text
stringlengths
0
1.59M
meta
dict
Annual immunisation coverage report, 2010. This, the fourth annual immunisation coverage report, documents trends during 2010 for a range of standard measures derived from Australian Childhood Immunisation Register (ACIR) data. These include coverage at standard age milestones and for individual vaccines included on the National Immunisation Program (NIP). For the first time, coverage from other sources for adolescents and the elderly are included. The proportion of children 'fully vaccinated' at 12, 24 and 60 months of age was 91.6%, 92.1% and 89.1% respectively. For vaccines available on the NIP but not currently assessed for 'fully immunised' status or for eligibility for incentive payments (rotavirus and pneumococcal at 12 months and meningococcal C and varicella at 24 months) coverage varied. Although pneumococcal vaccine had similar coverage at 12 months to other vaccines, coverage was lower for rotavirus at 12 months (84.7%) and varicella at 24 months (83.0%). Overall coverage at 24 months of age exceeded that at 12 months of age nationally and for most jurisdictions, but as receipt of varicella vaccine at 18 months is excluded from calculations, this represents delayed immunisation, with some contribution from immunisation incentives. The 'fully immunised' coverage estimates for immunisations due by 60 months increased substantially in 2009, reaching almost 90% in 2010, probably related to completed immunisation by 60 months of age being introduced in 2009 as a requirement for GP incentive payments. As previously documented, vaccines recommended for Indigenous children only (hepatitis A and pneumococcal polysaccharide vaccine) had suboptimal coverage at around 57%. Delayed receipt of vaccines by Indigenous children at the 60-month milestone age improved from 56% to 62% but the disparity in on-time vaccination between Indigenous and non-Indigenous children at earlier age milestones did not improve. Coverage data for human papillomavirus (HPV)from the national HPV register are consistent with high coverage in the school-based program (73%) but were lower for the catch-up program for women outside school (30-38%). Coverage estimates for vaccines on the NIP from 65 years of age were comparable with other developed countries.
{ "pile_set_name": "PubMed Abstracts" }
AML & Identity Verification Policy This Anti-Money Laundering ('AML') Policy and Identity Verification Policy (collectively the ‘AML Policy’) is designed to stipulate the commitment of trade.io Technologies Ltd (the 'Company') and its affiliated companies to detect, prevent and report attempts to use its financial services platform (the ‘Services’) to illegally launder money, to finance illegal activities such as terrorism and drug trafficking, or to commit fraud. Money laundering is defined as the process where the identity of the proceeds of crime are so disguised that it gives the appearance of legitimate income. Criminals are known to specifically target financial services firms through which they attempt to launder criminal proceeds without the firm's knowledge or suspicions. Trade.io Technologies Ltd is a company with limited liability, incorporated under the laws of the Hong Kong. The Company, and trade.io Technologies Limited, and trade.io Financial Ltd. [CL1] (collectively the "Group Companies") offer the Services through its platform, that allows people to buy and sell math-based currencies such as bitcoins. The Group Companies do not keep or manage Bitcoin wallets and/or fiat money deposits. The Group Companies recognize that decentralized and distributed digital currency and payment systems in which payments are processed and secured by advanced cryptography and distributed computing power instead of a centralised (government) institution pose a risk of illegal use (as do all financial systems). The Group Companies believe, however, that the legitimate use of math-based currency networks can potentially provide immense benefits and efficiencies within the global economy. For services provided by the Company which is regulated under Hong Kong jurisdiction, Trade.io Financial Ltd which is regulated under Cayman jurisdiction policy to comply with all applicable laws and regulations regarding AML and identity verification (know your customer / KYC procedures), and to detect and prevent the use of its Services for money laundering or to facilitate criminal or terrorist activities. Accordingly, the Group Companies have implemented this AML Policy and accompanying systems and procedures to assess the specific risks posed by the Group Companies’ Services and established controls to address those risks as required by law. While the Group Companies are committed to protecting its users' privacy, they will not allow people to use its Services to launder money, commit fraud or other financial crimes, finance terrorist activities, or facilitate other illegal conduct. The Group Companies' AML Policy is based on the current Hong Kong and Cayman laws and regulations. If you have any questions relating to this AML Policy, the use of your Account, the Services, or any other matter, please contact us: [email protected].
{ "pile_set_name": "Pile-CC" }
Alley Cats Lapel Pin 2.2"x1.5" Item :#400003-A Satisfaction Guarantee Order with confidence and satisfaction. All merchandise is selected for quality and performance and is guaranteed against defects. If not completely satisfied with your order, please contact customer service within 15 days of receipt of the order to request a return for replacement or credit.
{ "pile_set_name": "Pile-CC" }
1. Technical Field The present invention generally relates to electronic musical instruments, and more particularly, to electronic musical instruments capable of generating musical sounds with plural timbres in response to a sound generation instruction. 2. Related Art Electronic musical instruments having a plurality of keys composing a keyboard, in which, upon depressing plural ones of the keys, different timbres are assigned to each of the depressed plural keys, and musical sounds at pitches designated by the depressed keys are generated with the timbres assigned to the depressed keys, are known. An example of such related art is Japanese Laid-open Patent Application SHO 57-128397. Another electronic musical instrument known to date generates musical sounds with multiple timbres concurrently in response to each key depression. For example, musical sounds that are to be generated by different plural kinds of wind instruments (trumpet, trombone and the like) at each pitch may be stored in a memory, and when one of the keys is depressed, those of the musical sounds stored in the memory and corresponding to the depressed key are read out thereby generating the musical sounds. In this case, when one of the keys is depressed, musical sounds with plural timbres are simultaneously generated, which provides a performance that sounds like a performance by a brass band. However, when plural ones of the keys are depressed, musical sounds with plural timbres are generated in response to each of the depressed keys. Therefore, when the number of keys depressed increases, the resultant musical sounds give an impression that the number of performers has increased, which sounds unnatural. Another known electronic musical instrument performs a method in which, when the number of the keys depressed is fewer, musical sounds with a plurality of timbres are generated in response to each of the keys depressed; and when the number of the keys depressed is greater, musical sounds with a fewer timbres are generated in response to each of the keys depressed. However, in the electronic musical instruments of related art, timbres that can be assigned according to states of key depression are limited, and the performance sounds unnatural or artificial when the number of keys depressed changes. For example, when one of the keys is depressed, a set of multiple musical sounds is generated; and when another key is depressed in this state, the musical sounds being generated are stopped, and another set of multiple musical sounds is generated in response to the key that is newly key-depressed. Furthermore, when plural ones of the keys are depressed at the same time, timbres to be assigned to the respective keys are determined; but when other keys are newly depressed in this state, the new key depressions may be ignored, which is problematical because such performance sounds unnatural.
{ "pile_set_name": "USPTO Backgrounds" }
Enter your email to restore your password Ernst Conservation Seeds grows, processes and sells over 400 species of native and naturalized seeds and live plant materials for restoration, beautification, reclamation and conservation. The environmental climate and professionals in the field are recognizing how important natives are in the restoration of our North American ecology, and that natives are the best choice for use in almost every scenario. We know how to harvest native seeds and grow them in a production environment. We know how to help our customers replicate that success in their own applications. This steadfast commitment to understanding our customers’ needs and advising them on the best solutions hasn’t changed in fifty years. Company details Ernst Conservation Seeds was founded by Calvin Ernst in 1964 as Ernst Crownvetch Farms. This third generation family-owned and operated business was formed to meet the need for soil conservation along our interstate highways. Since that time, our business has evolved with the needs of the soil and water conservation industry. Driving this evolution are increased public and governmental interest in native species as a preferred first choice, sustainable landscape design, low-impact development, responsible reclamation and restoration, improved biodiversity, habitat development and evolving practices in conservation agriculture. Today, we grow, process and sell over 400 species of native and naturalized seeds and live plant materials propagated on more than 8,000 total acres. While the majority of acreage is located in northwestern Pennsylvania, we own additional farm land in Florida, and have cooperative relationships in Maryland, North Carolina and Oregon. Our products are sold to conservation organizations, landscape architects, reclamation/restoration contractors, government agencies and private landowners throughout the United States and abroad. We pay special attention to providing species that enhance the beauty of the environment by their colorful flowers, fruit and foliage. We go to great lengths to provide native seed mixes that reflect the wide variety of species that we have studied growing together in native environments. We provide a diversified selection of seeds and materials that are sure to be of the highest quality. Every order is harvested, processed and shipped with pride and dedication from our entire family and staff. The individual needs of our customers remain our highest priority. We are dedicated to providing our customers with the best native and naturalized seeds and materials available. Our family and employees are dedicated to providing you with products that reflect our values. We trust that each order will be filled to your satisfaction. “The environmental climate and professionals in the field are recognizing how important natives are in the restoration of our North American ecology, and that natives are the best choice for use in almost every scenario,” says Calvin. “We know how to harvest these seeds and grow them in a production environment. We know how to help our customers repeat that success in their own applications, and we take the time to do that with each customer.” Many of the most successful enterprises in history owe their staying power to a visionary leader – one who guided them through the best and worst of times – always with a steadfast resolve and unwavering vision for their destiny. The history of Ernst Conservation Seeds is one such story – intertwined uniquely with that of its founder and president, Calvin Ernst. Born and raised a stone’s throw from where his sprawling agribusiness calls home, Calvin proved himself to be a savvy entrepreneur by the young age of 14, when he received his Pennsylvania nursery license, now known as a plant merchant certification. In his senior year of high school, Calvin grew the record corn crop in Crawford County with guidance from his 4-H leader and the local Penn State University Cooperative Extension office. As a junior at Penn State in 1962, Calvin, his brother Luther and some friends were performing research on crownvetch — an herbaceous legume that spreads through both rhizomes and seed — for the Pennsylvania Department of Transportation. Some staff members from the University told the young men they couldn’t find anyone interested in growing crownvetch. Calvin recalls, “I didn’t initially think that seeds would be my thing. It was really the challenge of doing something PennDOT couldn’t get anyone else to do that put me on this path.” And Calvin has always loved a challenge. In 1963, Calvin was working for Penn State’s College of Agriculture and Luther as a school administrator. The brothers scraped together $1,000 to purchase foundation crownvetch seed and convinced their father, Ted, to plant it on five acres of the family farm. The gamble, they assured him, would pay off.Recalling his mother’s reaction to the initial seed purchase, Calvin says, “She thought every seed must have been worth a penny – she even swept the stray seeds off the barn floor.” It was also in 1963 that Calvin made his most auspicious proposal — and realized his greatest personal gain — when he requested, and was granted, the hand of Marcia Atwell in marriage. The two have been life and business partners ever since, literally traveling around the globe and making an indelible mark on the seed trade industry in the ensuing 50-plus years together. Reflecting on the importance of having her by his side all these years, Calvin says, “Marcia has always supported me personally and professionally. And I could count on her, as I could my parents, to question me on why I thought something was the right idea. She would never say, ‘Don’t ever do that again,’ but instead she would ask why things didn’t work out and how we could learn from it.” He continues, “I think more than anything, it was her support back home and keeping the family together and strong that always made it productive for me to go out and try things, then come back and regroup now and again.” In 1964, the Ernst brothers planted an additional 60 acres of crownvetch on leased land in the spring, and harvested the earlier five-acre stand that fall. With Ted’s assistance, the 1964 crop was sold to Stanford Seed in Plymouth Meeting, Pennsylvania. The Ernst family enterprise — newly dubbed Ernst Crownvetch Farms — had its first customers and was officially in the seed business. The sale to Stanford Seed and other early customers allowed the fledgling agribusiness to hire its first full-time employee, who would help them expand production on owned and leased land. Calvin had witnessed firsthand the potential of crownvetch for erosion control while living and working in the greenhouses at Penn State. His gut told him this legume held enormous potential for commercial viability. His timing couldn’t have been better. It was during this period of time in the mid-to-late 1960s that the massive Unites States Interstate Highway System was being built. Superhighways like I-79, I-80, I-90 and I-95 were being carved across the American landscape. Suddenly, there was high demand for effective cover crops to revegetate rights-of-way and highway medians. Much of Ernst Crownvetch Farms’ key growth occurred during the ensuing years, thanks largely to the relationships being cultivated with highway departments and government agencies involved with the interstate system. The 1967 crownvetch crop made it possible to purchase the 180-acre property which Ernst Conservation Seeds still calls home today. It also allowed for the Company’s first personnel expansion, to what was then a handful of people who helped the Ernsts grow both crownvetch seed and crowns. In fall of 1969, Ernst Crownvetch Farms joined forces with Multi-Systems, Inc., a public corporation based in Detroit, to purchase a 640-acre farm in north central Nebraska, where they plowed under the native prairie and planted the entire farm in irrigated crownvetch. The purchase doubled the acreage Ernst had in production at the time. Over the next three years, Calvin, Marcia and young sons Andy and Michael would spend a couple months each spring and fall living on the Nebraska farm while fields were planted and harvested. By 1972, the price of crownvetch collapsed. The Ernsts’ partnership with Multi-Systems was mutually severed, with Ernst Crownvetch Farms owing $12,000. With no available assets, Calvin and Marcia took yet another risk by securing local Farmers Home Administration financing on approximately 500 acres back home in Crawford County. The couple expanded their business by growing crownvetch crowns and potted plants. They soon paid their debt from the dissolved partnership and moved on, in control of their own destiny once again. The couple was blessed with the birth of daughter Robin in 1973. The remainder of the 1970s saw Calvin and Marcia raising the three kids while continuing to sell crownvetch and grain crops. According to Calvin, the children all shared a love for the natural world and the ever-changing business their parents were in. “I don’t think they ever looked at our farming as drudgery,” he says. “It seems they always figured, ‘Something’s going to happen here that’s going to be more exciting than the last thing.’ And that kept them engaged. Every time we made progress, we shared it with them as well. I think that was important. And it’s something they do with their own kids today.” The business continued to expand until the 22% interest rates of the early 1980s hit. When the value of crownvetch wasn’t worth the cost of harvesting it, the couple began growing large volumes of no-till corn planted right into the existing crownvetch fields. The practice created high corn yields due to the legume’s excellent nitrogen-fixing properties. Once again, crownvetch had saved the day, even when it was playing a supporting role as a cover crop. In 1985, Ernst Crownvetch Farms hired its first full-time information technology employee to manage the company’s inventory and sales & marketing activities. This progressive move was becoming characteristic of the Ernsts and their approach to agriculture as a true business, and its employees as professionals. “I think I’ve generally been successful at finding or developing a skill set within an employee – a skill set that was useful for the business and that person’s professional growth,” he comments. “I’ve tried to mold some of our employees into what the business needs them to be with a lot of success. And some of them I’m still working on,” he laughs. In the later 1980s, Ernst began growing native deertongue obtained from the USDA’s Big Flats Plant Materials Center in Corning, New York. Deertongue was the first native used for strip mine reclamation where low soil pH was a challenge. Calvin credits the propagation and marketing of deertongue seed as the turning point in the Company’s eventual transition from the non-native crownvetch that had driven sales for the first 20-plus years to the native plant species that would assume that role moving forward. The Company planted its first foundation switchgrass seed (‘Shelter’ variety) in 1988. Calvin was interested in switchgrass because it added wildlife value to strip mine and reclamation seed mixes. It wouldn’t take long, however, for him to find an even higher calling for this high-yielding warm season grass that grows so well on marginal lands. In 1990, Ernst was purchasing much of its crownvetch seed from growers in southeastern Minnesota in order to mitigate the effects of low market prices. The Company built a small processing facility and erected a handful of grain bins there. Calvin recalls that these activities in Minnesota first piqued his interest and drove a shift in his business strategy toward the diversity of natives and their potential to revolutionize the seed trade. Southeast Minnesota and Iowa were home to many of the first commercial growers of native ecotypes. This fraternity of like-minded producers was very helpful, sharing their combined insights with the ever-curious and innovative entrepreneur. In short order, Calvin began shifting acreage from grain and crownvetch production to that of native forbs and grasses. In step with Ernst’s shift toward native ecotypes was a shift in the attitudes of government agencies toward the use of non-native species such as crownvetch. Non-natives, specifically those classified as aggressive species, were beginning to be blacklisted in favor of a move toward native species. Once again, Calvin had begun innovating and adapting his product offering ahead of the curve. Calvin has always believed in the need to continually educate himself and others on best practices, to study the future of agronomy and foresee opportunities to diversify and meet future demands. His peers recognize this as well, often inviting him to speak or to participate in the greater conversation within the industry. In the summer of 1990, Calvin and Marcia traveled to Eastern Europe as part of the “People to People” exchange program in order to study a diverse agricultural practice. In 1991, Calvin traveled with the USDA to China to promote inter-cropping perennial legumes with annual grain crops in order to reduce crop inputs and erosion. Further expansion of the farm’s operations occurred at this time with help from Ted and the hiring of additional employees. Calvin recalls fondly one of those employees in particular. “Pressley Hilliard came to me in an old wreck of a car one day and said, ‘Calvin, you need to buy my farm and grow corn.’ I said, “Pressley, I’m going to show you how to make money without growing corn or raising dairy cows.” We spent time traveling together in the Midwest buying and selling seed and he became enamored with the large production fields. You see, fifteen years ago or so, there was a big transition from dairy farms to crop farms. And it seemed that on every farm where they had torn down the old dairy barns and went straight to crop farming, there was a Cadillac in the yard, so to speak. And on one of those trips, Pressley finally looked at me and said, ‘when I get back, I’m gonna tear down those old barns.’ He was a great person and really became member of our family. We lost Pressley a couple years ago, and folks are still telling stories about him today.” In 1993, Ernst Crownvetch Farms secured the rights to grow and market ‘Niagara’ Big Bluestem, which was successfully planted in 1994. At about this time, the Company changed its name to Ernst Conservation Seeds in order to better represent its evolving products and philosophy. By that time, Ernst was wild harvesting and growing native wetland seeds for the wetland mitigation market.Further opportunity arose when Ernst began collaborating with federal agencies, highway departments and land developers for the purpose of establishing wetlands and meadows using native seeds, and teaching these groups how to install bioengineering materials for soil stabilization. Andy, Michael and Robin all pitched in with Ernst employees to expand native seed production and sales. Andy became involved in both state and national professional seed organizations that promote better quality standards. Michael busied himself building additional processing, storage and office capacity. Robin directed seed sales and promoted efficient native seed installation.Mark Fiely joined Ernst Conservation Seeds in 1995 as its full-time horticulturist, helping Calvin diversify the Company’s offering of native ecotypes. To this day, Mark spends a considerable portion of his time traveling the eastern United States in search of new species and researching their viability as production crops. He also works closely with customers, from large government agencies to landscape architects and hobby gardeners, all with the goal of educating them on the use of native species and assisting in their successful establishment. In 2001, fire destroyed a major portion of the Company’s seed conditioning facility in Meadville and several of that year’s crops were lost. Employees and neighbors brought their own tools to help the family rebuild. “Our community was showing up to help us before the end of the first day,” recalls Calvin. With used equipment and loyal employees, seed was conditioned outside through the winter. In 2002, a new seed processing facility was completed, including equipment repair bays and a secure bay for the handling of field spray applications. Though the incident was tragic, it is widely seen as a unifying moment in the history of the Company, strengthening bonds between the family, its employees and the community, while also necessitating facility expansion and improvements that would pay dividends in short order. “It was something we’d never want to repeat under the same circumstances,” Calvin reflects. “But it allowed us to rebuild and improve the facilities we had. The changes we were able to make to our capacity and processing efficiency just advanced us tremendously. And the way our neighbors, business partners and employees came together and helped out so quickly is very special. It was quite a pulling together.” In response to a challenge to develop a native seed source for the extreme southeastern United States, Calvin initially utilized his vacuum harvesting technology to wild harvest wiregrass in central Florida. These successful wild harvests and collections of native forbs and grasses throughout Florida gave him yet another opportunity to expand. In 2003, the Ernst family purchased a farm in Live Oak, named it Ernst Southern Native Seeds, LLC, and began field production, with frequent assistance from the NRCS Plant Materials Center (PMC) in Brooksville, Florida and the Florida Wildflower Seed & Plant Growers Association. Due to decreased demand, coupled with production difficulties involving wiregrass and some of the forbs, this venture did not prove to be as fruitful as hoped. However, with the aid of the Brooksville PMC, Calvin is successfully producing seed of two plant materials center releases of ‘Stuart’ and ‘Miami’ switchgrass. Additionally, in cooperation with the U.S. Department of Agriculture, Agricultural Research Service (USDA, ARS) in Griffin, Georgia, he is multiplying seed for more than 40 southeast ecotypes of lowland and upland switchgrass, along with his own native wildflowers. Calvin had been considering the potential for developing grass biomass for energy production. He put his plans to the test in 2005 by leasing 5,000 acres of marginal farmland in Crawford County and planting switchgrass for seed and biomass production. With marginal land being what it is, Calvin learned plenty about the effects of low pH and wet soils. Switchgrass performed well, but, “with thousands of tons of lime and patience, it did better,” recalls Calvin with a wry grin. Research soon began on the densification of grass for use in direct combustion applications. In a characteristically gutsy move, Calvin decided that his Company would need to be the innovator once again — leading the charge instead of sitting on the sidelines of progress. Ernst would build its own state-of-the-art facility to process warm season grasses. Michael and a select group of dedicated employees designed and constructed a pellet plant that uses only grass. The plant was completed in 2012 and is currently producing densified grass pellets for multiple uses as a separate entity called Ernst Biomass, LLC. As with most of Calvin’s ventures, very little financial assistance was utilized in the interest of maintaining project control and keeping development on schedule. The facility has opened numerous market opportunities for grass biomass, including numerous agricultural applications and uses in the burgeoning Utica and Marcellus shale oil and gas plays of the northeastern United States. Today, with over 8,000 acres in production, Ernst grows more than 400 diverse crops for conservation, restoration, beautification, energy, pharmaceuticals and consumption. Future growth opportunities can be seen in increased public and governmental interest in sustainable landscapes, low-impact development, responsible reclamation and restoration, improved biodiversity and habitat development, and evolving practices in conservation agriculture. While Calvin and Marcia show no sign of slowing down, their children all play critical roles in the future growth and diversification of Ernst Conservation Seeds and its affiliates. Andy and Michael Ernst share responsibilities for day-to-day operations at Ernst Conservation Seeds and Ernst Biomass, while Robin operates Meadville Land Service, Inc., a full service mobile restoration company specializing in the construction, restoration and mitigation of streams and wetlands, as well as native planting, seeding and the installation of bioengineering material. Darrell Ernst, Calvin’s younger brother, has been with the Company as an electrical and hydraulic mechanic for over five years. After a passing glance back on the first 50 years of his Company’s history, Calvin immediately focuses on the promise of its future. “The environmental climate and professionals in the field are recognizing how important natives are in the whole restoration of our North American ecology, and that natives are the best choice for use in just about every scenario. “Through our experience, we know how to harvest these seeds and grow them in a production environment. We know how to help our customers repeat that success in their own unique applications, and we take the time to do that with each customer. “There’s progress to be made in the efficiency of producing native seeds and in discovering, or creating, new markets for them. We continue to find new plants in diverse ecologies that may contain a thousand species in a square mile. It is the mission of Ernst Conservation Seeds to make available to eastern North America the key native and naturalized species of plants for restoration, reclamation, conservation, wildlife and pollinator habitat enhancement, renewable biomass energy and the beautification of our nation. We will identify, collect and propagate new species and ecotypes that will meet our clients’ needs, from eastern Canada to the southeastern United States. Our native seeds are produced from species that are considered the most significant foundation of an effective native restoration or reclamation project. To ensure our customers receive a quality product, all of our seeds are harvested, conditioned and tested under the highest quality standards. In addition to 8,000 acres of native seed production at Ernst, we supply seed from some of North America’s top producers and collectors. Ernst Conservation Seeds and its suppliers collect, grow and process all of our products in an ecologically sustainable and renewable manner.
{ "pile_set_name": "Pile-CC" }
Don't get me wrong, Macross is a great Anime series. But, the same can't be said for the game. You begin by gazing at a sassy gong-vixen (Minymay?) and then hop into your Valkyrie (Transforming spaceship). Now, you have a rapidly decreasing power supply, which is drained even faster when you hit enemies. Basically, if you get hit once, you won't have enough power to make it to the next stage. You can always change into your robot form, with rapid fire, but you move too slowly and, once again, won't be able to make it to the next level. Graphics are poor, Gradius is infinitely times better. Sound, once again, repeats constantly. Controls are good, but the difficulty is always set on nigh-impossible. Too damn difficult for its own good.
{ "pile_set_name": "Pile-CC" }
Q: Why do XS subs use const char *? A lot of Perl XS code uses const char * as the return value of an XS sub but never just char *. For example: const char * version(...) CODE: RETVAL = chromaprint_get_version(); OUTPUT: RETVAL code from xs-fun Can someone explain why const is preferred? In my testing, the returned scalar is modifiable whether const is used or not. A: It's only for clarity. The chromaprint_get_version function returns a const char *, so the XSUB should be defined with a const char * return type as well. If you have a look at the built-in typemap, it doesn't make a difference whether you use const char *, char *, or even unsigned char *. They all use the T_PV typemap. In all cases, the XSUB will return an SV containing a copy of the C string, which is always modifiable.
{ "pile_set_name": "StackExchange" }
This application claims priority to Patent Application No. 2003-281029 filed in Japan on 28 Jul. 2003, the content of which is incorporated herein by reference in its entirety. The present invention pertains to a magnetically coupled device in which insulator layer(s) intervene between mutually magnetically coupled transmitting coil(s) and receiving coil(s), input of signal(s) at transmitting coil(s) causing output at receiving coil(s) of signal(s) produced at least partially by induction due to magnetic coupling therebetween; and to electronic equipment employing same. As is known, optically coupled devices, employed in a wide variety of electronic equipment, are provided with light-emitting element(s) at input side(s) thereof and light-receiving element(s) at output side(s) thereof, signal transmission taking place with input side(s) being electrically isolated from output side(s). It so happens that in recent years magnetically coupled devices, with their faster communication rates, have drawn more attention than optically coupled devices due to increases in transmission speed (on the order of between 50 Mb/s and 100 Mb/s), representative of which is the situation existing with respect to fieldbus networks for factory automation equipment and the like. Among such magnetically coupled devices is, for example, that disclosed at U.S. Pat. No. 6,376,933. In this magnetically coupled device, which comprises bridge circuitry including magnetoresistive sensor(s) for which resistance varies in correspondence to magnetic field strength, magnetoresistive sensor(s) is/are used to detect input magnetic field(s), output signal(s) from magnetoresistive sensor(s) is/are extracted from bridge circuitry, such output signal(s) is/are fed back thereinto, output magnetic field(s) is/are produced, and output signal(s) from magnetoresistive sensor(s) is/are extracted to the exterior while control is carried out so as to cause input magnetic field(s) and output magnetic field(s) to cancel out one another. Here, because output signal(s) is/are fed back thereinto, input magnetic field(s) and output magnetic field(s) being made to cancel out one another, internal noise generated at output-signal-side circuitry is canceled out. However, the foregoing conventional magnetoresistive devices have had the problem that, even where it may have been possible to reduce internal noise, as no consideration had been made for reduction of geomagnetism and other such external noise, there has been occurrence of distortion of output signal waveform(s) and/or phenomena such as dropped bits during communication of output signal(s), preventing normal communication. The present invention was therefore conceived in light of the foregoing conventional issues, it being an object thereof to provide a magnetically coupled device capable of reducing effects of external noise and of stably carrying out high-speed communication.
{ "pile_set_name": "USPTO Backgrounds" }
Q: $f'=e^{f^{-1}}$, again This question is a spin-off of this one, in which the OP asks whether there is a solution $f:\mathbb R\to\mathbb R$ of the functional equation (not exactly an ODE) $f'=e^{f^{-1}}$, where $f^{-1}$ is the compositional inverse of $f$. The posted answer exploits the growth of $f(x)$ when $x\to-\infty$ and obtains a contradiction, which resolves the question nicely, but also invites the following question: what if we restrict to $f:\mathbb R_{\ge0}\to\mathbb R_{\ge0}$ and impose $f(0)=0$? This idea has been explored in the comments, where a formal power series expansion is obtained for $f$ which does not seem to converge for any $x\ne0$. Taking another approach, we can use an iteration scheme starting from $f_1(x)=x$ and inductively solve the ODE $f_{n+1}'=e^{f_n^{-1}}$ with the initial condition $f_{n+1}(0)=0$ to obtain $f_{n+1}$, much in the spirit of Picard iteration. Explicitly, for example, we have $f_2'=e^x$ and $f_2=e^x-1$; $f_3'=e^{\ln(x+1)}=1+x$ and $f_3=x+x^2/2$; $f_4'=e^{\sqrt{1+2x}-1}$ and $f_4=e^{\sqrt{1+2x}-1}(\sqrt{1+2x}-1)$ and the next iteration produces non-elementary functions. It is clear that the sequence $(f_{2k-1})_{k\ge1}$ is increasing, $(f_{2k})_{k\ge1}$ is decreasing, and $f_{2k-1}<f_{2k}$, so there are respective limits $f_-=\lim_{k\to\infty} f_{2k-1}$ and $f_+=\lim_{k\to\infty} f_{2k+1}$, with $f_-\le f_+$. It is also clear that from $n\ge2$ on the function $f_n'=e^{f_{n-1}^{-1}}$ is positive and increasing, so $f_n$ is increasing and convex, which can be passed to the limit to show that both $f_-$ and $f_+$ are also increasing and convex. As such they are continuous, and by Dini's theorem $f_{2k-1}$ converges to $f_-$ locally uniformly and similarly for $f_+$. Furthermore, the inequality $|x-y|\le |f_n(x)-f_n(y)|$ (as $f_n'=e^{f_{n-1}^{-1}}\ge1$) can also be passed to the limit. Then the following chain of inequalities: $|f_-^{-1}(x)-f_{2k-1}^{-1}(x)|\le |x-f_-(f_{2k-1}^{-1}(x))|=|f_{2k-1}(f_{2k-1}^{-1}(x))-f_-(f_{2k-1}^{-1}(x))|$ shows that $f_{2k-1}^{-1}$ converges locally uniformly to $f_-^{-1}$, which then implies $f_{2k}'$ converges locally uniformly to $e^{f_-^{-1}}$. Hence $f_+'=e^{f_-^{-1}}$, and similarly $f_-'=e^{f_-^{-1}}$. From this it can be shown that $f_{2k-1}$ converges to $f_-$ locally in $C^\infty$, so both $f_-$ and $f_+$ are smooth functions, and they form an orbit of order at most 2 of the above iteration scheme. Moreover it can be shown that the first $n$ terms of the Taylor expansion of $f_n$ agrees with what have been calculated formally in the previous comments, so both $f_-$ and $f_+$ have the same Taylor expansion as calculated using formal power series expansion. In light of the above, a priori the following three scenarios can happen: $f_-\neq f_+$ and we have a genuine orbit of order 2, consisting of two functions having the same Taylor expansion at 0 but not being identical. $f_-=f_+$ is an actual solution to the equation $f'=e^{f^{-1}}$, but it is merely $C^\infty$ but not analytic, having a divergent power series expansion at 0. $f_-=f_+$ is an actual solution to the equation $f'=e^{f^{-1}}$, and it is analytic on a neighborhood of 0; we are just misled by the first 100 or so terms of the Taylor expansion. Now finally comes the question: which of the above scenario is the reality? In the first two scenarios, one can also ask what is the growth rate of $f_-(x)$ and $f_+(x)$ as $x\to+\infty$. A: There is no analytic local solution at $0$ to $f'=e^{f^{-1}}$, $f(0)=0$, that is, the formal power series solution is diverging. Together with the solution given in comments by fedja, this means the actual scenario is 2. For convenience of notation, I shall consider the equivalent equation $$\begin{cases} g' =e^{g\circ g}, \\ g(0)=0, \end{cases}$$ satisfied by $g(x):=-f^{-1}(-x)$ (Indeed, by the rule of the derivative of an inverse, $(f^{-1})'(x)={1\over f'(f^{-1}(x))}=e^{-f^{-1}(f^{-1}(x))}$ so that $g'(x) =e^{g(g(x))}$; see also Tom Copeland's previous answer here.) Indeed, assume by contradiction the formal power series solution $x+{1\over2}x^2+{1\over2}x^3+{2\over3}x^4+\&c.$ to the above equation has a positive radius of convergence. Then, it extends uniquely by analytic continuation to a maximally-defined analytic function, still denoted $g$ (that is, defined on the largest positive interval $[0,a)$, for some $0<a\le+\infty$). Note that the Taylor series of $g$ at $0$ has non-negative coefficients. This follows immediately by induction, equating the coefficients of $g'$ and $e^{g\circ g}$; incidentally, this series is the EGF of the positive integer sequence OEIS A214645, as also remarked here. As a consequence (check the details below), $g$ is totally monotonic on $[0,a)$; in particular $g'(x)>g'(0)=1$ and $g(x)>x$ for all $0<x<a$, and $g$ is invertible. Then observe that $\log( g'( g^{-1}(x))$ is a well-defined analytic function on the interval $g[0,a)$, and coincides with $g$ locally at $0$. By the maximality of $[0,a)$ we have thus $g[0,a)\subset[0,a)$, but, due to the inequality $g(x)>x$ on $(0,a)$, this inclusion is only possible if $a=+\infty$, so that $g$ is unbounded. On the other hand, arguing as in Christian Remling's previous answer, since $e^{-g(g(t))}g'(t)=1$ and $g(t)\ge t$, we have for any $x\ge0$ $$x=\int_0^{x}e^{-g(g(t))}g'(t)dt=\int_0^{g(x)}e^{-g(s)}ds\le \int_0^{+\infty}e^{-s}ds=1 ,$$ a contradiction. $$*$$ Rmk 1. To justify the total monotonicity of $g$, note that, as a general elementary fact, a real analytic function on an interval $I$, whose Taylor series at some point $x_0\in I$ has non-negative coefficients, has Taylor series with non-negative coefficients ay any point $x\in I$, $x\ge x_0$. Indeed, this is clear for $x_1\ge x_0$ within the radius of convergence of $x_0$, and since there is a uniform radius of convergence at any $y\in [x_0,x]$, one reaches $x$ by finitely many steps $x_0<x_1<\dots<x_n=x$. $$*$$ Rmk 2. The very same argument works for other differential-functional equations like e.g. $$\begin{cases} g' =1 + {g\circ g}, \\ g(0)=0, \end{cases}$$ that generates the sequence OEIS A001028. As before, a maximally-defined analytic solution $g$, if any, must be totally monotonic and defined for all $x\ge0$, for otherwise $ g'\circ g^{-1} -1$ would be a proper extension of it. Then we reach a contradiction as before, with one more step needed: since we have ${ g'(t)\over 1+g(g(t))}=1$ and $g(t)\ge t$ for any $t\ge0$, we also have, for any $x\ge0$ $$x=\int_0^{x}{ g'(t)dt\over 1+g(g(t))}=\int_0^{g(x)}{ dt\over 1+g(t)}\le\int_0^{g(x)}{ dt\over 1+t}=\log(1+g(x)) ,$$ whence $e^x\le 1+ g(x)$; if we plug this into the latter inequalities again, we get $$x=\int_0^{g(x)}{ dt\over 1+g(t)}\le \int_0^{g(x)}e^{-t}dt\le 1 ,$$ as before. By comparison, the same conclusion also holds for $g'=F( {g\circ g})$ with any $F$ analytic and totally monotonic on $(-\epsilon,+\infty)$, and with $F(0)=1$.
{ "pile_set_name": "StackExchange" }
Q: Transform smarty Boolean value to human readable value.('Yes'/'No' or 'True'/'False') I'm using Smarty to generate some tables, and at one point I'm printing out variable values that have been passed from php file. The problem is that some of these variables are Boolean values and they render as "1" or "". This was my attempt to transform these Boolean values to a human readable format. It does not work. How can can I check if a variable is a Boolean value? {if $val2.$value_index === true}Yes {else if $val2.$value_index === false}No {else}{$val2.$value_index->value}{/if} A: Use the PHP var_export() function as a smarty modifier for your boolean variables. Set the second parameter to true, so var_export() returns the variable representation instead of outputting it. To check if your variable is a boolean, use the PHP is_bool() function. Your Smarty code should look like this: {if is_bool($val2.$value_index)} {$val2.$value_index|var_export:true} {/if} A: I'm not exactly familiar with this, but it looks as though that should be: {if $val2.$value_index->value === true}Yes {elseif $val2.$value_index->value === false}No {else}{$val2.$value_index->value}{/if}
{ "pile_set_name": "StackExchange" }
Q: Php, static variables for trait itself only, how? its possible to have static variables for traits: Trait Example { public static $var; } class X { use Example; } class Y { use Example; } however, the problem is when more class would want to use this trait, I get a fatal error: Example and X define the same property ($var) in the composition of Y. This might be incompatible, to improve maintainability consider using accessor methods in traits instead. Class was composed how to define this static variable just for the trait itself? A: Traits can define both static members and static methods. however You can not reassign trait properties. From PHP manual http://php.net/traits See Example #12 Conflict Resolution If a trait defines a property then a class can not define a property with the same name, otherwise an error is issued. It is an E_STRICT if the class definition is compatible (same visibility and initial value) or fatal error otherwise. The solution would be to override properties in the class Trait Example { public static $var; } class X { use Example; public static $var; } class Y { use Example; public static $var; }
{ "pile_set_name": "StackExchange" }
A wide variety of consumables (e.g., foods, beverage, cosmetics, etc.) contain contaminants, toxins, allergens, and/or other substances that are of interest to all or specific types of consumers. In particular, in recent years, an increase in the number of consumers with an identified allergy (e.g., gluten allergy, dairy allergy, fish allergy, nut allergy, soy allergy, cosmetic allergy, etc.) has contributed to a number of products that omit ingredients having an associated allergen; however, such consumers are still at risk for consuming items with a harmful substance when the items do not have adequate labeling or documentation. Various systems and methods exist for detection of toxins and harmful substances present in a sample; however, current systems and methods are deficient due to one or more of: a time-intensive manner of receiving test results, a labor-intensive manner of receiving test results, a non-automated manner of processing samples, system bulk, system non-portability, and other factors that contribute to inconveniencing a consumer using such systems. Due to these and other defects of current systems and methods for detecting harmful substances in consumables, there is thus a need for an improved system and method for detecting target substances. This invention provides such a system and method.
{ "pile_set_name": "USPTO Backgrounds" }
How to Control the Ring In this week’s CROM’s Corner we will be going through part 2 of our Footwork series. Although there are a few different aspects that go into Ring Generalship, I believe the integral components stem from footwork. Some people understand the term, some people have never heard of it, and some don’t care for it. If you are any of these three, know that if you don’t KO/stop your opposition that this is one of the deciding factors that a judge will be looking at to score for or against you. While it’s true that everyone loves a knockdown, drag ‘em out brawl, I was a commentator on a beautifully technical bout this past weekend which was a great display of exactly what ring generalship represents. It was a 5 round work of art by two female Nak Muays in a rematch at the 105 lb/ 48 kg mini flyweight division. The blue corner was the taller and more aggressive style fighter, as the red corner was content to be the counter fighter. From the opening bell the blue corner was attempting to set the pace by using her lead leg to establish range. The red corner was wise enough to stay just out of range and counter with hopping lead leg push kicks of her own. As the fight/round went on the red corner started to evade and counter the blue corners attack using precise timing and low kicks to blue corner’s lead leg. Though the blue corner was using smart aggressiveness the red corner was utilizing sharp footwork to stay out of corners, off the ropes, and to create angles for her low kick attacks. The red corner was able to use position and ring awareness alongside accurate counter attacks throughout the fight to retain her title in championship form. How do you define “Ring Generalship”? I believe every coach will have their own interpretation as to what ring generalship is and they will have valid points. In my opinion, ring generalship is the ability to move and use the entire ring in such a way to corral and land significant strikes to mentally and physically dominate your opposition. The finer points of Ring Generalship: -Precise and purposeful footwork -Awareness of where you are in the ring in relation to your opposition -Being able to use the ropes to your advantage -Using feints to keep your opponent guessing, confused and off rhythm -Using stalling or retreating to bait the opposition in to attacking first, leaving them open for counter attacks -Mimicking a shark with circling and forward movement as you are hunting and stalking for your own offensive maneuvers As with any technique in Muay Thai do your best to incorporate this in to your shadowboxing, bag work, pad work and sparring and it will become a part of your fighting strategy. Becoming a ring general will make it crystal clear for the judges and the crowd to see who’s in charge.
