specialties, such as tandoori chicken, rogan gosh and chicken biryani. Vegetarians aren’t forgotten either, with a long list of dishes that’ll suit even the most hardcore vegan’s... Read our full review of Sagar. A plate of rice topped with four different curries for breakfast? Sounds like a handful (or rather plateful) but that’s exactly what nasi kandar is about; a combination of tantalising, distinct flavours. Once you get used to the idea of consuming so many carbs and so much spice so early in the day, I guarantee you’ll be fighting for a plate of this truly Malaysian dish on... Read our full review of Nasi Kandar. Now in it's third and largest incarnation in the area over the last five years, it finally looks to have found a long-term home. Part of a small local chain, SK Corner offers all the classics, including roti canai (fluffy flat bread with curry saunce), tosai (thin savoury pancake, usually served with curry sauces and chutneys), Mamak mee (spicy fried noodles), ayam goreng (fried chicken),... Read our full review of Restoran SK Corner. The deep fried bitter gourd is worth the trip to this Bangsar outlet almost by itself. Popular extras, like the ikan goreng (fried fish coated in spices), and vegetarian chicken curry, are cheap and tasty too. As an added bonus, Sri Nirwana serves banana leaf all day and all night -- at most other places it is a lunch-time treat only. Bangsar Village is a twenty minute walk (or five minute... Read our full review of Sri Nirwana Maju. Introduction KL is one of world's great unsung culinary destinations. You could stay for a year, eat out every night, and still not exhaust the city's supply of superb eateries. What truly impresses about KL's eateries is how high overall standards are, especially places that are popular with... Read our full review of Great places to eat in Kuala Lumpur. Malay & Nyonya It serves up most of the Malay classics, including otak otak (steamed seafood mousse wrapped in a green leaf), rendang (slow cooked dry meat curry), and ayam percik (chargrilled marinated chicken). Bijan may not be cheap (the least expensive main course is 30 ringgit), but it does represent reasonable value for money. Unusually for Malay cuisine it can be washed down with a glass of beer or... Read our full review of Bijan. The menu includes a good selection of Malay classics, with some Indonesian ones thrown in for good measure. Recommended dishes include the sup ekor (oxtail soup), sambal tumis udang (prawns in a sour spicy sauce), and the kambing masak merah (slow-cooked marinated lamb shank). A nice touch is the mini-tasting menus, which give diners the chance to sample a selection of dishes, such as prawns... Read our full review of Enak KL. Kuala Lumpur is not so much the city that never sleeps, as the city that never stops eating. To say that the city’s residents like their food is a serious understatement. They are obsessed with it. Day to day life is planned around meals, not the other way... Read our full review of Eating around the clock in KL. Every year, Kuala Lumpur plays host to a global halal conference, an indication of how important the Malaysian government views the international market for products that comply with Islamic rules. The event covers everything from food to financial services, which probably comes as a bit of a surprise to anyone who thinks the term only refers to the way an animal is slaughtered. So what does... Read our full review of Halal and Haram (Haraam) in Kuala Lumpur. The two main centres of Nyonya cooking are Penang, where Thai influences also feature, and Melaka, where Portuguese and Indonesian cuisines form part of the mix. The Old China Cafe explores these disparate influences to the full, serving up dishes such as gulai kepala ikan (fish head curry) and ayam cincalok (chicken with preserved shrimp). It's worth a visit for the historic shophouse alone... Read our full review of Old China Cafe. A good way to start your meal is with the selection of appetisers, which includes popiah goreng (fried spring rolls) and cucur udang (deep fried battered prawns). Other recommended dishes include the ikan siakap masam manis (deep fried sweet and sour sea bass) and ayam panggang kuah percik (chargrilled marinated chicken). Songket has the bonus (or curse) of live traditional entertainment... Read our full review of Songket. Makan Kitchen not only tries to show off this regional variety, it also showcases some of Malaysia's non-Malay cuisines, including Indian, Chinese, Nyonya (Malay-Chinese), Ibanese (from the Iban people of Sarawak), and Kristang (Portuguese-Malakan). It's possible to order a la carte, or as a sort of buffet (59-79 ringgit, where you choose a selection of dishes, and it's cooked freshly for you).... Read our full review of Makan Kitchen. Markets As I may have mentioned before, Malaysians like their food. It’s one of the few things which cuts across all the main ethnic groups in the country. One big difference between the races though, is that while fantastic Chinese and Indian food is easily accessible to tourists, good Malay cooking is far more difficult to... Read our full review of Ramadan food markets in Kuala Lumpur. Close to where Kuala Lumpur began in 1857 is a traffic-clogged square called Pasar Medan — literally, “market field” in Malay. It was here that the city’s pioneering tin miners bought their fresh supplies, and around which the early settlement too shape. In the late 19th century, the market was moved to a new site a few hundred metres away, where Central Market now... Read our full review of The best fresh food markets in Kuala Lumpur. Middle Eastern The large range of hot and cold meze, and excellent Lebanese bread sandwiches, mostly priced in the 10-15 ringgit mark, all make for high quality, decent value snacks. The same could not be said of its alcohol prices though, which are cheeky to say the least. Al-Amar's big brother, in Pavilion, is a much more formal, and thus pricier affair, turning out what many people believe to be the best... Read our full review of Al-Amar. The food, which is described as Arabian, is not only reliably good, but also the best value Middle Eastern cuisine in town. As well as a good range of meze, and grilled meat and fish dishes, Sahara Tent has some more esoteric offerings, like Arayess (lamb stuffed bread), and fried breaded fish fillet on a bed of hummus. Sahara Tent is a five minute walk from Bukit Bintang monorail... Read our full review of Sahara Tent. One such place is Naab, which specialises in Iranian fare. While most of the dishes would not look out of place on a Lebanese menu, such as the various kebabs, dolma (vine leaves stuffed with herby rice) and hummus, Naab has a sprinkling of more unusual offerings. These include lamb shank with broad bean rice and ghorme sabzi, a traditional Iranian beef stew. Naab is good value for money,... Read our full review of Naab. Tarbush is part of a small local chain but don't let that put you off. The sharing plates of meze (mostly vegetarian appetisers), served with warm flat bread, make for tasty meals in themselves. These include some of the best hummus (chickpea and sesame paste dip) in town, as well as baba ghanoush (smoky aubergine dip), falafel (deep fried chickpea patties) and fattoush (mixed salad topped by... Read our full review of Tarbush. Though strictly speaking not part of the Middle East, Turkish cuisine shares many of the same dishes. What makes Bosphorus special though, is the offerings which are more particular to Turkey, including imam bayaldi (baked stuffed aubergine), cacik (yoghurt and garlic dip), lahmacun (Turkish lamb pizza), and hunkar begendi (literally the Sultan's favourite, slow cooked lamb served on aubergine... Read our full review of Bosphorus. Other Asian cuisine Apart from the well-executed standards, there are also a number of more unusual dishes, such chor ladda (chicken and peanut dumplings) and Yam Hua Plee (banana flower and minced chicken salad), many from the Isaan region of Thailand. Rama V wins further points for having an interesting vegetarian menu. Rama V is on the south side of Jalan U-Thant, which runs off to the east of Jalan Tun... Read our full review of Rama V Fine Thai Cuisine. Forget the stained/torn table cloths, and the wobbly tables, and concentrate on the food. The green curries are wonderfully spicy and flavoursome, while the som tam (spicy papaya salad), and pad Thai (sour sweet fried flat noodles), are great too. Considering its convenient location, at the Jalan Alor end of Changkat Bukit Bintang, and the reasonable prices, this place is a true rough... Read our full review of Restoran Thai Somtam Seafood. What sets Samira apart from many of its rivals, is that the food has not been altered too much for local tastes. This is proper Thai (and Laotian) fare, with favourites like tom kha (spicy cocount milk soup), and pad thai (sour sweet rice noodles), done reliably well. Samira has several vegetarian options and is happy to adapt dishes where possible. It's hidden away in Sentul Park, on the... Read our full review of Samira by Asian Terrace. The two conveniently placed KL outlets (one in Equatorial, the other in Pavilion), are both reliably good places to find authentic cuisine. It is the simple things which Kampachi does well, such as the california rolls (meat, fish or vegetables, wrapped in rice), soba (buckwheat noodle) soup, shioyaki (salt baked fish), and bento (assorted goodies served in a multi-compartment tray). You'll... Read our full review of Kampachi. Seafood Whether you’re seeking a quick culinary expedition or just looking for a new place to visit for a day from Kuala Lumpur, Port Klang is easily accessible and allows you to combine filling your stomach with the discovery of a new location. Relatively unknown by foreigners, Port Klang’s crab and steamboat dishes are highly sought after by tourists visiting from Singapore and other parts of... Read our full review of Seafood in Port Klang. Fatty Crab is a name on Kuala Lumpur‘s seafood circuit that any self-respecting seafood lover ought to know. It’s impossible to miss with the crowds waiting outside to dine here; even with two floors of seating, you may need to wait more than an hour on weekends for a table. The best strategy is to either go early (before 20:00), late (after 21:30), or dine here on weekdays when the throngs... Read our full review of Fatty Crab. Anyone up for some fresh seafood in Kuala Lumpur? If heading for the coast is too time-consuming and inconvenient, then this is the place for you in Kuala Lumpur: Unique Seafood is 15 minutes from the city centre by cab and you’ll find more than a hundred fish tanks filled with fresh seafood imported from all over the world, including some rather unique specimens. From abalone and geoduck, to... Read our full review of Unique Seafood 23. Vegetarian As well as the lunch-time mixed rice section, it's a great spot to try Chinese and Nyonya dishes which are usually off-limits. The curry mee (thick curry noodle soup), asam laksa (sour spicy soup) and the char kuay teow (spicy fried flat noodles) are particularly good. As with every other vegetarian eatery in town, no alcohol is served. Blue Boy is just off Jalan Tong Shin a 20-30 minute walk... Read our full review of Blue Boy. Apart from breads, which are ordered from the waiting staff, the rest of the food is served as a buffet. As many of the dishes, which change every day, are cooked to old family recipes, Annalakshmi is a genuine culinary voyage of discovery. Whatever you choose to pay (15-20 ringgit a head is reasonable), the money goes to a good cause, helping to fund the Temple of Fine Arts. Annalakshmi is... Read our full review of Annalakshmi. The cafe is owned by Artisan Roast, purveyor of some of the city's finest coffee. So you can rest assured that you can get a quality caffeine fix to go with your vegetarian and vegan food. As well as savoury snacks, are sweet pastries and ice cream. The only disappointing feature is the lack of decaf coffee. You'll find RAW Coffee on the ground floor of the Wisma Equity Building on the north... Read our full review of RAW Coffee Kuala Lumpur. This popular eatery does a range of good value thalis thalis (a selection of dishes normally served on a round stainless steel plate), from various regions of India. A la carte choices include south Indian treats like masala tosai (savoury pancake with spicy potato filling), as well as north Indian favourites like sag paneer (cottage cheese cubes with spinach). While the decor won't win any... Read our full review of Bakti Woodlands. Horror, pity and grudging admiration: the three main ways Malaysians react when they find out someone is a vegetarian. This would suggest that keeping clear of meat and fish is a tough ask, even in cosmopolitan KL. Which is odd, because there are few places in the world where vegetarians can eat as well.... Read our full review of How to eat vegetarian in Kuala Lumpur. Saravana Bhavan, which has convenient outlets in Bangsar, Brickfields and Little India, turns out some of the city's best Indian food, all of it vegetarian. Top picks include the superb masala tosai (savoury pancake stuffed with a spicy potato and onion mix), aloo gobi masala (potato and cauliflower curry) and paneer butter masala (cubes of Indian cottage cheese in a rich tomato sauce).... Read our full review of Saravana Bhavan. Western Set on the edge of the embassy district, this place is a triumph of substance over style. Forget the plastic furniture, neon lighting, and traffic noise, steaks of this quality, for under 30 ringgit, are worth travelling miles for. The mixed clientele includes plenty of diplomats, who generally know a thing or two when it comes to food. Cold beer is available by the can. Suzi's Corner can be... Read our full review of Suzi's Corner. Promising to burger you senseless, Daily Grind has a wide range of burgers to choose from, including two vegetarian options, although the classic beef burger with cheese is hard to beat. Most are in the 30-40 ringgit bracket, so not exactly cheap, but for the taste and quality, it's really not bad value. Bangsar Village is a twenty minute walk (or five minute cab ride) from Bangsar LRT on the... Read our full review of The Daily Grind. Named after a frangipani which unfortunately no longer stands out front, the restaurant pulls off the fusion trick, marrying European and Asian cuisines, to make an end result which is greater than the sum of parts. Dishes like the strudel of seared foie gras and apple rendang (unlike the Malaysian dry curry, this is a fried fruit reduction) may sound like a dog's dinner, but are actually very... Read our full review of Frangipani. Although named after the Spanish for pig, this place is run by an Austrian, and turns out dishes from all over Europe. Thuringer tostbratwurst (sausage with pickled cabbage and mashed potato), may sit uneasily with pan-fired goats cheese wrapped in Serrano ham, but El Cerdo's legion of loyal customers attest to the quality of the food. Despite the rustic nature of the menu, this is not a cheap... Read our full review of El Cerdo. Quite apart from having a great range of authentic tapas, cold cuts, and main meals, El Meson is the unlikely home to one of KL's best fried breakfasts, with real bacon and pork sausages. Unlikely, because most Spaniards (like Italians) start the day with nothing more substantial than a coffee. The rest of the menu, however, could hardly be more evocative of Spain. Bangsar Village is a twenty... Read our full review of El Meson. A favourite amongst expats and well-heeled locals alike, this is a great place for a treat Italian meal while visiting KL. Although by no means cheap, Sassorosso is not outrageously priced, so long as you stick to pizzas and pasta, and avoid the temptations of the extensive wine list. It also does a great value lunchtime deal, with an antipasti buffet, and pizza or pasta, for little more than 50... Read our full review of Sassorosso. While it is relatively easy to get good Spanish food in Kuala Lumpur, the most prominent local chain, La Bodega, lets itself down by being pork-free. Spanish food without the likes of jamon (ham) and chorizo (spicy pork sausage), is simply not the same. That said, La Bodega is still one of the best places in town for tapas. The most accessible branch is Bodega @Pavilion KL, which, while being... Read our full review of La Bodega. With a diverse multiracial society and an evolving food culture, there’s no doubt that diners are spoilt for choice in Malaysia. But you aren’t limited to Asian cuisine if you’re seeking something a little more exotic to this part of the world; if you prefer the zing of jalapenos, jump on the wagon at Las Carretas for affordable Mexican cuisine and refreshing... Read our full review of Las Carretas. Dishes like lamb shank with soft polenta (cornmeal), roast sea bass with grilled vegetables, and pumpkin ravioli with duck breast, are great examples of less being more. The pizza is good too, although it's best to go for the more classic options, such as funghi (mushroom) or quattro formagi (four cheeses). The wine and food pricing is amongst the fairest in KL, for a restaurant of this quality.... Read our full review of Tatto. It is an undeniably pleasant setting -- one of KL's very best spots for a romantic date. And the food is generally decent too, especially the pizzas. But the use of pork substitutes, like beef bacon and turkey ham, is somewhat less classy than the decor. Where possible stick to simpler combinations, with real Italian ingredients, such as the gnocchi (potato dumplings) with gorgonzola and rocket;... Read our full review of Nerovivo.
{ "pile_set_name": "Pile-CC" }
using Mirror; namespace WeaverTargetRpcTests.TargetRpcValid { class TargetRpcValid : NetworkBehaviour { [TargetRpc] void TargetThatIsTotallyValid(NetworkConnection nc) { } } }
{ "pile_set_name": "Github" }
// Copyright (c) 2013 The Chromium Authors. All rights reserved. // Use of this source code is governed by a BSD-style license that can be // found in the LICENSE file. // // This implements a Clang tool to convert all instances of std::string("") to // std::string(). The latter is more efficient (as std::string doesn't have to // take a copy of an empty string) and generates fewer instructions as well. It // should be run using the tools/clang/scripts/run_tool.py helper. #include <memory> #include "clang/ASTMatchers/ASTMatchFinder.h" #include "clang/ASTMatchers/ASTMatchers.h" #include "clang/Basic/SourceManager.h" #include "clang/Frontend/FrontendActions.h" #include "clang/Tooling/CommonOptionsParser.h" #include "clang/Tooling/Refactoring.h" #include "clang/Tooling/Tooling.h" #include "llvm/Support/CommandLine.h" using namespace clang::ast_matchers; using clang::tooling::CommonOptionsParser; using clang::tooling::Replacement; using clang::tooling::Replacements; namespace { // Handles replacements for stack and heap-allocated instances, e.g.: // std::string a(""); // std::string* b = new std::string(""); class ConstructorCallback : public MatchFinder::MatchCallback { public: ConstructorCallback(Replacements* replacements) : replacements_(replacements) {} virtual void run(const MatchFinder::MatchResult& result) override; private: Replacements* const replacements_; }; // Handles replacements for invocations of std::string("") in an initializer // list. class InitializerCallback : public MatchFinder::MatchCallback { public: InitializerCallback(Replacements* replacements) : replacements_(replacements) {} virtual void run(const MatchFinder::MatchResult& result) override; private: Replacements* const replacements_; }; // Handles replacements for invocations of std::string("") in a temporary // context, e.g. FunctionThatTakesString(std::string("")). Note that this // handles implicits construction of std::string as well. class TemporaryCallback : public MatchFinder::MatchCallback { public: TemporaryCallback(Replacements* replacements) : replacements_(replacements) {} virtual void run(const MatchFinder::MatchResult& result) override; private: Replacements* const replacements_; }; class EmptyStringConverter { public: explicit EmptyStringConverter(Replacements* replacements) : constructor_callback_(replacements), initializer_callback_(replacements), temporary_callback_(replacements) {} void SetupMatchers(MatchFinder* match_finder); private: ConstructorCallback constructor_callback_; InitializerCallback initializer_callback_; TemporaryCallback temporary_callback_; }; void EmptyStringConverter::SetupMatchers(MatchFinder* match_finder) { const clang::ast_matchers::StatementMatcher& constructor_call = id( "call", cxxConstructExpr( hasDeclaration(cxxMethodDecl(ofClass(hasName("std::basic_string")))), argumentCountIs(2), hasArgument(0, id("literal", stringLiteral())), hasArgument(1, cxxDefaultArgExpr()))); // Note that expr(has()) in the matcher is significant; the Clang AST wraps // calls to the std::string constructor with exprWithCleanups nodes. Without // the expr(has()) matcher, the first and last rules would not match anything! match_finder->addMatcher(varDecl(forEach(expr(has(constructor_call)))), &constructor_callback_); match_finder->addMatcher(cxxNewExpr(has(constructor_call)), &constructor_callback_); // The implicitly generated constructor for temporary could be wrapped by // implicitCastExpr, so ignoringParenImpCasts is needed. match_finder->addMatcher( cxxBindTemporaryExpr(ignoringParenImpCasts(forEach(constructor_call))), &temporary_callback_); // Note that forEachConstructorInitializer is needed. The std::string // constructor is wrapped by exprWithCleanups and cxxCtorInitializer. // forEach() would not work. match_finder->addMatcher(cxxConstructorDecl(forEachConstructorInitializer( withInitializer(expr(has(constructor_call))))), &initializer_callback_); } void ConstructorCallback::run(const MatchFinder::MatchResult& result) { const clang::StringLiteral* literal = result.Nodes.getNodeAs<clang::StringLiteral>("literal"); if (literal->getLength() > 0) return; const clang::CXXConstructExpr* call = result.Nodes.getNodeAs<clang::CXXConstructExpr>("call"); clang::CharSourceRange range = clang::CharSourceRange::getTokenRange(call->getParenOrBraceRange()); auto err = replacements_->add(Replacement(*result.SourceManager, range, "")); assert(!err); } void InitializerCallback::run(const MatchFinder::MatchResult& result) { const clang::StringLiteral* literal = result.Nodes.getNodeAs<clang::StringLiteral>("literal"); if (literal->getLength() > 0) return; const clang::CXXConstructExpr* call = result.Nodes.getNodeAs<clang::CXXConstructExpr>("call"); auto err = replacements_->add(Replacement(*result.SourceManager, call, "")); assert(!err); } void TemporaryCallback::run(const MatchFinder::MatchResult& result) { const clang::StringLiteral* literal = result.Nodes.getNodeAs<clang::StringLiteral>("literal"); if (literal->getLength() > 0) return; const clang::CXXConstructExpr* call = result.Nodes.getNodeAs<clang::CXXConstructExpr>("call"); // Differentiate between explicit and implicit calls to std::string's // constructor. An implicitly generated constructor won't have a valid // source range for the parenthesis. We do this because the matched expression // for |call| in the explicit case doesn't include the closing parenthesis. clang::SourceRange range = call->getParenOrBraceRange(); if (range.isValid()) { auto err = replacements_->add(Replacement(*result.SourceManager, literal, "")); assert(!err); } else { auto err = replacements_->add( Replacement(*result.SourceManager, call, literal->isWide() ? "std::wstring()" : "std::string()")); assert(!err); } } } // namespace static llvm::cl::extrahelp common_help(CommonOptionsParser::HelpMessage); int main(int argc, const char* argv[]) { llvm::cl::OptionCategory category("EmptyString Tool"); CommonOptionsParser options(argc, argv, category); clang::tooling::ClangTool tool(options.getCompilations(), options.getSourcePathList()); Replacements replacements; EmptyStringConverter converter(&replacements); MatchFinder match_finder; converter.SetupMatchers(&match_finder); std::unique_ptr<clang::tooling::FrontendActionFactory> frontend_factory = clang::tooling::newFrontendActionFactory(&match_finder); int result = tool.run(frontend_factory.get()); if (result != 0) return result; if (replacements.empty()) return 0; // Each replacement line should have the following format: // r:<file path>:<offset>:<length>:<replacement text> // Only the <replacement text> field can contain embedded ":" characters. // TODO(dcheng): Use a more clever serialization. Ideally we'd use the YAML // serialization and then use clang-apply-replacements, but that would require // copying and pasting a larger amount of boilerplate for all Chrome clang // tools. llvm::outs() << "==== BEGIN EDITS ====\n"; for (const auto& r : replacements) { llvm::outs() << "r:::" << r.getFilePath() << ":::" << r.getOffset() << ":::" << r.getLength() << ":::" << r.getReplacementText() << "\n"; } llvm::outs() << "==== END EDITS ====\n"; return 0; }
{ "pile_set_name": "Github" }
The targets of CAPRI rounds 20-27. Eight CAPRI prediction rounds with a total of 15 targets were held in the years 2010-2012. Only five of the targets were protein assemblies comparable with those of earlier CAPRI rounds. In one target, the solvent positions at the interface had to be predicted; another was a protein-polysaccharide complex. The remainders were designed complexes issued from protein engineering experiments, and the prediction concerned either their structure or the binding affinity of the designed ligand. Affinity prediction was a new experiment in CAPRI, and a challenge for its participants. It pushed the community into developing novel procedures and score functions that will improve the performance of docking methods, help designing binders, and yield better structure-based estimates of the binding free energy of natural assemblies.
{ "pile_set_name": "PubMed Abstracts" }
using NHapi.Base.Parser; using NHapi.Base; using NHapi.Base.Log; using System; using System.Collections.Generic; using NHapi.Model.V26.Segment; using NHapi.Model.V26.Datatype; using NHapi.Base.Model; namespace NHapi.Model.V26.Group { ///<summary> ///Represents the RRI_I12_AUTHORIZATION_CONTACT Group. A Group is an ordered collection of message /// segments that can repeat together or be optionally in/excluded together. /// This Group contains the following elements: ///<ol> ///<li>0: AUT (Authorization Information) </li> ///<li>1: CTD (Contact Data) optional </li> ///</ol> ///</summary> [Serializable] public class RRI_I12_AUTHORIZATION_CONTACT : AbstractGroup { ///<summary> /// Creates a new RRI_I12_AUTHORIZATION_CONTACT Group. ///</summary> public RRI_I12_AUTHORIZATION_CONTACT(IGroup parent, IModelClassFactory factory) : base(parent, factory){ try { this.add(typeof(AUT), true, false); this.add(typeof(CTD), false, false); } catch(HL7Exception e) { HapiLogFactory.GetHapiLog(GetType()).Error("Unexpected error creating RRI_I12_AUTHORIZATION_CONTACT - this is probably a bug in the source code generator.", e); } } ///<summary> /// Returns AUT (Authorization Information) - creates it if necessary ///</summary> public AUT AUT { get{ AUT ret = null; try { ret = (AUT)this.GetStructure("AUT"); } catch(HL7Exception e) { HapiLogFactory.GetHapiLog(GetType()).Error("Unexpected error accessing data - this is probably a bug in the source code generator.", e); throw new System.Exception("An unexpected error ocurred",e); } return ret; } } ///<summary> /// Returns CTD (Contact Data) - creates it if necessary ///</summary> public CTD CTD { get{ CTD ret = null; try { ret = (CTD)this.GetStructure("CTD"); } catch(HL7Exception e) { HapiLogFactory.GetHapiLog(GetType()).Error("Unexpected error accessing data - this is probably a bug in the source code generator.", e); throw new System.Exception("An unexpected error ocurred",e); } return ret; } } } }
{ "pile_set_name": "Github" }
Take a rocks glass and fill the bottom with one layer of fresh blueberries. Add the brown sugar and lemon juice and gently muddle. (The longer you let this sit, the better the flavors are going to meld). Fill the glass with ice then top with the rum and ginger ale.