{ "pile_set_name": "Pile-CC" }
Transcript 1. Professional Presence The Hard Facts about Soft Skills Handouts 2. In business, professional relationships are enhanced when people understand and practice business protocol. Every time an associate presents or accepts a business card, greets a customer with a handshake, or attends a business lunch or dinner, they will exemplify the polish and professionalism that communicates exceptional customer service and market leadership. In today’s more casual business dealings, that rare individual is easily distinguished from the competition. Business protocol and etiquette is also a foundation for individuals developing their leadership potential. It makes an immediate and noticeable difference in how an individual is perceived and in their effectiveness in business and social interaction. Ellen Reddick 2 Impact Factory [email protected] 801.581.0369 3. What is Business Presence? A powerful business presence exudes high-level professionalism in attire, posture, conduct, and verbal skills as well as displaying confidence, leadership, and personal power in a businesslike manner. A powerful business presence conveys on the nonverbal level: "I am intelligent; I have choices; I am resourceful; I can be authoritative, easily managing and inspiring other people; and I am capable of handling any business situation, including conflict and curve balls." Know the components of business presence, and learn how to use them to your advantage: • Attire - all aspects of your clothing selections, including accessories such as shoes, jewelry, eye-glasses, etc. • Hair - style, color, condition, length • Grooming - overall cleanliness, and personal presentation, including fragrances use and abuse • Posture - confidence in the way you hold yourself • Demeanor - mannerisms, and body language • Business Accessories -such as briefcases, pens, technology tools, etc. • Communication Skills - articulation, eye contact, and effective listening • Etiquette Skills - the right handshake, business protocols, and courtesies Ellen Reddick 3 Impact Factory [email protected] 801.581.0369 4. First Impressions Appearance + Actions + Attitude When someone meets you for the first time, they will make up to eleven assumptions about your personal or professional life. These assumptions are made fast – within three to seven seconds. Right or wrong, correct or incorrect, your appearance, actions, and attitude prompt immediate speculation – conclusions accepted as true without any real proof. Age ~ This assumption is largely based on physical aspects. Make sure you pay attention to your appearance. Level of Education ~ Education can refer to textbook knowledge as well as worldly exposure. Appearance, action & attitude – will strongly affect this assumption. Moral Character ~ This assumption is based on whether you project an understanding of what is morally and socially right or wrong. Likability ~ Your actions, particularly nonverbal body language, can greatly affect this assumption. A friendly smile, sincerity, politeness and good listening habits can push this assumption to the positive side. Position in Company ~ Of the three’s A’s, attitude is the most helpful here, Have you noticed the upper management tend to exude confidence and a positive attitude? Body language is important – walk taller, hold shoulders back, and make excellent eye contact. Income ~ This assumption often reverts back to appearance, one that you can correct quickly. Level of Success ~ As we mentioned earlier, attitude is contagious. Name & Model of Car ~ This is an odd one and one I have never figured out. Marital Status ~ While it is not appropriate to ask people often assume that married people are more stable. Level of Confidence ~ This assumption is based on your attitude, experience, and self- esteem, which in turn is affected by your appearance 7 actions Company Image ~ Remember…You are the company. The way you present yourself is precisely how others perceive the company you work for. Ellen Reddick 4 Impact Factory [email protected] 801.581.0369 5. Body Language Basics Body language is the single most important means we have of getting our point across. Over 50% of our communication is accomplished through our posture and gestures. Body language can add to or detract from your professional image. Posture Good posture, whether sitting or standing, presents a confident image. • Stand and sit up straight • Head up • Shoulders back • Feet flat on the ground approximately shoulder width apart • Arms should be relax at your side Walk When entering a room, walk in with confidence and purpose. Maintain good posture. Keep you head up and your eyes off the floor. Lift your feet up, avoid dragging them along the ground. Keep your arms at your side, a nice easy swing that matches your stride. A relaxed yet purposeful walk communicates high self- esteem and commendable confidence. Gestures Be aware of your gestures at all times. When speaking with others, make certain your gestures enhance your message and don’t detract from it. Gestures should be open and friendly. Avoid doing anything that is going to detract from your professionalism and the message you are trying to convey. Eye Contact Eye contact is builds trust and develops rapport with others. Looking people in the eye lets them know you are interested in what is happening, you are involved, you are self-confident and a professional. Avoiding eye contact makes people believe you lack confidence, are nervous and unprepared, and worst of all you might not be trust worthy. It is recommended that you maintain eye contact approximately 95% of the time when you are engaged in a one-on-one conversation, and up to 50% of the time when in a group setting. Ellen Reddick 5 Impact Factory [email protected] 801.581.0369 6. Facial Expressions Your face offers a veritable wealth of information, not just your age and heritage. Your expressions, or sometimes lack of, give away your innermost attitudes. Some expressions may make you appear unfriendly, angry, or disinterested. A warm sincere smile on the other hand, allows you to appear friendly, open, and approachable, and may be one of your best accessories. Handshake Americans traditionally shake hands when meeting or leaving someone for the first time, or when reconnecting with a person. An appropriate handshake is between right hands only (unless your right hand is disabled), web-to-web contact with locked thumbs, and care given to not grab the other person’s knuckles. A firm grasp that lasts long enough for two to five substantial pumps is essential. Every handshake should begin from a standing position, ladies as well as men. There is no gender distinction in business today. The rest goes as follows: extend your right hand, initiate eye contact, say an enthusiastic hello, slowly and clearly state your first and last name, and be sure to smile. The handshakes you should avoid: • The limp, dead fish handshake • The double-handed handshake, often called the politician or pastoral handshake • The bone-crusher handshake • The cold, clammy handshake Business Tip: Name Badge  Always place your name badge on your right shoulder where it can be readily seen. The nametag’s purpose is to reinforce your name. When you meet someone and shake hands, their gaze will automatically follow your right arm up to your shoulder and then to your face. Place your nametag high enough on your right shoulder to be easily see. Ellen Reddick 6 Impact Factory [email protected] 801.581.0369 7. Introductions There are two kinds of introductions: self-introductions and three-party introductions. When do you introduce yourself? When you recognize someone and he or she doesn’t recognize you, whenever you’re seated next to someone you don’t know, when the introducer doesn’t remember your name and when you’re the friend of a friend. Extend your hand, offer your first and last names and share something about yourself or the event you’re attending. Tip: In a self-introduction, never give yourself an honorific such as Mr., Ms., Dr., etc. In a three-person introduction, your role is to introduce two people to each other. In a business or business/social situation, one must take into consideration the rank of the people involved in order to show appropriate deference. Simply say first the name of the person who should be shown the greatest respect. And remember, gender doesn’t count in the business world; protocol is based upon rank. Senior employees outrank junior employees, customers or clients outrank every employee (even the CEO), and officials (Mayor, Senator, etc.) outrank non-officials. Begin with the superior’s name, add the introduction phrase, say the other person’s name and add some information about the second person. Then reverse the introduction by saying the second’s name, followed by the introduction phrase and the superior’s name and information. When a three-party intro is done correctly, the two people being introduced should be able to start some small talk based upon what you shared about each of them. Introductions should match, so if you know the first and last names of both people, say both. If you know only the first name of one person, say only the first names of both. If you add an honorific for one person, the other should also have one. Examples: “Mr. Brown, I’d like to introduce Ms. Ann Smith, who started yesterday in the mailroom. Ann, this is Douglas Brown, our CEO.” (Ann would be wise to call the CEO “Mr. Brown” right away and not assume she may call him by his first name. Always use the last names of superiors and clients until you are invited to do otherwise.) “Pete, I’d like to introduce to you Doug Brown, our CEO. Doug, I’d like you to meet, Pete Johnson, who’s considering our firm for his ad campaign.” Tip: Don’t say “I’d like to introduce you to..”, but rather “I’d like to introduce to you…” Tip: Always stand for an introduction. Social skills are important prerequisites to succeeding in business. Knowing how to shake hands and handle introductions can set you apart from the competition, convey confidence and project a professional image. Practice these simple skills and you will reap the benefits! Ellen Reddick 7 Impact Factory [email protected] 801.581.0369 9. Seven Body Language Killers In many ways, listeners hear with their eyes. What is your body language saying about you? When you give a presentation or run a sales meeting, are you coming across as authoritative, confident and credible, or insecure, disreputable and out of your league? When it comes to body language, simply avoiding the most common mistakes and replacing them with more confident movements will make a big difference. Killer #1- Avoiding eye contact What it says about you: You lack confidence; you are nervous and unprepared. What to do instead: Spend 90% or more of your presentation time looking into the eyes of your listeners. The vast majority of people spend far too much time looking down at notes, PowerPoint slides or at the table in front of them. Not surprisingly, most speakers can change this behavior instantly simply by watching video of themselves. Powerful business leaders look at their listeners directly in the eye when delivering their message. During the recent confirmation hearings for U.S Chief Justice nominee John Roberts, newspapers praised him for "looking self-assured." How did Roberts project this image? Instead of reading his statements from notes, Roberts looked his audience of Senators straight in the eye as he delivered his remarks. Killer #2- Slouching What it says about you: You are non-authoritative; you lack confidence. What to do instead: When standing stationary, place feet at shoulder width and lean slightly forward. Pull your shoulders slightly forward as well -- you'll appear more masculine. Head and spine should be straight. Don't use a tabletop or podium as an excuse to lean on it. Killer #3- Fidgeting, rocking or swaying What it says about you: You are nervous, unsure or unprepared. What to do instead: Well, stop fidgeting. Fidgeting, rocking and swaying don't serve any purpose. I recently worked with the top executive of computer company who had to deliver the news of a product delay to a major investor. He and his team actually had the event under control, and had learned valuable lessons from the failure. But his body language suggested otherwise. Killer #4- Standing in place What it says about you: You are rigid, nervous, boring -- not engaging or dynamic. Ellen Reddick 9 Impact Factory [email protected] 801.581.0369 10. What to do instead: Walk. Move. Most men who come to me for presentation coaching think they need to stand ridged in one place. What they don't realize is that movement is not only acceptable, it's welcome. Some of the greatest business speakers walk into the audience, and are constantly moving... but with purpose! For example, a dynamic speaker will walk from one side of the room to another to deliver their message. But if there's no one in a corner of the room, it doesn't make sense to go there -- it's not moving with purpose. When I tape my clients on video, I actually want to see that they move out of frame once in a while. Otherwise, they appear too rigid. Killer #5- Keeping hands in pocket What it says about you: You are uninterested, uncommitted or nervous. What to do instead: The solution here is too simple: Take your hands out of your pocket. I've seen great business leaders who never once put both hands in their pockets during a presentation. One hand is acceptable -- as long as the free hand is gesturing. Killer #6- Using phony gestures What it says about you: You are over coached, unnatural or artificial. What to do instead: Use gestures; just don't overdo it. Researchers have shown that gestures reflect complex thought. Gestures leave listeners with the perception of confidence, competence and control. But the minute you try to copy a hand gesture, you risk looking contrived -- like a bad politician. Killer #7- Jingling coins, tapping toes & other annoying movements What it says about you: You are nervous, unpolished or insufficiently concerned with details. What to do instead: Use a video camera to tape yourself. Play it back with a critical eye. Do you find annoying gestures that you weren't aware of? I once watched an author who had written a book on leadership discuss his project. He couldn't help but jingle all the coins in his pocket throughout the entire talk. He didn't sell very many books that day, and he certainly didn't score points on the leadership scale. Nervous energy will reflect itself in toe-tapping, touching your face or moving your leg up and down. It's an easy fix once you catch yourself in the act! Use your body as a positive communication tool! Ellen Reddick 10 Impact Factory [email protected] 801.581.0369 11. How to Write a Handwritten Note Only three or four sentences long, a thank you/hand written note is a golden opportunity to make the sort of personal connection that builds stronger professional relationships. Hand write a note whenever possible. It says you took the time to think about what you were writing. The person receiving your note will appreciate your thoughtfulness and will not be grading your penmanship. A simple fold-over note card, a black or blue pen, a stamp and little effort are all you need. A good thank you/hand written note that gets mailed is better than the perfect one that never gets written. The six elements of a basic thank you note: Ellen Reddick 11 Impact Factory [email protected] 801.581.0369 12. 1. Salutation Dear Jay, A surprising number of writers forget this, but people like to see their own names. If you are on a first-name basis, use it, otherwise use the more formal Mr. or Ms. greeting. 2. Express your appreciation Thanks so much for the the tickets to Noises Off. Thank you is more formal; thanks is more casual. 3. Describe the gift or experience Al and I have always loved going to the theater, especially when it's a comedy. Mention how an object looks or how The performances were great, and we you will use it. Mention your laughed until our sides ached. It was enjoyment of an event. People want wonderful of you to think of us. to know they made you happy. Even if there was a problem with the gift, keep negatives to yourself. If the gift or event wasn’t to your taste, focus on the giver and the thought. Everyone wants to be appreciated. The time and energy are more important than the gift. 4. Mention a connection We hope to see you when you are in town again. Discuss the past, allude to the future or mention something you have in common with the giver. If you can’t think of anything else express your desire to see or talk to the person soon. 5. Thanks again for Thanks again for a wonderful evening. It’s not overkill to say it again 6. Close Sincerely, Any of the following are suitable for business: • Sincerely • Sincerely yours • Cordially Ellen Reddick 12 Impact Factory [email protected] 801.581.0369 13. What to Say: Ideas for Business Greetings Thank You: General • With special thanks and much appreciation. • Sincere thanks for your extra efforts. • Your thoughtfulness is appreciated so much more than words can say. • With sincere gratitude for all you have done. • You’re the best! • You made my day! • It was a pleasure to work with you. • Thank you for thinking of us. • Many thanks for all you do. Thank You: For Business/Order • Thank you for your order. Continuing to serve you will be a pleasure. • Your business is always appreciated. • Thank you for choosing us. • Thank you for your friendship, your business and the opportunity to serve you. • Your business is sincerely appreciated. We look forward to continuing to serve you. • Success is having you for a customer. • We appreciate your business and your confidence in us. • Thank you for your continued business. We look forward to working with you in the future. Thank You: For Referral • Thank you for the referral. Your confidence and trust in us is sincerely appreciated. • Thank you for referring _______ to our firm. We sincerely appreciate your confidence in us. Ellen Reddick 13 Impact Factory [email protected] 801.581.0369 14. • Thanks for thinking of me. Your referral is very much appreciated. • Thank you for the vote of confidence. • Many thanks for referring _______ to me. I’ll make sure he/she gets VIP service. Thank You: For Time/Conversation • Thank you for taking the time to meet with me. • It was a pleasure talking with you. I hope we can speak again soon. • Thanks for your time. If you need anything, don’t hesitate to call me. • Thank you for meeting with me. If you need anything, I’m only a phone call away. • Thanks for squeezing me in. I know how busy you are. • Many thanks for your inquiry. I’m sure we can meet your needs. It is Your Birthday • Wishing you a wonderful day. • Sincere good wishes on your special day. • Best wishes on your birthday for good health and happiness throughout the year. • Warmest greetings on your birthday with every good wish for the coming year. • With friendly thoughts and best wishes for your birthday. • Sending you sincere wishes for good health and happiness on your birthday. • All the best to you for a very special birthday. • May you have an unforgettable day filled with happiness. • Wishing you life’s best! • May this day and every day be filled with joy. • Wishing you every happiness today and always. • Have a sensational day! • May all of your dreams come true. • Warm wishes on your birthday and always. Business Anniversary • Happy Anniversary! Thank you for being a part of our success now and in the future. Ellen Reddick 14 Impact Factory [email protected] 801.581.0369 15. • Thanks for another great year! • You’ve made our success possible. Thank you! • Thanks from all of us for ______ years of your business. We look forward to many more. • Many thanks for being our customer for _______ years. We value that relationship. • Your business is appreciated. Thank you for choosing us. Welcome • A hearty welcome from all of us. • Welcome aboard! It’s good to have you with us. • A very warm welcome. We’re glad you joined us. • We’re glad you’re here. • A warm welcome. Thank you for choosing us! • Welcome! We look forward to serving you. • A warm welcome from all of us. Thank you for the opportunity to serve you. Congratulations • Congratulations on a job well done. • Hoping the best things in life will always be yours. • This is a day to remember. • It’s great to see good things happen for someone so deserving. • Congratulations on a well-deserved promotion. • Congratulations on an outstanding accomplishment. • Your achievement is an inspiration. • Kudos to you! You’ve earned them. • Just want to add my good wishes to those you’ve already received. • Bravo! You’ve accomplished great things. Retirement • With every good wish for your retirement. May this be the start of your best years. • Congratulations on your retirement. Best wishes for a great future. • Wishing you life's best today and always. • Congratulations on achieving a milestone. Here's to a great future. Ellen Reddick 15 Impact Factory [email protected] 801.581.0369 16. • Best wishes for today and every day in the future. • Congratulations on your special day. May the future be filled with much happiness. Get Well • May every day find you feeling better! • Thinking of you. May you feel better soon. • Our warmest thoughts are with you. Wishing you a speedy recovery. • We’re sick without you. Get well soon. • Hoping this finds you well on the way to recovery. • Take care of yourself and feel better soon. • You are in my thoughts. If there is anything I can do, please let me know. • You are missed! Get well soon and hurry back. Sympathy • Please accept my/our deepest sympathy • My/Our sympathy and thoughts are with you and your family. • Offering my/our sincerest condolences to you and your family • With concern and caring sympathy. • May your sorrow be eased by good memories. • With heartfelt sympathy. You are in my thoughts and prayers. • Hoping these words of sympathy will comfort you in your time of sorrow. • Words are inadequate at a time like this. Please accept my heartfelt sympathy. Keeping in Touch • Just a note to keep in touch. Let’s talk soon. • Thinking of you—hope all is well. Let me know if I can help in any way. • Sorry I missed you. Hope to talk with you soon. • Just touching base with you. • Sending this just to say hi. Ellen Reddick 16 Impact Factory [email protected] 801.581.0369 17. How Does Your Office Welcome Clients? A new client is coming to visit--and panic sets in. What will they think? Will they have a favorable experience that encourages them to do business with you? Or will they leave your facilities wondering how to contact your competition? When customers visit, they form an impression of your business. That impression becomes your image. Whether the visit involves a business transaction, a service call or a corporate event--whether it's for only an hour or a full day--you need to create positive impressions for everyone. Here are some tips for receiving visitors graciously: • Create a welcoming atmosphere Ellen Reddick 17 Impact Factory [email protected] 801.581.0369 18. Have you trained your receptionist (or the first person your clients see) to smile and greet every visitor who comes to the office? That first contact can affect perceptions about the company. If this person is on the phone or occupied with another customer, do they acknowledge the visitor with a glance or a smile? Or do they ignore the visitor? Do customers have to hunt around for someone to assist them? If you know ahead of time that the client is coming, make sure everyone knows the name of the visitor. The receptionist should be prepared with a name badge or a visitor's pass. Be sure every visitor is greeted in a friendly and helpful way. • Set professional standards A client visited a car dealership on a Saturday afternoon. The sales representative who greeted her was dressed in a white tank top that exposed her belly button; she also wore a pair of tight black jeans and black-and-white sneakers. The client took one look at her and decided to go to another dealership--her competitor. Are your employees appropriately dressed? Do they always project a professional image, even on business-casual days? Or are they dressed a little too casually? Your employees represent the company; their appearance should reflect that at all times. Think about how their appearance can enhance or detract from your corporate image. • Act as the host When you receive visitors, you are the host. The way you greet them in your office can affect the outcome of the meeting. So set the tone for a positive encounter. Don't keep your visitors waiting. If the receptionist is escorting them to your office, be sure to come out from behind your desk to greet them. Stand to shake hands, and shake "web to web"--that is, grasp the other hand fully with your hand-don't simply clasp the other person's fingers. Shake in the same manner with men and women alike. To create the best impression, personally greet the visitors in the waiting room. Shake hands with your guests and escort them to your office, letting them follow Ellen Reddick 18 Impact Factory [email protected] 801.581.0369 19. you. Upon arrival at your office, allow them to proceed first into the room, and indicate where they should sit. Do not seat your guests directly across from your desk; instead, place their chairs to the side of the desk. Don't accept calls or interruptions during the meeting. When the meeting is over, stand, shake hands once again and walk your guests back to the waiting room. • Make the proper introductions Introductions may seem like a trivial item in the grand scheme of business interactions, but they are crucial to setting a professional tone in the office. If clients are at your location for the entire day, make an effort to introduce them to your senior executives. This simple gesture will help your guests to feel welcome. As you escort a client through the office, you may run into company employees. Be sure to make the proper introductions. When deciding who should be introduced first, use the following order, regardless of gender: client, senior executives, and junior executives. Provide information about each person you introduce, so these people can start a conversation. For example: "Mr. Harris (client), I would like you to meet Ms. Jones (company president). Mr. Harris is our new client from Chicago; Ms. Jones is our company president." Show equal respect and gracious behavior to everyone in your office. Your clients will notice how you treat everyone. • Be conscious of office courtesies When escorting a client for a product demonstration or a company tour, use proper office courtesies. One should never, for instance, discuss office gossip or talk negatively about company employees in front of guests. I have sat in reception areas and overheard employees talk about things and people that gave me a very unflattering view of the company. The same should be applied to employees that walk through the office talking on their cell phone. You never know who may overhear a remark that should not be heard at all. Know the appropriate way to handle entrances, exits, revolving doors and elevators. As the host, when you get to a door, open it. This rule applies regardless of gender. It is polite to hold the door for your guest to enter. At revolving doors, the host enters the door first, leading the way for guests. As you enter, you might want to say, "I'll wait for you on the other side." Then do so. If there is more than one person with you, wait until everyone is through the revolving door before you proceed. When navigating stairs and escalators, the host leads the way, whether you are going up or down. When using elevators, allow your guests to enter before you do; upon exiting, leave the elevator first and hold the door for those following. Ellen Reddick 19 Impact Factory [email protected] 801.581.0369 20. People at the front of the elevator should step off to make room when those in the back need to exit. Hold the door, allow them to leave and step back into the elevator. This is much nicer than cramming your body to the sidewall so that they have room to leave. Companies that want to stand out from their competition pay attention to making visitors welcome. Manners make the difference. Greet your visitors graciously, know what to do during their visit, be considerate of others and create positive impressions that last and last. Make a client visit to your company another selling opportunity and reaffirm that your company deserves their business. Sound as Good as You Look Speaking with Ease Every time you open your mouth and speak, your professionalism is on display. What you say and how you say it is extremely important to your professional image. What we say is not as important as how we make people feel. Make certain your speech doesn’t detract from your professionalism by paying attention to the following: Ellen Reddick 20 Impact Factory [email protected] 801.581.0369 21. • Listen to the sound of your own voice. Keep it warm and inviting. People with a higher than normal voice are thought to be less intelligent than those with a lower voice. One way to improve the sound of your voice is to read out loud to yourself every day for 5 or 10 minutes. Read quality literature, the Bible, poetry, Shakespeare, the classics. • Speak slowly, clearly and distinctly. Make it easy for the person you are speaking with to hear and understand what it is you are saying. • Eliminate the use of non-words. Non-words are meaningless fillers that speckle our speech, distract from our message, drain our impact, and annoy our listener. The most common non-words are “uhh,” “ahh,” and “um.” They also include words such as “like,” “you know,” “well,” “so,” “okay?” and “sort of.” The excessive use of non-words can undermine your credibility and make you appear weak and ill-prepared. • Always use proper grammar. Nothing detracts from your professionalism faster than using the incorrect tense of a verb or an incorrect word. • Avoid using slang such as “hi guys,” “how ya doin,” or casual phrases like whatever” while rolling your eyes. NEVER refer to a group of people as “You guys.” • Avoid poor diction. Often people don’t realize they are using poor diction because it becomes a verbal habit. Resources Be An Interesting Person Selected Shorts – Each week on National Public Radio, great actors from stage, screen and television bring short stories to life. Selected Shorts is an award-winning, one- hour program featuring readings of classic and new short fiction, recorded live at New York’s Symphony Space. One of the most popular series on the airwaves, this unique show is hosted by Isaiah Sheffer and produced for radio by Symphony Space and WNYC Radio. see: http://www.wnyc.org/shows/shorts/ KCPW & KRCL radio stations What you will learn: The power of a quality voice and the importance of using your voice as a tool. Ellen Reddick 21 Impact Factory [email protected] 801.581.0369 22. C-SPAN2 Booknotes – 48 hours of non-fiction book programming, all weekend, every weekend on C- SPAN2. It includes book events related to History, Biography, Business, and also Encore Booknotes programs. Book TV airs from Saturday at 8am ET through Monday at 8am ET Also the show: After Words. This Saturday, November 11 at 9:00 pm and Sunday, November 12 at 6:00 pm and at 9:00 pm Book TV presents After Words: Nicholas Lemann, author of "Redemption: The Last Battle of the Civil War" interviewed by Herman Belz, a professor of history at the University of Maryland See: http://www.booktv.org/schedule Resources Books The Elements of Style William Strunk Jr. & E. B. White Global Business Etiquette: A Guide Jeanette S. Martin and Lillian H. to International Communication Chaney and Customs Primal Branding Patrick Hanlon AllEtiquette.com – A Power Guide Fredrica Cere Kussin First Impressions Ann Demarais, Ph.D What You Don’t Know About How Others See You Ellen Reddick 22 Impact Factory [email protected] 801.581.0369 27. II. Samuel Eliot Morison. The Oxford History of the American People;Page Smith. A People's History of the United States. III. Alfred North Whitehead. Science and the Modern World. IV. Alfred North Whitehead. An Introduction to Mathematics. V. E. H. Gombrich. The Story of Art. VI. Mortimer J. Adler and Charles Van Doren. How to Read a Book Social Intelligence In his new book Social Intelligence, Daniel Goleman wrote “Listening poorly is the common cold of social intelligence. And it is being made worse by technology. To have a human moment, you need to be fully present. You have to be away from your laptop, put down your BlackBerry, you end your daydream and you pay full attention to the person you are with. It may sound rudimentary but think about how often we just keep multitasking and half pay attention. We each need to live in the moment fully engaged in what we are doing.” Ellen Reddick 27 Impact Factory [email protected] 801.581.0369 28. The use of etiquette or true professionalism is exactly that – being fully present! SIX KEYS TO STRONG EMOTIONAL INTELLIGENCE Self-awareness, self-control and empathy form the foundation of strong emotional intelligence, followed by social expertness, personal influence and mastery of vision. • Self-awareness. Knowing what influences our feelings, positively or negatively, is critical. It’s very important to realize what kinds of situations can put us over the edge before we get there. • Self-control. Once we know our “triggers,” we can implement coping mechanisms. For instance, just knowing that getting cut off on the highway Ellen Reddick 28 Impact Factory [email protected] 801.581.0369 29. produces intense feelings of rage (self-awareness), we can decide to cope better while driving by listening to soothing music or a recorded book (self-control). • Empathy. We must cultivate the ability to look at a situation from another’s perspective. In our driving example, consider that the driver who cut you off might have been someone helping an expectant mother get to the hospital. • Social expertness. The ability to build relationships requires empathy, excellent communication skills, and the ability to listen well. • Personal influence. All leaders are, by definition, required to influence and persuade others to follow them. This is impossible to do without the qualities listed above. • Mastery of vision. A mission statement of sorts outlines intentions and values. Cell Phones - The Worst Offenses On the topic of wireless "faux pas," respondents in the Yahoo! HotJobs survey ranked these five unacceptable behaviors, from most reprehensible to least. 1. Accepting a personal call while in a meeting or presentation 2. Answering the phone or emails while at a business dinner 3. Talking on the phone while in the bathroom 4. Talking on the phone while in close quarters (such as a train, plane, or bus) 5. Answering a work call or email during personal time after work hours Ellen Reddick 29 Impact Factory [email protected] 801.581.0369 30. The Top Eight Rules of Proper Cell Phone Etiquette at Work A recent study showed that at least 40% of U.S. companies now have a published cell phone usage policy at work. That percentage will most certainly rise in the near future. It might be more difficult for the employees of the majority of firms that have yet to adopt an acceptable use policy. To avoid suffering a career detour from unacceptable cell phone use in your office, consider the following generally accepted rules of good cell phone behavior. 1. Turn your ringer OFF or set to “vibrate”. Unless your cell phone is a company-issued handset for business use, set your unit to vibrate while at your desk. Even if you’ve selected a tasteful ring tone, repetitive incoming calls will be noticed (negatively) by co-workers and management. 2. Let “bread and milk” and other unimportant calls go to voicemail. While it’s wonderful to have a live connection to the important people in your life, children, parents, other family and friends, frequent chatty calls during your workday will often reflect negatively on your perceived concentration on your duties. 3. When you must use your cell phone, find a private, quiet place to make your calls. Regardless of where you are, most etiquette advisors agree you should always observe the “ten-foot rule”. Maintain a buffer zone of at least ten feet from others while you’re using your cell phone. While at work, you should make every attempt to expand basic etiquette and find locations that do not infringe on co-workers trying to perform their jobs. 4. Don’t bring your cell phone to meetings. Neglecting this one rule can do career damage even when you adhere to most of the other recommendations. Some etiquette gurus recommend that, should an important call be expected, either for business or a family emergency, you could put your cell phone on “vibrate” and bring it with you. Treat this exception with extreme caution, however. Regardless of the urgency of the expected call, your boss will most certainly take a very dim view of a meeting interruption because of your cell phone. It is a far better idea to leave your cell phone at your desk to avoid any “interruption temptation”. 5. Never use your cell phone in restrooms. This rule may, at first, appear frivolous, but the statistics indicate it is an important component of cell phone etiquette. Why? You often do not know who else may be using the facilities. Should you communicate private information or sensitive work issues, you may easily be overheard without your knowledge. There are some well-documented horror stories of information delivered into the wrong hands by this simple, innocuous rule violation. 6. Eliminating embarrassing ring tones. Should you have a psychological need to use a cutesy or outrageous ring tone while away from your job, be very careful when you are at work. Either keep your cell phone on vibrate at all times at work or change to a more professional ring tone during your Ellen Reddick 30 Impact Factory [email protected] 801.581.0369 31. work day. Along with annoying both co-workers and supervisors, a silly ring tone can negatively impact your career by displaying a less than professional, serious image to management. 7. Maintain a low voice during cell phone conversations. Often called “holding court”, having loud conversations about nothing, a loud voice can be extremely annoying to anyone within earshot. Often, the ten-foot rule becomes useless during one of these situations. Unless you are in the middle of a loud construction site, you should understand that cell phone microphones are very sensitive and only inches away from your mouth. There is normally no need to increase your voice to levels used by seminar leaders talking without microphones. 8. Use text messages instead of voice calls to maintain professionalism. If you need to communicate on a personal level and understand that voice calls would be inappropriate, send a text message to your caller. It’s quiet, fast, and to the point. Unless you’re trying to set a world’s record for the largest thumbs on the planet, a few text messages during the workday keeps your lines of communications open without wasting your time or annoying co-workers. Try to remember that, through most of recorded history, the world of business operated quite effectively without constant cell phone use. The basic substance of successful business operations contains no requirement that cell phones contribute mightily to your company’s bottom line. Be ready for a formal company policy regarding cell phone use at work. More and more firms, many reaching unacceptable levels of frustration, will be joining those who have already published regulations and publishing restrictive policies. By following the current rules of good cell phone etiquette, you’ll not only be ahead of the curve, you may enhance your professional standing at work by displaying this considerate behavior. Some of your cell phone etiquette may even be transferred to your friends who might be in need of some guidelines, too. Professional e-mail Etiquette Guidelines "There are four ways, and only four ways, in which we have contact with the world. We are evaluated and classified by these four contacts: what we do, how we look, what we say, and how we say it." - Dale Carnegie (1888-1955) American Educator When it comes to your business e-mail communications, you need to make an impression that can lend to the determination that you are a credible professional enterprise and someone that will be easy and a pleasure to do business with. You only have one chance to make that first impression which will be invaluable to building trust and confidence. Ellen Reddick 31 Impact Factory [email protected] 801.581.0369 32. Top 10 Business Email Etiquette issues that need to be considered with every commercial e-mail sent. SUBJECT The window into your e-mail and can determine if your e-mail will be opened. Level of Formality Try to avoid the prevailing assumption that e-mail by its very nature allows you to be informal in your business e-mail. Addressing How do you address your new contacts? TO, From, These fields can make or break you: BCC, CC TO Type the contacts name formally-John B. Doe - not john b doe or JOHN B DOE. FROM Make sure you have your full name formally typed BCC Use this field when e-mailing a group of contacts who do not personally know each other CC Use this field when there are a handful of associates involved in a discussion that requires all be on the same page Formatting Refrain from using any formatting in your day-to-day business e-mail communications. Attachments If you need to send a large size file business courtesy dictates you ask the recipient first if it is O.K. Using Previous Always start a new e-mail and add your contacts to your address book. E-mail New Correspondence Don’t give the perception that you are lazy Down Edit Do not just hit reply and start typing. Use common courtesy Be careful with signatures There you have it! The above Top 10 items will certainly allow your business communications to rise above the majority who do not take the time to understand and master these issues. When forging new business relationships and solidifying established partnerships, the level of professionalism and courtesy you relay in your business e-mail communications will always gain clients over the competition that may be anemic, uninformed or just plain lazy in this area. Ellen Reddick 32 Impact Factory [email protected] 801.581.0369 33. When it comes to business, regardless of mode of communication used, professionalism and courtesy never go out of style! Business email etiquette speaks volumes about the sender and the company where the message was originated. Keep your professional image at all times following these simple rules. They are not hard and all the benefits will be yours. Top 10 List of SMS Etiquette Text messaging is one of the simplest and most useful means of mobile communication. No one can doubt the popularity of text messaging and short messaging service (SMS) in particular - more than 50 billion SMS messages were sent across the world's GSM networks in the first quarter of 2005, a fivefold increase over the previous year - and there's no slowdown in sight. 1. Common courtesy still rules. Contrary to popular belief, composing an SMS while you're in a face-to-face conversation with someone is just about as rude as taking a voice call. 2. Remember that SMS is informal. SMS shouldn't be used for formal invitations or to dump your girlfriend or boyfriend. The casualness of SMS diminishes the strength and meaning of the message. Ellen Reddick 33 Impact Factory [email protected] 801.581.0369 34. 3. Don't get upset if you don't get a reply. Before you text someone and get frustrated at the lack of a response, be sure that they're familiar with how to use the service, and that their carrier will accept messages from yours. 4. Be aware of your tone. It is extremely difficult to discern tone in text messages, just as in e-mail. What seems to you to be a completely innocuous message may be grossly misinterpreted by the recipient, causing certain discomfort if not irreparable harm. 5. Don't SMS while you're driving. Talking on the phone is bad enough. You won't know what hit you - or what you hit - if you are pounding out a message on your keyboard. 6. Leave the slang to the kids. Don't expect your stodgy superiors at work to be hip to the lingo of the SMS streets. And don't expect to win points with your kids by trying to be cool, either. 7. Remember that SMS can be traced. Anonymous messages - if you must send them -are still best sent from Web sites. 8. Be conscientious of others' schedules. Don't assume that because you are awake, working, not busy, or sober that the person you're texting is as well. Many a pleasant slumber have been interrupted by recurring "beep- beep...beep-beeps" of messages. 9. If it's immediate, make a voice call. If you can't get through and your text message is ignored, there's probably a good reason. There are still some times when people don't even have a thumb free to respond. 10. Remember that your phone does have an off button. There are very, very few things in the world that absolutely cannot wait. General Dining Etiquette It is important to know how to conduct oneself properly at the table. The rules of dining etiquette are fairly straightforward and mostly require common sense. Table Setting. It can be very confusing to be presented with a variety of eating utensils. (See below) Remember the guideline “to start at the outside and work your way in.” If you have been given two forks, which are the same size, begin with the fork on the outside. Many restaurants use the same size of fork for both the salad and main course. Ellen Reddick 34 Impact Factory [email protected] 801.581.0369 35. Napkin. When dining with others place your napkin on your lap after everyone at your table has been seated. Do not open your napkin in mid-air. As you remove your napkin from the table begin to open below the table level and place on your lap. If you must leave a meal, do so between courses, and place your napkin on your chair or to the left of your plate. When a meal is completed, place your napkin to the right of your plate – never on the plate. Served. Wait for everyone at your table to be served before beginning to eat. However, if an individual who has not been served encourages you to begin eating, you may do so. Eat slowly while waiting for their food to be served. Soup. When eating soup, think of making a circle: spoon away from you, bring around to your mouth and back to the bowl. Soup is taken from the side of the soup spoon –it is not inserted into your mouth. Do not slurp or make noises when eating soup. Sorbet. This item is often served between courses to cleanse the palate. It is a light, sherbet texture and depending on when served may be eaten with a fork or a spoon. Utensils. Be careful how you hold your utensils. Many people tend to make a fist around the handle of the utensil – this is the way a young child would grasp a utensil (not an adult). There are two acceptable ways to use the knife and fork: continental fashion and American standard. Continental fashion—the diner cuts the food usually one bite at a time and uses the fork in the left hand, tines Ellen Reddick 35 Impact Factory [email protected] 801.581.0369 36. pointing down, to spear the food and bring it to the mouth. American standard—a few bites are cut, the knife is laid across the top of the plate, sharp edge toward you, and the fork is switched to the right hand, if right-handed, tines up to bring the food to the mouth. (Do not cut more than two or three bites at a time.) Dessert Utensils. Dessert utensils may be found placed across the top of the place setting. Place these utensils down for use after the main course is removed (fork to the left and spoon to the right). Passing. Pass “community food” such as the breadbasket, salt and pepper, and salad dressing to the right. Always pass the salt and pepper together. When passing items such as a creamer, syrup pitcher or gravy boat, pass it with the handle pointing toward the recipient. Seasoning. Always taste your food first before using any seasonings. Do not assume it needs to be seasoned. Sweeteners. Do not be excessive with sugar or sweetener packets. The rule of thumb is no more than two packets per meal. Do not crumble the packets but partially tear off a corner, empty the contents and place to the side. Bread. Bread/rolls should never be eaten whole. Break into smaller, more manageable pieces, buttering only one bite at a time. Toast and garlic bread however may be eaten as whole pieces since they are usually already buttered. If you are served a piping hot muffin or biscuit, you may break in half crosswise, butter and put back together. However when ready to actually eat, break it into small pieces. Glasses. A variety of types and sizes of glasses can be used throughout the meal. Remember your items to drink will be located in the area above your knife and spoon. Coffee cups may be located to the right of the knife and spoon. Alcohol. Alcohol, if consumed, should be in moderation. In most cases you may have a drink during the social hour and wine(s) with the dinner. You do not have to finish your drink. In fact slowly sipping is recommended. If you do not want an alcoholic drink politely decline. Buffets. Buffets provide an opportunity to select items you enjoy. Do not overload your plate. Select a balanced variety of food items. Pre-Set Meals. With a pre-set meal the host/hostess has already made the selections and the individuals are served. If allergic, religious or vegetarian issues arise, quietly deal with these as the server is at your side. For vegetarian ask if you may have a vegetable plate; with allergies or religion provide the Ellen Reddick 36 Impact Factory [email protected] 801.581.0369 37. server with some options (ex. Allergic to shellfish—ask if they have cod or flounder and be ready with your preference). This lets the server know what you can eat. Always eat a little of all items served to you. Ordering from Menu. As the guest select an item that is in the mid-price range, easy to eat and you will enjoy. Consider asking your host/hostess for a recommendation before making your decision. As the host it is helpful to take the lead in ordering appetizers and wine, if these are to be served. Finished. When finished with a course, leave your plates in the same position that they were presented to you. In other words, do not push your plates away or stack them. Guest. If you are someone’s guest at a meal, ask the person what he/she recommends. By doing this, you will learn price range guidelines and have an idea of what to order. Usually order an item in the mid price range. Also keep in mind, the person who typically initiates the meal will pay. Remember to thank them for the meal. Restaurant Staff. Wait staff, servers, Maitre d’, etc. are your allies. They can assist you with whatever problem may arise. Quietly get their attention and speak to them about the issue. 12 Common Dining Mistakes Today more business is done while dining than ever before. Sales can be lost and careers short- circuited when poor table manners are displayed. Remember, your table manners are a gift you give those with whom you dine. They also indicate whether or not you know how to show respect for others. The following are the most common mistakes noted while dining. 1. Misusing silverware Gripping the fork and knife incorrectly is the most obvious and common faux pas. Knives are meant to cut, not saw. The fork and knife should never teeter half off the plate onto the table. Don't wave your silverware in the air while talking. Silverware placed at the top Ellen Reddick 37 Impact Factory [email protected] 801.581.0369 38. of the plate is for dessert. Place only the silverware that you have used on the plate when finished. 2. Using the wrong butter plate There's a simple rule to remember: liquids to the right, solids to the left. Your butter plate will be near your fork, not your knife. 3. Buttering an entire roll Bread and rolls are meant to be torn, not cut. A large roll would be torn in half first, then a smaller piece can be torn off, buttered and eaten. Toast is the exception. The entire piece can be buttered at once. 4. Improper use of the napkin The napkin comes off the table only after everyone is seated. It is used to dab the lips, not scrub the face. If leaving the table temporarily mid-meal, place the napkin on your chair. At the end of the meal, place it on the table next to your plate, never on the plate, however. 5. Eating too fast or too slow Pacing is important when dining with others. Slow down if you notice you're faster than everyone else. Speed up or leave some food if you're a slow eater. You should never leave your guest to dine alone, which happens if you're finished way ahead of your guest. 6. Showing food in mouth This happens when you've taken too big of a bite and then chew with your mouth open, or continue to talk. This is very unappetizing for others to observe. Small bites are necessary when trying to converse while eating. 7. Seasoning food before tasting Without tasting your food, how would you know it really needs seasoning? This can be seen as an insult to the chef and host. It also can indicate that you jump to conclusions. 8. Washing food down with liquids The mouth should be cleared of food before beverages are sipped. It's a good habit to get into, especially with wine. Wine is meant to cleanse the palate and its taste can't fully be appreciated with food still in the mouth. 9. Passing food incorrectly The salt is always passed with the pepper. Anything with a handle, such as the creamer, is passed so the handle is facing the person receiving the item. This is why the correct way to pass food the first time around is to the right=counterclockwise. 10. Leaving lipstick marks Lipstick should be well blotted so not to leave marks on cups and glasses. It's a real turnoff. 11. Grooming at the table This is another turnoff. Don't touch your hair or apply makeup while at the table. And certainly don't pick your teeth at the table. Excuse yourself from the table to remove something from your teeth...or to apply makeup. 12. Poor posture Sit up straight, don't lean on your elbows or forearms, don't rock in your chair, and keep your elbows close to your side. When You are the Host Doing business over meals is a ritual that has existed for centuries. Taking clients to breakfast, lunch or dinner has long been an effective way to build relationships, make the sale or seal the deal. These business meals are essentially business meetings. Knowledge of your product or your service is Ellen Reddick 38 Impact Factory [email protected] 801.581.0369 39. crucial to the success of the meeting, but so are your manners. Too many people jeopardize an opportunity because they fail to use good dining etiquette. Here are a few basic rules to make the experience pleasurable and profitable: • Know your duties as the host. You are in charge. It is up to you to see that things go well and that your guests are comfortable. You need to attend to every detail, from extending the invitation to paying the bill. • Plan ahead when you issue the invitation. Allow a week for a business dinner and three days for lunch. Be certain that the date works for you. That might sound obvious, but if you have to cancel or postpone, you can look disorganized and disrespectful of your client's time. • Select a restaurant that you know, preferably one where you are known. This is no time to try out the latest hot spot. Being confident of the quality of the food and service leaves you free to focus on business. • Consider the atmosphere. Does it lend itself to conversation and discussion? If you and your clients cannot hear each other over the roar of the diners and dishes, you will have wasted your time and money. • Let the staff know that you will be dining with clients. If your guests suggest a restaurant new to you, call ahead and speak with the maître d'. Make it clear that you will be having a business meal and picking up the check. • Arrive early. This is the perfect time to give your credit card to the maître d’, and avoid the awkwardness that can accompany the arrival of the bill. • Take charge of seating. Your guests should have the prime seats—the ones with the view. As the host, take the least desirable spot—the one facing the wall, the kitchen or the restrooms. • Allow your guests to order first. However, you might suggest certain dishes to be helpful. By recommending specific items, you are indicating a price range. Order as many courses as your guests, no more and no less, to facilitate the flow of the meal. It is awkward if one of you orders an appetizer or dessert and the others do not • As the host, you are the one who decides when to start discussing business. That will depend on a number of factors such as the time of day and how well you know your clients. At breakfast, time is short, so get down to business quickly. At lunch, wait until you have ordered so you will not be interrupted. Dinner, which tends to be the most social meal, is a time for building rapport. Limit the business talk, and do it after the main course is completed. Ellen Reddick 39 Impact Factory [email protected] 801.581.0369 40. • When you know your clients well, you have more of a basis for small talk. However, because you have established a business friendship, you can eliminate some of the chitchat when time is an issue. When you don't know your clients well, spend more time getting acquainted before launching your shoptalk. • Handle ANY disasters with grace. With all your attention to detail, things can still go wrong. The food may not be up to your standards, the waiter might be rude or the people at the next table boisterous and out of control. Whatever happens, be part of the solution not the problem. Excuse yourself to discuss any problems with the staff. • Limit the alcohol you drink. The three-martini lunch is mostly a thing of the past. However, cocktails and wine are still part of the business dinner. Since alcohol can have the same effect as truth serum, keep your consumption to one or two glasses. When guests are drinking liberally and you sense trouble, excuse yourself and discreetly ask the server to hold back on refilling the wine glasses or offering another cocktail. Your conduct throughout the meal will determine professional success. If you pay attention to the details and make every effort to see that your clients have a pleasant experience, they will assume that you will handle their business the same way. You are laying a foundation for a solid, powerful business relationship by paying attention to details. When You are the Guest The business meal has become standard operating procedure in business. Over half of all business is finalized at some type of a meal and job interviews often include a meal as part of the interview process. Many times we are put on the spot and our behavior and manners are on display. Knowing what it takes to be someone’s guest at a business meal is as important as being the host. The Ellen Reddick 40 Impact Factory [email protected] 801.581.0369 41. following guidelines will help you make a positive impression when you are the guest: • Confirm the day and time if the invitation was made more than a week in advance. • Arrive on time. Call ahead if you will be more than five minutes late. If you cannot reach your host directly, call the restaurant and leave a message with the maitre d’. • Follow your host’s lead in ordering beverages. • Order an entrée from the menu in the average price range. Ask for suggestions from the host. Don’t order the most expensive item on the menu. • Do everything in moderation. It is not your last meal, so don’t stuff yourself. If you are on an interview, don’t drink alcohol. Otherwise, if the occasion calls for a drink, never over do it. • Do not complain about the service or the meal. Remember that your host is paying for the meal and you should behave graciously, • Set a comfortable atmosphere and ask questions to encourage conversation. • If you must cancel, call personally, apologize and suggest a rescheduling. • Thank your host for the meal and their time. Send a thank you note to your host. It takes a short time but makes a big impression The Power of Professional Presence Ellen Reddick 41 Impact Factory [email protected] 801.581.0369 42. • In the business environment, you plan every move with potential clients. • • You arrange for the appointment, you prepare for the meeting, you rehearse for the presentation, you prepare as a host for dining with clients, but in spite of your best efforts, potential clients pop up in the most unexpected places. Leave nothing to chance. Every time you walk out of your office, be ready to make a powerful first impression…it is the best selling technique. The 5 Ps of Professional Success Ellen Reddick 42 Impact Factory [email protected] 801.581.0369
{ "pile_set_name": "Pile-CC" }
Archive for June, 2009 Another piece of shock news as Michael Jackson dies unexpectedly at what is a relatively young age of 50. And of course we are all both horrified and fascinated by it, whether or not we were ever fans of him or his music. These kind of unexpected twists, especially in relation to someone we all know about, highlight the tragic nature of our existence. Because there is a Michael Jackson in us all. A combination of being very public and very reclusive, wanting people to know and recognize us and yet wanting to have our own space. And, like him, conflicted about our identities and with low points matching the highs. The media are having a field day speculating about his health, his childhood, his mental state, his apparent loneliness, his talent, now tinged with a kind of wistful speculation as to what might have been had he lived longer. It’s not quite another Princess Diana moment, but as with all celebrity lives and deaths these things hold up a mirror to ourselves, our own hopes and aspirations, and the reality of our struggles. An opportunity to face up to the baggage we all inherit from childhood, and also to reflect on the contribution we can make to the wellbeing of those who come after us. Whatever the truth about Michael Jackson’s lifestyle and health, his music will live on in the lives of his many fans. Thanks for the memories. RIP Michael Jackson – a ‘Rare Iconic Personality’. It’s not very often that baptisms get into the tabloid press, though bishops quite often do – frequently for the wrong reasons. But this story surely highlights both a growing trend for the baptism of adult converts, and also shows that a bit of spectacle can be a good thing in terms of getting into the news. Maybe if more of church happened outside the four walls of church buildings, there would be more interest by the general public. There’s something safe about being able to stand on a river bank to be part of worship, as compared with being trapped in pews or behind closed doors. But then, John the Baptist knew all about that a long time ago. This week saw the end of a long process to launch the Mission Shaped Ministry course in Scotland. The course itself emerged out of the Fresh Expressionsinitiative of the Church of England and Methodists to encourage new forms of church – and it’s been successful way beyond anyone’s wildest dreams in England, Wales, and Ireland. Scotland has had to wait a bit longer, but in September-October this year there will be a six-week taster (Mission Shaped Intro) in Edinburgh and Glasgow, and then starting in January 2010 the entire course will be presented in Glasgow and Inverness. The church mice will be involved in Inverness, along with Duncan Macpheron, minister of Hilton Church, while the Glasgow course will be led by Alan McWilliam and David Currie. We took a couple of days off this week, thinking that June might actually be summer in Scotland. How wrong can you be! It wasn’t just all four seasons in the proverbial 24 hours, but all four of them in the space of about 40 minutes. The drive to Glasgow on Monday started in dull, though dry weather as we left rural Aberdeenhire, but by the time we were passing Stirling there was actually snow at the side of the road. We had to look at least twice, but sure enough – not hailstones, but real snow. Not to mention a sky as black as night and flooding all over the place. Then just 15 minutes later, bright sunshine, which continued all the way to Glasgow and for the rest of the day. Still, it was just as well that the main attraction was not outdoors. And it was well worth travelling through fire and brimstone to be there! The main attraction was a concert by The Priests, three Irish priests who’ve just shot to fame from nowhere in less than 12 months following the release of their first album last Christmas. In an obviously unscripted dialogue, their informal laid-back style of conversation throughout the concert was something else. Fun, faith, spontaneity, and a lot of easy talk about God and the spiritual, not to mention their fantastic singing just made it a great occasion. And where else would you find a concert where the most prominent projected icon is a cross? And it wasn’t all a bunch of old grannies either: we sat next to a couple of twenty-something young women who must have been first in line to get there, and whose excitement at seeing The Priests in person was … well, infectious. Next day we went to see an exhibition of Edvard Munch’s work, which (as we expected) evoked the exact opposite set of emotions, with his obsessions with failed love affairs, death and, of course, stress – most famously expressed in his painting The Scream. But as well as that there are various versions of his Madonna on display, along with an intriguing portrait of Nietzsche, and a striking self-portrait. The exhibition runs till September, and is free so well worth a visit if you like that sort of thing. After that, a walk down the street to the Kelvingrove Gallery to take (yet another) look at Salvador Dali’s Christ of St John of the Cross, and while we were viewing that we had an unexpected (and free) organ recital. Of course, all this was interspersed with new conversations, about the meaning of life, faith, spirituality, theology … and how cool it would be to have The Priests as pastors. And on the way home we called by this interesting studio. A two day outing doing these things probably tells you something about us … We’ll comment on the book and its contents once we’ve finished reading it, and had a chance to talk about it. But the question of whether fresh expressions of church are really as fresh as we all think came to our attention with the recent death of the Revd Bill Shergold. He’s not typically hailed as one of the heroes of either fresh expressions or emerging church, and quite likely most readers of this blog will be wondering who exactly he was and why we should be bothered to mark his passing. After all, he was 89 when he died last month. And he trained as a priest at Mirfield, a high church college if ever there was one. And his most significant ministry was at the Eton Mission in London, with close connections with the posh school that gave it its name. So you might think he would be about the last person to have pioneered anything remotely missional, let alone truly creative. And you’d be wrong. He was the founder of the 59 Club, a bikers community, which he started when he realized that here was a way of connecting faith with what at the time (the 1950s) was a growing recreational trend among young men in particular. To read the story of how and why he did this, in his own words, go here. He clearly thought he was just doing what came naturally, given his calling as a parish priest, and his efforts were not blessed with all the trendy terminology that seems an essential part of the emerging, emergent, fresh expressions scene today. Which we all probably need to be reminded of: that there have always been mavericks and pioneers who saw missional openings in unlikely places and who stepped outside of the box in order to see where God might be at work. Bill Shergold was one of them. And at a time when Christians were far less tolerant of the non-traditional than they are today. But then, he did, as a newspaper headline of the time says, wear ‘leathers under his cassock’ – which, obviously, means that he wore a cassock over his leathers. When so many are preferring to dispose of cassocks and other bits of tradition, we might have something to learn from him. This week has certainly been a long time for UK politicians, most notably Gordon Brown, who looks like being on his way out as prime minister. He makes a lot of having been raised in a Church of Scotland manse, and his Presbyterian values and ‘moral compass’, though the point of all that is probably a bit lost on many people today, if for no other reason than they’ve heard it so many times now and it’s not altogether clear what it all amounts to. What can in one context be tenacity and commitment can all too easily become stubbornness and aggression. Ask any Presbyterian! The ‘I’m right and you’re all wrong’ attitude has been the cause of many splits and schisms over the years (centuries even) not just in Presbyterian circles, but throughout Scottish churches more generally. One thing we’re thinking about right now is whether this sort of righteousness is an inevitable outcome of a certain kind of theology, or whether that connection is secondary, and other factors such as personality type play a bigger role. It’s certainly the case, in our experience anyway, that folks from other backgrounds seem to be a bit more laid back about things, not taking themselves too seriously, and more ready to know when they need to change.
{ "pile_set_name": "Pile-CC" }
Out of Stock! The Body pillow is filled with slow release, soft and silky fiber, with a special ultrasoft fabric case. This 56” long pillow is ideal for side sleepers and pregnant women as it improves posture and increases comfort for the spine, arms and legs in addition to improving blood circulation. Complimentary 300 thread count white self stripe pillow cover with every Body pillow.
{ "pile_set_name": "Pile-CC" }
Introduction ============ Gingival reactive lesions like pyogenic granuloma have frequent occurrence around natural dentition, however, their association with dental implants is not common. The causes of pyogenic granuloma (PG) in relation to dental implants are not clear mainly due to few published cases ([@B1]-[@B8]). Tooth-related PG is a result of tissue response to minor injury or chronic low-grade irritation ([@B9]-[@B16]). Clinically, oral PG is characterized as a soft mass of smooth or lobulated appearance that could be sessile or pedunculated and frequently presents ulceration. The lesion grows rapidly for a few weeks and the colour ranges from pink to red purple and haemorrhage may occur either spontaneously or after minor trauma ([@B8]). Its incidence is relatively common and accounts for 3.81-7% of all biopsies harvested from the oral cavity ([@B13]-[@B16]). Microscopically, the lesion is characterized by prominent capillary growth in hyperplastic granulation tissue, which suggests a strong activity of angiogenesis. The blood vessels often show a clustered or medullary pattern separated by less vascular fibrotic septa, leading some authorities to consider PG as a polypoid form of capillary hemangioma ([@B17]). The lesions of PG may be found in the oral cavity or extraorally. The most frequent intraoral localization is the gingiva (about 60-70%), but lesions can occur on the lips (14%), tongue (9%), buccal mucosa (7%) and palate (2%) ([@B18]-[@B24]). Possible treatment methods are excision, curettage, cryotherapy, sclerotherapy, chemical and electrical cauterization, cryotherapy and the use of lasers with the carbon dioxide (CO2) or argon ([@B25]-[@B29]). Conservative local excision is the preferred form of treatment and recurrence rates after excision range from 0% to 16% ([@B29]). However, to the best of the authors' knowledge, only 5 cases of pyogenic granuloma in association with a dental implant have been reported in the international literature ([@B1]-[@B3],[@B7],[@B8]). Within the context of the scarce information available on these lesions, the aim of the present study was to report 10 novel clinical cases of pyogenic granuloma in association with titanium dental implants and to elucidate potential risk factors. Finally, the presence of marginal bone loss was evaluated. Material and Methods ==================== Patients charts at the service of oral medicine of Anitua's Dental Clinic (Alava, Spain) were revised from 1991 to 2011. Patients selection was based on the following inclusion criteria: • Treatment of pyogenic granuloma. • The presence of histopathological diagnosis. • Lesion in relation to dental implants. All patients who did not fulfill all inclusion criteria were excluded from the study. Data were collected to report on patient age, gender, patient´s disease, lesion site, type of dental implant (surface and morphology), predisposing factors (trauma, prosthesis type, poor oral hygiene), clinical and radiographic features, diagnosis, treatment and recurrence. Orthopantomography (OPG) of all lesions were examined to compare the presence or absence bone resorption around dental implants. A descriptive statistical analysis of all variables were performed. Then the relationship between PG and marginal bone loss was analyzed by nonparametric Spearman correlation. The effect of surface type on marginal bone loss was also analyzed with one-way ANOVA and Levene post hoc test. The statistical significance was set at *p*-value \< 0.05. All the statistical analyses were performed using the SPSS v15.0 for Windows statistical software package (SPSS Inc., Chicago, IL, USA). Results ======= Ten patients with pyogenic granuloma in relation to dental implants had been identified. They were 2 males and 8 females. Patients' age ranged from 21 to 92 years and all were non-smokers. Five of the ten patients (50%) had systemic disorders: cardiac arrhythmia (1 patient), hypertension (2 patients), atrial fibrillation (2 patients), Type II diabetes mellitus (2 patients), hepatitis C (1 patient ), hypothyroidism (1 patient). Within the group of patients with systemic disease, 3 of them were using 1 to 2 drugs daily, whereas the remaining patient took more than 2 drugs. With regard to oral hygiene habits, 20% of patients reported to brush once a day, 50% did twice daily and 30% brushed three times a day. A 90% of the patients received professional prophylaxis twice a year and the other 10% once a year. In the use of hygiene products the obtained results were as follows: a) use of mouthwash: only was used by 3 patients (37.5%), b) use of dental floss: only one patient (12.5%), and c) interproximal brushes: 3 patients (37.5%). The distribution of PG lesions was even between maxilla and mandible (50% for each region), and the most common oral site affected by PG was the area of tooth 41 (2 cases). The development of PG was related to only accumulation of dental plaque (one patient), bad prosthetic design (one patient), and both factors (one patient). In 4 patients, there had been a combination of tissue pressure by the prosthesis and poor oral hygiene. However, no etiological factor could be related to the development of PG in 3 patients. The clinical size of the lesions ranged from 1.1 x 0.6 mm to 36 x 19 mm. The mean diameter was 7.2 mm. All the lesions were excised and sent for histological examination. The defects were covered with a autologous fibrin membrane (Anitua's protocol). During the first week after the operation, all patients were given analgesic and 0.2% chlorhexidine gluconate mouthwash. During the follow-up period (range two months to 10 years), there were no recurrences. The histopathological reports indicated the diagnosis of PG and the description of highly vascular proliferation that resembles granulation tissue (Fig. [1](#F1){ref-type="fig"}). Figure 1Histological images of the pyogenic granuloma showing an appearance similar to granulation tissue. The histological type of the pyogenic granuloma is non-lobular capillary hemangioma. Arrow heads label blood vessels surrounded by connective tissue. The surfaces of the implants associated with the lesion were smooth (2 implants), machined (3 implants) and rough (5 implants). In no case there was a natural tooth adjacent to the implants related to the lesion. The characteristics of diameters and lengths of the implants studied can be seen in figure [2](#F2){ref-type="fig"}. The average load time of the implants studied was 115 months (SD = 67.5), ranging from a range of 9 to 184 months. Oral rehabilitation was performed with complete prosthesis in 9 patients. The mean mesial bone loss was 2.14 mm (range 0 to 6.50 mm, SD = 2.07) and the mean of distal bone was 1.66 mm (range 0 to 3.75 mm, SD = 1.21. Figure 2Diameter and length of dental implants related to the pyogenic granuloma. There were no statistically significant association between the PG area and the marginal bone loss. However the smooth implant surface showed a significant influence on bone loss (Anova: *p* = 0.001) (Fig. [3](#F3){ref-type="fig"}). Figure 3Peri-implant bone loss grouped by type of surface. The bone loss was the highest for implants with smooth surface. Discussion ========== The clinical and histopathological findings have confirmed the diagnosis of pyogenic granuloma in 10 patients. The present study is the one with the highest number of implant-related PG lesion that are available until now in the scientific literature. These PG lesions have been diagnosed as non-lobular capillary hemangioma. There are two histological types of PG. The first type is characterized by proliferating blood vessels that are organized in lobular aggregates. This histological type of PG was called lobular capillary hemangioma (LCH type). The second type (non-LCH type) consist of highly vascular proliferation that resembles granulation tissue ([@B1],[@B4],[@B11]). Literature data indicated that PG is rarely associated with dental implants, as there are only five cases reported ([@B1]-[@B3],[@B7],[@B8]). However, other reactive lesions such as gingival hyperplasia caused by phenytoin, allergy to titanium abutments or peripheral giant cell granulomas have been reported in the international literature. Causes of conventional oral pyogenic granulomas are not clear, although it has been shown that different stimuli irritants that can trigger them, such as repeated trauma, poor oral hygiene and hormonal problems ([@B1]-[@B20]). About 30-50% of patients with PG have a history of local trauma ([@B9]). Considering PG, in the case reported by Dojcinovic *et al.* ([@B1]), the inappropriate healing cap has resulted in dental plaque accumulation and chronic inflammation of the peri-implant tissues, triggering the development of a PG. However this was not the cause for PG in the case reported by Olmedo *et al.* ([@B2]). The authors have pointed out to the presence of "metal-like" particles and have postulated that these particles could be the result electrochemical phenomena, corrosion, friction, or a synergistic combination of these events ([@B4],[@B5]). Once released, these particles may trigger an inflammatory response mediated by cytokines and macrophages ([@B5]). This inflammatory reaction could perpetuate the pseudo-periodontal pocket that generates the lesion around the implant ([@B5]). In the case reported by Etöz *et al.* ([@B3]), the presence of a gap between the alveolar bone and implant surface could be associated with the occurrence of pyogenic granuloma. Although bone splitting technique was adequately performed, trauma from the upper dentition and lack of adequate keratinized mucosa could result in soft tissue invasion and may have been responsible for PG development ([@B3]). Kang *et al.* ([@B8]) have stated that the causes of the occurrence of PG was unclear however, the antithrombotic therapy may have some involvement in the development of the lesion. In this study, PG was related to only accumulation of dental plaque (one patient), bad prosthetic design (one patient), and to both factors (one patient). The mean age of patients was 74.5 years and most of them have decreased manual dexterity. The bad prosthetic design with flanges could difficult the maintenance of good oral hygiene and could predispose the development of PG around dental implants. In 4 cases, there has been a combination of tissue pressure by the prosthesis and poor oral hygiene. However, no etiological factor could be related to the development of PG in 3 patients where implants have a smooth surface. Previously published studies have reported the association of PG to implant with roughened surface ([@B1]-[@B3],[@B7],[@B8]). There are no published data on smooth or machined surfaces. In the histological analysis, the presence of metal-like particles were searched for. Such particles could not be found in any of the 10 biopsies and thus could not be related to the development or progression of PG. The marginal bone loss has shown no association with the presence of PG. However, Implant's surface has affected significantly the marginal bone loss around dental implants. This results can indicate that PG showed no predilection to specific surface type. With the data obtained from this study and others in the literature we can conclude that pyogenic granuloma in association with dental implants seems to respond to the same stimuli that triggers tooth-related PG. This lesion should be included in the differential diagnosis of soft mass growth around dental implants. PG had no significant correlation with the marginal bone loss around dental implants.