{ "pile_set_name": "Pile-CC" }
Detail of Robert Rauschenberg's Erased de Kooning Drawing showing inscription Detail of Robert Rauschenberg’s Erased de Kooning Drawing (1953) showing the inscription made by Jasper Johns Research Material Artwork Detail The inscription below Erased de Kooning Drawing was executed by artist Jasper Johns (b. 1930) using a lettering device. The paper bearing the inscription is normally framed by a window cut into the work’s mat board. In this conservation image we see the entire sheet, with remnants of tape along its edges and slight staining caused by exposure to light and the acidic backing board on which the drawing was originally mounted.
{ "pile_set_name": "Pile-CC" }
[*] Richard and Anita Calkins Distinguished Professor of Law, Drake Law School. B.A., Illinois Wesleyan University, 1975; J.D., Harvard University, 1978. The author is especially grateful for the careful review and thoughtful comments of Professor David C. Baldus (which is not to imply that Professor Baldus agrees with any of the author's particular substantive points). The author, with the guidance of Professor Baldus, has made every effort to avoid misinterpreting or misusing any of the statistical data mentioned herein. Any errors, of course, are solely attributable to the author. The author also thanks his secretary, Karla Westberg, and his research assistants, Julie Greteman and Kristin Mueller, for their diligent assistance. Return to text. [1] Carol S. Steiker & Jordan M. Steiker, Sober Second Thoughts: Reflections on Two Decades of Constitutional Regulation of Capital Punishment, 109 HARV. L. REV. 355 (1995). The Steiker article has been cited in the popular press. See Ted Gest, A House Without a Blueprint: After 20 Years, the Death Penalty Is Still Being Meted Out Unevenly, U.S. NEWS & WORLD REP., July 8, 1996, at 41 (quoting Steiker and Steiker for the proposition that Supreme Court death penalty jurisprudence has "grown like a house without a blueprint—with a new room here, a staircase there, but without the guidance of a master builder"). See also RAYMOND PATERNOSTER, CAPITAL PUNISHMENTIN AMERICA at xv (1991) ("[A] substantial number of death sentences continue to be imposed in a fashion that can only be described as 'freakish.' "); Daniel Givelber, The New Law of Murder, 69 IND. L.J. 375, 378 (1994) ("The new law [of capital] murder is a failure. By most measures, it has marginally reduced but by no means eliminated arbitrariness from capital punishment."). Return to text. [6] The article is particularly effective in showing how easily states can fulfill the requirements the Court has set, seeid. at 402, and at illuminating roads not taken by the Court that might have had better results, see id. at 414-26. Return to text. [7] Steiker and Steiker never suggest that any of these goals are viewed by the Court as more important than any other, and in fact may suggest at one point that minimizing underinclusion is in fact the Court's primary goal: "Each of the three concerns or commitments (desert, fairness, and individualization) reflects different facets of the basic norm of equal treatment, the idea that like cases should be treated alike." Id. at 369. Return to text. [8] In this context, as in most others, it is dangerous to view "the Court" as an entity with a single mind, when in fact it is composed of nine members who often have diametrically opposed opinions. As to the death penalty, as Steiker and Steiker point out, "the basic configuration on Eighth Amendment issues remained constant for two decades after Furman: two unwavering poles competed for the center." Id. at 428 (citing Furman v. Georgia, 408 U.S. 238 (1972)). On one pole were former Justices Brennan and Marshall, who advocated complete abolition of the death penalty. See id. at 427. On the other pole were former Chief Justice Burger and current Chief Justice Rehnquist (joined in more recent days by Justices Scalia and Thomas), who oppose significant regulation of the death penalty through the Eighth Amendment. See id. It was thus the remaining "centrist" justices like Blackmun (until late in his career, when he became a virtual abolitionist), O'Connor, Powell, Stevens, and White, whose votes controlled the outcomes of cases. See id. at 428. Thus, when I refer to "the Court," I am referring to that centrist bloc as augmented by whatever votes they could pull from the two poles on particular issues. Despite the cobbled-together nature of this body of doctrine, Steiker and Steiker acknowledge that the Court has promulgated some consistent themes, see id. at 364, and I agree (although I do not agree with Steiker and Steiker concerning what all those themes are). Return to text. [29] See id. at 397 (citing Turner v. Murray, 476 U.S. 28, 37 (1986) (permitting voir dire concerning racial prejudice in cases involving interracial murders); Gardner v. Florida, 430 U.S. 349, 357-62 (1977) (invalidating a death sentence based in part upon a presentence report not made available to defense counsel); Caldwell v. Mississippi, 472 U.S. 320, 328-30 (1985) (preventing prosecutors from arguing that the jury's decision is not the final one concerning the death sentence since the jury verdict is subject to appellate review); Beck v. Alabama, 447 U.S. 625, 637-38 (1980) (requiring the inclusion of lesser-included offense instructions that would support a guilty verdict for a noncapital offense); Simmons v. South Carolina, 512 U.S. 154, 163-64 (1994) (permitting defendant to inform jury that a "life" sentence means life without parole); Johnson v. Mississippi, 486 U.S. 578, 584-87 (1988) (overturning a sentence based upon a prior conviction later invalidated); Herrera v. Collins, 506 U.S. 390, 417 (1993) (post-trial judicial consideration of newly discovered evidence may be constitutionally required in a truly compelling case)). Return to text. [31] See id. ("It is difficult to imagine a body of doctrine that is much worse—either in its costs of implementation or in its negligible returns—than the one we have now."); id. at 429 (describing the doctrinal structure as "functionally and aesthetically unsatisfying"); id. at 437 (describing the Court's doctrine as "failure as regulation"); id. at 438 ("We are left with the worst of all possible worlds: the Supreme Court's detailed attention to death penalty law has generated negligible improvements over the pre-Furman era, but has helped people to accept without second thoughts—much less 'sober' ones—our profoundly failed system of capital punishment."). Return to text. [32] See, e.g., David C. Baldus et al., Comparative Review of Death Sentences: An Empirical Study of the Georgia Experiment, 74 J. CRIM. L. & CRIMINOLOGY 661, 664 (1983) ("[I]ndividual death sentences that are excessively severe in comparison to the sentences imposed in factually indistinguishable cases—what we call 'comparatively excessive'—do violate the [E]ighth [A]mendment."); Arnold Barnett, Some Distribution Patterns for the Georgia Death Sentence, 18 U.C. DAVIS L. REV. 1327, 1328 (1985) ("The notion animating proportionality review—one that has been explicitly endorsed by the Supreme Court—is that death sentences cannot be imposed in an arbitrary manner. It is considered objectionable if a given defendant is put to death while, in adjacent counties (or adjacent courtrooms), defendants in virtually the same situation are given prison terms."); PATERNOSTER, supra note 1, at 162-64 (arguing that Furman and Gregg both show that the Court has been concerned with underinclusion). Return to text. [35] The two written works in which BWP set forth the findings that are most pertinent for purposes of this Article are BALDUSETAL., EQUAL JUSTICE, supra note 33, and Baldus et al., Comparative Review, supra note 32. Return to text. [41] See id. at 1339-41, 1364-66. Barnett's method may seem overly simplistic in focusing on only three variables, but the accuracy of his selection of factors is not crucial because choosing other factors would result in the same sort of continuum with low death sentencing rates for the least culpable cases, midrange death sentencing rates for midrange cases, and high death sentencing rates for the most culpable offenders. See, e.g., infra notes 177-81 and accompanying text (explaining system developed by BWP). Return to text. [42] See Barnett, supra note 32, at 1341. Barnett's protocols for each of the three variables are reproduced at the end of this Article. Seeinfra Appendix A. Return to text. [44] Barnett's chart is found at Barnett, supra note 32, at 1342. Actually, the chart I have reproduced here is a reformulation of Barnett's chart produced by BWP in BALDUSETAL., EQUAL JUSTICE, supra note 33, at 95. I chose to use the Baldus reformulation because it is slightly easier to understand. There are a couple of minor discrepancies between the two charts for which I cannot account, but they do not make any difference in the analysis. Return to text. [66] There were 2,484 such convictions in the six-year period following Furman. See BALDUSETAL., EQUAL JUSTICE, supra note 33, at 45. This means there likely were about 2,000 in the five-year period included in Barnett's study. Return to text. [74] Death penalty cases, if properly defended, cost a great deal more than other murder cases at virtually every stage, from voir dire through sentencing. Since most death-eligible defendants are indigent, the court ends up footing litigation costs for both sides. For horror stories of capital defendants who got bargain-basement representation, see Stephen B. Bright, Counsel for the Poor: The Death Sentence Not for the Worst Crime but for the Worst Lawyer, 103 YALE L.J. 1835 (1994). Return to text. [75] See GA. CODE ANN. § 17-10-30.1 (Supp. 1996) (permitting sentencing by a judge presumably if jury is waived, although the statute is not entirely clear on that point). Return to text. [77] See, e.g., In re Winship, 397 U.S. 358, 363 (1970) ("The accused during a criminal prosecution has at stake interest of immense importance, both because of the possibility that he may lose his liberty upon conviction and because of the certainty that he would be stigmatized by the conviction."). Return to text. [78] See id. at 371-72 (Harlan, J., concurring). In a civil suit between two private parties for money damages, for example, we view it as no more serious in general for there to be an erroneous verdict in the defendant's favor than for there to be an erroneous verdict in the plaintiff's favor . . . . In a criminal case, on the other hand, we do not view the social disutility of convicting an innocent man as equivalent to the disutility of acquitting someone who is guilty . . . . I view the requirement of proof beyond a reasonable doubt in a criminal case as bottomed on a fundamental value determination of our society that it is far worse to convict an innocent man than to let a guilty man go free. [79] The Court found the beyond-a-reasonable-doubt standard of proof to be constitutionally required in In re Winship, 397 U.S. 358, 364 (1970). As to the supermajority requirement, the Constitution requires unanimity for conviction by a six-person jury. See Burch v. Louisiana, 441 U.S. 130, 138 (1979). As to a twelve-person jury, the Court has upheld a nine-to-three verdict in favor of conviction. See Johnson v. Louisiana, 406 U.S. 356, 362-63 (1972). However, the Court probably would not approve any lesser supermajority. Johnson was a five-to-four decision, and one of the five members of the majority, Justice Blackmun, stated in his concurrence that any lesser number of votes for conviction would cause him "great difficulty." Id. at 366 (Blackmun, J., concurring). Return to text. [80] See, e.g., 18 U.S.C.A. § 3553(b) (West Supp. 1996) (providing that a court may depart from the sentencing guidelines due to a "circumstance of a kind, or to a degree, not adequately taken into consideration by the Sentencing Commission in formulating the guidelines that should result in a sentence different from that described"). Return to text. [81] For discussions of mercy as a desirable aspect of criminal sentencing, see JEFFRIE G. MURPHY & JEAN HAMPTON, FORGIVENESSAND MERCY 20 (1988) ("To be merciful is to treat a person less harshly than, given certain rules, one has a right to treat that person."); Eric L. Muller, The Virtue of Mercy in Criminal Sentencing, 24 SETON HALL L. REV. 288, 335 (1993): Mercy . . . is an attitude that the sentencer adopts, during the process of selecting a sentence from within a range of authorized punishments, by imagining both the nature of the criminal episode and the impact of the possible sentences from the defendant's perspective. Mercy reminds the judge of how things look from the defense table. Mercy's role in the sentencing process is therefore a limiting or restraining one; it provides a check against the risk that the sentencer will get things wrong by describing the nature of the crime in an imbalanced way or underestimating the impact of the sentence on the defendant. See also Paul Whitlock Cobb, Jr., Note, Reviving Mercy in the Structure of Capital Punishment, 99 YALE L.J. 389, 391 (1989) (arguing that mercy is a particular virtue in capital sentencing). But see California v. Brown, 479 U.S. 538, 542 (1987) (holding that an instruction requiring jurors to ignore "mere sentiment, conjecture, sympathy, passion, prejudice, public opinion or public feeling" was not unconstitutional). Return to text. [82] Justice Brennan created the "death is different" argument in Furman v. Georgia, 408 U.S. 238, 282 (1972) (Brennan, J., concurring). Since then, the Court has adopted this precept in part, although by no means to the extent it could have. See Steiker & Steiker, supra note 1, at 397 (discussing the relatively limited scope to which the Court has put the "death is different" doctrine into practice). Return to text. [86] See CAL. PENAL CODE § 190.4(a) (West 1988); Skaggs v. Commonwealth, 694 S.W.2d 672, 681 (Ky. 1985) (discussing that the failure of a jury to reach a verdict will result in the retrial of the sentencing). Return to text. [102] See, e.g., James Luginbuhl & Julie Howe, Discretion in Capital Sentencing Instructions: Guided or Misguided?, 70 IND. L.J. 1161, 1165-76 (1995) (discussing evidence of juror misapplication of instructions concerning burden of proof regarding aggravating and mitigating circumstances and unanimity requirement regarding finding of aggravating and mitigating circumstances). However, jurors can hardly miss the requirement that their ultimate decision to impose a death sentence must be unanimous. Return to text. [103] See, e.g., BALDUSETAL., EQUAL JUSTICE, supra note 33, at 235. In comparing post- Furman death sentencing rates among the states, it is worth noting that the states whose statutes require death sentencing by the judge rather than by the jury tend to have the highest rates in the region (e.g., Indiana in the East North Central region, Florida in the South Atlantic region, Alabama in the East South Central region, and Arizona and Idaho in the Mountain region). Id.; see also Harris v. Alabama, 115 S. Ct. 1031, 1036 (1995) (noting that according to statistics compiled by the Alabama Prison Project, there have been only five cases in Alabama in which the judge rejected an advisory verdict of death and instead imposed life imprisonment, compared to 47 instances where the judge imposed a death sentence over a jury recommendation of life imprisonment); Stephen B. Bright & Patrick J. Keenan, Judges and the Politics of Death: Deciding Between the Bill of Rights and the Next Election in Capital Cases, 75 B.U. L. REV. 759 (1995) (exploring and decrying the propensity of judges to resort to death sentences in view of increasing public and political pressure). Return to text. [107] The Court upheld sentencing by a one-person sentencer when it refused to find sentencing by the trial judge unconstitutional in Proffitt v.Florida, 428 U.S. 242, 259-60 (1976). The extent to which the Court might permit a death sentence to be imposed by a nonunanimous jury has never been tested, because all states with jury sentencing require a unanimous verdict. The Court has not yet decided whether a unanimous verdict is required at the guilt phase of a case in which the death sentence may be sought upon conviction. See Schad v. Arizona, 501 U.S. 624, 630 (1991). The Court also has not required that the beyond-a-reasonable-doubt standard be employed during capital sentencing, as is evidenced by the Court's upholding of state schemes that do not embody that requirement. Seesupra notes 82, 85, 92-93 and accompanying text (states not employing the beyond-a-reasonable-doubt standard in capital sentencing). Return to text. [108] Examples include witnesses changing stories, co-defendants getting deals, and prosecutors' offices being short of resources. Return to text. [109] See Bordenkircher v. Hayes, 434 U.S. 357, 364 (1978). [S]o long as the prosecutor has probable cause to believe that the accused committed an offense defined by statute, the decision whether or not to prosecute, and what charge to file or bring before a grand jury generally rests entirely in his discretion [but the decision to prosecute may not be] . . . "deliberately based upon an unjustifiable standard such as race, religion, or other arbitrary classification." [112] 391 U.S. 510 (1968). Although Steiker and Steiker begin their analysis with the 1972 Furman case, see Steiker & Steiker, supra note 1, at 363, I believe the 1968 Witherspoon case is the appropriate starting point for considering the Court's regulation of states' administration of the death penalty. Return to text. [116] 428 U.S. 280 (1976). Woodson held unconstitutional a statute that made the death penalty mandatory for every defendant convicted of first-degree murder or felony murder. See id. at 301. Return to text. [117] 428 U.S. 325 (1976). Roberts held unconstitutional a Louisiana statute that imposed a mandatory death sentence on five narrowly defined categories of first-degree murder. See id. at 335-36. Return to text. [118] The Court appeared to reached the logical end of this line in Sumner v. Shuman, 483 U.S. 66, 85 (1987) (holding mandatory death penalty for murder committed by a person serving a life sentence unconstitutional). Return to text. [119] 438 U.S. 586 (1978). Lockett held unconstitutional an Ohio statute that limited the categories of mitigating evidence that could be considered by the sentencer. See id. at 608. Return to text. [120] 455 U.S. 104 (1982). Eddings held that it was unconstitutional for a sentencer to refuse, as a matter of law, to consider all relevant mitigating evidence. See id. at 112. Return to text. [131] The most famous portion of the opinion deals with McCleskey's claim of invidious discrimination. For a discussion of this claim and the Court's treatment of it, see infra notes 138-141 and accompanying text. Return to text. [139] SeeMcCleskey, 481 U.S. at 298 ("[M]cCleskey would have to prove that the Georgia legislature enacted or maintained the death penalty statute becauseof an anticipated racially discriminatory effect.") (emphasis added). Return to text. [142] The Court may have missed the golden opportunity in McCleskey to pay more than lip service to this goal. Return to text. [143] See Lockett v. Ohio, 438 U.S. 586, 604 (1978). [T]he Eighth and Fourteenth Amendments require that the sentencer, in all but the rarest kind of capital case, not be precluded from considering, as a mitigating factor, any aspect of a defendant's character or record and any of the circumstances of the offense that the defendant proffers as a basis for a sentence less than death. [C]ontemporary death penalty law is remarkably undemanding. The narrowing, channeling, and individualization requirements can be simultaneously and completely satisfied by a statute that defines capital murder as any murder accompanied by some additional, objective factor or factors and that provides for a sentencing proceeding in which the sentencer is asked simply whether the defendant should live or die. [T]he narrowing function required for a regime of capital punishment may be provided in either of these two ways: The legislature may itself narrow the definition of capital offenses, as Texas and Louisiana have done, so that the jury finding of guilty responds to this concern, or the legislature may more broadly define capital offenses and provide for narrowing by jury findings of aggravating circumstances at the penalty phase. [148] SeeLockett, 438 U.S. at 608 (invalidating a statute that limited the kinds of mitigating evidence the sentencer could consider). Return to text. [149] See Caldwell v. Mississippi, 472 U.S. 320, 329-30 (1985) (reversing a death sentence because the prosecutor and judge had indicated to the jury that their decision was not final due to appellate review, thereby possibly detracting from the jury's awareness that it was exercising a "truly awesome responsibility"). Return to text. [158] At many points, Steiker and Steiker assert that state systems have the potential to operate arbitrarily. See, e.g., id. at 375 ("[T]he continuing failure of states to narrow the class of death-eligible invites the possibility that some defendants will receive the death penalty in circumstances in which it is not deserved according to wider community standards (overinclusion)."); id. at 378 ("[T]he fear of overinclusive application of the death penalty that accounted in part for the Court's decision to enter the constitutional thicket remains quite justified."); id. at 381-82 ("Narrowing the class of the death-eligible in no way addresses the problem of [overinclusion], because open-ended discretion after death-eligibility permits, even invites, the jury to act according to its own unaccountable whims."); id. at 391-92 ("Although such discretion cannot be used to render a defendant death-eligible contrary to community standards, it can be used to exempt favored defendants from the death penalty or to withhold severe punishment for crimes against despised victims."); id. at 402 ("And the fact of minimal regulation, which invites if not guarantees the same kinds of inequality as the pre-Furman regime, is filtered through time-consuming, expensive proceedings that ultimately do little to satisfy the concerns that led the Court to take a sober second look at this country's death penalty practices in the first place."); id. at 417-18 ("[A]llowing states to seek the death penalty against all offenders in these categories presents a real and substantial danger that many offenders will be selected for execution who do not 'deserve' it (and who will therefore be treated more harshly than many offenders who do 'deserve' death).") (emphasis added). Return to text. [159] See id. at 426 ("We have argued that the Supreme Court's chosen path of constitutional regulation of the death penalty has been a disaster, an enormous regulatory effort with almost no rationalizing effect."); see alsoid. at 403 ("In short, the last twenty years have produced a complicated regulatory apparatus that achieves extremely modest goals with a maximum amount of political and legal discomfort."); id. at 426 ("It is difficult to imagine a body of doctrine that is much worse—either in its costs of implementation or in its negligible returns—than the one we have now."); id. at 429 (arguing that the Court's death penalty doctrinal structure is "functionally and ethically unsatisfying."); id. at 437 ("We began our exploration of legitimation theory in an effort to support the idea that the Court's deeply flawed death penalty law persists because of its success as a 'facade' that creates an appearance of stringent regulation but hides the incoherence and ineffectiveness of the underlying structure."); id. at 438 ("We are left with the worst of all possible worlds: the Supreme Court's detailed attention to death penalty law has generated negligible improvements over the pre-Furman era, but has helped people to accept without second thoughts—much less 'sober' ones—our profoundly failed system of capital punishment."). Return to text. [161] See Steiker & Steiker, supra note 1, at 375 (stating that the Baldus study "found that approximately 86% of all persons convicted of murder in Georgia over a five-year period after the adoption of Georgia's new statute were death-eligible under that scheme."). Return to text. [164] The difference between this 20% and the 14% exclusion figure used by Steiker and Steiker, seesupra note 161, is that the 14% figure is based on 1974-79 cases, see BALDUSETAL., EQUAL JUSTICE, supra note 33, at 268 n.31, while my 20% figure is based on 1973-78 cases, seeid. at 88-89. Return to text. [165] See BALDUSETAL., EQUAL JUSTICE, supra note 33, at 43 (post-Furman cases analyzed included those from March 28, 1973, through June 20, 1978). In some jurisdictions, legislatures have drawn narrow death-eligibility criteria, resulting in a small percentage of homicides being death eligible. Seeid. at 233-34 (about 20% of Colorado murder and nonnegligent manslaughter cases death-eligible); see also David Baldus & George Woodworth, Proportionality: The View of the Special Master, 6 CHANCE: NEW DIRECTIONSFOR STATISTICSAND COMPUTING 9, 11 (1993) (only 227 of over 2,000 New Jersey homicide cases death-eligible). Return to text. [171] That is, of course, as long as the defendant's attorney took advantage of the opportunity to present such evidence. For horror stories concerning attorneys who completely wasted this opportunity (not necessarily in Georgia), see David J. Gross, Sixth Amendment—Defendant's Dual Burden in Claims of Ineffective Assistance of Counsel, 75 J. CRIM. L. 755, 757 (1984); Welsh S. White, Effective Assistance of Counsel in Capital Cases: The Evolving Standard of Care, 1993 U. ILL. L. REV. 323, 325. Return to text. [172] See BALDUSETAL., EQUAL JUSTICE, supra note 33, at 182 ("The most striking post-Furman change has been the statewide decline in the race-of-defendant effect. Indeed, on average, black defendants appear to enjoy a slight overall advantage compared to white defendants, although the effect is not statistically significant.") Return to text. [173] See id. at 183-84. Instead, BWP attribute the finding to a general trend toward equal treatment of African-American defendants that began in urban areas and spread to rural areas. See id. Thus, they state, "Consequently, it does not appear that the decline in discrimination based on the defendant's race is attributable to Georgia's 1973 statutory changes." Id. at 184. Return to text. [178] See BALDUSETAL., EQUAL JUSTICE, supra note 33, at 229-48 (discussing three studies of pre- Furman cases, and three studies of post-Furman cases). An interesting recent research effort is reported in Robert E. Weiss et al., Assessing the Capriciousness of Death Penalty Charging, 30 L. & SOC'Y REV. 607, 617-25 (1996) (analyzing death penalty charging in 363 homicides in San Francisco County, California, through regression analysis and concluding that under the most optimistic assessment, the charging system "wring[s] out about two-thirds of the potential capriciousness"). Return to text. [179] See BALDUSETAL., EQUAL JUSTICE, supra note 33, at 80-81 ("The purpose of each analysis was to determine whether those defendants who received sentences of death can be meaningfully distinguished from the many other defendants who received only life sentences."). Return to text. [180] See id. at 44 (over 150 aggravating and mitigating factors were used). Return to text. [183] In light of this statistic, it is possible to argue that the Court overreacted in Furman. However, there are important aspects of the world as seen by the Court in 1972 that are not reflected by this statistic. First, this statistic does not include cases that came before the Court from Georgia in which the defendants had been sentenced to death for rape or armed robbery, two crimes as to which the Court later determined that the death penalty was overinclusive as a matter of law. See Coker v. Georgia, 433 U.S. 584, 597 (1977); Hooks v. Georgia, 433 U.S. 917, 917 (1977). Second, it took quite a lot of legwork for the Baldus group to dig out the information that enabled them to determine just how aggravated each case was. The lack of a meaningful sentencing proceeding in Georgia prior to 1972 means that the Court did not have access to this information—the Georgia system from the Court's perspective must have resembled a "black box" from which defendants' names were pulled seemingly at random. Third, this statistic does not reflect the seemingly disproportionate number of African-Americans sentenced to death, particularly for rapes of white women. See supra note 128 and accompanying text. Return to text. [186] I realize, of course, that death penalty opponents often contend that the very fact that the system cannot be made perfect is a cogent argument for its abolition. Return to text. [187] This has prompted me to make a modest effort to do so. See infra Part III.B.1.b. Return to text. [188] These cases are summarized in Appendix B. I identified these cases by obtaining a printout of all of the inmates on Georgia's death row from the NAACP Legal Defense Fund Death Penalty Project. I arranged the cases in reverse chronological order from date of sentence, then I searched the defendants' names electronically, to find a direct appeal decision by the Georgia Supreme Court. I excluded two of these cases. First, I did not use Drane v. State, 455 S.E.2d 27 (Ga. 1995), because the Georgia Supreme Court found that the trial court may have improperly excluded the co-defendant's confession—in which the co-defendant took major responsibility for the killing—and reversed the conviction. See id. at 30. Although this evidence was admitted at the sentencing phase, the failure to admit it at the guilt phase could have undermined the validity of the jury's verdict at the guilt phase. The second case I excluded was Potts v. State, 410 S.E.2d 89 (Ga. 1991). This case involved a kidnapping and murder that occurred in 1981, but took almost a decade to reach the Georgia Supreme Court. I excluded this case because the crime was not committed during the same time frame as the other cases I examined. I replaced these two cases with the next two cases in reverse chronological order. Return to text. The mitigating factors were: Defendant showed remorse, gave self up within 24 hours, was drunk or had a history of drug or alcohol abuse, had no intent to kill, believed he or she had a moral justification, the victim was a fugitive, provoked or aroused defendant, was drinking, or using drugs or had bad blood with defendant. [221] See id. at 686 n.92 ("The minor aggravating factors were: A race-related motive, victim was drowned, defendant resisted arrest, defendant created a great risk in a public place, or the victim was a hostage or female."). Return to text. [222] Specifically, I assumed that the factors included within the Barnett analysis and the BWP analysis continue to identify the basic aggravating and mitigating factors, and continue to directly reflect their relative strength. As BWP explain: There are two basic approaches to classifying cases as similar or dissimilar—the a priori and the empirical. The a priori approach endeavors to classify cases as similar on the basis of criteria that, from a legal or moral perspective, one believes should govern the appropriate sentence. . . . . The empirical approach also begins by presupposing that certain factual characteristics of the case being reviewed can serve to identify other cases of "similar" culpability. In contrast to the a priori approach—which primarily selects those factual characteristics on a normative basis—the empirical approach tries to employ those legitimate case characteristics that, statistically, best explain the observed sentencing results . . . . The difference between the two methods is that the a priorist selects the factors he or she believes should influence the sentencing decision, while the empiricist selects the factors that actually appear to do so. BALDUSETAL., EQUAL JUSTICE, supra note 33, at 47-48. Thus, I am adopting an a priori approach, with my a priori choices being informed by the results of empirical studies. Return to text. [227] Barnett reported no cases in this box, but this is clearly a box that should have a high ratio—the ratios in the other boxes where the three Barnett integers totaled "4" are .56 and .81. Return to text. [228] In this case, the defendant pulled the victim's head back by the hair and shot her in the forehead. If this is not an "execution-style" killing (BWP do not define this), then there is no serious aggravating circumstance, and the case scores .00 on the BWP scale. If it is an execution-style killing, then it scores .42. Return to text. [229] There were not enough cases in this box in the BWP study (only one, in which a death sentence was not imposed) to form a valid proportion. The boxes on either side had moderate ratios (.40 and .50), but were based upon a small number of cases. Return to text. [232] See David Cook et al., The Decisionmakers: What Moves Prosecutors, Judges, & Jurors? (Mar. 4, 1996) (finding that jurors are more willing to find mental problems mitigating in the abstract than when applied to a real case) (materials based upon the Capital Jury Research project presented at Life in the Balance VIII conference in St. Louis, Missouri) (on file with the author). Return to text. [244] See id. at 90-91 ("Specifically, our 'overall culpability' index ranks the cases according to the presence or absence of seventeen legitimate case characteristics and combinations thereof that share a statistically significant relationship with the sentences imposed."). Return to text. [245] See id. at 56. We developed a regression-based culpability index for the [study] with a logistic multiple-regression analysis designed to identify statistically the factors that best explain which defendants received death sentences . . . . This procedure required us, first, to collect information for every case concerning a large number of legitimate case characteristics, such as prior record or a contemporaneous felony, that might have influenced the sentencing decision. We then computed for each such case characteristic a regression co-efficient (or 'weight') that reflected its individual contribution to the overall culpability index. Next, we calculated the relative culpability or blameworthiness of each case by summing the 'weights' of all the legitimate explanatory variables present in that case. We then ranked all the cases according to their relative culpability scores, thereby constructing an overall culpability index along which the cases were distributed. Finally, we defined as 'similar' six groups of cases with comparable overall culpability scores. [258] To me, the most regrettable road not taken by the Court has been its failure to require a heightened level of attorney competence above the relatively minimal standard set for all cases, including death penalty cases, in Strickland v. Washington, 466 U.S. 668, 687 (1984) (requiring that counsel's performance be shown to be deficient and that the deficiency prejudiced the defense in order to reverse a conviction or death sentence). A requirement that states provide super-competent trial counsel would either force states out of the death penalty business due to excessive costs or force states to provide top-notch counsel. Either possibility would be more fair to defendants and more efficient in the long run. Return to text.