{ "pile_set_name": "PubMed Central" }
Introduction {#sec1} ============ In total hip arthroplasty (THA), optimum component position is critical for long-term success of the operation by decreasing rates of wear, aseptic loosening, and dislocation \[[@bib1], [@bib2], [@bib3], [@bib4]\]. Recognizing the importance of acetabular component position, Lewinnek et al published a "safe zone" of 5° to 25° for anteversion and 30° to 50° for acetabular abduction based on their experience with dislocations after posterior THA \[[@bib5]\]. This still serves as the standard for ideal acetabular component position but has been called into question given the importance of the spinopelvic relationship \[[@bib6],[@bib7]\]. In addition to acetabular component position, emphasis has also been placed on femoral component positioning. Historically, surgeons have identified the importance of keeping the femoral component out of varus because of increased rates of failure with varus cemented femoral stems \[[@bib8],[@bib9]\]. With the use of cementless femoral fixation, varus positioning of the femoral stem has not been shown to lead to the same increased failures \[[@bib10]\]. However, as compared with cemented femoral stems, many cementless femoral stems provide less ability to adjust the version of the component as a stable press-fit requires the stem to adapt to the proximal geometry of the native femur. Consequently, recent attention has been given to the combined version (CV) of the acetabular and femoral components, with the goal of improving impingement-free range of motion and decreasing instability \[[@bib11], [@bib12], [@bib13]\]. The concept of CV was originally introduced by Ranawat, and he described the use of the "Ranawat sign" to determine CV intraoperatively when using the posterior approach \[[@bib14]\]. While no optimum femoral version has been described, Dorr proposed a CV safe zone of 25°-50° based on previous anatomical studies and his experience with decreased instability in this range \[[@bib15]\]. More recent studies have attempted to quantify a combined anteversion that minimizes impingement \[[@bib16],[@bib17]\]. Native femoral anteversion can vary a great deal, and intraoperative judgment of femoral component version can be difficult. Using preoperative computerized tomography (CT) scans of a group of 46 patients scheduled for primary THA, Bargar et al \[[@bib18]\] found a large range of native femoral version from 6° of retroversion to 33° of anteversion. Dorr et al compared the surgeon's estimate of femoral component anteversion in the posterior approach with the postoperative CT measurement of version and found a poor precision of the surgeon\'s estimate with a correlation coefficient of only 0.688 \[[@bib19]\]. In addition, this study found that only 45% of the femoral stems landed within the desired range of 10°-20° of anteversion. In direct anterior total hip arthroplasty (DA-THA), femoral component broaching and insertion occurs while the patient is positioned supine with the leg fully extended, and the leg below the knee is often draped from the surgeon\'s view. Despite published results of comparable patient outcomes from the DA-THA with other THA approaches, some have questioned the ability to appropriately orient the femoral component with respect to femoral anteversion, via this approach \[[@bib20], [@bib21], [@bib22], [@bib23]\]. Previous studies have reported on improved acetabular component positioning in DA-THA \[[@bib24],[@bib25]\]. However, no prior study, to our knowledge, has examined the combined anteversion of the femoral and acetabular components in DA-THA. This study aims to analyze the combined femoral and acetabular anteversion with cross-sectional imaging and quantify this relative to the CV "safe zone" described by Dorr. Materials and methods {#sec2} ===================== After obtaining institutional review board approval, patients were approached for enrollment in the study. An patient who was undergoing a primary DA-THA from the senior author (JBM) was a candidate for enrollment. Patients with femoral or acetabular hardware were excluded from this study. Thirty consecutive patients were enrolled in the study. Four blinded observers independently recorded the measurements (2 fellowship-trained arthroplasty surgeons, one hip and knee fellow, and one orthopaedic resident). All implants were positioned using intraoperative fluoroscopy based on preoperative templating. A CORAIL femoral stem (DePuy, Warsaw, IN) and a PINNACLE acetabular cup (DePuy, Warsaw, IN) were used for all the cases. The senior author standardized intraoperative images by matching the anteroposterior (AP) pelvis fluoroscopic view with the preoperative AP pelvis standing radiograph. One month after surgery, all patients had a standing AP pelvis and a cross-table lateral radiograph taken, which were used for acetabular component position measurement. Abduction and anteversion measurements of the acetabulum were made from the digital radiograph using the TraumaCad (Voyant Health, Columbia, MD) hip abduction measurement tool. Femoral component position measurements were taken from limited supine CT scan of the hip and knee with 2.5-mm cuts (General Electric BrightSpeed, Fairfield, CT). CT was not selected for acetabular component position to minimize patient radiation exposure. Angular measurements were calculated using the axis of the top of neck of the femoral stem relative to both the posterior condylar axis (PCA) and the transepicondylar axis (TEA). The CV was then calculated for the TEA and the PCA by adding the femoral anteversion calculated from the CT scan with the anteversion measured from the standing AP pelvis radiograph. Statistical analysis {#sec2.1} -------------------- Measurements from the 4 observers were combined, and the mean and standard deviation were calculated. The Pearson correlation coefficient was also measured for each observer, with the kappa values reported, and compared with the group for all measurements. The mean for each measurement was used to determine the number of components placed in the "safe zone." Statistical analysis was performed with the use of SAS software (SAS Institute, Raleigh, NC). Results {#sec3} ======= Of the 30 enrolled patients, 29 had an appropriate CT scan obtained. One patient had a CT scan performed without adherence to the protocol precluding reference of femoral version to the axes of the knee and was excluded from the results. The mean acetabular abduction and anteversion were 39.3° (standard deviation \[SD\] = 4.2°) and 27.2° (SD = 4.7°), respectively. The mean stem anteversion was 17.5° (SD = 10.8°) from the TEA and 21.7° (SD = 11.3°) from the PCA. Ten of the 30 cups were placed inside of the "safe zone" of Lewinnek for acetabular anteversion, but all cups were within the "safe zone" for abduction ([Fig. 1](#fig1){ref-type="fig"}).Figure 1The Lewinnek "safe zone." Ten of the 30 cups were placed inside of the "safe zone" of Lewinnek for acetabular anteversion, but all cups were within the "safe zone" for abduction. Combined femoral and acetabular component anteversion from the TEA resulted in 79% (23 of 29) of patients within the "safe zone" of 25°-50° with accurately oriented components ([Fig. 2](#fig2){ref-type="fig"}).Figure 2Combined anteversion. Combined femoral and acetabular component anteversion. Pearson correlation coefficients were high for both stem anteversion from the TEA (R = 0.96) and the PCA (R = 0.98); however, the kappa coefficient for interobserver reliability for combined component anteversion was greater for the TEA (kappa = 0.83 vs 0.65). Discussion {#sec4} ========== Component positioning has been recognized as an important factor in the long-term survival of THA \[[@bib5],[@bib12],[@bib26]\]. Muller et al. \[[@bib27]\] suggested a cup anteversion of 10°-15° and femoral anteversion of 10° to be ideal. Lewinnek et al. \[[@bib5]\] followed with their study that found a lower dislocation rate when the acetabular components were positioned in a safe zone of 30°-50° of inclination and 5°-25° of anteversion. A study by Biedermann et al. \[[@bib28]\] found the lowest dislocation rates with acetabular components positioned at 45° of inclination and 15° of anteversion. More recently, Dorr proposed a CV safe zone of 25°-50° based on previous anatomical studies and his experience with decreased instability in this range \[[@bib15]\]. Many authors have begun to appreciate the importance of the combined femoral and acetabular anteversion on dislocation rates and impingement \[[@bib3],[@bib11],[@bib12],[@bib29]\]. Ranawat and Maynard \[[@bib6]\] suggested the importance of the combination of femoral and acetabular anteversion and recommended 45° for women and between 20° and 30° for men. Jolles et al. \[[@bib12]\] found that when the combined anteversion was outside of a range of 40°-60°, the patient's dislocation was 6.9 times higher. Hisatome and Doi \[[@bib29]\] examined combined anteversion in a mathematical model to find the optimum positions to avoid neck impingement with different sized components. They recommended an ideal position, while not accounting for patient's pelvic inclination, of 45° of cup abduction, 25° of cup anteversion, and 25° of stem antitorsion. Other studies have examined the combined component anteversion after lateral or posterior approach THA. Reikerås and Gunderson \[[@bib30]\] utilized postoperative CT scans in 91 patients after either posterior or lateral approach THA and found that only 60.4% of their patients had a combined anteversion within the acceptable safe zone. Wassilew et al. \[[@bib31]\] evaluated THAs performed using an anterolateral approach with navigation, and they found that 88% of their patients were within the CV safe zone of 25°-50°. A study by Nogler et al. \[[@bib24]\] examined the ability of the DA approach to position the femoral and acetabular components with and without navigation. However, the present study is the first to analyze CV in the DA-THA. We used the TraumaCad (Voyant Health, Columbia, MD) software tool, which was found to have good intraobserver and interobserver reliability but can underestimate acetabular anteversion by as much as 12° \[[@bib32]\]. Despite the potential for underestimation of anteversion, we believe that a standing radiograph more accurately represents the patient\'s functional anteversion and accounts for the patient\'s lumbar or pelvic tilt because of the difficulties in the estimation of tilts with supine radiographs \[[@bib33], [@bib34], [@bib35]\]. This notion is supported by the work of Hayakawa et al that found a statistically significant difference between intraoperative and postoperative radiographs in 100 consecutive patients for both anteversion and vertical tilt \[[@bib35]\]. Impingement can lead to abnormal wear patterns or dislocation. Our study found that 17% of patients had CV greater than 50°, outside of the safe zone. However, when the femoral and acetabular components were analyzed independently, 20 of 30 patients had "excessive" anteversion of the acetabular component. Intraoperative stability assessments did not identify any impingement. There was less variability in acetabular component version than in femoral version. With uncemented femoral components, femoral anteversion is largely dictated by proximal femoral geometry. Therefore, some surgeons have recommended a femur-first technique to better address this variability and "fine-tune" version on the acetabular implant \[[@bib36]\]. Our results are comparable with those of similar series that included the posterior or lateral approach THA with and without navigation, with 88% and 60.4% of the components within the safe zone for CV, respectively \[[@bib30],[@bib31]\]. We are unable to conclude that our results are superior based on the small sample size in our study, but this should be investigated further with a larger series. We used both the PCA and the TEA for measurements to determine femoral component anteversion. Interestingly, we found a slightly higher interobserver reliability with the TEA measurements than with the PCA. This may reflect the difficultly of locating the point of maximal posterior bone in the condyle with a fine-cut CT scan. The differential radii of the femoral condyles and the extremity orientation relative to the CT scanner may influence the appearance of the most posterior projection of the condyles. This could cause the most posterior condylar projection to be on separate cuts of the CT scan. Authors may consider using the TEA primarily for femoral version measurements with axial imaging or 3-dimensional imaging techniques. There are several potential limitations for this study. First, the number of patients in this study was 30. A small sample size may not reflect the variability of patient anatomies. The single-surgeon cohort may limit the generalizability of these results. The use of plain radiographs instead of CT to assess acetabular component position may be a limitation. The CT may be more accurate in determining acetabular anteversion and abduction. However, most surgeons who perform the DA-THA utilize the standing AP pelvis radiograph to position the acetabular component. It has been previously shown that the supine position of the acetabular component varies from supine to standing radiographs, and therefore, we chose to utilize a standing pelvis AP radiograph to determine the implant position. Many accepted modern studies have relied on AP radiographs to determine both anteversion and abduction angles for acetabular components \[[@bib37], [@bib38], [@bib39]\]. Finally, this study did not assess the spinopelvic relationship. Abdel et al. recently demonstrated that most dislocations occurred within the "safe zone" \[[@bib39]\] and it is possible that other factors are as important for stability as implant position. As this study represents the first to examine CV in DA-THA with postoperative axial imaging, we found that the DA approach allowed for placement of components with CV within the acceptable range for most patients. In this study, excessive anteversion of the acetabular component based on Lewinnek's "safe zone" was the most common component orientation error. However, this may simply represent a single surgeon's component orientation preference and may not necessarily be generalizable. Even with limited visualization of the proximal femur, the DA approach can reproducibly yield a high percentage of THA components in the "ideal" position for CV. Conflict of interest {#sec5} ==================== J.B. Mason receives royalties from DePuy and A Johnson & Johnson Company, is a paid consultant for DePuy and A Johnson & Johnson Company, receives other financial or material support from DePuy and A Johnson & Johnson Company, receives royalties, financial or material support from the Journal of Arthroplasty, and is a board member for the Publication Committee AAHKS; J.R. Martin is a paid consultant for DePuy and A Johnson & Johnson Company; J.L. Masonis receives royalties from Medacta, Smith & Nephew, and Zimmer, is a paid consultant for Smith & Nephew and Zimmer, holds stock or stock options in Orthogrid, receives research support a principal investigator from DePuy, A Johnson & Johnson Company, Smith & Nephew, and Zimmer, receives royalties, financial or material support from Medacta, and is a board member for the Anterior Hip Foundation; J.B. Jackson is a board member for AAOS and AOFAS committee. Appendix A. Supplementary data {#appsec1} ============================== Conflict of Interest Statement for ChristalConflict of Interest Statement for JacksonConflict of Interest Statement for MartinConflict of Interest Statement for MasonConflict of Interest Statement for MasonisConflict of Interest Statement for Springer
{ "pile_set_name": "PubMed Central" }
Stuff Queer People Need To Know (follow them @SQPNTK) has just shared that the multi-talented dancer, photographer, student and current Miss New York Claire Buffie will be the first Miss America competitor to run on “Straight for Equality: Let’s Talk” platform, which will focusing on all aspects of equality for the LGBT community. Buffie told the Advocate that the major reason she stuck with the competition is her passion for her platform: improving the climate for LGBT youths in schools, and breaking stigma, and talking about misconceptions . It’s to get so great to see a Beauty Queen who is an outspoken advocate for human rights. She is a real role model to young women everywhere! I’m so proud to be from NY. As much as I despise former Miss California USA Carrie Prejean — who recently exercised her right to “opposite marriage” when she tied the knot with Oakland Raider Kyle Boller — and these so-called scholarship competitions, one beauty queen is supporting LGBT rights in her race for the crown. Miss New York … Read More One response to “Why I Love Miss NY!” reading things like this makes me want to scream with joy. I wish my son would never have to see discrimination against anyone. Men, women, lesbians, gays, straights, transgender, nursing mothers, handicap people, children, adults.
{ "pile_set_name": "Pile-CC" }
Q: Formula to combine variable and cell references I have been looking for hours for a solution but couldn't find any. I am an absolute beginner in VBA and couldn't figure this out for myself. The thing I would like to do is that VBA enters in a cell a formula that will contain a value extracted from a variable and then subtracts all the below cells. The cells below could change which would affect the overall value so I need to leave it as dynamic. (e.g: Cell A1 should look like this: =500-A2-A3-A4.. etc). The code looks like this at the moment. So far it only enters the value from the variable crnt = Cells(5, "D").Value Range("E60").Select ActiveCell.Offset(0, crnt - 1).Activate rev = ActiveCell.Value Range("E9").Select ActiveCell.Offset(0, crnt - 1).Select ActiveCell.Value = rev A: You might want this one: InVal = 500 ' input value Cells("A1").FormulaLocal = "=" & CStr(InVal) & "-A2-A3-A4" or in a loop Dim InVal() as Variant InVal = Range("M60:Z60").Value For i = LBound(InVal) to UBound(InVal) Cells(1, i + 1).FormulaLocal = "=" & CStr(Val(InVal(i))) & "-" & Cells(2, i + 1).Address & "-" & Cells(3, i + 1).Address & "-" & Cells(4, i + 1).Address Next i All you need to do is to play with .Address and the strings to compile the formula.
{ "pile_set_name": "StackExchange" }
One Beaver Stadium Happy Thanksgiving! It’s once again that time of year when we give thanks for all the good things in our lives and express our gratitude to the important people in our lives. In this time of Thanksgiving, we should strive to remember our friends. Even the most thoughtful of us can let important relationships slip by the wayside, and we can lose track of people who were once the best of friends. Football season always seems to come and go much too quickly and it is one of the most exciting times to visit State College. Now is the time to make the trip back to Happy Valley for a great Nittany Lion Football weekend. Click “Read More” to learn about all the great things to do while you’re in State College. The purpose of the Football Letterman's Club is to perpetuate the Penn State Football tradition and promote brotherhood and unity between the university and former players, coaches and managers for their mutual benefit.
{ "pile_set_name": "Pile-CC" }
Disclaimer: This app is intended for entertainment purposes only. This app allows you to customize your lock screens by adding colorful overlays to pics and wallpapers. It does not modify the phone interface. Design a new background with this app and choose from multiple lock themes that will let you create something incredible! Even combine images with your own photos from your camera. Save your completed design to camera roll and then set as your lock screen wallpaper. Easy to use and make your own lock themes!
{ "pile_set_name": "Pile-CC" }
Monthly Archives: March 2014 Pharrell Williams will replace judge Cee Lo Green on The Voice for it’s upcoming seventh season. Williams was behind the two tracks that were each dubbed “the song of the summer” (“Get Lucky” and “Blurred Lines”) last year. Williams also helped Hans Zimmer score the soundtrack of next summer: “The Amazing Spider-Man 2.” He wrote… Fox not only announced plans for the season’s end with releasing finale dates for their current programming, but they announced plans for the summer premieres of some hits like “So You Think You Can Dance” and new show “I Wanna Marry ‘Harry’.” With premieres comes sacrifices. Next week’s series finale of “Raising Hope” has pre-empted… NBC is already making summer plans as this TV season winds down. In addition to announcing their finale plans, NBC will be rolling out six new series this summer with some returning favorites. “Crossbones,” a pirate drama, is one of the more anticipated summer rollouts. Check out the full list of premieres below. All times… True Detective, the hit series brought to you by HBO is currently on the hunt for a new pair of True Detectives. Matthew McConaughey and Woody Harrelson have said they would not be returning, although we knew that already as HBO had confirmed from the beginning this was to be an anthology. Rumor now has… Joining NBC and ABC, the EYE network is the latest to roll out their season ending plans. Kicking things off next week with the “How I Met Your Mother” series finale and ending with a three-hour Survivor extravaganza, check out the CBS Season Finale dates below! ABC Announces Finale Dates MONDAY, MARCH 31 8/7c How… Last night’s “Wheel of Fortune” (airing March 19, 2014) featured what host Pat Sajak called the “most amazing solve” in his career as the show’s host … for over 30 years! This solve is akin to a last second hail Mary play. Only two letters popped up on the final puzzle for Emil and his… After NBC announced their plans for the end of the season, ABC is next in line to share their air-dates for the end of the 2013-2014 TV season. Kicking it off with “Once Upon a Time In Wonderland,” putting “Scandal” in April and ending it with a few sitcom favorites, check out the plans below.… In the latest cover of Frozen’s Oscar winning song “Let It Go,” one man brilliantly gives us a taste of how the song might end up if Lumiere from Beauty and the Beast or Minne Mouse gave it a whirl! How would Timon and Pumbaa do? Check out the video below and let us know… “What percentage of water is celery?” That is precisely one of many burning questions users post on “Yahoo! Answers.” Life just isn’t the same without knowing exactly how much a $5 footlong at Subway costs, you know? A nine-hour adaptation of "11/22/63" - King's thriller about the Kennedy assassination - is headed directly to Hulu. Helmed by Abrams, the series is a limited “event series,” but there will be opportunities for future subsequent seasons based on the story, which follows high school English teacher Jake Epping, who travels back in time to try to prevent the assassination of President John F. Kennedy in Dallas on the fateful date in American history.
{ "pile_set_name": "Pile-CC" }
Proctosigmoidoscopy and rectal biopsy in infants and children. The medical records of all patients ages 0 to 21 years who underwent proctosigmoidoscopy and/or rectal biopsy over a 27 month period of time were reviewed to determine the efficacy and safety of these procedures in pediatric patients. One hundred twenty-one patients underwent proctosigmoidoscopy; 91 of these also had rectal biopsies. Median age was two years; 21% were less than six months and 8% less than one month of age. Depth of examination was 10 to 15 cm in most patients greater than 10 years of age. Induced friability was the most frequently observed mucosal abnormality. Abnormal findings were almost always present in patients with bloody diarrhea and were quite common in those with rectal bleeding, but less common in those with chronic diarrhea and abdominal pain. Colitis of various causes was the most common cause of blood in the stool; anal fissures were found in only four of 23 patients with rectal bleeding. Both proctosigmoidoscopy and rectal biopsy were needed to exclude the presence of colitis. Mobidity was 0% with proctosigmoidoscopy and 0.34% with rectal suction biopsy.
{ "pile_set_name": "PubMed Abstracts" }
In copending application Ser. No. 912,268, filed June 5, 1978 by Daniel M. Cap and William H. Lake, titled High Pressure Metal Vapor Discharge Lamps of Improved Efficacy, which is a continuation-in-part of an earlier application Ser. No. 812,479, filed July 5, 1977 similarly assigned, useful and efficient high pressure discharge lamps are disclosed having much smaller sizes than have been considered practical heretofore, namely discharge volumes of one cubic centimeter or less. In preferred form achieving maximum efficacy, these high intensity lamps utilize generally spheroidal thin-walled arc chambers which may vary in shape from slightly oblate to substantially prolate. Remarkably high efficacies are obtained by raising the metal vapor pressure above 5 atmospheres and to progressively higher pressures as the size is reduced. In such miniature lamps, the convective arc instability usually associated with the high pressures utilized is avoided, and there is no appreciable hazard from possibility of explosion. Practical designs provide wattage ratings or lamp sizes starting at about 100 watts and going down to less than 10 watts, the lamps having characteristics including color rendition, efficacy, maintenance and life duration making them suitable for general lighting purposes. A less desirable characteristic of these miniature high pressure metal vapor lamps is the very rapid deionization to which they are subject. In operation on 60 Hz alternating current, deionization is almost complete between half cycles so that a very high restriking voltage is required to be provided by the ballast. Particularly in metal halide lamps, during lamp warm-up within the first few seconds after arc ignition, the reignition voltage reaches extremely high levels. In view of these deionization limitations associated with low frequency operation of miniature metal halide lamps, the use of conventional 60 Hz ballasts has many disadvantages. The object of the invention is to provide an improved method or operating system for miniature metal halide lamps which overcomes the limitations imposed by rapid deionization at low operating frequencies and which permits the design of compact, practical and efficient high frequency ballasts.
{ "pile_set_name": "USPTO Backgrounds" }
The U.S. Army is laying the groundwork to let Halliburton Co., keep several billion dollars paid for work in Iraq that Pentagon auditors say is questionable or unsupported by proper documentation, the Wall Street Journal reported today. According to Pentagon documents reviewed by the Journal, the Army has acknowledged that the Houston-based company might never be able to account properly for some of its work, which has been probed amid accusations that Halliburton's Kellogg Brown & Root unit overbilled the government for some operations in Iraq. The company has hired a consulting firm to estimate what Halliburton's services should cost, the report said. The newspaper, citing the documents and internal memorandums, said that officials are considering using the estimate to serve as the basis for "an equitable settlement," under which the Pentagon could drop many of the claims its auditors have made against the company. But the Journal added that some disgruntled Pentagon officials see the effort to broker an outside settlement with the company as unusual because the contract is so large. According to the report, Kellogg Brown & Root so far has billed about $12 billion in Iraq, and about $3 billion of that remains disputed by government officials. The Journal also cited Pentagon records showing that $650 million in Halliburton billings are deemed questionable. An additional $2 billion is considered to have insufficient paperwork to justify the billing, the report said. A representative for Halliburton did not immediately return a call seeking comment early today.
{ "pile_set_name": "Pile-CC" }
Simple example of machine learning in TensorFlow - jostmey https://github.com/jostmey/NakedTensor?bare ====== dbcurtis I like these kind of "Hello, world!" examples for TensorFlow. As a TensorFlow beginner, I need all the references I can get. Here is what I need right now: "Hello, we meet again!". I can build a neural net model, and train (albeit, often badly) a model, but saving and restoring the trained weights so that I can run the model again is giving me fits. I am clearly missing something fundamental about how to restore a TensorFlow NN model. For your next tutorial, may I suggest: 1) a list of do's and don'ts for constructing a savable/restorable model, and 2) a wee bit of example code. Of course, now that I have discovered Keras I'm moving away from low-level direct TensorFlow. But I suspect I'm not the only one a bit foggy about the whole save/restore work flow. ~~~ pmalynin As a person that uses TensorFlow for his day job: I find that saving and restoring are of the weirder things with TensorFlow, you can either go all out an decide to save out all the variables, or only the ones needed for the model. You usually don't want to save out gradients (which are also variables) since they take up a bunch of space and aren't actually that useful to restore. Now on the other, what are model variables -- do you want to save model variables + the moving averages ... or just the averages. But then when you're loading you'll have to "shadow" the moving averages to the real variables that actually run in your model. Good news though, most of the scaffolding code you can write once and re-use it over and over again. ~~~ minimaxir In Keras, it's just a simple model.save() [to a hdf5 file] and load_model(). This includes both the weights and the architecture. Models with a few million parameters result in a file around ~50MB, which is still reasonable for modern production use cases. ~~~ glial Keras makes using deep learning for simple-ish use cases sooooo easy. ~~~ matheweis I second this - I'm really excited about Keras being integrated into the core of Tensorflow (other than the chance it might lose the Torch compatibility). ------ pred_ That's nifty; I was looking for something like that just a few weeks ago for a work demonstration! Ended up doing [https://gist.github.com/fuglede/ad04ce38e80887ddcbeb6b81e97b...](https://gist.github.com/fuglede/ad04ce38e80887ddcbeb6b81e97bbfbc) instead. ~~~ rhcom2 Thank you to you and OP for both sharing these resources. Really helpful. ------ nemo1618 I wish there were more TensorFlow examples written in Go. I made the mistake of checking out TensorFlow as my first intro to ML and it flew about 10 miles over my head. Slowly learning now, but most of the documentation and tutorials are written in Python. This blog series was also helpful on a conceptual level: [https://medium.com/emergent-future/simple-reinforcement- lear...](https://medium.com/emergent-future/simple-reinforcement-learning- with-tensorflow-part-0-q-learning-with-tables-and-neural- networks-d195264329d0#.4znc3ulur) ~~~ make3 as a deep learning professional, the deep learning community is something like 99% Python. You'd probably better learn Python at least well enough to recreate the corresponding Go code in your mind instantly. ------ calebm >>> You are one buzzword away from being a professional. Instead of fitting a line to just eight datapoints, we will now fit a line to 8-million datapoints. Welcome to big data. LOL :) (Side-note: 8 million is still not big data) ~~~ mcrad Big Data is a reference to complexity of the data & underlying system that data represents, NOT the number of datapoints. lol ~~~ pyromine Big data is really just a buzzword that no one knows what it really means, because everyone's definition is different lol ~~~ happycube I always think in terms of Munchkin: "any data that is not Big is small" ------ JonathonCwik So I'm still wrapping my head around some of the math (I haven't had a math class in a handful of years)... I get the output of the model (y_model = m*xs[i]+b), it's the y = mx + b where we know x (from the dataset) and have y be a variable. The error is where I start to lose it, so I get the idea of the first part (ys[i]-y_model). It's basically the difference between the actual y value (from the dataset). I get that we want this number to be as small as possible as the closer to zero it is for the entire dataset that means we get closer to the line going through (or near) all the points and the closest fit will be when this total_error is nearest to zero. What I don't get is the squaring of the difference. Is it just to make the difference a larger number so that it's a little more normalized? How do you get to the conclusion that it needs to be normalized? Same thing with the learning rate? I believe these to be correlated but I can't tell you how... ~~~ cowabungabruce Squaring gets you guaranteed positive numbers. Remember, we are adding all the errors together to optimize the model: If we get sum_errors_A = 4 + -3 + -1 sum_errors_B = 1 + 1 + 1 B is obviously the better model, but it has a higher error than A when comparing. If we squared all the terms and then added, B would be the stronger model. ~~~ JonathonCwik Ah, gotcha! Makes a lot more sense now. ------ Kiro This is awesome! I currently have a small pet project where I think some simple ML would be cool but I don't know where to start so these things are great. Basically my use case is that I have a bunch of 64x64 images (16 colors) which I manually label as "good", "neutral" or "bad". I want to input this dataset and train the network to categorize new 64x64 images of the same type. The closest I've found is this: [https://gist.github.com/sono- bfio/89a91da65a12175fb1169240cd...](https://gist.github.com/sono- bfio/89a91da65a12175fb1169240cde3a87b) But it's still too hard to understand exactly how I can create my own dataset and how to set it up efficiently (the example is using 32x32 but I also want to factor in that it's only 16 colors; will that give it some performance advantages?). ~~~ nl [https://blog.keras.io/building-powerful-image- classification...](https://blog.keras.io/building-powerful-image- classification-models-using-very-little-data.html) is what you want. ------ cosmicexplorer What is the meaning of the "?bare" query string in the url? I googled around for the meaning of query strings on the github site but only found rnandom repos on github (not sure how to narrow the search). The first time I tried removing it I saw another folder named "to_do", but this is gone now so it might give a version which is cached for longer somehow? ~~~ cosmicexplorer OK, found out what a bare repository means and pretty sure that's what it refers to. Still can't find any documentation for the query string parameter and don't know how that makes sense for github's repository view page. ------ blauditore I'm not sure about the rules, but shouldn't posts linking to own, personal projects be prefixed with "Show HN:"? I've seen a lot such posts lately where the poster was clearly the author as well. ~~~ pvg No, Show HN is a different thing with its own (generally stricter) rules. You don't have to add it to things just because you happen to be the author. [https://news.ycombinator.com/showhn.html](https://news.ycombinator.com/showhn.html) ------ kyleschiller I think you meant bare bones. ------ mediocrejoker I'm guessing english is not your first language, so I just wanted to point out that "bare bottom" is generally synonymous with "uncovered buttocks" ie. in the context of changing an infant's diaper. Perhaps you were meaning to put "bare bones"? Google's definition of the latter is "reduced to or comprising only the basic or essential elements of something." Don't want to detract from your point but I think your title is throwing some people off. I know I would be hesitant to click something at work that sounds like it could contain nudity. ~~~ dekhn I think the last example was a clASSifier, so it makes sense. ------ bencollier49 "Bare bottom"? I'm not clicking on this. ~~~ bencollier49 Downvoted! The title might have changed now, but the original one was completely indecipherable. As far as I could tell it was genuinely some sort of image recognition algorithm for naked buttocks. ------ BonoboBoner Simple example? Before finishing the first paragraph, it says "The slope and y-intercept of the line are determined using gradient descent." What on earth does that mean? Maybe they should teach mathematics in english at universities outside of english speaking countries. German mathematics does not help here. I wish there was a 4GL like SQL for machine learning using dynamic programming for algorithm selection and model synthesis like a dbms query planner. PREDICT s as revenue LEARN FROM company.sales as s GROUP BY MONTH ORDER BY company.region ~~~ sampo > _" The slope and y-intercept of the line are determined using gradient > descent."_ Slope and intercept are very standard names for the parameters of a linear regression model. Gradient descent is the name of the algorithm used.
{ "pile_set_name": "HackerNews" }
Q: Migrating from PVM to MPI I'm working on migrating a project from PVM to MPI. I wanted to ask if anyone here has done so before and if there exists any tutorials or manuals on the correspondance between functions in PVM and MPI. A: Chapter 9 of the useful book Using MPI talks pretty explicitly about comparing PVM and MPI and what you'd have to do to port. They're both message-passing libraries, and if you're mostly using point-to-point communications or basic collectives, the port should be quite straightforward. PVM though always had a lot more support for dynamic processes creation and management than even recent MPI standards have had, and if your code relies heavily on those sorts of features, it will be harder. A: I have a lot of resources I've been using over the past few days MPJ Papers mpj: enabling parallel simulations in java MPJ MIT MPJ java docs Google Scholar MPI Hope it helps! No problem with MPI by the way each processor runs synchronously in parallel with all the other processors, and every processor shares a different address space. (You can experiment this for yourself with java.util.Date and run System.out.println statements to the console and you'll see when you send something and receive something using point-to-point or unblocked communication, the process will recieve at the same time it was sent in a synchronous fashion). Send and recieve is better to think about when your at the dinner table and you ask a relative to give you a fork, you would recieve the fork at the same as it is being sent (i.e. being handed directly to you).
{ "pile_set_name": "StackExchange" }
More Views The J136 is an in house frame, made of the highest quality tier 90 plastic. Its sleek, wraparound style is highly popular and typically fits medium to large heads. These frames are designed with an adjustable nose bridge, for a perfect fit. The glasses come with rubber temple bars for added comfort, and are available in black. ANSI Z87.1-2003 APPROVED Product Description Details The J136 is an in house frame, made of the highest quality tier 90 plastic. Its sleek, wraparound style is highly popular and typically fits medium to large heads. These frames are designed with an adjustable nose bridge, for a perfect fit. The glasses come with rubber temple bars for added comfort, and are available in black. ANSI Z87.1-2003 APPROVED Liability Disclaimer: Phillips Safety Employees are not optometrists and can only make suggestions concerning eye protection. There are many types of eye protection available and we manufacture as many as possible. Phillips Safety Products does not accept any liability concerning eye damage arising from the use, misuse, or non-use of any eyewear products we sell.
{ "pile_set_name": "Pile-CC" }
Investors We Provide Quick Results for Your Underperforming Assets Optimizing the financial performance of the brand Development of management teams and training programs Operational systems and infrastructure to support growth Maximizing the growth potential for emerging brands Repositioning and refreshing brands in decline Menu innovation strategies designed to drive frequency and sales The investment community acquires restaurant brands for various reasons, but the common goal within a portfolio is profitability and quick financial wins. The expert team at Synergy Restaurant Consultants has the ability to identify and quantify opportunities to improve the performance of your assets and can act as a support system positioned between investors and operators to facilitate targeted growth. Synergy Restaurant Consultants has practical tools developed through experience with diverse operations which we use to help struggling brands by designing solutions that garner the most benefit with the least investment. The foodservice industry is a pennies business; when you manage the pennies, the dollars take care of themselves. Firms have invested billions of dollars into the restaurant industry in recent years in many cases leading to accelerated growth without the infrastructure required to support operations and hospitality. As opposed to retail, restaurants require standardized systems and excellent training programs to ensure consistent execution of the core product at the store level and that elusive secret to success…genuine hospitality. From stabilizing operations to improving top-line revenue and bottom-line profit, the team at Synergy Restaurant Consultants addresses your asset’s pain-points through innovation and efficiencies. By working with your restaurant brand’s management team to implement executable strategies, Synergy Restaurant Consultants will bring performance in line with expectations while supporting operations through periods of change.
{ "pile_set_name": "Pile-CC" }
Answers Q: I've lived a very sinful life, but a friend of mine says God will forgive me if I'll just believe in Jesus. What difference would that make? And how would I know if I was really forgiven? A: Your friend is right: You can be forgiven, and you can know beyond doubt that someday you will go to be with God in heaven forever. And my prayer is that you will take the one step that is necessary for this to become a reality. What is that step? It is the step of faith - trusting Jesus Christ as your Lord and Savior and committing your life to Him. Let me explain what this means. Only one thing will ever keep us out of heaven, and that is our sin. God is holy and pure, and unless we are cleansed of our sins we can never enter heaven. The Bible says of God, "Your eyes are too pure to look on evil; you cannot tolerate wrong" (Habakkuk 1:13). We not only need to be forgiven; we need to be cleansed. But how is this possible? We can't cleanse ourselves; only God can do it. And this is what He did by sending His Son, Jesus, into the world. He was without sin - but on the cross all our sins were placed on Him, and He took the judgment we deserved. All this was in accordance with God's plan, for God loves us and wanted to provide a way for us to be cleansed and saved. What must we do? We must turn to Christ, repenting of our sins and trusting Him alone for our salvation. Why not ask Christ to come into your life right now and save you? The Bible says, "Believe in the Lord Jesus, and you will be saved" (Acts 16:31).
{ "pile_set_name": "Pile-CC" }
Electrostatic interactions between hyaluronan and proteins at pH 4: how do they modulate hyaluronidase activity. Hyaluronan (HA) hydrolysis catalyzed by hyaluronidase (HAase) is inhibited at low HAase over HA ratio and low ionic strength, because HA forms electrostatic complexes with HAase, which is unable to catalyze hydrolysis. Bovine serum albumin (BSA) was used as a model to study the HA-protein electrostatic complexes at pH 4. At low ionic strength, there is formation of (i) neutral insoluble complexes at the phase separation and (ii) small positively-charged or large negatively-charged soluble complexes whether BSA or HA is in excess. According to the ionic strength, different types of complex are formed. Assays for HA and BSA led to the determination of the stoichiometry of these complexes. HAase was also shown to form the various types of complex with HA at low ionic strength. Finally, we showed that at 0 and 150 mmol L(-1) NaCl, BSA competes with HAase in forming complexes with HA and thus induces HAase release resulting in a large increase in the hydrolysis rate. These results, in addition to data in the literature, show that HA-protein complexes, which can exist under numerous and varied conditions of pH, ionic strength and protein over HA ratio, might control the in vivo HAase activity.
{ "pile_set_name": "PubMed Abstracts" }
313 F.Supp. 337 (1970) Margaruite J. BRANCH, Plaintiff, v. Robert H. FINCH, Secretary of Health, Education and Welfare, Defendant. Civ. A. No. T-4561. United States District Court, D. Kansas. April 22, 1970. *338 *339 *340 Reginald LaBunker, Topeka, Kan., for plaintiff. Robert J. Roth, U. S. Atty., Elmer Hoge, Asst. U. S. Atty., Topeka, Kan., for defendant. MEMORANDUM OF DECISION TEMPLAR, District Judge. This proceeding was instituted by plaintiff against the Secretary of Health, Education and Welfare as is authorized by and pursuant to Section 205(g) of the Social Security Act, 42 U. S.C. § 405(g), for the purpose of obtaining a judicial review of a final decision of the Secretary denying her application for disability insurance benefits under Sections 216(i) and 223 of the Act, 42 U.S.C. § 416(i) and 423. An affidavit being filed, this Court, on April 25. 1969, entered an order granting plaintiff leave to sue forma pauperis without securing costs. Both parties in this action have submitted motions for summary judgment together with briefs to support their respective positions. The plaintiff filed her application to establish a period of disability on February 28, 1968, as provided in Section 416(i), and for disability insurance benefits, as provided under Section 423 of the Act. Claimant alleged, in substance, that she became unable to work because of a badly sprained back on September 23, 1967. The application was denied initially and on reconsideration. On December 11, 1968, a hearing was conducted before the hearing examiner of the department, at which the plaintiff was present without an attorney. The hearing examiner filed his decision denying plaintiff's application on December 30, 1968. The appeals Council upheld the decision of the hearing examiner upon the plaintiff's request for review. The hearing examiner's decision became the final decision of the Secretary of Health, Education and Welfare. The claimant will meet the earnings requirement until June 30, 1972. The hearing examiner determined that, in view of the claimant's limited education and age, training for sedentary work would not be profitable for her. In his determination that the claimant is not entitled to a period of disability or to disability insurance benefits, the hearing examiner made the following findings: "FINDINGS OF FACT "1. The claimant is approximately 59 years of age and she has an eighth grade education. "2. The claimant has worked as a laundry worker, waitress, maid, and nurse's aide. "3. In September 1967 the claimant began to suffer from back pain and she was treated for the condition at St. Francis Hospital, Topeka, Kansas. "4. Orthopedic examination of the claimant's back in May 1968 resulted in a diagnosis of mild musculoligamentous strain residuals with underlying mild lumbar degenerative joint disease. "5. The claimant has not attempted to secure work since leaving her employment with the A. T. & S. F. Hospital, Topeka, Kansas, in 1967. "6. While the claimant's back condition has possibly prevented her from returning to work as a maid, she has not been prevented from working as a waitress, laundry helper, or nurse's aide for a period of twelve months or more and she is currently able to engage in this type of activity. "CONCLUSION OF LAW "The claimant has not been prevented from engaging in substantial, gainful activity for a period of twelve months *341 or more at any time prior to the date of this decision and she is presently able to work as a waitress, laundry helper, or nurse's aide." (Record P. 9, 10). The primary issue before this Court is whether or not there is substantial evidence to support the Secretary's decision that plaintiff was not entitled to a period of disability or to disability insurance benefits and specifically whether plaintiff has been unable to engage in substantial gainful activity by reason of a medically determinable physical or mental impairment which has lasted or can be expected to last for a continuous period of not less than 12 months. The definition of disability set forth in § 423(d) (1) provides: "(d) (1) The term `disability' means— (A) inability to engage in any substantial gainful activity by reason of any medically determinable physical or mental impairment which can be expected to result in death or which has lasted or can be expected to last for a continuous period of not less than 12 months * * *." "(2) For purposes of paragraph (1) (A)— (A) an individual * * * shall be determined to be under a disability only if his physical or mental impairment or impairments are of such severity that he is not only unable to do his previous work but cannot, considering his age, education, and work experience, engage in any other kind of substantial gainful work which exists in the national economy, regardless of whether such work exists in the immediate area in which he lives, or whether a specific job vacancy exists for him, or whether he would be hired if he applied for work. * * *" * * * * * * "(3) For purposes of this subsection, a `physical or mental impairment' is an impairment that results from anatomical, physiological, or psychological abnormalities which are demonstrable by medically acceptable clinical and laboratory diagnostic techniques." * * * * * * "(5) An individual shall not be considered to be under a disability unless he furnishes such medical and other evidence of the existence thereof as the Secretary may require." The word "any" as used in the phrase "any substantial gainful activity" must be read in light of what is reasonable and not what is merely conceivable. See Huneycutt v. Gardner, 282 F.Supp. 405 (M.D.N.C.1968). This Court recognizes that judicial review of final decisions of the Secretary is a defined and limited one. See Folsom v. O'Neal, 250 F.2d 946 (10th Cir. 1957); Gordon v. Celebrezze, 253 F.Supp. 779 (D.Kan.1965); Jones v. Celebrezze, 246 F.Supp. 701 (D.Kan. 1965); and Shonk v. Gardner (Templar, J., No. T-4354, unreported). The Court pointed out in Gardner v. Bishop, 362 F.2d 917, 919 (10th Cir. 1966), that findings of fact by the Secretary and the inferences drawn from such findings should not be disturbed by a reviewing court, "if there is substantial evidence to support them. Substantial evidence has been defined as `such relevant evidence as a reasonable mind might accept as adequate to support a conclusion.'" Stated in a different manner the evidence must be such, if the trial were to a jury, as would justify a refusal to direct a verdict when the conclusion sought to be drawn from it is one of fact for the jury. If there is only a slight preponderance of the evidence on one side or the other, the Secretary's finding should be affirmed. See Underwood v. Ribicoff, 298 F.2d 850, 851 (4th Cir. 1962). This Court is aware of the principle that the Act should be construed liberally in favor of a party seeking its benefits. See Davidson v. Gardner, *342 370 F.2d 803 (6th Cir. 1966); Dvorak v. Celebrezze, 345 F.2d 894 (10th Cir. 1965); and Ketcherside v. Celebrezze, 209 F.Supp. 226 (D.Kan.1962). It is clear that a court is not to try a case de novo and that it must not abdicate its traditional function to scrutinize the entire record in order to determine whether the conclusions made by the Secretary are rational and if the court should determine that reliance has been placed upon one portion of the record in disregard of overwhelming evidence to the contrary, then the court is bound to modify or reverse the Secretary's findings with or without remanding the case for rehearing. See Thomas v. Celebrezze, 331 F.2d 541 (4th Cir. 1964) and Burrell v. Finch, 308 F.Supp. 264 (D. Kan.1969). The plaintiff's age, education, training, experience, and physical and mental capabilities are of considerable importance in determining her rights to disability benefits under the Act. See Ellerman v. Flemming, 188 F.Supp. 521 (D.Mo.1960) and Aniol v. Flemming, 188 F.Supp. 233 (D.Kan.1960). The record discloses that claimant resides at 627 W. 17th Topeka, Kansas, has a seventh grade education, and was approximately 59 years of age at the time of the hearing. There is some discrepancy as to the level of education attained by the claimant. Although the hearing examiner found that the claimant had an eighth grade education, the claimant testified that she had finished the seventh grade. In her request for reconsideration (Record P. 67) the claimant stated that she had only an eighth grade education, and Dr. Miller made reference to the eighth grade in one of his reports (Record P. 51). The claimant testified that she is married, but separated, and has eight children living. (Record P. 21). The claimant's past work record may be summarized as follows: waitress for a number of years; nurse's aide; worked for a laundry as an ironer; and worked as a maid at the Santa Fe Hospital, which was her most recent employment. Additional testimony offered by the claimant may be summarized as follows: The claimant does not have a driver's license or a car, but she is able to use the public buses. She testified that she is 5' 3" and weighs 139 lbs., although she used to weigh 165 lbs. The claimant stated that she weighed 165 when she got hurt, then in response to a question of the hearing examiner she stated that she weighed up in the 40's in September 1967. She worked for Santa Fe Hospital for 3 years as a maid, and the work involved scrubbing, dusting, washing windows and waxing. The claimant testified that while she was scrubbing the floor, the bed broke and she slipped. She stated that she went to St. Francis Hospital and was there for 12 days. She further stated that she had doctored with Dr. Rook and took treatments at the Santa Fe Hospital before she had to quit at Santa Fe. She said that she felt better for a while after being released. She testified that she received a workmen's compensation settlement. The claimant said that she did not look for any work after the injury occurred because she is not able to work. In relation to her back she stated that whenever she does a lot of stooping, scrubbing or anything like that, or standing on her feet any length or period of time it bothers her. She has not had any surgery on her back but the doctor said she might have to, although he did not advise it now. She testified that she stays home and watches television, and that she is able to make her meals and take care of her personal needs. She cannot do any mopping, ironing, scrubbing, washing, lifting or anything like that because it bothers her. She does not wear a back brace, and the doctor has not suggested that she should. She takes the medicine the doctor gives her and heat treatments. The heat treatments consist of heating towels *343 in hot water and putting them on a heat pad. In regard to house cleaning the claimant dusts and things like that. She visits her daughters and she has company once in a while. The claimant's support consists of $83 a month from welfare. In reference to a question about attempting to find work as a waitress she stated that she did not think she could stand up on her feet that long. She testified that steady walking bothers her, and she does not think she could stand up as a waitress carrying heavy trays and plates. She indicated that she likes to work and wishes she could. She stated that her back feels worse when she gets up and around during the day and when she turns over at night it bothers her, but the heat treatments help a lot. The doctor has not suggested that she should exercise for the back condition, but said she could not do any heavy work. She indicated that her back feels worse when she goes to bed than when she gets up. Two of the claimant's daughters testified that they clean house for her. They do the scrubbing, ironing, washing and waxing. One of the daughters testified that in her opinion her mother's back condition would keep her from working as a maid. In the claimant's hospital admission report dated October 1, 1967, Dr. Kirk Miller, M.D., claimant's personal physician, stated the admission diagnosis as "Low back syndrome" and "Constipation". (Record P. 45) In this report Dr. Miller noted the claimant's chief complaint was low back pain and he gave the following summary of claimant's illness: "About two weeks ago, while mopping at Santa Fe Hospital, patient noted gradual onset of low back pain. It became so severe that it was finally necessary for her to quit work. I have been seeing her in my office during the past week at which time she was put on muscle relaxants and diathermy, but all to no avail. She still continued to have her pain. It was decided to put her in the hospital where we could obtain some studies, possibly a myelogram; in any event, to treat her more intensively with heat and bed-rest and traction." (Record P. 45) The doctor made the following physical examination findings in this same report: "Well developed, well nourished, 57-year old female appearing younger than stated age, not appearing acutely or chronically ill. HEENT * * * Pupils round, regular, equal, react well to light and on accomodation. Ear canals and drums clear. Pharynx clear. Neck supple; no thyroid enlargement. Chest clear to percussion and auscultation. Heart reveals regular sinus rhythm; no murmurs or enlargement. Abdomen soft; no masses, spasms, tenderness; LKSB not felt. Extremities relatively unremarkable. There is considerable tenderness to deep palpation over the lower lumbar spine and just lateral to the lower lumbar spine around L-4, L-5 bilaterally." (Record P. 45) In the hospital discharge report dated October 12, 1967, Dr. Miller noted: "Patient was admitted with a 2-weeks history of low back pain; she has had one previous episode. Admitted for conservative treatment of back condition and possible myelogram if she did not clear. Px revealed considerable tenderness to palpation over the lower lumbar spine and just lateral to the lower lumbar spine around L-4, L-5, bilaterally. WBC revealed slight shift to the left, which was normal with 70 polys, 22 lymphs. IVP negative. Quantitative urine for culture was negative. Chest film normal. Spine films revealed degeneration and/or herniation of the L-4, L-5 disc. "Patient was placed in bed and given a Kapok pad warm heat treatment to her lower back. She was given Ultrasound daily to lower back by the physiotherapy department, placed on Darvon-65 *344 p. r. n. pain. Over a period of a week back pain gradually disappeared. During this period of time she also noted frequent urination and nocturia 3-4m. Urinary studies were carried out which were negative. She recovered completely from back pain after 12 days in the hospital and she is being sent home today taking no medication except Darvon p. r. n. She will continue her Parafon Forte, if necessary. It is decided that she can return to work if her back pain disappears. Her work seems to aggravate her condition and it may be necessary for her to find some other profession because of this difficulty." (Record P. 47) Dr. Miller indicated his final diagnosis in the hospital discharge report as: "Degeneration and/or herniation of L-4, L-5 disc Frequent urination, cause undetermined" (Record P. 57) In another report dated March 20, 1968, Dr. Miller stated his diagnosis as "Low back syndrome with probable herniation of L-4 to L-5 disk." (Record P. 51) The following history of the patient was given by Dr. Miller in this report: "This patient originally injured her back while working for the Santa Fe Hospital in the Winter of 1966-1967. At that time her anterior thigh muscles hurt while mopping, and she was off of work for 10 days. Again on September 11, 1967 while scrubbing a floor, her back began to hurt and has been hurting ever since. She was put on Parafon Forte, given diathermy treatment, a bed-board was suggested for her, and she had to use moist heat at home, and treatment continued from September 25th until October 1st, 1967 without much relief. She was hospitalized at St. Francis Hospital from October 1 to October 12, 1967, and her back was considerably improved. When seen on October 23, 1967, it was felt she could return to work and do light work. At that time she was given Darvon Compound and feeling much better. She was seen again in November and December of 1967, and January and February of 1968, at monthly intervals, at such time she stated that she had some soreness occasionally. Straight legraising was O.K. bilaterally except for slight soreness on the left when elevated to 90 degrees. It was felt that she would be able to continue to work in a sedentary type job but she should never again do heavy lifting or mopping such as she had done previously." (Record P. 48) Dr. Miller further noted in this same report that "Because of this patient's limited educational background (8th grade) it will probably be difficult for her to obtain sedentary type of occupation which will be required for her with her difficulty." (Record P. 51) In a report dated May 13, 1968, Dr. W. L. Beller, a radiologist, to whom the claimant had been referred by Dr. Donald D. Hobbs, stated as his conclusion the following: "Moderate degenerative disc disease at the L4 level. Mild rotoscoliosis of the dorsolumbar spine. No other significant abnormality is apparent." (Record P. 58) Dr. Donald D. Hobbs, specialist in orthopedic surgery, submitted a report dated May 27, 1968, in which he noted that the claimant complained of persistent low back pain with aching discomfort aggravated by bending and stooping. In this report Dr. Hobbs made the following findings upon examination of the claimant: "Examination today reveals an alert, co-operative woman in no apparent distress. She moves about the examining room with normal gait. Does heel and toe walking without evidence of muscle weakness. There is no significant evidence of guarding on performance of trunk motions. Range of motion of the lumbar spine in flexion, extension and lateral flexion is essentially normal. The patient complains of increased discomfort on left lateral *345 flexion and on hyperextension. There is mild tenderness over the paravetebral musculature on the left with deep palpation. No significant gluteal sciatic notch tenderness. The patient complains of pain on any attempted mobilization of the left lower extremity, hip-knee flexion, straight leg raising or simple rotary motions of the hip joint. Certainly there is no appreciable limitation of straight leg raising and Laseque's test is negative. Domarque, Trendelenburg, Ober and Ely tests are all negative. The neurologic check including motor, sensory and reflex activity over the segmental distribution of the lumbosacral plexus is entirely physiologic. Babinski's sign is bilaterally absent. The popliteal stretch test is entirely negative." (Record P. 61) Dr. Hobbs stated his impression as "Mild musculo-ligamentous strain residuals with underlying mild lumbar degenerative joint disease" and he concluded his report by saying "It is my impression that this patient is a suitable candidate for moderate work activity perhaps to exclude excessive bending, stooping and heavy lifting." Dr. Miller submitted a supplemental report dated August 16, 1968, in which his diagnosis was: "1. Low back syndrome, probable herniation of L-4 to L-5 disc. 2. Chronic rhinitis." (Record P. 72) Dr. Miller further stated in this report: "I saw the patient on March 25, 1968, at which time she had subsequently had a mild urinary tract infection prior to this time which was cleared up. She was having difficulty with leg cramps. A calcium and phosperous determination were obtained and found to be within normal limits. The patient stated that her back was well at that time. I saw the patient again on April 19, 1968 at which time her back was bothering her off and on but not as sore as usual. She had an acute bronchitis for which she was treated with expectorants, decongestants and given a course of inhalation therapy. She continued this until April 27, 1968, at which time was quite recovered from the infection. I did not see the patient again until August 10, 1968, at which time she stated that she was still having some back trouble. She reported that she had stooped over one time last week and her back hurt her for only one day. She also stated that it hurt her to do any scrubbing or any physical work. She also had a chronic rhinitis. For the rhinitis I gave her some decongestants and sprays. She stated that she was taking Darvon Compound 65 PRN for her back difficulty." (Record P. 69) The hearing examiner noted that the claimant "seemed somewhat younger than her stated age of 59, and about her stated height and weight of 5 feet 3 inches and 139 pounds, respectively." (Record P. 8) He also stated that the claimant "exhibited no significant signs or symptoms of any mental or physical impairments during the hearing." (Record P. 8) In the disability interview report the interviewer indicated that claimant displayed no difficulty with walking, speaking, sight, hearing, use of hands and arms, breathing, sitting, reading, writing, responding, language, or comprehending. (Record P. 55) The finding of disability in a social security disability case involves a two-step finding. First, there must be a finding that the claimant has a medically determinable physical or mental impairment. Second, assuming such impairment is found to be present, there must be a finding of whether the impairment, in fact, causes an inability to engage in any substantial gainful activity. See Knelly v. Celebrezze, 249 F. Supp. 521 (M.D.Pa.1965), and Burrell v. Finch, 308 F.Supp. 264 (D.Kan.1969). The first finding may require the application of objective and subjective evidence and the second is almost an entirely *346 subjective determination. See Mauldin v. Celebrezze, 260 F.Supp. 287 (D.S. C.1966). Certain elements of proof should be considered in making a finding of claimant's ability or inability to engage in any substantial gainful employment, and they are: objective medical facts and clinical findings; diagnoses and expert medical opinions of treating and examining physicians; subjective evidence of pain and disability testified to by claimant and other lay witnesses; and the educational background, work history and present age of claimant. See Morgan v. Gardner, D.C., 254 F. Supp. 977, and Huneycutt v. Gardner, supra. As the defendant stated in his brief there is no question whether plaintiff has a back impairment and back pain because all the medical evidence indicates that she does. The defendant also correctly stated that the key question is whether that impairment and the attending pain are so severe that plaintiff is unable to engage in substantial gainful activity. (Defendant's Brief P. 5) The first portion of the two-step test has been met in that the plaintiff has a medically determinable impairment. The second part of the test as to whether that impairment and accompanying pain are so severe that the claimant is unable to engage in any substantial gainful activity is mainly a subjective determination. This Court is well aware of the fact that pain can be so severe as to be disabling in itself, with or without objective symptoms. See Bailey v. Cohen, (Templar, J., No. T-4266, unreported). The test is not whether the impairment, subjective or objective, would be disabling to a theoretical person but instead whether the subjective complaint independently or together with other impairments is disabling to this particular claimant. See Shonk v. Gardner, (Templar, J., No. T-4354, unreported); Burrell v. Cohen, supra; and Franklin v. Secretary of Health, Education and Welfare, 393 F.2d 640 (2d Cir. 1968). Subjective symptoms should be evaluated with due consideration for credibility, motivation, and medical evidence of impairment. See Dvorak v. Celebrezze, supra. The burden of proving disability under the Social Security Act is with the claimant, See McMillin v. Gardner, 384 F.2d 596 (10th Cir. 1967), and this burden need not be carried beyond a reasonable doubt. See Rose v. Finch, 303 F.Supp. 35 (W.D.Va.1969). In the present case the plaintiff testified before the hearing examiner that she could perform certain household chores and that she could take care of her personal needs. A claimant need not be completely helpless, bedfast or at death's door in order to sustain her claim for disability benefits. See Perkins v. Ribicoff, 201 F.Supp. 332 (E.D.Ark.1961). The ability to do light housework does not constitute a true test of ability to engage in substantial gainful activity. See Murphy v. Gardner, 379 F.2d 1 (8th Cir. 1967); Jarvis v. Ribicoff, 312 F.2d 707 (6th Cir. 1963); and Mims v. Celebrezze, 217 F. Supp. 581 (D.Colo.1963). The plaintiff in this case does have an impairment, a back condition, and there is testimony and evidence that she suffers some pain. The hearing examiner determined that the plaintiff could work as a waitress, laundry helper, or nurse's aide, occupations in which she had formerly engaged in. The Secretary does not have the duty of finding a specific employer for a specific job. See Gardner v. Brian, 369 F.2d 443 (10th Cir. 1966). In Statzer v. Cohen, 297 F.Supp. 874, 877 (W.D.Va.1969) the Court stated: "The question here is not whether the claimant would be hired by an employer if he applied for work, but rather, whether he is physically and mentally capable of performing work which exists in significant numbers in the national economy." Two of the examining physicians found, in effect, that the plaintiff could return to some type of work, either sedentary *347 or moderate, although not to her former employment. Dr. Miller noted in one of his reports that "Because of this patient's limited educational background (8th grade) it will probably be difficult for her to obtain sedentary type of occupation which will be required for her with her difficulty." (Record P. 51) This last notation is only an opinion of Dr. Miller, and this determination is for the Secretary to make after a review of all the proceedings in the case. The type of substantial gainful activity that a disability claimant can be found able to engage in must be both substantial and gainful, realistically judged by his education, training and experience. See Jones v. Gardner, 282 F.Supp. 56 (W.D. Ark.1966), and Nichols v. Gardner, 361 F.2d 963 (8th Cir. 1966). The fact that a claimant for disability benefits could not work without pain or discomfort does not satisfy the test for disability under the act. See Coomes v. Ribicoff, 209 F.Supp. 670 (D.Kan.1962). It must be remembered that the Social Security Act is not to be interpreted as unemployment compensation insurance. See Celebrezze v. Sutton, 338 F.2d 417 (8th Cir. 1964), and Richard v. Celebrezze, 247 F.Supp. 183 (D.Minn.1965). The plaintiff's attorney stated in his brief: "The problem in plaintiff's case is not whether there is waitress, laundry helper, or nurses aide work available, and whether she would be hired if she applied for those jobs that the hearing examiner determined that plaintiff could do, but rather whether under the medical evidence and plaintiff's own testimony she could perform those occupations on a `sustained basis' to the extent that she could have been `substantially gainfully employed' during the past two years." (Brief P. 8) The finding of the hearing examiner that the claimant is able to work as a waitress, laundry helper or nurse's aide is not entirely supported by the objective and subjective factors considered in this case. Employment as a waitress could not be considered in any sense of the imagination as "sedentary" or "moderate" work activity. The plaintiff testified that she worked as an ironer for the American Linen Company for about eight months, but she left this employment when the company closed down. It is to be noted in this case that the plaintiff has made no effort to seek substantial gainful employment of any type. There is evidence that the plaintiff has a back impairment with accompanying pain; there is evidence that the plaintiff should not return to her former work as a maid at the Santa Fe Hospital; and there is evidence that the plaintiff is able to perform some type of work. The only evidence contrary to the plaintiff's ability to work is the plaintiff's belief that she cannot work. In the case of Carden v. Gardner, 352 F.2d 51, 52 (6th Cir. 1965) the Court stated: "* * * it is also the rule that where the Secretary has found from the evidence that the claimant is able to engage in a former trade or occupation, such a determination `precludes the necessity of an administrative showing of gainful work which the appellant was capable of doing and the availability of any such work.'" After considering the objective and subjective factors in this case the Court concludes that plaintiff is able to work as a nurse's aide and may be able to work as a laundry helper, occupations in which she was once engaged. There is evidence and testimony in this case that the plaintiff received a small, lump sum workmen's compensation settlement. A determination of disability by a state or some other agency is not binding on the Secretary in a social security disability benefits case. See Neel v. Ribicoff, 204 F. Supp. 914 (D.Or.1962); Dupkunis v. Celebrezze, 323 F.2d 380 (3rd Cir. 1963); Sampson v. Flemming, 189 F.Supp. 725 (D.Kan.1960); and Stancavage v. Celebrezze, 209 F.Supp. 781, reversed on other grounds 323 F.2d 373 (3rd Cir. 1963). *348 The plaintiff's attorney makes reference in his brief to the fact that the claimant was without representation of counsel during the proceedings. In Hullom v. Burrows, 266 F.2d 547, 548 (6th Cir. 1959), cert. den. 361 U.S. 919, 80 S.Ct. 262, 4 L.Ed.2d 187, it was said: "The Sixth Amendment to the Constitution of the United States, which provides that in criminal prosecutions the accused shall have the assistance of counsel for his defense, does not apply to civil cases." In his decision the hearing examiner stated that "* * * claimant did not have a representative, but was fully advised by the Hearing Examiner of her right to be represented, which right was waived by the claimant." (Record P. 5) There is no evidence in the record that the hearing examiner made any inquiry regarding claimant's representation at the hearing. Apparently the claimant did receive a notice of hearing which included information concerning representation, which read in part, "While it is not required, you may be represented at the hearing by an attorney or other qualified person of your choice, if you desire assistance in presenting your case." (Record P. 14) It then discussed the payment of a fee to the attorney or other representative. A claimant's lack of counsel in a social security disability benefits case does not require reversal of a decision denying benefits if the claimant had a fair opportunity to be heard, full opportunity to present evidence, and was not prejudiced by the absence of counsel. See Meola v. Ribicoff, 207 F.Supp. 658 (S.D.N.Y.1962). It is worthy of note in this case that the plaintiff was represented by an attorney in her workmen's compensation claim, which occurred prior to the proceedings in this case, and two letters from the plaintiff's attorney relating to the workmen's compensation claim were submitted at the hearing. The plaintiff's attorney in her workmen's compensation claim is the same attorney now representing the plaintiff on this review. The plaintiff was given a full and fair hearing before the hearing examiner even though she was not represented by counsel. Plaintiff's attorney stated in his brief at page 3 that plaintiff weighed 165 pounds when hurt and she weighed 139 pounds at the time of the hearing. This statement is not supported by the evidence and testimony in the case. The plaintiff testified that she weighed 165 pounds until she was hurt, but in response to a question of the hearing examiner as to whether she weighed 165 pounds in September 1967 she stated that she weighed in the 40's then. (Record P. 21, 22) In the hospital admission report, Dr. Miller noted in his systemic review that claimant had lost 10 pounds in the last year. (Record P. 45) There is no evidence or testimony in this case that the plaintiff suffered a substantial loss of weight because of her injury or that any weight loss contributed adversely to her condition. Plaintiff's counsel cited two Kansas workmen's compensation cases, Hanna v. Edward Gray Corp., 197 Kan. 793, 421 P.2d 205, and Miller v. Beech Aircraft Corp., 204 Kan. 184, 460 P.2d 535, in support of the proposition that the testimony of the plaintiff as to the duration of disability is to be considered as well as medical testimony. Although these two state cases involved workmen's compensation, the proposition is one which would be considered by the Secretary in reaching his decision in a social security disability benefits case. It was not overlooked in the present case. The Secretary's determination is final if supported by substantial evidence. Any conflicts in the evidence or in reasonable inferences to be drawn therefrom is for the Secretary and not for the Court to resolve. Even if there is only a slight preponderance of evidence on one side or the other the Secretary's findings must be affirmed. See Ferrell v. Gardner, 260 F.Supp. 996 (S. D.W.Va.1966). This Court has carefully examined the record and briefs submitted in this case and concludes that the *349 findings of the Secretary are supported by substantial evidence except for the finding that the plaintiff could work as a waitress. This Court is convinced that the record fails to disclose that the plaintiff's impairment is of sufficient severity as to be disabling within the meaning of the Social Security Act. For the above reasons, the Court must conclude that the decision of the Secretary be affirmed, the motion of the defendant for summary judgment is granted, and the complaint be dismissed. It is so ordered.