{ "pile_set_name": "Pile-CC" }
Mecel Mecel was a software and systems consulting firm, specializing in the automotive industry. The company has offices in Gothenburg and has approximately 120 employees. History Mecel was founded in Sweden in 1982 by Jan Nytomt and Hasse Johansson, who later became technical manager at Scania. The company idea was to provide the automotive industry with electronic engine control devices. In 1982 Saab-Scania Combitech Group, as the company was named at the time, acquired Mecel. When General Motors bought the Saab-Scania car operations in 1990 Mecel followed with it. In 1997 General Motors created the company Delphi Automotive Systems and subsequently Mecel became a wholly owned subsidiary of Delphi. Mecel has since been operating as an independent software and system house being able to offer services to all customers. In 1987 a software division, Mecel Gothenburg, was started in Chalmers University Science Park with the intention of investigating and developing multiplexed signaling in the vehicle based on CAN. In 1990 Mecel and Mecel Gothenburg together formed Mecel AB and Mecel Gothenburg has since 2000 has been organizational headquarters. In 2006 the Åmål office was purchased by co founder Jan Nytomt and in 2007 the Mecel Engine Systems was acquired by Hoerbiger In 2009 Mecel had an operating revenue of 107.3 million. President from 2000 until 2011 was Kent-Eric Lång [1], succeeded by Henrik Häggström in August 2011. Company Operations Some major contributions to the industry during the years: The IonSense technology was developed by the Mecel founders in the 80's and are presented in a number of patents. US patents 4785789, 4903676, 4947810, 5769049, 5992386, 6123057, 6827061. The technology are used in a number of applications among others Saab Direct Ignition where it was introduced in the Trionic T5.2 system. In the European Union research programme FP4 was Mecel a member and contributor of the X-by-wire project Mecel has also been contributing to the automotive standardization two examples are within ISO. ISO 14229 where Anders Lundqvist was (chairman). ISO 26262 where Håkan Sivencrona has been editor for subsection 10. Products Some of Mecels product areas are: Automotive Bluetooth Picea Populus References Category:Software companies of Sweden Category:Companies based in Gothenburg Category:Automotive companies of Sweden
{ "pile_set_name": "Wikipedia (en)" }
Q: Why doesn't `FOO=42 echo "$FOO"` print 42 in Bash? I'm confused by this behaviour: $ FOO=42 echo "$FOO" $ FOO=42 && echo "$FOO" 42 I'm accustomed to using VARNAME=value cmd to specify environment variables for other commands, so I was surprised to discover it doesn't work when cmd is echo. This might have something to do with echo being a Bash built-in. Is this the case? If so, is using && the best way to specify environment variables for Bash built-ins? Update: && is no good, as it results in the environment variables being set permanently, which I'm trying to avoid. A: It doesn't matter that echo is a built-in. The reason is that variables on the command line are evaluated before executing the command, they're not evaluated by the command. You could get the result you want with: FOO=42 bash -c 'echo "$FOO"' This starts a new shell to execute echo $foo. Since the argument to bash is in single quotes, the variable is not replaced by the original shell. A: The replacement happens before the command is executed: $FOO is replaced with its current value. echo "" is executed with $FOO set to 42. Try: FOO=42 sh -c 'echo "$FOO"'
{ "pile_set_name": "StackExchange" }
Discount Supra Shoes Hsupra shoesui Catholic, yuan the breath of god from above gold j ī shoot out. The trial of the gun, crackdown. "Oh! Thsupra shoes supra shoes, thsupra shoes supra shoes the truth of the holy land, legends, one of ten big Catholic emerald god, god, you incredibly day gold kill them, refining into doctrine! You......." judge gun a look, the whole body supra shoes in a state of dull, seems to be scared silly. Tai chi god figure was down oppression, judge gun again blasting, the whole body supra shoes the essence and on, into a gun meaning budo, to break the tai chi. But the party cold five fingers open again, a virtual pressure, and the big one town chute, pledge, the whole body of the kingdom of the crystal supra shoes brilliant blossom a sacred light. judge gun all of the martial way moves were a shattered, the whole people fell to the ground, into the tall man of authority, but now he's all hsupra shoes majesty, just as it supra shoes a morally, do not have completely the judgment ability. Once, the celestial master trial, don't know how much the judge emperor, the ancient emperor, to gain entrance, the barbarians, the protoss................ The heavens in the world of the first WangPinXian, but it has become a crackdown by the dead dog. He and xi stem, has become the morally, in the hands of the party, at will be cao longitudinal, not at all against ability.Party cold and step on the past, that judgment and party a gun cold laptop up. Her left hand xi stem, her right hand guns of the trial reigns, everything under control, such as the sea supra shoes almost a mountain, only burst, creation of supreme power not to pull out. Supra High Top Shoes Judge gun feel endless humiliations, he was party to cold in hand, and could not move, supra shoes almost have a suicidal feelings, but now it supra shoes not possible, the huge mana instant party between the hsupra shoes body down to, unexpectedly began to forcibly searched hsupra shoes mind the avenue of essence and memory. "The cold, you kill me! I will not humiliate!" Judge gun roars way: "be killed, and shouldn't be humiliated!" "Are you? You are the pigs!" Party cold cold way: "you judge gun, presided over the celestial DuoNian, the master many secret, I have to from your memory, search out the mystery of the ancient Dan. Get one accident of deep sleep, fulfill my god Dan way of king day. Do you think you can in my hand for die? I won't be so easy to let you die, let your survival can not, beg dead can't." A rumbling, huge memory from the judgment of the guns of the body were forcibly paging through, judge gun thsupra shoes moment of the heart of it supra shoes humiliating possible, supra shoes life most pain and sufferings, thsupra shoes supra shoes like a person supra shoes to pick light body of the 1 in the square, to the people to watch the general. "The cold, you or kill me!" Xi stem also roars way, because the party supra shoes also also cold check hsupra shoes memory. Two people are a practice for one hundred million years without ancient emperor, do not know how much memory, but the party of the cold now fix for the very important, read in between memory, not for a while, and sought to a memory map, and many of the space supra shoes marked on the map, some secret vanity portal above, and all up and down the ups and downs. Finally, in the endless depths, don't know how many dangerous after the space, the far-off divide cut off, in the deepest vanity YinHe ShaQi, a were all of the great seal ancient portal, be web traces of general completely winding, above all supra shoes the absolute seal, the immortality of the soul in the guardian of the gods. Thsupra shoes supra shoes the memory "Dan world" portal, the map of the world to Dan. Judge gun, xi stem of mind supra shoes a picture of thsupra shoes map, party cold against each other, we are exactly the same, have no regret, not a nod, but the world map of Dan Dan among the portal supra shoes the seals, nowhere, supra shoes the speculation in, Dan Lord of the world with the life of decorate down invincible seal, it supra shoes day king also can not open, and in two old memory, must want to find the legend of the key of god of Dan, to open the doors of Dan. And, in the two people in mind, it supra shoes some of the information industry has Dan, Dan world, at least supra shoes more than ten era of the left, Dan Lord of the world, in ten before era, supra shoes a big pieces of the powers of refining Dan yao and to finsupra shoesh the day king, later mana more and more violent, supra shoes almost infinite rival king fairy, battle effectiveness and end the general without the king. Cheap Supra Shoes Then establsupra shoeshed the Dan world, cultivate the similar, after ten hun Dun era, heaven and earth and big burst, Dan world more and more violent. With so many god bestowed Dan, every era, can produce a lot of equivalent to the ancient imperial holy product to cure. Thsupra shoes time earth and heaven big burst, Dan Lord of the world, but also want to break through to the border of the king of fairy, steal heaven and earth and big burst, hun Dun replacement between, the door of eternal life passed out of the way, and therefore be possessed king against the fairy, breaking the Dan world, severely injured Dan Lord of the world. Later the seal was Dan, nature supra shoes the king of fairy dsupra shoesappear, as a kind of celestial many day king had also want to attack the Dan, take out which those sleeping nature god Dan, even find the body of the Lord of Dan, but are not able to success, because the Lord of life in the Dan decorate down the seal of very severe, unless he himself supra shoes to find the key of god of the loss of Dan.
{ "pile_set_name": "Pile-CC" }
Q: Does this code not follow or violate prototype pattern in any way? Instead of getting clone object and modifying attributes, I have first modified attributes of the object and then returned its clone. Is there any difference rule-wise and performance-wise? Also, any other suggestions regarding the design would be great. Thanks. public class Category implements Cloneable { private int id; private String title; private int totalGames; // getters and setters public Category clone() { try { return (Category)super.clone(); } catch(CloneNotSupportedException ex) { return null; } } } public class CategoryCache { private static Category category = new Category(0, null, 0); private CategoryCache() { } public static Category getCategory(int id, String title, int totalGames) { category.setId(id); category.setTitle(title); category.setTotalGames(totalGames); return category; } } while (<100 times>) { Category category = CategoryCache.getCategory(<var1>, <var2>, <var3>).clone(); arlCategory.add(category); // add to arraylist } A: Indeed more than a pattern, Prototype is a work around for increasing performance in Java. The basic thing we need to understand is 'we need Prototype whenever we think that direct creation looks costly, hence we are using a clone of an existing one rather than newly creation. So primarily we replace the creation (new()) with someExistingObject.clone(). So it doesn't matter whether you are changing the attributes before/after cloning, you have achieved the ultimate goal. So the results will be same. The only difference in your way is, the object you are using for cloning purpose (which you are using again and again) most probably will be a dedicated one only for cloning process, and can not perform any other work.
{ "pile_set_name": "StackExchange" }
Q: NGINX SSL Forward Proxy Config I know that NGINX is not supposed to be used as a forward proxy but I have a requirement to do so ... Anyway, obviously it is not to hard to get http to work as a forward proxy but issues arise when trying to configure https. I generated some self signed certs and then try to connect to https://www.google.com and it gives me the error ERR_TUNNEL_CONNECTION_FAILED. The issue has to do with my certs somehow but I have no idea how to fix the issue. Does anyone know how to achieve this functionality ? Here is my config server { listen 443 ssl; root /data/www; ssl on; ssl_certificate /etc/ssl/certs/server.crt; ssl_certificate_key /etc/ssl/certs/server.key; ssl_protocols TLSv1 TLSv1.1 TLSv1.2; ssl_ciphers ALL:!ADH:!EXPORT56:RC4+RSA:+HIGH:+MEDIUM:+LOW:+SSLv2:+EXP; ssl_prefer_server_ciphers on; location / { resolver 8.8.8.8; proxy_pass https://$http_host$uri$is_args$args; } } A: The reason NGINX does not support HTTPS forward proxying is because it doesn't support the CONNECT method. However, if you are interested in using it as a HTTPS forwarding proxy you can use the ngx_http_proxy_connect_module
{ "pile_set_name": "StackExchange" }
I've just spent the last eight days on a boat with Jim and Anna Abernethy, Captain Kurt, Chef Steve, and six British blokes representing Dive Magazine UK, the BBC, and various other fine British institutions (in fact, Jeremy may qualify as a "fine institution" by himself :). We left out of Palm Beach aboard the M/V Shear Water, the Abernethy's wonderful liveaboard, bound for the Bahamas (Little Bahama Bank) with over 500 lbs of crated fish to use as tasty morsels for attracting great hammerhead sharks and tiger sharks. Photographs have been separated into individual categories, and may be accessed by clicking on the links in the menu to the right, or by scrolling down a bit on this page. NEW! - See a mpg video of me shooting this image of a reef shark. Watch for my strobes firing at the end of the clip. Thanks to Jim Abernethy for shooting the clip and for e-mailing it to me. :) If you have something to say, please leave me a comment about this trip in my web journal. Visitors: Warning: date(): It is not safe to rely on the system's timezone settings. You are *required* to use the date.timezone setting or the date_default_timezone_set() function. In case you used any of those methods and you are still getting this warning, you most likely misspelled the timezone identifier. We selected the timezone 'UTC' for now, but please set date.timezone to select your timezone. in /home/ericc/public_html/scripts/txthit.php on line 76 313144 victims since 07.28.04 BAHAMAS SHARK TRIP, TABLE OF PHOTOGRAPHS great hammerheads reef sharks bulls and lemons night dolphins people portraits shark wrangling sunsets topside walker's cay artsy pics misc. photos anna's photos BAHAMAS SHARK TRIP, FEB 20: JEWFISH MOUNTAIN 23:21 - I finally have a moment to myself -- it's been a looong day! We awoke this morning docked in West End for customs and motored off once we had been cleared. By late morning we were anchored at Jewfish Mountain for a day of diving. Gliding around the site were 15-20 Caribbean reef sharks of varying size. Many were curious juveniles who were more than happy to buzz a dome port for a portrait. At around 65' there was a beautiful purple tube sponge surrounded by red and orange sponges, which was perfect for reef portraits of sharks. These were the sort of shots that Jeremy liked (the rest being "crap" :). He paid me a nice compliment by telling me, "normally I'm quite rude to photographers because I don't like their stuff, but I like yours; i like that you naturally shoot with interesting composition." I'm finding him to be an interesting guy. He's only taken two photographs so far. I guess he has enough of these sorts of shots, having authored three books on sharks. At one point I tugged on some fish that was sticking out of our bait box and ended up pulling out a rather large piece by accident. The sharks came *really* close at that point (as I kicked away from the fish, which I had dropped) and I was bumped multiple times as they investigated me and my white strobes. My strobes were given light bites a few times. I think I have my exposures down now. It's a great feeling knowing that I can likely get "the shot," should the moment present itself. Having said that, I utterly failed to shoot any presentable night dolphin shots this evening. We had some dolphin feeding on flying fish near the boat for a couple of hours, and a few of us jumped in to play with them. Geoff was in the water for a full hour in only a t-shirt and trunks! I should have pre-focused my camera, but instead relied on auto-focus assisted by a bright Hartenberger light to illuminate the way. I was able to get some good photos using this method last year, but this time the D60's notoriously poor autofocus mechanism failed to act fast enough, so I ended up with 40 blurry photos. :( Some of them looked like they could have been fantastic, had they been in focus. *sigh* I did get a blurry photo of what looks like a sea snake. I yelled, "snake!" when I saw it, but was told by those watching over me from the boat that it was an eel. Everyone changed their minds when they saw the photo. It's neat looking (although blurry). Also near was a school of a couple hundred small squid that kept appearing directly beneath the boat (coming up from the depths to about 15-20', repeatedly). I'm having a good time with the Brits and their Brit humor. Earlier, someone uttered the phrase, "you could see her tonsils through her rectum." You'd probably never hear an American string words together like that. :) I've retired to my bunk and am typing away here, listening to Vienna Teng before going to bed. It's impossible for me to do any "personal" work out in the galley because of various distractions. :) BAHAMAS SHARK TRIP, FEB 21: MOUNT MOKARRAN 12:21 - Hammerhead!! Two great hammerheads (and a beautiful frigate bird) are circling the boat here at Mount Mokarran. One is probably just over 10', and the other is said to be about the same size (I just spent 45 minutes with one of them and didn't see the other one). Anna did a fantastic job wrangling the shark onto the dive platform, which gave all of us opportunities to get some chomping shots. He (the shark) was completely unafraid, gliding between us at arm's length. 15:05 - When I splashed back into the water the second time, the hammerhead whipped around and swam towards me with great purpose. I took a few blurry photos of him while beating his head lightly with my camera; next time I will be prepared to take proper photographs while I avoid being investigated too closely. Anna said that he came at me three times. :) Down at the bottom there were bull sharks, reef sharks, and lemon sharks wandering around. Jimmy took some shots of a large pregnant lemon shark covered with remoras. I should have explored down there a bit more. One or two tiger sharks came in as well, but they weren't close enough to get photographs of. 22:49 - I was just browsing through some photographs I have here on my computer from the days just before I left on this trip; it seems strange that the people in those images are dressed in San Francisco attire, sitting in my place at a house concert. I sometimes think about how bipolar my life is and wish that I could just be settled/content sitting at home relaxing. Earlier today Brahms' c minor piano quartet lodged itself in my head, and memories of performing it with Livia, Barry, and Fred flashed by. I haven't touched my cello since December 26th. Every time I leave on one of these extended trips, I am away from the other things that make me happy (friends, playing music, etc.). But I suppose it is ok, because I shot some fantastic hammerhead pictures today. :) BAHAMAS SHARK TRIP, FEB 22: WALKER'S CAY 21:41 - As forecasted, the wind started blowing today. We drove around looking for calm seas for most of the day, eventually giving up and coming in to dock at Walker's Cay. Around the shark dive area bull sharks, lemon sharks, and nurse sharks swimming around close to shore. We're booked to swim with the bull sharks there at 8am tomorrow morning. The shark scientist Dr. Erich Ritter (the one who was recently bitten at the bull shark area) is here as well; he was giving a talk in a side room when we arrived. A few in our group have some shared history with Dr. Ritter and were interested in seeing the condition of his leg, but no one mustered up enough momentum to ask about it. We did, however, talk to the person who drove him away from the site to be evacuated. It is said that Dr. Ritter kept repeating, "it was my fault! it was my fault!" afterwards. We've just eaten a wonderful dinner and are now watching "Blue Water, White Death," a documentary with Ron and Valerie Taylor about early shark diving. BAHAMAS SHARK TRIP, FEB 23: WALKER-S CAY 16:24 - The wind is blowing 20-25 knots out of the northwest. We've been confined to the boat for most of the day, but a few of us did venture out for a blustery walk around the beautiful beach at the tip of the island. A small airplane left the smell of burning rubber while landing as we were walking back, and Dr. Erich Ritter came jogging down the runway -- in shorts. I'm amazed that he is able to jog with so much damage done to his leg! I won't describe it here, but I will say that he is lucky to be on his feet. 16:45 - The blokes are all outside trying to bait in a bull shark. John came inside a few minutes ago carrying a small, hollow, red tube. "Guess what was in this tube?" he asked. Yep. It was the handle to a mop pole. The rest of the pole -- with around $12K worth of camera gear attached -- had fallen off and was laying in the sand. Luckily, the water is shallow, and Captain Kurt managed to fish it out with a large hook. Boys will be boys, I suppose. :) Both Jimmy and John have been trying to get close-up footage of Bahama Mama (a large local bull shark) for awhile now. BAHAMAS SHARK TRIP, FEB 24: DODDSR 16:09 - We left this morning and are now anchored at a site lovingly referred to as "Drop Over Dead Dog Snapper Rock." There are a few Caribbean reef sharks circling around, and some distance from the anchor line is a grouper spawning aggregation (at a sandy patch in 110' of water). Many pregnant groupers are there, along with a large school of Bermuda chubs (also spawning). The school of chubs followed me while I swam around the sandy area, but the grouper were rather paranoid, and I was unable to get close to them. The wind is still blowing pretty hard, and the swell on the surface made it difficult to get back onto the boat. 21:56 - We're anchored at Lilly Bank now, in calm water for the night. In the morning we return to Mount Mokkaran, the site of our first hammerhead sighting. All of us are praying for a large tiger shark. :) BAHAMAS SHARK TRIP, FEB 25: MOUNT OLYMPUS 17:14 - Mount Mokarran was too rough this morning, so we ended up anchoring at Mount Olympus, a gorgeous reef, by Bahamian standards. It is covered with nice sea fans and colorful sponges, but unfortunately the visibility was poor (because of particles in the water and a deep thermocline) so we continued to El Dorado for the remainder of the afternoon. There are some really large reef sharks at El Dorado. Jimmy snapped the metal ball off of Anna's Sea & Sea strobe arm mount during the first dive. Things like mounting balls really should be indestructible! I don't think my ULCS balls would have been that easy to break off. Anyway, we tried using the Pasco Fix magic glue that the Austrian guy at the Miami Boat Show sold us, and the glued-on ball stayed in place for most of the second dive, but broke again when Anna was adjusting her strobe position. We're going to glue it again tonight and let it cure all night. BAHAMAS SHARK TRIP, FEB 26: MOUNT MOKARRAN 22:05 - Two great hammerheads came in today, but neither of them were "players". A small 7' one swam circles around Jeremy and only came up for bait a few times before disappearing off into the murk. A larger 11-12' one (with disfigured pectoral fins, Jeremy says. he even drew an illustration for us.) was off further in the distance, circling the boat. Its dorsal fin was enormous! Jim and Anna have seen great hammerheads as long as 18', but this 11-12' specimen was the largest one I have ever seen. I followed it, drifting with the current until I was further from the boat than I wanted to be. Even though I knew I wasn't in any real danger, I had to suppress the slight panic that was welling up within me. (Imagine: the visibility is around 90' or so, but it's a milky view all around. You look up and scan the brightness above for the tell-tale shadow of the boat, and it is nowhere to be seen. A large hammerhead is circling just out of sight... :) Although I don't get "lost" that often, it's always like that for me during the moment I realize that I have no idea where the boat is. At the bottom 90' below, four bull sharks (two large and two small), a few reef sharks, and two lemon sharks (one of them was 8-9' long!) patrolled, but they didn't seem to be as friendly as the sharks we've seen elsewhere. I was unable to get close enough to any of them to take a decent photo. I did, however, take a nice photo of the bow of the Shear Water from beneath the water, with thin ribbons of perfect light streaming downward from around it. We're anchored here for the night. Jimmy says that there are often tiger sharks pacing around in the early morning after a night with bait left out. "I just hope that if one comes by it isn't big enough to try to eat the crate itself," he said. I'm planning on going in with him first thing in the morning. Hope there's something fun out there. :) I had another "what the HELL am I doing with my life!?" moment this evening while I was sitting at dinner between two conversations. I have no idea how I'm going to figure it out. Part of me just wants to settle down with a "normal" job. There's tremendous security in that, and as a bonus I would be able to develop my local friendships in a way that would alleviate some of the frustration I've been feeling lately. Argh. BAHAMAS SHARK TRIP, FEB 27: MOUNT MOKARRAN 22:41 - The Coast Guard just stopped our boat to see if we were smuggling drugs. As they came close enough to see us, one of the shouted, "Is that Mr. Abernethy?" It helps to be known. :) Today was a fantastic day of hanging out with sharks. Jimmy never woke me up in the morning; instead, I was shaken into consciousness by an increased swell that repeatedly threw the bow of the boat up and down. I spent most of the morning hanging out in the galley, waiting for an interesting shark to appear. By 11am, we had two hammerheads and a tiger on the bottom, investigating two crates of fish that had fallen off of the bait line. Unfortunately (for the rest of us), only Derek was in the water at that time, but one of the hammerheads turned out to be a player and circled around us until the sun went down. It was around 10' long. A smaller tiger shark was also in the water with us for much of the day, but it was extremely skittish and was chased away by the hammerhead whenever it came close to us. I saw it a few times off in the distance, but it never ventured close enough for me to get a photo. Several large bull sharks were at the bottom, along with a couple of nice looking lemon sharks (which carry a permanent, sinister smile on their faces). By the end of the day, they were getting close enough to us for photographs. It is apparently a great thing to get bull shark photos with relatively clear water. I've heard that they can be nasty, but haven't had any experience with them before this trip. At Walker's Cay, it is easy to get close to bull sharks, but the visibility there isn't as good unless you are lucky enough to have the opportunity to go in without hordes of other people. Simon seems to attract hammerheads when he returns to the boat from the water. A few times now Anna has wrangled in hammerheads literally to the swim step while Simon was trying to get onto it. When it happened today, he looked up from the water and yelled, "Stop your damn wrangling, woman!" :) The good barrister Derek wrangled for awhile today. I imagined him wearing a wig. He has 11 weeks of vacation a year, and he takes every day of it. Europeans REALLY know how to balance work and play properly! Everyone almost literally jumped out of the water back onto the boat when five or six bull sharks came charging up from 80' to greet them at the surface. Not long after Jimmy dumped in an old, useless crate of fish, one of them came straight at me as well. I took a picture and kept my camera between me and it. :) Another interesting event: a hammerhead stole one of our 69-cent styrofoam floats; it bit straight through the rope (eating the bait), and the float ball drifted off the stern in the current. At Anna's urging, Jimmy promptly donned fins & mask and dove in to retrieve it. The same gang of bulls who had earlier expressed interest in the others on the surface immediately charged up again to investigate. After all, the light-colored things in the water previously were fish carcasses. :) Jimmy thrashed around in circles, coming up a few times to yell, "Shit!" Jeremy happened to be coming back to the boat at that time (we promptly sent him back out to help), but a few moments later, Jimmy stuck his head up out of the water and yelled, "I need a camera!". Typical. :) Jeremy told us that he was thinking, "who's the idiot snorkeling with the bull sharks?" At Walker's Cay there is a strict rule that you must be totally encased in black to get in with the bulls. Erich Ritter was bare-legged when he was bitten there.
{ "pile_set_name": "Pile-CC" }
Economical and green biodiesel production process using river snail shells-derived heterogeneous catalyst and co-solvent method. River snail shells-derived CaO was used as a heterogeneous catalyst to synthesize biodiesel via transesterification of palm oil with methanol. The shell materials were calcined in air at 600-1000°C for 3h. Physicochemical properties of the resulting catalysts were characterized by TGA-DTG, XRD, SEM, BET, XRF, FT-IR and TPD. CaO catalyzed transesterification mechanism of palm oil into biodiesel was verified. The effects of adding a co-solvent on kinetic of the reaction and %FAME yield were investigated. %FAME yield of 98.5%±1.5 was achieved under the optimal conditions of catalyst/oil ratio of 5wt.%; methanol/oil molar ratio of 12:1; reaction temperature of 65°C; 10%v/v of THF in methanol and reaction time of 90min. The results ascertained that river snail shells is a novel raw material for preparation of CaO catalyst and the co-solvent method successfully decreases the reaction time and biodiesel production cost.
{ "pile_set_name": "PubMed Abstracts" }
Effect of clonidine early in life on brain morphofunctional deficits induced by neonatal malnutrition in the rat. A great body of evidence indicates that malnutrition early in life induces central noradrenergic hyperactivity (CNH). On the other hand, it is known that noradrenaline (NA) is an important regulator of the regressive processes occurring during synaptogenesis such as cell death, axonal pruning and synaptic elimination. This leads to the hypothesis that some of the morphofunctional modifications induced by malnutrition on the brain could be due, at least in part, to an increase of NA activity during the period of accelerated brain growth. This study evaluates whether early reduction of CNH by the alpha-2 presynaptic adrenoreceptor agonist clonidine, prevents long-term morphofunctional deficits induced by protein-energy malnutrition in the rat. Results of experiments performed on 45 day-old malnourished animals that received clonidine during the suckling period, show that the pharmacological treatment prevented: (i) deficits in both NA levels and NA release in the visual cortex; (ii) deficit in brain weight but not in body weight; and (iii) reduction of the normal brain interhemispheric asymmetry of visual cortical evoked potentials. It is suggested that administration of clonidine early in life prevents brain morphofunctional deficits by malnutrition, by restoring the normal tropic role of NA during synaptogenesis.
{ "pile_set_name": "PubMed Abstracts" }
#!/bin/bash if [ -z "$1" ]; then echo "This script must be called with an argument" >&2 exit 1 fi /usr/local/bin/mine $(script/find_spec_or_impl.rb $1)
{ "pile_set_name": "Github" }
Noida grows, but poor infrastructure, closure of industries haunt Noida, April 17 (IANS) Despite being a virtual extension of India’s national capital, this industrial hub, software centre and leisure destination still laments over poor power supply and roads, making the hunger for such essentials as well as the closure of industries major election planks. Close to 10,000 industrial units dot this city, technically in Uttar Pradesh but bordering New Delhi. Just a fourth of them function. Rising crime and poor infrastructure have only fanned the angst of the 250,000-strong electorate. “The government in power has only traded stones and erected statues,” said Samajwadi Party contestant Narendra Bhati, seeking to blame both the central and the Bahujan Samaj Party (BSP) government of Chief Minister Mayawati for the lack of development. “Little has been done to look after the development of the state as a whole and this city in general,” Bhati told IANS, promising to bring change if elected. For Noida Entrepreneurs Association president Rakesh Katyal, jobs, or the lack of them, was a major issue, as only 2,700 industrial units were functioning out of 9,700 that had set up shop here. “The financial slowdown has eaten up small and medium industries and the rest are hit by high value-added tax. But the government does not appear to be concerned.” Then there is mafia - and crime. “The city is transforming from an industrial hub to a crime hub,” Aditya Ghildyal, general secretary of the Association of Greater Noida Industries, told IANS. It was here that the infamous serial killings of children took place and gory tales of cannibalism hit global headlines. And it was again here that the chief executive of a multinational firm was lynched in broad daylight. “Industrialists and we residents are scared to step out of our houses in the night. Why talk about night, there are incidents taking place in broad daylight,” said Ghildyal. The suburban city which was earlier part of a reserved constituency, Khurja, has become Gautam Buddh Nagar constituency after delimitation. Home to nearly 400,000 people, this booming city has seen for almost four decades migration of people from all parts of the country, both for job and for a home of their own. Noida has become a major residential hub as people took up apartments in the suburb’s high rises, strewn across the city, at most competitive prices, little knowing that they would have to later regret their decision. Little wonder then that Satya Verma, an employee of information technology major Hindustan Computers Ltd, who was once elated getting a job in Noida, now regrets his decision. “Development is restricted to some areas. Water is dirty. Electricity supply is poor. There are potholes everywhere. Theft and burglaries are routine,” he said. “It is hard to believe that there are so many software companies here - many of them catering to Fortune 500 companies,” he added, a view shared by Sunit Rai, a public relations executive who lives in Sector 62. “Why blame politicians alone? It seems people are also comfortable with big shopping malls mushrooming in the city. They do not really seem to care about basic needs like infrastructure,” Rai said. The suburban city boasts of international-style shopping malls highlighting the glaring differences in the two parallel ecosystems that runs in the city. The Great India Noida Place - a one kilometre long mall - and other shopping marts like Centre Stage Mall, Spice and many more are some of the examples of its glamorous side. Then there is the Atta market, a shoppers paradise for the middle-class, which houses almost everything a household would need at very competitive prices. The Bharatiya Janata Party’s (BJP) Ashok Kumar Pradhan won the 2004 polls from Khurja with an impressive margin of 41,350 votes. He is contesting this time from Bulandshahr and Mahesh Sharma, owner of the well-known Kailash Hospitals and a doctor himself, is the BJP candidate from Noida. “We want maximum number of people to come out and vote no matter whoever they vote for,” BJP vice-president Chiranjeev Mahajan said. “What this city needs is an educated leader who would understand policies and not any someone who would only grow richer with the nation’s money.” The Congress got only 18.16 percent of the votes in 2004. This time, it has fielded Ramesh Chand Tomar, who was in the BJP for years and switched to the Congress recently. The BSP too has a new candidate this year - Surendra Nagar, who has huge resources at his disposal being the owner of Paras Milk, a Rs. 600-crore dairy business.
{ "pile_set_name": "Pile-CC" }
Q: global/inner variable conflict? (python) Sorry for the stupid question, I'm a newbie programmer. But can anyone tell me why the following program behaves this way? def lol(a): a=[] a.append(1) return a Now when I do k = [2, 3] lol(k) It returns 1, but k is still unchanged? Why? Thanks a lot! A: In lol(a), the line a=[] binds a to a new list. After this line, a is no longer bounded to the same list than k. So what you're actually modifying in your function is a new list, not the list that you received in argument. For further information, see the docs. If you want k to be [1], then you could write something like this instead: def lol(a): a[:] = [1] return a k = [2, 3] lol(k) # now k is equal to [1]
{ "pile_set_name": "StackExchange" }
Radio Crowd besieges Danish Tehran embassy A crowd of over 1,000 people tonight attempted to storm the Danish embassy in Tehran, which sits behind a high wall in the north of the city. After they rammed the metal gate to the compound, police drove them back with teargas and arrested some. Firefighters were seen trying to put out a fire inside, apparently caused by a firebomb. Earlier, hundreds of demonstrators pelted the Austrian embassy compound with petrol bombs and rocks late, as protests over cartoons portraying the Prophet Mohammed spread across the Muslim world. Denmark had previously asked the Iranian authorities to increase security at the embassy, following weekend attacks on its embassy in Damascus and its consulate in Beirut, which were both burned by angry demonstrators. Iran's commerce minister announced today, however, that all trade with Denmark had been suspended. Anger at the cartoons rose across east Africa: at least one person was killed in a protest in Somalia and Djibouti banned the import of Danish products. In Kenya, the country's main Islamic group announced plans for a mass protest against Denmark. Qatar's Chamber of Commerce said it had halted dealings with Danish and Norwegian delegations, urging Muslim states to do the same. In Bahrain, parliament formed a committee to contact Arab and Islamic governments to enforce the boycott. In Strasbourg, the Council of Europe described as 'unacceptable' the violence of the past few days. Freedom of opinion and expression is protected by European human rights law, 'even in cases when the views expressed were offensive,' said Secretary General Terry Davis. Denmark told its nationals to avoid Muslim countries even as it pursued diplomatic efforts to defuse tension over the publication of the cartoons. The foreign ministry warning lists 14 Muslim countries travellers should avoid following violent protests against the cartoons, which first appeared in a Danish daily. Earlier today, there were demonstrations and riots across muslim Asia against the cartoons Authorities in Afghanistan say three people have been killed during clashes between police and protestors. Two were killed in gunfire from among protestors at the main gates of Bagram Airbase, 60km north of the capital Kabul. A crowd of about 5,000 people had gathered to protest outside the US-led coalition's Bagram headquarters. Five protestors and eight police officers were wounded in the incident. And in the eastern province of Lakhman, a third protestor died after being shot during a demonstration. In Somalia, a 14-year-old boy was shot dead and several others were injured after crowds attacked police. There have also been demonstrations in Indonesia, India, Gaza, Thailand and New Zealand. The cartoons were first published in a Danish newspaper in September and have since been reprinted in several publications, most of them European. UK police have govt support The British government has said the behaviour of some Muslim demonstrators outside the Danish Embassy in London in recent days was completely unacceptable. A Downing Street statement added that the police would have the government's full support in any actions they wished to take as a result of the protests. Police have been criticised for failing to arrest some of the London demonstrators, as they carried signs threatening to kill those who published the cartoons of the Prophet Mohammed. Earlier, some of Lebanon's political leaders accused Syria of being behind the attack on the Danish embassy in Beirut yesterday. The mission was ransacked and burnt during the violent protests. The attack on the embassy has resulted in the resignation of Lebanon's Interior Minister, Hassan Sabeh.
{ "pile_set_name": "Pile-CC" }
FBI director: Cover up your webcam - grej http://thehill.com/policy/national-security/295933-fbi-director-cover-up-your-webcam ====== 6t6t6t6 From all they ways I can be spied, the webcam is the one that concerns me the least. At the end, all they will see is a bearded man staring to the front. May they be able to see me naked? Well, probably, but I honestly don't think that they will make a lot of money by selling my naked pictures... My wife tells me that I still look good, but I suspect that she is being nice to me. What would scare more is that they manage to capture what is on my screen, or install a keylogger, or activate the microphones to hear my conversations, or that they access my hard disks and steal data, including my private keys. Hey, but putting a sticker on your webcam is a way to show how 1337 your are! I prefer not to have to bother removing stickers every time I want to do a Skype call. ~~~ matt_wulfeck You're displaying a common trope I see sometimes with security: > "because this particular thing does affect me personally, it doesn't matter. > And because it doesn't matter to me it doesn't matter at all" Blackmailing people with pictures taken from webcams is not theoretical. It happens[0] and it's good advice to tape up your cam. It may not affect you personally, but it may affect your wife, daughter, or sister in a much more sinister way. Believe it or not this kind of thing can ruin someone's life. [0] [http://www.computerweekly.com/news/2240209018/US-teen- hacker...](http://www.computerweekly.com/news/2240209018/US-teen-hacker- pleads-guilty-to-webcam-blackmail) ~~~ iceman99 I know someone whose camera and microphone were taken over. A window showed on her computer where the person watching her chatted with her and told her things that he only knew because he was watching her. It scared her to death and made her cry. Beyond blackmail, it is probably close to the psychological equivalent of a stranger just suddenly appearing in your home watching you. I think that every electronic camera and mic device should have a hard switch/button that physically disables both the camera and mic. Having to use tape or a cover does not keep you from being spied on; it only eliminates the visual spying. The attacker can still listen. ~~~ zyngaro Smartphones represent a bigger security risk in that regard. Front facing rear facing, mic all ones personal data, pictures and so on. ~~~ JohnStrange Hardly. You put your phone on the desk and it's going to show the ceiling. In contrast to this, people do all kinds of weird things in front of laptops. I've even heard once of someone who allegedly masturbated (!) in front of a laptop. Of course, that must have been an extreme outlier ... ------ janvidar Isn't this really just a sign of flawed hardware design? In my opinion hardware should be designed so that the camera LED lamp should always be lit if the camera is used. If there is a malfunction with the LED, then the camera should also not work. Also there should be a hardware LED for when the microphone is being used which should work in the same fashion for laptops with built-in microphones. In the webcam drivers I have looked at the LED is controlled independently of capturing, although drivers do enable the LED when the camera is used. This essentially means that hackers can record and disable the lamp. I've been considering hacking together some piece of software that will continuously use the camera (/dev/video) in order to block it for other applications, and have it fail with visible alerts if unable to block the camera. Not sure if the same thing can be achieved for the audio recording devices due to multiplexing. ~~~ awesomerobot >If there is a malfunction with the LED, then the camera should also not work. Many would argue that this is the more flawed design. ~~~ Kadin It seems like a "fail safe" to me. The current design is a bit closer to a "fail deadly" in that it creates a mode that's the worst-case from the user's perspective: the camera works but the indicator doesn't. It is probably worse to have an unreliable indicator light than it is to not have any indicator light at all. ------ _Codemonkeyism "The head of the FBI on Wednesday defended putting a piece of tape over his personal laptop's webcam, claiming the security step was a common sense one that most should take." One needs to ask why is the head of the FBI telling you this? Cui bono? This is a red herring. The FBI has no interest in filming you through your webcam. They want to listen to your microphone, watch your screen, get the keys you've typed, see the websites you've visited, read the emails you've sent. Watch you on video? Nah. This is a red herring. That is the reason the head of the FBI tells you to cover your webcam. I wish the The Last Psychiatrist would come back. ~~~ tingol The FBI isn't telling you this so you could protect yourself from the government. They are telling you this because they know how easy it is for someone else to take control of the camera and make your life hard. So it is a common sense step for you to take if you're concerbed about security. You took a pretty huge jump from that to the FBI listening to your mic. ------ ipsin If you're so concerned about having your webcam subverted, it seems like the first step would be to insist on a hardware LED that can't be subverted in firmware. If nothing else, it would serve as a canary, indicating that your machine has been thoroughly compromised. ~~~ gkoberger And who do we trust to do that? More importantly, is it even possible? ~~~ krastanov In terms of electronics it is fairly trivial and it can be inspected by eye (or microscope) if the manufacturer decides to not encapsulate everything on a chip (which presumably would be the point of such a feature). Just have the only positive voltage rail going to the camera be the same one that is directly powering the LED. The firmware will be turning this rail on and off, hence turning the camera and the LED on and off simultaneously. ~~~ 1_2__3 Idle though on possible attack vectors: Convince the firmware to use a lower voltage, one that doesn't hit the breakover voltage on the LED but still powers the camera. Strobe the line, get snapshots without the LED doing more than very faintly glowing. ~~~ umanwizard LED activation voltage is less than what cameras typically require. ------ white-flame I said it then, and I say it now: \- Encryption is our webcam tape. That tape cannot be thwarted by any remote attacker, legally warranted or not. It's perfect, unbreakable security from webcam visuals being exfiltrated, exactly the security features that Comey says we shouldn't be allowed to have for our data. ~~~ pdkl95 "What if everyone believed that law-abiding citizens should use postcards for their mail? If a nonconformist tried to assert his privacy by using an envelope for his mail, it would draw suspicion. Perhaps the authorities would open his mail to see what he's hiding. Fortunately, we don't live in that kind of world, because everyone protects most of their mail with envelopes. So no one draws suspicion by asserting their privacy with an envelope. There's safety in numbers. Analogously, it would be nice if everyone routinely used encryption for all their email, innocent or not, so that no one drew suspicion by asserting their email privacy with encryption. Think of it as a form of solidarity." ~ Philip Zimmermann, "Why I wrote PGP" [https://www.philzimmermann.com/EN/essays/WhyIWrotePGP.html](https://www.philzimmermann.com/EN/essays/WhyIWrotePGP.html) ~~~ drvdevd A brilliant point and a salient quote. Why must we continue to live, collectively, with our heads in the sand? ------ meowface I know this thread will probably get politicized, but I see nothing wrong (or necessarily hypocritical; he's law enforcement, not IC) with his advice here. ~~~ waterphone It's not a bad thing to do, it's just hypocritical of him to value his own privacy but tell everyone else they need to give up theirs and let the FBI and NSA have access to everything they want to keep private. ~~~ nathancahill Why would you be concerned about the FBI or the NSA knowing about the content of your digital communiques if you have nothing to hide? Even the most ardent supporter of personal freedoms will admit that the government observing you over a network is the same as taking pictures of you with a telephoto lens on a busy street. The truth is the same: there are too many people and you aren't special enough to deserve personal surveillance. ~~~ anexprogrammer > there are too many people Oh _please._ They can probably harvest the lot. It'll be some algorithm that deems you worthy or otherwise or gets you on an "of interest" list. Let's keep "personal surveillance" for '50s spy movies and Banksy murals. More generally, what about the chilling effect on legal and legitimate conversation? ~~~ jeremysmyth _It 'll be some algorithm that deems you worthy or otherwise or gets you on an "of interest" list._ ...or your association with "Occupy" or some other political protest movement that someone in power disagrees with, or that your wife bullied some politician's wife for two weeks in school, or that your interfering neighbour with a petty dislike of how you landscape your garden works as a government clerk and can access your data. There are many reasons why some individual might want to know private things about some other individual. When individuals with some tiny (or vast) power want to wield it over _anyone else_ , especially when they can do it with little oversight, it's very tempting. That "the government" has access to my private information does not mean it's blind and faceless. It's made up of people with complex motivations. ------ sotojuan The webcam cover up is interesting to me because it's the only "weird privacy thing" I've seen regular, non-technical people do. A good amount of people at my university, most of which use social media liberally and don't care about encryption, cover their camera up. ~~~ pseudonymcoward This is only idle speculation but: A web cam resembles an eye staring at you all the time. This makes people feel weird, like something is staring at them. The threat to privacy is right in their face and on a gut level. That's the reason so many people cover them even when they won't take other basic online privacy precautions. ~~~ Sylos Also just in general, people understand what a camera does. It's much harder to understand the implications of abstract "data" going off onto the internet. ------ rdtsc This is like the coal burning power plant telling you to make sure to sort your recyclables into appropriate containers, to make the environment cleaner. Also people enjoy and feel good about accomplishing small things. Putting a sticker on your laptop is a small easy task. Do it and they feel more "secure" in an instant. ------ benevol Every electronic communication device (laptop, mobile, tablet, etc) should have _1 hardware switch per sensor_ (camera, mic, motion/acceleration, etc) which disables the sensor. Why manufacturers still haven't introduced this is beyond me. ~~~ pwg >Why manufacturers still haven't introduced this is beyond me. Expense and lack of demand. Some older laptops used to feature hardware kill switches for the wifi (this was prior to the advent of a camera in every laptop). The old Dell D820 model was one such laptop. Eventually they were dropped all around because from the makers point of view, the presence of the switch had no effect on the sales of the laptops. Anything you add to the BOM (Bill of Materials) for the device raises the final net cost, and there is still enough competition in the laptop/phone space that keeping the costs down is necessary to compete. Additionally, twenty-five cents per unit does not sound like much, until of course you multiply that by 10+ million units built (where a twenty-five cents difference per unit amounts to $2.5+ million difference in the end). So if having the switch or not having the switch made no difference in sales, the maker could either raise their profit, or lower their price (or more likely split the difference) by dropping the switches. The lack of demand is that not enough purchasers are telling manufacturers they want hardware on/off switches (the purchasers do this by buying only laptops with them, and by not buying laptops without them [which may be difficult to bootstrap now, given that almost no laptop has a hardware on/off switch anymore]). ~~~ jcadam I've found many of those supposedly 'hardware' wifi kill switches were software controlled (When I installed Linux on an old Dell, it completely ignored the state of the wifi switch). I want a switch that physically cuts power to a device, but no... :( ------ Hilyin I guess this is just as good place as any to bring this up. In current OS X, you cannot disable your mic. You can turn down the input volume, but never disable. All malware needs to do is raise the input volume and it can listen to you to its hearts content. And its worse with your iPhone. ~~~ the_common_man Can someone confirm if this is actually true? Sounds too far fetched that you cannot disable the mic (i.e not muting, I assume?). ~~~ Hilyin Just look around on the internet, you'll find the same thing. I researched this a few weeks ago and was amazed. You basically have to disable the audio driver in OSX to disable it, and doing that, means you can't play audio at all. And even that isn't enough, it technically can be hijacked at an even lower level. ------ ssebastianj I was looking for a way to cover the mics and webcam integrated in my laptop which doesn't require a tape. So, I grabbed a couple of those magnets stripes usually found on fridges and then , using a scissor, made two little rectangular stripes and a larger one. Next, I glued the little stripes on the laptop, near close the mics. The nice thing is that the large stripe covers both, the mics and webcam. For me, it's an easy way to cover/uncover fast. ------ boxkite I keep mine covered because I work remotely a lot and I don't want to accidentally shirtless video chat someone from bed when I meant to make a different type of call. ~~~ 3chelon It was unusually hot and I actually did that myself just the other day - embarrassing! ------ conradev I use a MacBook Pro as my daily driver, but I recently purchased a Lenovo ThinkPad to play around with. Sometimes I forget how awesome it is to have a repairable and modular computer. I didn't want the webcam or microphone in the ThinkPad… so I took 30 minutes and removed it. Easy as that. ~~~ csydas Well,to be fair you could just open the MacBook Pro and unplug the ribbon for the webcam. iFixit will have instructions. Removing it entirely granted is another matter, involving opening the screen, but you'd have to do the same on any modern laptop with an integrated camera wouldn't you? ~~~ wruza For my mac I just used