{ "pile_set_name": "FreeLaw" }
1. Historical Origins {#sec1-viruses-12-00132} ===================== At a meeting of the Fellows of the National Institute of Agricultural Botany in Cambridge, UK, on 14 November 1924, Dr. Redcliffe Salaman gave a lecture entitled "Degeneration of the Potato---An Urgent Problem" \[[@B1-viruses-12-00132]\]. He reported that "potato degeneration", namely the decrease in yield when potatoes were grown year after year from tubers, rather than from true seed, cost the UK between five and ten million pounds sterling each year. He noted that the condition was first reported in 1778 at a meeting in Manchester, and called "potato curl". It was worse in lowland crops and in the Southern UK than in crops grown on higher ground and in the north, and although some thought it was caused by disease, perhaps insect-borne, others believed it was a form of senility resulting from repeated vegetative reproduction! Salaman concluded that that degeneration was caused by a complex of tuber-borne pathogens. Salaman's talk was successful, as it induced the Ministry of Agriculture to found the Potato Virus Research Station in Cambridge and appoint him as director, and in turn he appointed Kenneth Smith as entomologist, who soon separated some of the components of potato curl and identified the viruses he called potato virus X and potato virus Y (PVY) \[[@B2-viruses-12-00132]\]. Other viruses similar to PVY were soon reported, for example, henbane mosaic virus \[[@B3-viruses-12-00132]\], which was like PVY in causing mosaic symptoms, being transmitted by sap, although relatively unstable in it, and also by being transmitted by aphids in short feeds. These viruses, which became known as potyviruses, short for "potato virus Y group viruses" \[[@B4-viruses-12-00132]\], were among those included in early attempts to devise biological taxonomies of plant viruses \[[@B5-viruses-12-00132]\] based on the length of their filamentous particles \[[@B6-viruses-12-00132]\]. They were also distinguished from other plant viruses by having serologically distinct virions and, biologically, by having distinct host ranges and causing distinct symptoms, and by their properties in infective sap, such as dilution end point, thermal inactivation point, and longevity in vitro. Sixteen different potyviruses had been described in 1959. Subsequently, in this pre-sequencing era, a combination of techniques, including sucrose density gradient centrifugation, analytical ultracentrifugation, ultraviolet spectrophotometry, and polyacrylamide gel electrophoresis were also included to establish the sedimentation coefficients and buoyant densities of virions, and the molecular weights of protein subunits and % nucleic acid contents, as all these properties provided additional distinguishing characteristics when novel viruses were being described \[[@B7-viruses-12-00132]\]. Virus identification and taxonomy were transformed later, when methods for sequencing genes were invented in the 1970s and applied to plant viruses \[[@B8-viruses-12-00132],[@B9-viruses-12-00132]\], and it was established that hierarchical groupings based on viral protein and gene sequences, including those of potyviruses, confirmed and extended those that had been devised previously by using phenotypic characters, serological tests, etc. As a result, 57 potyviruses had been identified by 1991 \[[@B10-viruses-12-00132]\], using sequences of the "part NIb-CP" region of their genomes, as this was bracketed by convenient primer sites \[[@B11-viruses-12-00132],[@B12-viruses-12-00132]\]. By 2000, over 1000 potyvirus sequences were recorded in the GenBank database, and there are now more than 26,000. The potyviruses now form a family, the *Potyviridae* \[[@B13-viruses-12-00132]\], containing at least eight genera of which the aphid-transmitted potyviruses, including the first described, PVY, make up the largest genus, *Potyvirus*. This large plant virus genus is one of the most important economically because of the yield and quality losses it causes in a wide range of crops worldwide. Moreover, some of its members currently endanger food security in developing countries by causing devastating diseases in tropical and subtropical food crops \[[@B14-viruses-12-00132]\]. 2. The Origins of the Potyviridae {#sec2-viruses-12-00132} ================================= The potyvirids are distinguished from other viruses by specific molecular differences, together with a combination of phenotypic properties \[[@B13-viruses-12-00132],[@B15-viruses-12-00132]\]. All potyviruses infect plants; most are transmitted in nature by arthropods---mostly by aphids---though bymoviruses are transmitted by root-infecting plasmodiophorids, which are cercozoan amoebae. Some potyviruses are seed-borne \[[@B16-viruses-12-00132]\]. Potyvirid virions are flexuous filaments, 680--900 nm long and 11--20 nm in diameter. Each is helically constructed from 1400 to 2140 subunits of a coat protein (CP), and a positive-sense, single-stranded RNA genome (usually monopartite, but bipartite in the genus *Bymovirus*) of 8--11 kb in total, which is wound into a groove within the CP subunits. The ancestry and origins of the potyvirids is being revealed by studies of the structure and sequences of their genes and proteins. These show that their genomes are polyphyletic in origin, as there are significant similarities between three of their genes and those of viruses in three otherwise-unrelated virus genera; two detected by the protein sequence similarity of the helicase region of the CI protein and the RdRp region of the NIb protein, respectively, and the third by the structure of the CP \[[@B17-viruses-12-00132],[@B18-viruses-12-00132]\]. A BLASTp search of the GenBank protein sequence database (Sept 2019), using the eight main motif regions of the polyprotein of PVY (NC_001616), and excluding matches with sequences from the *Potyviridae*, found only significant matches between the "DEAD helicase-helicase C" region of the CI protein and that of classical swine fever and hog cholera pestiviruses (chance probability, 1e-12\_-16; 30% identity, 13% indels), and no others. Likewise, there were significant similarities between the PVY RdRp region and that of astroviruses (see below). Structural studies have only been reported for the CP protein of one potyvirus, watermelon mosaic virus (WMV), and reveal a structure that is closely similar to those of other viruses with flexuous filamentous virions, including two potexviruses, and also the enveloped flexuous nucleoproteins of orthomyxoviruses and bunyavirids, which include tomato spotted wilt tospovirus \[[@B19-viruses-12-00132],[@B20-viruses-12-00132],[@B21-viruses-12-00132]\]; all these CPs have a core domain rich in alpha helices. Each CP subunit interacts with five nucleotides (nts), and has 8.8 subunits per turn in a left-handed helix, with a pitch of 34.5--35 Å. Its N-terminus is external to the virion, and its C-terminus internal. The terminal regions interact with adjacent subunits and provide flexibility to the virion. In serological studies, the N-terminus is dominant and, in potyviruses, is also involved with aphid interactions \[[@B22-viruses-12-00132],[@B23-viruses-12-00132]\]. The sequences of their RNA-dependent RNA polymerases (RdRps) place the potyvirids in the "Picornavirus Supergroup" ([Figure 1](#viruses-12-00132-f001){ref-type="fig"}) \[[@B19-viruses-12-00132],[@B24-viruses-12-00132]\], where the potyvirids are outsiders, as most of the others have icosahedral virions made of eight-stranded antiparallel beta-barrel proteins, the so-called 'jelly roll' proteins. In the Wolf et al. \[[@B24-viruses-12-00132]\] taxonomy of RdRps ([Figure 2](#viruses-12-00132-f002){ref-type="fig"}), the potyvirid RdRps form a cluster that is sister to an RdRp found in a metagenome, bufivirus UC1-gp2, isolated from "wastewater" collected in San Francisco. The sister clade to the potyvirid/bufivirus clade of RdRps are mostly those of the astroviruses, a group of gut-infecting viruses that are found in a wide range of animals, mostly mammals or birds. They have 28--35 nm diameter isometric virions (<https://en.wikipedia.org/wiki/Astrovirus> (accessed July 2019)). Sister to the RdRp clade of potyviruses/bufivirus/astroviruses are the RdRps of hypoviruses, amalgaviruses, partitiviruses, and picobirnaviruses, many of them metagenomes, including one from *Phytophthora infestans* \[[@B25-viruses-12-00132]\] and two from leeches \[[@B26-viruses-12-00132]\]. None of the motifs identified in potyvirus proteins, other than the RdRp, match those encoded by astroviruses; the nonstructural protein of a human astrovirus (NP_059443) was found to have the RdRp motif, but, in addition, only a trypsin-like peptidase, a restriction enzyme, and a motif of unknown function. The bufivirus metagenome includes a 3′ terminal S domain (jelly-roll) capsid protein gene indicating that it, like most of the picornavirus supergroup, including astroviruses, probably has isometric virions. Most of the genome of all potyvirids encodes a single polyprotein, which is post-translationally hydrolyzed into ten proteins \[[@B15-viruses-12-00132],[@B27-viruses-12-00132]\]. It also encodes another protein (P3N-PIPO) in the −1 reading frame, and a second (P1N-PISPO) in a few potyvirids \[[@B28-viruses-12-00132]\]. From the N-terminus to the C-terminus, the ten potyvirus proteins are named as follows: P1-Pro, HC-Pro, P3, 6K1, CI, 6K2, NIa-Pro, Nib, and CP. The P1-Pro protein is a serine protease (S30) that self-hydrolyses its own C-terminal cleavage site. Next is the HC-Pro protein, which is a cysteine protease (C6) that also hydrolyses its own C-terminal cleavage site. The other eight proteins have seven cleavage sites hydrolyzed by NIa-Pro, the cysteine protease (C4), encoded by the eighth region. The eight largest motifs were found in all potyvirus sequences by using the motif-matching facility Pfam, in all three rymoviruses (agropyrum mosaic, ryegrass mosaic, and hordeum mosaic viruses), and in the two most closely related potyvirids, namely reed chlorotic stripe virus and blackberry virus Y. The genomes of bymoviruses and macluraviruses have smaller sets of the enzyme motifs as some of their N-terminal motifs are missing; Pfam (<https://pfam.xfam.org/> (accessed July 2019)) found only the C-terminal four motifs of the polyprotein in the complete polyproteins of barley yellow mosaic bymovirus, cardamom mosaic macluravirus, sweet potato mild mottle ipomovirus, and wheat streak mosaic poaceaevirus. A Pfam analysis of celery latent celavirus (CLV) found only the helicase C and RdRp genes found in other potyvirids. Thus, the RdRp or the helicase proteins are probably most appropriate for inferring the phylogeny of the potyvirids. The phylogeny of RdRp genes of all named potyvirids shows that they form at least eleven genera, of which by far the largest is the potyviruses ([Figure 2](#viruses-12-00132-f002){ref-type="fig"}). The RdRp of CLV \[[@B32-viruses-12-00132],[@B33-viruses-12-00132],[@B34-viruses-12-00132]\] is the sister of the RdRps of all other potyvirids, but those of the bymoviruses and macluraviruses are closest to that of bufivirus UC1 and the astroviruses as they are on the shortest branches. The virions and genome of CLV have all the features of a potyvirid, not a bufivirus. Its virions are flexuous filaments around 900 nm in length and contain a single genome of 11,519 nts \[[@B34-viruses-12-00132]\]. This confirms that their structure is likely to be closely similar to those of WMV as, using the known parameters of WMV virions, the 11,519 nts of the CLV genome will assemble with 2.304 CP subunits and form a helix 903--916 nm long \[[@B20-viruses-12-00132]\]. The similarities and differences between CLV and other potyvirids may indicate the properties of their shared ancestor. CLV was first reported from Europe. It is sap-transmitted to several dicotyledonous plants (dicots) from several different families, but there is no record of tests of monocotyledonous plants (monocots) as hosts, and like many potyvirids, it is readily seed-borne in two plant species. CLV was not transmitted by five species of aphids. Its genome has one major open reading frame (ORF), and a minor overlapping ORF, P3N-PIPO, in the -1 frame. It has some, but not all, of the motifs found in potyvirids, but not those associated with aphid-transmission in potyvirus genomes. CLV's one unique feature is a signal peptide at the 5′ terminus of its genome. In summary, although the potyviruses and astroviruses share an RdRp ancestor \[[@B24-viruses-12-00132]\], none of their other genes are related, and no more potyvirus-like or astrovirus-like intermediate ancestors are known at present. Similar conclusions can be drawn about their shared helicase and CP genes. Nothing is known at present of the origins of the other potyvirus proteins, although their diversity and likely relationships suggest that they, and especially the P1 protein, have helped generate the extraordinary diversity of the potyvirids \[[@B35-viruses-12-00132]\]. Those unique to potyviruses may have arisen de novo, or by overprinting \[[@B36-viruses-12-00132],[@B37-viruses-12-00132],[@B38-viruses-12-00132]\], or may have come from other organisms of which the genes have not been sequenced yet. The only safe conclusion is that the potyvirids are polyphyletic in origin. 3. The Potyvirus: Rymovirus Divergence {#sec3-viruses-12-00132} ====================================== The potyviruses and rymoviruses are sister taxa ([Figure 2](#viruses-12-00132-f002){ref-type="fig"}); they diverged from a common potyvirid ancestor that, judging from their phylogenetic distances, probably had blackberry virus Y and reed chlorotic stripe virus as successive sister viruses, although the genomic sequences of both of these viruses differ significantly from those of rymoviruses and potyviruses. Although most of the differences in the genomic sequences of potyviruses and rymoviruses, or the proteins they encode, are small, they are responsible for their phenotypic differences, including their transmission by different vector types, aphids and mites. Govier and Kassanis \[[@B39-viruses-12-00132],[@B40-viruses-12-00132]\] first reported that, for transmission by aphids, potyviruses required virions and a "helper component" present in infected plants. This was shown to be the protein now called HC-Pro, which was subsequently found to have several additional functions (reviewed by \[[@B15-viruses-12-00132]\]), including the ability to suppress RNA silencing. Potyvirus proteins have at least three motifs associated with aphid transmission \[[@B15-viruses-12-00132],[@B41-viruses-12-00132]\] including the DAG- motif at the N-terminus of the CP, and the -KITC- and -PTK- motifs of the HC-Pro protein; although the first two of these are not found in the homologous sites of rymovirus polyproteins, the last is. When the HC-Pro gene of mite-transmitted wheat streak mosaic tritimovirus (WSMV) was replaced by that of aphid-transmitted turnip mosaic potyvirus (TuMV), it was no longer transmitted by its mite vector \[[@B42-viruses-12-00132]\], but there is no report of similar experiments with rymoviruses or potyviruses. Gibbs and Ohshima \[[@B43-viruses-12-00132]\] suggested that the divergence giving rise to the proto-potyvirus and proto-rymovirus is likely to have occurred in an infected Eurasian monocot. This conclusion was based on the fact that the primary hosts (i.e., the host from which they were first isolated) of all three rymoviruses are all Eurasian monocots; *Agropyron* (Eurasian; <https://en.wikipedia.org/wiki/Agropyron> (accessed 30 October 2019)), *Hordeum* (Eurasian, African, Americas; <https://en.wikipedia.org/wiki/Hordeum> (accessed 1 December 2019)), and *Lolium* (Europe, Asia, N. Africa; <https://en.wikipedia.org/wiki/Lolium> (accessed 18 December 2019)), and many of the basal potyviruses are too ([Figure 3](#viruses-12-00132-f003){ref-type="fig"}a,b). The list of potyvirus hosts closest to the rymoviruses depends on whether ORF or polyprotein sequences are used for estimating their patristic distances from the rymoviruses, but 16 of the nearest 20 are shared. Of these, 11 are from Eurasian plants (seven monocots and four dicots), and single hosts are from the Americas, Australia, Madagascar, and South Africa, and one is cosmopolitan. The possible dates of that divergence and of some of these invasions of other continents are discussed below. 4. Potyvirus Diversity {#sec4-viruses-12-00132} ====================== 4.1. Phylogenetics {#sec4dot1-viruses-12-00132} ------------------ The evolution of potyviruses has been studied by using the two strategies widely used for investigating evolutionary rates and processes. Firstly, phylogenetics \[[@B44-viruses-12-00132]\], which is based on the premise that organisms evolve by mutation and selection, so that the resulting successive divergences can be represented as a tree \[[@B45-viruses-12-00132]\], and revealed computationally and quantified by comparing their properties, especially, nowadays, those of their gene sequences and the proteins they encode. Secondly, methods of population genetics can be used (see below in [Section 4.2](#sec4dot2-viruses-12-00132){ref-type="sec"}). The ML phylogeny ([Figure 3](#viruses-12-00132-f003){ref-type="fig"}a,b) shows that most, but not all, of the lineages proposed in earlier published phylogenies (e.g., Gibbs and Ohshima \[[@B43-viruses-12-00132]\]), are confirmed. The relationships between the different potyviruses in the phylogeny are also closely similar to those in a published neighbor joining (NJ) tree phylogeny \[[@B13-viruses-12-00132]\], despite differing in relative branch lengths. Several of the virus lineages in the ML phylogeny are evident because they are subtended by long branches (Lineages 4, 5, 7, and 9); ML trees often define clusters more clearly than NJ trees, as their basal branches are relatively longer than their tip branches. Their long branches represent periods of the past that have only one known survivor, namely the lineage progenitors. Some lineages are additionally defined by the relationships of their primary hosts, namely the hosts from which they were first isolated, when the hosts are grouped at the "Order" level of the angiosperms (<https://en.wikipedia.org/wiki/APG_IV_system> (accessed 16 September 2019). Most viruses of Lineages 1 and 9 were first isolated from lilioids, most of Lineage 2 from commelinids, Lineage 4 and 7 from rosids, and Lineage 5 and 8 from asterids, whereas the hosts of some large lineages were from two plant clades, such as Lineage 3 which was from monocots (both alismatid and lilioid) or rosids, but rarely asterids, and Lineage 6, which was from a mixture of lilioids or asterids, but not rosids. These specificities are interesting as early attempts "to find some logic in the confusing issues of experimental host ranges of plant viruses" \[[@B46-viruses-12-00132]\] were not resolved by more data of the experimental hosts \[[@B47-viruses-12-00132],[@B48-viruses-12-00132],[@B49-viruses-12-00132]\]. However, the potyvirus lineages of primary hosts shown in [Figure 2](#viruses-12-00132-f002){ref-type="fig"} and [Figure 3](#viruses-12-00132-f003){ref-type="fig"}a,b, and the even more exact correlations shown by the tobamoviruses and their primary hosts \[[@B50-viruses-12-00132]\], indicate that there are phylogenetically influenced components of both virus and host that control their biochemical compatibility. It might be that the greater molecular repertoire of monocots, asterids, and rosids, which have resulted from repeated genome duplication \[[@B51-viruses-12-00132]\], allow viruses to form functioning relationships with them. It is noteworthy that few potyviruses have been reported from caryophyllids and very few from basal angiosperms, such as the ranunculids, although hibbertia virus Y is from a Gunnerid, and catharanthus mosaic virus was isolated from *Welwitschia mirabilis* (a gymnosperm; \[[@B52-viruses-12-00132]\]). Two poty-like metagenomes have recently been reported from unexpected hosts (snails and a "dipteran mix") and are discussed below. Overall, the primary 'host preferences' of potyviruses among green plants is strikingly similar to the host preferences of their principal vectors, which are heteroecious aphids, that alternate between woody and herbaceous hosts, which are mostly rosids, asterids, and commelinids (grasses), but not caryophyllids \[[@B53-viruses-12-00132]\]. Genetic recombination is common in potyvirus populations \[[@B54-viruses-12-00132]\] and in potyvirus experiments \[[@B55-viruses-12-00132]\]. The populations of four potyviruses discussed in [Section 4.2](#sec4dot2-viruses-12-00132){ref-type="sec"} below, had 35% to 64% recombinants, and most reports conclude that recombination is an important factor driving the evolution of potyvirus populations \[[@B56-viruses-12-00132]\]. However, there have been few reports that potyvirus species are recombinants involving other described viruses. Therefore, RDP version 4.95 was used to analyze the 152 ORF sequences used for [Figure 3](#viruses-12-00132-f003){ref-type="fig"}, but only five recombinants were found. Hubei poty-like virus (Lineage 2; NC_032912) was the recombinant with greatest statistical support, but is probably an in silico contaminant, which will be discussed below (see Metagenomes, [Section 6.10](#sec6dot10-viruses-12-00132){ref-type="sec"}). The analysis confirmed that WMV (Lineage 3; NC_006262) is a recombinant with soybean mosaic virus (SbMV; NC_002634; Lineage 3) as a major parent with a minor 5′-terminal region closest to bean common mosaic virus (BCMV; NC_003397; nts 1-c.770), as previously reported by Desbiez and Lecoq \[[@B57-viruses-12-00132]\], and that Sudan watermelon mosaic virus (Lineage 4; NC035459) is also a recombinant with parents from Lineage 4, namely zucchini shoestring virus (NC_043172) and a minor 5′-terminal region close to wild melon vein banding virus (NC_035458; nts 1-c.550), as reported by Desbiez et al. \[[@B58-viruses-12-00132]\]. Two other recombinants are novel but less certain. The ORF of calla lily latent virus (CLLV; EF105298) is mostly related to that of SbMV, but has a 5′-terminal region distantly related (74.9% ID) to that of konjac mosaic virus (KMV; NC_007913; nts 1-c.570), and likewise most of the ORF of vanilla mosaic virus (VMV) is related to that of BCMV but it has a 5′-terminal region (nts 1-c.665) that is also distantly related (61.8% ID) to that of KMV; these links were not resolved by direct nBLAST searches. These results indicate that, at most, only four of the 152 distinct potyviruses, we compared, were generated by recombination. The ORF phylogeny in [Figure 3](#viruses-12-00132-f003){ref-type="fig"}a,b is closely similar to a ML tree of the polyprotein sequences encoded by the ORFs, although a graph comparing their patristic distances ([Figure 4](#viruses-12-00132-f004){ref-type="fig"}) shows that there are differences of up to 15% in individual branch lengths. The patristic distances graph ([Figure 4](#viruses-12-00132-f004){ref-type="fig"}) also shows that the relationship between the ORF and polyprotein patristic distances is broadly linear except at the smallest axial values. This is perhaps evidence of mutational saturation, but not translational saturation; the rate changes may reflect the time-dependent bias in rate estimates of nt sequence change \[[@B59-viruses-12-00132],[@B60-viruses-12-00132]\]. 4.2. Population Genetics {#sec4dot2-viruses-12-00132} ------------------------ As mentioned above in [Section 4.1](#sec4dot1-viruses-12-00132){ref-type="sec"}, the evolution of populations of organisms can be studied not only by phylogenetics, but also by using the methods of population genetics (popgen) \[[@B61-viruses-12-00132],[@B62-viruses-12-00132],[@B63-viruses-12-00132]\]. These describe features of gene populations, using mathematical models, and compare observed features with those likely to result from sequential random changes. Popgen analyses have been used to study potyvirus populations within plant populations (e.g., Achon \[[@B64-viruses-12-00132]\]; Li et al. \[[@B65-viruses-12-00132]\]; Wang et al. \[[@B66-viruses-12-00132]\]; Hajizadeh et al. \[[@B67-viruses-12-00132]\]) and, increasingly, virus populations within individual plants (e.g., Cuevas et al. \[[@B68-viruses-12-00132]\]; Domingo and Perales \[[@B69-viruses-12-00132]\]; Dunham et al. \[[@B70-viruses-12-00132]\]; Kutnjak et al. \[[@B71-viruses-12-00132]\]; Rousseau et al. \[[@B72-viruses-12-00132]\]; Seo et al. \[[@B73-viruses-12-00132]\]). Such studies have shown that the effective populations of potyviruses are all around 10,000 \[[@B74-viruses-12-00132]\], and the "The high potential for genetic variation in plant viruses need not necessarily result in high diversity of virus populations. There is evidence that negative selection results in virus-encoded proteins being not more variable than those of their hosts and vectors. Evidence suggests that small population diversity, and genetic stability, is the rule" \[[@B75-viruses-12-00132]\]. We have investigated whether popgen analyses of the genome sequences now available for five potyviruses with contrasting biologies can reveal features that correlate with their contrasting biological differences. Note that we use the terms phylogroups (PVYs), strains (PPVs), and groups (TuMV) somewhat interchangeably, as these are the terms used in quoted publications. The viruses we examined are as follows: ### 4.2.1. Potato Virus Y {#sec4dot2dot1-viruses-12-00132} PVY, which originated in South America \[[@B29-viruses-12-00132]\] from a lineage of potyviruses ([Figure 3](#viruses-12-00132-f003){ref-type="fig"}b; Lineage 5) found mostly in solanaceous weeds and crops, and asteroid species in the Americas \[[@B76-viruses-12-00132],[@B77-viruses-12-00132]\]. Potatoes (*Solanum tuberosum*) were domesticated in South America and first taken to Europe in the 16th century. They became a major international vegetatively propagated crop after the mid-19th century. PVY, which is mostly spread by locally migrating aphids and planting infected seed tubers, is now common in the potato crops of the world, where recombinant PVYs have become particularly damaging. ### 4.2.2. Turnip Mosaic Virus {#sec4dot2dot2-viruses-12-00132} TuMV, which is the only dicotyledon-infecting member of a lineage of potyviruses of lilioid monocotyledons ([Figure 3](#viruses-12-00132-f003){ref-type="fig"}b). It diverged about a millennium ago from a virus of European orchids, currently referred to as the OM TuMV outgroup \[[@B78-viruses-12-00132]\]. TuMV probably emerged to infect its crop and weed hosts during the development of agriculture in Eurasia in recent centuries. It is common in crops of several annual brassicas (canola, turnips, radish, etc.), that are grown from seed. It is also common in various perennial domesticated and weed *Brassicaceae* \[[@B79-viruses-12-00132]\]. TuMV has been reported as being seed-borne in some hosts \[[@B80-viruses-12-00132],[@B81-viruses-12-00132]\], but this has not been confirmed, and it is probably mostly spread by aphids migrating within and between populations of its perennial and annual hosts. ### 4.2.3. Plum Pox Virus {#sec4dot2dot3-viruses-12-00132} Plum pox virus (PPV), which is a potyvirus of long-lived woody domesticated and wild *Prunus* fruit trees and shrubs. Its host populations are therefore much smaller and longer lived than the host populations of PVY and TuMV. PPV is usually considered to be a single species ([Figure 3](#viruses-12-00132-f003){ref-type="fig"}b), even though it has seven distinct strains. Its center of emergence was probably Eurasia \[[@B31-viruses-12-00132]\]. It is spread by aphids within a wide range of wild and domesticated *Prunus* species and non-*Prunus* weeds. PPV is also graft transmitted, and most of its crop hosts have been propagated by grafting for the last three millennia. ### 4.2.4. Sweet Potato Potyviruses {#sec4dot2dot4-viruses-12-00132} The SwPVs, or sweet potato potyviruses ([Figure 3](#viruses-12-00132-f003){ref-type="fig"}b; Lineage 8), which have been isolated from sweet potato (*Ipomoea batatas*) crops in all continents, except Antarctica. The SwPVs are usually considered to be five species \[[@B28-viruses-12-00132]\], but as all have only been isolated from sweet potato, we included them as it is possible that they are a single diverse mega-species, and it is of interest to check whether or not population genetics methods agree. ### 4.2.5. Hardenbergia Mosaic Virus {#sec4dot2dot5-viruses-12-00132} Hardenbergia mosaic virus (HarMV) is a potyvirus found in the wild only in southwestern Australia where it is widespread in the perennial native legume *Hardenbergia comptoniana* \[[@B82-viruses-12-00132]\]. It is a member of the BCMV lineage ([Figure 3](#viruses-12-00132-f003){ref-type="fig"}a; Lineage 3), which mostly radiated in South-East Asia \[[@B83-viruses-12-00132]\], and may have been carried to Australia by Austronesian boat people. This lineage probably arrived in Australia long before Europeans arrived in 1788, colonized the continent, and subsequently developed large-scale agriculture. Thus, HarMV is a virus with smaller known host and vector populations than the other four potyviruses considered here. Its biology is discussed in more detail below. A summary of the results of the popgen analyses of the non-recombinant (n-rec) ORF sequences of these five viruses is shown in [Figure 5](#viruses-12-00132-f005){ref-type="fig"}, which includes an outline ML phylogeny of the ORF sequences of the five viruses, and parameters from a graph comparing their ORF and polyprotein patristic distances, comparable to [Figure 4](#viruses-12-00132-f004){ref-type="fig"}. The pairwise nt diversity for each virus (π) is, as expected, related to the maximum pairwise ORF patristic distance (max ORF-dist), and the horizontal width of the corresponding collapsed cluster in the tree. The ω values (dN/dS) for four of the viruses are in the range of 0.065 (PVY) to 0.086 (PPV) confirming that all are under strong negative selection; however, the value of 0.260 for the SwPVs indicate that these viruses are under less stringent negative selection and/or are not evolving as a single population, i.e., providing evidence that they are separate species \[[@B84-viruses-12-00132]\]. The slope (b) of the linear regression in a patristic graph comparing ORF and polyprotein trees ([Figure 4](#viruses-12-00132-f004){ref-type="fig"}) correlates with ω. The slope varied from 0.243 to 0.450 for the five individual viruses ([Figure 4](#viruses-12-00132-f004){ref-type="fig"}). The slope was even greater for between-virus comparisons, and, for the 152 potyviruses represented in [Figure 3](#viruses-12-00132-f003){ref-type="fig"}a,b, it increased from c. 0.6 at the smallest axis values to c. 1.3 ([Figure 4](#viruses-12-00132-f004){ref-type="fig"}). The popgen comparisons of the different phylogroups/groups/strains of PVY, TuMV, SwPVs, and HarMV isolates are given in [Tables S1 to S4](#app1-viruses-12-00132){ref-type="app"} and summarized in [Figure 6](#viruses-12-00132-f006){ref-type="fig"}. The data for PPV are from Hajizadeh et al. \[[@B31-viruses-12-00132]\]. All the groupings are monophyletic; the BRs group of TuMV is normally subdivided into a basal paraphyletic "basal-BR" group with a subgroup called "Asian-BR". It can be seen that around three-quarters of the groups are represented by 10 or more sequences. The diversity of each group (π) correlates with their collapsed cluster sizes with PPV groups having the smallest diversities and HarMV group/species having the largest. The ω ratio estimates for individual genes ([Figure 7](#viruses-12-00132-f007){ref-type="fig"}) are considered to assess the strength of selection against translational change in the encoded protein. These fall into three groups; the proteins encoded by the n-rec genomes that are most strongly selected (smallest ω) are the HC-Pro, CI, Nia, and NIb proteins (ω = 0.047--0.055), an intermediate group is of the P1, P3, VPg, and CP proteins (ω = 0.101--0.229), and PIPO is least conserved (ω = 0.526), whereas the rec genomes give ω values that are around 10% greater, and in the same groupings except that VPg is one of the most strongly conserved proteins. Comparisons of the popgen results for the five viruses are instructive. There are five major phylogroups in the world PVY population ([Figure 6](#viruses-12-00132-f006){ref-type="fig"}), three of them (O, C, and N) are mostly n-rec, and two populations, R1 and R2, are based on single and double OxN recombinants. Commonest isolates from most potato-growing areas, and the most frequently sequenced, are O, R1, and R2 isolates. ORF sequences of the C phylogroup, which mostly have been isolated from a range of non-potato solanaceous hosts, are much more diverse ([Table S1.1](#app1-viruses-12-00132){ref-type="app"}; π = 0.113) than those of the O and N phylogroups (π = 0.027 and 0.043), which were mostly isolated from potatoes, and this diversity is also shown in the number of segregating sites (S), mutations within segregating sites (η), and the average number of differences between sequences from the same populations (k). The ω ratios for the individual ORFs ([Table S1.1](#app1-viruses-12-00132){ref-type="app"}), and for each of their genes separately ([Table S1.4](#app1-viruses-12-00132){ref-type="app"}), are less than one, indicating that their genomes are under dominant negative (purifying) selection; those of the n-rec isolates under stronger selection than those of the rec isolates (average ω 0.147 compared with 0.208), and with the PIPO gene ([Figure 7](#viruses-12-00132-f007){ref-type="fig"}; yellow bars) under least selection. The phylogroups are genetically distinct and there is no evidence of gene flow between them ([Table S1.3](#app1-viruses-12-00132){ref-type="app"}; Ks, Z, Snn, and Fst tests), confirming that after the primary recombination events which established the R1 and R2 lineages there was no significant gene flow between them. The Tajima's D test ([Table S1.1](#app1-viruses-12-00132){ref-type="app"}) gave a significant negative value for the O, R1, and R2 populations, confirming that they had recently expanded after a population bottleneck, and this reflects the adoption of potatoes as a major international crop after the mid-19th century with the O phylogroup and R1 and R2 necrogenic recombinants, but not the N and C phylogroups, as major pathogens of it. The major expansion evident in the Tajima's D scores was confirmed in popgen analyses of most of the individual PVY proteins ([Table S1.4](#app1-viruses-12-00132){ref-type="app"}), especially the HC-Pro, P3, CI, and VPg proteins. The evidence of less-stringent negative selection of the recombinant isolates (R1 and R2 phylogroups) is shown mostly in their P1 and PIPO genes. TuMV, which is common in cultivated and weed brassicas worldwide, has four major groups: world-B, Iranian, BRs (basal-BR and Asian-BR), and basal-B. It also has the orchid outgroup found only in Europe, as mentioned above in [Section 4.2.2](#sec4dot2dot2-viruses-12-00132){ref-type="sec"}, TuMV-OM \[[@B78-viruses-12-00132]\], and although currently included with TuMV, this is clearly distinct according to its genetic differentiation coefficient ([Table S2.3](#app1-viruses-12-00132){ref-type="app"}; mean Fst 0.81; \[[@B83-viruses-12-00132],[@B84-viruses-12-00132]\]. It was therefore excluded from [Figure 6](#viruses-12-00132-f006){ref-type="fig"}. Most diverse, and basal to the brassicas infecting isolates of TuMV proper, are the basal-B and Iranian populations, and although Tajima's D test gave negative values with both the world-B and BRs (basal-BR and Asian-BR) groups, neither was statistically significant. The TuMV population is more genetically diverse than the PVY population ([Figure 5](#viruses-12-00132-f005){ref-type="fig"}), but all TuMV genes, especially PIPO, are under stronger negative selection than those of PVY ([Figure 7](#viruses-12-00132-f007){ref-type="fig"}). These clear popgen differences between the PVY and TuMV populations probably reflect biological differences that have affected translational selection; the PVY population has recently expanded its range rapidly, mostly by trade, and into monoculture crops, whereas the TuMV population has diverged as vector aphids have moved it between and within annual crops and perennial weeds, and this greater diversity of hosts may produce greater negative selection. The PPV population has a smaller mean nt diversity than the PVY and TuMV populations; π for PPV is 0.121 ([Figure 5](#viruses-12-00132-f005){ref-type="fig"}) and a mean of 0.020 for its strains ([Figure 6](#viruses-12-00132-f006){ref-type="fig"}), but it has similar ω values. These differences probably result from its smaller population living in a long-lived woody host and transmission by grafting. Four of its major strain populations (D, M, CR, and C) have negative Tajima's Ds, but only that of the D strain is statistically significant, and this is the strain that spread during the 20th century across Europe and from there to the Americas and East Asia, whereas the others are mostly confined to Eurasia, which is probably the "center of divergence" of PPV. The ω values for the genes of different PPV strains ([Figure 7](#viruses-12-00132-f007){ref-type="fig"}), especially those with larger sample sizes, are dominated by large values for PIPO, but it can be seen that the conserved genes of PPV (HC-Pro, CI, NIa, Nib, and CP) are, like those of PVY, less conserved than those of TuMV. The popgen results for the SwPVs indicate that they are a lineage of separate viruses found in a single host species, not a single megaspecies. The mean nt diversity ([Figure 5](#viruses-12-00132-f005){ref-type="fig"}) of the SwPVs (π = 0.258) is greater than that of the other four viruses (π = 0.064--0.139), and the diversities of its component species range from 0.020 to 0.057 ([Figure 6](#viruses-12-00132-f006){ref-type="fig"}). They are also distinguished as species by the genetic differentiation coefficient (Fst \> 0.872) \[[@B85-viruses-12-00132],[@B86-viruses-12-00132]\]. The n-rec sequences of four of the SwPV populations are found worldwide, but that of sweet potato latent virus (SPLV) is not (see below), and all gave negative results in the Tajima's D test, but only that of SPVG was statistically significant; SPLV was excluded from these analyses as only three ORF sequences of it were available. Of interest too, is that all the SwPVs have a PIPO gene, like other potyviruses, but, in addition, all, except SPLV, have a second overlapping gene, PISPO, and the ω values ([Table S3.4](#app1-viruses-12-00132){ref-type="app"}) indicate that the PISPO genes of sweet potato feathery mottle virus (SPFMV) and sweet potato virus G (SPVG) are under positive selection (ω = 1.162 and 1.336) as is also the PIPO gene of sweet potato virus C (SPVC) (ω = 1.253). The HarMV population was represented by a single population of 10 ORF sequences. It is the only 'wild plant' potyvirus which we examined. The results are remarkably similar to those of the other four viruses we checked. The HarMV sequences have a nt diversity (π) similar to that of TuMV and a ω value (0.078) similar to those of PVY and PPV but less than that of the SwPVs ([Figure 6](#viruses-12-00132-f006){ref-type="fig"}, [Figure 7](#viruses-12-00132-f007){ref-type="fig"} and [Table S4.1](#app1-viruses-12-00132){ref-type="app"}). The ω values for individual HarMV genes ([Figure 7](#viruses-12-00132-f007){ref-type="fig"}) have a pattern within those of the other viruses, and with no evidence from Tajima's D tests of a major recent population expansion. The HarMV population was more variable than that of Mediterranean ruda potyvirus (MeRV), which has a similar ecology \[[@B87-viruses-12-00132]\]. In summary, the results of the popgen analyses complement and confirm inferences obtained from phylogenetic analyses of the same ORF sequences (see above in [Section 4.1](#sec4dot1-viruses-12-00132){ref-type="sec"}). They also suggest that various popgen estimates, such as ω, Fst, and b, might be used as indicators of whether a population of similar viruses is one or more species. This could provide a more theory-based way of defining which viruses form natural potyvirus species, and hence could replace the present unsatisfactory method based on arbitrary maximum %ID values (\<76% nt identity and \<82% amino acid identity; \[[@B88-viruses-12-00132]\]). Estimates of various popgen parameters indicate that the SwPVs are probably separate species, as too are the brassica-infecting and orchid-infecting TuMVs. The possibility of using popgen parameters to define species was tested further by checking whether the fast-evolving isolates of the C phylogroup of PVY \[[@B29-viruses-12-00132]\] were a separate species. These 28 extra sequences were added and the popgen factors recalculated, but only marginally changed the popgen parameters, indicating that PVY is still a single species. Further tests were also made using the ORF sequences of 16 isolates of narcissus yellow stripe-like (NYSLV) viruses, which fall into five distinct clusters, although biologically indistinguishable. Ohshima et al. \[[@B89-viruses-12-00132]\] reported that it was uncertain whether the NYSLVs should be considered one species or more, as their ORF sequence diversity is at the %ID limit set by the ICTV for delineating potyvirus species. The ω values for the four largest clusters, each of three sequences, had a mean of 0.055 (range 0.054 - 0.058), but as the clusters were progressively clustered, as in their ML tree \[[@B89-viruses-12-00132]\] ([Figure 2](#viruses-12-00132-f002){ref-type="fig"}) the value of ω increased to 0.117 \> 0.129 \> 0.146 \> 0.154 and finally 0.157 with the addition of the ORF of wild onion symptomless virus. These comparisons suggest that the NYSLVs are five independently evolving viruses, and that a calculated ω value greater than 0.1 is a useful indication that a population of potyviruses consists of more than one species. 5. Potyviruses in Space and Time {#sec5-viruses-12-00132} ================================ Attempts to add the dimensions of time and space to phylogenies of organisms, especially viruses, are currently a very active area of research \[[@B9-viruses-12-00132]\]. Although virus genomes can be recovered from preserved plant specimens, the maximum age of such recoveries is only around 1000 years \[[@B90-viruses-12-00132]\]. However, it is also possible to determine the age of virus populations that are evolving at a measurable rate by comparing the gene sequences of isolates collected "heterochronously" over the longest possible time period and analyze them by using Bayesian Monte Carlo coalescent methods in the BEAST packages \[[@B91-viruses-12-00132]\], or by regression methods such as "Least Squares Dating" \[[@B92-viruses-12-00132]\]. Bayesian methods also now extend to assessing virus migration pathways, using SPREAD \[[@B93-viruses-12-00132]\], etc. These methods have been used for elegant analyses of the spread of maize streak mastrevirus \[[@B94-viruses-12-00132]\], tomato yellow leaf curl begomovirus \[[@B95-viruses-12-00132],[@B96-viruses-12-00132]\], and of rice yellow mottle sobemovirus \[[@B97-viruses-12-00132],[@B98-viruses-12-00132]\], all of which, importantly, corroborate their conclusions using historical records of the spread of the diseases they cause. Studies on migration pathways for potyviruses are limited to TuMV \[[@B99-viruses-12-00132],[@B100-viruses-12-00132]\]. Studies of timescales have been made with several potyviruses. CP genes were used in early estimates of the "time to most recent common ancestor" (TMRCA) of the zucchini yellow mosaic virus (ZYMV) population \[[@B101-viruses-12-00132]\], the papaya ringspot virus (PRSV) population \[[@B102-viruses-12-00132]\], and of the initial radiation of all potyviruses \[[@B103-viruses-12-00132]\]. These studies gave compatible dates of 408 years before present (YBP), 2250 YBP, and 6600 YBP, respectively. CP genes were also used to obtain a recent estimate \[[@B104-viruses-12-00132]\] of 129--169 YBP as the age of the present narcissus late season yellows virus population. However, most dating studies of potyviruses have been of PVY and TuMV populations ([Table 1](#viruses-12-00132-t001){ref-type="table"}) and are based on gene sequences varying from full length ORFs of more than 9000 nts to the VPg gene of only 564 nts \[[@B29-viruses-12-00132],[@B30-viruses-12-00132],[@B100-viruses-12-00132],[@B105-viruses-12-00132],[@B106-viruses-12-00132]\]. The results show an interesting and unexpected positive correlation between the length of the sequence and its estimated TMRCA ([Table 1](#viruses-12-00132-t001){ref-type="table"}); the longer the sequence analyzed, the older the apparent age of the common ancestor. External corroborative evidence for the PVY and TuMV dating studies is imprecise. TuMV studies \[[@B99-viruses-12-00132]\] estimated that the virus arrived in Australia and New Zealand from Europe, at dates that were consistent with records of its first appearance in those countries, and the timescale obtained from the complete ORFs of PVY \[[@B29-viruses-12-00132]\] dates major divergences of its two main lineages to the mid-19th century, and hence they coincide with a major European effort to breed potato late blight (*Phytophthora infestans*)-resistant potatoes and a significant increase in European potato cropping. The estimated TMRCA of the population of one potyvirus can be extrapolated to those of other potyviruses, if their gene sequences align, and the alignment is used to calculate and compare them in a single ML tree; Fuentes et al. \[[@B29-viruses-12-00132]\] in their [Figure 4](#viruses-12-00132-f004){ref-type="fig"} showed that dates obtained from a ML tree and a Bayesian maximum clade credibility tree are linearly related. This is the basis of the "sub-tree comparison" method first used by Mohammadi et al. \[[@B107-viruses-12-00132]\], who showed that the TMRCA of the known world beet mosaic virus (BtMV) population is compatible with a 19th-century emergence of BtMV from wild beet rather than an ancient infection of chard or leaf beet. It was also used to show that the TMRCA of PPV was probably around 820 (range 865--775) BCE \[[@B31-viruses-12-00132]\], which is compatible with the invention of fruit tree grafting at the beginning of the first millennium BCE \[[@B108-viruses-12-00132]\]. When aligned representative sequences of TuMV, PVY, PPV, and the basal groups of the potyvirus tree were used to calculate an ML tree ([Figure S1](#app1-viruses-12-00132){ref-type="app"}), the divergence of the potyviruses and rymoviruses was dated, using the TuMV TMRCA ([Table 1](#viruses-12-00132-t001){ref-type="table"}), as 14,206 YBP, and using the PVY TMRCA, as 30,192 YBP. The later date is interesting as it suggests a possible route by which the PVY lineage invaded the Americas (see below, [Section 6.5](#sec6dot5-viruses-12-00132){ref-type="sec"}). 6. Evolutionary Vignettes from Potyvirus Studies {#sec6-viruses-12-00132} ================================================ 6.1. Super-Adapters {#sec6dot1-viruses-12-00132} ------------------- The conclusion that the potyviruses originated in Eurasia only a few tens of thousands of years ago is important, as it helps define the conditions that have allowed potyviruses to migrate and become the important and speciose genus it is nowadays. The hallmark property of potyviruses seems to be their ability to infect and maintain populations in a wide range of plants and to switch hosts often, but be constrained to particular clades of eudicotyledons. The divergence of potyviruses has occurred during the period when humans and their activities have come, increasingly, to dominate the world, and the ability of potyviruses to exploit those conditions have allowed them to become numerous and often damaging. Although humans originated in Africa around 300,000 YBP, they did not migrate beyond Africa's immediate environs until c. 80,000 YBP, then migrating to Asia and Australia, and eventually the Americas. Trade is an ancient human activity (<https://en.wikipedia.org/wiki/Trade#Prehistory> (accessed Dec 6 2019)), and seed-borne pathogens, such as potyviruses, are likely to have been carried along the 'Spice Trade' routes of the Indian Ocean, the Silk Road of Central Asia for many centuries. However, arguably the most important factor contributing to the success of the potyviruses and geminiviruses has been worldwide marine trade, which started with the exploration of the Americas by Columbus in the 15th century and resulted in the major exchange of plants and animals between the Americas and other regions of the world known as the Columbian Exchange (<https://en.wikipedia.org/wiki/Columbian_exchange> (accessed 6 December 2019)). Most recently, travel and trade by air has become important in the worldwide movement of viruses and their hosts despite an increased awareness of the importance of quarantine. 