a knife to open screen and shoved black paper strip before camera. ------ greglindahl I experimented a bit with an Apple laptop microphone, and it took 2 layers of electrical tape to block the mic. There doesn't appear to be any way to block an iPhone mic without blocking the speaker, too, and I'm not confident that it could be blocked at all. ------ mpetrovich But what about his computer's built-in mic? Unless he's pantomiming all sensitive info... ------ neom It's pretty sad that he used the word "authority" in this sentence: You do that so that people who don’t have authority don’t look at you. I think that’s a good thing.” ------ throwaway13337 It's relatively common to have access to private security cameras. Some are even google indexed. The software included relies on the users protect the web interface. Obviously, this is the vulnerability. Especially with things like default passwords. Here's an article about it: [http://www.networkworld.com/article/2844283/microsoft- subnet...](http://www.networkworld.com/article/2844283/microsoft- subnet/peeping-into-73-000-unsecured-security-cameras-thanks-to-default- passwords.html) A lot of these cameras are controllable and have speakers. People now do live video streams of pranking people through this means. Pictures: [http://imgur.com/a/0WImd](http://imgur.com/a/0WImd) ------ skybrian Back in the day, SGI workstations had a hardware shutter. I still think it's a good idea. ------ 24gttghh My Asus 1015PEM netbook from 6 years ago has a physical screen that slides over the camera; sliding the screen also turns on the camera. Why don't more laptops have this feature if this is such a 'big deal'? ------ throw2016 The hacker news readership is focussed on startups and technology. It's a career, a business and in some cases an interest in technology. So privacy as a social good may not be the primary perspective and it often devolves into how this affects readers personally rather than the society they live in or side tracks into technology nuances. Technology is enabling new negative possibilities but it does not follow that technologists can make a difference. There is no ethical code of conduct. Like everyone else they are another cog in the wheel and software engineers may not have an interest or priority on privacy, social and political issues. There are a large number of folks working in the nsa, gchq, google, facebook, palantir, hardware vendors and elsewhere actively enabling this. Like technology itself politics, liberty, privacy and the evolution of modern system from the time of feudalism requires interest and priority. From this perspective the need to tape up your webcam may have completely different ramnifications. ------ xcasperx I agree with what most people are saying on here, but I believe there's a bigger picture to it. Let's say that your computer has been completely 'pwned', and that you are currently reading an article with an ad for Cow Porn, or whatever, on the right hand hand side of the site. The hacker can write some code to check what your eyes, and eyebrows, did when you looked at the ad. If it peaked your interest, the hacker can maliciously add more 'Cow Porn' ads to sites you visit - via swapping out the regular ones. Now one day you get curious and click on it, and boom they take a screen shot and try to blackmail you. This is obviously quite outlandish but think about purposefully planting posts, lets say on reddit, by switching out posts. They then look at your head movements, and, or, eye movements then boom, you're added to some list that you wouldn't have be added to if it weren't for your eye movements. ------ dingo_bat I have never covered my Webcam because I trust the light to come on if the camera turns on. Is it possible to bypass that led? ~~~ Steuard In addition to the attacks that others have mentioned here, I've also heard folks comment previously on the possibility of turning on the camera very briefly, just long enough for a single still shot. If it was done fast enough, the brief flicker of the LED might not be noticeable. (Like you, I had always assumed that the power for the webcam was literally in series with the LED, so that disabling the LED would render the camera inoperable. That seemed like the obvious way to do it if you wanted to provide a truly reliable signal. But evidently that's not the case.) ~~~ abraae Perhaps you mean in parallel. An LED is driven by 20 mA, whereas a camera requires more like 200 mA, so it's not feasible to wire them in series - either the LED will burn out or the camera won't power up. ~~~ Steuard Yeah, I was pretty sure I was being a little sloppy by using the term "series" (for shame, physics prof, for shame!), but I was hoping to evoke the general sense of "if current doesn't flow through the LED for any reason, the camera can't turn on." Honestly, I'm not 100% certain offhand of a way to wire that (which is why I didn't want to be specific earlier, despite using a specific term: shoulda added some weasel words :) ). Do the LED and the camera run off of the same _voltage_? (If not, then parallel wiring won't work, either.) ------ pjc50 Previously: [http://www.independent.co.uk/life-style/gadgets-and- tech/yah...](http://www.independent.co.uk/life-style/gadgets-and-tech/yahoo- webcam-users-intimate-images-intercepted-by-gchq-spy-programme-snowden-files- reveal-9158140.html) ------ eosrei What about the cameras in your phone and the microphones in everything? Security theater isn't security. ------ krinchan I'm about to die laughing at the hoops people are jumping through in the comments to claim they've never pulled up some porn and enjoyed themselves in front of their laptop. Ever. _EVER_ ------ laurent123456 This article describes how to turn off the led light on Windows, which is surprisingly easy: [http://blog.erratasec.com/2013/12/how-to-disable-webcam- ligh...](http://blog.erratasec.com/2013/12/how-to-disable-webcam-light-on- windows.html) TLDR: Webcams follow the UVC standard and, according to this standard, the LED indicator light is controlled by the host software. So a simple hack is to find the webcam driver DLL, find the function that controls the LED (such as TurnOnOffLED()), make it return immediately, done. ------ tedmiston Does anyone feel the need to cover their iPhone front facing camera? ~~~ e1ven Yes. I cover both the cameras on my phone with tape, and only remove it when I want to take a picture. That said, I have a lot more faith in the security of a whitelist-based model like the App store, versus the blacklist model of a PC with antivirus. ------ foobarcrunch Unless you're using Prey[0] and want an opportunity to photograph would-be crooks. [0] [https://preyproject.com](https://preyproject.com) ------ markyc in this day and age how come we don't see laptops carry a physical on/off switch for the microphone and camera? ~~~ Shanea93 This is the day and age of removing headphone jacks to make a phone slimmer, taking away your disk drive, etc. Most companies care more about aesthetics than functionality at this point. ~~~ ojii can I have a laptop without a webcam/integrated mic then? ~~~ soylentcola How courageous of you! ------ awesomerobot Also remove your microphone and don't use a keyboard? If I were hacking you I'd _much_ rather log your keystrokes or hear what you're saying. The number of scenarios where having a visual would be useful would be incredibly low by comparison. Putting a sticker over your webcam is like putting a lock on a screen door. ~~~ maxerickson Most screen doors I can think of do have locks. Even quite home made ones often end up with a hook that kids can't reach. ~~~ awesomerobot That's my point. It does one thing, but it's by no means security. ------ piedradura I prefer to have a computer composed by parts, so I attach the webcam to the computer when I need to, same thing for the audio and many other applications. I only need 1k of ram to send a secret message, so no virus or malware could be in my tiny computer. ------ zelos Didn't all Sun webcams used to have little irises that you could close on them? It seems like a sensible precaution: makes it less likely I'll accidentally log into a company conference call in my dressing gown with my camera enabled. ------ whitenoice Just saw the prescreening of snowden movie with online live event with movie cast and snowden post movie, and this was exactly what was depicted in the movie and in the event talk. ------ andrewflnr So the guy who decries "going dark" when it comes to encryption wants us to literally go dark with our webcams. It's like a dystopian comedy setup. ------ JustUhThought At some of my house parties I require guests to check their phone at the door. Price of admission. (I keep a landline and am ok with giving that number out as an emergency contact number). Boy does this get the conversation started. I can tape my phn camera, but what about the other 20 phns in the room? I have no control over them to keep them from posting photos of me drinking or whatnot during a party, photos I do not want online. From the tin-hat perspective one must do (much) better than consider their personal devices. One must consider _all_ devices in their _personal proximity_. ~~~ GarrisonPrime It'd be amusing to have a little Faraday cage by the door for them to deposit into. :) ------ demonshreder Aren't these attacks primarily for Windows? Would using Linux (say Arch) mitigate these? Edit: Shouldn't we be more concerned about phones and tabs? ~~~ facepalm Nice attempt at humor :-) ------ codethief In case anyone's looking for something a little bit more sophisticated than a sticker to put on his/her webcam: [https://soomz.io/detail/webcam_covers_a10](https://soomz.io/detail/webcam_covers_a10) Been using it for a while and it works like a charm. (Though on a phone it does tend to attract a bit of dirt and the color wears off over time. If you keep your phone in the pocket of your pants, that is.) ------ chrischen Quick question for HNers: why isn't something like the camera insicator light implemented for the microphone? ------ SG- Anyone know what kind of laptop he uses? ------ wickedlogic Please cover your webcam, it is distracting while we are trying to listen to what you are clicking on. ------ listentojohan What I don't understand is why he has to defend it? (Yes, it might seem hypocritical.) ------ bobsoap Instead of a sticker, one could also use this clever, simple, magnetic gadget (not affiliated): [https://www.kickstarter.com/projects/1893116150/nope-20-live...](https://www.kickstarter.com/projects/1893116150/nope-20-live- free) ~~~ bobsoap Seriously, downvoted without an explanation? That's quite poor. If something about my post offends anyone, I'd love to know about it. ------ mangeletti I swear this is a true story: I worked at Staples when I was 19, and when I first started I was a "front end lead" (read: the only full-time cashier), so I would work behind the service counter at the front. Once, I was standing up front while there were no customers when all of the sudden the voice of the general manager (we'll call him Bill) popped onto the phone's speaker, "Hey, Michael". I looked up and noticed the light next to "Manager's Office" was on. I instinctively replied, "Hey, Bill; what's up?", despite the fact that it nearly gave me a heart attack. Bill proceeded to tell me to run something he needed to the back, which I did, and that was the end of that. Then, one day I was helping a customer with some Cross pens behind the counter. I stood up to grab a key that was next to the register when I noticed out of the corner of my eye that the phone's "Manager's Office" intercom light was on. It made my heart jump because I hadn't talk to anybody through it, and I knew that Bill was in the back office. I immediately realized, 'oh my god, he's probably spying on me to see how my service is!'. It made me feel uncomfortable, until I realized it was an opportunity to be extraordinarily helpful and jovial with the customer and be "candidly" observed by my manager. So I did that. I rang the customer up and she left. The light went off after a few minutes of silence. After that, I noticed the light come on a number of times on different days, which surprised me. I even ran to the back after helping a customer once, while the intercom light was still on, sneaked around the corner, and looked into his office window to see if it was really him. He was sitting there looking at his phone. I looked for just a moment when I heard from the speaker above, "<beep!> cashier to the front". I ran. Bill was probably the greatest manager I've ever known, such a hard worker, a really cool guy to talk to, well respected by everyone, etc. In fact, if all managers were like him, Staples would probably still be a force to be reckoned with. So, it never bothered me the way it probably would have, had it been some creepy manager. This is necessary for the rest of the story, because had it not been the case, I would have probably called him out, etc. Eventually I started being extra jovial all the time, because I never knew when I'd miss seeing the light come on and miss the opportunity to impress Bill. Bill was so impressed with my service that I was given a raise and promoted to manager of the copy & print center about 6 months later, which eventually led to me opening my own print company and quitting Staples (after seeing how high the margins were), which led to me learning how to use Adobe Creative Suite and graphic design, which led to me shifting my focus to print design for clients (brochures, cards, etc.), which led to me meeting some guys who ran an Internet marketing company one day while trying to sell my print design services. They wanted to hire me full time, and did, so I began learning web design, then web development, then back end code, etc. I always tell myself, 'I was probably destined for this kind of work', but the reality is that my entire life might have been changed by simply knowing I was being spied on by my Boss. I realize that it probably worked out for the better in my case, but the fact is, knowing that somebody is watching you causes you to change who you are. It's a form of control in and of itself. In fact, it doesn't even need to happen to you. Now that we have all seen that the government does spy on people, it's hard to imagine all the tiny ways that it might change your behavior and the things you say (e.g., online). ~~~ repler I worked at Staples too (Business Machines!), the management was not shy about reminding us about mystery shoppers. My managers would always walk around the corner right at the instant I would sit down for a minute when it wasn't busy 5 hours into my shift. Never failed. Ugh. I know we didn't have surveillance cameras in the store at the time though, because it was a sore point (and against Staples policy at the time). ------ mmaunder I wonder if he covers front and back cellphone cameras. ------ caub Laptops have a LED showing when webcam is in use ------ stanislavb Hypocrite! ------ orthogon What about the part where we stop buying products with integrated cameras? What about the part where we stop buying devices that we have seeemingly no hope of control over? What about that? Is boycott a word too strong? Gee, you're right. We should all just give up, and accept that what we're sold, is that which we must buy. ~~~ deathanatos I think you're being a bit quick to judge people here… Having an integrated camera is obviously a lot easier to deal with, logistically, than lugging along an external USB camera. I think a lot of the people here would love to have hardware-level kill switches for their video camera. And mic. And WiFi. (I would; I used to own a Thinkpad with a hardware kill switch for WiFi. It was useful, even aside from the privacy benefits.) ~~~ orthogon I think you're neglecting a key detail: alternatives are hardly even on the shelves, and NO ONE QUESTIONS IT. > Oh, well, that's just supply and demand, of course! > Everyone just WANTS an always on internet connection! > Why would anyone ever remove the battery from their cell phone??? > It's more cost effective to build the device like that. Common sense! > Everyone wants a unique identifier, GPS and 911 service. It's safer! Yup, no one would ever want things any other way. It's silly to question why the invisible hand of the market works as it does. ~~~ derogator The really amazing part about the downvotes here, is that HN is unable to reconcile the realities of mass surveillance that tend to conflict with profit motives, and yet the collective overtone of HN professes itself to be a bastion of progressive futurist space exploring tranhumanism. Few seem to notice the cognitive dissonance. Sort of a cruel prank. Those in the best position to release the yoke, are only motivated to tighten it.
{ "pile_set_name": "HackerNews" }
Tentative Graduation Dates Set I hope that everyone in your household is staying safe and finding continued enjoyment in your time together. As the school district alters or finalizes plans during this time of school closure, there are several items of importance that I want to bring to your attention. New Feeding Sites to Open Monday, April 20 Beginning Monday, April 20, we will begin Grab-and-Go meal service for any child ages 1 to 18 at five additional school sites. Angie Debo Elementary (16060 N. May Ave.) Frontier Elementary (4901 Explorer Dr.) Heritage Elementary (400 E. Sorghum Mill Rd.) Northern Hills Elementary (901 E. Wayne St.) Orvis Risner Elementary (2801 S. Rankin St.) The meals will be available in the schools’ drive-thru from 12:30 p.m. to 1:00 p.m. Monday-Friday. Meal service will be set up near the schools’ cafeterias, which, in some cases, could be at the back of the building. The addition of these sites brings to 13 the number of feeding locations across our district. Each week, EPS is serving around 5,000 students an estimated 10,000 meals. For a master list of all Grab-and-Go feeding sites, go to edmondschools.net. Tentative Dates Set for Graduation Ceremonies District and high school administrators, as well as senior sponsors, have been finalizing plans to move high school graduation ceremonies to the summertime. The Cox Convention Center has been booked for two tentative dates, July 11 and July 24, the latter date preferred, but will be dependent on other concurrently scheduled events at the Cox. Additionally, we are requesting a booking date over fall break (TBD) that, while not ideal, still provides an opportunity to recognize and reflect upon our graduates’ accomplishments, even as they have begun their new lives in college or careers. We are communicating these dates now so that families have the opportunity to “hold” the dates and begin to make tentative plans with family and friends. National and local health and safety guidelines will dictate on which date the ceremonies will be held. Commemorative graduation programs will be printed and school sites will soon announce tryouts among the valedictorians for the positions of graduation speakers. In the meantime, the district, thanks to a grant from the Edmond Public Schools Foundation, is purchasing yard signs for all graduates to proudly display at home to commemorate this important accomplishment. Members of the EPS Foundation Board and the schools’ teachers are planning a surprise posting of the yard signs in the seniors’ front yards. As we near the end of school, seniors will be contacted to solicit information regarding transcript needs, scholarships, and post-graduation plans. Also, dates will soon be announced for seniors to schedule appointments to return their Chromebooks and student IDs and at the same time pick up their official diplomas, yearbooks, and any personal items still remaining in the buildings. District Developing Plan to Pick Up Personal Belongings We hope to be able to announce by late next week our plan for how elementary, middle school and high school students (except seniors) will pick up their personal belongings and drop off school equipment such as textbooks, library books and so on. Thank you for your patience as we develop this process. 2020-2021 Annual Update to Open May 1 Parents or guardians of students currently enrolled in the 2019-20 school are required to complete an Annual Update for 2020-2021 by logging into the Parent Portal. After May 1, login, scroll down and click on the “More” link and then “Online Registration” in the lower-left corner of the portal screen to begin the Annual Update. Parents or guardians can verify their existing information and make any needed changes. Students will not receive 2020-21 schedules or homeroom teacher assignments in August until this update has been completed. If you need assistance registering or logging in to the Parent Portal, please email [email protected] with your specific question. Teachers off Contract on April 24 As Friday, April 24 (better known as “April Day”) is still considered a non-contract day for all certified personnel under the EPS board-approved school calendar, all teachers will be off that day. Teachers will not be obligated to contact students or hold virtual lessons on this day. Remember, content and lessons can still be accessed and completed on the EPS Learning Dashboard. New Content Uploaded to EPS Learning Dashboard on Sundays New content is uploaded to the EPS Learning Dashboard every Sunday at noon. Please encourage your child to do as many of the dashboard activities as possible. The skills addressed in the learning dashboard each week are key skills needed for the next grade level. Until our next communication, please stay safe and take care of yourselves. If you are struggling with excessive worry, anxiety or depression, please reach out to our Call Sam hotline. The number is 1-855-225-2SAM (2726). This free, 24-hour, confidential hotline is staffed by full-time counselors at Mercy who are eager to assist you.
{ "pile_set_name": "Pile-CC" }
Q: WinForm - draw resizing frame using a single-pixel border In a Windows Form with a Resizing Frame, the frame border draws with a raised 3-D look. I'd like it to draw with a flat single pixel border in a color of my choosing. Is this possible without having to owner draw the whole form? A: You could try something like this: Point lastPoint = Point.Empty; Panel leftResizer = new Panel(); leftResizer.Cursor = System.Windows.Forms.Cursors.SizeWE; leftResizer.Dock = System.Windows.Forms.DockStyle.Left; leftResizer.Size = new System.Drawing.Size(1, 100); leftResizer.MouseDown += delegate(object sender, MouseEventArgs e) { lastPoint = leftResizer.PointToScreen(e.Location); leftResizer.Capture = true; } leftResizer.MouseMove += delegate(object sender, MouseEventArgs e) { if (lastPoint != Point.Empty) { Point newPoint = leftResizer.PointToScreen(e.Location); Location = new Point(Location.X + (newPoint.X - lastPoint.X), Location.Y); Width = Math.Max(MinimumSize.Width, Width - (newPoint.X - lastPoint.X)); lastPoint = newPoint; } } leftResizer.MouseUp += delegate (object sender, MouseEventArgs e) { lastPoint = Point.Empty; leftResizer.Capture = false; } form.BorderStyle = BorderStyle.None; form.Add(leftResizer);
{ "pile_set_name": "StackExchange" }
Antioxidant activities of the water-soluble fraction in tempeh-like fermented soybean (GABA-tempeh). Tempeh is a traditional fermented soyfood native to Central Java, Indonesia; tempeh is prepared by salt-free aerobic fermentation using Rhizopus. Similar to miso, tempeh is also reported to be antioxygenic. In this study, we used a tempeh-like fermented soybean. First, soybean was incubated aerobically and then successively incubated anaerobically. Because the gamma-amino butyric acid (GABA) content was increased remarkably, we named this tempeh GABA-tempeh. The contents of other free amino acids and peptides were significantly higher in GABA-tempeh than in conventional tempeh. In this study, we compared the antioxidant activity of the water-soluble fraction in GABA-tempeh with that of soybean and conventional tempeh. The order of the antioxidant activity was shown as follows: GABA-tempeh > conventional tempeh > soybean. The components responsible for the antioxidant activity of GABA-tempeh were isoflavone aglycones, free amino acids, and peptides, which increased during aerobic and anaerobic fermentations.
{ "pile_set_name": "PubMed Abstracts" }
Microsporidiosis in a Brazilian University Hospital: case report. This is the report on a patient with chronic diarrhea caused by microsporidia. He is married, infected with HIV and has low CD4 cell count. The diagnosis was established through stool parasite search using concentration methods and Gram-chromotrope staining technique. Ileum biopsy was also performed in this case. The etiological diagnosis may be established in a clinical laboratory, by chromotrope staining technique in routine microscopic examination of stool specimens.
{ "pile_set_name": "PubMed Abstracts" }
Awesome Sport Theme Boys Bedroom Ideas - This inspiring boys bedroom comes from Perianth. Perianth designing this perfect boy?s bedroom by considering the boys character that really close with sport as their hobby or they positive activity to kill th Quarterback Peyton Manning of the Denver Broncos looks on during warm-ups before playing against the Seattle Seahawks during Super Bowl XLVIII at MetLife Stadium on February 2014 in East Rutherford, New Jersey.
{ "pile_set_name": "Pile-CC" }
Q: Linux cron job fails to execute part of script which works in shell I'm having a problem with a script that writes to a log file during a backup procedure. Tested perfectly when called from the root shell, but fails when run from the cron demon. Backup is done over a series of partitions and the on-site admin will rotate the drives in the top dock weekly. In order to know where the most recent backup is located I've included the following lines sudo hdparm -I /dev/sdb | grep 'Model Number' sudo hdparm -I /dev/sdb | grep 'Serial Number' I've tried this with a >> /batch/backup.log and without. When the bash script is run from the command line, it works beautifully. But when the crontab calls the script the output from these lines is blank. crontab entry: 00 00 * * * /batch/backup.bat >> /batch/backup.log I have no idea why other than the possibility that cron can't handle the pipe or the grep or something. I have isolated the lines in a test.bat but they remain blank. The backup script uses the hdparm to spin down the drive at the end, but now I wonder if that's not working properly either if cron can't handle hdparm. A: That is probably because hdparm is not in the PATH when the script is executed through cron. Although less likely, same might apply to grep as well. Try replacing hdparm with /full/path/to/hdparm in your script.