6.2. Australian Potyviruses {#sec6dot2-viruses-12-00132} --------------------------- A large number of potyviruses have been found on the isolated continent of Australia, with many of them being found only there. They provide insights into the timing of potyvirus migration, as Australia was biologically isolated for many millions of years (<https://en.wikipedia.org/wiki/Wallace_Line> (accessed 16 December 2019)). Australia was first colonized by the Aborigines at least 40,000--65,000 years ago \[[@B109-viruses-12-00132]\] (<https://en.wikipedia.org/wiki/History_of_Indigenous_Australians> (accessed 10 December 2019)). It was linked to Papua New Guinea by a land bridge during the last Ice Age, forming the continent of Sahul, until this bridge was flooded 6500--8000 years ago \[[@B110-viruses-12-00132]\]. The Austronesian voyagers from Asia visited the north coast of Sahul during 3000--4000 YBP, but not until the 17th century did the Macassans collect trepang or bêche-de-mer and camp on the beaches of Northern Australia. Europeans explored the entire coastline of the continent around the same time and established permanent colonies in the 18th century. Regular trade between Australia and other parts of the world started about two centuries ago and has increased ever since. The spreading of potyviruses depends on the 'nonpersistent' transmission by migrating aphids, especially those of the dioecious *Aphidini*, which, although much more ancient \[[@B111-viruses-12-00132]\], have also been favored by the development of agriculture. Australia had, until recently, a very small population of potential aphid vectors of potyviruses (i.e., *Aphidoideae*), with no more than 20 endemic species; however, there are now around 200 other species of the 4700 mostly recorded in the temperate Holarctic regions of the world \[[@B112-viruses-12-00132],[@B113-viruses-12-00132],[@B114-viruses-12-00132],[@B115-viruses-12-00132]\]. Potyviruses constitute the largest virus group with representatives known from only Australia, with most being represented only by single partial nt sequences in GenBank. They fall cleanly into one or other of two groups. There are those commonly found in crops, and also found in crops in other regions of the world, and to which they are closely related. These potyviruses most probably entered Australia recently in trade. There is also a large number of potyviruses found in native or introduced weed species, but these are more distantly related to potyviruses from other regions of the world. Most of the latter are members of the BCMV group (Group 3, [Figure 3](#viruses-12-00132-f003){ref-type="fig"}a), whereas the recent migrants are from various groups. The Australian BCMV group potyviruses form two clusters. One consists of ceratobium virus Y (CerVY), dianella chlorotic mottle virus (DiCMV), euphorbia ringspot virus (ERV), glycine virus Y (GVY), kennedya virus Y (KVY), passiflora foetida virus Y (PfoVY), passiflora virus Y (PaVY), pleione virus Y (PleVY), pterostylis virus Y (PtVY), rhopalanthe virus Y (RhoVY) and sarcohilus virus Y (SarVY), and the other of clitoria chlorosis virus (ClCV), clitoria virus Y (CliVY), diuris virus Y (DiVY), eustrephus virus Y (EustVY), HarMV, hibbertia virus Y (HibVY), passiflora mosaic virus (PaMV), passionfruit woodiness virus (PWV), and siratro viruses 1 and 2 (Sir1VY and Sir2VY) \[[@B11-viruses-12-00132],[@B82-viruses-12-00132],[@B116-viruses-12-00132],[@B117-viruses-12-00132],[@B118-viruses-12-00132],[@B119-viruses-12-00132],[@B120-viruses-12-00132],[@B121-viruses-12-00132],[@B122-viruses-12-00132]\]. This suggests that there were two near-simultaneous incursions into Australia of viruses of the BCMV group, and the fact that PaVY is also found in New Guinea \[[@B120-viruses-12-00132]\] supports the suggestion \[[@B83-viruses-12-00132]\] that the early BCMV group viruses were brought from Asia to the north coast of Sahul by Austronesian speakers who were not only explorers but also colonizers; they traveled in outrigger canoes with various live domesticated plants and animals so that they could establish viable communities when they found habitable islands. Recent studies using high throughput sequencing of plants belonging to the Southwest Australian native flora detected three additional potyviruses of orchids: blue squill virus A (BSVA), donkey orchid virus A (DOVA), and caladenia virus A (CalVA) \[[@B123-viruses-12-00132],[@B124-viruses-12-00132],[@B125-viruses-12-00132]\]. BSVA group with HarMV and PWV within the BCMV potyvirus group \[[@B125-viruses-12-00132]\], whereas CalVA and DOVA do not \[[@B103-viruses-12-00132],[@B125-viruses-12-00132]\], and their date and mode of entry to Australia is unknown. 6.3. Papaya Ringspot Virus {#sec6dot3-viruses-12-00132} -------------------------- The spread of PRSV around the world is also an informative story. It was first recorded in Hawaii, by Jensen \[[@B126-viruses-12-00132]\], and has been reported since then from most of the world's tropical and subtropical regions. PRSV is a typical potyvirus, as it is transmitted non-persistently by several aphid species \[[@B127-viruses-12-00132]\], and also occasionally in seeds of papaya (*Carica papaya*) \[[@B128-viruses-12-00132]\] and *Robinia pseudoacacia* \[[@B129-viruses-12-00132]\]. In 1984, it was shown to be closely related to one of the potyviruses common in wild and cultivated cucurbit crops worldwide, and it was called watermelon mosaic virus 1 at that time \[[@B127-viruses-12-00132]\]. These viruses are now called the PRSV-P (papaya) and PRSV-W (watermelon) biotypes of a single species; PRSV-W infects cucurbits, but not papaya, whereas PRSV-P infects both papaya and cucurbits. Cucurbitaceous weeds are natural reservoirs of infection for crops of both PRSV biotypes \[[@B130-viruses-12-00132],[@B131-viruses-12-00132]\]. PRSV is closely related to several other viruses of cucurbits in the Middle East and Africa (Group 4, [Figure 3](#viruses-12-00132-f003){ref-type="fig"}a; \[[@B58-viruses-12-00132],[@B102-viruses-12-00132],[@B103-viruses-12-00132],[@B118-viruses-12-00132]\]), one of which is recorded to infect papaya in the Congo, causing serious disease including ringspots \[[@B132-viruses-12-00132]\]. PRSV probably arose in South Asia and spread from there to the remainder of the world, including the Americas \[[@B58-viruses-12-00132]\]. An isolated outbreak of papaya ringspot disease in Australia was particularly informative as phylogenetic studies of the CP gene sequences of PRSV from the outbreak \[[@B133-viruses-12-00132],[@B134-viruses-12-00132]\] grouped with sequences from the long established local PRSV-W population, rather than others from overseas. Thus, the local PRSV-W population was the likely source of the PRSV-P outbreak. Olarte-Casillo et al. \[[@B102-viruses-12-00132]\] questioned this conclusion when they used Mesquite 4.7 \[[@B135-viruses-12-00132]\] to make an "ancestral reconstruction" of the PRSV population, using all known CP sequences, and concluded that "ancestral state could be either of the two biotypes". Ancestral reconstruction assumes, however, that the data used are a representative sample of the world PRSV population, and c. 70% of the sequences they analyzed were of PRSV-P biotype, whereas surveys of 22 Pacific Islands \[[@B136-viruses-12-00132]\], where papaya and various cucurbits are commonly grown for food, found PRSV-W on 17 different islands, but PRSV-P on only four. More recently, Maina et al. \[[@B137-viruses-12-00132]\] found evidence that only one PRSV-W introduction, or multiple introductions of very similar isolates, has occurred to Australia since agriculture commenced following the arrival of European colonists. Thus, PRSV-W genomic sequences from the entire northern coastline of Australia most resembled those from Papua New Guinea (PNG), but differed from those from East Timor (ET) and elsewhere. It seems that the PRSV-W to PRSV-P conversion occurs very infrequently. It was suggested \[[@B138-viruses-12-00132]\] that this host shift is controlled by the VPg-NIa-NIb region of the genomes of experimentally constructed PRSV-W x PRSV-P recombinants. Comparisons showed that simultaneous changes in three amino acids in the NIa were most likely involved: an Ala (W) to Val (P), an Asp (W) to Lys (P), and a Val (W) to Ile (P), all involving one or more first or second codon position mutations, which is an unlikely event. 6.4. The Columbian Exchange {#sec6dot4-viruses-12-00132} --------------------------- It is clear that the host ranges and distribution of potyviruses have been greatly affected by the Columbian Exchange, mentioned above, in [Section 6.1](#sec6dot1-viruses-12-00132){ref-type="sec"}. For example, PRSV, as described above, in [Section 6.3](#sec6dot3-viruses-12-00132){ref-type="sec"}, is part of a lineage of Old World cucurbit viruses. It was reported by Olarte-Castillo et al. \[[@B102-viruses-12-00132]\] to have a TMRCA of 2250 (95%CI 9800-250) YBP, which is congruent with the report of Desbiez et al. \[[@B58-viruses-12-00132]\] that the TMRCA of the PRSV cluster is 3600 YBP. However, papaya is a native of tropical Southern Mexico and Central America and was confined to that area until about 1550 CE (470 YBP), when Spaniards carried seeds to the Philippines, and from there to Malacca, India, and to Naples in 1626 CE, so that now papaya is commonly grown in all tropical regions of the world \[[@B139-viruses-12-00132]\]. These facts indicate that PRSV-W is the pre-Columbian version of this virus of cucurbits, and, only recently, has papaya been spread around the world by mankind and, occasionally, where they have met "papaya ringspot disease" has been generated. There are several other examples of "new encounter" potyvirus diseases involving a crop species from one region of the world that has been taken for the first time by mankind into the territory of a potyvirus, resulting in disease, often severe \[[@B140-viruses-12-00132]\]. Sweet potato, for example, was domesticated in Central America \[[@B141-viruses-12-00132]\]. It probably spread by natural means to Oceania, where it was found and exploited by the Austronesian explorers \[[@B141-viruses-12-00132]\]. Iberian galleons took sweet potatoes and other New World crops first to the Philippines and then to China and Okinawa by the early 17th century, and later to Korea. Sweet potato arrived in Europe across the Atlantic and was recorded in England in 1604 (<https://en.wikipedia.org/wiki/Sweet_potato> (accessed on 10 December 2019)). There is evidence that the five related potyviruses (Lineage 8, [Figure 3](#viruses-12-00132-f003){ref-type="fig"}b) found in sweet potato throughout the world may have originated outside the Americas, long before sweet potato encountered them. SPFMV, SPVC, SPVG, and sweet potato virus 2 (SPV2) now have a worldwide distribution, judging from GenBank records, which reveal that the sequenced isolates came from Africa, the Americas, Asia, Europe, and Oceania (SPFMV, 34 countries/ 443 records; SPVC, 16/69; SPVG 19/150 and SPV2 9/22). By contrast, SPLV, which is the basal sister to the others, has 92 records, but only from China, South Korea, Taiwan, and Tibet, and all the most closely related viruses (PPV, hyacinth mosaic virus, and asparagus virus 1) are Asian or European, suggesting that the center of divergence of Group 8 is Asia, not the Americas. 6.5. The Major Lineages: BCMV and PVY {#sec6dot5-viruses-12-00132} ------------------------------------- The BCMV and PVY lineages are the largest in the potyvirus phylogeny ([Figure 3](#viruses-12-00132-f003){ref-type="fig"}a,b; Groups 3 and 5). Both are clearly delineated by long branches, indicating a period in their history that produced no other known survivors. The BCMV lineage mostly radiated in SE Asia and Australia \[[@B83-viruses-12-00132]\], and its primary hosts are mostly rosids and monocots, and viruses of the group have caused most damage in crop species that originated in other areas of the world: common beans (*Phaseolus vulgaris*) from central America, passion fruit (*Passiflora edulis*) from South America, cowpea (*Vigna unguiculata*) from central Africa, only soybean (*Soja max*) being from SE Asia. By contrast, most of the primary hosts of the PVY lineage are asterids, and Fribourg et al. \[[@B76-viruses-12-00132]\] noted that all but two of the 27 viruses of the PVY lineage were isolated in the Americas, 17 of them having never been found anywhere else. Thus, it is likely that the PVY lineage diversified in the Americas, although how and when it originally migrated there from the Old World are interesting questions. If the TMRCA of PVY in [Table 1](#viruses-12-00132-t001){ref-type="table"} is correct, then [Figure S1](#app1-viruses-12-00132){ref-type="app"}, a ML tree of 38 representative ORF sequences, indicates that the long basal branch of the lineage covered the period 15.4--18.8 thousand YBP. This is the period human progenitors of the Amerindians are most likely to have migrated to the Americas (<https://en.wikipedia.org/wiki/Settlement_of_the_Americas> (accessed 17 December 2019); <https://en.wikipedia.org/wiki/Indigenous_peoples_of_the_Americas> (accessed 23 Dec 2019)) from Beringia, which was, at that time, at the eastern end of the mammoth steppe biome. This biome stretched from Iberia, across the north of Eurasia to Beringia (<https://en.wikipedia.org/wiki/Mammoth_steppe> (accessed 11 December 2019)). Around 16 thousand YBP, ice retreated enough to open one, possibly two, routes from Beringia into the Americas \[[@B142-viruses-12-00132]\]. The mammoth steppe was sub-Arctic and dominated by willow shrubs, grasses, and herbs, including many *Artemisia* spp. \[[@B143-viruses-12-00132],[@B144-viruses-12-00132]\], which are asterids, like many primary hosts of the PVY lineage viruses. It seems that no one has surveyed the viruses of *Artemisia* yet, and to do so might be very instructive. 6.6. Genetic Connectivity {#sec6dot6-viruses-12-00132} ------------------------- This is a biosecurity term that refers to situations where genetically similar nt sequences occur among populations of the same virus obtained from infected plants growing in different countries \[[@B14-viruses-12-00132]\]. In studies with potyvirus isolates from infected crops in Northern Australia and nearby countries ET and PNG, genetic connectivity was demonstrated in three instances. These were between one location in Northern Australia and ET for ZYMV \[[@B145-viruses-12-00132]\], two locations in Northern Australia and ET for SPFMV \[[@B146-viruses-12-00132]\], and, as mentioned above in [Section 6.3](#sec6dot3-viruses-12-00132){ref-type="sec"}, locations spanning the entire region of Northern Australia and PNG for PRSV \[[@B137-viruses-12-00132]\]. Such findings indicate that important potyviruses of economically important crops are crossing the sea separating Northern Australia from nearby countries to the north. A possible explanation is that this connectivity has arisen through trade in either direction. Alternatively, it may have resulted from spread by viruliferous insect vectors blown across the sea by annual monsoonal wind currents. These findings emphasize the need for improved biosecurity measures to protect against potentially damaging international virus movements occurring by natural means in addition to those resulting from international trade in plant materials \[[@B137-viruses-12-00132],[@B145-viruses-12-00132],[@B146-viruses-12-00132]\]. 6.7. Seed Transmission {#sec6dot7-viruses-12-00132} ---------------------- Several of the most important crop potyviruses have been shown to be seed-borne \[[@B16-viruses-12-00132],[@B147-viruses-12-00132]\]; however, many other potyviruses have not. Regardless, there are many records of crop potyviruses being found that could only be logically explained by seed transmission; indeed, it is likely that potyviruses are more frequently seed-borne than published records suggest perhaps because inadequate numbers of seeds were tested \[[@B148-viruses-12-00132]\]. There are many examples of potyviruses being spread from one part of the world to another by the international seed trade \[[@B14-viruses-12-00132],[@B16-viruses-12-00132]\]. Moreover, sowing potyvirus-infected seeds results in multiple infection foci consisting of infected seedlings scattered at random throughout crops. This constitutes a critical source from which aphid vectors can acquire a potyvirus and spread it throughout a crop resulting in serious virus disease epidemics \[[@B149-viruses-12-00132],[@B150-viruses-12-00132],[@B151-viruses-12-00132]\]. 6.8. Potyvirus Emergence from Natural Ecosystems {#sec6dot8-viruses-12-00132} ------------------------------------------------ There is evidence of agriculture being practiced by Australia's aboriginal population well before the island continent was first colonized by Europeans in 1788. The crops they grew consisted of Australian native plants, such as wild yams and grasses grown for their storage roots and seeds, respectively \[[@B152-viruses-12-00132]\]. Interfaces between natural vegetation and introduced crop species only arose after 1788, and, in many parts of the continent, are much more recent than that. Such interfaces are therefore well suited to studies on potyvirus emergence from native vegetation to infect introduced crop plants and weeds, and vice versa \[[@B140-viruses-12-00132]\]. Two such studies documented the spread of HarMV from infected *H. comptoniana* plants to nearby plants of introduced lupin species \[[@B153-viruses-12-00132],[@B154-viruses-12-00132]\]. PWV may have spread from its indigenous Australian host *Passiflora aurantia* (golden passion flower) to cause widespread infection in recently introduced crop, forage and naturalized weed legumes and *Passiflora* spp., which originated in South and Central America, or East Asia \[[@B103-viruses-12-00132],[@B121-viruses-12-00132],[@B122-viruses-12-00132],[@B140-viruses-12-00132],[@B155-viruses-12-00132]\]. PaMV and PaVY have been found infecting the passionfruit crop and naturalized introduced weeds so presumably also spread to them from an as yet unknown native plant host. Similarly, the indigenous Australian potyviruses of *Clitoria* and siratro (*Macroptilium atropurpureum*) have so far only been isolated from naturalized introduced weeds but presumably spread from unknown native plant hosts to introduced species after European colonisation \[[@B82-viruses-12-00132],[@B118-viruses-12-00132],[@B155-viruses-12-00132]\]. CerMV, DiVY, EustVY, GVY, HibVY, KVY, PleVY, and PtVY, have so far only been found infecting native plant species \[[@B118-viruses-12-00132],[@B155-viruses-12-00132]\], whereas RhVY and SarVY have only been isolated from imported orchids \[[@B118-viruses-12-00132]\]. In situations where a stable mixed plant population infected with viruses has co-evolved with native wild plants over a significant period in a given world region, populations of its isolates collected over a limited geographic range are likely to be diverse (e.g., Spetz et al. \[[@B156-viruses-12-00132]\]). Isolates of the most studied Australian indigenous potyviruses, HarMV, PaVY and PWV, provide excellent examples of this phenomenon \[[@B82-viruses-12-00132],[@B122-viruses-12-00132]\]. The localized natural distribution of HarMV reflects that of its Australian principal native host plant *H. comptoniana*. PWV and PaVY occur most commonly in the warmer tropical and subtropical regions of the Australian continent, where, as described above in [Section 6.2](#sec6dot2-viruses-12-00132){ref-type="sec"}, they infect a range of hosts. When ClVY, HarMV, PaVY, and PWV were inoculated to Australian native plant species, some that became infected produced surprisingly severe systemic symptoms. This observation did not support the suggestion that indigenous viruses are likely to be harmless when they infect wild plants. Instead, it indicates that, when they encounter native plant species they are not adapted to, they will likely behave in the wild just like crop viruses behave when they infect new crops \[[@B157-viruses-12-00132]\]. 6.9. Historical Potyvirus Specimens {#sec6dot9-viruses-12-00132} ----------------------------------- Historical collections of plant viruses are proving extremely valuable in linking the pre- and post-sequencing eras of potyvirus research. This applies not only to providing sequence data for dating studies described above in [Section 5](#sec5-viruses-12-00132){ref-type="sec"}, as these require comparisons between the sequences of old and recent potyvirus isolates covering the largest possible timespan, but also in revealing whether potyviruses studied in the post-sequencing era are named correctly, and if new sequences from unpublished potyvirus isolates from historical collections can be linked with those of established viruses. Studies on historical isolates preserved since the 1970s and 1980s from the Andean region of South America and Europe provide examples. With PVY, a dating study without these historical isolates suggested the "time to most common ancestor" (TMRCA) of PVY was the 16th century \[[@B105-viruses-12-00132]\], whereas a similar study which included sequences from European isolates from the 1980s \[[@B158-viruses-12-00132]\] placed its TMRCA around 1000 CE \[[@B106-viruses-12-00132]\]. When new PVY isolates from the Andean potato domestication center were included in dating analyses, along with the 1980s European sequences, the TMRCA was estimated to be around 156 CE \[[@B29-viruses-12-00132]\]. This study concluded that, although PVY was first taken to Europe in the 16th century in potato tubers after the Spanish conquest of Peru, as mentioned above in [Section 5](#sec5-viruses-12-00132){ref-type="sec"}, most of the current PVY diversity developed in the mid-19th century, when additional potato breeding lines were imported to help develop potatoes resistant to the potato late blight pandemic then occurring. Historical samples were also valuable when the sequence of a historical arracacha virus Y (ArVY) isolate collected in Peru in 1976 was compared with other potyvirus sequences, as it had 79% nucleotide identity with a 2013 Brazilian isolate of the subsequently described arracacha mottle virus, showing the latter was actually ArVY \[[@B159-viruses-12-00132]\]. Similarly, when a potyvirus sequence obtained from a 33-year-old mashua (*Tropaeolum tuberosum*) sample was sequenced and compared with other potyvirus sequences, it was found to be a distinct potyvirus to which the name mashua virus Y (MasVY) was given; MasVY's relationships to three other potyviruses (Tropaeolum mosaic virus, Tropaeolum virus 1 and Tropaeolum virus 2), described previously from the same host, are unknown, as the genomes of these viruses are still not sequenced \[[@B160-viruses-12-00132]\]. Finally it is noteworthy that two isolates of a potyvirus collected from pepino (*Solanum muricatum*) in Peru in 1976, and kept in a historical collection thereafter, have been recently shown, along with five new Peruvian pepino potyvirus isolates, to be isolates of wild potato mosaic virus, a virus previously known only from the wild potato *Solanum chancayense* \[[@B76-viruses-12-00132],[@B161-viruses-12-00132]\]. 6.10. Metagenomes, A New Frontier? {#sec6dot10-viruses-12-00132} ---------------------------------- Recently, new methods of gene sequencing have permitted surveys of virus-like genes and genomes in environmental samples (soil, water, air, etc.) and in bulk cellular material (blended invertebrates, etc.). The resulting metagenomic sequences have greatly expanded the size of the known virosphere \[[@B24-viruses-12-00132],[@B162-viruses-12-00132]\]. Two metagenomes appeared in the genomic sequences downloaded from GenBank, using the search term "Potyviridae", and both were reported from China. One is of Wuhan poty-like virus 1 (KX884573), which groups with the macluraviruses ([Figure 2](#viruses-12-00132-f002){ref-type="fig"}). It was isolated from the blended remains of 12 Chinese land snails (*Mastigeulota kiangsinensis*), collected in Wuhan, and has 73% ID with 95% cover of the genome of broad-leaved dock virus A (NC_038560) from *Rumex obtusifolius* from New Zealand. It is more distantly related to yam chlorotic necrosis virus (MH341583) from *Dioscorea alata* from India. Thus, Wuhan poty-like virus is more likely to be a constituent of the snails' last supper than a virus infecting the snails. The other metagenomic potyvirid is Hubei poty-like virus 1 (NC_032912), which was obtained from a "dipteran mix" of insects collected around Hubei. It is a recombinant with a major parent (nts 1-7630, 98% ID; 84% of the sequence) closest to an unusual isolate of sugarcane mosaic virus from *Canna* sp., in China (KY548507), and a minor parent (nts 7631-9094) closest to an unusual isolate of bean yellow mosaic virus (DQ060521; 95% ID) also isolated from "naturally planted" Canna sp., in China. This again suggests a contaminant virus, not an infection of the dipterans in the source material. Thus, both potyvirus-like metagenomes are more likely to be from contaminating plant materials than from the tissue of the animals being tested. Furthermore, Hubei poty-like virus 1 is probably an in silico recombinant, as its likely recombination site is adjacent to the region encoding the -GNNSGQP- motif, which is a conserved potyvirid motif \[[@B11-viruses-12-00132],[@B12-viruses-12-00132]\], and both 'parents' detected by BLASTn had been isolated from Canna plants. 7. Conclusions {#sec7-viruses-12-00132} ============== The major value of the esoteric studies of potyviruses described in this review is to provide a coherent evolutionary framework in time and space within which it is possible to plan how best to minimize the damage done by potyviruses to plants valued by humankind. Such a framework also contributes to the understanding of how potyvirus infections interact with plant populations within managed and natural ecosystems. Moreover, knowledge of the relationships of each virus, especially a newly emerged one, can provide valuable predictions of its likely behavior by extrapolating the known properties of near relatives and adding a timescale to those inferences greatly enhances their value and likely accuracy. The story in our review started in 1931, with PVY, one of the first two described viruses of potato, but now, nine decades later, at least 49 more viruses of potato have been recorded \[[@B163-viruses-12-00132]\]. The group of viruses, of which PVY is the type, is now represented in GenBank by genomic sequences of more than 150 different potyviruses and a third as many other potyvirids. Their discovery represents a considerable international effort as an analysis of the 2610 'country' records ([Table S5](#app1-viruses-12-00132){ref-type="app"}) shows that they came from 82 different countries from all regions of the world. The pioneers of potyvirology, Redcliffe Salaman, Kenneth Smith, Fred Bawden, Basil Kassanis, et al. discovered the first of a fascinating lineage of viruses that has provided us and others with an enormous amount of interesting and valuable work with no sign that the lode will 'run out' anytime soon. Apart from the four authors, nobody else helped with this study. ###### Click here for additional data file. The following are available online at <https://www.mdpi.com/1999-4915/12/2/132/s1>. Tables S1--S4. Popgen results; Table S5 (XLS file); The 'country' records of 2610 potyvirid genome sequences; Figure S1. A ML phylogeny of 38 representative potyviruses making subtree comparisons of node dates. R.A.C.J. initiated the project; A.J.G., M.H., and K.O. analyzed the data; all authors contributed to writing the paper. All authors have read and agreed to the published version of the manuscript. In Japan, this work was supported by the Japan Society for the Promotion of Science Grant numbers 16K14862 and 18K05653. It received no external funding from Australia or Iran. The authors declare that they have no conflicts of interest. ![The phylogeny of the RdRps of selected potyvirids, and of the other most closely related viral RdRps (redrawn from \[[@B24-viruses-12-00132]\]).](viruses-12-00132-g001){#viruses-12-00132-f001} ![A maximum likelihood (ML) phylogeny of 166 potyvirids, calculated using the same methods as \[[@B29-viruses-12-00132],[@B30-viruses-12-00132],[@B31-viruses-12-00132]\], from the protein sequences encoded by the RdRp regions of all genomes with GenBank Reference Sequence Accession Codes (July 2019), together with any others that had unique names. The most closely related non-potyvirid, bufivirus UC1, is included as an outlier. Branch colors indicate the major angiosperm "Order" from which each virus was isolated (i.e., its "primary host"); eudicotyledon rosid (red), asterid (blue), or caryophyllid (yellow) and monocotyledon (green) alismatid "A", lilioid "L", or commelinid "C". The RdRps of potyviruses branching most closely to the rymoviruses are shown, and the phylogeny of the other 103 is collapsed. The nodes with a red disk have \>0.9 SH support.](viruses-12-00132-g002){#viruses-12-00132-f002} ###### An ML phylogeny of 149 potyvirus ORF sequences with three rymovirus ORFs as outgroup using the same methods as \[[@B29-viruses-12-00132],[@B30-viruses-12-00132],[@B31-viruses-12-00132]\]. The ORFs are from all 126 potyviruses represented in GenBank in mid-2019 by Reference Sequences, together with single representative sequences of all 23 other potyviruses in GenBank with unique names. Note that (**a**) shows the three rymoviruses and Lineages 1--4, whereas (**b**) shows Lineages 5--9. The "Order" of the primary host, namely the plant from which each was first isolated, and often given in the name of the virus, is shown by the branch color (and letter), eudicotyledonous rosid (red), asterid (blue), or caryophyllid (yellow) and monocotyledonous alismatid "A", lilioid "L", or commelinid "C". ![](viruses-12-00132-g003a) ![](viruses-12-00132-g003b) ![A graph comparing the patristic distances of the ML tree of ORFs in [Figure 3](#viruses-12-00132-f003){ref-type="fig"}a,b and the ML tree of the protein sequences encoded by these ORFs; 149 potyviruses and three rymoviruses are included.](viruses-12-00132-g004){#viruses-12-00132-f004} ![The ML phylogenetic tree (collapsed) of the non-recombinant (n-rec) ORFs of five potyvirus populations. The number of ORF sequences for each virus (N), their average pairwise nt diversity (π) and, for each, the ratio of nonsynonymous nt diversity to synonymous nt diversity ω (dN/dS); also the slope (b) of the linear regression in a graph comparing the pairwise patristic distances in ML trees of the ORF sequences (*y* axis) and encoded polyproteins (*x* axis), and the maximum patristic distance (max ORF-dist) in the patristic distance graph.](viruses-12-00132-g005){#viruses-12-00132-f005} ![The ML phylogenetic trees (collapsed) of the phylogroups/groups/strains of the non-recombinant (n-rec) ORFs of five potyviruses. The number of ORF sequences for each grouping (N), their average pairwise nt diversity (π), and, for each, the ratio of nonsynonymous nt diversity to synonymous nt diversity ω (dN/dS), and the statistical significance of Tajima's D coefficient for the group.](viruses-12-00132-g006){#viruses-12-00132-f006} ![A stacked column chart of the ω (dN/dS) values of the genes of populations of different potyvirus phylogroups/groups/strains. The N-terminal protein (P1) is at the base of each column.](viruses-12-00132-g007){#viruses-12-00132-f007} viruses-12-00132-t001_Table 1 ###### Timescale analyses of potato virus Y and turnip mosaic virus. -------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- Parameter PVY TuMV ------------------------------------------------------------ ------------------------------------------------- ----------------------------------------------------- --------------------------------------------- ---------------------------------------------- ---------------------------------------------- ---------------------------------------------- ---------------------------------------------- \[[@B105-viruses-12-00132]\] \[[@B29-viruses-12-00132]\] and this study \[[@B106-viruses-12-00132]\] \[[@B100-viruses-12-00132]\] Method BEAST 1.7.2 BEAST 1.8.2 BEAST 1.8.4 BEAST 1.8.2 Number of sequences; 28 162 177 106 329 369 369 Sequence length (nucleotides) 9723 8913 564 9432 927 873 855 Region Polyprotein Polyprotein VPg Polyprotein Partial HC-Pro Partial P3 Partial NIb Sampling date range 1982--2010 1943--2016 1983--2015 1968--2012 1968--2012 1968--2012 1968--2012 Best-fit substitution model GTR+I+G GTR+I+Γ~4~ HKY+G~4~ GTR+I+G GTR+I+G GTR+I+G GTR+I+G Best-fit clock model UCLD, UCED, SC UCLD UCLD UCED UCED UCED UCED Best-fit demographic model ND EG, BSP BSP CZ CZ CZ CZ TMRCA (95% CI)\ 161--619 (UCLD), 123--436 (UCED), 525--970 (SC) 1841 (1157--2622) (EG),\ 158 (71--269) 1201 (468--2150) 951 (326--1291) 758 (274--1548) 758 (274--1548) Year before present (YBP) 1879 (1192--2659) (BSP) TMRCA effective sample size ND 238 (EG), 261 (BSP) ND ND ND ND ND Substitution rate (nt/site/year) Unknown 9.30 × 10^−5^ (6.79 × 10^−5^--1.18 × 10^-4^) (EG),\ 5.6 × 10^−4^ (3.35 × 10^−4^--8.17 × 10^-4^) 8.89 × 10^−4^ (6.87 × 10^−4^--1.30 × 10^−3^) 1.41 × 10^−3^ (1.09 × 10^−3^--1.78 × 10^−3^) 1.46 × 10^−3^ (1.25 × 10^−3^--1.87 × 10^−3^) 1.37 × 10^−3^ (1.04 × 10^−3^--1.73 × 10^−3^) 9.16 × 10^−5^ (6.90 × 10^−5^--1.15 × 10^−4^) (BSP) Substitution rates effective sample size ND \>200 \>200 ND ND ND ND Date (DRT) or cluster-based date (CDRT) randomization test Not passed DRT passed CDRT passed DRT passed DRT passed DRT passed DRT passed -------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- Best-fit clock model: uncorrelated relaxed lognormal distribution, UCLD; uncorrelated relaxed exponential distribution, UCED; strict clock, SC; expansion growth, EG; Bayesian skyline plot, BSP; constant size, CZ; exponential population growth, EPG. YBP, see sampling date range; ND, not done.
{ "pile_set_name": "PubMed Central" }
A nuclear overhauser study of heme orientational isomerism in monomeric Chironomus hemoglobins. The nuclear Overhauser effect (NOE) was used to investigate heme orientation and to obtain assignments for all resolved resonances in the 1H-NMR spectrum of met-cyano Chironomus thummi thummi monomeric hemoglobins III and IV (Hb III and Hb IV). The only non-heme resolved resonance was found to be from Phe-38 (CD1), and NOE dipolar connectivity between this resonance and the heme 5- and 8-methyls was used to establish the absolute orientation of the heme for each heme-insertion isomer present. The assignments of resonances and heme disorder permitted structural comparisons between the various components, including those due to a point mutation in Hb III. Finally, the characteristic differences of NOE patterns to amino-acid protons from substituents on heme pyrroles I and II formed the basis for assigning resonances and heme orientation relative to native Hb IV for deuterohemin-reconstituted Hb IV, for which there are no X-ray data available.
{ "pile_set_name": "PubMed Abstracts" }
Piggy-backing on the ongoing Apple Maps drama, The New York Times gives us a couple interesting tidbits that help explain the origins of Google Maps on the iPhone. For starters, Apple never intended to put maps on the iPhone. It was a decision late CEO Steve Jobs made last minute, one that would cost Apple its reputation five years later as Apple rushed its own solution out of the door too early. In a way, the report notes, Apple Maps continue on a string of Internet services missteps, with notable examples of the recently axed Ping social network for music, Siri, a controversial digital assistant, the MobileMe suite of web tools and recent iCloud outages. These blunders expose Apple as a hardware and design-focused culture, which is more often than not a difficult match for online services on a world scale, where Google rules the landscape by a wide margin… Nick Wingfield and Brian Chen filed this report with The New York Times, based on interviews with former Apple engineers: Including a maps app on the first iPhone was not even part of the company’s original plan as the phone’s unveiling approached in January 2007. Just weeks before the event, Mr. Jobs ordered a mapping app to show off the capabilities of the touch-screen device. Remarkably, just two engineers managed to scrap together an app for Steve Jobs keynote in three weeks and Apple “hastily cut a deal with Google to use its map data”. It began to bother executives how much data about the behavior of iPhone users was flowing back to Google, which could see the coordinates of every iPhone user who downloaded a map, the former executive said. This was all happening at a time when Apple and Google were buddies, with then Google CEO Eric Schmidt having a seat on Apple’s board of directors – even though at that point Google was working on its own mobile operating system, which it had acquired two years earlier, in 2005, in the form of Android, Inc. a Palo Alto startup headed by Andy Rubin, the founder of Danger and now Senior Vice President of Mobile and Digital Content at Google. The contention erupted in 2008 as Android began introducing iPhone-like features: That year, Mr. Jobs drove to Google’s headquarters and got into a screaming match with Google’s founders, Larry Page and Sergey Brin, and the head of its Android development team, Andy Rubin, as he tried to discourage them from copying the iPhone, according to an account of the meeting in Walter Isaacson’s biography of Mr. Jobs. Rubin to this date continues to oversee development of Android. It would take Apple some time to realize what was happening and force Schmidt to resign from the Board “due to potential conflicts of interest”. This corner Apple has painted itself into with Maps today may never have happened if Jobs hadn’t misplaced his trust in Schmidt. Here’s Steve Jobs placing a prank call to Starbucks via Google Maps at the iPhone keynote in January 2007. The report goes on to assert that “Google was blindsided” by the Apple Maps introduction at WWDC 2012, despite numerous reports and Apple’s acquisitions of mapping startups Placebase, Poly9 and C3 Technologies. A former Apple executive told the paper that Apple was caught off guard by Mapgate: “They’re embarrassed by it,” he said. Many of the problems are a result of merging map data, some of it flawed, from many sources. Another source sums it up nicely: “I always felt if you had to name an Achilles’ heel at Apple, it’s Internet services,” said Andrew Borovsky, a former Apple product designer who worked on MobileMe and now runs his own design firm in New York. “It’s clearly an issue.” Maps is an important part of iOS 6, but it’s not the most important part. Would the iPhone stop working without Maps? No, it would be just fine. Apple is not going to fail because of a mapping application — they will take their lumps and deliver a better app in the future. Related Topics You do realize that at some point people want to read different articles than Apple Maps right? Talk about overkill. Mercy. CollegiateLad Yeah, it’s serious overkill… Why not produce an iPhone 5 availability tracker list for consumers who want an iPhone 5, but can’t locate one? That’s something readers will find very useful. I’ve been searching all over the place for my wife one and everyone seems to be out of stock. MagicDrumSticks Lamborghini mercy Dan they have nothing else better to talk about, iphonemapsblog? CollegiateLad They may not have been an Internet services company in the past, but they’ve got it together now. iCloud is awesome and iTunes Match is brilliant. And I think Maps will be the best mapping service in the “near” future. I think this bad press is a blessing in disguise. Apple may not like it now, but in five years they will be better because of it. http://www.facebook.com/mattthegoodwin Matt Goodwin icloud is not awesome. the web interface is awful. main reason i had to switch to gmail. i was an apple employee for 2 years and i tried to like the web interface of mobile me/icloud but its just style over function. CollegiateLad Works great… All my devices are in sync: Mac, iPad, and iPhone. Bought a new phone everything synced fast over LTE before I arrived home. Love it!!! Find my phone is awesome too. iWork is brilliant. Couldn’t be happier. http://twitter.com/Branhower Branhower I really don’t think the web interface is a huge breaker. iCloud is primarily designed to keep your digital life in sync, the web interface is just an afterthought. EpicFacepalm iCloud uses Amazon And Microsoft’s servers and none of them are running Mac OS… I unfortunately disagree CollegiateLad Apple uses its own data centers now. There’s a new mammoth one in NC. And there are several others being built around the world. Kurt Not going to happen http://www.facebook.com/j.terrymma Jeff Terry “Cost Apple its reputation”… Are you serious? Do you honestly believe that this whole over blown situation has caused Apple to ruin its reputation? Absolutely not, But it sure is making these Media sites, And journalist look really stupid. I Agree with the below post, Enough with the maps, We get it, You don’t like it, Now MOVE ON!!! Apple Maps is no where near as bad as you people are making it out to be. CollegiateLad I’m with Jeff on this one, maps work great for me too and in many respects I think it’s better. Kok Hean It works nicely here although Google Maps is more detailed. John Herthep I want ios 5 maps Chaos Slow news day huh? Kurt Why not write about Steve woz not agreeing with apple billion dollar win against Samsung. Much more interesting Chaos They did. http://www.itallnews.com iTAllNews.com Apple Map Fail Bakersfield This whole maps thing is bringing out all the idiots isn’t it. I’ve been using it a lot, I have had no issues at all, You nerds will always find something to fixate on. http://www.facebook.com/kelly.hewitt.731 Kelly Hewitt Why is everyone complaining about it. I’ve only found one noticeable downsight that is my town is in black and white. That’s probably because I’m rural. 3D is 10000000 times better than googles, googles doesn’t even render properly. http://twitter.com/digitalfeind Dani Hayes You know, the maps on ios was going to be a problem no matter what. If it stayed with google maps people would complain that it has no turn by turn navigation. http://twitter.com/purpledodi Jens Tinnerholm Apple will be fine http://www.facebook.com/razick.rilshad Razick Rilshad Apple maps is not working in our country (srilanka) enybody knows why?
{ "pile_set_name": "Pile-CC" }
O'Leary, Pasborg & Friis-Nielsen - Støj Mark Corroto, AllAboutJazz In the aptly named Guerilla Series, for Ayler Records, this trio does, indeed, fight a "little war," recording this limited release (400 copies) as a hit-and-run ambush of destruction and noise. Støj is quite surprising for O'Leary, whose previous outings found him detailing more muted sounds with the likes of Supersilent on St. Fin Barre's (Leo, 2009), Tomasz Stanko on Levitation (Leo, 2005), and Cuong Vu on Waiting (Leo, 2007). Here, the Irish guitarist teams with the Scandinavian duo of Stefan Pasborg and Peter Friis-Nielsen, a tipoff that this album will comprise sabotage and surprise. Drummer Pasborg (the leader of the Odessa 5 and Ibrahim Electric) and bassist Friis-Nielsen, have been heard on several hardcore Peter Brötzmann sessions, including Medicina (Atavistic, 2004) and Live At Neferiti (Ayler, 1999). The route chosen here is fast and loud. The album opens with the befitting brief track, "First Tune." O'Leary fires off swift, crisp notes over Pasborg's feverish drumming and Friis-Nielsen's thunderous bass. The trio plays with a cathartic passion, displaying speed and a sort of controlled tumult. The aptly named "Kinetic" follows up with even more speed. This trio could rival any metal band, except they also interject bits of free music into this tornado of a recording. The title track darts and dodges, with Pasborg mixing the pulse and O'Leary ramping up the intensity. The trio establishes a pattern of either short intensity, or longer tracks that build ferocity as the music progresses. What maintains attention here is the band's ability to inject passion into both a sliced-up bebop pulse from Pasborg's bass on "Exit," and the slogging thunder of "Interference," that switches with a boom into rock-n-roll. From note one, this is a take no prisoners outing.
{ "pile_set_name": "Pile-CC" }
Q: Heroku Puma Sidekiq Running 167% crititcal r14 memory quota exceeded on 3 web dynos with one visitor I am running Puma 3.4, Rails 4.2.6, Sidekiq 4.2.2, Redis Mini, on 3 dynos (standard 1x) on Heroku. I am doing simple Beta testing and I cannot seem to optimize my puma-dyno situation. I get High Response Time Alerts and Critical Memory Quota alerts when one user is on the site (I am using New Relic to monitor). I have added Puma Worker Killer to try to diagnose this, but no help. I have everything set using Environment variables (max_threads, concurrency, etc) and I've scoured the internet for how to config. I am setting options in database.yml, sidekiq.rb, puma.rb, puma_worker_killer.rb and sidekiq.yml, so I might be setting things in too many places. Since I'm running 3 Standard 1x web dynos for one user I know that something is wrong. config/puma.rb before_fork do require 'puma_worker_killer' ActiveRecord::Base.connection_pool.disconnect! PumaWorkerKiller.config do |config| config.ram = ENV['PUMA_WORKER_KILLER_RAM'] || 1024 # mb config.frequency = 5 # seconds config.percent_usage = 0.98 config.rolling_restart_frequency = 12 * 3600 # 12 hours in seconds end PumaWorkerKiller.start end workers Integer(ENV['WEB_CONCURRENCY'] || 5) min_threads_count = Integer(ENV['MIN_THREADS'] || 1) threads_count = Integer(ENV['RAILS_MAX_THREADS'] || 5) threads min_threads_count, threads_count preload_app! rackup DefaultRackup port ENV['PORT'] || 5000 environment ENV['RACK_ENV'] || 'development' on_worker_boot do ActiveSupport.on_load(:active_record) do ActiveRecord::Base.establish_connection end end config/initializers/sidekiq.rb require 'sidekiq' redis_url = ENV['REDISTOGO_URL'] redis_config = { url: redis_url, namespace: 'oct', } Sidekiq.configure_server do |config| config.redis = { url: ENV["REDISTOGO_URL"], namespace: 'oct', size: ENV["SIDEKIQ_SERVER_CONNECTIONS"].to_i || 6} config.error_handlers << Proc.new do |exception, context_hash| SidekiqErrorService.new(exception, context_hash).notify end end Sidekiq.configure_client do |config| config.redis = { url: ENV["REDISTOGO_URL"], namespace: 'oct', size: ENV["REDIS_CLIENT_CONNECTION_SIZE"].to_i || 2} end config/sidekiq.yml :verbose: false :concurrency: <%= ENV["WEB_CONCURRENCY"] %> production: :timeout: <%= ENV["SIDEKIQ_TIMEOUT"] %> development: :timeout: 30 :queues: - [highest, 2] - medium - lowest - mailers config/initializers/puma_worker_killer.rb PumaWorkerKiller.enable_rolling_restart config/database.yml default: &default adapter: postgresql encoding: unicode pool: <%= ENV["DB_POOL"] || ENV['RAILS_MAX_THREADS'] || 5 %> development: <<: *default database: myapp_development username: myapp password: myapp host: localhost port: 5432 test: <<: *default database: myapp_test username: myapp password: myapp host: localhost port: 5432 my current environment settings Memory 125-167% (on web dynos, not worker dynos) WEB_CONCURRENCY: 4 DB_POOL: 15 SIDEKIQ_SERVER_CONNECTIONS: 25 MIN_THREADS: 1 RAILS_MAX_THREADS: 5 REDIS_CLIENT_CONNECTION_SIZE: 1 SIDEKIQ_TIMEOUT: 30 DATABASE_REAP_FREQ: 5 PUMA_WORKER_KILLER_RAM: 1535 I also tried to use this helper http://manuelvanrijn.nl/sidekiq-heroku-redis-calc/ but it made it worse, 300% + memory usage WEB_CONCURRENCY: 45 DB_POOL: 15 SIDEKIQ_SERVER_CONNECTIONS: 47 MIN_THREADS: 1 RAILS_MAX_THREADS: 5 REDIS_CLIENT_CONNECTION_SIZE: 1 SIDEKIQ_TIMEOUT: 30 DATABASE_REAP_FREQ: 5 PUMA_WORKER_KILLER_RAM: 1535 A: For a Rails 4, you have too many puma workers even at 4 (45 is impossibly high for that tier). Standard-1x dynos have 512MB. Trying dropping WEB_CONCURRENCY down to 2 and I suspect that you'll see a large enough reduction in memory consumption to prevent R14s. If you're still having trouble after switching WEB_CONCURRENCY to 2 you will need to do some memory optimizations or drop it down to 1.
{ "pile_set_name": "StackExchange" }
// // LMJCalendarViewController.m // PLMMPRJK // // Created by HuXuPeng on 2017/5/7. // Copyright © 2017年 GoMePrjk. All rights reserved. // #import "LMJCalendarViewController.h" #import "LMJEventTool.h" @interface LMJCalendarViewController () @end @implementation LMJCalendarViewController - (void)viewDidLoad { [super viewDidLoad]; LMJWeak(self); LMJEventModel *eventModel = [[LMJEventModel alloc] init]; // @property (nonatomic, strong) NSString *title; //标题 // @property (nonatomic, strong) NSString *location; //地点 //@"yyyy-MM-dd HH:mm" // @property (nonatomic, strong) NSString *startDateStr; //开始时间 // @property (nonatomic, strong) NSString *endDateStr; //结束时间 // @property (nonatomic, assign) BOOL allDay; //是否全天 // @property (nonatomic, strong) NSString *notes; //备注 // if (alarmStr.length == 0) { // alarmTime = 0; // } else if ([alarmStr isEqualToString:@"不提醒"]) { // alarmTime = 0; // } else if ([alarmStr isEqualToString:@"1分钟前"]) { // alarmTime = 60.0 * -1.0f; // } else if ([alarmStr isEqualToString:@"10分钟前"]) { // alarmTime = 60.0 * -10.f; // } else if ([alarmStr isEqualToString:@"30分钟前"]) { // alarmTime = 60.0 * -30.f; // } else if ([alarmStr isEqualToString:@"1小时前"]) { // alarmTime = 60.0 * -60.f; // } else if ([alarmStr isEqualToString:@"1天前"]) { // alarmTime = 60.0 * - 60.f * 24; // @property (nonatomic, strong) NSString *alarmStr; //提醒 eventModel.title = @"eventModel标题"; eventModel.location = @"BeiJing"; eventModel.startDateStr = @"2018-04-05 19:10"; eventModel.endDateStr = @"2018-04-05 20:10"; eventModel.allDay = YES; eventModel.notes = @"eventModel备注"; eventModel.alarmStr = @"1小时前"; self.addItem([LMJWordItem itemWithTitle:@"事件标题: " subTitle:@"" itemOperation:nil]) .addItem([LMJWordItem itemWithTitle:@"增加日历事件" subTitle: nil itemOperation:^(NSIndexPath *indexPath) { [[LMJEventTool sharedEventTool] createEventWithEventModel:eventModel]; [weakself.view makeToast:@"增加了"]; }]) .addItem([LMJWordItem itemWithTitle:@"查找" subTitle: nil itemOperation:^(NSIndexPath *indexPath) { EKEvent *event = [[LMJEventTool sharedEventTool] getEventWithEKEventModel:eventModel]; weakself.sections.firstObject.items.firstObject.subTitle = event.title; [weakself.tableView reloadRow:0 inSection:0 withRowAnimation:0]; }]) .addItem([LMJWordItem itemWithTitle:@"删除" subTitle:nil itemOperation:^(NSIndexPath *indexPath) { BOOL isDeleted = [[LMJEventTool sharedEventTool] deleteEvent:eventModel]; if (isDeleted) { [weakself.view makeToast:@"删除成功"]; weakself.sections.firstObject.items.firstObject.subTitle = nil; [weakself.tableView reloadRow:0 inSection:0 withRowAnimation:0]; }else { [weakself.view makeToast:@"删除失败"]; } }]); } #pragma mark - LMJNavUIBaseViewControllerDataSource /** 导航条左边的按钮 */ - (UIImage *)lmjNavigationBarLeftButtonImage:(UIButton *)leftButton navigationBar:(LMJNavigationBar *)navigationBar { [leftButton setImage:[UIImage imageNamed:@"NavgationBar_white_back"] forState:UIControlStateHighlighted]; return [UIImage imageNamed:@"NavgationBar_blue_back"]; } #pragma mark - LMJNavUIBaseViewControllerDelegate /** 左边的按钮的点击 */ -(void)leftButtonEvent:(UIButton *)sender navigationBar:(LMJNavigationBar *)navigationBar { [self.navigationController popViewControllerAnimated:YES]; } @end
{ "pile_set_name": "Github" }
Human immunodeficiency virus replication induces monocyte chemotactic protein-1 in human macrophages and U937 promonocytic cells. We have recently described a significant correlation between human immunodeficiency virus-1 (HIV-1) RNA replication and monocyte chemotactic protein-1 (MCP-1) levels in the cerebrospinal fluid (CSF) of individuals with the acquired immunodeficiency syndrome (AIDS) with HIV encephalitis (E). Because local macrophages (microglia) are the cells predominantly infected in the brain, we investigated whether in vitro HIV infection affects MCP-1 production in mononuclear phagocytes (MP). MCP-1 secretion and expression were consinstently upregulated over constitutive levels in human monocyte-derived macrophages (MDM) infected with the M-tropic R5 BaL strain of HIV-1. HIV replication was required for this effect, as demonstrated by the absence of chemokine upregulation after infection in the presence of 3'-azido-3'-deoxythimidine (AZT) or cell-exposure to heat-inactivated (triangle up degrees ) virus. MCP-1 induction was not restricted to HIV-1 BaL, but was also observed during productive infection of MDM with two primary isolates differing for entry coreceptor usage and of U937 cells with the X4 HIV-1 MN strain. Based on the observation that exogenous HIV-1 Tat induced MCP-1 expression in astrocytes, we also investigated its role in MDM and U937 cells. Exogenous Tat induced MCP-1 production from MDM in a concentration-dependent manner, however, it was not effective on uninfected U937 cells or on the chronically infected U937-derived cell line U1. Transfection of Tat-expressing plasmids moderately activated HIV expression in U1 cells, but failed to induce MCP-1 expression in this cell line or in uninfected U937 cells. HIV replication-dependent expression of MCP-1 in MP may be of particular relevance for the pathogenesis of HIV infection in nonlymphoid organs such as the brain.
{ "pile_set_name": "PubMed Abstracts" }
Known risk factors do not explain disparities in gallstone prevalence between Denmark and northeast Germany. Gallstones are a common disease worldwide, with disparities in the prevalence of the disease in different settings. The aim of the present study was to assess if different distributions of risk factors could explain the disparities in the prevalence of gallstone disease between Denmark and northeast Germany. Data of 5,559 subjects from the Danish MONICA survey and of 3,647 subjects of the German Study of Health in Pomerania were investigated. Gallstone disease was defined as a prior history of cholecystectomy or the presence of sonographically diagnosed gallstones. Logistic regression models were performed to assess the confounding effect of selected risk factors on regional disparities in gallstone disease. After adjustment for age and vocational training, German subjects (women: Odds ratio, OR, 2.46 (95% confidence interval, CI: 2.07-2.91); men: OR, 1.89 (95% CI: 1.52-2.36)) had approximatively twice the odds of gallstones than Danes. Inclusion of lifestyle factors (smoking, alcohol intake, coffee use) did not affect this result, whereas adjustment for body mass index (BMI), lipids, diabetes, and use of oral contraceptives, menopausal hormone therapy (MHT) and parity (women only) changed the estimates considerable, but still Germans (women: OR, 1.65 (95% CI: 1.36-2.00); men: OR, 1.61 (95% CI: 1.27-2.04)) had higher odds than Danes. German individuals had a higher prevalence of gallstones than Danes. This difference was partly explained by a higher BMI, unfavorable lipid levels, higher prevalence of diabetes, and a more frequent use of OR and MHT in German subjects. Further research is needed to evaluate the impact of unmeasured predictors, including genetic components, on the population-related risk of gallstones.
{ "pile_set_name": "PubMed Abstracts" }
Q: What is the difference between a line segment inside and outside of a concave polygon? My question is about the creation of visibility graphs in surfaces with multiple convex and concave polygons. My problem is that i am not able to classify whether the line segments connecting the nodes of the same polygon go through or don't go through this polygon. As seen in the picture below: I'd need to separate the orange, invalid lines from the blue, valid lines. I hope somebody can provide me a solution to this problem with a suitable algorithm that can be implemented in python. Or for even complexer polygons?: difficult polygon A: This code accepts A and B as two vertices and checks if the line joining them lies completely inside , partially inside or completely outside the polygon. This is based on mathematical fact that for a line with eqn. F(X,y):Ax+By+C the point x1,y1 will lie on the line if F(x1,y1)=0 On one side of line if F(x1,y1)>0 On other side of line if F(x1,y1)<0 L=[] #list of all the vertices of the polygon as (x,y) tuples in order A=() B=() # A and B are tuples of coordinates of points joking diagonal to check def eqn(A,B): X1=A[0];Y1=A[1] X2=B[0];Y2=B[1] return(X2-X1,Y1-Y2,X1*Y2-X2*Y1) def check(Y,X,C,y,x): if(Y*y+X*X+C>0): return 1 elif(Y*y+X*X+C<0): return -1 else: return 0 Y,X,C=eqn(A,B) #get parameters of diagonal joining A and B a=L.index(A) b=L.index(B) L1=[] L2=[] if(a>b): L1=L[b+1:a] L2=L[a+1:]+L[:b] elif(b>a): L1=L[a+1:b] L2=L[b+1:]+L[:a] #so I have split the list into two lists L1 and L2 containing vertices in cyclic order on either side of the diagonal k=1 m=0 val1=check(Y,X,C,L1[0][1],L1[0][0]) val2=check(Y,X,C,L2[0][1],L2[0][0]) if(val1==val2): k=0 m=1 else: # I have to check F(x,y) for each point in list L1 and L2 it should be of one sign for all elements in L1 and of other sign for all elements in L2 for line to lie completely inside polygon for t in L1: if(check(Y,X,C,t[1],t[0])!=val1): k=0 m=0 for s in L2: if(check(Y,X,C,s[1],s[0])!=val2): k=0 m=0 if(k==0): print('the diagonal passes outside') else: print('the diagonal lies completely inside the polygon') if(m==1): print('the diagonal lies completely outside the polygon') I have written the code hope it works as required,but there maybe errors:o,the logic is correct,there may be syntax or other errors you have to take care of(I can help in that case) I have excluded one case if the two points chosen are consecutive,then it is obviously the side of the polygon(trivial to check).
{ "pile_set_name": "StackExchange" }
The retinal vasculature is prone to damages, leading to serious ocular diseases including loss of vision. While angiogenic therapies are being explored as potential treatments, a significant hurdle is our inability to control the three dimensional organization of the vascular network induced by angiogenic factors to ensure proper functioning of pharmacologically induced retinal vasculature. Thus, our long term objective is to unravel mechanisms that control the spatial organization of retinal vascular beds, and in particular to investigate how components of the hypoxia signaling pathway act as spatial cues to determine the direction and position of vascular growth in the retina. These studies will be carried out in three specific aims. Aim 1. Investigate roles of prolyl hydroxylase domain proteins in controlling retinal vascular pattern formation. PHDs negatively regulate the abundance of hypoxia inducible factors (HIFs), the latter of which are essential for angiogenesis. We hypothesize that the level of PHD activity in a tissue microenvironment determines the activity and directionality of vascular growth in its vicinity, and will test this hypothesis by generating chimeric retinas that contain micro tissue domains with PHD deficiency or overexpression. Aim 2. Determine if HIF-la accumulation in a micro tissue domain controls the position and direction of vascular growth in nearby tissues. Aim 3. Explore the role of VEGFR-l in defining vessel to vessel distances. VEGFR-l is produced by endothelial cells and forms tight complex with VEGF-A, a key angiogenic molecule induced by hypoxia. We propose that VEGF-A/VEGFR-1 interaction diminishes bioavailable VEGF-A near the source of VEGFR-l expression and therefore disallows the growth of more microvessels within a certain distance from an existing microvessel. This hypothesis will be tested by creating chimeric retinas that contain micro tissue domains overexpressing VEGFR-1, and assessing vascular density near such tissues. The objective of these studies is to facilitate the development of effective therapies aimed at repairing damaged retinal vascular beds and is highly consistent with the mission of the National Eye Institute (NEI).
{ "pile_set_name": "NIH ExPorter" }
638 So.2d 176 (1994) Vickie BROADWAY and Husband Michael E. Broadway, Appellants, v. BAY HOSPITAL, INC., d/b/a HCA Gulf Coast Hospital, Appellee. No. 92-2337. District Court of Appeal of Florida, First District. June 14, 1994. Edmund D. Quintana of Burke & Blue, P.A., Panama City, for appellants. Ann J. Tipton of Baker, Duke & Tipton, P.A., Pensacola, for appellee. *177 PER CURIAM. This cause is before us on appeal from a final order dismissing appellants' second amended complaint with prejudice. Appellants contend (1) that the trial court erred in finding that they were required to comply with the presuit screening requirements of chapter 766, Florida Statutes, for medical malpractice claims; (2) that their compliance with the presuit screening requirements was sufficient such that the trial court erred in dismissing their complaint; and (3) that section 766.203(2), Florida Statutes, which imposes as a condition precedent to the filing of a medical malpractice claim that the plaintiff provide notice of the claim and a corroborating expert opinion, is unconstitutional. We reverse as to the first issue and, consequently, do not reach the second and third issues. The second amended complaint alleged that plaintiff/appellant Vickie Broadway was a patient at appellee's hospital in July 1989 and was injured when her hospital bed collapsed. Appellants sought damages based on appellee's breach of its duty to use reasonable care in maintaining its premises and breach of its duty to warn Ms. Broadway of latent hazards. Appellee sought dismissal of the complaint on the ground that the complaint stated a claim for medical negligence and that appellants had failed to comply with the presuit screening requirements of chapter 766, Florida Statutes. The trial court entered an order dismissing the complaint with prejudice under section 766.206(2), Florida Statutes, which requires that a medical malpractice complaint be dismissed if the court finds that the plaintiff is not in compliance with the presuit investigation requirements of chapter 766. Under section 766.106(1)(a), Florida Statutes, "claim for medical malpractice" is defined as "a claim arising out of the rendering of, or the failure to render, medical care or services." A person seeking recovery for injury resulting from medical malpractice must prove that the injury resulted from a breach of the prevailing professional standard of care as set forth in section 766.102(1), Florida Statutes. The test for determining whether a defendant is entitled to the benefit of the presuit screening requirements of section 766.106, Florida Statutes, is whether the defendant is directly or vicariously liable under the medical negligence standard of care set forth in section 766.102(1), Florida Statutes. Weinstock v. Groth, 629 So.2d 835 (Fla. 1993), citing NME Properties, Inc. McCullough, 590 So.2d 439 (Fla. 2d DCA 1991). Not every wrongful act by a health care provider amounts to medical malpractice. Stackhouse v. Emerson, 611 So.2d 1365 (Fla. 5th DCA 1993). From the face of the complaint, it is apparent that appellants have sued appellee for the failure to warn of a dangerous condition or properly maintain a piece of equipment, rather than for breach of some professional standard of care. We hold that the trial court erred in dismissing the complaint. We reject appellee's contention that Neilinger v. Baptist Hospital of Miami, Inc., 460 So.2d 564 (Fla. 3d DCA 1984), requires affirmance of the order below. In Neilinger, the complaint alleged that the plaintiff, a maternity patient, slipped and fell on a pool of amniotic fluid while descending from an examination table under the direction and care of employees of the hospital. The complaint on its face alleged breach of a professional standard of care. The order appealed from is therefore reversed, and this cause is remanded for proceedings consistent herewith. BOOTH, JOANOS and MINER, JJ., concur.
{ "pile_set_name": "FreeLaw" }
Q: Rank by 2 different levels of partitioning/grouping I have this set of data using Microsoft SQL Server Management Studio Category|pet name| date |food price|vet expenses|vat A | jack |2017-08-28| 12.98 | 2424 |23 A | jack |2017-08-29| 2339 | 2424 |23 A | smithy |2017-08-28| 22.35 | 2324 |12 A | smithy |2017-08-29| 123.35 | 2432 |23 B | casio |2017-08-28| 11.38 | 44324 |32 B | casio |2017-08-29| 2.24 | 3232 |43 B | lala |2017-08-28| 343.36 | 42342 |54 B | lala |2017-08-29| 34.69 | 22432 |54 C | blue |2017-08-28| 223.02 | 534654 |78 C | blue |2017-08-29| 321.01 | 6654 |67 C | collie |2017-08-28| 232.05 | 4765 |43 C | collie |2017-08-29| 233.03 | 4654 |65 What I want to do is rank by food price, but group by category, order by category, pet name, date and then rank by vet expenses, but group by category, order by category, pet name, date and then rank by vat, but group by category, order by category, pet name, date. I'm thinking this will be a join statement for the table above? Something exactly like below: Category|pet name| date |food price|vet expenses|vat|Rankfp|Rankve|Rankvat A | jack |2017-08-28| 12.98 | 2424 |23 | 2 | 1 |1 A | jack |2017-08-29| 2339 | 2424 |23 | 1 | 2 |1 A | smithy |2017-08-28| 22.35 | 2324 |12 | 1 | 2 |2 A | smithy |2017-08-29| 123.35 | 2432 |22 | 2 | 1 |2 B | casio |2017-08-28| 11.38 | 44324 |32 | 2 | 1 |2 B | casio |2017-08-29| 2.24 | 3232 |43 | 2 | 2 |2 B | lala |2017-08-28| 343.36 | 42342 |54 | 1 | 2 |1 B | lala |2017-08-29| 34.69 | 22432 |54 | 1 | 1 |1 C | blue |2017-08-28| 223.02 | 534654 |78 | 2 | 1 |1 C | blue |2017-08-29| 321.01 | 6654 |67 | 1 | 1 |1 C | collie |2017-08-28| 232.05 | 4765 |43 | 1 | 2 |2 C | collie |2017-08-29| 233.03 | 4654 |65 | 2 | 2 |2 NB: this is not needed in the final output but to make it more readable I have ordered the outcome by category, pet name, date: Category|pet name| date |food price|vet expenses|vat|Rankfp|Rankve|Rankvat A | jack |2017-08-28| 12.98 | 2424 |23 | 2 | 1 |1 A | smithy |2017-08-28| 22.35 | 2324 |12 | 1 | 2 |2 A | jack |2017-08-29| 2339 | 2424 |23 | 1 | 2 |1 A | smithy |2017-08-29| 123.35 | 2432 |22 | 2 | 1 |2 B | casio |2017-08-28| 11.38 | 44324 |32 | 2 | 1 |2 B | lala |2017-08-28| 343.36 | 42342 |54 | 1 | 2 |1 B | lala |2017-08-28| 343.36 | 42342 |54 | 1 | 2 |1 B | lala |2017-08-29| 34.69 | 22432 |54 | 1 | 1 |1 C | blue |2017-08-28| 223.02 | 534654 |78 | 2 | 1 |1 C | collie |2017-08-28| 232.05 | 4765 |43 | 1 | 2 |2 C | blue |2017-08-29| 321.01 | 6654 |67 | 1 | 1 |1 C | collie |2017-08-29| 233.03 | 4654 |65 | 2 | 2 |2 The code I have below only ranks by category, but does not group by food price, vet expenses and vat. RANK ()OVER(PARTITION BY [Category], [Date] order by [Category] ,[Pet Name],[Date]) as 'Rank' Would it be a case of grouping the costs separately then left joining the rankings on to the original data? (I will be using pivots and slicers in excel so want to have all the data on one table/query) A: After walking away with some time to refresh my brain i had a eureka moment and solved this. It was actually easy when I thought about it. so the code to get the desired table goes something like this: select * , rank ()OVER(PARTITION BY [Category], [date] order by [food price], [Category] ,[pet name],[date]) as 'Rankfp' , rank ()OVER(PARTITION BY [Category], [date] order by [vet expenses], [Category] ,[pet name], [date]) as 'Rankve' , rank ()OVER(PARTITION BY [Category], [date] order by [vat], [Category] ,[pet name], [date]) as 'Rankvat' from petcost order by [category, [pet name]
{ "pile_set_name": "StackExchange" }
The prevalence of frontotemporal dementia. To estimate the prevalence of frontotemporal dementia (FTD) and other degenerative early-onset dementias in a geographically defined population. Early-onset dementia (at age <65 years) results in high psychiatric morbidity and caregiver burden. Prevalence figures are available for early-onset AD but not for FTD, a dementia that is almost invariably of early onset. Case ascertainment was by review of case records of three specialist clinic databases and inpatient admissions at a university hospital in Cambridge, United Kingdom, for patients with dementia who were <65 years of age, living in Cambridge City or East or South Cambridgeshire (population 326,019) on May 30, 2000. All the relevant health services in the area were also contacted for potential cases. Diagnosis of various dementias was based on published criteria. All patients with potential FTD were examined by the study investigators and underwent structural neuroimaging. The 1998 population estimates for the area were used to calculate age and sex prevalence with confidence intervals for AD, FTD, and other causes of dementia. A total of 108 patients (66 men and 42 women) with dementia with onset before they were 65 years of age were identified, of whom 60 were <65 years on the census date, giving an overall prevalence of 81 (95% CI, 62.8 to 104.5) per 100,000 in the 45- to 64-year age group. The prevalences of early-onset FTD and AD were the same: 15 per 100,000 (8.4 to 27.0) in the 45- to 64-year-old population. The mean age at onset of FTD was 52.8 years and there was a striking male preponderance (14:3). It is possible case ascertainment methods resulted in a relative underrepresentation of some forms of dementia. Frontotemporal dementia is a more common cause of early-onset dementia than previously recognized and appears to be more common in men.
{ "pile_set_name": "PubMed Abstracts" }
Q: How can I hide or diminish VS2017's vertical lines in the editor Visual Studio 2017 uses quite bright, dashed, vertical lines within code's indentation to highlight the extent of various scopes. How can I turn these off, or make them less vivid? A: You can reduce the intensity of these lines: In VS2017, go to menu Tools, Options.... Navigate to Environment/Fonts and Colors and scroll to select the Structure Guide Lines display item. Click custom, then drag down the black arrow to the right of the dialog until you see a colour you like. A: You can also turn them off completely from Tools\Options, Text Editor, General, Show structure guide lines.
{ "pile_set_name": "StackExchange" }
The Daily Mail says United have inserted a clause into Lingard’s one month loan deal to Birmingham City that will prevent the forward from playing in the Capital One Cup. Lingard, who sparkled on his debut for the Midlands’ club as he hit four goals in the 4-1 victory over Sheffield Wednesday, is therefore ruled out for the visit of Swansea on Wednesday evening. The short-term move to Birmingham may be extended if all parties are happy with the way the signing works out but United have also safeguarded against the possibility of Lingard being cup-tied ahead of a possible speedy return to Old Trafford.
{ "pile_set_name": "Pile-CC" }
Q: Bad reputation of reputation For the record: the post below is not to defend the point where I am standing. That's why I feel I am entitled to bring this up. Every now and then, reputation is brought up in discussions as an argument. Used wrongly in my opinion, for reasons pointed out below. Not the only reason, but an important one was the question here http://meta.askubuntu.com/a/15662/72216, where the question at a certain point moved to a reputation/motivation discussion. The question wasn't reputation- motivated, but even if it were, it shouldn't (have) be(en) an argument at all. As a general rule, when working in teams, to make sure the team is productive, we need to make sure each and every member of the team has his or her own personal interest in a good result of the team. This interest may and will vary. The formula of the SE sites understands this extremely well. That's one of the reasons the reputation system exists, and why we have a personal reputation record on SE sites. The site obviously stresses on the importance of the personal reputation; not only are privileges directly related to reputation, but together with the general information of moderator candidates for example, detailed information is displayed on the candidates' reputation, the average reputation per post and so on. Of course, we may hope that the motivation to answer (or ask) questions is not purely reputation based, and to prevent misunderstandings, mine isn't. However, as long as we post quality Q's and A's, keep the site's rules, maintain general rules of decensy and good behaviour, our personal motivation is totally irrelevant to the site. Nevertheless, on a regular base, in discussions, "chasing reputation" is implicitely or explicitely mentioned as a bad thing, a sign of bad behaviour, doing it for the wrong reasons. As mentioned, in itself, chasing reputation, even if it is the only motivation to create good content, is perfectly fine and needs no defense at all. So, in a nutshell, please don't use chasing reputation as an argument to prove you're right or someone else is wrong. What counts is good content and constructive behaviour. The motivation under the hood is no one's business but the poster's. A: Sometimes, when I close my eyes in a daydream, I see a little green rectangle top left. The sign of joy! I'm not a mind reader, but I think it's probably hypocritical for people to mutter disapprovingly about others "chasing reputation". Like my mother told me at school where I got bullied for always putting my hand up to give the answer "They're just jealous." Problems might arise, I guess, when the overall glory of AU is damaged somehow by the way people behave, or needed effort (like reviewing and editing) is not made because it doesn't contribute to reputation. In that case, I think people should be complaining about the problem, and not the motivation, since, as you say, what others are thinking is private and unknowable... Moreover, we are not all the same, and it takes many different folks to make a glorious SE site, and many people do those non-rep-earning tasks, and as long as there are enough people doing them, then there isn't a problem... In short I agree with you and am just rambling... Better get back to writing quick answers to easy questions ploughing through the Close Votes Review Queue... A: Reputation isn't just imaginary numbers on the screen. It's a number which says something important. It says that you helped people. So of course people like to "chase" it (or at least appreciate it when they get it). Why do people spend hours on AU helping people? It's not because they make money from it (mostly). It's not because there's (usually) some tangible, real life benefit to them immediately. It's mostly because they like the feeling of having helped someone. Of course! If you spend hours writing good answers and helping strangers with problems, and there's no feedback, then that's not a good feeling. So reputation is very important! It tells you that you helped people and that your work was useful. The feeling of having contributed to something useful can often be more valuable to us than even money. Someone may say "your motive shouldn't just be reputation". But I think reputation really is a type of feedback showing you that you helped people. If someone said "Your motive shouldn't just be to know that you've helped people", then I would say, "Yes, it's an entirely decent motive to be on AU with the intention of trying to help people and wanting to have a solid affirmation that you actually did help people." I think almost everyone here agrees with this, including the people you were having a discussion with in the post you linked to in OP (I was actually one of those people.) I would suggest that it's hardly possible to be after only reputation. Reputation isn't "only" reputation. It's a symbol of something. Is anyone after just the number? I doubt it. The number itself would be totally meaningless if it didn't represent something. I believe what people are truly after is what the number represents. And I think that's a perfectly fine thing to be "after." Otherwise it just seems meaningless. For example, let's say you spend lots of time and energy figuring out an excellent answer to a tough problem. OP abandons the post, and doesn't give any feedback to the answer. Very few other people notice the answer, and it just gets lost without any upvotes. Thankfully this doesn't happen very often. Because when we have worked hard at something, we need affirmation that it was actually helpful. And that is exactly what that little +100 or +200 symbol on the top tells you. That you helped people. Finally, you can even spend your reputation to help others. Let's say a user has posted a really tough problem that you don't know the answer to. If you post a large bounty on it, it might just motivate people to put up the effort to find a solution to the tough problem. That's actually getting people to put in effort into something. That's something we pay lots of money for in the real world. So, reputation is really important! I dare assert that without it, AU would be much, much weaker than it is today. And I don't blame anyone in the slightest, for chasing it. That would be like blaming a social worker for "chasing" the smiles on the faces of the people he/she was helping. I often help my real life friends with their computers. I'll willingly admit that one of my motives is the feeling of having helped someone, and knowing that they are thankful. Reputation is the AU equivalent of that, and I think it's an entirely appropriate motive. It's true that many of us might use reputation as food for our egos, etc, obsessing over it. Human nature can be like that. But unless a user is putting on a truly bizarre show, I think we should hesitate before suggesting that other users are in such a state. It's mostly quite hard to know what's actually going on in the mind of another person. So in this regard I believe we should mostly give everyone the benefit of the doubt.
{ "pile_set_name": "StackExchange" }
Outcomes of Patients Implanted Using a Left Thoracotomy Technique for a Miniaturized Centrifugal Continuous-Flow Pump. As ventricular-assist devices (VADs) are increasingly employed in heart failure management, a leading cause of mortality, new literature is consistently published on less-invasive implantation techniques. Although early perioperative outcomes have been shown to be favorable with minimally invasive left thoracotomy (LT) approaches compared with conventional sternotomy (CS), studies comparing long-term outcomes are lacking. We set out to evaluate long-term follow up between LT and CS approach. In a single center, retrospective review, data on patients with similar demographic profiles were collected. HeartWare (HVAD) implantation was performed by either CS or LT. Analysis was performed on perioperative adverse outcomes, and 6 month postoperative adverse events. Primary objectives of the study included comparative outcomes of morbidity and mortality between both groups at 180 days postimplantation. Eighty-one (n = 81) bridge to transplant (BTT) patients underwent CS or LT HVAD implantation. Perioperative transfusion (p = 0.04) favored the LT cohort compared with CS, with a median of 6 units and 8 units transfused for each group, respectively. No survival difference was observed between both groups at 6 months postimplantation (p = 0.52). Clinical outcomes at an average of 6 month follow up showed no difference in adverse events, including common postoperative VAD complications such as infection and right heart failure. Miniaturization of LVAD size and improvement in technology has allowed expansion of interest in alternative surgical approaches for HVAD implantation. For BTT patients, no difference in early outcome was observed 6 months after implantation using a left LT versus CS technique.
{ "pile_set_name": "PubMed Abstracts" }
Visual stimuli that are spatially removed from a neuron's classic reception field and which they elicit no response can strongly affect the magnitude of a response to stimuli within the classic field. It is thought that lateral connections among neurons mediate the interaction. Behaviorally, the presence of surround stimuli can profoundly affect the ability to perform fine spatial discriminations between similar center patches. In the proposed research, we test recent findings from the neuroscience literature in the psychophysical domain. An understanding of the normal mechanisms governing these lateral interactions is critical for our understanding of normal visual processing. For example, excitatory contextual modulation is thought to reflect the operation of contour mechanisms that mediate reading, whereas inhibitory interactions over space may be involved in segregating parts of a scene. It is also of import to provide normal behavioral data as a baseline in clinical applications. Deficits shown in amblyopia and strabismus include both hyperacuity tasks and lateral interactions. Here, we use psychophysical discrimination tasks to ask how these mechanisms integrate or segregate information from different regions of space, and how the spatial arrangement of stimuli in one part of the visual field affects performance in another. Specifically, we test several hypotheses: (1) that the spatial extent of regions of psychophysically-determined summation and inhibition in discrimination depends upon the contrast; (2) that there are spatial asymmetries in contextual modulation of mechanisms mediating fine spatial discriminations; (3) that the modulation process can be characterized by at least one of three quantitative models of gain control; (4) that apparently contradictory results in the psychophysical literature can be resolved within the context of a relatively simple neural model of contextual modulation; and (5) that contextual influences are both qualitatively and quantitatively altered by changes in apparent figure-ground relationships. We propose to begin to characterize these properties quantitatively.
{ "pile_set_name": "NIH ExPorter" }
Reconstruction of the maxilla and midface--surgical management, outcome, and prognostic factors. Loss of the maxilla due to tumor ablation has both functional and aesthetic consequences. Even small defects become obvious because of missing bone and soft tissue. Reconstruction of the maxilla and midface in these patients presents a challenge to the surgeon although several possibilities are available for this purpose. The long term benefit to patients of the different modalities remains unclear due to wide individual variation. One hundred and twenty-one patients with maxillary oral squamous cell carcinoma were treated with curative intent. One hundred and five patients were surgically reconstructed using local or free microsurgical flaps. All parameters were collected from case records. Kaplan-Meier plots and univariate log-rank test and multivariate Cox proportional hazards regression models were used to determine the association between possible predictor variables and survival time of patients suffering from oral squamous cell carcinomas. After controlling for age, resection margins, nodal stage, and surgical management, which were independent and dependent predictors of survival, the type of reconstruction and involvement of surgical margins were associated with survival (HR=0.50, p=0.044, 95% CI, 0.25-0.98 and HR=3.16, p=0.007, 95% CI, 1.38-7.25). Various types of maxillary defects can be reconstructed successfully using different reconstructive techniques. The size and complexity of defects does not correlate with prognosis in oral squamous cell carcinoma patients. The criteria for reconstruction with a free flap were based on extensive defects in which local flaps were insufficient, on medical co-morbidities, and previous treatment.
{ "pile_set_name": "PubMed Abstracts" }
Fort Hood Shooter Is Seeking Death Penalty Tags FORT HOOD, Texas (AFP) – The army psychiatrist who has admitted to opening fire on fellow soldiers in the Fort Hood massacre is deliberately seeking the death penalty, his stand-by defense attorney said Wednesday. Lieutenant Colonel Kris Poppe urged a military judge to either prevent Major Nidal Hasan from representing himself at the high-profile trial or allow the court-appointed lawyers tasked with assisting him to be removed from the case. “It became clear his goal is to remove impediments and obstacles to the death penalty,” Poppe told the court as the second day of Hasan’s trial got underway. “Should he decide he wants to fight the death penalty, then we are here and ready to defend him.” Hasan interrupted Poppe, declaring “this is a twist of the facts” and insisting he was not trying to martyr himself. Military judge Colonel Tara Osborn cleared the courtroom to discuss the matter privately with Hasan and then called an early end to the day’s proceedings. Hasan has repeatedly attempted to plead guilty to killing 13 people and wounding dozens more in the 2009 attack at a Texas military base. Military law prohibits Hasan from pleading guilty to a capital offense. So he has been given the opportunity to try to convince the jury that he does not deserve death for his actions. Now aged 42, Hasan was due to deploy to Afghanistan weeks after the attack. He has said he shot the soldiers to protect his fellow Muslims from an “illegal” war. “The evidence will clearly show I am the shooter,” Hasan declared in his opening statements Tuesday. The statement, which lasted just a couple minutes, reiterated his radical views. “We, the mujahedeen, are imperfect Muslims trying to establish a perfect religion in the land of the supreme God,” Hasan said. “I apologize for any mistakes that I made in this endeavor.”
{ "pile_set_name": "Pile-CC" }
Lisnadill Lisnadill () is a hamlet, townland and civil parish in County Armagh, Northern Ireland. In the 2001 Census it had a population of 54 people. It lies about 3 miles south of Armagh and is within the Armagh City and District Council area. Places of interest The Drumconwell Ogham Stone stood in the neighbouring townland of Drumconwell, on the ancient routeway to Eamhain Mhacha. It can now be seen in the Robinson Library in Armagh. People Frederick Francis Maude, born in Lisnadill on 20 December 1821, was an Irish recipient of the Victoria Cross. Education Lisnadill Primary School See also List of civil parishes of County Armagh References NI Neighbourhood Information System Drumconwell Ogham Stone Category:Villages in County Armagh Category:Townlands of County Armagh Category:Civil parishes of County Armagh
{ "pile_set_name": "Wikipedia (en)" }
Clinician compliance with laboratory regulations requiring submission of relevant clinical data: A one year retrospective analysis. The College of American Pathologists (CAP) recognizes the need for clinical data in the interpretation of specimens submitted for histopathologic evaluation. Anecdotal evidence indicates that clinician compliance with requests for clinical history is variable. Quality assurance data from August 1, 2010 to September 31, 2011 were searched for all cases listing no clinical history. Four consecutive weeks of surgical pathology request forms were also reviewed for the presence or absence of clinical history and its accuracy. 21,700 cases were accessioned in the study period and 1293 (5.9%) requisitions contained no clinical history. The four-week review documented that 143 of 1698 (8.4%) requisitions had no clinical history and 12 cases contained incorrect history (0.7%). Between 5.9% and 8.4% of requisitions contain no clinical history. In 0.2% of cases, clinical history was incorrect. Compliance with the CAP policy for clinical history appears poor.
{ "pile_set_name": "PubMed Abstracts" }
using System; using System.Text; using System.Collections.Generic; using System.IO; using System.Windows.Forms; using DotSpatial.Positioning; namespace Diagnostics { static class Program { /// <summary> /// The main entry point for the application. /// </summary> [STAThread] static void Main() { Application.EnableVisualStyles(); Application.SetCompatibleTextRenderingDefault(false); Application.Run(new MainForm()); } } }
{ "pile_set_name": "Github" }
Tenerife Norte-Ciudad de La Laguna Airport AENA INFORMS REMEMBER:If thiyour are travelling, check with your airline before going to the airport and remember that the use of a mask is compulsory for indoor public spaces and outdoors when impossible to keep the safety distance. Follow the hygiene measures at all times, keep a distance with anyone and collect your baggage once the person in front of you has left the area.
{ "pile_set_name": "Pile-CC" }
Poly(alkylcyanoacrylate) nanocapsules: physicochemical characterization and mechanism of formation. Nanocapsules of poly(isobutylcyanoacrylate) and poly(isohexylcyanoacrylate) were prepared by addition of the monomer to an organic phase and subsequent mixing of the organic phase to an aqueous phase containing poloxamer 188, 238 or 407. Gel permeation chromatography indicated that in contrast to literature reports, polymerization occurred in the organic phase and nanocapsules were obtained by interfacial precipitation of the polymer without any significant change of the molecular weight. Addition of SO2 to the organic phase before the introduction of the monomer allowed preparation of nanocapsules with a lower molecular weight. Nanospheres were prepared in a similar way albeit using an organic phase that was completely miscible within the aqueous phase so that solid spheres were obtained. Density gradient centrifugation revealed that nanocapsules had a density intermediate between nanospheres and an emulsion prepared in the same way without addition of monomer to the organic phase. Further, the process used to prepare nanocapsules had a high yield since no oil droplets or nanospheres were obtained by this process. Zeta potential of the nanocapsules and spheres was found to be related to the molecular weight of the polymer: values as high as approximately -42 mV were obtained for low molecular weight nanocapsules (MW approximately 1000) compared to approximately -10mV for the emulsion and the high molecular weight nanocapsules (MW approximately 100,000). Surface charge of the nanocapsules and molecular weight of their polymeric wall conditioned the adsorption capacity of poloxamers. Moreover, the highest adsorption was measured with the most hydrophobic poloxamer. These observations agree with previous work conducted on hydrophobic surfaces.
{ "pile_set_name": "PubMed Abstracts" }
Evaluation of cellular and humoral systemic immune response against Giardia duodenalis infection in cattle. Giardia duodenalis causes diarrhoea in humans and a wide range of mammals, including cattle. In cattle, the infection often has a chronic character. Infected calves may excrete cysts for several months, suggesting that Giardia is able to suppress and evade the immune response. In this study six calves were infected with G. duodenalis assemblage A and E and housed in an environment that allowed reinfection. Cyst excretion was monitored twice a week and blood was collected every 2 weeks, until decreasing cyst counts indicated the development of protective immunity. The kinetics of the circulating memory cells and serum antibodies were followed up throughout this period. Cyst excretion started 1 week post-infection and remained high until week 14. Low cyst counts from week 15 p.i. onwards indicated that the calves had developed immunity. From week 5 p.i. significant proliferation of CD4(+) αβ T-cells was observed after in vitro stimulation with G. duodenalis antigen. Characterisation of the proliferating CD4(+) T-cells using real time qPCR showed that at the peak of antigen driven PBMC proliferation the majority of cells were CD4(+) T-cells expressing IL-17 and to a lesser extent FoxP3. The cell proliferation was strongly reduced after plastic adhesion of the PBMC, suggesting a role for antigen-presenting cells. Failure to restore proliferation of depleted PBMC with Giardia-stimulated monocyte-derived dendritic cells (MoDC) and unchanged proliferation after depletion of CD21(+) B-cells showed that other antigen-presenting cells than MoDC and B-cells were important for T-cell proliferation. Analysis of the antibody response indicated that serum IgG1 and IgA levels against G. duodenalis assemblage A and E increased from week 11 post-infection. From the start of the antibody response, all trophozoites stained positive in an immunofluorescence assay with serum antibodies, indicating that a broad repertoire of antibodies was produced against all variant-specific surface proteins. Further research is necessary to determine which effector T-cell subset produces IL-17 and which cells play a role in antigen presentation.
{ "pile_set_name": "PubMed Abstracts" }
Gas chromatographic evaluation of trapidil and its desethyl metabolite in biological fluids for pharmacokinetic and bioavailability investigations. This paper describes a suitable and cost-saving method for quantitative analysis of trapidil (5-methyl-7-diethylamino-s-triazolo [1,5-a]pyrimidine) and its desethyl metabolite in plasma and urine for pharmacokinetic and bioavailability investigations. Trapidil and desethyl-trapidil were extracted from plasma, concentrated and injected into the gas chromatography without any derivatization process. The authors suggest a series of internal standards. A thermoionic specific detector enables high sensitivity to be achieved, i.e. 20 ng/ml, and good specificity. The method is cost-saving in that it allows about 30 analyses a day to be performed without automatic integrators, and about 50 analyses a day with these integrators.
{ "pile_set_name": "PubMed Abstracts" }
If this is your first visit, be sure to check out the FAQ by clicking the link above. You may have to register before you can post: click the register link above to proceed. To start viewing messages, select the forum that you want to visit from the selection below. I get that. And look, I'm a former Chicago guy and my Kim is a former Nebraska gal, so we don't eat anything that didn't have parents. I suppose it's subjective to a degree. But tripe...?! Jeez. My last post on this matter as I'm going waaaaay off-thread. But I can't resist. As my mother would have said, "Gross!" http://en.wikipedia.org/wiki/Tripe Mmmmmmm... McRib! Originally Posted by MOTU_Maniac I love the McRib, but don't want to know what it is made of. I learned long ago to NEVER question the food you eat or you won't eat anything that you don't personally grow in your own garden. lol. End of every year I like to compile a list of my favorite films and ones I'd recommend plus I like to read everyone else's picks as well. One of those rare years where I could make a top ten I feel good about, usually I make a top 5. Really confident in my top two. Loved Zero Dark Thirty, extremely well put together and acted. The Dark Knight Rises people can pick apart to death, but I loved the story telling, Bane's voice and eye acting, Catwoman, Alfred, Gordon, Blake, Batman's goodbye, all of it. The rest are interchangeable. Contraband Haywire (only if you love Gina Carano) Underworld: Awakening (best of the series) The Grey Chronicle (surprisingly good superhero film using found footage) Project X (Chronicle meets Risky business on steroids and ecstasy) Safe House Gone (surprisingly good) John Carter 21 Jump Street (made me a Channing Tatum fan) ATM Lockout Safe (one of the better Statham movies) The Dictator Men in Black 3 Mansome Prometheus Safety Not Guaranteed Ted People Like Us The Amazing Spiderman The Bourne Legacy Premium Rush Resident Evil: Retribution (if you liked all the others) End of Watch Looper V/H/S Flight The Bay Hitchcock Killing Them Softly The Collection (2nd best horror movie of the year) The Hobbit: An Unexpected Journey (wanted to love it, but it's no LOTR) Jack Reacher I'll probably be the only one (and so be it!) but Expendables 2 was the best for me. I'm an Action movie fan to the core and seeing these guys together (i don't care if they're old timers LoL) in the one film was cool. The Hobbit & The Avengers are another couple that deserve notable mentions. 2012 wasn't a great year for outings to the cinema. Haven't seen Skyfall yet but will try to get to that one so can't obviously include that for 2012. Looking forward to some films in 2013 a bit more (hopefully they don't let me down...) such as Jack Reacher, Pain & Gain, GI Joe, Stand Up Guys, Movie 43, World War Z, Man of Steel, The Last Stand, Snitch... Geez that's a fare few! Pretty sure there will be more...
{ "pile_set_name": "Pile-CC" }
Long Summer Light, Epic Landscapes, Wildlife Action! Southeast Alaska is a land of photo superlatives, from colorful sunrise to magical sunset, the endless opportunities in between will leave even the most seasoned photographer breathless. Every week as the Saltery “C” embarks on a new adventure with a fresh group, the trip script writes itself as we cruise deep into wilderness with no 2 trips being exactly the same in every way. Around every turn of the coastline, behind the next point of land, there is the potential for extraordinary photographic experiences that can’t always be planned, and often exceeds expectations. The excitement never ceases when the scenery changes constantly and wildlife action can appear at any moment! Because Classic Alaska Charters is an overnight charter service we are in no hurry to go anywhere other than where the photographic opportunities, the light, and wildlife, present themselves. Mountains Rise And Waterfalls Pour! Standing on the bow of the Saltery “C” you’ll marvel at the geologic landscape that has been created by volcano’s, heaved by tectonics, weathered by glaciers into sculpted valleys of rock granite walls thousands of feet vertical from saltwater! Waterfalls are gushing from the cliff sides everywhere you look, even more when it rains, and that’s often. Several places there’s chances to pull the boat up and under one of these waterfalls for a unique perspective or to just get wet with the purest water on the planet. The dramatic landscape provides amazing light and shadow shows along with the obvious awe inspiring panorama of a safe anchor spot. Kayaking, exploring a snow cave (early summer) and hiking, provide magnificent views and vistas throughout the day. At night, the stars come out and the sky beckons to night photographers eager to capture the Milky Way, a Blue Moon, or the Aurora Borealis, and perhaps even a meteor shower, typically in August. Some of these events ARE predictable, however, like any great photo shoot it all depends on the weather! Whales, Bald Eagles, And Bears! Humpback whales by the hundreds arrive in the Ketchikan area in early Spring bubble net feeding along the coastline, often breaching playfully, females with calves close to their side, larger groups coordinating their all day feeding frenzy. Just because we anchor up for the night doesn’t mean the photographic action is over either! Often whales come into the secluded coves we nestle the Saltery “C” in and give us a show. Killer whales are frequent visitors to the Southeast Alaska coastal waters too. Following the migrating salmon they forage and feast right up to river mouths in packs often as many as a dozen. Many an encounter with Orca’s (and humpback whales too!) offer jaw dropping once in a lifetime experiences. For professional photographers it could mean a pay day! Amateurs and the novice photographers with camera’s filling the digital albums would be the envy of their peers.Bald eagles are essentially everywhere and any given hour of any day Captain Rob can make a soaring, diving, swooping bald eagle photo shoot happen. There’s hundreds of species of other magnificent birds to photograph that inhabit the wilderness waters we ply. Pacific and red throated loons, marbeled murrelet, pigeon guillemot, rhinoceros auklet, common murre, are frequent sightings for seabirds. Shore, tidal, and upland birds include belted kingfisher, black bellied plover, harlequin duck, water dipper, hummingbirds, thrushes and swallows. Of course, the list goes on… For serious birders we can supply a complete check list upon your arrival to keep track of your amazing sightings. Bears! Black and brown bear are plentiful in the remote wilderness areas of Misty Fiords National Monument Wilderness Area with sightings of them nearly every week. For some serious bear photography Captain Rob can make it happen. Along with the bears wandering the tideflats and estuaries, there’s the Alexander Archipelago Wolves that have emerged from the old growth forest more frequently the last few years. Sitka black tailed deer, harbor seals, and Dall porpoise round out the most frequent cooperating subjects.
{ "pile_set_name": "Pile-CC" }
TNF Block Gene Variants Associate With Pain Intensity in Black Southern Africans With HIV-associated Sensory Neuropathy. HIV-associated sensory neuropathy (HIV-SN) is a common neurological complication of HIV infection, and it is often painful. Tumor necrosis factor (TNF)-α is implicated in neuropathic pain, but associations between neuropathic pain and polymorphisms in the TNFA gene have not been identified. The "TNF block" is a region of high linkage disequilibrium within the central major histocompatability complex that contains several genes involved in the regulation of inflammation, including TNFA. Polymorphisms in the block have been associated with an altered risk of HIV-SN, but no investigations into whether this region is associated with the painful symptoms of neuropathy have been undertaken. Therefore, we investigated whether polymorphisms in the TNF block are associated with pain intensity in black Southern Africans with HIV-SN. Single-nucleotide polymorphisms (SNPs) defining TNF block haplotypes and African-specific tagSNPs were genotyped in samples from 150 black Southern Africans with HIV-SN. One SNP allele, rs28445017*A, was significantly associated with an increased pain intensity after correction for age, sex, and the CD4 T-cell count. A common 3-SNP haplotype containing rs28445017*G remained associated with a reduced pain intensity after correction for covariates and multiple comparisons. We identified a novel genetic association between polymorphisms in the TNF block and the pain intensity in black Southern Africans with HIV-SN. Our study implicates rs28445017 in painful HIV-SN, although its precise role and whether it may be causative is unclear. rs28445017 was not associated with the risk for HIV-SN as such, highlighting potential differences between the pathophysiology of the neuropathy and the painful features of the neuropathy.
{ "pile_set_name": "PubMed Abstracts" }
Inhibition of glycoprotein catabolism in vivo and in the perfused rat liver. Leupeptin is a peptide which inhibits several of the lysosomal proteases. When this compound was added in low concentrations to a perfused liver, the degradation of 125I-asialo-fetuin by the liver was dramatically slowed. When 5 mg leupeptin were added to the perfusate 1 h prior to the radioactive glycoprotein, the liver retained from 70 to 90% or the radioisotope 60 min after infusing 125I-asialo-fetuin. However, untreated livers contained less than 20% of the radioactivity at that time. Subcellular fractionation experiments showed that the radioactivity accumulated in the heavy and light mitochondrial fractions (ML) of the homogenate. At 80 min after the glycoprotein was added, almost 40% of the radioactivity was still located with these fractions. Very similar inhibitory effects were seen upon treating rats intravenously with 5 mg of leupeptin 60 min prior to injection of 125I-labelled asialo-fetuin. A 7 fold increase in liver radioactivity was observed 6 hrs after the glycoprotein had been given to the treated animals. Purified human liver cathepsin B digested fetuin to about 3% of total hydrolysis and the major peptide fragment produced had an SDS-electrophoretic mobility equivalent to that of ovalbumin.
{ "pile_set_name": "PubMed Abstracts" }
RIGHT STEP SIDE, LEFT BEHIND, RIGHT STEP SIDE, LEFT HEEL, LEFT STEP BACK, RIGHT CROSS 1-2 Step right to side, step left behind right &3Step right to side, touch left heel forward &4 Step left back, step right across in front of left LEFT STEP SIDE, RIGHT HEEL, RIGHT STEP BACK, LEFT CROSS, RIGHT STEP SIDE 5-6 Step left to side, touch right heel forward &7 Step right back, step left across in front of right 8-1 Step right to side, Step LEFT behind right LEFT BEHIND, RIGHT STEP SIDE, LEFT HEEL, LEFT STEP BACK, RIGHT CROSS, LEFT TOUCH &2 Step right to side, touch left heel forward &3 Step left back, step right across in front of left 4 Touch left beside right
{ "pile_set_name": "Pile-CC" }
Armchair Gaming Episode 15- Art, Aesthetics and Games Part 3 Welcome to another episode of Armchair Gaming. The goal for this show is simple: I want to help you learn more about philosophy, and I’ll be using video games as an instrument to help teach it. Today we will continue looking at art, Philosophy of Art and the Beautiful while playing Monster Hunter: World. In previous episodes we have looked for philosophical themes in games themselves. In this episode, we will be taking a look at the game industry as a whole, to address the argument of video games as a medium of art. In the last few weeks, we took our first look at whether or not games qualify as art. Being relatively new to human history, relative to other art forms, games have fought for a position in today’s society as more than just an escape from reality. In today’s episode, we will look at how video games have developed in the art community, and how they have changed the topography of the art world forever. About Armchair Gaming I had the chance to explore philosophy in high school and I loved it so much that I went on to study it at Trent University, where I obtained a Bachelor of Arts, majoring in philosophy. I feel so strongly about the subject that I often find myself going through the books I had purchased over my university career, as well as adding to the collection regularly. Philosophy is an amazingly exciting subject that can teach us not just what to think, but how to think. Unfortunately, a lot of people see philosophy as some intimidating monster, with difficult concepts and theories to grasp. Conversely, some see it as a waste of someone’s time and intellect. As someone who has dedicated their life to the subject, this Scholarly Gamer wants to bring philosophy to you in a way that is approachable, sometimes funny, and presented through a medium of great importance to himself and millions of other people around the world: Games. I hope you’ll join us on this journey. And remember, you never go a day in your life without living some philosophy. Sheldon was Born and raised in Canada's Capital City, Ottawa, where he came to love 4 things... Metal, Hockey, Knitting and Gaming. Sheldon has a B.A in philosophy from Trent University, and uses his critical analysis and knowledge from his 4 years accidentally ruining everything for everyone. In his limited spare time, He generally tries to be an upstanding Canadian Citizen SCHOLARS ONLINE With Scholarly Gamers, our team hopes to deliver a reporting platform above and beyond the standard set forth by loads of other media sources. We look to bring about critical thought and examination to a number of themes, technologies, implications, and more when it comes to the games that we share a passion for.
{ "pile_set_name": "Pile-CC" }
Volatile and non-volatile/semi-volatile compounds and in vitro bioactive properties of Chilean Ulmo (Eucryphia cordifolia Cav.) honey. Ulmo honey originating from Eucryphia cordifolia tree, known locally in the Araucania region as the Ulmo tree is a natural product with valuable nutritional and medicinal qualities. It has been used in the Mapuche culture to treat infections. This study aimed to identify the volatile and non-volatile/semi-volatile compounds of Ulmo honey and elucidate its in vitro biological properties by evaluating its antioxidant, antibacterial, antiproliferative and hemolytic properties and cytotoxicity in Caco-2 cells. Headspace volatiles of Ulmo honey were isolated by solid-phase microextraction (SPME); non-volatiles/semi-volatiles were obtained by removing all saccharides with acidified water and the compounds were identified by GC/MS analysis. Ulmo honey volatiles consisted of 50 compounds predominated by 20 flavor components. Two of the volatile compounds, lyrame and anethol have never been reported before as honey compounds. The non-volatile/semi-volatile components of Ulmo honey comprised 27 compounds including 13 benzene derivatives accounting 75% of the total peak area. Ulmo honey exhibited weak antioxidant activity but strong antibacterial activity particularly against gram-negative bacteria and methicillin-resistant Staphylococcus aureus (MRSA), the main strain involved in wounds and skin infections. At concentrations >0.5%, Ulmo honey reduced Caco-2 cell viability, released lactate dehydrogenase (LDH) and increased reactive oxygen species (ROS) production in a dose dependent manner in the presence of foetal bovine serum (FBS). The wide array of volatile and non-volatile/semi-volatile constituents of Ulmo honey rich in benzene derivatives may partly account for its strong antibacterial and antiproliferative properties important for its therapeutic use. Our results indicate that Ulmo honey can potentially inhibit cancer growth at least partly by modulating oxidative stress.
{ "pile_set_name": "PubMed Abstracts" }
[Early parenteral nutrition in complex post-operative periods]. The protein hypercatabolic state in critically ill pediatric patients can be minimized by an effective nutrition therapy. We conducted a study to evaluate the benefits of early parenteral nutrition (EPN) assessing its effect on nutritional parameters and clinical relevance after complex surgical procedures. Prospective randomized study in patients undergoing abdominal surgery in which nothing by mouth is anticipated for a period ≥ 3 days, between 2012 and 2014. Blood tests were performed assessing nutritional parameters in the first 24 hours and the 5th postoperative day. Two groups were created, starting EPN in group A and standard fluid therapy in group B, after the extraction of the first sample. Forty-four patients were included, 18 in group A and 26 in group B. In the first analysis all had decreased levels of prealbumin and retinol-binding protein. On the 5th day, 55,6% of group A normalized prealbumin levels compared to 11,5% of B (p: 0.003, EF = 80%) whereas retinol-binding protein was normalized in 66,7% and 34.6%, respectively (p: 0,07, EF = 48,4%). Three patients in group A (16,7%) had postoperative infectious complications compared to 8 in B (30,8%), difference no statistically significant but clinically relevant (NNT=7,1), since the latter showed low prealbumin levels and longer hospital stay. No complications related to EPN were detected. Administration of EPN in the complex postoperative patients appears to be safe and beneficial for their recovery, being the prealbumin an early indicator of good nutritional response.