{ "pile_set_name": "StackExchange" }
/* This repository is no longer actively maintained. To find all solutions to this problem (and practice coding more problems) at: ~~~~~~~~~~~~~~~~~~~~~~~~~ https://backtobackswe.com ~~~~~~~~~~~~~~~~~~~~~~~~~ */ public class Solution { public static void main(String args[]) { /* Here you are given the adjacency list, but even if you were given the raw edges and vertices (remember: G = (V, E)), you'd still be able to build the adjacency list in O(|E|) time. Just loop over the edges and build what you see below. */ Map<Integer, List<Integer>> originalNodeToAdjacents = new HashMap<>(); originalNodeToAdjacents.put(0, Arrays.asList(1)); originalNodeToAdjacents.put(1, Arrays.asList(2)); originalNodeToAdjacents.put(2, Arrays.asList(3, 4)); originalNodeToAdjacents.put(3, Arrays.asList(0)); originalNodeToAdjacents.put(4, Arrays.asList(2)); /* The graph above: 0 ---> 1 ---> 2 <---> 4 ^ / \ / \ / \ ⌄ 3 */ /* If we reverse each edge: 0 <--- 1 <--- 2 <---> 4 \ ^ \ / \ / ⌄ / 3 */ System.out.println(isStronglyConnected(originalNodeToAdjacents)); } private static boolean isStronglyConnected(Map<Integer, List<Integer>> originalNodeToAdjacents) { boolean allNodesReached = allNodesReachedViaBFS(originalNodeToAdjacents); if (!allNodesReached) { return false; } Map<Integer, List<Integer>> reversedNodeToAdjacents = reverseGraph(originalNodeToAdjacents); boolean allNodesReachedWithReverseGraph = allNodesReachedViaBFS(reversedNodeToAdjacents); return allNodesReachedWithReverseGraph; } private static boolean allNodesReachedViaBFS(Map<Integer, List<Integer>> originalNodeToAdjacents) { Set<Integer> visited = new HashSet<>(); Queue<Integer> queue = new LinkedList<>(); queue.add(0); visited.add(0); while (!queue.isEmpty()) { int node = queue.poll(); List<Integer> adjacents = originalNodeToAdjacents.get(node); if (adjacents != null) { for (int adjacent: adjacents) { if (!visited.contains(adjacent)) { visited.add(adjacent); queue.add(adjacent); } } } } return visited.size() == originalNodeToAdjacents.size(); } private static Map<Integer, List<Integer>> reverseGraph(Map<Integer, List<Integer>> originalNodeToAdjacents) { Map<Integer, List<Integer>> reversedNodeToAdjacents = new HashMap<>(); for (Map.Entry<Integer, List<Integer>> entry: originalNodeToAdjacents.entrySet()) { int nodeValue = entry.getKey(); List<Integer> adjacents = entry.getValue(); // Reverse each edge for (int adjacent: adjacents) { List<Integer> reversedAdjacents; if (!reversedNodeToAdjacents.containsKey(adjacent)) { reversedAdjacents = new ArrayList<>(); } else { reversedAdjacents = reversedNodeToAdjacents.get(adjacent); } // Reverse edge, before node went to adjacent, now adjacent maps to the node reversedAdjacents.add(nodeValue); reversedNodeToAdjacents.put(adjacent, reversedAdjacents); } } return reversedNodeToAdjacents; } }
{ "pile_set_name": "Github" }
Irfaan Ali Dr. Hon. Mohamed Irfaan Ali is a Guyanese politician, sitting Member of Parliament and a former Minister of Housing in Guyana. Ali was elected Presidential Candidate for the People's Progressive Party on January 19, 2019. Early life & education Ali was born in Leonora, a village in the West Coast Demarara region of Guyana. The child of two educators and one of two sons, Ali also spent much of his formative years on the island of Leguan. He is a past student of the Leonora Nursery and Primary schools and Cornelia Ida Primary. Ali completed his secondary education at St. Stanislaus College in Georgetown, Guyana. He holds a doctorate in Urban and Regional Planning from the University of the West Indies. Professional career Ali served as Project Manager of the Caribbean Development Bank's Project Implementation Unit in the Ministry of Finance and Senior Planner in the State Planning Secretariat. Political career Ali became a member of the National Assembly of Guyana in 2006. He was subsequently appointed to the portfolios of Minister of Housing and Water and Minister of Tourism Industry and Commerce. During his tenure as Minister, Ali performed the functions of President and Prime Minister on separate occasions. In 2015, the People's Progressive Party (PPP/C) went into opposition during which time he served as chair of the Public Accounts Committee and co-chair the Economic Services Committee of the Parliament of Guyana. Presidential candidacy Irfaan Ali is the Presidential Candidate of the People's Progressive Party (PPP/C) for the March 2, 2020 General and Regional Elections in Guyana. He was selected as the presidential candidate for the People's Progressive Party on January 19, 2019. His controversial selection came at a time after Ali had been charged with 19 counts of conspiracy and fraud by Guyana's Special Organized Crime Unit (SOCU). Immediately following his selection, Ali was accused of academic fraud. References Category:Living people Category:Guyanese politicians Category:Government ministers of Guyana Category:Guyanese politicians of Indian descent Category:1980 births
{ "pile_set_name": "Wikipedia (en)" }
Two-Port Pars Plana Anterior and Central Core Vitrectomy (Lam Floaterectomy) in Combination With Phacoemulsification and Intraocular Lens Implantation Under Topical Anesthesia for Patients with Cataract and Significant Floaters: Results of the First 50 Consecutive Cases. To study the safety and efficacy of 2-port pars plana anterior and central core vitrectomy (Lam floaterectomy) in combination with phacoemulsification (phaco) and intraocular lens implantation (IOL) for patients with cataract and significant floaters under topical anesthesia. Retrospective review of the first 50 consecutive cases. A standardized treatment protocol was used for patients with cataract and significant (moderate to severe) floaters (duration > 3 months). Data analysis included intraoperative and postoperative complications, floater status, and patient satisfaction. There were 50 eyes (38 patients) with a male-to-female ratio of 1 to 2.3. Twelve patients had bilateral eye surgeries. Mean age was 58.10 ± 9.85 years (range, 39-83). All patients completed the 3-month follow-up. One eye had mild vitreous hemorrhage at the end of surgery arising from sclerotomy wound oozing. No other intraoperative compli-cations were encountered. Postoperatively, there was 1 case of transient hypotony and 1 case of congestion at sclerotomy wound. No cases of retinal break or detachment, or clinically significant macular edema, were reported. There were 5 cases (10%) of mild residual floaters and 1 case (2%) of floater recurrence. Total floater clearance rate was 88%. Patient satisfaction rates were 80%, 14%, 6%, and 0% for very satisfied, satis-fied, acceptable, and unsatisfied, respectively. The 3-month results in terms of safety and efficacy of the Lam floaterectomy in combination with phaco and IOLfor patients with cataract and significant floaters under topical anesthesia are encouraging. Further larger-scale, prospective, multicenter studies seem warranted.
{ "pile_set_name": "PubMed Abstracts" }
Discriminative ability of dual-energy X-ray absorptiometry site selection in identifying patients with osteoporotic fractures. Dual-energy X-ray absorptiometry (DXA) is the gold standard method for measurement of bone mineral density (BMD). The aims of the current study are to compare the ability of BMD measurements to identify subjects with vertebral fractures (VF), when the lumbar spine (LS), hip or both sites are measured. 460 subjects aged 73+/-5.2 years participated in the study. Thoraco-lumbar spine radiographs were obtained and analyzed for the presence of VF using the visual semi-quantitative assessment. BMD of the LS and the left femur were measured by DXA. Eighteen men (12%) and 56 women (20%) had at least one VF. 16% of scans at the LS were unreadable because of the presence of degenerative changes. In both genders, BMD of the hip showed better ability than LS BMD in detecting subjects with osteoporosis. BMD and T-score values at the hip, but not the LS, were lower in subjects with VF than those without (p<0.05). Femoral neck BMD showed the highest OR for each S.D. decrease in BMD for identifying subjects with VF, and the best predictability for prevalent VF using ROC. Fracture risk prediction did not increase by adding the spine to the hip measurement. In conclusion, hip BMD was the only and best skeletal site needed to detect subjects with osteoporosis and showed the strongest relationship with prevalent vertebral fractures in elderly subjects.
{ "pile_set_name": "PubMed Abstracts" }
Q: how to format a number in mIRC? My remote script gets a variable with a number formatted like 4365271385. I would like the script to send a message with the variable in it formatted like 4.365.271.385. I searched the internet and the help file, but i couldn't find it. Sometimes the number is in the thousands, sometimes in the billions. How to do this? Can't be hard, can it? A: It is indeed not very hard. Use $bytes, in your case $bytes(4365271385,bd) b parameter: Comma-formats the number for bytes. d parameter: Returns the value whilst retaining decimal point values. You don't need this if you're only working with whole integers. But it's handy to have. More at http://en.wikichip.org/wiki/mirc/identifiers/$bytes
{ "pile_set_name": "StackExchange" }
Breaking News All Ages Ladies Soccer Thistle ladies caused one of the upsets of the season defeating old rivals Workies 3-0. Knowing they had only 4 games to go, out of finals contention and only fielding 10 players, Thistle ladies had something to prove. The first goal was a result from a brilliant cross by Maddie Risby to Brooke McDonald to slide one past the keeper. Rhiannon Walding scored next as she lofted a well weighted ball from near half way. Jamie-Lee Hunt closed off the scoring with a wonderful one on one with the keeper. Ashlee Fitzpatrick, Jennifer Merry and Annmarie Tomazin were once again outstanding in defence. Angie Cambourn and Jacinta Moon held their own in the middle of the field shutting down any attack coming down the centre. Danielle Byrne was outstanding in goals saving some tricky and fast shots determined to not to let any slip past her. Overall Thistle ladies have had a fun and wonderful season and we hope to see you all back next year!
{ "pile_set_name": "Pile-CC" }
Disclosed herein, in various embodiments, are stable, high performing nanoparticle compositions suitable for printing, such as by inkjet printing, as well as processes and devices for making and/or using the same. Fabrication of electronic circuit elements using liquid deposition techniques may be beneficial as such techniques provide potentially low-cost alternatives to conventional mainstream amorphous silicon technologies for electronic applications such as thin film transistors (TFTs), light-emitting diodes (LEDs), RFID tags, photovoltaics, etc. However, the deposition and/or patterning of functional electrodes, pixel pads, and conductive traces, lines and tracks which meet the conductivity, processing, and cost requirements for practical applications have been a great challenge. The metal, silver (Ag), is of particular interest as conductive elements for electronic devices because silver is much lower in cost than gold (Au) and it possesses much better environmental stability than copper (Cu). Silver nanoparticles have been extensively examined. However, previous ink compositions containing silver nanoparticles have typically had poor jettability, i.e. they could not be printed using conventional inkjet printing technologies. Typically, the ink would block the nozzle, drip out or dry out on the printer head, and/or the ink droplets would misfire. The printed features had low resolution and/or suffered from the “coffee ring” effect, wherein the particles in a given droplet end up along the circumference of the circle having a center where the droplet was deposited on the substrate (i.e. a non-uniform deposition). Ideally, deposited inkjet-printed lines should be smooth, even, and straight. Jettable ink compositions would be desirable to enable drop-on-demand deposition and printing with functional features such as electrodes and interconnects for electronic devices.
{ "pile_set_name": "USPTO Backgrounds" }
Just give us a call at 1300 get TCA and we’ll be happy to schedule an appointment with you to discuss your particular business needs. In order to make certain that we can help your business, our process begins with a Technology Assessment that includes a Needs Analysis and a Cost Savings Analysis. We will examine the results of the assessment and make recommendations to meet your current and future business needs. What other services and solutions do you provide? admin 2017-06-25T11:19:42+00:00 Examples of items that are not covered under our Flat Fee service plans include the cost of replacement or new hardware, or shipping costs, the cost of software licensing or renewal or upgrade fees, and the cost of any third party vendor or manufacturer support or incident fees. Whenever the potential arises for additional fees outside of our Flat Fee, you will always be notified in advance for approval. What does your Flat Fee service Include? admin 2017-06-25T11:18:43+00:00 Remote Help Desk, Lab/Bench Service and Onsite Service for all covered equipment, operating systems and applications: Servers, PC’s, Laptops, Firewalls, Routers and Switches Microsoft Windows XP Pro Desktop Operating Systems Microsoft Office 2000, 2003 and 2007 Microsoft Windows Server 2003 and Small Business Server 2003 Microsoft Exchange Server 2003 and 2007 Microsoft SQL Server 2000 and 2005 And more Vendor Management Services. We will manage all of your infrastructure vendors, allowing you and your staff to run your business, not your vendors. Anytime there is a problem with a device or line of business application serviced by a vendor we manage for you, it’s one call to us, and we take it from there, and work the problem to resolution with the vendor. We will even schedule any onsite visits required by the vendor, and oversee the successful remediation of the issue at hand. Broadband Vendors Phone Service Vendors Phone Equipment Vendors Copier/Fax/Scanner/Document Imaging Vendors Line of Business Application Vendors Hosted Website/Domain Registration Vendors Do you perform support on an as needed basis? admin 2017-06-25T11:17:20+00:00 Studies show that proactive maintenance improves equipment longevity, uptime and efficiency, and provides cost savings over time. Since all of our Flat Fee service plans are based on this premise, we do not offer reactive services. Get in touch Name Email Message Now open in Ballina TCA has been providing solutions for all the technology needs of businesses on the Coffs Coast since 1994. We are the home of computers, Ricoh photocopiers and managed services, technological communication, IT networking and photocopiers. We are proud to now offer the same great service and products to the businesses of Ballina – with our service area now stretching all the way to the Tweed.
{ "pile_set_name": "Pile-CC" }
Q: Android UI Mathematics required for the implementation Can someone tell me what would be the math required for moving around the small ball in the bar(meter) according to the touch motion.... I needed a clear idea on the logic.. A: The logic depends on how you want to model the interaction between the finger and the ball. Is it moving through a fluid, like a ball bearing? A gravitational field? Do you want it to decelerate as if under the influence of friction from the sides of the bar? Or do you want to simply have the ball track the finger, without fancy damping of the motion? My point is that the "logic" can be pretty complicated, depending on how you decide to model it. I'd recommend looking for something canned in JavaScript before coding it yourself.
{ "pile_set_name": "StackExchange" }
/* * QEMU Common PCI Host bridge configuration data space access routines. * * Copyright (c) 2006 Fabrice Bellard * * Permission is hereby granted, free of charge, to any person obtaining a copy * of this software and associated documentation files (the "Software"), to deal * in the Software without restriction, including without limitation the rights * to use, copy, modify, merge, publish, distribute, sublicense, and/or sell * copies of the Software, and to permit persons to whom the Software is * furnished to do so, subject to the following conditions: * * The above copyright notice and this permission notice shall be included in * all copies or substantial portions of the Software. * * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR * IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, * FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL * THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER * LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, * OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN * THE SOFTWARE. */ /* Worker routines for a PCI host controller that uses an {address,data} register pair to access PCI configuration space. */ #ifndef PCI_HOST_H #define PCI_HOST_H #include "hw/sysbus.h" #define TYPE_PCI_HOST_BRIDGE "pci-host-bridge" #define PCI_HOST_BRIDGE(obj) \ OBJECT_CHECK(PCIHostState, (obj), TYPE_PCI_HOST_BRIDGE) #define PCI_HOST_BRIDGE_CLASS(klass) \ OBJECT_CLASS_CHECK(PCIHostBridgeClass, (klass), TYPE_PCI_HOST_BRIDGE) #define PCI_HOST_BRIDGE_GET_CLASS(obj) \ OBJECT_GET_CLASS(PCIHostBridgeClass, (obj), TYPE_PCI_HOST_BRIDGE) struct PCIHostState { SysBusDevice busdev; MemoryRegion conf_mem; MemoryRegion data_mem; MemoryRegion mmcfg; uint32_t config_reg; PCIBus *bus; QLIST_ENTRY(PCIHostState) next; }; typedef struct PCIHostBridgeClass { SysBusDeviceClass parent_class; const char *(*root_bus_path)(PCIHostState *, PCIBus *); } PCIHostBridgeClass; /* common internal helpers for PCI/PCIe hosts, cut off overflows */ void pci_host_config_write_common(PCIDevice *pci_dev, uint32_t addr, uint32_t limit, uint32_t val, uint32_t len); uint32_t pci_host_config_read_common(PCIDevice *pci_dev, uint32_t addr, uint32_t limit, uint32_t len); void pci_data_write(PCIBus *s, uint32_t addr, uint32_t val, unsigned len); uint32_t pci_data_read(PCIBus *s, uint32_t addr, unsigned len); extern const MemoryRegionOps pci_host_conf_le_ops; extern const MemoryRegionOps pci_host_conf_be_ops; extern const MemoryRegionOps pci_host_data_le_ops; extern const MemoryRegionOps pci_host_data_be_ops; #endif /* PCI_HOST_H */
{ "pile_set_name": "Github" }
Q: WPF Group Items in ComboBox programmatically (Creating Data Templates in Code) I need to group my Items in a Combobox like this. [Category] - Item - Item [Category2] - Item - Item I found an working answer here, but my comboboxes are created dynamically by User Action. Is it possible to fill the Combobox like this programmatically? The Items I want to display are ModuleCategoryViewControl's : public class ClassNameController { public string Name { get; set; } public System.Type ObjectType { get; set; } public ClassNameController(string name, Type objectType) { this.Name = name; this.ObjectType = objectType; } public override string ToString() { return Name; } } class ModuleCategoryViewControl : ClassNameController { public string Category { get; set; } public ModuleCategoryViewControl(string name, string category, Type objectType) : base(name, objectType) { this.Category = category; } } They should group by Category and displayed by Name A: Is it possible to fill the Combobox like this programmatically? The sample code on the link you supplied does fill the ComboBox programmatically so it's unclear what your issue really is. If you add items dynamically at runtime you should replace the List<ModuleCategoryViewControl> with an ObservableCollection<ModuleCategoryViewControl>. Please refer to the following sample code. Window.xaml.cs: public partial class MainWindow : Window { readonly ObservableCollection<ModuleCategoryViewControl> items = new ObservableCollection<ModuleCategoryViewControl>(); public MainWindow() { InitializeComponent(); items.Add(new ModuleCategoryViewControl("Item2", "A", typeof(int))); items.Add(new ModuleCategoryViewControl("Item2", "A", typeof(int))); items.Add(new ModuleCategoryViewControl("Item3", "A", typeof(int))); items.Add(new ModuleCategoryViewControl("Item4", "B", typeof(int))); items.Add(new ModuleCategoryViewControl("Item5", "B", typeof(int))); ListCollectionView lcv = new ListCollectionView(items); lcv.GroupDescriptions.Add(new PropertyGroupDescription("Category")); comboBox.ItemsSource = lcv; } private void Button_Click(object sender, RoutedEventArgs e) { items.Add(new ModuleCategoryViewControl("Item6", "A", typeof(int))); items.Add(new ModuleCategoryViewControl("Item7", "C", typeof(int))); } } Window.xaml: <StackPanel x:Name="sp"> <ComboBox x:Name="comboBox"> <ComboBox.GroupStyle> <GroupStyle> <GroupStyle.HeaderTemplate> <DataTemplate> <TextBlock Text="{Binding Name}"/> </DataTemplate> </GroupStyle.HeaderTemplate> </GroupStyle> </ComboBox.GroupStyle> <ComboBox.ItemTemplate> <DataTemplate> <TextBlock Text="{Binding Name}"/> </DataTemplate> </ComboBox.ItemTemplate> </ComboBox> <Button Content="Add Item" Click="Button_Click" /> </StackPanel> If you want to create the DataTemplates programmatically you could use the XamlReader.Parse method: ComboBox cmb = new ComboBox(); cmb.GroupStyle.Add(System.Windows.Markup.XamlReader.Parse("<GroupStyle xmlns=\"http://schemas.microsoft.com/winfx/2006/xaml/presentation\"><GroupStyle.HeaderTemplate><DataTemplate><TextBlock Text=\"{Binding Name}\"/></DataTemplate></GroupStyle.HeaderTemplate></GroupStyle>") as GroupStyle); cmb.ItemTemplate = System.Windows.Markup.XamlReader.Parse("<DataTemplate xmlns=\"http://schemas.microsoft.com/winfx/2006/xaml/presentation\"><TextBlock Text=\"{Binding Name}\"/></DataTemplate>") as DataTemplate; cmb.ItemsSource = lcv; sp.Children.Add(cmb);
{ "pile_set_name": "StackExchange" }
Ab initio structure determination of monoclinic 2,2-dihydroxymethylbutanoic acid from synchrotron radiation powder diffraction data: combined use of direct methods and the Monte Carlo method. The crystal structure of 2,2-dihydroxymethylbutanoic acid (C(6)H(12)O(4)) in monoclinic form has been determined ab initio from synchrotron radiation powder diffraction data. Two O and five C atoms were first derived by direct methods. Two missing O atoms and one C atom were found by the Monte Carlo method without applying constraint to their relative positions. Positional and isotropic displacement parameters of these non-H atoms were refined by the Rietveld method. Molecules are linked by hydrogen bonds and they make sheet-like networks running parallel to the (010) plane. The Monte Carlo method is demonstrated to be a powerful tool for finding missing atoms in partially solved structure.
{ "pile_set_name": "PubMed Abstracts" }
Q: My iOS app isn't requesting iAds I recently released my first app on the app store (August 5, 2014 release). When I was testing the app the test iAds seemed to never go away. Now, the actual app available on the app store isn't displaying any ads. I have read similar question, where iAds didn't work at first, but everyone says they started working after a little bit. However, mine seems unique in that it made six impressions right after it was first downloaded (6 requests, 6 impressions), but it hasn't done anything since. Is this a programming error and that's why my requests are low, or is this common for iAds on new apps? Thanks. Oh, and I added ads using the method shown in this video https://www.youtube.com/watch?v=u5XcVnHCQ0w The app uses Sprite Kit and was designed for iOS 7.0. There is only one view controller and it only displays banner ads. The app also uses Game Center if that is of any importance. A: iAd takes a few days to look at new apps and then approves those for the iAd network. It is normal that you will have to wait a little bit.