{ "pile_set_name": "PubMed Abstracts" }
Q: Injecting JpaRepository directly Im looking for a way intercept all requests going to all the defined methods. (defined=whatever is on the JpaRepository interface). so for example when someone calls repo.findAll() I will be able to run a generic code before and after. (generic=same code of all the entities). So what I did is created a generic class and implemented methods in JpaRepository and then intercept all the requests. @Repository public class BaseJpaRepository<T> implements JpaRepository<T, Long> { @Autowired private JpaRepository<T, Long> repository; @Override public List<T> findAll() { //run some code here List<T> res = repository.findAll(); //run some code here return res; } // all other methods here... } this is the interface to inject into services: @Repository public interface UserRepository extends JpaRepository<UserEntity, Long> { } this is the Bean @Repository public class UserRepositoryBean extends BaseJpaRepository<User> implements JpaRepository<User, Long> { } The problem is that private JpaRepository<T, Long> repository; is not injecting, I assume that this is because spring needs the Entity type in bootstrap time. I also tried to inject explicit type it to the constructor if UserRepositoryBean and pass it to the parent. but its unsatisfied. @Repository public class UserRepositoryBean extends BaseJpaRepository<User> implements JpaRepository<User, Long> { public UserRepositoryBean(JpaRepositry<User, Long> repo){super(repo);} } Any way to intercept all the Spring jpa methods? Thanks A: First you define basic interface that all your custom repositories will be inherited from @NoRepositoryBean interface BaseJpaRepository<T, ID> extends JpaRepository<T, ID> { // You can also declare any generic methods here, // and override (intercept) them in BaseJpaRepositoryImpl as well } And it's implementation as well @NoRepositoryBean class BaseJpaRepositoryImpl<T, ID> extends SimpleJpaRepository<T, ID> implements BaseJpaRepository<T, ID> { public BaseJpaRepositoryImpl(JpaEntityInformation<T, ID> entityInformation, EntityManager em) { super(entityInformation, em); } // One of 'defined' methods inherited from SimpleJpaRepository (and in turn from JpaRepository) @Override public List<T> findAll() { //run some code here List<T> res = super.findAll(); //run some code here return res; } // other 'defined' methods to intercept ... } Your custom repository would then look just as usual except that it is now derived from your BaseJpaRepository interface instead of Spring's JpaRepository @Repository interface UserRepository extends BaseJpaRepository<User, Long> { } To make it all work, let's modify following annotation that is usually placed onto some @Configuration class or onto @SpringBootApplication-ed class @EnableJpaRepositories( basePackages = {"org.example.repositories"}, repositoryBaseClass = BaseJpaRepositoryImpl.class ) P.S. Another viable approach is to use Spring AOP. You can also check out similar Question here
{ "pile_set_name": "StackExchange" }
Andrew Stroup Andrew Myung Stroup (born May 22, 1985) is an engineer and entrepreneur, best known as a participant on the first season of the Discovery Channel's The Big Brain Theory. He currently is the Founder of LVRG. Early life Stroup was born in Seoul, South Korea and at the age of 4 months old, was adopted by an Oklahoma family (David and Jimmye Stroup). He grew up in Sand Springs, a suburb of Tulsa, Oklahoma, where he attended and graduated as Valedictorian from Charles Page High School in 2003. He attended Oklahoma State University and graduated in 2009 with two B.S. degrees in Aerospace Engineering and Mechanical Engineering from the College of Engineering, Architecture, and Technology with focuses in Mathematics and Business Management. During his Senior year (2008-2009) at Oklahoma State University, he co-led Team Black, an engineering team of 15 students, that placed first in the American Institute of Aeronautics and Astronautics Design/Build/Fly competition, hosted in Tucson, Arizona. Career Professional career Starting in 2006, he served as a project engineering manager for BarDyne, Inc., a fluid power engineering and consultant firm based in Stillwater, OK that originated from the Fluid Power Research Center (Oklahoma State University). During this time, he worked with organizations that spanned multiple industries, to include Walt Disney Imagineering, supporting their California Screamin' roller coaster in Anaheim, CA, and General Dynamics Amphibious Systems in Woodbridge, VA on the Expeditionary Fighting Vehicle program, developed for the United States Marine Corps. In 2009, Stroup relocated to Washington, D.C. to serve as a subject-matter expert (SME) defense contractor for the Department of Defense CBRN defense portfolio, specifically on aerospace platform integration efforts, to include the Joint Strike Fighter program. Mid 2011 he joined the Department of Defense civilian workforce through an insourcing initiative, where his roles and responsibilities shifted towards supporting the military medical community and the development of vaccines and drugs as medical countermeasures for the United States Armed Forces. His final position was an Informatics SME and Integration Lead on a White House Presidential Executive Order initiative called Biosurveillance. From October 2012 to March 2015, he served as the CEO of an internet security tech startup called CommonKey that provided a cloud-based identity and access management solution for small and medium enterprises through a software as a service management dashboard paired with a browser extension that provided single sign-on functionality. In June 2014 and until January 2015, Stroup became a co-founder of MegaBots, Inc. where he focused on fluid power design, fabrication, and business development and operations. In March 2015 he became the Director of Product and Technology for the White House Presidential Innovation Fellows, which is a competitive fellowship program that pairs top innovators from the private sector, non-profits, and academia with top innovators in government to collaborate on solutions that aim to deliver significant results in condensed timelines (four to twelve months). Afterwards, he transitioned into the financial services industry when he served as an Entrepreneur in Residence within the Global Information Security organization at Bank of America Merrill Lynch, leading a Technology Strategy and Business Enablement team. Stroup currently serves as the founder and CEO of LVRG, an AI-driven vendor relationship management platform that streamlines enterprise-wide external engagements. Additionally, he serves as an Advisory Board Member at Exygy, Entrepreneur in Residence at Oklahoma State University, Mentor at Entrepreneurs Roundtable Accelerator and Technology and Information Security Advisor for Human Rights Watch. TV career In 2013, Stroup appeared in the first season of Discovery Channel's reality TV series The Big Brain Theory: Pure Genius, an engineering competition consisting of 10 contestants from across the country, which aired from May to June 2013. Each week contestants were put to the test, competing against each other in two teams to design, build, and deliver solutions to difficult engineering problems. He survived six out of eight episodes. To promote the show he appeared in a series of interviews prior to and during the airing of the TV series. Philanthropic interests Stroup, along with Corey Fleischer, another contestant and winner of The Big Brain Theory, and Jason Hardebeck founded the Baltimore Foundery in 2013, a nonprofit organization makerspace (ref hackerspace) that focuses on providing access to industrial grade tools and education in the heart of Baltimore. Additionally, Stroup serves as a Trustee for the Awesome Foundation, which provide small grants for projects to people devoted to forwarding the interest of awesomeness in the universe. References External links Andrew Stroup's CrunchBase profile Category:1985 births Category:Living people Category:American aerospace engineers Category:Oklahoma State University alumni Category:Participants in American reality television series Category:People from Seoul
{ "pile_set_name": "Wikipedia (en)" }
Q: wmd markdown code problem i m using wmd markdown editor in my project and i have a problem with code tags: if i enter a code snippet , markdown does not convert to html correctly it converts in "<p>" tags but if i enter some text else first and then code snippet it converts correctly in "<code>" tags is this a bug of wmd markdown editor? and how can i solve this problem? A: I was actually working on this for my fixed version of WMD edit. Using regex you can quickly lop off the leading and trailing <p> tags which are most notably the causers of a lot of problems: html = html.replace(/^<p>/g, '').replace(/<\/p>$/g, ''); To enforce this in wmd.. (I'm asuming you're using the SO fork of wmd editor) Find this part of the code and change it as follows: var convertToHtml = function(){ if (wmd.showdown) { var markdownConverter = new wmd.showdown.converter(); } var text = inputBox.value; var callback = function(){ inputBox.value = text; }; if (!/markdown/.test(wmd.wmd_env.output.toLowerCase())) { if (markdownConverter) { inputBox.value = markdownConverter.makeHtml(text); // Add this line here: inputBox.value= inputBox.value.replace(/^<p>/g, '').replace(/<\/p>$/g, ''); top.setTimeout(callback, 0); } } return true; }; Untested, but you should get the idea.
{ "pile_set_name": "StackExchange" }
Q: Select all columns of a dataframe as a StructType In pyspark, I have two dataframes, dfA and dfB, with complex schemas. A common column in the schemas is 'time'. I'd like to make a new dataframe that is the union of these two, so that I can sort on time, however I don't want to lose anything in the original dataframes. I can't figure out how to get everything from one of the original dataframes and group it together in a new structType of the union. That is, if I have # dfA root |--time |--fieldA |--fieldB # dfB root |--time |--fieldC |--fieldD I'd like to create a union dataframe that has schema # root |--time |--dfA |--time |--fieldA |--fieldB |--dfB |--time |--fieldC |--fieldD After the union, the fields dfA and dfB will null sometimes, depending on which of the original dataframes the row came from. I imagine I could define the common schema by doing common_schema = T.StructType([T.StructField('time', T.TimestampType()), T.StructField('dfA', dfA.schema, True), T.StructField('dfB', dfB.schema, True)]) But then I get stuck on the syntax for how to select everything from a dataframe as a column. I'm looking for something like commonA = dfA.select('time', F.col('*').alias('dfA')) commonB = dfB.select('time', F.col('*').alias('dfB')) common_df = commonA.union(commonB) But this is an illegal use of '*' A: Select all columns of a dataframe as a StructType from pyspark.sql.functions import struct, lit commonA = dfA.select("time", struct(*[c for c in df.columns]).alias("dfA")) commonB = dfB.select("time", struct(*[c for c in df.columns]).alias("dfB")) but this cannot be unioned as described. You could: commonA_ = commonA.select("time", "dfA", lit(None).cast(dfB.schema).alias("dfB")) commonB_ = commonB.select("time", lit(None).cast(dfA.schema).alias("dfA"), "dfB") commonA_.union(commonB_) but it sounds you are looking for something more like outer join dfA.alias("A").join(dfB.alias("B"), ["time"], "fullouter")
{ "pile_set_name": "StackExchange" }
I have been bugging my Best Buy almost daily for updates and today they informed me that my 168gig is at the store and will be waiting for me as soon as they open. They are only receiving one 128 and one 64 however. I hope that others of you get better news :-! I have still not received any kind of emails from them updating me. I have just been working with a customer service rep in store. Aurora, CO Grats. The thread was made for people who have NOT received the email. We know some people have. No **** Sherlock, you posted that there were people having issues and I was trying to let people know it isn't everyone and that maybe..just maybe there is hope before tomorrow. Go take your frustration out on someone else jackass. No **** Sherlock, you posted that there were people having issues and I was trying to let people know it isn't everyone and that maybe..just maybe there is hope before tomorrow. Go take your frustration out on someone else jackass. Calm down kid. My point is that we already know people are getting their emails. Hence the title saying for people who HAVEN'T.
{ "pile_set_name": "Pile-CC" }
<!DOCTYPE html> <!-- this file is auto-generated. DO NOT EDIT. /* ** Copyright (c) 2012 The Khronos Group Inc. ** ** Permission is hereby granted, free of charge, to any person obtaining a ** copy of this software and/or associated documentation files (the ** "Materials"), to deal in the Materials without restriction, including ** without limitation the rights to use, copy, modify, merge, publish, ** distribute, sublicense, and/or sell copies of the Materials, and to ** permit persons to whom the Materials are furnished to do so, subject to ** the following conditions: ** ** The above copyright notice and this permission notice shall be included ** in all copies or substantial portions of the Materials. ** ** THE MATERIALS ARE PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, ** EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF ** MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. ** IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY ** CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, ** TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE ** MATERIALS OR THE USE OR OTHER DEALINGS IN THE MATERIALS. */ --> <html> <head> <meta charset="utf-8"> <title>WebGL GLSL conformance test: operators_001_to_008.html</title> <link rel="stylesheet" href="../../../../resources/js-test-style.css" /> <link rel="stylesheet" href="../../../resources/ogles-tests.css" /> <script src="../../../../resources/js-test-pre.js"></script> <script src="../../../resources/webgl-test.js"></script> <script src="../../../resources/webgl-test-utils.js"></script> <script src="../../ogles-utils.js"></script> </head> <body> <canvas id="example" width="500" height="500" style="width: 16px; height: 16px;"></canvas> <div id="description"></div> <div id="console"></div> </body> <script> "use strict"; OpenGLESTestRunner.run({ "tests": [ { "referenceProgram": { "vertexShader": "../default/default.vert", "uniforms": { "result": { "count": 1, "type": "uniform4fv", "value": [ 1.0, 1.0, 1.0, 1.0 ] } }, "fragmentShader": "../default/expected.frag" }, "model": null, "testProgram": { "vertexShader": "../default/default.vert", "fragmentShader": "postfixincrement_frag.frag" }, "name": "postfixincrement_frag.test.html", "pattern": "compare" }, { "referenceProgram": { "vertexShader": "../default/default.vert", "uniforms": { "result": { "count": 1, "type": "uniform4fv", "value": [ 1.0, 1.0, 1.0, 1.0 ] } }, "fragmentShader": "../default/expected.frag" }, "model": null, "testProgram": { "vertexShader": "postfixincrement_vert.vert", "fragmentShader": "../default/default.frag" }, "name": "postfixincrement_vert.test.html", "pattern": "compare" }, { "referenceProgram": { "vertexShader": "../default/default.vert", "uniforms": { "result": { "count": 1, "type": "uniform4fv", "value": [ 1.0, 1.0, 1.0, 1.0 ] } }, "fragmentShader": "../default/expected.frag" }, "model": null, "testProgram": { "vertexShader": "../default/default.vert", "fragmentShader": "postfixdecrement_frag.frag" }, "name": "postfixdecrement_frag.test.html", "pattern": "compare" }, { "referenceProgram": { "vertexShader": "../default/default.vert", "uniforms": { "result": { "count": 1, "type": "uniform4fv", "value": [ 1.0, 1.0, 1.0, 1.0 ] } }, "fragmentShader": "../default/expected.frag" }, "model": null, "testProgram": { "vertexShader": "postfixdecrement_vert.vert", "fragmentShader": "../default/default.frag" }, "name": "postfixdecrement_vert.test.html", "pattern": "compare" }, { "referenceProgram": { "vertexShader": "../default/default.vert", "uniforms": { "result": { "count": 1, "type": "uniform4fv", "value": [ 1.0, 1.0, 1.0, 1.0 ] } }, "fragmentShader": "../default/expected.frag" }, "model": null, "testProgram": { "vertexShader": "../default/default.vert", "fragmentShader": "prefixincrement_frag.frag" }, "name": "prefixincrement_frag.test.html", "pattern": "compare" }, { "referenceProgram": { "vertexShader": "../default/default.vert", "uniforms": { "result": { "count": 1, "type": "uniform4fv", "value": [ 1.0, 1.0, 1.0, 1.0 ] } }, "fragmentShader": "../default/expected.frag" }, "model": null, "testProgram": { "vertexShader": "prefixincrement_vert.vert", "fragmentShader": "../default/default.frag" }, "name": "prefixincrement_vert.test.html", "pattern": "compare" }, { "referenceProgram": { "vertexShader": "../default/default.vert", "uniforms": { "result": { "count": 1, "type": "uniform4fv", "value": [ 1.0, 1.0, 1.0, 1.0 ] } }, "fragmentShader": "../default/expected.frag" }, "model": null, "testProgram": { "vertexShader": "../default/default.vert", "fragmentShader": "prefixdecrement_frag.frag" }, "name": "prefixdecrement_frag.test.html", "pattern": "compare" }, { "referenceProgram": { "vertexShader": "../default/default.vert", "uniforms": { "result": { "count": 1, "type": "uniform4fv", "value": [ 1.0, 1.0, 1.0, 1.0 ] } }, "fragmentShader": "../default/expected.frag" }, "model": null, "testProgram": { "vertexShader": "prefixdecrement_vert.vert", "fragmentShader": "../default/default.frag" }, "name": "prefixdecrement_vert.test.html", "pattern": "compare" } ] }); var successfullyParsed = true; </script> </html>
{ "pile_set_name": "Github" }
Copper - Data analysis toolkit for python - dfrodriguez143 http://pypi.python.org/pypi?:action=display&name=copper&version=0.0.2 ====== johncoogan Looks awesome, always love seeing my favorite tools wrapped up in new ways. Thanks a lot for posting. Quick note, since PyPi doesn't seem to parse markdown, the more information link to GitHub is malformed. I believe the plain link will hyperlink automatically. (See <http://scrible.com/s/2acQ2> for details). Thanks again for the package.
{ "pile_set_name": "HackerNews" }
Looking for Melania Penirian? About placeholder profiles You are visiting the placeholder page for Melania Penirian. This page is here because someone used our placeholder utility to look for Melania Penirian. We created this page automatically in hopes Melania Penirian would find it. If you are not Melania Penirian, but are an alumni of Aragon High School, register on this site for free now.
{ "pile_set_name": "Pile-CC" }
Vale Railway The Vale Railway (reporting mark VAEX), formerly the INCO Railway (reporting mark INCX), is an industrial railway operating in the City of Greater Sudbury, Ontario, Canada. It is owned and operated by Vale Limited. An internal, private railway, the line connects Vale's mines and processing plants that dominates the city's skyline. The line serves Copper Cliff North Mine, Copper Cliff South Mine, Creighton Mine, Frood Mine, Stobie Mine, Clarabelle Mill, Copper Cliff Smelter, and Copper Cliff Nickel Refinery. The isolated Levack mine spur in the north end of the city serves Coleman Mine and is operated by the Canadian Pacific Railway. The line was once entirely electrified along its route. Electrification began in 1926, but ended in 2000 in favour of diesel locomotives. The following junctions exist with the line: Canadian Pacific Cartier Subdivision at Sprecher (MP 81.7) where loaded ore cars from Coleman Mine are delivered Canadian Pacific Cartier Subdivision at Levack (MP 102.5) where empty ore cars from Clarabelle Mill are delivered Canadian Pacific Nickel Subdivision at Clarabelle (MP 3.3) where freight is exchanged with both the Canadian Pacific Railway and the Canadian National Railway Canadian Pacific Webbwood Subdivision (leased to Huron Central) at Copper Cliff (MP 4.8) Locomotive roster VAEX rosters 8 re-manufactured EMD GP38-4M locomotives for use on ore trains from the mines, slag trains from the smelter, or for local plant switching of various chemicals and products. These locomotives have upgraded electrical systems and are set up for remote operation. References External links Inco Rail History Railways of Sudbury Category:Ontario railways Category:Industrial railways Category:Rail transport in Greater Sudbury
{ "pile_set_name": "Wikipedia (en)" }
Table of Contents LLVM Update This page summarizes the effort of updating LegUp from LLVM 2.9 to LLVM 3.4. LegUp Source Changes Required LLVM Header Files Moved/Deprecated The following header files have been renamed or removed. The functionality seems identical in most cases. LLVM Objects and Functions Renamed/Deprecated Red highlighting indicates changes that may cause problems, or may not be functionally correct. Yellow highlighting indicates changes that are probably fine, but may need to be double checked. Unhighlighted rows indicate trivial changes that should have little or no effect. Functionality Added to LegUp ConstantDataArray LLVM 3.4 now uses ConstantDataArray in several places where a ConstantArray was used previously. ConstantDataArray support was added to some LegUp files including: Ram.cpp Ram.h GenerateRTL.cpp IterativeModuloScheduling.cpp LegUp Makefile Changes Required llvm-ld Deprecated Use: llvm-link ... llvm-opt -std-link-opts ... instead. Unfortunately llvm-link cannot link archive files, only .bc files. As a result, instead of linking with liblegup.a, libm.a, etc, we need to link with liblegup.bc, libm.bc, etc, which are basically the same thing, just in a different format. llvm-gcc Deprecated llvm-gcc was used for OpenMP support. The LLVM project “dragonegg” can be used instead. dragonegg is a gcc plugin. It will be compiled along with the rest of LegUp. It requires gcc 4.5, 4.6, 4.7, or 4.8, and the corresponding gcc-4.X-plugin-dev package (available using apt-get). The main LegUp Makefile assumes the packages gcc-4.6 and gcc-4.6-plugin-dev are installed. If you wish to use a different version of gcc, you must change the DRAGONEGG variable in legup/examples/Makefile.config and DRAGONEGG_GCC_VERSION in legup/Makefile and recompile LegUp. LLVM Profiling Deprecated Vectorization LLVM 3.4 now produces vectorized code that is not currently supported by LegUp. Adding clang flags -fno-vectorize and -fno-spl-vectorize seems to solve this problem for now. In the future it may be desirable to add this functionality to LegUp in order to obtain more parallel hardware. See LLVM 3.4 Auto-Vectorization for more info. MIPS1 Target Deprecated llc no longer has a backend for mips1. Compiling for mips32 with flags -mno-ldc1-sdc1 -soft-float produces somewhat similar code, but it is still not perfect. An awk command can be used to lower conditional move instructions, and add a nop after each lw. Also, the LLVM mips backend was modified to not produce DSP instructions. This seems to work well enough that the mips binutils can assemble working binaries for Tiger. Changes Required to LegUp Examples Disable LegUp Features It was necessary to disable LOCAL_RAMS for the following benchmarks: chstone/blowfish chstone/gsm It was necessary to disable GROUP_RAMS_SIMPLE_OFFSET for the following benchmarks: chstone/jpeg Other chstone_hybrid/dfsin: the linker complains about multiple definitions of 'sin' when linking with libm.bc. sin() was renamed to dfsin() to fix this problem. use_begin iterator is now user_begin. Don't use the use_ iterators directly any more. Use is now a bookkeeping helper class for the User class. See:
{ "pile_set_name": "Pile-CC" }
Structured white light scanning of rabbit Achilles tendon. The cross-sectional area (CSA) of a material is used to calculate stress under load. The mechanical behaviour of soft tissue is of clinical interest in the management of injury; however, measuring CSA of soft tissue is challenging as samples are geometrically irregular and may deform during measurement. This study presents a simple method, using structured light scanning (SLS), to acquire a 3D model of rabbit Achilles tendon in vitro for measuring CSA of a tendon. The Artec Spider™ 3D scanner uses structured light and stereophotogrammetry technologies to acquire shape data and reconstruct a 3D model of an object. In this study, the 3D scanner was integrated with a custom mechanical rig, permitting 360-degree acquisition of the morphology of six New Zealand White rabbit Achilles tendons. The reconstructed 3D model was then used to measure CSA of the tendon. SLS, together with callipers and micro-CT, was used to measure CSA of objects with a regular or complex shape, such as a drill flute and human cervical vertebra, for validating the accuracy and repeatability of the technique. CSA of six tendons was measured with a coefficient of variation of less than 2%. The mean CSA was 9.9±1.0mm2, comparable with those reported by other researchers. Scanning of phantoms demonstrated similar results to μCT. The technique developed in this study offers a simple and accurate method for effectively measuring CSA of soft tissue such as tendons. This allows for localised calculation of stress along the length, assisting in the understanding of the function, injury mechanisms and rehabilitation of tissue.
{ "pile_set_name": "PubMed Abstracts" }
ABOUT SPATIALLY HEALTH We are a team of data scientists, healthcare professionals and accomplished startup veterans. The relentless pursuit of data truth unifies our diverse backgrounds, and places the power of spatial intelligence at your fingertips. OUR VISION We believe people have the right to live in dignity and to fulfill their human-centric needs. Spatial analytics reveal the underlying connections and relationships behind why people and communities interact with health choices the way they do. At Spatially, our mission is to help shape the future of healthcare by emphasizing this human-centric approach. Spatially Health starts by thinking proactively, not reactively, about the potential of streamlined, spatial-based data. We believe that addressing the first mile — instead of the last — in the customer journey is integral to dignified, individualized healthcare. Join us as we develop and deliver real-world analysis, providing the analytics that drive population evaluations, model strategic initiatives and interventions, and predict better outcomes.
{ "pile_set_name": "Pile-CC" }
--[[ 文件:classical-ai.lua 主题:经典战术 ]]-- --[[ PART 00:常用工具函数 ]]-- --判断卡牌的花色是否相符 function MatchSuit(card, suit_table) if #suit_table > 0 then local cardsuit = card:getSuit() for _,suit in pairs(suit_table) do if cardsuit == suit then return true end end end return false end --判断卡牌的类型是否相符 function MatchType(card, type_table) if type(suit_table) == "string" then type_table = type_table:split("|") end if #type_table > 0 then for _,cardtype in pairs(type_table) do if card:isKindOf(cardtype) then return true end end end return false end --[[ PART 01:3V3经典战术 内容:黄金一波流、绝情阵 ]]-- --黄金一波流-- --相关信息 sgs.GoldenWaveDetail = { KurouActor = {}, --苦肉执行者 YijiActor = {}, --遗计执行者 JijiuActor = {}, --急救执行者 EruptSignal = {}, --起爆信号(五谷丰登中,急救执行者得到的红色牌) } --判断是否使用黄金一波流 function GoldenWaveStart(self) local huanggai = self.player local room = huanggai:getRoom() sgs.GoldenWaveDetail.EruptSignal = {} if huanggai:hasSkill("kurou") then local guojia, huatuo if #self.friends_noself > 1 then for _,friend in pairs(self.friends_noself) do if friend:hasSkill("yiji") then guojia = friend elseif friend:hasSkill("jijiu") then huatuo = friend else room:setPlayerMark(friend, "GWF_Forbidden", 1) end end end if guojia and huatuo then sgs.GoldenWaveDetail.KurouActor = {huanggai:objectName()} sgs.GoldenWaveDetail.YijiActor = {guojia:objectName()} sgs.GoldenWaveDetail.JijiuActor = {huatuo:objectName()} room:setPlayerMark(huanggai, "GoldenWaveFlow", 1) room:setPlayerMark(guojia, "GoldenWaveFlow", 1) room:setPlayerMark(huatuo, "GoldenWaveFlow", 1) return true else sgs.GoldenWaveDetail.KurouActor = {} sgs.GoldenWaveDetail.YijiActor = {} sgs.GoldenWaveDetail.JijiuActor = {} room:setPlayerMark(huanggai, "GWF_Forbidden", 1) return false end end room:setPlayerMark(huanggai, "GWF_Forbidden", 1) return false end --黄金苦肉 function GWFKurouTurnUse(self) local huanggai = self.player local released = sgs.GoldenWaveDetail.EruptSignal["Released"] if released then if self.getHp() > 1 then return sgs.Card_Parse("@KurouCard=.") end else return sgs.Card_Parse("@KurouCard=.") end end --黄金遗计 function GWFYijiAsk(player, card_ids) local guojia = self.player local released = sgs.GoldenWaveDetail.EruptSignal["Released"] local huanggai = sgs.GoldenWaveDetail.KurouActor[1] local huatuo = sgs.GoldenWaveDetail.JijiuActor[1] if released then for _,id in ipairs(card_ids) do return huanggai, id end else for _,id in ipairs(card_ids) do local card = sgs.Sanguosha:getCard(id) if MatchType(card, "Crossbow|AOE|Duel") then return huanggai, id elseif card:isRed() and huatuo:isAlive() then return huatuo, id else return huanggai, id end end end end --黄金急救 function GWFJijiuSignal(card, player, card_place) local huatuo = player if #EruptSignal > 0 then if card:getId() == EruptSignal[1] then local cards = player:getCards("he") for _,id in sgs.qlist(cards) do if id ~= EruptSignal[1] then local acard = sgs.Sanguosha:getCard(id) if acard:isRed() then return false end end end sgs.GoldenWaveDetail.EruptSignal["Released"] = card:getId() end end return true end --命苦的郭嘉(未完成) --绝情阵 --相关信息 sgs.RuthlessDetail = { JianxiongActor = {}, --奸雄执行者 TianxiangActor = {}, --天香执行者 YijiActor = {}, --遗计执行者 } --判断是否使用绝情阵 function RuthlessStart(self) local caocao = self.player local room = caocao:getRoom() if caocao:hasSkill("jianxiong") then local xiaoqiao, guojia if #self.friends_noself > 1 then for _,friend in pairs(self.friends_noself) do if friend:hasSkill("yiji") then guojia = friend elseif friend:hasSkill("tianxiang") then xiaoqiao = friend else room:setPlayerMark(friend, "RL_Forbidden", 1) end end end if xiaoqiao and guojia then sgs.RuthlessDetail.JianxiongActor = {caocao:objectName()} sgs.RuthlessDetail.TianxiangActor = {xiaoqiao:objectName()} sgs.RuthlessDetail.YijiActor = {guojia:objectName()} room:setPlayerMark(caocao, "Ruthless", 1) room:setPlayerMark(guojia, "Ruthless", 1) room:setPlayerMark(xiaoqiao, "Ruthless", 1) return true else sgs.RuthlessDetail.JianxiongActor = {} sgs.RuthlessDetail.TianxiangActor = {} sgs.RuthlessDetail.YijiActor = {} room:setPlayerMark(caocao, "RL_Forbidden", 1) return false end end room:setPlayerMark(caocao, "RL_Forbidden", 1) return false end --绝情天香 function RLTianxiangSkillUse(self, data) local xiaoqiao = self.player local caocao = sgs.RuthlessDetail.JianxiongActor[1] local damage = data if damage then local aoe = damage.card if aoe and aoe:isKindOf("AOE") then local handcards = self.player:getCards("h") handcards = sgs.QList2Table(handcards) self:sortByUseValue(handcards, true) for _, id in ipairs(handcards) do local suit = card:getSuit() if suit == sgs.Card_Heart or (xiaoqiao:hasSkill("hongyan") and suit == sgs.Card_Spade) then return "@TianxiangCard="..id.."->"..caocao:objectName() end end end end end --绝情遗计 function RLYijiAsk(player, card_ids) local guojia = self.player local caocao = sgs.RuthlessDetail.JianxiongActor[1] local xiaoqiao = sgs.RuthlessDetail.TianxiangActor[1] for _,id in ipairs(card_ids) do local card = sgs.Sanguosha:getCard(id) if MatchType(card, "Crossbow|AOE|Duel|ExNihilo|Peach") then return caocao, id else local hearts = {sgs.Card_Heart, sgs.Card_Spade} if MatchSuit(card, hearts) and xiaoqiao:isAlive() then return xiaoqiao, id else return caocao, id end end end end --[[ PART 02:KOF经典战术 内容:苦肉一波带、控底爆发 ]]-- --苦肉一波带-- --判断是否使用苦肉一波带 function KOFKurouStart(self) local others = self.room:getOtherPlayers(self.player) if others:length() == 1 then local enemy = others:first() if self:hasSkills("fankui|guixin|fenyong|zhichi|jilei", enemy) then self:speak("不行,这家伙不好对付,慢苦为妙。") self.room:setPlayerMark(self.player, "KKR_Forbidden", 1) return false end self:speak("看我大苦肉一波带走!") self.room:setPlayerMark(self.player, "KOFKurouRush", 1) return true end return false end --一波苦肉 function KOFKurouTurnUse(self) local huanggai = self.player if huanggai:getHp() > 1 then return sgs.Card_Parse("@KurouCard=.") end if self:getCardsNum("Analeptic") + self:getCardsNum("Peach") > 0 then return sgs.Card_Parse("@KurouCard=.") end end --控底爆发-- --相关信息 sgs.KOFControlType = {} --起爆卡牌的类型 sgs.KOFControlSuit = {} --起爆卡牌的花色 sgs.KOFControlResult = {} --控底结果 sgs.KOFControlDetail = { --爆发详细信息 EruptSkill = {}, --待爆发技能名 MaxInterval = {}, --爆发时可容忍的两起爆卡牌间间隔 ControlFinished = {} --爆发结束标志 } --判断是否使用控底爆发战术 function KOFControlStart(player) local room = player:getRoom() if player:hasSkill("guanxing") or player:hasSkill("super_guanxing") then local tag = player:getTag("1v1Arrange") if tag then local followList = tag:toStringList() if followList then if #followList > 0 then local follow = 1 for _,name in ipairs(followList) do local general = sgs.Sanguosha:getGeneral(name) local flag = false if general:hasSkill("luoshen") then sgs.KOFControlSuit = {sgs.Card_Spade, sgs.Card_Club} sgs.KOFControlDetail.EruptSkill = {"luoshen"} sgs.KOFControlDetail.MaxInterval = {0} sgs.KOFControlDetail.ControlFinished = {false} flag = true elseif general:hasSkill("jizhi") then sgs.KOFControlType = {"TrickCard"} sgs.KOFControlDetail.EruptSkill = {"jizhi"} sgs.KOFControlDetail.MaxInterval = {1} sgs.KOFControlDetail.ControlFinished = {false} elseif general:hasSkill("xiaoji") then sgs.KOFControlType = {"EquipCard"} sgs.KOFControlDetail.EruptSkill = {"xiaoji"} sgs.KOFControlDetail.MaxInterval = {2} sgs.KOFControlDetail.ControlFinished = {false} elseif general:hasSkill("guhuo") then sgs.KOFControlSuit = {sgs.Card_Heart} sgs.KOFControlDetail.EruptSkill = {"guhuo"} sgs.KOFControlDetail.MaxInterval = {1} sgs.KOFControlDetail.ControlFinished = {false} elseif general:hasSkill("caizhaoji_hujia") then sgs.KOFControlSuit = {sgs.Card_Heart, sgs.Card_Diamond} sgs.KOFControlDetail.EruptSkill = {"caizhaoji_hujia"} sgs.KOFControlDetail.MaxInterval = {0} sgs.KOFControlDetail.ControlFinished = {false} flag = true end if #sgs.KOFControlType > 0 or #sgs.KOFControlSuit > 0 then room:setPlayerMark(player, "KOFControl", follow) if flag then room:setPlayerMark(player, "StrictControl", 1) end return true end follow = follow + 1 end end end end end room:setPlayerMark(player, "KFC_Forbidden", 1) return false end --执行控底观星 function KOFGuanxing(self, cards) local up = {} local bottom = {} local strict = self.player:getMark("StrictControl") > 0 for _,id in pairs(cards) do local card = sgs.Sanguosha:getCard(id) if MatchSuit(card, sgs.KOFControlSuit) or MatchType(card, sgs.KOFControlType) then --相符 if card:isKindOf("Peach") then --相符,但是桃子 if self:isWeak() then --相符、桃子、虚弱 table.insert(up, id) else --相符、桃子、不虚弱 table.insert(bottom, id) table.insert(sgs.KOFControlResult, id) self.room:setPlayerMark(self.player, "KOFInterval", 0) end else --相符、不是桃子 table.insert(bottom, id) table.insert(sgs.KOFControlResult, id) self.room:setPlayerMark(self.player, "KOFInterval", 0) end elseif strict then --不相符,严格 table.insert(up, id) elseif card:isKindOf("Crossbow") then --不相符、不严格、诸葛连弩 table.insert(bottom, id) table.insert(sgs.KOFControlResult, id) local marks = self.player:getMark("KOFInterval") self.room:setPlayerMark(self.player, "KOFInterval", marks+1) else --不相符、不严格、不为诸葛连弩 local marks = self.player:getMark("KOFInterval") local maxInterval = sgs.KOFControlDetail.MaxInterval[1] if maxInterval and marks < maxInterval then --不相符、不严格、不为诸葛连弩、间隔较小 local value = sgs.ai_use_value[card:objectName()] if value and value > 4 then --不相符、不严格、不为诸葛连弩、间隔较小、使用价值高 table.insert(bottom, id) table.insert(sgs.KOFControlResult, id) self.room:setPlayerMark(self.player, "KOFInterval", marks+1) else --不相符、不严格、不为诸葛连弩、间隔较小、使用价值低 table.insert(up, id) end else --不相符、不严格、不为诸葛连弩、间隔较大 table.insert(up, id) end end end return up, bottom end --判断中间武将是否需要让路(待完善) function KOFNeedDeath(player) return false end --[[ PART X:控制总部 ]]-- sgs.classical_func = {} function Tactic(skillname, self, data) local func = sgs.classical_func[skillname] if func then return func(self, data) end end --观星 sgs.classical_func["guanxing"] = function(self, up_only) if not up_only then if self.player:getMark("KFC_Forbidden") == 0 then if self.player:getMark("KFC_Control") > 0 then return KOFGuanxing end if KOFControlStart(self.player) then return KOFGuanxing end end end end --苦肉 sgs.classical_func["kurou"] = function(self, data) local mode = string.lower(self.room:getMode()) if mode == "02_1v1" then if self.player:getMark("KOFKurouRush") > 0 then return KOFKurouTurnUse elseif self.player:getMark("KKR_Forbidden") == 0 then if KOFKurouStart(self) then return KOFKurouTurnUse end end elseif mode == "06_3v3" then if self.player:getMark("GoldenWaveFlow") > 0 then return GWFKurouTurnUse elseif self.player:getMark("GWF_Forbidden") == 0 then if GoldenWaveStart(self) then return GWFKurouTurnUse end end end end --遗计 sgs.classical_func["yiji"] = function(self, data) local mode = string.lower(self.room:getMode()) if mode == "06_3v3" then if self.player:getMark("GoldenWaveFlow") > 0 then return GWFYijiAsk elseif self.player:getMark("Ruthless") > 0 then return RLYijiAsk end end end --急救 sgs.classical_func["jijiu"] = function(self, data) local mode = string.lower(self.room:getMode()) if mode == "06_3v3" then if self.player:getMark("GoldenWaveFlow") > 0 then return GWFJijiuSignal end end end --天香 sgs.classical_func["tianxiang"] = function(self, data) local mode = string.lower(self.room:getMode()) if mode == "06_3v3" then if self.player:getMark("Ruthless") > 0 then return RLTianxiangSkillUse end end end
{ "pile_set_name": "Github" }
AWAR – The Catch Up AWAR has been setting recording booths on fire, especially with his most recent work, The Winning Team, his collaborative album with producer Vanderslice. Whether killing verses alongside Freddie Gibbs or Roc Marciano or holding it down solo on tracks like “Orange Boxcutter,” AWAR continued to cement his place in the game as a real lyricist. In our latest episode of The Catch Up, AWAR takes us through some of his most recent cuts, as well as songs from his catalogue that helped get him to where he is now. Packed with insightful stories about his journey as an MC, how certain songs came together, and stories behind his rhymes, this episode of The Catch Up will only make you more of a fan of the one and only AWAR.
{ "pile_set_name": "Pile-CC" }
Direct Bindings and Interposition Interposition can occur when multiple instances of a symbol, having the same name, exist in different dynamic objects that have been loaded into a process. Under the default search model, symbol references are bound to the first definition that is found in the series of dependencies that have been loaded. This first symbol is said to interpose on the other symbols of the same name. Direct bindings can circumvent any implicit interposition. As the directly bound reference is searched for in the dependency associated with the reference, the default symbol search model that enables interposition, is bypassed. In a directly bound environment, bindings can be established to different definitions of a symbol that have the same name. The ability to bind to different definitions of a symbol that have the same name is a feature of direct binding that can be very useful. However, should an application depend upon an instance of interposition, the use of direct bindings can subvert the applications expected execution. Before deciding to use direct bindings with an existing application, the application should be analyzed to determine whether interposition exists. To determine whether interposition is possible within an application, use lari(1). By default, lari conveys interesting information. This information originates from multiple instances of a symbol definition, which in turn can lead to interposition. Interposition only occurs when one instance of the symbol is bound to. Multiple instances of a symbol that are called out by lari might not be involved in interposition. Other multiple instance symbols can exist, but might not be referenced. These unreferenced symbols are still candidates for interposition, as future code development might result in references to these symbols. All instances of multiply defined symbols should be analyzed when considering the use of direct bindings. If multiple instances of a symbol of the same name exist, especially if interposition is observed, one of the following actions should be performed. Localize symbol instances to remove namespace collision. Remove the multiple instances to leave one symbol definition. Define any interposition requirement explicitly. Identify symbols that can be interposed upon to prevent the symbol from being directly bound to. The following sections explore these actions in greater detail. Localizing Symbol Instances Multiply defined symbols of the same name that provide different implementations, should be isolated to avoid accidental interposition. The simplest way to remove a symbol from the interfaces that are exported by an object, is to reduce the symbol to local. Demoting a symbol to local can be achieved by defining the symbol “static”, or possibly through the use of symbol attributes provided by the compilers. A symbol can also be reduced to local by using the link-editor and a mapfile. The following example shows a mapfile that reduces the global function error() to a local symbol by using the local scoping directive. Although individual symbols can be reduced to locals using explicit mapfile definitions, defining the entire interface family through symbol versioning is recommended. See Chapter 5, Interfaces and Versioning. Versioning is a useful technique typically employed to identify the interfaces that are exported from shared objects. Similarly, dynamic executables can be versioned to define their exported interfaces. A dynamic executable need only export the interfaces that must be made available for the dependencies of the object to bind to. Frequently, the code that you add to a dynamic executable need export no interfaces. The removal of exported interfaces from a dynamic executable should take into account any symbol definitions that have been established by the compiler drivers. These definitions originate from auxiliary files that the compiler drivers add to the final link-edit. See Using a Compiler Driver. The following example mapfile exports a common set of symbol definitions that a compiler driver might establish, while demoting all other global definitions to local. You should determine the symbol definitions that your compiler driver establishes. Any of these definitions that are used within the dynamic executable should remain global. By removing any exported interfaces from a dynamic executable, the executable is protected from future interposition issues than might occur as the objects dependencies evolve. Removing Multiply Defined Symbols of the Same Name Multiply defined symbols of the same name can be problematic within a directly bound environment, if the implementation associated with the symbol maintains state. Data symbols are the typical offenders in this regard, however functions that maintain state can also be problematic. In a directly bound environment, multiple instances of the same symbol can be bound to. Therefore, different binding instances can manipulate different state variables that were originally intended to be a single instance within a process. For example, suppose that two shared objects contain the same data item errval. Suppose also, that two functions action() and inspect(), exist in different shared objects. These functions expect to write and read the value errval respectively. With the default search model, one definition of errval would interpose on the other definition. Both functions action() and inspect() would be bound to the same instance of errval. Therefore, if an error code was written to errval by action(), then inspect() could read, and act upon this error condition. However, suppose the objects containing action() and inspect() were bound to different dependencies that each defined errval. Within a directly bound environment, these functions are bound to different definitions of errval. An error code can be written to one instance of errval by action() while inspect() reads the other, uninitialized definition of errval. The outcome is that inspect() detects no error condition to act upon. Multiple instances of data symbols typically occur when the symbols are declared in headers. int bar; This data declaration results in a data item being produced by each compilation unit that includes the header. The resulting tentative data item can result in multiple instances of the symbol being defined in different dynamic objects. However, by explicitly defining the data item as external, references to the data item are produced for each compilation unit that includes the header. extern int bar; These references can then be resolved to one data instance at runtime. Occasionally, the interface for a symbol implementation that you want to remove, should be preserved. Multiple instances of the same interface can be vectored to one implementation, while preserving any existing interface. This model can be achieved by creating individual symbol filters by using a FILTERmapfile keyword. This keyword is described in SYMBOL_SCOPE / SYMBOL_VERSION Directives. Creating individual symbol filters is useful when dependencies expect to find a symbol in an object where the implementation for that symbol has been removed. For example, suppose the function error() exists in two shared objects, A.so.1 and B.so.1. To remove the symbol duplication, you want to remove the implementation from A.so.1. However, other dependencies are relying on error() being provided from A.so.1. The following example shows the definition of error() in A.so.1. A mapfile is then used to allow the removal of the error() implementation, while leaving a filter for this symbol that is directed to B.so.1. The function error() is global, and remains an exported interface of A.so.2. However, any runtime binding to this symbol is vectored to the filtee B.so.1. The letter “F” indicates the filter nature of this symbol. This model of preserving existing interfaces, while vectoring to one implementation has been used in several Oracle Solaris libraries. For example, a number of math interfaces that were once defined in libc.so.1 are now vectored to the preferred implementation of the functions in libm.so.2. Defining Explicit Interposition The default search model can result in instances of the same named symbol interposing on later instances of the same name. Even without any explicit labelling, interposition still occurs, so that one symbol definition is bound to from all references. This implicit interposition occurs as a consequence of the symbol search, not because of any explicit instruction the runtime linker has been given. This implicit interposition can be circumvented by direct bindings. Although direct bindings work to resolve a symbol reference directly to an associated symbol definition, explicit interposition is processed prior to any direct binding search. Therefore, even within a direct binding environment, interposers can be designed, and be expected to interpose on any direct binding associations. Interposers can be explicitly defined using the following techniques. With the LD_PRELOAD environment variable. With the link-editors -z interpose option. With the INTERPOSEmapfile keyword. As a consequence of a singleton symbol definition. The interposition facilities of the LD_PRELOAD environment variable, and the -z interpose option, have been available for some time. See Runtime Interposition. As these objects are explicitly defined to be interposers, the runtime linker inspects these objects before processing any direct binding. Interposition that is established for a shared object applies to all the interfaces of that dynamic object. This object interposition is established when a object is loaded using the LD_PRELOAD environment variable. Object interposition is also established when an object that has been built with the -z interpose option, is loaded. This object model is important when techniques such as dlsym(3C) with the special handle RTLD_NEXT are used. An interposing object should always have a consistent view of the next object. A dynamic executable has additional flexibility, in that the executable can define individual interposing symbols using the INTERPOSEmapfile keyword. Because a dynamic executable is the first object loaded in a process, the executables view of the next object is always consistent. The following example shows an application that explicitly wants to interpose on the exit() function. The letter “I” indicates the interposing nature of this symbol. Presumably, the implementation of this exit() function directly references the system function _exit(), or calls through to the system function exit() using dlsym() with the RTLD_NEXT handle. At first, you might consider identifying this object using the -z interpose option. However, this technique is rather heavy weight, because all of the interfaces exported by the application would act as interposers. A better alternative would be to localize all of the symbols provided by the application except for the interposer, together with using the -z interpose option. However, use of the INTERPOSEmapfile keyword provides greater flexibility. The use of this keyword allows an application to export several interfaces while selecting those interfaces that should act as interposers. Symbols that are assigned the STV_SINGLETON visibility effectively provide a form of interposition. See Table 12-20. These symbols can be assigned by the compilation system to an implementation that might become multiply instantiated in a number of objects within a process. All references to a singleton symbol are bound to the first occurrence of a singleton symbol within a process.
{ "pile_set_name": "Pile-CC" }
Q: Determine whether a Python function is already implemented in C extension Suppose I have a Python program that runs slow- after profiliing and I have identified the bottleneck. One particular function from a 3rd party module I imported is particularly slow. For this particular case, I know that function is implemented in Python (Used Eclipse and it's easy to jump to the function definition). So I know that I can convert that function into Cython as a speed-up option. (If it is already implemented in C, there is no point in writing it in Cython...). If I don't have an IDE, what would be an easy option to determine this? I know that I can go to the directory where the module is installed and infer that it is in C if the module is in .so. But is there any alternative? Thanks A: Check whether it is an instance of types.FunctionType: >>> import types >>> isinstance(len, types.FunctionType) False >>> def mylen(): pass ... >>> isinstance(mylen, types.FunctionType) True Probably you'd be safer to check for isinstance(X, (types.FunctionType, types.LambdaType). C functions are instances of builtin_function_or_method: >>> len.__class__ <type 'builtin_function_or_method'> >>> np.vdot.__class__ <type 'builtin_function_or_method'> You can access this type as types.BuiltinFunctionType/types.BuiltinMethodType. Alternatively you can check whether the function has a __code__ attribute. Since C functions do not have bytecode, they can't have __code__. Note sometimes what seems like a function is actually a class, e.g. enumerate but some 3rd party library may do the same. This means that you should also check whether a class is implemented in C or not. This one is harder since all classes are instances of type. A way may be to check whether the class has a __dict__ in its dir, and if it doesn't have you should check for __slots__. Something like the following should be pretty accurate: def is_implemented_in_c(obj): if isinstance(obj, (types.FunctionType, types.LambdaType)): return False elif isinstance(obj, type): if '__dict__' in dir(obj): return False return not hasattr(obj, '__slots__') # We accept also instances of classes. # Return True for instances of C classes, False for python classes. return not isinstance(obj, types.InstanceType) Example usage: >>> is_implemented_in_c(enumerate) True >>> is_implemented_in_c(len) True >>> is_implemented_in_c(np.vdot) True >>> is_implemented_in_c(lambda x: True) False >>> is_implemented_in_c(object) True >>> class A(object): ... __slots__ = ('a', 'b') ... >>> is_implemented_in_c(A) False
{ "pile_set_name": "StackExchange" }
In the spectacular pre-title credits opening sequence, Agent 007 James Bond (Roger Moore) was pursued by four machine gun-wielding Russian KGB agents in an exciting ski-chase down a steep slope in the Austrian Alps. In the opening scene, the existential hero simply named the Driver (Ryan O'Neal) stole a prospective client's 4-door Mercedes V-8 Sedan and then auditioned his skills. He showed the three terrified bad guys how talented he was as a freelance, ace getaway driver/wheelman for bank heists. He plowed through a cramped, underground parking garage and narrow alleyways in LA to demonstrate his prowess and prove that he was worth every penny of his high-priced fee. The film had three spectacular car chase sequences as well (including a night-time chase through LA). Hooper (1978) In a film filled with stunts and daredevil challenges, a car driven by stuntman Sonny Hooper (Burt Reynolds) drove through a collapsing factory (and barely missed its falling chimney) and made a rocket-propelled leap over a 456' chasm over a river where a bridge used to be before it collapsed. In the final hour of this 11th James Bond film, agent 007 (Roger Moore) ventured to the Amazonian jungle in Brazil, where he was pursued in his armored Glastron Hydrofoil Speedboat on the Tapirape River by henchman sent by villainous billionaire industrialist Hugo Drax (Michael Lonsdale). They launched an armed attack on his craft with explosive depth charges. From the rear of his boat, Bond deployed mines, blowing up one boat and killing three thugs. As he raced forward, two other boats joined in the pursuit - one held steel-toothed Jaws (Richard Kiel) who was wielding a machine-gun. Bond then launched torpedoes from his speedboat, and destroyed a second boat with three men onboard. When Bond's speedboat approached the massive Iguacu Falls, he escaped death when he launched himself from his speedboat onto a hang glider that was deployed from the craft's roof - and he soared away to safety. Jaws (with two other thugs) in the last boat crashed over the falls. The Blues Brothers (1980) Cool ex-con, renegade musicians named the Blues Brothers - who were "on a mission from God" - were siblings, who both wore black suits, hats, and shades: Joliet "Jake" Blues (John Belushi) Elwood Blues (Dan Aykroyd) In one of the comedy film's earlier scenes, there was an incredible jump over an open drawbridge [the 95th Street bridge] ("This car's got some pickup"), then a spectacular chase through an entire indoor shopping mall in the Chicago area [the former Dixie Square Mall] - when they were pursued by state police in their Bluesmobile (a converted 1974 Dodge Monaco police cruiser sedan), with dozens of crashes through store windows (J. C. Penney's, Toys R Us, etc.) - that sent shoppers fleeing. In the last half hour of the film, they sped 106 miles in their car toward downtown Chicago while pursued by lots of squad cars, with a maniacal death-defying chase that reportedly had the largest number of car crashes (demolition derby style) in film history. One police car ended up crashing into the side of a freight truck ("We're in a truck!"). At the conclusion, the two - driving at 120 mph at times - plowed their vehicle through a flock of pigeons and a crowd of pedestrians and into the lobby of the Richard J. Daley Center municipal building at Daley Plaza. Once they had reached their final destination, their car literally collapsed and completely fell apart after they stepped out of it. [Mack Sennett's The Keystone Kops short films were an inspiration for this film.] The Cannonball Run (1981) Here was another chase film from Hal Needham (similar to his earlier The Gumball Rally (1976)), featuring a cross-country, car-crashing road-race from Connecticut to Southern California with the tagline: "You'll never guess who wins."
{ "pile_set_name": "Pile-CC" }
HomeUncategorizedObserve your dog obey all orders by using a good dog training collar Observe your dog obey all orders by using a good dog training collar While your family dog might have turned into the apple of your eyes, he or she also needs appropriate training and you can easily observe your dog abide by all of the commands by using a good dog training collar Http://dogbadge.com. There are several kinds of training collars available for dogs of all age groups, shapes, as well as sizes and you ought to choose one that suits your beloved pet and also fits within your budget. Dogs have been domesticated over centuries by man and also numerous training methods have been refined over the years to exercise better control over all of them. A training collar can help train your dog very quickly and also hold her or him in hand too. There are several types of collars to pick from including choke training collars which are also known as chain collars, martingale collars, prong collars, as well as remote training collars or even electronic training collars, which feature that latest within electronic technology. Traditional training collars that involve choke collar training probably won’t appeal to you given that this involves tightening of the chain around your dogs neck in case he or she becomes overactive as well as tries to tug hard on the leash. A copyrighted variant that is similar to the principle of the choke training collar is definitely the good dog training collar. This inventive collar features ridges situated on the inside of the dog collar that are connected together through tiny links that can be added or even taken out depending on the dimensions of the dogs neck. This particular training collar has two loops at each end that are attached to a free-sliding leash. This kind of design ensures that the dog collar tightens across the neck of your dog in a very accurate and delicate manner if she or he tries to distance themself from you as well as relaxes the moment she or he comes back towards you. This specific training collar is an inexpensive way of coaching your pet dog quickly and your pet dog will definitely stop pulling at the leash within a very short period of time. On the other hand, if you wish to control your dog remotely or perhaps wish to coach your own hunting dog from afar then you can certainly opt for another form of good dog training collar that is available in the form of remote training collars or even electronic training collars. You should use the corresponding e-collar as a hunting dog training collar or simply to coach your own domesticated pet, based on your particular requirements. These collars include a remote transmitter that will remain in your hand along with a receiver fitted on the collar of the dog. You’ll be able to send electrical stimulation as well as beeps or even use vibrations through varying strengths to manage your dog. These collars usually have a range between about half and one mile although higher end versions even feature GPS tracking of your dog. You can browse between numerous models of dogtra training collars as well as sportdog training collars that are made by dogtra and sportdog, two of the very best respected manufacturers of remote control training collars. If you’d like your pet dog to consistently act just like a good dog as well as stay in your control at all times then you definitely have to start using the best possible training collar to coach her or him with ease. You can undoubtedly watch your dog obey all of the commands by using a good dog training collar that enables you to coach your beloved family dog in a very gentle way. Related Articles Embroidery badges can be made at home. You simply need some imagination and creativity and you can make customized badges yourself that won’t only be prominent but will also enable you to get a large […] When you’d like to spice up a piece of clothing, accessory, luggage piece or even hats you can sew on badges to have the fresh look easily. Badges or patches when placed strategically can immediately […]
{ "pile_set_name": "Pile-CC" }
Due to the heavy storms this month several cities in TX, and several parishes in LA, have been declared Disaster areas. Because of this, those area have a filing deadline of July 15, 2016. If you have already filed your 2015 tax return, you have the option to amend...
{ "pile_set_name": "Pile-CC" }
// // detail/winrt_ssocket_service.hpp // ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ // // Copyright (c) 2003-2015 Christopher M. Kohlhoff (chris at kohlhoff dot com) // // Distributed under the Boost Software License, Version 1.0. (See accompanying // file LICENSE_1_0.txt or copy at http://www.boost.org/LICENSE_1_0.txt) // #ifndef ASIO_DETAIL_WINRT_SSOCKET_SERVICE_HPP #define ASIO_DETAIL_WINRT_SSOCKET_SERVICE_HPP #if defined(_MSC_VER) && (_MSC_VER >= 1200) # pragma once #endif // defined(_MSC_VER) && (_MSC_VER >= 1200) #include "asio/detail/config.hpp" #if defined(ASIO_WINDOWS_RUNTIME) #include "asio/error.hpp" #include "asio/io_service.hpp" #include "asio/detail/addressof.hpp" #include "asio/detail/winrt_socket_connect_op.hpp" #include "asio/detail/winrt_ssocket_service_base.hpp" #include "asio/detail/winrt_utils.hpp" #include "asio/detail/push_options.hpp" namespace clmdep_asio { namespace detail { template <typename Protocol> class winrt_ssocket_service : public winrt_ssocket_service_base { public: // The protocol type. typedef Protocol protocol_type; // The endpoint type. typedef typename Protocol::endpoint endpoint_type; // The native type of a socket. typedef Windows::Networking::Sockets::StreamSocket^ native_handle_type; // The implementation type of the socket. struct implementation_type : base_implementation_type { // Default constructor. implementation_type() : base_implementation_type(), protocol_(endpoint_type().protocol()) { } // The protocol associated with the socket. protocol_type protocol_; }; // Constructor. winrt_ssocket_service(clmdep_asio::io_service& io_service) : winrt_ssocket_service_base(io_service) { } // Move-construct a new socket implementation. void move_construct(implementation_type& impl, implementation_type& other_impl) { this->base_move_construct(impl, other_impl); impl.protocol_ = other_impl.protocol_; other_impl.protocol_ = endpoint_type().protocol(); } // Move-assign from another socket implementation. void move_assign(implementation_type& impl, winrt_ssocket_service& other_service, implementation_type& other_impl) { this->base_move_assign(impl, other_service, other_impl); impl.protocol_ = other_impl.protocol_; other_impl.protocol_ = endpoint_type().protocol(); } // Move-construct a new socket implementation from another protocol type. template <typename Protocol1> void converting_move_construct(implementation_type& impl, typename winrt_ssocket_service< Protocol1>::implementation_type& other_impl) { this->base_move_construct(impl, other_impl); impl.protocol_ = protocol_type(other_impl.protocol_); other_impl.protocol_ = typename Protocol1::endpoint().protocol(); } // Open a new socket implementation. clmdep_asio::error_code open(implementation_type& impl, const protocol_type& protocol, clmdep_asio::error_code& ec) { if (is_open(impl)) { ec = clmdep_asio::error::already_open; return ec; } try { impl.socket_ = ref new Windows::Networking::Sockets::StreamSocket; impl.protocol_ = protocol; ec = clmdep_asio::error_code(); } catch (Platform::Exception^ e) { ec = clmdep_asio::error_code(e->HResult, clmdep_asio::system_category()); } return ec; } // Assign a native socket to a socket implementation. clmdep_asio::error_code assign(implementation_type& impl, const protocol_type& protocol, const native_handle_type& native_socket, clmdep_asio::error_code& ec) { if (is_open(impl)) { ec = clmdep_asio::error::already_open; return ec; } impl.socket_ = native_socket; impl.protocol_ = protocol; ec = clmdep_asio::error_code(); return ec; } // Bind the socket to the specified local endpoint. clmdep_asio::error_code bind(implementation_type&, const endpoint_type&, clmdep_asio::error_code& ec) { ec = clmdep_asio::error::operation_not_supported; return ec; } // Get the local endpoint. endpoint_type local_endpoint(const implementation_type& impl, clmdep_asio::error_code& ec) const { endpoint_type endpoint; endpoint.resize(do_get_endpoint(impl, true, endpoint.data(), endpoint.size(), ec)); return endpoint; } // Get the remote endpoint. endpoint_type remote_endpoint(const implementation_type& impl, clmdep_asio::error_code& ec) const { endpoint_type endpoint; endpoint.resize(do_get_endpoint(impl, false, endpoint.data(), endpoint.size(), ec)); return endpoint; } // Set a socket option. template <typename Option> clmdep_asio::error_code set_option(implementation_type& impl, const Option& option, clmdep_asio::error_code& ec) { return do_set_option(impl, option.level(impl.protocol_), option.name(impl.protocol_), option.data(impl.protocol_), option.size(impl.protocol_), ec); } // Get a socket option. template <typename Option> clmdep_asio::error_code get_option(const implementation_type& impl, Option& option, clmdep_asio::error_code& ec) const { std::size_t size = option.size(impl.protocol_); do_get_option(impl, option.level(impl.protocol_), option.name(impl.protocol_), option.data(impl.protocol_), &size, ec); if (!ec) option.resize(impl.protocol_, size); return ec; } // Connect the socket to the specified endpoint. clmdep_asio::error_code connect(implementation_type& impl, const endpoint_type& peer_endpoint, clmdep_asio::error_code& ec) { return do_connect(impl, peer_endpoint.data(), ec); } // Start an asynchronous connect. template <typename Handler> void async_connect(implementation_type& impl, const endpoint_type& peer_endpoint, Handler& handler) { bool is_continuation = clmdep_asio_handler_cont_helpers::is_continuation(handler); // Allocate and construct an operation to wrap the handler. typedef winrt_socket_connect_op<Handler> op; typename op::ptr p = { clmdep_asio::detail::addressof(handler), clmdep_asio_handler_alloc_helpers::allocate( sizeof(op), handler), 0 }; p.p = new (p.v) op(handler); ASIO_HANDLER_CREATION((p.p, "socket", &impl, "async_connect")); start_connect_op(impl, peer_endpoint.data(), p.p, is_continuation); p.v = p.p = 0; } }; } // namespace detail } // namespace clmdep_asio #include "asio/detail/pop_options.hpp" #endif // defined(ASIO_WINDOWS_RUNTIME) #endif // ASIO_DETAIL_WINRT_SSOCKET_SERVICE_HPP
{ "pile_set_name": "Github" }
Erich Emminger Erich Emminger (25 June 1880 – 30 August 1951) was a German lawyer and Catholic politician of the Center Party (Zentrum) and later of the Bavarian People's Party (BVP). He served as Minister of Justice in the Weimar Republic from 30 November 1923 until 15 April 1924 under Chancellor Wilhelm Marx. Early life Erich Emminger was born on 25 June 1880 in Eichstätt, Bavaria. His parents were Johann Adolf Erich Emminger (1856-1909), a Gymnasialprofessor, and his wife Marie Therese (1854–99), née Müller, daughter of an Augsburg notary. Emminger married Maria Schärft in 1906. Their children included Otmar Emminger, future president of the Deutsche Bundesbank. Following his training as a lawyer at Münster, Emminger practiced law at Augsburg (1906–08) and Nuremberg (1908–09). In 1909 he became a civil servant (state prosecutor and Amtsrichter). He participated in World War I first as a voluntary soldier and later as a Kriegsgerichtsrat (military judge). Political career Emminger was a member of the Catholic Center Party (Zentrum)and, from 1913-18 held a seat in the Reichstag for the constituency of Weilheim. In 1918, he joined the Bavarian People's Party (BVP) and represented it in the Reichstag 1920-33. Emminger was Minister of Justice in the first cabinet of chancellor Wilhelm Marx, which took office on 30 November 1923. His tenure was defined by the passage of three decrees of 22 December 1923, 4 January and 13 February 1924, which were based on the of 8 December 1923. These significantly changed civil and criminal law and the judiciary system with an eye towards speeding up proceedings. The reform of 4 January became known as the so-called Emminger Reform that among other things abolished the jury as trier of fact and replaced it with a mixed system of judges and lay judges in Germany's judiciary which still exists today. Schwurgerichte (formerly based on jurors) kept their name but were in fact replaced by lay judges. Since the reforms were successful, they were kept in place by later legislation once the enabling law had lapsed. Late 1923 was among the most tumultuous times of the Weimar Republic, bringing the peak of hyperinflation and the ongoing Occupation of the Ruhr. One of Emminger's main goals as a politician and lawyer became a revaluation of the currency to partially offset the adverse social consequences of hyperinflation. As a minister he prevented the planned Aufwertungsverbot from becoming law and continued to fight for revaluation as a Reichstag delegate. Emminger left office on 15 April 1924 and his Secretary of State, Curt Joël, took over as acting Minister of Justice. He remained a member of the Rechtsausschuss of the Reichstag and 1927-31 served as chairman of the Zentralvorstand der deutsch-österreichischen Arbeitsgemeinschaft which worked towards a harmonisation of German and Austrian laws. He also contributed to a reform of the criminal law. Emminger was re-elected to the Reichstag in 1933 but the Nazi takeover ended his political activities. He worked as a judge at the Oberste Landesgericht of Bavaria in 1931-35 and then at the Oberlandesgericht. From 1946 until his retirement in July 1949, he was Senatspräsident there. Emminger died in Munich on 30 August 1951. Publications Die Aufwertungsfrage im aufgelösten Reichstage, 1924 References External links Erich Emmminger at the Akten der Reichskanzlei online version (German) Bio of Erich Emminger in a databank on (Imperial) Reichstag delegates (German) More biographical information on Erich Emminger, Datenbank der deutschen Parlamentsabgeordneten (German) Category:1880 births Category:1951 deaths Category:People from Eichstätt Category:People from the Kingdom of Bavaria Category:German Roman Catholics Category:Centre Party (Germany) politicians Category:Bavarian People's Party politicians Category:Justice ministers of Germany Category:Members of the 13th Reichstag of the German Empire Category:Members of the Reichstag of the Weimar Republic
{ "pile_set_name": "Wikipedia (en)" }
Encyclopedia of Anti-Revisionism On-Line Progressive Workers Movement On the Question of Liu Shao-chi First Published:Progressive Worker [Canada] Vol. 4, No. 5, March 1968Transcription, Editing and Markup: Malcolm and Paul SabaCopyright: This work is in the Public Domain under the Creative Commons Common Deed. You can freely copy, distribute and display this work; as well as make derivative and commercial works. Please credit the Encyclopedia of Anti-Revisionism On-Line as your source, include the url to this work, and note any of the transcribers, editors & proofreaders above. The Belgian journal, La Voix du Peuple, has given considerable attention of late to a speech by Sidney Rittenberg, an American who has lived in China for more than 20 years. An extremely long article purporting to be a criticism of the Rittenburg lecture has extended over a number of issues during November, December and January. Criticism of Rittenburg is the stated aim but the authors appear to have a much more sinister objective in mind. Rittenburg spoke to a Peking meeting sponsored by a group known as the “Bethune-Yenan Rebel Regiment”, apparently composed in the main of foreign experts working in China. This event took place in April 1967 and the address was subsequently mineographed and distributed abroad in Belgium (in French) and in England ( in English), under the title “Liu Shao-ehi and His Evil Book”. Copies of the speech together with articles attacking its main content have been received in Canada and we propose to comment on the lengthy polemic which appeared in La Voix du Peuple. While we might be disposed to be somewhat critical of Rittenburg’s speech for being poorly constructed, not too carefully prepared and containing some careless formulatons, we are in agreement with its basic content in criticizing and repudiating the bourgeois-reactionary line of Liu Shao-chi and upholding the proletarian-revolutionary line of Mao Tse-tung. However, the Belgian trio of Jacques Grippa, Rene Raindorf and Stephen Strulens who are of the opposite opinion, in reply to Rittenburg’s 40 to 50 minute speech inscribed a, reply that would fill a good-sized book. The extreme length of this literary attack is largely caused by the authors’ ranging far beyond the limits of the Rittenburg speech which did not provide them with sufficient scope for the objective they had in mind. In order to correct this situaton Rittenburg is charged with not saying certain things, and the things which were not said provide the main basis for the attack. The authors list a total of ten so-called “omissions” in the speech: “ . .. no denunciation of American fascist imperialism”; “... no analysis of the social base of social-democratic reformism and revisionism”; “... no analysis of the contradictions in the contemporary world or the role of fundamental contradiction”; “nothing about revolutionary movements for national liberation”; “no reference to the contradictions between imperalists and revisionists on the one hand and socialist countries on the other hand”; “no allusion to the new stage of working class struggle ... in imperialist countries”; “nothing ... on the subject of contradictions between the capitalists and between the imperalists”; “no reminder of the essential nature of our period as Lenin and other Marxist-Leninists have defined it”; “nothing . . . which recalls that this is a period during which imperialism will be destroyed and the proletarian revolution victorious”; “These ’omissions’ suggest strange conclusions about the real world ...” If these alleged “omissions” had been discussed, several days would have been added to a 50 minute speech. But let us leave it to the authors themselves to make reply to their charges of “omissions”. In part four of their literary marathon, having ’forgotten what they had written several weeks previous, the authors, criticizing Rittenburg, unwittingly supplied their own answer to the false cry of ’omissions”; as follows: “It is also necessary to refute the false argument that is purely and simply a diversion and consists of saying that How to be a Good Communist does not deal with such and such a question. With that reasoning no Marxist-Leninist work except a complete encyclopedia would be of any value.” That is fitting enough reply – nothing need be added. However, we did not take up the pen to defend Rittenberg; the relentless attack on his speech is but the prologue to the real aim of his detractors – a covert attack on Chairman Mao Tse-tung and the Proletarian Cultural Revoluton in China, an attack masked by vehement declarations of loyalty to Marxist-Leninist principles and with loud cries of “long live Mao Tse-tung.” But not every shouter of slogans is a Marxist-Leninist and the lengthy article in La Voix du Peuple is a prime example of that point. In part 2 of the article we read: “...the Marxist-Leninists of the world have always contributed new jewels to the common treasure of Marxist-Leninist thought, as Mao Tse-tung has done so brilliantly in many areas.” We have no desire to disparge the contributions of many working-class journalists around the world, (including our own modest effort), who work under difficult and trying circumstances. But we cannot agree that the vast and important contributions to Marxist-Leninist theory and practice made by the chief architect and leader of the Chinese Revolution are to be considered in the same light, for what the authors imply here is that Mao Tse-tung is just another contributor instead of presenting him in the proper light as the equal of Marx, Engels, and Lenin, the one who advances the work begun by these brilliant minds. Mao Tse-tung has brilliantly applied and developed Marxism-Leninism in the era of the final defeat of imperialism and of victorious proletarian revolution, and particularly in solving the problem of how to carry on the proletarian revolution under the dictatorship of the proletariat – a task which Marx, Lenin, and Engels could not, and did not carry out. To downgrade the great contribution of Mao Tse-tung as la Voix du Peuple does means denying the authority of Marxist-Leninist thought in our day, it means lowering the banner of revolution. The thought of Mao Tse-tung is not just one more of many contributions, it IS Marxism-Leninism in our time and upholding Marxism-Leninism, defending the proletarian revolution and proletarian dictatorship requires that revolutionaries uphold and defend the authority of the thought of Mao Tse-tung. The above-quoted passage fails in this respect – it lowers the banner of the thought of Mao Tse-tung, hence it lowers the banner of proletaian revolution in the world. The “Center” of Revolution When representatives of the Progressive Workers Movement returned from a trip to China last year, they stated: The outcome of the struggle now taking place will determine the future destiny of China and will exercise a decisive influence on the whole world because, as far as the present era is concerned, it is China that plays the really decisive role in the world. It is China that is the decisive factor so far as revolution, not only in China but in the world, is concerned. We can say with confidence there will be hope in the world so long as China does not fall and does not change its colour. The Great Proletarian Cultural Revolution is an event of vast importance which has a vital bearing on the destiny of the whole of mankind (Progressive Worker, Vol.3, No.9, July, 1967). The passage of time and events have not caused us to alter our opinion. On the contrary, we are now more firmly convinced that the consolidation of the proletarian dictatorship and winning new victories in the Cultural Revolution in China constitute objectives that are of supreme importance to the cause of the anti-imperialist struggle and the world revolution. From the contents of the article in la Voix du Peuple it appears that Grippa, Raindorf and Streulens are far from agreeing with us. Rittenberg, after commenting on the revisionist seizure of power in the Soviet Union, went on to say: Was that going to happen in China? Were they going to take down the picture of Chairman Mao that hangs over the Tien An Men gate tower one day? Were they going to announce that China would not be the center of world revolution, that China will cease and desist from giving unstinted aid to the embattled peoples of all countries, particularly of Asia, Africa and Latin America in return for false assurances of peace and moderation from the imperialists. Taking a distorted version of this passage as their point la Voix du Peuple presents an argument that conveys the impression that the defeat of the Chinese Revolution would be but a minor tragedy. Here, in part, is la Voix du Peuple rebuttal to Rittenberg: For us Marxist-Leninists, the Soviet Union was for a long time the only socialist country, the only one where the victorious proletarian revolution showed the way...and constituted a powerful force for the proletarian world revolution... When the revisionists usurped power in the U.S.S.R., we were not for long disoriented and discouraged – we did not feel we had lost our ’center’. We considered this setback, this temporary defeat of the Russian Revolution, just as a setback, a check for ourselves and for the world revolution, a regrettable mishap for class struggle on a world scale, but we preserved intact our fighting will... When the Chinese revolution was victorious and the People’s Republic of China was proclaimed we saluted that victory, considered it as our own... (Part 3). Ignoring for the moment the all-too-casual way in which the Russian Revolution is written off, and the very low estimate of the extent of that defeat, let us examine its meaning as it applies to China for it is the very obvious intention of la Voix du Peuple that it is intended to convey their opinion of a possible defeat in China. According to these writers, then, the downfall of the Chinese Revolution would be “just a setback”, a “check”, a “regrettable mishap for the class struggle” that would make no substantial difference to the world Marxist-Leninist movement and the anti-imperialist struggle. Apparently we can depend on the editors of La Voix du Peuple to “preserve intact their fighting will”, step into the breach and challenge international reaction led by U.S. imperialism and aided by Soviet revisionism. With all due respect to La Voix du Peuple we simply cannot buy their theory. For us the Chinese revolution is a subject of outstanding importance the defeat of which could never be written off as a “regrettable mishap.” Certainly struggle would go on. It is inevitable that struggle will continue, but under what vastly altered and unfavourable circumstances! It would take nothing away from the outstanding heroism of the Vietnamese people, nor would we be underestimating their brilliant application of, and contribution to the strategy and tactics of peoples war, to say that, without revolutionary China as their firm and reliable rear, their struggle would be infinitely more difficult, if not impossibe in its present highly-developed form. Without China, Soviet revisionist and treachery pressure to yield imperialist blackmail would go unchallenged. It is not without significance that it is in Southeast Asia where the Chinese revolution has the greastest influence, and not in the Middle East or Latin America, that U.S. imperialism is meeting its most formidable challenge just now. Are we not justified in believing that had China fallen to the revisionists the anti-imperialist struggle in Vietnam and elsewhere would not now be in its present highly-developed form? If that diaster had occured the counter-revolutionary policy of peaceful co-existence with the imperialists, and not that of the revolutionary anti-imperialist peoples war, would be the dominant characteristic in the world in this period. Should we, then accept the opinion that this would be only a “regrettable mishap.” We cannot accept the way in which La Voix du Peuple presents the sequence of events quoted above. It happens that the Russian revolution suffered a “regrettable mishap” following which the courageous editors of the Belgium journal “preserved intact their fighting will, the determination to struggle”, then, happily, along came the Chinese Revolution which the editors “claimed as their own.” We have not such short memories. We will remember that the Chinese revolution was victorious for some seven years before the outright seizure of power by the Kruschovites and that it was the Chinese Party that was in the lead in exposing that betrayal by the revisionists. We know that it was still another seven years, in 1963, before Grippa and his colleagues effected an organizational break with the revisionists in Belgium. Had there been no Red China to stand against and expose revisionist treachery the struggle to build a Marxist-Leninist movement would have been more difficult. In his preface to the second edition of The Peasant in Germany Engels said of the German workers: “If the German workers proceed in this way, they not march exactly at the head of the movement – it is not in the interests of the movement that the workers of one country should march at the head of all – but they will occupy an honourable place on the battle line, and they will stand armed for battle when other unexpected grave trials or momentuous events will demand heightened courage heightened determination, and the will to act”, and further on in the preface, they “form the vanguard of the proletarian struggle.” What could be said of the German workers a century ago, without state power in their confrontation with reaction is a thousand times more applicable to China today. The working people of China certainly occupy an honourable place in the battle line, and those who have been privileged to see China in these days of victory in the Cultural Revolution know that the Chinese people, mobilized around the revolutionary banner of Mao Tse-tung, stand armed for battle when grave trials or momentuous events demand heightened courgae. The Book of Liu Shao-chi The true extent of La Voix du Peuple becomes clear in Part 4 which appeared in the issue of December 1st. Rittenberg’s speech is but the means to an end, that end being defence of the book by Liu Shao-chi. This fact is established in the very first phrase when Rittenberg’s criticism of How to be a Good Communis is referred to as “vituperations against the book by Liu Shao-chi”. This categorical rejection of any criticism of the book is made still clearer later when Rittenberg’s critical remarks are classed as, “frantic attacks against Marxist-Leninist parties”, “a peridious campaign against Marxism-Leninism”, “an anti Marxist-Leninist counter-revolutionary line”, etc. Repudiation of the line of Liu Shao-chi is discribed as an “invention of Rittenberg and his masters” used with the “intention of destroying Marxist-Leninist parties by any means.” La Voix du Peuple makes numerous allusions to “Rittenberg, his masters and agents” with the obvious intention of having all criticism of Liu Shao-chi and his book automatically associated with an alleged international counter-revolutionary conspiracy. In this way the authors of the article strive to suppress criticism of the line of Liu Shao-chi and, at the same time, give their actions the appearance of defending Marxism-Leninism. If Rittenberg does have “masters and agents” they must total in the hundreds of millions – presently engaged in sharp criticism and repudiation of the line of Liu Shao-chi. This repudiation of Liu Shao-chi and his book is an important part of the Cultural Revolution, and a fact which cannot help but be known to La Voix du Peuple. One of the authors, Stephen Strulens, arrived in China last spring apparently there to discuss some questions in connection with the Rittenberg speech. We met Strulens and his companion at the Shanghai Airport and spent several hours with them there. We were with them when airport workers gave a concert featuring the thought of Mao Tse-tung by means of song and dance – one encounters these impromptu concerts all over China. Propaganda teams of the thought of Mao Tse-tung can be found in all corners of the land and they number in the millions. In unison with the working masses of China these teams raise the cry “Down with Liu Shao-chi and his evil book.” Strulens witnessed this phenomena at Shanghai and when we saw him again on our return to Peking we know he could not fail to see millions of workers repeating the slogan in the great square at Tien An Men, not far from the Hotel Peking. Strulens, therefore, could not fail to observe that “Down with Liu Shao-chi and the capitalist roaders” was the demand of millions and not a plot devised by a small band of counter-revolutionary conspirators. Strulens must have communicated this fact to his colleagues. What purpose do they have, then, in attempting to have this appear as an “invention of Rittenberg, his masters and his agents”? They can have only one aim in view – rehabilitation of the bourgeois-reactionary line of Liu Shao-chi as sumanzed in his book How to be a Communist La Voix du Peuple gives an edited and abbreviated version of the following passage from Rittenberg’s speech: “ the poison smuggled into the Communist movement by Liu Shao-chi and the representatives of his line, particularly reflected in his book, must be eradicated, not only in China, but throughout the revolutionary movement. Otherwise, it will be impossible to really establish a proletarian revolutionary line and carry the revolution forward to victory.” Responding to this la Voix du Peuple says: “Rittenberg his masters and agents have thrown their ultimate to Marxist-Leninist: those who do not yell ’Down with Liu Shao-chi and his book How to be a Good Communist’ become ’false revolutionaries,’ ’revisionists,’ ’counter revolutionaries.’” This type of ’reply’ only amounts to an evasion of the real point at issue by a resort to invective. If Rittenberg is justified in his criticism of the book – and we agree he is – then those who do not join in repudiating it are false revolutionaries and revisionists, and resorting to invective connot erase that fact. Again it is evident La Voix du Peuple is anxious to defend Liu Shao-chi by any avaible means. Following the above passage the editors express righteous indignation over an “order” said to have come from Ritenberg: “... at their order, our Party is supposed to serviley reject, totally, on the spot, with no discussion, a book which for all this time has been considered good...” There is no part of Rittenberg’s speech which could possibly be interpreted as an order to servilely reject anything. As for “no discussion”, the editors of la Voix du Peuple must surely know that Liu Shao-chi and his book have been important items for discussion for many months and that numerous articles and pamphlets on the subject have been published in many languages. If there has been no discussion of this question in Belgium then the fault rests with the Belgian movement for failing to read, study, and discuss the wealth of material and information available. And if there has been no discussion, as the above quotation clearly indicates, on what did la Voix du Peuple base their decision to reject Rittenberg’s thesis and defend the book by Liu Shao-chi? It seems they have decided to accept the line of Liu Shao-chi “with no discussion”. That the authors of the article in la Voix du Peuple do defend How to be a Good Communist is not in doubt as the following passage form Part 4 will demonstrate: Rittenberg condemns How to be a Good Communist because it mentions nowhere the problem of taking revolutionary power. This is not true. Not only does the whole book deal with the education of the Communist Party, of the cadre in the revolutionary struggle, thus implying the necessity of the taking of power by the proletariat allied to the other classes of the labouring population, that is to say the dictatorship of the proletariat, but also deals explicitly with the fundamental question of power, in relation to the deportment of Communists. It is significant that the authors are unable to quote Liu Shao-chi DIRECTLY on the dictatorship of the proletariat, but, in giving the lie to Rittenberg, are limited to making the unsubstantiated claim that Liu Shao-chi IMPLIES the necessity of taking power, which can be considered as no more than an opinion of the editors, and a very unreliable one at that. The truth is that How to be a Good Communist, first published in China in 1939, and revised and republished many times thereafter until 1962, maintains total silence on the proletarian dictatorship. (First published in the fierce struggle of the anti-Japanese war, it never once touched upon that conflict until the 1962 edition, long after the war, when a brief reference to it was thrown in). Liu Shao-chi simply describes the state as “centralized and at the same time democratic” and nowhere mentions the necessity for dictatorship over the class enemy. What is that but the Kruschovite “state of the whole people”? However it is not necessary for us to enter into an endless debate over this question of implicit or explicit references to proletarian power for it is easy to establish the fact that Liu Shao-chi not only does not mention the subject but actually eliminates all references to it in every one of the many editions issued since 1939. In 1962 – the year of the most recent edition (English edition 1964) – the question of proletarian power was under sharp attack from the revisionists led by the Soviet ruling clique, therefore Marxist-Leninists were duty-bound to rise in defence of this concept which is central to Marxism-Leninism. Yet Liu Shao-chi continued to erase it from his book. On pages 40 and 41 (1961 English edition) Liu Shao-chi cites two passages from Left-Wing Communism by Lenin but he eliminates important sections from the body of each quotation. In the quotation on Page 40 the following section is excluded: The dictatorship of the proletariat is a persistent struggle – bloody and bloodless, violent and peaceful, military and economic, educational and administrative – against the forces and traditions of the old society... Without an iron party tempered in the struggle, without a party enjoying the confidence of all that is honest in the given class, without a party capable of watching and influencing the mood of the masses, it is impossible to conduct such a struggle successfully. And on Page 41 we find the following excluded from the quotation from Lenin: “The dictatorship of the proletariat is essential.” So we can see clearly that Liu Shao-chi ELIMINATED all references to proletarian dictatorship when he “quoted” from Lenin and made no reference to the subject himself. Was this just an oversight, an accident repeated in each new and revised edition of How to be a Good Communist? How could any Marxist-Leninist possibly overlook the all-important question of proletarian power? It is not Rittenberg but the editors of la Voix du Peuple who are wrong about Liu Shao-chi failing to deal with the dictatorship of the proletariat. And in view of the charge by la Voix du Peuple that “Rittenberg and his masters” are trying to destroy the Marxist-Leninist movement it is significant that Liu Shao-chi erases Lenin’s reference to the type of party required UNDER THE DICTATORSHIP OF THE PROLETARIAT. The Belgian article states: “Engels, Lenin and Stalin ought to disappear according to Rittenberg”. This is to our way of thinking a completely unjustified accusation, all the more slanderous in view of the failure to point out how Liu Shao-chi did, in fact, cause Engels and Stalin to disappear. In all the editions of his book until 1962 Liu Shao-chi wrote: “be the best pupils of Marx, Engels, Lenin and Stalin” and quoted three passages from Chapter Four of the History of the CPSU. But in nineteen-sixty-two, he revised this to read: “Be worthy pupils of Marx and Lenin” and deleted entirely the passages previously quoted from the History of the CPSU. To do this in nineteen-sixty-two could only mean conforming to the wishes and needs of the Soviet revisionists who attacked Stalin to destroy Marxism-Leninism. In order to delete the name of Stalin he made Engels a co-victim with him. For us the evidence seems clear and irrefutable: Liu Shao-chi opposes proletarian dictatorship and the party of a revolutionary type which Lenin fought for and Mao Tse-tung did so much to build in China. In Conclusion We have not exhausted the subject of Liu Shao-chi whose activities range well beyond those dealt with here. There is a lot of material available which can be obtained from Advance Books and Periodicals, Neither have we dealt completely with the lengthy article in la Voix du Peuple. We feel however, that we are justified in drawing the conclusion that the editors of la Voix du Peuple are committed to defending the bourgeois-reactioary line of Liu Shao-chi and are intent on making it appear that criticism of Liu Shao-chi is an attack on the Communist Party and the thought of Mao Tse-tung. But these two are representatives of two fundamentally different lines which cannot be reconciled. Liu Shao-chi represents the counter-revolutionory line of the bourgeois while Mao Tse-tung represents the proletarian revolutionary line. One must choose between these two. The Central Committee and the vast majority of cadres and Party members, together with the Chinese masses, guided by the thought of Chairman Mao, are criticizing and repudiating the reactionary line of Liu Shao-chi who is the top party person in authority taking the capitalist road. The speech by Rittenberg, as we have noted above, might justifiably be criticized for its style and some careless formulations. But this is not what the editors of la Voix du Peuple are concerned with. On the basic point of repudiating Liu Shao-chi and defending Mao Tse-tung Rittenberg is correct. But it is precisely against this correct point that the attack is directed. It is clear that the authors, behind the screen of a pretended attack on Rittenberg, are in reality mounting an attack on Mao Tse-tung and the Proletarian Cultural Revolution. We firmly state our opposition to the line advanced by La Voix du Peuple, which we consider to be pointing a revisionist course and, in essence, counter-revolutionary. We take our stand now, as always, on the side of Chair Mao Tse-tung and China’s Great Proletarian Cultural Revolution.
{ "pile_set_name": "Pile-CC" }
Associated Co-operative Creameries Associated Co-operative Creameries (ACC), formerly CWS Milk Group, was a subsidiary and operating division of the Co-operative Group. Associated Co-operative Creameries Limited is an industrial and provident society that was first registered in 1961, and became a subsidiary of the North Eastern Co-operative Society (NECS), a large regional consumer co-operative based in Gateshead. It became one of the largest milk processors and distributors in north-east England. After NECS merged with the Co-operative Wholesale Society (CWS, now the Co-operative Group) in 1992, Associated Co-operative Creameries absorbed CWS Milk Group, a milk processor and distributor based in Wales and north west England. The abbreviated trading name ACC was adopted in 2001 when the milk and distribution operations were split. By 2004, Associated Co-operative Creameries Limited, trading as ACC Milk, was the UK's fourth largest dairy business, when it was sold to yet another co-operative, Dairy Farmers of Britain of Nantwich, Cheshire, forming Britain's largest milk co-operative, and the UK's third largest milk processor. ACC moved its registered address to Nantwich at that time. ACC Distribution was the logistics division of The Co-operative Group and supplied not only stores belonging to The Co-operative Group itself but other co-operative societies. ACC Distribution is still owned by the Co-operative Group and is today known as Co-operative Retail Logistics. References Category:Former co-operatives of the United Kingdom Category:Agricultural marketing cooperatives Category:Dairy products companies of the United Kingdom Category:The Co-operative Group
{ "pile_set_name": "Wikipedia (en)" }
The direct line to Brown University students and the Brown way of life: brought to you by Brown University Admissions Office From Albania to Zimbabwe: My Very First Halloweekend Hi there! My name is Akira Camargo, a freshman hailing from Tokyo, Japan who will try to crack funny jokes and puns from time to time as I write posts for From Albania to Zimbabwe, the ins and outs of being at Brown from an international student’s perspective. Through my posts, you’ll be able to learn more about all things international here, ranging from international events at Brown (cool guest speakers, festivals and parties) to my thoughts on living in America for the first time (!!!), and a bunch of other interesting stuff as my first year at Brown unfolds. Hope you enjoy reading them! Happy November! I hope all of you had a great one. For those of you applying to colleges, the Early Decision deadline just passed…! I congratulate those of you who submitted your first college application! That’s a commendable honor. I remember exactly a year ago, I was in my high school library looking over my Brown application and hitting submit while my friend Sumika (who also got admitted to Brown and is in the above photo on the left) did a last-minute run through of my essays. It’s really weird to think how much my life has changed in just a year. Spooky… Speaking of spooky, Halloweekend is just making its final run at Brown. I dressed up with all of my friends, had a lot of fun at some awesome Halloween-themed parties and I am now procrastinating from all the work I didn’t do this week. Anyway, this was my first Halloween in America and in college, and I must say, WOW. I was overwhelmed by the enthusiasm and passion everyone had with regards to what costume they wanted to wear, what parties to go to and much much more. Back at home, we really didn’t do much for Halloween except for Trick-or-Treating when I was younger, so it was a big change to do a whole set of different things. It was an overwhelming couple of days but I sure did have a lot of fun. On Friday, I dressed up with my friend as superheroes and went to a party that was hosted by our college neighbor next door, RISD. I met a bunch of cool people and even made a new Japanese friend! The international world is small, and you are bound to find people who you share mutual friends with. Take advantage of your international background! On Saturday, the Japan Cultural Association had its annual Haunted House, which was tiring and exicting all at the same time. We created our own haunted house, in a series of small classrooms in a basement of an old buildling at Brown. Scary right? It was a great success and I had a lot of fun scaring people (I didn’t think that would be fun, but hey, it really was!). As an international student, you will definitely experience a lot of ‘firsts’, just like Halloween. Don’t forget to be open-minded and try new things. That being said, no one really pressures you, and it’s also cool to stick to what you’re used to as well. Stay warm, folks. It just started snowing here and I am freaking out! Winter is coming! Best, Akira If you have any more questions, comments, suggestions of what I should write about or just want to chat, feel free to message me at [email protected].
{ "pile_set_name": "Pile-CC" }
Multivariate modelling of infectious disease surveillance data. This paper describes a model-based approach to analyse multivariate time series data on counts of infectious diseases. It extends a method previously described in the literature to deal with possible dependence between disease counts from different pathogens. In a spatio-temporal context it is proposed to include additional information on global dispersal of the pathogen in the model. Two examples are given: the first describes an analysis of weekly influenza and meningococcal disease counts from Germany. The second gives an analysis of the spatio-temporal spread of influenza in the U.S.A., 1996-2006, using air traffic information. Maximum likelihood estimates in this non-standard model class are obtained using general optimization routines, which are integrated in the R package surveillance.
{ "pile_set_name": "PubMed Abstracts" }
Q: Summarize ndarray by 2d array in Python I want to summarize a 3d array dat using indices contained in a 2d array idx. Consider the example below. For each margin along dat[:, :, i], I want to compute the median according to some index idx. The desired output (out) is a 2d array, whose rows record the index and columns record the margin. The following code works but is not very efficient. Any suggestions? import numpy as np dat = np.arange(12).reshape(2, 2, 3) idx = np.array([[0, 0], [1, 2]]) out = np.empty((3, 3)) for i in np.unique(idx): out[i,] = np.median(dat[idx==i], axis = 0) print(out) Output: [[ 1.5 2.5 3.5] [ 6. 7. 8. ] [ 9. 10. 11. ]] A: To visualize the problem better, I will refer to the 2x2 dimensions of the array as the rows and columns, and the 3 dimension as depth. I will refer to vectors along the 3rd dimension as "pixels" (pixels have length 3), and planes along the first two dimensions as "channels". Your loop is accumulating a set of pixels selected by the mask idx == i, and taking the median of each channel within that set. The result is an Nx3 array, where N is the number of distinct incides that you have. One day, generalized ufuncs will be ubiquitous in numpy, and np.median will be such a function. On that day, you will be able to use reduceat magic1 to do something like unq, ind = np.unique(idx, return_inverse=True) np.median.reduceat(dat.reshape(-1, dat.shape[-1]), np.r_[0, np.where(np.diff(unq[ind]))[0]+1]) 1 See Applying operation to unevenly split portions of numpy array for more info on the specific type of magic. Since this is not currently possible, you can use scipy.ndimage.median instead. This version allows you to compute medians over a set of labeled areas in an array, which is exactly what you have with idx. This method assumes that your index array contains N densely packed values, all of which are in range(N). Otherwise the reshaping operations will not work properly. If that is not the case, start by transforming idx: _, ind = np.unique(idx, return_inverse=True) idx = ind.reshape(idx.shape) OR idx = np.unique(idx, return_inverse=True)[1].reshape(idx.shape) Since you are actually computing a separate median for each region and channel, you will need to have a set of labels for each channel. Flesh out idx to have a distinct set of indices for each channel: chan = dat.shape[-1] offset = idx.max() + 1 index = np.stack([idx + i * offset for i in range(chan)], axis=-1) Now index has an identical set of regions defined in each channel, which you can use in scipy.ndimage.median: out = scipy.ndimage.median(dat, index, index=range(offset * chan)).reshape(chan, offset).T The input labels must be densely packed from zero to offset * chan for index=range(offset * chan) to work properly, and the reshape operation to have the right number of elements. The final transpose is just an artifact of how the labels are arranged. Here is the complete product, along with an IDEOne demo of the result: import numpy as np from scipy.ndimage import median dat = np.arange(12).reshape(2, 2, 3) idx = np.array([[0, 0], [1, 2]]) def summarize(dat, idx): idx = np.unique(idx, return_inverse=True)[1].reshape(idx.shape) chan = dat.shape[-1] offset = idx.max() + 1 index = np.stack([idx + i * offset for i in range(chan)], axis=-1) return median(dat, index, index=range(offset * chan)).reshape(chan, offset).T print(summarize(dat, idx))
{ "pile_set_name": "StackExchange" }
Biography I am happy that you are using this web site and hope that you found it useful. Unfortunately, the cost of making this material freely available is increasing, so if you have found the site useful and would like to contribute towards its continuation, I would greatly appreciate it. Click the button to go to Paypal and make a donation. Dorothea Benckendorff, Princess Lieven (1784-1857) Dorothea, Princess Lieven, was born in December, 1784, into the Russian Baltic nobility at Riga, now in Latvia. Her father, General Christopher von Benckendorff, served as military governor of Russia’s Baltic provinces; her mother, Anna Juliane née Schilling von Cannstatt, held a high position at the Russian court as senior lady-in-waiting and best friend of Empress Maria Fyodorovna, the wife of Czar Paul and mother of the Czars Alexander I and Nicholas. Princess Lieven had two brothers. Count Alexander Benkendorf, four years her senior, was aide-de-camp to the Emperor Nicholas, and at one time Chief of the Secret Police. He died in 1844. Count Constantine Benkendorf was born in the same year as the Princess; he rose to the rank of General in the Russian service, and died of fever, in 1828, at Pravadi, during the first campaign of the war against Turkey. Dorothea was educated at the Smolny Convent Institute in St Petersburg and then was assigned as a maid of honour to the Empress Maria. In 1801, at the age of sixteen, some months after finishing her studies, Dorothea married General Count (later Prince) Christopher Lieven. Princess Lieven had, in all, five sons and one daughter. Two sons, Alexander and Paul, alone survived their parents. Of the younger children, the only daughter died, presumably, in infancy; Arthur and George died at Petersburg, of scarlet fever, in 1835, while Constantine, having incurred his father's displeasure, left his family and died in America in the year 1838. At the Peace of Tilsit, in 1807, Count Lieven had attained the rank of Lieutenant-General, and in 1810 was accredited to Berlin as Russian Minister Plenipotentiary, at the Court of Frederick-William III. In 1812 Count Lieven was appointed Ambassador in London, and held this post for the following twenty-two years. Dorothea used her intelligence, charisma, and social skills to contribute materially to the success of her husband’s embassy. In England's political environment, the Princess discovered that she had a flair for politics. By 1814, if not earlier, she was elected as one of the patronesses of Almack's Assembly Rooms, the first foreigner to be so honoured; she is said to have introduced the German Waltz to Almack's. She was a prominent political hostess: invitations to her house were the most sought after. She held the confidence of some of the most important statesmen in London and Europe and she was considered to be at least as politically important, if not more so, than her ambassador husband who, at the time of the coronation of the Emperor Nicholas in September, 1826, received the title of Prince. The Princess participated, either directly or indirectly, in every major diplomatic event between 1812 and 1857. She knew ‘everyone in the Courts and cabinets for thirty or forty years [and] knew all the secret annals of diplomacy’, wrote a French diplomat. Dorothea devoted herself tirelessly to the welfare of Russia, assiduously sleeping with every major statesman on the European stage, including Metternich, George IV and each successive British prime minister except George Canning, whom she saw as a plebeian with no manners. Her lovers changed with each Cabinet reshuffle. She performed at least one secret diplomatic mission for the Tsar when, in 1825 Tsar Alexander entrusted Dorothea with a secret overture to the British government. ‘It is a pity Countess Lieven wears skirts’, the Tsar wrote to his foreign minister Count Nesselrode. ‘She would have made an excellent diplomat.’ The Tsar’s mission marked Dorothea Lieven’s debut as a diplomat in her own right. During Prince Lieven’s ambassadorship in England, (1812-1834) the Princess played a key role in the birth of modern Greece, and made a notable contribution to the creation of today’s Belgium. In London, Princess Lieven cultivated friendships with the foremost statesmen of her day. She and Austrian Chancellor Prince Klemens Lothar Wenzel von Metternich had a notorious liaison. Her friendships with George IV, Prince Metternich, the Duke of Wellington, George Canning, Count Nesselrode, Lord Grey, and François Guizot gave Dorothea Lieven the opportunity to exercise authority in the diplomatic councils of Great Britain, France, and Russia. In 1834 Prince Lieven was recalled from London, and was named Governor to the young Czarevitch, later Emperor Alexander II. Despite her residence in London, the Princess had already been appointed senior lady-in-waiting to the Empress Alexandra in 1829. Soon after the Lievens returned to Russia, their two youngest sons died suddenly. This tragedy and her declining health caused the Princess to leave her native land and settle in Paris. Though she suffered from ill health in the last decades of her life, she continued to be involved in politics and diplomacy. Her collected letters provide a wickedly gossipy insight into Regency England. In a city where salons served a unique social and political purpose, Princess Lieven’s Paris salon, known as ‘the listening/observation post of Europe’, empowered her to be an independent stateswoman. In 1837 she and François Guizot entered into a close personal partnership that lasted until the Princess's death. Dorothea Lieven died peacefully at her home, 2 rue Saint-Florentin, Paris1 on 27 January 1857 . She was buried, according to her wish, at the Lieven family estate, Mežotne near Jelgava, next to her two young sons who had died in St. Petersburg. These materials may be freely used for non-commercial purposes in accordance with applicable statutory allowances and distribution to students. Re-publication in any form is subject to written permission.
{ "pile_set_name": "Pile-CC" }
{ "jsonSchemaSemanticVersion": "1.0.0", "imports": [ { "corpusPath": "cdm:/foundations.1.1.cdm.json" }, { "corpusPath": "/core/operationsCommon/Common.1.0.cdm.json", "moniker": "base_Common" }, { "corpusPath": "/core/operationsCommon/DataEntityView.1.0.cdm.json", "moniker": "base_DataEntityView" }, { "corpusPath": "/core/operationsCommon/Tables/SupplyChain/ProductInformationManagement/Main/InventTable.1.0.cdm.json" }, { "corpusPath": "/core/operationsCommon/Tables/SupplyChain/ProcurementAndSourcing/WorksheetHeader/PurchTable.1.0.cdm.json" }, { "corpusPath": "/core/operationsCommon/Tables/SupplyChain/ProcurementAndSourcing/Transaction/VendPackingSlipJour.1.0.cdm.json" }, { "corpusPath": "/core/operationsCommon/Tables/SupplyChain/ProcurementAndSourcing/Transaction/VendPackingSlipTrans.1.0.cdm.json" }, { "corpusPath": "/core/operationsCommon/Tables/Finance/Ledger/Main/CompanyInfo.1.0.cdm.json" } ], "definitions": [ { "entityName": "PurchPackingSlipTmp", "extendsEntity": "base_Common/Common", "exhibitsTraits": [ { "traitReference": "is.CDM.entityVersion", "arguments": [ { "name": "versionNumber", "value": "1.0" } ] } ], "hasAttributes": [ { "name": "ExternalItemNum", "dataType": "ExternalItemId", "isNullable": true, "description": "" }, { "name": "InventDimPrint", "dataType": "FreeTxt", "isNullable": true, "description": "" }, { "name": "InventDimProduct", "dataType": "InventDimPrint", "isNullable": true, "description": "" }, { "name": "ItemId", "dataType": "ItemId", "isNullable": true, "description": "" }, { "name": "JournalRecId", "dataType": "VendPackingSlipJourRecId", "description": "" }, { "name": "Name", "dataType": "ItemFreeTxt", "isNullable": true, "description": "" }, { "name": "Ordered", "dataType": "PurchQty", "isNullable": true, "description": "" }, { "name": "PackingSlipId", "dataType": "PackingSlipId", "isNullable": true, "description": "" }, { "name": "pdsCWQty", "dataType": "PdsCWInventQty", "isNullable": true, "description": "" }, { "name": "pdsCWStr", "dataType": "String255", "isNullable": true, "description": "" }, { "name": "pdsCWUnitId", "dataType": "PdsCWUnitId", "isNullable": true, "description": "" }, { "name": "PurchId", "dataType": "PurchIdBase", "isNullable": true, "description": "" }, { "name": "PurchUnitTxt", "dataType": "UnitOfMeasureReportingText", "isNullable": true, "description": "" }, { "name": "Qty", "dataType": "PurchDeliveredQty", "isNullable": true, "description": "" }, { "name": "Remain", "dataType": "PurchQty", "isNullable": true, "description": "" }, { "name": "ValueMST", "dataType": "AmountMST", "isNullable": true, "displayName": "Value", "description": "" }, { "name": "VendPackingSlipTrans", "dataType": "VendPackingSlipTransRecId", "description": "" }, { "name": "DataAreaId", "dataType": "string", "isReadOnly": true }, { "entity": { "entityReference": "InventTable" }, "name": "Relationship_InventTableRelationship", "resolutionGuidance": { "entityByReference": { "allowReference": true } } }, { "entity": { "entityReference": "PurchTable" }, "name": "Relationship_PurchTableRelationship", "resolutionGuidance": { "entityByReference": { "allowReference": true } } }, { "entity": { "entityReference": "VendPackingSlipJour" }, "name": "Relationship_VendPackingSlipJourRelationship", "resolutionGuidance": { "entityByReference": { "allowReference": true } } }, { "entity": { "entityReference": "VendPackingSlipTrans" }, "name": "Relationship_VendPackingSlipTransRelationship", "resolutionGuidance": { "entityByReference": { "allowReference": true } } }, { "entity": { "entityReference": "CompanyInfo" }, "name": "Relationship_CompanyRelationship", "resolutionGuidance": { "entityByReference": { "allowReference": true } } } ], "displayName": "Show packing slip" }, { "dataTypeName": "ExternalItemId", "extendsDataType": "string" }, { "dataTypeName": "FreeTxt", "extendsDataType": "string" }, { "dataTypeName": "InventDimPrint", "extendsDataType": "string" }, { "dataTypeName": "ItemId", "extendsDataType": "string" }, { "dataTypeName": "VendPackingSlipJourRecId", "extendsDataType": "bigInteger" }, { "dataTypeName": "ItemFreeTxt", "extendsDataType": "string" }, { "dataTypeName": "PurchQty", "extendsDataType": "decimal" }, { "dataTypeName": "PackingSlipId", "extendsDataType": "string" }, { "dataTypeName": "PdsCWInventQty", "extendsDataType": "decimal" }, { "dataTypeName": "String255", "extendsDataType": "string" }, { "dataTypeName": "PdsCWUnitId", "extendsDataType": "string" }, { "dataTypeName": "PurchIdBase", "extendsDataType": "string" }, { "dataTypeName": "UnitOfMeasureReportingText", "extendsDataType": "string" }, { "dataTypeName": "PurchDeliveredQty", "extendsDataType": "decimal" }, { "dataTypeName": "AmountMST", "extendsDataType": "decimal" }, { "dataTypeName": "VendPackingSlipTransRecId", "extendsDataType": "bigInteger" } ] }
{ "pile_set_name": "Github" }
Immunogenicity of hepatitis A vaccine in children with celiac disease. The response to hepatitis A vaccine has not been studied in children with celiac disease (CD). The aim of the present study was to evaluate the immunogenicity of an inactivated hepatitis A virus (HAV) vaccine and the effect of the human leukocyte antigen (HLA) type on immunogenicity in children with CD. Thirty-three patients with CD and 62 healthy controls were enrolled in the study. Inactivated HAV vaccine (Havrix; GlaxoSmithKline Biologicals, Rixensart, Belgium) containing 720 enzyme-linked immunosorbent assay units of alum-adsorbed hepatitis A antigen was administered intramuscularly in a 2-dose schedule at 0 and 6 months. Seroconversion rates and antibody titers of HAV were measured at 1 and 7 months. At 1 month, seroconversion rates were 78.8% and 77.4% and geometric mean titers were 50.7 and 49.9 mIU/mL in the CD and control groups, respectively (P > 0.05). At 7 months, seroconversion rates were 97% and 98.4% and geometric mean titers were 138.5 and 133 mIU/mL in the CD and control groups, respectively (P > 0.05). The most frequent HLA types were HLA-DQ2, -DR3, and -DR7 alleles in patients with CD and HLA-DQ3, -DQ6, -DR11, and -DR14 in the controls. There was no association between HLA alleles and antibody titers of hepatitis A vaccine. Children with CD have a good immune response to hepatitis A vaccine, similar to healthy controls.
{ "pile_set_name": "PubMed Abstracts" }
Disparity of innate immunity-related gene effects on asthma and allergy on Karelia. We investigated the interactive effects of 11 innate immunity-related genes (IL10, IL12b, IL8, TLR2, TLR4, CD14, IFNGR, CC16, IFNg, CMA1, and TGFB) and four IgE response genes (IL4, IL13, IL4RA, and STAT6) with 'Western' or 'Eastern' environments/lifestyles on asthma and allergy in Karelian children. Karelian children (412 Finnish and 446 Russian) were recruited and assessed for a range of allergic conditions, with 24 single-nucleotide polymorphisms genotyped in 15 genes. The genotype-phenotype relationships differed in Finnish and Russian Karelian children. The interaction between polymorphisms and the variable representing 'Western' and 'Eastern' environments/ lifestyles was significant for IL10-1082 (p = 0.0083) on current rhinitis, IL12b 6408 on current conjunctivitis (p = 0.016) and atopy (p = 0.034), IL8 781 on atopic eczema (p = 0.0096), CD14 -550 on current rhinitis (p = 0.022), IFNgR1 -56 on atopic eczema(p = 0.038), and STAT6 2964 on current itchy rash (p = 0.037) and total serum IgE (p = 0.042). In addition, the G allele of IL13 130 was associated with a lower level of total serum IgE in Finnish (p = 0.003) and Russian (p = 0.01) children and overall (pooling the two populations together, p = 0.00006). After adjusting for multiple tests, the association between IL13 130 and IgE and the interactive effects of IL10-1082 on current rhinitis and IL8 781 on atopic eczema were significant by controlling a false-positive rate of 0.05 and 0.10, respectively. Living in an Eastern vs. Western environment was associated with a different genetic profile associated with asthma and allergy in the Karelian populations.
{ "pile_set_name": "PubMed Abstracts" }
Aspects of Human Genetics: With Special Reference to by PDF Read or Download Aspects of Human Genetics: With Special Reference to X-Linked Disorders Symposium on X-Linked Diseases Held by the European Society of Human Genetics, Madrid, September-October 1982: Selected Papers PDF The concept “thoughts turn into issues” has turn into a meme in pop culture. It’s held as a company proposition in metaphysics, and a few religious lecturers ascribe countless powers to the brain. yet are those claims scientifically exact? What does the medical proof let us know in regards to the scope of the human brain to remodel ideas into truth? Antiepileptic medicines are one of the most typically prescribed medicinal drugs via either neurologists and psychiatrists, as they exert a couple of results which expand a ways past their anticonvulsant houses. there's becoming facts that every antiepileptic drug is characterized by means of a selected behavioural profile. Additional info for Aspects of Human Genetics: With Special Reference to X-Linked Disorders Symposium on X-Linked Diseases Held by the European Society of Human Genetics, Madrid, September-October 1982: Selected Papers
{ "pile_set_name": "Pile-CC" }
Diagnostic value of emergency medical services provider judgement in the identification of head injuries among trauma patients. Previous studies have reported that many patients with a severe head injury are not transported to a higher-level trauma centre where the necessary round-the-clock neurosurgical care is available. The aim of this study was to analyse the diagnostic value of emergency medical services (EMS) provider judgement in the identification of a head injury. In this multicentre cohort study, all trauma patients aged 16 years and over who were transported with highest priority to a trauma centre were evaluated. The diagnostic value of EMS provider judgement was determined using an Abbreviated Injury Scale score of ≥1 in the head region as reference standard. A total of 980 (35.4%) of the 2766 patients who were included had a head injury. EMS provider judgement (Abbreviated Injury Scale score ≥1) had a sensitivity of 67.9% and a specificity of 87.7%. In the cohort, 208 (7.5%) patients had a severe head injury. Of these, 68% were transported to a level I trauma centre. Identification of a head injury on-scene is challenging. EMS providers could not identify 32% of the patients with a head injury and 21% of the patients with a severe head injury. Additional education, training and a supplementary protocol with predictors of a severe head injury could help EMS providers in the identification of these patients.
{ "pile_set_name": "PubMed Abstracts" }