{ "pile_set_name": "StackExchange" }
223 F.Supp.2d 286 (2002) Jeffrey E. SIMPSON, Plaintiff v. Cheryl GALLANT, et al., Defendants No. CIV. 02-15-B-K. United States District Court, D. Maine. September 25, 2002. Jeffrey E. Simpson, South Windham, ME, Pro se. Michael J. Schmidt, Esq., Wheeler & Arey, P.A., Waterville, ME, for Defendants. MEMORANDUM OF DECISION KRAVCHUK, United States Magistrate Judge. Jeffrey Simpson is seeking remedies for alleged violations of his constitutional right to have access to the telephone and mail services when he was a pretrial detainee at the Penobscot County Jail. (Docket Nos. 1, 7, 8, & 15.) A motion to dismiss filed by the defendants, Cheryl Gallant, Richard Clukey, and Edward Reynolds[1] was denied. *287 (Docket Nos. 26 & 31.) The parties have now consented to proceed before the magistrate judge.[2] Simpson has filed a motion for summary judgment (Docket No. 38) which he has since clarified to be a motion for partial summary judgment vis-à-vis a claim that he was unable to orchestrate bail in the period between October 20, 2001, through January 21, 2002, because he was denied access to a phone despite his express request to use the phone to arrange bail (Docket No. 52). The defendants have responded to this motion and have filed a cross motion for summary judgment as to all of Simpson's claims. (Docket No. 44.) I DENY Simpson's motion for summary judgment and GRANT summary judgment to the defendants on Simpson's claim that his constitutional rights were violated when his request to make a collect call to arrange bail was denied. As to the remainder of Simpson's claims relating to phone and mail access I conclude that Simpson has not exhausted his administrative remedies as required by 42 U.S.C. § 1997e(a) and, because the defendants press for disposition on this ground, these claims are DISMISSED WITHOUT PREJUDICE. Background Broadly put, Simpson claims that while he was a pretrial detainee at the Penobscot County Jail he was placed in disciplinary segregation for violations of jail rules. During the period he spent in segregation he was completely denied access to the phones and he was allowed to mail only three personal letters a week, with postage paid by the jail pursuant to a jail policy. He was not allowed to send additional mail using his own postage. On January 21, 2002, Simpson was released from custody on bail that was posted by an associate. On February 21, 2002, Simpson was found not guilty on one charge after a jury trial. On February 14, 2002, all additional counts against Simpson triggering his detention from October 10, 2001, through January 21, 2002, had been dismissed. Simpson's theory of the case is that Penobscot County Jail policies pertaining to outgoing mail and its policy prohibiting the use of a phone for any reason by inmates not in good standing violated his right to prepare his defense and make bail. At the motion to amend/motion to dismiss juncture it was clarified that Simpson pursues these three defendants in their official capacities challenging the constitutionality of the Jail's policy or custom. See Monell v. Dep't of Social Servs., 436 U.S. 658, 694, 98 S.Ct. 2018, 56 L.Ed.2d 611 (1978) (observing that a § 1983 suit may be brought "when execution of a government's policy or custom, whether made by its lawmakers or by those whose edicts or acts may fairly be said to represent official policy, inflicts the injury that the government as an entity is responsible for under § 1983").[3] Discussion A. Summary Judgment Standard Typically the summary judgment standard is phrased in terms of moving and nonmoving parties but in this instance the plaintiff and the defendants are cross-movants. *288 My determination below turns on the question of exhaustion of administrative remedies (with respect to which the defendants carry the burden) and whether or not there is a genuine dispute of material fact as to Simpson's single exhausted claim involving the denial of his December 1, 2001, request to make a phone call to arrange bail. As I conclude that the summary judgment record on both motions supports judgment for the defendants and does not support judgment for Simpson on his motion, I have analyzed the record treating the defendants as the movants and Simpson as the nonmovant, an approach that favors Simpson. Summary judgment is appropriate if there are no genuine and disputed issues of material fact and if, viewing the evidence most favorably to Simpson, the defendants are entitled to prevail as a matter of law. Fed.R.Civ.P. 56; Celotex Corp. v. Catrett, 477 U.S. 317, 322-23, 106 S.Ct. 2548, 91 L.Ed.2d 265 (1986); Nicolo v. Philip Morris, Inc., 201 F.3d 29, 33 (1st Cir.2000). The defendants bear the burden of showing that there is no material factual dispute. A disputed fact is material if it "has the potential to change the outcome of the suit under the governing law if the dispute over it is resolved favorably to the nonmovant." Navarro v. Pfizer Corp., 261 F.3d 90, 93-94 (1st Cir.2001) (quoting McCarthy v. Northwest Airlines, Inc., 56 F.3d 313, 315 (1st Cir.1995)). I must take Simpson's evidence as true, but only evidence that is supported by the affidavits or other evidentiary material. Celotex, 477 U.S. at 324, 106 S.Ct. 2548. Simpson's pro se status does not excuse him from meeting the summary judgment requirements. Parkinson v. Goord, 116 F.Supp.2d 390, 393 (W.D.N.Y.2000) ("[P]roceeding pro se does not otherwise relieve a litigant of the usual requirements of summary judgment, and a pro se party's bald assertions, unsupported by evidence, are insufficient to overcome a motion for summary judgment."). With respect to material facts (as opposed to legal argument[4]) I have drawn all reasonable inferences in favor of Simpson. Matsushita Elec. Indus. Co. v. Zenith Radio Corp., 475 U.S. 574, 587, 106 S.Ct. 1348, 89 L.Ed.2d 538 (1986). In undertaking the exhaustion inquiry, the defendants bear the burden of proof on this affirmative defense, see Casanova v. Dubois, 304 F.3d 75, 77-78 (1st Cir.2002), and may discharge their burden by demonstrating that their is no record evidence to support Simpson's case on this question, Celotex, 477 U.S. at 325, 106 S.Ct. 2548. Vis-à-vis Simpson's constitutional claims Simpson would bear the burden at trial, and, as to any essential factual element of his claim on which he would bear the burden of proof at trial, Simpson's failure to come forward with sufficient evidence to generate a trialworthy issue would warrant summary judgment for the defendants. In re Spigel, 260 F.3d 27, 31 (1st Cir.2001). B. Exhaustion pursuant to § 1997e(a) As they did in their motion to dismiss the defendants press for dismissal of this entire action on the grounds that Simpson failed to exhaust his administrative remedies as required by 42 U.S.C. § 1997e(a). In § 1997e(a) Congress provided: No action shall be brought with respect to prison conditions under section 1983 of this title, or any other Federal *289 law, by a prisoner confined in any jail, prison, or other correctional facility until such administrative remedies as are available are exhausted. 42 U.S.C. § 1997e(a). In my recommended decision on the motion to dismiss I concluded that Simpson had adequately plead exhaustion for purposes of surviving the motion to dismiss.[5] As anticipated, the record on these cross-motions for summary judgment provides a better basis for making the exhaustion determination. The facts that are material to the exhaustion concern are as follows. The inmate grievance procedure for the Penobscot County Jail is not disputed by the parties. It is contained in the inmate handbook and provides: An inmate may file a grievance of an alleged violation of civil, Constitutional, or statutory rights ... or to appeal a previous grievance decision. Jail personnel will provide inmates who wish to report a grievance (consistent with the definition) with a copy of the Grievance form used by the Penobscot County Jail. Completed grievances may be submitted directly to the Corrections Officer, Asst. Shift Supervisor or Shift Supervisor who will sign the grievance indicating receipt of the grievance, to include date and time. Once signed by the Receiving Officer, the inmate will be given a copy of *290 the submitted grievance. When a grievance is resolved, a copy of the written response/finding will be provided to the inmate within twenty-four (24) hours. An inmate may appeal a grievance decision to the next level of command for review, stating the reason for the appeal. Grievances that appear frivolous in nature or include obscenities or are unrelated to jail operations and activities will not be considered. Once the inmate has exhausted the internal grievance system, he/she may submit their grievance to the Maine Department of Correction or other review agency for external review. Upon request, jail personnel will provide inmates who wish to report a grievance with adequate writing supplies. Inmate grievances addressed to the Maine Department of Corrections, State House Station # 111, Augusta, Maine 04333 or other review agency are considered legal/privileged correspondence. (DSMF Ex. 8 at 14.) Though the defendants contend that each inmate is given a copy of this policy upon arrival, Simpson states that he had to make a specific request for one and first had his copy on December 1, 2001. It is not disputed that Simpson arrived at the Penobscot County Jail on September 26, 2001, and was placed in the maximum security population. Either on October 20 or October 31[6] Simpson was placed in disciplinary segregation where he stayed until his release on bail on January 21, 2002. The only requests that Simpson submitted for telephone access, postage, or attorney visits were dated December 1, 2001, December 14, 2001, and January 6, 2002. On December 1, 2001, Simpson submitted a request form on which Simpson had written: "I need to make a collect call for bail pu[r]poses. I can not get through on this phone. Could I please make a 5 minute call." This request form was denied on the same date, the officer indicating: "As I already explained to you, you['re] not authorized use of the phone while in disciplinary lockup." On December 1 Simpson filed an inmate grievance stating: "I asked S[e]rge[a]nt Basso if I could use a phone to arrange bail. He said no, I was in lockup. I told him I have a constitutional right to make a call to arrange bail, talk to attorney, etc.[...] I am an unsentenced inmate. I need to arrange bail." This form indicates that an investigation was initiated on the same date and Sergeant Basso responded: "Inmate is in the [Lockup]. Policy F-140 states inmates not in good standing will NOT be allowed access to the collect call phones located in the dayroom areas. Therefore this does not meet the criteria of a defined grievance." In the section of the form that provides for "Action Taken," Basso checked, "No Action Warranted — Not a Defined Grievance." This notation is dated December 1, 2001. On December 6, 2001, Clukey, without further explanation, checked "Grievance Unfounded" in the section of the form dedicated to recording any administrative review and action. With respect to the defendants' assertion that Simpson did not appeal the denial of this December 1, 2001, grievance, Simpson argues that the defendants have not proven the negative: that the Department of Corrections did not receive or answer or defer an answer vis-à-vis Simpson's grievance. He cites to paragraphs in his affidavit that state that he *291 could not appeal the determination because Clukey had checked the box indicating that the grievance was unfounded. In order to appeal Simpson would have had to ask permission to submit a grievance to a shift leader and because of the characterization of the grievance as nongrievable, unfounded, and frivolous Simpson was denied grievance forms by Basso and two other jail officers. Simpson states that on December 19, 2001, he wrote a letter to the Commissioner of Corrections at the 111 Augusta State House address informing him that he wanted intervention on his behalf. He did not receive a response. Simpson avers that he sent a notarized letter in July 2002 asking for a resolution of this grievance and he has not received a reply. Simpson does not provide any documentation of these appeal efforts beyond a May 26, 2002, grievance form on which Simpson states that from April 30, 2002, onwards he had requested grievance forms three times and been denied the forms and permission to file a grievance. (Pl.'s Reply Mem. Ex 1.) On this form the failure is acknowledged by the jail personnel and the action taken is that Simpson was to be informed that he would be getting the forms. (Id.) As noted above, Simpson submitted two more requests to jail staff. On December 14, 2001, Simpson submitted an inmate request form stating: "I need to buy some cosmetics off the store cart also stamps. I am in lock up and was told to write shift leader." (DMSJ Ex. 3.) The response on the form is: "Stamp request denied — we will provide you with 3 stamps/week while you are in lock-up — hygiene pack request can be made out and submitted by Thursday of each week. You will have $1 deducted from your account for the hygiene pack if you want a shave card that will be an additional $1. You do not have any access to the store cart for anything while in lock-up. This request is to[o] late for this week." (Id.) Simpson did not file a grievance with respect to this request. On January 6, 2002, Simpson filled out an inmate request form indicating: "I need to use an unmonitored, non-recorded phone line to contact my attorney. My trial starts in approximately 1 week. It is extremely important." (Id. Ex. 4.) On the same date Simpson met with his attorney for approximately forty minutes. As a consequence of this person-to-person meeting the jail officers took no further action on the request and the form bears this notation: "Inmate's attorney came and visited him on this date (1-6-02) from 14:30 to 15:10 — non-contact." There is a check beside "Reviewed and no action warranted at this time." Simpson did not file a grievance with respect to the January 6, 2002, request.[7] I conclude that the only claim that Simpson has exhausted is his claim concerning the denial of access to the phone to attempt to make bail, an attempt that commenced on December 1, 2001. Though Simpson has no proof-positive of his efforts to appeal this determination to the Department of Corrections, he does have some proof that his efforts to file grievances (efforts some of which post-date the filing of this action perhaps) were not facilitated by the Jail as required by the policy. After all, exhaustion is an affirmative defense *292 and this court has no way of knowing without some presentation by the burden bearer as to the Department of Corrections' record on this matter, whether Simpson has submitted a grievance to the Department. Furthermore, the fact that jail personnel responded that this was not grievable — and they do not back-away from this position in these pleadings — suggests that it is not inequitable to estop them from arguing that Simpson has failed to exhaust. So while I conclude that Simpson has a right to a review of the merits of this claim, the other facets of this action have not been exhausted as required by § 1997e(a). See Nelson v. Rodas, 2002 WL 31075804, *4-6 (S.D.N.Y. Sept. 17, 2002) (examining status of the case law as to whether § 1997e(a) requires dismissal of the entire action if there are exhausted and nonexhausted claims, concluding that dismissing the nonexhausted claims without prejudice and proceeding on the exhausted claim was appropriate given that the parties and the court had already expended considerable resources on the action). With the defendants pressing this defense, these nonexhausted claims cannot be addressed by this court unless I determined that § 1997e(a) did not apply to this action. Casanova v. Dubois, 289 F.3d 142, 147 (1st Cir.2002) (remanding case for determination of whether remedies have been exhausted, noting: "Although not jurisdictional the exhaustion requirement is nonetheless mandatory"). 1. Simpson's § 1997e(a) Status When He Brought this Action and the Unexhausted Claims The facts material to Simpson's status as a "prisoner" within the meaning of § 1997e(a) are undisputed. Simpson was released from the Penobscot County Jail on January 21, 2002, when he posted bail, only to return on January 26, 2002. He has been in State custody since January 26, 2002, and was housed for sometime at the Maine Correctional Center in South Windham, Maine. Simpson's original complaint and motion to proceed in forma pauperis were signed by Simpson on January 16, 2002, and a jail officer signed the certificate on the in forma pauperis form on the same date. Simpson represented in these pleadings that he was incarcerated at the Penobscot County Jail. These pleadings were docketed by the court's clerk on January 23, 2002, a date on which Simpson was on bail and thus not incarcerated at the Penobscot County Jail. As indicated in the recommended decision on the motion to dismiss, one judge in this District has concluded that the § 1997e(a) exhaustion requirement is not applicable to individuals who have been released from custody during the pendency of the federal action. See Murphy v. Magnusson, 1999 WL 615895 (D.Me. 1999) (not requiring § 1997e(a) exhaustion by a former-prisoner plaintiff who had been released from the defendant's custody after the filing of the complaint). Other Circuit Courts of Appeal have reached similar conclusions in addressing former-prisoner status and the exhaustion requirement, see Ahmed v. Dragovich, 297 F.3d 201, 210 (3d Cir.2002); Greig v. Goord, 169 F.3d 165, 167 (2d Cir.1999), and other limitations placed on prisoner suits by the Prison Litigation Reform Act (PLRA), Janes v. Hernandez, 215 F.3d 541, 543 (5th Cir.2000) (attorney fee limitation of § 1997e(d)); Kerr v. Puckett, 138 F.3d 321, 323 (7th Cir.1998) (mental and emotional injury damages limitation of § 1997e(e)). Simpson's case is one that requires the court to look again at the question of how changes in the plaintiff's status from prisoner to non-prisoner and back to prisoner impact the exhaustion question. In Medina-Claudio v. Rodriguez-Mateo, 292 F.3d 31 (1st Cir.2002) the First Circuit made it clear that the exhaustion requirement *293 applied if exhaustion was logistically possible for the plaintiff, even if he was no longer a prisoner at the facility involved in the underlying allegations. Id. at 35. Thus, the exhaustion requirement perseveres even when the future plaintiff is removed from the location where the alleged rights violations occurred, but remains within the correctional system. Therefore Simpson, who is once again a prisoner in the state penal system, cannot raise continuing violations in the context of this lawsuit without exhausting his administrative grievances.[8] In terms of timing, section 1997e(a) clearly anticipates exhaustion prior to the bringing of a federal suit, starting as is does with the phrase, "No action shall be brought...." Thus, pragmatically speaking, the appropriate window for Simpson in terms of the exhaustion of his remedies would have been prior to January 16, 2002, when he completed and signed his paperwork for this suit. I conclude that what Simpson could have done to exhaust his administrative remedies after he filed this suit does not seem to be the appropriate point of reference; rather it is his ability to exhaust remedies prior to the commencement of the action that must be determined.[9] From the record in front of me it appears likely that Simpson mailed his complaint on or soon after January 16, 2002, from the Penobscot County Jail. Clearly he prepared and signed the filings by January 16, and the record indicates that he sent one legal letter on January 17, 2002. (DMSJ Ex. 6.) The First Circuit Court of Appeals has recently definitively adopted the "prisoner mail box" rule for purposes of determining when a prisoner's § 1983 pleading is "filed" for statute of limitations purposes. Casanova, at 79 ("[We] hold that the mailbox rule shall govern the determination of when a prisoner's § 1983 filing has been completed. So long as the prisoner complies with the prison's procedures for sending legal mail, the filing date for purposes of assessing compliance with the statute of limitations will be the date on which the prisoner commits the mail to the custody of prison authorities.")[10] Whether this action was "brought" within the meaning of § 1997e(a) when it was "filed" on January 17, 2002, or when it was docketed in this court on January 23, 2002, is not determinative *294 because the record now definitively establishes that although Simpson posted bail on January 21, 2002, he was reincarcerated on January 26, 2002, and remains in custody. Thus, unlike a former-prisoner plaintiff, Simpson would be subject to the strictures of § 1997e(a) if the court dismissed the action without prejudice; he would need to administratively exhaust each claim before bringing it to this forum. For a provision that is meant to lift some of the burden of prisoner litigation from the shoulders of the federal trial courts, section 1997e(a) has proven to be a prickly piece of legislation to apply given the variegations in the status of plaintiffs. See Rodriguez v. Ghoslaw, 2002 WL 1424586, *1 (S.D.N.Y.2002) ("Legislative and judicial efforts to reduce the burden of prison litigation on the district courts by creating procedural obstacles to prisoners' suits can sometimes have perverse effects."). In the present case Simpson has brought not only a claim that he was denied access to a phone to make bail arrangements, but he has also alleged that the jail's policy and procedures have limited his access to the courts by denying him the opportunity to consult with his attorney and the witnesses necessary for his trial. Those claims have not been the subject of any administrative grievances that I can discern. Though the wisdom of the strategy might be questioned in light of the summary judgment record before me, defendants continue to press for dismissal on that basis. Id. at *3 ("Defendant could have chosen to expressly waive the non-exhaustion issue and move instead for restoration of the summary judgment in his favor on the merits. Instead, he seeks a dismissal without prejudice. Under the PLRA, he is entitled to that remedy. Accordingly, the plaintiff's claim against defendant ... is dismissed without prejudice to future litigation on the same cause of action after exhaustion of any available administrative remedies."). They are entitled to that result under the PLRA. 2. The Exhausted Constitutional Claim The facts material to the denial of Simpson's request to make a collect call while in disciplinary segregation are as follows. Simpson was booked into the Penobscot County Jail on September 26, 2001, on charges of robbery and terrorizing. All inmates who are booked into the Jail are allowed two unmonitored telephone calls after the booking process has been completed. Simpson was in the maximum security population from September 26, 2001, through, at least, October 20, 2001. During this period Simpson had access to collect call phones located in the day room of his cell block. Simpson was placed in disciplinary segregation initially because he refused to obey an order issued by a correctional officer. Subsequently the Jail extended his disciplinary segregation (running until his release on bail on January 21, 2002) based on a series of subsequent disciplinary charges including: tampering or blocking a locking device; refusing to comply with an order; destroying, altering, or damaging jail property; lock tampering and leaving his cell during lock-down; placing a trash can full of water and feces on a TV stand; refusing to obey an order from a correctional officer; defecating on a piece of paper in front of his door; threatening a corrections officer; possession of contraband; and interference with an officer in the performance of his duties. (Gallant Aff. ¶ 9; Defs.' Reply to PMSJ Ex. A.)[11] *295 An inmate who violates the jail rules and is placed in disciplinary segregation is an inmate not in good standing. Inmates not in good standing are placed in disciplinary segregation and are subjected to restrictions including limitation on their telephone access. Pursuant to Penobscot County Jail Policy F-140, which covers inmate use of telephones, an inmate not in good standing will not be allowed access to collect call phones except as authorized by the shift supervisor or designee for a bona fide reason. Routine lawyer calls do not constitute a bona fide reason. With respect to alternative means of communication, inmates in disciplinary segregation are allowed postage for three personal one-ounce first-class letters each week and they have unlimited writing supplies and postage for the purposes of corresponding with attorneys, courts, or grievance review representatives. They can meet with their attorneys at any time subject to reasonable hour restrictions; these are restrictions that primarily require that the attorney not seek to meet with their client at the time when the inmates are sleeping, eating, or during a formal headcount. The intake log kept by the Jail staff shows that Simpson was allowed to meet with his attorney on October 22, 2001; October 28, 2001; November 2, 2001; January 6; 2002; January 8, 2002; January 15, 2002; and January 21, 2002. Simpson made one request to make a call to arrange bail on December 1, 2001. This request was denied, as described above in the discussion of exhaustion. Simpson asked the jail administrators to provide his associate's address for Simpson and they refused. The defendants assert that Simpson could have met with his attorney on any date that he was incarcerated in the Jail between September 26, 2001, and January 21, 2002. Simpson retorts that he could not arrange visits with his attorney on any day because he was denied phone calls to his attorney. Simpson's claim concerning interference with his ability to post bail falls under the Fourteenth Amendment umbrella that protects Simpson's right to "post-arrest procedural guarantees" such as bail. See Brady v. Dill, 187 F.3d 104, 108 (1st Cir.1999). Simpson's plaint concerning the Jail's policy of denying access to the collect phone can also be characterized as a condition of pretrial detention claim under Bell v. Wolfish, 441 U.S. 520, 99 S.Ct. 1861, 60 L.Ed.2d 447 (1979). Therein the Supreme Court stated: [I]f a particular condition or restriction of pretrial detention is reasonably related to a legitimate governmental objective, it does not, without more, amount to "punishment." Conversely, if a restriction or condition is not reasonably related to a legitimate goal — if it is arbitrary or purposeless — a court permissibly *296 may infer that the purpose of the governmental action is punishment that may not constitutionally be inflicted upon detainees qua detainees. Courts must be mindful that these inquiries spring from constitutional requirements and that judicial answers to them must reflect that fact rather than a court's idea of how best to operate a detention facility. 441 U.S. at 539, 99 S.Ct. 1861 (footnotes and citations omitted). The concern underlying Bell is that the challenged conditions are not "imposed to sanction prior unproven criminal conduct," but are "imposed to enforce reasonable prison disciplinary requirements." Collazo-Leon v. United States Bureau of Prisons, 51 F.3d 315, 318 (1st Cir.1995). It is undisputed that Simpson was given access to two unmonitored calls when he first arrived at the jail in September 2001. It is also undisputed that he had ample access to the phone prior to his October disciplinary segregation. Even after his disciplinary segregation he had the ability to use the mail to reach individuals to help him arrange bail. He also had unlimited ability to send legal mail. Though Simpson argues that the jail officials were unwilling to help him find an address for his associate (making the phone his only recourse to his associate) this refusal to track down an address is not of Constitutional magnitude on its own. The extra delay of relying on the mail to contact his attorney or someone who could do some leg work for him, after Simpson had at least a month prior to his segregation where his phone access was not restricted, does not make this an unreasonable alternative to the phone and is an adequate safeguard of Simpson's right to arrange bail. See cf. Turner v. Safley, 482 U.S. 78, 88, 107 S.Ct. 2254, 96 L.Ed.2d 64 (1987) (observing, in a First Amendment context, that the availability of alternative method of communication was relevant to determining the scope of the burden imposed by the challenged regulation). I also note that Simpson filed one grievance with respect to his need to use the phone to arrange bail. Though the rebuff he received could give an inmate pause about the utility of pressing the matter, the record indicates that Simpson attempted no other avenues of either getting the Jail to allow him access to the phone by providing it with concrete information of how the call was going to allow him to make bail or attempting an alternative method of making the necessary contact beyond the request for his associate's address.[12] The record demonstrates that Simpson was able to meet with his attorney and send mail to him and others; surely others were as capable of helping Simpson locate the address as were the jail administrators. I do not mean to suggest by this analysis that the jail staff had no obligation to respond to Simpson's bail request because he had been unable to make bail initially or because he was in disciplinary segregation. A pretrial detainee's status vis-à-vis ability to post bail can change as a case unfolds and the Jail, given the right set of facts, could find itself confronting a deprivation of constitutional significance if its staff failed to take care to recognize the bona fide nature of bail requests, separate and distinct from routine contact with counsel. These facts do not present that circumstance. *297 With respect to Bell I must gauge whether the restriction or condition was "reasonably related to a legitimate goal" or, conversely, whether it was "arbitrary or purposeless." Bell, 441 U.S. at 539, 99 S.Ct. 1861. First I examine whether the denial of Simpson's request for a call on December 1, 2001, was done with an express intent to punish Simpson. See id.; see also Valdez v. Rosenbaum, 302 F.3d 1039, 1045-46 (9th Cir.2002). The defendants' initiated no action towards Simpson; rather they were reacting to his request. The denial of Simpson's request was pursuant to a policy that prohibited access to the phone for inmates not in good standing. The determination that Simpson's was not a bona fide reason to depart from this prohibition does not support a conclusion that the denial of Simpson's request for a call on December 1, 2001, was done with an express intent to punish Simpson. See Bell, 441 U.S. at 539, 99 S.Ct. 1861; see also Valdez v. Rosenbaum, 302 F.3d 1039, 1045-46 (9th Cir.2002). I must also consider whether a punitive intent can be inferred from the denial. Bell, 441 U.S. at 538-39, 99 S.Ct. 1861. Here I ask "`whether an alternative purpose to which [the restriction] may rationally be connected is assignable for it, and whether it appears excessive in relation to the alternative purpose assigned [to it].'" Id. at 538, 99 S.Ct. 1861 (quoting Kennedy v. Mendoza-Martinez, 372 U.S. 144, 168-69, 83 S.Ct. 554, 9 L.Ed.2d 644 (1963)). The purposes assigned to the denial of the request is that Simpson was in disciplinary segregation because of disorderly conduct including more than one incident of tampering with his door so as to release himself from lock-up (with one of these door tampering incidents occurring on December 1, 2001, the day of Simpson's phone call request.) He was also alleged to have been disobeying orders, threatening, and obstructing jail personnel. Simpson was considered a security risk. Not giving Simpson the special permission he needed under the jail policies to make the phone call is rationally related to minimizing the risk to Jail security. The single denial, particularly in light of the other avenues of communication left open to Simpson, was not excessive in relation to the defendants' justification. Simpson also stresses that the defendants have admitted that the phone policy/denial of request was partially punitive, aimed at sanctioning Simpson (and presumably other inmates not in good standing) for disorderly behavior. Simpson confuses the notion of punishment of a pretrial detainee for the unproven criminal conduct which is the basis for the detention with the notion of punishment for misconduct in the facility. The former is constitutionally impermissible; the latter is not, so long as the "particular condition or restriction of pretrial detention is reasonably related to a legitimate governmental objective." Bell, 441 U.S. at 539, 99 S.Ct. 1861; see also Turner, 482 U.S. at 89, 107 S.Ct. 2254 ("[W]hen a prison regulation impinges on inmates' constitutional rights, the regulation is valid if it is reasonably related to legitimate penological interests.... Subjecting the day-to-day judgments of prison officials to an inflexible strict scrutiny analysis would seriously hamper their ability to anticipate security problems and to adopt innovative solutions to the intractable problems of prison administration."). As indicated above I conclude that Simpson has failed to come forward with sufficient evidence to generate a trialworthy issue on this claim and summary judgment for the defendants is warranted. In re Spigel, 260 F.3d at 31. Conclusion For the reasons set forth above, I hereby GRANT the defendants summary judgment on Simpson's denial of access to the telephone to make bail claim and DENY *298 Simpson summary judgment on that same claim. Simpson's remaining claims are DISMISSED WITHOUT PREJUDICE. So ordered. NOTES [1] Edward Reynolds is now deceased. The parties have not yet moved to substitute the current sheriff. [2] Pursuant to 28 U.S.C. § 636(c), the parties have consented to have United States Magistrate Judge Margaret J. Kravchuk conduct all proceedings in this case, including trial, and to order entry of judgment. [3] The parties have provided factual statements pertaining to the issue of final decision-making authority and polices and procedures. There is no meaningful dispute on this score for purposes of making the municipal liability determination and my conclusions below make it unnecessary for me to set forth these facts in any detail. [4] Simpson's statement of material facts and his reply to the defendants' statement of facts are peppered with legal argument, including discussion of cases and argument on how I should construe the defendants' answers to his complaint; I have culled the material, properly-supported facts from these pleadings. [5] I wrote: Simpson alleges that he submitted a slip on December 1, 2001, requesting a phone call so that he could arrange bail and/or call a lawyer. When this request was denied Simpson submitted on the same day a Penobscot County Sheriff's grievance form indicating that he was a pretrial detainee and that he had a right to use the phone to arrange bail or call an attorney which was denied by Assistant Jail Administrator, Richard Clukey, who stated that it did not meet the criteria of a defined grievance and it did not present a grievable issue. On an unspecified date Simpson submitted a request form asking the jail administration to provide the address for his associate, providing them with his phone number and this request was denied. Regarding his mail privileges, Simpson submitted request forms on December 14, 2001, and January 11, 2002, concerning his mail privileges seeking permission to use his own funds to send additional letters and these requests were denied. Simpson has adequately plead exhaustion for purposes of this motion to dismiss. The defendants' argument that he could have done more does not sufficiently controvert Simpson's claims concerning his efforts to seek redress within the Jail. Compare Ray v. Kertes, 285 F.3d 287, 293, 295 (3d Cir.2002) (holding that the Prison Litigation Reform Act (PLRA) exhaustion requirement is an affirmative defense and that a prisoner need neither plead nor prove exhaustion to proceed under the PLRA, noting that the Second, Seventh, Ninth, and D.C. Circuits have so held) with Knuckles El v. Toombs, 215 F.3d 640, 642 (6th Cir.2000) (holding that a prisoner was required to "plead his claims with specificity and show that they have been exhausted by attaching a copy of the applicable administrative dispositions to the complaint, or, in the absence of written documentation, describe with specificity the administrative proceeding and its outcome"). (Docket No. 26.) Notably, since that decision the First Circuit has joined the Third Circuit (as well as the Second, Seventh, Eighth, Ninth, and D.C.) in concluding that exhaustion is an affirmative defense. Casanova, at 1042 n. 3. A Ninth Circuit panel has just reworked its Wyatt v. Terhune, 280 F.3d 1238 (9th Cir.2002) conclusion vis-à-vis exhaustion as an affirmative defense, adding, among other things, a discussion of the Swierkiewicz v. Sorema, 534 U.S. 506, 122 S.Ct. 992, 152 L.Ed.2d 1 (2002) pleading standard and providing that the defense should be treated as a matter of abatement pursued through Federal Rule of Civil Procedure 12(b) instead of a motion for summary judgment. Wyatt v. Terhune, 305 F.3d 1033, 2002 WL 31103012, *5-9 (9th Cir. 2002); Wyatt v. Terhune, 305 F.3d at 1033 (9th Cir.2002) (denying petition for rehearing en banc and withdrawing opinion published at 280 F.3d 1238). [6] The parties contest this date but the exact date is neither material to the exhaustion question nor the constitutional inquiry. [7] The defendants also state that Simpson's attorney sent Gallant a letter dated December 12, 2001, indicating that Simpson needed access to writing material and the mail for purposes of contacting his attorney and defense witnesses, and also requesting that Simpson be allowed phone access for these purposes. Gallant called the attorney on January 2, 2002, and left a message indicating that Simpson was in disciplinary segregation for three or four months and would not have access to the telephone but that he would have access to writing materials and the mail. She also said that the attorney could visit Simpson during reasonable hours. [8] This is not a situation such as I confronted in Dennison v. Prison Health Services, 2001 WL 761218, *2-3 (D.Me.2001). That plaintiff was a prisoner at the time of filing but was released entirely from custody during the pendency of her suit. I concluded that the § 1997e(a) concern was mooted by her release. Because Dennison raised an acute concern about the judicial efficiency of dismissing the complaint merely to see it re-filed shed of the § 1997e(a) requirement, I found the pragmatic approach advocated in a concurrence and dissenting opinion in an Eleventh Circuit case to be persuasive. See Harris v. Gamer, 216 F.3d 970, 985-86 (11th Cir. 2000) (Anderson, J., concurring; Tjoflat, J., concurring in part and dissenting in part). Nothing that has happened since my opinion in Dennison has changed my view that the problem of exhaustion under § 1997e(a) has to be approached with common sense. [9] I reject the defendants' argument that the date on which Simpson accomplished service on the defendants, April 5, 2002, should be determinative. [10] It is not clear whether the First Circuit would conclude that what is good for the common goose (a prisoner-favorable statute of limitations calculation) is good for the rare gander (a prisoner-adverse "filing" date for a § 1997e(a) determination). See also Morales-Rivera v. United States, 184 F.3d 109, 109 (1st Cir.1999) ("We hold that a pro se prisoner's motion under 28 U.S.C. § 2255 or § 2254 is filed on the date that it is deposited in the prison's internal mail-system for forwarding to the district court, provided that the prisoner utilizes, if available, the prison's system for recording legal mail."). [11] Simpson objected and moved to strike the statement of material fact containing the chronological sequence of these disciplinary infractions. (DFSM ¶ 7; Pl.'s Reply SMF ¶ 7.) In their reply to Simpson's response the defendants have provided a sheath of reports. (Def's Reply Ex. A.) Simpson's rumblings about the disciplinary proceedings and his contention that the Gallant affidavit does not support the statement because she had no personal knowledge of the hearings does not, by any stretch, generate a due process challenge to these charges. Though Simpson argues with the defendants' characterization of the disciplinary process, including whether or not he received a copy of his denied grievance in a timely fashion, Simpson clearly has not and cannot contest the validity of these determinations on due process grounds in this action. See Edwards v. Balisok, 520 U.S. 641, 117 S.Ct. 1584, 137 L.Ed.2d 906 (1997); Heck v. Humphrey, 512 U.S. 477, 114 S.Ct. 2364, 129 L.Ed.2d 383 (1994). The relevance is limited to the fact that Simpson was in disciplinary segregation for what the jail perceived to be a series of disciplinary infractions and, as framed in this case, a determination that the denial of access to bail claim was valid would not imply the invalidity of those disciplinary determinations. [12] Though the allegations of Simpson's complaint concerning access to the phone, mails, and his attorney, taken together supported a claim that the defendant's conduct interfered with his access to courts, this single episode does not support an access to court claim distinct from the analysis conferred here. His other generalized allegations have fallen by the wayside because he failed to exhaust the administrative procedure.
{ "pile_set_name": "FreeLaw" }
Malik Morgan #24 Guard Height: 6'4" Weight: 199lbs. Class: Sophomore City/State: River Ridge, La. High School: John Curtis HS Major: Sports Administration Experience: 2 Letters Career Statistics &dtrif;&rtrif; Bio SOPHOMORE SEASON (2013-14) Season ended early when he suffered a knee injury during the second half of the Auburn game (2/12) … Played in 21 games with six starts prior to injury … One double figure game in the overtime win against Butler (12/1) in the Old Spice Classic … In that game, hit 5-of-11 field goals, including 2-of-3 three-pointers with a season high seven rebounds and three steals, scoring a career tying high of 12 points … Four career games in double figures … Had a strong start at South Carolina (1/11), playing a career best 33 minutes with eight points, six rebounds and four assists … Made nine treys, 34 in two seasons … Averaged 15.5 minutes a game, 4.4 points and 3.1 rebounds a contest. FRESHMAN SEASON (2012-13)Morgan played in all 31 games at LSU, with 14 starts and proved a factor in many games for the Tigers … Averaged 5.3 points per game and 2.9 rebounds, while averaging 18.4 minutes a game … Three games in double figures – 12 at Tennessee (2/19); 11 at Georgia (1/19) and 10 in his first LSU game vs. UC Santa Barbara (11/9) … Eight points against Seton Hall (11/29) where Morgan was 3-of-4 from the field with 2 treys was huge as LSU came from 16-point second-half deficit … Season best 5 assists vs. Mississippi State (2/16) and 5 steals vs. Northwestern State (11/20) … Best of 8 rebounds against Chattanooga (12/11) … Made 25 three-pointers. PRIOR TO LSULed John Curtis to its first Class 2A State Championship in 2012, earning All-State First Team honors from the Louisiana Sports Writers Association … Was named the Class 2A Player of the Year by LSWA … Averaged 18.1 points, five assists and 4.3 rebounds to earn District 10-2A Player of the Year honors and help the Patriots earn the No. 1 playoff seed … Had a career high of 56 points and 10 rebounds in a game versus Riverside Academy … Coach Mike Krajcer was named Coach of the Year as Patriots capped off a 30-3 season. PERSONALBorn on Jan. 31, 1993 … Left handed … Honor Student at John Curtis … Parents are Detra and Sam Morgan … Siblings are Kai Morgan (14) and Kolby Morgan (16) … Mother attended LSU and played volleyball at LSU (1983-86) … Detra (Brown) played on two SEC Championship teams at LSU (1985-86) and led the team in kills, hitting percentage and digs in 1985 … Cousin Aaron Morgan is a football defensive end for the Jacksonville Jaguars … Said LSU was “my dream school since I was a baby since my mother played volleyball at LSU” … Major at LSU is sports management … Likes to watch TV to relax … Lists as his hobby “playing basketball with brother and sister” … Favorite food is Shrimp Pasta … Favorite NBA player of Oklahoma City, but favorite team is the Miami Heat.
{ "pile_set_name": "Pile-CC" }
IggyAzalea.us is not associated with Iggy Azalea, her family/friends or her manager. This is simply a non-profit fansite dedicated to the talented singer. All content posted up on this site is used under the fair use copyright law 107. If anything belongs to you and you would like credit or removal please contact us at gmail before taking any legal actions. Any images and multimedia are copyright to their rightful owners. No copyright infringement is intended. IggyAzalea.us does not knowingly intend or attempt to offend or violate any copyright or intellectual property rights of any entity. Rapper Iggy Azalea says she is now concentrating on executive producing film and TV projects. The 26-year-old star has revealed that she is no more interested in acting but she will remain involved in the industry through her production company, Azalea Street Productions, reported Femalefirst. “There’s no more acting but I actually am doing a lot of executive producing. I’ve got a film coming out next year that I’m producing. “I’m not going to say what network, but I’ve just signed a first rights deal agreement with a big network in America that I am executive producing. We are doing five shows a year for the network, all scripted,” she said. Azalea, however, remained tight-lipped over projects her production company is working on. “I’m not acting but I’m definitely creating a lot of scripted content that you guys will be seeing. I find books and projects and things that I like and I team up with writers and go over the scripts and develop them. “I have a production company called Azalea Street Productions. It is all secret still,” she said. Australian rap superstar Iggy Azalea is the latest recruit to join the X Factor Australia judging panel, which returns to our screen this week just days after it premieres in Australia. We find out what the Fancy singer plans to bring to this year’s series. What type of artists are you hoping to unearth? I’m not necessarily looking for that ballad voice although it would be nice. I think I just really want someone with an interesting story who is an interesting person. Charismatic, warm and friendly. Somebody that I would want to be friends with and everybody is drawn to. I want to really take the time to notice who is memorable and then also who’s talented and can pull it off on stage. But I think sometimes these shows become so much about who can belt it out the most and not enough about personality. I really want to find that person who can still be in people’s minds even when the cameras aren’t rolling anymore. Have you seen any rappers? No, I’m not looking for a rapper. I never really feel like that works in this format. Rap is about song writing and this is about singing and covering other people’s songs, so I don’t know that this works in this format because you’re singing someone else’s lyrics and you also don’t necessarily have a vocal ability, so what are you showcasing if they’re not your lyrics? It kind of gets into murky water, lost in translation. The ‘Black Widow’ hitmaker – who was born in Sydney and grew up in Mullumbimby – sees America as her home now but enjoys returning to her birth country from time to time. She said: ‘I mean, to be honest with you, my home is in America. I’ve lived there for a decade, that’s where I live. It’s great to come back and visit my grandparents, but there is no home connection. It would be like you going home to where you lived when you were nine, I kind of don’t associate with that anymore.’ And the 26-year-old singer is ‘proud’ of the success she has achieved. She added to Australia’s Herald Sun newspaper: ‘To be the best, you want to compete with the best. The people I saw back then who I saw in the charts, who were at the top of our charts, were American. ‘I am proud, but I think anybody would be proud of the success that I’ve had, whether they come from a big city or a small town. It’s tough, no matter what.’ Meanwhile, Iggy will return to Australia following the announcement she will be a new judge on The X Factor. She said previously: ‘I hope it will be a bit of a summer getaway and I can work too. It will be summer so hopefully I can get out and chill and show everybody that is coming with me the good food and the beach and play some tennis and ride horses. ‘Spending a month in Australia is the longest I will have spent there in literally like 10 years. Aussie rapstress Iggy Azalea appears to be turning her attention to producing content for NBCUniversal. The “Team” performer just signed a production deal with the company to create original content. Azalea made the announcement via Instagram with a photo of her signature on the contract. “Wanted to share with everyone that my production company ‘Azalea Street’ has just signed on to create original content for Universal NBC! So guys, I’m an Executive Producer for at least a few years to come! Hopefully many! Lots of scripted series in the works! Lots of interesting ideas!” This partnership between Azalea’s company and NBCUniversal appears to have been in the works for some time. She mentioned her interest in producing content during a recent interview with Notion magazine. “I would still like to get into producing movies and television series, behind the scenes and will be doing that in the next one or two years.” So, if you’re waiting on Azalea’s sophomore album, you’re going to need to keep waiting. But that doesn’t mean she isn’t hard at work! Rapper Iggy Azalea has bought a new home and is busy decorating it following her recent split from her ex-fiance Nick Young. The “Fancy” hitmaker, 26, seems she’s keen to wipe clear any memories she has of her former lover by setting up home elsewhere and putting her own stamp on the interiors, reported Conmtactmusic. Taking to her Twitter account, she said, “Can’t wait to get home and get started on fixing up my new place. I’ve been annoying Adam and Guy talking about carpet all week (sic).” The 26-year-old rapper moved out of the home she shared with Nick in Tarzana, California, late last month after she saw the NBA basketball player getting frisky beneath the sheets with a mystery woman on their home CCTV. Azalea and Young began dating at the beginning of 2014 and got engaged in 2015, but their romance was rocked earlier this year when the “Team” hitmaker had to suffer the indignity of a video leaking online which showed Nick admitting to his Los Angeles Lakers teammate D’Angelo Russell that he had cheated on her with a teenager. Iggy Azalea is gearing up to join a new “team.” The 26-year-old has confirmed she’s taking her talents down under to join the judges’ panel on The X Factor Australia. “I understand what it’s like to have giant dreams and intend to help other young Australians achieve theirs by sharing my knowledge and developing their talent in collaboration with The X Factor,” the Sydney-born artist said in a statement. Iggy will replace Dannii Minogue (sister of Kylie) on the talent show’s upcoming eighth season, though her fellow co-judges have yet to be announced.
{ "pile_set_name": "Pile-CC" }
Retailers had worse sales in November than expected — because of Sandy. The economy isn’t doing as well as experts thought it would — because of Sandy. New home sales were weaker than first reported — because of Sandy. Hurricane Sandy, of course, was a mighty disaster. But it is a godsend to anyone who needs an excuse. Didn’t do your term paper? Blame Sandy. Missed a credit-card payment? It’s Sandy’s fault. Hell, I’m going to plead emotional distress — because of Sandy — the next time I get a traffic ticket, forget to hold open a door or jaywalk. So you can now expect any company, especially those selling or doing anything on the East Coast, to blame the infamous hurricane. This will go on for months. Sandy is like spackle: it covers a whole lot of mistakes. If you want to entertain yourself for a few seconds, put the words “because of Sandy” into a Google search, and you’ll see that everything from blood drives to restaurants to pay phones to college application deadlines were affected by the storm. I mention this because the Labor Department will announce its employment numbers this Friday. They aren’t supposed to be very good — only 90,000 new jobs compared with the 171,000 jobs that magically appeared just a few days before the presidential election. As I’ve mentioned before, the last two employment reports were unusually — and suspiciously — strong. A person with a skeptical mind might think this was because the Democrats needed good economic reports to hold power. President Obama will be in office for another four years, and there is now no real reason to prove statistically that the economy is stronger than it really is. In fact, with the current fiscal-cliff talks, it might be better for the administration to show economic weakness so that the Republicans are forced to negotiate. Besides, if Friday’s number is less than the 90,000 expected, or the unemployment rate goes higher than the anticipated 8 percent (from 7.9 percent), Sandy will be blamed. I have a prediction: a lot of newborns in 2013 will be named — you guessed it — Sandy because of Sandy. *** In my last column, I wrote about pedophiles posting their filth on Facebook. But this isn’t just Facebook’s problem. Companies that advertise on the site are going to be humiliated someday when their ads run alongside sexually explicit images of children. And this is a format problem that only a complete overhaul of Facebook’s design will solve. As it now stands, the advertisements that come up on a Facebook user’s screen are meant entirely for that user. What I mean is, if a person’s Facebook profile says he has a family, the ads will reflect that with, for instance, lots of insurance and financial-services companies. It doesn’t matter what the Facebook user is looking at on the left part of his screen. Those ads come up automatically on the right side. So when The Post’s computer technician and I were investigating the disturbing photos the other day, we saw a stack of ads for MasterCard, Dunkin’ Donuts, State Farm Insurance, the state of Arizona, a game called “Battle Pirates” and Kim Crawford Wine on the same screen. I wonder what those companies would think if they knew. * Wall Street may care about Friday’s jobs report, but the thing that really matters on Main Street is income statistics. Here are some: According to the Federal Reserve, real median household income was up just 1.2 percent in October from this year’s low of $50,757 in April. The current $51,089 income level is slightly above what it was at the end of last year. Median income was $54,761 in October 2007. So, you see the problem? Well, you really don’t get the whole sense from those numbers. Besides this drop-off in income, households are also getting hurt on their investments. Sure, the Standard & Poor’s 500 index is up nicely this year, and the Dow Jones industrial index has some gain. But people aren’t likely to cash in stocks — and have to record a gain or loss on taxes — when they want to make a purchase. They are more likely, in my experience, to look at their bank accounts, see interest income and spend the money that their money has made. But interest income is so puny these days because rates are being held at historic lows by the Fed. Bottom line: Households are not only earning less at work but also getting less return on their savings. Add to that the possibility of higher taxes at the end of the year, and you can probably can see why the economy is in a perpetual state of blah. The only states in which consumers should be feeling any better are those where marijuana has been legalized. My favorite joke of the week is Obama asking for an end to the US debt ceiling. With the Fed already having created $3 trillion in an alternate currency to buy its quantitative-easing bonds, the idea of also giving Washington a blank check on spending is pretty hilarious. I wonder how hard our kids will be laughing 10 or 20 years from now when they endure the 1920s German experience of having to cart wheelbarrows full of currency to the supermarket.
{ "pile_set_name": "Pile-CC" }
This application claims the benefit of Korean Application No. 2000-46938, filed Aug. 14, 2000, the disclosure of which is hereby incorporated herein by reference. The present invention relates to semiconductor devices, and more particularly, to duty cycle correction circuits. Recently, the speed of semiconductor memory devices, for example, dynamic random access memories (DRAMs), has increased to improve the performance of existing systems. However, increasing demand for improved systems may require DRAMs that can process even more data at even higher speeds. Accordingly, synchronous dynamic random access memories (SDRAMs) that operate in synchronization with system clocks have been developed for a high-speed operation, thus significantly increasing data transmission speeds. There are limitations on the amount of data that may be input to and/or output from a memory device per clock cycle of a system clock. To address these limitations, dual data rate (DDR) SDRAMs have been recently developed in order to further increase the transmission speed of data. DDR SDRAMS input and/or output data in synchronization with both the rising edge and the falling edge of a clock. Reliable data transmission is possible when the duty cycle of a clock signal is equivalent at 50%, which is ideal, in a DDR SDRAM or a direct rambus dynamic random access memory (RDRAM). Thus, when a signal having a duty cycle that is not equivalent, i.e. greater than or less than 50%, is provided as an input, the signal typically does not perform very well as an input signal. Duty cycle correction circuits have been developed to address this problem. A block diagram of a conventional duty cycle correction circuit is illustrated in FIG. 1. A duty cycle correction circuit includes a duty cycle corrector 10 and a detection circuit 13. The duty cycle corrector 10 generates a pair of complementary input signals IN and INB, from which distortion is typically removed, in response to first and second complementary clock signals CLK and CLKB, having distortion resulting from nonequivalent duty cycles. The detection circuit 13 feeds back first and second detection signals DETECT and DETECTB obtained by detecting distortion in the duty cycles of the complementary pair of input signals IN and INB of the correction circuit 10 in response to the pair of complementary input signals IN and INB. Now referring to FIG. 2, a circuit diagram of a conventional detection circuit 13 of FIG. 1 will be discussed. When mismatching exists among diode-connected loads M1 and M4, cross-coupled loads M2 and M3, source coupled pairs M5 and M6, and/or the respective transistors in the detection circuit 13, increased distortion may occur in the duty cycles of the pair of complementary input signals IN and INB due to mismatching of the respective transistors, even though less distortion is present in the duty cycles of the complementary pair of clock signals CLK and CLKB. Semiconductor devices according to embodiments of the present invention include a duty cycle correction circuit having a duty cycle corrector and a detection circuit. The duty cycle corrector generates a first input signal having a second duty cycle with a higher degree of equivalence than the first duty cycle in response to a first detection signal and a first control signal having a first duty cycle. The detection circuit generates the first detection signal in response to the first input signal. The detection circuit includes a current source having first and second current sources and a bias circuit that is electrically coupled to the first and second current sources and controls a bias of the first and the second current sources responsive to the first input signal. In some embodiments of the present invention, the duty cycle corrector further generates a second input signal having a fourth duty cycle with a higher degree of equivalence than the third duty cycle in response to a second detection signal and a second control signal having a third duty cycle. The detection circuit, in other embodiments of the present invention, further generates the second detection signal in response to the second input signal. In further embodiments of the present invention, the duty cycle correction circuit includes a load matching circuit that is electrically coupled to the first and second current sources and matches a load of the bias circuit in response to the second input signal. In still further embodiments of the present invention, the first control signal is a true clock signal and the second control signal is a complementary clock signal. Furthermore, the first and second input signals are complementary signals and the first and second detection signals are complementary signals. In some embodiments of the present invention, the duty cycle correction circuit further includes a first output driver circuit that pulls the first detection signal up or down in response to the first input signal and a second output driver circuit that pulls a second detection signal up or down in response to a second input signal. The current generated by the current source is supplied to the first output driver circuit, the second output driver circuit and the bias circuit responsive to a bias voltage. The bias voltage may be a voltage at a first node during a period and is calculated according to the equation VNODB+VNODCxe2x88x92VDDxe2x88x92GND. VNODB is the voltage at a second node, VNODC is the voltage at a third node, VDD is a source voltage, and GND is a ground voltage.
{ "pile_set_name": "USPTO Backgrounds" }
About Me When was the last time you had your air ducts professionally cleaned? Do you know what could be building up in the air ducts in your home? Do you have anyone in the home with breathing sensitivities or allergies? The air ducts in my home were seriously neglected for many years. I had no idea that the dust and debris in the air ducts were what was causing a lot of my allergy symptoms. After the duct cleaning technician explained to me what was in the air ducts, I fully understood the importance of such a service. To learn what could be lurking in your air ducts, visit my site.
{ "pile_set_name": "Pile-CC" }
Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies. aging workforce If you're like most businesses, you've already cut costs and avoided unnecessary expenses. At this point, you might feel like you've exhausted all the possibilities for managing costs and driving significant savings. This eBook looks at how you can cut costs even further without stifling business growth or reducing your workforce. Are your people and customers fully engaging with each other? That’s the question many small and midsize businesses are trying to answer. Employees are scattered. So are clients. Today’s office can be a kitchen counter or an airline seat. Customers demand excellent experiences regardless of device. Mobile devices reign supreme. The workforce and your customers are global — and moving at a relentless pace. With Avaya IP Office, everyone will now be engaged with a complete, across-the-board solution that brings it all together. Read this paper to learn how Avaya IP Office will help give your business a competitive edge. Add Research About us DatacenterDynamics is a brand of DCD Group, a global B2B media and publishing company that develops products to help senior professionals in the world's most ICT dependent organizations make risk-based infrastructure and capacity decisions. Our portfolio of live events, online and print publishing, business intelligence and professional development brands are centred on the complexities of technology convergence. Operating in 42 different countries, we have developed a unique global knowledge and networking platform, which is trusted by over 30,000 ICT, engineering and technology professionals.
{ "pile_set_name": "Pile-CC" }
Q: Show HyperLinks in Gridview I have an XML file and it contains data about products,and the most interesting data is a url that takes user to the page of thah product.I have successfully extracted urls from that XML file into XmlNodeList and then I put them into DataTable so these urls can be displayed in ASPxGridview.But these urls are shown as text and are not clickable.How to convert the text into HyperLinks?Thanks in advance! A: You are looking for a HyperLinkField: http://msdn.microsoft.com/en-us/library/system.web.ui.webcontrols.hyperlinkfield.aspx You'd bind the url to the DataNagivateUrlFields property. Edit with code example: <asp:gridview id="gv1" autogeneratecolumns="true" runat="server"> <columns> <asp:hyperlinkfield text="View Product" DataNavigateUrlFields="url" /> </columns> </asp:gridview>
{ "pile_set_name": "StackExchange" }